Hello Armin,

Many thanks for your review.

On Sun, 26 Sept 2021 at 03:01, akuster808 <akuster...@gmail.com> wrote:
>
>
>
> On 9/19/21 12:19 PM, Bhupesh Sharma wrote:
> > fscrypt is a high-level tool for the management of Linux
> > filesystem encryption. fscrypt manages metadata, key generation,
> > key wrapping, PAM integration, and provides a uniform interface
> > for creating and modifying encrypted directories.
> >
> > Add recipe for the same in 'recipes-security'.
>
> Was this a double post? or a V2?

Sorry for the double post, but since I had some issues subscribing to
the OE-list, my first attempt to post was not accepted by the mailing
list server.

> I follow the OE/YP Stable process and this appears to be adding a new
> package to a stable release which is not allowed..  I have no issue
> taking it for Master.

Sure. I realized my mistake later-on. I should have sent it for the
'master' branch and not stable / dunfell. Can you please consider
taking this into the 'master' branch, or should I send the patch
separately.

Thanks and sorry for the late reply,
Bhupesh

> -armin
> >
> > Signed-off-by: Bhupesh Sharma <bhupesh.sha...@linaro.org>
> > ---
> >  recipes-security/fscrypt/fscrypt_1.0.0.bb | 49 +++++++++++++++++++++++
> >  1 file changed, 49 insertions(+)
> >  create mode 100644 recipes-security/fscrypt/fscrypt_1.0.0.bb
> >
> > diff --git a/recipes-security/fscrypt/fscrypt_1.0.0.bb 
> > b/recipes-security/fscrypt/fscrypt_1.0.0.bb
> > new file mode 100644
> > index 0000000..a70d310
> > --- /dev/null
> > +++ b/recipes-security/fscrypt/fscrypt_1.0.0.bb
> > @@ -0,0 +1,49 @@
> > +SUMMARY = "fscrypt is a high-level tool for the management of Linux 
> > filesystem encryption"
> > +DESCIPTION = "fscrypt manages metadata, key generation, key wrapping, PAM 
> > integration, \
> > +and provides a uniform interface for creating and modifying encrypted 
> > directories. For \
> > +a small, low-level tool that directly sets policies, see fscryptctl \
> > +(https://github.com/google/fscryptcl)."
> > +HOMEPAGE = "https://github.com/google/fscrypt";
> > +SECTION = "base"
> > +LICENSE = "Apache-2.0"
> > +LIC_FILES_CHKSUM = 
> > "file://src/${GO_IMPORT}/LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57"
> > +
> > +BBCLASSEXTEND = "native nativesdk"
> > +
> > +# fscrypt depends on go and libpam
> > +DEPENDS += "go-dep-native libpam"
> > +
> > +SRCREV = "92b1e9a8670ccd3916a7d24a06cab1e4c9815bc4"
> > +SRC_URI = "git://github.com/google/fscrypt.git"
> > +GO_IMPORT = "import"
> > +
> > +S = "${WORKDIR}/git"
> > +
> > +inherit go
> > +inherit goarch
> > +
> > +do_compile() {
> > +     export GOARCH=${TARGET_GOARCH}
> > +     export GOROOT="${STAGING_LIBDIR_NATIVE}/${TARGET_SYS}/go"
> > +     export GOPATH="${WORKDIR}/git"
> > +
> > +     # Pass the needed cflags/ldflags so that cgo
> > +     # can find the needed headers files and libraries
> > +     export CGO_ENABLED="1"
> > +     export CGO_CFLAGS="${CFLAGS} --sysroot=${STAGING_DIR_TARGET}"
> > +     export CGO_LDFLAGS="${LDFLAGS} --sysroot=${STAGING_DIR_TARGET}"
> > +
> > +     cd ${S}/src/${GO_IMPORT}
> > +     oe_runmake
> > +
> > +     # Golang forces permissions to 0500 on directories and 0400 on files 
> > in
> > +     # the module cache which prevents us from easily cleaning up the build
> > +     # directory. Let's just fix the permissions here so we don't have to
> > +     # hack the clean tasks.
> > +     chmod -R u+w ${S}/pkg/mod
> > +}
> > +
> > +do_install() {
> > +     install -d ${D}/${bindir}
> > +     install ${S}/src/${GO_IMPORT}/bin/fscrypt ${D}/${bindir}/fscrypt
> > +}
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#54953): https://lists.yoctoproject.org/g/yocto/message/54953
Mute This Topic: https://lists.yoctoproject.org/mt/85725373/21656
Group Owner: yocto+ow...@lists.yoctoproject.org
Unsubscribe: https://lists.yoctoproject.org/g/yocto/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to