> What time frame are you looking for to land fixes for this I don't have a specific timeline for this, I just wanted to raise it as a missing feature before I forgot about it.
I think the project that I wanted this for might be able to work around the missing feature with rules like dbus (send,receive) bus=session path=/com/example/MyService/**, dbus receive bus=session peer=(label=unconfined), so that unconfined developer/test processes can call Ping() and Introspect(), all processes can call the service's methods and receive its signals, but the service can't call methods on (the interesting object paths of) more-privileged processes like systemd. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1692582 Title: RFE: dbus AppArmor mediation matching by message type To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1692582/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs