From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6927266035414335488 X-Received: by 2002:a19:4811:: with SMTP id v17mr2522857lfa.600.1615393695862; Wed, 10 Mar 2021 08:28:15 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a19:ac46:: with SMTP id r6ls2276681lfc.2.gmail; Wed, 10 Mar 2021 08:28:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJz3kC40zWNzYGhZEovsUu7NJUeko6VV1WbYAvRGdSZteiel7BM6cLxmjAbyYmqr2kS4pfe4 X-Received: by 2002:a19:f001:: with SMTP id p1mr2620748lfc.447.1615393694793; Wed, 10 Mar 2021 08:28:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615393694; cv=none; d=google.com; s=arc-20160816; b=h6lXqqS60hol4iMWnGuNfTPQYK5AYrCs3TYnyC2H4NjDchBtgIuSklJwjLMa7tAAKb Z0cNK2TrDWKLCgkh/MsCF42lR0NJY+dgpXAenXplj4xA2Ig1Yd9c/kwU5Tc8da+yAkCD /npDYlOMoK/lgZo/z9zADHxACcWkeJ1Us7rGqN7uRAUIFeFzYmCQimxuijSpvzcOTpRk 3UiwU7D+7qcG12EzlZbx+3eMc7HN+Tl7s5aPDoEd120ZFnVer+8T20i+htmFct/1dKkx TncX43gBNQj8uBtjZIsAyVLgwFsHSy7vedfEnrviwOYtxXxLieWV0PQsWe016fUa7k9A YTcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:cc:to:from:date; bh=3YUccZAxrML9GAOIaJwveLdl0Cx5nqe+tgDdE/cV9ow=; b=CPmSTWi1KNbPJnApM6fvSwm4TBgRRTiN50N5FzWVJc0A13oJ7HQB4S1mnhVWwQNiUd KE/M7UnIbvP+0OaRnis7mFJwUNIfwkJlQELmm2zht4maIVFwgKviz1VBct534it42qRa of/qpYpPOLT8FNvon/viIPT6UYw/VJJcPdK9TX5oU+z4wFMxSnkEFpme9MHgp3xS45oQ WYGqq4Oud+i5sdM6e2aPtrqnePI919E6sNNnX83ZPCS0HUjwXGugsiMdsYr8Fez0MMC6 1/PtstKkSLwfocCxWcLLoO4ki9MGct68EUgRuUYwQvdzBw/jbAnKiW1CKWPrJV84Ud5b 57pQ== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=henning.schild@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from lizzard.sbs.de (lizzard.sbs.de. [194.138.37.39]) by gmr-mx.google.com with ESMTPS id j12si633368lfg.8.2021.03.10.08.28.14 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 10 Mar 2021 08:28:14 -0800 (PST) Received-SPF: pass (google.com: domain of henning.schild@siemens.com designates 194.138.37.39 as permitted sender) client-ip=194.138.37.39; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of henning.schild@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=henning.schild@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by lizzard.sbs.de (8.15.2/8.15.2) with ESMTPS id 12AGSENG009909 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Wed, 10 Mar 2021 17:28:14 +0100 Received: from md1za8fc.ad001.siemens.net ([167.87.35.127]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 12AGSD2n017803; Wed, 10 Mar 2021 17:28:13 +0100 Date: Wed, 10 Mar 2021 17:28:12 +0100 From: Henning Schild To: "[ext] Silvano Cirujano Cuesta" Cc: isar-users@googlegroups.com Subject: Re: [PATCH v6 0/5] Add support for containerized root filesystems Message-ID: <20210310172812.2b7c910a@md1za8fc.ad001.siemens.net> In-Reply-To: <20210309205239.652677-1-silvano.cirujano-cuesta@siemens.com> References: <20210309205239.652677-1-silvano.cirujano-cuesta@siemens.com> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-TUID: 5XZI47xas1rb Silvano you might want to push this to https://code.siemens.com/ebsy/debian/isar to make use of our CI. Henning Am Tue, 9 Mar 2021 21:52:34 +0100 schrieb "[ext] Silvano Cirujano Cuesta" : > This patch series provides support for containerized root filesystems, > for both target images and SDKs. > > For containerized target images the new image type `container-img` has > been added. > > For containerized SDKs the task `populate_sdk` has been extended. > > Containerized root filesystems are easy to distribute and run, > enabling this way following scenarios: > - Use ISAR to build container images meant to be run only in > containers. > - Use the same ISAR configuration to build images for containers, VMs > and bare-metal. > - Easy SDK distribution and "installation". > - Quickly testing certain applications in the workstation using the > target root filesystem. > > In order to build containerized target root filesystems `IMAGE_TYPE` > has to be `container-img`, additionally the container image format > can be selected with the variable `CONTAINER_FORMATS`. The default > format is `docker-archive`. > > In order to build containerized SDKs the variable `SDK_FORMAT` has to > provide any of the supported container formats (e.g. > `docker-archive`). The default format is the legacy > non-containerized: `tar_xz`. > > It also provides a sample machine, multiconfigs and ci-testing. > > More information about its usage is documented in the file > docs/user_manual.md. > > A PoC/demo of this functionality (only the SDK part) has been created > based on the project https://github.com/siemens/meta-iot2050. > Jan Kiszka already tested and liked it! => > https://github.com/siemens/meta-iot2050/issues/86#issuecomment-768907845 > > Successful builds of both containerized target and SDK are available > on the same PoC project: > - https://github.com/Silvanoc/meta-iot2050/actions/runs/558311580 > - https://github.com/Silvanoc/meta-iot2050/actions/runs/558311581 > and also the resulting images: > - > https://github.com/users/Silvanoc/packages/container/package/meta-iot2050%2Fiot2050-debian-arm64 > - > https://github.com/users/Silvanoc/packages/container/package/meta-iot2050%2Fiot2050-debian-sdk-arm64 > > In order to get a feeling about its usage (you need Docker or Podman), > follow these simple copy&paste instructions: > https://github.com/Silvanoc/meta-iot2050/blob/master/kas/BUILDING-SDK-CONTAINER.md#running-the-sdk > Build instructions are available in the upper part of that document. > > Two new dependencies (umoci and skopeo -backporting from bullseye to > buster works easily) are required to create containerized root > filesystems (as specified in the documentation). > > Typical container image management actions (e.g. push an image to a > container image regitry) are out of scope. Available tools (Docker, > Skopeo, Buildah, Podman,...) should be used for these actions. > > A patch will follow this one to get the dependencies into the > container images being provided by the project > https://github.com/siemens/kas (for `kas-container`, for example). > > Silvano Cirujano Cuesta (5): > classes: add root filesystem containerizing class > classes: add new image type 'container-img' > sdk: add support for containerized sdk > docs: document creation of container images > ci: add container image testing configurations > > doc/user_manual.md | 127 > ++++++++++++++++++ meta-isar/conf/machine/container.conf | > 5 + .../conf/multiconfig/container-bullseye.conf | 4 + > .../conf/multiconfig/container-buster.conf | 4 + > .../conf/multiconfig/container-focal.conf | 4 + > .../conf/multiconfig/container-stretch.conf | 4 + > meta/classes/container-img.bbclass | 18 +++ > .../classes/image-container-extension.bbclass | 81 +++++++++++ > meta/classes/image-sdk-extension.bbclass | 42 +++++- > meta/classes/image.bbclass | 1 + > scripts/ci_build.sh | 11 +- > 11 files changed, 293 insertions(+), 8 deletions(-) > create mode 100644 meta-isar/conf/machine/container.conf > create mode 100644 meta-isar/conf/multiconfig/container-bullseye.conf > create mode 100644 meta-isar/conf/multiconfig/container-buster.conf > create mode 100644 meta-isar/conf/multiconfig/container-focal.conf > create mode 100644 meta-isar/conf/multiconfig/container-stretch.conf > create mode 100644 meta/classes/container-img.bbclass > create mode 100644 meta/classes/image-container-extension.bbclass >