|
[PATCH 1/4] eudev: Upgrade 3.2.10 -> 3.2.11
The upstream has moved from Gentoo to GitHub and is now maintained by a
new collection of cross-distribution contributors.
Drop the revert of the userspace firmware loading removal patch as these
are
The upstream has moved from Gentoo to GitHub and is now maintained by a
new collection of cross-distribution contributors.
Drop the revert of the userspace firmware loading removal patch as these
are
|
By
Alex Kiernan
·
#165360
·
|
|
Re: [PATCH v2] gnutls: Added fips support option.
<leimaohui@...> wrote:
Perhaps there could be
PACKAGECONFIG[fips] =
<leimaohui@...> wrote:
Perhaps there could be
PACKAGECONFIG[fips] =
|
By
Alexander Kanavin
·
#165359
·
|
|
Re: [PATCH 1/4] eudev: Upgrade 3.2.10 -> 3.2.11
Will do.
--
Alex Kiernan
By
Alex Kiernan
·
#165358
·
|
|
Re: [PATCH 1/4] eudev: Upgrade 3.2.10 -> 3.2.11
Thanks, can you check that 'devtool latest-version eudev' works
please? And fix UPSTREAM_CHECK_URI accordingly.
Alex
Thanks, can you check that 'devtool latest-version eudev' works
please? And fix UPSTREAM_CHECK_URI accordingly.
Alex
|
By
Alexander Kanavin
·
#165357
·
|
|
[PATCH 4/4] openssh: Add openssh-sftp-server to openssh RDEPENDS
OpenSSH 9.0 uses sftp by default as the transport for scp, add in
sftp-server so that this works as expected for users, rather than being
left with a confusing "scp: Connection closed"
OpenSSH 9.0 uses sftp by default as the transport for scp, add in
sftp-server so that this works as expected for users, rather than being
left with a confusing "scp: Connection closed"
|
By
Alex Kiernan
·
#165356
·
|
|
[PATCH 3/4] pypi.bbclass: Set CVE_PRODUCT to PYPI_PACKAGE
The CVE product name for PyPI packages is (usually) the same as the PyPI
package name (and not our recipe name), so use that as the default.
Signed-off-by: Alex Kiernan <alexk@...>
Signed-off-by:
The CVE product name for PyPI packages is (usually) the same as the PyPI
package name (and not our recipe name), so use that as the default.
Signed-off-by: Alex Kiernan <alexk@...>
Signed-off-by:
|
By
Alex Kiernan
·
#165355
·
|
|
[PATCH 2/4] eudev: Add PACKAGECONFIG for manpages & selinux
Drop DEPENDS on libxslt-native which is unused as the tarball includes
the manpages and the build process never invokes the script which
regenerates them (make.sh)
Signed-off-by: Alex Kiernan
Drop DEPENDS on libxslt-native which is unused as the tarball includes
the manpages and the build process never invokes the script which
regenerates them (make.sh)
Signed-off-by: Alex Kiernan
|
By
Alex Kiernan
·
#165354
·
|
|
[PATCH 1/4] eudev: Upgrade 3.2.10 -> 3.2.11
The upstream has moved from Gentoo to GitHub and is now maintained by a
new collection of cross-distribution contributors.
Drop the revert of the userspace firmware loading removal patch as these
are
The upstream has moved from Gentoo to GitHub and is now maintained by a
new collection of cross-distribution contributors.
Drop the revert of the userspace firmware loading removal patch as these
are
|
By
Alex Kiernan
·
#165353
·
|
|
Re: gcc12 testing results
since its now added to AB, I am hoping this does not become a holding
block for fundamental changes
like compiler upgrades. perhaps it should be made optional for master
if thats not where CI efforts
since its now added to AB, I am hoping this does not become a holding
block for fundamental changes
like compiler upgrades. perhaps it should be made optional for master
if thats not where CI efforts
|
By
Khem Raj
·
#165352
·
|
|
Re: gcc12 testing results
why are we pinning edgerouter-alt to 5.10 ?
why are we pinning edgerouter-alt to 5.10 ?
|
By
Khem Raj
·
#165351
·
|
|
Re: [PATCH v2] gnutls: Added fips support option.
Hi, Alex
But because gnutls-native also need to enable fips, circular dependency error will occur in this way.
---------------------------------------------
ERROR: 288 unbuildable tasks were
Hi, Alex
But because gnutls-native also need to enable fips, circular dependency error will occur in this way.
