DBus work for 13.04
Registered by
Jamie Strandboge
Acceptance citeria for April:
- Goal: Users will be able to define AppArmor policy for DBus such that confined applications will only be able to access (send, receive, acquire) specific buses (system, session, etc), connection name, object path, interface, signals and methods.
Blueprint information
- Status:
- Complete
- Approver:
- Jamie Strandboge
- Priority:
- Undefined
- Drafter:
- John Johansen
- Direction:
- Approved
- Assignee:
- Tyler Hicks
- Definition:
- Approved
- Series goal:
- Accepted for raring
- Implementation:
-
Implemented
- Milestone target:
-
ubuntu-13.04-month-6
- Started by
- Jamie Strandboge
- Completed by
- Jamie Strandboge
Related branches
Related bugs
Sprints
Whiteboard
(?)
Work Items
Work items:
[tyhicks] dbus - parser tests: DONE
[tyhicks] dbus daemon - regression tests: DONE
[tyhicks] dbus - update aa-logparser, including test: POSTPONED
[tyhicks] dbus daemon, pass labeling info on messages so security context can be queried by recipient: DONE
[tyhicks] initial work to query confinement labeling of sender: DONE
Dependency tree

* Blueprints in grey have been implemented.