diff options
Diffstat (limited to 'meta-oe')
18 files changed, 231 insertions, 106 deletions
diff --git a/meta-oe/classes/signing.bbclass b/meta-oe/classes/signing.bbclass index 8af7bbf8e0..5068360ca7 100644 --- a/meta-oe/classes/signing.bbclass +++ b/meta-oe/classes/signing.bbclass | |||
@@ -54,7 +54,7 @@ | |||
54 | SIGNING_PKCS11_URI ?= "" | 54 | SIGNING_PKCS11_URI ?= "" |
55 | SIGNING_PKCS11_MODULE ?= "" | 55 | SIGNING_PKCS11_MODULE ?= "" |
56 | 56 | ||
57 | DEPENDS += "softhsm-native libp11-native opensc-native openssl-native" | 57 | DEPENDS += "softhsm-native libp11-native opensc-native openssl-native extract-cert-native" |
58 | 58 | ||
59 | def signing_class_prepare(d): | 59 | def signing_class_prepare(d): |
60 | import os.path | 60 | import os.path |
@@ -87,6 +87,11 @@ def signing_class_prepare(d): | |||
87 | export(role, "SIGNING_PKCS11_URI_%s_", pkcs11_uri) | 87 | export(role, "SIGNING_PKCS11_URI_%s_", pkcs11_uri) |
88 | export(role, "SIGNING_PKCS11_MODULE_%s_", pkcs11_module) | 88 | export(role, "SIGNING_PKCS11_MODULE_%s_", pkcs11_module) |
89 | 89 | ||
90 | # there can be an optional CA associated with this role | ||
91 | ca_cert_name = d.getVarFlag("SIGNING_CA", role) or d.getVar("SIGNING_CA") | ||
92 | if ca_cert_name: | ||
93 | export(role, "SIGNING_CA_%s_", ca_cert_name) | ||
94 | |||
90 | signing_pkcs11_tool() { | 95 | signing_pkcs11_tool() { |
91 | pkcs11-tool --module "${STAGING_LIBDIR_NATIVE}/softhsm/libsofthsm2.so" --login --pin 1111 $* | 96 | pkcs11-tool --module "${STAGING_LIBDIR_NATIVE}/softhsm/libsofthsm2.so" --login --pin 1111 $* |
92 | } | 97 | } |
@@ -123,58 +128,131 @@ signing_import_define_role() { | |||
123 | echo "_SIGNING_PKCS11_MODULE_${role}_=\"softhsm\"" >> $_SIGNING_ENV_FILE_ | 128 | echo "_SIGNING_PKCS11_MODULE_${role}_=\"softhsm\"" >> $_SIGNING_ENV_FILE_ |
124 | } | 129 | } |
125 | 130 | ||
126 | # signing_import_cert_from_der <role> <der> | 131 | # signing_import_cert_from_der <cert_name> <der> |
127 | # | 132 | # |
128 | # Import a certificate from DER file to a role. To be used | 133 | # Import a certificate from DER file to a cert_name. |
129 | # with SoftHSM. | 134 | # Where the <cert_name> can either be a previously setup |
135 | # signing_import_define_role linking the certificate to a signing key, | ||
136 | # or a new identifier when dealing with a standalone certificate. | ||
137 | # | ||
138 | # To be used with SoftHSM. | ||
130 | signing_import_cert_from_der() { | 139 | signing_import_cert_from_der() { |
131 | local role="${1}" | 140 | local cert_name="${1}" |
132 | local der="${2}" | 141 | local der="${2}" |
133 | 142 | ||
134 | signing_pkcs11_tool --type cert --write-object "${der}" --label "${role}" | 143 | # check wether the cert_name/role needs to be defined first, |
144 | # or do so otherwise | ||
145 | local uri=$(siging_get_uri $cert_name) | ||
146 | if [ -z "$uri" ]; then | ||
147 | signing_import_define_role "$cert_name" | ||
148 | fi | ||
149 | |||
150 | signing_pkcs11_tool --type cert --write-object "${der}" --label "${cert_name}" | ||
135 | } | 151 | } |
136 | 152 | ||
137 | # signing_import_cert_chain_from_pem <role> <pem> | 153 | # signing_import_set_ca <cert_name> <ca_cert_name> |
138 | # | 154 | # |
155 | # Link the certificate from <cert_name> to its issuer stored in | ||
156 | # <ca_cert_name> By walking this linked list a CA-chain can later be | ||
157 | # reconstructed from the involed roles. | ||
158 | signing_import_set_ca() { | ||
159 | local cert_name="${1}" | ||
160 | local ca_cert_name="${2}" | ||
161 | |||
162 | echo "_SIGNING_CA_${cert_name}_=\"${ca_cert_name}\"" >> $_SIGNING_ENV_FILE_ | ||
163 | echo "added link from ${cert_name} to ${ca_cert_name}" | ||
164 | } | ||
139 | 165 | ||
140 | # Import a certificate *chain* from a PEM file to a role. | 166 | # signing_get_ca <cert_name> |
141 | # (e.g. multiple ones concatenated in one file) | ||
142 | # | 167 | # |
143 | # Due to limitations in the toolchain: | 168 | # returns the <ca_cert_name> that has been set previously through |
144 | # signing class -> softhsm -> 'extract-cert' | 169 | # either signing_import_set_ca; |
145 | # the input certificate is split into a sequentially numbered list of roles, | 170 | # or a local.conf override SIGNING_CA[role] = ... |
146 | # starting at <role>_1 | 171 | # If none was set, the empty string is returned. |
172 | signing_get_ca() { | ||
173 | local cert_name="${1}" | ||
174 | |||
175 | # prefer local configuration | ||
176 | eval local ca="\$SIGNING_CA_${cert_name}_" | ||
177 | if [ -n "$ca" ]; then | ||
178 | echo "$ca" | ||
179 | return | ||
180 | fi | ||
181 | |||
182 | # fall back to softhsm | ||
183 | eval echo "\$_SIGNING_CA_${cert_name}_" | ||
184 | } | ||
185 | |||
186 | # signing_has_ca <cert_name> | ||
147 | # | 187 | # |
148 | # (The limitations are the conversion step from x509 to a plain .der, and | 188 | # check if the cert_name links to another cert_name that is its |
149 | # extract-cert expecting a x509 and then producing only plain .der again) | 189 | # certificate authority/issuer. |
150 | signing_import_cert_chain_from_pem() { | 190 | signing_has_ca() { |
151 | local role="${1}" | 191 | local ca_cert_name="$(signing_get_ca ${1})" |
152 | local pem="${2}" | 192 | |
153 | local i=1 | 193 | test -n "$ca_cert_name" |
154 | 194 | return $? | |
155 | cat "${pem}" | \ | ||
156 | while openssl x509 -inform pem -outform der -out ${B}/temp_${i}.der; do | ||
157 | signing_import_define_role "${role}_${i}" | ||
158 | signing_pkcs11_tool --type cert \ | ||
159 | --write-object ${B}/temp_${i}.der \ | ||
160 | --label "${role}_${i}" | ||
161 | rm ${B}/temp_${i}.der | ||
162 | echo "imported ${pem} under role: ${role}_${i}" | ||
163 | i=$(awk "BEGIN {print $i+1}") | ||
164 | done | ||
165 | } | 195 | } |
166 | 196 | ||
167 | # signing_import_cert_from_pem <role> <pem> | 197 | # signing_get_intermediate_certs <cert_name> |
168 | # | 198 | # |
169 | # Import a certificate from PEM file to a role. To be used | 199 | # return a list of role/name intermediary CA certificates for a given |
170 | # with SoftHSM. | 200 | # <cert_name> by walking the chain setup with signing_import_set_ca. |
201 | # | ||
202 | # The returned list will not include the the root CA, and can | ||
203 | # potentially be empty. | ||
204 | # | ||
205 | # To be used with SoftHSM. | ||
206 | signing_get_intermediate_certs() { | ||
207 | local cert_name="${1}" | ||
208 | local intermediary="" | ||
209 | while signing_has_ca "${cert_name}"; do | ||
210 | cert_name="$(signing_get_ca ${cert_name})" | ||
211 | if signing_has_ca "${cert_name}"; then | ||
212 | intermediary="${intermediary} ${cert_name}" | ||
213 | fi | ||
214 | done | ||
215 | echo "${intermediary}" | ||
216 | } | ||
217 | |||
218 | # signing_get_root_cert <cert_name> | ||
219 | # | ||
220 | # return the role/name of the CA root certificate for a given | ||
221 | # <cert_name>, by walking the chain setup with signing_import_set_ca | ||
222 | # all the way to the last in line that doesn't have a CA set - which | ||
223 | # would be the root. | ||
224 | # | ||
225 | # To be used with SoftHSM. | ||
226 | signing_get_root_cert() { | ||
227 | local cert_name="${1}" | ||
228 | while signing_has_ca "${cert_name}"; do | ||
229 | cert_name="$(signing_get_ca ${cert_name})" | ||
230 | done | ||
231 | echo "${cert_name}" | ||
232 | } | ||
233 | |||
234 | # signing_import_cert_from_pem <cert_name> <pem> | ||
235 | # | ||
236 | # Import a certificate from PEM file to a cert_name. | ||
237 | # Where the <cert_name> can either be a previously setup | ||
238 | # signing_import_define_role linking the certificate to a signing key, | ||
239 | # or a new identifier when dealing with a standalone certificate. | ||
240 | # | ||
241 | # To be used with SoftHSM. | ||
171 | signing_import_cert_from_pem() { | 242 | signing_import_cert_from_pem() { |
172 | local role="${1}" | 243 | local cert_name="${1}" |
173 | local pem="${2}" | 244 | local pem="${2}" |
174 | 245 | ||
246 | # check wether the cert_name/role needs to be defined first, | ||
247 | # or do so otherwise | ||
248 | local uri=$(siging_get_uri $cert_name) | ||
249 | if [ -z "$uri" ]; then | ||
250 | signing_import_define_role "$cert_name" | ||
251 | fi | ||
252 | |||
175 | openssl x509 \ | 253 | openssl x509 \ |
176 | -in "${pem}" -inform pem -outform der | | 254 | -in "${pem}" -inform pem -outform der | |
177 | signing_pkcs11_tool --type cert --write-object /proc/self/fd/0 --label "${role}" | 255 | signing_pkcs11_tool --type cert --write-object /proc/self/fd/0 --label "${cert_name}" |
178 | } | 256 | } |
179 | 257 | ||
180 | # signing_import_pubkey_from_der <role> <der> | 258 | # signing_import_pubkey_from_der <role> <der> |
@@ -346,6 +424,30 @@ signing_get_module() { | |||
346 | fi | 424 | fi |
347 | } | 425 | } |
348 | 426 | ||
427 | # signing_extract_cert_der <role> <der> | ||
428 | # | ||
429 | # Export a certificate attached to a role into a DER file. | ||
430 | # To be used with SoftHSM. | ||
431 | signing_extract_cert_der() { | ||
432 | local role="${1}" | ||
433 | local output="${2}" | ||
434 | |||
435 | extract-cert "$(signing_get_uri $role)" "${output}" | ||
436 | } | ||
437 | |||
438 | # signing_extract_cert_pem <role> <pem> | ||
439 | # | ||
440 | # Export a certificate attached to a role into a PEM file. | ||
441 | # To be used with SoftHSM. | ||
442 | signing_extract_cert_pem() { | ||
443 | local role="${1}" | ||
444 | local output="${2}" | ||
445 | |||
446 | extract-cert "$(signing_get_uri $role)" "${output}.tmp-der" | ||
447 | openssl x509 -inform der -in "${output}.tmp-der" -out "${output}" | ||
448 | rm "${output}.tmp-der" | ||
449 | } | ||
450 | |||
349 | python () { | 451 | python () { |
350 | signing_class_prepare(d) | 452 | signing_class_prepare(d) |
351 | } | 453 | } |
diff --git a/meta-oe/recipes-connectivity/ace/ace_8.0.2.bb b/meta-oe/recipes-connectivity/ace/ace_8.0.2.bb index 0fe41a7b92..35252c3efc 100644 --- a/meta-oe/recipes-connectivity/ace/ace_8.0.2.bb +++ b/meta-oe/recipes-connectivity/ace/ace_8.0.2.bb | |||
@@ -21,13 +21,15 @@ CVE_STATUS[CVE-2009-1147] = "cpe-incorrect: this CVE is for vmware ace" | |||
21 | COMPATIBLE_HOST:libc-musl = "null" | 21 | COMPATIBLE_HOST:libc-musl = "null" |
22 | 22 | ||
23 | S = "${UNPACKDIR}/ACE_wrappers" | 23 | S = "${UNPACKDIR}/ACE_wrappers" |
24 | B = "${WORKDIR}/ACE_wrappers/ace" | 24 | B = "${UNPACKDIR}/ACE_wrappers/ace" |
25 | export ACE_ROOT = "${WORKDIR}/ACE_wrappers" | 25 | export ACE_ROOT = "${UNPACKDIR}/ACE_wrappers" |
26 | 26 | ||
27 | inherit pkgconfig | 27 | inherit pkgconfig |
28 | 28 | ||
29 | CXXFLAGS:append = " -fpermissive -Wnodeprecated-declarations" | 29 | CXXFLAGS:append = " -fpermissive -Wno-deprecated-declarations" |
30 | CXX:append = " -ffile-prefix-map=${WORKDIR}= " | 30 | CXX:append = " -ffile-prefix-map=${UNPACKDIR}= " |
31 | export CCFLAGS = "${CXXFLAGS}" | ||
32 | |||
31 | EXTRA_OEMAKE += "INSTALL_LIB=${baselib} install_rpath=0" | 33 | EXTRA_OEMAKE += "INSTALL_LIB=${baselib} install_rpath=0" |
32 | 34 | ||
33 | do_install() { | 35 | do_install() { |
diff --git a/meta-oe/recipes-connectivity/paho-mqtt-cpp/paho-mqtt-cpp_1.5.3.bb b/meta-oe/recipes-connectivity/paho-mqtt-cpp/paho-mqtt-cpp_1.5.3.bb index d1674403f0..5b4aed3001 100644 --- a/meta-oe/recipes-connectivity/paho-mqtt-cpp/paho-mqtt-cpp_1.5.3.bb +++ b/meta-oe/recipes-connectivity/paho-mqtt-cpp/paho-mqtt-cpp_1.5.3.bb | |||
@@ -11,6 +11,7 @@ LIC_FILES_CHKSUM = " \ | |||
11 | " | 11 | " |
12 | 12 | ||
13 | SRC_URI = "git://github.com/eclipse/paho.mqtt.cpp;protocol=https;branch=master;tag=v${PV}" | 13 | SRC_URI = "git://github.com/eclipse/paho.mqtt.cpp;protocol=https;branch=master;tag=v${PV}" |
14 | SRCREV = "17ff3dc0270738adc710667be44847eebc038ae0" | ||
14 | 15 | ||
15 | DEPENDS = "openssl paho-mqtt-c" | 16 | DEPENDS = "openssl paho-mqtt-c" |
16 | 17 | ||
diff --git a/meta-oe/recipes-connectivity/wifi-test-suite/files/0001-wfa_cmdproc-Store-return-value-into-location.patch b/meta-oe/recipes-connectivity/wifi-test-suite/files/0005-wfa_cmdproc-Store-return-value-into-location.patch index 074f0fe7bb..074f0fe7bb 100644 --- a/meta-oe/recipes-connectivity/wifi-test-suite/files/0001-wfa_cmdproc-Store-return-value-into-location.patch +++ b/meta-oe/recipes-connectivity/wifi-test-suite/files/0005-wfa_cmdproc-Store-return-value-into-location.patch | |||
diff --git a/meta-oe/recipes-connectivity/wifi-test-suite/files/0006-make-CFLAGS-appendable.patch b/meta-oe/recipes-connectivity/wifi-test-suite/files/0006-make-CFLAGS-appendable.patch new file mode 100644 index 0000000000..9d20403866 --- /dev/null +++ b/meta-oe/recipes-connectivity/wifi-test-suite/files/0006-make-CFLAGS-appendable.patch | |||
@@ -0,0 +1,60 @@ | |||
1 | From ef4ead927f69452c95b80e5bf042f67897f67e9d Mon Sep 17 00:00:00 2001 | ||
2 | From: Alper Ak <alperyasinak1@gmail.com> | ||
3 | Date: Mon, 23 Jun 2025 15:46:37 +0300 | ||
4 | Subject: [PATCH] Allow extra CFLAGS via EXTRA_CFLAGS variable | ||
5 | |||
6 | This patch introduces an EXTRA_CFLAGS variable to the Makefile, which is | ||
7 | appended to CFLAGS. This allows users or external build systems to pass | ||
8 | their additional compiler flags. | ||
9 | |||
10 | Upstream-Status: Submitted [https://github.com/Wi-FiTestSuite/Wi-FiTestSuite-Linux-DUT/pull/61] | ||
11 | |||
12 | Signed-off-by: Alper Ak <alperyasinak1@gmail.com> | ||
13 | --- | ||
14 | Makefile.inc | 15 ++++++++------- | ||
15 | 1 file changed, 8 insertions(+), 7 deletions(-) | ||
16 | |||
17 | diff --git a/Makefile.inc b/Makefile.inc | ||
18 | index 0094bdf..76729b9 100644 | ||
19 | --- a/Makefile.inc | ||
20 | +++ b/Makefile.inc | ||
21 | @@ -22,28 +22,29 @@ UCC=ucc | ||
22 | CON=console_src | ||
23 | WTG=WTGService | ||
24 | MAKE?=make | ||
25 | +EXTRA_CFLAGS ?= | ||
26 | |||
27 | # This is for WMM-PS | ||
28 | #for Ext TG | ||
29 | -#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -Wall -I../inc | ||
30 | +#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -Wall -I../inc ${EXTRA_CFLAGS} | ||
31 | |||
32 | ## for WMM-AC, WMM-PS, Voice, PMF, TDLS Test-Bed | ||
33 | -#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_VOICE_EXT -DWFA_STA_TB -Wall -I../inc | ||
34 | +#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_VOICE_EXT -DWFA_STA_TB -Wall -I../inc ${EXTRA_CFLAGS} | ||
35 | |||
36 | ## for WMM-AC, WMM-PS Test-Bed | ||
37 | -#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_STA_TB -Wall -I../inc | ||
38 | +#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_STA_TB -Wall -I../inc ${EXTRA_CFLAGS} | ||
39 | |||
40 | ## for non-Test-Bed WMM-AC, WMM-PS and Voice | ||
41 | -#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_VOICE_EXT -Wall -I../inc | ||
42 | +#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_VOICE_EXT -Wall -I../inc ${EXTRA_CFLAGS} | ||
43 | |||
44 | ## for PC-ENDPOINT | ||
45 | -#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_VOICE_EXT -DWFA_PC_CONSOLE -Wall -I../inc | ||
46 | +#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_VOICE_EXT -DWFA_PC_CONSOLE -Wall -I../inc ${EXTRA_CFLAGS} | ||
47 | |||
48 | ## for PC-ENDPOINT No Voice | ||
49 | -#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_PC_CONSOLE -DWFA_STA_TB -Wall -I../inc | ||
50 | +#CFLAGS = -g -O2 -D_REENTRANT -DWFA_WMM_PS_EXT -DWFA_WMM_AC -DWFA_PC_CONSOLE -DWFA_STA_TB -Wall -I../inc ${EXTRA_CFLAGS} | ||
51 | |||
52 | # This is for WPA2 as default | ||
53 | -CFLAGS = -g -O2 -D_REENTRANT -Wall -I../inc | ||
54 | +CFLAGS = -g -O2 -D_REENTRANT -Wall -I../inc ${EXTRA_CFLAGS} | ||
55 | |||
56 | DUTLIBS = ../lib/libwfa_dut.a -lpthread | ||
57 | CALIBS = ../lib/libwfa_ca.a -lpthread | ||
58 | -- | ||
59 | 2.43.0 | ||
60 | |||
diff --git a/meta-oe/recipes-connectivity/wifi-test-suite/wifi-test-suite_10.10.1.bb b/meta-oe/recipes-connectivity/wifi-test-suite/wifi-test-suite_10.10.1.bb index 9703c10452..357789ad88 100644 --- a/meta-oe/recipes-connectivity/wifi-test-suite/wifi-test-suite_10.10.1.bb +++ b/meta-oe/recipes-connectivity/wifi-test-suite/wifi-test-suite_10.10.1.bb | |||
@@ -14,7 +14,8 @@ SRC_URI = "git://github.com/Wi-FiTestSuite/Wi-FiTestSuite-Linux-DUT.git;branch=m | |||
14 | file://0003-fix-path-to-usr-sbin-for-script-and-make-script-for-.patch \ | 14 | file://0003-fix-path-to-usr-sbin-for-script-and-make-script-for-.patch \ |
15 | file://0004-run-ranlib-per-library-and-use-AR.patch \ | 15 | file://0004-run-ranlib-per-library-and-use-AR.patch \ |
16 | file://fno-common.patch \ | 16 | file://fno-common.patch \ |
17 | file://0001-wfa_cmdproc-Store-return-value-into-location.patch \ | 17 | file://0005-wfa_cmdproc-Store-return-value-into-location.patch \ |
18 | file://0006-make-CFLAGS-appendable.patch \ | ||
18 | " | 19 | " |
19 | 20 | ||
20 | # to avoid host path QA error | 21 | # to avoid host path QA error |
@@ -41,4 +42,6 @@ RDEPENDS:${PN} = "wpa-supplicant" | |||
41 | # http://errors.yoctoproject.org/Errors/Details/766893/ | 42 | # http://errors.yoctoproject.org/Errors/Details/766893/ |
42 | # wfa_cmdproc.c:467:68: error: passing argument 3 of 'strtok_r' from incompatible pointer type [-Wincompatible-pointer-types] | 43 | # wfa_cmdproc.c:467:68: error: passing argument 3 of 'strtok_r' from incompatible pointer type [-Wincompatible-pointer-types] |
43 | # wfa_cs.c:4175:57: error: initialization of 'caStaGetEventDetails_t *' {aka 'struct ca_sta_get_event_details *'} from incompatible pointer type 'caStaMngServ_t *' {aka 'struct ca_sta_manage_service *'} [-Wincompatible-pointer-types] | 44 | # wfa_cs.c:4175:57: error: initialization of 'caStaGetEventDetails_t *' {aka 'struct ca_sta_get_event_details *'} from incompatible pointer type 'caStaMngServ_t *' {aka 'struct ca_sta_manage_service *'} [-Wincompatible-pointer-types] |
44 | CC += "-Wno-error=incompatible-pointer-types" | 45 | CFLAGS += "-Wno-error=incompatible-pointer-types" |
46 | |||
47 | export EXTRA_CFLAGS = "${CFLAGS}" | ||
diff --git a/meta-oe/recipes-connectivity/zeromq/cppzmq_4.10.0.bb b/meta-oe/recipes-connectivity/zeromq/cppzmq_4.11.0.bb index e411e6efc0..012dbe5f57 100644 --- a/meta-oe/recipes-connectivity/zeromq/cppzmq_4.10.0.bb +++ b/meta-oe/recipes-connectivity/zeromq/cppzmq_4.11.0.bb | |||
@@ -4,7 +4,7 @@ LICENSE = "MIT" | |||
4 | LIC_FILES_CHKSUM = "file://LICENSE;md5=db174eaf7b55a34a7c89551197f66e94" | 4 | LIC_FILES_CHKSUM = "file://LICENSE;md5=db174eaf7b55a34a7c89551197f66e94" |
5 | DEPENDS = "zeromq" | 5 | DEPENDS = "zeromq" |
6 | 6 | ||
7 | SRCREV = "c94c20743ed7d4aa37835a5c46567ab0790d4acc" | 7 | SRCREV = "3bcbd9dad2f57180aacd4b4aea292a74f0de7ef4" |
8 | 8 | ||
9 | SRC_URI = "git://github.com/zeromq/cppzmq.git;branch=master;protocol=https" | 9 | SRC_URI = "git://github.com/zeromq/cppzmq.git;branch=master;protocol=https" |
10 | 10 | ||
@@ -14,3 +14,5 @@ inherit cmake | |||
14 | EXTRA_OECMAKE = "-DCPPZMQ_BUILD_TESTS=OFF" | 14 | EXTRA_OECMAKE = "-DCPPZMQ_BUILD_TESTS=OFF" |
15 | 15 | ||
16 | ALLOW_EMPTY:${PN} = "1" | 16 | ALLOW_EMPTY:${PN} = "1" |
17 | |||
18 | BBCLASSEXTEND = "native nativesdk" | ||
diff --git a/meta-oe/recipes-core/mm-common/mm-common_1.0.6.bb b/meta-oe/recipes-core/mm-common/mm-common_1.0.7.bb index a252a6b48e..cb1b710954 100644 --- a/meta-oe/recipes-core/mm-common/mm-common_1.0.6.bb +++ b/meta-oe/recipes-core/mm-common/mm-common_1.0.7.bb | |||
@@ -1,6 +1,6 @@ | |||
1 | SUMMARY = "Common GNOME build files for C++ bindings" | 1 | SUMMARY = "Common GNOME build files for C++ bindings" |
2 | LICENSE = "GPL-2.0-only" | 2 | LICENSE = "GPL-2.0-only" |
3 | LIC_FILES_CHKSUM = "file://COPYING;md5=751419260aa954499f7abaabaa882bbe" | 3 | LIC_FILES_CHKSUM = "file://COPYING;md5=570a9b3749dd0463a1778803b12a6dce" |
4 | 4 | ||
5 | 5 | ||
6 | inherit gnomebase | 6 | inherit gnomebase |
@@ -8,7 +8,7 @@ inherit gnomebase | |||
8 | # All the recipe does is stage python and shell script, some autotools files; nothing is compiled. | 8 | # All the recipe does is stage python and shell script, some autotools files; nothing is compiled. |
9 | inherit allarch | 9 | inherit allarch |
10 | 10 | ||
11 | SRC_URI[archive.sha256sum] = "b55c46037dbcdabc5cee3b389ea11cc3910adb68ebe883e9477847aa660862e7" | 11 | SRC_URI[archive.sha256sum] = "494abfce781418259b1e9d8888c73af4de4b6f3be36cc75d9baa8baa0f2a7a39" |
12 | 12 | ||
13 | BBCLASSEXTEND = "native nativesdk" | 13 | BBCLASSEXTEND = "native nativesdk" |
14 | 14 | ||
diff --git a/meta-oe/recipes-core/opencl/clpeak_1.1.4.bb b/meta-oe/recipes-core/opencl/clpeak_1.1.5.bb index 59f807b7ae..a765f1530f 100644 --- a/meta-oe/recipes-core/opencl/clpeak_1.1.4.bb +++ b/meta-oe/recipes-core/opencl/clpeak_1.1.5.bb | |||
@@ -6,7 +6,7 @@ SRC_URI = "git://github.com/krrishnarraj/clpeak.git;protocol=https;branch=master | |||
6 | LICENSE = "Apache-2.0" | 6 | LICENSE = "Apache-2.0" |
7 | LIC_FILES_CHKSUM = "file://LICENSE;md5=86d3f3a95c324c9479bd8986968f4327" | 7 | LIC_FILES_CHKSUM = "file://LICENSE;md5=86d3f3a95c324c9479bd8986968f4327" |
8 | 8 | ||
9 | SRCREV = "527695de8393a3144863a0a07f9b92f1c734d1c4" | 9 | SRCREV = "b2e647ffb8f42aa22ce4b0194d6ef6d16d5002b0" |
10 | 10 | ||
11 | 11 | ||
12 | inherit cmake | 12 | inherit cmake |
diff --git a/meta-oe/recipes-devtools/android-tools/android-tools_5.1.1.r37.bb b/meta-oe/recipes-devtools/android-tools/android-tools_5.1.1.r37.bb index ff83b6c2ee..c04a1ef8c4 100644 --- a/meta-oe/recipes-devtools/android-tools/android-tools_5.1.1.r37.bb +++ b/meta-oe/recipes-devtools/android-tools/android-tools_5.1.1.r37.bb | |||
@@ -187,8 +187,3 @@ FILES:${PN}-fstools = "\ | |||
187 | " | 187 | " |
188 | 188 | ||
189 | BBCLASSEXTEND = "native" | 189 | BBCLASSEXTEND = "native" |
190 | |||
191 | # http://errors.yoctoproject.org/Errors/Details/766881/ | ||
192 | # android-tools/5.1.1.r37/git/system/core/adb/adb_auth_host.c:86:23: error: passing argument 2 of 'RSA_get0_key' from incompatible pointer type [-Wincompatible-pointer-types] | ||
193 | # android-tools/5.1.1.r37/git/system/core/adb/adb_auth_host.c:86:27: error: passing argument 3 of 'RSA_get0_key' from incompatible pointer type [-Wincompatible-pointer-types] | ||
194 | CC += "-Wno-error=incompatible-pointer-types" | ||
diff --git a/meta-oe/recipes-devtools/ctags/ctags_6.2.20250608.0.bb b/meta-oe/recipes-devtools/ctags/ctags_6.2.20250615.0.bb index 845a78da76..c794278f57 100644 --- a/meta-oe/recipes-devtools/ctags/ctags_6.2.20250608.0.bb +++ b/meta-oe/recipes-devtools/ctags/ctags_6.2.20250615.0.bb | |||
@@ -14,7 +14,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=0636e73ff0215e8d672dc4c32c317bb3" | |||
14 | 14 | ||
15 | inherit autotools-brokensep pkgconfig manpages | 15 | inherit autotools-brokensep pkgconfig manpages |
16 | 16 | ||
17 | SRCREV = "c06d333b3162660694b26604a364cdab89e2010e" | 17 | SRCREV = "0644fb80a8250cc3ca6ba00037e490768fe4492e" |
18 | SRC_URI = "git://github.com/universal-ctags/ctags;branch=master;protocol=https;tag=p${PV}" | 18 | SRC_URI = "git://github.com/universal-ctags/ctags;branch=master;protocol=https;tag=p${PV}" |
19 | 19 | ||
20 | 20 | ||
diff --git a/meta-oe/recipes-devtools/nodejs/nodejs_22.16.0.bb b/meta-oe/recipes-devtools/nodejs/nodejs_22.16.0.bb index 4bc829f140..679acafabf 100644 --- a/meta-oe/recipes-devtools/nodejs/nodejs_22.16.0.bb +++ b/meta-oe/recipes-devtools/nodejs/nodejs_22.16.0.bb | |||
@@ -6,10 +6,11 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=b4f41dcacabc8f07b9ca7dee2f188a00" | |||
6 | CVE_PRODUCT = "nodejs node.js" | 6 | CVE_PRODUCT = "nodejs node.js" |
7 | 7 | ||
8 | DEPENDS = "openssl openssl-native file-replacement-native python3-packaging-native" | 8 | DEPENDS = "openssl openssl-native file-replacement-native python3-packaging-native" |
9 | DEPENDS:append:class-target = " qemu-native" | ||
10 | DEPENDS:append:class-native = " c-ares-native" | 9 | DEPENDS:append:class-native = " c-ares-native" |
11 | 10 | ||
12 | inherit pkgconfig python3native qemu ptest siteinfo | 11 | inherit pkgconfig python3native ptest siteinfo |
12 | inherit_defer ${@bb.utils.contains('HOST_AND_TARGET_SAME_WIDTH', '0', 'qemu', '', d)} | ||
13 | |||
13 | 14 | ||
14 | COMPATIBLE_MACHINE:armv4 = "(!.*armv4).*" | 15 | COMPATIBLE_MACHINE:armv4 = "(!.*armv4).*" |
15 | COMPATIBLE_MACHINE:armv5 = "(!.*armv5).*" | 16 | COMPATIBLE_MACHINE:armv5 = "(!.*armv5).*" |
@@ -108,11 +109,11 @@ python do_create_v8_qemu_wrapper () { | |||
108 | on the host.""" | 109 | on the host.""" |
109 | qemu_libdirs = [d.expand('${STAGING_DIR_HOST}${libdir}'), | 110 | qemu_libdirs = [d.expand('${STAGING_DIR_HOST}${libdir}'), |
110 | d.expand('${STAGING_DIR_HOST}${base_libdir}')] | 111 | d.expand('${STAGING_DIR_HOST}${base_libdir}')] |
111 | qemu_cmd = qemu_wrapper_cmdline(d, d.getVar('STAGING_DIR_HOST'), | 112 | qemu_cmd = "" |
112 | qemu_libdirs) | ||
113 | 113 | ||
114 | if d.getVar("HOST_AND_TARGET_SAME_WIDTH") == "1": | 114 | if d.getVar("HOST_AND_TARGET_SAME_WIDTH") == "0": |
115 | qemu_cmd = "" | 115 | qemu_cmd = qemu_wrapper_cmdline(d, d.getVar('STAGING_DIR_HOST'), |
116 | qemu_libdirs) | ||
116 | 117 | ||
117 | wrapper_path = d.expand('${B}/v8-qemu-wrapper.sh') | 118 | wrapper_path = d.expand('${B}/v8-qemu-wrapper.sh') |
118 | with open(wrapper_path, 'w') as wrapper_file: | 119 | with open(wrapper_path, 'w') as wrapper_file: |
@@ -209,6 +210,7 @@ python __anonymous () { | |||
209 | # 32 bit target and 64 bit host (x86-64 or aarch64) have different bit width | 210 | # 32 bit target and 64 bit host (x86-64 or aarch64) have different bit width |
210 | if d.getVar("SITEINFO_BITS") == "32" and "64" in d.getVar("BUILD_ARCH"): | 211 | if d.getVar("SITEINFO_BITS") == "32" and "64" in d.getVar("BUILD_ARCH"): |
211 | d.setVar("HOST_AND_TARGET_SAME_WIDTH", "0") | 212 | d.setVar("HOST_AND_TARGET_SAME_WIDTH", "0") |
213 | d.appendVar("DEPENDS:class-target", " qemu-native") | ||
212 | else: | 214 | else: |
213 | d.setVar("HOST_AND_TARGET_SAME_WIDTH", "1") | 215 | d.setVar("HOST_AND_TARGET_SAME_WIDTH", "1") |
214 | } | 216 | } |
diff --git a/meta-oe/recipes-devtools/php/php_8.4.6.bb b/meta-oe/recipes-devtools/php/php_8.4.8.bb index 5118ddd6ab..f38a407968 100644 --- a/meta-oe/recipes-devtools/php/php_8.4.6.bb +++ b/meta-oe/recipes-devtools/php/php_8.4.8.bb | |||
@@ -1,5 +1,5 @@ | |||
1 | SUMMARY = "A server-side, HTML-embedded scripting language" | 1 | SUMMARY = "A server-side, HTML-embedded scripting language" |
2 | HOMEPAGE = "http://www.php.net" | 2 | HOMEPAGE = "https://www.php.net" |
3 | SECTION = "console/network" | 3 | SECTION = "console/network" |
4 | 4 | ||
5 | LICENSE = "PHP-3.0" | 5 | LICENSE = "PHP-3.0" |
@@ -29,7 +29,7 @@ SRC_URI:append:class-target = " \ | |||
