From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6927266035414335488 X-Received: by 2002:a7b:c1c4:: with SMTP id a4mr4474027wmj.122.1615397419568; Wed, 10 Mar 2021 09:30:19 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a7b:c047:: with SMTP id u7ls1515018wmc.1.gmail; Wed, 10 Mar 2021 09:30:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJwK2hOfiIGNjTLay+3mP4crr6fK5EwDnfpP9dQ/MksqPRxSYH5fGbjfikPwncf53H7PgDLs X-Received: by 2002:a1c:66c4:: with SMTP id a187mr4363419wmc.164.1615397418714; Wed, 10 Mar 2021 09:30:18 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1615397418; cv=pass; d=google.com; s=arc-20160816; b=sLia6V9RmAOnhEirlQd1Ij8qjI+nma4Srm+5FDHZFxov8mWuVnzXS2hNdHLw81WG65 QyUava52LfrSDOkxcEYR1jxaMJ1/z9NWNtEA1ObsQqS67syG22m5qi1hKLuG2zR5wPB5 XoKUklSn+MIrMCQTP5yKRI+satnTOP65qh0Z3elXcYpPjokv174lEH4wV75Pxx4Z2jAM 3GE4IaMI9pPG3HfH3QmtkvoU/RkpCb4ziw6txJDd2MEU8XJDbz5NMl5O+k6v8wNUIWsB xMWhRjkIxy4uhDefxrxH8bBr2BPyx+MVX4crEsub1+gw1lyn3sJJPl7gvqGkfnMsMoPt DNdg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:content-language:content-transfer-encoding:in-reply-to :user-agent:date:message-id:from:references:cc:to:subject :dkim-signature; bh=Pva2bG/hByUE9dryG1rIzrReDj/CcqA0z0apNh8NUvk=; b=LdaaD20WgP/wYPf/b90ZCJvPlS19bKC9wiROmEcVBR9HgI/pMZKz0A9lfb1RPFV7fY XUIJ5gZS7u+OL1M5wodo9VLqGGlgt5dNCFgb+N0z6Q223ADL31E6zKhQFN4xlD2LZLl0 JU+oLWRrirXpiJyb01/20jpH6feNtPIlwxf7Q+vtCjm0owmYbRT6nd16TgM224R1AsUR S9vSf4BtRySFLY0+PB94Zq/EJHc6udwHEzRUOy0svv485XKdo7JHfu72/tTTnyEGP4EC G1CeEVlNtSR8oATyPGOWiEU3QB2Aqj+E9mr3ktJuCw2XCSPhV3n8Vbm5Q9AbwBEImh7J ayJQ== ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.onmicrosoft.com header.s=selector1-siemens-onmicrosoft-com header.b=SbbmLJPd; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.14.42 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-eopbgr140042.outbound.protection.outlook.com. [40.107.14.42]) by gmr-mx.google.com with ESMTPS id h16si3321wrx.2.2021.03.10.09.30.18 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 10 Mar 2021 09:30:18 -0800 (PST) Received-SPF: pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.14.42 as permitted sender) client-ip=40.107.14.42; Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.onmicrosoft.com header.s=selector1-siemens-onmicrosoft-com header.b=SbbmLJPd; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.14.42 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=g83FEnDNKhIJR794c9z9YLbuQbNpclEYQBiIueT8m0cfgVss4KJKxdo7Z7l+yDCq8FrmNT2qYFtI7iN4T18NEinVoDo+WTMA1jvimW0Id6dTw3RI8wEFM+w/wsCiDOkPW9ijK0sxVwOutuURib3W9iYg8bTp5CWfUmVS92hes0RieRipr7LFUNi8BaTtLluKO/OWXBIiKTNQYCHVpvPs1xIPZDhirHV2PEMDqZ5N80w5ibelV7htrCNq5NwUHIX+G4HqRKeiPOD9HGNBZlZ1GklFqlsa19nSGd1QsEfjO5G+f2QWobJPnglj3jKCN0k62g1309iGimLevvAAFSeJqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Pva2bG/hByUE9dryG1rIzrReDj/CcqA0z0apNh8NUvk=; b=g4k21nbX4/FRtrjLD9VmkgWlnsMwkupiw7XTK83yvRLjMuV+6shoB8dJmLIBcqWOoHo+OYnPS3eWDG9CRc0SIhTUiukRpBaT/3APymdXOuQKe/YR+p7o0r8jRM6x76abgPENsP50+tI0016Dqbv5UJ1FKLFViS2bXSA9mvPkusnE1c5moImRaVgGVh/FGdKOdRmZIB9Ywj6k076Yg+MzbJ5VxRqmrpRXR45nJ4u6E3BRzlXsdqDJgypj2IiVvJSRmAZbOYthcEKxBGKHh5wje1ZTlznuFHz1lBrMQwdrEE83UQMJ3ZM3+P8HIzL07pVY4+JSEFnthBKWeXXbBCuRjw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.onmicrosoft.com; s=selector1-siemens-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Pva2bG/hByUE9dryG1rIzrReDj/CcqA0z0apNh8NUvk=; b=SbbmLJPd3vajBMrqpWcaQR/dHgNFSt1Jti2WJm03yVrPEReIk5OuGiQ6/+M76DkgEd0KPlg3yqhOOSWGtjmHp4+PdT30bxTBHnShEchV9Xzd9n+aOZdbZey6UNcpTmJoDryw/JggWmGjBwjZ1PbJ8i/ZfEEwNVOn5aFGlKM4qo4= Authentication-Results: googlegroups.com; dkim=none (message not signed) header.d=none;googlegroups.com; dmarc=none action=none header.from=siemens.com; Received: from AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:12a::30) by AM8PR10MB4116.