summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorEnrico Jorns <ejo@pengutronix.de>2017-11-17 14:17:50 +0100
committerEnrico Jorns <e.joerns@tu-bs.de>2017-11-22 09:46:45 +0100
commitb1e1f88df8efe62558ac3bab007268e38d911767 (patch)
treec848fcec1472edf20bc80eb05495d1d697c5a108
parentb4c5f9fd82ff18b8cf7d63a614bce2928e2eb9bd (diff)
downloadmeta-ptx-b1e1f88df8efe62558ac3bab007268e38d911767.tar.gz
meta-ptx-b1e1f88df8efe62558ac3bab007268e38d911767.tar.xz
remove RAUC from meta-ptx
Support for RAUC officially went to meta-rauc (https://github.com/rauc/meta-rauc) a while ago and was kept in meta-ptx only for a migration phase and will now be removed finally. Signed-off-by: Enrico Jorns <ejo@pengutronix.de>
-rw-r--r--README4
-rw-r--r--classes/bundle.bbclass196
-rw-r--r--recipes-core/rauc/files/openssl-ca/dev-ca.pem184
-rw-r--r--recipes-core/rauc/files/rauc-mark-good.service12
-rw-r--r--recipes-core/rauc/rauc-native_git.bb13
-rw-r--r--recipes-core/rauc/rauc.inc76
-rw-r--r--recipes-core/rauc/rauc_git.bb11
7 files changed, 2 insertions, 494 deletions
diff --git a/README b/README
index 1049a2d..1102068 100644
--- a/README
+++ b/README
@@ -1,6 +1,6 @@
The meta-ptx layer provides support for the `barebox` bootloader,
-the `rauc` update tool, the `genimage` image generation mechanism,
-and some other useful tools and patches
+the `genimage` image generation mechanism, and some other useful tools and
+patches
It provides it own sample distro `ptx` which is based on systemd.
diff --git a/classes/bundle.bbclass b/classes/bundle.bbclass
deleted file mode 100644
index 0f18b47..0000000
--- a/classes/bundle.bbclass
+++ /dev/null
@@ -1,196 +0,0 @@
-# Class for creating rauc bundles
-#
-# Description:
-#
-# You have to set the slot images in your recipe file following this example:
-#
-# RAUC_BUNDLE_COMPATIBLE ?= "My Super Product"
-# RAUC_BUNDLE_VERSION ?= "v2015-06-07-1"
-#
-# RAUC_BUNDLE_HOOKS[file] ?= "hook.sh"
-# RAUC_BUNDLE_HOOKS[hooks] ?= "install-check"
-#
-# RAUC_BUNDLE_SLOTS ?= "rootfs kernel dtb bootloader"
-#
-# RAUC_SLOT_rootfs ?= "core-image-minimal"
-# RAUC_SLOT_rootfs[fstype] = "ext4"
-# RAUC_SLOT_rootfs[hooks] ?= "install;post-install"
-#
-# RAUC_SLOT_kernel ?= "linux-yocto"
-# RAUC_SLOT_kernel[type] ?= "kernel"
-#
-# RAUC_SLOT_bootloader ?= "barebox"
-# RAUC_SLOT_bootloader[type] ?= "boot"
-#
-# RAUC_SLOT_dtb ?= linux-yocto
-# RAUC_SLOT_dtb[type] ?= "file"
-# RAUC_SLOT_dtb[file] ?= "am335x-bone.dtb"
-#
-#
-# Additionally you need to provide a certificate and a key file
-#
-# RAUC_KEY_FILE ?= "development-1.key.pem"
-# RAUC_CERT_FILE ?= "development-1.cert.pem"
