Modification about smack label of db file belong to process. 66/20566/2 tizen_3.0.m14.2_ivi accepted/tizen/common/20140610.155836 submit/tizen/20140528.142609 submit/tizen/20140529.072918 submit/tizen/20140602.113255 submit/tizen_common/20140521.163740 submit/tizen_common/20140522.130648 submit/tizen_common/20140522.135644 submit/tizen_ivi/20140618.000000 submit/tizen_ivi/20140618.000001 submit/tizen_ivi/20140619.000000 submit/tizen_ivi/20140622.000000 submit/tizen_ivi/20140623.000000 submit/tizen_ivi/20140624.064036 submit/tizen_ivi/20140626.125712 submit/tizen_ivi/20140626.130032 submit/tizen_ivi/20140626.144348 tizen_3.0.m14.2_ivi_release
authorjooseong.lee <jooseong.lee@samsung.com>
Fri, 9 May 2014 08:56:51 +0000 (17:56 +0900)
committerjooseong lee <jooseong.lee@samsung.com>
Fri, 9 May 2014 08:57:25 +0000 (01:57 -0700)
[Problem]
Most db files have 'floor' label.  Because these are created when binary is built.
No process can write db (since 'floor' label allows only read and execute)

[Solution]
Modify smack label based on below condition and three domain model
Condition1. Assign domain of process creates db files
Condition2. Assign domain of process uses db files.

Change-Id: Ie9febb019833c04b4f634cb2751dec3a6bc31bdb
Signed-off-by: jooseong.lee <jooseong.lee@samsung.com>
packaging/privacy-manager-server.manifest
packaging/privacy-manager.spec

index c00c25b..1672cef 100644 (file)
@@ -2,4 +2,7 @@
         <request>
                 <domain name="_" />
         </request>
+       <assign>
+               <filesystem path="/opt/dbspace/.privacylist.db*" label="User" />
+       </assign>
 </manifest>
index f963fbd..99057f6 100644 (file)
@@ -114,6 +114,7 @@ then
        echo "Create privacy DB"
        %{_bindir}/privacy_manager_create_clean_db.sh
 fi
+chsmack -a 'User' %{TZ_SYS_DB}/.privacy.db*
 
 %postun -p /sbin/ldconfig