http://tizen.org/privilege/tethering.admin priv_tethering_admin
http://tizen.org/privilege/email priv_email
http://tizen.org/privilege/tee.client priv_tee_client
+http://tizen.org/privilege/internal/device/audio audio
+http://tizen.org/privilege/internal/device/display display
+http://tizen.org/privilege/internal/device/video video
# @(kernel thread) can get access to internet privilege
cyad --set-policy --bucket=MANIFESTS_GLOBAL --client="@" --user=* --privilege="http://tizen.org/privilege/internet" --type=ALLOW
+# Ensure applications can access standard devices
+for priv in audio video display; do
+ cyad --set-policy --bucket=MANIFESTS_GLOBAL --client="*" --user="*" --privilege="http://tizen.org/privilege/internal/device/$priv" --type=ALLOW
+ cyad --set-policy --bucket=MANIFESTS_LOCAL --client="*" --user="*" --privilege="http://tizen.org/privilege/internal/device/$priv" --type=ALLOW
+done
+
# Stop the service to prevent concurrent db access
systemctl stop security-manager.service security-manager.socket \
|| echo Failed to stop security-manager systemd service, continuing regardless
* http://tizen.org/privilege/internal/default/partner
* http://tizen.org/privilege/internal/default/platform
* http://tizen.org/privilege/internal/default/public
+* http://tizen.org/privilege/internal/device/audio
+* http://tizen.org/privilege/internal/device/display
+* http://tizen.org/privilege/internal/device/video
* http://tizen.org/privilege/internal/inputdevice.block
* http://tizen.org/privilege/internal/service
* http://tizen.org/privilege/internal/usermanagement
* http://tizen.org/privilege/internal/default/partner
* http://tizen.org/privilege/internal/default/platform
* http://tizen.org/privilege/internal/default/public
+* http://tizen.org/privilege/internal/device/audio
+* http://tizen.org/privilege/internal/device/display
+* http://tizen.org/privilege/internal/device/video
* http://tizen.org/privilege/internal/inputdevice.block
* http://tizen.org/privilege/internal/service
* http://tizen.org/privilege/notexist
* http://tizen.org/privilege/internal/default/partner
* http://tizen.org/privilege/internal/default/platform
* http://tizen.org/privilege/internal/default/public
+* http://tizen.org/privilege/internal/device/audio
+* http://tizen.org/privilege/internal/device/display
+* http://tizen.org/privilege/internal/device/video
* http://tizen.org/privilege/internal/inputdevice.block
* http://tizen.org/privilege/internal/service
* http://tizen.org/privilege/notexist
* http://tizen.org/privilege/internal/default/partner
* http://tizen.org/privilege/internal/default/platform
* http://tizen.org/privilege/internal/default/public
+* http://tizen.org/privilege/internal/device/audio
+* http://tizen.org/privilege/internal/device/display
+* http://tizen.org/privilege/internal/device/video
* http://tizen.org/privilege/internal/inputdevice.block
* http://tizen.org/privilege/internal/service
* http://tizen.org/privilege/notexist
* http://tizen.org/privilege/internal/default/partner
* http://tizen.org/privilege/internal/default/platform
* http://tizen.org/privilege/internal/default/public
+* http://tizen.org/privilege/internal/device/audio
+* http://tizen.org/privilege/internal/device/display
+* http://tizen.org/privilege/internal/device/video
* http://tizen.org/privilege/internal/inputdevice.block
* http://tizen.org/privilege/internal/service
* http://tizen.org/privilege/notexist
std::string uidStr = std::to_string(creds.uid);
m_cynaraAdmin.getAppPolicy(appProcessLabel, uidStr, privileges);
m_cynaraAdmin.getAppPolicy(appProcessLabel, CYNARA_ADMIN_WILDCARD, privileges);
+ m_cynaraAdmin.getAppPolicy(CYNARA_ADMIN_WILDCARD, CYNARA_ADMIN_WILDCARD, privileges);
vectorRemoveDuplicates(privileges);