From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6927266035414335488 X-Received: by 2002:a05:6000:2aa:: with SMTP id l10mr4564402wry.368.1615396706750; Wed, 10 Mar 2021 09:18:26 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a5d:6a89:: with SMTP id s9ls2449892wru.2.gmail; Wed, 10 Mar 2021 09:18:26 -0800 (PST) X-Google-Smtp-Source: ABdhPJzPpv2fnBX/07JWL/HEMtAK8PBmzP9ZuYWvIgi2XFKd6ZETnTsoRagya2e9O8xqLJadeyaE X-Received: by 2002:adf:fb91:: with SMTP id a17mr4518203wrr.93.1615396705956; Wed, 10 Mar 2021 09:18:25 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1615396705; cv=pass; d=google.com; s=arc-20160816; b=PDSeDE98Bnktu2TYXFybVMUbhlySxeo9UR5fm1sYQBeERrJ50ylhA94bQmbbKbUsq0 T+wwCRvkBgzBFPmms0TFVwHT1/3kH/7TF8mcaR61MJq/hXPAWW3qYdL+IP0Zt/uKtyCv llkfvP8PzGsIRW5wDqJDKUb/+Uomq1+OB2qmCFEfnd2x4EZ9Obtcx5ZhxlexWfRsK0Ko qIEfqHhxy1yy6y85nBul5y1497Ui1St2uvwYqbeJwR1JH+KAizVU26rFIw5gsat9mxOP 4Sb5ogR0xxumCd3+3Tf7shUKpIfmMhFEelkkCPDH32qb6Y6Sp04LqqKMUDrlzz06l5/Q kCgA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:content-language:content-transfer-encoding:in-reply-to :user-agent:date:message-id:from:references:to:subject :dkim-signature; bh=XOpGR/WHJuHjA41B4AzdLKOOD8oPYdZHeYwwfHFwGqs=; b=JR5V9m42/a1BIC0aft1WebM8GD2XOUp0nHvu6EAi4f6c3mWlj2mIVmrwtS4TWcvOmC xP9yvkCTj5cgDe0vF/XnhmZjwqNgC3KLUt9EqSoqyvyh6uE6u6Xi1Rs8OFfaI4KWOg6I +h0TOWtTMu24zABOTutZST7N0qwBG+xNR/lpy/J2q+fm/pjoKi6E9E7Q7uF0ezoUoa1p lsnbNHP4O0HloaxUP3xKtUAuGmY3UaU0/RXGT6QNdFZe9Da8b6HYWiStnoOrm5F/+G0Y UQ3MT9R/D2ChlZ8F53i6RjF2eW4p+bPqGprBeyr4DcX+rwL6xXqctwOoeqH4USAdcb7A D3JQ== ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.onmicrosoft.com header.s=selector1-siemens-onmicrosoft-com header.b=jm3XISMy; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.8.70 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80070.outbound.protection.outlook.com. [40.107.8.70]) by gmr-mx.google.com with ESMTPS id b6si274910wmc.2.2021.03.10.09.18.25 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 10 Mar 2021 09:18:25 -0800 (PST) Received-SPF: pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.8.70 as permitted sender) client-ip=40.107.8.70; Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.onmicrosoft.com header.s=selector1-siemens-onmicrosoft-com header.b=jm3XISMy; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.8.70 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=n9E1w0INmGlMXlhKv9bDgQFZqtERGU2nUfsPGaRM31YDnQYcas+C0mQNov3G+Y9mpVliHhXP3kjN+cODUtTjys6D/95oe4lQOT9LugboQPynejfWSRogQ9vgVIbmLWPhEDzJQftxxf/obP6vHdSjVP8tAf+vziWS3tLpJFK6Ulv94UNoGQtgCa7fszMfjXsriauU95m6lkk4SXTQTtqTJ3P8IFL0+ohW/ZVX+GC+cznGtD7vN3qxB9Id8jK4sEXC7yp7RtT+ZlAfPK4eONbI1bkMCSnlifA0fExqnF1goyQ3NIFcOlNhpsdVegidQVaGGOlCkM2hLelQrdTcvDvr8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XOpGR/WHJuHjA41B4AzdLKOOD8oPYdZHeYwwfHFwGqs=; b=Fh+gDmSb2YoM1P8XvVUf8F7JjP7my/vRjoomztELbdlOmOgi9+NbQb0uHPYmqAGmO1ewSU2rn5MKxbZ4LbvcY6Hu7bXaPUr6vmsuR199WLNYIq/eAMP3dRkxMC3qpPKfqrcbAKMTxNmCApFmKN6iE+c+ZZM/FXqpZVLsG0nCfD1gZ/06zQ3xMLzGe+ulnO834B9e2x5GINL2fiVGCxD+13mR1E3zLHCi72TRRJ0Sh/H4+Xm21D3keuMGrmToHEF25/wT84/LoG1DTJOqh+M+iQwzLnLXTS/W521FS7pNG/ZllJl/t0fkM1OY7AEckswA4VFhzCvR39gx3O/wCpCaPw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.onmicrosoft.com; s=selector1-siemens-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XOpGR/WHJuHjA41B4AzdLKOOD8oPYdZHeYwwfHFwGqs=; b=jm3XISMyOWge5HfNlAsrkl6O/O6GSHHDtRVmX3CDMUFgzPlxEHOmoH+XCuJrQKS4Ssb008djN6+JIVBFoHAsOnV+v7brL7oZrFPO0yh3dN1Qt/65a9OaaPhCpu/FIK6eHdyEx61MfXt0GItF2jmkwCQK+EH1j0n8PgJWcJUig6o= Authentication-Results: googlegroups.com; dkim=none (message not signed) header.d=none;googlegroups.com; dmarc=none action=none header.from=siemens.com; Received: from AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:12a::30) by AM0PR10MB3140.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:189::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.26; Wed, 10 Mar 2021 17:18:24 +0000 Received: from AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM ([fe80::4807:51a1:30ab:908b]) by AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM ([fe80::4807:51a1:30ab:908b%7]) with mapi id 15.20.3912.027; Wed, 10 Mar 2021 17:18:24 +0000 Subject: Re: [PATCH v6 0/5] Add support for containerized root filesystems To: Anton Mikanovich , isar-users@googlegroups.com References: <20210309205239.652677-1-silvano.cirujano-cuesta@siemens.com> From: Silvano Cirujano Cuesta Message-ID: <3d304c0a-a7e7-99c7-fdf0-4946a6a59a7b@siemens.com> Date: Wed, 10 Mar 2021 18:18:23 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-Originating-IP: [2001:a61:b9b:ac02:de3a:1146:19ca:44b6] X-ClientProxiedBy: AM4PR05CA0031.eurprd05.prod.outlook.com (2603:10a6:205::44) To AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:12a::30) Return-Path: silvano.cirujano-cuesta@siemens.com MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from [IPv6:2001:a61:b9b:ac02:de3a:1146:19ca:44b6] (2001:a61:b9b:ac02:de3a:1146:19ca:44b6) by AM4PR05CA0031.eurprd05.prod.outlook.com (2603:10a6:205::44) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17 via Frontend Transport; Wed, 10 Mar 2021 17:18:24 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 3341f8da-b74c-486c-4167-08d8e3e8833b X-MS-TrafficTypeDiagnostic: AM0PR10MB3140: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: xEn5CLvWIS3u51feXvsyDB1C/Ed9hbto1JQd3rI7DElCjaHmxtKkbQX1CBQgSso//dZ1Oiorl1VWoNwkfRa9ZjY2azGAF3gzMNNhaOuvd1FmDonISrhPNK1V7MxEE/3oOvCfHPf6i/Dv3B0bUxslQWXRRXTwTZG01Ob8vcmYK6bcAQpXrxWDbh2TN7aZEJ23OXEgUqlfFmUCPha56MdbGz7w3Q9sunmIfddu2g/jqmuYC5X59l/sRkwGLkoMs1UJcfefLeGDR911FJbVcRD96Yr/oCa1wIWVSogU6+TzRWHbbMhrv/GtAfCS9aR2eS8/uIts1lktPsOJ3ARi+C0RILPzTN1UvJiJ1hOX8Z9MIrtto84H6Zt5DChhT5dYUTg5R3k6VBaeYGXGMRMlx421Ye/Rkn67hISJzOHuGll23rkhE0FEI6QL0dMNTFMrSch6vDpkWRKnND4QxgZOap9E8WItO1zWpyV2wmmvSk6lBq4OGAu4eAmTG87wMi1kewalm6qdJTkqUoMEAnzkyP+OyzRqfI/jMMEheV3xgaxVYMYbnP9k1zhBq8nfPNU438XeCNVVKFclsoHOYDXJQQVepbn10s3/4HNV5VHZ4+LP8wYZKwAHCLukbrqHSBiRWfIQ2Jq3LvBHaYSD4aLi8Hw5vaF2Zbi2PPbNi5qeY3iLSytbKpt80nb7sFAjbnIp51+d X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(4636009)(376002)(39860400002)(396003)(346002)(366004)(136003)(6486002)(316002)(66556008)(53546011)(966005)(2616005)(36756003)(186003)(45080400002)(478600001)(66946007)(16526019)(8936002)(66476007)(30864003)(5660300002)(2906002)(8676002)(83380400001)(31696002)(86362001)(31686004)(45980500001)(43740500002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: =?utf-8?B?WUZ0Y1VpZElKQm5IWXIvS3N5VjdLYURRN2EzeGRnNlFvMXlhNU8rcm5nV29s?= =?utf-8?B?UlA5WSt6cUVSTnNDZXVWTmRqODRaUmdsSkxkVUFyL2VORElrN2Y5bVVmV1J2?= =?utf-8?B?UmwzMzBJM0RUVWJwbVZ0enN1ajJuNDJyRjF2STE0dHZyWmNsTTlYaCtGK2hV?= =?utf-8?B?Y1FacVI0U3BIdndzOE9PTlgzbytKSjFNOXlGQlNnYU5jcW5WU1lSdW1TeEtm?= =?utf-8?B?YUhDUjdVc1FGRGMwbVRMS1lpUlhwMlc3OTRRNGxrZGszRTBOQWdRbnNnb21X?= =?utf-8?B?TWNYcVNUelBGRm9EeGxjNm4zci9lTlFtaHp0ZlZQWnN1RUFvZkplQldybGg0?= =?utf-8?B?VEJDMDM4NUt5b0FVRE9tQWp0Y1pwYmFseS8ydlQ1ZTI0RVo0T05BUU85VnZy?= =?utf-8?B?dmtHa00rZENxL0ZKZVEyWTFzRCtQanhmRHhYMTJvSXNLcnZ5UzVlME92bitk?= =?utf-8?B?U1RVYjUzbzU2bTdWQTZVUmFIekMrMkk5dDJxQ2FzeXhrcGY1WjdiN0EyWlN4?= =?utf-8?B?Qy9XeWVSbmNzWDRpSjhrdFFIdjF5aXd0VHNKM24zcU1hWGpwcWNJcUlDcE9x?= =?utf-8?B?d0h3cXI0Z1VNQUF5UE1ueUlUUHZERk9KWVM2THpkUGM0eVJVMVdvTmlBcm95?= =?utf-8?B?SS9wZE5jRmZvaVMzSjkxVk4rbUVqUmR5ekdrbFB6QkpOLy9WWklKL2xaQXlT?= =?utf-8?B?aUJSNHpRNUY2KzRzd09tLzlNTTIraGNsTm1MeWdXWmN0V28vcEFVL3JHSWY5?= =?utf-8?B?VnhoZURNNnBJSFp0VTZsNllDOXBuaFlVTWU5Z1FqdUppV3pCQm9zU0pSVWFG?= =?utf-8?B?V1o1V2lZTWNiallEc21icUdvOEp1ZldZa1RVc3ZieWJUM2c0KzlRbFFJTVlj?= =?utf-8?B?K2V1NDR1Q3g3eWF2UzVDQmdMcjllUlU2cW15Z2RONGhCWTlQaTg0MG1NbUp0?= =?utf-8?B?SUhDZUZzbmhTbnl5VDhya2JjNjN1cjZFaUlNUnJWZjl2UVl1RGtVOThGdDhK?= =?utf-8?B?YUZXaGZRcEFLaHBOdGtQQlMvQ0QyNWlqMjFPZllHRTljSVdTQ2g5WHBKanA3?= =?utf-8?B?RnNlTHZqSytOY3Q1YkhkL2dSM2JkbGpaRFRsQWV5ODNKa1BuZlFLeVdDL0Vz?= =?utf-8?B?dTRIc3J5UWF4Y2I0bTF0d2c0Q0JjRU1zSVUva0w0bXJSWklRcVZMODA2Rkt3?= =?utf-8?B?Ymg2UURhNm1DR2NkczkvMDlsTkV6UXZnKzhUSnpqKzIrdFdhM0pDYjNKemFU?= =?utf-8?B?eUlLZVd6cnBNY1p5NGFkbmREWWRsYkE0M2traDdCR2ZwbWF6T3pjcGhPVnRH?= =?utf-8?B?K2R4b29kcFZHNjhNS2o2cDdmZzR1T2I0aXh3TUdnTEw5bmNSTk1MaVJPa0NJ?= =?utf-8?B?WnBueXR0UGFtdURjWmNhMU9uNHdMb0grTFd1U0VnWkJRcloyVzFMZGJVWjZO?= =?utf-8?B?L3o1QmVKRUxEdXQrUmoyTEFJMmphRHdPdEFqVHBoZGZxVGZnQmRGNCtjRHl2?= =?utf-8?B?NlM3cG9KV0FOK2tCWFlZOG42V0Z2eVQyVXdmNDlhR0RTWm9KSUNMUzArMXpZ?= =?utf-8?B?NVhlUytQR2JYOW5VRWlMS1hpT3gycDVwd20zUGhmUmhtVCtHZ2hSMzFBTDhJ?= =?utf-8?B?aDJ5WVJwa29Nek9YSDZvaWV1c2RobFdERkM3YTRKZmlhdWlFbFFmSEtHeUtT?= =?utf-8?B?eFJPNEl0SXp1UWp5VWFIdWRLdVZOMFlpMktNZ2Y1czc1alNOR0MvY0tMWHha?= =?utf-8?B?Vm12UG43VHkwc1RlNFY3dHpOenprVWwzbnZvNk1nRGg5d3N2eEUxS2dOSjVr?= =?utf-8?B?WXZQVjUrUE5pd1U2dmZyYXZLazhUYUpqeGtTOTJuQWtEL1NtNVlwZUhXY2xu?= =?utf-8?Q?lFfJMkTUBfYL7?= X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3341f8da-b74c-486c-4167-08d8e3e8833b X-MS-Exchange-CrossTenant-AuthSource: AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2021 17:18:24.7671 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: x0n2CRifej1FPJBaHMUeftNfeI37V5GqsO77zF61nm5mfvqZKIYW2OFxLmQPhNuz2WJ8gLgn/Y+ac6K2lvqB69n7CHVDPFKI6yDem14Tz34tUEBFuBfQtGwLBuqJDw2d X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR10MB3140 X-TUID: ahZdGQGQJqiy On 10/03/2021 17:18, Anton Mikanovich wrote: > 09.03.2021 23:52, Silvano Cirujano Cuesta wrote: >> This patch series provides support for containerized root filesystems, >> for both target images and SDKs. >> >> For containerized target images the new image type `container-img` has >> been added. >> >> For containerized SDKs the task `populate_sdk` has been extended. >> >> Containerized root filesystems are easy to distribute and run, enabling >> this way following scenarios: >>   - Use ISAR to build container images meant to be run only in containers. >>   - Use the same ISAR configuration to build images for containers, VMs >>     and bare-metal. >>   - Easy SDK distribution and "installation". >>   - Quickly testing certain applications in the workstation using the >>     target root filesystem. >> >> In order to build containerized target root filesystems `IMAGE_TYPE` has >> to be `container-img`, additionally the container image format can be >> selected with the variable `CONTAINER_FORMATS`. The default format is >> `docker-archive`. >> >> In order to build containerized SDKs the variable `SDK_FORMAT` has to >> provide any of the supported container formats (e.g. `docker-archive`). >> The default format is the legacy non-containerized: `tar_xz`. >> >> It also provides a sample machine, multiconfigs and ci-testing. >> >> More information about its usage is documented in the file >> docs/user_manual.md. >> >> A PoC/demo of this functionality (only the SDK part) has been created >> based on the project https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fmeta-iot2050&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C70ab5dc719fe445169a008d8e3e01c27%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509898980089588%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=%2FB%2BNBKhRCkVNy%2FGEbAiFgEUZBpy0VmhkWdpvNq2wokM%3D&reserved=0. >> Jan Kiszka already tested and liked it! => >> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fmeta-iot2050%2Fissues%2F86%23issuecomment-768907845&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C70ab5dc719fe445169a008d8e3e01c27%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509898980089588%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=Os3cY15D2myT5sdPINARBh63iwb3GpE5IlupRGnA0v0%3D&reserved=0 >> >> Successful builds of both containerized target and SDK are available on >> the same PoC project: >>   - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Factions%2Fruns%2F558311580&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C70ab5dc719fe445169a008d8e3e01c27%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509898980089588%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=N3DUdGxhNOWlvbatGxopSWPWsMXsXdvsKmIsOh1KtyU%3D&reserved=0 >>   - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Factions%2Fruns%2F558311581&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C70ab5dc719fe445169a008d8e3e01c27%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509898980089588%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=cOkongJ%2BtbrEvaquB241NbaK1nQHHiY%2FrgbYHPFAjeo%3D&reserved=0 >> and also the resulting images: >>   - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fusers%2FSilvanoc%2Fpackages%2Fcontainer%2Fpackage%2Fmeta-iot2050%252Fiot2050-debian-arm64&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C70ab5dc719fe445169a008d8e3e01c27%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509898980089588%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=UegaXdy58CUxX8%2FsDnG8cy3V9uy9IUyh8yA00U%2FSaR4%3D&reserved=0 >>   - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fusers%2FSilvanoc%2Fpackages%2Fcontainer%2Fpackage%2Fmeta-iot2050%252Fiot2050-debian-sdk-arm64&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C70ab5dc719fe445169a008d8e3e01c27%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509898980089588%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=wss3OIVsS2ulaQ4Jr7ria0wMna6Y0U8Ahp9M3XQU5PM%3D&reserved=0 >> >> In order to get a feeling about its usage (you need Docker or Podman), >> follow these simple copy&paste instructions: >> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Fblob%2Fmaster%2Fkas%2FBUILDING-SDK-CONTAINER.md%23running-the-sdk&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C70ab5dc719fe445169a008d8e3e01c27%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509898980089588%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=%2FiIv247NEqKV%2F2osF6hL5S4QiA6T8yqd5TQpi3EbuGQ%3D&reserved=0 >> Build instructions are available in the upper part of that document. >> >> Two new dependencies (umoci and skopeo -backporting from bullseye to >> buster works easily) are required to create containerized root >> filesystems (as specified in the documentation). >> >> Typical container image management actions (e.g. push an image to a >> container image regitry) are out of scope. Available tools (Docker, >> Skopeo, Buildah, Podman,...) should be used for these actions. >> >> A patch will follow this one to get the dependencies into the container >> images being provided by the project >> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fkas&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C70ab5dc719fe445169a008d8e3e01c27%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509898980099579%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=eozG3LQR9pRGIcNiz9a0DckXhkBu8pcas9c%2F%2BWon9mU%3D&reserved=0 (for `kas-container`, for example). >> >> Silvano Cirujano Cuesta (5): >>    classes: add root filesystem containerizing class >>    classes: add new image type 'container-img' >>    sdk: add support for containerized sdk >>    docs: document creation of container images >>    ci: add container image testing configurations >> >>   doc/user_manual.md                            | 127 ++++++++++++++++++ >>   meta-isar/conf/machine/container.conf         |   5 + >>   .../conf/multiconfig/container-bullseye.conf  |   4 + >>   .../conf/multiconfig/container-buster.conf    |   4 + >>   .../conf/multiconfig/container-focal.conf     |   4 + >>   .../conf/multiconfig/container-stretch.conf   |   4 + >>   meta/classes/container-img.bbclass            |  18 +++ >>   .../classes/image-container-extension.bbclass |  81 +++++++++++ >>   meta/classes/image-sdk-extension.bbclass      |  42 +++++- >>   meta/classes/image.bbclass                    |   1 + >>   scripts/ci_build.sh                           |  11 +- >>   11 files changed, 293 insertions(+), 8 deletions(-) >>   create mode 100644 meta-isar/conf/machine/container.conf >>   create mode 100644 meta-isar/conf/multiconfig/container-bullseye.conf >>   create mode 100644 meta-isar/conf/multiconfig/container-buster.conf >>   create mode 100644 meta-isar/conf/multiconfig/container-focal.conf >>   create mode 100644 meta-isar/conf/multiconfig/container-stretch.conf >>   create mode 100644 meta/classes/container-img.bbclass >>   create mode 100644 meta/classes/image-container-extension.bbclass >> > Thanks for adding CI cases, but Jenkins failed during do_populate_sdk: Do you have the documented dependencies (umoci and skopeo backported from bullseye) in the CI system? I've tested the commands manually on my system using kas-container and they worked, but your setup is slightly different. > > 14:17:17 + SDK_FORMAT=docker-archive > 14:17:17 + BB_ENV_WHITELIST=' SDK_FORMAT' > 14:17:17 + bitbake -c do_populate_sdk mc:qemuarm-stretch:isar-image-base > ... > 14:17:18 ERROR: Unable to parse /workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb > 14:17:18 Traceback (most recent call last): > 14:17:18   File "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/parse/ast.py", line 382, in multi_finalize(fn='/workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb', d=): > 14:17:18          try: > 14:17:18     >        finalize(fn, d) > 14:17:18          except bb.parse.SkipRecipe as e: > 14:17:18   File "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/parse/ast.py", line 347, in finalize(fn='/workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb', d=, variant=None): > 14:17:18 > 14:17:18     >        bb.parse.siggen.finalise(fn, d, variant) > 14:17:18 > 14:17:18   File "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/siggen.py", line 182, in SignatureGeneratorBasicHash.finalise(fn='/workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb', d=, variant=None): > 14:17:18              try: > 14:17:18     >            taskdeps = self._build_data(fn, d) > 14:17:18              except bb.parse.SkipRecipe: > 14:17:18   File "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/siggen.py", line 150, in SignatureGeneratorBasicHash._build_data(fn='/workspace/build/isar_am_devel_fast/92/meta-isar/recipes-app/libhello/libhello.bb', d=): > 14:17:18              ignore_mismatch = ((d.getVar("BB_HASH_IGNORE_MISMATCH") or '') == '1') > 14:17:18     >        tasklist, gendeps, lookupcache = bb.data.generate_dependencies(d, self.basewhitelist) > 14:17:18 > 14:17:18   File "/workspace/build/isar_am_devel_fast/92/bitbake/lib/bb/data.py", line 371, in generate_dependencies(d=, whitelist={'SHELL', 'DEPLOY_DIR', 'PRSERV_DUMPFILE', 'SDKPKGSUFFIX', 'FILE_DIRNAME', 'TERM', 'COREBASE', 'LICENSE_PATH', 'STAGING_DIR_HOST', 'SSTATE_PKGARCH', 'PKGDATA_DIR', 'THISDIR', 'USER', 'EXTERNAL_TOOLCHAIN', 'PWD', 'DL_DIR', 'LOGNAME', 'PATH', 'BB_LIMITEDDEPS', 'CCACHE', 'BB_TASKHASH', 'CCACHE_DIR', 'PARALLEL_MAKE', 'BBSERVER', 'PRSERV_LOCKDOWN', 'BBPATH', 'BB_WORKERCONTEXT', 'PRSERV_HOST', 'WORKDIR', 'FILE', 'CCACHE_NOHASHDIR', 'PRSERV_DUMPDIR', 'FILESEXTRAPATHS', 'HOME', 'BUILD_ARCH', 'STAMPCLEAN', 'SSTATE_DIR', 'TMPDIR', 'FILESPATH', 'STAGING_DIR_TARGET'}): > 14:17:18          keys = set(key for key in d if not key.startswith("__")) > 14:17:18     >    shelldeps = set(key for key in d.getVar("__exportlist", False) if d.getVarFlag(key, "export", False) and not d.getVarFlag(key, "unexport", False)) > 14:17:18          varflagsexcl = d.getVar('BB_SIGNATURE_EXCLUDE_FLAGS') > 14:17:18 TypeError: 'NoneType' object is not iterable > > Full log: https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fci.isar-build.org%3A8080%2Fjob%2Fisar_am_devel_fast%2F92%2FconsoleFull&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C70ab5dc719fe445169a008d8e3e01c27%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637509898980099579%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=SS%2FYypaMBwrC9dvwJCeIrW9EjPqVfF2RXFghcfAn4Lc%3D&reserved=0 >