From bad30c92a1cbe0e411f52c277cef37b6570b623f Mon Sep 17 00:00:00 2001
From: José Bollo The afm-system-daemon
-
+The afm-system-daemon
+José Bollo
+Fulup Ar Foll
+30 mai 2016
+The afm-system-daemon
-
-version: 1
Date: 30 mai 2016
-Author: José Bollo
-
This document describes application framework system daemon fundamentals. -FCF (Fully Conform to Specification) implementation is still under development. -It may happen that current implementation somehow diverges with specifications.
- - -The daemon afm-system-daemon is in charge of installing -applications on AGL system. Its main tasks are:
- +Author: José Bollo +TABLE-OF-CONTENT-HERE
+This document describes application framework system daemon fundamentals. FCF (Fully Conform to Specification) implementation is still under development. It may happen that current implementation somehow diverges with specifications.
+The daemon afm-system-daemon is in charge of installing applications on AGL system. Its main tasks are:
installs applications and setup security framework -for newly installed application.
installs applications and setup security framework for newly installed application.
uninstall applications
The afm-system-daemon takes its orders from system -instance of D-Bus.
- +The afm-system-daemon takes its orders from system instance of D-Bus.
The figure below summarizes the situation of afm-system-daemon in the system.
-+------------------------------------------------------------+
| User |
| |
@@ -79,169 +69,89 @@ instance of D-Bus.
| +--------------------+ +-----------------------+ |
| |
| System |
-+------------------------------------------------------------+
-
-
-
-afm-system-daemon is launched as a systemd service -attached to system. Normally, the service file is -located at /lib/systemd/system/afm-system-daemon.service.
- ++------------------------------------------------------------+ +afm-system-daemon is launched as a systemd service attached to system. Normally, the service file is located at /lib/systemd/system/afm-system-daemon.service.
The options for launching afm-system-daemon are:
--r
--root directory
- Set the root application directory.
+ Set the root application directory.
- Note that the default root directory is defined
- to be /usr/share/afm/applications (may change).
+ Note that the default root directory is defined
+ to be /usr/share/afm/applications (may change).
-d
--daemon
- Daemonizes the process. It is not needed by sytemd.
+ Daemonizes the process. It is not needed by sytemd.
-q
--quiet
- Reduces the verbosity (can be repeated).
+ Reduces the verbosity (can be repeated).
-v
--verbose
- Increases the verbosity (can be repeated).
+ Increases the verbosity (can be repeated).
-h
--help
- Prints a short help.
-
-
-
-afm-system-daemon takes its orders from the session instance -of D-Bus. The use of D-Bus is great because it allows to implement -discovery and signaling.
- -The afm-system-daemon is listening with the destination name -org.AGL.afm.system at the object of path /org/AGL/afm/system -on the interface org.AGL.afm.system for the below detailed -members install and uninstall.
- -D-Bus is mainly used for signaling and discovery. Its optimized -typed protocol is not used except for transmitting only one string -in both directions.
- -The client and the service are using JSON serialization to -exchange data.
- + Prints a short help. +afm-system-daemon takes its orders from the session instance of D-Bus. The use of D-Bus is great because it allows to implement discovery and signaling.
+The afm-system-daemon is listening with the destination name org.AGL.afm.system at the object of path /org/AGL/afm/system on the interface org.AGL.afm.system for the below detailed members install and uninstall.
+D-Bus is mainly used for signaling and discovery. Its optimized typed protocol is not used except for transmitting only one string in both directions.
+The client and the service are using JSON serialization to exchange data.
The D-Bus interface is defined by:
-DESTINATION: org.AGL.afm.system
PATH: /org/AGL/afm/system
INTERFACE: org.AGL.afm.system
The signature of any member of the interface is string -> string -for JSON -> JSON.
- -This is the normal case. In case of error, the current implementation -returns a dbus error that is a string.
- -Here is an example using dbus-send to query data on -installed applications.
- +The signature of any member of the interface is string -> string for JSON -> JSON.
+This is the normal case. In case of error, the current implementation returns a dbus error that is a string.
+Here is an example using dbus-send to query data on installed applications.
dbus-send --session --print-reply \
---dest=org.AGL.afm.system \
-/org/AGL/afm/system \
-org.AGL.afm.system.install 'string:"/tmp/appli.wgt"'
-
-
-
-Description: Install an application from a widget file.
- -When an application with the same id and version already exists. Outside of -using force=true the application is not reinstalled.
- -Applications are installed the subdirectories of applications common directory. -If root is specified, the application is installed under the -sub-directories of the root defined.
- -Note that this methods is a simple accessor method of -org.AGL.afm.system.install from afm-system-daemon.
- -After the installation and before returning to the sender, -afm-system-daemon sends a signal org.AGL.afm.system.changed.
- -Input: The path of the widget file to install and, optionally, -a flag to force reinstallation, and, optionally, a root directory.
- +When an application with the same id and version already exists. Outside of using force=true the application is not reinstalled.
+Applications are installed the subdirectories of applications common directory. If root is specified, the application is installed under the sub-directories of the root defined.
+Note that this methods is a simple accessor method of org.AGL.afm.system.install from afm-system-daemon.
+After the installation and before returning to the sender, afm-system-daemon sends a signal org.AGL.afm.system.changed.
+Input: The path of the widget file to install and, optionally, a flag to force reinstallation, and, optionally, a root directory.
Either just a string being the absolute path of the widget file:
- -"/a/path/driving/to/the/widget"
-
-
+"/a/path/driving/to/the/widget"
Or an object:
-{
- "wgt": "/a/path/to/the/widget",
- "force": false,
- "root": "/a/path/to/the/root"
-}
-
-
-“wgt” and “root” must be absolute paths.
- -output: An object with the field “added” being the string for -the id of the added application.
- -{"added":"appli@x.y"}
-
-
+ "wgt": "/a/path/to/the/widget",
+ "force": false,
+ "root": "/a/path/to/the/root"
+}
+"wgt" and "root" must be absolute paths.
+output: An object with the field "added" being the string for the id of the added application.
+{"added":"appli@x.y"}
Description: Uninstall an application from its id.
- -Note that this methods is a simple method accessor of -org.AGL.afm.system.uninstall from afm-system-daemon.
- -After the uninstallation and before returning to the sender, -afm-system-daemon sends a signal org.AGL.afm.system.changed.
- +Note that this methods is a simple method accessor of org.AGL.afm.system.uninstall from afm-system-daemon.
+After the uninstallation and before returning to the sender, afm-system-daemon sends a signal org.AGL.afm.system.changed.
Input: the id of the application and optionally the application root path.
-Either a string:
- -"appli@x.y"
-
-
+"appli@x.y"
Or an object:
-{
- "id": "appli@x.y",
- "root": "/a/path/to/the/root"
-}
-
-
-output: the value ‘true’.
+ "id": "appli@x.y", + "root": "/a/path/to/the/root" +} +output: the value 'true'.
diff --git a/doc/afm-user-daemon.html b/doc/afm-user-daemon.html index d69c396..a7fcd49 100644 --- a/doc/afm-user-daemon.html +++ b/doc/afm-user-daemon.html @@ -1,94 +1,68 @@ + - - + + + + + +version: 1
Date: 30 mai 2016
-Author: José Bollo
-
-
-This document describes application framework user daemon fundamentals. -FCF (Fully Conform to Specification) implementation is still under development. -It may happen that current implementation somehow diverges with specifications.
- - -The daemon afm-user-daemon is in charge of handling -applications on behalf of a user. Its main tasks are:
- +Author: José Bollo +TABLE-OF-CONTENT-HERE
+This document describes application framework user daemon fundamentals. FCF (Fully Conform to Specification) implementation is still under development. It may happen that current implementation somehow diverges with specifications.
+The daemon afm-user-daemon is in charge of handling applications on behalf of a user. Its main tasks are:
enumerate applications that end user can run -and keep this list available on demand
start applications on behalf of end user, set user running -environment, set user security context
enumerate applications that end user can run and keep this list available on demand
start applications on behalf of end user, set user running environment, set user security context
list current runnable or running applications
stop (aka pause), continue (aka resume), terminate -a running instance of a given application
transfer requests for installation/uninstallation -of applications to the corresponding system daemon -afm-system-daemon
stop (aka pause), continue (aka resume), terminate a running instance of a given application
transfer requests for installation/uninstallation of applications to the corresponding system daemon afm-system-daemon
The afm-user-daemon takes its orders from the session -instance of D-Bus.
- +The afm-user-daemon takes its orders from the session instance of D-Bus.
The figure below summarizes the situation of afm-user-daemon in the system.
-+------------------------------------------------------------+
| User |
| +---------------------+ |
@@ -115,165 +89,89 @@ instance of D-Bus.
| +--------------------+ +-----------------------+ |
| |
| System |
-+------------------------------------------------------------+
-
-
-
-At start afm-user-daemon scans the directories containing -applications and load in memory a list of avaliable applications -accessible by current user.
- -When afm-system-daemon installs or removes an application. -On success it sends the signal org.AGL.afm.system.changed. -When receiving such a signal, afm-user-daemon rebuilds its -applications list.
- -afm-user-daemon provides the data it collects about -applications to its clients. Clients may either request the full list -of avaliable applications or a more specific information about a -given application.
- - -afm-user-daemon launches application. Its builds a secure -environment for the application before starting it within a -secured environment.
- ++------------------------------------------------------------+ +At start afm-user-daemon scans the directories containing applications and load in memory a list of avaliable applications accessible by current user.
+When afm-system-daemon installs or removes an application. On success it sends the signal org.AGL.afm.system.changed. When receiving such a signal, afm-user-daemon rebuilds its applications list.
+afm-user-daemon provides the data it collects about applications to its clients. Clients may either request the full list of avaliable applications or a more specific information about a given application.
+afm-user-daemon launches application. Its builds a secure environment for the application before starting it within a secured environment.
Different kind of applications can be launched.
- -This is set using a configuration file that describes -how to launch an application of a given kind within a given -mode.
- +This is set using a configuration file that describes how to launch an application of a given kind within a given mode.
There is two launching modes: local or remote.
- -Launching an application locally means that -the application and its binder are launched together.
- -Launching application remotely translates in only launching -the application binder. The UI by itself has to be activated -remotely by the requested (ie: HTML5 homescreen in a browser)
- -Once launched, running instances of application receive -a runid that identify them.
- - -afm-user-daemon manages the list of applications -that it launched.
- -When owning the right permissions, a client can get the list -of running instances and details about a specific -running instance. It can also terminates, stops or -continues a given application.
- - -If the client own the right permissions, -afm-user-daemon delegates that task -to afm-system-daemon.
- - -afm-user-daemon is launched as a systemd service -attached to user sessions. Normally, the service file is -located at /usr/lib/systemd/user/afm-user-daemon.service.
- +Launching an application locally means that the application and its binder are launched together.
+Launching application remotely translates in only launching the application binder. The UI by itself has to be activated remotely by the requested (ie: HTML5 homescreen in a browser)
+Once launched, running instances of application receive a runid that identify them.
+afm-user-daemon manages the list of applications that it launched.
+When owning the right permissions, a client can get the list of running instances and details about a specific running instance. It can also terminates, stops or continues a given application.
+If the client own the right permissions, afm-user-daemon delegates that task to afm-system-daemon.
+afm-user-daemon is launched as a systemd service attached to user sessions. Normally, the service file is located at /usr/lib/systemd/user/afm-user-daemon.service.
The options for launching afm-user-daemon are:
--a
--application directory
- Includes the given application directory to
- the database base of applications.
+ Includes the given application directory to
+ the database base of applications.
- Can be repeated.
+ Can be repeated.
-r
--root directory
- Includes root application directory or directories when
- passing multiple rootdir to
- applications database.
-
- Note that default root directory for
- applications is always added. In current version
- /usr/share/afm/applications is used as default.
+ Includes root application directory or directories when
+ passing multiple rootdir to
+ applications database.
+ Note that default root directory for
+ applications is always added. In current version
+ /usr/share/afm/applications is used as default.
+
-m
--mode (local|remote)
- Set the default launch mode.
- The default value is 'local'
+ Set the default launch mode.
+ The default value is 'local'
-d
--daemon
- Daemonizes the process. It is not needed by sytemd.
+ Daemonizes the process. It is not needed by sytemd.
-q
--quiet
- Reduces the verbosity (can be repeated).
+ Reduces the verbosity (can be repeated).
-v
--verbose
- Increases the verbosity (can be repeated).
+ Increases the verbosity (can be repeated).
-h
--help
- Prints a short help.
-
-
-
-It contains rules for launching applications. -When afm-user-daemon has to launch an application, -it looks for launch mode (local or remote), as well as -for the type of application describe in config.xml -widget configuration file.
- + Prints a short help. +It contains rules for launching applications. When afm-user-daemon has to launch an application, it looks for launch mode (local or remote), as well as for the type of application describe in config.xml widget configuration file.
This tuple mode+type allows to select the adequate rule.
-Configuration file is /etc/afm/afm-launch.conf.
- -It contains sections and rules. It can also contain comments -and empty lines to improve readability.
- -The separators are space and tabulation, any other character -should have a meaning.
- -The format is line oriented. -The new line character separate the lines.
- -Lines having only separators are blank lines and ignored. -Line having character #(sharp) at first position are comment -lines and ignored.
- -Lines not starting with a separator are different -from lines starting with a separator character.
- +It contains sections and rules. It can also contain comments and empty lines to improve readability.
+The separators are space and tabulation, any other character should have a meaning.
+The format is line oriented. The new line character separate the lines.
+Lines having only separators are blank lines and ignored. Line having character #(sharp) at first position are comment lines and ignored.
+Lines not starting with a separator are different from lines starting with a separator character.
The grammar of the configuration file is defined below:
-CONF: *COMMENT *SECTION
SECTION: MODE *RULE
RULE: +TYPE VECTOR ?VECTOR
-MODE: 'mode' +SEP ('local' | 'remote') *SEP EOL
+MODE: 'mode' +SEP ('local' | 'remote') *SEP EOL
TYPE: DATA *SEP EOL
@@ -285,30 +183,22 @@ NDATA: +NCHAR
EOL: NL *COMMENT
COMMENT: *SEP CMT *(SEP | NCHAR) NL
-NL: '\x0a'
-SEP: '\x20' | '\x09'
-CMT: '#'
-CHAR: '\x00'..'\x08' | '\x0b'..'\x1f' | '\x21' | '\x22' | '\x24'..'\xff'
-NCHAR: CMT | CHAR
-
-
-Here is a sample of configuration file for defining how -to launch an application of types application/x-executable, -text/x-shellscript and text/html in local mode:
- +NL: '\x0a' +SEP: '\x20' | '\x09' +CMT: '#' +CHAR: '\x00'..'\x08' | '\x0b'..'\x1f' | '\x21' | '\x22' | '\x24'..'\xff' +NCHAR: CMT | CHAR +Here is a sample of configuration file for defining how to launch an application of types application/x-executable, text/x-shellscript and text/html in local mode:
mode local
application/x-executable
text/x-shellscript
-%r/%c
+ %r/%c
text/html
-/usr/bin/afb-daemon --mode=local --readyfd=%R --alias=/icons:%I --port=%P --rootdir=%r --token=%S --sessiondir=%D/.afb-daemon
-/usr/bin/web-runtime http://localhost:%P/%c?token=%S
-
-
+ /usr/bin/afb-daemon --mode=local --readyfd=%R --alias=/icons:%I --port=%P --rootdir=%r --token=%S --sessiondir=%D/.afb-daemon
+ /usr/bin/web-runtime http://localhost:%P/%c?token=%S
This shows that:
-Within this mode, the launchers have either one or two description vectors. -All of those vectors are treated as programs -and are executed with ‘execve’ system call.
- -The first vector is the leader vector and it defines the process -group. The second vector (if any) is attached to the group -defined by this first vector.
- - -Within this mode, the launchers have either one or two vectors -describing them.
- -The first vector is process as a program and is executed with -system call ‘execve’.
- -The second vector (if any) defines a text that is returned -to the caller. This mechanism can be used to return a uri -for remote UI to connect on the newly launched application.
- -The daemon afm-user-daemon allocates a port for each -new remote application. -The current implementation port allocation is incremental. -A smarter (cacheable and discoverable) allocation should be defined.
- - -Vectors can include sequences of 2 characters that have a special -meaning. These sequences are named %substitution because their -first character is the percent sign (%) and because each occurrence -of the sequence is replaced, at launch time, by the value associated -to sequences.
- +Within this mode, the launchers have either one or two description vectors. All of those vectors are treated as programs and are executed with 'execve' system call.
+The first vector is the leader vector and it defines the process group. The second vector (if any) is attached to the group defined by this first vector.
+Within this mode, the launchers have either one or two vectors describing them.
+The first vector is process as a program and is executed with system call 'execve'.
+The second vector (if any) defines a text that is returned to the caller. This mechanism can be used to return a uri for remote UI to connect on the newly launched application.
+The daemon afm-user-daemon allocates a port for each new remote application. The current implementation port allocation is incremental. A smarter (cacheable and discoverable) allocation should be defined.
+Vectors can include sequences of 2 characters that have a special meaning. These sequences are named %substitution because their first character is the percent sign (%) and because each occurrence of the sequence is replaced, at launch time, by the value associated to sequences.
Here is the list of %substitutions:
-%%: %.
- -This simply emits the percent sign %
%a: appid
- +This simply emits the percent sign %
+Holds application Id of launched application.
- -Defined by the attribute id of the element
%c: content
- +Defined by the attribute id of the element
The file within the widget directory that is the entry point.
- -For HTML applications, it represents the relative path to main -page (aka index.html).
- -Defined by attribute src of the element
%D: datadir
- -Path of the directory where the application runs (cwd) -and stores its data.
- -It is equal to %h/%a.
%H: height
- +For HTML applications, it represents the relative path to main page (aka index.html).
+Defined by attribute src of the element
Path of the directory where the application runs (cwd) and stores its data.
+It is equal to %h/%a.
+Requested height for the widget.
- -Defined by the attribute height of the element
%h: homedir
- +Defined by the attribute height of the element
Path of the home directory for all applications.
- -It is generally equal to $HOME/app-data
%I: icondir
- -Path of the directory were the icons of the applications can be found.
%m: mime-type
- +It is generally equal to $HOME/app-data
+Path of the directory were the icons of the applications can be found.
+Mime type of the launched application.
- -Defined by the attribute type of the element
%n: name
- -Name of the application as defined by the content of the
-element
%p: plugins
- -In the future should represent the list of plugins and plugins directory separated by ‘,’. -Warning: not supported in current version.
%P: port
- -A port to use. It is currently a kind of random port. The precise -model is to be defined later.
%R: readyfd
- -Number of file descriptor to use for signaling -readiness of launched process.
%r: rootdir
- -Path of directory containing the widget and its data.
%S: secret
- -An hexadecimal number that can be used to initialize pairing of client -and application binder.
%W: width
- -Requested width for the widget.
- -Defined by the attribute width of the element
Defined by the attribute type of the element
afm-user-daemon takes its orders from the session instance -of D-Bus. D-Bus is nice to use in this context because it allows -discovery and signaling.
- -The dbus session is by default addressed by environment -variable DBUS_SESSION_BUS_ADDRESS. Using systemd -variable DBUS_SESSION_BUS_ADDRESS is automatically set for -user sessions.
- -The afm-user-daemon is listening on destination name -org.AGL.afm.user at object path /org/AGL/afm/user -on interface org.AGL.afm.user for following members: - runnables, detail, start, terminate, -stop, continue, runners, state, -install and uninstall.
- -D-Bus is mainly used for signaling and discovery. Its optimized -typed protocol is not used except for transmission of standalone strings.
- +Name of the application as defined by the content of the element
In the future should represent the list of plugins and plugins directory separated by ','. Warning: not supported in current version.
+A port to use. It is currently a kind of random port. The precise model is to be defined later.
+Number of file descriptor to use for signaling readiness of launched process.
+Path of directory containing the widget and its data.
+An hexadecimal number that can be used to initialize pairing of client and application binder.
+Requested width for the widget.
+Defined by the attribute width of the element
afm-user-daemon takes its orders from the session instance of D-Bus. D-Bus is nice to use in this context because it allows discovery and signaling.
+The dbus session is by default addressed by environment variable DBUS_SESSION_BUS_ADDRESS. Using systemd variable DBUS_SESSION_BUS_ADDRESS is automatically set for user sessions.
+The afm-user-daemon is listening on destination name org.AGL.afm.user at object path /org/AGL/afm/user on interface org.AGL.afm.user for following members: runnables, detail, start, terminate, stop, continue, runners, state, install and uninstall.
+D-Bus is mainly used for signaling and discovery. Its optimized typed protocol is not used except for transmission of standalone strings.
Clients and Services are using JSON serialisation to exchange data.
-The D-Bus interface is defined by:
-DESTINATION: org.AGL.afm.user
PATH: /org/AGL/afm/user
INTERFACE: org.AGL.afm.user
The signature of any member of the interface is string -> string -for JSON -> JSON.
- -This is the normal case. In case of error, the current implementation -returns a dbus error as a string.
- -Here an example using dbus-send to query data on -installed applications.
- +The signature of any member of the interface is string -> string for JSON -> JSON.
+This is the normal case. In case of error, the current implementation returns a dbus error as a string.
+Here an example using dbus-send to query data on installed applications.
dbus-send --session --print-reply \
---dest=org.AGL.afm.user \
-/org/AGL/afm/user \
-org.AGL.afm.user.runnables string:true
-
-
-
-The command line tool afm-util uses dbus-send to send -orders to afm-user-daemon. This small scripts allows to -send command to afm-user-daemon either interactively -at shell prompt or scriptically.
- + --dest=org.AGL.afm.user \ + /org/AGL/afm/user \ + org.AGL.afm.user.runnables string:true +The command line tool afm-util uses dbus-send to send orders to afm-user-daemon. This small scripts allows to send command to afm-user-daemon either interactively at shell prompt or scriptically.
The syntax is simple: it accept a command and when requires attached arguments.
-Here is the summary of afm-util:
-afm-util runnables :
- -list the runnable widgets installed
afm-util install wgt :
- -install the wgt file
afm-util uninstall id :
- -remove the installed widget of id
afm-util detail id :
- -print detail about the installed widget of id
afm-util runners :
- -list the running instance
afm-util start id :
- -start an instance of the widget of id
afm-util terminate rid :
- -terminate the running instance rid
afm-util stop rid :
- -stop the running instance rid
afm-util continue rid :
- -continue the previously rid
afm-util state rid :
- -get status of the running instance rid
list the runnable widgets installed
+install the wgt file
+remove the installed widget of id
+print detail about the installed widget of id
+list the running instance
+start an instance of the widget of id
+terminate the running instance rid
+stop the running instance rid
+continue the previously rid
+get status of the running instance rid
Here is how to list applications using afm-util:
- -afm-util runnables
-
-
+afm-util runnables
Recall:
-DESTINATION: org.AGL.afm.user
PATH: /org/AGL/afm/user
INTERFACE: org.AGL.afm.user
Description: Get details about an application from its id.
-Input: the id of the application as below.
-Either just a string:
- -"appli@x.y"
-
-
-Or an object having the field “id” of type string:
- -{"id":"appli@x.y"}
-
-
-Output: A JSON object describing the application containing -the fields described below.
- +"appli@x.y"
+Or an object having the field "id" of type string:
+{"id":"appli@x.y"}
+Output: A JSON object describing the application containing the fields described below.
{
- "id": string, the application id (id@version)
- "version": string, the version of the application
- "width": integer, requested width of the application
- "height": integer, resqueted height of the application
- "name": string, the name of the application
- "description": string, the description of the application
- "shortname": string, the short name of the application
- "author": string, the author of the application
-}
-
-
+ "id": string, the application id (id@version)
+ "version": string, the version of the application
+ "width": integer, requested width of the application
+ "height": integer, resqueted height of the application
+ "name": string, the name of the application
+ "description": string, the description of the application
+ "shortname": string, the short name of the application
+ "author": string, the author of the application
+}
Description: Get the list of applications that can be run.
-Input: any valid json entry, can be anything except null.
- -output: An array of description of the runnable applications. -Each item of the array contains an object containing the detail of -an application as described above for the method -org.AGL.afm.user.detail.
- +output: An array of description of the runnable applications. Each item of the array contains an object containing the detail of an application as described above for the method org.AGL.afm.user.detail.
Description: Install an application from its widget file.
- -If an application of the same id and version exists, it is not -reinstalled except when force=true.
- -Applications are installed in the subdirectories of the common directory -reserved for applications. -If root is specified, the application is installed under -sub-directories of defined root.
- -Note that this methods is a simple accessor to the method -org.AGL.afm.system.install of afm-system-daemon.
- -After the installation and before returning to the sender, -afm-user-daemon sends the signal org.AGL.afm.user.changed.
- -Input: The path of widget file to be installed. Optionally, -a flag to force reinstallation and/or a root directory.
- +If an application of the same id and version exists, it is not reinstalled except when force=true.
+Applications are installed in the subdirectories of the common directory reserved for applications. If root is specified, the application is installed under sub-directories of defined root.
+Note that this methods is a simple accessor to the method org.AGL.afm.system.install of afm-system-daemon.
+After the installation and before returning to the sender, afm-user-daemon sends the signal org.AGL.afm.user.changed.
+Input: The path of widget file to be installed. Optionally, a flag to force reinstallation and/or a root directory.
Simple form a simple string containing the absolute widget path:
- -"/a/path/driving/to/the/widget"
-
-
+"/a/path/driving/to/the/widget"
Or an object:
-{
- "wgt": "/a/path/to/the/widget",
- "force": false,
- "root": "/a/path/to/the/root"
-}
-
-
-“wgt” and “root” MUST be absolute paths.
- -output: An object containing field “added” to use as application ID.
- -{"added":"appli@x.y"}
-
-
+ "wgt": "/a/path/to/the/widget",
+ "force": false,
+ "root": "/a/path/to/the/root"
+}
+"wgt" and "root" MUST be absolute paths.
+output: An object containing field "added" to use as application ID.
+{"added":"appli@x.y"}
Description: Uninstall an application from its id.
- -Note that this methods is a simple accessor to -org.AGL.afm.system.uninstall method from afm-system-daemon.
- -After the uninstallation and before returning to the sender, -afm-user-daemon sends the signal org.AGL.afm.user.changed.
- -Input: the id of the application and, optionally, the path to -application root.
- +Note that this methods is a simple accessor to org.AGL.afm.system.uninstall method from afm-system-daemon.
+After the uninstallation and before returning to the sender, afm-user-daemon sends the signal org.AGL.afm.user.changed.
+Input: the id of the application and, optionally, the path to application root.
Either a string:
- -"appli@x.y"
-
-
+"appli@x.y"
Or an object:
-{
- "id": "appli@x.y",
- "root": "/a/path/to/the/root"
-}
-
-
-output: the value ‘true’.
- + "id": "appli@x.y", + "root": "/a/path/to/the/root" +} +output: the value 'true'.
Description:
- -Input: the id of the application and, optionally, the -start mode as below.
- +Input: the id of the application and, optionally, the start mode as below.
Either just a string:
- -"appli@x.y"
-
-
-Or an object containing field “id” of type string and -optionally a field mode:
- -{"id":"appli@x.y","mode":"local"}
-
-
-The field “mode” is a string equal to either “local” or “remote”.
- +"appli@x.y"
+Or an object containing field "id" of type string and optionally a field mode:
+{"id":"appli@x.y","mode":"local"}
+The field "mode" is a string equal to either "local" or "remote".
output: The runid of the application launched. runid is an integer.
-Description: Terminates the application attached to runid.
-Input: The runid (an integer) of running instance to terminate.
- -output: the value ‘true’.
- +output: the value 'true'.
Description: Stops the application attached to runid until terminate or continue.
-Input: The runid (integer) of the running instance to stop.
- -output: the value ‘true’.
- +output: the value 'true'.
Description: Continues the application attached to runid previously stopped.
-Input: The runid (integer) of the running instance to continue.
- -output: the value ‘true’.
- +output: the value 'true'.
Description: Get informations about a running instance of runid.
-Input: The runid (integer) of the running instance inspected.
- -output: An object describing instance state. It contains: -the runid (integer), the id of the running application (string), -the state of the application (string either: “starting”, “running”, “stopped”).
- +output: An object describing instance state. It contains: the runid (integer), the id of the running application (string), the state of the application (string either: "starting", "running", "stopped").