-
-LICENSE = "MIT"
-
-PACKAGE_ARCH = "${MACHINE_ARCH}"
-
-RAUC_IMAGE_FSTYPE ?= "ext4"
-
-do_fetch[cleandirs] = "${S}"
-do_patch[noexec] = "1"
-do_configure[noexec] = "1"
-do_compile[noexec] = "1"
-do_install[noexec] = "1"
-do_populate_sysroot[noexec] = "1"
-do_package[noexec] = "1"
-do_package_qa[noexec] = "1"
-do_packagedata[noexec] = "1"
-do_package_write_ipk[noexec] = "1"
-do_package_write_deb[noexec] = "1"
-do_package_write_rpm[noexec] = "1"
-
-RAUC_BUNDLE_COMPATIBLE ??= "${MACHINE}-${TARGET_VENDOR}"
-RAUC_BUNDLE_VERSION ??= "${PV}"
-RAUC_BUNDLE_DESCRIPTION ??= "${SUMMARY}"
-RAUC_BUNDLE_BUILD ??= "${DATETIME}"
-RAUC_BUNDLE_BUILD[vardepsexclude] = "DATETIME"
-
-# Create dependency list from images
-do_fetch[depends] = "${@' '.join([d.getVar(image, True) + ":do_build" for image in \
- ['RAUC_SLOT_' + slot for slot in d.getVar('RAUC_BUNDLE_SLOTS', True).split()]])}"
-
-S = "${WORKDIR}"
-
-RAUC_KEY_FILE ?= "development-1.key.pem"
-RAUC_CERT_FILE ?= "development-1.cert.pem"
-
-SRC_URI = "\
- file://${RAUC_KEY_FILE} \
- file://${RAUC_CERT_FILE} \
- "
-
-DEPENDS = "rauc-native"
-
-python do_fetch() {
- import shutil
-
- machine = d.getVar('MACHINE', True)
- img_fstype = d.getVar('RAUC_IMAGE_FSTYPE', True)
- bundle_path = d.expand("${S}/bundle")
-
- bb.utils.mkdirhier(bundle_path)
- try:
- manifest = open('%s/manifest.raucm' % bundle_path, 'w')
- except OSError:
- raise bb.build.FuncFailed('Unable to open manifest.raucm')
-
- manifest.write('[update]\n')
- manifest.write(d.expand('compatible=${RAUC_BUNDLE_COMPATIBLE}\n'))
- manifest.write(d.expand('version=${RAUC_BUNDLE_VERSION}\n'))
- manifest.write(d.expand('description=${RAUC_BUNDLE_DESCRIPTION}\n'))
- manifest.write(d.expand('build=${RAUC_BUNDLE_BUILD}\n'))
- manifest.write('\n')
-
- hooksflags = d.getVarFlags('RAUC_BUNDLE_HOOKS')
- if hooksflags and 'file' in hooksflags:
- manifest.write('[hooks]\n')
- manifest.write("filename=%s\n" % hooksflags.get('file'))
- if 'hooks' in hooksflags:
- manifest.write("hooks=%s\n" % hooksflags.get('hooks'))
- manifest.write('\n')
-
- for slot in d.getVar('RAUC_BUNDLE_SLOTS', True).split():
- manifest.write('[image.%s]\n' % slot)
- slotflags = d.getVarFlags('RAUC_SLOT_%s' % slot)
- if slotflags and 'type' in slotflags:
- imgtype = slotflags.get('type')
- else:
- imgtype = 'image'
-
- if slotflags and 'fstype' in slotflags:
- img_fstype = slotflags.get('fstype')
-
- if imgtype == 'image':
- imgsource = "%s-%s.%s" % (d.getVar('RAUC_SLOT_%s' % slot, True), machine, img_fstype)
- imgname = imgsource
- elif imgtype == 'kernel':
- # TODO: Add image type support
