touch /opt/share/security-config/dummy_file
chmod 600 /opt/share/security-config/dummy_file
mv %{SECURITY_TEST_DIR}/new_service_test/list/common/* %{SECURITY_TEST_DIR}/new_service_test/
+chsmack -a "System::NoUse" /etc/smack/onlycap
%post profile_mobile
mv %{SECURITY_TEST_DIR}/new_service_test/list/mobile/* %{SECURITY_TEST_DIR}/new_service_test/
rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
rm -f /opt/share/askuser_disable
-chsmack -a "System::NoUse" /etc/smack/onlycap
mv /usr/share/security-config/mount_list/mobile/additional_mount_list /usr/share/security-config/additional_mount_list
rm -r /usr/share/security-config/mount_list/
mv %{SECURITY_TEST_DIR}/new_service_test/list/wearable/* %{SECURITY_TEST_DIR}/new_service_test/
rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
rm -f /opt/share/askuser_disable
-chsmack -a "System::NoUse" /etc/smack/onlycap
mv /usr/share/security-config/mount_list/wearable/additional_mount_list /usr/share/security-config/additional_mount_list
rm -r /usr/share/security-config/mount_list/
mv %{SECURITY_TEST_DIR}/new_service_test/list/iot/* %{SECURITY_TEST_DIR}/new_service_test/
rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
rm -f /opt/share/askuser_disable
-chsmack -a "System::NoUse" /etc/smack/onlycap
mv /usr/share/security-config/mount_list/iot/additional_mount_list /usr/share/security-config/additional_mount_list
rm -r /usr/share/security-config/mount_list/
%post profile_iot_headless
mv %{SECURITY_TEST_DIR}/new_service_test/list/iot/* %{SECURITY_TEST_DIR}/new_service_test/
rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
-chsmack -a "System::NoUse" /etc/smack/onlycap
mv /usr/share/security-config/mount_list/iot/additional_mount_list /usr/share/security-config/additional_mount_list
rm -r /usr/share/security-config/mount_list/
%attr(755,root,root) %{_sysconfdir}/gumd/useradd.d/90_user-content-permissions.post
%attr(755,root,root) %{_sysconfdir}/gumd/useradd.d/91_user-dbspace-permissions.post
%attr(644,root,root) /etc/smack/netlabel.d/netlabel_config
+%attr(644,root,root) /etc/smack/onlycap
%files profile_mobile
%license LICENSE
%attr(-,root,root) %{_unitdir}/security-config.service
%attr(-,root,root) %{_unitdir}/multi-user.target.wants/security-config.service
%attr(755,root,root) /usr/share/security-config/smack_default_labeling
-%attr(644,root,root) /etc/smack/onlycap
%attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/mobile/*
%attr(644,root,root) /usr/share/security-config/mount_list/mobile/*
%attr(-,root,root) %{_unitdir}/security-config.service
%attr(-,root,root) %{_unitdir}/multi-user.target.wants/security-config.service
%attr(755,root,root) /usr/share/security-config/smack_default_labeling
-%attr(644,root,root) /etc/smack/onlycap
%attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/wearable/*
%attr(644,root,root) /usr/share/security-config/mount_list/wearable/*
%attr(-,root,root) %{_unitdir}/security-config.service
%attr(-,root,root) %{_unitdir}/multi-user.target.wants/security-config.service
%attr(755,root,root) /usr/share/security-config/smack_default_labeling
-%attr(644,root,root) /etc/smack/onlycap
%attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/iot/*
%attr(644,root,root) /usr/share/security-config/mount_list/iot/*
%attr(-,root,root) %{_unitdir}/security-config.service
%attr(-,root,root) %{_unitdir}/multi-user.target.wants/security-config.service
%attr(755,root,root) /usr/share/security-config/smack_default_labeling
-%attr(644,root,root) /etc/smack/onlycap
%attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/iot/*
%attr(644,root,root) /usr/share/security-config/mount_list/iot/*