Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add permission/access control for launching of Wayland applications #711

Open
2 of 4 tasks
conniefry opened this issue Nov 30, 2017 · 1 comment
Open
2 of 4 tasks
Assignees
Milestone

Comments

@conniefry
Copy link
Contributor

conniefry commented Nov 30, 2017

As a pxscene product owner, I want to be able to control what pxApps can launch particular Wayland applications in my pxscene environment.

Currently, we have a configuration file for Wayland apps that maps an app 'name' to the app location on disk. However, we need to have a way to control access so that only permitted/trusted pxApps can launch any or specific Wayland apps when they know the name of the app(s).

  • Design permissions/access mechanism
  • Code is implemented with > 80% code coverage
  • Test cases are defined
  • Tests are run and passing

Internal Reference: XRE2-1128

@conniefry conniefry added this to the Sprint 1712 milestone Nov 30, 2017
@conniefry conniefry assigned bobseamon and conniefry and unassigned bobseamon and conniefry Dec 5, 2017
@bobseamon
Copy link

bobseamon commented Dec 6, 2017

pxscene security model documentation has been expanded to include an application section.
(@conniefry to supply github link once moved from private location; see Internal Reference info.)

In the permission section, "applications" determine what a pxApp can launch when using scene.create({t:'wayland', cmd:"browser"})

  • If an application name appears in the allowed section ("browser" in this case), it can be launched.
  • If an application name is not contained in the application section, or if the application is listed in the blocked section, it cannot be launched.
  • If an application uses the application manager API, then permissions for that application should include allowed:["*"], otherwise applications will not be able to be launched from application manager.

Test cases should include both positive and negative testing based on the above scenario.

@conniefry conniefry modified the milestones: Sprint 1712, Sprint 1801 Dec 21, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants