Openembedded Core Discussions
 help / color / mirror / Atom feed
From: Richard Purdie <richard.purdie@linuxfoundation.org>
To: Joshua Watt <jpewhacker@gmail.com>
Cc: OE-core <openembedded-core@lists.openembedded.org>
Subject: Re: [PATCH 3/3] nativesdk-glibc: Split glibc and libcrypt to use libxcrypt instead
Date: Sat, 07 Apr 2018 15:05:49 +0100	[thread overview]
Message-ID: <1523109949.2942.80.camel@linuxfoundation.org> (raw)
In-Reply-To: <CAJdd5GbOcVGfGa4BSm6N0q2ffO9PzpOZnRx1s4_eQsz+f6yXcA@mail.gmail.com>

On Sat, 2018-04-07 at 13:36 +0000, Joshua Watt wrote:
> Of course, after this I finished, I think up a new idea :)
> 
> Would it be possible to add libxcrypt to the default dependencies
> (along side glibc)? The main advantage I can see is that it would
> maintain the "status quo" of libcrypt being there be default. My main
> observation from when I went though the exercise of getting this to
> build last night is that while we fixed the SDK for core-image-sato,
> others may be including additional recipes in their SDK that depend
> on libcrypt and these can fail in non-obvious ways (for example,
> util-linux would have been very puzzling to track down if I hadn't
> know it was related to the libcrypt changes).
> 
> We would obviously remove it in the next dev cycle and make the
> recipes fix their DEPENDS, like we are already planning to do.
> 
> It might even be possible to switch the target to using libxcrypt
> this way, but I don't think I would recommend it.
> 
> The main disadvantage that I can think of is that the libxcrypt
> recipe will be ugly, since it would have to build
> with INHIBIT_DEFAULT_DEPS=1.
> 
> I'm not sure I sold myself on this idea. I don't think I know enough
> about all the implications and adding additional nativesdk recipes is
> not very common, so maybe a blurb in the release notes is sufficent?
> 
> Anyway, I thought I would put it out there.

Its not a bad idea but the xcrypt dependencies would get ugly as it
would have to depend on glibc without using the default deps as you
say.

I think we're close to making it work with the virtual/crypt, at least
for nativesdk and since this matches what we'll likely ultimately have
to do, I'm tempted to go that route.

Current patchset is missing a musl PROVIDES but that is easily fixed
for the next test.

Cheers,

Richard


  reply	other threads:[~2018-04-07 14:05 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-04-07 10:43 [PATCH 1/3] Revert "python3: fix create_manifest to handle pycache folders" Richard Purdie
2018-04-07 10:43 ` [PATCH 2/3] devtool/oeqa: Ensure added layers set LAYERSERIES_COMPAT Richard Purdie
2018-04-07 10:43 ` [PATCH 3/3] nativesdk-glibc: Split glibc and libcrypt to use libxcrypt instead Richard Purdie
2018-04-07 13:36   ` Joshua Watt
2018-04-07 14:05     ` Richard Purdie [this message]
2018-04-07 11:02 ` ✗ patchtest: failure for "Revert "python3: fix create_ma..." and 2 more Patchwork

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1523109949.2942.80.camel@linuxfoundation.org \
    --to=richard.purdie@linuxfoundation.org \
    --cc=jpewhacker@gmail.com \
    --cc=openembedded-core@lists.openembedded.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox