Include onlycap list file in profile packages. 67/254067/2 submit/tizen/20210223.035047
authorjin-gyu.kim <jin-gyu.kim@samsung.com>
Tue, 23 Feb 2021 02:38:45 +0000 (11:38 +0900)
committerjin-gyu.kim <jin-gyu.kim@samsung.com>
Tue, 23 Feb 2021 03:11:29 +0000 (12:11 +0900)
- Remove onlycap list file from security-config main rpm.

Change-Id: I5f37e7a21a8d1eada3095d29ed95797a226d7e6e

packaging/security-config.spec

index 5f287282bda61c8f227e113c3f3208d7ca26de4e..9301c7ed0dbcebefee25d06be0b5b2cb0c0dc76d 100755 (executable)
@@ -93,7 +93,12 @@ ln -s %{SECURITY_TEST_DIR} /opt/share/security-config/test
 touch /opt/share/security-config/dummy_file
 chmod 600 /opt/share/security-config/dummy_file
 mv %{SECURITY_TEST_DIR}/new_service_test/list/common/* %{SECURITY_TEST_DIR}/new_service_test/
-chsmack -a "System::NoUse" /etc/smack/onlycap
+
+#TODO: profile_common rpm is not existed.
+#      This means, onlycap list is not included in common profile image.
+#      If needed, there are two opitons.
+#      1. Create profile_common rpm and include onlycap list into it.
+#      2. Include onlycap list in security-config main rpm, and guide deleting it to the product team if not needed.
 
 %post profile_mobile
 mv %{SECURITY_TEST_DIR}/new_service_test/list/mobile/* %{SECURITY_TEST_DIR}/new_service_test/
@@ -101,6 +106,7 @@ rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
 rm -f /opt/share/askuser_disable
 mv /usr/share/security-config/mount_list/mobile/additional_mount_list /usr/share/security-config/additional_mount_list
 rm -r /usr/share/security-config/mount_list/
+chsmack -a "System::NoUse" /etc/smack/onlycap
 
 %post profile_wearable
 mv %{SECURITY_TEST_DIR}/new_service_test/list/wearable/* %{SECURITY_TEST_DIR}/new_service_test/
@@ -108,12 +114,14 @@ rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
 rm -f /opt/share/askuser_disable
 mv /usr/share/security-config/mount_list/wearable/additional_mount_list /usr/share/security-config/additional_mount_list
 rm -r /usr/share/security-config/mount_list/
+chsmack -a "System::NoUse" /etc/smack/onlycap
 
 %post profile_tv
 mv %{SECURITY_TEST_DIR}/new_service_test/list/tv/* %{SECURITY_TEST_DIR}/new_service_test/
 rm -r %{SECURITY_TEST_DIR}/new_service_test/list/
 mv /usr/share/security-config/mount_list/tv/additional_mount_list /usr/share/security-config/additional_mount_list
 rm -r /usr/share/security-config/mount_list/
+chsmack -a "System::NoUse" /etc/smack/onlycap
 
 %post profile_iot_headed
 mv %{SECURITY_TEST_DIR}/new_service_test/list/iot/* %{SECURITY_TEST_DIR}/new_service_test/
@@ -121,12 +129,14 @@ rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
 rm -f /opt/share/askuser_disable
 mv /usr/share/security-config/mount_list/iot/additional_mount_list /usr/share/security-config/additional_mount_list
 rm -r /usr/share/security-config/mount_list/
+chsmack -a "System::NoUse" /etc/smack/onlycap
 
 %post profile_iot_headless
 mv %{SECURITY_TEST_DIR}/new_service_test/list/iot/* %{SECURITY_TEST_DIR}/new_service_test/
 rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
 mv /usr/share/security-config/mount_list/iot/additional_mount_list /usr/share/security-config/additional_mount_list
 rm -r /usr/share/security-config/mount_list/
+chsmack -a "System::NoUse" /etc/smack/onlycap
 
 %files
 %manifest %{_datadir}/%{name}.manifest
@@ -156,7 +166,6 @@ rm -r /usr/share/security-config/mount_list/
 %attr(755,root,root) %{_sysconfdir}/gumd/useradd.d/90_user-content-permissions.post
 %attr(755,root,root) %{_sysconfdir}/gumd/useradd.d/91_user-dbspace-permissions.post
 %attr(644,root,root) /etc/smack/netlabel.d/netlabel_config
-%attr(644,root,root) /etc/smack/onlycap
 
 %files profile_mobile
 %license LICENSE
@@ -165,6 +174,7 @@ rm -r /usr/share/security-config/mount_list/
 %attr(755,root,root) /usr/share/security-config/smack_default_labeling
 %attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/mobile/*
 %attr(644,root,root) /usr/share/security-config/mount_list/mobile/*
+%attr(644,root,root) /etc/smack/onlycap
 
 %files profile_wearable
 %license LICENSE
@@ -173,11 +183,13 @@ rm -r /usr/share/security-config/mount_list/
 %attr(755,root,root) /usr/share/security-config/smack_default_labeling
 %attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/wearable/*
 %attr(644,root,root) /usr/share/security-config/mount_list/wearable/*
+&attr(644,root,root) /etc/smack/onlycap
 
 %files profile_tv
 %license LICENSE
 %attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/tv/*
 %attr(644,root,root) /usr/share/security-config/mount_list/tv/*
+%attr(644,root,root) /etc/smack/onlycap
 
 %files profile_iot_headed
 %license LICENSE
@@ -186,6 +198,7 @@ rm -r /usr/share/security-config/mount_list/
 %attr(755,root,root) /usr/share/security-config/smack_default_labeling
 %attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/iot/*
 %attr(644,root,root) /usr/share/security-config/mount_list/iot/*
+%attr(644,root,root) /etc/smack/onlycap
 
 %files profile_iot_headless
 %license LICENSE
@@ -194,4 +207,4 @@ rm -r /usr/share/security-config/mount_list/
 %attr(755,root,root) /usr/share/security-config/smack_default_labeling
 %attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/iot/*
 %attr(644,root,root) /usr/share/security-config/mount_list/iot/*
-
+%attr(644,root,root) /etc/smack/onlycap