Reviewed-by: Ernst Sjöstrand <[email protected]>

Den tis 17 maj 2022 kl 08:01 skrev Marta Rybczynska <[email protected]>:

> The addition of summary output caused two issues: error when building
> an image and the fact that JSON output was generated even when
> CVE_CHECK_FORMAT_JSON.
>
> When generating an image it caused an error like:
> ERROR: core-image-minimal-1.0-r0 do_rootfs: Error executing a python
> function in exec_func_python() autogenerated:
>
>   The stack trace of python calls that resulted in this exception/failure
> was:
>   File: 'exec_func_python() autogenerated', lineno: 2, function: <module>
>        0001:
>    *** 0002:cve_check_write_rootfs_manifest(d)
>        0003:
>   File: '/home/alexk/poky/meta/classes/cve-check.bbclass', lineno: 213,
> function: cve_check_write_rootfs_manifest
>        0209:
>        0210:        link_path = os.path.join(deploy_dir, "%s.json" %
> link_name)
>        0211:        manifest_path = d.getVar("CVE_CHECK_MANIFEST_JSON")
>        0212:        bb.note("Generating JSON CVE manifest")
>    *** 0213:        generate_json_report(json_summary_name,
> json_summary_link_name)
>        0214:        bb.plain("Image CVE JSON report stored in: %s" %
> link_path)
>        0215:}
>        0216:
>        0217:ROOTFS_POSTPROCESS_COMMAND:prepend =
> "${@'cve_check_write_rootfs_manifest; ' if
> d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
>   Exception: NameError: name 'json_summary_name' is not defined
>
> The fix is to pass the d variable to the pure python function
> generate_json_report
> to get correct values of variables and add conditions for the JSON
> output where needed.
>
> In addition clarify the message presenting the summary JSON file,
> which isn't related to an image.
>
> Uses partial fixes from Alex Kiernan, Ernst Sjöstrand (ernstp),
> and Davide Gardenal.
>
> Fixes: f2987891d315 ("cve-check: add JSON format to summary output")
>
> Signed-off-by: Marta Rybczynska <[email protected]>
> ---
>  meta/classes/cve-check.bbclass | 18 ++++++++++--------
>  1 file changed, 10 insertions(+), 8 deletions(-)
>
> diff --git a/meta/classes/cve-check.bbclass
> b/meta/classes/cve-check.bbclass
> index 24ddb865ea..7cd98ae462 100644
> --- a/meta/classes/cve-check.bbclass
> +++ b/meta/classes/cve-check.bbclass
> @@ -79,7 +79,7 @@ CVE_CHECK_LAYER_INCLUDELIST ??= ""
>  # set to "alphabetical" for version using single alphabetical character
> as increment release
>  CVE_VERSION_SUFFIX ??= ""
>
> -def generate_json_report(out_path, link_path):
> +def generate_json_report(d, out_path, link_path):
>      if os.path.exists(d.getVar("CVE_CHECK_SUMMARY_INDEX_PATH")):
>          import json
>          from oe.cve_check import cve_check_merge_jsons
> @@ -127,10 +127,11 @@ python cve_save_summary_handler () {
>                      os.remove(cvefile_link)
>                  os.symlink(os.path.basename(cve_summary_file),
> cvefile_link)
>
> +    if d.getVar("CVE_CHECK_FORMAT_JSON") == "1":
>          json_summary_link_name = os.path.join(cvelogpath,
> d.getVar("CVE_CHECK_SUMMARY_FILE_NAME_JSON"))
>          json_summary_name = os.path.join(cvelogpath, "%s-%s.json" %
> (cve_summary_name, timestamp))
> -        generate_json_report(json_summary_name, json_summary_link_name)
> -        bb.plain("CVE report summary created at: %s" %
> json_summary_link_name)
> +        generate_json_report(d, json_summary_name, json_summary_link_name)
> +        bb.plain("Complete CVE JSON report summary created at: %s" %
> json_summary_link_name)
>  }
>
>  addhandler cve_save_summary_handler
> @@ -207,11 +208,12 @@ python cve_check_write_rootfs_manifest () {
>                  os.symlink(os.path.basename(manifest_name), manifest_link)
>              bb.plain("Image CVE report stored in: %s" % manifest_name)
>
> -        link_path = os.path.join(deploy_dir, "%s.json" % link_name)
> -        manifest_path = d.getVar("CVE_CHECK_MANIFEST_JSON")
> -        bb.note("Generating JSON CVE manifest")
> -        generate_json_report(json_summary_name, json_summary_link_name)
> -        bb.plain("Image CVE JSON report stored in: %s" % link_path)
> +        if d.getVar("CVE_CHECK_FORMAT_JSON") == "1":
> +            link_path = os.path.join(deploy_dir, "%s.json" % link_name)
> +            manifest_path = d.getVar("CVE_CHECK_MANIFEST_JSON")
> +            bb.note("Generating JSON CVE manifest")
> +            generate_json_report(d, manifest_path, link_path)
> +            bb.plain("Image CVE JSON report stored in: %s" % link_path)
>  }
>
>  ROOTFS_POSTPROCESS_COMMAND:prepend =
> "${@'cve_check_write_rootfs_manifest; ' if
> d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
> --
> 2.33.0
>
>
> 
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#165711): 
https://lists.openembedded.org/g/openembedded-core/message/165711
Mute This Topic: https://lists.openembedded.org/mt/91158052/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to