Re: [OE-core][PATCH] openssl: openssl: patch CVE-2024-2511

2024-04-13 Thread Tim Orling via lists.openembedded.org
Looks like when 3.2.2 is released it will include this. So 3.2.2 should be
applied to scarthgap.

“master” will be moving to 3.3.0 soon for styhead

On Sat, Apr 13, 2024 at 3:50 PM Peter Marko via lists.openembedded.org
 wrote:

> From: Peter Marko 
>
> Patch:
> https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08
> News:
> https://github.com/openssl/openssl/commit/b7acb6731a96b073d6150465bd090e2052a595c2
>
> Signed-off-by: Peter Marko 
> ---
>  .../openssl/openssl/CVE-2024-2511.patch   | 120 ++
>  .../openssl/openssl_3.2.1.bb  |   1 +
>  2 files changed, 121 insertions(+)
>  create mode 100644
> meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch
>
> diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch
> b/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch
> new file mode 100644
> index 00..8772f716d5
> --- /dev/null
> +++ b/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch
> @@ -0,0 +1,120 @@
> +From e9d7083e241670332e0443da0f0d4ffb52829f08 Mon Sep 17 00:00:00 2001
> +From: Matt Caswell 
> +Date: Tue, 5 Mar 2024 15:43:53 +
> +Subject: [PATCH] Fix unconstrained session cache growth in TLSv1.3
> +
> +In TLSv1.3 we create a new session object for each ticket that we send.
> +We do this by duplicating the original session. If SSL_OP_NO_TICKET is in
> +use then the new session will be added to the session cache. However, if
> +early data is not in use (and therefore anti-replay protection is being
> +used), then multiple threads could be resuming from the same session
> +simultaneously. If this happens and a problem occurs on one of the
> threads,
> +then the original session object could be marked as not_resumable. When we
> +duplicate the session object this not_resumable status gets copied into
> the
> +new session object. The new session object is then added to the session
> +cache even though it is not_resumable.
> +
> +Subsequently, another bug means that the session_id_length is set to 0 for
> +sessions that are marked as not_resumable - even though that session is
> +still in the cache. Once this happens the session can never be removed
> from
> +the cache. When that object gets to be the session cache tail object the
> +cache never shrinks again and grows indefinitely.
> +
> +CVE-2024-2511
> +
> +Reviewed-by: Neil Horman 
> +Reviewed-by: Tomas Mraz 
> +(Merged from https://github.com/openssl/openssl/pull/24043)
> +
> +CVE: CVE-2024-2511
> +Upstream-Status: Backport [
> https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08
> ]
> +Signed-off-by: Peter Marko 
> +---
> + ssl/ssl_lib.c|  5 +++--
> + ssl/ssl_sess.c   | 28 ++--
> + ssl/statem/statem_srvr.c |  5 ++---
> + 3 files changed, 27 insertions(+), 11 deletions(-)
> +
> +diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
> +index 4afb43bc86e54..c51529ddab5bb 100644
> +--- a/ssl/ssl_lib.c
>  b/ssl/ssl_lib.c
> +@@ -4457,9 +4457,10 @@ void ssl_update_cache(SSL_CONNECTION *s, int mode)
> +
> + /*
> +  * If the session_id_length is 0, we are not supposed to cache it,
> and it
> +- * would be rather hard to do anyway :-)
> ++ * would be rather hard to do anyway :-). Also if the session has
> already
> ++ * been marked as not_resumable we should not cache it for later
> reuse.
> +  */
> +-if (s->session->session_id_length == 0)
> ++if (s->session->session_id_length == 0 || s->session->not_resumable)
> + return;
> +
> + /*
> +diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c
> +index 3dcc4d81e5bc6..1fa6d17c46863 100644
> +--- a/ssl/ssl_sess.c
>  b/ssl/ssl_sess.c
> +@@ -127,16 +127,11 @@ SSL_SESSION *SSL_SESSION_new(void)
> + return ss;
> + }
> +
> +-SSL_SESSION *SSL_SESSION_dup(const SSL_SESSION *src)
> +-{
> +-return ssl_session_dup(src, 1);
> +-}
> +-
> + /*
> +  * Create a new SSL_SESSION and duplicate the contents of |src| into it.
> If
> +  * ticket == 0 then no ticket information is duplicated, otherwise it is.
> +  */
> +-SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket)
> ++static SSL_SESSION *ssl_session_dup_intern(const SSL_SESSION *src, int
> ticket)
> + {
> + SSL_SESSION *dest;
> +
> +@@ -265,6 +260,27 @@ SSL_SESSION *ssl_session_dup(const SSL_SESSION *src,
> int ticket)
> + return NULL;
> + }
> +
> ++SSL_SESSION *SSL_SESSION_dup(const SSL_SESSION *src)
> ++{
> ++return ssl_session_dup_intern(src, 1);
> ++}
> ++
> ++/*
> ++ * Used internally when duplicating a session which might be already
> shared.
> ++ * We will have resumed the original session. Subsequently we might have
> marked
> ++ * it as non-resumable (e.g. in another thread) - but this copy should
> be ok to
> ++ * resume from.
> ++ */
> ++SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket)
> ++{
> ++SSL_SESSION *sess = ssl_session_dup_intern(src, ticket);
> ++
> ++if (sess != NULL)
> ++   

[OE-core][PATCH] openssl: openssl: patch CVE-2024-2511

2024-04-13 Thread Peter Marko via lists.openembedded.org
From: Peter Marko 

Patch: 
https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08
News: 
https://github.com/openssl/openssl/commit/b7acb6731a96b073d6150465bd090e2052a595c2

Signed-off-by: Peter Marko 
---
 .../openssl/openssl/CVE-2024-2511.patch   | 120 ++
 .../openssl/openssl_3.2.1.bb  |   1 +
 2 files changed, 121 insertions(+)
 create mode 100644 
meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch

diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch 
b/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch
new file mode 100644
index 00..8772f716d5
--- /dev/null
+++ b/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch
@@ -0,0 +1,120 @@
+From e9d7083e241670332e0443da0f0d4ffb52829f08 Mon Sep 17 00:00:00 2001
+From: Matt Caswell 
+Date: Tue, 5 Mar 2024 15:43:53 +
+Subject: [PATCH] Fix unconstrained session cache growth in TLSv1.3
+
+In TLSv1.3 we create a new session object for each ticket that we send.
+We do this by duplicating the original session. If SSL_OP_NO_TICKET is in
+use then the new session will be added to the session cache. However, if
+early data is not in use (and therefore anti-replay protection is being
+used), then multiple threads could be resuming from the same session
+simultaneously. If this happens and a problem occurs on one of the threads,
+then the original session object could be marked as not_resumable. When we
+duplicate the session object this not_resumable status gets copied into the
+new session object. The new session object is then added to the session
+cache even though it is not_resumable.
+
+Subsequently, another bug means that the session_id_length is set to 0 for
+sessions that are marked as not_resumable - even though that session is
+still in the cache. Once this happens the session can never be removed from
+the cache. When that object gets to be the session cache tail object the
+cache never shrinks again and grows indefinitely.
+
+CVE-2024-2511
+
+Reviewed-by: Neil Horman 
+Reviewed-by: Tomas Mraz 
+(Merged from https://github.com/openssl/openssl/pull/24043)
+
+CVE: CVE-2024-2511
+Upstream-Status: Backport 
[https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08]
+Signed-off-by: Peter Marko 
+---
+ ssl/ssl_lib.c|  5 +++--
+ ssl/ssl_sess.c   | 28 ++--
+ ssl/statem/statem_srvr.c |  5 ++---
+ 3 files changed, 27 insertions(+), 11 deletions(-)
+
+diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
+index 4afb43bc86e54..c51529ddab5bb 100644
+--- a/ssl/ssl_lib.c
 b/ssl/ssl_lib.c
+@@ -4457,9 +4457,10 @@ void ssl_update_cache(SSL_CONNECTION *s, int mode)
+ 
+ /*
+  * If the session_id_length is 0, we are not supposed to cache it, and it
+- * would be rather hard to do anyway :-)
++ * would be rather hard to do anyway :-). Also if the session has already
++ * been marked as not_resumable we should not cache it for later reuse.
+  */
+-if (s->session->session_id_length == 0)
++if (s->session->session_id_length == 0 || s->session->not_resumable)
+ return;
+ 
+ /*
+diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c
+index 3dcc4d81e5bc6..1fa6d17c46863 100644
+--- a/ssl/ssl_sess.c
 b/ssl/ssl_sess.c
+@@ -127,16 +127,11 @@ SSL_SESSION *SSL_SESSION_new(void)
+ return ss;
+ }
+ 
+-SSL_SESSION *SSL_SESSION_dup(const SSL_SESSION *src)
+-{
+-return ssl_session_dup(src, 1);
+-}
+-
+ /*
+  * Create a new SSL_SESSION and duplicate the contents of |src| into it. If
+  * ticket == 0 then no ticket information is duplicated, otherwise it is.
+  */
+-SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket)
++static SSL_SESSION *ssl_session_dup_intern(const SSL_SESSION *src, int ticket)
+ {
+ SSL_SESSION *dest;
+ 
+@@ -265,6 +260,27 @@ SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int 
ticket)
+ return NULL;
+ }
+ 
++SSL_SESSION *SSL_SESSION_dup(const SSL_SESSION *src)
++{
++return ssl_session_dup_intern(src, 1);
++}
++
++/*
++ * Used internally when duplicating a session which might be already shared.
++ * We will have resumed the original session. Subsequently we might have 
marked
++ * it as non-resumable (e.g. in another thread) - but this copy should be ok 
to
++ * resume from.
++ */
++SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket)
++{
++SSL_SESSION *sess = ssl_session_dup_intern(src, ticket);
++
++if (sess != NULL)
++sess->not_resumable = 0;
++
++return sess;
++}
++
+ const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, unsigned int 
*len)
+ {
+ if (len)
+diff --git a/ssl/statem/statem_srvr.c b/ssl/statem/statem_srvr.c
+index 853af8c0aa9f9..d5f0ab091dacc 100644
+--- a/ssl/statem/statem_srvr.c
 b/ssl/statem/statem_srvr.c
+@@ -2445,9 +2445,8 @@ CON_FUNC_RETURN 
tls_construct_server_hello(SSL_CONNECTION *s, WPACKET *pkt)
+  * so the following won't overwrite an 

[OE-core][kirkstone][PATCH] openssl: patch CVE-2024-2511

2024-04-13 Thread Peter Marko via lists.openembedded.org
From: Peter Marko 

Patch: 
https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d
News: 
https://github.com/openssl/openssl/commit/daee101e39073d4b65a68faeb2f2de5ad7b05c36

Signed-off-by: Peter Marko 
---
 .../openssl/openssl/CVE-2024-2511.patch   | 122 ++
 .../openssl/openssl_3.0.13.bb |   1 +
 2 files changed, 123 insertions(+)
 create mode 100644 
meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch

diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch 
b/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch
new file mode 100644
index 00..8aea686205
--- /dev/null
+++ b/meta/recipes-connectivity/openssl/openssl/CVE-2024-2511.patch
@@ -0,0 +1,122 @@
+From b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d Mon Sep 17 00:00:00 2001
+From: Matt Caswell 
+Date: Tue, 5 Mar 2024 15:43:53 +
+Subject: [PATCH] Fix unconstrained session cache growth in TLSv1.3
+
+In TLSv1.3 we create a new session object for each ticket that we send.
+We do this by duplicating the original session. If SSL_OP_NO_TICKET is in
+use then the new session will be added to the session cache. However, if
+early data is not in use (and therefore anti-replay protection is being
+used), then multiple threads could be resuming from the same session
+simultaneously. If this happens and a problem occurs on one of the threads,
+then the original session object could be marked as not_resumable. When we
+duplicate the session object this not_resumable status gets copied into the
+new session object. The new session object is then added to the session
+cache even though it is not_resumable.
+
+Subsequently, another bug means that the session_id_length is set to 0 for
+sessions that are marked as not_resumable - even though that session is
+still in the cache. Once this happens the session can never be removed from
+the cache. When that object gets to be the session cache tail object the
+cache never shrinks again and grows indefinitely.
+
+CVE-2024-2511
+
+Reviewed-by: Neil Horman 
+Reviewed-by: Tomas Mraz 
+(Merged from https://github.com/openssl/openssl/pull/24044)
+
+(cherry picked from commit 7e4d731b1c07201ad9374c1cd9ac5263bdf35bce)
+
+CVE: CVE-2024-2511
+Upstream-Status: Backport 
[https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d]
+Signed-off-by: Peter Marko 
+---
+ ssl/ssl_lib.c|  5 +++--
+ ssl/ssl_sess.c   | 28 ++--
+ ssl/statem/statem_srvr.c |  5 ++---
+ 3 files changed, 27 insertions(+), 11 deletions(-)
+
+diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
+index 2c8479eb5fc69..eed649c6fdee9 100644
+--- a/ssl/ssl_lib.c
 b/ssl/ssl_lib.c
+@@ -3736,9 +3736,10 @@ void ssl_update_cache(SSL *s, int mode)
+ 
+ /*
+  * If the session_id_length is 0, we are not supposed to cache it, and it
+- * would be rather hard to do anyway :-)
++ * would be rather hard to do anyway :-). Also if the session has already
++ * been marked as not_resumable we should not cache it for later reuse.
+  */
+-if (s->session->session_id_length == 0)
++if (s->session->session_id_length == 0 || s->session->not_resumable)
+ return;
+ 
+ /*
+diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c
+index d836b33ed0e81..75adbd9e52b40 100644
+--- a/ssl/ssl_sess.c
 b/ssl/ssl_sess.c
+@@ -152,16 +152,11 @@ SSL_SESSION *SSL_SESSION_new(void)
+ return ss;
+ }
+ 
+-SSL_SESSION *SSL_SESSION_dup(const SSL_SESSION *src)
+-{
+-return ssl_session_dup(src, 1);
+-}
+-
+ /*
+  * Create a new SSL_SESSION and duplicate the contents of |src| into it. If
+  * ticket == 0 then no ticket information is duplicated, otherwise it is.
+  */
+-SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket)
++static SSL_SESSION *ssl_session_dup_intern(const SSL_SESSION *src, int ticket)
+ {
+ SSL_SESSION *dest;
+ 
+@@ -285,6 +280,27 @@ SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int 
ticket)
+ return NULL;
+ }
+ 
++SSL_SESSION *SSL_SESSION_dup(const SSL_SESSION *src)
++{
++return ssl_session_dup_intern(src, 1);
++}
++
++/*
++ * Used internally when duplicating a session which might be already shared.
++ * We will have resumed the original session. Subsequently we might have 
marked
++ * it as non-resumable (e.g. in another thread) - but this copy should be ok 
to
++ * resume from.
++ */
++SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket)
++{
++SSL_SESSION *sess = ssl_session_dup_intern(src, ticket);
++
++if (sess != NULL)
++sess->not_resumable = 0;
++
++return sess;
++}
++
+ const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, unsigned int 
*len)
+ {
+ if (len)
+diff --git a/ssl/statem/statem_srvr.c b/ssl/statem/statem_srvr.c
+index a9e67f9d32a77..6c942e6bcec29 100644
+--- a/ssl/statem/statem_srvr.c
 b/ssl/statem/statem_srvr.c
+@@ -2338,9 +2338,8 @@ int tls_construct_server_hello(SSL *s, WPACKET *pkt)
+  * 

Re: [OE-core] [PATCH 10/33] gnutls: upgrade 3.8.4 -> 3.8.5

2024-04-13 Thread Simone Weiß
On Fri, 2024-04-12 at 16:39 +0200, Alexandre Belloni wrote:
> On 11/04/2024 19:41:09+, Simone Weiß wrote:
> > On Wed, 2024-04-10 at 02:45 +0200, Alexandre Belloni via
> > lists.openembedded.org wrote:
> > > Failed ptests:
> > > {'gnutls': ['alerts',
> > >     'cert-status',
> > >     'ciphersuite-name',
> > >     'dtls-etm',
> > >     'dtls10-cert-key-exchange',
> > >     'dtls12-cert-key-exchange',
> > >     'keylog-env',
> > >     'mini-chain-unsorted',
> > >     'mini-record-failure',
> > >     'mini-overhead',
> > >     'mini-record',
> > >     'mini-record-2',
> > >     'record-retvals',
> > >     'rehandshake-switch-cert',
> > >     'rehandshake-switch-cert-allow',
> > >     'rehandshake-switch-cert-client',
> > >     'rehandshake-switch-cert-client-allow',
> > >     'rsa-encrypt-decrypt',
> > >     'rsa-psk',
> > >     'rsa-psk-cb',
> > >     'rsaes-pkcs1-v1_5',
> > >     'tls-etm',
> > >     'tls-force-etm',
> > >     'tls-neg-ext4-key',
> > >     'tls10-cert-key-exchange',
> > >     'tls11-cert-key-exchange',
> > >     'tls10-server-kx-neg',
> > >     'tls12-anon-upgrade',
> > >     'tls12-cert-key-exchange',
> > >     'tls11-server-kx-neg',
> > >     'tls12-server-kx-neg',
> > >     'tls13-cert-key-exchange',
> > >     'tls13-server-kx-neg',
> > >     'version-checks']}
> > > 
> > > 
> > Hi,
> > 
> > is there a autobuilder link to this? I tried it locally and all was
> > fine.
> > Would like to check it just to see if I can spot a difference. Or do
> > you
> > (Wang Mingyu) already check at the moment?
> 
> https://autobuilder.yoctoproject.org/typhoon/#/builders/81/builds/6489/steps/12/logs/stdio
> 
> https://autobuilder.yocto.io/pub/non-release/20240409-25/testresults/qemux86-64-ptest/gnutls.log

Looks like at least some might be fixable with
https://gitlab.com/gnutls/gnutls/-/merge_requests/1830

I will take a further look

> 

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198201): 
https://lists.openembedded.org/g/openembedded-core/message/198201
Mute This Topic: https://lists.openembedded.org/mt/105417636/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 1/2] python3-websockets: Import from meta-python

2024-04-13 Thread Khem Raj
On Sat, Apr 13, 2024 at 4:38 AM Richard Purdie <
richard.pur...@linuxfoundation.org> wrote:

> On Fri, 2024-04-12 at 07:05 -0700, Khem Raj wrote:
> > we need a patch to remove it from meta-python at same time
>
> I was testing this was all we needed and went to create one now I've
> confirmed that but I see you have one in master-next. Let me know if
> you need anything.


I think we are fine for now with that


>
> Cheers,
>
> Richard
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198200): 
https://lists.openembedded.org/g/openembedded-core/message/198200
Mute This Topic: https://lists.openembedded.org/mt/105480053/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core][PATCH 2/3] kbd: remove non-free Agafari fonts

2024-04-13 Thread Peter Kjellerstedt
> -Original Message-
> From: openembedded-core@lists.openembedded.org  c...@lists.openembedded.org> On Behalf Of Richard Purdie
> Sent: den 13 april 2024 12:47
> To: peter.ma...@siemens.com; Khem Raj 
> Cc: openembedded-core@lists.openembedded.org
> Subject: Re: [OE-core][PATCH 2/3] kbd: remove non-free Agafari fonts
> 
> On Sat, 2024-04-13 at 06:31 +, Peter Marko via
> lists.openembedded.org wrote:
> > That surprises me but fine.
> > I'm sending a v2 moving the file removal to the recipe.
> > But you could also hand-craft the patch again locally.
> 
> Since time is against me, I did create a hybrid patch:
> 
> https://git.yoctoproject.org/poky/commit/?h=master-next=03b9028fe6f76da4b19c62eca102caccaf66c1b4
> 
> Let me know if anyone isn't happy with this. I'm happy to take other
> patches.
> 
> Cheers,
> 
> Richard

The do_configure:prepend() looks wrong:

+do_configure:prepend() {
+rm -rf ${S}/${S}/data/consolefonts/Agafari-1*
+}

I assume that should be:

+do_configure:prepend() {
+   rm -rf ${S}/data/consolefonts/Agafari-1*
+}

//Peter


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198199): 
https://lists.openembedded.org/g/openembedded-core/message/198199
Mute This Topic: https://lists.openembedded.org/mt/105486424/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core] [PATCH 1/2] python3-websockets: Import from meta-python

2024-04-13 Thread Richard Purdie
On Fri, 2024-04-12 at 07:05 -0700, Khem Raj wrote:
> we need a patch to remove it from meta-python at same time

I was testing this was all we needed and went to create one now I've
confirmed that but I see you have one in master-next. Let me know if
you need anything.

Cheers,

Richard

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198198): 
https://lists.openembedded.org/g/openembedded-core/message/198198
Mute This Topic: https://lists.openembedded.org/mt/105480053/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] Patchtest results for [PATCH 1/3] python3-testtools: Fix build problems from incorrect build backend

2024-04-13 Thread Patchtest
Thank you for your submission. Patchtest identified one
or more issues with the patch. Please see the log below for
more information:

---
Testing patch 
/home/patchtest/share/mboxes/1-3-python3-testtools-Fix-build-problems-from-incorrect-build-backend.patch

FAIL: test lic files chksum modified not mentioned: LIC_FILES_CHKSUM changed 
without "License-Update:" tag and description in commit message 
(test_metadata.TestMetadata.test_lic_files_chksum_modified_not_mentioned)

PASS: pretest src uri left files 
(test_metadata.TestMetadata.pretest_src_uri_left_files)
PASS: test CVE check ignore (test_metadata.TestMetadata.test_cve_check_ignore)
PASS: test Signed-off-by presence 
(test_mbox.TestMbox.test_signed_off_by_presence)
PASS: test author valid (test_mbox.TestMbox.test_author_valid)
PASS: test commit message presence 
(test_mbox.TestMbox.test_commit_message_presence)
PASS: test max line length (test_metadata.TestMetadata.test_max_line_length)
PASS: test mbox format (test_mbox.TestMbox.test_mbox_format)
PASS: test non-AUH upgrade (test_mbox.TestMbox.test_non_auh_upgrade)
PASS: test shortlog format (test_mbox.TestMbox.test_shortlog_format)
PASS: test shortlog length (test_mbox.TestMbox.test_shortlog_length)
PASS: test src uri left files 
(test_metadata.TestMetadata.test_src_uri_left_files)

SKIP: pretest pylint: No python related patches, skipping test 
(test_python_pylint.PyLint.pretest_pylint)
SKIP: test CVE tag format: No new CVE patches introduced 
(test_patch.TestPatch.test_cve_tag_format)
SKIP: test Signed-off-by presence: No new CVE patches introduced 
(test_patch.TestPatch.test_signed_off_by_presence)
SKIP: test Upstream-Status presence: No new CVE patches introduced 
(test_patch.TestPatch.test_upstream_status_presence_format)
SKIP: test bugzilla entry format: No bug ID found 
(test_mbox.TestMbox.test_bugzilla_entry_format)
SKIP: test lic files chksum presence: No added recipes, skipping test 
(test_metadata.TestMetadata.test_lic_files_chksum_presence)
SKIP: test license presence: No added recipes, skipping test 
(test_metadata.TestMetadata.test_license_presence)
SKIP: test pylint: No python related patches, skipping test 
(test_python_pylint.PyLint.test_pylint)
SKIP: test series merge on head: Merge test is disabled for now 
(test_mbox.TestMbox.test_series_merge_on_head)
SKIP: test summary presence: No added recipes, skipping test 
(test_metadata.TestMetadata.test_summary_presence)
SKIP: test target mailing list: Series merged, no reason to check other mailing 
lists (test_mbox.TestMbox.test_target_mailing_list)

---

Please address the issues identified and
submit a new revision of the patch, or alternatively, reply to this
email with an explanation of why the patch should be accepted. If you
believe these results are due to an error in patchtest, please submit a
bug at https://bugzilla.yoctoproject.org/ (use the 'Patchtest' category
under 'Yocto Project Subprojects'). For more information on specific
failures, see: https://wiki.yoctoproject.org/wiki/Patchtest. Thank
you!

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198197): 
https://lists.openembedded.org/g/openembedded-core/message/198197
Mute This Topic: https://lists.openembedded.org/mt/105498877/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 1/3] python3-testtools: Fix build problems from incorrect build backend

2024-04-13 Thread Richard Purdie
testtools uses the hatchling backend so:
  * merge the inc back into the recipe
  * drop setuptools
  * use the hatchling backend
  * add the needed vcs dependency
  * drop the now unneeded python3-pbr dependency

This means the submodules are included in packaging, fixing build failures
and the verison in the wheel is no longer 0.0.0

Prior to this fix, testtools in buildtools tarball was completely
broken.

