summaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
authorHavoc Pennington <hp@redhat.com>2003-03-21 02:38:40 +0000
committerHavoc Pennington <hp@redhat.com>2003-03-21 02:38:40 +0000
commitb6ffea177fccb6cc4e65992da7d8b390054277f7 (patch)
tree5194ad93d495c110c88b7730f05b9265dd6ce73d /doc
parent056d76d809dc341b0dce160d3f79062604565c77 (diff)
2003-03-20 Havoc Pennington <hp@redhat.com>
* dbus/dbus-connection.c (dbus_connection_set_unix_user_function): new function (dbus_connection_get_unix_user): new function
Diffstat (limited to 'doc')
-rw-r--r--doc/config-file.txt28
1 files changed, 20 insertions, 8 deletions
diff --git a/doc/config-file.txt b/doc/config-file.txt
index c10cd7ad..ae581924 100644
--- a/doc/config-file.txt
+++ b/doc/config-file.txt
@@ -94,6 +94,8 @@ Elements:
own="servicename"
send_to="servicename"
receive_from="servicename"
+ user="username"
+ group="groupname"
Examples:
<deny send="org.freedesktop.System.Reboot"/>
@@ -101,6 +103,8 @@ Elements:
<deny own="org.freedesktop.System"/>
<deny send_to="org.freedesktop.System"/>
<deny receive_from="org.freedesktop.System"/>
+ <deny user="john"/>
+ <deny group="enemies"/>
send_to and receive_from mean that messages may not be sent to
or received from the *owner* of the given service, not that
@@ -108,24 +112,32 @@ Elements:
a connection owns services A, B, C, and sending to A is denied,
sending to B or C will not work either.
- For "servicename" or "messagename" the character "*" can be
- substituted, meaning "any." Complex globs like "foo.bar.*" aren't
- allowed for now because they'd be work to implement and maybe
- encourage sloppy security anyway.
+ user and group denials mean that the given user or group may
+ not connect to the message bus.
- FIXME should we allow send/send_to and receive/receive_from
- to both be specified, in which case they would be ANDed together?
+ For "servicename" or "messagename" or "username" or "groupname"
+ the character "*" can be substituted, meaning "any." Complex globs
+ like "foo.bar.*" aren't allowed for now because they'd be work to
+ implement and maybe encourage sloppy security anyway.
+
+ It does not make sense to deny a user or group inside a <policy>
+ for a user or group; user/group denials can only be inside
+ context="default" or context="required" policies.
+
+ A single <deny> rule may specify both send and send_to, OR both
+ receive and receive_from. In this case, the denial applies only if
+ both attributes match the message being denied.
e.g. <deny send="foo.bar" send_to="foo.blah"/> would deny
messages of the given name AND to the given service.
- Probably need to see how hard/slow all this will be to implement.
-
<allow>
send="messagename"
receive="messagename"
own="servicename"
send_to="servicename"
receive_from="servicename"
+ user="username"
+ group="groupname"
Makes an exception to previous <deny> statements. Works
just like <deny> but with the inverse meaning.