From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6927266035414335488 X-Received: by 2002:a1c:b48a:: with SMTP id d132mr4273782wmf.108.1616170286887; Fri, 19 Mar 2021 09:11:26 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a7b:cc94:: with SMTP id p20ls2929351wma.0.gmail; Fri, 19 Mar 2021 09:11:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxwDF9kQPhjHDZHNizoCv9BuHq3X2e61fuo1gJgm5BLmnA3nhGuUa3ruqyukXgfNUWMDSS1 X-Received: by 2002:a1c:2049:: with SMTP id g70mr4430192wmg.7.1616170286123; Fri, 19 Mar 2021 09:11:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616170286; cv=none; d=google.com; s=arc-20160816; b=RgGGFSAzyhrhC36p5qFyPS/XJlrOI5ZZcLC/YUz2jJeSwHXY2ugZjB0i2relak1yKp 9rc0Qa33ojgxcpQGs8Ts9D0Lvdv8UwXVlsX4u/Cm96OZo3DrnvUpf0K8YdDpjPdjRMTv 3GLxgX5tYtwRUzdjFoeXoVzZzhqtRhTqheu8/v7NhlLJVT8aKkIuoY8VhxGr+EV6rWVF EMlIseMAqkalTLrTL7l1wgHWSFBbMeEwIfLh3GUiWjLkOHnC3gLARFUpuBvYXl4CEyuo 6C2HkapszHdZ3kHqb2R/9yhIz+kTXqOLttxYQfNVM6j4iXQ/MjcUriea45ee/kMCcSwS Xc3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=user-agent:in-reply-to:content-disposition:mime-version:references :mail-followup-to:message-id:subject:to:from:date; bh=Bwj9EuC3PBTQ8HA46zltq4x/b+DFP+v0NyjveQj12nM=; b=sM0+0W2jE5H7qsDxUdN0pTarSqxKqlrG7jDLmY0+ERmXnmEW/aX6tYom4R3Fwdkf1N dqqadrKCvlp6rwpnMB7Tahg6Cx3ZvJLMHssE5NK4ttRMnBkTMLmeXyidVSdSe2nnzeLQ wyAE1XgiCBEL5p092Lz2QHRHrR79fJg+WRcLvBNEGY47IYtLIqEJPJBrMzc06V+sH664 aBFhSZZIRkAr50KtBgSmmrA46kXuu7rbbF+coSiKC78M+m8waQbdBLcz+afdt3SmPRVW Ejb0MeECAVCAwaqk1T2/hrPH3prhOIWhlKZQmDR2SIUwbe+MF3iLHW8UJn4uSZ9b8PGY gYJQ== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=neutral (google.com: 85.214.156.166 is neither permitted nor denied by best guess record for domain of ibr@radix50.net) smtp.mailfrom=ibr@radix50.net Return-Path: Received: from shymkent.ilbers.de (shymkent.ilbers.de. [85.214.156.166]) by gmr-mx.google.com with ESMTPS id r11si244656wrm.1.2021.03.19.09.11.25 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Fri, 19 Mar 2021 09:11:26 -0700 (PDT) Received-SPF: neutral (google.com: 85.214.156.166 is neither permitted nor denied by best guess record for domain of ibr@radix50.net) client-ip=85.214.156.166; Authentication-Results: gmr-mx.google.com; spf=neutral (google.com: 85.214.156.166 is neither permitted nor denied by best guess record for domain of ibr@radix50.net) smtp.mailfrom=ibr@radix50.net Received: from yssyq.m.ilbers.de (host-80-81-17-52.static.customer.m-online.net [80.81.17.52]) (authenticated bits=0) by shymkent.ilbers.de (8.15.2/8.15.2/Debian-8) with ESMTPSA id 12JGBMQS009687 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 19 Mar 2021 17:11:25 +0100 Date: Fri, 19 Mar 2021 17:11:22 +0100 From: Baurzhan Ismagulov To: isar-users@googlegroups.com Subject: Re: [PATCH v7 4/5] docs: document creation of container images Message-ID: <20210319161122.GE28779@yssyq.m.ilbers.de> Mail-Followup-To: isar-users@googlegroups.com References: <20210312195843.96000-1-silvano.cirujano-cuesta@siemens.com> <20210312195843.96000-5-silvano.cirujano-cuesta@siemens.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210312195843.96000-5-silvano.cirujano-cuesta@siemens.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED autolearn=unavailable autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on shymkent.ilbers.de X-TUID: kkfECS0Ld5Jo On Fri, Mar 12, 2021 at 08:58:42PM +0100, Silvano Cirujano Cuesta wrote: > --- a/doc/user_manual.md ... > @@ -223,6 +227,54 @@ qemu-system-x86_64 -m 256M -nographic -bios edk2/Build/OvmfX64/RELEASE_*/FV/OVMF ... > +### Generate container image with root-filesystem ... > +A container image created from an ISAR configuration meant for bare-metal or virtual machines can be helpfull to test certain applications which requirements (e.g. libraries) can be easily resolved in a containerized environment. ... > +It's technically possible, but requires making host resources (e.g. the Docker Daemon socket) accessible in the container. > +What can endanger the stability and security of the host. Thanks for implementing this long-standing feature, the series looks good to me. I'd suggest a couple of cosmetic changes: * "root-filesystem" -> "root filesystem" * "ISAR" -> "Isar" * "container. What can endanger" -> "container, which can endanger" * Wrap at column 79. What do you think? Would it be ok to do that when we apply it, or should I send an updated patch? We'll play a bit with the images, but I'm quite positive we'll be able to merge this soon. With kind regards, Baurzhan.