diff options
author | AKalinich-Luxoft <AKalinich@luxoft.com> | 2017-10-03 11:48:18 +0300 |
---|---|---|
committer | BSolonenko <BSolonenko@luxoft.com> | 2018-01-26 12:36:17 +0200 |
commit | 864d96ba4fca82c3a56febdb7474c5f7d555d625 (patch) | |
tree | d9150dda52545afa92d83835ec389d1545cb73f7 | |
parent | ee73e2507a05800d2a0b2cd47712f61b472ec09b (diff) | |
download | sdl_core-864d96ba4fca82c3a56febdb7474c5f7d555d625.tar.gz |
Add new PermitResult values for EXTERNAL_PROPRIETARY flow
Added new values for more detailed CheckPermissions result
description. This values will be used in AM layer for
generating info message string.
3 files changed, 14 insertions, 7 deletions
diff --git a/src/components/policy/policy_external/include/policy/policy_types.h b/src/components/policy/policy_external/include/policy/policy_types.h index f57919b6f7..4055922a02 100644 --- a/src/components/policy/policy_external/include/policy/policy_types.h +++ b/src/components/policy/policy_external/include/policy/policy_types.h @@ -113,7 +113,13 @@ typedef std::vector<std::string> PermissionsList; */ typedef std::vector<std::string> StringArray; -enum PermitResult { kRpcAllowed = 0, kRpcDisallowed, kRpcUserDisallowed }; +enum PermitResult { + kRpcAllowed = 0, + kRpcDisallowed, + kRpcUserDisallowed, + kRpcAllParamsDisallowed, + kRpcAllParamsUserDisallowed +}; /** * @struct Stores result of check: diff --git a/src/components/policy/policy_external/src/cache_manager.cc b/src/components/policy/policy_external/src/cache_manager.cc index a9b599f981..a9ba20aa29 100644 --- a/src/components/policy/policy_external/src/cache_manager.cc +++ b/src/components/policy/policy_external/src/cache_manager.cc @@ -1152,6 +1152,7 @@ void CacheManager::CheckPermissions(const PTString& app_id, policy_table::Strings::const_iterator app_groups_iter_end = pt_->policy_table.app_policies_section.apps[app_id].groups.end(); + result.hmi_level_permitted = PermitResult::kRpcDisallowed; policy_table::FunctionalGroupings::const_iterator concrete_group; for (; app_groups_iter != app_groups_iter_end; ++app_groups_iter) { diff --git a/src/components/policy/policy_external/src/policy_manager_impl.cc b/src/components/policy/policy_external/src/policy_manager_impl.cc index 806b7e13ba..6a186f243b 100644 --- a/src/components/policy/policy_external/src/policy_manager_impl.cc +++ b/src/components/policy/policy_external/src/policy_manager_impl.cc @@ -665,7 +665,7 @@ void PolicyManagerImpl::CheckPermissions(const PTString& app_id, .parameter_permissions.any_parameter_disallowed_by_user) { LOG4CXX_DEBUG(logger_, "All parameters are disallowed by user."); result.list_of_disallowed_params = rpc_params; - result.hmi_level_permitted = kRpcUserDisallowed; + result.hmi_level_permitted = kRpcAllParamsUserDisallowed; return; } @@ -673,7 +673,7 @@ void PolicyManagerImpl::CheckPermissions(const PTString& app_id, .parameter_permissions.any_parameter_disallowed_by_policy) { LOG4CXX_DEBUG(logger_, "All parameters are disallowed by policy."); result.list_of_undefined_params = rpc_params; - result.hmi_level_permitted = kRpcDisallowed; + result.hmi_level_permitted = kRpcAllParamsDisallowed; return; } @@ -709,11 +709,11 @@ void PolicyManagerImpl::CheckPermissions(const PTString& app_id, } if (result.DisallowedInclude(rpc_params)) { - LOG4CXX_DEBUG(logger_, "All parameters are disallowed."); - result.hmi_level_permitted = kRpcUserDisallowed; + LOG4CXX_DEBUG(logger_, "All parameters are disallowed by user."); + result.hmi_level_permitted = kRpcAllParamsUserDisallowed; } else if (!result.IsAnyAllowed(rpc_params)) { - LOG4CXX_DEBUG(logger_, "There are no parameters allowed."); - result.hmi_level_permitted = kRpcDisallowed; + LOG4CXX_DEBUG(logger_, "There are no parameters allowed by policy."); + result.hmi_level_permitted = kRpcAllParamsDisallowed; } if (cache_->IsApplicationRevoked(app_id)) { |