Comment out Security-server API checking privileges of process 43/19243/2
authorjooseong.lee <jooseong.lee@samsung.com>
Wed, 9 Apr 2014 08:01:35 +0000 (17:01 +0900)
committerjooseong lee <jooseong.lee@samsung.com>
Wed, 9 Apr 2014 08:03:04 +0000 (01:03 -0700)
Below Security-server APIs can be return 'access deny" by 3-domain smack policy.
And it makes bootting and running issue.
So we should comment out them temporarily untill implement of Cynara.
- security_server_check_privilege_by_sockfd
- security_server_check_privilege_by_pid
- security_server_check_privilege_by_cookie

visit below site:
https://wiki.tizen.org/wiki/Security:Cynara

Change-Id: Idcf379a1cd6ee38c80d21b952cdf52b067813603
Signed-off-by: jooseong.lee <jooseong.lee@samsung.com>
src/server/client/client-cookie.cpp
src/server/client/client-privilege-by-pid.cpp
src/server/client/client-socket-privilege.cpp

index 90a461ab0fbf12f76934152b38cf907034cf8f1f..b2ca6ffd99960020878d0211fff6e6f8bc90448b 100644 (file)
@@ -209,6 +209,7 @@ int security_server_check_privilege(const char *cookie, gid_t privilege)
 SECURITY_SERVER_API
 int security_server_check_privilege_by_cookie(const char *cookie, const char *object, const char *access_rights)
 {
+#if 0
     using namespace SecurityServer;
     MessageBuffer send, recv;
     int retval = SECURITY_SERVER_API_ERROR_UNKNOWN;
@@ -242,6 +243,8 @@ int security_server_check_privilege_by_cookie(const char *cookie, const char *ob
         Deserialization::Deserialize(recv, retval);
         return retval;
     });
+#endif
+       return SECURITY_SERVER_API_SUCCESS;
 }
 
 SECURITY_SERVER_API
index 1d96f18f293a336b162e0ab3500b0f07e36f6108..4c1c10d37dc81e07479f0ce028cfdad6e5763fdd 100644 (file)
@@ -41,6 +41,7 @@ int security_server_check_privilege_by_pid(
         int pid,
         const char *object,
         const char *access_rights) {
+#if 0
     using namespace SecurityServer;
     return try_catch([&] {
         if (1 != smack_check())
@@ -78,5 +79,7 @@ int security_server_check_privilege_by_pid(
         Deserialization::Deserialize(recv, result);
         return result;
     });
+#endif
+       return SECURITY_SERVER_API_SUCCESS;
 }
 
index fded5e374e68c2b953df5e0edff846e3b1c89681..811178de840f984c7c4be2f58328888c6ead1736 100644 (file)
@@ -41,6 +41,7 @@ int security_server_check_privilege_by_sockfd(int sockfd,
                                               const char *object,
                                               const char *access_rights)
 {
+#if 0
     char *subject = NULL;
     int ret;
     std::string path;
@@ -82,6 +83,8 @@ int security_server_check_privilege_by_sockfd(int sockfd,
     }
 
     return security_server_check_privilege_by_pid(cr.pid, object, access_rights);
+#endif
+    return SECURITY_SERVER_API_SUCCESS;
 }
 
 SECURITY_SERVER_API