Hotfix: image creation failed
[platform/core/security/key-manager.git] / packaging / key-manager.spec
index 0e2ac04..ed87faa 100644 (file)
@@ -1,17 +1,14 @@
 Name:       key-manager
 Summary:    Central Key Manager and utilities
-Version:    0.1.18
+Version:    0.1.22
 Release:    1
 Group:      System/Security
-License:    Apache-2.0 and BSL-1.0
+License:    Apache-2.0 and BSL-1.0 and BSD-2.0
 Source0:    %{name}-%{version}.tar.gz
-Source1001: key-manager.manifest
-Source1002: key-manager-pam-plugin.manifest
-Source1003: key-manager-listener.manifest
-Source1004: libkey-manager-client.manifest
-Source1005: libkey-manager-client-devel.manifest
-Source1006: libkey-manager-common.manifest
-Source1007: key-manager-tests.manifest
+Source1001: key-manager-pam-plugin.manifest
+Source1002: libkey-manager-client.manifest
+Source1003: libkey-manager-client-devel.manifest
+Source1004: libkey-manager-common.manifest
 BuildRequires: cmake
 BuildRequires: zip
 BuildRequires: pkgconfig(dlog)
@@ -25,41 +22,42 @@ BuildRequires: pkgconfig(capi-system-info)
 BuildRequires: pkgconfig(security-manager)
 BuildRequires: pkgconfig(cynara-client-async)
 BuildRequires: pkgconfig(cynara-creds-socket)
+BuildRequires: pkgconfig(libtzplatform-config)
+BuildRequires: pkgconfig(glib-2.0)
+BuildRequires: pkgconfig(pkgmgr)
 BuildRequires: boost-devel
-Requires(pre): pwdutils
-Requires(postun): pwdutils
+BuildRequires: ca-certificates-devel
+#Requires(pre): tizen-platform-config-tools
 Requires: libkey-manager-common = %{version}-%{release}
 %{?systemd_requires}
 
 %global user_name key-manager
 %global group_name key-manager
 %global service_name key-manager
-%global _rundir /run
 %global smack_domain_name System
+%global old_rw_data_dir /opt/data/ckm
+%global rw_data_dir %{?TZ_SYS_DATA:%TZ_SYS_DATA/ckm}%{!?TZ_SYS_DATA:%old_rw_data_dir}
+%global ro_data_dir %{?TZ_SYS_RO_SHARE:%TZ_SYS_RO_SHARE/ckm}%{!?TZ_SYS_RO_SHARE:%_datadir/ckm}
+%global db_test_dir %{?TZ_SYS_RO_SHARE:%TZ_SYS_RO_SHARE/ckm-db-test}%{!?TZ_SYS_RO_SHARE:%_datadir/ckm-db-test}
+%global bin_dir %{?TZ_SYS_BIN:%TZ_SYS_BIN}%{!?TZ_SYS_BIN:%_bindir}
+# image creation error occured if /usr/sbin used for ldconfig
+#%global sbin_dir %{?TZ_SYS_SBIN:%TZ_SYS_SBIN}%{!?TZ_SYS_SBIN:%_sbindir}
+%global sbin_dir /sbin
+%global ro_etc_dir %{?TZ_SYS_RO_ETC:%TZ_SYS_RO_ETC}%{!?TZ_SYS_RO_ETC:/etc}
+%global run_dir %{?TZ_SYS_RUN:%TZ_SYS_RUN}%{!?TZ_SYS_RUN:/var/run}
+%global initial_values_dir %{rw_data_dir}/initial_values
+%global ca_certs_dir %{?TZ_SYS_CA_CERTS:%TZ_SYS_CA_CERTS}%{!?TZ_SYS_CA_CERTS:%ro_etc_dir/ssl/certs}
 
 %description
 Central Key Manager daemon could be used as secure storage
 for certificate and private/public keys. It gives API for
 application to sign and verify (DSA/RSA/ECDSA) signatures.
 
-%package -n key-manager-listener
-Summary:    Package with listener daemon
-Group:      System/Security
-BuildRequires: pkgconfig(glib-2.0)
-BuildRequires: pkgconfig(dlog)
-BuildRequires: pkgconfig(capi-appfw-package-manager)
-Requires:   libkey-manager-client = %{version}-%{release}
-
-%description -n key-manager-listener
-Listener for central key manager. This daemon is responsible for
-receive notification from dbus about uninstall application
-and pass them to key-manager daemon.
-
 %package -n libkey-manager-common
 Summary:    Central Key Manager (common libraries)
 Group:      Development/Libraries
-Requires(post): /sbin/ldconfig
-Requires(postun): /sbin/ldconfig
+Requires(post): %{sbin_dir}/ldconfig
+Requires(postun): %{sbin_dir}/ldconfig
 
