Skip to content
Snippets Groups Projects
  1. Aug 04, 2023
  2. Jul 27, 2023
    • GitBot's avatar
      Integrate gitlab-ci/separate-images-in-multiple-pipelines and 1 more · a51905fe
      GitBot authored
      --
      
      Commit: seco-ne/yocto/infrastructure/gitlab-ci@9406ad75
      
      Yocto build: separate images in multiple pipelines
      
      Instead of building the Yocto image, the Yocto SDK and the FNGSystem
      image in one single pipeline, separate them into three independent
      pipelines that are triggered in parallel.
      
      This makes the concept more modular: we have a single general pipeline
      now which is configurable from outside via variables. Hence we can have
      a custom number of pipelines along with custom build targets in each
      project without having to make code changes in the gitlab-ci project.
      
      The default Yocto manifest pipeline configures three build pipelines:
      
      - yocto-build-jobs
      - sdk-build-jobs
      - fngsystem-build-jobs
      
      In a project including the Yocto manifest pipeline, we can disable
      certain build pipelines using job rules, e.g. disabling the SDK build:
      
      sdk-build-jobs:
        rules:
          - when: never
      
      Furthermore we can add more pipelines by simply adding jobs extending
      the '.build-jobs' class in the project's .gitlab-ci.yml:
      
      yocto-custom-build-jobs:
        extends:
          - .build-jobs
        variables:
          BITBAKE_TASK: build
          CI_PARAM_IMAGE: custom-image
          CI_PARAM_DISTRO: custom-distro
          PACKAGE_TYPE: image
      
      --
      
      Commit: seco-ne/yocto/infrastructure/gitlab-ci@447804d2
      
      .gitlab-ci: increase analyze timeout
      a51905fe
  3. Jul 25, 2023
    • GitBot's avatar
      Integrate gitlab-ci/unify-image-and-sdk-package-jobs and 3 more · 85bb5a07
      GitBot authored
      --
      
      Commit: seco-ne/yocto/infrastructure/gitlab-ci@5762a54c
      
      Yocto build: unify image and SDK package jobs
      
      Image and SDK package jobs call the same package script just with
      different arguments. Instead of having two job classes `package_release`
      and `package_sdk` for these two tasks, merge them into the base class
      `package` and make the differences configurable via a variable
      `PACKAGE_TYPE`.
      
      --
      
      Commit: seco-ne/yocto/infrastructure/gitlab-ci@8e72eac2
      
      Yocto build: add variable for manual builds
      
      Instead of hard-coding the rules for manual builds in each actual job,
      conditionally add this to the `buildbase` class and add a variable
      `MANUAL_BUILD` to the according jobs.
      
      --
      
      Commit: seco-ne/yocto/infrastructure/gitlab-ci@e6d71996
      
      Yocto build: unify image and SDK build jobs
      
      Image and SDK builds share a lot of similar code. Instead of having two
      job classes `build_yocto_image` and `build_yocto_sdk` for these two
      tasks, merge them into the base class `build_yocto` and make the
      differences configurable via a variable.
      
      The `dump_install_command` part of the script, which was not executed
      for SDK builds, is always present now, but it's only executed if the
      `INSTALLSCRIPT` variable is set, which is not the case for SDK builds.
      
      The `collect_srcrevs` part of the script is executed in all cases. It
      was not part of the SDK build before, but it's not less relevant there.
      
      --
      
      Commit: seco-ne/yocto/infrastructure/gitlab-ci@f892500f
      
      Yocto build: make main artifacts path configurable
      
      Instead of specifying all possible artifacts paths and abusing the fact
      that GitLab ignores non-existing paths during artifact upload, implement
      a cleaner solution with a configurable path.
      85bb5a07
  4. Jul 24, 2023
  5. Jun 21, 2023
  6. Jun 02, 2023
  7. May 08, 2023
    • Dmitry Petrov's avatar
      Set EX_SSS_BOOT_DO_ERASE to 0 · 5181a4b5
      Dmitry Petrov authored
      If set to 1, all objects, which are handled by Secure chip except for
      predefined ones, are deleted when a client application starts.
      This breaks the logic of existing example, and functions "getbinkey",
      "erasekey", and "decryptaes" start to fail because a requested key is
      already removed when ex_sss_entry() is called.
      5181a4b5
  8. Apr 24, 2023
  9. Apr 19, 2023
  10. Apr 18, 2023
    • Felix Gerking's avatar
      Add setaeskey and decryptaes functions · 81d167f0
      Felix Gerking authored
      New functions:
      * setaeskey: Read text file and inject key with aes policies
      * decryptaes: Use a aes key stored in the SE to decrypt a given input file
      
      Limitations:
      * The decryption can only handle input files smaller or equal 512 bytes
      * The decryptaes function can not handle salted input files
      * The address issue is still present (see previous commit)
      
      The example is only intended to show the se05x API usage and has multiple
      security issues. Therefore, do not use this example in productive cases.
      81d167f0
    • Felix Gerking's avatar
      Initial commit se05x-aes-key · bd43155c
      Felix Gerking authored
      The app provides the functions to:
      1. setkey: Read text file and inject a key at a specified address
      2. getkey: Read out key from a specified address and write it to a file
      3. erasekey: Erase a key at a specific address
      
      At the moment, it is not possible to use all adresses of the SE. This is
      due to failing get_handle requests on some adresses. It looks like
      this is a problem of the build configuration, as the get_handle requests
      work when using the yocto default configuration of the full package.
      bd43155c
Loading