diff options
| author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-16 20:33:47 +0000 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-21 23:37:27 +0000 |
| commit | 71ef3191938da772b07274165dd3a85c2ed011f1 (patch) | |
| tree | fd830ada451fec669352cb0dfc1bb316ea9cefd8 /meta/classes | |
| parent | 5a3d6c7bda0f158473c82d1c38ae2df26192dccb (diff) | |
| download | poky-71ef3191938da772b07274165dd3a85c2ed011f1.tar.gz | |
meta/scripts: Automated conversion of OE renamed variables
(From OE-Core rev: aa52af4518604b5bf13f3c5e885113bf868d6c81)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes')
| -rw-r--r-- | meta/classes/archiver.bbclass | 2 | ||||
| -rw-r--r-- | meta/classes/buildhistory.bbclass | 4 | ||||
| -rw-r--r-- | meta/classes/cve-check.bbclass | 10 | ||||
| -rw-r--r-- | meta/classes/insane.bbclass | 4 | ||||
| -rw-r--r-- | meta/classes/populate_sdk_ext.bbclass | 12 | ||||
| -rw-r--r-- | meta/classes/sstate.bbclass | 26 | ||||
| -rw-r--r-- | meta/classes/staging.bbclass | 4 |
7 files changed, 31 insertions, 31 deletions
diff --git a/meta/classes/archiver.bbclass b/meta/classes/archiver.bbclass index e830900574..c19c770d11 100644 --- a/meta/classes/archiver.bbclass +++ b/meta/classes/archiver.bbclass | |||
| @@ -63,7 +63,7 @@ ARCHIVER_WORKDIR = "${WORKDIR}/archiver-work/" | |||
| 63 | # When producing a combined mirror directory, allow duplicates for the case | 63 | # When producing a combined mirror directory, allow duplicates for the case |
| 64 | # where multiple recipes use the same SRC_URI. | 64 | # where multiple recipes use the same SRC_URI. |
| 65 | ARCHIVER_COMBINED_MIRRORDIR = "${ARCHIVER_TOPDIR}/mirror" | 65 | ARCHIVER_COMBINED_MIRRORDIR = "${ARCHIVER_TOPDIR}/mirror" |
| 66 | SSTATE_DUPWHITELIST += "${DEPLOY_DIR_SRC}/mirror" | 66 | SSTATE_ALLOW_OVERLAP_FILES += "${DEPLOY_DIR_SRC}/mirror" |
| 67 | 67 | ||
| 68 | do_dumpdata[dirs] = "${ARCHIVER_OUTDIR}" | 68 | do_dumpdata[dirs] = "${ARCHIVER_OUTDIR}" |
| 69 | do_ar_recipe[dirs] = "${ARCHIVER_OUTDIR}" | 69 | do_ar_recipe[dirs] = "${ARCHIVER_OUTDIR}" |
diff --git a/meta/classes/buildhistory.bbclass b/meta/classes/buildhistory.bbclass index 05f66d10b9..49797a6701 100644 --- a/meta/classes/buildhistory.bbclass +++ b/meta/classes/buildhistory.bbclass | |||
| @@ -792,8 +792,8 @@ def buildhistory_get_sdkvars(d): | |||
| 792 | sdkvars = "DISTRO DISTRO_VERSION SDK_NAME SDK_VERSION SDKMACHINE SDKIMAGE_FEATURES TOOLCHAIN_HOST_TASK TOOLCHAIN_TARGET_TASK BAD_RECOMMENDATIONS NO_RECOMMENDATIONS PACKAGE_EXCLUDE" | 792 | sdkvars = "DISTRO DISTRO_VERSION SDK_NAME SDK_VERSION SDKMACHINE SDKIMAGE_FEATURES TOOLCHAIN_HOST_TASK TOOLCHAIN_TARGET_TASK BAD_RECOMMENDATIONS NO_RECOMMENDATIONS PACKAGE_EXCLUDE" |
| 793 | if d.getVar('BB_CURRENTTASK') == 'populate_sdk_ext': | 793 | if d.getVar('BB_CURRENTTASK') == 'populate_sdk_ext': |
| 794 | # Extensible SDK uses some additional variables | 794 | # Extensible SDK uses some additional variables |
| 795 | sdkvars += " SDK_LOCAL_CONF_WHITELIST SDK_LOCAL_CONF_BLACKLIST SDK_INHERIT_BLACKLIST SDK_UPDATE_URL SDK_EXT_TYPE SDK_RECRDEP_TASKS SDK_INCLUDE_PKGDATA SDK_INCLUDE_TOOLCHAIN" | 795 | sdkvars += " ESDK_LOCALCONF_ALLOW ESDK_LOCALCONF_REMOVE ESDK_CLASS_INHERIT_DISABLE SDK_UPDATE_URL SDK_EXT_TYPE SDK_RECRDEP_TASKS SDK_INCLUDE_PKGDATA SDK_INCLUDE_TOOLCHAIN" |
| 796 | listvars = "SDKIMAGE_FEATURES BAD_RECOMMENDATIONS PACKAGE_EXCLUDE SDK_LOCAL_CONF_WHITELIST SDK_LOCAL_CONF_BLACKLIST SDK_INHERIT_BLACKLIST" | 796 | listvars = "SDKIMAGE_FEATURES BAD_RECOMMENDATIONS PACKAGE_EXCLUDE ESDK_LOCALCONF_ALLOW ESDK_LOCALCONF_REMOVE ESDK_CLASS_INHERIT_DISABLE" |
| 797 | return outputvars(sdkvars, listvars, d) | 797 | return outputvars(sdkvars, listvars, d) |
| 798 | 798 | ||
| 799 | 799 | ||
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 21d3da7974..2d69aeba4b 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass | |||
| @@ -44,14 +44,14 @@ CVE_CHECK_CREATE_MANIFEST ??= "1" | |||
| 44 | CVE_CHECK_REPORT_PATCHED ??= "1" | 44 | CVE_CHECK_REPORT_PATCHED ??= "1" |
| 45 | 45 | ||
| 46 | # Whitelist for packages (PN) | 46 | # Whitelist for packages (PN) |
| 47 | CVE_CHECK_PN_WHITELIST ?= "" | 47 | CVE_CHECK_SKIP_RECIPE ?= "" |
| 48 | 48 | ||
| 49 | # Whitelist for CVE. If a CVE is found, then it is considered patched. | 49 | # Whitelist for CVE. If a CVE is found, then it is considered patched. |
| 50 | # The value is a string containing space separated CVE values: | 50 | # The value is a string containing space separated CVE values: |
| 51 | # | 51 | # |
| 52 | # CVE_CHECK_WHITELIST = 'CVE-2014-2524 CVE-2018-1234' | 52 | # CVE_CHECK_IGNORE = 'CVE-2014-2524 CVE-2018-1234' |
| 53 | # | 53 | # |
| 54 | CVE_CHECK_WHITELIST ?= "" | 54 | CVE_CHECK_IGNORE ?= "" |
| 55 | 55 | ||
| 56 | # Layers to be excluded | 56 | # Layers to be excluded |
| 57 | CVE_CHECK_LAYER_EXCLUDELIST ??= "" | 57 | CVE_CHECK_LAYER_EXCLUDELIST ??= "" |
| @@ -178,11 +178,11 @@ def check_cves(d, patched_cves): | |||
| 178 | pv = d.getVar("CVE_VERSION").split("+git")[0] | 178 | pv = d.getVar("CVE_VERSION").split("+git")[0] |
| 179 | 179 | ||
| 180 | # If the recipe has been whitelisted we return empty lists | 180 | # If the recipe has been whitelisted we return empty lists |
| 181 | if pn in d.getVar("CVE_CHECK_PN_WHITELIST").split(): | 181 | if pn in d.getVar("CVE_CHECK_SKIP_RECIPE").split(): |
| 182 | bb.note("Recipe has been whitelisted, skipping check") | 182 | bb.note("Recipe has been whitelisted, skipping check") |
| 183 | return ([], [], []) | 183 | return ([], [], []) |
| 184 | 184 | ||
| 185 | cve_whitelist = d.getVar("CVE_CHECK_WHITELIST").split() | 185 | cve_whitelist = d.getVar("CVE_CHECK_IGNORE").split() |
| 186 | 186 | ||
| 187 | import sqlite3 | 187 | import sqlite3 |
| 188 | db_file = d.expand("file:${CVE_CHECK_DB_FILE}?mode=ro") | 188 | db_file = d.expand("file:${CVE_CHECK_DB_FILE}?mode=ro") |
diff --git a/meta/classes/insane.bbclass b/meta/classes/insane.bbclass index a28fcd4798..4fc3c06c64 100644 --- a/meta/classes/insane.bbclass +++ b/meta/classes/insane.bbclass | |||
| @@ -48,7 +48,7 @@ enabled tests are listed here, the do_package_qa task will run under fakeroot." | |||
| 48 | 48 | ||
| 49 | ALL_QA = "${WARN_QA} ${ERROR_QA}" | 49 | ALL_QA = "${WARN_QA} ${ERROR_QA}" |
| 50 | 50 | ||
| 51 | UNKNOWN_CONFIGURE_WHITELIST ?= "--enable-nls --disable-nls --disable-silent-rules --disable-dependency-tracking --with-libtool-sysroot --disable-static" | 51 | UNKNOWN_CONFIGURE_OPT_IGNORE ?= "--enable-nls --disable-nls --disable-silent-rules --disable-dependency-tracking --with-libtool-sysroot --disable-static" |
| 52 | 52 | ||
| 53 | # This is a list of directories that are expected to be empty. | 53 | # This is a list of directories that are expected to be empty. |
| 54 | QA_EMPTY_DIRS ?= " \ | 54 | QA_EMPTY_DIRS ?= " \ |
| @@ -1270,7 +1270,7 @@ Rerun configure task after fixing this.""" | |||
| 1270 | options = set() | 1270 | options = set() |
| 1271 | for line in output.splitlines(): | 1271 | for line in output.splitlines(): |
| 1272 | options |= set(line.partition(flag)[2].split()) | 1272 | options |= set(line.partition(flag)[2].split()) |
| 1273 | whitelist = set(d.getVar("UNKNOWN_CONFIGURE_WHITELIST").split()) | 1273 | whitelist = set(d.getVar("UNKNOWN_CONFIGURE_OPT_IGNORE").split()) |
| 1274 | options -= whitelist | 1274 | options -= whitelist |
| 1275 | if options: | 1275 | if options: |
| 1276 | pn = d.getVar('PN') | 1276 | pn = d.getVar('PN') |
diff --git a/meta/classes/populate_sdk_ext.bbclass b/meta/classes/populate_sdk_ext.bbclass index a6f1506a39..9c9561c5c6 100644 --- a/meta/classes/populate_sdk_ext.bbclass +++ b/meta/classes/populate_sdk_ext.bbclass | |||
| @@ -22,8 +22,8 @@ SDK_INCLUDE_BUILDTOOLS ?= '1' | |||
| 22 | SDK_RECRDEP_TASKS ?= "" | 22 | SDK_RECRDEP_TASKS ?= "" |
| 23 | SDK_CUSTOM_TEMPLATECONF ?= "0" | 23 | SDK_CUSTOM_TEMPLATECONF ?= "0" |
| 24 | 24 | ||
| 25 | SDK_LOCAL_CONF_WHITELIST ?= "" | 25 | ESDK_LOCALCONF_ALLOW ?= "" |
| 26 | SDK_LOCAL_CONF_BLACKLIST ?= "CONF_VERSION \ | 26 | ESDK_LOCALCONF_REMOVE ?= "CONF_VERSION \ |
| 27 | BB_NUMBER_THREADS \ | 27 | BB_NUMBER_THREADS \ |
| 28 | BB_NUMBER_PARSE_THREADS \ | 28 | BB_NUMBER_PARSE_THREADS \ |
| 29 | PARALLEL_MAKE \ | 29 | PARALLEL_MAKE \ |
| @@ -34,7 +34,7 @@ SDK_LOCAL_CONF_BLACKLIST ?= "CONF_VERSION \ | |||
| 34 | TMPDIR \ | 34 | TMPDIR \ |
| 35 | BB_SERVER_TIMEOUT \ | 35 | BB_SERVER_TIMEOUT \ |
| 36 | " | 36 | " |
| 37 | SDK_INHERIT_BLACKLIST ?= "buildhistory icecc" | 37 | ESDK_CLASS_INHERIT_DISABLE ?= "buildhistory icecc" |
| 38 | SDK_UPDATE_URL ?= "" | 38 | SDK_UPDATE_URL ?= "" |
| 39 | 39 | ||
| 40 | SDK_TARGETS ?= "${PN}" | 40 | SDK_TARGETS ?= "${PN}" |
| @@ -294,8 +294,8 @@ python copy_buildsystem () { | |||
| 294 | if derivative: | 294 | if derivative: |
| 295 | shutil.copyfile(builddir + '/conf/local.conf', baseoutpath + '/conf/local.conf') | 295 | shutil.copyfile(builddir + '/conf/local.conf', baseoutpath + '/conf/local.conf') |
| 296 | else: | 296 | else: |
