From: Jan Kiszka <jan.kiszka@siemens.com>
To: Silvano Cirujano Cuesta <silvano.cirujano-cuesta@siemens.com>,
isar-users@googlegroups.com
Subject: Re: [PATCH 1/2] sdk: support creation of container image
Date: Fri, 5 Feb 2021 12:29:46 +0100 [thread overview]
Message-ID: <724da05d-7eeb-73de-05a4-5effab51086f@siemens.com> (raw)
In-Reply-To: <62b4993c-0a7d-f29d-9c65-978936fd8e7c@siemens.com>
On 05.02.21 12:24, Silvano Cirujano Cuesta wrote:
>
> On 05/02/2021 12:07, Jan Kiszka wrote:
>> On 05.02.21 10:08, [ext] Silvano Cirujano Cuesta wrote:
>>> Extend task "populate_sdk" to support the creation of a container image
>>> containing the SDK.
>>>
>>> Signed-off-by: Silvano Cirujano Cuesta <silvano.cirujano-cuesta@siemens.com>
>>> ---
>>> meta/classes/image-sdk-extension.bbclass | 104 +++++++++++++++++++++--
>>> 1 file changed, 97 insertions(+), 7 deletions(-)
>>>
>>> diff --git a/meta/classes/image-sdk-extension.bbclass b/meta/classes/image-sdk-extension.bbclass
>>> index a8c708a..082b16d 100644
>>> --- a/meta/classes/image-sdk-extension.bbclass
>>> +++ b/meta/classes/image-sdk-extension.bbclass
>>> @@ -6,10 +6,81 @@
>>> # This class extends the image.bbclass to supply the creation of a sdk
>>>
>>> SDK_INCLUDE_ISAR_APT ?= "0"
>>> +SDK_FORMATS ?= "tar-xz"
>>> +
>>> +sdk_tar_xz() {
>>> + # Copy mount_chroot.sh for convenience
>>> + sudo cp ${SCRIPTSDIR}/mount_chroot.sh ${SDKCHROOT_DIR}
>>> +
>>> + # Create SDK archive
>>> + cd -P ${SDKCHROOT_DIR}/..
>>> + sudo tar --transform="s|^rootfs|sdk-${DISTRO}-${DISTRO_ARCH}|" \
>>> + -c rootfs | xz -T0 > ${DEPLOY_DIR_IMAGE}/sdk-${DISTRO}-${DISTRO_ARCH}.tar.xz
>>> + bbnote "SDK rootfs available in ${DEPLOY_DIR_IMAGE}/sdk-${DISTRO}-${DISTRO_ARCH}.tar.xz"
>>> +}
>>> +
>>> +sdk_container_images() {
>>> + local cmd="/bin/dash"
>>> + local empty_tag="empty"
>>> + local full_tag="latest"
>>> + local oci_img_dir="${WORKDIR}/oci-image"
>>> + local sdk_container_formats="$1"
>>> +
>>> + # prepare OCI container image skeleton
>>> + sudo umoci init --layout "${oci_img_dir}"
>>> + sudo umoci new --image "${oci_img_dir}:${empty_tag}"
>>> + sudo umoci config --image "${oci_img_dir}:${empty_tag}" \
>>> + --config.cmd="${cmd}"
>>> + sudo umoci unpack --image "${oci_img_dir}:${empty_tag}" \
>>> + "${oci_img_dir}_unpacked"
>>> +
>>> + # add SDK root filesystem as the flesh of the skeleton
>>> + sudo cp -a "${SDKCHROOT_DIR}"/* "${oci_img_dir}_unpacked/rootfs/"
>>> +
>>> + # pack container image
>>> + sudo umoci repack --image "${oci_img_dir}:${full_tag}" \
>>> + "${oci_img_dir}_unpacked"
>>> + sudo umoci remove --image "${oci_img_dir}:${empty_tag}"
>>> + sudo rm -rf "${oci_img_dir}_unpacked"
>>> +
>>> + # no root needed anymore
>>> + sudo chown --recursive $(id -u):$(id -g) "${oci_img_dir}"
>>> +
>>> + # convert the OCI container image to the desired format
>>> + sdk_id="sdk-${DISTRO}-${DISTRO_ARCH}"
>>> + image_name="isar-${sdk_id}"
>>> + image_archive="${DEPLOY_DIR_IMAGE}/${sdk_id}-${sdk_format}.tar"
>>> + for sdk_format in ${sdk_container_formats} ; do
>>> + case "${sdk_format}" in
>>> + "docker-archive" | "oci-archive")
>>> + if [ "${sdk_format}" = "oci-archive" ] ; then
>>> + target="${sdk_format}:${image_archive}:latest"
>>> + else
>>> + target="${sdk_format}:${image_archive}:${image_name}:latest"
>>> + fi
>>> + skopeo --insecure-policy copy \
>>> + "oci:${oci_img_dir}:${full_tag}" "${target}"
>>> + xz -T0 "${image_archive}"
>>> + bbnote "Containerized SDK available in ${image_archive}.xz"
>>> + ;;
>>> + "oci")
>>> + tar --create --xz --directory "${oci_img_dir}" \
>>> + --file "${image_archive}.xz" .
>>> + bbnote "Containerized SDK available in ${image_archive}.xz"
>>> + ;;
>>> + "docker-daemon" | "containers-storage")
>>> + skopeo --insecure-policy copy \
>>> + "oci:${oci_img_dir}:${full_tag}" \
>>> + "${sdk_format}:${image_name}:latest"
>>> + bbnote "Containerized SDK available in ${sdk_format} as '${image_name}:latest'"
>>> + ;;
>>> + esac
>>> + done
>>> +}
>>>
>>> do_populate_sdk[stamp-extra-info] = "${DISTRO}-${MACHINE}"
>>> do_populate_sdk[depends] = "sdkchroot:do_build"
>>> -do_populate_sdk[vardeps] += "SDK_INCLUDE_ISAR_APT"
>>> +do_populate_sdk[vardeps] += "SDK_INCLUDE_ISAR_APT SDK_FORMATS"
>>> do_populate_sdk() {
>>> if [ "${SDK_INCLUDE_ISAR_APT}" = "1" ]; then
>>> # Copy isar-apt with deployed Isar packages
>>> @@ -48,12 +119,31 @@ do_populate_sdk() {
>>> done
>>> done
>>>
>>> - # Copy mount_chroot.sh for convenience
>>> - sudo cp ${SCRIPTSDIR}/mount_chroot.sh ${SDKCHROOT_DIR}
>>> + # separate SDK formats: TAR and container formats
>>> + container_formats=""
>>> + for sdk_format in ${SDK_FORMATS} ; do
>>> + case ${sdk_format} in
>>> + "tar-xz")
>>> + sdk_tar_xz
>>> + ;;
>>> + "docker-archive" | "oci" | "oci-archive")
>>> + container_formats="${container_formats} ${sdk_format}"
>>> + ;;
>>> + "docker-daemon" | "containers-storage")
>>> + if [ -f /.dockerenv ] || [ -f /run/.containerenv ] ; then
>>> + die "Adding the SDK container image to a container runtime (${sdk_format}) not supported if running from a container (e.g. 'kas-container')"
>>> + fi
>>> + ;;
>>> + *)
>>> + die "unsupported SDK format specified: ${sdk_format}"
>>> + ;;
>>> + esac
>>> + done
>>>
>>> - # Create SDK archive
>>> - cd -P ${SDKCHROOT_DIR}/..
>>> - sudo tar --transform="s|^rootfs|sdk-${DISTRO}-${DISTRO_ARCH}|" \
>>> - -c rootfs | xz -T0 > ${DEPLOY_DIR_IMAGE}/sdk-${DISTRO}-${DISTRO_ARCH}.tar.xz
>>> + # generate the SDK in all the desired container formats
>>> + if [ -n "${container_formats}" ] ; then
>>> + bbnote "Generating SDK container in${container_formats} format"
>>> + sdk_container_images "${container_formats}"
>>> + fi
>>> }
>>> addtask populate_sdk after do_rootfs
>>>
>> How much of this would be reusable of generating a container from a
>> target rootfs? We should avoid shuffling code around if we can already
>> line things up nicely while introducing it.
>
> With that reuse in mind I can refactor the code to have a class that can be reused for both SDK and target rootfs. It's not a big deal.
>
> Is it somehow related to the huge "some image classes" thread that is active right now?
>
Not directly related, but container images would fall into that same
category.
Jan
--
Siemens AG, T RDA IOT
Corporate Competence Center Embedded Linux
next prev parent reply other threads:[~2021-02-05 11:29 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-02-05 9:08 [PATCH 0/2] Add support for containerized SDKs Silvano Cirujano Cuesta
2021-02-05 9:08 ` [PATCH 1/2] sdk: support creation of container image Silvano Cirujano Cuesta
2021-02-05 11:07 ` Jan Kiszka
2021-02-05 11:24 ` Silvano Cirujano Cuesta
2021-02-05 11:29 ` Jan Kiszka [this message]
2021-02-05 17:52 ` Silvano Cirujano Cuesta
2021-02-05 18:20 ` Jan Kiszka
2021-02-05 9:08 ` [PATCH 2/2] docs: document usage of sdk container images Silvano Cirujano Cuesta
2021-02-05 11:07 ` Jan Kiszka
2021-02-05 14:58 ` Silvano Cirujano Cuesta
2021-02-05 18:21 ` Jan Kiszka
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=724da05d-7eeb-73de-05a4-5effab51086f@siemens.com \
--to=jan.kiszka@siemens.com \
--cc=isar-users@googlegroups.com \
--cc=silvano.cirujano-cuesta@siemens.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox