From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6641861376070385664 X-Received: by 2002:a50:aeaf:: with SMTP id e44mr705787edd.4.1547083198053; Wed, 09 Jan 2019 17:19:58 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a17:906:85d4:: with SMTP id i20-v6ls2317489ejy.2.gmail; Wed, 09 Jan 2019 17:19:57 -0800 (PST) X-Google-Smtp-Source: ALg8bN48gLoZX0JSedEO9lZvOHGe5DUnj/9neCF8XRqVB3IrZrZqBVtiA8Qgf7z8FvOIigKDo3jH X-Received: by 2002:a17:906:6006:: with SMTP id o6-v6mr634310ejj.4.1547083197533; Wed, 09 Jan 2019 17:19:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547083197; cv=none; d=google.com; s=arc-20160816; b=A9r61focYuYYMmIl4yLLdFB0wzgI7hpUpKAYxE0fbDJQh5/8YAsEcc5JPtfaZuswrb xkBtZlfcxh3LMU65g0aW+dM7Z/f4K1jCEu5bd+bmeyYmhHUOv2cMYDKtaBpgH6ZIeXyn vDoOhPxBdX+B2LM65xw6mByv7IvniGw6/ATSluT9L/JTVF85PbckTQvvO1IIXwMlCNyB tnC7Y/lTg21WamB34S+/g0UkVOi1iUva2ylZ6GC9Wg/rYMVrmWo8bxcoXVzIqqAk6j7O yVLmrf6Ct+SO16xQ7jxVkcSRoCbhAeYjrrhkDw3crydg/8aHGG2Yhyyu0IFWNBWmxucP mylA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:to:subject; bh=+A66+BKULdbzp6MeUn59XRdLeuKs4N1HC/1YW9DV8Ys=; b=lXZWm+np8QSW3Ak5fvTyqIehhX3i0i8zs1Jhv4ievYAH/dAn8dCLSCq01Qoaf+musp 4vo+/dZJhlzeM37FpD8yo7vZFdfZ1iVb3DMXu3oroXaAY0trFw+2mGiJG2r9Eoq+eHtx qxTtijgPSNIhmd5LYWeM6P6X9/EDVP30LaFAnkKPDacAiOBHDbqGGqOtr3yPS5hf+pVZ oG+bXx+oL9+AW3T99C1Km2EAWdM28QsoiM6+h84TeoC8PLeHMTtcXmQTqFz4yY+1blsX K0y9EJQrrPBvlaX/q0LgeIFShHOg5n/ieL9sV/xEPVkarh3Njq2PaA/0g9fnZDzNaIM+ RdTw== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com Return-Path: Received: from david.siemens.de (david.siemens.de. [192.35.17.14]) by gmr-mx.google.com with ESMTPS id h28si136849edh.4.2019.01.09.17.19.57 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 09 Jan 2019 17:19:57 -0800 (PST) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) client-ip=192.35.17.14; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id x0A1JuXf024682 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Thu, 10 Jan 2019 02:19:57 +0100 Received: from [139.24.142.110] ([139.24.142.110]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id x0A1JtBO030572 for ; Thu, 10 Jan 2019 02:19:56 +0100 Subject: Re: [PATCH 1/7] dpkg-raw: Respect file permissions defined by recipe To: isar-users References: <20190107142049.0c5426a3@md1za8fc.ad001.siemens.net> <20190109153706.GB12226@yssyq.m.ilbers.de> From: Jan Kiszka Message-ID: <6c2a13e5-513f-243f-3d82-317a8a9df228@siemens.com> Date: Thu, 10 Jan 2019 09:19:50 +0800 User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); de; rv:1.8.1.12) Gecko/20080226 SUSE/2.0.0.12-1.1 Thunderbird/2.0.0.12 Mnenhy/0.7.5.666 MIME-Version: 1.0 In-Reply-To: <20190109153706.GB12226@yssyq.m.ilbers.de> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: JJBYj9mhALuT On 09.01.19 23:37, Baurzhan Ismagulov wrote: > On Mon, Jan 07, 2019 at 02:28:47PM +0100, Jan Kiszka wrote: >>>> dh_fixperms overwrites the permissions do_install defined carefully. >>>> Skip this step to avoid that. > ... >>>> --- a/meta/classes/dpkg-raw.bbclass >>>> +++ b/meta/classes/dpkg-raw.bbclass >>>> @@ -56,9 +56,11 @@ EOF >>>> deb_create_rules() { >>>> cat << EOF > ${S}/debian/rules >>>> #!/usr/bin/make -f >>>> + >>>> +override_dh_fixperms: >>>> + >>>> %: >>>> dh \$@ >>>> - >>> >>> I think it is not a good idea to do that in general. While you might >>> have found an example where dh_fixperms caused problems, there are >>> probably many where it helps. Say people use "cp" to fill ${D} or >>> "echo" to fill ${D}/bin/ >> >> I'm open for better suggestions. > > dh_fixperms -X from a variable / file? > > override_dh_fixperms in a conditional makefile include, if exists? Something like this? diff --git a/meta/classes/dpkg-raw.bbclass b/meta/classes/dpkg-raw.bbclass index 10fb1b9..fa584ee 100644 --- a/meta/classes/dpkg-raw.bbclass +++ b/meta/classes/dpkg-raw.bbclass @@ -53,11 +53,14 @@ Description: ${DESCRIPTION} EOF } +FIXPERM_EXCLUSIONS = "${@' '.join(['-X ' + x for x in d.getVar('PRESERVE_PERMS', False).split()])}" + deb_create_rules() { cat << EOF > ${S}/debian/rules #!/usr/bin/make -f override_dh_fixperms: + dh_fixperms ${EXCLUSIONS} %: dh \$@ Then the user would have to specify the files to be excluded with full paths: PRESERVE_PERMS = "/root/.ssh" PRESERVE_PERMS += "/etc/network/interfaces.d/wifi" > > That said, I think the right way would be to create proper source packages > downstream. Cannot follow that idea yet: What would be the interface? > > FWIW, meta-eid has a PoC for dh_making a package from bitbake, but one could > start with manually debianized packages first. > > With kind regards, > Baurzhan. > Jan -- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux