On 05/09/2012 05:22 PM, Joshua Lock wrote:
In order to make sstate cache's more easily shared ensure any user of
the system has rwx permission by calling chown on sstate files after
they're created.

Signed-off-by: Joshua Lock<[email protected]>
---
  meta/classes/sstate.bbclass |    1 +
  1 files changed, 1 insertions(+), 0 deletions(-)

diff --git a/meta/classes/sstate.bbclass b/meta/classes/sstate.bbclass
index a8c98e5..6707ecf 100644
--- a/meta/classes/sstate.bbclass
+++ b/meta/classes/sstate.bbclass
@@ -454,6 +454,7 @@ sstate_create_package () {
        else
                tar -cz --file=$TFILE --files-from=/dev/null
        fi
+       chmod 0777 $TFILE
        mv $TFILE ${SSTATE_PKG}

        cd ${WORKDIR}
Why execute permission, and should it not be restricted to 664 for group level write access? Why would multiple users be writing to the same sstate file anyways once it's there it could be read-only since a change will trigger a new sstate file, not a re-write of the existing one.

Sau!

_______________________________________________
Openembedded-core mailing list
[email protected]
http://lists.linuxtogo.org/cgi-bin/mailman/listinfo/openembedded-core

Reply via email to