mirror of
git://git.yoctoproject.org/poky.git
synced 2025-07-19 21:09:03 +02:00
classes: Drop ';' delimiter from ROOTFS/IMAGE*COMMAND variables
Originally these were shell functions but they have long since been processed by bb.build.exec_func(). Since we no longer need shell syntax, we can drop the ';' delimiters and just use a space separated string. This cleans up the variable and quietly removes any stray ';' that do happen to still make it in. (From OE-Core rev: c3365dfd9ddd7fbe70b62e0f11166e57a8ca6f73) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
parent
32c98e6a8c
commit
6fd8af0d30
|
@ -4,7 +4,7 @@
|
||||||
# SPDX-License-Identifier: MIT
|
# SPDX-License-Identifier: MIT
|
||||||
#
|
#
|
||||||
|
|
||||||
IMAGE_PREPROCESS_COMMAND:append = " combine_dbg_image; "
|
IMAGE_PREPROCESS_COMMAND:append = " combine_dbg_image"
|
||||||
|
|
||||||
combine_dbg_image () {
|
combine_dbg_image () {
|
||||||
if [ "${IMAGE_GEN_DEBUGFS}" = "1" -a -e ${IMAGE_ROOTFS}-dbg ]; then
|
if [ "${IMAGE_GEN_DEBUGFS}" = "1" -a -e ${IMAGE_ROOTFS}-dbg ]; then
|
||||||
|
|
|
@ -25,7 +25,7 @@ inherit ${IMGCLASSES}
|
||||||
|
|
||||||
TOOLCHAIN_TARGET_TASK += "${PACKAGE_INSTALL}"
|
TOOLCHAIN_TARGET_TASK += "${PACKAGE_INSTALL}"
|
||||||
TOOLCHAIN_TARGET_TASK_ATTEMPTONLY += "${PACKAGE_INSTALL_ATTEMPTONLY}"
|
TOOLCHAIN_TARGET_TASK_ATTEMPTONLY += "${PACKAGE_INSTALL_ATTEMPTONLY}"
|
||||||
POPULATE_SDK_POST_TARGET_COMMAND += "rootfs_sysroot_relativelinks; "
|
POPULATE_SDK_POST_TARGET_COMMAND += "rootfs_sysroot_relativelinks"
|
||||||
|
|
||||||
LICENSE ?= "MIT"
|
LICENSE ?= "MIT"
|
||||||
PACKAGES = ""
|
PACKAGES = ""
|
||||||
|
@ -120,8 +120,7 @@ def rootfs_command_variables(d):
|
||||||
python () {
|
python () {
|
||||||
variables = rootfs_command_variables(d)
|
variables = rootfs_command_variables(d)
|
||||||
for var in variables:
|
for var in variables:
|
||||||
if d.getVar(var, False):
|
d.setVarFlag(var, 'vardeps', d.getVar(var))
|
||||||
d.setVarFlag(var, 'func', '1')
|
|
||||||
}
|
}
|
||||||
|
|
||||||
def rootfs_variables(d):
|
def rootfs_variables(d):
|
||||||
|
@ -657,8 +656,8 @@ create_merged_usr_symlinks_sdk() {
|
||||||
create_merged_usr_symlinks ${SDK_OUTPUT}${SDKTARGETSYSROOT}
|
create_merged_usr_symlinks ${SDK_OUTPUT}${SDKTARGETSYSROOT}
|
||||||
}
|
}
|
||||||
|
|
||||||
ROOTFS_PREPROCESS_COMMAND += "${@bb.utils.contains('DISTRO_FEATURES', 'usrmerge', 'create_merged_usr_symlinks_rootfs; ', '',d)}"
|
ROOTFS_PREPROCESS_COMMAND += "${@bb.utils.contains('DISTRO_FEATURES', 'usrmerge', 'create_merged_usr_symlinks_rootfs', '',d)}"
|
||||||
POPULATE_SDK_PRE_TARGET_COMMAND += "${@bb.utils.contains('DISTRO_FEATURES', 'usrmerge', 'create_merged_usr_symlinks_sdk; ', '',d)}"
|
POPULATE_SDK_PRE_TARGET_COMMAND += "${@bb.utils.contains('DISTRO_FEATURES', 'usrmerge', 'create_merged_usr_symlinks_sdk', '',d)}"
|
||||||
|
|
||||||
reproducible_final_image_task () {
|
reproducible_final_image_task () {
|
||||||
if [ "$REPRODUCIBLE_TIMESTAMP_ROOTFS" = "" ]; then
|
if [ "$REPRODUCIBLE_TIMESTAMP_ROOTFS" = "" ]; then
|
||||||
|
@ -678,6 +677,6 @@ systemd_preset_all () {
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
IMAGE_PREPROCESS_COMMAND:append = " ${@ 'systemd_preset_all;' if bb.utils.contains('DISTRO_FEATURES', 'systemd', True, False, d) and not bb.utils.contains('IMAGE_FEATURES', 'stateless-rootfs', True, False, d) else ''} reproducible_final_image_task; "
|
IMAGE_PREPROCESS_COMMAND:append = " ${@ 'systemd_preset_all' if bb.utils.contains('DISTRO_FEATURES', 'systemd', True, False, d) and not bb.utils.contains('IMAGE_FEATURES', 'stateless-rootfs', True, False, d) else ''} reproducible_final_image_task "
|
||||||
|
|
||||||
CVE_PRODUCT = ""
|
CVE_PRODUCT = ""
|
||||||
|
|
|
@ -272,7 +272,7 @@ def get_deployed_files(man_file):
|
||||||
dep_files.append(os.path.basename(f))
|
dep_files.append(os.path.basename(f))
|
||||||
return dep_files
|
return dep_files
|
||||||
|
|
||||||
ROOTFS_POSTPROCESS_COMMAND:prepend = "write_package_manifest; license_create_manifest; "
|
ROOTFS_POSTPROCESS_COMMAND:prepend = "write_package_manifest license_create_manifest "
|
||||||
do_rootfs[recrdeptask] += "do_populate_lic"
|
do_rootfs[recrdeptask] += "do_populate_lic"
|
||||||
|
|
||||||
python do_populate_lic_deploy() {
|
python do_populate_lic_deploy() {
|
||||||
|
|
|
@ -31,7 +31,7 @@
|
||||||
# Regardless which mode you choose, update and migration strategy of configuration files under /etc
|
# Regardless which mode you choose, update and migration strategy of configuration files under /etc
|
||||||
# overlay is out of scope of this class
|
# overlay is out of scope of this class
|
||||||
|
|
||||||
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", "overlayfs-etc", "create_overlayfs_etc_preinit;", "", d)}'
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", "overlayfs-etc", "create_overlayfs_etc_preinit", "", d)}'
|
||||||
IMAGE_FEATURES_CONFLICTS_overlayfs-etc = "${@ 'package-management' if bb.utils.to_boolean(d.getVar('OVERLAYFS_ETC_USE_ORIG_INIT_NAME'), True) else ''}"
|
IMAGE_FEATURES_CONFLICTS_overlayfs-etc = "${@ 'package-management' if bb.utils.to_boolean(d.getVar('OVERLAYFS_ETC_USE_ORIG_INIT_NAME'), True) else ''}"
|
||||||
|
|
||||||
OVERLAYFS_ETC_MOUNT_POINT ??= ""
|
OVERLAYFS_ETC_MOUNT_POINT ??= ""
|
||||||
|
|
|
@ -152,12 +152,12 @@ python write_host_sdk_manifest () {
|
||||||
output.write(format_pkg_list(pkgs, 'ver'))
|
output.write(format_pkg_list(pkgs, 'ver'))
|
||||||
}
|
}
|
||||||
|
|
||||||
POPULATE_SDK_POST_TARGET_COMMAND:append = " write_sdk_test_data ; "
|
POPULATE_SDK_POST_TARGET_COMMAND:append = " write_sdk_test_data"
|
||||||
POPULATE_SDK_POST_TARGET_COMMAND:append:task-populate-sdk = " write_target_sdk_manifest; sdk_prune_dirs; "
|
POPULATE_SDK_POST_TARGET_COMMAND:append:task-populate-sdk = " write_target_sdk_manifest sdk_prune_dirs"
|
||||||
POPULATE_SDK_POST_HOST_COMMAND:append:task-populate-sdk = " write_host_sdk_manifest; "
|
POPULATE_SDK_POST_HOST_COMMAND:append:task-populate-sdk = " write_host_sdk_manifest"
|
||||||
|
|
||||||
SDK_PACKAGING_COMMAND = "${@'${SDK_PACKAGING_FUNC};' if '${SDK_PACKAGING_FUNC}' else ''}"
|
SDK_PACKAGING_COMMAND = "${@'${SDK_PACKAGING_FUNC}' if '${SDK_PACKAGING_FUNC}' else ''}"
|
||||||
SDK_POSTPROCESS_COMMAND = " create_sdk_files; check_sdk_sysroots; archive_sdk; ${SDK_PACKAGING_COMMAND} "
|
SDK_POSTPROCESS_COMMAND = "create_sdk_files check_sdk_sysroots archive_sdk ${SDK_PACKAGING_COMMAND}"
|
||||||
|
|
||||||
def populate_sdk_common(d):
|
def populate_sdk_common(d):
|
||||||
from oe.sdk import populate_sdk
|
from oe.sdk import populate_sdk
|
||||||
|
@ -372,8 +372,7 @@ do_populate_sdk[vardeps] += "${@sdk_variables(d)}"
|
||||||
python () {
|
python () {
|
||||||
variables = sdk_command_variables(d)
|
variables = sdk_command_variables(d)
|
||||||
for var in variables:
|
for var in variables:
|
||||||
if d.getVar(var, False):
|
d.setVarFlag(var, 'vardeps', d.getVar(var))
|
||||||
d.setVarFlag(var, 'func', '1')
|
|
||||||
}
|
}
|
||||||
|
|
||||||
do_populate_sdk[file-checksums] += "${TOOLCHAIN_SHAR_REL_TMPL}:True \
|
do_populate_sdk[file-checksums] += "${TOOLCHAIN_SHAR_REL_TMPL}:True \
|
||||||
|
|
|
@ -120,7 +120,7 @@ python write_host_sdk_ext_manifest () {
|
||||||
f.write("%s %s %s\n" % (info[1], info[2], info[3]))
|
f.write("%s %s %s\n" % (info[1], info[2], info[3]))
|
||||||
}
|
}
|
||||||
|
|
||||||
SDK_POSTPROCESS_COMMAND:append:task-populate-sdk-ext = " write_target_sdk_ext_manifest; write_host_sdk_ext_manifest; "
|
SDK_POSTPROCESS_COMMAND:append:task-populate-sdk-ext = " write_target_sdk_ext_manifest write_host_sdk_ext_manifest"
|
||||||
|
|
||||||
SDK_TITLE:task-populate-sdk-ext = "${@d.getVar('DISTRO_NAME') or d.getVar('DISTRO')} Extensible SDK"
|
SDK_TITLE:task-populate-sdk-ext = "${@d.getVar('DISTRO_NAME') or d.getVar('DISTRO')} Extensible SDK"
|
||||||
|
|
||||||
|
@ -743,7 +743,7 @@ sdk_ext_postinst() {
|
||||||
|
|
||||||
SDK_POST_INSTALL_COMMAND:task-populate-sdk-ext = "${sdk_ext_postinst}"
|
SDK_POST_INSTALL_COMMAND:task-populate-sdk-ext = "${sdk_ext_postinst}"
|
||||||
|
|
||||||
SDK_POSTPROCESS_COMMAND:prepend:task-populate-sdk-ext = "copy_buildsystem; install_tools; "
|
SDK_POSTPROCESS_COMMAND:prepend:task-populate-sdk-ext = "copy_buildsystem install_tools "
|
||||||
|
|
||||||
SDK_INSTALL_TARGETS = ""
|
SDK_INSTALL_TARGETS = ""
|
||||||
fakeroot python do_populate_sdk_ext() {
|
fakeroot python do_populate_sdk_ext() {
|
||||||
|
|
|
@ -5,25 +5,25 @@
|
||||||
#
|
#
|
||||||
|
|
||||||
# Zap the root password if debug-tweaks and empty-root-password features are not enabled
|
# Zap the root password if debug-tweaks and empty-root-password features are not enabled
|
||||||
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'empty-root-password' ], "", "zap_empty_root_password; ",d)}'
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'empty-root-password' ], "", "zap_empty_root_password ",d)}'
|
||||||
|
|
||||||
# Allow dropbear/openssh to accept logins from accounts with an empty password string if debug-tweaks or allow-empty-password is enabled
|
# Allow dropbear/openssh to accept logins from accounts with an empty password string if debug-tweaks or allow-empty-password is enabled
|
||||||
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'allow-empty-password' ], "ssh_allow_empty_password; ", "",d)}'
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'allow-empty-password' ], "ssh_allow_empty_password ", "",d)}'
|
||||||
|
|
||||||
# Allow dropbear/openssh to accept root logins if debug-tweaks or allow-root-login is enabled
|
# Allow dropbear/openssh to accept root logins if debug-tweaks or allow-root-login is enabled
|
||||||
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'allow-root-login' ], "ssh_allow_root_login; ", "",d)}'
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'allow-root-login' ], "ssh_allow_root_login ", "",d)}'
|
||||||
|
|
||||||
# Autologin the root user on the serial console, if empty-root-password and serial-autologin-root are active
|
# Autologin the root user on the serial console, if empty-root-password and serial-autologin-root are active
|
||||||
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", [ 'empty-root-password', 'serial-autologin-root' ], "serial_autologin_root; ", "",d)}'
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", [ 'empty-root-password', 'serial-autologin-root' ], "serial_autologin_root ", "",d)}'
|
||||||
|
|
||||||
# Enable postinst logging if debug-tweaks or post-install-logging is enabled
|
# Enable postinst logging if debug-tweaks or post-install-logging is enabled
|
||||||
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'post-install-logging' ], "postinst_enable_logging; ", "",d)}'
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'post-install-logging' ], "postinst_enable_logging ", "",d)}'
|
||||||
|
|
||||||
# Create /etc/timestamp during image construction to give a reasonably sane default time setting
|
# Create /etc/timestamp during image construction to give a reasonably sane default time setting
|
||||||
ROOTFS_POSTPROCESS_COMMAND += "rootfs_update_timestamp; "
|
ROOTFS_POSTPROCESS_COMMAND += "rootfs_update_timestamp "
|
||||||
|
|
||||||
# Tweak files in /etc if read-only-rootfs is enabled
|
# Tweak files in /etc if read-only-rootfs is enabled
|
||||||
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", "read-only-rootfs", "read_only_rootfs_hook; ", "",d)}'
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", "read-only-rootfs", "read_only_rootfs_hook ", "",d)}'
|
||||||
|
|
||||||
# We also need to do the same for the kernel boot parameters,
|
# We also need to do the same for the kernel boot parameters,
|
||||||
# otherwise kernel or initramfs end up mounting the rootfs read/write
|
# otherwise kernel or initramfs end up mounting the rootfs read/write
|
||||||
|
@ -34,20 +34,20 @@ ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", "read-only
|
||||||
APPEND:append = '${@bb.utils.contains("IMAGE_FEATURES", "read-only-rootfs", " ro", "", d)}'
|
APPEND:append = '${@bb.utils.contains("IMAGE_FEATURES", "read-only-rootfs", " ro", "", d)}'
|
||||||
|
|
||||||
# Generates test data file with data store variables expanded in json format
|
# Generates test data file with data store variables expanded in json format
|
||||||
ROOTFS_POSTPROCESS_COMMAND += "write_image_test_data; "
|
ROOTFS_POSTPROCESS_COMMAND += "write_image_test_data "
|
||||||
|
|
||||||
# Write manifest
|
# Write manifest
|
||||||
IMAGE_MANIFEST = "${IMGDEPLOYDIR}/${IMAGE_NAME}.manifest"
|
IMAGE_MANIFEST = "${IMGDEPLOYDIR}/${IMAGE_NAME}.manifest"
|
||||||
ROOTFS_POSTUNINSTALL_COMMAND =+ "write_image_manifest ; "
|
ROOTFS_POSTUNINSTALL_COMMAND =+ "write_image_manifest"
|
||||||
# Set default postinst log file
|
# Set default postinst log file
|
||||||
POSTINST_LOGFILE ?= "${localstatedir}/log/postinstall.log"
|
POSTINST_LOGFILE ?= "${localstatedir}/log/postinstall.log"
|
||||||
# Set default target for systemd images
|
# Set default target for systemd images
|
||||||
SYSTEMD_DEFAULT_TARGET ?= '${@bb.utils.contains_any("IMAGE_FEATURES", [ "x11-base", "weston" ], "graphical.target", "multi-user.target", d)}'
|
SYSTEMD_DEFAULT_TARGET ?= '${@bb.utils.contains_any("IMAGE_FEATURES", [ "x11-base", "weston" ], "graphical.target", "multi-user.target", d)}'
|
||||||
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("DISTRO_FEATURES", "systemd", "set_systemd_default_target; systemd_sysusers_check;", "", d)}'
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("DISTRO_FEATURES", "systemd", "set_systemd_default_target systemd_sysusers_check", "", d)}'
|
||||||
|
|
||||||
ROOTFS_POSTPROCESS_COMMAND += 'empty_var_volatile;'
|
ROOTFS_POSTPROCESS_COMMAND += 'empty_var_volatile'
|
||||||
|
|
||||||
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("DISTRO_FEATURES", "overlayfs", "overlayfs_qa_check; overlayfs_postprocess;", "", d)}'
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("DISTRO_FEATURES", "overlayfs", "overlayfs_qa_check overlayfs_postprocess", "", d)}'
|
||||||
|
|
||||||
inherit image-artifact-names
|
inherit image-artifact-names
|
||||||
|
|
||||||
|
@ -63,10 +63,10 @@ inherit image-artifact-names
|
||||||
# systemd_sysusers_create and set_user_group. Using :append is not
|
# systemd_sysusers_create and set_user_group. Using :append is not
|
||||||
# enough for that, set_user_group is added that way and would end
|
# enough for that, set_user_group is added that way and would end
|
||||||
# up running after us.
|
# up running after us.
|
||||||
SORT_PASSWD_POSTPROCESS_COMMAND ??= " tidy_shadowutils_files; "
|
SORT_PASSWD_POSTPROCESS_COMMAND ??= "tidy_shadowutils_files"
|
||||||
python () {
|
python () {
|
||||||
d.appendVar('ROOTFS_POSTPROCESS_COMMAND', ' ${SORT_PASSWD_POSTPROCESS_COMMAND}')
|
d.appendVar('ROOTFS_POSTPROCESS_COMMAND', ' ${SORT_PASSWD_POSTPROCESS_COMMAND}')
|
||||||
d.appendVar('ROOTFS_POSTPROCESS_COMMAND', 'rootfs_reproducible;')
|
d.appendVar('ROOTFS_POSTPROCESS_COMMAND', ' rootfs_reproducible')
|
||||||
}
|
}
|
||||||
|
|
||||||
# Resolve the ID as described in the sysusers.d(5) manual: ID can be a numeric
|
# Resolve the ID as described in the sysusers.d(5) manual: ID can be a numeric
|
||||||
|
|
|
@ -34,7 +34,7 @@
|
||||||
ROOTFS_DEBUG_FILES ?= ""
|
ROOTFS_DEBUG_FILES ?= ""
|
||||||
ROOTFS_DEBUG_FILES[doc] = "Lists additional files or directories to be installed with 'cp -a' in the format 'source1 target1;source2 target2;...'"
|
ROOTFS_DEBUG_FILES[doc] = "Lists additional files or directories to be installed with 'cp -a' in the format 'source1 target1;source2 target2;...'"
