diff options
author | Enrico Jorns <ejo@pengutronix.de> | 2017-11-17 14:17:50 +0100 |
---|---|---|
committer | Enrico Jorns <e.joerns@tu-bs.de> | 2017-11-22 09:46:45 +0100 |
commit | b1e1f88df8efe62558ac3bab007268e38d911767 (patch) | |
tree | c848fcec1472edf20bc80eb05495d1d697c5a108 | |
parent | b4c5f9fd82ff18b8cf7d63a614bce2928e2eb9bd (diff) | |
download | meta-ptx-b1e1f88df8efe62558ac3bab007268e38d911767.tar.gz meta-ptx-b1e1f88df8efe62558ac3bab007268e38d911767.tar.xz |
remove RAUC from meta-ptx
Support for RAUC officially went to meta-rauc
(https://github.com/rauc/meta-rauc) a while ago and was kept in meta-ptx
only for a migration phase and will now be removed finally.
Signed-off-by: Enrico Jorns <ejo@pengutronix.de>
-rw-r--r-- | README | 4 | ||||
-rw-r--r-- | classes/bundle.bbclass | 196 | ||||
-rw-r--r-- | recipes-core/rauc/files/openssl-ca/dev-ca.pem | 184 | ||||
-rw-r--r-- | recipes-core/rauc/files/rauc-mark-good.service | 12 | ||||
-rw-r--r-- | recipes-core/rauc/rauc-native_git.bb | 13 | ||||
-rw-r--r-- | recipes-core/rauc/rauc.inc | 76 | ||||
-rw-r--r-- | recipes-core/rauc/rauc_git.bb | 11 |
7 files changed, 2 insertions, 494 deletions
@@ -1,6 +1,6 @@ The meta-ptx layer provides support for the `barebox` bootloader, -the `rauc` update tool, the `genimage` image generation mechanism, -and some other useful tools and patches +the `genimage` image generation mechanism, and some other useful tools and +patches It provides it own sample distro `ptx` which is based on systemd. diff --git a/classes/bundle.bbclass b/classes/bundle.bbclass deleted file mode 100644 index 0f18b47..0000000 --- a/classes/bundle.bbclass +++ /dev/null @@ -1,196 +0,0 @@ -# Class for creating rauc bundles -# -# Description: -# -# You have to set the slot images in your recipe file following this example: -# -# RAUC_BUNDLE_COMPATIBLE ?= "My Super Product" -# RAUC_BUNDLE_VERSION ?= "v2015-06-07-1" -# -# RAUC_BUNDLE_HOOKS[file] ?= "hook.sh" -# RAUC_BUNDLE_HOOKS[hooks] ?= "install-check" -# -# RAUC_BUNDLE_SLOTS ?= "rootfs kernel dtb bootloader" -# -# RAUC_SLOT_rootfs ?= "core-image-minimal" -# RAUC_SLOT_rootfs[fstype] = "ext4" -# RAUC_SLOT_rootfs[hooks] ?= "install;post-install" -# -# RAUC_SLOT_kernel ?= "linux-yocto" -# RAUC_SLOT_kernel[type] ?= "kernel" -# -# RAUC_SLOT_bootloader ?= "barebox" -# RAUC_SLOT_bootloader[type] ?= "boot" -# -# RAUC_SLOT_dtb ?= linux-yocto -# RAUC_SLOT_dtb[type] ?= "file" -# RAUC_SLOT_dtb[file] ?= "am335x-bone.dtb" -# -# -# Additionally you need to provide a certificate and a key file -# -# RAUC_KEY_FILE ?= "development-1.key.pem" -# RAUC_CERT_FILE ?= "development-1.cert.pem" - -LICENSE = "MIT" - -PACKAGE_ARCH = "${MACHINE_ARCH}" - -RAUC_IMAGE_FSTYPE ?= "ext4" - -do_fetch[cleandirs] = "${S}" -do_patch[noexec] = "1" -do_configure[noexec] = "1" -do_compile[noexec] = "1" -do_install[noexec] = "1" -do_populate_sysroot[noexec] = "1" -do_package[noexec] = "1" -do_package_qa[noexec] = "1" -do_packagedata[noexec] = "1" -do_package_write_ipk[noexec] = "1" -do_package_write_deb[noexec] = "1" -do_package_write_rpm[noexec] = "1" - -RAUC_BUNDLE_COMPATIBLE ??= "${MACHINE}-${TARGET_VENDOR}" -RAUC_BUNDLE_VERSION ??= "${PV}" -RAUC_BUNDLE_DESCRIPTION ??= "${SUMMARY}" -RAUC_BUNDLE_BUILD ??= "${DATETIME}" -RAUC_BUNDLE_BUILD[vardepsexclude] = "DATETIME" - -# Create dependency list from images -do_fetch[depends] = "${@' '.join([d.getVar(image, True) + ":do_build" for image in \ - ['RAUC_SLOT_' + slot for slot in d.getVar('RAUC_BUNDLE_SLOTS', True).split()]])}" - -S = "${WORKDIR}" - -RAUC_KEY_FILE ?= "development-1.key.pem" -RAUC_CERT_FILE ?= "development-1.cert.pem" - -SRC_URI = "\ - file://${RAUC_KEY_FILE} \ - file://${RAUC_CERT_FILE} \ - " - -DEPENDS = "rauc-native" - -python do_fetch() { - import shutil - - machine = d.getVar('MACHINE', True) - img_fstype = d.getVar('RAUC_IMAGE_FSTYPE', True) - bundle_path = d.expand("${S}/bundle") - - bb.utils.mkdirhier(bundle_path) - try: - manifest = open('%s/manifest.raucm' % bundle_path, 'w') - except OSError: - raise bb.build.FuncFailed('Unable to open manifest.raucm') - - manifest.write('[update]\n') - manifest.write(d.expand('compatible=${RAUC_BUNDLE_COMPATIBLE}\n')) - manifest.write(d.expand('version=${RAUC_BUNDLE_VERSION}\n')) - manifest.write(d.expand('description=${RAUC_BUNDLE_DESCRIPTION}\n')) - manifest.write(d.expand('build=${RAUC_BUNDLE_BUILD}\n')) - manifest.write('\n') - - hooksflags = d.getVarFlags('RAUC_BUNDLE_HOOKS') - if hooksflags and 'file' in hooksflags: - manifest.write('[hooks]\n') - manifest.write("filename=%s\n" % hooksflags.get('file')) - if 'hooks' in hooksflags: - manifest.write("hooks=%s\n" % hooksflags.get('hooks')) - manifest.write('\n') - - for slot in d.getVar('RAUC_BUNDLE_SLOTS', True).split(): - manifest.write('[image.%s]\n' % slot) - slotflags = d.getVarFlags('RAUC_SLOT_%s' % slot) - if slotflags and 'type' in slotflags: - imgtype = slotflags.get('type') - else: - imgtype = 'image' - - if slotflags and 'fstype' in slotflags: - img_fstype = slotflags.get('fstype') - - if imgtype == 'image': - imgsource = "%s-%s.%s" % (d.getVar('RAUC_SLOT_%s' % slot, True), machine, img_fstype) - imgname = imgsource - elif imgtype == 'kernel': - # TODO: Add image type support - if slotflags and 'file' in slotflags: - imgsource = "%s" % slotflags.get('file') - else: - imgsource = "%s-%s.bin" % ("zImage", machine) - imgname = "%s.%s" % (imgsource, "img") - elif imgtype == 'boot': - # TODO: adapt if barebox produces determinable output images - imgsource = "%s" % ("barebox.img") - imgname = imgsource - elif imgtype == 'file': - if slotflags and 'file' in slotflags: - imgsource = "%s" % slotflags.get('file') - else: - raise bb.build.FuncFailed('Unknown file for slot: %s' % slot) - imgname = "%s.%s" % (imgsource, "img") - else: - raise bb.build.FuncFailed('Unknown image type: %s' % imgtype) - - manifest.write("filename=%s\n" % imgname) - if slotflags and 'hooks' in slotflags: - manifest.write("hooks=%s\n" % slotflags.get('hooks')) - manifest.write("\n") - - bundle_imgpath = "%s/%s" % (bundle_path, imgname) - # Set or update symlinks to image files - if os.path.lexists(bundle_imgpath): - bb.utils.remove(bundle_imgpath) - shutil.copy(d.expand("${DEPLOY_DIR_IMAGE}/%s") % imgsource, bundle_imgpath) - if not os.path.exists(bundle_imgpath): - raise bb.build.FuncFailed('Failed creating symlink to %s' % imgname) - - manifest.close() -} - -do_unpack_append() { - import shutil - import os - import stat - - hooksflags = d.getVarFlags('RAUC_BUNDLE_HOOKS') - if hooksflags and 'file' in hooksflags: - hf = hooksflags.get('file') - dsthook = d.expand("${S}/bundle/%s" % hf) - shutil.copy(d.expand("${WORKDIR}/%s" % hf), dsthook) - st = os.stat(dsthook) - os.chmod(dsthook, st.st_mode | stat.S_IEXEC) -} - -DEPLOY_DIR_BUNDLE ?= "${DEPLOY_DIR_IMAGE}/bundles" -DEPLOY_DIR_BUNDLE[doc] = "Points to where rauc bundles will be put in" - -BUNDLE_BASENAME = "${PN}" -BUNDLE_NAME = "${BUNDLE_BASENAME}-${MACHINE}-${DATETIME}" -# Don't include the DATETIME variable in the sstate package sigantures -BUNDLE_NAME[vardepsexclude] = "DATETIME" -BUNDLE_LINK_NAME = "${BUNDLE_BASENAME}-${MACHINE}" - -do_bundle() { - if [ -e ${B}/bundle.raucb ]; then - rm ${B}/bundle.raucb - fi - ${STAGING_DIR_NATIVE}${bindir}/rauc bundle \ - --cert=${WORKDIR}/${RAUC_CERT_FILE} \ - --key=${WORKDIR}/${RAUC_KEY_FILE} \ - ${S}/bundle \ - ${B}/bundle.raucb -} - -do_deploy() { - install -d ${DEPLOY_DIR_BUNDLE} - install ${B}/bundle.raucb ${DEPLOY_DIR_BUNDLE}/${BUNDLE_NAME}.raucb - ln -sf ${BUNDLE_NAME}.raucb ${DEPLOY_DIR_BUNDLE}/${BUNDLE_LINK_NAME}.raucb -} - -addtask bundle after do_configure before do_build -addtask deploy after do_bundle before do_build - diff --git a/recipes-core/rauc/files/openssl-ca/dev-ca.pem b/recipes-core/rauc/files/openssl-ca/dev-ca.pem deleted file mode 100644 index f8e0991..0000000 --- a/recipes-core/rauc/files/openssl-ca/dev-ca.pem +++ /dev/null @@ -1,184 +0,0 @@ -Certificate: - Data: - Version: 3 (0x2) - Serial Number: 1 (0x1) - Signature Algorithm: sha256WithRSAEncryption - Issuer: O=Test Org, CN=Test Org Provisioning CA Development - Validity - Not Before: Jan 1 00:00:00 1970 GMT - Not After : Dec 31 23:59:59 9999 GMT - Subject: O=Test Org, CN=Test Org Provisioning CA Development - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - Public-Key: (2048 bit) - Modulus: - 00:be:69:34:3b:c6:5b:45:31:c9:2c:e2:cc:70:17: - c8:c4:94:a5:3a:70:64:d5:55:4d:73:d4:97:74:de: - 59:ef:f5:ef:8a:f8:24:e8:ab:62:30:d6:f0:4f:8c: - 6f:7f:dc:e8:2d:61:67:ac:4f:f3:e2:10:86:bd:31: - 57:8e:5a:4d:e6:f6:7c:98:27:e8:84:77:56:d0:2c: - fc:e4:9d:12:87:a4:64:38:82:cc:ff:e2:f6:ee:f3: - 1b:36:cd:3c:c3:49:80:43:40:03:c8:6c:a6:b0:92: - a3:a8:74:e5:92:6c:cb:a1:3b:04:a3:b3:37:a8:05: - c6:5a:ae:af:02:74:ea:a9:35:7c:66:11:17:b8:b2: - 9f:e4:dd:5d:5e:84:72:6c:f6:69:94:29:64:1d:0d: - e3:b6:f5:57:9d:88:6f:be:15:cf:99:63:1b:15:60: - 4d:0d:d6:f8:fe:6c:1f:0c:08:71:38:ff:53:11:ae: - ad:4f:12:c8:00:87:3f:9e:5b:26:6a:14:9d:a0:39: - 1d:7a:a0:9b:ea:7c:6d:1b:db:45:26:73:50:e2:8f: - fe:c0:40:b1:10:d6:a0:28:c4:c9:8c:f3:2e:ea:eb: - 59:82:27:e6:97:d8:12:12:b2:dd:15:81:b3:ac:53: - dc:ae:3c:ca:41:1a:2f:ca:7f:58:e9:90:4f:97:2a: - 4b:49 - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Key Identifier: - 2B:DA:30:7F:54:40:3B:C0:8D:D3:50:F9:21:A4:3D:BA:01:EB:41:2B - X509v3 Authority Key Identifier: - keyid:2B:DA:30:7F:54:40:3B:C0:8D:D3:50:F9:21:A4:3D:BA:01:EB:41:2B - DirName:/O=Test Org/CN=Test Org Provisioning CA Development - serial:01 - - X509v3 Basic Constraints: - CA:TRUE - Signature Algorithm: sha256WithRSAEncryption - 2c:9b:21:f9:69:4b:61:69:96:ec:48:f5:d3:60:24:6c:99:4f: - 89:30:f2:ec:33:53:79:c3:29:6b:ea:fd:8e:d9:27:f6:eb:3d: - 71:cd:13:4f:e6:40:07:7a:71:e9:f7:23:96:38:65:a0:a9:91: - 83:75:bc:57:d9:ad:d2:1f:57:79:0e:32:34:37:f1:e4:38:eb: - 5a:b4:ae:60:8d:40:44:ba:0b:e1:22:4e:fa:f0:3d:29:5d:66: - 0f:df:cd:16:9c:6c:02:b4:a5:02:43:b3:45:8e:70:cd:d3:a3: - 43:ff:92:ff:52:d0:c4:5d:d8:d3:6b:25:a1:07:ea:7f:5b:87: - 5e:02:89:d0:98:76:fb:8b:7d:3b:a9:b4:c9:da:31:78:85:e6: - 3d:0f:1b:73:b2:47:65:d0:3f:18:da:54:2a:62:3f:42:f7:f7: - c2:b9:53:2d:97:c7:9c:04:92:c8:d6:dc:c6:2e:db:6b:e8:26: - 3a:b2:12:b4:b9:ba:74:54:ef:26:a2:6c:2f:1a:e5:72:73:5a: - a3:3a:96:bc:08:fc:a6:da:7d:18:f6:48:c9:a9:bd:a9:00:69: - 1a:29:c3:b2:3f:3d:8f:e8:16:19:1c:92:f5:8d:b0:73:b5:04: - cc:23:b2:cd:74:79:9a:e7:58:5c:d8:72:e8:51:1b:5f:7d:31: - 71:23:16:b7 ------BEGIN