2016-01-05 17:52:06 +00:00
|
|
|
|
|
|
|
# Zap the root password if debug-tweaks feature is not enabled
|
|
|
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'empty-root-password' ], "", "zap_empty_root_password ; ",d)}'
|
|
|
|
|
|
|
|
# Allow dropbear/openssh to accept logins from accounts with an empty password string if debug-tweaks is enabled
|
|
|
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'allow-empty-password' ], "ssh_allow_empty_password; ", "",d)}'
|
|
|
|
|
|
|
|
# Enable postinst logging if debug-tweaks is enabled
|
|
|
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'post-install-logging' ], "postinst_enable_logging; ", "",d)}'
|
|
|
|
|
|
|
|
# Create /etc/timestamp during image construction to give a reasonably sane default time setting
|
|
|
|
ROOTFS_POSTPROCESS_COMMAND += "rootfs_update_timestamp ; "
|
|
|
|
|
|
|
|
# Tweak the mount options for rootfs in /etc/fstab if read-only-rootfs is enabled
|
|
|
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", "read-only-rootfs", "read_only_rootfs_hook; ", "",d)}'
|
|
|
|
|
2016-11-25 17:37:06 +00:00
|
|
|
# Generates test data file with data store variables expanded in json format
|
|
|
|
ROOTFS_POSTPROCESS_COMMAND += "write_image_test_data ; "
|
|
|
|
|
2016-01-05 17:52:06 +00:00
|
|
|
# Write manifest
|
2016-09-01 08:56:00 +00:00
|
|
|
IMAGE_MANIFEST = "${IMGDEPLOYDIR}/${IMAGE_NAME}.rootfs.manifest"
|
2016-01-05 17:52:06 +00:00
|
|
|
ROOTFS_POSTUNINSTALL_COMMAND =+ "write_image_manifest ; "
|
|
|
|
# Set default postinst log file
|
|
|
|
POSTINST_LOGFILE ?= "${localstatedir}/log/postinstall.log"
|
|
|
|
# Set default target for systemd images
|
|
|
|
SYSTEMD_DEFAULT_TARGET ?= '${@bb.utils.contains("IMAGE_FEATURES", "x11-base", "graphical.target", "multi-user.target", d)}'
|
2016-05-31 20:59:54 +00:00
|
|
|
ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("DISTRO_FEATURES", "systemd", "set_systemd_default_target; systemd_create_users;", "", d)}'
|
2016-01-05 17:52:06 +00:00
|
|
|
|
|
|
|
ROOTFS_POSTPROCESS_COMMAND += 'empty_var_volatile;'
|
|
|
|
|
|
|
|
# Disable DNS lookups, the SSH_DISABLE_DNS_LOOKUP can be overridden to allow
|
|
|
|
# distros to choose not to take this change
|
|
|
|
SSH_DISABLE_DNS_LOOKUP ?= " ssh_disable_dns_lookup ; "
|
|
|
|
ROOTFS_POSTPROCESS_COMMAND_append_qemuall = "${SSH_DISABLE_DNS_LOOKUP}"
|
|
|
|
|
rootfs-postcommands.bbclass: sort passwd entries
The /etc passwd files in a rootfs consist of the default entries from
base-passwd plus anything that gets added via package installation,
EXTRA_USERS_PARAMS and/or system sysusers.
The execution order of preinst scripts is not perfectly deterministic,
or at least unrelated changes caused it to change in a
non-deterministic way, resulting in irrelevant changes in the order of
passwd entries.
useradd-staticids.bbclass ensures that the numeric IDs don't change,
but re-ordering can still occur, which is bad for reproducible builds
and file-based update mechanisms like swupd which work best if changes
are as minimal as possible.
To achieve that, the files get sorted in a post-processing command,
enabled by default. Sorting is based primarily on the numeric IDs, so
for example, the "root" user continues to be listed first. "nobody"
now is at the end, which wasn't the case before.
The order of the entries should not matter, but in obscure cases where
it does (like having multiple entries for the same numeric ID) this
behavior can be disabled by setting SORT_PASSWD_POSTPROCESS_COMMAND to
an empty string.
Fixes: YOCTO #10520
(From OE-Core rev: ba684f436908ac2300a00c174d5aa06b4f824367)
Signed-off-by: Patrick Ohly <patrick.ohly@intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2017-01-09 10:09:42 +00:00
|
|
|
# Sort the user and group entries in /etc by ID in order to make the content
|
|
|
|
# deterministic. Package installs are not deterministic, causing the ordering
|
|
|
|
# of entries to change between builds. In case that this isn't desired,
|
|
|
|
# the command can be overridden.
|
|
|
|
#
|
|
|
|
# Note that useradd-staticids.bbclass has to be used to ensure that
|
|
|
|
# the numeric IDs of dynamically created entries remain stable.
|
|
|
|
#
|
|
|
|
# We want this to run as late as possible, in particular after
|
|
|
|
# systemd_sysusers_create and set_user_group. Using _append is not
|
|
|
|
# enough for that, set_user_group is added that way and would end
|
|
|
|
# up running after us.
|
|
|
|
SORT_PASSWD_POSTPROCESS_COMMAND ??= " sort_passwd; "
|
|
|
|
python () {
|
|
|
|
d.appendVar('ROOTFS_POSTPROCESS_COMMAND', '${SORT_PASSWD_POSTPROCESS_COMMAND}')
|
|
|
|
}
|
|
|
|
|
2016-05-31 20:59:54 +00:00
|
|
|
systemd_create_users () {
|
|
|
|
for conffile in ${IMAGE_ROOTFS}/usr/lib/sysusers.d/systemd.conf ${IMAGE_ROOTFS}/usr/lib/sysusers.d/systemd-remote.conf; do
|
|
|
|
[ -e $conffile ] || continue
|
|
|
|
grep -v "^#" $conffile | sed -e '/^$/d' | while read type name id comment; do
|
|
|
|
if [ "$type" = "u" ]; then
|
|
|
|
useradd_params="--shell /sbin/nologin"
|
|
|
|
[ "$id" != "-" ] && useradd_params="$useradd_params --uid $id"
|
|
|
|
[ "$comment" != "-" ] && useradd_params="$useradd_params --comment $comment"
|
|
|
|
useradd_params="$useradd_params --system $name"
|
|
|
|
eval useradd --root ${IMAGE_ROOTFS} $useradd_params || true
|
|
|
|
elif [ "$type" = "g" ]; then
|
|
|
|
groupadd_params=""
|
|
|
|
[ "$id" != "-" ] && groupadd_params="$groupadd_params --gid $id"
|
|
|
|
groupadd_params="$groupadd_params --system $name"
|
|
|
|
eval groupadd --root ${IMAGE_ROOTFS} $groupadd_params || true
|
2016-07-14 18:12:40 +00:00
|
|
|
elif [ "$type" = "m" ]; then
|
|
|
|
group=$id
|
|
|
|
if [ ! `grep -q "^${group}:" ${IMAGE_ROOTFS}${sysconfdir}/group` ]; then
|
|
|
|
eval groupadd --root ${IMAGE_ROOTFS} --system $group
|
|
|
|
fi
|
|
|
|
if [ ! `grep -q "^${name}:" ${IMAGE_ROOTFS}${sysconfdir}/passwd` ]; then
|
|
|
|
eval useradd --root ${IMAGE_ROOTFS} --shell /sbin/nologin --system $name
|
|
|
|
fi
|
|
|
|
eval usermod --root ${IMAGE_ROOTFS} -a -G $group $name
|
2016-05-31 20:59:54 +00:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
done
|
|
|
|
}
|
2016-01-05 17:52:06 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# A hook function to support read-only-rootfs IMAGE_FEATURES
|
|
|
|
#
|
|
|
|
read_only_rootfs_hook () {
|
|
|
|
# Tweak the mount option and fs_passno for rootfs in fstab
|
|
|
|
sed -i -e '/^[#[:space:]]*\/dev\/root/{s/defaults/ro/;s/\([[:space:]]*[[:digit:]]\)\([[:space:]]*\)[[:digit:]]$/\1\20/}' ${IMAGE_ROOTFS}/etc/fstab
|
|
|
|
|
|
|
|
# If we're using openssh and the /etc/ssh directory has no pre-generated keys,
|
|
|
|
# we should configure openssh to use the configuration file /etc/ssh/sshd_config_readonly
|
|
|
|
# and the keys under /var/run/ssh.
|
|
|
|
if [ -d ${IMAGE_ROOTFS}/etc/ssh ]; then
|
|
|
|
if [ -e ${IMAGE_ROOTFS}/etc/ssh/ssh_host_rsa_key ]; then
|
2017-10-06 12:12:46 +00:00
|
|
|
echo "SYSCONFDIR=\${SYSCONFDIR:-/etc/ssh}" >> ${IMAGE_ROOTFS}/etc/default/ssh
|
2016-01-05 17:52:06 +00:00
|
|
|
echo "SSHD_OPTS=" >> ${IMAGE_ROOTFS}/etc/default/ssh
|
|
|
|
else
|
2017-10-06 12:12:46 +00:00
|
|
|
echo "SYSCONFDIR=\${SYSCONFDIR:-/var/run/ssh}" >> ${IMAGE_ROOTFS}/etc/default/ssh
|
2016-01-05 17:52:06 +00:00
|
|
|
echo "SSHD_OPTS='-f /etc/ssh/sshd_config_readonly'" >> ${IMAGE_ROOTFS}/etc/default/ssh
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Also tweak the key location for dropbear in the same way.
|
|
|
|
if [ -d ${IMAGE_ROOTFS}/etc/dropbear ]; then
|
|
|
|
if [ -e ${IMAGE_ROOTFS}/etc/dropbear/dropbear_rsa_host_key ]; then
|
|
|
|
echo "DROPBEAR_RSAKEY_DIR=/etc/dropbear" >> ${IMAGE_ROOTFS}/etc/default/dropbear
|
|
|
|
else
|
|
|
|
echo "DROPBEAR_RSAKEY_DIR=/var/lib/dropbear" >> ${IMAGE_ROOTFS}/etc/default/dropbear
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
if ${@bb.utils.contains("DISTRO_FEATURES", "sysvinit", "true", "false", d)}; then
|
|
|
|
# Change the value of ROOTFS_READ_ONLY in /etc/default/rcS to yes
|
|
|
|
if [ -e ${IMAGE_ROOTFS}/etc/default/rcS ]; then
|
|
|
|
sed -i 's/ROOTFS_READ_ONLY=no/ROOTFS_READ_ONLY=yes/' ${IMAGE_ROOTFS}/etc/default/rcS
|
|
|
|
fi
|
|
|
|
# Run populate-volatile.sh at rootfs time to set up basic files
|
|
|
|
# and directories to support read-only rootfs.
|
|
|
|
if [ -x ${IMAGE_ROOTFS}/etc/init.d/populate-volatile.sh ]; then
|
|
|
|
${IMAGE_ROOTFS}/etc/init.d/populate-volatile.sh
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# This function is intended to disallow empty root password if 'debug-tweaks' is not in IMAGE_FEATURES.
|
|
|
|
#
|
|
|
|
zap_empty_root_password () {
|
|
|
|
if [ -e ${IMAGE_ROOTFS}/etc/shadow ]; then
|
|
|
|
sed -i 's%^root::%root:*:%' ${IMAGE_ROOTFS}/etc/shadow
|
|
|
|
fi
|
|
|
|
if [ -e ${IMAGE_ROOTFS}/etc/passwd ]; then
|
|
|
|
sed -i 's%^root::%root:*:%' ${IMAGE_ROOTFS}/etc/passwd
|
|
|
|
fi
|
2017-04-19 19:49:03 +00:00
|
|
|
}
|
2016-01-05 17:52:06 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# allow dropbear/openssh to accept root logins and logins from accounts with an empty password string
|
|
|
|
#
|
|
|
|
ssh_allow_empty_password () {
|
2016-02-26 09:12:21 +00:00
|
|
|
for config in sshd_config sshd_config_readonly; do
|
|
|
|
if [ -e ${IMAGE_ROOTFS}${sysconfdir}/ssh/$config ]; then
|
|
|
|
sed -i 's/^[#[:space:]]*PermitRootLogin.*/PermitRootLogin yes/' ${IMAGE_ROOTFS}${sysconfdir}/ssh/$config
|
|
|
|
sed -i 's/^[#[:space:]]*PermitEmptyPasswords.*/PermitEmptyPasswords yes/' ${IMAGE_ROOTFS}${sysconfdir}/ssh/$config
|
|
|
|
fi
|
|
|
|
done
|
2016-01-05 17:52:06 +00:00
|
|
|
|
|
|
|
if [ -e ${IMAGE_ROOTFS}${sbindir}/dropbear ] ; then
|
|
|
|
if grep -q DROPBEAR_EXTRA_ARGS ${IMAGE_ROOTFS}${sysconfdir}/default/dropbear 2>/dev/null ; then
|
|
|
|
if ! grep -q "DROPBEAR_EXTRA_ARGS=.*-B" ${IMAGE_ROOTFS}${sysconfdir}/default/dropbear ; then
|
|
|
|
sed -i 's/^DROPBEAR_EXTRA_ARGS="*\([^"]*\)"*/DROPBEAR_EXTRA_ARGS="\1 -B"/' ${IMAGE_ROOTFS}${sysconfdir}/default/dropbear
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
printf '\nDROPBEAR_EXTRA_ARGS="-B"\n' >> ${IMAGE_ROOTFS}${sysconfdir}/default/dropbear
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -d ${IMAGE_ROOTFS}${sysconfdir}/pam.d ] ; then
|
2017-08-17 05:43:17 +00:00
|
|
|
for f in `find ${IMAGE_ROOTFS}${sysconfdir}/pam.d/* -type f -exec test -e {} \; -print`
|
|
|
|
do
|
|
|
|
sed -i 's/nullok_secure/nullok/' $f
|
|
|
|
done
|
2016-01-05 17:52:06 +00:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
ssh_disable_dns_lookup () {
|
|
|
|
if [ -e ${IMAGE_ROOTFS}${sysconfdir}/ssh/sshd_config ]; then
|
|
|
|
sed -i -e 's:#UseDNS yes:UseDNS no:' ${IMAGE_ROOTFS}${sysconfdir}/ssh/sshd_config
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
rootfs-postcommands.bbclass: sort passwd entries
The /etc passwd files in a rootfs consist of the default entries from
base-passwd plus anything that gets added via package installation,
EXTRA_USERS_PARAMS and/or system sysusers.
The execution order of preinst scripts is not perfectly deterministic,
or at least unrelated changes caused it to change in a
non-deterministic way, resulting in irrelevant changes in the order of
passwd entries.
useradd-staticids.bbclass ensures that the numeric IDs don't change,
but re-ordering can still occur, which is bad for reproducible builds
and file-based update mechanisms like swupd which work best if changes
are as minimal as possible.
To achieve that, the files get sorted in a post-processing command,
enabled by default. Sorting is based primarily on the numeric IDs, so
for example, the "root" user continues to be listed first. "nobody"
now is at the end, which wasn't the case before.
The order of the entries should not matter, but in obscure cases where
it does (like having multiple entries for the same numeric ID) this
behavior can be disabled by setting SORT_PASSWD_POSTPROCESS_COMMAND to
an empty string.
Fixes: YOCTO #10520
(From OE-Core rev: ba684f436908ac2300a00c174d5aa06b4f824367)
Signed-off-by: Patrick Ohly <patrick.ohly@intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2017-01-09 10:09:42 +00:00
|
|
|
python sort_passwd () {
|
|
|
|
import rootfspostcommands
|
|
|
|
rootfspostcommands.sort_passwd(d.expand('${IMAGE_ROOTFS}${sysconfdir}'))
|
|
|
|
}
|
|
|
|
|
2016-01-05 17:52:06 +00:00
|
|
|
#
|
|
|
|
# Enable postinst logging if debug-tweaks is enabled
|
|
|
|
#
|
|
|
|
postinst_enable_logging () {
|
|
|
|
mkdir -p ${IMAGE_ROOTFS}${sysconfdir}/default
|
|
|
|
echo "POSTINST_LOGGING=1" >> ${IMAGE_ROOTFS}${sysconfdir}/default/postinst
|
|
|
|
echo "LOGFILE=${POSTINST_LOGFILE}" >> ${IMAGE_ROOTFS}${sysconfdir}/default/postinst
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Modify systemd default target
|
|
|
|
#
|
|
|
|
set_systemd_default_target () {
|
|
|
|
if [ -d ${IMAGE_ROOTFS}${sysconfdir}/systemd/system -a -e ${IMAGE_ROOTFS}${systemd_unitdir}/system/${SYSTEMD_DEFAULT_TARGET} ]; then
|
|
|
|
ln -sf ${systemd_unitdir}/system/${SYSTEMD_DEFAULT_TARGET} ${IMAGE_ROOTFS}${sysconfdir}/systemd/system/default.target
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# If /var/volatile is not empty, we have seen problems where programs such as the
|
|
|
|
# journal make assumptions based on the contents of /var/volatile. The journal
|
|
|
|
# would then write to /var/volatile before it was mounted, thus hiding the
|
|
|
|
# items previously written.
|
|
|
|
#
|
|
|
|
# This change is to attempt to fix those types of issues in a way that doesn't
|
|
|
|
# affect users that may not be using /var/volatile.
|
|
|
|
empty_var_volatile () {
|
|
|
|
if [ -e ${IMAGE_ROOTFS}/etc/fstab ]; then
|
|
|
|
match=`awk '$1 !~ "#" && $2 ~ /\/var\/volatile/{print $2}' ${IMAGE_ROOTFS}/etc/fstab 2> /dev/null`
|
|
|
|
if [ -n "$match" ]; then
|
|
|
|
find ${IMAGE_ROOTFS}/var/volatile -mindepth 1 -delete
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Turn any symbolic /sbin/init link into a file
|
|
|
|
remove_init_link () {
|
|
|
|
if [ -h ${IMAGE_ROOTFS}/sbin/init ]; then
|
|
|
|
LINKFILE=${IMAGE_ROOTFS}`readlink ${IMAGE_ROOTFS}/sbin/init`
|
|
|
|
rm ${IMAGE_ROOTFS}/sbin/init
|
|
|
|
cp $LINKFILE ${IMAGE_ROOTFS}/sbin/init
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
make_zimage_symlink_relative () {
|
|
|
|
if [ -L ${IMAGE_ROOTFS}/boot/zImage ]; then
|
|
|
|
(cd ${IMAGE_ROOTFS}/boot/ && for i in `ls zImage-* | sort`; do ln -sf $i zImage; done)
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
python write_image_manifest () {
|
|
|
|
from oe.rootfs import image_list_installed_packages
|
2016-01-18 14:33:06 +00:00
|
|
|
from oe.utils import format_pkg_list
|
2016-01-06 22:57:46 +00:00
|
|
|
|
2016-12-14 21:13:04 +00:00
|
|
|
deploy_dir = d.getVar('IMGDEPLOYDIR')
|
|
|
|
link_name = d.getVar('IMAGE_LINK_NAME')
|
|
|
|
manifest_name = d.getVar('IMAGE_MANIFEST')
|
2016-01-06 22:57:46 +00:00
|
|
|
|
2016-03-23 15:37:59 +00:00
|
|
|
if not manifest_name:
|
|
|
|
return
|
|
|
|
|
2016-01-18 14:33:06 +00:00
|
|
|
pkgs = image_list_installed_packages(d)
|
2016-01-06 22:57:46 +00:00
|
|
|
with open(manifest_name, 'w+') as image_manifest:
|
2016-01-18 14:33:06 +00:00
|
|
|
image_manifest.write(format_pkg_list(pkgs, "ver"))
|
2016-01-05 17:52:06 +00:00
|
|
|
image_manifest.write("\n")
|
2016-01-06 22:57:46 +00:00
|
|
|
|
2016-03-23 15:37:59 +00:00
|
|
|
if os.path.exists(manifest_name):
|
2016-01-06 22:57:46 +00:00
|
|
|
manifest_link = deploy_dir + "/" + link_name + ".manifest"
|
2016-04-13 11:14:23 +00:00
|
|
|
if os.path.lexists(manifest_link):
|
2016-01-06 22:57:46 +00:00
|
|
|
os.remove(manifest_link)
|
|
|
|
os.symlink(os.path.basename(manifest_name), manifest_link)
|
2016-01-05 17:52:06 +00:00
|
|
|
}
|
|
|
|
|
2017-04-19 19:49:03 +00:00
|
|
|
# Can be use to create /etc/timestamp during image construction to give a reasonably
|
2016-01-05 17:52:06 +00:00
|
|
|
# sane default time setting
|
|
|
|
rootfs_update_timestamp () {
|
|
|
|
date -u +%4Y%2m%2d%2H%2M%2S >${IMAGE_ROOTFS}/etc/timestamp
|
|
|
|
}
|
|
|
|
|
|
|
|
