From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6927266035414335488 X-Received: by 2002:ac2:5444:: with SMTP id d4mr12358362lfn.126.1614677452755; Tue, 02 Mar 2021 01:30:52 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a19:ac46:: with SMTP id r6ls7593017lfc.2.gmail; Tue, 02 Mar 2021 01:30:51 -0800 (PST) X-Google-Smtp-Source: ABdhPJwGv21T1J7zqD8XvTFxn27jknEsPIhTol2SwFrSVUHpIbh1MLVW7vK/813qn3/LIznNJ+X2 X-Received: by 2002:a19:309:: with SMTP id 9mr12383272lfd.268.1614677451787; Tue, 02 Mar 2021 01:30:51 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1614677451; cv=pass; d=google.com; s=arc-20160816; b=JjMCBu68kYs3uF0PDeJS88Lxfa/duDjnBLhuCLcKvl8ZPY58/coKJRgcubUk/aTrWc x0K1ybMyN+yVKX7S043bltIGRXyak35ZhDNTMOWmKCFUexgVhRQWO1O/vH9HOYfyJ/iR lKHkHnN7KjGW5hslvSVs6seyFUlUD69QqWtfsAAZX8sAhXmO2RUZMemSiMV3yiIOQD63 ZSZtgjuPz6qE1CYTZkE0+Q0oyktu3MzAML0ck9TCICQCraJ5v1amwsMm9ppipJKCtCtX 480f0c+4rp7FMg+6tV6fWHm70IYjRQwZQ1q+RTrwcXM+Ms5r6bzD9ewzUpSebdA6eNB1 DFfw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:content-language:content-transfer-encoding:in-reply-to :user-agent:date:message-id:from:references:to:subject :dkim-signature; bh=KX/0+/y81cGfvuBWqhmQW4oKaXdlJFyhF7UJiBadO18=; b=k1deYnmVPEEoVFdaocVz0SSFwOOY4Vw0+w75EVfhfAU2uPsvIgGEwsx27PDVPhjcIJ E1u1cD7B9v9aBzV7Z0NC8knMeYN8jvRBeN/DQb9nbmqGI4YPWAFfGGpd1rIscfI0tPCJ rlcE3H6ZxhW6RMTEU2uaYuQ28tBhkelWbRfXOsLJFlgyVc/wYRLsIeNX6BkCZ5Qym0Xi y1olAuErJlfMLXCsaq6diPkhYMGoqk1/IEK24QoDxP+kc3e10Te21ToKMzI95T6bv4c+ 7leRgjnpBnk46WTJhrZ/u1WEQIil4DGYCIJozKJy/OBC+KPL318fHAZFk+jVIpyxIqxi F1PQ== ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.onmicrosoft.com header.s=selector1-siemens-onmicrosoft-com header.b=KaqKuNtC; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.5.55 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50055.outbound.protection.outlook.com. [40.107.5.55]) by gmr-mx.google.com with ESMTPS id a17si510606ljq.5.2021.03.02.01.30.51 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 02 Mar 2021 01:30:51 -0800 (PST) Received-SPF: pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.5.55 as permitted sender) client-ip=40.107.5.55; Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.onmicrosoft.com header.s=selector1-siemens-onmicrosoft-com header.b=KaqKuNtC; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.5.55 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=INWPW6QpeDAf5Y7pan6VlG0cMAsQJRyKEKYrmiU+4s2JXO42+N1cm+uJEoupNalgm2VdLY830CsGjZlTCDL2hYaYMD/pX6Q6gAyvSq7lXyJPoisLcABLMvCF8gPqCoo4cD4EExQrhCA6x9SzeU53bJjMeNvl0fXpSgtdhn8mzgfG4R9sXQhOhUza6Qhkjng4H7YOa/BOtZlcVom1kH9xK0XcNkBqTfT75MpvIbD7oiF+Ex+BFYsm9UQhNU8j0YL5/FrHDq09wp8RTM7g1rmES7bQE+kyeiNnyTJytftJ29qeGBMlqkM61SMhdOyVGbDi01vAnl4Cx3h1SQfgkhn0lw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KX/0+/y81cGfvuBWqhmQW4oKaXdlJFyhF7UJiBadO18=; b=l3JkzVodZu644nxESizkEE2i2WOCgOoFq5LddNX1kQJ2s20uI22/OmheOkMrJ4Ycgr5Dy14UnXJq1cGG+pNcEPo3qvWE9XY4HJSibVjM8ods0QfnFyjFrbiwDfUP/xT0pEcTmndA+vwTZgON2+85QpdKwaez5LOkqvJx2rCJrkiHnjJ/wfFGJK0u8MMzCvP5Sk60UWWyD5xErSOLIXYJmgoFgvf80MjI5fMNaO/efoD1gDI9jXfLGMfhtb5j1U0QCU4P0OmaMkRoOkgg3gz7hKNl6pLoiqPt4COuqzSDQYyDuj52x74ofN3iW30TeBVJEWnPv+bq1xIbbRhpEWu3xg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.onmicrosoft.com; s=selector1-siemens-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KX/0+/y81cGfvuBWqhmQW4oKaXdlJFyhF7UJiBadO18=; b=KaqKuNtCUjr/DbNF1uA0wplRBVFVZ32290Y8EGhQ+Ei0SSCG23LtGBmCHCOQ9vaNWwZPVpz3TiBGxQlTlhY91rsKUTNIBURf18gIO/uxnCR5JWx8v5UxfYFkzJ56KzV3N7/ITeER2yMMoxmeBz3L2lU414smeSzltAjm1w2Bks0= Authentication-Results: googlegroups.com; dkim=none (message not signed) header.d=none;googlegroups.com; dmarc=none action=none header.from=siemens.com; Received: from AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:12a::30) by AM0PR10MB2707.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:124::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.23; Tue, 2 Mar 2021 09:30:50 +0000 Received: from AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM ([fe80::14f7:2b4:e15c:c584]) by AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM ([fe80::14f7:2b4:e15c:c584%7]) with mapi id 15.20.3890.028; Tue, 2 Mar 2021 09:30:50 +0000 Subject: Re: [PATCH v5 0/4] Add support for containerized root filesystems To: Anton Mikanovich , isar-users@googlegroups.com References: <20210215133918.50988-1-silvano.cirujano-cuesta@siemens.com> From: Silvano Cirujano Cuesta Message-ID: <79edd6c9-31d3-ad42-f2eb-85eae66d600a@siemens.com> Date: Tue, 2 Mar 2021 10:30:43 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-Originating-IP: [2001:a61:b9b:ac02:de3a:1146:19ca:44b6] X-ClientProxiedBy: AM0PR03CA0054.eurprd03.prod.outlook.com (2603:10a6:208::31) To AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:12a::30) Return-Path: silvano.cirujano-cuesta@siemens.com MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from [IPv6:2001:a61:b9b:ac02:de3a:1146:19ca:44b6] (2001:a61:b9b:ac02:de3a:1146:19ca:44b6) by AM0PR03CA0054.eurprd03.prod.outlook.com (2603:10a6:208::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.20 via Frontend Transport; Tue, 2 Mar 2021 09:30:49 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 8594a279-007f-420b-a1da-08d8dd5dddfe X-MS-TrafficTypeDiagnostic: AM0PR10MB2707: X-MS-Exchange-MinimumUrlDomainAge: github.com#4893 X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: qFB3V8w5GLqCCrpr+6rx28ETWX5KIo2h9LjQ1lzM0Y7/D8HJDQlTvhSulKfWEM+lPO/t2b40Y3YO6JweBGvexS4G33KFLwrFyZHbjVUnFqVZ9q8z93seN/4uYBIxHF5tJIp+nza1Rv1jnZ89iUb2qHmEQ76aTHdk27OA1Z+gC+QHIKzxMEAZ0Y04wePG1yBs0+tR/zJzCX0PlpToJelwFPHyo/7QUzx/LUI4xjvWGaOdTpwiWmJ73IIcRP38N35kEs/oM7b34GzmmIvPwp8n2Ptz/ptgGB6QUjLgtFbR3xDr51CJse8r4PfKU/iocHHj68P62ylbuRkd63bNZjb6EHHh2SowhaVx27pD66UoDDQweUMqjgRPa0DJHpRN3GBkHrac50RdNjuE/a8kMW7+g4dDRyHxi+t5YHLvkniLONaDEXvWFgQdw3R1ugzYQrFLDxPeyA/DQ4W9U38rj4ampH6UZZ56Zn0AFyzix5TJXiv4ri/AgVmOCTIcIBouFQw5PP+SCZssKX5GgiU+B7AzscpZmul2Dkz90y3VR+1jReIHBIWQw0HYFzzV0P6yPzlFZjOpF0KKkcUbqG3fbCKGaGtq/Luih+ueqfeq1P/Lw9VQGhPaO1z+/enGEN1yd6HnKXuv8zNkC6rGS+tQY3VDjnl+G8PoI0w4d0EeKmDv9ko2GcMT9bIt5B6kxg2sm3k0 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(4636009)(396003)(39860400002)(136003)(346002)(376002)(366004)(966005)(2906002)(31696002)(2616005)(31686004)(478600001)(83380400001)(6486002)(6666004)(8676002)(16526019)(8936002)(66556008)(36756003)(53546011)(316002)(66946007)(86362001)(66476007)(5660300002)(45080400002)(186003)(45980500001)(43740500002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: =?utf-8?B?WGczc1YxTHJzUFlNMnMwTE1iTHZXYkJFWFM2eFI2Zkl1V2UxTjFTRjRjcnRR?= =?utf-8?B?L1ZWaVdVaThtdzhCdG5keHVOZ2l2dnJXRG55dEhNZVBOdS9zWGtaZkl4Y2hr?= =?utf-8?B?N21IVU5LQmVoNVNaT3dRSlc5dEs3YmxPd0JYUysyUmsrYW52Umg5NTNuNDFt?= =?utf-8?B?L2xlbGswWVB4QlZBS1FPMHFlV3cxUkJ2VS81d255d3FsNSsrWGZJSHlNN3Y1?= =?utf-8?B?bzBJZHVyMHpray83aDNDZVFqcWg5TUIra20vNTgyTElFbnczUU8yUEk5aFhP?= =?utf-8?B?S1habklvdnB2RlE4bzhXSzh3RzVKcHNDNkIweUFheFdncUdTamxMbW4yZGhn?= =?utf-8?B?S3NEOW9RL3JnRW1lTUtEN0FBS0I3SHB0VWU5cWpmZmxtb0dCNXVBdVU2V1Jw?= =?utf-8?B?MkdOZ3NEOUt3MkhyY1NFYVVSKzg4aThBdTgvVWE0L0pMWTFOU2JCazNqbGtx?= =?utf-8?B?MHd0bU9rT3hEMS8rRnZxWmFXUkdDV1J2emE1cTQ5VUxOZGwzMGlUZURrbGQ1?= =?utf-8?B?RW5ReHpQVDVFNmZvQkdWVnk1VUUwV1Zna0NsMGs3ZHMxbGxCcEJRUXhhZUhL?= =?utf-8?B?dEZ2L1ZkLzltb3doZGJCMVpDT1JvUnFJSWlGUEI0d1BWVmFZbG1kdG8ybWhN?= =?utf-8?B?aERaWmE4VTdNTFIrMW9oTi9WWDZLVm16a2ZHNmpUTDZ3b2JpWUt0bU1ILzR2?= =?utf-8?B?ejg0VEI3ejhFSmJMUjZ1SzJ4Z1hCbjNzNDQzdXJXNHcwUUxEclUxK2M5MStl?= =?utf-8?B?cXdkYU51UnQzem5DK1dnaGpyTTJKR3FvM1BHYXVuNkRXSzdtZTVEaHJrUWZF?= =?utf-8?B?SVBUVlJudk5pYUdvcFdNU1lGVHNvdGdJRm55K1o4TmM3NVNuTjFmOC9sNjRy?= =?utf-8?B?bzFXWElEU2lUeHRiVzdUYW5iQ1BIbHhOOFFvNWhjNjExc2xRTlA4MkRibEUx?= =?utf-8?B?bmdYUWlFTW53OVFiY04xTkRlUzFIQm9LSWVEZW12WFYrVzBFeFRuczJEMTho?= =?utf-8?B?aEY0ZnhrVXZUdGtha2dOYTR5Uyt2VFB4ekVJMXJVRjdtSmNQdGJ4amxkbE5i?= =?utf-8?B?WTdqcWYwbWkxMlptb3VYTVFldkIraUVQelIxL1NlV003YU1XR1hZcU12RGdq?= =?utf-8?B?RUk5NmtaWkRRaXFheHVjb2k4NUdldDI4czdoMmI0bGFVekxqK01lVlRwZmJR?= =?utf-8?B?OS9wY2xHQ3dzUmpSMi9BNDZYNmRCSzRuSUdTSW4vY0pzRVRWOWdOeVpsRUJC?= =?utf-8?B?Sm9FOEdabFg5Vldjb1l6RDJrcXRLenk1VlZBUWdNZkJxU0JTSWpoUVFWRXEz?= =?utf-8?B?UDVLeGFCTmt3cXBIbGsvRFlwSlNUcktJWU8rN25sS2x4bCt6MTBMOFlZcE1q?= =?utf-8?B?SS9VWWMranc2M3Y3bWdUWDRpUlBaVHo2dC9EaGpIUXJTUzFncUd5eVhSaU9V?= =?utf-8?B?YVNJRllwbm9RWXdNeGZyRFZuRUFveDlBMWZyenpITVRMV1JEVy83ZTZQbU1q?= =?utf-8?B?a29WYmhuOGtqR29hekZvd1ArL09vaytEMitEVXpJT1M5dmhUaTJIUzVldE42?= =?utf-8?B?dDBkM1I5TWwrZEdTN0VHQ0ZzK3JpQnk5MkkvTDdyT01pZ0tGcW9vQitmR1VF?= =?utf-8?B?VThpeXcyNUJHcVo4eXFWWjlFdkQ4K1BUTG1yV2gzbW1zRi9OTGFqQ1k5WWh5?= =?utf-8?B?Rm1YMUhJYkhCYjJ5VWFjdlhhdnQyOGpGZnM1bXA5SHdTL2NaV3pxTmZEMEc5?= =?utf-8?B?dlpCUVM4MXNSN1BMK0c5Q0ZVQml4bEdwRTNsU0FCK3NPLzdZc24zVWN4S2lM?= =?utf-8?B?NXhMaGw5N0lWTEJ3eVBnQi9FME1rQWt2U3lnaXVMQUJIMWR0VG9LRTI4MDc5?= =?utf-8?Q?vNg3vz4XGwgwj?= X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8594a279-007f-420b-a1da-08d8dd5dddfe X-MS-Exchange-CrossTenant-AuthSource: AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2021 09:30:50.0943 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: nSVZPufwPWk0w9CRYoVd8fcm6Q6Hh/jQT51B8j0KM/6sP+LYvhSaMOcCAWOddZ888zh30E8iIISZLR1BcJ6QxtzUqt9O2zPZYQ9Km+2AtS2vaAJNQJUrKGvjYrU+GKoo X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR10MB2707 X-TUID: psjdU6y3WnCP On 02/03/2021 10:05, Anton Mikanovich wrote: > 15.02.2021 16:39, Silvano Cirujano Cuesta wrote: >> This patch series provides support for containerized root filesystems, >> for both target images and SDKs. >> >> For containerized target images the new image type `container-img` has >> been added. >> >> For containerized SDKs the task `populate_sdk` has been extended. >> >> Containerized root filesystems are easy to distribute and run, enabling >> this way following scenarios: >>   - Use ISAR to build container images meant to be run only in containers. >>   - Use the same ISAR configuration to build images for containers, VMs >>     and bare-metal. >>   - Easy SDK distribution and "installation". >>   - Quickly testing certain applications in the workstation using the >>     target root filesystem. >> >> In order to build containerized target root filesystems `IMAGE_TYPE` has >> to be `container-img`, additionally the container image format can be >> selected with the variable `CONTAINER_FORMATS`. The default format is >> `docker-archive`. >> >> In order to build containerized SDKs the variable `SDK_FORMAT` has to >> provide any of the supported container formats (e.g. `docker-archive`). >> The default format is the legacy non-containerized: `tar_xz`. >> >> More information about its usage is documented in the file >> docs/user_manual.md. >> >> A PoC/demo of this functionality (only the SDK part) has been created >> based on the project https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fmeta-iot2050&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7Cad4bf8937210493b054b08d8dd5a524a%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637502727284407780%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=dQs%2Fz96YDE2A7P8vduYstzhPzPtgtmTMj%2BbL7rzJ7SA%3D&reserved=0. >> Jan Kiszka already tested and liked it! => >> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fmeta-iot2050%2Fissues%2F86%23issuecomment-768907845&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7Cad4bf8937210493b054b08d8dd5a524a%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637502727284417779%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=EbMCfrcIp7Ox6g3qu76ZAEbfD0Hi2uFdQg8k3vRRjfQ%3D&reserved=0 >> >> Successful builds of both containerized target and SDK are available on >> the same PoC project: >>   - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Factions%2Fruns%2F558311580&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7Cad4bf8937210493b054b08d8dd5a524a%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637502727284417779%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=GrSzLMcn5FCpBxbfiN6MR1JmDM2br4SiIZ8Sr3T5VZ0%3D&reserved=0 >>   - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Factions%2Fruns%2F558311581&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7Cad4bf8937210493b054b08d8dd5a524a%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637502727284417779%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=KOK%2FrnO2koZGMMvmVTvY2btxk8pQtSk94erdp6kSgjw%3D&reserved=0 >> and also the resulting images: >>   - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fusers%2FSilvanoc%2Fpackages%2Fcontainer%2Fpackage%2Fmeta-iot2050%252Fiot2050-debian-arm64&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7Cad4bf8937210493b054b08d8dd5a524a%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637502727284417779%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=a7PR38IxA8bv3w3AEytnAI3AmTxWEMNsgsdMh%2FB09z4%3D&reserved=0 >>   - https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fusers%2FSilvanoc%2Fpackages%2Fcontainer%2Fpackage%2Fmeta-iot2050%252Fiot2050-debian-sdk-arm64&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7Cad4bf8937210493b054b08d8dd5a524a%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637502727284417779%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=cUwlR32HYINq2uZFbsAgDpc5RVh4OeECEb8z1tFy%2Fpc%3D&reserved=0 >> >> In order to get a feeling about its usage (you need Docker or Podman), >> follow these simple copy&paste instructions: >> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FSilvanoc%2Fmeta-iot2050%2Fblob%2Fmaster%2Fkas%2FBUILDING-SDK-CONTAINER.md%23running-the-sdk&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7Cad4bf8937210493b054b08d8dd5a524a%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637502727284417779%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=johK8ZhCGDLqu1ylY0zhdsTNs4H9xi8fTXR5PZiG0Co%3D&reserved=0 >> Build instructions are available in the upper part of that document. >> >> Two new dependencies are required to create containerized root >> filesystems (as specified in the documentation). >> >> Typical container image management actions (e.g. push an image to a >> container image regitry) are out of scope. Available tools (Docker, >> Skopeo, Buildah, Podman,...) should be used for these actions. >> >> A patch will follow this one to get the dependencies into the container >> images being provided by the project >> https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fsiemens%2Fkas&data=04%7C01%7Csilvano.cirujano-cuesta%40siemens.com%7Cad4bf8937210493b054b08d8dd5a524a%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C637502727284417779%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=XTlGc05JGsY%2FidOi7OTUU1znz4cAOrU5zO5WLo251kA%3D&reserved=0 (for `kas-container`, for example). >> >> Silvano Cirujano Cuesta (4): >>    classes: add root filesystem containerizing class >>    classes: add new image type 'container-img' >>    sdk: add support for containerized sdk >>    docs: document creation of container images >> >>   doc/user_manual.md                            | 127 ++++++++++++++++++ >>   meta/classes/container-img.bbclass            |  18 +++ >>   .../classes/image-container-extension.bbclass |  79 +++++++++++ >>   meta/classes/image-sdk-extension.bbclass      |  42 +++++- >>   meta/classes/image.bbclass                    |   1 + >>   5 files changed, 260 insertions(+), 7 deletions(-) >>   create mode 100644 meta/classes/container-img.bbclass >>   create mode 100644 meta/classes/image-container-extension.bbclass >> > Do you plan to put both sdk and rootfs container creation under CI case (in docker-archive format probably, not to ruin kas-docker building)? Sorry, I don't get the question. Could you please rephrase the question? In any case both of them can be run locally or on CI. In fact I've carefully selected the tools so that they can run on unprivileged containers being widely extended tools (umoci in fact is part of the OCI toolset). BR,   Silvano