[oe] [meta-gnome][PATCH 2/2] gparted: Do not use NULL where boolean is expected

2022-01-27 Thread Khem Raj
Signed-off-by: Khem Raj 
---
 ...t-use-NULL-where-boolean-is-expected.patch | 33 +++
 .../recipes-extended/gparted/gparted_1.3.1.bb |  1 +
 2 files changed, 34 insertions(+)
 create mode 100644 
meta-gnome/recipes-extended/gparted/files/0001-Do-not-use-NULL-where-boolean-is-expected.patch

diff --git 
a/meta-gnome/recipes-extended/gparted/files/0001-Do-not-use-NULL-where-boolean-is-expected.patch
 
b/meta-gnome/recipes-extended/gparted/files/0001-Do-not-use-NULL-where-boolean-is-expected.patch
new file mode 100644
index 00..1b0d24024b
--- /dev/null
+++ 
b/meta-gnome/recipes-extended/gparted/files/0001-Do-not-use-NULL-where-boolean-is-expected.patch
@@ -0,0 +1,33 @@
+From 9af84e1c08a2159c10baf13244e2c8a7d7e837e9 Mon Sep 17 00:00:00 2001
+From: Khem Raj 
+Date: Thu, 27 Jan 2022 23:02:20 -0800
+Subject: [PATCH] Do not use NULL where boolean is expected
+
+Fixes
+src/GParted_Core.cc:73:57: error: static_cast from 'nullptr_t' to 
'PedPartitionFlag' (aka '_PedPartitionFlag') is not allowed
+| for ( PedPartitionFlag flag = ped_partition_flag_next( 
static_cast( NULL ) ) ;
+|
^
+| 1 error generated.
+
+Upstream-Status: Pending
+Signed-off-by: Khem Raj 
+---
+ src/GParted_Core.cc | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/src/GParted_Core.cc b/src/GParted_Core.cc
+index f7ac970..3290c66 100644
+--- a/src/GParted_Core.cc
 b/src/GParted_Core.cc
+@@ -70,7 +70,7 @@ GParted_Core::GParted_Core()
+   ped_exception_set_handler( ped_exception_handler ) ; 
+ 
+   //get valid flags ...
+-  for ( PedPartitionFlag flag = ped_partition_flag_next( 
static_cast( NULL ) ) ;
++  for ( PedPartitionFlag flag = ped_partition_flag_next( 
static_cast( false ) ) ;
+ flag ;
+ flag = ped_partition_flag_next( flag ) )
+   flags .push_back( flag ) ;
+-- 
+2.35.0
+
diff --git a/meta-gnome/recipes-extended/gparted/gparted_1.3.1.bb 
b/meta-gnome/recipes-extended/gparted/gparted_1.3.1.bb
index 1c8dd69686..355bcce9b6 100644
--- a/meta-gnome/recipes-extended/gparted/gparted_1.3.1.bb
+++ b/meta-gnome/recipes-extended/gparted/gparted_1.3.1.bb
@@ -10,6 +10,7 @@ REQUIRED_DISTRO_FEATURES = "x11"
 SRC_URI = " \
 
${SOURCEFORGE_MIRROR}/project/${BPN}/${BPN}/${BPN}-${PV}/${BPN}-${PV}.tar.gz \
 file://0001-Install-polkit-action-unconditionally-executable-pke.patch \
+file://0001-Do-not-use-NULL-where-boolean-is-expected.patch \
 "
 SRC_URI[sha256sum] = 
"5eee2e6d74b15ef96b13b3a2310c868ed2298e03341021e7d12a5a98a1d1e109"
 
-- 
2.35.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95144): 
https://lists.openembedded.org/g/openembedded-devel/message/95144
Mute This Topic: https://lists.openembedded.org/mt/88740507/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[oe] [meta-oe][PATCH 1/2] libcec: Fix type mismatch for return value of LibCecBootloader()

2022-01-27 Thread Khem Raj
Signed-off-by: Khem Raj 
---
 ...return-type-of-function-LibCecBootlo.patch | 41 +++
 .../recipes-extended/libcec/libcec_6.0.2.bb   |  1 +
 2 files changed, 42 insertions(+)
 create mode 100644 
meta-oe/recipes-extended/libcec/libcec/0001-cecloader-Match-return-type-of-function-LibCecBootlo.patch

diff --git 
a/meta-oe/recipes-extended/libcec/libcec/0001-cecloader-Match-return-type-of-function-LibCecBootlo.patch
 
b/meta-oe/recipes-extended/libcec/libcec/0001-cecloader-Match-return-type-of-function-LibCecBootlo.patch
new file mode 100644
index 00..ab1ab5b8eb
--- /dev/null
+++ 
b/meta-oe/recipes-extended/libcec/libcec/0001-cecloader-Match-return-type-of-function-LibCecBootlo.patch
@@ -0,0 +1,41 @@
+From 2241edc8b70c2a54d109ac9c0e821889ac138d40 Mon Sep 17 00:00:00 2001
+From: Khem Raj 
+Date: Thu, 27 Jan 2022 22:49:52 -0800
+Subject: [PATCH] cecloader: Match return type of function LibCecBootloader
+
+Fixes
+include/cecloader.h:175:14: error: cannot initialize return object of type 
'bool' with an rvalue of type 'nullptr_t'
+  return NULL;
+ ^~~~
+
+Upstream-Status: Pending
+Signed-off-by: Khem Raj 
+---
+ include/cecloader.h | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/include/cecloader.h b/include/cecloader.h
+index be76468f..550f598e 100644
+--- a/include/cecloader.h
 b/include/cecloader.h
+@@ -172,7 +172,7 @@ bool LibCecBootloader(const char *strLib = NULL)
+ if (!g_libCEC)
+ {
+   std::cout << dlerror() << std::endl;
+-  return NULL;
++  return false;
+ }
+   }
+ 
+@@ -181,7 +181,7 @@ bool LibCecBootloader(const char *strLib = NULL)
+   if (!LibCecBootloader)
+   {
+ std::cout << "cannot find CECStartBootloader" << std::endl;
+-return NULL;
++return false;
+   }
+ 
+   bool bReturn = LibCecBootloader();
+-- 
+2.35.0
+
diff --git a/meta-oe/recipes-extended/libcec/libcec_6.0.2.bb 
b/meta-oe/recipes-extended/libcec/libcec_6.0.2.bb
index eabe1d476a..2036c53eff 100644
--- a/meta-oe/recipes-extended/libcec/libcec_6.0.2.bb
+++ b/meta-oe/recipes-extended/libcec/libcec_6.0.2.bb
@@ -14,6 +14,7 @@ SRC_URI = 
"git://github.com/Pulse-Eight/libcec.git;branch=release;protocol=https

file://0001-CheckPlatformSupport.cmake-Do-not-hardcode-lib-path.patch \
file://0001-Enhance-reproducibility.patch \
file://0001-Remove-buggy-test-confusing-host-and-target.patch \
+   
file://0001-cecloader-Match-return-type-of-function-LibCecBootlo.patch \
   "
 
 S = "${WORKDIR}/git"
-- 
2.35.0


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95143): 
https://lists.openembedded.org/g/openembedded-devel/message/95143
Mute This Topic: https://lists.openembedded.org/mt/88740506/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe] [PATCH v3 meta-oe] rtc-tools: Add a recipe

2022-01-27 Thread Peter Kjellerstedt
> -Original Message-
> From: openembedded-devel@lists.openembedded.org 
>  On Behalf Of Fabio Estevam
> Sent: den 28 januari 2022 00:06
> To: openembedded-devel@lists.openembedded.org
> Cc: otavio.salva...@ossystems.com.br; h...@denx.de; 
> alexandre.bell...@bootlin.com; raj.k...@gmail.com; Peter Kjellerstedt 
> ; Fabio Estevam 
> Subject: [oe] [PATCH v3 meta-oe] rtc-tools: Add a recipe
> 
> From: Fabio Estevam 
> 
> rtc-tools is a useful utility developed by Alexandre Belloni
> for testing RTC kernel drivers, such as y2038 support.
> 
> Based on the initial recipe from Heiko Schocher .
> 
> Signed-off-by: Fabio Estevam 
> ---
>  .../0001-rtc-tools-Add-a-Makefile.patch   | 44 +++
>  .../rtc-tools/rtc-tools_1.0.0.bb  | 18 
>  2 files changed, 62 insertions(+)
>  create mode 100644 
> meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
>  create mode 100644 meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb
> 
> diff --git 
> a/meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
>  
> b/meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
> new file mode 100644
> index ..c1d1fa97eaa3
> --- /dev/null
> +++ b/meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-
> Makefile.patch
> @@ -0,0 +1,44 @@
> +From b19924f797d69475b1857272231500c97ba9959c Mon Sep 17 00:00:00 2001
> +From: Fabio Estevam 
> +Date: Thu, 27 Jan 2022 18:40:29 -0300
> +Subject: [PATCH rtc-tools v2] rtc-tools: Add a Makefile
> +
> +Add a Makefile to make installation and uninstallation
> +process easier.
> +
> +Upstream-Status: Submitted 
> [https://marc.info/?l=linux-rtc=164332426030004=2]
> +Signed-off-by: Fabio Estevam 
> +---
> +Changes since v1:
> +- Simplify the Makefile by taking Peter Kjellerstedt's feedback in
> +the oe-devel list.

This doesn't belong in the Makefile.patch file, it belongs after the 
commit message as it relates to the review process and has no bearing 
once this is integrated.

> +
> + Makefile | 16 
> + 1 file changed, 16 insertions(+)
> + create mode 100644 Makefile
> +
> +diff --git a/Makefile b/Makefile
> +new file mode 100644
> +index 000..71a4c9c
> +--- /dev/null
>  b/Makefile
> +@@ -0,0 +1,16 @@
> ++prefix ?= /usr
> ++bindir ?= $(prefix)/bin
> ++
> ++EXEC = rtc-range rtc rtc-sync
> ++
> ++all: $(EXEC)
> ++
> ++clean:
> ++$(RM) $(EXEC)
> ++
> ++install:
> ++install -d $(DESTDIR)$(bindir)
> ++install $(EXEC) $(DESTDIR)$(bindir)
> ++
> ++uninstall:
> ++$(RM) -r $(addprefix $(DESTDIR)$(bindir)/,$(EXEC))
> +--
> +2.25.1
> +
> diff --git a/meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb 
> b/meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb
> new file mode 100644
> index ..64ea3173d8a4
> --- /dev/null
> +++ b/meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb
> @@ -0,0 +1,18 @@
> +SUMMARY = "Useful programs to test rtc drivers"
> +LICENSE = "GPL-2.0-only"
> +LIC_FILES_CHKSUM = "file://COPYING;md5=74274e8a218423e49eefdea80bc55038"
> +
> +SRC_URI = 
> "git://git.kernel.org/pub/scm/linux/kernel/git/abelloni/${BPN}.git;protocol=https;branch=master
>  \
> +   file://0001-rtc-tools-Add-a-Makefile.patch \
> +   "
> +SRCREV = "acc442e7af4e1e783432a43d37f1a7938c692659"
> +
> +S = "${WORKDIR}/git"
> +
> +TARGET_CC_ARCH += "${LDFLAGS}"

You forgot to remove the TAGET_CC_ARCH line.

> +
> +EXTRA_OEMAKE = "DESTDIR=${D}"
> +
> +do_install() {
> + oe_runmake install
> +}
> --
> 2.25.1

//Peter


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95142): 
https://lists.openembedded.org/g/openembedded-devel/message/95142
Mute This Topic: https://lists.openembedded.org/mt/88733959/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[oe] [meta-openembedded][PATCHv2 2/2] unattended-upgrades: add new recipe version 2.6

2022-01-27 Thread An?bal Lim?n
The unattended-upgrades is a set of scripts that allows to execute
unattended upgrades in debian based systems in this case when
enable package_deb and add package management into the image.

At this moment installs all the required script and files into the image
leaving the configuration and execution to be implemented by distro.

Signed-off-by: Aníbal Limón 
Signed-off-by: Aníbal Limón 
---
 ...de-Remove-distro_info-usage-to-check.patch | 78 +++
 .../unattended-upgrades_2.6.bb| 31 
 2 files changed, 109 insertions(+)
 create mode 100644 
meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
 create mode 100644 
meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb

diff --git 
a/meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
 
b/meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
new file mode 100644
index 0..d39427e9f
--- /dev/null
+++ 
b/meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
@@ -0,0 +1,78 @@
+From a52d763559d1017ca73d2a2933aba1c78ad354c6 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?An=C3=ADbal=20Lim=C3=B3n?= 
+Date: Thu, 27 Jan 2022 16:32:25 -0600
+Subject: [PATCH] unattended-upgrade: Remove distro_info usage to check devel
+ releases
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+The distro-info python3 package is used to check if the release is a
+devel release and choice if continue with unattended-upgrade for now
+remove it because needs support into python3-distro-info [1].
+
+[1] https://salsa.debian.org/debian/distro-info
+
+Signed-off-by: Aníbal Limón 
+
+Upstream-Status: Inappropriate
+---
+ unattended-upgrade | 38 --
+ 1 file changed, 38 deletions(-)
+
+diff --git a/unattended-upgrade b/unattended-upgrade
+index 802d4d5..3b4e83e 100755
+--- a/unattended-upgrade
 b/unattended-upgrade
+@@ -83,9 +83,6 @@ import apt
+ import apt_inst
+ import apt_pkg
+ 
+-import distro_info
+-
+-
+ # the reboot required flag file used by packages
+ REBOOT_REQUIRED_FILE = "/var/run/reboot-required"
+ KEPT_PACKAGES_FILE = "var/lib/unattended-upgrades/kept-back"
+@@ -2061,41 +2058,6 @@ def run(options, # type: Options
+ if should_stop():
+ return UnattendedUpgradesResult(False)
+ 
+-# check to see if want to auto-upgrade the devel release
+-if apt_pkg.config.find("Unattended-Upgrade::DevRelease") == "auto":
+-try:
+-if DISTRO_ID.lower() == 'ubuntu':
+-devel = (distro_info.UbuntuDistroInfo() .
+- devel(result="object"))
+-elif DISTRO_ID.lower() == 'debian':
+-devel = (distro_info.DebianDistroInfo() .
+- devel(result="object"))
+-else:
+-devel = (distro_info.DistroInfo(DISTRO_ID) .
+- devel(result="object"))
+-except Exception as e:
+-logging.warning("Could not figure out development release: %s" % 
e)
+-else:
+-if ((devel.series == DISTRO_CODENAME
+- and devel.release is not None
+- and devel.release - date.today() > DEVEL_UNTIL_RELEASE)):
+-syslog.syslog((_("Not running on this development "
+- "release before %s") %
+-  (devel.release - DEVEL_UNTIL_RELEASE
+-   - datetime.timedelta(days=1
+-logging.warning(_("Not running on this development "
+-  "release before %s") %
+-(devel.release - DEVEL_UNTIL_RELEASE
+- - datetime.timedelta(days=1)))
+-return UnattendedUpgradesResult(True)
+-
+-logging.debug("Running on the development release")
+-elif "(development branch)" in DISTRO_DESC and not\
+-apt_pkg.config.find_b("Unattended-Upgrade::DevRelease", True):
+-syslog.syslog(_("Not running on the development release."))
+-logging.info(_("Not running on the development release."))
+-return UnattendedUpgradesResult(True)
+-
+ logging.info(_("Starting unattended upgrades script"))
+ 
+ # check and get lock
diff --git 
a/meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb 
b/meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb
new file mode 100644
index 0..629d2b43d
--- /dev/null
+++ b/meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb
@@ -0,0 +1,31 @@
+SUMMARY = "This script upgrades packages automatically and unattended."
+DESCRIPTION = "The purpose of unattended-upgrades is to keep the 

[oe] [meta-openembedded][PATCHv2 1/2] python3-apt: add new recipe version 2.3.0

2022-01-27 Thread An?bal Lim?n
This recipe enables python3-apt wrapper to use apt in easy way
from python3.

Signed-off-by: Aníbal Limón 
Signed-off-by: Aníbal Limón 
---
 .../python/python3-apt_2.3.0.bb | 17 +
 1 file changed, 17 insertions(+)
 create mode 100644 meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb

diff --git a/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb 
b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
new file mode 100644
index 0..6463f49bb
--- /dev/null
+++ b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
@@ -0,0 +1,17 @@
+SUMMARY = "Python-apt is a wrapper to use features of apt from python."
+LICENSE = "GPLv2 & FSFAP"
+LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=0636e73ff0215e8d672dc4c32c317bb3 \
+
file://debian/copyright;md5=4ed7b6862ca422678b17e7d4ed592285"
+
+SRC_URI = 
"git://salsa.debian.org/apt-team/python-apt.git;protocol=https;branch=main"
+
+SRCREV = "6145b6484d220685edfd922d364afbf065127efe"
+
+S = "${WORKDIR}/git"
+
+inherit setuptools3
+
+DEPENDS += "apt"
+RDEPENDS:${PN} += "apt python3-core"
+
+FILES:${PN} = "${libdir} ${datadir}/python-apt"
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95140): 
https://lists.openembedded.org/g/openembedded-devel/message/95140
Mute This Topic: https://lists.openembedded.org/mt/88737601/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe] [meta-openembedded][PATCH 1/2] meta-oe/recipes-devtools: Add python3-apt bindings

2022-01-27 Thread Khem Raj
On Thu, Jan 27, 2022 at 6:29 PM Anibal Limón  wrote:
>
>
>
> On Thu, Jan 27, 2022 at 8:27 PM Khem Raj  wrote:
>>
>> On Thu, Jan 27, 2022 at 5:35 PM An?bal Lim?n  wrote:
>> >
>> > Signed-off-by: Aníbal Limón 
>> > Signed-off-by: Aníbal Limón 
>> > ---
>> >  .../python/python3-apt_2.3.0.bb | 17 +
>> >  1 file changed, 17 insertions(+)
>> >  create mode 100644 meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
>> >
>> > diff --git a/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb 
>> > b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
>> > new file mode 100644
>> > index 0..4e7138b33
>> > --- /dev/null
>> > +++ b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
>> > @@ -0,0 +1,17 @@
>> > +SUMMARY = "Python-apt is a wrapper to use features of apt from python."
>> > +LICENSE = "GPLv2 & Permissive"
>>
>> Permissive is not a standard SPDX license. So please explain it better.
>
>
> Yep, this is a topic, comes from debian/copyright file in the repo, next,
>
> https://salsa.debian.org/apt-team/python-apt/-/blob/main/debian/copyright#L10
>
> Any idea how to handle this?.

I think this is
https://spdx.org/licenses/FSFAP.html

>
> Regards,
> Anibal
>
>>
>>
>> > +LIC_FILES_CHKSUM = 
>> > "file://COPYING.GPL;md5=0636e73ff0215e8d672dc4c32c317bb3 \
>> > +
>> > file://debian/copyright;md5=4ed7b6862ca422678b17e7d4ed592285"
>> > +
>> > +SRC_URI = 
>> > "git://salsa.debian.org/apt-team/python-apt.git;protocol=https;branch=main"
>> > +
>> > +SRCREV = "6145b6484d220685edfd922d364afbf065127efe"
>> > +
>> > +S = "${WORKDIR}/git"
>> > +
>> > +inherit setuptools3
>> > +
>> > +DEPENDS += "apt"
>> > +RDEPENDS:${PN} += "apt python3-core"
>> > +
>> > +FILES:${PN} = "/usr/lib /usr/share/python-apt"
>> > --
>> > 2.34.1
>> >
>> >
>> > 
>> >

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95139): 
https://lists.openembedded.org/g/openembedded-devel/message/95139
Mute This Topic: https://lists.openembedded.org/mt/88736517/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe] [meta-openembedded][PATCH 1/2] meta-oe/recipes-devtools: Add python3-apt bindings

2022-01-27 Thread An?bal Lim?n
On Thu, Jan 27, 2022 at 8:27 PM Khem Raj  wrote:

> On Thu, Jan 27, 2022 at 5:35 PM An?bal Lim?n 
> wrote:
> >
> > Signed-off-by: Aníbal Limón 
> > Signed-off-by: Aníbal Limón 
> > ---
> >  .../python/python3-apt_2.3.0.bb | 17 +
> >  1 file changed, 17 insertions(+)
> >  create mode 100644 meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
> >
> > diff --git a/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
> b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
> > new file mode 100644
> > index 0..4e7138b33
> > --- /dev/null
> > +++ b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
> > @@ -0,0 +1,17 @@
> > +SUMMARY = "Python-apt is a wrapper to use features of apt from python."
> > +LICENSE = "GPLv2 & Permissive"
>
> Permissive is not a standard SPDX license. So please explain it better.
>

Yep, this is a topic, comes from debian/copyright file in the repo, next,

https://salsa.debian.org/apt-team/python-apt/-/blob/main/debian/copyright#L10

Any idea how to handle this?.

Regards,
Anibal


>
> > +LIC_FILES_CHKSUM =
> "file://COPYING.GPL;md5=0636e73ff0215e8d672dc4c32c317bb3 \
> > +
> file://debian/copyright;md5=4ed7b6862ca422678b17e7d4ed592285"
> > +
> > +SRC_URI = "git://
> salsa.debian.org/apt-team/python-apt.git;protocol=https;branch=main"
> > +
> > +SRCREV = "6145b6484d220685edfd922d364afbf065127efe"
> > +
> > +S = "${WORKDIR}/git"
> > +
> > +inherit setuptools3
> > +
> > +DEPENDS += "apt"
> > +RDEPENDS:${PN} += "apt python3-core"
> > +
> > +FILES:${PN} = "/usr/lib /usr/share/python-apt"
> > --
> > 2.34.1
> >
> >
> > 
> >
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95138): 
https://lists.openembedded.org/g/openembedded-devel/message/95138
Mute This Topic: https://lists.openembedded.org/mt/88736517/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe] [meta-openembedded][PATCH 1/2] meta-oe/recipes-devtools: Add python3-apt bindings

2022-01-27 Thread Khem Raj
On Thu, Jan 27, 2022 at 5:35 PM An?bal Lim?n  wrote:
>
> Signed-off-by: Aníbal Limón 
> Signed-off-by: Aníbal Limón 
> ---
>  .../python/python3-apt_2.3.0.bb | 17 +
>  1 file changed, 17 insertions(+)
>  create mode 100644 meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
>
> diff --git a/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb 
> b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
> new file mode 100644
> index 0..4e7138b33
> --- /dev/null
> +++ b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
> @@ -0,0 +1,17 @@
> +SUMMARY = "Python-apt is a wrapper to use features of apt from python."
> +LICENSE = "GPLv2 & Permissive"

Permissive is not a standard SPDX license. So please explain it better.

> +LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=0636e73ff0215e8d672dc4c32c317bb3 \
> +
> file://debian/copyright;md5=4ed7b6862ca422678b17e7d4ed592285"
> +
> +SRC_URI = 
> "git://salsa.debian.org/apt-team/python-apt.git;protocol=https;branch=main"
> +
> +SRCREV = "6145b6484d220685edfd922d364afbf065127efe"
> +
> +S = "${WORKDIR}/git"
> +
> +inherit setuptools3
> +
> +DEPENDS += "apt"
> +RDEPENDS:${PN} += "apt python3-core"
> +
> +FILES:${PN} = "/usr/lib /usr/share/python-apt"
> --
> 2.34.1
>
>
> 
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95137): 
https://lists.openembedded.org/g/openembedded-devel/message/95137
Mute This Topic: https://lists.openembedded.org/mt/88736517/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe] [meta-openembedded][PATCH 2/2] meta-oe/recipe-devtools: Add Debian unattended-upgrades

2022-01-27 Thread Khem Raj

Please fix the commit message format per commit guidelines

On 1/27/22 17:35, An?bal Lim?n wrote:

This script works to enable unattended-upgrades in package_deb
apt/dpkg systems. Is missing configuration/integration to execute
via systemd or init.

Signed-off-by: Aníbal Limón 
Signed-off-by: Aníbal Limón 
---
  ...de-Remove-distro_info-usage-to-check.patch | 78 +++
  .../unattended-upgrades_2.6.bb| 31 
  2 files changed, 109 insertions(+)
  create mode 100644 
meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
  create mode 100644 
meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb

diff --git 
a/meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
 
b/meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
new file mode 100644
index 0..d39427e9f
--- /dev/null
+++ 
b/meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
@@ -0,0 +1,78 @@
+From a52d763559d1017ca73d2a2933aba1c78ad354c6 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?An=C3=ADbal=20Lim=C3=B3n?= 
+Date: Thu, 27 Jan 2022 16:32:25 -0600
+Subject: [PATCH] unattended-upgrade: Remove distro_info usage to check devel
+ releases
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+The distro-info python3 package is used to check if the release is a
+devel release and choice if continue with unattended-upgrade for now
+remove it because needs support into python3-distro-info [1].
+
+[1] https://salsa.debian.org/debian/distro-info
+
+Signed-off-by: Aníbal Limón 
+
+Upstream-Status: Inappropriate
+---
+ unattended-upgrade | 38 --
+ 1 file changed, 38 deletions(-)
+
+diff --git a/unattended-upgrade b/unattended-upgrade
+index 802d4d5..3b4e83e 100755
+--- a/unattended-upgrade
 b/unattended-upgrade
+@@ -83,9 +83,6 @@ import apt
+ import apt_inst
+ import apt_pkg
+
+-import distro_info
+-
+-
+ # the reboot required flag file used by packages
+ REBOOT_REQUIRED_FILE = "/var/run/reboot-required"
+ KEPT_PACKAGES_FILE = "var/lib/unattended-upgrades/kept-back"
+@@ -2061,41 +2058,6 @@ def run(options, # type: Options
+ if should_stop():
+ return UnattendedUpgradesResult(False)
+
+-# check to see if want to auto-upgrade the devel release
+-if apt_pkg.config.find("Unattended-Upgrade::DevRelease") == "auto":
+-try:
+-if DISTRO_ID.lower() == 'ubuntu':
+-devel = (distro_info.UbuntuDistroInfo() .
+- devel(result="object"))
+-elif DISTRO_ID.lower() == 'debian':
+-devel = (distro_info.DebianDistroInfo() .
+- devel(result="object"))
+-else:
+-devel = (distro_info.DistroInfo(DISTRO_ID) .
+- devel(result="object"))
+-except Exception as e:
+-logging.warning("Could not figure out development release: %s" % 
e)
+-else:
+-if ((devel.series == DISTRO_CODENAME
+- and devel.release is not None
+- and devel.release - date.today() > DEVEL_UNTIL_RELEASE)):
+-syslog.syslog((_("Not running on this development "
+- "release before %s") %
+-  (devel.release - DEVEL_UNTIL_RELEASE
+-   - datetime.timedelta(days=1
+-logging.warning(_("Not running on this development "
+-  "release before %s") %
+-(devel.release - DEVEL_UNTIL_RELEASE
+- - datetime.timedelta(days=1)))
+-return UnattendedUpgradesResult(True)
+-
+-logging.debug("Running on the development release")
+-elif "(development branch)" in DISTRO_DESC and not\
+-apt_pkg.config.find_b("Unattended-Upgrade::DevRelease", True):
+-syslog.syslog(_("Not running on the development release."))
+-logging.info(_("Not running on the development release."))
+-return UnattendedUpgradesResult(True)
+-
+ logging.info(_("Starting unattended upgrades script"))
+
+ # check and get lock
diff --git 
a/meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb 
b/meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb
new file mode 100644
index 0..cfdd00465
--- /dev/null
+++ b/meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb
@@ -0,0 +1,31 @@
+SUMMARY = "This script upgrades packages automatically and unattended."
+DESCRIPTION = "The purpose of unattended-upgrades is to keep the computer current 
with the latest security (and other) updates automatically."

Re: [oe] [meta-openembedded][PATCH 1/2] meta-oe/recipes-devtools: Add python3-apt bindings

2022-01-27 Thread Khem Raj

Please fix the commit message format per commit guidelines

On 1/27/22 17:35, An?bal Lim?n wrote:

Signed-off-by: Aníbal Limón 
Signed-off-by: Aníbal Limón 
---
  .../python/python3-apt_2.3.0.bb | 17 +
  1 file changed, 17 insertions(+)
  create mode 100644 meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb

diff --git a/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb 
b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
new file mode 100644
index 0..4e7138b33
--- /dev/null
+++ b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
@@ -0,0 +1,17 @@
+SUMMARY = "Python-apt is a wrapper to use features of apt from python."
+LICENSE = "GPLv2 & Permissive"
+LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=0636e73ff0215e8d672dc4c32c317bb3 \
+
file://debian/copyright;md5=4ed7b6862ca422678b17e7d4ed592285"
+
+SRC_URI = 
"git://salsa.debian.org/apt-team/python-apt.git;protocol=https;branch=main"
+
+SRCREV = "6145b6484d220685edfd922d364afbf065127efe"
+
+S = "${WORKDIR}/git"
+
+inherit setuptools3
+
+DEPENDS += "apt"
+RDEPENDS:${PN} += "apt python3-core"
+
+FILES:${PN} = "/usr/lib /usr/share/python-apt"


Can we use ${libdir} and ${datadir} here ?








-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95135): 
https://lists.openembedded.org/g/openembedded-devel/message/95135
Mute This Topic: https://lists.openembedded.org/mt/88736517/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[oe] [meta-openembedded][PATCH 1/2] meta-oe/recipes-devtools: Add python3-apt bindings

2022-01-27 Thread An?bal Lim?n
Signed-off-by: Aníbal Limón 
Signed-off-by: Aníbal Limón 
---
 .../python/python3-apt_2.3.0.bb | 17 +
 1 file changed, 17 insertions(+)
 create mode 100644 meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb

diff --git a/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb 
b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
new file mode 100644
index 0..4e7138b33
--- /dev/null
+++ b/meta-oe/recipes-devtools/python/python3-apt_2.3.0.bb
@@ -0,0 +1,17 @@
+SUMMARY = "Python-apt is a wrapper to use features of apt from python."
+LICENSE = "GPLv2 & Permissive"
+LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=0636e73ff0215e8d672dc4c32c317bb3 \
+
file://debian/copyright;md5=4ed7b6862ca422678b17e7d4ed592285"
+
+SRC_URI = 
"git://salsa.debian.org/apt-team/python-apt.git;protocol=https;branch=main"
+
+SRCREV = "6145b6484d220685edfd922d364afbf065127efe"
+
+S = "${WORKDIR}/git"
+
+inherit setuptools3
+
+DEPENDS += "apt"
+RDEPENDS:${PN} += "apt python3-core"
+
+FILES:${PN} = "/usr/lib /usr/share/python-apt"
-- 
2.34.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95133): 
https://lists.openembedded.org/g/openembedded-devel/message/95133
Mute This Topic: https://lists.openembedded.org/mt/88736517/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[oe] [meta-openembedded][PATCH 2/2] meta-oe/recipe-devtools: Add Debian unattended-upgrades

2022-01-27 Thread An?bal Lim?n
This script works to enable unattended-upgrades in package_deb
apt/dpkg systems. Is missing configuration/integration to execute
via systemd or init.

Signed-off-by: Aníbal Limón 
Signed-off-by: Aníbal Limón 
---
 ...de-Remove-distro_info-usage-to-check.patch | 78 +++
 .../unattended-upgrades_2.6.bb| 31 
 2 files changed, 109 insertions(+)
 create mode 100644 
meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
 create mode 100644 
meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb

diff --git 
a/meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
 
b/meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
new file mode 100644
index 0..d39427e9f
--- /dev/null
+++ 
b/meta-oe/recipes-devtools/unattended-upgrades/files/0001-unattended-upgrade-Remove-distro_info-usage-to-check.patch
@@ -0,0 +1,78 @@
+From a52d763559d1017ca73d2a2933aba1c78ad354c6 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?An=C3=ADbal=20Lim=C3=B3n?= 
+Date: Thu, 27 Jan 2022 16:32:25 -0600
+Subject: [PATCH] unattended-upgrade: Remove distro_info usage to check devel
+ releases
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+The distro-info python3 package is used to check if the release is a
+devel release and choice if continue with unattended-upgrade for now
+remove it because needs support into python3-distro-info [1].
+
+[1] https://salsa.debian.org/debian/distro-info
+
+Signed-off-by: Aníbal Limón 
+
+Upstream-Status: Inappropriate
+---
+ unattended-upgrade | 38 --
+ 1 file changed, 38 deletions(-)
+
+diff --git a/unattended-upgrade b/unattended-upgrade
+index 802d4d5..3b4e83e 100755
+--- a/unattended-upgrade
 b/unattended-upgrade
+@@ -83,9 +83,6 @@ import apt
+ import apt_inst
+ import apt_pkg
+ 
+-import distro_info
+-
+-
+ # the reboot required flag file used by packages
+ REBOOT_REQUIRED_FILE = "/var/run/reboot-required"
+ KEPT_PACKAGES_FILE = "var/lib/unattended-upgrades/kept-back"
+@@ -2061,41 +2058,6 @@ def run(options, # type: Options
+ if should_stop():
+ return UnattendedUpgradesResult(False)
+ 
+-# check to see if want to auto-upgrade the devel release
+-if apt_pkg.config.find("Unattended-Upgrade::DevRelease") == "auto":
+-try:
+-if DISTRO_ID.lower() == 'ubuntu':
+-devel = (distro_info.UbuntuDistroInfo() .
+- devel(result="object"))
+-elif DISTRO_ID.lower() == 'debian':
+-devel = (distro_info.DebianDistroInfo() .
+- devel(result="object"))
+-else:
+-devel = (distro_info.DistroInfo(DISTRO_ID) .
+- devel(result="object"))
+-except Exception as e:
+-logging.warning("Could not figure out development release: %s" % 
e)
+-else:
+-if ((devel.series == DISTRO_CODENAME
+- and devel.release is not None
+- and devel.release - date.today() > DEVEL_UNTIL_RELEASE)):
+-syslog.syslog((_("Not running on this development "
+- "release before %s") %
+-  (devel.release - DEVEL_UNTIL_RELEASE
+-   - datetime.timedelta(days=1
+-logging.warning(_("Not running on this development "
+-  "release before %s") %
+-(devel.release - DEVEL_UNTIL_RELEASE
+- - datetime.timedelta(days=1)))
+-return UnattendedUpgradesResult(True)
+-
+-logging.debug("Running on the development release")
+-elif "(development branch)" in DISTRO_DESC and not\
+-apt_pkg.config.find_b("Unattended-Upgrade::DevRelease", True):
+-syslog.syslog(_("Not running on the development release."))
+-logging.info(_("Not running on the development release."))
+-return UnattendedUpgradesResult(True)
+-
+ logging.info(_("Starting unattended upgrades script"))
+ 
+ # check and get lock
diff --git 
a/meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb 
b/meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb
new file mode 100644
index 0..cfdd00465
--- /dev/null
+++ b/meta-oe/recipes-devtools/unattended-upgrades/unattended-upgrades_2.6.bb
@@ -0,0 +1,31 @@
+SUMMARY = "This script upgrades packages automatically and unattended."
+DESCRIPTION = "The purpose of unattended-upgrades is to keep the computer 
current with the latest security (and other) updates automatically."
+HOMEPAGE = "https://wiki.debian.org/UnattendedUpgrades;
+LICENSE = "GPLv2"
+LIC_FILES_CHKSUM = 

Re: [oe][meta-oe][hardknott][PATCH] protobuf: Fix static init fiasco on 3.15.2

2022-01-27 Thread Armin Kuster



On 1/18/22 22:43, He Zhe wrote:


On 1/17/22 11:30 AM, He Zhe wrote:

On 1/15/22 10:22 PM, akuster808 wrote:

On 1/12/22 12:11 AM, He Zhe wrote:

The protobuf 3.15.2 suffers from the C++ "Static Initialization Fiasco"
issue. This patches makes the extension attributes have a higher
priority than the attributes, so there's no possibility of random
initialization orders.

Signed-off-by: Jani Nurminen 

Upstream-Status: Pending

Since this indicates "Pending", does this issue need to be fixed in
Master too?

Thanks for reminding. Just sent one for master.

This has been merged in master. Can it be merged in hardknott?


yes.

it is now queued.

thanks,
Armin


Thanks,
Zhe


Zhe


-armin

Signed-off-by: He Zhe 
---
  ...r-init-prio-for-extension-attributes.patch | 81 +++
  .../protobuf/protobuf_3.15.2.bb   |  1 +
  2 files changed, 82 insertions(+)
  create mode 100644 
meta-oe/recipes-devtools/protobuf/protobuf/0001-Lower-init-prio-for-extension-attributes.patch

diff --git 
a/meta-oe/recipes-devtools/protobuf/protobuf/0001-Lower-init-prio-for-extension-attributes.patch
 
b/meta-oe/recipes-devtools/protobuf/protobuf/0001-Lower-init-prio-for-extension-attributes.patch
new file mode 100644
index 00..9f4fd71796
--- /dev/null
+++ 
b/meta-oe/recipes-devtools/protobuf/protobuf/0001-Lower-init-prio-for-extension-attributes.patch
@@ -0,0 +1,81 @@
+From 00362d12edf1b7fde723b041a4569dc659e65ad1 Mon Sep 17 00:00:00 2001
+From: Jani Nurminen 
+Date: Fri, 24 Sep 2021 09:56:11 +0200
+Subject: Lower init prio for extension attributes
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+Added PROTOBUF_EXTENSION_ATTRIBUTE_INIT_PRIORITY in
+code generation for extension attributes.
+It has lower prio than PROTOBUF_ATTRIBUTE_INIT_PRIORITY to
+ensure that extension attributes are initialized after
+other attribute.
+This is needed in some applications to avoid segmentation fault.
+
+Reported by Karl-Herman Näslund.
+
+Signed-off-by: Jani Nurminen 
+
+Upstream-Status: Pending
+
+Signed-off-by: He Zhe 
+---
+ src/google/protobuf/compiler/cpp/cpp_extension.cc | 2 +-
+ src/google/protobuf/port_def.inc  | 7 +++
+ src/google/protobuf/port_undef.inc| 1 +
+ 3 files changed, 9 insertions(+), 1 deletion(-)
+
+diff --git a/src/google/protobuf/compiler/cpp/cpp_extension.cc 
b/src/google/protobuf/compiler/cpp/cpp_extension.cc
+index 3792db81a..cbec19d30 100644
+--- a/src/google/protobuf/compiler/cpp/cpp_extension.cc
 b/src/google/protobuf/compiler/cpp/cpp_extension.cc
+@@ -174,7 +174,7 @@ void ExtensionGenerator::GenerateDefinition(io::Printer* 
printer) {
+   }
+
+   format(
+-  "PROTOBUF_ATTRIBUTE_INIT_PRIORITY "
++  "PROTOBUF_EXTENSION_ATTRIBUTE_INIT_PRIORITY "
+   "::$proto_ns$::internal::ExtensionIdentifier< $extendee$,\n"
+   "::$proto_ns$::internal::$type_traits$, $field_type$, $packed$ >\n"
+   "  $scoped_name$($constant_name$, $1$);\n",
+diff --git a/src/google/protobuf/port_def.inc 
b/src/google/protobuf/port_def.inc
+index ae9fef425..f1d203707 100644
+--- a/src/google/protobuf/port_def.inc
 b/src/google/protobuf/port_def.inc
+@@ -154,6 +154,9 @@
+ #ifdef PROTOBUF_ATTRIBUTE_INIT_PRIORITY
+ #error PROTOBUF_ATTRIBUTE_INIT_PRIORITY was previously defined
+ #endif
++#ifdef PROTOBUF_EXTENSION_ATTRIBUTE_INIT_PRIORITY
++#error PROTOBUF_EXTENSION_ATTRIBUTE_INIT_PRIORITY was previously defined
++#endif
+ #ifdef PROTOBUF_PRAGMA_INIT_SEG
+ #error PROTOBUF_PRAGMA_INIT_SEG was previously defined
+ #endif
+@@ -596,6 +599,10 @@
+ // Highest priority is 101. We use 102 to allow code that really wants to
+ // higher priority to still beat us.
+ #define PROTOBUF_ATTRIBUTE_INIT_PRIORITY __attribute__((init_priority((102
++// Some embedded systems get a segmentation fault if extension attributes are
++// initialized with higher or equal priority as other attributes. This gives
++// extension attributes high priority, but lower than other attributes.
++#define PROTOBUF_EXTENSION_ATTRIBUTE_INIT_PRIORITY 
__attribute__((init_priority((103
+ #else
+ #define PROTOBUF_ATTRIBUTE_INIT_PRIORITY
+ #endif
+diff --git a/src/google/protobuf/port_undef.inc 
b/src/google/protobuf/port_undef.inc
+index daef09bc4..d0c613b55 100644
+--- a/src/google/protobuf/port_undef.inc
 b/src/google/protobuf/port_undef.inc
+@@ -77,6 +77,7 @@
+ #undef PROTOBUF_ATTRIBUTE_WEAK
+ #undef PROTOBUF_ATTRIBUTE_NO_DESTROY
+ #undef PROTOBUF_ATTRIBUTE_INIT_PRIORITY
++#undef PROTOBUF_EXTENSION_ATTRIBUTE_INIT_PRIORITY
+ #undef PROTOBUF_PRAGMA_INIT_SEG
+
+ // Restore macro that may have been #undef'd in port_def.inc.
+--
+2.17.1
+
diff --git a/meta-oe/recipes-devtools/protobuf/protobuf_3.15.2.bb 
b/meta-oe/recipes-devtools/protobuf/protobuf_3.15.2.bb
index 62c6ee0159..ac4e1ad84b 100644
--- a/meta-oe/recipes-devtools/protobuf/protobuf_3.15.2.bb
+++ b/meta-oe/recipes-devtools/protobuf/protobuf_3.15.2.bb
@@ -17,6 +17,7 @@ SRC_URI = 

Re: [oe] [meta-oe][hardknott][PATCH] mariadb: Upgrade to 10.5.13

2022-01-27 Thread Armin Kuster



On 1/23/22 22:22, Yu, Mingli wrote:

Ping.

Thanks,

thanks for the ping.

got it now.

thanks,
Armin


On 12/22/21 1:47 PM, Yu, Mingli wrote:

From: Mingli Yu 

Remove c11_atomics.patch as the logic is already included in the
new version [1].

[1] 
https://github.com/MariaDB/server/commit/f502ccbcb5dfce29067434885a23db8d1bd5f134


Signed-off-by: Mingli Yu 
---
  ...e_10.5.12.bb => mariadb-native_10.5.13.bb} |  0
  meta-oe/recipes-dbs/mysql/mariadb.inc |  3 +-
  .../mysql/mariadb/c11_atomics.patch   | 82 ---
  ...{mariadb_10.5.12.bb => mariadb_10.5.13.bb} |  0
  4 files changed, 1 insertion(+), 84 deletions(-)
  rename meta-oe/recipes-dbs/mysql/{mariadb-native_10.5.12.bb => 
mariadb-native_10.5.13.bb} (100%)

  delete mode 100644 meta-oe/recipes-dbs/mysql/mariadb/c11_atomics.patch
  rename meta-oe/recipes-dbs/mysql/{mariadb_10.5.12.bb => 
mariadb_10.5.13.bb} (100%)


diff --git a/meta-oe/recipes-dbs/mysql/mariadb-native_10.5.12.bb 
b/meta-oe/recipes-dbs/mysql/mariadb-native_10.5.13.bb

similarity index 100%
rename from meta-oe/recipes-dbs/mysql/mariadb-native_10.5.12.bb
rename to meta-oe/recipes-dbs/mysql/mariadb-native_10.5.13.bb
diff --git a/meta-oe/recipes-dbs/mysql/mariadb.inc 
b/meta-oe/recipes-dbs/mysql/mariadb.inc

index 3ecb29256..4a7b3cac4 100644
--- a/meta-oe/recipes-dbs/mysql/mariadb.inc
+++ b/meta-oe/recipes-dbs/mysql/mariadb.inc
@@ -13,7 +13,6 @@ SRC_URI = 
"https://archive.mariadb.org/${BP}/source/${BP}.tar.gz \

 file://configure.cmake-fix-valgrind.patch \
file://support-files-CMakeLists.txt-fix-do_populate_sysroot.patch \
 file://0001-disable-ucontext-on-musl.patch \
-   file://c11_atomics.patch \
 file://clang_version_header_conflict.patch \
 file://fix-arm-atomic.patch \
 file://0001-Fix-library-LZ4-lookup.patch \
@@ -25,7 +24,7 @@ SRC_URI = 
"https://archive.mariadb.org/${BP}/source/${BP}.tar.gz \

    "
  SRC_URI_append_libc-musl = " file://ppc-remove-glibc-dep.patch"
  -SRC_URI[sha256sum] = 
"ab4f1ca69a30c5372e191a68e8b543a74168327680fb1f4067e8cc0a5582e4bd"
+SRC_URI[sha256sum] = 
"16f008c66831130e9263b2601265d566ffc4e890d37bacecd4dcecebfd0d1c58"

    UPSTREAM_CHECK_URI = "https://github.com/MariaDB/server/releases;
  diff --git a/meta-oe/recipes-dbs/mysql/mariadb/c11_atomics.patch 
b/meta-oe/recipes-dbs/mysql/mariadb/c11_atomics.patch

deleted file mode 100644
index 1c76ab391..0
--- a/meta-oe/recipes-dbs/mysql/mariadb/c11_atomics.patch
+++ /dev/null
@@ -1,82 +0,0 @@
-From 976468458d53d8bb71acf48ddfc852a60557acb9 Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Vicen=C8=9Biu=20Ciorbaru?= 
-Date: Thu, 23 Jul 2020 00:02:21 -0700
-Subject: [PATCH] Link with libatomic to enable C11 atomics support
-
-   Some architectures (mips) require libatomic to support proper
-   atomic operations. Check first if support is available without
-   linking, otherwise use the library.
-
-Upstream-Status: Pending
-Signed-off-by: Khem Raj 
-Signed-off-by: Mingli Yu 

- configure.cmake  | 20 +++-
- mysys/CMakeLists.txt |  4 
- sql/CMakeLists.txt   |  4 
- 3 files changed, 27 insertions(+), 1 deletion(-)
-
-diff --git a/configure.cmake b/configure.cmake
-index 4fc324a9..23a2ea91 100644
 a/configure.cmake
-+++ b/configure.cmake
-@@ -862,7 +862,25 @@ int main()
-   long long int *ptr= 
-   return (int)__atomic_load_n(ptr, __ATOMIC_SEQ_CST);
- }"
--HAVE_GCC_C11_ATOMICS)
-+HAVE_GCC_C11_ATOMICS_WITHOUT_LIBATOMIC)
-+IF (HAVE_GCC_C11_ATOMICS_WITHOUT_LIBATOMIC)
-+  SET(HAVE_GCC_C11_ATOMICS True)
-+ELSE()
-+  SET(OLD_CMAKE_REQUIRED_LIBRARIES ${CMAKE_REQUIRED_LIBRARIES})
-+  LIST(APPEND CMAKE_REQUIRED_LIBRARIES "atomic")
-+  CHECK_CXX_SOURCE_COMPILES("
-+  int main()
-+  {
-+    long long int var= 1;
-+    long long int *ptr= 
-+    return (int)__atomic_load_n(ptr, __ATOMIC_SEQ_CST);
-+  }"
-+  HAVE_GCC_C11_ATOMICS_WITH_LIBATOMIC)
-+  IF(HAVE_GCC_C11_ATOMICS_WITH_LIBATOMIC)
-+    SET(HAVE_GCC_C11_ATOMICS True)
-+  ENDIF()
-+  SET(CMAKE_REQUIRED_LIBRARIES ${OLD_CMAKE_REQUIRED_LIBRARIES})
-+ENDIF()
-
- IF(WITH_VALGRIND)
-   SET(HAVE_valgrind 1)
-diff --git a/mysys/CMakeLists.txt b/mysys/CMakeLists.txt
-index 6aab788f..91b9c393 100644
 a/mysys/CMakeLists.txt
-+++ b/mysys/CMakeLists.txt
-@@ -154,6 +154,10 @@ TARGET_LINK_LIBRARIES(mysys dbug strings 
${ZLIB_LIBRARY}
-  ${LIBNSL} ${LIBM} ${LIBRT} ${CMAKE_DL_LIBS} ${LIBSOCKET} 
${LIBEXECINFO})

- DTRACE_INSTRUMENT(mysys)
-
-+IF (HAVE_GCC_C11_ATOMICS_WITH_LIBATOMIC)
-+  TARGET_LINK_LIBRARIES(mysys atomic)
-+ENDIF()
-+
- IF(HAVE_BFD_H)
-   TARGET_LINK_LIBRARIES(mysys bfd)
- ENDIF(HAVE_BFD_H)
-diff --git a/sql/CMakeLists.txt b/sql/CMakeLists.txt
-index b9cd418f..d42e5017 100644
 a/sql/CMakeLists.txt
-+++ b/sql/CMakeLists.txt
-@@ -222,6 +222,10 @@ ELSE()
-   SET(MYSQLD_SOURCE main.cc ${DTRACE_PROBES_ALL})
- ENDIF()
-
-+IF (HAVE_GCC_C11_ATOMICS_WITH_LIBATOMIC)
-+  TARGET_LINK_LIBRARIES(sql atomic)
-+ENDIF()
-+
- IF(MSVC OR 

[oe] [PATCH v3 meta-oe] rtc-tools: Add a recipe

2022-01-27 Thread Fabio Estevam
From: Fabio Estevam 

rtc-tools is a useful utility developed by Alexandre Belloni
for testing RTC kernel drivers, such as y2038 support.

Based on the initial recipe from Heiko Schocher .

Signed-off-by: Fabio Estevam 
---
 .../0001-rtc-tools-Add-a-Makefile.patch   | 44 +++
 .../rtc-tools/rtc-tools_1.0.0.bb  | 18 
 2 files changed, 62 insertions(+)
 create mode 100644 
meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
 create mode 100644 meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb

diff --git 
a/meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
 
b/meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
new file mode 100644
index ..c1d1fa97eaa3
--- /dev/null
+++ 
b/meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
@@ -0,0 +1,44 @@
+From b19924f797d69475b1857272231500c97ba9959c Mon Sep 17 00:00:00 2001
+From: Fabio Estevam 
+Date: Thu, 27 Jan 2022 18:40:29 -0300
+Subject: [PATCH rtc-tools v2] rtc-tools: Add a Makefile
+
+Add a Makefile to make installation and uninstallation
+process easier.
+
+Upstream-Status: Submitted 
[https://marc.info/?l=linux-rtc=164332426030004=2]
+Signed-off-by: Fabio Estevam 
+---
+Changes since v1:
+- Simplify the Makefile by taking Peter Kjellerstedt's feedback in
+the oe-devel list.
+
+ Makefile | 16 
+ 1 file changed, 16 insertions(+)
+ create mode 100644 Makefile
+
+diff --git a/Makefile b/Makefile
+new file mode 100644
+index 000..71a4c9c
+--- /dev/null
 b/Makefile
+@@ -0,0 +1,16 @@
++prefix ?= /usr
++bindir ?= $(prefix)/bin
++
++EXEC = rtc-range rtc rtc-sync
++
++all: $(EXEC)
++
++clean:
++  $(RM) $(EXEC)
++
++install:
++  install -d $(DESTDIR)$(bindir)
++  install $(EXEC) $(DESTDIR)$(bindir)
++
++uninstall:
++  $(RM) -r $(addprefix $(DESTDIR)$(bindir)/,$(EXEC))
+-- 
+2.25.1
+
diff --git a/meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb 
b/meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb
new file mode 100644
index ..64ea3173d8a4
--- /dev/null
+++ b/meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb
@@ -0,0 +1,18 @@
+SUMMARY = "Useful programs to test rtc drivers"
+LICENSE = "GPL-2.0-only"
+LIC_FILES_CHKSUM = "file://COPYING;md5=74274e8a218423e49eefdea80bc55038"
+
+SRC_URI = 
"git://git.kernel.org/pub/scm/linux/kernel/git/abelloni/${BPN}.git;protocol=https;branch=master
 \
+   file://0001-rtc-tools-Add-a-Makefile.patch \
+   "
+SRCREV = "acc442e7af4e1e783432a43d37f1a7938c692659"
+
+S = "${WORKDIR}/git"
+
+TARGET_CC_ARCH += "${LDFLAGS}"
+
+EXTRA_OEMAKE = "DESTDIR=${D}"
+
+do_install() {
+   oe_runmake install
+}
-- 
2.25.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95130): 
https://lists.openembedded.org/g/openembedded-devel/message/95130
Mute This Topic: https://lists.openembedded.org/mt/88733959/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe] [PATCH v2 meta-oe] rtc-tools: Add a recipe

2022-01-27 Thread Peter Kjellerstedt
> -Original Message-
> From: openembedded-devel@lists.openembedded.org  de...@lists.openembedded.org> On Behalf Of Otavio Salvador
> Sent: den 26 januari 2022 20:01
> To: Khem Raj 
> Cc: Fabio Estevam ; openembeded-devel  de...@lists.openembedded.org>; Heiko Schocher ; Alexandre
> BELLONI 
> Subject: Re: [oe] [PATCH v2 meta-oe] rtc-tools: Add a recipe
> 
> Em qua., 26 de jan. de 2022 às 15:32, Khem Raj 
> escreveu:
> > > +do_install() {
> > > +   oe_runmake install
> > > +}
> 
> IIRC this is the default so EXTRA_OEMAKE (removing this task) would just
> work.

No. There is a default base_do_compile() in base.bbclass that runs 
oe_runmake if a Makefile exists, but the default base_do_install() 
does nothing.

//Peter


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95129): 
https://lists.openembedded.org/g/openembedded-devel/message/95129
Mute This Topic: https://lists.openembedded.org/mt/88703575/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe] [PATCH v2 meta-oe] rtc-tools: Add a recipe

2022-01-27 Thread Peter Kjellerstedt
> -Original Message-
> From: openembedded-devel@lists.openembedded.org 
>  On Behalf Of Khem Raj
> Sent: den 26 januari 2022 19:33
> To: Fabio Estevam 
> Cc: openembeded-devel ; Otavio 
> Salvador ; Heiko Schocher ; 
> Alexandre BELLONI 
> Subject: Re: [oe] [PATCH v2 meta-oe] rtc-tools: Add a recipe
> 
> On Wed, Jan 26, 2022 at 10:22 AM Fabio Estevam  wrote:
> >
> > rtc-tools is a useful utility developed by Alexandre Belloni
> > for testing RTC kernel drivers, such as y2038 support.
> >
> > Based on the initial recipe from Heiko Schocher .
> >
> > Signed-off-by: Fabio Estevam 
> > ---
> > Changes since v1:
> > - None: just sent it to oe-devel as suggested by Khem.
> >
> >  .../0001-rtc-tools-Add-a-Makefile.patch   | 52 +++
> >  .../rtc-tools/rtc-tools_1.0.0.bb  | 19 +++
> >  2 files changed, 71 insertions(+)
> >  create mode 100644 
> > meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
> >  create mode 100644 meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb
> >
> > diff --git 
> > a/meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
> >  
> > b/meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
> > new file mode 100644
> > index ..a372e390efb9
> > --- /dev/null
> > +++ 
> > b/meta-oe/recipes-support/rtc-tools/rtc-tools/0001-rtc-tools-Add-a-Makefile.patch
> > @@ -0,0 +1,52 @@
> > +From faa6dd2e4d063afcaa19f16740a3fc413a399e60 Mon Sep 17 00:00:00 2001
> > +From: Fabio Estevam 
> > +Date: Sun, 23 Jan 2022 09:22:19 -0300
> > +Subject: [PATCH rtc-tools] rtc-tools: Add a Makefile
> > +
> > +Add a Makefile to make installation and uninstallation
> > +process easier.
> > +
> > +Upstream-Status: Submitted 
> > [https://marc.info/?l=linux-rtc=164294073129803=2]
> > +Signed-off-by: Fabio Estevam 
> > +---
> > + Makefile | 29 +
> > + 1 file changed, 29 insertions(+)
> > + create mode 100644 Makefile
> > +
> > +diff --git a/Makefile b/Makefile
> > +new file mode 100644
> > +index ..4f244d9289f1
> > +--- /dev/null
> >  b/Makefile
> > +@@ -0,0 +1,29 @@
> > ++prefix ?= /usr
> > ++bindir ?= $(prefix)/bin
> > ++
> > ++EXEC = rtc-range rtc rtc-sync
> > ++
> > ++all: $(EXEC)
> > ++
> > ++rtc-range: rtc-range.c
> > ++  $(CC) $(CFLAGS) -o $@ rtc-range.c
> 
> perhaps you should also be using LDFLAGS here.
> 
> > ++
> > ++rtc: rtc.c
> > ++  $(CC) $(CFLAGS) -o $@ rtc.c
> 
> here
> 
> > ++
> > ++rtc-sync: rtc-sync.c
> > ++  $(CC) $(CFLAGS) -o $@ rtc-sync.c
> > ++
> 
> and here

Actually, it is better to just remove the three rules above. 
Make has a built in rule to build a binary from a C source file.

> > ++clean:
> > ++  rm -f $(EXEC)

Change to:

clean:
$(RM) $(EXEC)

> > ++
> > ++install: rtc-range rtc rtc-sync
> > ++  mkdir -p '$(DESTDIR)$(bindir)'
> > ++  install -m755 rtc-range '$(DESTDIR)$(bindir)/rtc-range'
> > ++  install -m755 rtc '$(DESTDIR)$(bindir)/rtc'
> > ++  install -m755 rtc-sync '$(DESTDIR)$(bindir)/rtc-sync'

Change to:

install:
install -d $(DESTDIR)$(bindir)
install $(EXEC) $(DESTDIR)$(bindir)

The install target should not have any dependencies or it might 
build them in pseudo context.

> > ++
> > ++uninstall:
> > ++  rm -rf '$(DESTDIR)$(bindir)/rtc-range'
> > ++  rm -rf '$(DESTDIR)$(bindir)/rtc'
> > ++  rm -rf '$(DESTDIR)$(bindir)/rtc-sync'

Change to:

uninstall:
$(RM) -r $(addprefix $(DESTDIR)$(bindir),$(EXEC))

> > +--
> > +2.25.1
> > diff --git a/meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb 
> > b/meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb
> > new file mode 100644
> > index ..8f0326829d8c
> > --- /dev/null
> > +++ b/meta-oe/recipes-support/rtc-tools/rtc-tools_1.0.0.bb
> > @@ -0,0 +1,19 @@
> > +DESCRIPTION = "Useful programs to test rtc drivers"

Change "DESCRIPTION" to "SUMMARY".

> > +LICENSE = "GPLv2"

Change "GPLv2" to "GPL-2.0-only".

> > +LIC_FILES_CHKSUM = "file://COPYING;md5=74274e8a218423e49eefdea80bc55038"
> > +
> > +SRC_URI = 
> > "git://git.kernel.org/pub/scm/linux/kernel/git/abelloni/rtc-tools.git;protocol=https;branch=master
> >  \

Change "rtc-tools" to "${BPN}".

> > +   file://0001-rtc-tools-Add-a-Makefile.patch \
> > +   "
> > +SRCREV ?= "acc442e7af4e1e783432a43d37f1a7938c692659"

Change "?=" to "=".

> > +
> > +S = "${WORKDIR}/git"
> > +
> > +TARGET_CC_ARCH += "${LDFLAGS}"
> 
> this may not be needed if above changes are made.

Correct. Remove it.

> > +EXTRA_OEMAKE = " \
> > +   DESTDIR=${D} \
> 
> DESTDIR=${D} should perhaps already be part of oe_runmake

No, it isn't by default.

> 
> > +   all \

Remove "all", and rewrite this as:

EXTRA_OEMAKE = "DESTDIR=${D}"

> > +   "
> > +do_install() {
> > +   oe_runmake install
> > +}
> > --
> > 2.25.1

//Peter


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95128): 

Re: [oe] [meta-gnome][PATCH] evolution-data-server: try to fix g-i data generation

2022-01-27 Thread Khem Raj
On Wed, Jan 26, 2022 at 11:27 PM Markus Volk  wrote:
>
> thanks to your patches for systemd i could try this now. i have
> successfully built evolution-data-server for musl x86-64 with g-ir and
> vapi. However, also with the recipe that is currently in master. So this
> test is not really helpful.

Thats good, can you try it with current master-next ?

>
> Am 26.01.22 um 08:18 schrieb Markus Volk:
> > i tried, but there are a lot of systemd patches that are not applying
> > and thus i'm unable to compile it. But never mind ... if it doesn't
> > run for you, just disable GIR. Maybe i find some time to look into it
> > sometime later
> >
> > Am 26.01.22 um 07:35 schrieb Khem Raj:
> >> On Tue, Jan 25, 2022 at 10:01 PM Markus Volk  wrote:
> >>> Signed-off-by: Markus Volk 
> >>> ---
> >>>   .../evolution-data-server/evolution-data-server.bb | 5 +++--
> >>>   1 file changed, 3 insertions(+), 2 deletions(-)
> >>>
> >>> diff --git
> >>> a/meta-gnome/recipes-gnome/evolution-data-server/evolution-data-server.bb
> >>> b/meta-gnome/recipes-gnome/evolution-data-server/evolution-data-server.bb
> >>>
> >>> index 9ccaedbcc..c5c7d947f 100644
> >>> ---
> >>> a/meta-gnome/recipes-gnome/evolution-data-server/evolution-data-server.bb
> >>> +++
> >>> b/meta-gnome/recipes-gnome/evolution-data-server/evolution-data-server.bb
> >>> @@ -27,14 +27,15 @@ EXTRA_OECMAKE = " \
> >>>   -DENABLE_UOA=OFF \
> >>>   -DENABLE_GOOGLE_AUTH=OFF \
> >>>   -DENABLE_WEATHER=OFF \
> >>> --DG_IR_COMPILER=${STAGING_BINDIR}/g-ir-compiler-wrapper \
> >>> --DG_IR_SCANNER=${STAGING_BINDIR}/g-ir-scanner-wrapper \
> >>>   -DVAPIGEN=${STAGING_BINDIR_NATIVE}/vapigen \
> >>>   ${@bb.utils.contains('GI_DATA_ENABLED', 'True',
> >>> '-DENABLE_INTROSPECTION=ON -DENABLE_VALA_BINDINGS=ON',
> >>> '-DENABLE_INTROSPECTION=OFF', d)} \
> >>>   -D${LKSTRFTIME} \
> >>>   -DLIB_SUFFIX=${@d.getVar('baselib').replace('lib', '')} \
> >>>   "
> >>>
> >>> +EXTRA_OECMAKE:append:class-target = "
> >>> -DG_IR_COMPILER=${STAGING_BINDIR}/g-ir-compiler-wrapper"
> >>> +EXTRA_OECMAKE:append:class-target = "
> >>> -DG_IR_SCANNER=${STAGING_BINDIR}/g-ir-scanner-wrapper"
> >>> +
> >> Can you test it for TCLIBC = "musl"
> >>
> >>
> >>>   PACKAGECONFIG[canberra] =
> >>> "-DENABLE_CANBERRA=ON,-DENABLE_CANBERRA=OFF,libcanberra"
> >>>   PACKAGECONFIG[oauth]=
> >>> "-DENABLE_OAUTH2=ON,-DENABLE_OAUTH2=OFF,webkitgtk json-glib"
> >>>   PACKAGECONFIG[goa]=
> >>> "-DENABLE_GOA=ON,-DENABLE_GOA=OFF,gnome-online-accounts"
> >>> --
> >>> 2.25.1
> >>>
> >>>
> >>>
> >>>
> >>>
> >>>
> >>>
> >
> >
> >
>
> 
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95127): 
https://lists.openembedded.org/g/openembedded-devel/message/95127
Mute This Topic: https://lists.openembedded.org/mt/88691224/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[oe] [meta-oe][dunfell][PATCH v2] CVE-2021-4034: polkit Local privilege escalation in pkexec due to incorrect handling of argument vector

2022-01-27 Thread Jeremy Puhlman
Upstream-Status: Backport
CVE: CVE-2021-4034

Signed-off-by: Jeremy A. Puhlman 
---
 .../polkit/files/CVE-2021-4034.patch  | 74 +++
 .../recipes-extended/polkit/polkit_0.116.bb   |  1 +
 2 files changed, 75 insertions(+)
 create mode 100644 meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch

diff --git a/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch 
b/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch
new file mode 100644
index 0..cab1c83c0
--- /dev/null
+++ b/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch
@@ -0,0 +1,74 @@
+From ed8b418f1341cf7fc576f6b17de5c6dd4017e034 Mon Sep 17 00:00:00 2001
+From: "Jeremy A. Puhlman" 
+Date: Thu, 27 Jan 2022 00:01:27 +
+Subject: [PATCH] CVE-2021-4034: Local privilege escalation in pkexec due to 
+ incorrect handling of argument vector
+
+Upstream-Status: Backport 
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
+CVE: CVE-2021-4034
+
+Signed-off-by: Jeremy A. Puhlman 
+---
+ src/programs/pkcheck.c |  6 ++
+ src/programs/pkexec.c  | 21 -
+ 2 files changed, 26 insertions(+), 1 deletion(-)
+
+diff --git a/src/programs/pkcheck.c b/src/programs/pkcheck.c
+index f1bb4e1..aff4f60 100644
+--- a/src/programs/pkcheck.c
 b/src/programs/pkcheck.c
+@@ -363,6 +363,12 @@ main (int argc, char *argv[])
+   local_agent_handle = NULL;
+   ret = 126;
+ 
++  if (argc < 1)
++{
++  help();
++  exit(1);
++}
++
+   /* Disable remote file access from GIO. */
+   setenv ("GIO_USE_VFS", "local", 1);
+ 
+diff --git a/src/programs/pkexec.c b/src/programs/pkexec.c
+index 7698c5c..3ff4c58 100644
+--- a/src/programs/pkexec.c
 b/src/programs/pkexec.c
+@@ -488,6 +488,17 @@ main (int argc, char *argv[])
+   pid_t pid_of_caller;
+   gpointer local_agent_handle;
+ 
++
++  /*
++   * If 'pkexec' is called wrong, just show help and bail out.
++   */
++  if (argc<1)
++{
++  clearenv();
++  usage(argc, argv);
++  exit(1);
++}
++
+   ret = 127;
+   authority = NULL;
+   subject = NULL;
+@@ -636,7 +647,15 @@ main (int argc, char *argv[])
+   goto out;
+ }
+   g_free (path);
+-  argv[n] = path = s;
++  path = s;
++
++  /* argc<2 and pkexec runs just shell, argv is guaranteed to be 
null-terminated.
++   * /-less shell shouldn't happen, but let's be defensive and don't 
write to null-termination
++   */
++  if (argv[n] != NULL)
++  {
++argv[n] = path;
++  }
+ }
+   if (access (path, F_OK) != 0)
+ {
+-- 
+2.26.2
+
diff --git a/meta-oe/recipes-extended/polkit/polkit_0.116.bb 
b/meta-oe/recipes-extended/polkit/polkit_0.116.bb
index ad1973b13..77288b008 100644
--- a/meta-oe/recipes-extended/polkit/polkit_0.116.bb
+++ b/meta-oe/recipes-extended/polkit/polkit_0.116.bb
@@ -25,6 +25,7 @@ PAM_SRC_URI = "file://polkit-1_pam.patch"
 SRC_URI = 
"http://www.freedesktop.org/software/polkit/releases/polkit-${PV}.tar.gz \
${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', 
'', d)} \
file://0003-make-netgroup-support-optional.patch \
+   file://CVE-2021-4034.patch \
"
 SRC_URI[md5sum] = "4b37258583393e83069a0e2e89c0162a"
 SRC_URI[sha256sum] = 
"88170c9e711e8db305a12fdb8234fac5706c61969b94e084d0f117d8ec5d34b1"
-- 
2.20.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95126): 
https://lists.openembedded.org/g/openembedded-devel/message/95126
Mute This Topic: https://lists.openembedded.org/mt/88725791/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe] [meta-oe][dunfell][PATCH] CVE-2021-3466: polkit Local privilege escalation in pkexec due to incorrect handling of argument vector

2022-01-27 Thread Jeremy Puhlman

Had an odd brain fart for some reason.

On 1/26/2022 10:27 PM, Ranjitsinh Rathod wrote:

Seems like the subject line is wrongly saying CVE-2021-3466 CVE.


Thanks,

Best Regards,

*Ranjitsinh Rathod*
Technical Leader |  | KPIT Technologies Ltd.
Cellphone: +91-84606 92403
*^__
*KPIT |Follow us on LinkedIn 







*From:* openembedded-devel@lists.openembedded.org 
 on behalf of Jeremy 
Puhlman via lists.openembedded.org 


*Sent:* Thursday, January 27, 2022 5:44 AM
*To:* openembedded-devel@lists.openembedded.org 


*Cc:* Jeremy A. Puhlman 
*Subject:* [oe] [meta-oe][dunfell][PATCH] CVE-2021-3466: polkit Local 
privilege escalation in pkexec due to incorrect handling of argument 
vector
Caution: This email originated from outside of the KPIT. Do not click 
links or open attachments unless you recognize the sender and know the 
content is safe.


Upstream-Status: Backport
CVE: CVE-2021-3466
Signed-off-by: Jeremy A. Puhlman 
---
 .../polkit/files/CVE-2021-4034.patch  | 71 +++
 .../recipes-extended/polkit/polkit_0.116.bb   |  1 +
 2 files changed, 72 insertions(+)
 create mode 100644 
meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch


diff --git a/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch 
b/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch

new file mode 100644
index 0..294ada961
--- /dev/null
+++ b/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch
@@ -0,0 +1,71 @@
+From ed8b418f1341cf7fc576f6b17de5c6dd4017e034 Mon Sep 17 00:00:00 2001
+From: "Jeremy A. Puhlman" 
+Date: Thu, 27 Jan 2022 00:01:27 +
+Subject: [PATCH] CVE-2021-4034: Local privilege escalation in pkexec 
due to

+ incorrect handling of argument vector
+
+Upstream-Status: Backport 
https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgitlab.freedesktop.org%2Fpolkit%2Fpolkit%2F-%2Fcommit%2Fa2bf5c9c83b6ae46cbd5c779d3055bff81ded683data=04%7C01%7Cranjitsinh.rathod%40kpit.com%7C45f46f1f615a4eb760cf08d9e12a0005%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637788392834981462%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000sdata=6gOaS0OVJ%2B3GwhS8HtF4DXXiZOsxIYmbuSjsz4LgJME%3Dreserved=0 


+---
+ src/programs/pkcheck.c |  6 ++
+ src/programs/pkexec.c  | 21 -
+ 2 files changed, 26 insertions(+), 1 deletion(-)
+
+diff --git a/src/programs/pkcheck.c b/src/programs/pkcheck.c
+index f1bb4e1..aff4f60 100644
+--- a/src/programs/pkcheck.c
 b/src/programs/pkcheck.c
+@@ -363,6 +363,12 @@ main (int argc, char *argv[])
+   local_agent_handle = NULL;
+   ret = 126;
+
++  if (argc < 1)
++    {
++  help();
++  exit(1);
++    }
++
+   /* Disable remote file access from GIO. */
+   setenv ("GIO_USE_VFS", "local", 1);
+
+diff --git a/src/programs/pkexec.c b/src/programs/pkexec.c
+index 7698c5c..3ff4c58 100644
+--- a/src/programs/pkexec.c
 b/src/programs/pkexec.c
+@@ -488,6 +488,17 @@ main (int argc, char *argv[])
+   pid_t pid_of_caller;
+   gpointer local_agent_handle;
+
++
++  /*
++   * If 'pkexec' is called wrong, just show help and bail out.
++   */
++  if (argc<1)
++    {
++  clearenv();
++  usage(argc, argv);
++  exit(1);
++    }
++
+   ret = 127;
+   authority = NULL;
+   subject = NULL;
+@@ -636,7 +647,15 @@ main (int argc, char *argv[])
+   goto out;
+ }
+   g_free (path);
+-  argv[n] = path = s;
++  path = s;
++
++  /* argc<2 and pkexec runs just shell, argv is guaranteed to be 
null-terminated.
++   * /-less shell shouldn't happen, but let's be defensive and 
don't write to null-termination

++   */
++  if (argv[n] != NULL)
++  {
++    argv[n] = path;
++  }
+ }
+   if (access (path, F_OK) != 0)
+ {
+--
+2.26.2
+
diff --git a/meta-oe/recipes-extended/polkit/polkit_0.116.bb 
b/meta-oe/recipes-extended/polkit/polkit_0.116.bb

index ad1973b13..77288b008 100644
--- a/meta-oe/recipes-extended/polkit/polkit_0.116.bb
+++ b/meta-oe/recipes-extended/polkit/polkit_0.116.bb
@@ -25,6 +25,7 @@ PAM_SRC_URI = "file://polkit-1_pam.patch"
 SRC_URI = 

