No, for other packages we don't bind them to well known names. What we do is that we find the DBus connection for the primary PID and send the message to that dbus connection directly. This way we don't have to worry about the info leak issue that Marc and Jamie are talking about. The path is a bit special in that it's the AppID of the app DBus encoded.
-- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu in Ubuntu. https://bugs.launchpad.net/bugs/1342129 Title: [webapps] should enable access to dbus org.freedesktop.Application Status in “apparmor-easyprof-ubuntu” package in Ubuntu: New Bug description: Webapps recently add the capability to be invoked & open to custom urls (not default), but the apparmor profile needs to be updated to enable the org.freedesktop.Application dbus if to be accessed/created: Jul 15 13:57:14 ubuntu-phablet dbus[2689]: apparmor="DENIED" operation="dbus_bind" bus="session" name="org.freedesktop.Application" mask="bind" pid=28561 profile="com.ubuntu.developer.webapps.webapp-gmail_webapp- gmail_1.0.12" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1342129/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp