summaryrefslogtreecommitdiffstats
path: root/scripts/contrib/patchreview.py
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@arm.com>2022-04-26 13:07:20 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-05-03 21:02:02 +0100
commit3f17ee4ebef3103e290750d8cdd7d001fc306673 (patch)
treeec4cc4e7b5b29c390dc85429941adba3372f47c3 /scripts/contrib/patchreview.py
parentce323dd1a92a5be02571beddd6c240c215258f39 (diff)
downloadpoky-3f17ee4ebef3103e290750d8cdd7d001fc306673.tar.gz
bitbake.conf: mark all directories as safe for git to read
Recent git releases containing [1] have an ownership check when opening repositories, and refuse to open a repository if it is owned by a different user. This breaks any use of git in do_install, as that is executed by the (fake) root user. Whilst not common, this does happen. Setting the git configuration safe.directories=* disables this check, so that git is usable in fakeroot tasks. This can be set globally via the internal environment variable GIT_CONFIG_PARAMETERS, we can't use GIT_CONFIG_*_KEY/VALUE as that isn't present in all the releases which have the ownership check. We already set GIT_CEILING_DIRECTORIES to ensure that git doesn't recurse up out of the work directory, so this isn't a security issue. [1] https://github.com/git/git/commit/8959555cee7ec045958f9b6dd62e541affb7e7d9 (From OE-Core rev: 7a97531169d662fe0466db5992566bcdbe3a0d5f) Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 8bed8e6993e7297bdcd68940aa0d47ef47120117) Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/contrib/patchreview.py')
0 files changed, 0 insertions, 0 deletions