Lines Matching +full:json +full:- +full:schema

2 # Zap the root password if debug-tweaks and empty-root-password features are not enabled
3 …S_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'empty-root-password' ]…
5 …ccept logins from accounts with an empty password string if debug-tweaks or allow-empty-password i…
6 …S_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'allow-empty-password' …
8 # Allow dropbear/openssh to accept root logins if debug-tweaks or allow-root-login is enabled
9 …S_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'allow-root-login' ], "…
11 # Enable postinst logging if debug-tweaks or post-install-logging is enabled
12 …_COMMAND += '${@bb.utils.contains_any("IMAGE_FEATURES", [ 'debug-tweaks', 'post-install-logging' ]…
17 # Tweak files in /etc if read-only-rootfs is enabled
18 ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", "read-only-rootfs", "read_onl…
26 APPEND:append = '${@bb.utils.contains("IMAGE_FEATURES", "read-only-rootfs", " ro", "", d)}'
28 # Generates test data file with data store variables expanded in json format
37 …?= '${@bb.utils.contains_any("IMAGE_FEATURES", [ "x11-base", "weston" ], "graphical.target", "mult…
44 inherit image-artifact-names
51 # Note that useradd-staticids.bbclass has to be used to ensure that
66 [ -e $conffile ] || continue
67 grep -v "^#" $conffile | sed -e '/^$/d' | while read type name id comment; do
69 useradd_params="--shell /sbin/nologin"
70 [ "$id" != "-" ] && useradd_params="$useradd_params --uid $id"
71 [ "$comment" != "-" ] && useradd_params="$useradd_params --comment $comment"
72 useradd_params="$useradd_params --system $name"
73 eval useradd --root ${IMAGE_ROOTFS} $useradd_params || true
76 [ "$id" != "-" ] && groupadd_params="$groupadd_params --gid $id"
77 groupadd_params="$groupadd_params --system $name"
78 eval groupadd --root ${IMAGE_ROOTFS} $groupadd_params || true
81 eval groupadd --root ${IMAGE_ROOTFS} --system $group || true
82 eval useradd --root ${IMAGE_ROOTFS} --shell /sbin/nologin --system $name --no-user-group || true
83 eval usermod --root ${IMAGE_ROOTFS} -a -G $group $name
90 # A hook function to support read-only-rootfs IMAGE_FEATURES
94 if [ -f ${IMAGE_ROOTFS}/etc/fstab ]; then
95 …sed -i -e '/^[#[:space:]]*\/dev\/root/{s/defaults/ro/;s/\([[:space:]]*[[:digit:]]\)\([[:space:]]*\…
98 # Tweak the "mount -o remount,rw /" command in busybox-inittab inittab
99 if [ -f ${IMAGE_ROOTFS}/etc/inittab ]; then
100 sed -i 's|/bin/mount -o remount,rw /|/bin/mount -o remount,ro /|' ${IMAGE_ROOTFS}/etc/inittab
103 # If we're using openssh and the /etc/ssh directory has no pre-generated keys,
106 # If overlayfs-etc is used this is not done as /etc is treated as writable
107 # If stateless-rootfs is enabled this is always done as we don't want to save keys then
108 …ls.contains('IMAGE_FEATURES', 'overlayfs-etc', True, False, d) or bb.utils.contains('IMAGE_FEATURE…
109 if [ -d ${IMAGE_ROOTFS}/etc/ssh ]; then
110 if [ -e ${IMAGE_ROOTFS}/etc/ssh/ssh_host_rsa_key ]; then
111 echo "SYSCONFDIR=\${SYSCONFDIR:-/etc/ssh}" >> ${IMAGE_ROOTFS}/etc/default/ssh
114 echo "SYSCONFDIR=\${SYSCONFDIR:-/var/run/ssh}" >> ${IMAGE_ROOTFS}/etc/default/ssh
115 echo "SSHD_OPTS='-f /etc/ssh/sshd_config_readonly'" >> ${IMAGE_ROOTFS}/etc/default/ssh
120 if [ -d ${IMAGE_ROOTFS}/etc/dropbear ]; then
121 if [ ! -e ${IMAGE_ROOTFS}/etc/dropbear/dropbear_rsa_host_key ]; then
129 if [ -e ${IMAGE_ROOTFS}/etc/default/rcS ]; then
130 sed -i 's/ROOTFS_READ_ONLY=no/ROOTFS_READ_ONLY=yes/' ${IMAGE_ROOTFS}/etc/default/rcS
132 # Run populate-volatile.sh at rootfs time to set up basic files
133 # and directories to support read-only rootfs.
