aboutsummaryrefslogtreecommitdiff
path: root/data
diff options
context:
space:
mode:
authorDavid Herrmann <dh.herrmann@gmail.com>2015-07-15 13:49:49 +0200
committerAleksander Morgado <aleksander@aleksander.es>2015-07-15 15:04:43 +0200
commit99da30059f136600e4bf5ac2faec8b42def17d65 (patch)
treed9b17274391cf15e655bf7e9ef27fd5207a813a9 /data
parentad2c2ad14cbf894fa755a56536fa72b0db83e3d3 (diff)
policy: don't prevent us from receiving signals
By using: <deny send_destination="org.freedesktop.ModemManager1"/> ..we prevent anyone on the system from sending us signals, even if we subscribed to them. This is clearly not what this line intended. More importantly, we silently break mm-auth-provider-polkit, as we never receiver 'changed' signals via PolkitAuthority. Right now, this is not required by the implementation of PolkitAuthority, but ModemManager should not place restrictions on the implementation of external libraries. So make sure we only prevent Method-Calls to be sent to us. Any other message that we didn't expect is automatically discarded by gdbus, anyway. Without this change, debugging dbus policies constantly shows messages that Polkit couldn't send the 'changed' signal to ModemManager. This is suppressed in non-debugging mode. But it would make debugging a lot easier, if we'd avoid force-dropping those events and not clutter the debug-log.
Diffstat (limited to 'data')
-rw-r--r--data/org.freedesktop.ModemManager1.conf.polkit3
1 files changed, 2 insertions, 1 deletions
diff --git a/data/org.freedesktop.ModemManager1.conf.polkit b/data/org.freedesktop.ModemManager1.conf.polkit
index d1ea1669..6b90b4b9 100644
--- a/data/org.freedesktop.ModemManager1.conf.polkit
+++ b/data/org.freedesktop.ModemManager1.conf.polkit
@@ -3,7 +3,8 @@
"http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
<busconfig>
<policy context="default">
- <deny send_destination="org.freedesktop.ModemManager1"/>
+ <deny send_destination="org.freedesktop.ModemManager1"
+ send_type="method_call"/>
<!-- Methods listed here are explicitly allowed or PolicyKit protected.
The rest are restricted to root for security.