summaryrefslogtreecommitdiff
path: root/policy
AgeCommit message (Expand)AuthorFilesLines
2019-12-11Add http://tizen.org/privilege/internal/livecoredump and disable it for non-a...Karol Lewandowski7-1/+8
2019-11-20Remove package generated SharedRO rulesDariusz Michaluk3-11/+1
2019-10-11Add core privileges: securesysteminfo and voicecontrol.ttsYunjin Lee5-0/+10
2019-08-29Disable http://tizen.org/privilege/internal/sysadmin for non-applicationsTomasz Swierczek6-0/+7
2019-04-15Add core privilege: d2d.datasharing, d2d.remotelaunchYunjin Lee5-0/+10
2019-04-09Add new rules-loader optionsDariusz Michaluk1-5/+8
2019-03-28Add core privilege: windowsystem.adminYunjin Lee5-0/+5
2018-12-18Add core privilegesYunjin Lee5-0/+20
2018-11-22Change local permissible file location to use UID rather than usernameTomasz Swierczek1-0/+26
2018-10-10Replace smack rule storage with straight-from-db rule loaderKonrad Lipinski3-0/+173
2018-09-17Add core privilege: updatecontrol.admin and permission.checkYunjin Lee5-0/+10
2018-09-12Move standard users group management from GUM to security-managerKarol Lewandowski7-0/+24
2018-08-24Initialize database and restart service in policy-reloadKonrad Lipinski1-0/+8
2018-08-24Give internet privilege to kernel thread(@)jin-gyu.kim1-0/+3
2018-08-09Rework security-manager-migration script as a policy update scriptRafal Krypa1-1/+23
2018-08-06Add /opt/usr/media to privilege-mount.list againjin-gyu.kim1-0/+1
2018-07-17Retrieve package manager privilege from User::Shell clientjin-gyu.kim1-6/+0
2018-07-03Add TZ_SYS_MEDIASHARED to privilege-mount.listjin-gyu.kim1-1/+1
2018-04-05Add core privilege voicecontrol.manager, softap and softap.adminYunjin Lee5-0/+15
2018-01-17Restore mediastorage/externalstorage privilege to group mappingDariusz Michaluk1-0/+2
2018-01-03Add core privilege: devicecertificateYunjin Lee5-0/+5
2017-12-22client: do not add application process to hardcoded groupsRafal Krypa1-2/+0
2017-11-28Allow privilege enforcement with bind mounts to be configuredRafal Krypa2-0/+18
2017-11-28Add ConfigFile class for run-time reading and parsing of config filesRafal Krypa1-1/+1
2017-11-17Adding privilege group priv_tee_client.r.tyminski1-0/+1
2017-09-28Add core privilege: peripheralioYunjin Lee5-0/+5
2017-09-26Remove core privilege: d2d.datasharingYunjin Lee5-5/+0
2017-08-07Add core privilege: gesturegrab, gestureactivationYunjin Lee5-0/+10
2017-07-05Add core privilege: blocknumber.read, blocknumber.writeYunjin Lee5-0/+10
2017-05-19Add core privilege: zigbee, zigbee.adminYunjin Lee5-0/+10
2017-05-19Add core privilege: tee.clientYunjin Lee5-5/+10
2017-04-24Merge remote-tracking branch 'origin/tizen' into appdefinedBartlomiej Grzelewski4-5/+5
2017-04-19Revert of changes related to privacy popupsRadoslaw Bartosiak1-16/+0
2017-04-02Migrate existing application policy to use new ask-user policiesRafal Krypa1-0/+16
2017-03-28Remove the redundant SharedRO SMACK rules.jin-gyu.kim4-4/+4
2017-03-15Fix buckets: aggregation of global and local instance privileges of an appDariusz Michaluk2-6/+45
2017-02-16Make it possible to use out-of-the-source build dirLukasz Pawelczyk1-1/+1
2017-02-08Add APPDEFINED Cynara bucketRadoslaw Bartosiak1-0/+2
2016-12-27Don't put empty lines in generated Smack policyRafal Krypa2-1/+9
2016-12-13Map email privilege to priv_emailjin-gyu.kim1-0/+1
2016-12-08Add transmute rule between non-hybrid app and RW pathZofia Abramowska1-0/+38
2016-10-23Treat web only privilege as core privilegeYunjin Lee5-77/+77
2016-10-14Add FOTA script for security-manager policy updateRafal Krypa2-0/+12
2016-10-12SM : Unify Smack rules of System access to applicationMateusz Forc1-3/+3
2016-10-11Update policy set for 'security' user typejooseong lee1-2/+2
2016-10-07Add packagemanger.info privilege for 'User::Shell' domainjooseong lee1-0/+3
2016-09-29Migrate security policy after app labeling schema changedRafal Krypa1-0/+65
2016-09-29Fix policy versioning mechanismRafal Krypa3-7/+11
2016-09-29Merge remote-tracking branch 'sandbox/zabramowska/hybrid' into tizenRafal Krypa3-28/+28
2016-09-28Update default policy for new domain('User::Shell')jooseong lee1-0/+6