- if slotflags and 'file' in slotflags:
- imgsource = "%s" % slotflags.get('file')
- else:
- imgsource = "%s-%s.bin" % ("zImage", machine)
- imgname = "%s.%s" % (imgsource, "img")
- elif imgtype == 'boot':
- # TODO: adapt if barebox produces determinable output images
- imgsource = "%s" % ("barebox.img")
- imgname = imgsource
- elif imgtype == 'file':
- if slotflags and 'file' in slotflags:
- imgsource = "%s" % slotflags.get('file')
- else:
- raise bb.build.FuncFailed('Unknown file for slot: %s' % slot)
- imgname = "%s.%s" % (imgsource, "img")
- else:
- raise bb.build.FuncFailed('Unknown image type: %s' % imgtype)
-
- manifest.write("filename=%s\n" % imgname)
- if slotflags and 'hooks' in slotflags:
- manifest.write("hooks=%s\n" % slotflags.get('hooks'))
- manifest.write("\n")
-
- bundle_imgpath = "%s/%s" % (bundle_path, imgname)
- # Set or update symlinks to image files
- if os.path.lexists(bundle_imgpath):
- bb.utils.remove(bundle_imgpath)
- shutil.copy(d.expand("${DEPLOY_DIR_IMAGE}/%s") % imgsource, bundle_imgpath)
- if not os.path.exists(bundle_imgpath):
- raise bb.build.FuncFailed('Failed creating symlink to %s' % imgname)
-
- manifest.close()
-}
-
-do_unpack_append() {
- import shutil
- import os
- import stat
-
- hooksflags = d.getVarFlags('RAUC_BUNDLE_HOOKS')
- if hooksflags and 'file' in hooksflags:
- hf = hooksflags.get('file')
- dsthook = d.expand("${S}/bundle/%s" % hf)
- shutil.copy(d.expand("${WORKDIR}/%s" % hf), dsthook)
- st = os.stat(dsthook)
- os.chmod(dsthook, st.st_mode | stat.S_IEXEC)
-}
-
-DEPLOY_DIR_BUNDLE ?= "${DEPLOY_DIR_IMAGE}/bundles"
-DEPLOY_DIR_BUNDLE[doc] = "Points to where rauc bundles will be put in"
-
-BUNDLE_BASENAME = "${PN}"
-BUNDLE_NAME = "${BUNDLE_BASENAME}-${MACHINE}-${DATETIME}"
-# Don't include the DATETIME variable in the sstate package sigantures
-BUNDLE_NAME[vardepsexclude] = "DATETIME"
-BUNDLE_LINK_NAME = "${BUNDLE_BASENAME}-${MACHINE}"
-
-do_bundle() {
- if [ -e ${B}/bundle.raucb ]; then
- rm ${B}/bundle.raucb
- fi
- ${STAGING_DIR_NATIVE}${bindir}/rauc bundle \
- --cert=${WORKDIR}/${RAUC_CERT_FILE} \
- --key=${WORKDIR}/${RAUC_KEY_FILE} \
- ${S}/bundle \
- ${B}/bundle.raucb
-}
-
-do_deploy() {
- install -d ${DEPLOY_DIR_BUNDLE}
- install ${B}/bundle.raucb ${DEPLOY_DIR_BUNDLE}/${BUNDLE_NAME}.raucb
- ln -sf ${BUNDLE_NAME}.raucb ${DEPLOY_DIR_BUNDLE}/${BUNDLE_LINK_NAME}.raucb
-}
-
-addtask bundle after do_configure before do_build
-addtask deploy after do_bundle before do_build
-
diff --git a/recipes-core/rauc/files/openssl-ca/dev-ca.pem b/recipes-core/rauc/files/openssl-ca/dev-ca.pem
deleted file mode 100644
index f8e0991..0000000
