2018-09-28 10:11:11 +02:00
|
|
|
|
/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*-
|
|
|
|
|
*
|
2019-06-13 02:34:43 +02:00
|
|
|
|
* Copyright © 2018-2019 Endless Mobile, Inc.
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*
|
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
|
*
|
|
|
|
|
* Authors:
|
|
|
|
|
* - Philip Withnall <withnall@endlessm.com>
|
2019-06-13 02:34:43 +02:00
|
|
|
|
* - Andre Moreira Magalhaes <andre@endlessm.com>
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
|
|
#include <glib.h>
|
|
|
|
|
#include <glib-object.h>
|
|
|
|
|
#include <glib/gi18n-lib.h>
|
2018-11-26 15:48:45 +01:00
|
|
|
|
#include <gio/gdesktopappinfo.h>
|
2018-09-28 10:11:11 +02:00
|
|
|
|
#include <gio/gio.h>
|
2019-02-26 18:43:56 +01:00
|
|
|
|
#include <libmalcontent/app-filter.h>
|
2018-09-28 10:11:11 +02:00
|
|
|
|
|
2019-04-24 13:44:50 +02:00
|
|
|
|
#include "libmalcontent/app-filter-private.h"
|
2018-09-28 10:11:11 +02:00
|
|
|
|
|
|
|
|
|
|
2019-12-11 16:46:14 +01:00
|
|
|
|
/* FIXME: Eventually deprecate these compatibility fallbacks. */
|
|
|
|
|
GQuark
|
|
|
|
|
mct_app_filter_error_quark (void)
|
|
|
|
|
{
|
|
|
|
|
return mct_manager_error_quark ();
|
|
|
|
|
}
|
2018-09-28 10:11:11 +02:00
|
|
|
|
|
2019-04-24 13:44:50 +02:00
|
|
|
|
/* struct _MctAppFilter is defined in app-filter-private.h */
|
2018-09-28 10:11:11 +02:00
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
G_DEFINE_BOXED_TYPE (MctAppFilter, mct_app_filter,
|
|
|
|
|
mct_app_filter_ref, mct_app_filter_unref)
|
2018-09-28 10:11:11 +02:00
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_ref:
|
|
|
|
|
* @filter: (transfer none): an #MctAppFilter
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*
|
|
|
|
|
* Increment the reference count of @filter, and return the same pointer to it.
|
|
|
|
|
*
|
|
|
|
|
* Returns: (transfer full): the same pointer as @filter
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*/
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilter *
|
|
|
|
|
mct_app_filter_ref (MctAppFilter *filter)
|
2018-09-28 10:11:11 +02:00
|
|
|
|
{
|
|
|
|
|
g_return_val_if_fail (filter != NULL, NULL);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, NULL);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count <= G_MAXINT - 1, NULL);
|
|
|
|
|
|
|
|
|
|
filter->ref_count++;
|
|
|
|
|
return filter;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_unref:
|
|
|
|
|
* @filter: (transfer full): an #MctAppFilter
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*
|
|
|
|
|
* Decrement the reference count of @filter. If the reference count reaches
|
|
|
|
|
* zero, free the @filter and all its resources.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*/
|
|
|
|
|
void
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_unref (MctAppFilter *filter)
|
2018-09-28 10:11:11 +02:00
|
|
|
|
{
|
|
|
|
|
g_return_if_fail (filter != NULL);
|
|
|
|
|
g_return_if_fail (filter->ref_count >= 1);
|
|
|
|
|
|
|
|
|
|
filter->ref_count--;
|
|
|
|
|
|
|
|
|
|
if (filter->ref_count <= 0)
|
|
|
|
|
{
|
|
|
|
|
g_strfreev (filter->app_list);
|
2018-10-09 12:24:25 +02:00
|
|
|
|
g_variant_unref (filter->oars_ratings);
|
2018-09-28 10:11:11 +02:00
|
|
|
|
g_free (filter);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_get_user_id:
|
|
|
|
|
* @filter: an #MctAppFilter
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Get the user ID of the user this #MctAppFilter is for.
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*
|
2020-03-16 13:13:35 +01:00
|
|
|
|
* Returns: user ID of the relevant user, or `(uid_t) -1` if unknown
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*/
|
|
|
|
|
uid_t
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_get_user_id (MctAppFilter *filter)
|
2018-09-28 10:11:11 +02:00
|
|
|
|
{
|
|
|
|
|
g_return_val_if_fail (filter != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, FALSE);
|
|
|
|
|
|
|
|
|
|
return filter->user_id;
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-20 15:55:36 +01:00
|
|
|
|
static MctAppFilterOarsValue
|
|
|
|
|
oars_str_to_enum (const gchar *value_str)
|
|
|
|
|
{
|
|
|
|
|
if (g_str_equal (value_str, "none"))
|
|
|
|
|
return MCT_APP_FILTER_OARS_VALUE_NONE;
|
|
|
|
|
else if (g_str_equal (value_str, "mild"))
|
|
|
|
|
return MCT_APP_FILTER_OARS_VALUE_MILD;
|
|
|
|
|
else if (g_str_equal (value_str, "moderate"))
|
|
|
|
|
return MCT_APP_FILTER_OARS_VALUE_MODERATE;
|
|
|
|
|
else if (g_str_equal (value_str, "intense"))
|
|
|
|
|
return MCT_APP_FILTER_OARS_VALUE_INTENSE;
|
|
|
|
|
else
|
|
|
|
|
return MCT_APP_FILTER_OARS_VALUE_UNKNOWN;
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-20 15:56:36 +01:00
|
|
|
|
/**
|
|
|
|
|
* mct_app_filter_is_enabled:
|
|
|
|
|
* @filter: an #MctAppFilter
|
|
|
|
|
*
|
|
|
|
|
* Check whether the app filter is enabled and is going to impose at least one
|
|
|
|
|
* restriction on the user. This gives a high level view of whether app filter
|
|
|
|
|
* parental controls are ‘enabled’ for the given user.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if the app filter contains at least one non-default value,
|
|
|
|
|
* %FALSE if it’s entirely default
|
|
|
|
|
* Since: 0.7.0
|
|
|
|
|
*/
|
|
|
|
|
gboolean
|
|
|
|
|
mct_app_filter_is_enabled (MctAppFilter *filter)
|
|
|
|
|
{
|
|
|
|
|
gboolean oars_ratings_all_intense_or_unknown;
|
|
|
|
|
GVariantIter iter;
|
|
|
|
|
const gchar *oars_value;
|
|
|
|
|
|
|
|
|
|
g_return_val_if_fail (filter != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, FALSE);
|
|
|
|
|
|
|
|
|
|
/* The least restrictive OARS filter has all values as intense, or unknown. */
|
|
|
|
|
oars_ratings_all_intense_or_unknown = TRUE;
|
|
|
|
|
g_variant_iter_init (&iter, filter->oars_ratings);
|
|
|
|
|
|
|
|
|
|
while (g_variant_iter_loop (&iter, "{&s&s}", NULL, &oars_value))
|
|
|
|
|
{
|
|
|
|
|
MctAppFilterOarsValue value = oars_str_to_enum (oars_value);
|
|
|
|
|
|
|
|
|
|
if (value != MCT_APP_FILTER_OARS_VALUE_UNKNOWN &&
|
|
|
|
|
value != MCT_APP_FILTER_OARS_VALUE_INTENSE)
|
|
|
|
|
{
|
|
|
|
|
oars_ratings_all_intense_or_unknown = FALSE;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Check all fields against their default values. Ignore
|
|
|
|
|
* `allow_system_installation` since it’s false by default, so the default
|
|
|
|
|
* value is already the most restrictive. */
|
2020-06-10 00:30:39 +02:00
|