29 | 29 | ||
30 | S = "${UNPACKDIR}/php-${PV}" | 30 | S = "${UNPACKDIR}/php-${PV}" |
31 | 31 | ||
32 | SRC_URI[sha256sum] = "9cf2734509b603f6589617ab52a9712a03e0fe059951cddd2d4623df4bf7c6c6" | 32 | SRC_URI[sha256sum] = "36569c64dd1499e570c436603b641eee7cde4af576af786597d0ee711b3a3a8a" |
33 | 33 | ||
34 | CVE_STATUS_GROUPS += "CVE_STATUS_PHP" | 34 | CVE_STATUS_GROUPS += "CVE_STATUS_PHP" |
35 | CVE_STATUS_PHP[status] = "fixed-version: The name of this product is exactly the same as github.com/emlog/emlog. CVE can be safely ignored." | 35 | CVE_STATUS_PHP[status] = "fixed-version: The name of this product is exactly the same as github.com/emlog/emlog. CVE can be safely ignored." |
diff --git a/meta-oe/recipes-devtools/protobuf/protobuf/0001-examples-Makefile-respect-CXX-LDFLAGS-variables-fix-.patch b/meta-oe/recipes-devtools/protobuf/protobuf/0001-examples-Makefile-respect-CXX-LDFLAGS-variables-fix-.patch index 7a8906a9a4..53fdf7dece 100644 --- a/meta-oe/recipes-devtools/protobuf/protobuf/0001-examples-Makefile-respect-CXX-LDFLAGS-variables-fix-.patch +++ b/meta-oe/recipes-devtools/protobuf/protobuf/0001-examples-Makefile-respect-CXX-LDFLAGS-variables-fix-.patch | |||
@@ -47,12 +47,12 @@ index f7ee9b116..8cd1359e2 100644 | |||
47 | 47 | ||
48 | add_person_cpp: add_person.cc protoc_middleman | 48 | add_person_cpp: add_person.cc protoc_middleman |
49 | pkg-config --cflags protobuf # fails if protobuf is not installed | 49 | pkg-config --cflags protobuf # fails if protobuf is not installed |
50 | - c++ -std=c++14 add_person.cc addressbook.pb.cc -o add_person_cpp `pkg-config --cflags --libs protobuf` | 50 | - c++ add_person.cc addressbook.pb.cc -o add_person_cpp `pkg-config --cflags --libs protobuf` |
51 | + $(CXX) $(CXXFLAGS) $(LDFLAGS) ../src/google/protobuf/.libs/timestamp.pb.o $(PROTOBUF) add_person.cc addressbook.pb.cc -o add_person_cpp | 51 | + $(CXX) $(CXXFLAGS) $(LDFLAGS) ../src/google/protobuf/.libs/timestamp.pb.o $(PROTOBUF) add_person.cc addressbook.pb.cc -o add_person_cpp |
52 | 52 | ||
53 | list_people_cpp: list_people.cc protoc_middleman | 53 | list_people_cpp: list_people.cc protoc_middleman |
54 | pkg-config --cflags protobuf # fails if protobuf is not installed | 54 | pkg-config --cflags protobuf # fails if protobuf is not installed |
55 | - c++ -std=c++14 list_people.cc addressbook.pb.cc -o list_people_cpp `pkg-config --cflags --libs protobuf` | 55 | - c++ list_people.cc addressbook.pb.cc -o list_people_cpp `pkg-config --cflags --libs protobuf` |
56 | + $(CXX) $(CXXFLAGS) $(LDFLAGS) ../src/google/protobuf/.libs/timestamp.pb.o $(PROTOBUF) list_people.cc addressbook.pb.cc -o list_people_cpp | 56 | + $(CXX) $(CXXFLAGS) $(LDFLAGS) ../src/google/protobuf/.libs/timestamp.pb.o $(PROTOBUF) list_people.cc addressbook.pb.cc -o list_people_cpp |
57 | 57 | ||
58 | add_person_dart: add_person.dart protoc_middleman_dart | 58 | add_person_dart: add_person.dart protoc_middleman_dart |
diff --git a/meta-oe/recipes-devtools/protobuf/protobuf_5.29.4.bb b/meta-oe/recipes-devtools/protobuf/protobuf_6.31.1.bb index 61aff1da28..90be1179aa 100644 --- a/meta-oe/recipes-devtools/protobuf/protobuf_5.29.4.bb +++ b/meta-oe/recipes-devtools/protobuf/protobuf_6.31.1.bb | |||
@@ -7,20 +7,18 @@ SECTION = "console/tools" | |||
7 | LICENSE = "BSD-3-Clause & MIT" | 7 | LICENSE = "BSD-3-Clause & MIT" |
8 | LIC_FILES_CHKSUM = " \ | 8 | LIC_FILES_CHKSUM = " \ |
9 | file://LICENSE;md5=37b5762e07f0af8c74ce80a8bda4266b \ | 9 | file://LICENSE;md5=37b5762e07f0af8c74ce80a8bda4266b \ |
10 | file://third_party/lunit/LICENSE;md5=99f08e72434dfa34fe0581d3dfb2d7f4 \ | ||
11 | file://third_party/utf8_range/LICENSE;md5=d4974d297231477b2ff507c35d61c13c \ | 10 | file://third_party/utf8_range/LICENSE;md5=d4974d297231477b2ff507c35d61c13c \ |
12 | " | 11 | " |
13 | 12 | ||
14 | DEPENDS = "zlib abseil-cpp jsoncpp" | 13 | DEPENDS = "zlib abseil-cpp jsoncpp" |
15 | DEPENDS:append:class-target = " protobuf-native" | 14 | DEPENDS:append:class-target = " protobuf-native" |
16 | 15 | ||
17 | SRCREV = "1be1c9d0ea6efa2a25bd7b76186844d1669be78a" | 16 | SRCREV = "74211c0dfc2777318ab53c2cd2c317a2ef9012de" |
18 | 17 | ||
19 | SRC_URI = "git://github.com/protocolbuffers/protobuf.git;branch=29.x;protocol=https \ | 18 | SRC_URI = "git://github.com/protocolbuffers/protobuf.git;branch=31.x;protocol=https \ |
20 | file://run-ptest \ | 19 | file://run-ptest \ |
21 | file://0001-examples-Makefile-respect-CXX-LDFLAGS-variables-fix-.patch \ | 20 | file://0001-examples-Makefile-respect-CXX-LDFLAGS-variables-fix-.patch \ |
22 | file://0001-fix-protobuf-native-build-failure-with-gcc-10.patch \ | 21 | file://0001-fix-protobuf-native-build-failure-with-gcc-10.patch \ |
23 | file://0001-utf8_range-add-version-marker-to-library-19009.patch \ | ||
24 | " | 22 | " |
25 | SRC_URI:append:mipsarcho32:toolchain-clang = " file://0001-Fix-build-on-mips-clang.patch " | 23 | SRC_URI:append:mipsarcho32:toolchain-clang = " file://0001-Fix-build-on-mips-clang.patch " |
26 | 24 | ||
diff --git a/meta-oe/recipes-graphics/libglvnd/libglvnd_1.7.0.bb b/meta-oe/recipes-graphics/libglvnd/libglvnd_1.7.0.bb deleted file mode 100644 index f26caf6940..0000000000 --- a/meta-oe/recipes-graphics/libglvnd/libglvnd_1.7.0.bb +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | DESCRIPTION = "libglvnd is a vendor-neutral dispatch layer for arbitrating \ | ||
2 | OpenGL API calls between multiple vendors." | ||
3 | HOMEPAGE = "https://gitlab.freedesktop.org/glvnd/libglvnd" | ||
4 | LICENSE = "MIT & BSD-1-Clause & BSD-3-Clause & GPL-3.0-with-autoconf-exception" | ||
5 | LIC_FILES_CHKSUM = "file://README.md;beginline=323;md5=7ac5f0111f648b92fe5427efeb08e8c4" | ||
6 | |||
7 | SRC_URI = "git://git@gitlab.freedesktop.org/glvnd/libglvnd.git;protocol=https;branch=master" | ||
8 | |||
9 | # v1.5.0 tag | ||
10 | SRCREV = "faa23f21fc677af5792825dc30cb1ccef4bf33a6" | ||
11 | |||
12 | REQUIRED_DISTRO_FEATURES = "opengl" | ||
13 | |||
14 | inherit meson pkgconfig features_check | ||
15 | |||
16 | |||
17 | PACKAGECONFIG ?= "\ | ||
18 | ${@bb.utils.contains('DISTRO_FEATURES', 'x11', 'x11', '', d)} \ | ||
19 | ${@bb.utils.contains('DISTRO_FEATURES', 'opengl', 'egl gles1 gles2', '', d)} \ | ||
20 | ${@bb.utils.contains('DISTRO_FEATURES', 'opengl x11', 'glx', '', d)} \ | ||
21 | " | ||
22 | |||
23 | PACKAGECONFIG[x11] = "-Dx11=enabled,-Dx11=disabled,libx11 libxext xorgproto" | ||
24 | PACKAGECONFIG[glx] = "-Dglx=enabled,-Dglx=disabled,libx11 libxext xorgproto,,libglx-icd" | ||
25 | PACKAGECONFIG[egl] = "-Degl=true,-Degl=false,,libegl-icd" | ||
26 | PACKAGECONFIG[gles1] = "-Dgles1=true,-Dgles1=false," | ||
27 | PACKAGECONFIG[gles2] = "-Dgles2=true,-Dgles2=false," | ||
28 | |||
29 | BBCLASSEXTEND = "native nativesdk" | ||
30 | |||
31 | PROVIDES = " \ | ||
32 | ${@bb.utils.contains('PACKAGECONFIG', 'glx', 'virtual/libgl', '', d)} \ | ||
33 | ${@bb.utils.contains('PACKAGECONFIG', 'gles1', 'virtual/libgles1', '', d)} \ | ||
34 | ${@bb.utils.contains('PACKAGECONFIG', 'gles2', 'virtual/libgles2 virtual/libgles3', '', d)} \ | ||
35 | ${@bb.utils.contains('PACKAGECONFIG', 'egl', 'virtual/egl', '', d)} \ | ||
36 | " | ||
37 | |||
38 | RPROVIDES:${PN} += "${@bb.utils.contains('PACKAGECONFIG', 'egl', 'libegl', '', d)}" | ||
diff --git a/meta-oe/recipes-kernel/drgn/python3-drgn_0.0.31.bb b/meta-oe/recipes-kernel/drgn/python3-drgn_0.0.32.bb index b1ff8d4019..31674ffec0 100644 --- a/meta-oe/recipes-kernel/drgn/python3-drgn_0.0.31.bb +++ b/meta-oe/recipes-kernel/drgn/python3-drgn_0.0.32.bb | |||
@@ -6,7 +6,7 @@ LICENSE = " LGPL-2.1-or-later" | |||
6 | LIC_FILES_CHKSUM = "file://COPYING;md5=7c83d30e99508d6b790eacdd3abab846" | 6 | LIC_FILES_CHKSUM = "file://COPYING;md5=7c83d30e99508d6b790eacdd3abab846" |
7 | 7 | ||
8 | SRC_URI = "git://github.com/osandov/drgn.git;protocol=https;branch=main;tag=v${PV}" | 8 | SRC_URI = "git://github.com/osandov/drgn.git;protocol=https;branch=main;tag=v${PV}" |
9 | SRCREV = "8209a147fb61deed38ca376d063bbff0343ca234" | 9 | SRCREV = "348d6efc5c18e0ae4ef2f3aea50a8edf17cb1fe9" |
10 | 10 | ||
11 | 11 | ||
12 | DEPENDS = "\ | 12 | DEPENDS = "\ |
diff --git a/meta-oe/recipes-kernel/kernel-selftest/kernel-selftest.bb b/meta-oe/recipes-kernel/kernel-selftest/kernel-selftest.bb index 648a5d7c5a..14aa5d0c0c 100644 --- a/meta-oe/recipes-kernel/kernel-selftest/kernel-selftest.bb +++ b/meta-oe/recipes-kernel/kernel-selftest/kernel-selftest.bb | |||
@@ -45,8 +45,6 @@ do_compile[depends] += "virtual/kernel:do_install" | |||
45 | 45 | ||
46 | inherit linux-kernel-base module-base kernel-arch ptest siteinfo | 46 | inherit linux-kernel-base module-base kernel-arch ptest siteinfo |
47 | 47 | ||
48 | S = "${UNPACKDIR}/${BP}" | ||
49 | |||
50 | DEBUG_PREFIX_MAP:remove = "-fcanon-prefix-map" | 48 | DEBUG_PREFIX_MAP:remove = "-fcanon-prefix-map" |
51 | 49 | ||
52 | TEST_LIST = "\ | 50 | TEST_LIST = "\ |