From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6646963335912751104 X-Received: by 2002:ac2:50d1:: with SMTP id h17mr473306lfm.15.1547616751550; Tue, 15 Jan 2019 21:32:31 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a2e:12d7:: with SMTP id 84-v6ls608060ljs.1.gmail; Tue, 15 Jan 2019 21:32:30 -0800 (PST) X-Google-Smtp-Source: ALg8bN5Abz9tszNIstdcSSe9KSgektgEuFEiYWIMHNhN0vMxKt8S+DayJNtk/RRZW9BZaUmm2ipk X-Received: by 2002:a2e:42ce:: with SMTP id h75-v6mr475756ljf.27.1547616750871; Tue, 15 Jan 2019 21:32:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547616750; cv=none; d=google.com; s=arc-20160816; b=Gbg8zVmP1/h3HGNAt3zig6IYTuNlIPP1P5SEIVYTsUEnt70uuVPGkfTxgkhH4EbGBt NYS938R7knsgo8anelsAaTk9xD/1jICShBt6KrS+wegwLUV0WfAZQ/TWGKMqW+HSRr6o HqFiIhJSw2vrpb6enr42YGgsBywyEEquiPWWJ1gdewkkrkYH4QEuoGD54vL+yooU0dji TJ0TsiAOA6B4O1G3OhR2onAmubkC/j3L/JtgWheU61Bbo5M9pNFguw4BPt7spfdbwU12 cVdWptmARSQKKTfAa3jzH1uJm4ml2opBBPO1swSwFyQ/gnOw6FRNt2VGFgz+2nSKL3Qc 9ctA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=references:in-reply-to:references:in-reply-to:message-id:date :subject:cc:to:from; bh=Fu40fmYJBL7dnJ/EUj4q93cPQ22vYmSO44F7US2shQA=; b=iLT3L3dJsPx5c8jj37D4/Uovkn2Xb7eqZiTzLWVu7FudANYWu4vbboXwzdHR6tzvnn gG0OJUEBWJ4p480nhDMK8zAM0pp+75TMUI5r/1Zemnwph1mfsPAivGjK5NWEoXrovuJ7 19mytkKudKS7G22W2HqSvfOMMOg0UKQqYocdXlUY2qXrr6pDWH4W09cgPBvAPPAN6W5u qHDLup5oAjfCtiMZTb3N5SCG+2pRSnupMlWYnC0taelDPlya7GcxKFnrd5iX+qVyPtHq WH9HbaBySWl8fQAR2Dbfk/L4eu0vUPE10qN54+uO6qrxDYnmTQ1ECRw0+7r02PXIjOjT hwFg== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com Return-Path: Received: from david.siemens.de (david.siemens.de. [192.35.17.14]) by gmr-mx.google.com with ESMTPS id t5-v6si227780lje.3.2019.01.15.21.32.30 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 15 Jan 2019 21:32:30 -0800 (PST) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) client-ip=192.35.17.14; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id x0G5WTl9001989 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Wed, 16 Jan 2019 06:32:30 +0100 Received: from md1f2u6c.ad001.siemens.net ([167.87.33.125]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id x0G5WRoJ011496; Wed, 16 Jan 2019 06:32:29 +0100 From: Jan Kiszka To: isar-users Cc: Henning Schild Subject: [PATCH v3 01/14] dpkg-raw: Respect file permissions defined by recipe if requested Date: Wed, 16 Jan 2019 06:32:14 +0100 Message-Id: <97edc3d29b4aaa19dbbb067e13335beda3f74447.1547616747.git.jan.kiszka@siemens.com> X-Mailer: git-send-email 2.16.4 In-Reply-To: References: In-Reply-To: References: X-TUID: kQsOfB+T+/Sp From: Jan Kiszka dh_fixperms overwrites the permissions do_install may have defined. To avoid that, allow the recipe write to define an exception list via the PRESERVE_PERMS variable. Fixes: f301ccb2b5b1 ("meta/dpkg-raw: build raw packages like all others") CC: Henning Schild Signed-off-by: Jan Kiszka --- RECIPE-API-CHANGELOG.md | 7 +++++++ meta/classes/dpkg-raw.bbclass | 9 ++++++++- 2 files changed, 15 insertions(+), 1 deletion(-) diff --git a/RECIPE-API-CHANGELOG.md b/RECIPE-API-CHANGELOG.md index 06a01e3..2bc1585 100644 --- a/RECIPE-API-CHANGELOG.md +++ b/RECIPE-API-CHANGELOG.md @@ -124,3 +124,10 @@ updated hence recipes using them shouldn't be impacted per se. These packages depend on a specific kernel. Its identification is now appended to the binary package names in the form "-${KERNEL_NAME}". + +### PRESERVE_PERMS needed with dpkg-raw for implicit file permission setting + +In order to use the same file permissions for an input file to a dpkg-raw +package on the build machine as well as on the target, its absolute target path +needs to be listed in the PRESERVE_PERMS variable (space-separated list of +files). Otherwise, default permissions are used. diff --git a/meta/classes/dpkg-raw.bbclass b/meta/classes/dpkg-raw.bbclass index 8d11433..42276e5 100644 --- a/meta/classes/dpkg-raw.bbclass +++ b/meta/classes/dpkg-raw.bbclass @@ -53,12 +53,19 @@ Description: ${DESCRIPTION} EOF } +FIXPERM_EXCLUSIONS = \ + "${@' '.join(['-X ' + x for x in \ + (d.getVar('PRESERVE_PERMS', False) or '').split()])}" + deb_create_rules() { cat << EOF > ${S}/debian/rules #!/usr/bin/make -f + +override_dh_fixperms: + dh_fixperms ${FIXPERM_EXCLUSIONS} + %: dh \$@ - EOF chmod +x ${S}/debian/rules } -- 2.16.4