|
|
|
return ((filter->app_list_type == MCT_APP_FILTER_LIST_BLOCKLIST &&
|
2020-03-20 15:56:36 +01:00
|
|
|
|
filter->app_list[0] != NULL) ||
|
2020-06-10 00:30:39 +02:00
|
|
|
|
filter->app_list_type == MCT_APP_FILTER_LIST_ALLOWLIST ||
|
2020-03-20 15:56:36 +01:00
|
|
|
|
!oars_ratings_all_intense_or_unknown ||
|
|
|
|
|
!filter->allow_user_installation);
|
|
|
|
|
}
|
|
|
|
|
|
2018-09-28 10:11:11 +02:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_is_path_allowed:
|
|
|
|
|
* @filter: an #MctAppFilter
|
2018-10-12 05:47:33 +02:00
|
|
|
|
* @path: (type filename): absolute path of a program to check
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*
|
|
|
|
|
* Check whether the program at @path is allowed to be run according to this
|
|
|
|
|
* app filter. @path will be canonicalised without doing any I/O.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if the user this @filter corresponds to is allowed to run the
|
|
|
|
|
* program at @path according to the @filter policy; %FALSE otherwise
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-09-28 10:11:11 +02:00
|
|
|
|
*/
|
|
|
|
|
gboolean
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_is_path_allowed (MctAppFilter *filter,
|
2018-09-28 10:11:11 +02:00
|
|
|
|
const gchar *path)
|
|
|
|
|
{
|
|
|
|
|
g_return_val_if_fail (filter != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, FALSE);
|
|
|
|
|
g_return_val_if_fail (path != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (g_path_is_absolute (path), FALSE);
|
|
|
|
|
|
|
|
|
|
g_autofree gchar *canonical_path = g_canonicalize_filename (path, "/");
|
2019-06-13 02:28:56 +02:00
|
|
|
|
g_autofree gchar *canonical_path_utf8 = g_filename_to_utf8 (canonical_path, -1,
|
|
|
|
|
NULL, NULL, NULL);
|
|
|
|
|
g_return_val_if_fail (canonical_path_utf8 != NULL, FALSE);
|
|
|
|
|
|
2018-09-28 10:11:11 +02:00
|
|
|
|
gboolean path_in_list = g_strv_contains ((const gchar * const *) filter->app_list,
|
2019-06-13 02:28:56 +02:00
|
|
|
|
canonical_path_utf8);
|
2018-09-28 10:11:11 +02:00
|
|
|
|
|
|
|
|
|
switch (filter->app_list_type)
|
|
|
|
|
{
|
2020-06-10 00:30:39 +02:00
|
|
|
|
case MCT_APP_FILTER_LIST_BLOCKLIST:
|
2018-09-28 10:11:11 +02:00
|
|
|
|
return !path_in_list;
|
2020-06-10 00:30:39 +02:00
|
|
|
|
case MCT_APP_FILTER_LIST_ALLOWLIST:
|
2018-09-28 10:11:11 +02:00
|
|
|
|
return path_in_list;
|
|
|
|
|
default:
|
|
|
|
|
g_assert_not_reached ();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-06-13 02:34:43 +02:00
|
|
|
|
/* Check whether a given @ref is a valid flatpak ref.
|
|
|
|
|
*
|
|
|
|
|
* For simplicity and to avoid duplicating the whole logic behind
|
|
|
|
|
* flatpak_ref_parse() this method will only check whether:
|
|
|
|
|
* - the @ref contains exactly 3 slash chars
|
|
|
|
|
* - the @ref starts with either app/ or runtime/
|
|
|
|
|
* - the name, arch and branch components of the @ref are not empty
|
|
|
|
|
*
|
|
|
|
|
* We avoid using flatpak_ref_parse() to allow for libflatpak
|
|
|
|
|
* to depend on malcontent without causing a cyclic dependency.
|
|
|
|
|
*/
|
|
|
|
|
static gboolean
|
|
|
|
|
is_valid_flatpak_ref (const gchar *ref)
|
|
|
|
|
{
|
|
|
|
|
g_auto(GStrv) parts = NULL;
|
|
|
|
|
|
|
|
|
|
if (ref == NULL)
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
parts = g_strsplit (ref, "/", 0);
|
|
|
|
|
return (g_strv_length (parts) == 4 &&
|
|
|
|
|
(strcmp (parts[0], "app") == 0 ||
|
|
|
|
|
strcmp (parts[0], "runtime") == 0) &&
|
|
|
|
|
*parts[1] != '\0' &&
|
|
|
|
|
*parts[2] != '\0' &&
|
|
|
|
|
*parts[3] != '\0');
|
|
|
|
|
}
|
|
|
|
|
|
2018-10-12 06:59:04 +02:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_is_flatpak_ref_allowed:
|
|
|
|
|
* @filter: an #MctAppFilter
|
2018-11-14 16:17:18 +01:00
|
|
|
|
* @app_ref: flatpak ref for the app, for example `app/org.gnome.Builder/x86_64/master`
|
2018-10-12 06:59:04 +02:00
|
|
|
|
*
|
|
|
|
|
* Check whether the flatpak app with the given @app_ref is allowed to be run
|
|
|
|
|
* according to this app filter.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if the user this @filter corresponds to is allowed to run the
|
|
|
|
|
* flatpak called @app_ref according to the @filter policy; %FALSE otherwise
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-10-12 06:59:04 +02:00
|
|
|
|
*/
|
|
|
|
|
gboolean
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_is_flatpak_ref_allowed (MctAppFilter *filter,
|
2018-10-12 06:59:04 +02:00
|
|
|
|
const gchar *app_ref)
|
|
|
|
|
{
|
|
|
|
|
g_return_val_if_fail (filter != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, FALSE);
|
|
|
|
|
g_return_val_if_fail (app_ref != NULL, FALSE);
|
2019-06-13 02:34:43 +02:00
|
|
|
|
g_return_val_if_fail (is_valid_flatpak_ref (app_ref), FALSE);
|
2018-10-12 06:59:04 +02:00
|
|
|
|
|
|
|
|
|
gboolean ref_in_list = g_strv_contains ((const gchar * const *) filter->app_list,
|
|
|
|
|
app_ref);
|
|
|
|
|
|
|
|
|
|
switch (filter->app_list_type)
|
|
|
|
|
{
|
2020-06-10 00:30:39 +02:00
|
|
|
|
case MCT_APP_FILTER_LIST_BLOCKLIST:
|
2018-10-12 06:59:04 +02:00
|
|
|
|
return !ref_in_list;
|
2020-06-10 00:30:39 +02:00
|
|
|
|
case MCT_APP_FILTER_LIST_ALLOWLIST:
|
2018-10-12 06:59:04 +02:00
|
|
|
|
return ref_in_list;
|
|
|
|
|
default:
|
|
|
|
|
g_assert_not_reached ();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-14 16:17:18 +01:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_is_flatpak_app_allowed:
|
|
|
|
|
* @filter: an #MctAppFilter
|
2018-11-14 16:17:18 +01:00
|
|
|
|
* @app_id: flatpak ID for the app, for example `org.gnome.Builder`
|
|
|
|
|
*
|
|
|
|
|
* Check whether the flatpak app with the given @app_id is allowed to be run
|
|
|
|
|
* according to this app filter. This is a globbing match, matching @app_id
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* against potentially multiple entries in the blocklist, as the blocklist
|
2018-11-14 16:17:18 +01:00
|
|
|
|
* contains flatpak refs (for example, `app/org.gnome.Builder/x86_64/master`)
|
|
|
|
|
* which contain architecture and branch information. App IDs (for example,
|
|
|
|
|
* `org.gnome.Builder`) do not contain architecture or branch information.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if the user this @filter corresponds to is allowed to run the
|
|
|
|
|
* flatpak called @app_id according to the @filter policy; %FALSE otherwise
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-11-14 16:17:18 +01:00
|
|
|
|
*/
|
|
|
|
|
gboolean
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_is_flatpak_app_allowed (MctAppFilter *filter,
|
2018-11-14 16:17:18 +01:00
|
|
|
|
const gchar *app_id)
|
|
|
|
|
{
|
|
|
|
|
g_return_val_if_fail (filter != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, FALSE);
|
|
|
|
|
g_return_val_if_fail (app_id != NULL, FALSE);
|
|
|
|
|
|
|
|
|
|
gsize app_id_len = strlen (app_id);
|
|
|
|
|
|
|
|
|
|
gboolean id_in_list = FALSE;
|
|
|
|
|
for (gsize i = 0; filter->app_list[i] != NULL; i++)
|
|
|
|
|
{
|
2019-06-13 02:34:43 +02:00
|
|
|
|
if (is_valid_flatpak_ref (filter->app_list[i]) &&
|
|
|
|
|
g_str_has_prefix (filter->app_list[i], "app/") &&
|
2018-11-14 16:17:18 +01:00
|
|
|
|
strncmp (filter->app_list[i] + strlen ("app/"), app_id, app_id_len) == 0 &&
|
|
|
|
|
filter->app_list[i][strlen ("app/") + app_id_len] == '/')
|
|
|
|
|
{
|
|
|
|
|
id_in_list = TRUE;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch (filter->app_list_type)
|
|
|
|
|
{
|
2020-06-10 00:30:39 +02:00
|
|
|
|
case MCT_APP_FILTER_LIST_BLOCKLIST:
|
2018-11-14 16:17:18 +01:00
|
|
|
|
return !id_in_list;
|
2020-06-10 00:30:39 +02:00
|
|
|
|
case MCT_APP_FILTER_LIST_ALLOWLIST:
|
2018-11-14 16:17:18 +01:00
|
|
|
|
return id_in_list;
|
|
|
|
|
default:
|
|
|
|
|
g_assert_not_reached ();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-26 15:48:45 +01:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_is_appinfo_allowed:
|
|
|
|
|
* @filter: an #MctAppFilter
|
2018-11-26 15:48:45 +01:00
|
|
|
|
* @app_info: (transfer none): application information
|
|
|
|
|
*
|
|
|
|
|
* Check whether the app with the given @app_info is allowed to be run
|
|
|
|
|
* according to this app filter. This matches on multiple keys potentially
|
|
|
|
|
* present in the #GAppInfo, including the path of the executable.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if the user this @filter corresponds to is allowed to run the
|
|
|
|
|
* app represented by @app_info according to the @filter policy; %FALSE
|
|
|
|
|
* otherwise
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-11-26 15:48:45 +01:00
|
|
|
|
*/
|
|
|
|
|
gboolean
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_is_appinfo_allowed (MctAppFilter *filter,
|
2018-11-26 15:48:45 +01:00
|
|
|
|
GAppInfo *app_info)
|
|
|
|
|
{
|
|
|
|
|
g_autofree gchar *abs_path = NULL;
|
2019-06-13 02:34:43 +02:00
|
|
|
|
const gchar * const *types = NULL;
|
2018-11-26 15:48:45 +01:00
|
|
|
|
|
|
|
|
|
g_return_val_if_fail (filter != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, FALSE);
|
|
|
|
|
g_return_val_if_fail (G_IS_APP_INFO (app_info), FALSE);
|
|
|
|
|
|
|
|
|
|
abs_path = g_find_program_in_path (g_app_info_get_executable (app_info));
|
|
|
|
|
|
|
|
|
|
if (abs_path != NULL &&
|
2019-02-26 18:43:56 +01:00
|
|
|
|
!mct_app_filter_is_path_allowed (filter, abs_path))
|
2018-11-26 15:48:45 +01:00
|
|
|
|
return FALSE;
|
|
|
|
|
|
2019-06-13 02:34:43 +02:00
|
|
|
|
types = g_app_info_get_supported_types (app_info);
|
|
|
|
|
for (gsize i = 0; types != NULL && types[i] != NULL; i++)
|
|
|
|
|
{
|
|
|
|
|
if (!mct_app_filter_is_content_type_allowed (filter, types[i]))
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-26 15:48:45 +01:00
|
|
|
|
if (G_IS_DESKTOP_APP_INFO (app_info))
|
|
|
|
|
{
|
|
|
|
|
g_autofree gchar *flatpak_app = NULL;
|
|
|
|
|
g_autofree gchar *old_flatpak_apps_str = NULL;
|
|
|
|
|
|
|
|
|
|
/* This gives `org.gnome.Builder`. */
|
|
|
|
|
flatpak_app = g_desktop_app_info_get_string (G_DESKTOP_APP_INFO (app_info), "X-Flatpak");
|
|
|
|
|
if (flatpak_app != NULL)
|
|
|
|
|
flatpak_app = g_strstrip (flatpak_app);
|
|
|
|
|
|
|
|
|
|
if (flatpak_app != NULL &&
|
2019-02-26 18:43:56 +01:00
|
|
|
|
!mct_app_filter_is_flatpak_app_allowed (filter, flatpak_app))
|
2018-11-26 15:48:45 +01:00
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
/* FIXME: This could do with the g_desktop_app_info_get_string_list() API
|
|
|
|
|
* from GLib 2.60. Gives `gimp.desktop;org.gimp.Gimp.desktop;`. */
|
|
|
|
|
old_flatpak_apps_str = g_desktop_app_info_get_string (G_DESKTOP_APP_INFO (app_info), "X-Flatpak-RenamedFrom");
|
|
|
|
|
if (old_flatpak_apps_str != NULL)
|
|
|
|
|
{
|
|
|
|
|
g_auto(GStrv) old_flatpak_apps = g_strsplit (old_flatpak_apps_str, ";", -1);
|
|
|
|
|
|
|
|
|
|
for (gsize i = 0; old_flatpak_apps[i] != NULL; i++)
|
|
|
|
|
{
|
2018-12-12 14:36:17 +01:00
|
|
|
|
gchar *old_flatpak_app = g_strstrip (old_flatpak_apps[i]);
|
2018-11-26 15:48:45 +01:00
|
|
|
|
|
|
|
|
|
if (g_str_has_suffix (old_flatpak_app, ".desktop"))
|
|
|
|
|
old_flatpak_app[strlen (old_flatpak_app) - strlen (".desktop")] = '\0';
|
|
|
|
|
old_flatpak_app = g_strstrip (old_flatpak_app);
|
|
|
|
|
|
|
|
|
|
if (*old_flatpak_app != '\0' &&
|
2019-02-26 18:43:56 +01:00
|
|
|
|
!mct_app_filter_is_flatpak_app_allowed (filter, old_flatpak_app))
|
2018-11-26 15:48:45 +01:00
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
2019-06-13 02:34:43 +02:00
|
|
|
|
/* Check whether a given @content_type is valid.
|
|
|
|
|
*
|
|
|
|
|
* For simplicity this method will only check whether:
|
|
|
|
|
* - the @content_type contains exactly 1 slash char
|
|
|
|
|
* - the @content_type does not start with a slash char
|
|
|
|
|
* - the type and subtype components of the @content_type are not empty
|
|
|
|
|
*/
|
|
|
|
|
static gboolean
|
|
|
|
|
is_valid_content_type (const gchar *content_type)
|
|
|
|
|
{
|
|
|
|
|
g_auto(GStrv) parts = NULL;
|
|
|
|
|
|
|
|
|
|
if (content_type == NULL)
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
parts = g_strsplit (content_type, "/", 0);
|
|
|
|
|
return (g_strv_length (parts) == 2 &&
|
|
|
|
|
*parts[0] != '\0' &&
|
|
|
|
|
*parts[1] != '\0');
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* mct_app_filter_is_content_type_allowed:
|
|
|
|
|
* @filter: an #MctAppFilter
|
|
|
|
|
* @content_type: content type to check
|
|
|
|
|
*
|
|
|
|
|
* Check whether apps handling the given @content_type are allowed to be run
|
|
|
|
|
* according to this app filter.
|
|
|
|
|
*
|
|
|
|
|
* Note that this method doesn’t match content subtypes. For example, if
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* `application/xml` is added to the blocklist but `application/xspf+xml` is not,
|
|
|
|
|
* a check for whether `application/xspf+xml` is blocklisted would return false.
|
2019-06-13 02:34:43 +02:00
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if the user this @filter corresponds to is allowed to run
|
|
|
|
|
* programs handling @content_type according to the @filter policy;
|
|
|
|
|
* %FALSE otherwise
|
|
|
|
|
* Since: 0.4.0
|
|
|
|
|
*/
|
|
|
|
|
gboolean
|
|
|
|
|
mct_app_filter_is_content_type_allowed (MctAppFilter *filter,
|
|
|
|
|
const gchar *content_type)
|
|
|
|
|
{
|
|
|
|
|
g_return_val_if_fail (filter != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, FALSE);
|
|
|
|
|
g_return_val_if_fail (content_type != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (is_valid_content_type (content_type), FALSE);
|
|
|
|
|
|
|
|
|
|
gboolean ref_in_list = g_strv_contains ((const gchar * const *) filter->app_list,
|
|
|
|
|
content_type);
|
|
|
|
|
|
|
|
|
|
switch (filter->app_list_type)
|
|
|
|
|
{
|
2020-06-10 00:30:39 +02:00
|
|
|
|
case MCT_APP_FILTER_LIST_BLOCKLIST:
|
2019-06-13 02:34:43 +02:00
|
|
|
|
return !ref_in_list;
|
2020-06-10 00:30:39 +02:00
|
|
|
|
case MCT_APP_FILTER_LIST_ALLOWLIST:
|
2019-06-13 02:34:43 +02:00
|
|
|
|
return ref_in_list;
|
|
|
|
|
default:
|
|
|
|
|
g_assert_not_reached ();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-08 18:20:11 +01:00
|
|
|
|
static gint
|
|
|
|
|
strcmp_cb (gconstpointer a,
|
|
|
|
|
gconstpointer b)
|
|
|
|
|
{
|
|
|
|
|
const gchar *str_a = *((const gchar * const *) a);
|
|
|
|
|
const gchar *str_b = *((const gchar * const *) b);
|
|
|
|
|
|
|
|
|
|
return g_strcmp0 (str_a, str_b);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_get_oars_sections:
|
|
|
|
|
* @filter: an #MctAppFilter
|
2018-11-08 18:20:11 +01:00
|
|
|
|
*
|
|
|
|
|
* List the OARS sections present in this app filter. The sections are returned
|
|
|
|
|
* in lexicographic order. A section will be listed even if its stored value is
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* %MCT_APP_FILTER_OARS_VALUE_UNKNOWN. The returned list may be empty.
|
2018-11-08 18:20:11 +01:00
|
|
|
|
*
|
|
|
|
|
* Returns: (transfer container) (array zero-terminated=1): %NULL-terminated
|
|
|
|
|
* array of OARS sections
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-11-08 18:20:11 +01:00
|
|
|
|
*/
|
|
|
|
|
const gchar **
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_get_oars_sections (MctAppFilter *filter)
|
2018-11-08 18:20:11 +01:00
|
|
|
|
{
|
|
|
|
|
g_autoptr(GPtrArray) sections = g_ptr_array_new_with_free_func (NULL);
|
|
|
|
|
GVariantIter iter;
|
|
|
|
|
const gchar *oars_section;
|
|
|
|
|
|
|
|
|
|
g_return_val_if_fail (filter != NULL, NULL);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, NULL);
|
|
|
|
|
|
|
|
|
|
g_variant_iter_init (&iter, filter->oars_ratings);
|
|
|
|
|
|
|
|
|
|
while (g_variant_iter_loop (&iter, "{&s&s}", &oars_section, NULL))
|
|
|
|
|
g_ptr_array_add (sections, (gpointer) oars_section);
|
|
|
|
|
|
|
|
|
|
/* Sort alphabetically for easier comparisons later. */
|
|
|
|
|
g_ptr_array_sort (sections, strcmp_cb);
|
|
|
|
|
|
|
|
|
|
g_ptr_array_add (sections, NULL); /* NULL terminator */
|
|
|
|
|
|
|
|
|
|
return (const gchar **) g_ptr_array_free (g_steal_pointer (§ions), FALSE);
|
|
|
|
|
}
|
|
|
|
|
|
2018-10-09 12:24:25 +02:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_get_oars_value:
|
|
|
|
|
* @filter: an #MctAppFilter
|
2018-10-09 12:24:25 +02:00
|
|
|
|
* @oars_section: name of the OARS section to get the value from
|
|
|
|
|
*
|
|
|
|
|
* Get the value assigned to the given @oars_section in the OARS filter stored
|
|
|
|
|
* within @filter. If that section has no value explicitly defined,
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* %MCT_APP_FILTER_OARS_VALUE_UNKNOWN is returned.
|
2018-10-09 12:24:25 +02:00
|
|
|
|
*
|
|
|
|
|
* This value is the most intense value allowed for apps to have in this
|
|
|
|
|
* section, inclusive. Any app with a more intense value for this section must
|
|
|
|
|
* be hidden from the user whose @filter this is.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* This does not factor in mct_app_filter_is_system_installation_allowed().
|
2018-11-13 12:30:19 +01:00
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Returns: an #MctAppFilterOarsValue
|
|
|
|
|
* Since: 0.2.0
|
2018-10-09 12:24:25 +02:00
|
|
|
|
*/
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterOarsValue
|
|
|
|
|
mct_app_filter_get_oars_value (MctAppFilter *filter,
|
2018-10-09 12:24:25 +02:00
|
|
|
|
const gchar *oars_section)
|
|
|
|
|
{
|
|
|
|
|
const gchar *value_str;
|
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
g_return_val_if_fail (filter != NULL, MCT_APP_FILTER_OARS_VALUE_UNKNOWN);
|
2018-10-09 12:24:25 +02:00
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1,
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MCT_APP_FILTER_OARS_VALUE_UNKNOWN);
|
2018-10-09 12:24:25 +02:00
|
|
|
|
g_return_val_if_fail (oars_section != NULL && *oars_section != '\0',
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MCT_APP_FILTER_OARS_VALUE_UNKNOWN);
|
2018-10-09 12:24:25 +02:00
|
|
|
|
|
|
|
|
|
if (!g_variant_lookup (filter->oars_ratings, oars_section, "&s", &value_str))
|
2019-02-26 18:43:56 +01:00
|
|
|
|
return MCT_APP_FILTER_OARS_VALUE_UNKNOWN;
|
2018-10-09 12:24:25 +02:00
|
|
|
|
|
2020-03-20 15:55:36 +01:00
|
|
|
|
return oars_str_to_enum (value_str);
|
2018-10-09 12:24:25 +02:00
|
|
|
|
}
|
|
|
|
|
|
2018-11-29 22:09:57 +01:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_is_user_installation_allowed:
|
|
|
|
|
* @filter: an #MctAppFilter
|
2018-11-29 22:09:57 +01:00
|
|
|
|
*
|
|
|
|
|
* Get whether the user is allowed to install to their flatpak user repository.
|
|
|
|
|
* This should be queried in addition to the OARS values
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* (mct_app_filter_get_oars_value()) — if it returns %FALSE, the OARS values
|
2018-11-29 22:09:57 +01:00
|
|
|
|
* should be ignored and app installation should be unconditionally disallowed.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if app installation is allowed to the user repository for
|
|
|
|
|
* this user; %FALSE if it is unconditionally disallowed for this user
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-11-29 22:09:57 +01:00
|
|
|
|
*/
|
|
|
|
|
gboolean
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_is_user_installation_allowed (MctAppFilter *filter)
|
2018-11-29 22:09:57 +01:00
|
|
|
|
{
|
|
|
|
|
g_return_val_if_fail (filter != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, FALSE);
|
|
|
|
|
|
|
|
|
|
return filter->allow_user_installation;
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-13 12:30:19 +01:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_is_system_installation_allowed:
|
|
|
|
|
* @filter: an #MctAppFilter
|
2018-11-13 12:30:19 +01:00
|
|
|
|
*
|
2018-11-28 17:39:39 +01:00
|
|
|
|
* Get whether the user is allowed to install to the flatpak system repository.
|
|
|
|
|
* This should be queried in addition to the OARS values
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* (mct_app_filter_get_oars_value()) — if it returns %FALSE, the OARS values
|
2018-11-28 17:39:39 +01:00
|
|
|
|
* should be ignored and app installation should be unconditionally disallowed.
