Prepare master for new framework integration
[AGL/meta-agl.git] / meta-app-framework / recipes-core / base-files / base-files_appfw.inc
diff --git a/meta-app-framework/recipes-core/base-files/base-files_appfw.inc b/meta-app-framework/recipes-core/base-files/base-files_appfw.inc
deleted file mode 100644 (file)
index 4c83013..0000000
+++ /dev/null
@@ -1,113 +0,0 @@
-RDEPENDS:${PN}:append:with-lsm-smack = " smack"
-PACKAGE_WRITE_DEPS:append:with-lsm-smack = " smack-native"
-
-do_install:append() {
-    install -m 0700 -d ${D}/${sysconfdir}/skel
-    chmod -R 0700 ${D}/${sysconfdir}/skel
-    install -m 0700 -d ${D}/${sysconfdir}/skel/app-data
-    install -m 0700 -d ${D}/${sysconfdir}/skel/.config
-    install -m 0755 -d ${D}/var
-    if [ -d ${D}/usr/local ]; then
-        mv ${D}/usr/local ${D}/var
-    else
-        install -m 0755 -d ${D}/var/local
-    fi
-    ln -s ../var/local ${D}/usr/local
-}
-
-do_install:append:with-lsm-smack () {
-    install -d ${D}/${sysconfdir}/smack/accesses.d
-    cat > ${D}/${sysconfdir}/smack/accesses.d/default-access-domains-no-user <<EOF
-System User::App-Shared rwxat
-System User::Home       rwxat
-EOF
-    chmod 0644 ${D}/${sysconfdir}/smack/accesses.d/default-access-domains-no-user
-}
-
-pkg_postinst:${PN}:append:with-lsm-smack() {
-    chsmack -r -a 'User::Home' -t -D $D/${sysconfdir}/skel
-    chsmack -a 'User::App-Shared' -D $D/${sysconfdir}/skel/app-data
-    cp -rTf --preserve=all $D/${sysconfdir}/skel $D/${ROOT_HOME}
-}
-
-
-
-# Install default Smack rules, copied from a running Tizen IVI 3.0.
-# Corresponds to manifest file from default-access-domains in Tizen:
-# https://review.tizen.org/git?p=platform/core/security/default-ac-domains.git;a=blob;f=packaging/default-ac-domains.manifest
-do_install:append:with-lsm-smack () {
-    install -d ${D}/${sysconfdir}/smack/accesses.d
-    cat >${D}/${sysconfdir}/smack/accesses.d/default-access-domains <<EOF
-System _ -----l
-System System::Log rwxa--
-System System::Run rwxat-
-System System::Shared rwxat-
-System ^ rwxa--
-_ System::Run rwxat-
-_ System -wx---
-^ System::Log rwxa--
-^ System::Run rwxat-
-^ System rwxa--
-EOF
-    chmod 0644 ${D}/${sysconfdir}/smack/accesses.d/default-access-domains
-
-    install -d ${D}/${libdir}/tmpfiles.d
-    cat >${D}/${libdir}/tmpfiles.d/packet-forwarding.conf <<EOF
-t /proc/sys/net/ipv4/conf/all/forwarding - - - - security.SMACK64=*
-t /proc/sys/net/ipv6/conf/all/forwarding - - - - security.SMACK64=*
-t /proc/sys/net/ipv4/conf/default/forwarding - - - - security.SMACK64=*
-t /proc/sys/net/ipv6/conf/default/forwarding - - - - security.SMACK64=*
-EOF
-    chmod 0644 ${D}/${libdir}/tmpfiles.d/packet-forwarding.conf
-
-    install -d ${D}/${base_libdir}/udev/rules.d
-    cat >${D}/${base_libdir}/udev/rules.d/85-netdev-ipconf-smacklabel.rules <<EOF
-SUBSYSTEM=="net", ENV{ID_NET_NAME}=="", RUN+="/bin/sh -c '/usr/bin/chsmack -a \* /proc/sys/net/ipv4/conf/%k/*'", RUN+="/bin/sh -c '/usr/bin/chsmack -a \* /proc/sys/net/ipv6/conf/%k/*'"
-
-SUBSYSTEM=="net", ENV{ID_NET_NAME}!="", RUN+="/bin/sh -c '/usr/bin/chsmack -a \* /proc/sys/net/ipv4/conf/\$env{ID_NET_NAME}/*'", RUN+="/bin/sh -c '/usr/bin/chsmack -a \* /proc/sys/net/ipv6/conf/\$env{ID_NET_NAME}/*'"
-EOF
-    chmod 0644 ${D}/${base_libdir}/udev/rules.d/85-netdev-ipconf-smacklabel.rules
-}
-
-# Do not rely on an rpm with manifest support. Apparently that approach
-# will no longer be used in Tizen 3.0. Instead set special Smack attributes
-# via postinst. This is much easier to use with bitbake, too:
-# - no need to maintain a patched rpm
-# - works for directories which are not packaged by default when empty
-RDEPENDS:${PN}:append:with-lsm-smack = " smack"
-DEPENDS:append:with-lsm-smack = " smack-native"
-pkg_postinst:${PN}:with-lsm-smack() {
-    #!/bin/sh -e
-
-    # https://review.tizen.org/gerrit/gitweb?p=platform/upstream/filesystem.git;a=blob;f=packaging/filesystem.manifest:
-    # <filesystem path="/etc" label="System::Shared" type="transmutable" />
-    install -d $D${sysconfdir}
-    # This has no effect on files installed into /etc during image construction
-    # because pseudo does not know the special semantic of SMACK::TRANSMUTE.
-    # To avoid having different xattrs on files inside /etc when pre-installed
-    # in an image vs. installed on a device, the xattr-images.bbclass has
-    # a workaround for this deficiency in pseudo.
-    chsmack -t $D${sysconfdir}
-    chsmack -a 'System::Shared' $D${sysconfdir}
-
-    # Same for /media. Any daemon running as "System" will get write access
-    # to everything.
-    install -d $D/media
-    chsmack -t $D/media
-    chsmack -a 'System::Shared' $D/media
-
-    # Same for /var. Any daemon running as "System" will get write access
-    # to everything.
-    install -d $D${localstatedir}
-    chsmack -t $D${localstatedir}
-    chsmack -a 'System::Shared' $D${localstatedir}
-
-    # <filesystem path="/tmp" label="*" />
-    mkdir -p $D/tmp
-    chsmack -a '*' $D/tmp
-
-    # <filesystem path="/var/log" label="System::Log" type="transmutable" />
-    # <filesystem path="/var/tmp" label="*" />
-    # These are in a file system mounted by systemd. We patch the systemd service
-    # to set these attributes.
-}