From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 7192512605249863680 X-Received: by 2002:a05:6000:50e:b0:2bd:c129:d936 with SMTP id a14-20020a056000050e00b002bdc129d936mr1853194wrf.619.1674682733893; Wed, 25 Jan 2023 13:38:53 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a05:600c:1ca4:b0:3cf:afd2:ab84 with SMTP id k36-20020a05600c1ca400b003cfafd2ab84ls29797wms.2.-pod-control-gmail; Wed, 25 Jan 2023 13:38:52 -0800 (PST) X-Google-Smtp-Source: AMrXdXtEs6Sv6t6H6teOVfzx8ZpFufiOKFIHZ4sKEYKVKTJCa3ugFKpBoLQkVvVmy9dPwU3oF8ZA X-Received: by 2002:a1c:cc11:0:b0:3da:1d52:26b5 with SMTP id h17-20020a1ccc11000000b003da1d5226b5mr40747329wmb.14.1674682732714; Wed, 25 Jan 2023 13:38:52 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1674682732; cv=pass; d=google.com; s=arc-20160816; b=uAfBzdjEFBwG60EZJytbh1QImejI9AJQPVcun96pP/RWAxdIDN2EiVXAyy1BlSg6w/ CIyfQVchrIcC9LhHfKjK7hIfgx+tIr78vFLbcdPfAWzJFK/fYQfaSqAZFzWsy3Hfq7Za NW5iLNvPIcORRItrwGDXAMm6r36zgLYw3ScszlcX5jIarJAKNSCUMYlIzZZOLEoVi7Gu Lbr9GW1jKzRPS3B3guGu0nmOXhPMlslMLQlj4jJbegG8uu3XxFtT45v2Ws+QemJWDsG9 ufktKkekD0SIe3wPaBP28SDa7yFqBMM2Wul9WPcraFdwbvzpD0p/5yCgmFUpwo6JxcO+ F1cg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:content-transfer-encoding:references:in-reply-to :message-id:subject:cc:to:from:date:dkim-signature; bh=LcDD82hnJyfvgvtDPdgZrIy2j87vfER9Y9G4WyKXv2s=; b=M3+fmr9l4ixbz13TUamExeHVkuNoDyHdEoorHkvGs6//e2oa6/wF1Rl032qKrSalFo zGhCiLYjYiYEcUIGRNoPRdOLyJWSkms+NVRffZMnHtXwYbJnNNKuvysTfwiEUmavkNxe 9GA11utTybYPZZ+5MOdoz+Lq+DXdzUgfVga4Dvt5x7KinrA2t1QJhxNdY7NBWKQJ7cPW E+0wFHmfUyQSJBRdJLCo4u50z55W7K9RngWOtwDwOxRA9uwYs2uCZItwF4umZp7fc0ej fyZFM5Rj6UChs6knFuRCrskF4iZD4euCQBLfs/tq4DtK1D51sw+fO4Z08jnKlZtDKUzl lQ9w== ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b=BeWPeesu; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of henning.schild@siemens.com designates 40.107.105.55 as permitted sender) smtp.mailfrom=henning.schild@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on2055.outbound.protection.outlook.com. [40.107.105.55]) by gmr-mx.google.com with ESMTPS id bd24-20020a05600c1f1800b003d9c716fa3csi388537wmb.1.2023.01.25.13.38.52 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 25 Jan 2023 13:38:52 -0800 (PST) Received-SPF: pass (google.com: domain of henning.schild@siemens.com designates 40.107.105.55 as permitted sender) client-ip=40.107.105.55; Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b=BeWPeesu; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of henning.schild@siemens.com designates 40.107.105.55 as permitted sender) smtp.mailfrom=henning.schild@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RERoKrA842dmR9sUQAIhHUkCrzZj51szNz7Zhz9j2KkLA7WuVyJzL4E+h1EytNxhRMMHwFVJndkYWOce1fpe6AGxszkF9JoXcFcfVxNSJbf5w1xDLmd2bjvj0igT5TrsITCZfHEgWKSPOKm3lQXALwZ6HpMHAEJdnr/ub31YsDDGtD6o2VBsKiOzfl/fghbwJ/SksDntISrbCVBt61tt7sMdycFFWJgzc3mlEPXcH4z8GLa89YJHzSbT7MAv5J8JueJUXsCmCJ91GGePIPDbM7c5/WLFy/A6LDUTvTmHILXaqoJkBEGOuzw9/aSFpx4AtNY/+PN6/rDo3woL6GPZxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=LcDD82hnJyfvgvtDPdgZrIy2j87vfER9Y9G4WyKXv2s=; b=W/G+hha9+QTCJZmBF8eanLfgswEhbhNJhPZKvTu06bTfypoUSWxlmVwuVBDZjVFCQRIgK189wCj0C/fBl3zyP2PD+KTtPWBCO9GIbLd2rJQ2SyGRivqqXPmvpCMApxD9FdNYQ0X2ZRdPY/wiWkJUQycBGMu8J19tJooVyxZ/8cIWt4yxnUfPKEv8CiEJ/qnP2W2lklkZSSnXkjq3RswV+Af0EZyQQ+u4xXrFUqkzjJFpICYuMGYbtHcDgeT0kg/nLKokcwVK8TN5w/unAdillmiCWvN2wUSLtzNnBEx1bNP/7BX16kgOxVrwdhCNmgMJldgGwGDELF9owtTaZhlwog== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LcDD82hnJyfvgvtDPdgZrIy2j87vfER9Y9G4WyKXv2s=; b=BeWPeesuaiE1DVMOGl3MFubZO7w1L/qIJNzYbgvkKzzdBK+UrUSqZ+3LLFg5LtpgPnM/bOacLit7gL+6QO0MMlHtE5O3pJ3brAJSXYP0H/bfcVrMu67sMe4AdqWogBZLL37RPmG+vDwO2F8rXPnZms2LUbkhEWgIOxQdYEzw0s/6TL7XZ6QNaqmfDN5/AtJtVcCb1roARc0xULKW01OHiqQODyd0dh2B4Occ5p4ldIoYuWC+kgPW1KToN2gBiKOZk/YeZPQyd6pR5XmsbY3itvkegw/gMxM2RtaG3UA67ni+jox8guvA9bQU8ZtAaGNWmuXbUlCHIVF/8T+HbZIX8g== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=siemens.com; Received: from PA4PR10MB5780.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:102:269::8) by DU2PR10MB7679.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:10:495::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6002.28; Wed, 25 Jan 2023 21:38:51 +0000 Received: from PA4PR10MB5780.EURPRD10.PROD.OUTLOOK.COM ([fe80::bdf0:fdeb:f955:bc79]) by PA4PR10MB5780.EURPRD10.PROD.OUTLOOK.COM ([fe80::bdf0:fdeb:f955:bc79%4]) with mapi id 15.20.6002.033; Wed, 25 Jan 2023 21:38:50 +0000 Date: Wed, 25 Jan 2023 22:38:48 +0100 From: Henning Schild To: "Schaffner, Tobias (T CED SES-DE)" Cc: "Gylstorff, Quirin (T CED SES-DE)" , "isar-users@googlegroups.com" , "Adler, Michael (T CED SES-DE)" Subject: Re: [PATCH 0/5] allow creation of users/groups before rootfs creation Message-ID: <20230125223848.6b911eb5@md1za8fc.ad001.siemens.net> In-Reply-To: <73457b6d-c5cd-7e43-5142-2feab5caa54a@siemens.com> References: <20230125090156.284309-1-tobias.schaffner@siemens.com> <20230125142901.597613d7@md1za8fc.ad001.siemens.net> <20230125172916.0d49528f@md1za8fc.ad001.siemens.net> <73457b6d-c5cd-7e43-5142-2feab5caa54a@siemens.com> X-Mailer: Claws Mail 4.1.0 (GTK 3.24.35; x86_64-pc-linux-gnu) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-ClientProxiedBy: FR2P281CA0065.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:93::11) To PA4PR10MB5780.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:102:269::8) Return-Path: henning.schild@siemens.com MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PA4PR10MB5780:EE_|DU2PR10MB7679:EE_ X-MS-Office365-Filtering-Correlation-Id: dd153275-b65d-4a55-7026-08daff1c8c67 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PA4PR10MB5780.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230025)(4636009)(396003)(136003)(39860400002)(366004)(346002)(376002)(451199018)(6862004)(66946007)(4326008)(8676002)(44832011)(8936002)(66476007)(66556008)(86362001)(9686003)(1076003)(186003)(41300700001)(53546011)(82960400001)(6506007)(83380400001)(6486002)(107886003)(6512007)(38100700002)(2906002)(5660300002)(54906003)(966005)(6636002)(478600001)(316002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?DWskztGlI3MmY5oOonajJwETLx7Ls56bA+QKQn5+Xg2wvcCyK4rCxpfpTfVE?= =?us-ascii?Q?9AKNh2QYb7ViTPqPM5RG+mPq7/fTBslHJ3OVm54QADlv+NJiXYwEqNQpgCLA?= =?us-ascii?Q?+U8+5eVtU+tJdvjJ2CSApt7xqvsfBwXqfIUiVOVLIkPaIwG0XUdc5TtqUWEe?= =?us-ascii?Q?mZh7WRazOyp3kT1KiLjsZJ7jx9RJAaC9Nxf2H3EnhO0MmHrEvj4muohCJogO?= =?us-ascii?Q?4J2ScNvXjLo0T4pRRCJRyi9HryjO5i0unW/m9l6wC8Sdo387N5899otRm2ES?= =?us-ascii?Q?+im7RDL6tqAsEBpSRW0sxkSjK7HLlVGBcbUlXZagEjnXLpz+BXt0d+IoOQtl?= =?us-ascii?Q?aY6kmVfNcq6JARaO8BBLqko6QkjsPbFSl0EW8xPx8jbdnFHyMJwnOlQJHt1G?