aboutsummaryrefslogtreecommitdiffstats
path: root/meta-app-framework/recipes-security/security-manager
diff options
context:
space:
mode:
Diffstat (limited to 'meta-app-framework/recipes-security/security-manager')
-rw-r--r--meta-app-framework/recipes-security/security-manager/security-manager.inc14
-rw-r--r--meta-app-framework/recipes-security/security-manager/security-manager_%.bbappend4
2 files changed, 9 insertions, 9 deletions
diff --git a/meta-app-framework/recipes-security/security-manager/security-manager.inc b/meta-app-framework/recipes-security/security-manager/security-manager.inc
index e1d1f4011..c6bc123d3 100644
--- a/meta-app-framework/recipes-security/security-manager/security-manager.inc
+++ b/meta-app-framework/recipes-security/security-manager/security-manager.inc
@@ -34,7 +34,7 @@ EXTRA_OECMAKE = " \
"
inherit systemd
-SYSTEMD_SERVICE_${PN} = "security-manager.service"
+SYSTEMD_SERVICE:${PN} = "security-manager.service"
inherit features_check
REQUIRED_DISTRO_FEATURES += "smack"
@@ -46,8 +46,8 @@ REQUIRED_DISTRO_FEATURES += "smack"
#
# Leave it empty to use the upstream Tizen policy.
SECURITY_MANAGER_POLICY ?= ""
-SRC_URI_append = " ${@' '.join(['file://' + x for x in d.getVar('SECURITY_MANAGER_POLICY', True).split()])}"
-python do_patch_append () {
+SRC_URI:append = " ${@' '.join(['file://' + x for x in d.getVar('SECURITY_MANAGER_POLICY', True).split()])}"
+python do_patch:append () {
import os
import shutil
import glob
@@ -62,22 +62,22 @@ python do_patch_append () {
shutil.copy(file, s + '/policy')
}
-do_install_append () {
+do_install:append () {
install -d ${D}/${systemd_unitdir}/system/multi-user.target.wants
ln -s ../security-manager.service ${D}/${systemd_unitdir}/system/multi-user.target.wants/security-manager.service
install -d ${D}/${systemd_unitdir}/system/sockets.target.wants
ln -s ../security-manager.socket ${D}/${systemd_unitdir}/system/sockets.target.wants/security-manager.socket
}
-RDEPENDS_${PN} += "sqlite3 cynara"
-FILES_${PN} += " \
+RDEPENDS:${PN} += "sqlite3 cynara"
+FILES:${PN} += " \
${systemd_unitdir} \
${TZ_SYS_DB} \
${bindir}/.security-manager-setup \
"
PACKAGES =+ "${PN}-policy"
-FILES_${PN}-policy = " \
+FILES:${PN}-policy = " \
${datadir}/${PN} \
${bindir}/security-manager-policy-reload \
"
diff --git a/meta-app-framework/recipes-security/security-manager/security-manager_%.bbappend b/meta-app-framework/recipes-security/security-manager/security-manager_%.bbappend
index ec8435369..ba3365f12 100644
--- a/meta-app-framework/recipes-security/security-manager/security-manager_%.bbappend
+++ b/meta-app-framework/recipes-security/security-manager/security-manager_%.bbappend
@@ -1,4 +1,4 @@
-FILESEXTRAPATHS_prepend := "${THISDIR}/security-manager:"
+FILESEXTRAPATHS:prepend := "${THISDIR}/security-manager:"
EXTRA_OECMAKE =+ " -DGLOBALUSER=afm"
@@ -6,7 +6,7 @@ SRC_URI += " \
file://0001-Adapt-rules-to-AGL.patch \
"
-do_install_append() {
+do_install:append() {
# Needed for wayland-0 socket access and memfd usage
echo "~APP~ System::Weston rw" >> ${D}${datadir}/security-manager/policy/app-rules-template.smack
echo "System::Weston ~APP~ rw" >> ${D}${datadir}/security-manager/policy/app-rules-template.smack