| 297 | local_conf_whitelist = (d.getVar('SDK_LOCAL_CONF_WHITELIST') or '').split() | 297 | local_conf_whitelist = (d.getVar('ESDK_LOCALCONF_ALLOW') or '').split() |
| 298 | local_conf_blacklist = (d.getVar('SDK_LOCAL_CONF_BLACKLIST') or '').split() | 298 | local_conf_blacklist = (d.getVar('ESDK_LOCALCONF_REMOVE') or '').split() |
| 299 | def handle_var(varname, origvalue, op, newlines): | 299 | def handle_var(varname, origvalue, op, newlines): |
| 300 | if varname in local_conf_blacklist or (origvalue.strip().startswith('/') and not varname in local_conf_whitelist): | 300 | if varname in local_conf_blacklist or (origvalue.strip().startswith('/') and not varname in local_conf_whitelist): |
| 301 | newlines.append('# Removed original setting of %s\n' % varname) | 301 | newlines.append('# Removed original setting of %s\n' % varname) |
| @@ -338,7 +338,7 @@ python copy_buildsystem () { | |||
| 338 | f.write('CONF_VERSION = "%s"\n\n' % d.getVar('CONF_VERSION', False)) | 338 | f.write('CONF_VERSION = "%s"\n\n' % d.getVar('CONF_VERSION', False)) |
| 339 | 339 | ||
| 340 | # Some classes are not suitable for SDK, remove them from INHERIT | 340 | # Some classes are not suitable for SDK, remove them from INHERIT |
| 341 | f.write('INHERIT:remove = "%s"\n' % d.getVar('SDK_INHERIT_BLACKLIST', False)) | 341 | f.write('INHERIT:remove = "%s"\n' % d.getVar('ESDK_CLASS_INHERIT_DISABLE', False)) |
| 342 | 342 | ||
| 343 | # Bypass the default connectivity check if any | 343 | # Bypass the default connectivity check if any |
| 344 | f.write('CONNECTIVITY_CHECK_URIS = ""\n\n') | 344 | f.write('CONNECTIVITY_CHECK_URIS = ""\n\n') |
diff --git a/meta/classes/sstate.bbclass b/meta/classes/sstate.bbclass index 86bf0395d2..787172b408 100644 --- a/meta/classes/sstate.bbclass +++ b/meta/classes/sstate.bbclass | |||
| @@ -50,21 +50,21 @@ SSTATE_EXTRAPATH[vardepvalue] = "" | |||
| 50 | SSTATE_EXTRAPATHWILDCARD[vardepvalue] = "" | 50 | SSTATE_EXTRAPATHWILDCARD[vardepvalue] = "" |
| 51 | 51 | ||
| 52 | # For multilib rpm the allarch packagegroup files can overwrite (in theory they're identical) | 52 | # For multilib rpm the allarch packagegroup files can overwrite (in theory they're identical) |
| 53 | SSTATE_DUPWHITELIST = "${DEPLOY_DIR}/licenses/" | 53 | SSTATE_ALLOW_OVERLAP_FILES = "${DEPLOY_DIR}/licenses/" |
| 54 | # Avoid docbook/sgml catalog warnings for now | 54 | # Avoid docbook/sgml catalog warnings for now |
| 55 | SSTATE_DUPWHITELIST += "${STAGING_ETCDIR_NATIVE}/sgml ${STAGING_DATADIR_NATIVE}/sgml" | 55 | SSTATE_ALLOW_OVERLAP_FILES += "${STAGING_ETCDIR_NATIVE}/sgml ${STAGING_DATADIR_NATIVE}/sgml" |
| 56 | # sdk-provides-dummy-nativesdk and nativesdk-buildtools-perl-dummy overlap for different SDKMACHINE | 56 | # sdk-provides-dummy-nativesdk and nativesdk-buildtools-perl-dummy overlap for different SDKMACHINE |
| 57 | SSTATE_DUPWHITELIST += "${DEPLOY_DIR_RPM}/sdk_provides_dummy_nativesdk/ ${DEPLOY_DIR_IPK}/sdk-provides-dummy-nativesdk/" | 57 | SSTATE_ALLOW_OVERLAP_FILES += "${DEPLOY_DIR_RPM}/sdk_provides_dummy_nativesdk/ ${DEPLOY_DIR_IPK}/sdk-provides-dummy-nativesdk/" |
| 58 | SSTATE_DUPWHITELIST += "${DEPLOY_DIR_RPM}/buildtools_dummy_nativesdk/ ${DEPLOY_DIR_IPK}/buildtools-dummy-nativesdk/" | 58 | SSTATE_ALLOW_OVERLAP_FILES += "${DEPLOY_DIR_RPM}/buildtools_dummy_nativesdk/ ${DEPLOY_DIR_IPK}/buildtools-dummy-nativesdk/" |
| 59 | # target-sdk-provides-dummy overlaps that allarch is disabled when multilib is used | 59 | # target-sdk-provides-dummy overlaps that allarch is disabled when multilib is used |
| 60 | SSTATE_DUPWHITELIST += "${COMPONENTS_DIR}/sdk-provides-dummy-target/ ${DEPLOY_DIR_RPM}/sdk_provides_dummy_target/ ${DEPLOY_DIR_IPK}/sdk-provides-dummy-target/" | 60 | SSTATE_ALLOW_OVERLAP_FILES += "${COMPONENTS_DIR}/sdk-provides-dummy-target/ ${DEPLOY_DIR_RPM}/sdk_provides_dummy_target/ ${DEPLOY_DIR_IPK}/sdk-provides-dummy-target/" |
| 61 | # Archive the sources for many architectures in one deploy folder | 61 | # Archive the sources for many architectures in one deploy folder |
| 62 | SSTATE_DUPWHITELIST += "${DEPLOY_DIR_SRC}" | 62 | SSTATE_ALLOW_OVERLAP_FILES += "${DEPLOY_DIR_SRC}" |
| 63 | # ovmf/grub-efi/systemd-boot/intel-microcode multilib recipes can generate identical overlapping files | 63 | # ovmf/grub-efi/systemd-boot/intel-microcode multilib recipes can generate identical overlapping files |
| 64 | SSTATE_DUPWHITELIST += "${DEPLOY_DIR_IMAGE}/ovmf" | 64 | SSTATE_ALLOW_OVERLAP_FILES += "${DEPLOY_DIR_IMAGE}/ovmf" |
| 65 | SSTATE_DUPWHITELIST += "${DEPLOY_DIR_IMAGE}/grub-efi" | 65 | SSTATE_ALLOW_OVERLAP_FILES += "${DEPLOY_DIR_IMAGE}/grub-efi" |
| 66 | SSTATE_DUPWHITELIST += "${DEPLOY_DIR_IMAGE}/systemd-boot" | 66 | SSTATE_ALLOW_OVERLAP_FILES += "${DEPLOY_DIR_IMAGE}/systemd-boot" |
| 67 | SSTATE_DUPWHITELIST += "${DEPLOY_DIR_IMAGE}/microcode" | 67 | SSTATE_ALLOW_OVERLAP_FILES += "${DEPLOY_DIR_IMAGE}/microcode" |
| 68 | 68 | ||
| 69 | SSTATE_SCAN_FILES ?= "*.la *-config *_config postinst-*" | 69 | SSTATE_SCAN_FILES ?= "*.la *-config *_config postinst-*" |
| 70 | SSTATE_SCAN_CMD ??= 'find ${SSTATE_BUILDDIR} \( -name "${@"\" -o -name \"".join(d.getVar("SSTATE_SCAN_FILES").split())}" \) -type f' | 70 | SSTATE_SCAN_CMD ??= 'find ${SSTATE_BUILDDIR} \( -name "${@"\" -o -name \"".join(d.getVar("SSTATE_SCAN_FILES").split())}" \) -type f' |
| @@ -260,7 +260,7 @@ def sstate_install(ss, d): | |||
| 260 | shareddirs.append(dstdir) | 260 | shareddirs.append(dstdir) |
| 261 | 261 | ||
| 262 | # Check the file list for conflicts against files which already exist | 262 | # Check the file list for conflicts against files which already exist |
| 263 | whitelist = (d.getVar("SSTATE_DUPWHITELIST") or "").split() | 263 | whitelist = (d.getVar("SSTATE_ALLOW_OVERLAP_FILES") or "").split() |
| 264 | match = [] | 264 | match = [] |
| 265 | for f in sharedfiles: | 265 | for f in sharedfiles: |
| 266 | if os.path.exists(f) and not os.path.islink(f): | 266 | if os.path.exists(f) and not os.path.islink(f): |