Signed-off-by: Richard Purdie 
---
 .../python/python-testtools.inc   | 27 ---
 .../python/python3-testtools_2.7.1.bb | 21 +--
 2 files changed, 19 insertions(+), 29 deletions(-)
 delete mode 100644 meta/recipes-devtools/python/python-testtools.inc

diff --git a/meta/recipes-devtools/python/python-testtools.inc 
b/meta/recipes-devtools/python/python-testtools.inc
deleted file mode 100644
index e9dd97ec1c1..000
--- a/meta/recipes-devtools/python/python-testtools.inc
+++ /dev/null
@@ -1,27 +0,0 @@
-SUMMARY = "Extensions to the Python standard library unit testing framework"
-HOMEPAGE = "https://pypi.org/project/testtools/;
-SECTION = "devel/python"
-LICENSE = "Apache-2.0"
-LIC_FILES_CHKSUM = "file://LICENSE;md5=e2c9d3e8ba7141c83bfef190e0b9379a"
-
-inherit pypi
-
-SRC_URI[sha256sum] = 
"df6de96010e29ee21f637a147eabf30d50b25e3841dd1d68f93ee89ce77e366c"
-
-DEPENDS += " \
-python3-pbr \
-"
-
-# Satisfy setup.py 'setup_requires'
-DEPENDS += " \
-python3-pbr-native \
-"
-
-RDEPENDS:${PN} += "\
-python3-doctest \
-python3-extras \
-python3-pbr \
-python3-six \
-"
-
-BBCLASSEXTEND = "nativesdk"
diff --git a/meta/recipes-devtools/python/python3-testtools_2.7.1.bb 
b/meta/recipes-devtools/python/python3-testtools_2.7.1.bb
index 79e46a02de7..cc7e0556326 100644
--- a/meta/recipes-devtools/python/python3-testtools_2.7.1.bb
+++ b/meta/recipes-devtools/python/python3-testtools_2.7.1.bb
@@ -1,3 +1,20 @@
-inherit setuptools3
-require python-testtools.inc
+SUMMARY = "Extensions to the Python standard library unit testing framework"
+HOMEPAGE = "https://pypi.org/project/testtools/;
+SECTION = "devel/python"
+LICENSE = "Apache-2.0"
+LIC_FILES_CHKSUM = "file://LICENSE;md5=e2c9d3e8ba7141c83bfef190e0b9379a"
+
+DEPENDS += "python3-hatch-vcs-native"
+
+inherit pypi python_hatchling
+
+SRC_URI[sha256sum] = 
"df6de96010e29ee21f637a147eabf30d50b25e3841dd1d68f93ee89ce77e366c"
+
+RDEPENDS:${PN} += "\
+python3-doctest \
+python3-extras \
+python3-six \
+"
+
+BBCLASSEXTEND = "nativesdk"
 
-- 
2.40.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198194): 
https://lists.openembedded.org/g/openembedded-core/message/198194
Mute This Topic: https://lists.openembedded.org/mt/105498752/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 3/3] abi_version/sstate: Switch to a new version for the upcoming release

2024-04-13 Thread Richard Purdie
In testing websocket hashequivalence, corrupted sstate was injected into the
autobuilder extensively. With the new release/LTS, being able to clearly
differentiate between old and new sstate is probably desireable anyway
so bump the appropriate versions.

Signed-off-by: Richard Purdie 
---
 meta/classes-global/sstate.bbclass | 2 +-
 meta/conf/abi_version.conf | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/meta/classes-global/sstate.bbclass 
b/meta/classes-global/sstate.bbclass
index 96655ff24ff..04539bbb99a 100644
--- a/meta/classes-global/sstate.bbclass
+++ b/meta/classes-global/sstate.bbclass
@@ -4,7 +4,7 @@
 # SPDX-License-Identifier: MIT
 #
 
-SSTATE_VERSION = "11"
+SSTATE_VERSION = "12"
 
 SSTATE_ZSTD_CLEVEL ??= "8"
 
diff --git a/meta/conf/abi_version.conf b/meta/conf/abi_version.conf
index b6643ea60b3..13c2c45b42a 100644
--- a/meta/conf/abi_version.conf
+++ b/meta/conf/abi_version.conf
@@ -12,4 +12,4 @@ OELAYOUT_ABI = "15"
 # a reset of the equivalence, for example when reproducibility issues break the
 # existing match data. Distros can also append to this value for the same 
effect.
 #
-HASHEQUIV_HASH_VERSION  = "15"
+HASHEQUIV_HASH_VERSION  = "16"
-- 
2.40.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198196): 
https://lists.openembedded.org/g/openembedded-core/message/198196
Mute This Topic: https://lists.openembedded.org/mt/105498754/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



[OE-core] [PATCH 2/3] buildtools-tarball: Add python3-setuptools

2024-04-13 Thread Richard Purdie
After the dependency on setuptools was dropped from python3-testtools, this
exposed eSDK dependencies in devtool and recipetool on python3-setuptools. Add
this to buildtools to fix build failures after the testtools fixes.

Signed-off-by: Richard Purdie 
---
 meta/recipes-core/meta/buildtools-tarball.bb | 1 +
 1 file changed, 1 insertion(+)

diff --git a/meta/recipes-core/meta/buildtools-tarball.bb 
b/meta/recipes-core/meta/buildtools-tarball.bb
index a5f6bb7aac9..dc075763e6c 100644
--- a/meta/recipes-core/meta/buildtools-tarball.bb
+++ b/meta/recipes-core/meta/buildtools-tarball.bb
@@ -11,6 +11,7 @@ TOOLCHAIN_HOST_TASK ?= "\
 nativesdk-python3-git \
 nativesdk-python3-jinja2 \
 nativesdk-python3-testtools \
+nativesdk-python3-setuptools \
 nativesdk-python3-subunit \
 nativesdk-python3-pyyaml \
 nativesdk-python3-websockets \
-- 
2.40.1


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198195): 
https://lists.openembedded.org/g/openembedded-core/message/198195
Mute This Topic: https://lists.openembedded.org/mt/105498753/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core][PATCH 2/3] kbd: remove non-free Agafari fonts

2024-04-13 Thread Richard Purdie
On Sat, 2024-04-13 at 06:31 +, Peter Marko via
lists.openembedded.org wrote:
> That surprises me but fine.
> I'm sending a v2 moving the file removal to the recipe.
> But you could also hand-craft the patch again locally.

Since time is against me, I did create a hybrid patch:

https://git.yoctoproject.org/poky/commit/?h=master-next=03b9028fe6f76da4b19c62eca102caccaf66c1b4

Let me know if anyone isn't happy with this. I'm happy to take other
patches.

Cheers,

Richard

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198193): 
https://lists.openembedded.org/g/openembedded-core/message/198193
Mute This Topic: https://lists.openembedded.org/mt/105486424/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-



Re: [OE-core][PATCH 2/3] kbd: remove non-free Agafari fonts

2024-04-13 Thread Peter Marko via lists.openembedded.org
That surprises me but fine.
I'm sending a v2 moving the file removal to the recipe.
But you could also hand-craft the patch again locally.

Peter

-Original Message-
From: Khem Raj  
Sent: Saturday, April 13, 2024 2:26
To: Marko, Peter (ADV D EU SK BFS1) 
Cc: openembedded-core@lists.openembedded.org
Subject: Re: [OE-core][PATCH 2/3] kbd: remove non-free Agafari fonts

> On Fri, Apr 12, 2024 at 10:02 AM Peter Marko via lists.openembedded.org 
>  wrote:
> >
> > I know that binary patches are problematic over mailing list.
> > Here the patch as zipped attachment just in case.
> >
>
> This does not help either, This patch is deleting files so why not just do 
> the delete operation in do_compile:prepend
>
> rm -rf ${S}/data/consolefonts/Agafari-1*
>
> until the mentioned patch is part of a future kbd release.
>
> > Peter
> >
> > 
> >

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#198192): 
https://lists.openembedded.org/g/openembedded-core/message/198192
Mute This Topic: https://lists.openembedded.org/mt/105486424/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-