DBus work for 13.04

Registered by Jamie Strandboge

Acceptance citeria for April:
 - Goal: Users will be able to define AppArmor policy for DBus such that confined applications will only be able to access (send, receive, acquire) specific buses (system, session, etc), connection name, object path, interface, signals and methods.

Blueprint information

Status:
Complete
Approver:
Jamie Strandboge
Priority:
Undefined
Drafter:
John Johansen
Direction:
Approved
Assignee:
Tyler Hicks
Definition:
Approved
Series goal:
Accepted for raring
Implementation:
Implemented
Milestone target:
milestone icon ubuntu-13.04-month-6
Started by
Jamie Strandboge
Completed by
Jamie Strandboge

Related branches

Sprints

Whiteboard

(?)

Work Items

Work items:
[tyhicks] dbus - parser tests: DONE
[tyhicks] dbus daemon - regression tests: DONE
[tyhicks] dbus - update aa-logparser, including test: POSTPONED
[tyhicks] dbus daemon, pass labeling info on messages so security context can be queried by recipient: DONE
[tyhicks] initial work to query confinement labeling of sender: DONE

Dependency tree

* Blueprints in grey have been implemented.

This blueprint contains Public information 
Everyone can see this information.