From e664a331d51d7cebc4bf8bfdd39eb534632f90d1 Mon Sep 17 00:00:00 2001 From: Lans Zhang Date: Thu, 29 Jun 2017 10:50:23 +0800 Subject: code style fixup Signed-off-by: Lans Zhang --- meta-integrity/recipes-kernel/linux/linux-yocto-integrity.inc | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) (limited to 'meta-integrity') diff --git a/meta-integrity/recipes-kernel/linux/linux-yocto-integrity.inc b/meta-integrity/recipes-kernel/linux/linux-yocto-integrity.inc index 34259de..247ae55 100644 --- a/meta-integrity/recipes-kernel/linux/linux-yocto-integrity.inc +++ b/meta-integrity/recipes-kernel/linux/linux-yocto-integrity.inc @@ -6,13 +6,15 @@ DEPENDS += "${@'key-store openssl-native' if d.getVar('IMA_ENABLED', True) == '1 # key-store-ima-cert is required in runtime but we hope it is available # in initramfs only. So we don't add it to RDEPENDS_${PN} here. -SRC_URI += " \ +SRC_URI += "\ ${@'file://ima.scc file://ima.cfg file://integrity.scc file://integrity.cfg' if d.getVar('IMA_ENABLED', True) == '1' else ''} \ " do_configure_append() { - [ -f "${STAGING_DIR_TARGET}${sysconfdir}/keys/system_trusted_key.pem" ] && + if [ -f "${STAGING_DIR_TARGET}${sysconfdir}/keys/system_trusted_key.pem" ]; then openssl x509 -in "${STAGING_DIR_TARGET}${sysconfdir}/keys/system_trusted_key.pem" \ - -outform DER -out "${B}/system_trusted_cert.x509" || + -outform DER -out "${B}/system_trusted_cert.x509" + else true + fi } -- cgit v1.2.3-54-g00ecf