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:1e8::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.19; Wed, 10 Mar 2021 17:30:17 +0000 Received: from AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM ([fe80::4807:51a1:30ab:908b]) by AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM ([fe80::4807:51a1:30ab:908b%7]) with mapi id 15.20.3912.027; Wed, 10 Mar 2021 17:30:17 +0000 Subject: Re: [PATCH v6 0/5] Add support for containerized root filesystems To: Henning Schild Cc: Anton Mikanovich , isar-users@googlegroups.com References: <20210309205239.652677-1-silvano.cirujano-cuesta@siemens.com> <3d304c0a-a7e7-99c7-fdf0-4946a6a59a7b@siemens.com> <20210310182514.25b0c08b@md1za8fc.ad001.siemens.net> From: Silvano Cirujano Cuesta Message-ID: <31f0fa53-fe73-3d5e-790b-180b2def7e83@siemens.com> Date: Wed, 10 Mar 2021 18:30:15 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.0 In-Reply-To: <20210310182514.25b0c08b@md1za8fc.ad001.siemens.net> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-Originating-IP: [2001:a61:b9b:ac02:de3a:1146:19ca:44b6] X-ClientProxiedBy: AM0PR05CA0085.eurprd05.prod.outlook.com (2603:10a6:208:136::25) To AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:12a::30) Return-Path: silvano.cirujano-cuesta@siemens.com MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from [IPv6:2001:a61:b9b:ac02:de3a:1146:19ca:44b6] (2001:a61:b9b:ac02:de3a:1146:19ca:44b6) by AM0PR05CA0085.eurprd05.prod.outlook.com (2603:10a6:208:136::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17 via Frontend Transport; Wed, 10 Mar 2021 17:30:17 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 8a479141-15b1-456e-577e-08d8e3ea2c07 X-MS-TrafficTypeDiagnostic: AM8PR10MB4116: X-LD-Processed: 38ae3bcd-9579-4fd4-adda-b42e1495d55a,ExtAddr X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:5236; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(4636009)(396003)(136003)(346002)(366004)(39860400002)(376002)(8676002)(37006003)(66946007)(36756003)(316002)(8936002)(2616005)(6636002)(186003)(16526019)(2906002)(83380400001)(478600001)(66476007)(31686004)(66556008)(966005)(45080400002)(86362001)(5660300002)(31696002)(6862004)(4326008)(6486002)(53546011)(30864003)(43740500002)(45980500001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: =?utf-8?B?Wk1EZmcvMnRrd2hDYmVZdi84Z3E4T1F0eTliT3h2UnRWUTJFZWNNLzNGcmxm?= =?utf-8?B?MWFyRGc2a2FjZ00zVUNlcnFiTTR3MEpxZnoxSHU0cFlSU1lJbnJxdzBDK3Fx?= =?utf-8?B?cHgzUW1VS3BGVld3RjMxYmZ4WFVWWHVIV0pKTWcyQjA0cllLUWwyakhXUEJI?= =?utf-8?B?NEFMM2FNdmVYcnlsTnZ4WGZYczJ2Wk9jS09NSkN2SXVlQ2psTXUrcEFkdEZk?= =?utf-8?B?VXRaWWhyazZNQXdYTTlhYWp3eTBxa2tJRUlHV1JDQjBaQkZMTklRLzQ2ODVr?= =?utf-8?B?WmpmWUp3anlPTXNreUx0NXY0ZE5Cc2VpNy8zcUhhRmNJRU9NQnk0TnlIUy9R?= =?utf-8?B?NzFrUXRkTzg2MGp1aXVOdUR1TGpvcGI0eFlkOEgrcEZxbHI3KytVL2t6K0E5?= =?utf-8?B?N3V0N3hYc1k5SzY1Vmx4RzkrZXZrZnYyM3htN3c5TnZONjdraGlDT1dsME5I?= =?utf-8?B?NVFGV3NkaXZJUi9zQmd5dW5QOG9ESWdjR25RQVJsWmFKWjkvWXh4VkxkcGJ3?= =?utf-8?B?cmNXVWpaNzRQTS9VNHhYajFJek1GTThTZ1labEFQMDNMZ3FlNTBFUmIvMEpG?= =?utf-8?B?dWJrRUk5REZrVnM5a1ZoeU13cHBmN3Z3WlI1S0JPdGxxK3RyWmZzU1J1VGpm?= =?utf-8?B?WllMbHd6aWVmckdLc0RUc2EyWS9acHFkcStVcTZyVk9KQjNIUGNNcHRsc0sx?= =?utf-8?B?Q1Z2ZW1RSHREQUtoV0JiZVI2enRCcXpEMTh5Z0RONWdYMStQSzVrczB6bnN0?= =?utf-8?B?c0FHcXpzQmptdkpUdWpVUWFtd2U0MEV0Mng5Zld0T3hLOHV4V2VpUkQ2ei9m?= =?utf-8?B?SjZTY0NNMTNDNGVsZElPU0V1YTk1ZnBSQkZTMmxvK2JrRy81MFFVemZaN2pp?= =?utf-8?B?d21uckxQakhVK2RjbDUra2FDUnhlRlIydEdmd3JObktSMGFyM1VYOGhQUXY3?= =?utf-8?B?YTNiWTZWdG5YbktjcHdLNFFnck9Bdzh0NHYzWGN2WXlRcUsyM1RNMkozVkIx?= =?utf-8?B?aG5EUVZXQjNRTEU4MFU1RU90V1llV2xWRC9Gdkc4aFZCT2JRcHROVjVDYzBW?= =?utf-8?B?bUlaZm4ycWVXZGpzNTJ4OXNyTXI4QW03M0xkVFVqbjVDSHhpZnZjOUdtNXVm?= =?utf-8?B?bjJoTVo1YlZNMld2V3hlcGozMmlQYU1ybkoyaEJMZFFXKzBhQW5jamV3YzIw?= =?utf-8?B?UzFYdUpleFNIZFpMQXlxREtUanhHR2wxZ3FFa0ViL1pEQUtPSk9KK2VGMjBK?= =?utf-8?B?OWJ6SEI0R1AzUWc0L1dZY2I4TUppR2ZaZzlMbG1FWk4xaDAzZzNmVTljQ3l6?= =?utf-8?B?czdTcnBHUE5aZ2JpSmt5RnZhdWUvOXFDdTF4RUx5dUFZODFYZEo1c2xZSUI2?= =?utf-8?B?S1BYbE1PTE1sc2p4R0FTbzBNbXVXd2piMmtBakMyY0NxK1dUUHdmdXJSNzd0?= =?utf-8?B?STF1dTgvZC8yOHB5WGRNSXJua0pUSGFkSndMb1lXaGFZaVovVXJZNGRXRjB1?= =?utf-8?B?Z1B6d1BaMEZkUFJuMWhOd2RVTUxOdStQcUpJYUVwNTB2ZEtEczY5TGRtWXdR?= =?utf-8?B?MjJjSnRJRmVpQkI2VWprMFN1UkdTTE55OTFlSm5oRG5iV2IzeE5oc0hjNjRI?= =?utf-8?B?SWxzRW01Y2NsNC9oem9NVFV4dGIvaVVpelNJWDdqc2hGa0lOcTRtZkxWRWEr?= =?utf-8?B?ajYzVVh0TUZNQ2FWcXJsK2xrK2dGZlJNSjdINU53djBMRS9qRjVXUWpHVTUy?= =?utf-8?B?V2tGdmtHZHB5RGNzTmFKNThnSEhiNXRBampHMHI4MjVNRFVxb2o1WG0vTitG?= =?utf-8?B?amduOVkvVmpwYzY5dGZHSS9neW5OWlM3MDJ5TEV4STRlTVRWMmcxTkxnUFlG?= =?utf-8?Q?EFOUzGbeAw3JF?= X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8a479141-15b1-456e-577e-08d8e3ea2c07 X-MS-Exchange-CrossTenant-AuthSource: AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2021 17:30:17.5335 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: U+FuUnQp4LFppudX+XnTZsPDbeEvd1ZDsH/fBZVIlcr75gORtI0nUM17OGSI7EejDYQXv8qVxRbeonjyddebz3eB4RhKn01N8Vqx9XWK2HLzG0Cg8VJV/x8FezVW5NlD X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR10MB4116 X-TUID: XtWDm60tbcly On 10/03/2021 18:25, Henning Schild wrote: > Am Wed, 10 Mar 2021 18:18:23 +0100 > schrieb "[ext] Silvano Cirujano Cuesta" > : > >> On 10/03/2021 17:18, Anton Mikanovich wrote: >>> 09.03.2021 23:52, Silvano Cirujano Cuesta wrote: >>>> This patch series provides support for containerized root >>>> filesystems, for both target images and SDKs. >>>> >>>> For containerized target images the new image type `container-img` >>>> has been added. >>>> >>>> For containerized SDKs the task `populate_sdk` has been extended. >>>> >>>> Containerized root filesystems are easy to distribute and run, >>>> enabling this way following scenarios: >>>>   - Use ISAR to build container images meant to be run only in >>>> containers. >>>>   - Use the same ISAR configuration to build images for >>>> containers, VMs and bare-metal. >>>>   - Easy SDK distribution and "installation". >>>>   - Quickly testing certain applications in the workstation using >>>> the target root filesystem. >>>> >>>> In order to build containerized target root filesystems >>>> `IMAGE_TYPE` has to be `container-img`, additionally the container >>>> image format can be selected with the variable >>>> `CONTAINER_FORMATS`. The default format is `docker-archive`. >>>> >>>> In order to build containerized SDKs the variable `SDK_FORMAT` has >>>> to provide any of the supported container formats (e.g. >>>> `docker-archive`). The default format is the legacy >>>> non-containerized: `tar_xz`. >>>> >>>> It also provides a sample machine, multiconfigs and ci-testing. >>>> >>>> More information about its usage is documented in the file >>>> docs/user_manual.md. >>>> >>>> A PoC/demo of this functionality (only the SDK part) has been >>>> created based on the project >>>> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fmeta-iot2050&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C9aeeebc3bbcd43639e3408d8e3e97906%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509939186866083%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=%2B2icpBtgUxWlC%2Byu%2B8mzTX%2B5f%2FUqwxx32eSm1OIt7jE%3D&reserved=0. >>>> Jan Kiszka already tested and liked it! => >>>> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fmeta-iot2050%2Fissues%2F86%23issuecomment-768907845&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C9aeeebc3bbcd43639e3408d8e3e97906%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509939186866083%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=KobF91tR3qTPXkVlm1siBENSZ8GI2yVgV%2FUR4wA%2Fa1g%3D&reserved=0 >>>> >>>> Successful builds of both containerized target and SDK are >>>> available on the same PoC project: >>>>   - >>>> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Factions%2Fruns%2F558311580&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C9aeeebc3bbcd43639e3408d8e3e97906%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509939186866083%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=SfmgjQlfFHt5GTWS1Bkh9fgYzdVus%2BxAQWL1HXU%2FEiM%3D&reserved=0 >>>>   - >>>> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Factions%2Fruns%2F558311581&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C9aeeebc3bbcd43639e3408d8e3e97906%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509939186866083%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=tXRuiVa7uhPLnRG7Ll2oLrz%2BGP85bR6HEOOzTp7J%2Bxo%3D&reserved=0 >>>> and also the resulting images: >>>>   - >>>> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fusers%2FSilvanoc%2Fpackages%2Fcontainer%2Fpackage%2Fmeta-iot2050%252Fiot2050-debian-arm64&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C9aeeebc3bbcd43639e3408d8e3e97906%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509939186876071%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=BKHSEDqOAHeum%2FGYdREIysEJ1JCTm68npNBZhgYkOr4%3D&reserved=0 >>>>   - >>>> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fusers%2FSilvanoc%2Fpackages%2Fcontainer%2Fpackage%2Fmeta-iot2050%252Fiot2050-debian-sdk-arm64&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C9aeeebc3bbcd43639e3408d8e3e97906%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509939186876071%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=EhFGqF5PnTNkeZub1%2FzDzFCClAT0cN4v2A95D85NEjo%3D&reserved=0 >>>> >>>> In order to get a feeling about its usage (you need Docker or >>>> Podman), follow these simple copy&paste instructions: >>>> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Fblob%2Fmaster%2Fkas%2FBUILDING-SDK-CONTAINER.md%23running-the-sdk&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C9aeeebc3bbcd43639e3408d8e3e97906%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509939186876071%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=GMOqu5mVVazU%2FnvpjiWLDoatp2Yi4XmYMkpZNLCMZts%3D&reserved=0 >>>> Build instructions are available in the upper part of that >>>> document. >>>> >>>> Two new dependencies (umoci and skopeo -backporting from bullseye >>>> to buster works easily) are required to create containerized root >>>> filesystems (as specified in the documentation). >>>> >>>> Typical container image management actions (e.g. push an image to a >>>> container image regitry) are out of scope. Available tools (Docker, >>>> Skopeo, Buildah, Podman,...) should be used for these actions. >>>> >>>> A patch will follow this one to get the dependencies into the >>>> container images being provided by the project >>>> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fkas&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C9aeeebc3bbcd43639e3408d8e3e97906%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509939186876071%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=0XCjNwZVf%2By0WL2C%2BRTRiVmgZT34dL0auBRFila0Uqs%3D&reserved=0 >>>> (for `kas-container`, for example). >>>> >>>> Silvano Cirujano Cuesta (5): >>>>    classes: add root filesystem containerizing class >>>>    classes: add new image type 'container-img' >>>>    sdk: add support for containerized sdk >>>>    docs: document creation of container images >>>>    ci: add container image testing configurations >>>> >>>>   doc/user_manual.md                            | 127 >>>> ++++++++++++++++++ meta-isar/conf/machine/container.conf         | >>>>   5 + .../conf/multiconfig/container-bullseye.conf  |   4 + >>>>   .../conf/multiconfig/container-buster.conf    |   4 + >>>>   .../conf/multiconfig/container-focal.conf     |   4 + >>>>   .../conf/multiconfig/container-stretch.conf   |   4 + >>>>   meta/classes/container-img.bbclass            |  18 +++ >>>>   .../classes/image-container-extension.bbclass |  81 +++++++++++ >>>>   meta/classes/image-sdk-extension.bbclass      |  42 +++++- >>>>   meta/classes/image.bbclass                    |   1 + >>>>   scripts/ci_build.sh                           |  11 +- >>>>   11 files changed, 293 insertions(+), 8 deletions(-) >>>>   create mode 100644 meta-isar/conf/machine/container.conf >>>>   create mode 100644 >>>> meta-isar/conf/multiconfig/container-bullseye.conf create mode >>>> 100644 meta-isar/conf/multiconfig/container-buster.conf create >>>> mode 100644 meta-isar/conf/multiconfig/container-focal.conf create >>>> mode 100644 meta-isar/conf/multiconfig/container-stretch.conf >>>> create mode 100644 meta/classes/container-img.bbclass create mode >>>> 100644 meta/classes/image-container-extension.bbclass >>> Thanks for adding CI cases, but Jenkins failed during >>> do_populate_sdk: >> Do you have the documented dependencies (umoci and skopeo backported >> from bullseye) in the CI system? I've tested the commands manually on >> my system using kas-container and they worked, but your setup is >> slightly different. > AFAIK the jenkins runner is debian buster running "shell" jobs. New > deps will not work here. > I did not review the changes, but hope those new deps have been added > to the docs. > > Henning Yes, it's documented both in the cover letter (look for 'umoci' in this e-mail) and in the user manual => https://github.com/Silvanoc/isar/commit/54c0af643f4011da1cf5171f1b8d8c29cf52769d#diff-266dae8a4f0ac77fb09535e9bbf9fa2516ea79ebc5c91b4781c6a537a6f8d64cR89  Silvano > >>> 14:17:17 + SDK_FORMAT=docker-archive >>> 14:17:17 + BB_ENV_WHITELIST=' SDK_FORMAT' >>> 14:17:17 + bitbake -c do_populate_sdk >>> mc:qemuarm-stretch:isar-image-base ... >>> 14:17:18 ERROR: Unable to parse >>> /workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb >>> 14:17:18 Traceback (most recent call last): 14:17:18   File >>> "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/parse/ast.py", >>> line 382, in >>> multi_finalize(fn='/workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb', >>> d=): 14:17:18 >>>      try: 14:17:18     >        finalize(fn, d) 14:17:18 >>> except bb.parse.SkipRecipe as e: 14:17:18   File >>> "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/parse/ast.py", >>> line 347, in >>> finalize(fn='/workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb', >>> d=, >>> variant=None): 14:17:18 14:17:18     > >>> bb.parse.siggen.finalise(fn, d, variant) 14:17:18 14:17:18   File >>> "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/siggen.py", >>> line 182, in >>> SignatureGeneratorBasicHash.finalise(fn='/workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb', >>> d=, >>> variant=None): 14:17:18              try: 14:17:18     > >>> taskdeps = self._build_data(fn, d) 14:17:18              except >>> bb.parse.SkipRecipe: 14:17:18   File >>> "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/siggen.py", >>> line 150, in >>> SignatureGeneratorBasicHash._build_data(fn='/workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb', >>> d=): 14:17:18 >>>          ignore_mismatch = ((d.getVar("BB_HASH_IGNORE_MISMATCH") or >>> '') == '1') 14:17:18     >        tasklist, gendeps, lookupcache = >>> bb.data.generate_dependencies(d, self.basewhitelist) 14:17:18 >>> 14:17:18   File >>> "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/data.py", >>> line 371, in generate_dependencies(d=>> object at 0x7f12917e1c50>, whitelist={'SHELL', 'DEPLOY_DIR', >>> 'PRSERV_DUMPFILE', 'SDKPKGSUFFIX', 'FILE_DIRNAME', 'TERM', >>> 'COREBASE', 'LICENSE_PATH', 'STAGING_DIR_HOST', 'SSTATE_PKGARCH', >>> 'PKGDATA_DIR', 'THISDIR', 'USER', 'EXTERNAL_TOOLCHAIN', 'PWD', >>> 'DL_DIR', 'LOGNAME', 'PATH', 'BB_LIMITEDDEPS', 'CCACHE', >>> 'BB_TASKHASH', 'CCACHE_DIR', 'PARALLEL_MAKE', 'BBSERVER', >>> 'PRSERV_LOCKDOWN', 'BBPATH', 'BB_WORKERCONTEXT', 'PRSERV_HOST', >>> 'WORKDIR', 'FILE', 'CCACHE_NOHASHDIR', 'PRSERV_DUMPDIR', >>> 'FILESEXTRAPATHS', 'HOME', 'BUILD_ARCH', 'STAMPCLEAN', >>> 'SSTATE_DIR', 'TMPDIR', 'FILESPATH', 'STAGING_DIR_TARGET'}): >>> 14:17:18          keys = set(key for key in d if not >>> key.startswith("__")) 14:17:18     >    shelldeps = set(key for key >>> in d.getVar("__exportlist", False) if d.getVarFlag(key, "export", >>> False) and not d.getVarFlag(key, "unexport", False)) 14:17:18 >>>    varflagsexcl = d.getVar('BB_SIGNATURE_EXCLUDE_FLAGS') 14:17:18 >>> TypeError: 'NoneType' object is not iterable >>> >>> Full log: >>> https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fci.isar-build.org%3A8080%2Fjob%2Fisar_am_devel_fast%2F92%2FconsoleFull&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C9aeeebc3bbcd43639e3408d8e3e97906%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509939186876071%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=9PeSmqXdC07ubN7xFJ4uH90hxprBnG4NuR4z5EMa8Ug%3D&reserved=0 -- Siemens AG, T RDA IOT SES-DE Corporate Competence Center Embedded Linux