231.key-manager-migrate-dkek.patch.sh
232.key-manager-change-user.patch.sh
233.key-manager-move-ss-migratable-data.patch.sh
- DESTINATION ${RO_ETC_DIR}/opt/upgrade
+ DESTINATION ${UPGRADE_SCRIPT_DIR}
PERMISSIONS
OWNER_READ
OWNER_WRITE
%global initial_values_dir %{rw_data_dir}/initial_values
%global ca_certs_dir %{?TZ_SYS_CA_CERTS:%TZ_SYS_CA_CERTS}%{!?TZ_SYS_CA_CERTS:%ro_etc_dir/ssl/certs}
+%global upgrade_script_dir %{?TZ_SYS_RO_SHARE:%TZ_SYS_RO_SHARE}%{!?TZ_SYS_RO_SHARE:%_datadir}/upgrade/scripts
+
%description
Central Key Manager daemon could be used as secure storage
for certificate and private/public keys. It gives API for
-DBIN_DIR=%{bin_dir} \
-DINITIAL_VALUES_DIR=%{initial_values_dir} \
-DDB_TEST_DIR=%{db_test_dir} \
- -DCA_CERTS_DIR=%{ca_certs_dir}
+ -DCA_CERTS_DIR=%{ca_certs_dir} \
+ -DUPGRADE_SCRIPT_DIR=%{upgrade_script_dir}
make %{?jobs:-j%jobs}
%{ro_data_dir}/*
%dir %attr(770, %{user_name}, %{group_name}) %{rw_data_dir}
%dir %attr(770, %{user_name}, %{group_name}) %{initial_values_dir}
-%{ro_etc_dir}/opt/upgrade/230.key-manager-change-data-dir.patch.sh
-%{ro_etc_dir}/opt/upgrade/231.key-manager-migrate-dkek.patch.sh
-%{ro_etc_dir}/opt/upgrade/232.key-manager-change-user.patch.sh
-%{ro_etc_dir}/opt/upgrade/233.key-manager-move-ss-migratable-data.patch.sh
+
+%{upgrade_script_dir}/230.key-manager-change-data-dir.patch.sh
+%{upgrade_script_dir}/231.key-manager-migrate-dkek.patch.sh
+%{upgrade_script_dir}/232.key-manager-change-user.patch.sh
+%{upgrade_script_dir}/233.key-manager-move-ss-migratable-data.patch.sh
%{ro_etc_dir}/gumd/userdel.d/10_key-manager.post
%{bin_dir}/ckm_tool