diff options
author | akuster <akuster808@gmail.com> | 2021-02-08 05:51:29 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-03-10 00:24:25 +0000 |
commit | d63c5f0d45698bba2313738c4bd45a2764a2f859 (patch) | |
tree | 724c9e4328a2611c4738fbc464fbe11605207807 /meta/classes/cve-check.bbclass | |
parent | ebecd278de8a27a95ae7d5757c34bade18133311 (diff) | |
download | poky-d63c5f0d45698bba2313738c4bd45a2764a2f859.tar.gz |
cve-check.bbclass: add layer to cve log
Lets include whcih layer a package belongs to and
add it to the cve logs
(From OE-Core rev: ede1c9faae48c8d9107cbdc2fcf61d7af60d32e5)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 00d965bb42dc427749a4c3985af56ceffff80457)
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes/cve-check.bbclass')
-rw-r--r-- | meta/classes/cve-check.bbclass | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index ed86403b6b..061af7a276 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass | |||
@@ -335,6 +335,9 @@ def cve_write_data(d, patched, unpatched, whitelisted, cve_data): | |||
335 | """ | 335 | """ |
336 | 336 | ||
337 | cve_file = d.getVar("CVE_CHECK_LOG") | 337 | cve_file = d.getVar("CVE_CHECK_LOG") |
338 | fdir_name = d.getVar("FILE_DIRNAME") | ||
339 | layer = fdir_name.split("/")[-3] | ||
340 | |||
338 | nvd_link = "https://web.nvd.nist.gov/view/vuln/detail?vulnId=" | 341 | nvd_link = "https://web.nvd.nist.gov/view/vuln/detail?vulnId=" |
339 | write_string = "" | 342 | write_string = "" |
340 | unpatched_cves = [] | 343 | unpatched_cves = [] |
@@ -344,6 +347,7 @@ def cve_write_data(d, patched, unpatched, whitelisted, cve_data): | |||
344 | is_patched = cve in patched | 347 | is_patched = cve in patched |
345 | if is_patched and (d.getVar("CVE_CHECK_REPORT_PATCHED") != "1"): | 348 | if is_patched and (d.getVar("CVE_CHECK_REPORT_PATCHED") != "1"): |
346 | continue | 349 | continue |
350 | write_string += "LAYER: %s\n" % layer | ||
347 | write_string += "PACKAGE NAME: %s\n" % d.getVar("PN") | 351 | write_string += "PACKAGE NAME: %s\n" % d.getVar("PN") |
348 | write_string += "PACKAGE VERSION: %s%s\n" % (d.getVar("EXTENDPE"), d.getVar("PV")) | 352 | write_string += "PACKAGE VERSION: %s%s\n" % (d.getVar("EXTENDPE"), d.getVar("PV")) |
349 | write_string += "CVE: %s\n" % cve | 353 | write_string += "CVE: %s\n" % cve |