aboutsummaryrefslogtreecommitdiffstats
path: root/meta-application-manager/recipes-application-framework/pkgmgr/files
diff options
context:
space:
mode:
authorKazumasa Mitsunari <kazumasa_mitsunari_za@mail.toyota.co.jp>2016-09-23 13:40:16 +0900
committerKazumasa Mitsunari <kazumasa_mitsunari_za@mail.toyota.co.jp>2016-09-23 13:40:16 +0900
commit18bd43272c0eb03ddf403d14cdb15f37695d5374 (patch)
tree2784d67e444090b90cc89a8123b70aef68e6dba7 /meta-application-manager/recipes-application-framework/pkgmgr/files
parent4e5d35db8a03eed001d526be639acb28f39a32b9 (diff)
Add pkgmgr-first-setup for systemd service
There are some settings to use appmgr for aglglobalapp. This is the first set up called at booting systemd. Item: * Language setting * Change owner to aglglobalapp for manage database * Initialize database But wayland socket is owned by root user yet, so an user has to change owner to create displays(surfaces) every time start weston. chown aglglobalapp /run/user/0 /run/user/0/wayland-0 This will be fixed to be changed every time after starting weston before long. Change-Id: I2fa635f35aa8e082973b09f2b8c80175d4f0ced4 Signed-off-by: Kazumasa Mitsunari <kazumasa_mitsunari_za@mail.toyota.co.jp>
Diffstat (limited to 'meta-application-manager/recipes-application-framework/pkgmgr/files')
-rw-r--r--meta-application-manager/recipes-application-framework/pkgmgr/files/pkgmgr-journaldb.patch52
1 files changed, 0 insertions, 52 deletions
diff --git a/meta-application-manager/recipes-application-framework/pkgmgr/files/pkgmgr-journaldb.patch b/meta-application-manager/recipes-application-framework/pkgmgr/files/pkgmgr-journaldb.patch
deleted file mode 100644
index 4773426..0000000
--- a/meta-application-manager/recipes-application-framework/pkgmgr/files/pkgmgr-journaldb.patch
+++ /dev/null
@@ -1,52 +0,0 @@
-diff --git a/tool/pkg_createdb.c b/tool/pkg_createdb.c
---- a/tool/pkg_createdb.c
-+++ b/tool/pkg_createdb.c
-@@ -261,15 +261,21 @@
- for (i = 0; files[i]; i++) {
- ret = chown(files[i], GLOBAL_USER, OWNER_ROOT);
- if (ret == -1) {
-+ if (files[i] == journal_file && errno == ENOENT)
-+ continue;
- strerror_r(errno, buf, sizeof(buf));
-- _E("FAIL : chown %s %d.%d, because %s", db_file, GLOBAL_USER, OWNER_ROOT, buf);
-+ _E("FAIL : chown %s %d.%d, because %s", files[i], GLOBAL_USER, OWNER_ROOT, buf);
- return -1;
- }
-
- ret = chmod(files[i], S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH);
- if (ret == -1) {
-+ if (files[i] == journal_file && errno == ENOENT)
-+ continue;
- strerror_r(errno, buf, sizeof(buf));
-- _E("FAIL : chmod %s 0664, because %s", db_file, buf);
-+ _E("FAIL : chmod %s 0664, because %s", files[i], buf);
- return -1;
- }
- }
-
---- a/tool/pkg_initdb.c
-+++ b/tool/pkg_initdb.c
-@@ -208,15 +208,21 @@
- for (i = 0; files[i]; i++) {
- ret = chown(files[i], GLOBAL_USER, OWNER_ROOT);
- if (ret == -1) {
-+ if (files[i] == journal_file && errno == ENOENT)
-+ continue;
- strerror_r(errno, buf, sizeof(buf));
-- _E("FAIL : chown %s %d.%d, because %s", db_file, GLOBAL_USER, OWNER_ROOT, buf);
-+ _E("FAIL : chown %s %d.%d, because %s", files[i], GLOBAL_USER, OWNER_ROOT, buf);
- return -1;
- }
-
- ret = chmod(files[i], S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH);
- if (ret == -1) {
-+ if (files[i] == journal_file && errno == ENOENT)
-+ continue;
- strerror_r(errno, buf, sizeof(buf));
-- _E("FAIL : chmod %s 0664, because %s", db_file, buf);
-+ _E("FAIL : chmod %s 0664, because %s", files[i], buf);
- return -1;
- }
- }
-
-