Example of returned state:
-{
- "runid": 2,
- "state": "running",
- "id": "appli@x.y"
-}
-
-
+ "runid": 2,
+ "state": "running",
+ "id": "appli@x.y"
+}
Description: Get the list of currently running instances.
-Input: anything.
- -output: An array of states, one per running instance, as returned by -the methodd org.AGL.afm.user.state.
+output: An array of states, one per running instance, as returned by the methodd org.AGL.afm.user.state.
diff --git a/doc/application-framework.html b/doc/application-framework.html index e909b77..9c51b8e 100644 --- a/doc/application-framework.html +++ b/doc/application-framework.html @@ -1,125 +1,80 @@ + - - + + + + + +version: 1
Date: 30 mai 2016
-Author: José Bollo
-
-
-This document describes application framework fundamentals. -FCF (Fully Conform to Specification) implementation is still under development. -It may happen that current implementation somehow diverges with specifications.
- - -The application framework on top of the security framework -provides components to install and uninstall applications -as well as to run them in a secured environment.
- -The goal of the framework is to manage applications and hide security details -to applications.
- -For the reasons explained in introduction, it was choose not to reuse Tizen -application framework directly, but to rework a new framework inspired from Tizen.
- -fundamentals remain identical: the applications are distributed -in a digitally signed container that should match widget specifications -normalized by the W3C. This is described by the technical -recommendations widgets and widgets-digsig of the W3 consortium.
- -As today this model allows the distribution of HTML, QML and binary applications -but it could be extended to any other class of applications.
- -The management of widget package signatures. -Current model is only an initial step, it might be extended in the -future to include new feature (ie: incremental delivery).
- - -TABLE-OF-CONTENT-HERE
+This document describes application framework fundamentals. FCF (Fully Conform to Specification) implementation is still under development. It may happen that current implementation somehow diverges with specifications.
+The application framework on top of the security framework provides components to install and uninstall applications as well as to run them in a secured environment.
+The goal of the framework is to manage applications and hide security details to applications.
+For the reasons explained in introduction, it was choose not to reuse Tizen application framework directly, but to rework a new framework inspired from Tizen.
+fundamentals remain identical: the applications are distributed in a digitally signed container that should match widget specifications normalized by the W3C. This is described by the technical recommendations widgets and widgets-digsig of the W3 consortium.
+As today this model allows the distribution of HTML, QML and binary applications but it could be extended to any other class of applications.
+The management of widget package signatures. Current model is only an initial step, it might be extended in the future to include new feature (ie: incremental delivery).
+The main path for applications are: APPDIR/PKGID/VER.
-Where:
-The advantage of such an organization is to allow several versions to live together. -This is required for multiple reasons (ie: roll back) and to comply with developers habits.
- - -All the files are installed as user “userapp” and group “userapp”. -All files have rw(x) for user and r-(x) for group and others.
- +The advantage of such an organization is to allow several versions to live together. This is required for multiple reasons (ie: roll back) and to comply with developers habits.
+All the files are installed as user "userapp" and group "userapp". All files have rw(x) for user and r-(x) for group and others.
This allows any user to read files.
- - -The data of a user are contain within its directory and are labeled using the application labels
- - -For Tizen, the following rules are set by the security manager for each application.
-System ~APP~ rwx
System ~PKG~ rwxat
System ~PKG~::RO rwxat
@@ -135,15 +90,9 @@ User ~PKG~::RO rwxat
~APP~ User::Home rxl
~APP~ User::App::Shared rwxat
~APP~ ~PKG~ rwxat
-~APP~ ~PKG~::RO rxl
-
-
-Here, ~PKG~ is the identifier of the package and ~APP~ is the identifier of the application.
- - -Not all user are able to run all applications. -How to manage that?
+~APP~ ~PKG~::RO rxl +Here, PKG is the identifier of the package and APP is the identifier of the application.
+Not all user are able to run all applications. How to manage that?
diff --git a/doc/overview.html b/doc/overview.html index 999b247..884a53c 100644 --- a/doc/overview.html +++ b/doc/overview.html @@ -1,49 +1,46 @@ + - - + + + + +version: 1
Date: 29 mai 2016
-Author: José Bollo
-
-
-
-
-
-This document describes what we intend to do. It may happen that our -current implementation and the content of this document differ.
- -In case of differences, it is assumed that this document is right -and the implementation is wrong.
- - -During the first works in having the security model of Tizen -integrated in AGL (Automotive Grade Linux) distribution, it became -quickly obvious that the count of components specific to Tizen -to integrate was huge.
- +Author: José Bollo +TABLE-OF-CONTENT-HERE
+This document describes what we intend to do. It may happen that our current implementation and the content of this document differ.
+In case of differences, it is assumed that this document is right and the implementation is wrong.
+During the first works in having the security model of Tizen integrated in AGL (Automotive Grade Linux) distribution, it became quickly obvious that the count of components specific to Tizen to integrate was huge.
Here is a minimal list of what was needed:
-But this list is complete because many dependencies are hidden. -Those hidden dependencies are including some common libraries but also many -tizen specific sub-components (iniparser, bundle, dlog, libtzplatform-config, -db-util, vconf-buxton, …).
- -This is an issue because AGL is not expected to be Tizen. Taking it would -either need to patch it for removing unwanted components or to take all -of them.
- -However, a careful study of the core components of the security framework -of Tizen showed that their dependencies to Tizen are light (and since some -of our work, there is no more dependency to tizen). -Those components are cynara, security-manager, D-Bus aware of cynara.
- -Luckyly, these core security components of Tizen are provided -by meta-intel-iot-security, a set of yocto layers. -These layers were created by Intel to isolate Tizen specific security -components from the initial port of Tizen to Yocto. -The 3 layers are providing components for:
- +But this list is complete because many dependencies are hidden. Those hidden dependencies are including some common libraries but also many tizen specific sub-components (iniparser, bundle, dlog, libtzplatform-config, db-util, vconf-buxton, ...).
+This is an issue because AGL is not expected to be Tizen. Taking it would either need to patch it for removing unwanted components or to take all of them.
+However, a careful study of the core components of the security framework of Tizen showed that their dependencies to Tizen are light (and since some of our work, there is no more dependency to tizen). Those components are cynara, security-manager, D-Bus aware of cynara.
+Luckyly, these core security components of Tizen are provided by meta-intel-iot-security, a set of yocto layers. These layers were created by Intel to isolate Tizen specific security components from the initial port of Tizen to Yocto. The 3 layers are providing components for:
The figure below shows the history of these layers.
- - 2014 2015
+ 2014 2015
Tizen OBS ----------+--------------------------->
- \
- \
- Tizen Yocto +---------+-------------->
- \
- \
- meta-intel-iot-security +----------->
-
-
-We took the decision to use these security layers that provides the
-basis of the Tizen security, the security framework.
-
-For the components of the application framework, built top of
-the security framework, instead of pulling the huge set of packages
-from Tizen, we decided to refit it by developping a tiny set of
-components that would implement the same behaviour but without all
-the dependencies and with minor architectural improvements for AGL.
-
-These components are afm-system-daemon and afm-user-daemon.
-They provides infrastructure for installing, uninstalling,
-launching, terminating, stopping and resuming applications in
-a multi user secure environment.
-
-A third component exists in the framework, the binder afb-daemon.
-The binder provides the easiest way to provide secured API for
-any tier. Currently, the use of the binder is not absolutely mandatory.
-
-This documentation explains the framework created by IoT.bzh
-by rewriting the Tizen Application Framework. Be aware of the
-previous foreword.
-
-
-Overview
-
-The figure below shows the major components of the framework
-and their interactions going through the following scenario:
-APPLICATION installs an other application and then launch it.
-
+ \
+ \
+ Tizen Yocto +---------+-------------->
+ \
+ \
+ meta-intel-iot-security +----------->
+We took the decision to use these security layers that provides the basis of the Tizen security, the security framework.
+For the components of the application framework, built top of the security framework, instead of pulling the huge set of packages from Tizen, we decided to refit it by developping a tiny set of components that would implement the same behaviour but without all the dependencies and with minor architectural improvements for AGL.
+These components are afm-system-daemon and afm-user-daemon. They provides infrastructure for installing, uninstalling, launching, terminating, stopping and resuming applications in a multi user secure environment.
+A third component exists in the framework, the binder afb-daemon. The binder provides the easiest way to provide secured API for any tier. Currently, the use of the binder is not absolutely mandatory.
+This documentation explains the framework created by IoT.bzh by rewriting the Tizen Application Framework. Be aware of the previous foreword.
+The figure below shows the major components of the framework and their interactions going through the following scenario: APPLICATION installs an other application and then launch it.
+-----------------------------------------------------------------------+
| User |
| ................................ |
@@ -166,126 +118,54 @@ APPLICATION installs an other application and then launch it.
| +---------------------+ +-------------------------+ |
| |
| System |
-+-----------------------------------------------------------------------+
-
-
++-----------------------------------------------------------------------+
Let follow the sequence of calls:
- -APPLICATION calls its binder to install the OTHER application.
The plugin afm-main-plugin of the binder calls, through -D-Bus system, the system daemon to install the OTHER application.
The system D-Bus checks wether APPLICATION has the permission -or not to install applications by calling CYNARA.
The system D-Bus transmits the request to afm-system-daemon.
- -afm-system-daemon checks the application to install, its -signatures and rights and install it.
afm-system-daemon calls SECURITY-MANAGER for fullfilling -security context of the installed application.
SECURITY-MANAGER calls CYNARA to install initial permissions -for the application.
The plugin afm-main-plugin of the binder calls, through D-Bus system, the system daemon to install the OTHER application.
The system D-Bus checks wether APPLICATION has the permission or not to install applications by calling CYNARA.
The system D-Bus transmits the request to afm-system-daemon.
afm-system-daemon checks the application to install, its signatures and rights and install it.
+afm-system-daemon calls SECURITY-MANAGER for fullfilling security context of the installed application.
SECURITY-MANAGER calls CYNARA to install initial permissions for the application.
APPLICATION call its binder to start the nearly installed OTHER application.
The plugin afm-main-plugin of the binder calls, through -D-Bus session, the user daemon to launch the OTHER application.
The session D-Bus checks wether APPLICATION has the permission -or not to start an application by calling CYNARA.
The plugin afm-main-plugin of the binder calls, through D-Bus session, the user daemon to launch the OTHER application.
The session D-Bus checks wether APPLICATION has the permission or not to start an application by calling CYNARA.
The session D-Bus transmits the request to afm-user-daemon.
afm-user-daemon checks wether APPLICATION has the permission -or not to start the OTHER application CYNARA.
afm-user-daemon uses SECURITY-MANAGER features to set -the seciruty context for the OTHER application.
afm-user-daemon checks wether APPLICATION has the permission or not to start the OTHER application CYNARA.
afm-user-daemon uses SECURITY-MANAGER features to set the seciruty context for the OTHER application.
afm-user-daemon launches the OTHER application.
This scenario does not cover all the features of the frameworks. -Shortly because details will be revealed in the next chapters, -the components are:
- +This scenario does not cover all the features of the frameworks. Shortly because details will be revealed in the next chapters, the components are:
SECURITY-MANAGER: in charge of setting Smack contexts and rules, -of setting groups, and, of creating initial content of CYNARA rules -for applications.
CYNARA: in charge of handling API access permissions by users and by -applications.
D-Bus: in charge of checking security of messaging. The usual D-Bus -security rules are enhanced by CYNARA checking rules.
SECURITY-MANAGER: in charge of setting Smack contexts and rules, of setting groups, and, of creating initial content of CYNARA rules for applications.
CYNARA: in charge of handling API access permissions by users and by applications.
D-Bus: in charge of checking security of messaging. The usual D-Bus security rules are enhanced by CYNARA checking rules.
afm-system-daemon: in charge of installing and uninstalling applications.
afm-user-daemon: in charge of listing applications, querying application details, -starting, terminating, stopping, resuming applications and their instances -for a given user context.
afb-binder: in charge of serving resources and features through an -HTTP interface.
afm-main-plugin: This plugin allows applications to use the API -of the AGL framework.
afm-user-daemon: in charge of listing applications, querying application details, starting, terminating, stopping, resuming applications and their instances for a given user context.
afb-binder: in charge of serving resources and features through an HTTP interface.
afm-main-plugin: This plugin allows applications to use the API of the AGL framework.
The security framework refers to the security model used to ensure -security and to the tools that are provided for implementing that model.
- -The security model refers to how DAC (Discretionnary Access Control), -MAC (Mandatory Access Control) and Capabilities are used by the system -to ensure security and privacy. It also includes features of reporting -using audit features and by managing logs and alerts.
- -The application framework manages the applications: -installing, uninstalling, starting, stopping, listing …
- -The application framework uses the security model/framework -to ensure the security and the privacy of the applications that -it manages.
- -The application framework must be compliant with the underlyiong -security model/framework. But it should hide it to the applications.
- - -The implemented security model is the security model of Tizen 3. -This model is described here.
- -The security framework then comes from Tizen 3 but through -the meta-intel. -It includes: Security-Manager, Cynara -and D-Bus compliant to Cynara.
- -Two patches are applied to the security-manager. These patches are removing -dependencies to packages specific of Tizen but that are not needed by AGL. -None of these patches adds or removes any behaviour.
- -Theoritically, the security framework/model is an implementation details -that should not impact the layers above the application framework.
- -The security framework of Tizen provides “nice lad” a valuable component to -scan log files and analyse auditing. This component is still in developement.
- - -The application framework on top of the security framework -provides the components to install and uninstall applications -and to run it in a secured environment.
- -The goal is to manage applications and to hide the details of -the security framework to the applications.
- -For the reasons explained in introduction, we did not used the -application framework of Tizen as is but used an adaptation of it.
- -The basis is kept identical: the applications are distributed -in a digitally signed container that must match the specifications -of widgets (web applications). This is described by the technical -recomendations widgets and widgets-digsig of the W3 consortium.
- +The security framework refers to the security model used to ensure security and to the tools that are provided for implementing that model.
+The security model refers to how DAC (Discretionnary Access Control), MAC (Mandatory Access Control) and Capabilities are used by the system to ensure security and privacy. It also includes features of reporting using audit features and by managing logs and alerts.
+The application framework manages the applications: installing, uninstalling, starting, stopping, listing ...
+The application framework uses the security model/framework to ensure the security and the privacy of the applications that it manages.
+The application framework must be compliant with the underlyiong security model/framework. But it should hide it to the applications.
+The implemented security model is the security model of Tizen 3. This model is described here.