134 if [ -x ${IMAGE_ROOTFS}/etc/init.d/populate-volatile.sh ]; then
135 ${IMAGE_ROOTFS}/etc/init.d/populate-volatile.sh
140 # Create machine-id
141 …alero> koen: you have three options: a) run systemd-machine-id-setup at install time, b) have / re…
142 touch ${IMAGE_ROOTFS}${sysconfdir}/machine-id
150 if [ -e ${IMAGE_ROOTFS}/etc/shadow ]; then
151 sed -i 's%^root::%root:*:%' ${IMAGE_ROOTFS}/etc/shadow
153 if [ -e ${IMAGE_ROOTFS}/etc/passwd ]; then
154 sed -i 's%^root::%root:*:%' ${IMAGE_ROOTFS}/etc/passwd
163 if [ -e ${IMAGE_ROOTFS}${sysconfdir}/ssh/$config ]; then
164 …sed -i 's/^[#[:space:]]*PermitEmptyPasswords.*/PermitEmptyPasswords yes/' ${IMAGE_ROOTFS}${sysconf…
168 if [ -e ${IMAGE_ROOTFS}${sbindir}/dropbear ] ; then
169 if grep -q DROPBEAR_EXTRA_ARGS ${IMAGE_ROOTFS}${sysconfdir}/default/dropbear 2>/dev/null ; then
170 if ! grep -q "DROPBEAR_EXTRA_ARGS=.*-B" ${IMAGE_ROOTFS}${sysconfdir}/default/dropbear ; then
171 …sed -i 's/^DROPBEAR_EXTRA_ARGS="*\([^"]*\)"*/DROPBEAR_EXTRA_ARGS="\1 -B"/' ${IMAGE_ROOTFS}${syscon…
174 printf '\nDROPBEAR_EXTRA_ARGS="-B"\n' >> ${IMAGE_ROOTFS}${sysconfdir}/default/dropbear
178 if [ -d ${IMAGE_ROOTFS}${sysconfdir}/pam.d ] ; then
179 for f in `find ${IMAGE_ROOTFS}${sysconfdir}/pam.d/* -type f -exec test -e {} \; -print`
181 sed -i 's/nullok_secure/nullok/' $f
191 if [ -e ${IMAGE_ROOTFS}${sysconfdir}/ssh/$config ]; then
192 …sed -i 's/^[#[:space:]]*PermitRootLogin.*/PermitRootLogin yes/' ${IMAGE_ROOTFS}${sysconfdir}/ssh/$…
196 if [ -e ${IMAGE_ROOTFS}${sbindir}/dropbear ] ; then
197 if grep -q DROPBEAR_EXTRA_ARGS ${IMAGE_ROOTFS}${sysconfdir}/default/dropbear 2>/dev/null ; then
198 sed -i '/^DROPBEAR_EXTRA_ARGS=/ s/-w//' ${IMAGE_ROOTFS}${sysconfdir}/default/dropbear
212 mkdir -p ${IMAGE_ROOTFS}${sysconfdir}/default
221 …if [ -d ${IMAGE_ROOTFS}${sysconfdir}/systemd/system -a -e ${IMAGE_ROOTFS}${systemd_system_unitdir}…
222 …ln -sf ${systemd_system_unitdir}/${SYSTEMD_DEFAULT_TARGET} ${IMAGE_ROOTFS}${sysconfdir}/systemd/sy…
234 if [ -e ${IMAGE_ROOTFS}/etc/fstab ]; then
236 if [ -n "$match" ]; then
237 find ${IMAGE_ROOTFS}/var/volatile -mindepth 1 -delete
244 if [ -h ${IMAGE_ROOTFS}/sbin/init ]; then
252 if [ -L ${IMAGE_ROOTFS}/boot/zImage ]; then
253 (cd ${IMAGE_ROOTFS}/boot/ && for i in `ls zImage-* | sort`; do ln -sf $i zImage; done)
285 sformatted=`date -u -d @${REPRODUCIBLE_TIMESTAMP_ROOTFS} +%4Y%2m%2d%2H%2M%2S`
287 sformatted=`date -u +%4Y%2m%2d%2H%2M%2S`
295 if [ -f ${IMAGE_ROOTFS}/etc/init.d/xserver-nodm ]; then
296 chmod a-x ${IMAGE_ROOTFS}/etc/init.d/xserver-nodm
301 for schema in ${IMAGE_ROOTFS}/etc/gconf/schemas/*.schemas
304 if [ -e $schema ]; then
305 oe-trim-schemas $schema > $schema.new
306 mv $schema.new $schema
312 contaminated="${S}/host-user-contaminated.txt"
313 HOST_USER_UID="$(PSEUDO_UNLOAD=1 id -u)"
314 HOST_USER_GID="$(PSEUDO_UNLOAD=1 id -g)"
316 find "${IMAGE_ROOTFS}" -path "${IMAGE_ROOTFS}/home" -prune -o \
317 -user "$HOST_USER_UID" -print -o -group "$HOST_USER_GID" -print >"$contaminated"
319 sed -e "s,${IMAGE_ROOTFS},," $contaminated | while read line; do
320 … is owned by the same user or group as the user running bitbake:" $line `ls -lan ${IMAGE_ROOTFS}/$…
323 if [ -s "$contaminated" ]; then
331 sysroot-relativelinks.py ${SDK_OUTPUT}/${SDKTARGETSYSROOT}
334 # Generated test data json file
340 testdata_name = os.path.join(deploy_dir, "%s.testdata.json" % d.getVar('IMAGE_NAME'))
346 testdata_link = os.path.join(deploy_dir, "%s.testdata.json" % link_name)
370 sformatted=`date -u -d @${REPRODUCIBLE_TIMESTAMP_ROOTFS} +%4Y%2m%2d%2H%2M%2S`
374 if [ -d ${IMAGE_ROOTFS}${sysconfdir}/gconf ]; then
375 find ${IMAGE_ROOTFS}${sysconfdir}/gconf -name '%gconf.xml' -print0 | xargs -0r \
376 sed -i -e 's@\bmtime="[0-9][0-9]*"@mtime="'${REPRODUCIBLE_TIMESTAMP_ROOTFS}'"@g'
408 if "mount-configured" in qaSkip:
423 '"mount-configured"')