Include onlycap list files in all profiles. 31/253331/1 accepted/tizen/unified/20210210.052227 submit/tizen/20210209.051847
authorjin-gyu.kim <jin-gyu.kim@samsung.com>
Tue, 9 Feb 2021 02:16:51 +0000 (11:16 +0900)
committerjin-gyu.kim <jin-gyu.kim@samsung.com>
Tue, 9 Feb 2021 02:17:07 +0000 (11:17 +0900)
Change-Id: Ibb604b782108ace1ae30e82627792d434f291931

packaging/security-config.spec

index 4dff00593bf03832debbef1aa1469ead394425c5..5f287282bda61c8f227e113c3f3208d7ca26de4e 100755 (executable)
@@ -93,12 +93,12 @@ ln -s %{SECURITY_TEST_DIR} /opt/share/security-config/test
 touch /opt/share/security-config/dummy_file
 chmod 600 /opt/share/security-config/dummy_file
 mv %{SECURITY_TEST_DIR}/new_service_test/list/common/* %{SECURITY_TEST_DIR}/new_service_test/
+chsmack -a "System::NoUse" /etc/smack/onlycap
 
 %post profile_mobile
 mv %{SECURITY_TEST_DIR}/new_service_test/list/mobile/* %{SECURITY_TEST_DIR}/new_service_test/
 rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
 rm -f /opt/share/askuser_disable
-chsmack -a "System::NoUse" /etc/smack/onlycap
 mv /usr/share/security-config/mount_list/mobile/additional_mount_list /usr/share/security-config/additional_mount_list
 rm -r /usr/share/security-config/mount_list/
 
@@ -106,7 +106,6 @@ rm -r /usr/share/security-config/mount_list/
 mv %{SECURITY_TEST_DIR}/new_service_test/list/wearable/* %{SECURITY_TEST_DIR}/new_service_test/
 rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
 rm -f /opt/share/askuser_disable
-chsmack -a "System::NoUse" /etc/smack/onlycap
 mv /usr/share/security-config/mount_list/wearable/additional_mount_list /usr/share/security-config/additional_mount_list
 rm -r /usr/share/security-config/mount_list/
 
@@ -120,14 +119,12 @@ rm -r /usr/share/security-config/mount_list/
 mv %{SECURITY_TEST_DIR}/new_service_test/list/iot/* %{SECURITY_TEST_DIR}/new_service_test/
 rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
 rm -f /opt/share/askuser_disable
-chsmack -a "System::NoUse" /etc/smack/onlycap
 mv /usr/share/security-config/mount_list/iot/additional_mount_list /usr/share/security-config/additional_mount_list
 rm -r /usr/share/security-config/mount_list/
 
 %post profile_iot_headless
 mv %{SECURITY_TEST_DIR}/new_service_test/list/iot/* %{SECURITY_TEST_DIR}/new_service_test/
 rm -rf %{SECURITY_TEST_DIR}/new_service_test/list/
-chsmack -a "System::NoUse" /etc/smack/onlycap
 mv /usr/share/security-config/mount_list/iot/additional_mount_list /usr/share/security-config/additional_mount_list
 rm -r /usr/share/security-config/mount_list/
 
@@ -159,13 +156,13 @@ rm -r /usr/share/security-config/mount_list/
 %attr(755,root,root) %{_sysconfdir}/gumd/useradd.d/90_user-content-permissions.post
 %attr(755,root,root) %{_sysconfdir}/gumd/useradd.d/91_user-dbspace-permissions.post
 %attr(644,root,root) /etc/smack/netlabel.d/netlabel_config
+%attr(644,root,root) /etc/smack/onlycap
 
 %files profile_mobile
 %license LICENSE
 %attr(-,root,root) %{_unitdir}/security-config.service
 %attr(-,root,root) %{_unitdir}/multi-user.target.wants/security-config.service
 %attr(755,root,root) /usr/share/security-config/smack_default_labeling
-%attr(644,root,root) /etc/smack/onlycap
 %attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/mobile/*
 %attr(644,root,root) /usr/share/security-config/mount_list/mobile/*
 
@@ -174,7 +171,6 @@ rm -r /usr/share/security-config/mount_list/
 %attr(-,root,root) %{_unitdir}/security-config.service
 %attr(-,root,root) %{_unitdir}/multi-user.target.wants/security-config.service
 %attr(755,root,root) /usr/share/security-config/smack_default_labeling
-%attr(644,root,root) /etc/smack/onlycap
 %attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/wearable/*
 %attr(644,root,root) /usr/share/security-config/mount_list/wearable/*
 
@@ -188,7 +184,6 @@ rm -r /usr/share/security-config/mount_list/
 %attr(-,root,root) %{_unitdir}/security-config.service
 %attr(-,root,root) %{_unitdir}/multi-user.target.wants/security-config.service
 %attr(755,root,root) /usr/share/security-config/smack_default_labeling
-%attr(644,root,root) /etc/smack/onlycap
 %attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/iot/*
 %attr(644,root,root) /usr/share/security-config/mount_list/iot/*
 
@@ -197,7 +192,6 @@ rm -r /usr/share/security-config/mount_list/
 %attr(-,root,root) %{_unitdir}/security-config.service
 %attr(-,root,root) %{_unitdir}/multi-user.target.wants/security-config.service
 %attr(755,root,root) /usr/share/security-config/smack_default_labeling
-%attr(644,root,root) /etc/smack/onlycap
 %attr(755,root,root) %{SECURITY_TEST_DIR}/new_service_test/list/iot/*
 %attr(644,root,root) /usr/share/security-config/mount_list/iot/*