aboutsummaryrefslogtreecommitdiff
path: root/data
AgeCommit message (Collapse)Author
2019-12-02data: added valgrind suppressions file imported from NMAleksander Morgado
2019-10-11systemd: always start MM after polkit service if enabling policyAleksander Morgado
Fixes https://gitlab.freedesktop.org/mobile-broadband/ModemManager/issues/113
2019-09-25policy: USSD policy requires user authentication in strict modeAleksander Morgado
2019-09-25polkit,conf: trivial comment update regarding Signal.Setup()Aleksander Morgado
2019-09-25polkit,conf: add missing firmware management methodsAleksander Morgado
2019-09-25polkit,conf: add missing OMA methodsAleksander Morgado
2019-09-25polkit,time: protect GetNetworkTime() with a new 'Time' policy ruleAleksander Morgado
2019-09-25polkit,conf: add missing supplementary voice service methodsAleksander Morgado
2019-09-25polkit,conf: add missing InjectAssistanceDataAleksander Morgado
2019-09-25polkit,conf: add missing SetInitialEpsBearerSettingsAleksander Morgado
2019-09-25polkit,conf: add missing SetEpsUeModeOperationAleksander Morgado
2019-09-25polkit,conf: add missing SetCurrentCapabilitiesAleksander Morgado
2019-09-25polkit,conf: add missing SetPowerStateAleksander Morgado
2019-09-25policy,conf: use SetCurrentBands instead of SetBandsAleksander Morgado
2019-09-24policy: Use SetCurrentModes instead of SetAllowedModesMohammed Sadiq
There is no DBus API for SetAllowedModes, but only for SetCurrentModes.
2018-12-07policy: Call method name should be SendDtmf rather than SendToneBob Ham
The method on MMBaseCall is send_tone but the D-Bus method call is SendDtmf. Without this patch, calls return org.freedesktop.DBus.Error.AccessDenied.
2018-06-13service: set User=root so that gio doesn't have to look into /etc/passwdLubomir Rintel
GVfs' libgvfsdbus.so GIo module, when automatically loaded, attempts to discover if there's a session D-Bus instance to use. It tries real hard to get the socket name it would use -- in absence of XDG_RUNTIME_DIR it decides to make it up with user's home directory. When HOME is unset too, it just tries to figure it out by looking into /etc/passwd. Which upsets SELinux that would better not see us looking into it. We trigger the load of the GIo modules, by using the GFile API to access the the ports in /dev. They're utterly uesless to us, but there doesn't seem to be a way to disable their load. Oh well. For now, let's just ensure HOME is set and the problematic path in glib is not taken.
2017-09-07i18n: deprecate intltool and use only gettext 0.19.8Aleksander Morgado
Instead of mixing both intltool and gettext, which not always work correctly together, this patch obsoletes intltool and uses only gettext, which includes support for translating XML files with ITS rules. See migration steps for GNOME projects here: https://wiki.gnome.org/MigratingFromIntltoolToGettext The gettext ITS rules for polkit policy files are imported from the upstream polkit repository. We don't use the polkit-installed rule files yet because there is no tagged release that contains those files yet, so we cannot build-depend on any specific polkit version. https://bugs.freedesktop.org/show_bug.cgi?id=96940
2017-08-12polkit: add missing Location interface method rulesAleksander Morgado
https://bugs.freedesktop.org/show_bug.cgi?id=102182
2017-06-18systemd: drop After=syslog.target ruleAleksander Morgado
syslog implementations are using socket activation nowadays, so an explicit ordering is not necessary anymore. Plus, syslog.target was already dropped from systemd in v198. Reported-by: Michael Biebl <biebl@debian.org>
2016-10-24systemd: tighten the service security a bitLubomir Rintel
What's left enabled: * Access to /dev -- obviously * CAP_SYS_ADMIN -- this is needed by TIOCSSERIAL only. Too bad this also allows TIOCSTI, which allows for code injection unless something else (SELinux) disallows access to ttys with shells. Maybe kernel should use CAP_SYS_TTY_CONFIG for this. * socket(AF_NETLINK) -- udev & kernel device changes * socket(AF_UNIX) -- D-Bus
2016-09-29core: allow disabling auto-scan and notifying ports one by one via APIAleksander Morgado
This commit enables a new core ModemManager daemon option, so that automatic detection of available modems is totally disabled: '--no-auto-scan'. Note that this option also replaces the previously used '--test-no-auto-scan' option, which was only used during tests. Along with the new ModemManager option, a new ReportKernelEvent() method in the API is defined, which allows notifying the daemon of which interfaces it should be accessing, as well as the main details of each interface. The only mandatory parameters in the new method are 'action' (add/remove), 'name' (the name of the interface) and 'subsystem' (the subsystem of the interface). The mmcli tool has support for using the new api method via several new options: * The '--report-kernel-event' option allows specifying device ports one by one, and is a direct mapping of the ReportKernelEvent() method: $ sudo mmcli --report-kernel-event="action=add,name=wwan0,subsystem=net" $ sudo mmcli --report-kernel-event="action=add,name=cdc-wdm0,subsystem=usbmisc" * The '--report-kernel-event-auto-scan' option uses udev monitoring to notify events automatically to the daemon. This allows to operate in a way equivalent to the default daemon operation (with implicit auto-scan). Worth noting that the ReportKernelEvent() method is only usable when '--no-auto-scan' is explicitly used in the daemon. An error will be reported if the method is tried while standard udev monitoring is enabled (implicit if auto scan isn't explicitly disabled in the daemon). If mmcli is going to be used only to report 'real time' events, an optional '--initial-kernel-events=[PATH]' may be given in the ModemManager call to automatically process a set of port kernel events one by one on boot. The file may e.g. contain: action=add,name=wwan0,subsystem=net action=add,name=cdc-wdm0,subsystem=usbmisc
2015-08-02policy: fix minor typoAleksander Morgado
2015-08-02polkit: added Voice policy ruleAleksander Morgado
2015-07-15policy: don't prevent us from receiving signalsDavid Herrmann
By using: <deny send_destination="org.freedesktop.ModemManager1"/> ..we prevent anyone on the system from sending us signals, even if we subscribed to them. This is clearly not what this line intended. More importantly, we silently break mm-auth-provider-polkit, as we never receiver 'changed' signals via PolkitAuthority. Right now, this is not required by the implementation of PolkitAuthority, but ModemManager should not place restrictions on the implementation of external libraries. So make sure we only prevent Method-Calls to be sent to us. Any other message that we didn't expect is automatically discarded by gdbus, anyway. Without this change, debugging dbus policies constantly shows messages that Polkit couldn't send the 'changed' signal to ModemManager. This is suppressed in non-debugging mode. But it would make debugging a lot easier, if we'd avoid force-dropping those events and not clutter the debug-log.
2014-07-11polkit: fix Location.Setup() authorization rulesAleksander Morgado
2014-03-09data: add iconAleksander Morgado
2014-02-13context: new '--test-plugin-dir' to allow specifying where the plugins areAleksander Morgado
2014-02-13service,tests: run in MM in debug mode in service testsAleksander Morgado
2014-02-13context: new '--test-enable' to enable the Test interfaceAleksander Morgado
2014-02-13context: new '--test-no-auto-scan' to avoid automatic scanning for devicesAleksander Morgado
2014-02-13context: new '--test-session' allows launching the MM daemon in the session busAleksander Morgado
2014-02-13service,tests: new DBus service file for testsAleksander Morgado
2013-08-21api,introspection: new 'Signal' interface for extended signal qualityAleksander Morgado
2013-07-23build: fix dbus activation file generationAleksander Morgado
https://bugzilla.gnome.org/show_bug.cgi?id=704711
2013-06-25systemd: schedule to restart the service on-abortAleksander Morgado
See https://bugzilla.gnome.org/show_bug.cgi?id=701229.
2013-06-23dbus: no need for systemd and nosystemd setups of the service fileAleksander Morgado
We can just merge them.
2013-06-23Revert "systemd: simplify unit file"Aleksander Morgado
This reverts commit 91898aa8b0bb8164b61e84ae68534c38cebb1482. See additional comments in the following bug: https://bugzilla.gnome.org/show_bug.cgi?id=701229 Basically, 'mask' and 'unmask' operations are not the ones we should be using or suggesting; and the Alias= for the DBus file is the correct way to go.
2013-06-13build: new strict & permissive polkit policies in '--with-polkit'Aleksander Morgado
The '--with-polkit' configure switch now supports more options than just yes or no: * strict: Active user needs to explicitly authenticate when peforming an operation defined in the Device.Control, Messaging, Location or Contacts interfaces. Polkit policy is set to 'auth_self_keep'. * permissive: Active user doesn't need to explicitly authenticate when peforming an operation defined in the Device.Control, Messaging, Location or Contacts interfaces. Polkit policy is set to 'yes'. * none: don't use polkit. If '--with-polkit' is not given, usage will be automatically decided based on the presence of the Polkit headers in the system (if headers found, strict policy will be applied, otherwise none). Also: * '--with-polkit' is equivalent to '--with-polkit=strict' * '--with-polkit=yes' is equivalent to '--with-polkit=strict' * '--with-polkit=no' is equivalent to '--with-polkit=none' * '--without-polkit' is equivalent to '--with-polkit=none' By default, ModemManager will always apply the strict policy, in order to protect the user from unwanted operations in the modem (e.g. getting the PIN locked forever after wrong PIN/PUK unlock attempts). https://bugzilla.gnome.org/show_bug.cgi?id=701740
2013-06-06build: fix distcheckAleksander Morgado
2013-06-06systemd: simplify unit fileAleksander Morgado
Avoid setting up the Alias rule, which was a helper to let us 'disable' the systemd service including dbus-activations. Without the Alias, 'disable' will still let starting ModemManager through dbus-activation. If you really want to fully disallow starting MM also through dbus-activation, you should 'mask' and 'unmask' the service. E.g.: $ sudo systemctl mask ModemManager ln -s '/dev/null' '/etc/systemd/system/ModemManager.service' $ sudo mmcli -L error: couldn't find the ModemManager process in the bus $ sudo systemctl unmask ModemManager rm '/etc/systemd/system/ModemManager.service' $ sudo mmcli -L No modems were found https://bugzilla.gnome.org/show_bug.cgi?id=701229
2013-05-26docs: don't require 'dia' to build the docsAleksander Morgado
These diagrams are not expected to change much, so just include the generated PNGs in the repository, and remove 'dia' from the prerequisites to build the documentation.
2013-02-06trivial: fix typoDan Williams
2013-02-06systemd: include systemd unit file supportAleksander Morgado
Allow having systemd handling the life cycle of the ModemManager process.
2012-10-04data: include ModemManager logo imagesAleksander Morgado
2012-10-04build: merge libmm-common into libmm-glibAleksander Morgado
It's pointless to have libmm-common around, just merge it into libmm-glib and make ModemManager depend on libmm-glib directly. At the end, the non-common stuff in libmm-glib is really minimal.
2012-05-24build: provide pkg-config files for ModemManager, libmm-common and libmm-glibAleksander Morgado
2012-05-23dbus: remove 'max_replies_per_connection' limit from D-Bus configurationJiří Klimeš
It is leftover from times when D-Bus default limit was 32. Now, it is 8192, see http://cgit.freedesktop.org/dbus/dbus/commit/?id=8d3d8ff55739eebd84d0d53a20a025329feafc3b
2012-03-16build: rename the binary from `modem-manager' to `ModemManager'Aleksander Morgado
2012-03-16introspection: setup all new files and remove old onesAleksander Morgado