Reviewed-by: Ernst Sjöstrand <[email protected]>
Den tis 17 maj 2022 kl 08:01 skrev Marta Rybczynska <[email protected]>:
> The addition of summary output caused two issues: error when building
> an image and the fact that JSON output was generated even when
> CVE_CHECK_FORMAT_JSON.
>
> When generating an image it caused an error like:
> ERROR: core-image-minimal-1.0-r0 do_rootfs: Error executing a python
> function in exec_func_python() autogenerated:
>
> The stack trace of python calls that resulted in this exception/failure
> was:
> File: 'exec_func_python() autogenerated', lineno: 2, function: <module>
> 0001:
> *** 0002:cve_check_write_rootfs_manifest(d)
> 0003:
> File: '/home/alexk/poky/meta/classes/cve-check.bbclass', lineno: 213,
> function: cve_check_write_rootfs_manifest
> 0209:
> 0210: link_path = os.path.join(deploy_dir, "%s.json" %
> link_name)
> 0211: manifest_path = d.getVar("CVE_CHECK_MANIFEST_JSON")
> 0212: bb.note("Generating JSON CVE manifest")
> *** 0213: generate_json_report(json_summary_name,
> json_summary_link_name)
> 0214: bb.plain("Image CVE JSON report stored in: %s" %
> link_path)
> 0215:}
> 0216:
> 0217:ROOTFS_POSTPROCESS_COMMAND:prepend =
> "${@'cve_check_write_rootfs_manifest; ' if
> d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
> Exception: NameError: name 'json_summary_name' is not defined
>
> The fix is to pass the d variable to the pure python function
> generate_json_report
> to get correct values of variables and add conditions for the JSON
> output where needed.
>
> In addition clarify the message presenting the summary JSON file,
> which isn't related to an image.
>
> Uses partial fixes from Alex Kiernan, Ernst Sjöstrand (ernstp),
> and Davide Gardenal.
>
> Fixes: f2987891d315 ("cve-check: add JSON format to summary output")
>
> Signed-off-by: Marta Rybczynska <[email protected]>
> ---
> meta/classes/cve-check.bbclass | 18 ++++++++++--------
> 1 file changed, 10 insertions(+), 8 deletions(-)
>
> diff --git a/meta/classes/cve-check.bbclass
> b/meta/classes/cve-check.bbclass
> index 24ddb865ea..7cd98ae462 100644
> --- a/meta/classes/cve-check.bbclass
> +++ b/meta/classes/cve-check.bbclass
> @@ -79,7 +79,7 @@ CVE_CHECK_LAYER_INCLUDELIST ??= ""
> # set to "alphabetical" for version using single alphabetical character
> as increment release
> CVE_VERSION_SUFFIX ??= ""
>
> -def generate_json_report(out_path, link_path):
> +def generate_json_report(d, out_path, link_path):
> if os.path.exists(d.getVar("CVE_CHECK_SUMMARY_INDEX_PATH")):
> import json
> from oe.cve_check import cve_check_merge_jsons
> @@ -127,10 +127,11 @@ python cve_save_summary_handler () {
> os.remove(cvefile_link)
> os.symlink(os.path.basename(cve_summary_file),
> cvefile_link)
>
> + if d.getVar("CVE_CHECK_FORMAT_JSON") == "1":
> json_summary_link_name = os.path.join(cvelogpath,
> d.getVar("CVE_CHECK_SUMMARY_FILE_NAME_JSON"))
> json_summary_name = os.path.join(cvelogpath, "%s-%s.json" %
> (cve_summary_name, timestamp))
> - generate_json_report(json_summary_name, json_summary_link_name)
> - bb.plain("CVE report summary created at: %s" %
> json_summary_link_name)
> + generate_json_report(d, json_summary_name, json_summary_link_name)
> + bb.plain("Complete CVE JSON report summary created at: %s" %
> json_summary_link_name)
> }
>
> addhandler cve_save_summary_handler
> @@ -207,11 +208,12 @@ python cve_check_write_rootfs_manifest () {
> os.symlink(os.path.basename(manifest_name), manifest_link)
> bb.plain("Image CVE report stored in: %s" % manifest_name)
>
> - link_path = os.path.join(deploy_dir, "%s.json" % link_name)
> - manifest_path = d.getVar("CVE_CHECK_MANIFEST_JSON")
> - bb.note("Generating JSON CVE manifest")
> - generate_json_report(json_summary_name, json_summary_link_name)
> - bb.plain("Image CVE JSON report stored in: %s" % link_path)
> + if d.getVar("CVE_CHECK_FORMAT_JSON") == "1":
> + link_path = os.path.join(deploy_dir, "%s.json" % link_name)
> + manifest_path = d.getVar("CVE_CHECK_MANIFEST_JSON")
> + bb.note("Generating JSON CVE manifest")
> + generate_json_report(d, manifest_path, link_path)
> + bb.plain("Image CVE JSON report stored in: %s" % link_path)
> }
>
> ROOTFS_POSTPROCESS_COMMAND:prepend =
> "${@'cve_check_write_rootfs_manifest; ' if
> d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
> --
> 2.33.0
>
>
>
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#165711):
https://lists.openembedded.org/g/openembedded-core/message/165711
Mute This Topic: https://lists.openembedded.org/mt/91158052/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-