summaryrefslogtreecommitdiff
path: root/policy/usertype-normal.profile
diff options
context:
space:
mode:
authorYunjin Lee <yunjin-.lee@samsung.com>2018-12-18 14:47:17 +0900
committerYunjin Lee <yunjin-.lee@samsung.com>2018-12-18 14:47:17 +0900
commitf6a597073dcc74351e4d76b8c2427aa2b8d02ee3 (patch)
tree776e6e555bbc31e96fc19e6751460b44de74f96e /policy/usertype-normal.profile
parentecc45ab65a5312f10078dcf94e627cfabaf57eaa (diff)
downloadsecurity-manager-f6a597073dcc74351e4d76b8c2427aa2b8d02ee3.tar.gz
security-manager-f6a597073dcc74351e4d76b8c2427aa2b8d02ee3.tar.bz2
security-manager-f6a597073dcc74351e4d76b8c2427aa2b8d02ee3.zip
Add core privileges
- autofillmanager: The application with this privilege can manage installed autofill services. It can set which autofill service to use and get the currently configured autofill service. - internal/buxton/systemsettings: Internal privilege to fix Web setting privilege's level mismatched mapping to the core systemsettings.admin privilege. The application with this privilege can read and write buxton keys for homescreen/lockscreen bg image, incoming call ringtone, and email notification alert tone. - filesystem,read, filesystem.write: Web filesystem.read and filesystem.write are public level privilege and native systemsettings.admin is platform level privilege. They were mapped because of the 2.X smack rules but checked that Web filesystem.read/write privileged device APIs are not wrappers of native systemsetting.admin privileged APIs. Hence add core privilege for filesystem.read and write separately and remove mapping to the systemsettings.admin. Change-Id: I73047f251c280d554ab13b3449eaa768a7ef7a86 Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
Diffstat (limited to 'policy/usertype-normal.profile')
-rw-r--r--policy/usertype-normal.profile4
1 files changed, 4 insertions, 0 deletions
diff --git a/policy/usertype-normal.profile b/policy/usertype-normal.profile
index 84d48016..ec1b8f66 100644
--- a/policy/usertype-normal.profile
+++ b/policy/usertype-normal.profile
@@ -14,6 +14,7 @@
* http://tizen.org/privilege/appmanager.kill
* http://tizen.org/privilege/appmanager.kill.bgapp
* http://tizen.org/privilege/appmanager.launch
+* http://tizen.org/privilege/autofillmanager
* http://tizen.org/privilege/blocknumber.read
* http://tizen.org/privilege/blocknumber.write
* http://tizen.org/privilege/bluetooth
@@ -55,6 +56,8 @@
* http://tizen.org/privilege/externalstorage
* http://tizen.org/privilege/externalstorage.appdata
* http://tizen.org/privilege/fido.client
+* http://tizen.org/privilege/filesystem.read
+* http://tizen.org/privilege/filesystem.write
* http://tizen.org/privilege/fullscreen
* http://tizen.org/privilege/gestureactivation
* http://tizen.org/privilege/gesturegrab
@@ -134,6 +137,7 @@
* http://tizen.org/privilege/internal/buxton/nfc
* http://tizen.org/privilege/internal/buxton/nfc.cardemulation
* http://tizen.org/privilege/internal/buxton/readonly
+* http://tizen.org/privilege/internal/buxton/systemsettings
* http://tizen.org/privilege/internal/buxton/telephony
* http://tizen.org/privilege/internal/dbus
* http://tizen.org/privilege/internal/default/partner