|
||||||
|
|
||||||
ROOTFS_POSTPROCESS_COMMAND += "rootfs_debug_files;"
|
ROOTFS_POSTPROCESS_COMMAND += "rootfs_debug_files"
|
||||||
rootfs_debug_files () {
|
rootfs_debug_files () {
|
||||||
#!/bin/sh -e
|
#!/bin/sh -e
|
||||||
echo "${ROOTFS_DEBUG_FILES}" | sed -e 's/;/\n/g' | while read source target mode; do
|
echo "${ROOTFS_DEBUG_FILES}" | sed -e 's/;/\n/g' | while read source target mode; do
|
||||||
|
|
|
@ -691,28 +691,28 @@ python buildhistory_get_extra_sdkinfo() {
|
||||||
|
|
||||||
# By using ROOTFS_POSTUNINSTALL_COMMAND we get in after uninstallation of
|
# By using ROOTFS_POSTUNINSTALL_COMMAND we get in after uninstallation of
|
||||||
# unneeded packages but before the removal of packaging files
|
# unneeded packages but before the removal of packaging files
|
||||||
ROOTFS_POSTUNINSTALL_COMMAND += "buildhistory_list_installed_image ;"
|
ROOTFS_POSTUNINSTALL_COMMAND += "buildhistory_list_installed_image"
|
||||||
ROOTFS_POSTUNINSTALL_COMMAND += "buildhistory_get_image_installed ;"
|
ROOTFS_POSTUNINSTALL_COMMAND += "buildhistory_get_image_installed"
|
||||||
ROOTFS_POSTUNINSTALL_COMMAND[vardepvalueexclude] .= "| buildhistory_list_installed_image ;| buildhistory_get_image_installed ;"
|
ROOTFS_POSTUNINSTALL_COMMAND[vardepvalueexclude] .= "| buildhistory_list_installed_image| buildhistory_get_image_installed"
|
||||||
ROOTFS_POSTUNINSTALL_COMMAND[vardepsexclude] += "buildhistory_list_installed_image buildhistory_get_image_installed"
|
ROOTFS_POSTUNINSTALL_COMMAND[vardepsexclude] += "buildhistory_list_installed_image buildhistory_get_image_installed"
|
||||||
|
|
||||||
IMAGE_POSTPROCESS_COMMAND += "buildhistory_get_imageinfo ;"
|
IMAGE_POSTPROCESS_COMMAND += "buildhistory_get_imageinfo"
|
||||||
IMAGE_POSTPROCESS_COMMAND[vardepvalueexclude] .= "| buildhistory_get_imageinfo ;"
|
IMAGE_POSTPROCESS_COMMAND[vardepvalueexclude] .= "| buildhistory_get_imageinfo"
|
||||||
IMAGE_POSTPROCESS_COMMAND[vardepsexclude] += "buildhistory_get_imageinfo"
|
IMAGE_POSTPROCESS_COMMAND[vardepsexclude] += "buildhistory_get_imageinfo"
|
||||||
|
|
||||||
# We want these to be the last run so that we get called after complementary package installation
|
# We want these to be the last run so that we get called after complementary package installation
|
||||||
POPULATE_SDK_POST_TARGET_COMMAND:append = " buildhistory_list_installed_sdk_target;"
|
POPULATE_SDK_POST_TARGET_COMMAND:append = " buildhistory_list_installed_sdk_target"
|
||||||
POPULATE_SDK_POST_TARGET_COMMAND:append = " buildhistory_get_sdk_installed_target;"
|
POPULATE_SDK_POST_TARGET_COMMAND:append = " buildhistory_get_sdk_installed_target"
|
||||||
POPULATE_SDK_POST_TARGET_COMMAND[vardepvalueexclude] .= "| buildhistory_list_installed_sdk_target;| buildhistory_get_sdk_installed_target;"
|
POPULATE_SDK_POST_TARGET_COMMAND[vardepvalueexclude] .= "| buildhistory_list_installed_sdk_target| buildhistory_get_sdk_installed_target"
|
||||||
POPULATE_SDK_POST_TARGET_COMMAND[vardepsexclude] += "buildhistory_list_installed_sdk_target buildhistory_get_sdk_installed_target"
|
POPULATE_SDK_POST_TARGET_COMMAND[vardepsexclude] += "buildhistory_list_installed_sdk_target buildhistory_get_sdk_installed_target"
|
||||||
|
|
||||||
POPULATE_SDK_POST_HOST_COMMAND:append = " buildhistory_list_installed_sdk_host;"
|
POPULATE_SDK_POST_HOST_COMMAND:append = " buildhistory_list_installed_sdk_host"
|
||||||
POPULATE_SDK_POST_HOST_COMMAND:append = " buildhistory_get_sdk_installed_host;"
|
POPULATE_SDK_POST_HOST_COMMAND:append = " buildhistory_get_sdk_installed_host"
|
||||||
POPULATE_SDK_POST_HOST_COMMAND[vardepvalueexclude] .= "| buildhistory_list_installed_sdk_host;| buildhistory_get_sdk_installed_host;"
|
POPULATE_SDK_POST_HOST_COMMAND[vardepvalueexclude] .= "| buildhistory_list_installed_sdk_host| buildhistory_get_sdk_installed_host"
|
||||||
POPULATE_SDK_POST_HOST_COMMAND[vardepsexclude] += "buildhistory_list_installed_sdk_host buildhistory_get_sdk_installed_host"
|
POPULATE_SDK_POST_HOST_COMMAND[vardepsexclude] += "buildhistory_list_installed_sdk_host buildhistory_get_sdk_installed_host"
|
||||||
|
|
||||||
SDK_POSTPROCESS_COMMAND:append = " buildhistory_get_sdkinfo ; buildhistory_get_extra_sdkinfo; "
|
SDK_POSTPROCESS_COMMAND:append = " buildhistory_get_sdkinfo buildhistory_get_extra_sdkinfo"
|
||||||
SDK_POSTPROCESS_COMMAND[vardepvalueexclude] .= "| buildhistory_get_sdkinfo ; buildhistory_get_extra_sdkinfo; "
|
SDK_POSTPROCESS_COMMAND[vardepvalueexclude] .= "| buildhistory_get_sdkinfo buildhistory_get_extra_sdkinfo"
|
||||||
SDK_POSTPROCESS_COMMAND[vardepsexclude] += "buildhistory_get_sdkinfo buildhistory_get_extra_sdkinfo"
|
SDK_POSTPROCESS_COMMAND[vardepsexclude] += "buildhistory_get_sdkinfo buildhistory_get_extra_sdkinfo"
|
||||||
|
|
||||||
python buildhistory_write_sigs() {
|
python buildhistory_write_sigs() {
|
||||||
|
|
|
@ -930,12 +930,12 @@ spdx_get_src[vardepsexclude] += "STAGING_KERNEL_DIR"
|
||||||
do_rootfs[recrdeptask] += "do_create_spdx do_create_runtime_spdx"
|
do_rootfs[recrdeptask] += "do_create_spdx do_create_runtime_spdx"
|
||||||
do_rootfs[cleandirs] += "${SPDXIMAGEWORK}"
|
do_rootfs[cleandirs] += "${SPDXIMAGEWORK}"
|
||||||
|
|
||||||
ROOTFS_POSTUNINSTALL_COMMAND =+ "image_combine_spdx ; "
|
ROOTFS_POSTUNINSTALL_COMMAND =+ "image_combine_spdx"
|
||||||
|
|
||||||
do_populate_sdk[recrdeptask] += "do_create_spdx do_create_runtime_spdx"
|
do_populate_sdk[recrdeptask] += "do_create_spdx do_create_runtime_spdx"
|
||||||
do_populate_sdk[cleandirs] += "${SPDXSDKWORK}"
|
do_populate_sdk[cleandirs] += "${SPDXSDKWORK}"
|
||||||
POPULATE_SDK_POST_HOST_COMMAND:append:task-populate-sdk = " sdk_host_combine_spdx; "
|
POPULATE_SDK_POST_HOST_COMMAND:append:task-populate-sdk = " sdk_host_combine_spdx"
|
||||||
POPULATE_SDK_POST_TARGET_COMMAND:append:task-populate-sdk = " sdk_target_combine_spdx; "
|
POPULATE_SDK_POST_TARGET_COMMAND:append:task-populate-sdk = " sdk_target_combine_spdx"
|
||||||
|
|
||||||
python image_combine_spdx() {
|
python image_combine_spdx() {
|
||||||
import os
|
import os
|
||||||
|
|
|
@ -286,7 +286,7 @@ python cve_check_write_rootfs_manifest () {
|
||||||
bb.plain("Image CVE JSON report stored in: %s" % manifest_name)
|
bb.plain("Image CVE JSON report stored in: %s" % manifest_name)
|
||||||
}
|
