From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6989998000320806912 X-Received: by 2002:a05:651c:12c4:: with SMTP id 4mr8468301lje.320.1629303725490; Wed, 18 Aug 2021 09:22:05 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a05:651c:b09:: with SMTP id b9ls533221ljr.6.gmail; Wed, 18 Aug 2021 09:22:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwslbd/z+TwIgek3pZmrg1/XN//+5T0qIme3YBLmIxR/uIhXXXufLmagrqash6jiWWgQPix X-Received: by 2002:a2e:a449:: with SMTP id v9mr8974765ljn.25.1629303724276; Wed, 18 Aug 2021 09:22:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629303724; cv=none; d=google.com; s=arc-20160816; b=oL2jpd9gJ23meE5opwyokrbtVsVqA7WHzE9tyOMVzDYFr3/BGIY/VZ1FH/njewHMOd xN2zPw6oHruonkRLcSfmRVLwRCcnX42Y8CoeryMqW7C7dL/hWAelGv7tybcNYlvRTUl3 Xe1L6lMSabPtjxRZhu9CAls7FVe/dGo9m4qZ0bRohk6neJbHzI/o4jYbOWBJlOV8ox/z 0fb7vHp6NgNX3AvceCitpgcAGBAZgqr2AAQgSJNVJ2xJOCG2wjh0XtVHFFsfZ5kaTI7r +0fciK8lkzrfHY7CR5/MWHeG7N8sM8KK/n/VEJhPR55NsxBZ1Pha1ABu8rDw8pTAAtQ5 fD2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:cc:to:subject; bh=adlv81U4QgThiEsGudPwU2igHhDEHcYu/utyq4C4iAM=; b=NImTy41q2X54cmnHamRRl8AKchYE4xYXbVlD5aiuTajEYetO07GeDVjgxhoQQwpZem RbhYDhSxbSQhGWFIV8U5dEURALxZKpdW1S5p57f7j/pm0sS9S4gUdn6TjFZB35yZ+USi d43xeqxXMYo2gq9mHah+v0SZ5BCpqC0Cgh3fPnKyVzjkjxH2u5UdNcsjltoDYnskr/vz XBdgGNg4i0L1iuqsNxjsn0Fhdfi5mjb4j/ZBeHRCFAF00T6Ny7BUVUBVdUqb+1F+o4Kf HR95QkdLJ8tgrxCGmo89HBFnCWt3RTSX6dq82A9mW9UI6KTxjFgKz15G9YVJyRG8pjG7 q08w== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from david.siemens.de (david.siemens.de. [192.35.17.14]) by gmr-mx.google.com with ESMTPS id n9si12754ljj.8.2021.08.18.09.22.04 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 18 Aug 2021 09:22:04 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) client-ip=192.35.17.14; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id 17IGM3Bd006251 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 18 Aug 2021 18:22:03 +0200 Received: from [167.87.0.29] ([167.87.0.29]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 17IGM2Zs025808; Wed, 18 Aug 2021 18:22:03 +0200 Subject: Re: [PATCH v5 3/5] classes: allow more control over container image name and tag To: Anton Mikanovich , Henning Schild , isar-users@googlegroups.com Cc: Silvano Cirujano Cuesta References: <20210805160949.14790-1-henning.schild@siemens.com> <20210805160949.14790-4-henning.schild@siemens.com> From: Jan Kiszka Message-ID: <16ef4e87-73d5-656a-1ff7-85ab27703e00@siemens.com> Date: Wed, 18 Aug 2021 18:22:02 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-TUID: AQvtrPpOo0aJ On 18.08.21 18:19, Anton Mikanovich wrote: > 05.08.2021 19:09, Henning Schild wrote: >> diff --git a/doc/user_manual.md b/doc/user_manual.md >> index cf7dc2fee35e..e5c07bd41fc5 100644 >> --- a/doc/user_manual.md >> +++ b/doc/user_manual.md >> @@ -1070,14 +1070,14 @@ bitbake -c do_populate_sdk >> mc:qemuarm-buster:isar-image-base >>    - Load the SDK container image into the Docker Daemon >>     ``` >> -docker load -i >> build/tmp/deploy/images/qemuarm/sdk-debian-buster-armhf-docker-archive.tar.xz >> >> +docker load -i >> build/tmp/deploy/images/qemuarm/isar-image-base-debian-buster-armhf-1.0-r0-docker-archive.tar.xz >> >>   ``` >>      - Run a container using the SDK container image (following >> commands starting >>      with `#~:` are to be run in the container) >>     ``` >> -docker run --rm -ti --volume "$(pwd):/build" >> isar-sdk-buster-armhf:latest >> +docker run --rm -ti --volume "$(pwd):/build" >> isar-image-base-debian-buster-armhf:1.0-r0 >>   ``` >>      - Check that cross toolchains are installed >> diff --git a/meta/classes/image-sdk-extension.bbclass >> b/meta/classes/image-sdk-extension.bbclass >> index 426b92595554..fa15b588068c 100644 >> --- a/meta/classes/image-sdk-extension.bbclass >> +++ b/meta/classes/image-sdk-extension.bbclass >> @@ -80,7 +80,7 @@ do_populate_sdk() { >>       # generate the SDK in all the desired container formats >>       if [ -n "${sdk_container_formats}" ] ; then >>           bbnote "Generating SDK container in ${sdk_container_formats} >> format" >> -        containerize_rootfs "${SDKCHROOT_DIR}" >> "sdk-${DISTRO}-${DISTRO_ARCH}" "${sdk_container_formats}" >> +        containerize_rootfs "${SDKCHROOT_DIR}" >> "${sdk_container_formats}" >>       fi >>   } >>   > > This might be wrong. Containerized rootfs image and containerized sdk > image are using the same name, so output files will be overwritten. > Meantime normal non-containerized SDK image is still using sdk-*.tar.xz > output file mask. > Good catch, the resulting filename for the SDK should be kept (already used downstream). Jan -- Siemens AG, T RDA IOT Corporate Competence Center Embedded Linux