From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6917993065941565440 X-Received: by 2002:a7b:c08b:: with SMTP id r11mr1602420wmh.11.1611049138592; Tue, 19 Jan 2021 01:38:58 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a1c:385:: with SMTP id 127ls7740477wmd.0.canary-gmail; Tue, 19 Jan 2021 01:38:57 -0800 (PST) X-Google-Smtp-Source: ABdhPJwKCR7AJ7qOe0U2BFV6H61ughmZSbEvAor97BrT7V47xnaiwdqs/f5hde0QqeHo5+McdBwl X-Received: by 2002:a1c:4303:: with SMTP id q3mr3209105wma.3.1611049137795; Tue, 19 Jan 2021 01:38:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611049137; cv=none; d=google.com; s=arc-20160816; b=rkmdmcCodPE1UQL/vWGDAzHXrJZKrMDoGvkPhPvUqxNfpW6jhTRFsaCpY9rp0cI82I ZIhUqvhZoylSPKuV1RKHZwigWbrAoG/AyzlOW/OjJN1jorNgQxzqaJZrq5Gmz+3SvrF8 OHzSIUP+zsoKNaCnYhnYRd3sSIWui3y418uWatP22dKQR2wkBrGwhdi8+sQ0HovYWjCE CrbQ02S7GcHRcEJy7tLPZffkFvisM0/elnZ3TzGUxGPvW8WekIIwI51KCxkHzkfRhz9B 66aHAVLNlXyTW6ZqDcCejOHdcEr581sQ8JmUud352jSO9+Vaach2F6WisCTY+ICki2Oo 1UZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date; bh=nNkD+HfyNtU1eCD8TazIgJpAT/Dokvc7Q2YvavPcvqI=; b=dxLhcZehSZJeIJHTYR1g/XjuNGImXh4C/zSM5fgP9vFTV+FlaWOo1G5ENqsTE0wYEw VOKVs8FORlIA3NXFU7fI9fHDr7paiCB63Z0iQu8BYpG5aD0vDaF8bd5y6BtFKKGOmUra mxi8M0mdxa3Mq6vCAHptdKzQVvjCdgg6ngToqOwlMB2xkCJ2MYlB1iBPDq+Qt6/kSdqi TykIkphIe24Gtoln2Ik2RgUvqCE9/3M8N/8ZAoiKI/ZKkeyrbZ2kvsfp9WZ1Za2kf5mW VRuXTC6fuPkVR28BUyBDSY7F33UMT3DraBK3306oNA8z2LfvihS7U3LI+AjxnRJBfVmm CKPQ== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 194.138.37.40 as permitted sender) smtp.mailfrom=henning.schild@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from gecko.sbs.de (gecko.sbs.de. [194.138.37.40]) by gmr-mx.google.com with ESMTPS id e16si1221729wrn.1.2021.01.19.01.38.57 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 19 Jan 2021 01:38:57 -0800 (PST) Received-SPF: pass (google.com: domain of henning.schild@siemens.com designates 194.138.37.40 as permitted sender) client-ip=194.138.37.40; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 194.138.37.40 as permitted sender) smtp.mailfrom=henning.schild@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by gecko.sbs.de (8.15.2/8.15.2) with ESMTPS id 10J9cvq5005844 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 19 Jan 2021 10:38:57 +0100 Received: from md1za8fc.ad001.siemens.net ([139.22.120.228]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 10J9cvBR030658; Tue, 19 Jan 2021 10:38:57 +0100 Date: Tue, 19 Jan 2021 10:38:54 +0100 From: Henning Schild To: "[ext] Silvano Cirujano Cuesta" Cc: isar-users@googlegroups.com Subject: Re: image-postproc-extension.bbclass modifying /etc/os-release Message-ID: <20210119103854.3ca02fc5@md1za8fc.ad001.siemens.net> In-Reply-To: <67e1fac9-5af5-29aa-de57-9a0de0cdd165@siemens.com> References: <67e1fac9-5af5-29aa-de57-9a0de0cdd165@siemens.com> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-TUID: AabNeWM9PFRx Am Fri, 15 Jan 2021 15:26:14 +0100 schrieb "[ext] Silvano Cirujano Cuesta" : > Hi, >=20 > I've noticed that '/etc/os-release' is being changed on the image in > meta/classes/image-postproc-extension.bbclass [1].=C2=A0 What BTW ends up > changing '/usr/lib/os-release', since it's only a symlink. But both > '/etc/os-release' and '/usr/lib/os-release' are owned by > 'base-files'... >=20 > An upgrade of 'base-files' would be replacing (silently, since is not > marked as a configuration file) '/usr/lib/os-release' with the > version of the upstream 'base-files' package and possibly breaking > any tools in the system relying on certain values in that file. We found that we can not even place a file in /etc/ it will always be replaced with that symlink, no config file protection on this one. While we could talk with upstream about that violation, we would also need a way of dealing with it, because it is unlikely to change in stable distros.=20 > Is there a reason that I'm missing for doing so instead of the > Debian-way (file diversion with dpkg-divert)? Or any hack that I've > overseen that avoids the mentioned breakage? So i propose a hack as follows: - write a script that can create /etc/os-release from a given default and a second file /etc/os-release-isar - if variable in both, prefer isar - if variable only in isar, append - if variable only in original, use - put that script into a package we install in every isar image - place a dpkg or apt hook into that package - test -f /etc/os-release-isar && test -h /etc/os-release - create/change /etc/os-release-isar in image postproc and run hook=20 Henning > Hasta la vista, >=20 > =C2=A0 Silvano >=20 > [1] > https://github.com/ilbers/isar/blob/a0d6de4ac7dfb926b38cfcd44f2bc8852f2e4= 3e3/meta/classes/image-postproc-extension.bbclass#L20 >=20