From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6808879013169201152 X-Received: by 2002:a2e:879a:: with SMTP id n26mr12632944lji.347.1602584523077; Tue, 13 Oct 2020 03:22:03 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a2e:7a0e:: with SMTP id v14ls1276094ljc.7.gmail; Tue, 13 Oct 2020 03:22:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw0GQH9Wp7N2jYEFfkl7GBoZtxAB0OTkB7gysX1hiyJ0/vktROtyrdAnyD1eGjtoARgm6HH X-Received: by 2002:a2e:9dcd:: with SMTP id x13mr1099526ljj.422.1602584521820; Tue, 13 Oct 2020 03:22:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602584521; cv=none; d=google.com; s=arc-20160816; b=jvQ5dlDisAE/xV+aobtrAl1AcXYJsLmt1brBITI89yoWPQ+wZNhWYLmrAVlJBIYHVH GwscLOUeT9dHuIb4oYZdK83ftI+lGkGfMp4sNPn9b0+GQunx1WdJXJJPVguW0VwTa868 0JC8RV2otV+mwv4PNVm1VbaD3kZ4LpnsxTvTqfsEx8azCqJmD2JGqRMznu7mOS/5IJw8 qRvHXH/o/xsO5GwAtVT7Ir0FoKFQMbWNZ8tBSUosOYH/zGzKyZkwAUWa1mlqWr+oxIqE Mr0PGZhydIvXW4gym1EJY6pClyKz1k9nSD6/JSj/n/JSmcfUmEozhIdXz96qwNOEyFgd fDIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:to:subject; bh=HBjuOU9y5wbnjqJp6GVOK2nKmrkJCgOAaAFgUvURDqg=; b=DIvS4LmJ+bzqcoJrU4zsQ4sSJMEY/0vtq4kOMYyZPX15vD8FWag5zAsPCow9GryAoQ EOmwDMKmYeh6iGRktYHEYNCQGt1dEwS+nxLqGq2BiEMGSMK72TkVx0ZhH+ALHG3Oeza4 p13J2q/4cKURRWDVP8GOQwfviSeXEMLDjnnKJ/ZH4/whMU99CxDhqLFpkdhmI4RkH+Ue zjKLQo6AdHaHfr0V0Y/PNNeAbWyhQuAIyv9eOii87rkR9F8JeSqzszRppELP017mA/k7 JkMPEinnOFw9eK3yvJ45/LQBYm7dwFgrAxjyOJtefNuwveP0BQhot1SawqirYvE4CDWp rr2A== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from goliath.siemens.de (goliath.siemens.de. [192.35.17.28]) by gmr-mx.google.com with ESMTPS id f23si589134ljg.8.2020.10.13.03.22.01 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 13 Oct 2020 03:22:01 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) client-ip=192.35.17.28; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by goliath.siemens.de (8.15.2/8.15.2) with ESMTPS id 09DAM0c5008293 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 13 Oct 2020 12:22:00 +0200 Received: from [139.25.68.37] ([139.25.68.37]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 09DAM0cI021198; Tue, 13 Oct 2020 12:22:00 +0200 Subject: Re: [PATCH v6 0/3] some images To: "Q. Gylstorff" , isar-users@googlegroups.com, hws@denx.de References: <20200625125646.13365-1-Quirin.Gylstorff@siemens.com> From: Jan Kiszka Message-ID: <320856d7-0b57-71fc-6eaa-3907ea14e5d7@siemens.com> Date: Tue, 13 Oct 2020 12:22:00 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <20200625125646.13365-1-Quirin.Gylstorff@siemens.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: Yd1e7QvGsT6x On 25.06.20 14:56, Q. Gylstorff wrote: > From: Quirin Gylstorff > > - Generate cpio images for rescue images > - generate custom initramfs > - generate ova images > > Changes V2: > - initramfs modification is now a package > - ova-wic-img was renamed to virtual-machine-image > - virtual-machine-image do_convert_wic supports now other image > formats > - Add tests > - cpiogz now use chown instead of userspec > > Changes V3: > - Add tests to build-ci > - add postrm to initramfs-config > - use sdimage-efi for virtualbox images > - changed maintainer > > Changes V4: > - use templates from debhelper for postinst and postrm scripts > > Changes V5: > - add virtual-machine-template package to add the template as extra file to the build > > Changes V6: > - whitespace fix > - initramfs-config is now a inc file instead of a recipe > - meta isar contains a default implementation of intramfs-config > > Quirin Gylstorff (3): > meta/support: Generate a custom initramfs > meta/classes: Generate ova image for vmware or virtualbox > meta/classes: add cpiogz-img > > meta-isar/conf/machine/virtualbox.conf | 16 ++ > meta-isar/conf/machine/vmware.conf | 16 ++ > .../multiconfig/qemuamd64-buster-cpiogz.conf | 9 + > .../multiconfig/virtualbox-ova-buster.conf | 8 + > .../initramfs-config/initramfs-config_0.1.bb | 7 + > meta/classes/cpiogz-img.bbclass | 20 +++ > meta/classes/virtual-machine-image.bbclass | 92 +++++++++++ > .../files/virtual-machine-template.ovf.tmpl | 155 ++++++++++++++++++ > .../virtual-machine-template_0.1.bb | 17 ++ > .../initramfs-config/files/control.tmpl | 12 ++ > .../initramfs-config/files/postinst.tmpl | 50 ++++++ > .../initramfs-config/files/postrm.tmpl | 41 +++++ > .../initramfs-config/initramfs-config.inc | 32 ++++ > scripts/ci_build.sh | 4 +- > 14 files changed, 478 insertions(+), 1 deletion(-) > create mode 100644 meta-isar/conf/machine/virtualbox.conf > create mode 100644 meta-isar/conf/machine/vmware.conf > create mode 100644 meta-isar/conf/multiconfig/qemuamd64-buster-cpiogz.conf > create mode 100644 meta-isar/conf/multiconfig/virtualbox-ova-buster.conf > create mode 100644 meta-isar/recipes-support/initramfs-config/initramfs-config_0.1.bb > create mode 100644 meta/classes/cpiogz-img.bbclass > create mode 100644 meta/classes/virtual-machine-image.bbclass > create mode 100644 meta/recipes-devtools/virtual-machine-template/files/virtual-machine-template.ovf.tmpl > create mode 100644 meta/recipes-devtools/virtual-machine-template/virtual-machine-template_0.1.bb > create mode 100644 meta/recipes-support/initramfs-config/files/control.tmpl > create mode 100644 meta/recipes-support/initramfs-config/files/postinst.tmpl > create mode 100644 meta/recipes-support/initramfs-config/files/postrm.tmpl > create mode 100644 meta/recipes-support/initramfs-config/initramfs-config.inc > What is the status of this, also compared to Harald's proposal for custom initramfs generation? Jan -- Siemens AG, T RDA IOT Corporate Competence Center Embedded Linux