diff options
author | Yunjin Lee <yunjin-.lee@samsung.com> | 2018-12-18 14:47:17 +0900 |
---|---|---|
committer | Yunjin Lee <yunjin-.lee@samsung.com> | 2018-12-18 14:47:17 +0900 |
commit | f6a597073dcc74351e4d76b8c2427aa2b8d02ee3 (patch) | |
tree | 776e6e555bbc31e96fc19e6751460b44de74f96e /policy/usertype-normal.profile | |
parent | ecc45ab65a5312f10078dcf94e627cfabaf57eaa (diff) | |
download | security-manager-f6a597073dcc74351e4d76b8c2427aa2b8d02ee3.tar.gz security-manager-f6a597073dcc74351e4d76b8c2427aa2b8d02ee3.tar.bz2 security-manager-f6a597073dcc74351e4d76b8c2427aa2b8d02ee3.zip |
Add core privileges
- autofillmanager: The application with this privilege can manage
installed autofill services. It can set which autofill service to use
and get the currently configured autofill service.
- internal/buxton/systemsettings: Internal privilege to fix
Web setting privilege's level mismatched mapping to the core
systemsettings.admin privilege. The application with this privilege
can read and write buxton keys for homescreen/lockscreen bg image,
incoming call ringtone, and email notification alert tone.
- filesystem,read, filesystem.write: Web filesystem.read and
filesystem.write are public level privilege and native
systemsettings.admin is platform level privilege. They were mapped
because of the 2.X smack rules but checked that Web
filesystem.read/write privileged device APIs are not wrappers of native
systemsetting.admin privileged APIs. Hence add core privilege for
filesystem.read and write separately and remove mapping to the
systemsettings.admin.
Change-Id: I73047f251c280d554ab13b3449eaa768a7ef7a86
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
Diffstat (limited to 'policy/usertype-normal.profile')
-rw-r--r-- | policy/usertype-normal.profile | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/policy/usertype-normal.profile b/policy/usertype-normal.profile index 84d48016..ec1b8f66 100644 --- a/policy/usertype-normal.profile +++ b/policy/usertype-normal.profile @@ -14,6 +14,7 @@ * http://tizen.org/privilege/appmanager.kill * http://tizen.org/privilege/appmanager.kill.bgapp * http://tizen.org/privilege/appmanager.launch +* http://tizen.org/privilege/autofillmanager * http://tizen.org/privilege/blocknumber.read * http://tizen.org/privilege/blocknumber.write * http://tizen.org/privilege/bluetooth @@ -55,6 +56,8 @@ * http://tizen.org/privilege/externalstorage * http://tizen.org/privilege/externalstorage.appdata * http://tizen.org/privilege/fido.client +* http://tizen.org/privilege/filesystem.read +* http://tizen.org/privilege/filesystem.write * http://tizen.org/privilege/fullscreen * http://tizen.org/privilege/gestureactivation * http://tizen.org/privilege/gesturegrab @@ -134,6 +137,7 @@ * http://tizen.org/privilege/internal/buxton/nfc * http://tizen.org/privilege/internal/buxton/nfc.cardemulation * http://tizen.org/privilege/internal/buxton/readonly +* http://tizen.org/privilege/internal/buxton/systemsettings * http://tizen.org/privilege/internal/buxton/telephony * http://tizen.org/privilege/internal/dbus * http://tizen.org/privilege/internal/default/partner |