public inbox for isar-users@googlegroups.com
 help / color / mirror / Atom feed
From: Vijai Kumar K <vijaikumar.kanagarajan@gmail.com>
To: isar-users@googlegroups.com
Cc: henning.schild@siemens.com, claudius.heine.ext@siemens.com,
	jan.kiszka@siemens.com, ibr@radix50.net
Subject: Discussion: Base-apt features
Date: Wed, 25 Sep 2019 13:11:22 +0530	[thread overview]
Message-ID: <20190925074122.GA12490@lightning> (raw)

Hi All,

Starting this thread to discuss the base-apt features and limitations.

Here I am listing down some of the issues/features and possibly the
need for them.


1. Support for adding source packages.

Currently we have support only for binaries. The corresponding source
files could also be added. 


2. Support for using password protected keys.

It is a good practice to have the gpg key protected to have an additional
level of security. Right now ISAR does not have provisions to use password
protected keys.


3. Support for specifying the signing key.

Right now, the signing mechanism uses the default gpg key of the system.
This is problematic in many ways. Especially for CI. In the current
implementation, eventhough we specify the key, we are not really using it.


4. Support for adding packages only to base-apt.

Sometimes, we might need a package to be present in base-apt but not in
the target yet. Things like dev & dbg packages. It would be good if we
have something like BASE_APT_INSTALL which contains the list which would
be populated only in base-apt.


5. Refactoring code to consolidate reprepro calls.

Right now, reprepro calls are spread across the build system. Its dependencies
are spread across too(Handling envs like GNUPGHOME, distributions file etc).
My first thought is to have a seperate module implemented to handle these
calls.

Like how https://github.com/openembedded/openembedded-core/blob/master/meta/lib/oe/gpg_sign.py
is used for all signing purpose.

Please add more if you have some features/limitations which needs to be addressed.

Thanks,
Vijai Kumar K

             reply	other threads:[~2019-09-25  7:41 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-09-25  7:41 Vijai Kumar K [this message]
2019-09-25  8:12 ` Baurzhan Ismagulov
2019-09-25  9:02   ` Vijai Kumar K
2019-09-25  9:51     ` Baurzhan Ismagulov
2019-09-25 10:14 ` Claudius Heine
2019-09-25 10:26   ` Baurzhan Ismagulov
2019-09-25 11:56     ` Claudius Heine
2019-09-25 12:19       ` Baurzhan Ismagulov
2019-09-25 12:29         ` Jan Kiszka
2019-09-25 12:39     ` Claudius Heine
2019-09-26  9:40 ` Henning Schild
2019-09-26 11:02   ` Vijai Kumar K
2019-09-26 11:30     ` Henning Schild

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190925074122.GA12490@lightning \
    --to=vijaikumar.kanagarajan@gmail.com \
    --cc=claudius.heine.ext@siemens.com \
    --cc=henning.schild@siemens.com \
    --cc=ibr@radix50.net \
    --cc=isar-users@googlegroups.com \
    --cc=jan.kiszka@siemens.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox