platform/core/security/libprivilege-control.git
10 years agoRemove obsolete systemd smack-default-labeling.service 29/12829/1 accepted/tizen/ivi/stable accepted/tizen/mobile accepted/tizen/20131207.002841 accepted/tizen/20131209.171830 accepted/tizen/generic/20140313.075300 accepted/tizen/ivi/20140312.235634 accepted/tizen/ivi/panda/20140318.013902 submit/tizen/20131204.012119 submit/tizen/20140312.230127
Casey Schaufler [Fri, 22 Nov 2013 22:23:01 +0000 (14:23 -0800)]
Remove obsolete systemd smack-default-labeling.service

Smack rules are now set directly by systemd. This service
is no longer required.

Change-Id: I7e5b1852efbe1170b4deee8ba411b087c7272af0
Signed-off-by: Casey Schaufler <casey.schaufler@intel.com>
10 years agoFixed smack default label unit file ordering problem. 54/12654/1 accepted/tizen/20131126.000742 submit/tizen/20131125.192938
Ossama Othman [Thu, 21 Nov 2013 00:31:17 +0000 (16:31 -0800)]
Fixed smack default label unit file ordering problem.

Change-Id: Ie1ad6afbf8308706040dc65386ec580a82854b75
Signed-off-by: Ossama Othman <ossama.othman@intel.com>
10 years agoFix build break in osp-installer. 51/10951/1 accepted/tizen/20131015.161649 accepted/tizen/20131016.005148 accepted/tizen/20131112.015550 accepted/tizen_ivi_stable/20131116.111623 submit/tizen/20131015.141049 submit/tizen_ivi_stable/20131116.100915
Bartlomiej Grzelewski [Tue, 15 Oct 2013 12:19:42 +0000 (14:19 +0200)]
Fix build break in osp-installer.

Libprivilege-control did not contain definitions of
* perm_app_setup_path
* app_setup_path
functions.

Change-Id: Iea127337b88d1ba72dcf456828bcfd051d83b2bc
Signed-off-by: Bartlomiej Grzelewski <b.grzelewski@samsung.com>
10 years agoFix build break in osp-installer. 65/10665/3 accepted/tizen/20131011.045524 accepted/tizen/20131011.172343 accepted/tizen/20131011.204651 submit/tizen/20131011.043745
Bartlomiej Grzelewski [Tue, 8 Oct 2013 12:29:12 +0000 (14:29 +0200)]
Fix build break in osp-installer.

This commit adds mockups for functions required by osp-installer:
* perm_app_set_privilege
* perm_app_id_from_socket
* perm_app_install
* perm_app_uninstall
* perm_app_enable_permissions
* perm_app_disable_permissions
* perm_app_revoke_permissions
* perm_app_reset_permissions
* perm_app_setup_path
* app_setup_path
* perm_app_add_friend
* perm_add_api_feature

Change-Id: I1b9abf5f7c05379089741b288240ebc630326fe4
Signed-off-by: Bartlomiej Grzelewski <b.grzelewski@samsung.com>
10 years ago[systemd upgrade] merge from devel_systemd branch of RSA 62/7762/2 accepted/tizen/ivi/genivi accepted/tizen/ivi/release tizen_ivi_genivi tizen_ivi_release accepted/tizen/20130912.101811 accepted/tizen/20130912.102114 accepted/tizen/20130912.151148 accepted/tizen/20130912.191553 accepted/tizen/20130912.195615 accepted/tizen/ivi/genivi/20140131.041918 accepted/tizen_ivi_release/20131120.050402 ivi_oct_m2 submit/tizen/20130912.080020 submit/tizen/20130912.090328 submit/tizen_ivi_genivi/20140131.040637 submit/tizen_ivi_release/20131120.030011
Maciej Wereski [Wed, 22 May 2013 07:29:48 +0000 (09:29 +0200)]
[systemd upgrade] merge from devel_systemd branch of RSA
Remove passwd and group files from conf package

These files are moved to setup package.

Conflicts:
packaging/libprivilege-control.changes
packaging/libprivilege-control.spec

Change-Id: Ief4c08f186010486deeaa37e61c357e64385a1f0
Signed-off-by: Maciej Wereski <m.wereski@partner.samsung.com>
10 years agoCall setguid function with the APP group ID retreives from /etc/group through getgrou... 92/5892/4 accepted/tizen/20130730.200453 submit/tizen/20130730.080821
Baptiste DURAND [Tue, 23 Jul 2013 17:37:21 +0000 (19:37 +0200)]
Call setguid function with the APP group ID retreives from /etc/group through getgrouplists function call.

10 years agoBefore applied a label on the process context, check if the label is previously set. 55/5655/1 accepted/tizen/20130711.205247 submit/tizen/20130711.193443
Baptiste DURAND [Wed, 10 Jul 2013 14:08:32 +0000 (16:08 +0200)]
Before applied a label on the process context, check if the label is previously set.

Wrt-installer could be compiled with SMACK OPTION to off.
In consequences, the smack label on the binary symbol link is not set.

So we can't applied this label in this case.
It better to use set_smack_from_binary instead of set_smack_for_wrt

Fix for TIVI-1119 & TZ-3514

Change-Id: Ie69136b3de04d79e6f6ac8bbc3be3f19e06fd808

10 years agocleanup spec 49/5649/1
Anas Nashif [Thu, 11 Jul 2013 17:18:44 +0000 (13:18 -0400)]
cleanup spec

- remove init.d scripts
- remove passwd, group file and do not install them, we use the setup
  package for those
- meta-data cleanup

Signed-off-by: Anas Nashif <anas.nashif@intel.com>
10 years agoFix build breakage caused by last manifest 'fix' 11/5611/1 accepted/tizen/20130711.163636 submit/tizen/20130711.003907
Rusty Lynch [Thu, 11 Jul 2013 00:24:48 +0000 (17:24 -0700)]
Fix build breakage caused by last manifest 'fix'

Change-Id: I03c2e3cb05a93719c71cd38dd656b22b92caaf45

10 years agodeleted old manifest. fix spec file. clean smack labeling 00/5600/1 accepted/tizen/20130710.213935 submit/tizen/20130710.124530
Alexandru Cornea [Wed, 10 Jul 2013 09:42:34 +0000 (12:42 +0300)]
deleted old manifest. fix spec file. clean smack labeling

10 years agoresetting manifest requested domain to floor 90/4490/2
Alexandru Cornea [Fri, 28 Jun 2013 14:06:03 +0000 (17:06 +0300)]
resetting manifest requested domain to floor

10 years agoresetting manifest requested domain to floor 40/5140/2
Alexandru Cornea [Mon, 1 Jul 2013 13:38:57 +0000 (16:38 +0300)]
resetting manifest requested domain to floor

10 years agoremoving chsmack 45/5445/1
Alexandru Cornea [Wed, 3 Jul 2013 09:26:16 +0000 (12:26 +0300)]
removing chsmack

10 years agoAdjusting Rules for boolmark tizen_2.1 accepted/tizen/20130520.101224 submit/tizen/20130517.045137 submit/tizen_2.1/20130516.045506
Bumjin Im [Wed, 15 May 2013 10:30:10 +0000 (19:30 +0900)]
Adjusting Rules for boolmark

10 years agoadd smack rules for sdcard
Kidong Kim [Wed, 15 May 2013 07:26:57 +0000 (16:26 +0900)]
add smack rules for sdcard

10 years agoadd smack rules for osp/web app submit/tizen_2.1/20130515.030959
Kidong Kim [Tue, 14 May 2013 08:58:30 +0000 (17:58 +0900)]
add smack rules for osp/web app

10 years agoMerge "Update .smack files 2" into tizen_2.1
Bumjin Im [Tue, 14 May 2013 06:03:52 +0000 (15:03 +0900)]
Merge "Update .smack files 2" into tizen_2.1

10 years agoUpdate .smack files 2
jinha.hwang [Tue, 14 May 2013 05:54:44 +0000 (14:54 +0900)]
Update .smack files 2

10 years agoadd new rules for system::share
Kidong Kim [Tue, 14 May 2013 05:08:26 +0000 (14:08 +0900)]
add new rules for system::share

10 years ago[Release] libprivilege-control_0.0.26.TIZEN
Krzysztof Jackiewicz [Mon, 13 May 2013 17:06:30 +0000 (19:06 +0200)]
[Release] libprivilege-control_0.0.26.TIZEN

* Added rules for OSP/WRT apps for app_give_access API usage in security-server

Change-Id: Ia529d15219f89d53f27c504b9715207acf1f8ab0

10 years agoAdded rules for OSP/WRT apps for app_give_access API usage in security-server
Tomasz Swierczek [Mon, 13 May 2013 16:25:07 +0000 (18:25 +0200)]
Added rules for OSP/WRT apps for app_give_access API usage in security-server

[Issue#]        TDIS-5744
[Bug/Feature]   Missing SMACK rules for runtime check for access to API.
[Cause]         N/A
[Solution]      Added rules - temporarily to OSP.smack and WRT.smack
[Verification]  use app_enable_permissions() - rule file should contain rule for security-server::api-data-share

Change-Id: Iefc140b1a93e5eec5507e466ea2db11641cff222

10 years agoadd new label and rules - system::share submit/tizen_2.1/20130514.053038
Kidong Kim [Mon, 13 May 2013 14:25:55 +0000 (23:25 +0900)]
add new label and rules - system::share

10 years agoAdding x rules for osp-*-services
Bumjin Im [Mon, 13 May 2013 06:55:05 +0000 (15:55 +0900)]
Adding x rules for osp-*-services

10 years agoAdjusting overwrapped Rule
Bumjin Im [Mon, 13 May 2013 00:57:31 +0000 (09:57 +0900)]
Adjusting overwrapped Rule

10 years agoRemoving Label for so files
Bumjin Im [Sun, 12 May 2013 07:39:57 +0000 (16:39 +0900)]
Removing Label for so files

10 years agoModifying Smack rules for Apps
Bumjin Im [Sun, 12 May 2013 05:18:30 +0000 (14:18 +0900)]
Modifying Smack rules for Apps

10 years agoModifying Smack rules for Apps
Bumjin Im [Sun, 12 May 2013 04:22:29 +0000 (13:22 +0900)]
Modifying Smack rules for Apps

10 years agoModifying Smack rules for Apps
Bumjin Im [Sun, 12 May 2013 03:58:22 +0000 (12:58 +0900)]
Modifying Smack rules for Apps

10 years agoModifying Smack rules for Apps
Bumjin Im [Sun, 12 May 2013 03:52:58 +0000 (12:52 +0900)]
Modifying Smack rules for Apps

10 years agoUpdate .smack files
jinha.hwang [Sat, 11 May 2013 14:24:20 +0000 (23:24 +0900)]
Update .smack files

10 years agoadd default rules
Kidong Kim [Sat, 11 May 2013 10:59:46 +0000 (19:59 +0900)]
add default rules

10 years agomerge back from tizen_2.1_smack
Kidong Kim [Fri, 10 May 2013 08:48:16 +0000 (17:48 +0900)]
merge back from tizen_2.1_smack

11 years agoadd new smack labels for vconf and support IPv6
Kidong Kim [Thu, 2 May 2013 08:59:26 +0000 (17:59 +0900)]
add new smack labels for vconf and support IPv6

11 years agoadd new smack rules for tizenprv00.privacy-popup 2.1b_release accepted/tizen_2.1/20130425.033002 submit/tizen_2.1/20130424.232930
Kidong Kim [Mon, 22 Apr 2013 10:04:32 +0000 (19:04 +0900)]
add new smack rules for tizenprv00.privacy-popup

11 years agoadd smack rules for oma-ds-agent::cfg
Kidong Kim [Tue, 16 Apr 2013 05:04:11 +0000 (14:04 +0900)]
add smack rules for oma-ds-agent::cfg

11 years agoadding missing rules
Bumjin Im [Sun, 14 Apr 2013 07:08:13 +0000 (16:08 +0900)]
adding missing rules

11 years agoadd smack rules for wifi and osp
Kidong Kim [Fri, 12 Apr 2013 01:11:57 +0000 (10:11 +0900)]
add smack rules for wifi and osp

11 years agoMerge "Fix for 64 bit compatibility." into tizen_2.1
Junfeng Dong [Thu, 11 Apr 2013 05:48:46 +0000 (14:48 +0900)]
Merge "Fix for 64 bit compatibility." into tizen_2.1

11 years agoadd smack rules for privacy-manager
Kidong Kim [Tue, 9 Apr 2013 08:56:54 +0000 (17:56 +0900)]
add smack rules for privacy-manager

11 years agoadd new rules and remove vconf labels
Kidong Kim [Mon, 8 Apr 2013 11:46:53 +0000 (20:46 +0900)]
add new rules and remove vconf labels

11 years agoadd new smack labels
Kidong Kim [Mon, 8 Apr 2013 09:07:35 +0000 (18:07 +0900)]
add new smack labels

11 years agoFix for 64 bit compatibility.
Junfeng Dong [Mon, 25 Mar 2013 13:01:33 +0000 (21:01 +0800)]
Fix for 64 bit compatibility.

- Fix hardcoding path.
- Use %cmake to set default paths.
- Fix type casting between pointer and int.

Change-Id: I2d1d42843ffd71281b17bf9f88e1ddea52bc8623

11 years agoadd smack rules regarding secure-storage
Kidong Kim [Fri, 5 Apr 2013 02:38:47 +0000 (11:38 +0900)]
add smack rules regarding secure-storage

11 years agoadd smack rules regarding data-provider-master
Kidong Kim [Thu, 4 Apr 2013 08:28:46 +0000 (17:28 +0900)]
add smack rules regarding data-provider-master

11 years agoadd missing smack rules
Kidong Kim [Wed, 3 Apr 2013 05:16:53 +0000 (14:16 +0900)]
add missing smack rules

11 years agoadd new rules for bt-service
Kidong Kim [Mon, 1 Apr 2013 04:54:47 +0000 (13:54 +0900)]
add new rules for bt-service

11 years agoMerge "[Release] libprivilege-control_0.0.25.TIZEN" into tizen_2.1
Tomasz Swierczek [Wed, 27 Mar 2013 10:11:26 +0000 (19:11 +0900)]
Merge "[Release] libprivilege-control_0.0.25.TIZEN" into tizen_2.1

11 years ago[Release] libprivilege-control_0.0.25.TIZEN
Krzysztof Jackiewicz [Wed, 27 Mar 2013 09:55:13 +0000 (10:55 +0100)]
[Release] libprivilege-control_0.0.25.TIZEN

* New API functions added
* Bugfixes

Change-Id: Id2a8cee05a210a2910b80ff8f084c9c8d5709bd9

11 years agointegrate default smack rules
Kidong Kim [Wed, 27 Mar 2013 05:12:49 +0000 (14:12 +0900)]
integrate default smack rules

11 years agoAdded proper #ifdef SMACK_ENABLED to new APIs static functions.
Tomasz Swierczek [Tue, 26 Mar 2013 15:31:58 +0000 (16:31 +0100)]
Added proper #ifdef SMACK_ENABLED to new APIs static functions.

[Issue#] SSDWSSP-156
[Bug]    Build break caused by missing #ifdefs
[Cause]  Code cherrypicked from private repository
[Solution] Added missing lines with #ifdefs
[Verification] Proper build with and without #ifdefs in spec file

Change-Id: I7bedc6a41bfb6911515701da1c849fbda9dab4d8

11 years agoImplicitly include base permission in app_enable_permissions().
Rafal Krypa [Tue, 26 Mar 2013 11:06:06 +0000 (12:06 +0100)]
Implicitly include base permission in app_enable_permissions().

[Issue#]       N/A
[Feature]      When adding list of permissions, also add an internal permission related to app type.
[Cause]        New semantics for permission names is incompatible with passing this from caller.
[Solution]     N/A
[Verification] Build only.

Change-Id: I254c2be16de6ec4c9a977e6d95da9f49e5e658e9

11 years agoAdded stub for add_shared_dir_readers function.
Tomasz Swierczek [Tue, 26 Mar 2013 08:30:06 +0000 (09:30 +0100)]
Added stub for add_shared_dir_readers function.

Change-Id: If6b657f841da48ffa3bd5b81f90d9c78b8f14c4c

11 years agoDon't fail when trying to enable app permissions that doesn't exist.
Rafal Krypa [Mon, 25 Mar 2013 19:38:16 +0000 (20:38 +0100)]
Don't fail when trying to enable app permissions that doesn't exist.

[Issue#]       N/A
[Feature]      Ability to function with missing Smack permission configs.
[Cause]        Not all API features are know at the moment.
[Solution]     Gently return on missing permission name.
[Verification] Build only.

Change-Id: Icdb3393a65abc820e953df646b8fb4927b4cfa49

11 years agoAdd new API function app_enable_permissions() to replace app_add_permissions() and...
Rafal Krypa [Mon, 25 Mar 2013 19:35:45 +0000 (20:35 +0100)]
Add new API function app_enable_permissions() to replace app_add_permissions() and app_add_volatile_permissions().

New function replaces the two old functions and accepts one additional argument:
application type. Permission names are now accepted in new form, compatinble
with Tizen API feature names, like "http://tizen.org/privilege/alarm".

[Issue#]       SSDWSSP-148
[Feature]      Enable passing names of application permissions in format used in specification.
[Cause]        A list of public API features with exact names was provided.
[Solution]     Implement parsing API feature names like "http://tizen.org/privilege/alarm".
[Verification] Build only.

Change-Id: Ief7b2e95950ba9fcb2890385d88a14b6843182f5

11 years agoAdd new API functions app_install() and app_uninstall().
Rafal Krypa [Mon, 25 Mar 2013 19:12:14 +0000 (20:12 +0100)]
Add new API functions app_install() and app_uninstall().

The first function must be called by installer before any other call to app_*
functions for the app. It will create empty Smack config file for the app.
It will fail if the file was already there (conflicting app_ids).
Other functions operating on Smack rules for the application will fail if
this file is not present.
The latter function removes the file, supposed to be the last call to
libprivilege-control from uninstaller.
For temporary compatibility old permissive behaviour of app_add_permissions() is
retained.

[Issue#]       N/A
[Feature]      N/A
[Cause]        N/A
[Solution]     N/A
[Verification] Build, install, reboot target.

Change-Id: I371c38b88a0c14a17eade5526e8fa1276a482f85

11 years agoNew API function app_add_friend(app_id1, app_id2).
Rafal Krypa [Fri, 22 Mar 2013 18:37:04 +0000 (19:37 +0100)]
New API function app_add_friend(app_id1, app_id2).

Function grants full Smack rule between the two applications.

[Issue#]       SSDWSSP-123
[Feature]      Provide API for hybrid applications.
[Cause]        There are groups of applications that need full access to each other.
[Solution]     Provide API for granting appropriate Smack rules.
[Verification] Build only (no tests nor API usage at the moment).

Change-Id: Iaa6b483246bcf0ecdb2f53e788b5f72b05b43645

11 years agoRework Smack-less mode.
Rafal Krypa [Fri, 1 Mar 2013 18:10:42 +0000 (19:10 +0100)]
Rework Smack-less mode.

[Issue#]       N/A
[Feature]      Only turn off parts that really require Smack support when it's not available.
[Cause]        Previous implementation was written very quickly.
[Solution]     Revise checking for Smack support and turning off parts of the functions.
[Verification] Build, install and run on Smack-less system.

Change-Id: I0f857c1a1d9cafd5523aea1280e7c1309b641aa3

11 years agoCosmetic: fix space indentation.
Rafal Krypa [Wed, 20 Feb 2013 12:17:31 +0000 (13:17 +0100)]
Cosmetic: fix space indentation.

[Issue#]       N/A
[Bug]          Inconsisten code style.
[Cause]        Different developers.
[Solution]     Unify indentation.
[Verification] Build.

Change-Id: Ia04825c77ec1a632169a910cf2adef5c222a9c59

11 years agoEnable libprivilege-control for target without smack module in kernel.
Bartlomiej Grzelewski [Fri, 15 Feb 2013 13:53:59 +0000 (14:53 +0100)]
Enable libprivilege-control for target without smack module in kernel.

[Issue#]       N/A
[Feature]      N/A
[Cause]        N/A
[Solution]     Added check if smack is supported in kernel.
[Verification] Compile, install, reboot target

Change-Id: I28bbcbe162e32a55c72c24a12c782ed269183cd8

11 years agoTemporary fix for web app launching.
Tomasz Swierczek [Fri, 15 Feb 2013 11:47:47 +0000 (12:47 +0100)]
Temporary fix for web app launching.

[Issue#]       N/A
[Feature]      N/A
[Cause]        N/A
[Solution]     Commented reset_permissions() and changed web app label to shorter
[Verification] Compile, install, reboot target

Change-Id: I77e4af57eb9050d1acf2eab24b8ccc1b145887ac

11 years agoModifying system::video --> device::video
Bumjin Im [Mon, 25 Mar 2013 07:29:55 +0000 (16:29 +0900)]
Modifying system::video --> device::video

11 years agoFix for compatibility of GCC 4.7.
Junfeng [Wed, 20 Mar 2013 03:03:46 +0000 (11:03 +0800)]
Fix for compatibility of GCC 4.7.

Change-Id: If923d10339e088cc1addb7d21e68097a94d6f715

11 years agoChange for booting fail on systemd
Ki-wook [Tue, 19 Mar 2013 15:57:27 +0000 (00:57 +0900)]
Change for booting fail on systemd

Signed-off-by: Ki-wook <kiwook.hong@samsung.com>
11 years agoadding missing rules due to Smack labels of osp-*-service
Bumjin Im [Mon, 18 Mar 2013 10:33:22 +0000 (19:33 +0900)]
adding missing rules due to Smack labels of osp-*-service

11 years agoModifying rules for changed osp-*-service labels
Bumjin Im [Mon, 18 Mar 2013 09:34:07 +0000 (18:34 +0900)]
Modifying rules for changed osp-*-service labels

11 years agomerge with master
Jinkun Jang [Fri, 15 Mar 2013 16:17:55 +0000 (01:17 +0900)]
merge with master

11 years agoModifying device node labels
Bumjin Im [Thu, 14 Mar 2013 01:26:28 +0000 (10:26 +0900)]
Modifying device node labels

11 years agoTizen 2.1 base
Jinkun Jang [Tue, 12 Mar 2013 16:51:32 +0000 (01:51 +0900)]
Tizen 2.1 base

11 years agoremove udev rules file
Kidong Kim [Mon, 11 Mar 2013 08:46:14 +0000 (17:46 +0900)]
remove udev rules file

11 years agoAdding missing rule for crash popup
Bumjin Im [Fri, 8 Mar 2013 08:38:21 +0000 (17:38 +0900)]
Adding missing rule for crash popup

