.TH oddjobd.conf 5 "24 June 2015" "oddjob Manual" .SH NAME oddjobd.conf - configuration for oddjobd .SH DESCRIPTION The \fB/etc/oddjobd.conf\fR configuration file specifies which services the \fIoddjobd\fR server provides over the D-Bus, and authorization rules which are enforced in addition to those enforced by the system message bus. The configuration file is an XML document. The top-level element type is \fI\fR, which contains one or more \fI\fR elements. Each \fI\fR describes a service which will be provided on the system-wide message bus. Each \fI\fR describes an object path which will will be recognized by the specified service. The object path may include wildcards, in which case any call to an object with a path name which matches the specified path will be accepted. An object contains one or more \fI\fR elements, each of which describes a group of methods described in \fI\fP elements. Each \fI\fR element must specify the method name as a value for its \fIname\fR attribute and may include a \fI element which the name of an executable to run as its \fIexec\fR attribute and the number of arguments which will be expected from the D-Bus client and passed to the helper as its \fIargument_count\fR attribute. The \fI\fR's \fIexec\fR attribute can include one or more command line arguments, separated from the executable by whitespace. A \fI\fR may also include attributes indicating whether or not the invoking user's name should be prepended to the list of arguments received as part of the D-Bus request (\fIprepend_user_name\fR, with recognized values "yes" or "no"), and whether that set of arguments should be passed in to the helper via stdin (the default) or on its command line (\fIargument_passing_method\fR, with recognized values "stdin" and "cmdline"). Each \fI\fR, \fI\fR, \fI\fR, \fI\fR, or \fI\fR element may also include authorization elements \fI\fR and \fI\fR. Each \fI\fR or \fI\fR rule specifies some combination of a user name and/or a UID range which the invoking user must match for the rule to apply. A rule can also specify the caller's SELinux context, user, role, or execution domain, and be applied or not based on whether or not policy is being enforced. All \fI\fR rules for the method are checked first, followed by all of its \fI\fR rules. If no matches are found, the \fI\fR rules for the containing \fI\fR element are checked, followed by its \fI\fP rules, and so on. If all ACLs are searched and no matches turn up, access is denied. The \fIoddjobd\fR server will automatically supply information used by the D-Bus introspection mechanism on behalf of your objects, but only if the client which is requesting the information is allowed to invoke the \fIIntrospect\fR method of the \fIorg.freedesktop.DBus.Introspectable\fR interface provided by the object. The configuration file may also indicate that the contents of other files should be read by the configuration parser, using an \fI\fR element. .SH EXAMPLES Here is an example file: Another: /etc/oddjobd-local.conf /etc/oddjobd.conf.d/*.conf And another: .SH SEE ALSO \fBoddjob_request\fR(1) \fBoddjob.conf\fR(5) \fBoddjobd\fR(8)