From: Daniel Turull <[email protected]>

Debug level was not added as a parameter, causing a warning.

Signed-off-by: Daniel Turull <[email protected]>
Signed-off-by: Richard Purdie <[email protected]>
(cherry picked from commit 40157fcbd9066f261812ba665ec963b2e496aa53)
[YC: This should fix the following warnings from the metric build:
stdio: WARNING: nodejs-22.14.0-r0 do_cve_check: Passed invalid debug level 
'Trying CVE entry update for CVE-2025-55130 from Unpatched to Unpatched' to 
bb.debug
https://autobuilder.yoctoproject.org/valkyrie/#/builders/103/builds/2835/steps/21/logs/warnings]
Signed-off-by: Yoann Congal <[email protected]>
---
While walnascar is EOL, the metrics build and the CVE tracking is more
or less the only thing we still support. This patch is part of that.

 meta/classes/cve-check.bbclass | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass
index 555fdaad77a..1dc579c033f 100644
--- a/meta/classes/cve-check.bbclass
+++ b/meta/classes/cve-check.bbclass
@@ -290,7 +290,7 @@ def cve_update(d, cve_data, cve, entry):
         cve_data[cve] = entry
         return
     # If we are updating, there might be change in the status
-    bb.debug("Trying CVE entry update for %s from %s to %s" % (cve, 
cve_data[cve]['abbrev-status'], entry['abbrev-status']))
+    bb.debug(1, "Trying CVE entry update for %s from %s to %s" % (cve, 
cve_data[cve]['abbrev-status'], entry['abbrev-status']))
     if cve_data[cve]['abbrev-status'] == "Unknown":
         cve_data[cve] = entry
         return
@@ -301,16 +301,16 @@ def cve_update(d, cve_data, cve, entry):
         if entry['status'] == "version-in-range" and cve_data[cve]['status'] 
== "version-not-in-range":
             # New result from the scan, vulnerable
             cve_data[cve] = entry
-            bb.debug("CVE entry %s update from Patched to Unpatched from the 
scan result" % cve)
+            bb.debug(1, "CVE entry %s update from Patched to Unpatched from 
the scan result" % cve)
             return
     if entry['abbrev-status'] == "Patched" and cve_data[cve]['abbrev-status'] 
== "Unpatched":
         if entry['status'] == "version-not-in-range" and 
cve_data[cve]['status'] == "version-in-range":
             # Range does not match the scan, but we already have a vulnerable 
match, ignore
-            bb.debug("CVE entry %s update from Patched to Unpatched from the 
scan result - not applying" % cve)
+            bb.debug(1, "CVE entry %s update from Patched to Unpatched from 
the scan result - not applying" % cve)
             return
     # If we have an "Ignored", it has a priority
     if cve_data[cve]['abbrev-status'] == "Ignored":
-        bb.debug("CVE %s not updating because Ignored" % cve)
+        bb.debug(1, "CVE %s not updating because Ignored" % cve)
         return
     bb.warn("Unhandled CVE entry update for %s from %s to %s" % (cve, 
cve_data[cve], entry))
 
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#231891): 
https://lists.openembedded.org/g/openembedded-core/message/231891
Mute This Topic: https://lists.openembedded.org/mt/117978952/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to