From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from david.siemens.de (david.siemens.de [192.35.17.14]) by mail.openembedded.org (Postfix) with ESMTP id AA7B06FFD8 for ; Mon, 5 Jun 2017 07:36:07 +0000 (UTC) Received: from mail1.siemens.de (mail1.siemens.de [139.23.33.14]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id v557LOVL017574 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Mon, 5 Jun 2017 09:21:24 +0200 Received: from dev.sbt.siemens.com ([163.242.44.98]) by mail1.siemens.de (8.15.2/8.15.2) with ESMTP id v557LO17007906; Mon, 5 Jun 2017 09:21:24 +0200 Received: from dev.sbt.siemens.com (localhost [127.0.0.1]) by dev.sbt.siemens.com (Postfix) with ESMTP id 795881AC428; Mon, 5 Jun 2017 09:21:24 +0200 (CEST) From: Peter Marko To: openembedded-core@lists.openembedded.org Date: Mon, 5 Jun 2017 09:21:09 +0200 Message-Id: <1496647273-9693-2-git-send-email-peter.marko@siemens.com> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1496647273-9693-1-git-send-email-peter.marko@siemens.com> References: <1496647273-9693-1-git-send-email-peter.marko@siemens.com> Subject: [PATCH 1/5] cve-check: honor RM_OLD_IMAGE flag X-BeenThere: openembedded-core@lists.openembedded.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Patches and discussions about the oe-core layer List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Jun 2017 07:36:08 -0000 Signed-off-by: Peter Marko --- meta/classes/cve-check.bbclass | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 3a9e227..d8ac412 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass @@ -96,6 +96,8 @@ python cve_check_write_rootfs_manifest () { manifest_link = os.path.join(deploy_dir, "%s.cve" % link_name) # If we already have another manifest, update symlinks if os.path.exists(os.path.realpath(manifest_link)): + if d.getVar('RM_OLD_IMAGE') == "1": + os.remove(os.path.realpath(manifest_link)) os.remove(manifest_link) os.symlink(os.path.basename(manifest_name), manifest_link) bb.plain("Image CVE report stored in: %s" % manifest_name) -- 2.1.4