# Prevent X from being started
|
|
|
|
rootfs_no_x_startup () {
|
|
|
|
if [ -f ${IMAGE_ROOTFS}/etc/init.d/xserver-nodm ]; then
|
|
|
|
chmod a-x ${IMAGE_ROOTFS}/etc/init.d/xserver-nodm
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
rootfs_trim_schemas () {
|
|
|
|
for schema in ${IMAGE_ROOTFS}/etc/gconf/schemas/*.schemas
|
|
|
|
do
|
|
|
|
# Need this in case no files exist
|
|
|
|
if [ -e $schema ]; then
|
|
|
|
oe-trim-schemas $schema > $schema.new
|
|
|
|
mv $schema.new $schema
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
rootfs_check_host_user_contaminated () {
|
|
|
|
contaminated="${WORKDIR}/host-user-contaminated.txt"
|
|
|
|
HOST_USER_UID="$(PSEUDO_UNLOAD=1 id -u)"
|
|
|
|
HOST_USER_GID="$(PSEUDO_UNLOAD=1 id -g)"
|
|
|
|
|
|
|
|
find "${IMAGE_ROOTFS}" -wholename "${IMAGE_ROOTFS}/home" -prune \
|
|
|
|
-user "$HOST_USER_UID" -o -group "$HOST_USER_GID" >"$contaminated"
|
|
|
|
|
|
|
|
if [ -s "$contaminated" ]; then
|
|
|
|
echo "WARNING: Paths in the rootfs are owned by the same user or group as the user running bitbake. See the logfile for the specific paths."
|
|
|
|
cat "$contaminated" | sed "s,^, ,"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Make any absolute links in a sysroot relative
|
|
|
|
rootfs_sysroot_relativelinks () {
|
|
|
|
sysroot-relativelinks.py ${SDK_OUTPUT}/${SDKTARGETSYSROOT}
|
|
|
|
}
|
2016-11-25 17:37:06 +00:00
|
|
|
|
|
|
|
# Generated test data json file
|
|
|
|
python write_image_test_data() {
|
|
|
|
from oe.data import export2json
|
|
|
|
|
2017-01-26 13:26:44 +00:00
|
|
|
testdata = "%s/%s.testdata.json" % (d.getVar('DEPLOY_DIR_IMAGE'), d.getVar('IMAGE_NAME'))
|
|
|
|
testdata_link = "%s/%s.testdata.json" % (d.getVar('DEPLOY_DIR_IMAGE'), d.getVar('IMAGE_LINK_NAME'))
|
2016-11-25 17:37:06 +00:00
|
|
|
|
|
|
|
bb.utils.mkdirhier(os.path.dirname(testdata))
|
2017-04-19 19:49:03 +00:00
|
|
|
searchString = "%s/"%(d.getVar("TOPDIR")).replace("//","/")
|
|
|
|
export2json(d, testdata,searchString=searchString,replaceString="")
|
2016-11-25 17:37:06 +00:00
|
|
|
|
2017-08-17 10:49:49 +00:00
|
|
|
if testdata_link != testdata:
|
|
|
|
if os.path.lexists(testdata_link):
|
|
|
|
os.remove(testdata_link)
|
|
|
|
os.symlink(os.path.basename(testdata), testdata_link)
|
2016-11-25 17:37:06 +00:00
|
|
|
}
|
2017-09-25 11:23:35 +00:00
|
|
|
write_image_test_data[vardepsexclude] += "TOPDIR"
|
2017-09-04 05:12:24 +00:00
|
|
|
|
|
|
|
# Check for unsatisfied recommendations (RRECOMMENDS)
|
|
|
|
python rootfs_log_check_recommends() {
|
|
|
|
log_path = d.expand("${T}/log.do_rootfs")
|
|
|
|
with open(log_path, 'r') as log:
|
|
|
|
for line in log:
|
|
|
|
if 'log_check' in line:
|
|
|
|
continue
|
|
|
|
|
|
|
|
if 'unsatisfied recommendation for' in line:
|
|
|
|
bb.warn('[log_check] %s: %s' % (d.getVar('PN', True), line))
|
|
|
|
}
|