--- a/recipes-core/rauc/files/openssl-ca/dev-ca.pem
+++ /dev/null
@@ -1,184 +0,0 @@
-Certificate:
- Data:
- Version: 3 (0x2)
- Serial Number: 1 (0x1)
- Signature Algorithm: sha256WithRSAEncryption
- Issuer: O=Test Org, CN=Test Org Provisioning CA Development
- Validity
- Not Before: Jan 1 00:00:00 1970 GMT
- Not After : Dec 31 23:59:59 9999 GMT
- Subject: O=Test Org, CN=Test Org Provisioning CA Development
- Subject Public Key Info:
- Public Key Algorithm: rsaEncryption
- Public-Key: (2048 bit)
- Modulus:
- 00:be:69:34:3b:c6:5b:45:31:c9:2c:e2:cc:70:17:
- c8:c4:94:a5:3a:70:64:d5:55:4d:73:d4:97:74:de:
- 59:ef:f5:ef:8a:f8:24:e8:ab:62:30:d6:f0:4f:8c:
- 6f:7f:dc:e8:2d:61:67:ac:4f:f3:e2:10:86:bd:31:
- 57:8e:5a:4d:e6:f6:7c:98:27:e8:84:77:56:d0:2c:
- fc:e4:9d:12:87:a4:64:38:82:cc:ff:e2:f6:ee:f3:
- 1b:36:cd:3c:c3:49:80:43:40:03:c8:6c:a6:b0:92:
- a3:a8:74:e5:92:6c:cb:a1:3b:04:a3:b3:37:a8:05:
- c6:5a:ae:af:02:74:ea:a9:35:7c:66:11:17:b8:b2:
- 9f:e4:dd:5d:5e:84:72:6c:f6:69:94:29:64:1d:0d:
- e3:b6:f5:57:9d:88:6f:be:15:cf:99:63:1b:15:60:
- 4d:0d:d6:f8:fe:6c:1f:0c:08:71:38:ff:53:11:ae:
- ad:4f:12:c8:00:87:3f:9e:5b:26:6a:14:9d:a0:39:
- 1d:7a:a0:9b:ea:7c:6d:1b:db:45:26:73:50:e2:8f:
- fe:c0:40:b1:10:d6:a0:28:c4:c9:8c:f3:2e:ea:eb:
- 59:82:27:e6:97:d8:12:12:b2:dd:15:81:b3:ac:53:
- dc:ae:3c:ca:41:1a:2f:ca:7f:58:e9:90:4f:97:2a:
- 4b:49
- Exponent: 65537 (0x10001)
- X509v3 extensions:
- X509v3 Subject Key Identifier:
- 2B:DA:30:7F:54:40:3B:C0:8D:D3:50:F9:21:A4:3D:BA:01:EB:41:2B
- X509v3 Authority Key Identifier:
- keyid:2B:DA:30:7F:54:40:3B:C0:8D:D3:50:F9:21:A4:3D:BA:01:EB:41:2B
- DirName:/O=Test Org/CN=Test Org Provisioning CA Development
- serial:01
-
- X509v3 Basic Constraints:
- CA:TRUE
- Signature Algorithm: sha256WithRSAEncryption
- 2c:9b:21:f9:69:4b:61:69:96:ec:48:f5:d3:60:24:6c:99:4f:
- 89:30:f2:ec:33:53:79:c3:29:6b:ea:fd:8e:d9:27:f6:eb:3d:
- 71:cd:13:4f:e6:40:07:7a:71:e9:f7:23:96:38:65:a0:a9:91:
- 83:75:bc:57:d9:ad:d2:1f:57:79:0e:32:34:37:f1:e4:38:eb:
- 5a:b4:ae:60:8d:40:44:ba:0b:e1:22:4e:fa:f0:3d:29:5d:66:
- 0f:df:cd:16:9c:6c:02:b4:a5:02:43:b3:45:8e:70:cd:d3:a3:
- 43:ff:92:ff:52:d0:c4:5d:d8:d3:6b:25:a1:07:ea:7f:5b:87:
- 5e:02:89:d0:98:76:fb:8b:7d:3b:a9:b4:c9:da:31:78:85:e6:
- 3d:0f:1b:73:b2:47:65:d0:3f:18:da:54:2a:62:3f:42:f7:f7:
- c2:b9:53:2d:97:c7:9c:04:92:c8:d6:dc:c6:2e:db:6b:e8:26:
- 3a:b2:12:b4:b9:ba:74:54:ef:26:a2:6c:2f:1a:e5:72:73:5a:
- a3:3a:96:bc:08:fc:a6:da:7d:18:f6:48:c9:a9:bd:a9:00:69:
- 1a:29:c3:b2:3f:3d:8f:e8:16:19:1c:92:f5:8d:b0:73:b5:04:
- cc:23:b2:cd:74:79:9a:e7:58:5c:d8:72:e8:51:1b:5f:7d:31:
- 71:23:16:b7
------BEGIN CERTIFICATE-----
-MIIDoDCCAoigAwIBAgIBATANBgkqhkiG9w0BAQsFADBCMREwDwYDVQQKDAhUZXN0
-IE9yZzEtMCsGA1UEAwwkVGVzdCBPcmcgUHJvdmlzaW9uaW5nIENBIERldmVsb3Bt
-ZW50MCIYDzE5NzAwMTAxMDAwMDAwWhgPOTk5OTEyMzEyMzU5NTlaMEIxETAPBgNV
-BAoMCFRlc3QgT3JnMS0wKwYDVQQDDCRUZXN0IE9yZyBQcm92aXNpb25pbmcgQ0Eg
-RGV2ZWxvcG1lbnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+aTQ7
-xltFMcks4sxwF8jElKU6cGTVVU1z1Jd03lnv9e+K+CToq2Iw1vBPjG9/3OgtYWes
-T/PiEIa9MVeOWk3m9nyYJ+iEd1bQLPzknRKHpGQ4gsz/4vbu8xs2zTzDSYBDQAPI
-bKawkqOodOWSbMuhOwSjszeoBcZarq8CdOqpNXxmERe4sp/k3V1ehHJs9mmUKWQd
-DeO29VediG++Fc+ZYxsVYE0N1vj+bB8MCHE4/1MRrq1PEsgAhz+eWyZqFJ2gOR16
-oJvqfG0b20Umc1Dij/7AQLEQ1qAoxMmM8y7q61mCJ+aX2BISst0VgbOsU9yuPMpB
-Gi/Kf1jpkE+XKktJAgMBAAGjgZwwgZkwHQYDVR0OBBYEFCvaMH9UQDvAjdNQ+SGk
-PboB60ErMGoGA1UdIwRjMGGAFCvaMH9UQDvAjdNQ+SGkPboB60EroUakRDBCMREw
-DwYDVQQKDAhUZXN0IE9yZzEtMCsGA1UEAwwkVGVzdCBPcmcgUHJvdmlzaW9uaW5n
-IENBIERldmVsb3BtZW50ggEBMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQAD
-ggEBACybIflpS2FpluxI9dNgJGyZT4kw8uwzU3nDKWvq/Y7ZJ/brPXHNE0/mQAd6
-cen3I5Y4ZaCpkYN1vFfZrdIfV3kOMjQ38eQ461q0rmCNQES6C+EiTvrwPSldZg/f
-zRacbAK0pQJDs0WOcM3To0P/kv9S0MRd2NNrJaEH6n9bh14CidCYdvuLfTuptMna
-MXiF5j0PG3OyR2XQPxjaVCpiP0L398K5Uy2Xx5wEksjW3MYu22voJjqyErS5unRU
-7yaibC8a5XJzWqM6lrwI/KbafRj2SMmpvakAaRopw7I/PY/oFhkckvWNsHO1BMwj
-ss10eZrnWFzYcuhRG199MXEjFrc=
------END CERTIFICATE-----
------BEGIN X509 CRL-----
-MIIBnjCBhzANBgkqhkiG9w0BAQsFADBCMREwDwYDVQQKDAhUZXN0IE9yZzEtMCsG
-A1UEAwwkVGVzdCBPcmcgUHJvdmlzaW9uaW5nIENBIERldmVsb3BtZW50Fw0xNTA0
-MjgwOTIyMDNaFw0yOTAxMDQwOTIyMDNaMBQwEgIBAxcNMTUwNDI4MDkyMjAzWjAN
-BgkqhkiG9w0BAQsFAAOCAQEAnI/DhvDwXafxvwHm2FOdIgJUNHSIEcHHeseh6B3d
-MDNqy9TmxVrIf6ncIhORKtMRReoOqzFeizvJYDK6vkXPSAk6zBktnlJpzgNUJnJI
-pLfsBdOqq/TXYByqP0/eK/NIztoE61cG0qIxMABtWyb8RCcEXyswdfaCmIq5g+OK
-UfeNo94d118QIKXAUIXQwWQ/m+wE6na94JFTyVWCquASTP4aghYFt4l86GtZ4q/Y
-UYkBW8vCgO9yEuWQ+Fq/1rJKAdZMezspRu/8f6AkRbXTGpFAQsdEp+MwBmr0bhd2
-SIcQxJfZb6uEGzqCaM+FVpAT8yYzcpjbEhPzyfn6lTQqYw==
------END X509 CRL-----
-Certificate:
- Data:
- Version: 3 (0x2)
- Serial Number: 1 (0x1)
- Signature Algorithm: sha256WithRSAEncryption
- Issuer: O=Test Org, CN=Test Org Provisioning CA Release
- Validity
- Not Before: Jan 1 00:00:00 1970 GMT
- Not After : Dec 31 23:59:59 9999 GMT
- Subject: O=Test Org, CN=Test Org Provisioning CA Release
- Subject Public Key Info:
- Public Key Algorithm: rsaEncryption
- Public-Key: (2048 bit)
- Modulus:
- 00:bc:9d:cb:7a:c6:e1:07:23:b6:6c:d0:8f:86:5e:
- 6c:b4:00:49:65:38:f1:aa:46:0d:68:0c:8b:95:89:
- 32:af:bd:1c:52:11:42:9e:8e:0d:aa:36:65:f5:53:
- f9:5d:3d:22:a2:f9:49:3f:ee:8d:dd:cf:2a:31:43:
- ae:e4:0b:b2:c8:e0:a3:bc:9b:24:e4:de:c0:8c:9f:
- 5f:d6:3f:dd:7b:b9:e4:bb:f8:42:fb:88:12:ae:51:
- 2b:c9:e9:c6:5d:87:99:cb:ed:84:61:5f:f8:5e:0e:
- 6e:7f:33:a8:eb:33:37:bb:d2:76:f4:0e:8d:4e:c4:
- 4a:ae:94:bf:e9:23:65:e8:29:bf:81:26:21:17:78:
- 61:ed:78:42:3d:3a:1a:d3:c9:6c:44:29:84:a9:3f:
- 6e:6a:f7:e2:b8:52:ec:83:07:51:fb:20:0d:89:15:
- 45:71:61:c9:dc:0a:da:ff:a5:80:3e:7b:ba:d0:5a:
- b0:c6:92:f7:84:f4:8b:75:15:a0:c7:c3:79:ae:21:
- e8:95:12:8b:3b:6e:02:8d:04:14:40:c1:cc:ed:fe:
- 98:ec:30:62:10:32:4a:fd:02:e9:da:3f:3b:5a:19:
- 7b:3c:88:22:f3:c2:c2:3a:e2:0f:bf:b2:29:64:98:
- 55:aa:21:e8:64:f0:50:0a:75:13:b0:b7:f5:f4:4a:
- 53:cb
- Exponent: 65537 (0x10001)
- X509v3 extensions:
- X509v3 Subject Key Identifier:
- BF:41:C9:7B:30:19:92:43:B5:8B:AA:F2:3D:DC:E1:B4:CD:23:67:23
- X509v3 Authority Key Identifier:
- keyid:BF:41:C9:7B:30:19:92:43:B5:8B:AA:F2:3D:DC:E1:B4:CD:23:67:23
- DirName:/O=Test Org/CN=Test Org Provisioning CA Release
- serial:01
-
- X509v3 Basic Constraints:
- CA:TRUE
- Signature Algorithm: sha256WithRSAEncryption
- 19:2c:41:18:51:59:cd:b3:5d:60:b0:ff:75:d0:69:89:c3:2b:
- 93:22:c7:b5:b9:e1:d4:ed:3b:7d:26:50:6e:fa:21:42:83:34:
- ce:0c:47:69:83:bc:ef:f6:0a:11:6e:ca:0d:76:2e:70:ad:3d:
- 04:f7:73:59:48:e6:0d:45:55:b3:29:6a:a0:fb:09:93:b6:4c:
- 7b:a4:4c:aa:d0:6e:10:c0:5c:6c:3c:b3:52:4f:13:b5:db:24:
- 70:ab:85:ef:30:ff:25:d9:fd:7a:da:f2:51:2b:52:d6:9f:60:
- d9:65:18:f6:3e:30:57:5c:63:1c:a7:3a:a2:cd:b4:d8:c1:ed:
- f2:37:46:cf:1a:4c:a6:b1:9d:40:53:5d:ad:22:7a:7c:eb:bf:
- 58:71:a1:3e:c3:2d:09:d1:b9:cf:32:7b:d0:52:38:d1:bc:aa:
- 99:2d:c5:3e:85:4a:7c:bd:7f:c9:0c:52:e6:1d:12:69:7d:78:
- 61:1e:79:e8:eb:b4:5b:4c:c7:7b:b0:66:0d:a7:c4:da:75:5e:
- 98:90:95:f7:c9:4e:5a:0d:24:42:3a:92:80:7a:75:90:9e:42:
- 9d:ab:96:a1:4d:19:2e:26:5c:a2:32:d6:18:f5:69:e3:89:56:
- 88:25:4e:0a:ac:44:91:5d:e5:a9:11:93:e0:93:b0:59:41:ae:
- 86:5b:38:b3
------BEGIN CERTIFICATE-----
-MIIDlDCCAnygAwIBAgIBATANBgkqhkiG9w0BAQsFADA+MREwDwYDVQQKDAhUZXN0
-IE9yZzEpMCcGA1UEAwwgVGVzdCBPcmcgUHJvdmlzaW9uaW5nIENBIFJlbGVhc2Uw
-IhgPMTk3MDAxMDEwMDAwMDBaGA85OTk5MTIzMTIzNTk1OVowPjERMA8GA1UECgwI
-VGVzdCBPcmcxKTAnBgNVBAMMIFRlc3QgT3JnIFByb3Zpc2lvbmluZyBDQSBSZWxl
-YXNlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvJ3LesbhByO2bNCP
-hl5stABJZTjxqkYNaAyLlYkyr70cUhFCno4NqjZl9VP5XT0iovlJP+6N3c8qMUOu
-5AuyyOCjvJsk5N7AjJ9f1j/de7nku/hC+4gSrlEryenGXYeZy+2EYV/4Xg5ufzOo
-6zM3u9J29A6NTsRKrpS/6SNl6Cm/gSYhF3hh7XhCPToa08lsRCmEqT9uavfiuFLs
-gwdR+yANiRVFcWHJ3Ara/6WAPnu60FqwxpL3hPSLdRWgx8N5riHolRKLO24CjQQU
-QMHM7f6Y7DBiEDJK/QLp2j87Whl7PIgi88LCOuIPv7IpZJhVqiHoZPBQCnUTsLf1
-9EpTywIDAQABo4GYMIGVMB0GA1UdDgQWBBS/Qcl7MBmSQ7WLqvI93OG0zSNnIzBm
-BgNVHSMEXzBdgBS/Qcl7MBmSQ7WLqvI93OG0zSNnI6FCpEAwPjERMA8GA1UECgwI
