diff options
author | Aleksandar Nikolic <aleksandar.nikolic010@gmail.com> | 2024-06-09 21:56:54 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2024-06-24 12:43:40 +0100 |
commit | edba6889b48dd80b5696320ec402478f7eb5c84d (patch) | |
tree | 891fcba1b398f9b65df1aaa3e9cf26b4f6f93e91 /meta/classes | |
parent | 44f1b2c56afd7fd202fe859476fab5a8ec0e912a (diff) | |
download | poky-edba6889b48dd80b5696320ec402478f7eb5c84d.tar.gz |
cve-check: Introduce CVE_CHECK_MANIFEST_JSON_SUFFIX
The variable contains the suffix of the CVE JSON manifest file.
By default, this variable is set to 'json', so the current behavior
is not changed, but enables developers to use some other suffix,
e.g., cve.json (similar to spdx.json).
(From OE-Core rev: d99eee76923659c0b95bf9ef415ae5d44f736d01)
Signed-off-by: Aleksandar Nikolic <an010@live.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes')
-rw-r--r-- | meta/classes/cve-check.bbclass | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 56ba8bceef..93a2a1413d 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass | |||
@@ -49,7 +49,8 @@ CVE_CHECK_DIR ??= "${DEPLOY_DIR}/cve" | |||
49 | CVE_CHECK_RECIPE_FILE ?= "${CVE_CHECK_DIR}/${PN}" | 49 | CVE_CHECK_RECIPE_FILE ?= "${CVE_CHECK_DIR}/${PN}" |
50 | CVE_CHECK_RECIPE_FILE_JSON ?= "${CVE_CHECK_DIR}/${PN}_cve.json" | 50 | CVE_CHECK_RECIPE_FILE_JSON ?= "${CVE_CHECK_DIR}/${PN}_cve.json" |
51 | CVE_CHECK_MANIFEST ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}.cve" | 51 | CVE_CHECK_MANIFEST ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}.cve" |
52 | CVE_CHECK_MANIFEST_JSON ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}.json" | 52 | CVE_CHECK_MANIFEST_JSON_SUFFIX ?= "json" |
53 | CVE_CHECK_MANIFEST_JSON ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}.${CVE_CHECK_MANIFEST_JSON_SUFFIX}" | ||
53 | CVE_CHECK_COPY_FILES ??= "1" | 54 | CVE_CHECK_COPY_FILES ??= "1" |
54 | CVE_CHECK_CREATE_MANIFEST ??= "1" | 55 | CVE_CHECK_CREATE_MANIFEST ??= "1" |
55 | 56 | ||
@@ -278,7 +279,8 @@ python cve_check_write_rootfs_manifest () { | |||
278 | bb.plain("Image CVE report stored in: %s" % manifest_name) | 279 | bb.plain("Image CVE report stored in: %s" % manifest_name) |
279 | 280 | ||
280 | if enable_json: | 281 | if enable_json: |
281 | link_path = os.path.join(deploy_dir, "%s.json" % link_name) | 282 | manifest_name_suffix = d.getVar("CVE_CHECK_MANIFEST_JSON_SUFFIX") |
283 | link_path = os.path.join(deploy_dir, "%s.%s" % (link_name, manifest_name_suffix)) | ||
282 | manifest_name = d.getVar("CVE_CHECK_MANIFEST_JSON") | 284 | manifest_name = d.getVar("CVE_CHECK_MANIFEST_JSON") |
283 | 285 | ||
284 | with open(manifest_name, "w") as f: | 286 | with open(manifest_name, "w") as f: |