summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGuojian <guojian.zhou@windriver.com>2017-08-24 19:52:34 +0800
committerLans Zhang <lans.zhang2008@gmail.com>2017-08-24 19:52:34 +0800
commit5a24b8f94f3388cece4f697f909c7c66a3bf8d49 (patch)
treed4cad04cae8f24b9d9ece829b25b043556a7091c
parent90fd1b523ad58a461de418bdbd97956e29897188 (diff)
downloadmeta-secure-core-5a24b8f94f3388cece4f697f909c7c66a3bf8d49.tar.gz
key-store: Fix two key-store-rpm-pubkey user key issues (#13)
1. user key pub rpm package also could be created. 2. The latest bitbake could not support the d.getVar() function nest call. Such as the following function call always return "None" d.getVar(d.getVar('RPM_KEY_DIR', True) + '/RPM-GPG-KEY-*', True) It caused the key-store-rpm-pubkey rpm package could not be created in the latest oe-core project. Signed-off-by: Guojian Zhou <guojian.zhou@windriver.com>
-rw-r--r--meta-signing-key/recipes-support/key-store/key-store_0.1.bb10
1 files changed, 5 insertions, 5 deletions
diff --git a/meta-signing-key/recipes-support/key-store/key-store_0.1.bb b/meta-signing-key/recipes-support/key-store/key-store_0.1.bb
index 472cef5..401646f 100644
--- a/meta-signing-key/recipes-support/key-store/key-store_0.1.bb
+++ b/meta-signing-key/recipes-support/key-store/key-store_0.1.bb
@@ -27,7 +27,7 @@ SYSTEM_CERT = "${KEY_DIR}/system_trusted_key.crt"
27IMA_CERT = "${KEY_DIR}/x509_evm.der" 27IMA_CERT = "${KEY_DIR}/x509_evm.der"
28 28
29python () { 29python () {
30 if uks_signing_model(d) != "sample": 30 if not (uks_signing_model(d) in "sample", "user"):
31 return 31 return
32 32
33 pn = d.getVar('PN', True) + '-system-trusted-privkey' 33 pn = d.getVar('PN', True) + '-system-trusted-privkey'
@@ -42,8 +42,8 @@ python () {
42 42
43 pn = d.getVar('PN', True) + '-rpm-pubkey' 43 pn = d.getVar('PN', True) + '-rpm-pubkey'
44 d.setVar('PACKAGES_prepend', pn + ' ') 44 d.setVar('PACKAGES_prepend', pn + ' ')
45 d.setVar('FILES_' + pn, d.getVar(d.getVar('RPM_KEY_DIR', True) + '/RPM-GPG-KEY-*', True)) 45 d.setVar('FILES_' + pn, d.getVar('RPM_KEY_DIR', True) + '/RPM-GPG-KEY-' + d.getVar('RPM_GPG_NAME', True))
46 d.setVar('CONFFILES_' + pn, d.getVar(d.getVar('RPM_KEY_DIR', True) + 'RPM-GPG-KEY-*', True)) 46 d.setVar('CONFFILES_' + pn, d.getVar('RPM_KEY_DIR', True) + '/RPM-GPG-KEY-' + d.getVar('RPM_GPG_NAME', True))
47 d.appendVar('RDEPENDS_' + pn, ' rpm') 47 d.appendVar('RDEPENDS_' + pn, ' rpm')
48} 48}
49 49
@@ -70,14 +70,14 @@ do_install() {
70 key_dir="${@uks_system_trusted_keys_dir(d)}" 70 key_dir="${@uks_system_trusted_keys_dir(d)}"
71 install -m 0644 "$key_dir/system_trusted_key.crt" "${D}${SYSTEM_CERT}" 71 install -m 0644 "$key_dir/system_trusted_key.crt" "${D}${SYSTEM_CERT}"
72 72
73 if [ "${@uks_signing_model(d)}" = "sample" ]; then 73 if [ "${@uks_signing_model(d)}" = "sample" -o "${@uks_signing_model(d)}" = "user" ]; then
74 install -m 0400 "$key_dir/system_trusted_key.key" "${D}${SYSTEM_PRIV_KEY}" 74 install -m 0400 "$key_dir/system_trusted_key.key" "${D}${SYSTEM_PRIV_KEY}"
75 fi 75 fi
76 76
77 key_dir="${@uks_ima_keys_dir(d)}" 77 key_dir="${@uks_ima_keys_dir(d)}"
78 install -m 0644 "$key_dir/x509_ima.der" "${D}${IMA_CERT}" 78 install -m 0644 "$key_dir/x509_ima.der" "${D}${IMA_CERT}"
79 79
80 if [ "${@uks_signing_model(d)}" = "sample" ]; then 80 if [ "${@uks_signing_model(d)}" = "sample" -o "${@uks_signing_model(d)}" = "user" ]; then
81 install -m 0400 "$key_dir/x509_ima.key" "${D}${IMA_PRIV_KEY}" 81 install -m 0400 "$key_dir/x509_ima.key" "${D}${IMA_PRIV_KEY}"
82 fi 82 fi
83} 83}