ubuntu-phone team mailing list archive
-
ubuntu-phone team
-
Mailing list archive
-
Message #10036
Re: Addition of signon-apparmor-extension
Hi,
On 10/02/2014 05:12 AM, Chris Wayne wrote:
> It seems that recently a package (signon-apparmor-extension) has been
> included that has been causing some issues
> (see https://bugs.launchpad.net/savilerow/+bug/1376445).
I added a comment on the bug suggesting a fix.
> Is there some apparmor policy group that I would need to include to be
> able to access Online Accounts? We have some scopes using accounts, and
> they're failing to get tokens with the following error:
> GDBus.Error:com.google.code.AccountsSSO.SingleSignOn.Error.PermissionDenied:
> Client has insuficient permissions to access the
> service.Method:getAuthSessionObjectPath
Unconfined applications can always access OA (so no, if your app is
unconfined, apparmor doesn't block any access to OA), but then OA has
its own ACL checks, and will allow only authorised processes to access
the accounts.
By default, all our plugins add "unconfined" to the account's ACL as
soon as the account is created, in order to allow all unconfined
processes to use the account. But the UbuntuOne plugin was not doing that.
Can you please confirm that this problem only affects apps and scopes
using the U1 account? Or does it affect other processes too?
> Even when being run unconfined. Is this a bug, or is it just a change
> in Online Accounts that needs to be accounted for?
It's something that we should have noticed much earlier; I only recently
found out that the signon-apparmor-extension was not installed on the
image (and without it, any application can access any account, which is
now what we want!), and asked Jamie to add it.
Ciao,
Alberto
Follow ups
References