Remove unnecessary dbus policy rules 16/190316/1 accepted/tizen/5.0/unified/20181102.015754 accepted/tizen/unified/20181005.012546 submit/tizen/20181001.175629 submit/tizen_5.0/20181101.000003
authorHyotaek Shim <hyotaek.shim@samsung.com>
Mon, 1 Oct 2018 03:18:17 +0000 (12:18 +0900)
committerHyotaek Shim <hyotaek.shim@samsung.com>
Mon, 1 Oct 2018 03:18:21 +0000 (12:18 +0900)
For the dbus session bus,
default allow rule is applied, and only a certain uid is allowed to use.
Thus, <check> rules are only required.

Change-Id: Idca915957c1c61a31d3a39a7e5a7060ff0936f10
Signed-off-by: Hyotaek Shim <hyotaek.shim@samsung.com>
heremaps-uc-launcher/config/heremaps-uc-launcher.conf

index 9abe1f7499d60f8775f7a840405d41c56cb31652..8b23062d795d2c3df92a314f034b466dedcc41e3 100644 (file)
@@ -1,27 +1,7 @@
 <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN"
  "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
 <busconfig>
-
-       <!-- root can own the service -->
-       <policy user="root">
-               <allow own="org.tizen.lbs.Providers.HereMapsUCLauncher"/>
-               <allow send_destination="org.tizen.lbs.Providers.HereMapsUCLauncher"/>
-       </policy>
-
-       <policy user="system">
-               <allow own="org.tizen.lbs.Providers.HereMapsUCLauncher"/>
-               <allow send_destination="org.tizen.lbs.Providers.HereMapsUCLauncher"/>
-       </policy>
-
-       <policy group="users">
-               <allow own="org.tizen.lbs.Providers.HereMapsUCLauncher"/>
-               <allow send_destination="org.tizen.lbs.Providers.HereMapsUCLauncher"
-                       send_path="/org/tizen/lbs/Providers/HereMapsUCLauncher"/>
-       </policy>
-
        <policy context="default">
-               <deny own="org.tizen.lbs.Providers.HereMapsUCLauncher"/>
-               <deny send_destination="org.tizen.lbs.Providers.HereMapsUCLauncher"/>
                <check send_destination="org.tizen.lbs.Providers.HereMapsUCLauncher"
                        privilege="http://tizen.org/privilege/mapservice"/>
        </policy>