On 05/09/2012 05:22 PM, Joshua Lock wrote:
In order to make sstate cache's more easily shared ensure any user of
the system has rwx permission by calling chown on sstate files after
they're created.
Signed-off-by: Joshua Lock<[email protected]>
---
meta/classes/sstate.bbclass | 1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/meta/classes/sstate.bbclass b/meta/classes/sstate.bbclass
index a8c98e5..6707ecf 100644
--- a/meta/classes/sstate.bbclass
+++ b/meta/classes/sstate.bbclass
@@ -454,6 +454,7 @@ sstate_create_package () {
else
tar -cz --file=$TFILE --files-from=/dev/null
fi
+ chmod 0777 $TFILE
mv $TFILE ${SSTATE_PKG}
cd ${WORKDIR}
Why execute permission, and should it not be restricted to 664 for group
level write access? Why would multiple users be writing to the same
sstate file anyways once it's there it could be read-only since a change
will trigger a new sstate file, not a re-write of the existing one.
Sau!
_______________________________________________
Openembedded-core mailing list
[email protected]
http://lists.linuxtogo.org/cgi-bin/mailman/listinfo/openembedded-core