diff options
author | Jermain Horsman <jermain.horsman@nedap.com> | 2023-01-16 12:46:37 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2023-01-18 16:42:28 +0000 |
commit | 14a852c273c43dbf04d6502c5cbbe5768d165c5d (patch) | |
tree | fe54c21591d6f520bfbba6da9ee99e5c89283ec9 /meta/classes | |
parent | 59d7bc14ef246097e128c57a163389a088d63ff9 (diff) | |
download | poky-14a852c273c43dbf04d6502c5cbbe5768d165c5d.tar.gz |
cve-check: write the cve manifest to IMGDEPLOYDIR
When building an image cve_check_write_rootfs_manifest() would sometimes fail
with a FileNotFoundError when writing the manifest.cve due to the parent
directory (DEPLOY_DIR_IMAGE) not (yet) existing.
The image task will provide the manifest in the deploy directory afterwards,
so other recipes depending on the manifest being in DEPLOY_DIR_IMAGE should
continue to function properly.
(From OE-Core rev: 00fb2aae22ce0d7ff5f3f8766fa770eeb4e73483)
Signed-off-by: Jermain Horsman <jermain.horsman@nedap.com>
Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes')
-rw-r--r-- | meta/classes/cve-check.bbclass | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 4b4ea7893e..41fdf8363f 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass | |||
@@ -48,8 +48,8 @@ CVE_CHECK_LOG_JSON ?= "${T}/cve.json" | |||
48 | CVE_CHECK_DIR ??= "${DEPLOY_DIR}/cve" | 48 | CVE_CHECK_DIR ??= "${DEPLOY_DIR}/cve" |
49 | CVE_CHECK_RECIPE_FILE ?= "${CVE_CHECK_DIR}/${PN}" | 49 | CVE_CHECK_RECIPE_FILE ?= "${CVE_CHECK_DIR}/${PN}" |
50 | CVE_CHECK_RECIPE_FILE_JSON ?= "${CVE_CHECK_DIR}/${PN}_cve.json" | 50 | CVE_CHECK_RECIPE_FILE_JSON ?= "${CVE_CHECK_DIR}/${PN}_cve.json" |
51 | CVE_CHECK_MANIFEST ?= "${DEPLOY_DIR_IMAGE}/${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.cve" | 51 | CVE_CHECK_MANIFEST ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.cve" |
52 | CVE_CHECK_MANIFEST_JSON ?= "${DEPLOY_DIR_IMAGE}/${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.json" | 52 | CVE_CHECK_MANIFEST_JSON ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.json" |
53 | CVE_CHECK_COPY_FILES ??= "1" | 53 | CVE_CHECK_COPY_FILES ??= "1" |
54 | CVE_CHECK_CREATE_MANIFEST ??= "1" | 54 | CVE_CHECK_CREATE_MANIFEST ??= "1" |
55 | 55 | ||
@@ -202,7 +202,7 @@ python cve_check_write_rootfs_manifest () { | |||
202 | recipies.add(pkg_data["PN"]) | 202 | recipies.add(pkg_data["PN"]) |
203 | 203 | ||
204 | bb.note("Writing rootfs CVE manifest") | 204 | bb.note("Writing rootfs CVE manifest") |
205 | deploy_dir = d.getVar("DEPLOY_DIR_IMAGE") | 205 | deploy_dir = d.getVar("IMGDEPLOYDIR") |
206 | link_name = d.getVar("IMAGE_LINK_NAME") | 206 | link_name = d.getVar("IMAGE_LINK_NAME") |
207 | 207 | ||
208 | json_data = {"version":"1", "package": []} | 208 | json_data = {"version":"1", "package": []} |