Perform Cynara runtime policy checks by default
authorJacek Bukarewicz <j.bukarewicz@samsung.com>
Tue, 23 Jun 2015 09:08:48 +0000 (11:08 +0200)
committerŁukasz Stelmach <l.stelmach@samsung.com>
Thu, 5 Nov 2015 10:59:55 +0000 (11:59 +0100)
commitc54ebccb85af981b980b361a69433e430a69961c
tree7eaecca884c0d3b5fe7d4fab9b78165e6d98ad23
parent3a2f8c3d15c5fa6591d1525fe99a994552f2f478
Perform Cynara runtime policy checks by default

This change introduces http://tizen.org/privilege/internal/dbus privilege
which is supposed to be available only to trusted system resources.
Checks for this privilege are used in place of certain allow rules to
make security policy more strict.

For system bus sending and receiving signals now requires
http://tizen.org/privilege/internal/dbus privilege. Requesting name
ownership and sending methods is still denied by default.

For session bus http://tizen.org/privilege/internal/dbus privilege
is now required for requesting name, calling methods, sending and receiving
signals.

Services are supposed to override these default settings to implement their
own security policy.

Change-Id: Ifb4a160bf6e0638404e0295a2e4fa3077efd881c
Signed-off-by: Jacek Bukarewicz <j.bukarewicz@samsung.com>
bus/session.conf.in
bus/system.conf.in