}
|
||||||
|
|
||||||
ROOTFS_POSTPROCESS_COMMAND:prepend = "${@'cve_check_write_rootfs_manifest; ' if d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
|
ROOTFS_POSTPROCESS_COMMAND:prepend = "${@'cve_check_write_rootfs_manifest ' if d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
|
||||||
do_rootfs[recrdeptask] += "${@'do_cve_check' if d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
|
do_rootfs[recrdeptask] += "${@'do_cve_check' if d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
|
||||||
do_populate_sdk[recrdeptask] += "${@'do_cve_check' if d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
|
do_populate_sdk[recrdeptask] += "${@'do_cve_check' if d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
|
||||||
|
|
||||||
|
|
|
@ -23,7 +23,7 @@ inherit useradd_base
|
||||||
PACKAGE_INSTALL:append = " ${@['', 'base-passwd shadow'][bool(d.getVar('EXTRA_USERS_PARAMS'))]}"
|
PACKAGE_INSTALL:append = " ${@['', 'base-passwd shadow'][bool(d.getVar('EXTRA_USERS_PARAMS'))]}"
|
||||||
|
|
||||||
# Image level user / group settings
|
# Image level user / group settings
|
||||||
ROOTFS_POSTPROCESS_COMMAND:append = " set_user_group;"
|
ROOTFS_POSTPROCESS_COMMAND:append = " set_user_group"
|
||||||
|
|
||||||
# Image level user / group settings
|
# Image level user / group settings
|
||||||
set_user_group () {
|
set_user_group () {
|
||||||
|
|
|
@ -76,6 +76,6 @@ python buildinfo_sdk () {
|
||||||
bb.build.exec_func("buildinfo", d)
|
bb.build.exec_func("buildinfo", d)
|
||||||
}
|
}
|
||||||
|
|
||||||
IMAGE_PREPROCESS_COMMAND += "buildinfo_image;"
|
IMAGE_PREPROCESS_COMMAND += "buildinfo_image"
|
||||||
POPULATE_SDK_PRE_TARGET_COMMAND += "buildinfo_sdk;"
|
POPULATE_SDK_PRE_TARGET_COMMAND += "buildinfo_sdk"
|
||||||
|
|
||||||
|
|
|
@ -258,9 +258,9 @@ def execute_pre_post_process(d, cmds):
|
||||||
if cmds is None:
|
if cmds is None:
|
||||||
return
|
return
|
||||||
|
|
||||||
for cmd in cmds.strip().split(';'):
|
cmds = cmds.replace(";", " ")
|
||||||
cmd = cmd.strip()
|
|
||||||
if cmd != '':
|
for cmd in cmds.split():
|
||||||
bb.note("Executing %s ..." % cmd)
|
bb.note("Executing %s ..." % cmd)
|
||||||
bb.build.exec_func(cmd, d)
|
bb.build.exec_func(cmd, d)
|
||||||
|
|
||||||
|
|
|
@ -117,7 +117,7 @@ fakeroot do_tweak_image () {
|
||||||
ln -rs ${IMAGE_ROOTFS}/lib ${IMAGE_ROOTFS}/lib64
|
ln -rs ${IMAGE_ROOTFS}/lib ${IMAGE_ROOTFS}/lib64
|
||||||
}
|
}
|
||||||
|
|
||||||
IMAGE_PREPROCESS_COMMAND += "do_populate_poky_src; do_tweak_image; "
|
IMAGE_PREPROCESS_COMMAND += "do_populate_poky_src do_tweak_image"
|
||||||
# For pip usage above
|
# For pip usage above
|
||||||
do_image[network] = "1"
|
do_image[network] = "1"
|
||||||
|
|
||||||
|
|
|
@ -40,6 +40,6 @@ python tinyinitrd () {
|
||||||
init.write(newinit)
|
init.write(newinit)
|
||||||
}
|
}
|
||||||
|
|
||||||
IMAGE_PREPROCESS_COMMAND += "tinyinitrd;"
|
IMAGE_PREPROCESS_COMMAND += "tinyinitrd"
|
||||||
|
|
||||||
QB_KERNEL_CMDLINE_APPEND += "debugshell=3 init=/bin/busybox sh init"
|
QB_KERNEL_CMDLINE_APPEND += "debugshell=3 init=/bin/busybox sh init"
|
||||||
|
|
Loading…
Reference in New Issue
Block a user