mirror of
https://github.com/jiazhang0/meta-secure-core.git
synced 2026-04-20 18:08:17 +00:00
@@ -1,4 +1,4 @@
|
||||
# Append iversion option for auto types
|
||||
do_install_append() {
|
||||
sed -i 's/\s*auto\s*defaults/&,iversion/' ${D}${sysconfdir}/fstab
|
||||
sed -i 's/\s*auto\s*defaults/&,iversion/' "${D}${sysconfdir}/fstab"
|
||||
}
|
||||
|
||||
@@ -1,5 +1,3 @@
|
||||
PACKAGES =+ "${PN}-switch_root.static"
|
||||
|
||||
CFLAGS_remove += "-pie -fpie"
|
||||
|
||||
do_compile_append_class-target() {
|
||||
@@ -9,8 +7,11 @@ do_compile_append_class-target() {
|
||||
}
|
||||
|
||||
do_install_append_class-target() {
|
||||
install -d ${D}${sbindir}
|
||||
install -m 0700 ${B}/switch_root.static ${D}${sbindir}/switch_root.static
|
||||
install -d "${D}${sbindir}"
|
||||
install -m 0700 "${B}/switch_root.static" \
|
||||
"${D}${sbindir}/switch_root.static"
|
||||
}
|
||||
|
||||
PACKAGES =+ "${PN}-switch_root.static"
|
||||
|
||||
FILES_${PN}-switch_root.static = "${sbindir}/switch_root.static"
|
||||
|
||||
@@ -3,8 +3,6 @@ FILESEXTRAPATHS_prepend := "${THISDIR}/linux-yocto:"
|
||||
IMA_ENABLED = "${@bb.utils.contains('DISTRO_FEATURES', 'ima', '1', '0', d)}"
|
||||
|
||||
DEPENDS += "${@'key-store openssl-native' if d.getVar('IMA_ENABLED', True) == '1' else ''}"
|
||||
# key-store-ima-cert is required in runtime but we hope it is available
|
||||
# in initramfs only. So we don't add it to RDEPENDS_${PN} here.
|
||||
|
||||
SRC_URI += "\
|
||||
${@'file://ima.scc file://ima.cfg file://integrity.scc file://integrity.cfg' \
|
||||
|
||||
@@ -4,24 +4,12 @@ LIC_FILES_CHKSUM = "\
|
||||
file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420 \
|
||||
"
|
||||
|
||||
inherit user-key-store
|
||||
|
||||
S = "${WORKDIR}"
|
||||
|
||||
inherit user-key-store
|
||||
|
||||
ALLOW_EMPTY_${PN} = "1"
|
||||
|
||||
PACKAGES =+ "\
|
||||
${PN}-system-trusted-cert \
|
||||
${PN}-ima-cert \
|
||||
"
|
||||
|
||||
# Note any private key is not available if user key signing model used.
|
||||
PACKAGES_DYNAMIC += "\
|
||||
${PN}-ima-privkey \
|
||||
${PN}-system-trusted-privkey \
|
||||
${PN}-rpm-pubkey \
|
||||
"
|
||||
|
||||
KEY_DIR = "${sysconfdir}/keys"
|
||||
# For RPM verification
|
||||
RPM_KEY_DIR = "${sysconfdir}/pki/rpm-gpg"
|
||||
@@ -118,6 +106,18 @@ pkg_postinst_${PN}-rpm-pubkey() {
|
||||
fi
|
||||
}
|
||||
|
||||
PACKAGES =+ "\
|
||||
${PN}-system-trusted-cert \
|
||||
${PN}-ima-cert \
|
||||
"
|
||||
|
||||
# Note any private key is not available if user key signing model used.
|
||||
PACKAGES_DYNAMIC += "\
|
||||
${PN}-ima-privkey \
|
||||
${PN}-system-trusted-privkey \
|
||||
${PN}-rpm-pubkey \
|
||||
"
|
||||
|
||||
FILES_${PN}-system-trusted-cert = "${SYSTEM_CERT}"
|
||||
CONFFILES_${PN}-system-trusted-cert = "${SYSTEM_CERT}"
|
||||
|
||||
|
||||
Reference in New Issue
Block a user