From: Silvano Cirujano Cuesta <silvano.cirujano-cuesta@siemens.com>
To: isar-users@googlegroups.com, "Kiszka,
Jan (CT RDA IOT SES-DE)" <jan.kiszka@siemens.com>
Subject: Re: [PATCH v5 0/4] Add support for containerized root filesystems
Date: Mon, 22 Feb 2021 10:16:13 +0100 [thread overview]
Message-ID: <70c2a4f5-e20d-ccec-aa5a-4a404be9feae@siemens.com> (raw)
In-Reply-To: <20210215133918.50988-1-silvano.cirujano-cuesta@siemens.com>
Friendly reminder
On 15/02/2021 14:39, [ext] Silvano Cirujano Cuesta wrote:
> This patch series provides support for containerized root filesystems,
> for both target images and SDKs.
>
> For containerized target images the new image type `container-img` has
> been added.
>
> For containerized SDKs the task `populate_sdk` has been extended.
>
> Containerized root filesystems are easy to distribute and run, enabling
> this way following scenarios:
> - Use ISAR to build container images meant to be run only in containers.
> - Use the same ISAR configuration to build images for containers, VMs
> and bare-metal.
> - Easy SDK distribution and "installation".
> - Quickly testing certain applications in the workstation using the
> target root filesystem.
>
> In order to build containerized target root filesystems `IMAGE_TYPE` has
> to be `container-img`, additionally the container image format can be
> selected with the variable `CONTAINER_FORMATS`. The default format is
> `docker-archive`.
>
> In order to build containerized SDKs the variable `SDK_FORMAT` has to
> provide any of the supported container formats (e.g. `docker-archive`).
> The default format is the legacy non-containerized: `tar_xz`.
>
> More information about its usage is documented in the file
> docs/user_manual.md.
>
> A PoC/demo of this functionality (only the SDK part) has been created
> based on the project https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fmeta-iot2050&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C2cd3aa178ab34860762f08d8d1b71e87%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637489931711752194%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=WkM3UYp9Bfm7izayxUFAnLH%2FWZMpCPQxZOH5vXz1SM0%3D&reserved=0.
> Jan Kiszka already tested and liked it! =>
> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fmeta-iot2050%2Fissues%2F86%23issuecomment-768907845&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C2cd3aa178ab34860762f08d8d1b71e87%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637489931711752194%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=GjNKEX9eFMYjTDF3f17k9KUammBDStvCdi9yonqgV1o%3D&reserved=0
>
> Successful builds of both containerized target and SDK are available on
> the same PoC project:
> - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Factions%2Fruns%2F558311580&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C2cd3aa178ab34860762f08d8d1b71e87%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637489931711752194%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=Omk6MunatUrP06oYwsWLKeyeUnifRInL9uW1rde4pig%3D&reserved=0
> - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Factions%2Fruns%2F558311581&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C2cd3aa178ab34860762f08d8d1b71e87%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637489931711752194%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=u4jV%2BcWk5cu5m5SflXNtV%2FeejeO5Lks1VqTfKR8riXI%3D&reserved=0
> and also the resulting images:
> - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fusers%2FSilvanoc%2Fpackages%2Fcontainer%2Fpackage%2Fmeta-iot2050%252Fiot2050-debian-arm64&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C2cd3aa178ab34860762f08d8d1b71e87%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637489931711752194%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=W7ThrUDCV94UIEGLDJwnuakDATL43r3KV9YJX1Gi%2F84%3D&reserved=0
> - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fusers%2FSilvanoc%2Fpackages%2Fcontainer%2Fpackage%2Fmeta-iot2050%252Fiot2050-debian-sdk-arm64&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C2cd3aa178ab34860762f08d8d1b71e87%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637489931711752194%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=CPd2YFNnth%2Fokhh3F9CL2T0tOvKKBoX22R1kHPHsI6M%3D&reserved=0
>
> In order to get a feeling about its usage (you need Docker or Podman),
> follow these simple copy&paste instructions:
> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Fblob%2Fmaster%2Fkas%2FBUILDING-SDK-CONTAINER.md%23running-the-sdk&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C2cd3aa178ab34860762f08d8d1b71e87%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637489931711752194%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=Z3%2FQeloU%2FAfPTeAWT7QLB9ORtEJ2V4Y9v0%2B3zX8D4L4%3D&reserved=0
> Build instructions are available in the upper part of that document.
>
> Two new dependencies are required to create containerized root
> filesystems (as specified in the documentation).
>
> Typical container image management actions (e.g. push an image to a
> container image regitry) are out of scope. Available tools (Docker,
> Skopeo, Buildah, Podman,...) should be used for these actions.
>
> A patch will follow this one to get the dependencies into the container
> images being provided by the project
> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fkas&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7C2cd3aa178ab34860762f08d8d1b71e87%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637489931711752194%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=lwdYFdlfKLiKEYMhyx3VW15%2B5t70noxUgJhwOCXQ5Fo%3D&reserved=0 (for `kas-container`, for example).
>
> Silvano Cirujano Cuesta (4):
> classes: add root filesystem containerizing class
> classes: add new image type 'container-img'
> sdk: add support for containerized sdk
> docs: document creation of container images
>
> doc/user_manual.md | 127 ++++++++++++++++++
> meta/classes/container-img.bbclass | 18 +++
> .../classes/image-container-extension.bbclass | 79 +++++++++++
> meta/classes/image-sdk-extension.bbclass | 42 +++++-
> meta/classes/image.bbclass | 1 +
> 5 files changed, 260 insertions(+), 7 deletions(-)
> create mode 100644 meta/classes/container-img.bbclass
> create mode 100644 meta/classes/image-container-extension.bbclass
>
--
Siemens AG, T RDA IOT SES-DE
Corporate Competence Center Embedded Linux
next prev parent reply other threads:[~2021-02-22 9:16 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-02-15 13:39 Silvano Cirujano Cuesta
2021-02-15 13:39 ` [PATCH v5 1/4] classes: add root filesystem containerizing class Silvano Cirujano Cuesta
2021-02-15 13:39 ` [PATCH v5 2/4] classes: add new image type 'container-img' Silvano Cirujano Cuesta
2021-02-15 13:39 ` [PATCH v5 3/4] sdk: add support for containerized sdk Silvano Cirujano Cuesta
2021-02-15 13:39 ` [PATCH v5 4/4] docs: document creation of container images Silvano Cirujano Cuesta
2021-02-22 9:16 ` Silvano Cirujano Cuesta [this message]
2021-02-23 8:03 ` [PATCH v5 0/4] Add support for containerized root filesystems Jan Kiszka
2021-03-02 9:05 ` Anton Mikanovich
2021-03-02 9:30 ` Silvano Cirujano Cuesta
2021-03-02 13:30 ` Anton Mikanovich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=70c2a4f5-e20d-ccec-aa5a-4a404be9feae@siemens.com \
--to=silvano.cirujano-cuesta@siemens.com \
--cc=isar-users@googlegroups.com \
--cc=jan.kiszka@siemens.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox