diff options
| author | Aleksandar Nikolic <aleksandar.nikolic010@gmail.com> | 2024-06-09 21:56:54 +0200 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2024-08-01 06:08:09 -0700 |
| commit | 19f249c4f15fe006305bd16f94d06f155cf8ddfb (patch) | |
| tree | 0fc0e11e77c72964b3bf609c08be2c86e19444c6 | |
| parent | f999c32c8b18c1e1b5573fe79cb4b5a729c2d1a4 (diff) | |
| download | poky-19f249c4f15fe006305bd16f94d06f155cf8ddfb.tar.gz | |
cve-check: Introduce CVE_CHECK_MANIFEST_JSON_SUFFIX
The variable contains the suffix of the CVE JSON manifest file.
By default, this variable is set to 'json', so the current behavior
is not changed, but enables developers to use some other suffix,
e.g., cve.json (similar to spdx.json).
(From OE-Core rev: 0cb103430d0505a3cd135e727379489bc3fe6e46)
Signed-off-by: Aleksandar Nikolic <an010@live.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit d99eee76923659c0b95bf9ef415ae5d44f736d01)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
| -rw-r--r-- | meta/classes/cve-check.bbclass | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 56ba8bceef..93a2a1413d 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass | |||
| @@ -49,7 +49,8 @@ CVE_CHECK_DIR ??= "${DEPLOY_DIR}/cve" | |||
| 49 | CVE_CHECK_RECIPE_FILE ?= "${CVE_CHECK_DIR}/${PN}" | 49 | CVE_CHECK_RECIPE_FILE ?= "${CVE_CHECK_DIR}/${PN}" |
| 50 | CVE_CHECK_RECIPE_FILE_JSON ?= "${CVE_CHECK_DIR}/${PN}_cve.json" | 50 | CVE_CHECK_RECIPE_FILE_JSON ?= "${CVE_CHECK_DIR}/${PN}_cve.json" |
| 51 | CVE_CHECK_MANIFEST ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}.cve" | 51 | CVE_CHECK_MANIFEST ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}.cve" |
| 52 | CVE_CHECK_MANIFEST_JSON ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}.json" | 52 | CVE_CHECK_MANIFEST_JSON_SUFFIX ?= "json" |
| 53 | CVE_CHECK_MANIFEST_JSON ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}.${CVE_CHECK_MANIFEST_JSON_SUFFIX}" | ||
| 53 | CVE_CHECK_COPY_FILES ??= "1" | 54 | CVE_CHECK_COPY_FILES ??= "1" |
| 54 | CVE_CHECK_CREATE_MANIFEST ??= "1" | 55 | CVE_CHECK_CREATE_MANIFEST ??= "1" |
| 55 | 56 | ||
| @@ -278,7 +279,8 @@ python cve_check_write_rootfs_manifest () { | |||
| 278 | bb.plain("Image CVE report stored in: %s" % manifest_name) | 279 | bb.plain("Image CVE report stored in: %s" % manifest_name) |
| 279 | 280 | ||
| 280 | if enable_json: | 281 | if enable_json: |
| 281 | link_path = os.path.join(deploy_dir, "%s.json" % link_name) | 282 | manifest_name_suffix = d.getVar("CVE_CHECK_MANIFEST_JSON_SUFFIX") |
| 283 | link_path = os.path.join(deploy_dir, "%s.%s" % (link_name, manifest_name_suffix)) | ||
| 282 | manifest_name = d.getVar("CVE_CHECK_MANIFEST_JSON") | 284 | manifest_name = d.getVar("CVE_CHECK_MANIFEST_JSON") |
| 283 | 285 | ||
| 284 | with open(manifest_name, "w") as f: | 286 | with open(manifest_name, "w") as f: |
