From patchwork Tue Oct 15 16:07:34 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Niko Mauno X-Patchwork-Id: 50720 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D199AD1D889 for ; Tue, 15 Oct 2024 16:08:19 +0000 (UTC) Received: from EUR02-AM0-obe.outbound.protection.outlook.com (EUR02-AM0-obe.outbound.protection.outlook.com [40.107.247.117]) by mx.groups.io with SMTP id smtpd.web11.685.1729008491090319796 for ; Tue, 15 Oct 2024 09:08:12 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@vaisala.com header.s=selector1 header.b=ARWHxby+; spf=permerror, err=parse error for token &{10 18 spf3.vaisala.com}: parse error for token &{10 18 _spf-dc57.sapsf.eu}: limit exceeded (domain: vaisala.com, ip: 40.107.247.117, mailfrom: niko.mauno@vaisala.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Enx+R9aSexzz1DSX5t9d3JATrTyKp9CK8fKkW+MJTts4yWKt1L69f9NBPyeOPFug29eLS1T6p7xjmQZf780dzHZqIsCEcCmYIkimSqh0fB8RXB1OtYq0B0/7DHIaT1CQpZ71QSC6gqytAhzolt93SCc7Hbt88VOKSktTLKqwKlAmVhLLjSFtUNjFZNDrTZn1/qKVUUfoJcxKts4nHZcarJhNPbPJVipNXLzydCqJTatyhyyze1fPsFqBXWHpbwP+iOgNZn4E3wKk4hAMTKNA5fU9fA1ZKt2Qk/PIkUIbAkbTmAAle3cw+Qu0XLqaAwEfwnB8ZYVlOyJWdtGKfRHxgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=s0WU3BCTt6lG929eKMedZv8JVEiNV0xRjPgd7vaFeCk=; b=vpHe1BnBk1WF6uOTiUMdljkdEp9zQaIqNBbIiq1JzJlyal49HFNTfjjCVv41trDkemTY1J2It2jWwuTB6Qw9N5QDbip5hqpbSmS7NraVxikfWmro/6fuykgekuP1CKd1sL3i0WZxhTQN36+jXBMxrjpaKFkHF9kZt4VHYGl+OShN1Z6F5tAnR9iS/418i5vDqsKIUttQw2mcCydjORvC/OMiDMcyfend78Fo0ZF11nG45SKxs2QnbEfUiJoPDipQIVzN6vxOpFQe1ByxqO8DsID9VTYdCfoeHYAqVU6vMx//SaBcFG011S0U9Sgoo3otadFhBi1eBAZqhBczD+SARA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vaisala.com; dmarc=pass action=none header.from=vaisala.com; dkim=pass header.d=vaisala.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vaisala.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=s0WU3BCTt6lG929eKMedZv8JVEiNV0xRjPgd7vaFeCk=; b=ARWHxby+F/ZW6qHsv/IVGS1NZBFs36DAOftOOAF1lPNkc+QNLlHP7PSehlEhreGvyApSJs/QZ0Q3rHXHNA/SvfgEH6aqWEvif4RPQP1NYFKT5vbCWAVOvH9Oe2a8yIXfA3onKg/hHvvvoVZZV86IF6M4ZOLhjrIisdMxVHvPJq+wFGydYOiZPFrCLAojT5ppLVmwWZSc3UpwAVorxHymCBifk2LIisSbETrHyLjqKpzI2/c/uD1x0ce7UxZYaQyRXSHT3s0lBpt0yGZTnrgWEbZDmFsSLgK0+GnqDB3M/eyIZIYodjqd7swjdxG9bQMbOvthncNcH/Rg9JQ1AZtJnA== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=vaisala.com; Received: from AS4PR06MB8447.eurprd06.prod.outlook.com (2603:10a6:20b:4e2::11) by VI0PR06MB9207.eurprd06.prod.outlook.com (2603:10a6:800:245::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8048.27; Tue, 15 Oct 2024 16:08:03 +0000 Received: from AS4PR06MB8447.eurprd06.prod.outlook.com ([fe80::af93:b150:b886:b2bc]) by AS4PR06MB8447.eurprd06.prod.outlook.com ([fe80::af93:b150:b886:b2bc%6]) with mapi id 15.20.8048.020; Tue, 15 Oct 2024 16:08:03 +0000 From: Niko Mauno To: docs@lists.yoctoproject.org CC: quentin.schulz@cherry.de, Niko Mauno Subject: [PATCHv2 1/2] docs: Replace VOLATILE_LOG_DIR with FILESYSTEM_PERMS_TABLES Date: Tue, 15 Oct 2024 16:07:34 +0000 Message-ID: <20241015160735.3066914-1-niko.mauno@vaisala.com> X-Mailer: git-send-email 2.39.2 X-ClientProxiedBy: GV2PEPF00003848.SWEP280.PROD.OUTLOOK.COM (2603:10a6:144:1:0:9:0:6) To AS4PR06MB8447.eurprd06.prod.outlook.com (2603:10a6:20b:4e2::11) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS4PR06MB8447:EE_|VI0PR06MB9207:EE_ X-MS-Office365-Filtering-Correlation-Id: 023f9779-a7f0-4862-e635-08dced338c1d X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|366016|52116014|376014|1800799024|38350700014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS4PR06MB8447.eurprd06.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(52116014)(376014)(1800799024)(38350700014);DIR:OUT;SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: vaisala.com X-MS-Exchange-CrossTenant-Network-Message-Id: 023f9779-a7f0-4862-e635-08dced338c1d X-MS-Exchange-CrossTenant-AuthSource: AS4PR06MB8447.eurprd06.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Oct 2024 16:08:03.0435 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 6d7393e0-41f5-4c2e-9b12-4c2be5da5c57 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: eVV+/+lFAuX3b5EP0UCuaPNbV/cqmxnaIw3uv+Grw0lJFCs3uUPLluodK7rZXCdh4pKWTKMrItt+3MhmiRyCpA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI0PR06MB9207 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 15 Oct 2024 16:08:19 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/docs/message/5491 The VOLATILE_LOG_DIR variable was removed and it's functionality replaced with a FILESYSTEM_PERMS_TABLES entry in https://git.yoctoproject.org/poky/commit/?id=2f8806deb7655b37d6f8d12ff54680d6acf7a298 ("bitbake.conf: drop VOLATILE_LOG_DIR, use FILESYSTEM_PERMS_TABLES instead") Signed-off-by: Niko Mauno --- .../migration-guides/migration-5.1.rst | 6 +++ documentation/ref-manual/features.rst | 5 --- documentation/ref-manual/variables.rst | 38 +++++++++---------- 3 files changed, 24 insertions(+), 25 deletions(-) diff --git a/documentation/migration-guides/migration-5.1.rst b/documentation/migration-guides/migration-5.1.rst index 298ff3e250..f58de3156d 100644 --- a/documentation/migration-guides/migration-5.1.rst +++ b/documentation/migration-guides/migration-5.1.rst @@ -117,6 +117,12 @@ Removed variables The following variables have been removed: +- ``VOLATILE_LOG_DIR``: :term:`FILESYSTEM_PERMS_TABLES` is now used instead. + By default, ``FILESYSTEM_PERMS_TABLES`` now contains the value + ``files/fs-perms-volatile-log.txt``, which means that volatile log is + enabled. Users can disable the volatile log by removing the value + ``files/fs-perms-volatile-log.txt`` from ``FILESYSTEM_PERMS_TABLES``. + .. _migration-5.1-removed-recipes: Removed recipes diff --git a/documentation/ref-manual/features.rst b/documentation/ref-manual/features.rst index b2ba731bb2..84ebfa81ae 100644 --- a/documentation/ref-manual/features.rst +++ b/documentation/ref-manual/features.rst @@ -325,11 +325,6 @@ The image features available for all images are: the ``/var/log/postinstall.log`` file on first boot of the image on the target system. - .. note:: - - To make the ``/var/log`` directory on the target persistent, use the - :term:`VOLATILE_LOG_DIR` variable by setting it to "no". - - *ptest-pkgs:* Installs ptest packages for all ptest-enabled recipes. - *read-only-rootfs:* Creates an image whose root filesystem is diff --git a/documentation/ref-manual/variables.rst b/documentation/ref-manual/variables.rst index 32c9e7407d..62a225ed1b 100644 --- a/documentation/ref-manual/variables.rst +++ b/documentation/ref-manual/variables.rst @@ -13,7 +13,7 @@ system and gives an overview of their function and contents. :term:`K ` :term:`L ` :term:`M ` :term:`N ` :term:`O ` :term:`P` :term:`R ` :term:`S` :term:`T` -:term:`U ` :term:`V ` +:term:`U ` :term:`V ` :term:`W ` :term:`X ` .. glossary:: @@ -2988,26 +2988,32 @@ system and gives an overview of their function and contents. :ref:`ref-tasks-patch` task as well. :term:`FILESYSTEM_PERMS_TABLES` - Allows you to define your own file permissions settings table as part + Allows you to define your own file permissions settings tables as part of your configuration for the packaging process. For example, suppose you need a consistent set of custom permissions for a set of groups and users across an entire work project. It is best to do this in the packages themselves but this is not always possible. - By default, the OpenEmbedded build system uses the ``fs-perms.txt``, - which is located in the ``meta/files`` folder in the :term:`Source Directory`. - If you create your own file - permissions setting table, you should place it in your layer or the + By default, the OpenEmbedded build system uses the ``fs-perms.txt`` and + ``fs-perms-volatile-log.txt`` which are located in the ``meta/files`` + folder in the :term:`Source Directory`. If you create your own file + permission setting tables, you should place those in your layer or the distro's layer. - You define the :term:`FILESYSTEM_PERMS_TABLES` variable in the - ``conf/local.conf`` file, which is found in the :term:`Build Directory`, - to point to your custom ``fs-perms.txt``. You can specify more than a - single file permissions setting table. The paths you specify to these - files must be defined within the :term:`BBPATH` variable. + You can override the value of :term:`FILESYSTEM_PERMS_TABLES` variable + in the ``conf/local.conf`` file, which is found in the + :term:`Build Directory`, to point to your custom permission table files. + You can specify one or more file permissions setting tables. The paths + that you specify to these files must be defined within the :term:`BBPATH` + variable. + + In order to disable the volatile log, which is enabled by default, one + can remove the ``files/fs-perms-volatile-log.txt`` value from + ``FILESYSTEM_PERMS_TABLES``. For guidance on how to create your own file permissions settings - table file, examine the existing ``fs-perms.txt``. + table files, examine the existing ``fs-perms.txt`` and + ``fs-perms-volatile-log.txt``. :term:`FIT_ADDRESS_CELLS` Specifies the value of the ``#address-cells`` value for the @@ -9983,14 +9989,6 @@ system and gives an overview of their function and contents. PACKAGE_INSTALL = "${INITRAMFS_SCRIPTS} ${VIRTUAL-RUNTIME_base-utils} base-passwd" - :term:`VOLATILE_LOG_DIR` - Specifies the persistence of the target's ``/var/log`` directory, - which is used to house postinstall target log files. - - By default, :term:`VOLATILE_LOG_DIR` is set to "yes", which means the - file is not persistent. You can override this setting by setting the - variable to "no" to make the log directory persistent. - :term:`VOLATILE_TMP_DIR` Specifies the persistence of the target's ``/tmp`` directory.