 %description -n libkey-manager-common
 Central Key Manager package (common library)
@@ -69,8 +67,8 @@ Summary:    Central Key Manager (client)
 Group:      Development/Libraries
 Requires:   key-manager = %{version}-%{release}
 Requires:   libkey-manager-common = %{version}-%{release}
-Requires(post): /sbin/ldconfig
-Requires(postun): /sbin/ldconfig
+Requires(post): %{sbin_dir}/ldconfig
+Requires(postun): %{sbin_dir}/ldconfig
 
 %description -n libkey-manager-client
 Central Key Manager package (client)
@@ -100,8 +98,8 @@ Summary:    CKM login/password module to PAM
 Group:      Development/Libraries
 BuildRequires: pam-devel
 Requires:   key-manager = %{version}-%{release}
-Requires(post): /sbin/ldconfig
-Requires(postun): /sbin/ldconfig
+Requires(post): %{sbin_dir}/ldconfig
+Requires(postun): %{sbin_dir}/ldconfig
 
 %description -n key-manager-pam-plugin
 CKM login/password module to PAM. Used to monitor user login/logout
@@ -114,9 +112,6 @@ cp -a %{SOURCE1001} .
 cp -a %{SOURCE1002} .
 cp -a %{SOURCE1003} .
 cp -a %{SOURCE1004} .
-cp -a %{SOURCE1005} .
-cp -a %{SOURCE1006} .
-cp -a %{SOURCE1007} .
 
 %build
 %if 0%{?sec_build_binary_debug_enable}
@@ -132,44 +127,26 @@ export LDFLAGS+="-Wl,--rpath=%{_libdir},-Bsymbolic-functions "
         -DCMAKE_BUILD_TYPE=%{?build_type:%build_type}%{!?build_type:RELEASE} \
         -DCMAKE_VERBOSE_MAKEFILE=ON \
         -DSYSTEMD_UNIT_DIR=%{_unitdir} \
-        -DSYSTEMD_ENV_FILE="/etc/sysconfig/central-key-manager" \
-        -DRUN_DIR:PATH=%{_rundir} \
+        -DSYSTEMD_ENV_FILE=%{ro_etc_dir}"/sysconfig/central-key-manager" \
+        -DRUN_DIR:PATH=%{run_dir} \
         -DSERVICE_NAME=%{service_name} \
         -DUSER_NAME=%{user_name} \
         -DGROUP_NAME=%{group_name} \
         -DSMACK_DOMAIN_NAME=%{smack_domain_name} \
-        -DMOCKUP_SM=%{?mockup_sm:%mockup_sm}%{!?mockup_sm:OFF}
+        -DMOCKUP_SM=%{?mockup_sm:%mockup_sm}%{!?mockup_sm:OFF} \
+        -DOLD_RW_DATA_DIR=%{old_rw_data_dir} \
+        -DRW_DATA_DIR=%{rw_data_dir} \
+        -DRO_DATA_DIR=%{ro_data_dir} \
+        -DRW_ETC_DIR=%{rw_etc_dir} \
+        -DRO_ETC_DIR=%{ro_etc_dir} \
+        -DBIN_DIR=%{bin_dir} \
+        -DINITIAL_VALUES_DIR=%{initial_values_dir} \
+        -DDB_TEST_DIR=%{db_test_dir} \
+        -DCA_CERTS_DIR=%{ca_certs_dir}
 
 make %{?jobs:-j%jobs}
 
 %install
-rm -rf %{buildroot}
-mkdir -p %{buildroot}/opt/data/ckm/initial_values
-mkdir -p %{buildroot}/etc/security/
-mkdir -p %{buildroot}/usr/share/ckm/scripts
-mkdir -p %{buildroot}/etc/gumd/userdel.d/
-cp data/scripts/*.sql %{buildroot}/usr/share/ckm/scripts
-cp doc/initial_values.xsd %{buildroot}/usr/share/ckm
-cp doc/sw_key.xsd %{buildroot}/usr/share/ckm
-cp data/gumd/10_key-manager.post %{buildroot}/etc/gumd/userdel.d/
-
-mkdir -p %{buildroot}/usr/share/ckm-db-test
-cp tests/testme_ver1.db %{buildroot}/usr/share/ckm-db-test/
-cp tests/testme_ver2.db %{buildroot}/usr/share/ckm-db-test/
-cp tests/testme_ver3.db %{buildroot}/usr/share/ckm-db-test/
-cp tests/XML_1_okay.xml %{buildroot}/usr/share/ckm-db-test/
-cp tests/XML_1_okay.xsd %{buildroot}/usr/share/ckm-db-test/
-cp tests/XML_1_wrong.xml %{buildroot}/usr/share/ckm-db-test/
-cp tests/XML_1_wrong.xsd %{buildroot}/usr/share/ckm-db-test/
-cp tests/XML_2_structure.xml %{buildroot}/usr/share/ckm-db-test/
-cp tests/XML_3_encrypted.xml %{buildroot}/usr/share/ckm-db-test/
-cp tests/XML_3_encrypted.xsd %{buildroot}/usr/share/ckm-db-test/
-cp tests/XML_4_device_key.xml %{buildroot}/usr/share/ckm-db-test/
-cp tests/XML_4_device_key.xsd %{buildroot}/usr/share/ckm-db-test/
-cp tests/encryption-scheme/db/db-7654 %{buildroot}/usr/share/ckm-db-test/db-7654
-cp tests/encryption-scheme/db/db-key-7654 %{buildroot}/usr/share/ckm-db-test/db-key-7654
-cp tests/encryption-scheme/db/key-7654 %{buildroot}/usr/share/ckm-db-test/key-7654
-
 %make_install
 %install_service multi-user.target.wants central-key-manager.service
 %install_service sockets.target.wants central-key-manager-api-control.socket
@@ -178,22 +155,42 @@ cp tests/encryption-scheme/db/key-7654 %{buildroot}/usr/share/ckm-db-test/key-76
 %install_service sockets.target.wants central-key-manager-api-encryption.socket
 
