Add new public:network and public:bluetooth permissions that currently
drive adding dependencies on network.target and bluetooth.target,
respectively. This allows related bindings to depend on those to
avoid start up races. In the future, these permissions could perhaps
be tied to configuring DBus access control of the related services.
Bug-AGL: SPEC-3509
Signed-off-by: Scott Murray <scott.murray@konsulko.com>
Change-Id: I582691bfe223a01ce80f04a4b0a1463d58287a9c
After=user@%i.service
ENDIF
-After=Network.target
-
IF_PERM(:public:display)
BindsTo=weston@display.service
After=weston@display.service
ENDIF
+IF_PERM(:public:bluetooth)
+Wants=bluetooth.target
+After=bluetooth.target
+ENDIF
+
+IF_PERM(:public:network)
+Wants=network.target
+After=network.target
+ENDIF
+
# Adds check to smack
ConditionSecurity=smack
%nl