# Generated by etckeeper. Do not edit.
mkdir -p './ConsoleKit/run-seat.d'
+mkdir -p './NetworkManager/conf.d'
mkdir -p './NetworkManager/dispatcher.d/no-wait.d'
mkdir -p './NetworkManager/dispatcher.d/pre-down.d'
mkdir -p './NetworkManager/dispatcher.d/pre-up.d'
+mkdir -p './NetworkManager/dnsmasq-shared.d'
+mkdir -p './NetworkManager/dnsmasq.d'
mkdir -p './ca-certificates/update.d'
mkdir -p './courier-imap/imapaccess'
mkdir -p './courier-imap/shared'
maybe chmod 0644 'ImageMagick-6/type-windows.xml'
maybe chmod 0644 'ImageMagick-6/type.xml'
maybe chmod 0755 'NetworkManager'
+maybe chmod 0755 'NetworkManager/conf.d'
maybe chmod 0755 'NetworkManager/dispatcher.d'
maybe chmod 0644 'NetworkManager/dispatcher.d/.keep_net-misc_networkmanager-0'
maybe chmod 0755 'NetworkManager/dispatcher.d/10-openrc-status'
maybe chmod 0755 'NetworkManager/dispatcher.d/no-wait.d'
maybe chmod 0755 'NetworkManager/dispatcher.d/pre-down.d'
maybe chmod 0755 'NetworkManager/dispatcher.d/pre-up.d'
+maybe chmod 0755 'NetworkManager/dnsmasq-shared.d'
+maybe chmod 0755 'NetworkManager/dnsmasq.d'
maybe chmod 0755 'NetworkManager/system-connections'
maybe chmod 0600 'NetworkManager/system-connections/.keep_net-misc_networkmanager-0'
maybe chmod 0755 'UPower'
<allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
<!-- These are there because some broken policies do
- <deny send_interface="..." /> (see dbus-daemon(8) for details).
- This seems to override that for the known VPN plugins.
+ <deny send_interface="..." /> (see dbus-daemon(8) for details).
+ This seems to override that for the known VPN plugins.
-->
<allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
<allow send_destination="org.freedesktop.NetworkManager.openswan"/>
<allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
<allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>
+ <allow send_destination="org.fedoraproject.FirewallD1"/>
+
<!-- Allow the custom name for the dnsmasq instance spawned by NM
from the dns dnsmasq plugin to own it's dbus name, and for
messages to be sent to it.
<deny send_destination="org.freedesktop.NetworkManager"/>
- <!-- Basic D-Bus API stuff -->
+ <!-- Basic D-Bus API stuff -->
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.DBus.Introspectable"/>
<allow send_destination="org.freedesktop.NetworkManager"
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.DBus.ObjectManager"/>
- <!-- Devices (read-only properties, no methods) -->
+ <!-- Devices (read-only properties, no methods) -->
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager.Device.Adsl"/>
<allow send_destination="org.freedesktop.NetworkManager"
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager.AccessPoint"/>
- <!-- Devices (read-only, no security required) -->
+ <!-- Devices (read-only, no security required) -->
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager.Device.WiMax"/>
- <!-- Devices (read/write, secured with PolicyKit) -->
+ <!-- Devices (read/write, secured with PolicyKit) -->
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager.Device.Wireless"/>
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager.Device"/>
- <!-- Core stuff (read-only properties, no methods) -->
+ <!-- Core stuff (read-only properties, no methods) -->
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager.Connection.Active"/>
<allow send_destination="org.freedesktop.NetworkManager"
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager.VPN.Connection"/>
- <!-- Core stuff (read/write, secured with PolicyKit) -->
+ <!-- Core stuff (read/write, secured with PolicyKit) -->
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager"/>
<allow send_destination="org.freedesktop.NetworkManager"
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager.Settings.Connection"/>
- <!-- Agents; secured with PolicyKit. Any process can talk to
- the AgentManager API, but only NetworkManager can talk
- to the agents themselves. -->
+ <!-- Agents; secured with PolicyKit. Any process can talk to
+ the AgentManager API, but only NetworkManager can talk
+ to the agents themselves. -->
<allow send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager.AgentManager"/>
- <!-- Root-only functions -->
+ <!-- Root-only functions -->
<deny send_destination="org.freedesktop.NetworkManager"
send_interface="org.freedesktop.NetworkManager"
send_member="SetLogging"/>
<deny send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
</policy>
- <limit name="max_replies_per_connection">1024</limit>
- <limit name="max_match_rules_per_connection">2048</limit>
+ <limit name="max_replies_per_connection">1024</limit>
+ <limit name="max_match_rules_per_connection">2048</limit>
</busconfig>