11 years agoAdding missing rules
Bumjin Im [Mon, 4 Mar 2013 04:09:22 +0000 (13:09 +0900)]
Adding missing rules

11 years agoRevising running Smack default rules for all combinations
Bumjin Im [Sun, 3 Mar 2013 23:40:36 +0000 (08:40 +0900)]
Revising running Smack default rules for all combinations

11 years agoapply smack default rules
Kidong Kim [Thu, 28 Feb 2013 06:35:46 +0000 (15:35 +0900)]
apply smack default rules

11 years agoapply smack default rule
Kidong Kim [Tue, 26 Feb 2013 07:47:27 +0000 (16:47 +0900)]
apply smack default rule

11 years agoadd new rules
Kidong Kim [Tue, 26 Feb 2013 00:55:12 +0000 (09:55 +0900)]
add new rules

11 years agoDisable libprivilege-control logs for performance increase
Tomasz Swierczek [Tue, 19 Feb 2013 08:46:55 +0000 (09:46 +0100)]
Disable libprivilege-control logs for performance increase

[Issue#]       N/A
[Bug]          Logs degrading performance.
[Cause]        Too much logs in dlog.
[Solution]     commented line in CMakeLists.txt.
[Verification] Compile, install, reboot target - no libprivilege logs in dlog.

Change-Id: I38cd536df1e2a97bab89e526dc82ea80bf53587d

11 years ago[Release] libprivilege-control_0.0.24.TIZEN
Tomasz Swierczek [Thu, 14 Feb 2013 09:00:11 +0000 (10:00 +0100)]
[Release] libprivilege-control_0.0.24.TIZEN

* Refactoring: adjust names of some internal identifiers.
* Refactoring: removed compilation warnings when SMACK is disabled.
* Disabled SMACK operation for tizendev.org.
* Remove prefix from process labels of WRT applications.
* Provide app_reset_permissions() API function.
* Provide app_add_volatile_permissions() API function.
* Rewrite internal function set_smack_for_wrt().
* Recreate Smack configuration files for WRT devcaps.
* Remove legacy code for WRT, enable new WRT functionality.

Change-Id: Ibc6584f5b2a6ed7d5fa85f555e7ca5bee05c4056

11 years agoDisabled SMACK on tizendev.org (removed usage)
Tomasz Swierczek [Thu, 14 Feb 2013 08:57:09 +0000 (09:57 +0100)]
Disabled SMACK on tizendev.org (removed usage)

[Issue#]       N/A
[Feature]      N/A
[Cause]        SMACK is disabled on tizendev.org - libprivilege-control API needs to return success temporarily
[Solution]     Comment SMACK_ENABLED #ifdef in CMakeLists.txt
[Verification] Build, install, reboot target device

Change-Id: Icfbc38aedfffbd1b386fe62b86cf820735d06090

11 years agoRemoved compilation warnings when SMACK is disabled.
Tomasz Swierczek [Thu, 14 Feb 2013 08:06:59 +0000 (09:06 +0100)]
Removed compilation warnings when SMACK is disabled.

[Issue#]       N/A
[Feature]      N/A
[Cause]        N/A
[Solution]     #ifdef SMACK operations when SMACK_ENABLED is not set
[Verification] Build, install, reboot target device

Change-Id: I777422f68ea3e950dc451514b78f0287e1703c3c

11 years agoRemove legacy code for WRT, enable new WRT functionality.
Rafal Krypa [Wed, 13 Feb 2013 15:12:06 +0000 (16:12 +0100)]
Remove legacy code for WRT, enable new WRT functionality.

[Issue#]       SSDWSSP-95
[Feature]      Remove old APIs designed for WRT, enable the new one.
[Cause]        New API is available and the old one was never used.
[Solution]     N/A
[Verification] Build, install, run tests from security-tests package.

Change-Id: I7e010f68832c9a79a3690de34354bc29176e7ba6

11 years agoRecreate Smack configuration files for WRT devcaps.
Rafal Krypa [Wed, 13 Feb 2013 15:10:09 +0000 (16:10 +0100)]
Recreate Smack configuration files for WRT devcaps.

[Issue#]       SSDWSSP-95
[Feature]      Provide empty Smack file for each WRT devcap.
[Cause]        Unification of API for WRT apps.
[Solution]     N/A
[Verification] Build, install, run tests from security-tests package.

Change-Id: I3253e22e4de7a1f01001c89d50348fbdf1403075

11 years agoRewrite internal function set_smack_for_wrt().
Rafal Krypa [Wed, 13 Feb 2013 15:03:47 +0000 (16:03 +0100)]
Rewrite internal function set_smack_for_wrt().

[Issue#]       SSDWSSP-95
[Feature]      Rewrite Smack setting for WRT process according to new requirements.
[Cause]        Unification of API for WRT apps.
[Solution]     N/A
[Verification] Build, install, run tests from security-tests package.

Change-Id: I995f78c12c10966208509754f736358b6a01702c

11 years agoProvide app_add_volatile_permissions() API function.
Rafal Krypa [Wed, 13 Feb 2013 14:42:18 +0000 (15:42 +0100)]
Provide app_add_volatile_permissions() API function.

[Issue#]       SSDWSSP-95
[Feature]      Function for granting one-time Smack rules for an application.
[Cause]        Unification of API for WRT apps.
[Solution]     N/A
[Verification] Build, install, run tests from security-tests package.

Change-Id: I92f168b4f007adc0ac1b92437dacff911a1a262d

11 years agoProvide app_reset_permissions() API function.
Rafal Krypa [Tue, 12 Feb 2013 14:39:27 +0000 (15:39 +0100)]
Provide app_reset_permissions() API function.

[Issue#]       SSDWSSP-95
[Feature]      Function for re-reading Smack rules for an application from disk.
[Cause]        Unification of API for WRT apps.
[Solution]     N/A
[Verification] Build, install, run tests from security-tests package.

Change-Id: I5c9e5816edb19d1038ff9505845a90a2c272969e

11 years agoRemove prefix from process labels of WRT applications.
Rafal Krypa [Tue, 12 Feb 2013 13:59:14 +0000 (14:59 +0100)]
Remove prefix from process labels of WRT applications.

[Issue#]       N/A
[Feature]      Unify Smack labeling of WRT applications.
[Cause]        Unification of WRT and non-WRT APIs.
[Solution]     N/A
[Verification] Build, install, run tests.

Change-Id: I2f96cada573fb4349b76faf88f8d7ff68630c825

11 years agoRefactoring: adjust names of some internal identifiers.
Rafal Krypa [Mon, 11 Feb 2013 17:38:25 +0000 (18:38 +0100)]
Refactoring: adjust names of some internal identifiers.

[Issue#]       N/A
[Feature]      Unify internal naming convention.
[Cause]        Refactoring
[Solution]     N/A
[Verification] Build

Change-Id: Idb0ba56c36c0f65b7604eb6e45c2701defab2d7c

11 years ago[Release] libprivilege-control_0.0.23.TIZEN
Tomasz Swierczek [Wed, 6 Feb 2013 14:05:48 +0000 (15:05 +0100)]
[Release] libprivilege-control_0.0.23.TIZEN

* Fixing bug in setting execute label for executable files.
* Correct bug in dir_set_smack_r() introduced by previous fix.
* Fix implementation of setting process label from Smack exec label.
* Remove white spaces at the end of lines of smack_default_rules file

Change-Id: I4b1201ad3283e801773839291a0e902922eafe48

11 years agoFix implementation of setting process label from Smack exec label.
Rafal Krypa [Tue, 5 Feb 2013 16:10:21 +0000 (17:10 +0100)]
Fix implementation of setting process label from Smack exec label.

[Issue#]       SSDWSSP-80
[Bug]          set_smack_from_binary() gets label from symlink, not its target.
[Cause]        Used function for getting label doesn't follow symlinks.
[Solution]     Change the function to the symlink-following one.
[Verification] Build, install, run latest tests from security-tests package.

Change-Id: Ibc67d8f91621ad0ab05c1690d87604acdc78c995

11 years agoCorrect bug introduced by patch 8ee07d7.
Rafal Krypa [Tue, 5 Feb 2013 14:13:56 +0000 (15:13 +0100)]
Correct bug introduced by patch 8ee07d7.

[Issue#]       SSDWSSP-70
[Bug]          Internal function dir_set_smack_r() ignores type mask argument.
[Cause]        Lack of curly brackets after if.
[Solution]     Fix the typo in code.
[Verification] Build, install, run latest tests from security-tests package.

Change-Id: Ibed39f9f103231c904d90299eadfaf93c0524b63

11 years agoFixing bug in setting execute label for executable files
Zofia Abramowska [Tue, 5 Feb 2013 10:35:16 +0000 (11:35 +0100)]
Fixing bug in setting execute label for executable files

[Issue#] SSDWSSP-70
[Bug] Execute labels was set for all files (not only executable)
[Cause] Bad flags and logic for given API
[Solution] Changed stat flags and now execute label is set for
everything with execute permissions and then removed from directories
[Verification] Successful build

Change-Id: Ic812c4872190d0faa2d1175edb98389d79b83b61

11 years agosmack_default_rules: remove white spaces at the end of lines
Rafal Krypa [Mon, 4 Feb 2013 11:35:28 +0000 (12:35 +0100)]
smack_default_rules: remove white spaces at the end of lines

This cosmetic change is intended to align the file between RSA and private
repositories, making the diff minimal.
No functional changes introduced.