-VGVzdCBPcmcxKTAnBgNVBAMMIFRlc3QgT3JnIFByb3Zpc2lvbmluZyBDQSBSZWxl
-YXNlggEBMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBABksQRhRWc2z
-XWCw/3XQaYnDK5Mix7W54dTtO30mUG76IUKDNM4MR2mDvO/2ChFuyg12LnCtPQT3
-c1lI5g1FVbMpaqD7CZO2THukTKrQbhDAXGw8s1JPE7XbJHCrhe8w/yXZ/Xra8lEr
-UtafYNllGPY+MFdcYxynOqLNtNjB7fI3Rs8aTKaxnUBTXa0ienzrv1hxoT7DLQnR
-uc8ye9BSONG8qpktxT6FSny9f8kMUuYdEml9eGEeeejrtFtMx3uwZg2nxNp1XpiQ
-lffJTloNJEI6koB6dZCeQp2rlqFNGS4mXKIy1hj1aeOJVoglTgqsRJFd5akRk+CT
-sFlBroZbOLM=
------END CERTIFICATE-----
------BEGIN X509 CRL-----
-MIIBgzBtMA0GCSqGSIb3DQEBCwUAMD4xETAPBgNVBAoMCFRlc3QgT3JnMSkwJwYD
-VQQDDCBUZXN0IE9yZyBQcm92aXNpb25pbmcgQ0EgUmVsZWFzZRcNMTUwNDI4MDky
-MjAzWhcNMjkwMTA0MDkyMjAzWjANBgkqhkiG9w0BAQsFAAOCAQEAqDda6fQJqO0T
-KctQiO1dxiqBXrGwzoW1o+p66hIZGo3+Detc3Cm9KJuB7Z5BCkUvNELTwNAOwdhO
-Nlflr5s4CobcRHr2PLdhbFmqkNsAlxWM9q65GcbDTpYmy49j5Kx7N1MOSNZhyyzl
-Aomj0JNK6QIWxzqikm1YBIoh1o5m18ZOWJMC9QAV+cOoFMuoNXr1BXPcE2OuWeUU
-H+XTJQyq4c0VmvJpvK1QOjEBw5TfRGAW5Yy0aRpne/fLygJwxy9Yl96NeehKvLKY
-3WVshVQbEEZoXS3PSO3b3lTTUOCXqCFdwzztvKV8HP+rRx+VLhx9WsCrm3DGXCtN
-nTyvlYybJw==
------END X509 CRL-----
diff --git a/recipes-core/rauc/files/rauc-mark-good.service b/recipes-core/rauc/files/rauc-mark-good.service
deleted file mode 100644
index 8b5decd..0000000
--- a/recipes-core/rauc/files/rauc-mark-good.service
+++ /dev/null
@@ -1,12 +0,0 @@
-[Unit]
-Description=Rauc Good-marking Service
-
-[Service]
-#Type=dbus
-#BusName=de.pengutronix.rauc
-#User=root
-ExecStart=@BINDIR@/rauc status mark-good
-
-[Install]
-WantedBy=multi-user.target
-
diff --git a/recipes-core/rauc/rauc-native_git.bb b/recipes-core/rauc/rauc-native_git.bb
deleted file mode 100644
index 661226a..0000000
--- a/recipes-core/rauc/rauc-native_git.bb
+++ /dev/null
@@ -1,13 +0,0 @@
-require rauc_git.bb
-
-inherit native deploy
-
-do_deploy[sstate-outputdirs] = "${DEPLOY_DIR_TOOLS}"
-
-do_deploy() {
- install -d ${DEPLOYDIR}
- install -m 0755 ${B}/rauc ${DEPLOYDIR}/rauc-${PV}
- ln -sf rauc-${PV} ${DEPLOYDIR}/rauc
-}
-
-addtask deploy before do_package after do_install
diff --git a/recipes-core/rauc/rauc.inc b/recipes-core/rauc/rauc.inc
deleted file mode 100644
index 7b38e15..0000000
--- a/recipes-core/rauc/rauc.inc
+++ /dev/null
@@ -1,76 +0,0 @@
-DESCRIPTION = "rauc update controller for host and target"
-HOMEPAGE = "https://github.com/jluebbe/rauc"
-LICENSE = "GPLv2"
-LIC_FILES_CHKSUM = "file://COPYING;md5=4fbd65380cdd255951079008b364516c"
-
-
-SRC_URI = "file://rauc-mark-good.service "
-
-DEPENDS = "openssl glib-2.0"
-RDEPENDS_${PN}_class-target = "dt-utils-barebox-state"
-RRECOMMENDS_${PN} = "squashfs-tools"
