From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.stusta.mhn.de (mail.stusta.mhn.de [141.84.69.5]) by mail.openembedded.org (Postfix) with ESMTP id 85D7860BAF for ; Sun, 8 Mar 2020 12:22:25 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) by mail.stusta.mhn.de (Postfix) with ESMTPSA id 48b0q35Dh1z1v; Sun, 8 Mar 2020 13:22:22 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=stusta.de; s=default; t=1583670144; bh=8tjnWd+5haUzpdRXvMGDB5n4Sk/0Dh7jdkf1l+gSeP8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=IEidb7v/j92Gv6EUaitrkF3xgVpy4YQV61+EBX8M/q/sx8ipsTw03u0DAoDM+PPL1 cho9HInwd1Kp2VB28LBsUj4JPw5Py377/wcCe1BFMZaltkMUV/cPXkPhscp4iAt5P8 OgktiwBlWHSr+zJE/YaGxjI5en2qHyrKQoPOIr63exKSgBm/eYLE4TtHZR+twQkR5f COMStrbouSGYvXI5tJTeZy1zpA4pvkQhQHLCN+aProbva6KTE8AgkYvkcLNfXjbP3B Lo9k9gER3Hh7K8jAjnPcgs1bwsY2H3vcECclwTCeY+7Sy5we+W9Y3kQsgL6DFNFeKD iMJZSUjO5dsU5roBdUL+P6N49XFJ5GT4eeBgMk/oylUgxsGocbUTp0GARopAbn6Clo CxdLn3vfL4LxwSuBns70p8Z5ncSsMV8axgVuNTLeU7a+LyPI4SqKI2BYsJ3ZDaoyks LzmeUtN8VuYc0wtFQJIe2JDNA2A93mSJdQN8wO/mWyqtH2bJAGKUP4YdyNdkKgIvLr tDvH16ff3RD0Wfl/9wx7e0CYv3p2CdxJka97RDxu5OGZudohcPY4QuWpWP/maKnT0G KTtX68CGQTybn0S6F7/K5KFXs3t0lS9c8SBZoTjE2rKPG4MtWVQqfvGSwm2WiNVNo9 qekYWl6Poy+I6zNqRfv4vI0Y= Date: Sun, 8 Mar 2020 14:22:20 +0200 From: Adrian Bunk To: chee.yang.lee@intel.com Message-ID: <20200308122220.GA29115@localhost> References: <1583461646-73057-1-git-send-email-chee.yang.lee@intel.com> MIME-Version: 1.0 In-Reply-To: <1583461646-73057-1-git-send-email-chee.yang.lee@intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) Cc: openembedded-core@lists.openembedded.org Subject: Re: [PATCH] cve-check: show whitelisted status X-BeenThere: openembedded-core@lists.openembedded.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Patches and discussions about the oe-core layer List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 08 Mar 2020 12:22:26 -0000 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline On Fri, Mar 06, 2020 at 10:27:26AM +0800, chee.yang.lee@intel.com wrote: > From: Chee Yang Lee > > change whitelisted CVE status from "Patched" to "Whitelisted". >... Thanks a lot for working on this. >... > index 7412436..7f98da6 100644 > --- a/meta/classes/cve-check.bbclass > +++ b/meta/classes/cve-check.bbclass > @@ -56,10 +56,10 @@ python do_cve_check () { > patched_cves = get_patches_cves(d) > except FileNotFoundError: > bb.fatal("Failure in searching patches") > - patched, unpatched = check_cves(d, patched_cves) > + whitelisted, patched, unpatched = check_cves(d, patched_cves) >... Unfortunately this doesn't work: $ . oe-init-build-env $ echo 'INHERIT += "cve-check"' >> conf/local.conf $ bitbake core-image-minimal ... ERROR: glibc-locale-2.31-r0 do_cve_check: Error executing a python function in exec_python_func() autogenerated: The stack trace of python calls that resulted in this exception/failure was: File: 'exec_python_func() autogenerated', lineno: 2, function: 0001: *** 0002:do_cve_check(d) 0003: File: '/tmp/poky/meta/classes/cve-check.bbclass', lineno: 59, function: do_cve_check 0055: try: 0056: patched_cves = get_patches_cves(d) 0057: except FileNotFoundError: 0058: bb.fatal("Failure in searching patches") *** 0059: whitelisted, patched, unpatched = check_cves(d, patched_cves) 0060: if patched or unpatched: 0061: cve_data = get_cve_info(d, patched + unpatched) 0062: cve_write_data(d, patched, unpatched, whitelisted, cve_data) 0063: else: Exception: ValueError: not enough values to unpack (expected 3, got 2) ERROR: Logfile of failure stored in: /tmp/poky/build/tmp/work/core2-64-poky-linux/glibc-locale/2.31-r0/temp/log.do_cve_check.3713 ERROR: Task (/tmp/poky/meta/recipes-core/glibc/glibc-locale_2.31.bb:do_cve_check) failed with exit code '1' cu Adrian