|
2018-11-13 12:30:19 +01:00
|
|
|
|
*
|
2018-11-28 17:39:39 +01:00
|
|
|
|
* Returns: %TRUE if app installation is allowed to the system repository for
|
|
|
|
|
* this user; %FALSE if it is unconditionally disallowed for this user
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-11-13 12:30:19 +01:00
|
|
|
|
*/
|
|
|
|
|
gboolean
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_is_system_installation_allowed (MctAppFilter *filter)
|
2018-11-13 12:30:19 +01:00
|
|
|
|
{
|
|
|
|
|
g_return_val_if_fail (filter != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, FALSE);
|
|
|
|
|
|
2018-11-28 17:39:39 +01:00
|
|
|
|
return filter->allow_system_installation;
|
2018-11-13 12:30:19 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-03-16 13:13:35 +01:00
|
|
|
|
/**
|
|
|
|
|
* _mct_app_filter_build_app_filter_variant:
|
|
|
|
|
* @filter: an #MctAppFilter
|
|
|
|
|
*
|
|
|
|
|
* Build a #GVariant which contains the app filter from @filter, in the format
|
|
|
|
|
* used for storing it in AccountsService.
|
|
|
|
|
*
|
|
|
|
|
* Returns: (transfer floating): a new, floating #GVariant containing the app
|
|
|
|
|
* filter
|
|
|
|
|
*/
|
|
|
|
|
static GVariant *
|
|
|
|
|
_mct_app_filter_build_app_filter_variant (MctAppFilter *filter)
|
|
|
|
|
{
|
|
|
|
|
g_auto(GVariantBuilder) builder = G_VARIANT_BUILDER_INIT (G_VARIANT_TYPE ("(bas)"));
|
|
|
|
|
|
|
|
|
|
g_return_val_if_fail (filter != NULL, NULL);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, NULL);
|
|
|
|
|
|
|
|
|
|
g_variant_builder_add (&builder, "b",
|
2020-06-10 00:30:39 +02:00
|
|
|
|
(filter->app_list_type == MCT_APP_FILTER_LIST_ALLOWLIST));
|
2020-03-16 13:13:35 +01:00
|
|
|
|
g_variant_builder_open (&builder, G_VARIANT_TYPE ("as"));
|
|
|
|
|
|
|
|
|
|
for (gsize i = 0; filter->app_list[i] != NULL; i++)
|
|
|
|
|
g_variant_builder_add (&builder, "s", filter->app_list[i]);
|
|
|
|
|
|
|
|
|
|
g_variant_builder_close (&builder);
|
|
|
|
|
|
|
|
|
|
return g_variant_builder_end (&builder);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* mct_app_filter_serialize:
|
|
|
|
|
* @filter: an #MctAppFilter
|
|
|
|
|
*
|
|
|
|
|
* Build a #GVariant which contains the app filter from @filter, in an opaque
|
|
|
|
|
* variant format. This format may change in future, but
|
|
|
|
|
* mct_app_filter_deserialize() is guaranteed to always be able to load any
|
|
|
|
|
* variant produced by the current or any previous version of
|
|
|
|
|
* mct_app_filter_serialize().
|
|
|
|
|
*
|
|
|
|
|
* Returns: (transfer floating): a new, floating #GVariant containing the app
|
|
|
|
|
* filter
|
|
|
|
|
* Since: 0.7.0
|
|
|
|
|
*/
|
|
|
|
|
GVariant *
|
|
|
|
|
mct_app_filter_serialize (MctAppFilter *filter)
|
|
|
|
|
{
|
|
|
|
|
g_auto(GVariantBuilder) builder = G_VARIANT_BUILDER_INIT (G_VARIANT_TYPE ("a{sv}"));
|
|
|
|
|
|
|
|
|
|
g_return_val_if_fail (filter != NULL, NULL);
|
|
|
|
|
g_return_val_if_fail (filter->ref_count >= 1, NULL);
|
|
|
|
|
|
|
|
|
|
/* The serialisation format is exactly the
|
|
|
|
|
* `com.endlessm.ParentalControls.AppFilter` D-Bus interface. */
|
|
|
|
|
g_variant_builder_add (&builder, "{sv}", "AppFilter",
|
|
|
|
|
_mct_app_filter_build_app_filter_variant (filter));
|
|
|
|
|
g_variant_builder_add (&builder, "{sv}", "OarsFilter",
|
|
|
|
|
g_variant_new ("(s@a{ss})", "oars-1.1",
|
|
|
|
|
filter->oars_ratings));
|
|
|
|
|
g_variant_builder_add (&builder, "{sv}", "AllowUserInstallation",
|
|
|
|
|
g_variant_new_boolean (filter->allow_user_installation));
|
|
|
|
|
g_variant_builder_add (&builder, "{sv}", "AllowSystemInstallation",
|
|
|
|
|
g_variant_new_boolean (filter->allow_system_installation));
|
|
|
|
|
|
|
|
|
|
return g_variant_builder_end (&builder);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* mct_app_filter_deserialize:
|
|
|
|
|
* @variant: a serialized app filter variant
|
|
|
|
|
* @user_id: the ID of the user the app filter relates to
|
|
|
|
|
* @error: return location for a #GError, or %NULL
|
|
|
|
|
*
|
|
|
|
|
* Deserialize an app filter previously serialized with
|
|
|
|
|
* mct_app_filter_serialize(). This function guarantees to be able to
|
|
|
|
|
* deserialize any serialized form from this version or older versions of
|
|
|
|
|
* libmalcontent.
|
|
|
|
|
*
|
|
|
|
|
* If deserialization fails, %MCT_MANAGER_ERROR_INVALID_DATA will be returned.
|
|
|
|
|
*
|
|
|
|
|
* Returns: (transfer full): deserialized app filter
|
|
|
|
|
* Since: 0.7.0
|
|
|
|
|
*/
|
|
|
|
|
MctAppFilter *
|
|
|
|
|
mct_app_filter_deserialize (GVariant *variant,
|
|
|
|
|
uid_t user_id,
|
|
|
|
|
GError **error)
|
|
|
|
|
{
|
2020-06-10 00:30:39 +02:00
|
|
|
|
gboolean is_allowlist;
|
2020-03-16 13:13:35 +01:00
|
|
|
|
g_auto(GStrv) app_list = NULL;
|
|
|
|
|
const gchar *content_rating_kind;
|
|
|
|
|
g_autoptr(GVariant) oars_variant = NULL;
|
|
|
|
|
gboolean allow_user_installation;
|
|
|
|
|
gboolean allow_system_installation;
|
|
|
|
|
g_autoptr(MctAppFilter) app_filter = NULL;
|
|
|
|
|
|
|
|
|
|
g_return_val_if_fail (variant != NULL, NULL);
|
|
|
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
|
|
|
|
|
|
/* Check the overall type. */
|
|
|
|
|
if (!g_variant_is_of_type (variant, G_VARIANT_TYPE ("a{sv}")))
|
|
|
|
|
{
|
|
|
|
|
g_set_error (error, MCT_MANAGER_ERROR,
|
|
|
|
|
MCT_MANAGER_ERROR_INVALID_DATA,
|
|
|
|
|
_("App filter for user %u was in an unrecognized format"),
|
|
|
|
|
(guint) user_id);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Extract the properties we care about. The default values here should be
|
|
|
|
|
* kept in sync with those in the `com.endlessm.ParentalControls.AppFilter`
|
|
|
|
|
* D-Bus interface. */
|
|
|
|
|
if (!g_variant_lookup (variant, "AppFilter", "(b^as)",
|
2020-06-10 00:30:39 +02:00
|
|
|
|
&is_allowlist, &app_list))
|
2020-03-16 13:13:35 +01:00
|
|
|
|
{
|
|
|
|
|
/* Default value. */
|
2020-06-10 00:30:39 +02:00
|
|
|
|
is_allowlist = FALSE;
|
2020-03-16 13:13:35 +01:00
|
|
|
|
app_list = g_new0 (gchar *, 1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!g_variant_lookup (variant, "OarsFilter", "(&s@a{ss})",
|
|
|
|
|
&content_rating_kind, &oars_variant))
|
|
|
|
|
{
|
|
|
|
|
/* Default value. */
|
|
|
|
|
content_rating_kind = "oars-1.1";
|
|
|
|
|
oars_variant = g_variant_new ("a{ss}", NULL);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Check that the OARS filter is in a format we support. Currently, that’s
|
|
|
|
|
* only oars-1.0 and oars-1.1. */
|
|
|
|
|
if (!g_str_equal (content_rating_kind, "oars-1.0") &&
|
|
|
|
|
!g_str_equal (content_rating_kind, "oars-1.1"))
|
|
|
|
|
{
|
|
|
|
|
g_set_error (error, MCT_MANAGER_ERROR,
|
|
|
|
|
MCT_MANAGER_ERROR_INVALID_DATA,
|
|
|
|
|
_("OARS filter for user %u has an unrecognized kind ‘%s’"),
|
|
|
|
|
(guint) user_id, content_rating_kind);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!g_variant_lookup (variant, "AllowUserInstallation", "b",
|
|
|
|
|
&allow_user_installation))
|
|
|
|
|
{
|
|
|
|
|
/* Default value. */
|
|
|
|
|
allow_user_installation = TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!g_variant_lookup (variant, "AllowSystemInstallation", "b",
|
|
|
|
|
&allow_system_installation))
|
|
|
|
|
{
|
|
|
|
|
/* Default value. */
|
|
|
|
|
allow_system_installation = FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Success. Create an #MctAppFilter object to contain the results. */
|
|
|
|
|
app_filter = g_new0 (MctAppFilter, 1);
|
|
|
|
|
app_filter->ref_count = 1;
|
|
|
|
|
app_filter->user_id = user_id;
|
|
|
|
|
app_filter->app_list = g_steal_pointer (&app_list);
|
|
|
|
|
app_filter->app_list_type =
|
2020-06-10 00:30:39 +02:00
|
|
|
|
is_allowlist ? MCT_APP_FILTER_LIST_ALLOWLIST : MCT_APP_FILTER_LIST_BLOCKLIST;
|
2020-03-16 13:13:35 +01:00
|
|
|
|
app_filter->oars_ratings = g_steal_pointer (&oars_variant);
|
|
|
|
|
app_filter->allow_user_installation = allow_user_installation;
|
|
|
|
|
app_filter->allow_system_installation = allow_system_installation;
|
|
|
|
|
|
|
|
|
|
return g_steal_pointer (&app_filter);
|
|
|
|
|
}
|
|
|
|
|
|
2020-11-02 16:21:04 +01:00
|
|
|
|
/**
|
|
|
|
|
* mct_app_filter_equal:
|
|
|
|
|
* @a: (not nullable): an #MctAppFilter
|
|
|
|
|
* @b: (not nullable): an #MctAppFilter
|
|
|
|
|
*
|
|
|
|
|
* Check whether app filters @a and @b are equal.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if @a and @b are equal, %FALSE otherwise
|
|
|
|
|
* Since: 0.10.0
|
|
|
|
|
*/
|
|
|
|
|
gboolean
|
|
|
|
|
mct_app_filter_equal (MctAppFilter *a,
|
|
|
|
|
MctAppFilter *b)
|
|
|
|
|
{
|
|
|
|
|
g_return_val_if_fail (a != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (a->ref_count >= 1, FALSE);
|
|
|
|
|
g_return_val_if_fail (b != NULL, FALSE);
|
|
|
|
|
g_return_val_if_fail (b->ref_count >= 1, FALSE);
|
|
|
|
|
|
|
|
|
|
return (a->user_id == b->user_id &&
|
|
|
|
|
a->app_list_type == b->app_list_type &&
|
|
|
|
|
a->allow_user_installation == b->allow_user_installation &&
|
|
|
|
|
a->allow_system_installation == b->allow_system_installation &&
|
|
|
|
|
g_strv_equal ((const gchar * const *) a->app_list, (const gchar * const *) b->app_list) &&
|
|
|
|
|
g_variant_equal (a->oars_ratings, b->oars_ratings));
|
|
|
|
|
}
|
|
|
|
|
|
2018-10-12 05:47:59 +02:00
|
|
|
|
/*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Actual implementation of #MctAppFilterBuilder.
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
|
|
|
|
* All members are %NULL if un-initialised, cleared, or ended.
|
|
|
|
|
*/
|
|
|
|
|
typedef struct
|
|
|
|
|
{
|
2020-06-10 00:30:39 +02:00
|
|
|
|
GPtrArray *blocklist; /* (nullable) (owned) (element-type utf8) */
|
2019-02-26 18:43:56 +01:00
|
|
|
|
GHashTable *oars; /* (nullable) (owned) (element-type utf8 MctAppFilterOarsValue) */
|
2018-11-29 22:09:57 +01:00
|
|
|
|
gboolean allow_user_installation;
|
2018-11-28 17:39:39 +01:00
|
|
|
|
gboolean allow_system_installation;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
/*< private >*/
|
|
|
|
|
gpointer padding[2];
|
2019-02-26 18:43:56 +01:00
|
|
|
|
} MctAppFilterBuilderReal;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
G_STATIC_ASSERT (sizeof (MctAppFilterBuilderReal) ==
|
|
|
|
|
sizeof (MctAppFilterBuilder));
|
|
|
|
|
G_STATIC_ASSERT (__alignof__ (MctAppFilterBuilderReal) ==
|
|
|
|
|
__alignof__ (MctAppFilterBuilder));
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
G_DEFINE_BOXED_TYPE (MctAppFilterBuilder, mct_app_filter_builder,
|
|
|
|
|
mct_app_filter_builder_copy, mct_app_filter_builder_free)
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_init:
|
|
|
|
|
* @builder: an uninitialised #MctAppFilterBuilder
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
|
|
|
|
* Initialise the given @builder so it can be used to construct a new
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* #MctAppFilter. @builder must have been allocated on the stack, and must not
|
2018-10-12 05:47:59 +02:00
|
|
|
|
* already be initialised.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Construct the #MctAppFilter by calling methods on @builder, followed by
|
|
|
|
|
* mct_app_filter_builder_end(). To abort construction, use
|
|
|
|
|
* mct_app_filter_builder_clear().
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*/
|
|
|
|
|
void
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_builder_init (MctAppFilterBuilder *builder)
|
2018-10-12 05:47:59 +02:00
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilder local_builder = MCT_APP_FILTER_BUILDER_INIT ();
|
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
g_return_if_fail (_builder != NULL);
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_return_if_fail (_builder->blocklist == NULL);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
g_return_if_fail (_builder->oars == NULL);
|
|
|
|
|
|
|
|
|
|
memcpy (builder, &local_builder, sizeof (local_builder));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_clear:
|
|
|
|
|
* @builder: an #MctAppFilterBuilder
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
|
|
|
|
* Clear @builder, freeing any internal state in it. This will not free the
|
|
|
|
|
* top-level storage for @builder itself, which is assumed to be allocated on
|
|
|
|
|
* the stack.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* If called on an already-cleared #MctAppFilterBuilder, this function is
|
2018-10-12 05:47:59 +02:00
|
|
|
|
* idempotent.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*/
|
|
|
|
|
void
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_builder_clear (MctAppFilterBuilder *builder)
|
2018-10-12 05:47:59 +02:00
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
g_return_if_fail (_builder != NULL);
|
|
|
|
|
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_clear_pointer (&_builder->blocklist, g_ptr_array_unref);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
g_clear_pointer (&_builder->oars, g_hash_table_unref);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_new:
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Construct a new #MctAppFilterBuilder on the heap. This is intended for
|
2018-10-12 05:47:59 +02:00
|
|
|
|
* language bindings. The returned builder must eventually be freed with
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_free(), but can be cleared zero or more times with
|
|
|
|
|
* mct_app_filter_builder_clear() first.
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Returns: (transfer full): a new heap-allocated #MctAppFilterBuilder
|
|
|
|
|
* Since: 0.2.0
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*/
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilder *
|
|
|
|
|
mct_app_filter_builder_new (void)
|
2018-10-12 05:47:59 +02:00
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
g_autoptr(MctAppFilterBuilder) builder = NULL;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
builder = g_new0 (MctAppFilterBuilder, 1);
|
|
|
|
|
mct_app_filter_builder_init (builder);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
return g_steal_pointer (&builder);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_copy:
|
|
|
|
|
* @builder: an #MctAppFilterBuilder
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Copy the given @builder to a newly-allocated #MctAppFilterBuilder on the
|
2018-10-12 05:47:59 +02:00
|
|
|
|
* heap. This is safe to use with cleared, stack-allocated
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* #MctAppFilterBuilders.
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
|
|
|
|
* Returns: (transfer full): a copy of @builder
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*/
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilder *
|
|
|
|
|
mct_app_filter_builder_copy (MctAppFilterBuilder *builder)
|
2018-10-12 05:47:59 +02:00
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
|
|
|
|
g_autoptr(MctAppFilterBuilder) copy = NULL;
|
|
|
|
|
MctAppFilterBuilderReal *_copy;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
g_return_val_if_fail (builder != NULL, NULL);
|
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
copy = mct_app_filter_builder_new ();
|
|
|
|
|
_copy = (MctAppFilterBuilderReal *) copy;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_builder_clear (copy);
|
2020-06-10 00:30:39 +02:00
|
|
|
|
if (_builder->blocklist != NULL)
|
|
|
|
|
_copy->blocklist = g_ptr_array_ref (_builder->blocklist);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
if (_builder->oars != NULL)
|
|
|
|
|
_copy->oars = g_hash_table_ref (_builder->oars);
|
2018-11-29 22:09:57 +01:00
|
|
|
|
_copy->allow_user_installation = _builder->allow_user_installation;
|
2018-11-28 17:39:39 +01:00
|
|
|
|
_copy->allow_system_installation = _builder->allow_system_installation;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
return g_steal_pointer (©);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_free:
|
|
|
|
|
* @builder: a heap-allocated #MctAppFilterBuilder
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Free an #MctAppFilterBuilder originally allocated using
|
|
|
|
|
* mct_app_filter_builder_new(). This must not be called on stack-allocated
|
|
|
|
|
* builders initialised using mct_app_filter_builder_init().
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*/
|
|
|
|
|
void
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_builder_free (MctAppFilterBuilder *builder)
|
2018-10-12 05:47:59 +02:00
|
|
|
|
{
|
|
|
|
|
g_return_if_fail (builder != NULL);
|
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_builder_clear (builder);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
g_free (builder);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_end:
|
|
|
|
|
* @builder: an initialised #MctAppFilterBuilder
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Finish constructing an #MctAppFilter with the given @builder, and return it.
|
|
|
|
|
* The #MctAppFilterBuilder will be cleared as if mct_app_filter_builder_clear()
|
2018-10-12 05:47:59 +02:00
|
|
|
|
* had been called.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Returns: (transfer full): a newly constructed #MctAppFilter
|
|
|
|
|
* Since: 0.2.0
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*/
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilter *
|
|
|
|
|
mct_app_filter_builder_end (MctAppFilterBuilder *builder)
|
2018-10-12 05:47:59 +02:00
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
|
|
|
|
g_autoptr(MctAppFilter) app_filter = NULL;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
g_auto(GVariantBuilder) oars_builder = G_VARIANT_BUILDER_INIT (G_VARIANT_TYPE ("a{ss}"));
|
|
|
|
|
GHashTableIter iter;
|
|
|
|
|
gpointer key, value;
|
|
|
|
|
g_autoptr(GVariant) oars_variant = NULL;
|
|
|
|
|
|
|
|
|
|
g_return_val_if_fail (_builder != NULL, NULL);
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_return_val_if_fail (_builder->blocklist != NULL, NULL);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
g_return_val_if_fail (_builder->oars != NULL, NULL);
|
|
|
|
|
|
|
|
|
|
/* Ensure the paths list is %NULL-terminated. */
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_ptr_array_add (_builder->blocklist, NULL);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
/* Build the OARS variant. */
|
|
|
|
|
g_hash_table_iter_init (&iter, _builder->oars);
|
|
|
|
|
while (g_hash_table_iter_next (&iter, &key, &value))
|
|
|
|
|
{
|
|
|
|
|
const gchar *oars_section = key;
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterOarsValue oars_value = GPOINTER_TO_INT (value);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
const gchar *oars_value_strs[] =
|
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
NULL, /* MCT_APP_FILTER_OARS_VALUE_UNKNOWN */
|
2018-10-12 05:47:59 +02:00
|
|
|
|
"none",
|
|
|
|
|
"mild",
|
|
|
|
|
"moderate",
|
|
|
|
|
"intense",
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
g_assert ((int) oars_value >= 0 &&
|
|
|
|
|
(int) oars_value < (int) G_N_ELEMENTS (oars_value_strs));
|
|
|
|
|
|
|
|
|
|
if (oars_value_strs[oars_value] != NULL)
|
|
|
|
|
g_variant_builder_add (&oars_builder, "{ss}",
|
|
|
|
|
oars_section, oars_value_strs[oars_value]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
oars_variant = g_variant_ref_sink (g_variant_builder_end (&oars_builder));
|
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
/* Build the #MctAppFilter. */
|
|
|
|
|
app_filter = g_new0 (MctAppFilter, 1);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
app_filter->ref_count = 1;
|
|
|
|
|
app_filter->user_id = -1;
|
2020-06-10 00:30:39 +02:00
|
|
|
|
app_filter->app_list = (gchar **) g_ptr_array_free (g_steal_pointer (&_builder->blocklist), FALSE);
|
|
|
|
|
app_filter->app_list_type = MCT_APP_FILTER_LIST_BLOCKLIST;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
app_filter->oars_ratings = g_steal_pointer (&oars_variant);
|
2018-11-29 22:09:57 +01:00
|
|
|
|
app_filter->allow_user_installation = _builder->allow_user_installation;
|
2018-11-28 17:39:39 +01:00
|
|
|
|
app_filter->allow_system_installation = _builder->allow_system_installation;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_builder_clear (builder);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
return g_steal_pointer (&app_filter);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* mct_app_filter_builder_blocklist_path:
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* @builder: an initialised #MctAppFilterBuilder
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* @path: (type filename): an absolute path to blocklist
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* Add @path to the blocklist of app paths in the filter under construction. It
|
2018-10-12 05:47:59 +02:00
|
|
|
|
* will be canonicalised (without doing any I/O) before being added.
|
|
|
|
|
* The canonicalised @path will not be added again if it’s already been added.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*/
|
|
|
|
|
void
|
2020-06-10 00:30:39 +02:00
|
|
|
|
mct_app_filter_builder_blocklist_path (MctAppFilterBuilder *builder,
|
2018-10-12 05:47:59 +02:00
|
|
|
|
const gchar *path)
|
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
g_return_if_fail (_builder != NULL);
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_return_if_fail (_builder->blocklist != NULL);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
g_return_if_fail (path != NULL);
|
|
|
|
|
g_return_if_fail (g_path_is_absolute (path));
|
|
|
|
|
|
|
|
|
|
g_autofree gchar *canonical_path = g_canonicalize_filename (path, "/");
|
2019-06-13 02:28:56 +02:00
|
|
|
|
g_autofree gchar *canonical_path_utf8 = g_filename_to_utf8 (canonical_path, -1,
|
|
|
|
|
NULL, NULL, NULL);
|
|
|
|
|
g_return_if_fail (canonical_path_utf8 != NULL);
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
2020-06-10 00:30:39 +02:00
|
|
|
|
if (!g_ptr_array_find_with_equal_func (_builder->blocklist,
|
2019-06-13 02:28:56 +02:00
|
|
|
|
canonical_path_utf8, g_str_equal, NULL))
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_ptr_array_add (_builder->blocklist, g_steal_pointer (&canonical_path_utf8));
|
2018-10-12 05:47:59 +02:00
|
|
|
|
}
|
|
|
|
|
|
2018-10-12 06:59:04 +02:00
|
|
|
|
/**
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* mct_app_filter_builder_blocklist_flatpak_ref:
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* @builder: an initialised #MctAppFilterBuilder
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* @app_ref: a flatpak app ref to blocklist
|
2018-10-12 06:59:04 +02:00
|
|
|
|
*
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* Add @app_ref to the blocklist of flatpak refs in the filter under
|
2018-10-12 06:59:04 +02:00
|
|
|
|
* construction. The @app_ref will not be added again if it’s already been
|
|
|
|
|
* added.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-10-12 06:59:04 +02:00
|
|
|
|
*/
|
|
|
|
|
void
|
2020-06-10 00:30:39 +02:00
|
|
|
|
mct_app_filter_builder_blocklist_flatpak_ref (MctAppFilterBuilder *builder,
|
2018-10-12 06:59:04 +02:00
|
|
|
|
const gchar *app_ref)
|
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
2018-10-12 06:59:04 +02:00
|
|
|
|
|
|
|
|
|
g_return_if_fail (_builder != NULL);
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_return_if_fail (_builder->blocklist != NULL);
|
2018-10-12 06:59:04 +02:00
|
|
|
|
g_return_if_fail (app_ref != NULL);
|
2019-06-13 02:34:43 +02:00
|
|
|
|
g_return_if_fail (is_valid_flatpak_ref (app_ref));
|
2018-10-12 06:59:04 +02:00
|
|
|
|
|
2020-06-10 00:30:39 +02:00
|
|
|
|
if (!g_ptr_array_find_with_equal_func (_builder->blocklist,
|
2018-10-12 06:59:04 +02:00
|
|
|
|
app_ref, g_str_equal, NULL))
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_ptr_array_add (_builder->blocklist, g_strdup (app_ref));
|
2018-10-12 06:59:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
2019-06-13 02:34:43 +02:00
|
|
|
|
/**
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* mct_app_filter_builder_blocklist_content_type:
|
2019-06-13 02:34:43 +02:00
|
|
|
|
* @builder: an initialised #MctAppFilterBuilder
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* @content_type: a content type to blocklist
|
2019-06-13 02:34:43 +02:00
|
|
|
|
*
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* Add @content_type to the blocklist of content types in the filter under
|
2019-06-13 02:34:43 +02:00
|
|
|
|
* construction. The @content_type will not be added again if it’s already been
|
|
|
|
|
* added.
|
|
|
|
|
*
|
|
|
|
|
* Note that this method doesn’t handle content subtypes. For example, if
|
2020-06-10 00:30:39 +02:00
|
|
|
|
* `application/xml` is added to the blocklist but `application/xspf+xml` is not,
|
|
|
|
|
* a check for whether `application/xspf+xml` is blocklisted would return false.
|
2019-06-13 02:34:43 +02:00
|
|
|
|
*
|
|
|
|
|
* Since: 0.4.0
|
|
|
|
|
*/
|
|
|
|
|
void
|
2020-06-10 00:30:39 +02:00
|
|
|
|
mct_app_filter_builder_blocklist_content_type (MctAppFilterBuilder *builder,
|
2019-06-13 02:34:43 +02:00
|
|
|
|
const gchar *content_type)
|
|
|
|
|
{
|
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
|
|
|
|
|
|
|
|
|
g_return_if_fail (_builder != NULL);
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_return_if_fail (_builder->blocklist != NULL);
|
2019-06-13 02:34:43 +02:00
|
|
|
|
g_return_if_fail (content_type != NULL);
|
|
|
|
|
g_return_if_fail (is_valid_content_type (content_type));
|
|
|
|
|
|
2020-06-10 00:30:39 +02:00
|
|
|
|
if (!g_ptr_array_find_with_equal_func (_builder->blocklist,
|
2019-06-13 02:34:43 +02:00
|
|
|
|
content_type, g_str_equal, NULL))
|
2020-06-10 00:30:39 +02:00
|
|
|
|
g_ptr_array_add (_builder->blocklist, g_strdup (content_type));
|
2019-06-13 02:34:43 +02:00
|
|
|
|
}
|
|
|
|
|
|
2018-10-12 05:47:59 +02:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_set_oars_value:
|
|
|
|
|
* @builder: an initialised #MctAppFilterBuilder
|
2018-10-12 05:47:59 +02:00
|
|
|
|
* @oars_section: name of the OARS section to set the value for
|
|
|
|
|
* @value: value to set for the @oars_section
|
|
|
|
|
*
|
|
|
|
|
* Set the OARS value for the given @oars_section, indicating the intensity of
|
|
|
|
|
* content covered by that section which the user is allowed to see (inclusive).
|
|
|
|
|
* Any apps which have more intense content in this section should not be usable
|
|
|
|
|
* by the user.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-10-12 05:47:59 +02:00
|
|
|
|
*/
|
|
|
|
|
void
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_builder_set_oars_value (MctAppFilterBuilder *builder,
|
2018-10-12 05:47:59 +02:00
|
|
|
|
const gchar *oars_section,
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterOarsValue value)
|
2018-10-12 05:47:59 +02:00
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
2018-10-12 05:47:59 +02:00
|
|
|
|
|
|
|
|
|
g_return_if_fail (_builder != NULL);
|
|
|
|
|
g_return_if_fail (_builder->oars != NULL);
|
|
|
|
|
g_return_if_fail (oars_section != NULL && *oars_section != '\0');
|
|
|
|
|
|
|
|
|
|
g_hash_table_insert (_builder->oars, g_strdup (oars_section),
|
|
|
|
|
GUINT_TO_POINTER (value));
|
|
|
|
|
}
|
2018-11-13 12:30:19 +01:00
|
|
|
|
|
2018-11-29 22:09:57 +01:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_set_allow_user_installation:
|
|
|
|
|
* @builder: an initialised #MctAppFilterBuilder
|
2018-11-29 22:09:57 +01:00
|
|
|
|
* @allow_user_installation: %TRUE to allow app installation; %FALSE to
|
|
|
|
|
* unconditionally disallow it
|
|
|
|
|
*
|
|
|
|
|
* Set whether the user is allowed to install to their flatpak user repository.
|
|
|
|
|
* If this is %TRUE, app installation is still subject to the OARS values
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* (mct_app_filter_builder_set_oars_value()). If it is %FALSE, app installation
|
2018-11-29 22:09:57 +01:00
|
|
|
|
* is unconditionally disallowed for this user.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-11-29 22:09:57 +01:00
|
|
|
|
*/
|
|
|
|
|
void
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_builder_set_allow_user_installation (MctAppFilterBuilder *builder,
|
2018-11-29 22:09:57 +01:00
|
|
|
|
gboolean allow_user_installation)
|
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
2018-11-29 22:09:57 +01:00
|
|
|
|
|
|
|
|
|
g_return_if_fail (_builder != NULL);
|
|
|
|
|
|
|
|
|
|
_builder->allow_user_installation = allow_user_installation;
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-13 12:30:19 +01:00
|
|
|
|
/**
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* mct_app_filter_builder_set_allow_system_installation:
|
|
|
|
|
* @builder: an initialised #MctAppFilterBuilder
|
2018-11-28 17:39:39 +01:00
|
|
|
|
* @allow_system_installation: %TRUE to allow app installation; %FALSE to
|
2018-11-13 12:30:19 +01:00
|
|
|
|
* unconditionally disallow it
|
|
|
|
|
*
|
2018-11-28 17:39:39 +01:00
|
|
|
|
* Set whether the user is allowed to install to the flatpak system repository.
|
|
|
|
|
* If this is %TRUE, app installation is still subject to the OARS values
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* (mct_app_filter_builder_set_oars_value()). If it is %FALSE, app installation
|
2018-11-13 12:30:19 +01:00
|
|
|
|
* is unconditionally disallowed for this user.
|
|
|
|
|
*
|
2019-02-26 18:43:56 +01:00
|
|
|
|
* Since: 0.2.0
|
2018-11-13 12:30:19 +01:00
|
|
|
|
*/
|
|
|
|
|
void
|
2019-02-26 18:43:56 +01:00
|
|
|
|
mct_app_filter_builder_set_allow_system_installation (MctAppFilterBuilder *builder,
|
2018-11-28 17:39:39 +01:00
|
|
|
|
gboolean allow_system_installation)
|
2018-11-13 12:30:19 +01:00
|
|
|
|
{
|
2019-02-26 18:43:56 +01:00
|
|
|
|
MctAppFilterBuilderReal *_builder = (MctAppFilterBuilderReal *) builder;
|
2018-11-13 12:30:19 +01:00
|
|
|
|
|
|
|
|
|
g_return_if_fail (_builder != NULL);
|
|
|
|
|
|
2018-11-28 17:39:39 +01:00
|
|
|
|
_builder->allow_system_installation = allow_system_installation;
|
2018-11-13 12:30:19 +01:00
|
|
|
|
}
|