From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6927266035414335488 X-Received: by 2002:a2e:9bce:: with SMTP id w14mr14509445ljj.120.1612879809971; Tue, 09 Feb 2021 06:10:09 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a2e:8952:: with SMTP id b18ls3671232ljk.3.gmail; Tue, 09 Feb 2021 06:10:09 -0800 (PST) X-Google-Smtp-Source: ABdhPJz8yxjAFk4IylYyEx1sB6d5uVhIKERLXRpp08j3Sk4roxxVK/BDhKs+K3oSodApsZ0j9dpj X-Received: by 2002:a2e:8886:: with SMTP id k6mr1680698lji.88.1612879808906; Tue, 09 Feb 2021 06:10:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612879808; cv=none; d=google.com; s=arc-20160816; b=DizcLCZ2d/1bDIJ63k5l2GCfDdbhKhtUP/iDbDZnUqo153HT9P/WVOME62upKfeKvE 9RPIQfGS0zUJDwJy3G41R1y2m4BEAdPBgwhLch+L43FNbmz3icpYnvH2smqydGRAAmbB yIbmI1OBJRMwt/krxjxWrl1t6mers8qMCIGxV6MSeMVG9rCsrtQ+4QAgWMqaUa9U78L5 MphWcTNz8oCY69jCUfsVjQ76rxdtQ68iH8Mb+NQNJfqxXbNfs+j+7lo2Cg0KqdwpHwBr gGtzIif+kT7mwYVtKWbcLwlU+c2VcyWdUhBO0pff9HfJ9fgB1C4O24phyUdIg2YyDLE3 IliQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from; bh=DxJJnCErke0gMsogJODQ9vSIqGqHEVCP2M/A17GtzxE=; b=KkIO2g493HucplAqrY1ibjPuIl2BZAN9J+ppJhPaCVfqc+2tuJ/PCwZyoSNGgmpVk7 EzOawwKb+10JviRKDFqczTa3WzC6OhterHNZPAtwGXB1WMaRG3yp5V70WpzM8B6QqFqU 7iraqRtV6tul9IJ4dKL0mxAAORJEhb0tjWzfv0uysSmRlGmfoe2GspsLAPo7vPpKQ7jk XAksbhAes3UJLWOo47MV50Lc9QIQIo6PkbUhQPe4ysj1yFNTqCnoSo/BRF9buLnNp/28 7tHsa2FqP8TdSeJJCRlro7PhVtpH3FWA175QWFpg3D5RM97eVy9DJpXBDQ5ZXIzwzxo/ 3caQ== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from david.siemens.de (david.siemens.de. [192.35.17.14]) by gmr-mx.google.com with ESMTPS id l22si811986ljh.4.2021.02.09.06.10.08 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 09 Feb 2021 06:10:08 -0800 (PST) Received-SPF: pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 192.35.17.14 as permitted sender) client-ip=192.35.17.14; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id 119EA7Ld006978 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 9 Feb 2021 15:10:08 +0100 Received: from md1sf36c.ad001.siemens.net ([167.87.10.176]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id 119EA6th018204 for ; Tue, 9 Feb 2021 15:10:07 +0100 From: Silvano Cirujano Cuesta To: isar-users@googlegroups.com Subject: [PATCH V2 0/2] Add support for containerized root filesystems Date: Tue, 9 Feb 2021 15:10:03 +0100 Message-Id: <20210209141005.45491-1-silvano.cirujano-cuesta@siemens.com> X-Mailer: git-send-email 2.30.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TUID: VwQIqmAXNQDK This patch series provides support for containerized root filesystems, for both target images and SDKs. For containerized target images the new image type `container-img` has been added. For containerized SDKs the task `populate_sdk` has been extended. Containerized root filesystems are easy to distribute and run, enabling this way following scenarios: - Use ISAR to build container images meant to be run only in containers. - Use the same ISAR configuration to build images for containers, VMs and bare-metal. - Easy SDK distribution and "installation". - Quickly testing certain applications in the workstation using the target root filesystem. In order to build containerized rootfilesystems `IMAGE_TYPE` as to be `container-img`, additionally the container image format can be selected with the variable `CONTAINER_FORMAT`. The default format is `docker-archive`. More information about its usage is documented in the file docs/user_manual.md. A PoC/demo of this functionality (only the SDK part) has been created based on the project https://github.com/siemens/meta-iot2050. Jan Kiszka already tested and liked it! => https://github.com/siemens/meta-iot2050/issues/86#issuecomment-768907845 In order to get a feeling about its usage (you need Docker or Podman), follow these simple copy&paste instructions: https://github.com/Silvanoc/meta-iot2050/blob/master/kas/BUILDING-SDK-CONTAINER.md#running-the-sdk Build instructions are available in the upper part of that document. Two new dependencies are required to create containerized root filesystems (as specified in the documentation). Typical container image management actions (e.g. push an image to a container image regitry) are out of scope. Available tools (Docker, Skopeo, Buildah, Podman,...) should be used for these actions. A patch will follow this one to get the dependencies into the container images being provided by the project https://github.com/siemens/kas (for `kas-container`, for example). Silvano Cirujano Cuesta (2): images: add support for container images docs: document creation of container images doc/user_manual.md | 127 +++++++++++++++++++++++++++++ meta/classes/container-img.bbclass | 99 ++++++++++++++++++++++ 2 files changed, 226 insertions(+) create mode 100644 meta/classes/container-img.bbclass -- 2.30.0