From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 7304933055699877888 X-Received: by 2002:a05:6512:4014:b0:50a:6fbb:6eb3 with SMTP id br20-20020a056512401400b0050a6fbb6eb3mr2609311lfb.11.1700833936004; Fri, 24 Nov 2023 05:52:16 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a05:6512:3b22:b0:50a:a6be:1dc0 with SMTP id f34-20020a0565123b2200b0050aa6be1dc0ls759553lfv.1.-pod-prod-09-eu; Fri, 24 Nov 2023 05:52:13 -0800 (PST) X-Google-Smtp-Source: AGHT+IEPDK11JsVxCh1qqSCfIVWoeQZZWjOL3TVk5iJaqIvUu39ZDGYI0OlX1stkYg44vENLgggZ X-Received: by 2002:a05:6512:2ed:b0:507:9640:f256 with SMTP id m13-20020a05651202ed00b005079640f256mr1803542lfq.36.1700833933513; Fri, 24 Nov 2023 05:52:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700833933; cv=none; d=google.com; s=arc-20160816; b=d9RpflF9TVnh95Z+2CLJPo0D5LJdoi3yfS/fimboQ7+ivqZejvnUH2TagR52hjqrSX /lbjCZVPqBxZGiiDthoA+M5uE5Ni8Ya4cmOqQRqE2s5vnBo4QqYNxYDBIXo3eGyljCr4 4SfduI7DDM0zqvvCscrkdldQ+yS8HSxJqeHD1DRPGZVOTlB9Svn6T7Cc0my/dA8453B3 nK2PycnoiekPaTOJNCiE9kPY5upkZaPpkjcUsqDHI4Z6I142LiHVxNoiCm97kEG5n/om /7jmRY+nob1G3dxqfyyUvkhi6+xV3sp45+oSiNkm3gL9uhvbGhhn0pwagHQETopBGYRx qRxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:user-agent:content-transfer-encoding:references :in-reply-to:date:to:from:subject:message-id; bh=0XjONG8YxVJEF9VWUrh5Esa0cMLNoEiTimgI0NX8Crk=; fh=ez+yYIN2+t1/A1KtVD1essDQ6+anTTnZTbSXjuK9WaU=; b=LBak20hRpDRCVCZrSeU+puIkxXEW12cu9UnRqIlpQob+wQKD4ydKrVbYbX5X3zy+MR uV2BrpyynNVGRSSn1V0mMPH58yeeS0ZaqCpq/Q3Cn7IsTmkCTc86BYcXHqdmxrempfiw IJ1pnZgIB+IxN4YUpxdCqmYtSrpPJZGUx9NXTlcfd8U9GCER80hOQrXEyxwITt/DT8g4 R15UItryfMKE6eg7oak6//R/x8VBU/OMGMZW1m4U28M8AMeRqS31sPtKF0Uqj2tyUpX6 iOM9QrXP+O3QCYLPslrfXFLzfOH2i10HO1kKOtj8O8yNXLSFNjrnEIOz0XMzL7UCuC92 wy5Q== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of ubely@ilbers.de designates 85.214.156.166 as permitted sender) smtp.mailfrom=ubely@ilbers.de Return-Path: Received: from shymkent.ilbers.de (shymkent.ilbers.de. [85.214.156.166]) by gmr-mx.google.com with ESMTPS id j9-20020a056512398900b0050aa70e9365si166916lfu.8.2023.11.24.05.52.13 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Fri, 24 Nov 2023 05:52:13 -0800 (PST) Received-SPF: pass (google.com: domain of ubely@ilbers.de designates 85.214.156.166 as permitted sender) client-ip=85.214.156.166; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of ubely@ilbers.de designates 85.214.156.166 as permitted sender) smtp.mailfrom=ubely@ilbers.de Received: from [127.0.0.1] (host-80-81-17-52.static.customer.m-online.net [80.81.17.52]) (authenticated bits=0) by shymkent.ilbers.de (8.15.2/8.15.2/Debian-8+deb9u1) with ESMTPSA id 3AODqAsO000647 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 24 Nov 2023 14:52:12 +0100 Message-ID: Subject: Re: [PATCH 1/1] bitbake: backport fetch2/aws: forward env-vars used in gitlab-ci K8s From: Uladzimir Bely To: Felix Moessbauer , isar-users@googlegroups.com Date: Fri, 24 Nov 2023 16:52:35 +0300 In-Reply-To: <20231124075037.655070-1-felix.moessbauer@siemens.com> References: <20231124075037.655070-1-felix.moessbauer@siemens.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.50.1 (by Flathub.org) MIME-Version: 1.0 X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED autolearn=unavailable autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on shymkent.ilbers.de X-TUID: A4eW46kzCrLF On Fri, 2023-11-24 at 15:50 +0800, 'Felix Moessbauer' via isar-users wrote: > The patch "fetch2/aws: forward env-vars used in gitlab-ci K8s" was > accepted upstream as c534526e. We need to backport it here to have > it already until the next bitbake LTS version is released: >=20 > This patch adds the following variables to the allow-list, which are > used in the "IAM roles for AWS when using the GitLab chart": >=20 > - AWS_ROLE_ARN > - AWS_WEB_IDENTITY_TOKEN_FILE >=20 > These variables are set in the CI job environment and are needed to > access the sstate cache artifacts in a connected S3 bucket. >=20 > Signed-off-by: Felix Moessbauer > --- > =C2=A0bitbake/lib/bb/fetch2/__init__.py | 2 ++ > =C2=A01 file changed, 2 insertions(+) >=20 > diff --git a/bitbake/lib/bb/fetch2/__init__.py > b/bitbake/lib/bb/fetch2/__init__.py > index a3140626..008adab9 100644 > --- a/bitbake/lib/bb/fetch2/__init__.py > +++ b/bitbake/lib/bb/fetch2/__init__.py > @@ -850,6 +850,8 @@ FETCH_EXPORT_VARS =3D ['HOME', 'PATH', > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 'AWS_PROFILE', > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 'AWS_ACCESS_KEY_ID', > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 'AWS_SECRET_ACCESS_K= EY', > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 'AWS_ROLE_ARN', > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 'AWS_WEB_IDENTITY_TOKEN_FI= LE', > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 'AWS_DEFAULT_REGION'= ] > =C2=A0 > =C2=A0def get_fetcher_environment(d): > --=20 > 2.39.2 >=20 It looks like a fork of bitbake-2.0.12 we currently use in Isar that we usually tend to avoid. But, probably not at this time...