diff options
author | Havoc Pennington <hp@redhat.com> | 2003-03-21 02:38:40 +0000 |
---|---|---|
committer | Havoc Pennington <hp@redhat.com> | 2003-03-21 02:38:40 +0000 |
commit | b6ffea177fccb6cc4e65992da7d8b390054277f7 (patch) | |
tree | 5194ad93d495c110c88b7730f05b9265dd6ce73d /doc | |
parent | 056d76d809dc341b0dce160d3f79062604565c77 (diff) | |
download | dbus-b6ffea177fccb6cc4e65992da7d8b390054277f7.tar.gz |
2003-03-20 Havoc Pennington <hp@redhat.com>
* dbus/dbus-connection.c (dbus_connection_set_unix_user_function):
new function
(dbus_connection_get_unix_user): new function
Diffstat (limited to 'doc')
-rw-r--r-- | doc/config-file.txt | 28 |
1 files changed, 20 insertions, 8 deletions
diff --git a/doc/config-file.txt b/doc/config-file.txt index c10cd7ad..ae581924 100644 --- a/doc/config-file.txt +++ b/doc/config-file.txt @@ -94,6 +94,8 @@ Elements: own="servicename" send_to="servicename" receive_from="servicename" + user="username" + group="groupname" Examples: <deny send="org.freedesktop.System.Reboot"/> @@ -101,6 +103,8 @@ Elements: <deny own="org.freedesktop.System"/> <deny send_to="org.freedesktop.System"/> <deny receive_from="org.freedesktop.System"/> + <deny user="john"/> + <deny group="enemies"/> send_to and receive_from mean that messages may not be sent to or received from the *owner* of the given service, not that @@ -108,24 +112,32 @@ Elements: a connection owns services A, B, C, and sending to A is denied, sending to B or C will not work either. - For "servicename" or "messagename" the character "*" can be - substituted, meaning "any." Complex globs like "foo.bar.*" aren't - allowed for now because they'd be work to implement and maybe - encourage sloppy security anyway. + user and group denials mean that the given user or group may + not connect to the message bus. - FIXME should we allow send/send_to and receive/receive_from - to both be specified, in which case they would be ANDed together? + For "servicename" or "messagename" or "username" or "groupname" + the character "*" can be substituted, meaning "any." Complex globs + like "foo.bar.*" aren't allowed for now because they'd be work to + implement and maybe encourage sloppy security anyway. + + It does not make sense to deny a user or group inside a <policy> + for a user or group; user/group denials can only be inside + context="default" or context="required" policies. + + A single <deny> rule may specify both send and send_to, OR both + receive and receive_from. In this case, the denial applies only if + both attributes match the message being denied. e.g. <deny send="foo.bar" send_to="foo.blah"/> would deny messages of the given name AND to the given service. - Probably need to see how hard/slow all this will be to implement. - <allow> send="messagename" receive="messagename" own="servicename" send_to="servicename" receive_from="servicename" + user="username" + group="groupname" Makes an exception to previous <deny> statements. Works just like <deny> but with the inverse meaning. |