+The security framework then comes from Tizen 3 but through the meta-intel. It includes: Security-Manager, Cynara and D-Bus compliant to Cynara.
+Two patches are applied to the security-manager. These patches are removing dependencies to packages specific of Tizen but that are not needed by AGL. None of these patches adds or removes any behaviour.
+Theoritically, the security framework/model is an implementation details that should not impact the layers above the application framework.
+The security framework of Tizen provides "nice lad" a valuable component to scan log files and analyse auditing. This component is still in developement.
+The application framework on top of the security framework provides the components to install and uninstall applications and to run it in a secured environment.
+The goal is to manage applications and to hide the details of the security framework to the applications.
+For the reasons explained in introduction, we did not used the application framework of Tizen as is but used an adaptation of it.
+The basis is kept identical: the applications are distributed in a digitally signed container that must match the specifications of widgets (web applications). This is described by the technical recomendations widgets and widgets-digsig of the W3 consortium.
This model allows the distribution of HTML, QML and binary applications.
- -The management of signatures of the widget packages -This basis is not meant as being rigid and it can be extended in the -futur to include for example incremental delivery.
+The management of signatures of the widget packages This basis is not meant as being rigid and it can be extended in the futur to include for example incremental delivery.
diff --git a/doc/quick-tutorial.html b/doc/quick-tutorial.html index ef3e9f7..f1f96ed 100644 --- a/doc/quick-tutorial.html +++ b/doc/quick-tutorial.html @@ -1,15 +1,24 @@ - - -[TOC]
This document proposes a quick tutorial to demonstrate the major functionnalities of the AGL Application Framework. For more complete information, please refer to the inline documentation available in the main git repository:
-https://gerrit.automotivelinux.org/gerrit/#/admin/projects/src/app-framework-main
-https://gerrit.automotivelinux.org/gerrit/#/admin/projects/src/app-framework-binder
For more information on AGL, please visit:
-https://www.automotivelinux.org/
This document proposes a quick tutorial to demonstrate the major functionnalities of the AGL Application Framework. For more complete information, please refer to the inline documentation available in the main git repository: https://gerrit.automotivelinux.org/gerrit/#/admin/projects/src/app-framework-main https://gerrit.automotivelinux.org/gerrit/#/admin/projects/src/app-framework-binder
+For more information on AGL, please visit: https://www.automotivelinux.org/
+4 sample applications (.wgt files) are prebuilt and available at the following address:
-https://github.com/iotbzh/afm-widget-examples
4 sample applications (.wgt files) are prebuilt and available at the following address: https://github.com/iotbzh/afm-widget-examples
You can get them by cloning this git repository on your desktop (will be useful later in this tutorial):
- - - -$ git clone https://github.com/iotbzh/afm-widget-examples
-
-
-
+$ git clone https://github.com/iotbzh/afm-widget-examples
Connect your AGL target board to the network and copy some sample widgets on it through SSH (set BOARDIP with your board IP address) :
- - - -$ cd afm-widget-examples
-$ BOARDIP=1.2.3.4
-$ scp *.wgt root@$BOARDIP:~/
-
+$ cd afm-widget-examples
+$ BOARDIP=1.2.3.4
+$ scp *.wgt root@$BOARDIP:~/
Connect through SSH on the target board and check for Application Framework daemons:
-$ ssh root@$BOARDIP
root@porter:~# ps -ef|grep bin/afm
afm 409 1 0 13:00 ? 00:00:00 /usr/bin/afm-system-daemon
root 505 499 0 13:01 ? 00:00:00 /usr/bin/afm-user-daemon
-root 596 550 0 13:22 pts/0 00:00:00 grep afm
-
-
-We can see that there are two daemons running:
-* afm-system-daemon runs with a system user ‘afm’ and is responsible for installing/uninstalling packages
-* afm-user-daemon runs as a user daemon (currently as root because it’s the only real user on the target board) and is responsible for the whole lifecycle of the applications running inside the user session.
The application framework has a tool running on the Command Line Interface (CLI). Using the afm-util command, you can install, uninstall, list, run, stop … applications.
- -To begin, run ‘afm-util help’ to get a quick help on commands:
- +root 596 550 0 13:22 pts/0 00:00:00 grep afm +We can see that there are two daemons running: * afm-system-daemon runs with a system user 'afm' and is responsible for installing/uninstalling packages * afm-user-daemon runs as a user daemon (currently as root because it's the only real user on the target board) and is responsible for the whole lifecycle of the applications running inside the user session.
+The application framework has a tool running on the Command Line Interface (CLI). Using the afm-util command, you can install, uninstall, list, run, stop ... applications.
+To begin, run 'afm-util help' to get a quick help on commands:
root@porter:~# afm-util help
usage: afm-util command [arg]
@@ -132,181 +102,76 @@ The commands are:
continue rid continue the previously rid
status rid
- state rid get status of the running instance rid
-
-
-
-
+ state rid get status of the running instance rid
You can then install your first application:
-root@porter:~# afm-util install /home/root/annex.wgt
-{ "added": "webapps-annex@0.0" }
-
-
-Let’s install a second application:
- +{ "added": "webapps-annex@0.0" } +Let's install a second application:
root@porter:~# afm-util install /home/root/memory-match.wgt
-{ "added": "webapps-memory-match@1.1" }
-
-
+{ "added": "webapps-memory-match@1.1" }
Note that usually, afm-util will return a JSON result, which is the common format for messages returned by the Application Framework daemons.
- - -You can then list all installed applications:
-root@porter:~# afm-util list
-[ { "id": "webapps-annex@0.0", "version": "0.0.10", "width": 0, "height": 0, "name": "Annex", "description": "Reversi\/Othello", "shortname": "", "author": "Todd Brandt <todd.e.brandt@intel.com>" },
- { "id": "webapps-memory-match@1.1", "version": "1.1.7", "width": 0, "height": 0, "name": "MemoryMatch", "description": "Memory match", "shortname": "", "author": "Todd Brandt <todd.e.brandt@intel.com>" } ]
-
-
+[ { "id": "webapps-annex@0.0", "version": "0.0.10", "width": 0, "height": 0, "name": "Annex", "description": "Reversi\/Othello", "shortname": "", "author": "Todd Brandt <todd.e.brandt@intel.com>" },
+ { "id": "webapps-memory-match@1.1", "version": "1.1.7", "width": 0, "height": 0, "name": "MemoryMatch", "description": "Memory match", "shortname": "", "author": "Todd Brandt <todd.e.brandt@intel.com>" } ]
Here, we can see the two previously installed applications.
- - -Let’s get some details about the first application:
- +Let's get some details about the first application:
root@porter:~# afm-util info webapps-annex@0.0
-{ "id": "webapps-annex@0.0", "version": "0.0.10", "width": 0, "height": 0, "name": "Annex", "description": "Reversi\/Othello", "shortname": "", "author": "Todd Brandt <todd.e.brandt@intel.com>" }
-
-
-Note that AGL applications are mostly handled by afm-util through their IDs. In our example, the application ID is ‘webapps-annex@0.0’.
- - - +{ "id": "webapps-annex@0.0", "version": "0.0.10", "width": 0, "height": 0, "name": "Annex", "description": "Reversi\/Othello", "shortname": "", "author": "Todd Brandt <todd.e.brandt@intel.com>" } +Note that AGL applications are mostly handled by afm-util through their IDs. In our example, the application ID is 'webapps-annex@0.0'.