[oe] [meta-oe][dunfell][PATCH] CVE-2021-4034: polkit Local privilege escalation in pkexec due to incorrect handling of argument vector

2022-01-27 Thread Jeremy Puhlman
Upstream-Status: Backport
CVE: CVE-2021-4034
Signed-off-by: Jeremy A. Puhlman 
---
 .../polkit/files/CVE-2021-4034.patch  | 71 +++
 .../recipes-extended/polkit/polkit_0.116.bb   |  1 +
 2 files changed, 72 insertions(+)
 create mode 100644 meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch

diff --git a/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch 
b/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch
new file mode 100644
index 0..294ada961
--- /dev/null
+++ b/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch
@@ -0,0 +1,71 @@
+From ed8b418f1341cf7fc576f6b17de5c6dd4017e034 Mon Sep 17 00:00:00 2001
+From: "Jeremy A. Puhlman" 
+Date: Thu, 27 Jan 2022 00:01:27 +
+Subject: [PATCH] CVE-2021-4034: Local privilege escalation in pkexec due to 
+ incorrect handling of argument vector
+
+Upstream-Status: Backport 
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
+---
+ src/programs/pkcheck.c |  6 ++
+ src/programs/pkexec.c  | 21 -
+ 2 files changed, 26 insertions(+), 1 deletion(-)
+
+diff --git a/src/programs/pkcheck.c b/src/programs/pkcheck.c
+index f1bb4e1..aff4f60 100644
+--- a/src/programs/pkcheck.c
 b/src/programs/pkcheck.c
+@@ -363,6 +363,12 @@ main (int argc, char *argv[])
+   local_agent_handle = NULL;
+   ret = 126;
+ 
++  if (argc < 1)
++{
++  help();
++  exit(1);
++}
++
+   /* Disable remote file access from GIO. */
+   setenv ("GIO_USE_VFS", "local", 1);
+ 
+diff --git a/src/programs/pkexec.c b/src/programs/pkexec.c
+index 7698c5c..3ff4c58 100644
+--- a/src/programs/pkexec.c
 b/src/programs/pkexec.c
+@@ -488,6 +488,17 @@ main (int argc, char *argv[])
+   pid_t pid_of_caller;
+   gpointer local_agent_handle;
+ 
++
++  /*
++   * If 'pkexec' is called wrong, just show help and bail out.
++   */
++  if (argc<1)
++{
++  clearenv();
++  usage(argc, argv);
++  exit(1);
++}
++
+   ret = 127;
+   authority = NULL;
+   subject = NULL;
+@@ -636,7 +647,15 @@ main (int argc, char *argv[])
+   goto out;
+ }
+   g_free (path);
+-  argv[n] = path = s;
++  path = s;
++
++  /* argc<2 and pkexec runs just shell, argv is guaranteed to be 
null-terminated.
++   * /-less shell shouldn't happen, but let's be defensive and don't 
write to null-termination
++   */
++  if (argv[n] != NULL)
++  {
++argv[n] = path;
++  }
+ }
+   if (access (path, F_OK) != 0)
+ {
+-- 
+2.26.2
+
diff --git a/meta-oe/recipes-extended/polkit/polkit_0.116.bb 
b/meta-oe/recipes-extended/polkit/polkit_0.116.bb
index ad1973b13..77288b008 100644
--- a/meta-oe/recipes-extended/polkit/polkit_0.116.bb
+++ b/meta-oe/recipes-extended/polkit/polkit_0.116.bb
@@ -25,6 +25,7 @@ PAM_SRC_URI = "file://polkit-1_pam.patch"
 SRC_URI = 
"http://www.freedesktop.org/software/polkit/releases/polkit-${PV}.tar.gz \
${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', 
'', d)} \
file://0003-make-netgroup-support-optional.patch \
+   file://CVE-2021-4034.patch \
"
 SRC_URI[md5sum] = "4b37258583393e83069a0e2e89c0162a"
 SRC_URI[sha256sum] = 
"88170c9e711e8db305a12fdb8234fac5706c61969b94e084d0f117d8ec5d34b1"
-- 
2.20.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95124): 
https://lists.openembedded.org/g/openembedded-devel/message/95124
Mute This Topic: https://lists.openembedded.org/mt/88725716/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[oe] [meta-oe][dunfell][PATCH] c-ares: bump PV in recipe to 1.16.1

2022-01-27 Thread Armin Kuster
Signed-off-by: Armin Kuster 
---
 meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb 
b/meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb
index b77604797d..692a5f0d6e 100644
--- a/meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb
+++ b/meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb
@@ -5,7 +5,7 @@ SECTION = "libs"
 LICENSE = "MIT"
 LIC_FILES_CHKSUM = "file://LICENSE.md;md5=fb997454c8d62aa6a47f07a8cd48b006"
 
-PV = "1.16.0+gitr${SRCPV}"
+PV = "1.16.1+gitr${SRCPV}"
 
 SRC_URI = "\
 git://github.com/c-ares/c-ares.git;branch=main;protocol=https \
-- 
2.25.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95123): 
https://lists.openembedded.org/g/openembedded-devel/message/95123
Mute This Topic: https://lists.openembedded.org/mt/88723882/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [oe] [meta-oe][dunfell][PATCH] CVE-2021-3466: polkit Local privilege escalation in pkexec due to incorrect handling of argument vector

2022-01-27 Thread Armin Kuster



On 1/26/22 16:14, Jeremy Puhlman wrote:

Upstream-Status: Backport
CVE: CVE-2021-3466
Signed-off-by: Jeremy A. Puhlman 
---
  .../polkit/files/CVE-2021-4034.patch  | 71 +++
  .../recipes-extended/polkit/polkit_0.116.bb   |  1 +
  2 files changed, 72 insertions(+)
  create mode 100644 meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch

diff --git a/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch 
b/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch
new file mode 100644
index 0..294ada961
--- /dev/null
+++ b/meta-oe/recipes-extended/polkit/files/CVE-2021-4034.patch
@@ -0,0 +1,71 @@
+From ed8b418f1341cf7fc576f6b17de5c6dd4017e034 Mon Sep 17 00:00:00 2001
+From: "Jeremy A. Puhlman" 
+Date: Thu, 27 Jan 2022 00:01:27 +
+Subject: [PATCH] CVE-2021-4034: Local privilege escalation in pkexec due to
+ incorrect handling of argument vector
+
+Upstream-Status: Backport 
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683

The patch itself needs to contain this additional information. Please add:

CVE: CVE-2021-
Signed-off-by: Jeremy A. Puhlman 


+---
+ src/programs/pkcheck.c |  6 ++
+ src/programs/pkexec.c  | 21 -
+ 2 files changed, 26 insertions(+), 1 deletion(-)
+
+diff --git a/src/programs/pkcheck.c b/src/programs/pkcheck.c
+index f1bb4e1..aff4f60 100644
+--- a/src/programs/pkcheck.c
 b/src/programs/pkcheck.c
+@@ -363,6 +363,12 @@ main (int argc, char *argv[])
+   local_agent_handle = NULL;
+   ret = 126;
+
++  if (argc < 1)
++{
++  help();
++  exit(1);
++}
++
+   /* Disable remote file access from GIO. */
+   setenv ("GIO_USE_VFS", "local", 1);
+
+diff --git a/src/programs/pkexec.c b/src/programs/pkexec.c
+index 7698c5c..3ff4c58 100644
+--- a/src/programs/pkexec.c
 b/src/programs/pkexec.c
+@@ -488,6 +488,17 @@ main (int argc, char *argv[])
+   pid_t pid_of_caller;
+   gpointer local_agent_handle;
+
++
++  /*
++   * If 'pkexec' is called wrong, just show help and bail out.
++   */
++  if (argc<1)
++{
++  clearenv();
++  usage(argc, argv);
++  exit(1);
++}
++
+   ret = 127;
+   authority = NULL;
+   subject = NULL;
+@@ -636,7 +647,15 @@ main (int argc, char *argv[])
+   goto out;
+ }
+   g_free (path);
+-  argv[n] = path = s;
++  path = s;
++
++  /* argc<2 and pkexec runs just shell, argv is guaranteed to be 
null-terminated.
++   * /-less shell shouldn't happen, but let's be defensive and don't 
write to null-termination
++   */
++  if (argv[n] != NULL)
++  {
++argv[n] = path;
++  }
+ }
+   if (access (path, F_OK) != 0)
+ {
+--
+2.26.2
+
diff --git a/meta-oe/recipes-extended/polkit/polkit_0.116.bb 
b/meta-oe/recipes-extended/polkit/polkit_0.116.bb
index ad1973b13..77288b008 100644
--- a/meta-oe/recipes-extended/polkit/polkit_0.116.bb
+++ b/meta-oe/recipes-extended/polkit/polkit_0.116.bb
@@ -25,6 +25,7 @@ PAM_SRC_URI = "file://polkit-1_pam.patch"
  SRC_URI = 
"http://www.freedesktop.org/software/polkit/releases/polkit-${PV}.tar.gz \
 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', 
'', d)} \
 file://0003-make-netgroup-support-optional.patch \
+   file://CVE-2021-4034.patch \
 "
  SRC_URI[md5sum] = "4b37258583393e83069a0e2e89c0162a"
  SRC_URI[sha256sum] = 
"88170c9e711e8db305a12fdb8234fac5706c61969b94e084d0f117d8ec5d34b1"






-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95122): 
https://lists.openembedded.org/g/openembedded-devel/message/95122
Mute This Topic: https://lists.openembedded.org/mt/88710808/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[oe] [meta-oe][PATCH] boinc-client:

2022-01-27 Thread Gianfranco
* update to 7.18.1 and unblacklist
* Add openssl 3.0 build fix provided by upstream
* fix the sed command to work with the correct new libtool named file
* refresh patches
* drop patch part that is added in one patch and removed in the following one

Signed-off-by: Gianfranco Costamagna 
Signed-off-by: Gianfranco Costamagna 
---
 .../packagegroups/packagegroup-meta-oe.bb |  1 +
 .../boinc/boinc-client/4563.patch | 36 +++
 .../boinc-client/boinc-AM_CONDITIONAL.patch   | 11 +-
 .../boinc/boinc-client/gtk-configure.patch| 10 +-
 ...ient_7.16.16.bb => boinc-client_7.18.1.bb} | 12 +++
 5 files changed, 45 insertions(+), 25 deletions(-)
 create mode 100644 meta-oe/recipes-extended/boinc/boinc-client/4563.patch
 rename meta-oe/recipes-extended/boinc/{boinc-client_7.16.16.bb => 
boinc-client_7.18.1.bb} (92%)

diff --git a/meta-oe/recipes-core/packagegroups/packagegroup-meta-oe.bb 
b/meta-oe/recipes-core/packagegroups/packagegroup-meta-oe.bb
index 3cf33c694..a600b24cc 100644
--- a/meta-oe/recipes-core/packagegroups/packagegroup-meta-oe.bb
+++ b/meta-oe/recipes-core/packagegroups/packagegroup-meta-oe.bb
@@ -333,6 +333,7 @@ RDEPENDS:packagegroup-meta-oe-devtools:remove:x86 = "ply"
 
 RDEPENDS:packagegroup-meta-oe-extended ="\
 bitwise \
+${@bb.utils.contains("DISTRO_FEATURES", "x11 wayland opengl", 
"boinc-client", "", d)} \
 brotli \
 byacc \
 cmatrix \
diff --git a/meta-oe/recipes-extended/boinc/boinc-client/4563.patch 
b/meta-oe/recipes-extended/boinc/boinc-client/4563.patch
new file mode 100644
index 0..a18da4539
--- /dev/null
+++ b/meta-oe/recipes-extended/boinc/boinc-client/4563.patch
@@ -0,0 +1,36 @@
+From 689dc20ede9768377d4032ff8c70b58269c8dc9c Mon Sep 17 00:00:00 2001
+From: Charlie Fenton 
+Date: Mon, 18 Oct 2021 01:43:08 -0700
+Subject: [PATCH 01/10] Mac: update dependent libraries to latest:
+ c-ares-1.17.2, curl-7.79.1, freetype-2.11.0, openssl-3.0.0 Previously updated
+ to wxWidgets-3.1.5. FTGL version ftgl-2.1.3~rc5  is still the current
+ version.
+
+---
+ lib/crypt.cpp |   7 +-
+ 8 files changed, 199 insertions(+), 150 deletions(-)
+
+diff --git a/lib/crypt.cpp b/lib/crypt.cpp
+index 01249cfc340..9b1f69160b8 100644
+--- a/lib/crypt.cpp
 b/lib/crypt.cpp
+@@ -1,6 +1,6 @@
+ // This file is part of BOINC.
+ // http://boinc.berkeley.edu
+-// Copyright (C) 2008 University of California
++// Copyright (C) 2021 University of California
+ //
+ // BOINC is free software; you can redistribute it and/or modify it
+ // under the terms of the GNU Lesser General Public License
+@@ -672,7 +672,10 @@ int check_validity_of_cert(
+ }
+ #ifdef HAVE_OPAQUE_RSA_DSA_DH
+ RSA *rsa;
+-rsa = EVP_PKEY_get0_RSA(pubKey);
++// CAUTION: In OpenSSL 3.0.0, EVP_PKEY_get0_RSA() now returns a
++// pointer of type "const struct rsa_st*" to an immutable value.
++// Do not try to modify the contents of the returned struct.
++rsa = (rsa_st*)EVP_PKEY_get0_RSA(pubKey);
+ if (!RSA_blinding_on(rsa, c)) {
+ #else
+ if (!RSA_blinding_on(pubKey->pkey.rsa, c)) {
diff --git 
a/meta-oe/recipes-extended/boinc/boinc-client/boinc-AM_CONDITIONAL.patch 
b/meta-oe/recipes-extended/boinc/boinc-client/boinc-AM_CONDITIONAL.patch
index 7c3b0325d..0431f523e 100644
--- a/meta-oe/recipes-extended/boinc/boinc-client/boinc-AM_CONDITIONAL.patch
+++ b/meta-oe/recipes-extended/boinc/boinc-client/boinc-AM_CONDITIONAL.patch
@@ -14,7 +14,7 @@ diff --git a/configure.ac b/configure.ac
 index d81d795de4..7beeb34ae2 100644
 --- a/configure.ac
 +++ b/configure.ac
-@@ -63,6 +63,7 @@ m4_pattern_allow([AC_PROG_OBJCXX])
+@@ -59,6 +59,7 @@ m4_pattern_allow([AC_PROG_OBJCXX])
  m4_ifdef([AC_PROG_OBJCXX],[AC_PROG_OBJCXX],)
  dnl --
  AC_PROG_CPP
@@ -22,12 +22,3 @@ index d81d795de4..7beeb34ae2 100644
  AC_PROG_MAKE_SET
  SAH_LINKS
  AC_LANG_PUSH(C)
-@@ -1068,6 +1069,8 @@ AM_CONDITIONAL(ENABLE_BOINCCRYPT, [test 
"x${enable_server}" = xyes  || test "x${
- AM_CONDITIONAL(INSTALL_HEADERS, [test "${enable_install_headers}" = yes])
- AM_CONDITIONAL(HAVE_CUDA_LIB, [test "${enable_client}" = yes -a -f 
./coprocs/CUDA/posix/${boinc_platform}/libcudart.so])
- 
-+PKG_CHECK_MODULES([GTK2], [gtk+-2.0])
-+
- dnl ==
- dnl some more vodoo required for building portable client-binary (client, 
clientgui)
- dnl ==
diff --git a/meta-oe/recipes-extended/boinc/boinc-client/gtk-configure.patch 
b/meta-oe/recipes-extended/boinc/boinc-client/gtk-configure.patch
index e060b1a40..3b814e903 100644
--- a/meta-oe/recipes-extended/boinc/boinc-client/gtk-configure.patch
+++ b/meta-oe/recipes-extended/boinc/boinc-client/gtk-configure.patch
@@ -14,7 +14,7 @@ diff --git a/configure.ac b/configure.ac
 index 7beeb34ae2..35234c2762 100644
 --- a/configure.ac
 +++ b/configure.ac
-@@ -1018,6 +1018,11 @@ 

[oe] [meta-python] [PATCH] python3-pywbemtools: upgrade 0.9.0 -> 0.9.1

2022-01-27 Thread xuhuan.f...@fujitsu.com
From: Xu Huan 

Signed-off-by: Xu Huan 
---
 ...ython3-pywbemtools_0.9.0.bb => python3-pywbemtools_0.9.1.bb} | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta-python/recipes-extended/pywbemtools/{python3-pywbemtools_0.9.0.bb 
=> python3-pywbemtools_0.9.1.bb} (92%)

diff --git 
a/meta-python/recipes-extended/pywbemtools/python3-pywbemtools_0.9.0.bb 
b/meta-python/recipes-extended/pywbemtools/python3-pywbemtools_0.9.1.bb
similarity index 92%
rename from 
meta-python/recipes-extended/pywbemtools/python3-pywbemtools_0.9.0.bb
rename to meta-python/recipes-extended/pywbemtools/python3-pywbemtools_0.9.1.bb
index 46b6a99605..c51f860fd5 100644
--- a/meta-python/recipes-extended/pywbemtools/python3-pywbemtools_0.9.0.bb
+++ b/meta-python/recipes-extended/pywbemtools/python3-pywbemtools_0.9.1.bb
@@ -4,7 +4,7 @@ HOMEPAGE = "https://pywbemtools.readthedocs.io/en/stable/;
 LICENSE = "Apache-2.0"
 LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=e23fadd6ceef8c618fc1c65191d846fa"
 
-SRC_URI[sha256sum] = 
"f6f36c96be46c801919fa6cc218a5d051fce381a2d9a0b99c9162d8335e96c36"
+SRC_URI[sha256sum] = 
"cbe2fe67620e73a81807940a75aeed8570205e2213d6f8de4db15fbc06fe8804"
 
 inherit pypi setuptools3
 
-- 
2.25.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95120): 
https://lists.openembedded.org/g/openembedded-devel/message/95120
Mute This Topic: https://lists.openembedded.org/mt/88718421/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[PATCH 3/3] [oe] [meta-python] [PATCH] python3-pytest-timeout: upgrade 2.0.2 -> 2.1.0

2022-01-27 Thread xuhuan.f...@fujitsu.com
From: Xu Huan 

Signed-off-by: Xu Huan 
---
 ...-pytest-timeout_2.0.2.bb => python3-pytest-timeout_2.1.0.bb} | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta-python/recipes-devtools/python/{python3-pytest-timeout_2.0.2.bb => 
python3-pytest-timeout_2.1.0.bb} (77%)

diff --git 
a/meta-python/recipes-devtools/python/python3-pytest-timeout_2.0.2.bb 
b/meta-python/recipes-devtools/python/python3-pytest-timeout_2.1.0.bb
similarity index 77%
rename from meta-python/recipes-devtools/python/python3-pytest-timeout_2.0.2.bb
rename to meta-python/recipes-devtools/python/python3-pytest-timeout_2.1.0.bb
index 7c77e4add6..c4faec6c61 100644
--- a/meta-python/recipes-devtools/python/python3-pytest-timeout_2.0.2.bb
+++ b/meta-python/recipes-devtools/python/python3-pytest-timeout_2.1.0.bb
@@ -5,7 +5,7 @@ LIC_FILES_CHKSUM = 
"file://LICENSE;md5=d8048cd156eda3df2e7f111b0ae9ceff"
 
 PYPI_PACKAGE = "pytest-timeout"
 
-SRC_URI[sha256sum] = 
"e6f98b54dafde8d70e4088467ff621260b641eb64895c4195b6e5c8f45638112"
+SRC_URI[sha256sum] = 
"c07ca07404c612f8abbe22294b23c368e2e5104b521c1790195561f37e1ac3d9"
 
 inherit pypi setuptools3
 
-- 
2.25.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95119): 
https://lists.openembedded.org/g/openembedded-devel/message/95119
Mute This Topic: https://lists.openembedded.org/mt/88717635/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[PATCH 2/3] [oe] [meta-python] [PATCH] python3-pyephem: upgrade 4.1.1 -> 4.1.3

2022-01-27 Thread xuhuan.f...@fujitsu.com
From: Xu Huan 

changelog:
===
-Fixed an inadvertent loss of precision in the routine that computes a date’s
hours, minutes, and seconds. It was sometimes returning a small negative number
of seconds, which caused Python’s datetime type to complain
ValueError: second must be in 0..59.
-Users installing from source on Windows are now protected against a possible
encoding error as setup.py reads in two text files.

Signed-off-by: Xu Huan 
---
 .../{python3-pyephem_4.1.1.bb => python3-pyephem_4.1.3.bb}  | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta-python/recipes-extended/python-pyephem/{python3-pyephem_4.1.1.bb 
=> python3-pyephem_4.1.3.bb} (77%)

diff --git 
a/meta-python/recipes-extended/python-pyephem/python3-pyephem_4.1.1.bb 
b/meta-python/recipes-extended/python-pyephem/python3-pyephem_4.1.3.bb
similarity index 77%
rename from meta-python/recipes-extended/python-pyephem/python3-pyephem_4.1.1.bb
rename to meta-python/recipes-extended/python-pyephem/python3-pyephem_4.1.3.bb
index ec3cde87d3..29697bc251 100644
--- a/meta-python/recipes-extended/python-pyephem/python3-pyephem_4.1.1.bb
+++ b/meta-python/recipes-extended/python-pyephem/python3-pyephem_4.1.3.bb
@@ -4,7 +4,7 @@ HOMEPAGE = "http://rhodesmill.org/pyephem/;
 LICENSE = "MIT"
 LIC_FILES_CHKSUM = "file://LICENSE;md5=9c930b395b435b00bb13ec83b0c99f40"

-SRC_URI[sha256sum] = 
"dba9e05c78ce910ae75a06351a5592479191a8dc570ac0cd6d18a77e98138873"
+SRC_URI[sha256sum] = 
"7fa18685981ba528edd504052a9d5212a09aa5bf15c11a734edc6a86e8a8b56a"

 PYPI_PACKAGE = "ephem"

--
2.25.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95118): 
https://lists.openembedded.org/g/openembedded-devel/message/95118
Mute This Topic: https://lists.openembedded.org/mt/88717634/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[PATCH 1/3] [oe] [meta-python] [PATCH] python3-pulsectl upgrade 21.10.5 -> 22.1.3

2022-01-27 Thread xuhuan.f...@fujitsu.com
From: Xu Huan 

Signed-off-by: Xu Huan 
---
 .../{python3-pulsectl_21.10.5.bb => python3-pulsectl_22.1.3.bb} | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta-python/recipes-devtools/python/{python3-pulsectl_21.10.5.bb => 
python3-pulsectl_22.1.3.bb} (84%)

diff --git a/meta-python/recipes-devtools/python/python3-pulsectl_21.10.5.bb 
b/meta-python/recipes-devtools/python/python3-pulsectl_22.1.3.bb
similarity index 84%
rename from meta-python/recipes-devtools/python/python3-pulsectl_21.10.5.bb
rename to meta-python/recipes-devtools/python/python3-pulsectl_22.1.3.bb
index 0b867b83a2..9a5b9f948c 100644
--- a/meta-python/recipes-devtools/python/python3-pulsectl_21.10.5.bb
+++ b/meta-python/recipes-devtools/python/python3-pulsectl_22.1.3.bb
@@ -3,7 +3,7 @@ HOMEPAGE = "https://github.com/mk-fg/python-pulse-control;
 LICENSE = "MIT"
 LIC_FILES_CHKSUM = "file://COPYING;md5=f1d10048469ff90123263eb5e214061d"
 
-SRC_URI[sha256sum] = 
"b347983fb78baab168f4dc4804ab2c59ca5b813bf62f8146dfb5fcb6ab6c8ba2"
+SRC_URI[sha256sum] = 
"f28fe4b881dd2cc144d2d94f83ec60d8c59a52642a0ad3635cc4d0f8406f4858"
 
 RDEPENDS:${PN} += " \
libpulse \
-- 
2.25.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#95117): 
https://lists.openembedded.org/g/openembedded-devel/message/95117
Mute This Topic: https://lists.openembedded.org/mt/88717632/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-