| @@ -296,7 +296,7 @@ def sstate_install(ss, d): | |||
| 296 | "DISTRO_FEATURES on an existing build directory is not supported - you " \ | 296 | "DISTRO_FEATURES on an existing build directory is not supported - you " \ |
| 297 | "should really clean out tmp and rebuild (reusing sstate should be safe). " \ | 297 | "should really clean out tmp and rebuild (reusing sstate should be safe). " \ |
| 298 | "It could be the overlapping files detected are harmless in which case " \ | 298 | "It could be the overlapping files detected are harmless in which case " \ |
| 299 | "adding them to SSTATE_DUPWHITELIST may be the correct solution. It could " \ | 299 | "adding them to SSTATE_ALLOW_OVERLAP_FILES may be the correct solution. It could " \ |
| 300 | "also be your build is including two different conflicting versions of " \ | 300 | "also be your build is including two different conflicting versions of " \ |
| 301 | "things (e.g. bluez 4 and bluez 5 and the correct solution for that would " \ | 301 | "things (e.g. bluez 4 and bluez 5 and the correct solution for that would " \ |
| 302 | "be to resolve the conflict. If in doubt, please ask on the mailing list, " \ | 302 | "be to resolve the conflict. If in doubt, please ask on the mailing list, " \ |
| @@ -350,7 +350,7 @@ def sstate_install(ss, d): | |||
| 350 | for lock in locks: | 350 | for lock in locks: |
| 351 | bb.utils.unlockfile(lock) | 351 | bb.utils.unlockfile(lock) |
| 352 | 352 | ||
| 353 | sstate_install[vardepsexclude] += "SSTATE_DUPWHITELIST STATE_MANMACH SSTATE_MANFILEPREFIX" | 353 | sstate_install[vardepsexclude] += "SSTATE_ALLOW_OVERLAP_FILES STATE_MANMACH SSTATE_MANFILEPREFIX" |
| 354 | sstate_install[vardeps] += "${SSTATEPOSTINSTFUNCS}" | 354 | sstate_install[vardeps] += "${SSTATEPOSTINSTFUNCS}" |
| 355 | 355 | ||
| 356 | def sstate_installpkg(ss, d): | 356 | def sstate_installpkg(ss, d): |
diff --git a/meta/classes/staging.bbclass b/meta/classes/staging.bbclass index 574700260f..65499283da 100644 --- a/meta/classes/staging.bbclass +++ b/meta/classes/staging.bbclass | |||
| @@ -24,7 +24,7 @@ SYSROOT_DIRS:append:class-cross = " ${SYSROOT_DIRS_NATIVE}" | |||
| 24 | SYSROOT_DIRS:append:class-crosssdk = " ${SYSROOT_DIRS_NATIVE}" | 24 | SYSROOT_DIRS:append:class-crosssdk = " ${SYSROOT_DIRS_NATIVE}" |
| 25 | 25 | ||
| 26 | # These directories will not be staged in the sysroot | 26 | # These directories will not be staged in the sysroot |
| 27 | SYSROOT_DIRS_BLACKLIST = " \ | 27 | SYSROOT_DIRS_IGNORE = " \ |
| 28 | ${mandir} \ | 28 | ${mandir} \ |
| 29 | ${docdir} \ | 29 | ${docdir} \ |
| 30 | ${infodir} \ | 30 | ${infodir} \ |
| @@ -65,7 +65,7 @@ sysroot_stage_dirs() { | |||
| 65 | done | 65 | done |
| 66 | 66 | ||
| 67 | # Remove directories we do not care about | 67 | # Remove directories we do not care about |
| 68 | for dir in ${SYSROOT_DIRS_BLACKLIST}; do | 68 | for dir in ${SYSROOT_DIRS_IGNORE}; do |
| 69 | rm -rf "$to$dir" | 69 | rm -rf "$to$dir" |
| 70 | done | 70 | done |
| 71 | } | 71 | } |
