Hi,
After sync-up with kirkstone 4.0.1, I get the following error…
Image CVE report stored in: /home/dwatkins/workspace/mgos/voyager1/build/tmp/deploy/images/mg90/omg-supplement-mfwimages-mg90-20220525182226.rootfs.cve
ERROR: omg-supplement-mfwimages-1.0-r0 do_rootfs: Error executing a python function in exec_func_python() autogenerated:
The stack trace of python calls that resulted in this exception/failure was:
File: 'exec_func_python() autogenerated', lineno: 2, function: <module>
0001:
*** 0002:cve_check_write_rootfs_manifest(d)
0003:
File: '/home/dwatkins/workspace/mgos/voyager1/upstream/yocto/poky/meta/classes/cve-check.bbclass', lineno: 213, function: cve_check_write_rootfs_manifest
0209:
0210:
link_path = os.path.join(deploy_dir, "%s.json" % link_name)
0211:
manifest_path = d.getVar("CVE_CHECK_MANIFEST_JSON")
0212:
bb.note("Generating JSON CVE manifest")
*** 0213:
generate_json_report(json_summary_name, json_summary_link_name)
0214:
bb.plain("Image CVE JSON report stored in: %s" % link_path)
0215:}
0216:
0217:ROOTFS_POSTPROCESS_COMMAND:prepend = "${@'cve_check_write_rootfs_manifest; ' if d.getVar('CVE_CHECK_CREATE_MANIFEST') == '1' else ''}"
Exception: NameError: name 'json_summary_name' is not defined
ERROR: Logfile of failure stored in: /home/dwatkins/workspace/mgos/voyager1/build/tmp/work/mg90-poky-linux-gnueabi/omg-supplement-mfwimages/1.0-r0/temp/log.do_rootfs.16510
ERROR: Task (/home/dwatkins/workspace/mgos/voyager1/meta-mgos-core/recipes-images/images/omg-supplement-mfwimages.bb:do_rootfs) failed with exit code '1'
NOTE: Tasks Summary: Attempted 8400 tasks of which 7718 didn't need to be rerun and 1 failed.
NOTE: Generating JSON CVE summary
CVE report summary created at: /home/dwatkins/workspace/mgos/voyager1/build/tmp/log/cve/cve-summary.json
645c157befa (Davide Gardenal 2022-05-03 09:51:43 +0200 130) json_summary_link_name
= os.path.join(cvelogpath, d.getVar("CVE_CHECK_SUMMARY_FILE_NAME_JSON"))
645c157befa (Davide Gardenal 2022-05-03 09:51:43 +0200 131) json_summary_name
= os.path.join(cvelogpath, "%s-%s.json" % (cve_summary_name, timestamp))
645c157befa (Davide Gardenal 2022-05-03 09:51:43 +0200 132) generate_json_report(json_summary_name,
json_summary_link_name)
645c157befa (Davide Gardenal 2022-05-03 09:51:43 +0200 133) bb.plain("CVE report
summary created at: %s" % json_summary_link_name)
645c157befa (Davide Gardenal 2022-05-03 09:51:43 +0200 210) link_path = os.path.join(deploy_dir,
"%s.json" % link_name)
645c157befa (Davide Gardenal 2022-05-03 09:51:43 +0200 211) manifest_path = d.getVar("CVE_CHECK_MANIFEST_JSON")
777f1d42b62 (Marta Rybczynska 2022-03-29 14:54:31 +0200 212) bb.note("Generating JSON CVE manifest")
645c157befa (Davide Gardenal 2022-05-03 09:51:43 +0200 213) generate_json_report(json_summary_name,
json_summary_link_name)
645c157befa (Davide Gardenal 2022-05-03 09:51:43 +0200 214) bb.plain("Image CVE
JSON report stored in: %s" % link_path)
I am not sure whether we need to locally setup the “json_summary_name” in “python cve_check_write_rootfs_manifest ()” like was done inside “python cve_save_summary_handler ()” or if something different was supposed to be passed to “generate_json_report()”
instead.
Regards,
Darcy
Darcy Watkins :: Senior Staff Engineer, Firmware
SIERRA WIRELESS
Direct +1 604 233 7989 :: Fax +1 604 231 1109 :: Main +1 604 231 1100
13811 Wireless Way :: Richmond, BC Canada V6V 3A4
[M4]
dwatkins@... :: www.sierrawireless.com