mirror of
https://git.yoctoproject.org/poky
synced 2026-04-26 09:32:14 +02:00
image.bbclass: add rootfs_check_host_user_contaminated
This function is intended to be used in ROOTFS_POSTPROCESS_COMMAND, and checks for any paths outside of /home which are owned by the user running bitbake. (From OE-Core rev: 72903f7534cccad35886f2cad8aac98a59392ec7) Signed-off-by: Christopher Larson <chris_larson@mentor.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
2d4976772c
commit
635d38594c
@@ -460,6 +460,20 @@ rootfs_trim_schemas () {
|
||||
done
|
||||
}
|
||||
|
||||
rootfs_check_host_user_contaminated () {
|
||||
contaminated="${WORKDIR}/host-user-contaminated.txt"
|
||||
HOST_USER_UID="$(PSEUDO_UNLOAD=1 id -u)"
|
||||
HOST_USER_GID="$(PSEUDO_UNLOAD=1 id -g)"
|
||||
|
||||
find "${IMAGE_ROOTFS}" -wholename "${IMAGE_ROOTFS}/home" -prune \
|
||||
-user "$HOST_USER_UID" -o -group "$HOST_USER_GID" >"$contaminated"
|
||||
|
||||
if [ -s "$contaminated" ]; then
|
||||
echo "WARNING: Paths in the rootfs are owned by the same user or group as the user running bitbake. See the logfile for the specific paths."
|
||||
cat "$contaminated" | sed "s,^, ,"
|
||||
fi
|
||||
}
|
||||
|
||||
# Make any absolute links in a sysroot relative
|
||||
rootfs_sysroot_relativelinks () {
|
||||
sysroot-relativelinks.py ${SDK_OUTPUT}/${SDKTARGETSYSROOT}
|
||||
|
||||
Reference in New Issue
Block a user