Change-Id: I78c911068bfe8254fa1040898ddfbe717a6f911c

11 years ago[Release] libprivilege-control_0.0.22.TIZEN
Tomasz Swierczek [Tue, 5 Feb 2013 08:26:44 +0000 (09:26 +0100)]
[Release] libprivilege-control_0.0.22.TIZEN

* Added new API for setting access/execute labels and transmute on OSP apps directories
* Fixed dlog usage
* Reverted "make symbolic link of udev rules file" (commit c3a7c9d1188f08fdc950858c589173bb5bb0c817)

Change-Id: I4dd69f4b637207ed635d0c13332d7f0d5540b681

11 years agoCorrect debug in dir_set_smack_r().
Rafal Krypa [Mon, 4 Feb 2013 18:40:28 +0000 (19:40 +0100)]
Correct debug in dir_set_smack_r().

[Issue#]       N/A
[Bug]          Debug log about setting Smack label on file is printed even for files don't matching the mask.
[Cause]        Debug log misplaced.
[Solution]     Move the log inside if block, checking whether file should be labeled.
[Verification] Build.

Change-Id: I1d83ca6986be8e4a47818e69738a66deda1b9b74

11 years agoFix segfault in DLOG in dir_set_smack_r function.
Janusz Kozerski [Mon, 4 Feb 2013 15:36:29 +0000 (16:36 +0100)]
Fix segfault in DLOG in dir_set_smack_r function.

[Issue#]       N/A
[Bug]          Segfult in dir_set_smack_r function.
[Cause]        Wrong DLOG agrument - printing enum like a string.
[Solution]     Fix print format.
[Verification] Build libprivilege with WRT_SMACK_ENABLE and run libprivilege-control tests.

Change-Id: I7be2f912537a4585afdcf9cc088eea340dfb0c74

11 years agoChanges for label settings on directories API
Zofia Abramowska [Mon, 4 Feb 2013 15:13:57 +0000 (16:13 +0100)]
Changes for label settings on directories API

[Issue#] SSDWSSP-70
[Feature] New API for setting label on application directory and
application shared directory
[Cause] N/A
[Solution] N/A
[Verification] Successful build

Change-Id: I9b0d739ee2a4fa636a226f1ef81cd29d06cd6502

11 years agoRevert "make symbolic link of udev rules file"
Rafal Krypa [Fri, 1 Feb 2013 17:52:45 +0000 (18:52 +0100)]
Revert "make symbolic link of udev rules file"

This reverts commit c3a7c9d1188f08fdc950858c589173bb5bb0c817.

The reverted commit was a workaround for pre-v182 udev. Since udev has
been upgraded already, the workaround is no longer needed.

Change-Id: Ife6a922f0daa1ec851221151c9b1c814d63a25d0

11 years ago[Release] libprivilege-control_0.0.21.TIZEN
Rafal Krypa [Fri, 1 Feb 2013 16:24:50 +0000 (17:24 +0100)]
[Release] libprivilege-control_0.0.21.TIZEN

* add new label and change label - system::core -> sys-assert::core
* Adding new API for setting label and transmute on directory

Change-Id: Ic20d398f2f0b57654d5f0245d1c38e256e98d921

11 years agoAdding new API for setting label and transmute on directory
Zofia Abramowska [Fri, 1 Feb 2013 11:15:59 +0000 (12:15 +0100)]
Adding new API for setting label and transmute on directory

[Issue#] SSDWSSP-67
[Feature] New API for setting label and transmute on directory
[Cause] N/A
[Solution] N/A
[Verification] Successful build

Change-Id: I81e7b0cbbbc5ec857c7dc4be450691dc8d7994b5

11 years agoadd new label and change label - system::core -> sys-assert::core
Kidong Kim [Fri, 1 Feb 2013 00:38:19 +0000 (09:38 +0900)]
add new label and change label - system::core -> sys-assert::core

11 years ago[Release] libprivilege-control_0.0.20.TIZEN
Rafal Krypa [Wed, 30 Jan 2013 16:16:41 +0000 (17:16 +0100)]
[Release] libprivilege-control_0.0.20.TIZEN

* Prevent related bugfixes.
* add new default smack rule.
* add new group for crash-logger.
* add new smack label - system::crash.
* Bug fix in adding permissions.
* Implement logging in libprivilege-control.
* Fix parsing of Smack config files.
* Remove some unnecessary code from wrt_set_src_dir() and wrt_set_data_dir().

Change-Id: I70cd2ba8ab5ac876be726aac4902939efc250a61