diff options
author | David Herrmann <dh.herrmann@gmail.com> | 2015-07-15 13:49:49 +0200 |
---|---|---|
committer | Aleksander Morgado <aleksander@aleksander.es> | 2015-07-15 15:04:43 +0200 |
commit | 99da30059f136600e4bf5ac2faec8b42def17d65 (patch) | |
tree | d9b17274391cf15e655bf7e9ef27fd5207a813a9 /data | |
parent | ad2c2ad14cbf894fa755a56536fa72b0db83e3d3 (diff) |
policy: don't prevent us from receiving signals
By using:
<deny send_destination="org.freedesktop.ModemManager1"/>
..we prevent anyone on the system from sending us signals, even if we
subscribed to them. This is clearly not what this line intended. More
importantly, we silently break mm-auth-provider-polkit, as we never
receiver 'changed' signals via PolkitAuthority. Right now, this is not
required by the implementation of PolkitAuthority, but ModemManager
should not place restrictions on the implementation of external
libraries.
So make sure we only prevent Method-Calls to be sent to us. Any other
message that we didn't expect is automatically discarded by gdbus,
anyway.
Without this change, debugging dbus policies constantly shows messages
that Polkit couldn't send the 'changed' signal to ModemManager. This is
suppressed in non-debugging mode. But it would make debugging a lot
easier, if we'd avoid force-dropping those events and not clutter the
debug-log.
Diffstat (limited to 'data')
-rw-r--r-- | data/org.freedesktop.ModemManager1.conf.polkit | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/data/org.freedesktop.ModemManager1.conf.polkit b/data/org.freedesktop.ModemManager1.conf.polkit index d1ea1669..6b90b4b9 100644 --- a/data/org.freedesktop.ModemManager1.conf.polkit +++ b/data/org.freedesktop.ModemManager1.conf.polkit @@ -3,7 +3,8 @@ "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <policy context="default"> - <deny send_destination="org.freedesktop.ModemManager1"/> + <deny send_destination="org.freedesktop.ModemManager1" + send_type="method_call"/> <!-- Methods listed here are explicitly allowed or PolicyKit protected. The rest are restricted to root for security. |