Message ID | 20230331162042.1801766-13-jose.quaresma@foundries.io |
---|---|
State | New |
Headers | show |
Series | [[yocto,meta-lts-mixins,kirkstone/go] 13/16] go: use go as CVE product for all golang recipe veriants | expand |
diff --git a/recipes-devtools/go-1.20/go-binary-native_1.20.1.bb b/recipes-devtools/go-1.20/go-binary-native_1.20.1.bb index 3eb80fd..2393345 100644 --- a/recipes-devtools/go-1.20/go-binary-native_1.20.1.bb +++ b/recipes-devtools/go-1.20/go-binary-native_1.20.1.bb @@ -16,6 +16,8 @@ SRC_URI[go_linux_ppc64le.sha256sum] = "85cfd4b89b48c94030783b6e9e619e35557862358 UPSTREAM_CHECK_URI = "https://golang.org/dl/" UPSTREAM_CHECK_REGEX = "go(?P<pver>\d+(\.\d+)+)\.linux" +CVE_PRODUCT = "go" + S = "${WORKDIR}/go" inherit goarch native diff --git a/recipes-devtools/go-1.20/go-common.inc b/recipes-devtools/go-1.20/go-common.inc index 83f8db7..96e32ee 100644 --- a/recipes-devtools/go-1.20/go-common.inc +++ b/recipes-devtools/go-1.20/go-common.inc @@ -19,6 +19,9 @@ S = "${WORKDIR}/go" B = "${S}" UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.src\.tar" +# all recipe variants are created from the same product +CVE_PRODUCT = "go" + INHIBIT_PACKAGE_DEBUG_SPLIT = "1" SSTATE_SCAN_CMD = "true"