From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6524973731959275520 X-Received: by 10.28.91.79 with SMTP id p76mr197092wmb.19.1519213833622; Wed, 21 Feb 2018 03:50:33 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 10.223.139.138 with SMTP id o10ls327614wra.1.gmail; Wed, 21 Feb 2018 03:50:33 -0800 (PST) X-Google-Smtp-Source: AH8x225FgKtXxOGs2XGI1klETtUy5capyIxWL0buoI3PwVT0B2TneKMNxLiVsWD5kzD0YuOM4u70 X-Received: by 10.223.166.209 with SMTP id t75mr243071wrc.19.1519213833194; Wed, 21 Feb 2018 03:50:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519213833; cv=none; d=google.com; s=arc-20160816; b=AZEKuxmJ07kbqYEGcZPnKC7pIwsr0hc8plzr/lMzbOb+MbfJJOSt4IjQonfWsJo1IZ ixi0Ui19Q4E3FspRVFJjMshhF4B73lLbEm0rI+yvdAqIvHUCrhexP2b8ZUIoy/sRNEss D1oh/uN4U9mg6M5Vj0xAeq98S0gtfUOM9uY2ElSgMB9lkWnoDL3FvAcA7fTH+xnaq46g tREP1J/Jgyymb8UprVDRu6xwmJ1UucXmZpwd5JhifP47+9uTkXDnyNCjXkaPeLvPhMIe cnTJB37hR4LAM0WHsfgxACeQW6gR/DQ5qMLzYXC/cjqo5FsWB/2Jeg9vwoU42hNMl/6/ 2BQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=references:in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=OJ2pNuX8buiqPBLPP9GMQIzcG3TVcoM0Zz4mnv2iZZE=; b=XeMIXP4LNx9HHSogE00gmORLuvxJUxGiDQzv3autoZBMR0Wu5gvhjb9EM5+OK8DLlx D9Y75jPb59z1WYWwpYqPuVUITDIueI7nLbKQ41Cw8i63IN9F7uQ45Vucc/DxJxNNYXdJ BDplEqtqcgZ21z7Qwctz2VYBuYc1dWtxY+zvG5O8rpFry30cWbeW0UEEcy0HO5Gy3ZrK 8ZT7qK12iik6K0vGoPiFv3wilL3gNehuqaC9O676YH578rqKF8m3a9+7OWZE6fHgEcIB h9g5jMhFBkbcImowPa9Jtt6gfod0QISY7sIGIlNf+I2NO1QTth8L2vf7oh8UUHS/1hjf n4pA== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of claudius.heine.ext@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=claudius.heine.ext@siemens.com Return-Path: Received: from david.siemens.de (david.siemens.de. [192.35.17.14]) by gmr-mx.google.com with ESMTPS id v8si869301wrg.2.2018.02.21.03.50.33 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 21 Feb 2018 03:50:33 -0800 (PST) Received-SPF: pass (google.com: domain of claudius.heine.ext@siemens.com designates 192.35.17.14 as permitted sender) client-ip=192.35.17.14; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of claudius.heine.ext@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=claudius.heine.ext@siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id w1LBoWxI011471 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 21 Feb 2018 12:50:32 +0100 Received: from ring.ppmd.siemens.net (linux-ses-ext02.ppmd.siemens.net [139.25.68.223]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id w1LBoWNv020019; Wed, 21 Feb 2018 12:50:32 +0100 From: claudius.heine.ext@siemens.com To: isar-users@googlegroups.com Cc: Claudius Heine Subject: [PATCH 4/5] meta-isar/isar-image-base: switch to using isar-bootstrap Date: Wed, 21 Feb 2018 12:50:02 +0100 Message-Id: <20180221115003.11163-5-claudius.heine.ext@siemens.com> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180221115003.11163-1-claudius.heine.ext@siemens.com> References: <20180221115003.11163-1-claudius.heine.ext@siemens.com> X-TUID: sC7RtWQ5eXrp From: Claudius Heine This patch removes the multistrap dependency of the isar-image-base recipe and changes it to use the 'isar-bootstrap' and 'isar-bootstrap-helper' instead. Signed-off-by: Claudius Heine --- .../recipes-core/images/files/download_dev-random | 24 -------- .../recipes-core/images/files/multistrap.conf.in | 38 ------------ meta-isar/recipes-core/images/files/setup.sh | 67 ---------------------- meta-isar/recipes-core/images/isar-image-base.bb | 59 +++++-------------- 4 files changed, 14 insertions(+), 174 deletions(-) delete mode 100644 meta-isar/recipes-core/images/files/download_dev-random delete mode 100644 meta-isar/recipes-core/images/files/multistrap.conf.in delete mode 100755 meta-isar/recipes-core/images/files/setup.sh diff --git a/meta-isar/recipes-core/images/files/download_dev-random b/meta-isar/recipes-core/images/files/download_dev-random deleted file mode 100644 index f7f5fe5..0000000 --- a/meta-isar/recipes-core/images/files/download_dev-random +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/sh -# -# This software is a part of ISAR. -# Copyright (C) 2017 ilbers GmbH - -set -e - -readonly ROOTFS="$1" - -if [ ! -c ${ROOTFS}/dev/random ]; then - rm -f ${ROOTFS}/dev/random - mknod "${ROOTFS}/dev/random" c 1 8 - chmod 666 "${ROOTFS}/dev/random" - chown 0:0 "${ROOTFS}/dev/random" -fi - -if [ ! -c ${ROOTFS}/dev/urandom ]; then - rm -f ${ROOTFS}/dev/urandom - mknod "${ROOTFS}/dev/urandom" c 1 9 - chmod 666 "${ROOTFS}/dev/urandom" - chown 0:0 "${ROOTFS}/dev/urandom" -fi - -exit 0 diff --git a/meta-isar/recipes-core/images/files/multistrap.conf.in b/meta-isar/recipes-core/images/files/multistrap.conf.in deleted file mode 100644 index 432b6af..0000000 --- a/meta-isar/recipes-core/images/files/multistrap.conf.in +++ /dev/null @@ -1,38 +0,0 @@ -# This software is a part of ISAR. -# Copyright (C) 2015-2017 ilbers GmbH - -[General] -noauth=true -unpack=true -ignorenativearch=true -bootstrap=##DISTRO_MULTICONF_BOOTSTRAP## Isar -aptsources=##DISTRO_MULTICONF_APTSOURCES## -configscript=##CONFIG_SCRIPT## -setupscript=##SETUP_SCRIPT## -hookdir=##DIR_HOOKS## - -[base] -source=##DISTRO_APT_SOURCE## -suite=##DISTRO_SUITE## -components=##DISTRO_COMPONENTS## -packages=##IMAGE_PREINSTALL## -omitdebsrc=true - -[updates] -source=##DISTRO_APT_SOURCE## -suite=##DISTRO_SUITE##-updates -components=##DISTRO_COMPONENTS## -omitdebsrc=true - -[security] -source=##DISTRO_APT_SOURCE_SEC## -suite=##DISTRO_SUITE##/updates -components=##DISTRO_COMPONENTS## -omitdebsrc=true - -[Isar] -packages=##IMAGE_INSTALL## -source=##DEPLOY_DIR_APT## -suite=##ISAR_DISTRO_SUITE## -components=main -omitdebsrc=true diff --git a/meta-isar/recipes-core/images/files/setup.sh b/meta-isar/recipes-core/images/files/setup.sh deleted file mode 100755 index 39b828c..0000000 --- a/meta-isar/recipes-core/images/files/setup.sh +++ /dev/null @@ -1,67 +0,0 @@ -#!/bin/sh -# -# This software is a part of ISAR. -# Copyright (C) 2015-2016 ilbers GmbH -# -# Based on multistrap/examples/chroot.sh - -set -e - -# The script is called with the following arguments: -# $1 = $DIR - the top directory of the bootstrapped system -# $2 = $ARCH - the specified architecture, already checked with -# dpkg-architecture. -# setup.sh needs to be executable. - -TARGET=$1 - -# Prevent daemons from starting in postinstall during the initial "dpkg -# --configure -a" under QEMU on the build host -if [ -x "$TARGET/sbin/start-stop-daemon" ]; then - echo "initctl: Trying to prevent daemons from starting in $TARGET" - - # Disable start-stop-daemon - mv $TARGET/sbin/start-stop-daemon $TARGET/sbin/start-stop-daemon.REAL - cat > $TARGET/sbin/start-stop-daemon << EOF -#!/bin/sh -echo -echo Warning: Fake start-stop-daemon called, doing nothing -EOF - chmod 755 $TARGET/sbin/start-stop-daemon -fi - -if [ -x "$TARGET/sbin/initctl" ]; then - echo "start-stop-daemon: Trying to prevent daemons from starting in $TARGET" - - # Disable initctl - mv "$TARGET/sbin/initctl" "$TARGET/sbin/initctl.REAL" - cat > $TARGET/sbin/initctl << EOF -#!/bin/sh -echo -echo "Warning: Fake initctl called, doing nothing" -EOF - chmod 755 $TARGET/sbin/initctl -fi - -# Define sysvinit policy 101 to prevent daemons from starting in postinstall -# during the initial "dpkg --configure -a" under QEMU on the build host -if [ -x "$TARGET/sbin/init" -a ! -f "$TARGET/usr/sbin/policy-rc.d" ]; then - echo "sysvinit: Using policy-rc.d to prevent daemons from starting in $TARGET" - - cat > $TARGET/usr/sbin/policy-rc.d << EOF -#!/bin/sh -echo "sysvinit: All runlevel operations denied by policy" >&2 -exit 101 -EOF - chmod a+x $TARGET/usr/sbin/policy-rc.d -fi - -# Install QEMU emulator to execute ARM binaries -if [ ! -x /usr/bin/qemu-arm-static ]; then - echo "qemu-arm-static binary not present, unable to execute ARM binaries" -else - sudo cp /usr/bin/qemu-arm-static ${TARGET}/usr/bin -fi - -# Set hostname -echo "isar" > $TARGET/etc/hostname diff --git a/meta-isar/recipes-core/images/isar-image-base.bb b/meta-isar/recipes-core/images/isar-image-base.bb index b444258..bc29408 100644 --- a/meta-isar/recipes-core/images/isar-image-base.bb +++ b/meta-isar/recipes-core/images/isar-image-base.bb @@ -9,14 +9,12 @@ LICENSE = "gpl-2.0" LIC_FILES_CHKSUM = "file://${LAYERDIR_isar}/licenses/COPYING.GPLv2;md5=751419260aa954499f7abaabaa882bbe" FILESPATH =. "${LAYERDIR_isar}/recipes-core/images/files:" -SRC_URI = "file://multistrap.conf.in \ - file://${DISTRO_CONFIG_SCRIPT} \ - file://setup.sh \ - file://download_dev-random" +SRC_URI = "file://${DISTRO_CONFIG_SCRIPT}" PV = "1.0" inherit image +inherit isar-bootstrap-helper IMAGE_INSTALL += "linux-image-${KERNEL_NAME}" @@ -28,50 +26,21 @@ IMAGE_PREINSTALL += "apt \ WORKDIR = "${TMPDIR}/work/${DISTRO}-${DISTRO_ARCH}/${PN}" -do_rootfs[dirs] = "${WORKDIR}/hooks_multistrap" +do_rootfs[cleandirs] = "${IMAGE_ROOTFS} \ + ${IMAGE_ROOTFS}/isar-apt" do_rootfs() { - E="${@ bb.utils.export_proxies(d)}" - - sudo rm -rf ${IMAGE_ROOTFS} - - chmod +x "${WORKDIR}/${DISTRO_CONFIG_SCRIPT}" - chmod +x "${WORKDIR}/setup.sh" - install -m 755 "${WORKDIR}/download_dev-random" "${WORKDIR}/hooks_multistrap/" - - # Multistrap accepts only relative path in configuration files, so get it: - cd ${TOPDIR} - WORKDIR_REL=${@ os.path.relpath(d.getVar("WORKDIR", True))} - - # Adjust multistrap config - sed -e 's|##IMAGE_PREINSTALL##|${IMAGE_PREINSTALL}|g' \ - -e 's|##DISTRO_MULTICONF_BOOTSTRAP##|${DISTRO_MULTICONF_BOOTSTRAP}|g' \ - -e 's|##DISTRO_MULTICONF_APTSOURCES##|${DISTRO_MULTICONF_APTSOURCES}|g' \ - -e 's|##DISTRO_APT_SOURCE##|${DISTRO_APT_SOURCE}|g' \ - -e 's|##DISTRO_APT_SOURCE_SEC##|${DISTRO_APT_SOURCE_SEC}|g' \ - -e 's|##DISTRO_SUITE##|${DISTRO_SUITE}|g' \ - -e 's|##DISTRO_COMPONENTS##|${DISTRO_COMPONENTS}|g' \ - -e 's|##CONFIG_SCRIPT##|./'"$WORKDIR_REL"'/${DISTRO_CONFIG_SCRIPT}|g' \ - -e 's|##SETUP_SCRIPT##|./'"$WORKDIR_REL"'/setup.sh|g' \ - -e 's|##DIR_HOOKS##|./'"$WORKDIR_REL"'/hooks_multistrap|g' \ - -e 's|##IMAGE_INSTALL##|${IMAGE_INSTALL}|g' \ - -e 's|##DEPLOY_DIR_APT##|copy:///${DEPLOY_DIR_APT}/${DISTRO}|g' \ - -e 's|##ISAR_DISTRO_SUITE##|${DEBDISTRONAME}|g' \ - "${WORKDIR}/multistrap.conf.in" > "${WORKDIR}/multistrap.conf" - - # Do not use bitbake flag [dirs] here because this folder should have - # specific ownership. - [ ! -d ${IMAGE_ROOTFS}/proc ] && sudo install -d -o 0 -g 0 -m 555 ${IMAGE_ROOTFS}/proc - sudo mount -t proc none ${IMAGE_ROOTFS}/proc - - # Create root filesystem. We must use sudo -E here to preserve the environment - # because of proxy settings - sudo -E multistrap -a ${DISTRO_ARCH} -d "${IMAGE_ROOTFS}" -f "${WORKDIR}/multistrap.conf" + setup_root_file_system "${IMAGE_ROOTFS}" ${IMAGE_PREINSTALL} ${IMAGE_INSTALL} # Configure root filesystem - sudo chroot ${IMAGE_ROOTFS} /${DISTRO_CONFIG_SCRIPT} ${MACHINE_SERIAL} ${BAUDRATE_TTY} \ - ${ROOTFS_DEV} - sudo rm "${IMAGE_ROOTFS}/${DISTRO_CONFIG_SCRIPT}" + sudo install -m 755 "${WORKDIR}/${DISTRO_CONFIG_SCRIPT}" "${IMAGE_ROOTFS}" + sudo chroot ${IMAGE_ROOTFS} /${DISTRO_CONFIG_SCRIPT} ${MACHINE_SERIAL} \ + ${BAUDRATE_TTY} \ + ${ROOTFS_DEV} - sudo umount ${IMAGE_ROOTFS}/proc 2>/dev/null || true + # Cleanup + sudo rm "${IMAGE_ROOTFS}/${DISTRO_CONFIG_SCRIPT}" + sudo rm "${IMAGE_ROOTFS}/etc/apt/sources.list.d/isar-apt.list" + sudo umount -l ${IMAGE_ROOTFS}/isar-apt + sudo rmdir ${IMAGE_ROOTFS}/isar-apt } -- 2.16.1