= =?us-ascii?Q?tnhCqzbSJGmaT2MV2WWGN0xjxTsCXqyJTfs7HM6XfjUWJBub1wuzTsAAuY8T?= =?us-ascii?Q?gv5wM08dP2whHr0pk6XmUH7aAz3Aow7IANnuLzioPiBw2Eg6zYnH6UFNBNi6?= =?us-ascii?Q?CID5TwrujmtmprzFTSD0kpv08/mZqcOLILtRBtRPtPLpbuXfMbr0/nRIsYGk?= =?us-ascii?Q?T0e3ds7uOx28xDGhHMK1K2SqOMEaz1BIMcqGumw3d+RXiCExQcoXxXUzZezB?= =?us-ascii?Q?X8m2NGhvAauLkWz0B4EYLrFz8371rGF8YnRgoxoUur96n/F2NInWOyj5rLfS?= =?us-ascii?Q?+AUZqlwyLlpow2QQnZ1TpQx75uTaDnK/7yKfpoOM9bp5NsniJ1PxR2FFF65y?= =?us-ascii?Q?tpe8pyghgkD0Ie57GxnU2QX55IBYJ9YeqKnZAf9gNW5zUfRmH30yLjCxcSYf?= =?us-ascii?Q?wpAiABNMJVmT2L7i7RsloYGImi2KvNhJ/zKcOYLFDRXybhoSa0Zo+ap+NohR?= =?us-ascii?Q?hn3DlZ7T3GKHx9CXH5G0AmtJyBo0o38yiirJ4NlV+aH+XKWM+18tJAA06oDf?= =?us-ascii?Q?HLXBaV1mknVtLbwGuh4lvnq5iPXYd5hsgTbm9Gyj1fU8EkFB5x6cSKBZUA3s?= =?us-ascii?Q?FX9tQepezRiKbd03/baTAoaruhCZ2z2x1P+T/Kx8CtNth7GQ4QaIBdjhE/OE?= =?us-ascii?Q?f5bDcj0rp5qIvpeuyf6gEJmigT2TItIYVQzh/GhiKGhwMbuPRKSgIsRwL9x5?= =?us-ascii?Q?HttquzJ82JTqL7BAK+W1i9Fu8OVjSim+tKbVmWtfFAzH0oqxc5ctuz2EhkZA?= =?us-ascii?Q?zDdbuGDQJUPdMt3HUI7Zww/TWA/NeQ1mB01VxLM8a1fN98VNlrrecq/djt9/?= =?us-ascii?Q?IIMHU6WIFc/oUd32t2148iCvSgva6q36Fs+3RIhEZ42m1gA2iu93aOB5I/Qt?= =?us-ascii?Q?/T47ljzOx+BA8N0Lm3I8Bwgvme7ITqWZVg2OayiT1zos2X27EwBIvJt+Axa8?= =?us-ascii?Q?hHVFo8xsUW8koeGrUIs2YC8IYZ+S6BGriKenAmRVPpDKzllX+6+QRWE6QWBy?= =?us-ascii?Q?6WllGPwZVZzpIvc6hzYxW0hJVRA54IWOa6nir0WwBYDSojfXAZa9Ti6xEcPR?= =?us-ascii?Q?/6wImM/fYnOhg4KeK2uIC2umqgkm/5TopTguwEcowbcCfEKkU/dqoOD9chhb?= =?us-ascii?Q?BbceYlKLHdc1HWG+hI+zzpQpzRrLij+ZmbOdkzw+P0OaeT7tBNJAHeYh71I4?= =?us-ascii?Q?5h+VlDMx2r0P+Ob3hWJ69YceV4ThrFnRX7FV3tnf/FhGBjRnGSZjan0X2EvE?= =?us-ascii?Q?CVbjjg=3D=3D?= X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-Network-Message-Id: dd153275-b65d-4a55-7026-08daff1c8c67 X-MS-Exchange-CrossTenant-AuthSource: PA4PR10MB5780.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Jan 2023 21:38:50.7821 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: bGtqypLVyMi8QttGyU5HwjgwCxllhp20xg/SNkrn7kQiyo7q2+/gtVK9WigVeUMu2t3uearMD/sE83EemtUN8SN8IWwMxWUPKIs1wuy7Wyc= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR10MB7679 X-TUID: XaagMwXgQ5bQ Am Wed, 25 Jan 2023 21:55:00 +0100 schrieb "Schaffner, Tobias (T CED SES-DE)" : > On 25.01.23 17:29, Schild, Henning (T CED SES-DE) wrote: > > Am Wed, 25 Jan 2023 14:44:40 +0100 > > schrieb Gylstorff Quirin : > > > >> On 1/25/23 14:29, Henning Schild wrote: > >>> Am Wed, 25 Jan 2023 10:01:51 +0100 > >>> schrieb "T. Schaffner" : > >>> > >>>> From: Tobias Schaffner > >>>> > >>>> This patch series will allow to specify a `pre` flag for the > >>>> USER_ and GROUP_ bitbake variables. If this flag is set to > >>>> `true` the given user or group will be created in the rootfs > >>>> configuration step instead of on rootfs postprocessing. This is > >>>> helpful when a specific id should be used which would otherwise > >>>> be picked by a user or group created by one of the installed > >>>> packages. > >>> > >>> While i do understand the reason i am not sure how relevant that > >>> is. Why would anything only function with a fixed ID? Whoever > >>> provided that thing should maybe fix it. > >> > >> Specific IDs are necessary for Updating an A/B rootfs system with a > >> persistent partition. In this case you do not want to change any > >> IDs