mirror of
https://gitlab.com/apparmor/apparmor
synced 2025-08-22 01:57:43 +00:00
Document aliases for dbus send and receive in apparmor.d
Acked-by: Tyler Hicks <tyhicks@canonical.com>
This commit is contained in:
parent
fd17ff0daa
commit
c3bcdc32fb
@ -195,7 +195,7 @@ B<DBUS LABEL> = 'label' '=' '(' '"' I<AARE> '"' | I<AARE> ')'
|
||||
|
||||
B<DBUS ACCESS LIST> = Comma separated list of I<DBUS ACCESS>
|
||||
|
||||
B<DBUS ACCESS> = ( 'send' | 'receive' | 'bind' | 'eavesdrop' )
|
||||
B<DBUS ACCESS> = ( 'send' | 'receive' | 'bind' | 'eavesdrop' | 'r' | 'read' | 'w' | 'write' | 'rw' )
|
||||
Some accesses are incompatible with some rules; see below.
|
||||
|
||||
B<AARE> = B<?*[]{}^>
|
||||
@ -1009,6 +1009,9 @@ The 'bind' permission cannot be used in message rules. The 'send' and 'receive'
|
||||
permissions cannot be used in service rules. The 'eavesdrop' permission cannot
|
||||
be used in rules containing any conditionals outside of the 'bus' conditional.
|
||||
|
||||
'r' and 'read' are synonyms for 'receive'. 'w' and 'write' are synonyms for
|
||||
'send'. 'rw' is a synonym for both 'send' and 'receive'.
|
||||
|
||||
AppArmor DBus permissions are implied when a rule does not explicitly state an
|
||||
access list. By default, all DBus permissions are implied. Only message
|
||||
permissions are implied for message rules and only service permissions are
|
||||
|
Loading…
x
Reference in New Issue
Block a user