Perform Cynara runtime policy checks by default
authorJacek Bukarewicz <j.bukarewicz@samsung.com>
Tue, 23 Jun 2015 09:08:48 +0000 (11:08 +0200)
committerAdrian Szyndela <adrian.s@samsung.com>
Fri, 19 Feb 2016 10:54:00 +0000 (11:54 +0100)
commit8f31796268fb52b8ac05ed3600bedd715021d055
tree1dc15e338bb2fada08e6b7141fbb1a8898a9e0db
parent119ef79a53097f83519fb00ab3171768c6defcd5
Perform Cynara runtime policy checks by default

This change introduces http://tizen.org/privilege/internal/dbus privilege
which is supposed to be available only to trusted system resources.
Checks for this privilege are used in place of certain allow rules to
make security policy more strict.

For system bus sending and receiving signals now requires
http://tizen.org/privilege/internal/dbus privilege. Requesting name
ownership and sending methods is still denied by default.

For session bus http://tizen.org/privilege/internal/dbus privilege
is now required for requesting name, calling methods, sending and receiving
signals.

Services are supposed to override these default settings to implement their
own security policy.

Change-Id: Ifb4a160bf6e0638404e0295a2e4fa3077efd881c
Signed-off-by: Jacek Bukarewicz <j.bukarewicz@samsung.com>
bus/session.conf.in
bus/system.conf.in