From 72903f7534cccad35886f2cad8aac98a59392ec7 Mon Sep 17 00:00:00 2001 From: Christopher Larson Date: Tue, 1 Sep 2015 15:23:04 -0700 Subject: image.bbclass: add rootfs_check_host_user_contaminated This function is intended to be used in ROOTFS_POSTPROCESS_COMMAND, and checks for any paths outside of /home which are owned by the user running bitbake. Signed-off-by: Christopher Larson Signed-off-by: Richard Purdie --- meta/classes/image.bbclass | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/meta/classes/image.bbclass b/meta/classes/image.bbclass index 4e66535407..fc7d64d7e5 100644 --- a/meta/classes/image.bbclass +++ b/meta/classes/image.bbclass @@ -460,6 +460,20 @@ rootfs_trim_schemas () { done } +rootfs_check_host_user_contaminated () { + contaminated="${WORKDIR}/host-user-contaminated.txt" + HOST_USER_UID="$(PSEUDO_UNLOAD=1 id -u)" + HOST_USER_GID="$(PSEUDO_UNLOAD=1 id -g)" + + find "${IMAGE_ROOTFS}" -wholename "${IMAGE_ROOTFS}/home" -prune \ + -user "$HOST_USER_UID" -o -group "$HOST_USER_GID" >"$contaminated" + + if [ -s "$contaminated" ]; then + echo "WARNING: Paths in the rootfs are owned by the same user or group as the user running bitbake. See the logfile for the specific paths." + cat "$contaminated" | sed "s,^, ," + fi +} + # Make any absolute links in a sysroot relative rootfs_sysroot_relativelinks () { sysroot-relativelinks.py ${SDK_OUTPUT}/${SDKTARGETSYSROOT} -- cgit 1.2.3-korg