Add internet & appdebugging privilege labels & their policy 65/240565/2 accepted/tizen_6.0_unified accepted/tizen_6.0_unified_hotfix accepted/tizen_6.5_base accepted/tizen_unified tizen_6.0 tizen_6.0_hotfix tizen_6.5_base accepted/tizen/6.0/unified/20201030.114845 accepted/tizen/6.0/unified/hotfix/20201103.004345 accepted/tizen/6.5/base/20211028.055200 accepted/tizen/base/20210823.065438 accepted/tizen/unified/20200916.121706 submit/tizen/20200915.110745 submit/tizen_6.0/20201029.205104 submit/tizen_6.0_hotfix/20201102.192504 submit/tizen_6.0_hotfix/20201103.114804 submit/tizen_6.5_base/20211028.133901 submit/tizen_base/20210823.195720 tizen_6.0.m2_release tizen_6.5.m2_release
authorTomasz Swierczek <t.swierczek@samsung.com>
Fri, 7 Aug 2020 12:48:53 +0000 (14:48 +0200)
committerTomasz Swierczek <t.swierczek@samsung.com>
Fri, 7 Aug 2020 13:08:29 +0000 (15:08 +0200)
Replacing nether with Smack-based network control requires
new labels that will be associated with network.

Added also policy for system daemons.

Change-Id: Ib06ff1bed4daede5e8aeefbcf8ac9e284b5193c3

packaging/default-ac-domains.manifest

index 1afa633cac492ae4862c8e3e85bbcd4d721eb469..ea0182792c6f5c5d613f92fdc4d2180f7f49846b 100644 (file)
       <smack permit="_" to="System::Run" type="rwxat"/>
     </permit>
   </define>
+  <define>
+    <domain name="System::Privilege::Internet" policy="shared"/>
+    <request>
+      <smack request="User" type="w"/>
+      <smack request="User::Shell" type="w"/>
+      <smack request="System" type="w"/>
+      <smack request="System::Privileged" type="w"/>
+      <smack request="System::TEF" type="w"/>
+      <smack request="_" type="w"/>
+    </request>
+    <permit>
+      <smack permit="User" type="w"/>
+      <smack permit="User::Shell" type="w"/>
+      <smack permit="System" type="w"/>
+      <smack permit="System::Privileged" type="w"/>
+      <smack permit="System::TEF" type="w"/>
+      <smack permit="_" type="w"/>
+    </permit>
+  </define>
+    <define>
+    <domain name="System::Privilege::AppDebugging" policy="shared"/>
+    <request>
+      <smack request="User" type="w"/>
+      <smack request="User::Shell" type="w"/>
+      <smack request="System" type="w"/>
+      <smack request="System::Privileged" type="w"/>
+      <smack request="System::TEF" type="w"/>
+      <smack request="_" type="w"/>
+    </request>
+    <permit>
+      <smack permit="User" type="w"/>
+      <smack permit="User::Shell" type="w"/>
+      <smack permit="System" type="w"/>
+      <smack permit="System::Privileged" type="w"/>
+      <smack permit="System::TEF" type="w"/>
+      <smack permit="_" type="w"/>
+    </permit>
+  </define>
   <define>
     <domain name="System::Privileged" policy="shared"/>
     <request>