-RRECOMMENDS_${PN}_append_class-target = " mtd-utils ${PN}-mark-good"
-
-PACKAGES =+ "${PN}-service ${PN}-mark-good"
-
-FILES_${PN}-service = "\
- ${systemd_unitdir}/system/rauc.service \
- ${datadir}/dbus-1/system.d/de.pengutronix.rauc.conf \
- ${datadir}/dbus-1/system-services/de.pengutronix.rauc.service \
- "
-FILES_${PN}-mark-good = "${systemd_unitdir}/system/rauc-mark-good.service"
-
-PACKAGECONFIG ??= "service network json"
-PACKAGECONFIG_class-native = ""
-PACKAGECONFIG_class-nativesdk = ""
-PACKAGECONFIG[service] = "--enable-service,--enable-service=no,,${PN}-service"
-PACKAGECONFIG[network] = "--enable-network,--enable-network=no,curl"
-PACKAGECONFIG[json] = "--enable-json,--enable-json=no,json-glib"
-
-inherit autotools pkgconfig gettext systemd
-
-RAUC_KEYRING_FILE ??= "openssl-ca/dev-ca.pem"
-RAUC_KEYRING_FILE[doc] = "Path to keyring file to be placed in rauc images"
-
-SRC_URI += "file://${RAUC_KEYRING_FILE}"
-
-EXTRA_OECONF += "\
- --with-systemdunitdir=${systemd_system_unitdir} \
- --with-dbuspolicydir=${datadir}/dbus-1/system.d \
- --with-dbussystemservicedir=${datadir}/dbus-1/system-services \
- "
-
-do_install_append_class-target () {
-
- # Create rauc config dir
- install -d ${D}${sysconfdir}/rauc
-
- # If a system.conf is provided in files, install it, otherwise warn
- if [ -f ${WORKDIR}/system.conf ]; then
- install -m 0644 ${WORKDIR}/system.conf ${D}${sysconfdir}/rauc/system.conf
- else
- bbwarn "No system.conf provided"
- fi
-
- # CA file
- if [ -f ${WORKDIR}/${RAUC_KEYRING_FILE} ]; then
- install -d ${D}${sysconfdir}/rauc/openssl-ca
- install -m 0644 ${WORKDIR}/${RAUC_KEYRING_FILE} ${D}${sysconfdir}/rauc/openssl-ca/; \
- else
- bbwarn "No keyring file provided"
- fi
-
- install -d ${D}${systemd_unitdir}/system/
- install -m 0644 ${WORKDIR}/rauc-mark-good.service ${D}${systemd_unitdir}/system/
- sed -i -e 's!@BINDIR@!${bindir}!g' ${D}${systemd_unitdir}/system/*.service
-
-}
-
-SYSTEMD_PACKAGES = "${PN}-service ${PN}-mark-good"
-SYSTEMD_SERVICE_${PN}-service = "rauc.service"
-SYSTEMD_SERVICE_${PN}-mark-good = "rauc-mark-good.service"
-SYSTEMD_AUTO_ENABLE_${PN} = "enable"
-
-BBCLASSEXTEND = "nativesdk"
-
-DEFAULT_PREFERENCE = "-1"
diff --git a/recipes-core/rauc/rauc_git.bb b/recipes-core/rauc/rauc_git.bb
deleted file mode 100644
index 10f1bb3..0000000
--- a/recipes-core/rauc/rauc_git.bb
+++ /dev/null
@@ -1,11 +0,0 @@
-require rauc.inc
-PR = "r9"
-
-SRC_URI_append = " \
- git://github.com/jluebbe/rauc.git;protocol=https \
- "
-
-PV = "0+git${SRCPV}"
-S = "${WORKDIR}/git"
-
-SRCREV = "aece736bba159f13427feae41b4f17039f6d979f"