 %pre
+# tzplatform-get sync breaked because of on-development situation. comment out just for temporary
+# fail if runtime dir variable is different than compilation time variable
+#if [ `tzplatform-get TZ_SYS_DATA | cut -d'=' -f2` != %{TZ_SYS_DATA} ]
+#then
+#    echo "Runtime value of TZ_SYS_DATA is different than the compilation time value. Aborting"
+#    exit 1
+#fi
+#if [ `tzplatform-get TZ_SYS_RO_SHARE | cut -d'=' -f2` != %{TZ_SYS_RO_SHARE} ]
+#then
+#    echo "Runtime value of TZ_SYS_RO_SHARE is different than the compilation time value. Aborting"
+#    exit 1
+#fi
+
+## backup plan for manage key-manager user/group is deprecated b/c pwdutils package
+## would be excluded from binary
 # User/group (key-manager/key-manager) should be already added in passwd package.
 # This is our backup plan if passwd package will not be configured correctly.
-id -g %{group_name} > /dev/null 2>&1
-if [ $? -eq 1 ]; then
-    groupadd %{group_name} -r > /dev/null 2>&1
-fi
+#id -g %{group_name} > /dev/null 2>&1
+#if [ $? -eq 1 ]; then
+#    groupadd %{group_name} -r > /dev/null 2>&1
+#fi
+#
+#id -u %{user_name} > /dev/null 2>&1
+#if [ $? -eq 1 ]; then
+#    useradd -d /var/lib/empty -s %{sbin_dir}/nologin -r -g %{group_name} %{user_name} > /dev/null 2>&1
+#fi
 
-id -u %{user_name} > /dev/null 2>&1
-if [ $? -eq 1 ]; then
-    useradd -d /var/lib/empty -s /sbin/nologin -r -g %{group_name} %{user_name} > /dev/null 2>&1
+%post
+# move data from old path to new one
+# we have to assume that in case of TZ_SYS_DATA change some upgrade script will move all the data
+if [ -d "%{old_rw_data_dir}" ] && [ "%{rw_data_dir}" != "%{old_rw_data_dir}" ]
+then
+    echo "Migrating old rw data to new rw data dir"
+    cp -a %{old_rw_data_dir}/. %{rw_data_dir}/ && rm -rf %{old_rw_data_dir}
 fi
 
-%clean
-rm -rf %{buildroot}
-
-%post
 systemctl daemon-reload
 if [ $1 = 1 ]; then
     # installation
@@ -204,8 +201,8 @@ if [ $1 = 2 ]; then
     # update
 
     # In ckm version <= 0.1.18 all files were owned by root.
-    find /opt/data/ckm -exec chsmack -a %{smack_domain_name} {} \;
-    chown %{user_name}:%{group_name} -R /opt/data/ckm
+    find %{rw_data_dir} -exec chsmack -a %{smack_domain_name} {} \;
+    chown %{user_name}:%{group_name} -R %{rw_data_dir}
     systemctl restart central-key-manager.service
 fi
 
@@ -222,36 +219,17 @@ if [ $1 = 0 ]; then
     systemctl daemon-reload
 fi
 
-%post -n libkey-manager-common -p /sbin/ldconfig
-%post -n libkey-manager-client -p /sbin/ldconfig
-%postun -n libkey-manager-common -p /sbin/ldconfig
-%postun -n libkey-manager-client -p /sbin/ldconfig
-
-%post -n key-manager-listener
-systemctl daemon-reload
-if [ $1 = 2 ]; then
-    # update
-    systemctl stop central-key-manager-listener.service
-fi
-
-%preun -n key-manager-listener
-if [ $1 = 0 ]; then
-    # unistall
-    systemctl stop central-key-manager-listener.service
-fi
-
-%postun -n key-manager-listener
-if [ $1 = 0 ]; then
-    # unistall
-    systemctl daemon-reload
-fi
-
+%post -n libkey-manager-common -p %{sbin_dir}/ldconfig
+%post -n libkey-manager-client -p %{sbin_dir}/ldconfig
+%postun -n libkey-manager-common -p %{sbin_dir}/ldconfig
+%postun -n libkey-manager-client -p %{sbin_dir}/ldconfig
 
 %files -n key-manager
 %manifest key-manager.manifest
 %license LICENSE
 %license LICENSE.BSL-1.0
-%{_bindir}/key-manager
+%license LICENSE.BSD-2.0
+%{bin_dir}/key-manager
 %{_unitdir}/multi-user.target.wants/central-key-manager.service
 %{_unitdir}/central-key-manager.service
 %{_unitdir}/central-key-manager.target
@@ -263,24 +241,20 @@ fi
 %{_unitdir}/central-key-manager-api-ocsp.socket
 %{_unitdir}/sockets.target.wants/central-key-manager-api-encryption.socket
 %{_unitdir}/central-key-manager-api-encryption.socket
-%dir %{_datadir}/ckm
-%{_datadir}/ckm/initial_values.xsd
-%{_datadir}/ckm/sw_key.xsd
-%attr(770, %{user_name}, %{group_name}) /opt/data/ckm/
-%attr(770, %{user_name}, %{group_name}) /opt/data/ckm/initial_values/
-%{_datadir}/ckm/scripts/*.sql
-/etc/opt/upgrade/230.key-manager-migrate-dkek.patch.sh
-/etc/opt/upgrade/231.key-manager-change-user.patch.sh
-/etc/gumd/userdel.d/10_key-manager.post
-%{_bindir}/ckm_tool
+%dir %{ro_data_dir}
+%{ro_data_dir}/*
+%dir %attr(770, %{user_name}, %{group_name}) %{rw_data_dir}
+%dir %attr(770, %{user_name}, %{group_name}) %{initial_values_dir}
+%{ro_etc_dir}/opt/upgrade/230.key-manager-change-data-dir.patch.sh
+%{ro_etc_dir}/opt/upgrade/231.key-manager-migrate-dkek.patch.sh
+%{ro_etc_dir}/opt/upgrade/232.key-manager-change-user.patch.sh
+%{ro_etc_dir}/gumd/userdel.d/10_key-manager.post
+%{bin_dir}/ckm_tool
 
 %files -n key-manager-pam-plugin
 %manifest key-manager-pam-plugin.manifest
 %{_libdir}/security/pam_key_manager_plugin.so*
 
-%files -n key-manager-listener
-%manifest key-manager-listener.manifest
-
 %files -n libkey-manager-common
 %manifest libkey-manager-common.manifest
 %{_libdir}/libkey-manager-common.so.*
@@ -314,25 +288,8 @@ fi
 
 %files -n key-manager-tests
 %manifest key-manager-tests.manifest
-%{_bindir}/ckm-tests-internal
-%dir %{_datadir}/ckm-db-test
-%{_datadir}/ckm-db-test/testme_ver1.db
-%{_datadir}/ckm-db-test/testme_ver2.db
-%{_datadir}/ckm-db-test/testme_ver3.db
-%{_datadir}/ckm-db-test/XML_1_okay.xml
-%{_datadir}/ckm-db-test/XML_1_okay.xsd
-%{_datadir}/ckm-db-test/XML_1_wrong.xml
-%{_datadir}/ckm-db-test/XML_1_wrong.xsd
-%{_datadir}/ckm-db-test/XML_2_structure.xml
-%{_datadir}/ckm-db-test/XML_3_encrypted.xml
-%{_datadir}/ckm-db-test/XML_3_encrypted.xsd
-%{_datadir}/ckm-db-test/XML_4_device_key.xml
-%{_datadir}/ckm-db-test/XML_4_device_key.xsd
-%{_datadir}/ckm-db-test/db-7654
-%{_datadir}/ckm-db-test/db-key-7654
-%{_datadir}/ckm-db-test/key-7654
-%{_datadir}/ckm-db-test/encryption-scheme.p12
-%{_bindir}/ckm_so_loader
-%{_bindir}/ckm_db_tool
-%{_bindir}/ckm_generate_db
-
+%{bin_dir}/ckm-tests-internal
+%{bin_dir}/ckm_so_loader
+%{bin_dir}/ckm_db_tool
+%{bin_dir}/ckm_generate_db
+%db_test_dir