From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6945105578761912320 X-Received: by 2002:a1c:1d14:: with SMTP id d20mr25396364wmd.36.1617033402564; Mon, 29 Mar 2021 08:56:42 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a1c:24d4:: with SMTP id k203ls7921056wmk.0.canary-gmail; Mon, 29 Mar 2021 08:56:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxR+dk7cAhdhoUq/TBZ3YgLMyQBMRybvBN0sdg/Htx033li9xfvgLqIeha5lVy3RVjdpYur X-Received: by 2002:a1c:7ec4:: with SMTP id z187mr25472741wmc.3.1617033401742; Mon, 29 Mar 2021 08:56:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617033401; cv=none; d=google.com; s=arc-20160816; b=XVL87wREaE/AQWz2SZBSSswOXvZ0FO9K9bS9eHUu4vfs2hWhdUlJDE21E5seBY3IWY y0bCJpUwyHZFpcSeijB59iTdRkatdBXIJHVPRx46zSOrxrQ3K4Oqflll77LJ9OA+VXTr sSN3V7sO8a6Gyw2AMWL1+9pOf98za9mY7ZydFHpWZy5OX4WQ+DbAY/S64sSMjdWcUJyq zwFyaGu5PDU/78Zoe4aBNuNUULQPE164YH2bdGtvaHaF/gbw1GaH4Dayv70p4rN8a3Y7 7mKOfQVuORdAw/9RDcb5qibLx4+/8K3/UVip8844TUc0/hrSSCGzXp6Qm01v6maWlBbL pOSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from; bh=UoU5rtSUjdje4gcbAE4iAaL8dO/gY1W/Afi0o1RjDTQ=; b=xYmkw7uRxKzCIiiGJ2SMp5yKnuEAKM3miGZZKENPGpNkvymxhiX8ktjo+pD/JDuM/7 oKE5cTOs4xO6vdKXHQWJQ4BaAiFnq6mWHvLjvswq4H63BtzHvcTPzKVqh9G4g6wCgD3o zc1Qt08uxZX8AgIrzk2v59tnuShZWTQKirRlsoOK54hP3A7UJeC0tKsBJZmNrNKeGnU2 /Uoj9BKxVqJWenGbX18GJEs3Sk5ERCAmIsA95vVFFN9gUGU9/sIqSsZTu6YKrk7tR79k y0hAzBrDJhA3Y8Mp5/tNzrfXFMu/v6sVW9m1wYiVjP8zuyqj5dQ5qjMmzi9DxAGWnXTj enAA== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 194.138.37.40 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from gecko.sbs.de (gecko.sbs.de. [194.138.37.40]) by gmr-mx.google.com with ESMTPS id r11si690638wrm.1.2021.03.29.08.56.41 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 29 Mar 2021 08:56:41 -0700 (PDT) Received-SPF: pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 194.138.37.40 as permitted sender) client-ip=194.138.37.40; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 194.138.37.40 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by gecko.sbs.de (8.15.2/8.15.2) with ESMTPS id 12TFufg2000539 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Mon, 29 Mar 2021 17:56:41 +0200 Received: from md1sf36c.ad001.siemens.net ([167.87.46.205]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id 12TFufsk031984 for ; Mon, 29 Mar 2021 17:56:41 +0200 From: Silvano Cirujano Cuesta To: isar-users@googlegroups.com Subject: [PATCH v8 1/5] classes: add root filesystem containerizing class Date: Mon, 29 Mar 2021 17:56:36 +0200 Message-Id: <20210329155640.62445-2-silvano.cirujano-cuesta@siemens.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210329155640.62445-1-silvano.cirujano-cuesta@siemens.com> References: <20210329155640.62445-1-silvano.cirujano-cuesta@siemens.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TUID: K/+GSQTGLKpn This class can be used to create container images which root filesystem is that generated by the do_rootfs task. Containerized root filesystems have following possible use-cases: - Using ISAR as a container image builder. - Simplify distribution of runtime rootfs (binaries, libraries, configurations, ...) for application development or testing. - Distributing SDKs. Signed-off-by: Silvano Cirujano Cuesta --- .../classes/image-container-extension.bbclass | 82 +++++++++++++++++++ meta/classes/image.bbclass | 1 + 2 files changed, 83 insertions(+) create mode 100644 meta/classes/image-container-extension.bbclass diff --git a/meta/classes/image-container-extension.bbclass b/meta/classes/image-container-extension.bbclass new file mode 100644 index 0000000..f693627 --- /dev/null +++ b/meta/classes/image-container-extension.bbclass @@ -0,0 +1,82 @@ +# This software is a part of ISAR. +# Copyright (C) Siemens AG, 2021 +# +# SPDX-License-Identifier: MIT +# +# This class extends the image.bbclass for containerizing the root filesystem. + +CONTAINER_FORMATS ?= "docker-archive" +IMAGE_INSTALL += "isar-exclude-docs isar-disable-apt-cache" + +containerize_rootfs() { + local cmd="/bin/dash" + local empty_tag="empty" + local full_tag="latest" + local oci_img_dir="${WORKDIR}/oci-image" + local rootfs="$1" + local rootfs_id="$2" + local container_formats="$3" + + # prepare OCI container image skeleton + bbdebug 1 "prepare OCI container image skeleton" + rm -rf "${oci_img_dir}" + sudo umoci init --layout "${oci_img_dir}" + sudo umoci new --image "${oci_img_dir}:${empty_tag}" + sudo umoci config --image "${oci_img_dir}:${empty_tag}" \ + --config.cmd="${cmd}" + sudo umoci unpack --image "${oci_img_dir}:${empty_tag}" \ + "${oci_img_dir}_unpacked" + + # add root filesystem as the flesh of the skeleton + sudo cp -a "${rootfs}"/* "${oci_img_dir}_unpacked/rootfs/" + # clean-up temporary files + sudo find "${oci_img_dir}_unpacked/rootfs/tmp" -mindepth 1 -delete + + # pack container image + bbdebug 1 "pack container image" + sudo umoci repack --image "${oci_img_dir}:${full_tag}" \ + "${oci_img_dir}_unpacked" + sudo umoci remove --image "${oci_img_dir}:${empty_tag}" + sudo rm -rf "${oci_img_dir}_unpacked" + + # no root needed anymore + sudo chown --recursive $(id -u):$(id -g) "${oci_img_dir}" + + # convert the OCI container image to the desired format + image_name="isar-${rootfs_id}" + for image_type in ${CONTAINER_FORMATS} ; do + image_archive="${DEPLOY_DIR_IMAGE}/${rootfs_id}-${image_type}.tar" + bbdebug 1 "Creating container image type: ${image_type}" + case "${image_type}" in + "docker-archive" | "oci-archive") + if [ "${image_type}" = "oci-archive" ] ; then + target="${image_type}:${image_archive}:latest" + else + target="${image_type}:${image_archive}:${image_name}:latest" + fi + rm -f "${image_archive}" "${image_archive}.xz" + bbdebug 2 "Converting OCI image to ${image_type}" + skopeo --insecure-policy copy \ + "oci:${oci_img_dir}:${full_tag}" "${target}" + bbdebug 2 "Compressing image" + xz -T0 "${image_archive}" + ;; + "oci") + tar --create --xz --directory "${oci_img_dir}" \ + --file "${image_archive}.xz" . + ;; + "docker-daemon" | "containers-storage") + if [ -f /.dockerenv ] || [ -f /run/.containerenv ] ; then + die "Adding the container image to a container runtime (${image_type}) not supported if running from a container (e.g. 'kas-container')" + fi + skopeo --insecure-policy copy \ + "oci:${oci_img_dir}:${full_tag}" \ + "${image_type}:${image_name}:latest" + ;; + *) + die "Unsupported format for containerize_rootfs: ${image_type}" + ;; + esac + done +} + diff --git a/meta/classes/image.bbclass b/meta/classes/image.bbclass index eddc444..ec93cab 100644 --- a/meta/classes/image.bbclass +++ b/meta/classes/image.bbclass @@ -76,6 +76,7 @@ inherit image-tools-extension inherit image-postproc-extension inherit image-locales-extension inherit image-account-extension +inherit image-container-extension # Extra space for rootfs in MB ROOTFS_EXTRA ?= "64" -- 2.30.2