---------------------------------------------
ERROR: 288 unbuildable tasks were
|
By
leimaohui
·
#165350
·
|
|
Re: gcc12 testing results
The Xen guys will hopefully get around to it shortly, but we are still
going through significant work to get kirkstone stabilized and
released for meta-virt, so there's unlikely to be anything
The Xen guys will hopefully get around to it shortly, but we are still
going through significant work to get kirkstone stabilized and
released for meta-virt, so there's unlikely to be anything
|
By
Bruce Ashfield
·
#165349
·
|
|
[PATCH 5/5] Revert "bitbake.conf: mark all directories as safe for git to read"
Turns out this doesn't actually work, as git doesn't respect the environm=
ent
when reading the safe.directory configuration variable.
This reverts commit
Turns out this doesn't actually work, as git doesn't respect the environm=
ent
when reading the safe.directory configuration variable.
This reverts commit
|
By
Ross Burton
·
#165348
·
|
|
[PATCH 4/5] scripts/git: Ensure we don't have circular references
From: Richard Purdie <richard.purdie@...>
This is horrible but I'm running out of better ideas. We hit circular ref=
erence
issues which we were trying to avoid in the core HOSTTOOLS
From: Richard Purdie <richard.purdie@...>
This is horrible but I'm running out of better ideas. We hit circular ref=
erence
issues which we were trying to avoid in the core HOSTTOOLS
|
By
Ross Burton
·
#165347
·
|
|
[PATCH 3/5] scripts: Make git intercept global
From: Richard Purdie <richard.purdie@...>
The previous minimially invasive git intercept simply isn't enough. For e=
xample,
meson used in the igt-gpu-tools recipe hardcodes the path
From: Richard Purdie <richard.purdie@...>
The previous minimially invasive git intercept simply isn't enough. For e=
xample,
meson used in the igt-gpu-tools recipe hardcodes the path
|
By
Ross Burton
·
#165346
·
|
|
[PATCH 2/5] base: Avoid circular references to our own scripts
From: Richard Purdie <richard.purdie@...>
We'd like to intercept git calls but we don't want circular references
and HOSTTOOLS currently sets them up. Tweak to avoid
From: Richard Purdie <richard.purdie@...>
We'd like to intercept git calls but we don't want circular references
and HOSTTOOLS currently sets them up. Tweak to avoid
|
By
Ross Burton
·
#165345
·
|
|
[PATCH 1/5] oeqa/selftest: add test for git working correctly inside pseudo
The fix for CVE-2022-24765 in git[1] breaks any use of git inside
pseudo. Add a simple test case to oe-selftest to verify that at least
basic uses of git work fine under pseudo.
[1]
The fix for CVE-2022-24765 in git[1] breaks any use of git inside
pseudo. Add a simple test case to oe-selftest to verify that at least
basic uses of git work fine under pseudo.
[1]
|
By
Ross Burton
·
#165344
·
|
|
Re: gcc12 testing results
yeah meta-virt is seemingly a new addition. Adding Bruce also about
the failures.
yeah meta-virt is seemingly a new addition. Adding Bruce also about
the failures.
|
By
Khem Raj
·
#165343
·
|
|
Re: [meta][dunfell][PATCH] fribidi: Add fix for CVE-2022-25308, CVE-2022-25309 and CVE-2022-25310
You can simplify your subject to: [OE-core][dunfell] fribidi: Add fix
for CVE-2022-25308, CVE-2022-25309 and CVE-2022-25310
Sadly the patch in the recipe does not apply. Have you done a test
You can simplify your subject to: [OE-core][dunfell] fribidi: Add fix
for CVE-2022-25308, CVE-2022-25309 and CVE-2022-25310
Sadly the patch in the recipe does not apply. Have you done a test
|
By
Steve Sakoman
·
#165342
·
|
|
Re: [meta][dunfell][PATCH] libinput: Add fix for CVE-2022-1215
You can simplify your subject line to just: [OE-core][dunfell]
libinput: Add fix for CVE-2022-1215
Unfortunately the patches in the recipe still do not apply. Have you
done a test build?
ERROR:
You can simplify your subject line to just: [OE-core][dunfell]
libinput: Add fix for CVE-2022-1215
Unfortunately the patches in the recipe still do not apply. Have you
done a test build?
ERROR:
|
By
Steve Sakoman
·
#165341
·
|