diff options
author | Konstantin Shemyak <konstantin.shemyak@ge.com> | 2018-02-19 16:35:54 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-02-24 10:31:46 +0000 |
commit | 2e07b1c0bb6e88cd0338b477ab9e69b1fe605e6c (patch) | |
tree | 8319c38b5618fbd105441c10fec3117113d708c3 | |
parent | 6c0c3220aa82e3cace95a1184592985163bc0efd (diff) | |
download | poky-2e07b1c0bb6e88cd0338b477ab9e69b1fe605e6c.tar.gz |
cve-check-tool: correctly exported web proxies
The binary 'cve-check-update' downloads the CVE database from the Internet.
If the system is behind a web proxy, the download fails, as proxy-related
variables are not exported.
In turn, 'cve-check-tool' does not connect to the network and correspondingly
does not need exported proxies.
Exported all proxy-related environment variables to 'cve-check-update' and
removed the unneeded export from 'cve-check-tool'.
(From OE-Core rev: 17db210975c740aff12732c511cf4fb32b507365)
Signed-off-by: Konstantin Shemyak <konstantin.shemyak@ge.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r-- | meta/classes/cve-check.bbclass | 3 | ||||
-rw-r--r-- | meta/recipes-devtools/cve-check-tool/cve-check-tool_5.6.4.bb | 1 |
2 files changed, 1 insertions, 3 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index d8087dd7c6..537659df12 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass | |||
@@ -184,9 +184,6 @@ def check_cves(d, patched_cves): | |||
184 | bb.note("Recipe has been whitelisted, skipping check") | 184 | bb.note("Recipe has been whitelisted, skipping check") |
185 | return ([], []) | 185 | return ([], []) |
186 | 186 | ||
187 | # It is needed to export the proxies to download the database using HTTP | ||
188 | bb.utils.export_proxies(d) | ||
189 | |||
190 | try: | 187 | try: |
191 | # Write the faux CSV file to be used with cve-check-tool | 188 | # Write the faux CSV file to be used with cve-check-tool |
192 | fd, faux = tempfile.mkstemp(prefix="cve-faux-") | 189 | fd, faux = tempfile.mkstemp(prefix="cve-faux-") |
diff --git a/meta/recipes-devtools/cve-check-tool/cve-check-tool_5.6.4.bb b/meta/recipes-devtools/cve-check-tool/cve-check-tool_5.6.4.bb index 7b70daa323..1c84fb1cf2 100644 --- a/meta/recipes-devtools/cve-check-tool/cve-check-tool_5.6.4.bb +++ b/meta/recipes-devtools/cve-check-tool/cve-check-tool_5.6.4.bb | |||
@@ -41,6 +41,7 @@ do_populate_cve_db() { | |||
41 | [ -z "${cve_dir}" ] && cve_dir="${DL_DIR}/CVE_CHECK" | 41 | [ -z "${cve_dir}" ] && cve_dir="${DL_DIR}/CVE_CHECK" |
42 | [ -z "${cve_file}" ] && cve_file="${TMPDIR}/cve_check" | 42 | [ -z "${cve_file}" ] && cve_file="${TMPDIR}/cve_check" |
43 | 43 | ||
44 | unused="${@bb.utils.export_proxies(d)}" | ||
44 | bbdebug 2 "Updating cve-check-tool database located in $cve_dir" | 45 | bbdebug 2 "Updating cve-check-tool database located in $cve_dir" |
45 | # --cacert works around curl-native not finding the CA bundle | 46 | # --cacert works around curl-native not finding the CA bundle |
46 | if cve-check-update --cacert ${sysconfdir}/ssl/certs/ca-certificates.crt -d "$cve_dir" ; then | 47 | if cve-check-update --cacert ${sysconfdir}/ssl/certs/ca-certificates.crt -d "$cve_dir" ; then |