as this can lead to wrong file permissions. > > > > I see, that is much more understandable. It also goes into the > > reproducible build direction. > > But if that is the case the solution does not seem to be good enough > > because it only considers users/groups created by isar. Not the ones > > created by installing debian packages. Where the order could be > > potentially random. Say you DEBIAN_DEPENDS or IMAGE_PREINSTALL "ftpd > > wwwd" which will craete users "ftp www" where the two deamons do not > > have any dep on each other and apt-get could install them in any > > order. That order might in reality not change too often but it > > could i.e. when you move from debian11 to debian12 or when you > > bring the third (or 10th) user-adding package into your new > > firmware. > > Thanks for the review! > > This series is not about reproducible builds. The IDs of the users and > groups that are created by debian packages are expected to change > between _image_ versions. So we expect these IDs to be different after > a swupdate. But your initial argument was that you have to create a user before any debian package comes, or did i misunderstand? Maybe we need to differentiate between upstream packages and isar-created ones? > For reproducible builds it is important that the ordering of installed > packages and their dependencies stay the same but that is a different > story. I expect the ordering algorithm for a specific set of packages > including dependencies to be deterministic but would have to look into > that in detail. I expect the algorithm to be non-deterministic ... potentially as you progress using debian. I can just claim, you have to prove. > Still, if somebody had a requirement that a user or group of a package > (e.g. ftp or www) stays the same, one could use this change to create > the user beforehand and pin its id using this change. True. But we might still want to keep the old database to run assertions so such things do not go unnoticed. > > So what you maybe really want is giving isar an /etc/passwd > > /etc/group pair. Every new firmware is build with the given layer > > code and that file-pair from the first release. Where you inject > > those files between bootstrap and install ... hoping that bootstrap > > will always be the same. Maybe one can inject before bootstrap ... > > or write a postproc function that will find all different ids and > > all files and fix up. Or at least start with an assertion in > > postproc that looks at the old database. > > Care that just adding /etc/passwd and /etc/group might not be enough > but you would have to handle the side effects of a useradd/groupadd > call properly (E.g. creating the home if set). And I expect more > things to come up if you have a detailed look. Yes. Not even want to think about LDAP or yp where the databases live in different files. > Take into account that the specific patch that introduces the pre flag > is small, easy to maintain and configure. It should still be motivated so that we later understand why we have it. And i would not call it easy to configure if one does not understand why ... people will "pre" randomly because they do not know what they are doing. We moved that stuff from pre to post once, and i can not help the feeling that people might want to want to mix pre and post one day ... at which point it might become really un-easy. > > Is the problem of uid/gid depend on install order known in the > > debian community and how do others solve it? Gentoo has moved from > > such dynamic allocation to static some years ago, probably for > > similar reasons. > > I am open to discuss this with the reproducible build guys but again > IMHO this discussion belongs into another thread. IMHO not, the repro guys want full repro ... which we can happily leave out when it comes to me. You want partial repro, which we should discuss here. I do not want to hold this back, just understand it and see if there can be a better solution. Feel free to ignore me and merge if nobody else asks questions. Henning > > Henning > > > >>> > >>> So i am willing to say that this is super-niche! And it deserves a > >>> niche-solution in its layer, not a feature in Isar. > >>> > >>> You could hook in a task between bootstrap and image_install. Or > >>> you could rebuild a bootstrap package to have reserved ids. You > >>> could run "the thing" in namespaces ... > >>> > >>> So is that really relevant? Please go into detail. > >>> > >>> Whatever happens i think the python rewrite is cool. But the code > >>> may have been coming/inspired from OE ... in which case it would > >>> not be cool, because it would fork away further. > >> > >> > >> OE uses a complete different implementation than to original: > >> https://git.openembedded.org/openembedded-core/tree/meta/classes/useradd.bbclass > >> > >> see also: > >> > >> https://git.openembedded.org/openembedded-core/tree/meta-skeleton/recipes-skeleton/useradd/useradd-example.bb > >> > >> > >> > >> Quirin > >>> > >>> Henning > >>> > >>>> A rewrite of the image-account-extension in python was done on > >>>> the way. This allows us to drop a lot of encoding and parsing > >>>> code that was used to transition to shell and therefore made it > >>>> easier to read and maintain. > >>>> > >>>> Using python functions for more complex tasks allows us the usage > >>>> of unittests. A very basic infrastructure for unittesting using > >>>> the build in python unittest and the bb.parse module was added. > >>>> This was used to test the re-implementation of the > >>>> image-account-extension as a first showcase. > >>>> > >>>> Tobias Schaffner (5): > >>>> simplify image-account-extension > >>>> allow creation of users/groups before rootfs creation > >>>> create a minimal python unittest infrastructure > >>>> add unittests for the image-account-extension > >>>> set minimal python version in user_manual to 3.5 > >>>> > >>>> doc/user_manual.md | 4 +- > >>>> meta/classes/image-account-extension.bbclass | 391 > >>>> +++++++----------- testsuite/unittests/README.md > >>>> | 28 ++ testsuite/unittests/bitbake.py | 37 ++ > >>>> testsuite/unittests/rootfs.py | 45 ++ > >>>> .../unittests/test_image_account_extension.py | 175 ++++++++ > >>>> 6 files changed, 434 insertions(+), 246 deletions(-) > >>>> create mode 100644 testsuite/unittests/README.md > >>>> create mode 100644 testsuite/unittests/bitbake.py > >>>> create mode 100644 testsuite/unittests/rootfs.py > >>>> create mode 100644 > >>>> testsuite/unittests/test_image_account_extension.py > >>>> > >>> > >> > >> > >> > >> > >