bus/accessibility/own¶
Allow owning a name on DBus public bus
Warning
Do not use it manually, It is automatically included in a profile by the
aa:dbus own directive.
bus/session/com.canonical.AppMenu.Registrar¶
Allow access for connecting to/communication with the appmenu
bus/session/com.canonical.Unity.LauncherEntry¶
Access required for connecting to/communicating with the Unity Launcher
bus/session/com.canonical.dbusmenu¶
Dbus menu
bus/session/io.snapcraft.Launcher¶
Allow use of snapd's internal xdg-open
bus/session/io.snapcraft.PrivilegedDesktopLauncher¶
Can identify and launch other snaps.
bus/session/io.snapcraft.Settings¶
Allow use of snapd's internal 'xdg-settings'
bus/session/org.freedesktop.IBus.Portal¶
Allow access to the IBus portal
bus/session/org.freedesktop.ScreenSaver¶
Allow checking status, activating and locking the screensaver
bus/session/org.freedesktop.Secret¶
Provide full access to the secret-service API:
The secret-service allows managing (add/delete/lock/etc) collections and (add/delete/etc) items within collections. The API also has the concept of aliases for collections which is typically used to access the default collection. While it would be possible for an application developer to use a snap-specific collection and mediate by object path, application developers are meant to instead to treat collections (typically the default collection) as a database of key/value attributes each with an associated secret that applications may query. Because AppArmor does not mediate member data, typical and recommended usage of the API does not allow for application isolation. For details, see:
bus/session/org.freedesktop.portal.NetworkMonitor¶
Allow access to xdg-desktop-portal NetworkMonitor methods and signals
bus/session/org.freedesktop.systemd1¶
Allow managing systemd user units services. This allow full control over all services. When possible use the systemctl directive instead.
bus/session/org.gnome.Mutter.IdleMonitor¶
Allow to get the current idle time
bus/session/org.gnome.ScreenSaver¶
Allow checking status, activating and locking the screensaver (GNOME version)
bus/session/org.gnome.SessionManager¶
Allow registering a client with the session manager. This is needed for applications that want to be notified of session events, such as shutdown or logout, and to be able to inhibit those actions.
bus/session/org.gnome.SettingsDaemon.MediaKeys¶
Allow requesting interest in receiving media key events. This tells Gnome settings that our application should be notified when key events we are interested in are pressed, and allows us to receive those events.
bus/session/org.gnome.keyring.internal.Prompter¶
Allow accessing the GNOME crypto services prompt APIs as used by applications using libgcr (such as pinentry-gnome3) for secure pin entry to unlock GPG keys etc. See: https://developer.gnome.org/gcr/unstable/GcrPrompt.html https://developer.gnome.org/gcr/unstable/GcrSecretExchange.html https://github.com/snapcore/snapd/pull/7673#issuecomment-592229711
bus/session/org.gtk.vfs.Daemon¶
Each daemon (main and for mounts) implement this.
bus/session/org.gtk.vfs.MountTracker¶
The mount tracking interface. Allows to lookup mounts by ID and list mountable info. Allow to receive mount/umount signals from the mount tracker (gvfsd).
bus/session/org.kde.StatusNotifierWatcher¶
Allow to display Status Notifier Items in the KDE Plasma systray (including supporting context menu)
bus/session/own¶
Allow owning a name on DBus public bus
Warning
Do not use it manually, It is automatically included in a profile by the
aa:dbus own directive.
bus/system/org.freedesktop.Avahi.AddressResolver¶
Avahi Address resolving¶
bus/system/org.freedesktop.Avahi.DomainBrowser¶
Domain browsing
bus/system/org.freedesktop.Avahi.HostNameResolver¶
Hostname resolving¶
bus/system/org.freedesktop.Avahi.RecordBrowser¶
Record browsing
bus/system/org.freedesktop.Avahi.ServiceResolver¶
Service resolving
bus/system/org.freedesktop.Avahi.ServiceTypeBrowser¶
Service type browsing¶
bus/system/org.freedesktop.ColorManager¶
Allow for color managed applications to communicate with colord
bus/system/org.freedesktop.NetworkManager¶
Allows observing NetworkManager settings. It grants access to listing MAC addresses, previous networks, etc but not secrets.
bus/system/org.freedesktop.PackageKit¶
Allow communication with PackageKit transactions. Transactions are exported with random object paths that currently take the form /@{int}_@{hex8}.
bus/system/org.freedesktop.PolicyKit1¶
Can talk to polkitd's CheckAuthorization API
bus/system/org.freedesktop.RealtimeKit1¶
Allow setting realtime priorities.
bus/system/org.freedesktop.UPower¶
Can query UPower for power devices, history and statistics.
bus/system/org.freedesktop.login1¶
Allow seting up login session & seat. It grants privileged access to user sessions.
bus/system/org.freedesktop.systemd1¶
Allow managing systemd units services. This allow full control over all services. When possible use the systemctl directive instead.
bus/system/org.freedesktop.systemd1.Manager¶
libnss-systemd (D-Bus portion from nameservice abstraction)
Also allow lookups for systemd-exec's DynamicUsers via D-Bus https://www.freedesktop.org/software/systemd/man/systemd.exec.html
bus/system/own¶
Allow owning a name on DBus public bus
Warning
Do not use it manually, It is automatically included in a profile by the
aa:dbus own directive.