Let’s start the first application Annex:
- +Let's start the first application Annex:
root@porter:~# afm-util start webapps-annex@0.0
-1
-
-
+1
As the application is a HTML5 game, you should then get a webview running with QML on the board display.
- - -The application has been started in the user session, with a dedicated security context, enforced by SMACK. To illustrate this, we can take a look at the running processes and their respective SMACK labels:
-root@porter:~# ps -efZ |grep webapps-annex | grep -v grep
User::App::webapps-annex root 716 491 0 13:19 ? 00:00:00 /usr/bin/afb-daemon --mode=local --readyfd=8 --alias=/icons /usr/share/afm/icons --port=12348 --rootdir=/usr/share/afm/applications/webapps-annex/0.0 --token=7D6D2F16 --sessiondir=/home/root/app-data/webapps-annex/.afb-daemon
-User::App::webapps-annex root 717 491 0 13:19 ? 00:00:00 /usr/bin/qt5/qmlscene http://localhost:12348/index.html?token=7D6D2F16 /usr/bin/web-runtime-webkit.qml
-
-
-In the previous result, we see that the application is composed of two processes:
-* the application binder (afb-daemon)
-* the application UI (qmlscene …)
While most system processes run with the label ‘System’, we see that the application runs with a specific SMACK label ‘User::App::webapps-annex’: this label is used to force the application to follow a Mandatory Access Control (MAC) scheme. This means that those processes run in their own security context, isolated from the rest of the system (and other applications). Global security rules can then be applied to restrict access to all other user or system resources.
- - - +User::App::webapps-annex root 717 491 0 13:19 ? 00:00:00 /usr/bin/qt5/qmlscene http://localhost:12348/index.html?token=7D6D2F16 /usr/bin/web-runtime-webkit.qml +In the previous result, we see that the application is composed of two processes: * the application binder (afb-daemon) * the application UI (qmlscene ...)
+While most system processes run with the label 'System', we see that the application runs with a specific SMACK label 'User::App::webapps-annex': this label is used to force the application to follow a Mandatory Access Control (MAC) scheme. This means that those processes run in their own security context, isolated from the rest of the system (and other applications). Global security rules can then be applied to restrict access to all other user or system resources.
To check for running applications, just run:
-root@porter:~# afm-util ps
-[ { "runid": 1, "state": "running", "id": "webapps-annex@0.0" } ]
-
-
-The ‘runid’ is the application instance ID and is used as an argument for the subcommands controlling the application runtime state (kill/stop/resume/status)
- - - +[ { "runid": 1, "state": "running", "id": "webapps-annex@0.0" } ] +The 'runid' is the application instance ID and is used as an argument for the subcommands controlling the application runtime state (kill/stop/resume/status)
To stop the application that was just started (the one with RUNID 1), just run the stop command:
-root@porter:~# afm-util terminate 1
-true
-
-
+true
The application is now stopped, as confirmed by a list of running apps:
-root@porter:~# afm-util ps
-[ ]
-
-
-
-
+[ ]
To uninstall an application, simply use its ID:
-root@porter:~# afm-util uninstall webapps-annex@0.0
-true
-
-
+true
Then list the installed apps to confirm the removal:
-root@porter:~# afm-util list
-[ { "id": "webapps-memory-match@1.1", "version": "1.1.7", "width": 0, "height": 0, "name": "MemoryMatch", "description": "Memory match", "shortname": "", "author": "Todd Brandt <todd.e.brandt@intel.com>" } ]
-
-
-
-
-afm-client is a HTML5 UI that allows to install/uninstall applications as well as starting/stopping them as already demonstrated with afm-util.
- -The HTML5 UI is accessible remotely through this URL:
-http://[board_ip]:1234/opa?token=132456789
The HTML5 UI is accessible remotely through this URL: http://[board_ip]:1234/opa?token=132456789
By clicking on the ‘Upload’ button on the right, you can send an application package (WGT file) and install it. Select for example the file ‘rabbit.wgt’ that was cloned initially from the git repository afm-widget-examples.
- -Then a popup requester ask for a confirmation: ‘Upload Application rabbit.wgt ?’. Click on the ‘Install’ button.
- +By clicking on the 'Upload' button on the right, you can send an application package (WGT file) and install it. Select for example the file 'rabbit.wgt' that was cloned initially from the git repository afm-widget-examples.
+Then a popup requester ask for a confirmation: 'Upload Application rabbit.wgt ?'. Click on the 'Install' button.
You should then see some changes in the toolbar: a new icon appeared, representing the freshly installed application.
- - -In the toolbar, click on the button representing the Rabbit application. You’ll get a popup asking to:
-* start the application
-* or get some info about it
-* or uninstall it
Click on the ‘start’ item: the application starts and should be visible as a webview on the target board display. Note that at this point, we could also run the application remotely, that is in the same browser as the Homescreen app. By default, the application framework is configured to run applications ‘locally’ on the board display.
- - - +In the toolbar, click on the button representing the Rabbit application. You'll get a popup asking to: * start the application * or get some info about it * or uninstall it
+Click on the 'start' item: the application starts and should be visible as a webview on the target board display. Note that at this point, we could also run the application remotely, that is in the same browser as the Homescreen app. By default, the application framework is configured to run applications 'locally' on the board display.
In the Homescreen application, click again on the Rabbit application button, then select ‘stop’: the application then stops.
- - - +In the Homescreen application, click again on the Rabbit application button, then select 'stop': the application then stops.
From the same popup menu, you can select ‘uninstall’ to remove the application from the system. As a consequence, the application icon should disappear from the toolbar.
- - - +From the same popup menu, you can select 'uninstall' to remove the application from the system. As a consequence, the application icon should disappear from the toolbar.
Another package ‘afb-client’ is also available for testing.
-This is a sample HTML5 application demonstrating various basic capabilities of the Binder daemon. It can be used by developers as a template to start writing real AGL Applications.
Another package 'afb-client' is also available for testing. This is a sample HTML5 application demonstrating various basic capabilities of the Binder daemon. It can be used by developers as a template to start writing real AGL Applications.
This application is not available as WGT file yet and it should be started manually without any specific security context:
- -root@porter:~# /usr/bin/afb-daemon --mode=remote --port=1235 --token='' --sessiondir=/home/root/.afm-daemon --rootdir=/usr/share/agl/afb-client --alias=/icons:/usr/share/afm/icons
-
-
-Then you can access it from a browser:
-http://[board_ip]:1235/opa/?token=132456789
afb-client is a simple application to demonstrate the built-in capabilities of the binder daemon (handling sessions and security tokens, testing POSTs uploads…) and was used during the application framework development to validate the proposed features.
root@porter:~# /usr/bin/afb-daemon --mode=remote --port=1235 --token='' --sessiondir=/home/root/.afm-daemon --rootdir=/usr/share/agl/afb-client --alias=/icons:/usr/share/afm/icons
+Then you can access it from a browser: http://[board_ip]:1235/opa/?token=132456789
+afb-client is a simple application to demonstrate the built-in capabilities of the binder daemon (handling sessions and security tokens, testing POSTs uploads...) and was used during the application framework development to validate the proposed features.
+ +