CERTIFICATE----- -MIIDoDCCAoigAwIBAgIBATANBgkqhkiG9w0BAQsFADBCMREwDwYDVQQKDAhUZXN0 -IE9yZzEtMCsGA1UEAwwkVGVzdCBPcmcgUHJvdmlzaW9uaW5nIENBIERldmVsb3Bt -ZW50MCIYDzE5NzAwMTAxMDAwMDAwWhgPOTk5OTEyMzEyMzU5NTlaMEIxETAPBgNV -BAoMCFRlc3QgT3JnMS0wKwYDVQQDDCRUZXN0IE9yZyBQcm92aXNpb25pbmcgQ0Eg -RGV2ZWxvcG1lbnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+aTQ7 -xltFMcks4sxwF8jElKU6cGTVVU1z1Jd03lnv9e+K+CToq2Iw1vBPjG9/3OgtYWes -T/PiEIa9MVeOWk3m9nyYJ+iEd1bQLPzknRKHpGQ4gsz/4vbu8xs2zTzDSYBDQAPI -bKawkqOodOWSbMuhOwSjszeoBcZarq8CdOqpNXxmERe4sp/k3V1ehHJs9mmUKWQd -DeO29VediG++Fc+ZYxsVYE0N1vj+bB8MCHE4/1MRrq1PEsgAhz+eWyZqFJ2gOR16 -oJvqfG0b20Umc1Dij/7AQLEQ1qAoxMmM8y7q61mCJ+aX2BISst0VgbOsU9yuPMpB -Gi/Kf1jpkE+XKktJAgMBAAGjgZwwgZkwHQYDVR0OBBYEFCvaMH9UQDvAjdNQ+SGk -PboB60ErMGoGA1UdIwRjMGGAFCvaMH9UQDvAjdNQ+SGkPboB60EroUakRDBCMREw -DwYDVQQKDAhUZXN0IE9yZzEtMCsGA1UEAwwkVGVzdCBPcmcgUHJvdmlzaW9uaW5n -IENBIERldmVsb3BtZW50ggEBMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQAD -ggEBACybIflpS2FpluxI9dNgJGyZT4kw8uwzU3nDKWvq/Y7ZJ/brPXHNE0/mQAd6 -cen3I5Y4ZaCpkYN1vFfZrdIfV3kOMjQ38eQ461q0rmCNQES6C+EiTvrwPSldZg/f -zRacbAK0pQJDs0WOcM3To0P/kv9S0MRd2NNrJaEH6n9bh14CidCYdvuLfTuptMna -MXiF5j0PG3OyR2XQPxjaVCpiP0L398K5Uy2Xx5wEksjW3MYu22voJjqyErS5unRU -7yaibC8a5XJzWqM6lrwI/KbafRj2SMmpvakAaRopw7I/PY/oFhkckvWNsHO1BMwj -ss10eZrnWFzYcuhRG199MXEjFrc= ------END CERTIFICATE----- ------BEGIN X509 CRL----- -MIIBnjCBhzANBgkqhkiG9w0BAQsFADBCMREwDwYDVQQKDAhUZXN0IE9yZzEtMCsG -A1UEAwwkVGVzdCBPcmcgUHJvdmlzaW9uaW5nIENBIERldmVsb3BtZW50Fw0xNTA0 -MjgwOTIyMDNaFw0yOTAxMDQwOTIyMDNaMBQwEgIBAxcNMTUwNDI4MDkyMjAzWjAN -BgkqhkiG9w0BAQsFAAOCAQEAnI/DhvDwXafxvwHm2FOdIgJUNHSIEcHHeseh6B3d -MDNqy9TmxVrIf6ncIhORKtMRReoOqzFeizvJYDK6vkXPSAk6zBktnlJpzgNUJnJI -pLfsBdOqq/TXYByqP0/eK/NIztoE61cG0qIxMABtWyb8RCcEXyswdfaCmIq5g+OK -UfeNo94d118QIKXAUIXQwWQ/m+wE6na94JFTyVWCquASTP4aghYFt4l86GtZ4q/Y -UYkBW8vCgO9yEuWQ+Fq/1rJKAdZMezspRu/8f6AkRbXTGpFAQsdEp+MwBmr0bhd2 -SIcQxJfZb6uEGzqCaM+FVpAT8yYzcpjbEhPzyfn6lTQqYw== ------END X509 CRL----- -Certificate: - Data: - Version: 3 (0x2) - Serial Number: 1 (0x1) - Signature Algorithm: sha256WithRSAEncryption - Issuer: O=Test Org, CN=Test Org Provisioning CA Release - Validity - Not Before: Jan 1 00:00:00 1970 GMT - Not After : Dec 31 23:59:59 9999 GMT - Subject: O=Test Org, CN=Test Org Provisioning CA Release - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - Public-Key: (2048 bit) - Modulus: - 00:bc:9d:cb:7a:c6:e1:07:23:b6:6c:d0:8f:86:5e: - 6c:b4:00:49:65:38:f1:aa:46:0d:68:0c:8b:95:89: - 32:af:bd:1c:52:11:42:9e:8e:0d:aa:36:65:f5:53: - f9:5d:3d:22:a2:f9:49:3f:ee:8d:dd:cf:2a:31:43: - ae:e4:0b:b2:c8:e0:a3:bc:9b:24:e4:de:c0:8c:9f: - 