Add capability for the app-defined-loader 52/225852/3 accepted/tizen/unified/20200226.124315 submit/tizen/20200225.045152
authorhyunho <hhstark.kang@samsung.com>
Tue, 25 Feb 2020 04:05:57 +0000 (13:05 +0900)
committerhyunho <hhstark.kang@samsung.com>
Tue, 25 Feb 2020 04:17:28 +0000 (13:17 +0900)
Change-Id: I3586503e0c83cc35ae6321cf1b4bdd63b0e09297
Signed-off-by: hyunho <hhstark.kang@samsung.com>
config/set_capability
test/capability_test/new_capabilities_exception.list

index a2f34d32cbf177f1029f720ab09260bd21b94cb7..e70e878fbbcee2435df07930cbca11fcb0c89007 100755 (executable)
@@ -434,6 +434,19 @@ if [ -e "/usr/bin/launchpad-loader" ] && [ ! -e "/usr/bin/launchpad-starter" ]
 then /usr/sbin/setcap cap_sys_admin,cap_sys_nice,cap_setgid=ei /usr/bin/launchpad-loader
 fi
 
+# Package               platform/core/appfw/launchpad
+# Owner                 Junghoon Park(jh9216.park@samsung.com)
+# Date                  Feb 25, 2020
+# Required              cap_setgid, cap_sys_admin, cap_sys_nice
+# cap_setgid           to use security_manager_prepare_app()
+# cap_sys_admin                to split mount namespace
+# cap_sys_nice         to change scheduling priority
+
+# TODO : condition check about launchpad-starter is temporary
+if [ -e "/usr/bin/app-defined-loader" ] && [ ! -e "/usr/bin/launchpad-starter" ]
+then /usr/sbin/setcap cap_sys_admin,cap_sys_nice,cap_setgid=ei /usr/bin/app-defined-loader
+fi
+
 # Package               platform/core/dotnet/launcher
 # Owner                 Pius Lee(pius.lee@samsung.com)
 # Date                  July 4, 2017
@@ -640,7 +653,7 @@ fi
 # Package               platform/core/security/krate
 # Date                  Sep 19, 2018
 # Required              cap_sys_admin
-# cap_sys_admin                Do bind-mount to control the file access 
+# cap_sys_admin                Do bind-mount to control the file access
 
 if [ -e "/usr/bin/krate-mount" ]
 then /usr/sbin/setcap cap_sys_admin=ei /usr/bin/krate-mount
index 9408fbbba600607131a0a9cf0917abea42e8d318..1489d47832eaa5fce2dcbe8d72db6a497ef5fc43 100755 (executable)
@@ -19,6 +19,7 @@
 /usr/bin/amd = cap_dac_override,cap_kill,cap_sys_admin+ei
 /usr/bin/wrt-loader = cap_setgid,cap_sys_admin+ei/usr/bin/tpk-backend = cap_chown,cap_dac_override,cap_fowner+ei
 /usr/bin/launchpad-loader = cap_setgid,cap_sys_admin,cap_sys_nice+ei
+/usr/bin/app-defined-loader = cap_setgid,cap_sys_admin,cap_sys_nice+ei
 /usr/bin/email-service = cap_chown+eip
 /usr/bin/wgt-backend = cap_chown,cap_dac_override,cap_fowner+ei
 /usr/bin/download-provider = cap_chown,cap_dac_override+ei