ADD_DEFINITIONS("-Wno-implicit-fallthrough") # No warnings about switc() statements, often done on purpose
ADD_DEFINITIONS("-DCYNARA_DB_DIR=\"${CYNARA_DB_DIR}\"")
ADD_DEFINITIONS("-DAPP_USER=\"${APP_USER}\"")
+ADD_DEFINITIONS("-DLIB_DIR=\"${LIB_DIR}\"")
# Enabler for popups; this should be done on system-level somewhere, but since it isn't
# and we already have such definition in security-manager, lets have it also here
-DCKM_RW_DATA_DIR=%{ckm_rw_data_dir} \
-DGLOBAL_APP_DIR=%{TZ_SYS_RW_APP} \
-DLOCAL_APP_DIR="%{TZ_SYS_HOME}/security_test_user/apps_rw" \
- -DSM_TEST_DIR="%{sm_test_dir}"
+ -DSM_TEST_DIR="%{sm_test_dir}"\
+ -DLIB_DIR:PATH=%{_libdir}
make %{?jobs:-j%jobs}
%pre
const std::string SOCKET_ADMIN("cynara-admin.socket");
const std::string SOCKET_AGENT("cynara-agent.socket");
-const std::string SERVICE_PLUGINS_DIR("/usr/lib/cynara/plugin/service/");
+const std::string SERVICE_PLUGINS_DIR(LIB_DIR"/cynara/plugin/service/");
}
void AppInstallHelperExt::checkPkgSmackRulesAfterUninstall() const
{
- const std::vector<AccessRequest> rules(std::move(parseSmackRulesFile(SMACK_RULES_PATH)));
+ const std::vector<AccessRequest> rules(parseSmackRulesFile(SMACK_RULES_PATH));
const std::string labels[] = {generatePathRWLabel(m_pkgName),
generatePathROLabel(m_pkgName),
generateProcessLabel(m_appName, m_pkgName, true),