5f:d6:3f:dd:7b:b9:e4:bb:f8:42:fb:88:12:ae:51: - 2b:c9:e9:c6:5d:87:99:cb:ed:84:61:5f:f8:5e:0e: - 6e:7f:33:a8:eb:33:37:bb:d2:76:f4:0e:8d:4e:c4: - 4a:ae:94:bf:e9:23:65:e8:29:bf:81:26:21:17:78: - 61:ed:78:42:3d:3a:1a:d3:c9:6c:44:29:84:a9:3f: - 6e:6a:f7:e2:b8:52:ec:83:07:51:fb:20:0d:89:15: - 45:71:61:c9:dc:0a:da:ff:a5:80:3e:7b:ba:d0:5a: - b0:c6:92:f7:84:f4:8b:75:15:a0:c7:c3:79:ae:21: - e8:95:12:8b:3b:6e:02:8d:04:14:40:c1:cc:ed:fe: - 98:ec:30:62:10:32:4a:fd:02:e9:da:3f:3b:5a:19: - 7b:3c:88:22:f3:c2:c2:3a:e2:0f:bf:b2:29:64:98: - 55:aa:21:e8:64:f0:50:0a:75:13:b0:b7:f5:f4:4a: - 53:cb - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Key Identifier: - BF:41:C9:7B:30:19:92:43:B5:8B:AA:F2:3D:DC:E1:B4:CD:23:67:23 - X509v3 Authority Key Identifier: - keyid:BF:41:C9:7B:30:19:92:43:B5:8B:AA:F2:3D:DC:E1:B4:CD:23:67:23 - DirName:/O=Test Org/CN=Test Org Provisioning CA Release - serial:01 - - X509v3 Basic Constraints: - CA:TRUE - Signature Algorithm: sha256WithRSAEncryption - 19:2c:41:18:51:59:cd:b3:5d:60:b0:ff:75:d0:69:89:c3:2b: - 93:22:c7:b5:b9:e1:d4:ed:3b:7d:26:50:6e:fa:21:42:83:34: - ce:0c:47:69:83:bc:ef:f6:0a:11:6e:ca:0d:76:2e:70:ad:3d: - 04:f7:73:59:48:e6:0d:45:55:b3:29:6a:a0:fb:09:93:b6:4c: - 7b:a4:4c:aa:d0:6e:10:c0:5c:6c:3c:b3:52:4f:13:b5:db:24: - 70:ab:85:ef:30:ff:25:d9:fd:7a:da:f2:51:2b:52:d6:9f:60: - d9:65:18:f6:3e:30:57:5c:63:1c:a7:3a:a2:cd:b4:d8:c1:ed: - f2:37:46:cf:1a:4c:a6:b1:9d:40:53:5d:ad:22:7a:7c:eb:bf: - 58:71:a1:3e:c3:2d:09:d1:b9:cf:32:7b:d0:52:38:d1:bc:aa: - 99:2d:c5:3e:85:4a:7c:bd:7f:c9:0c:52:e6:1d:12:69:7d:78: - 61:1e:79:e8:eb:b4:5b:4c:c7:7b:b0:66:0d:a7:c4:da:75:5e: - 98:90:95:f7:c9:4e:5a:0d:24:42:3a:92:80:7a:75:90:9e:42: - 9d:ab:96:a1:4d:19:2e:26:5c:a2:32:d6:18:f5:69:e3:89:56: - 88:25:4e:0a:ac:44:91:5d:e5:a9:11:93:e0:93:b0:59:41:ae: - 86:5b:38:b3 ------BEGIN CERTIFICATE----- -MIIDlDCCAnygAwIBAgIBATANBgkqhkiG9w0BAQsFADA+MREwDwYDVQQKDAhUZXN0 -IE9yZzEpMCcGA1UEAwwgVGVzdCBPcmcgUHJvdmlzaW9uaW5nIENBIFJlbGVhc2Uw -IhgPMTk3MDAxMDEwMDAwMDBaGA85OTk5MTIzMTIzNTk1OVowPjERMA8GA1UECgwI -VGVzdCBPcmcxKTAnBgNVBAMMIFRlc3QgT3JnIFByb3Zpc2lvbmluZyBDQSBSZWxl -YXNlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvJ3LesbhByO2bNCP -hl5stABJZTjxqkYNaAyLlYkyr70cUhFCno4NqjZl9VP5XT0iovlJP+6N3c8qMUOu -5AuyyOCjvJsk5N7AjJ9f1j/de7nku/hC+4gSrlEryenGXYeZy+2EYV/4Xg5ufzOo -6zM3u9J29A6NTsRKrpS/6SNl6Cm/gSYhF3hh7XhCPToa08lsRCmEqT9uavfiuFLs -gwdR+yANiRVFcWHJ3Ara/6WAPnu60FqwxpL3hPSLdRWgx8N5riHolRKLO24CjQQU -QMHM7f6Y7DBiEDJK/QLp2j87Whl7PIgi88LCOuIPv7IpZJhVqiHoZPBQCnUTsLf1 -9EpTywIDAQABo4GYMIGVMB0GA1UdDgQWBBS/Qcl7MBmSQ7WLqvI93OG0zSNnIzBm -BgNVHSMEXzBdgBS/Qcl7MBmSQ7WLqvI93OG0zSNnI6FCpEAwPjERMA8GA1UECgwI -VGVzdCBPcmcxKTAnBgNVBAMMIFRlc3QgT3JnIFByb3Zpc2lvbmluZyBDQSBSZWxl -YXNlggEBMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBABksQRhRWc2z -XWCw/3XQaYnDK5Mix7W54dTtO30mUG76IUKDNM4MR2mDvO/2ChFuyg12LnCtPQT3 -c1lI5g1FVbMpaqD7CZO2THukTKrQbhDAXGw8s1JPE7XbJHCrhe8w/yXZ/Xra8lEr -UtafYNllGPY+MFdcYxynOqLNtNjB7fI3Rs8aTKaxnUBTXa0ienzrv1hxoT7DLQnR -uc8ye9BSONG8qpktxT6FSny9f8kMUuYdEml9eGEeeejrtFtMx3uwZg2nxNp1XpiQ -lffJTloNJEI6koB6dZCeQp2rlqFNGS4mXKIy1hj1aeOJVoglTgqsRJFd5akRk+CT -sFlBroZbOLM= ------END CERTIFICATE----- ------BEGIN X509 CRL----- -MIIBgzBtMA0GCSqGSIb3DQEBCwUAMD4xETAPBgNVBAoMCFRlc3QgT3JnMSkwJwYD -VQQDDCBUZXN0IE9yZyBQcm92aXNpb25pbmcgQ0EgUmVsZWFzZRcNMTUwNDI4MDky -MjAzWhcNMjkwMTA0MDkyMjAzWjANBgkqhkiG9w0BAQsFAAOCAQEAqDda6fQJqO0T -KctQiO1dxiqBXrGwzoW1o+p66hIZGo3+Detc3Cm9KJuB7Z5BCkUvNELTwNAOwdhO -Nlflr5s4CobcRHr2PLdhbFmqkNsAlxWM9q65GcbDTpYmy49j5Kx7N1MOSNZhyyzl -Aomj0JNK6QIWxzqikm1YBIoh1o5m18ZOWJMC9QAV+cOoFMuoNXr1BXPcE2OuWeUU -H+XTJQyq4c0VmvJpvK1QOjEBw5TfRGAW5Yy0aRpne/fLygJwxy9Yl96NeehKvLKY -3WVshVQbEEZoXS3PSO3b3lTTUOCXqCFdwzztvKV8HP+rRx+VLhx9WsCrm3DGXCtN -nTyvlYybJw== ------END X509 CRL----- diff --git a/recipes-core/rauc/files/rauc-mark-good.service b/recipes-core/rauc/files/rauc-mark-good.service deleted file mode 100644 index 8b5decd..0000000 --- a/recipes-core/rauc/files/rauc-mark-good.service +++ /dev/null @@ -1,12 +0,0 @@ -[Unit] -Description=Rauc Good-marking Service - -[Service] -#Type=dbus -#BusName=de.pengutronix.rauc -#User=root -ExecStart=@BINDIR@/rauc status mark-good - -[Install] -WantedBy=multi-user.target - diff --git a/recipes-core/rauc/rauc-native_git.bb b/recipes-core/rauc/rauc-native_git.bb deleted file mode 100644 index 661226a..0000000 --- a/recipes-core/rauc/rauc-native_git.bb +++ /dev/null @@ -1,13 +0,0 @@ -require rauc_git.bb - -inherit native deploy - -do_deploy[sstate-outputdirs] = "${DEPLOY_DIR_TOOLS}" - -do_deploy() { - install -d ${DEPLOYDIR} - install -m 0755 ${B}/rauc ${DEPLOYDIR}/rauc-${PV} - ln -sf rauc-${PV} ${DEPLOYDIR}/rauc -} - -addtask deploy before do_package after do_install diff --git a/recipes-core/rauc/rauc.inc b/recipes-core/rauc/rauc.inc deleted file mode 100644 index 7b38e15..0000000 --- a/recipes-core/rauc/rauc.inc +++ /dev/null @@ -1,76 +0,0 @@ -DESCRIPTION = "rauc update controller for host and target" -HOMEPAGE = "https://github.com/jluebbe/rauc" -LICENSE = "GPLv2" -LIC_FILES_CHKSUM = "file://COPYING;md5=4fbd65380cdd255951079008b364516c" - - -SRC_URI = "file://rauc-mark-good.service " - -DEPENDS = "openssl glib-2.0" -RDEPENDS_${PN}_class-target = "dt-utils-barebox-state" -RRECOMMENDS_${PN} = "squashfs-tools" -RRECOMMENDS_${PN}_append_class-target = " mtd-utils ${PN}-mark-good" - -PACKAGES =+ "${PN}-service ${PN}-mark-good" - -FILES_${PN}-service = "\ - ${systemd_unitdir}/system/rauc.service \ - ${datadir}/dbus-1/system.d/de.pengutronix.rauc.conf \ - ${datadir}/dbus-1/system-services/de.pengutronix.rauc.service \ - " -FILES_${PN}-mark-good = "${systemd_unitdir}/system/rauc-mark-good.service" - -PACKAGECONFIG ??= "service network json" -PACKAGECONFIG_class-native = "" -PACKAGECONFIG_class-nativesdk = "" -PACKAGECONFIG[service] = "--enable-service,--enable-service=no,,${PN}-service" -PACKAGECONFIG[network] = "--enable-network,--enable-network=no,curl" -PACKAGECONFIG[json] = "--enable-json,--enable-json=no,json-glib" - -inherit autotools pkgconfig gettext systemd - -RAUC_KEYRING_FILE ??= "openssl-ca/dev-ca.pem" -RAUC_KEYRING_FILE[doc] = "Path to keyring file to be placed in rauc images" - -SRC_URI += "file://${RAUC_KEYRING_FILE}" - -EXTRA_OECONF += "\ - --with-systemdunitdir=${systemd_system_unitdir} \ - --with-dbuspolicydir=${datadir}/dbus-1/system.d \ - --with-dbussystemservicedir=${datadir}/dbus-1/system-services \ - " - -do_install_append_class-target () { - - # Create rauc config dir - install -d ${D}${sysconfdir}/rauc - - # If a system.conf is provided in files, install it, otherwise warn - if [ -f ${WORKDIR}/system.conf ]; then - install -m 0644 ${WORKDIR}/system.conf ${D}${sysconfdir}/rauc/system.conf - else - bbwarn "No system.conf provided" - fi - - # CA file - if [ -f ${WORKDIR}/${RAUC_KEYRING_FILE} ]; then - install -d ${D}${sysconfdir}/rauc/openssl-ca - install -m 0644 ${WORKDIR}/${RAUC_KEYRING_FILE} ${D}${sysconfdir}/rauc/openssl-ca/; \ - else - bbwarn "No keyring file provided" - fi - - install -d ${D}${systemd_unitdir}/system/ - install -m 0644 ${WORKDIR}/rauc-mark-good.service ${D}${systemd_unitdir}/system/ - sed -i -e 's!@BINDIR@!${bindir}!g' ${D}${systemd_unitdir}/system/*.service - -} - -SYSTEMD_PACKAGES = "${PN}-service ${PN}-mark-good" -SYSTEMD_SERVICE_${PN}-service = "rauc.service" -SYSTEMD_SERVICE_${PN}-mark-good = "rauc-mark-good.service" -SYSTEMD_AUTO_ENABLE_${PN} = "enable" - -BBCLASSEXTEND = "nativesdk" - -DEFAULT_PREFERENCE = "-1" diff --git a/recipes-core/rauc/rauc_git.bb b/recipes-core/rauc/rauc_git.bb deleted file mode 100644 index 10f1bb3..0000000 --- a/recipes-core/rauc/rauc_git.bb +++ /dev/null @@ -1,11 +0,0 @@ -require rauc.inc -PR = "r9" - -SRC_URI_append = " \ - git://github.com/jluebbe/rauc.git;protocol=https \ - " - -PV = "0+git${SRCPV}" -S = "${WORKDIR}/git" - -SRCREV = "aece736bba159f13427feae41b4f17039f6d979f" |