From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6945105578761912320 X-Received: by 2002:ac2:5394:: with SMTP id g20mr18836436lfh.8.1618211648354; Mon, 12 Apr 2021 00:14:08 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:ac2:5081:: with SMTP id f1ls363389lfm.2.gmail; Mon, 12 Apr 2021 00:14:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwItesLlkgjprk94t/BycZw96qrs8IFg7d2+iP523U9sSajrqtb7qZbQk8ECOOOwJ8evHyX X-Received: by 2002:a05:6512:48d:: with SMTP id v13mr13233322lfq.485.1618211647369; Mon, 12 Apr 2021 00:14:07 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1618211647; cv=pass; d=google.com; s=arc-20160816; b=PTnOgu8Bd5QX76wFrfKrEl8cORfXX7kKU24ZhYSPO7ocQvMV9FyPFGuX6XGKnxWCFK FwbewPm/sGxPIHwF/K1KqOQwpVu9gMqDcS6nFtp1DbEjc6iBnh0Te4Lz0Ay6CBvCGINX pMQfX7GWy2eyE2VEZf5Y6w68TNRnXQE5E1iCMmxJ58AnJwogINXuXP3U99sRWYCl651p TaojCqPnK46N7Dv+WvCiAZaanoxEW8ff81Qe1Ar524EMJZXUElkqwg/7fvTXVnBKNOIb BgITyorUGPDH0lzMVJaLf1nvNDkG3W/z+mCMsYnWBGL9y5/kjKBnOy8ZSkujxhcsIrmL CCWQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:content-language:content-transfer-encoding:in-reply-to :user-agent:date:message-id:references:to:subject:from :dkim-signature; bh=dw9EJ3EVE59a3fhdSoGM5wJPvVh+Rcpq3rrfVOASUKA=; b=DUVdaEt+oO90JBMvxOfoFYPY5Gfe/fq7cT3yev8H+9tS0029zIXzBOrTglJ1pAXjkS M4O3+AhMo6KySQHlK4Z9vH0E0uzYpzBAl2OYcSZoW0Qdnvbcpjh9Gkdm14nJjDMpXmG4 8b4s80qBv4OMIDkDmrtQxSqJe/fk4YN+lQAo958GqUG5/B+zO6TItU46r6/AVOavVIcY zWjFEl98XpHg122egXHgTNG7qLKzVR5qdKtrIs//lltIf3SABgFUhoRs0dq0SnWyLoDH hTI+74ug13bgDn0nPh42hYVbHlHNTanEfBKhCA3O4T6Wqho1q4zN6Gl9P3zDCj5RH163 ObnQ== ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.onmicrosoft.com header.s=selector1-siemens-onmicrosoft-com header.b=nJAo+TR5; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.20.69 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2069.outbound.protection.outlook.com. [40.107.20.69]) by gmr-mx.google.com with ESMTPS id c17si607392ljn.7.2021.04.12.00.14.07 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 12 Apr 2021 00:14:07 -0700 (PDT) Received-SPF: pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.20.69 as permitted sender) client-ip=40.107.20.69; Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.onmicrosoft.com header.s=selector1-siemens-onmicrosoft-com header.b=nJAo+TR5; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of silvano.cirujano-cuesta@siemens.com designates 40.107.20.69 as permitted sender) smtp.mailfrom=silvano.cirujano-cuesta@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GlU7KKgb1K+HN5oM2j2QadwkjkJ+TdZ4Jt5qRJ314e7ga0alLfo0a+jFNZJoHJhKPq7jj7+cnjPzzcmtfCzPW3YnJ7OUMubsVpk7LzDEd/70H1ifP3GjFmVOBbl4FxO1igMMgF0vR7oHIHJh7dj8y+lOAISnj3eczP6+PgPsLcs9wHJEGP/3ZUjFRBlmdrGbnJ1rabU63dX1b2SzH5V9kRvxNrHrVlS3JnppXavWYGPkX04XH7Xcf4NHbCKr3VoT1odMjKnf+UTHilKnseMCUrPlz94Rp7AswrQkjirzXPxgIROp2pVTVVW4/KwB3HCuIbWa/cqgcmjIFY1qG/fBTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dw9EJ3EVE59a3fhdSoGM5wJPvVh+Rcpq3rrfVOASUKA=; b=KNNjNKJklTk/iEU2/LLCi56RCB7jcy0KOYY6AzQY6j5zA9yOBhhVq6lyBst0JBdOwZHJWXN4+ZGPbRUhK5jcL7CfhIa5su0t4eyGmqdiO7ZH8xG3+qBaCI5+Vn0jjaEzUs9+7ire2byrsBTzZqlu4OTcb55lKGBnauEq4UDYt6jGrdhlQTMPdi/MiP27Wg27L7Sc7Ip0D98dHkW08OHBVnTZ8nVT7/OrZ+KORUe4kviGJwsAgid2v+x3mi0aIESc/m3FoLXm4BlzSm5wJJdnoZUHFBw87wY5CrzfElz0UWsq+p0/QaCZqU/QW0kjmQt1s5uzZVc9mmWhCaP+MPyGOQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.onmicrosoft.com; s=selector1-siemens-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dw9EJ3EVE59a3fhdSoGM5wJPvVh+Rcpq3rrfVOASUKA=; b=nJAo+TR58R46onvdpKr3rjInG6iRoZGv1br6jv09qZhWUCkkjUOGIXnfKz+ciDMObQl+YmOPF+264GiJbmtpSYbpLGFJrIXVX0VAlyK5bCTksF/WGHExyITF+xhAZb37TpH0rPYf4AN38pB/TgdLgq/D0MOqOn6bnD+6jU8qSTM= Authentication-Results: siemens.com; dkim=none (message not signed) header.d=none;siemens.com; dmarc=none action=none header.from=siemens.com; Received: from AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:12a::30) by AM9PR10MB4293.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:1f7::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.21; Mon, 12 Apr 2021 07:14:06 +0000 Received: from AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM ([fe80::4807:51a1:30ab:908b]) by AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM ([fe80::4807:51a1:30ab:908b%7]) with mapi id 15.20.4020.022; Mon, 12 Apr 2021 07:14:05 +0000 From: Silvano Cirujano Cuesta Subject: Re: [PATCH v8 1/5] classes: add root filesystem containerizing class To: Jan Kiszka , isar-users@googlegroups.com, Quirin Gylstorff References: <20210329155640.62445-1-silvano.cirujano-cuesta@siemens.com> <20210329155640.62445-2-silvano.cirujano-cuesta@siemens.com> <24c63901-abd1-7239-0dcb-b069c5e5894e@siemens.com> Message-ID: Date: Mon, 12 Apr 2021 09:14:01 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 In-Reply-To: <24c63901-abd1-7239-0dcb-b069c5e5894e@siemens.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Language: en-US X-Originating-IP: [2001:a61:3bff:3002:8e2c:20f9:9d99:194a] X-ClientProxiedBy: PR0P264CA0178.FRAP264.PROD.OUTLOOK.COM (2603:10a6:100:1c::22) To AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:12a::30) Return-Path: silvano.cirujano-cuesta@siemens.com MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from [IPv6:2001:a61:3bff:3002:8e2c:20f9:9d99:194a] (2001:a61:3bff:3002:8e2c:20f9:9d99:194a) by PR0P264CA0178.FRAP264.PROD.OUTLOOK.COM (2603:10a6:100:1c::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.17 via Frontend Transport; Mon, 12 Apr 2021 07:14:05 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: e91dda40-b4f2-446f-bd31-08d8fd828eaa X-MS-TrafficTypeDiagnostic: AM9PR10MB4293: X-LD-Processed: 38ae3bcd-9579-4fd4-adda-b42e1495d55a,ExtAddr X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(4636009)(376002)(346002)(396003)(136003)(366004)(39860400002)(38100700002)(53546011)(6486002)(8676002)(8936002)(2616005)(31686004)(110136005)(31696002)(478600001)(2906002)(66946007)(86362001)(6636002)(16526019)(83380400001)(186003)(5660300002)(66476007)(6666004)(66556008)(316002)(36756003)(45980500001)(43740500002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: =?utf-8?B?WlhnTjRZNHlPK2w5bkhWaFJSdVdheitYcFRYN2h1c0NpbXhNKyt4S3ZQcnp3?= =?utf-8?B?YUhuME91aW9lcmgwQ0tQYlBERkxxU0tUVlErSGhZVkptKzdFdVFYUnp5cXhl?= =?utf-8?B?NXRTSk1UVlEvMk8ycEQ3T1FkeHhPY0g1aXpBUlBqTGVTVDlDajhPQjMwK3l5?= =?utf-8?B?OFhxeE5OVjZYaEhPOCtUdnJ3VnhvREdrVDQ4RWNBdXBKc1ZYUzQ2VitqNXYv?= =?utf-8?B?YzAzZTBtV3JVN1RaYm1WRnlHYlQ1K0xSM044NjNEdDhwalk5ODVENlJ4aytT?= =?utf-8?B?KytmMEhiNEJyRkVONmpSK3hqY0E4V0ttbXN2cG5weG1Wc2w2ZjJ1WnNUR1dX?= =?utf-8?B?MnBiYldTVmZSL0FLOG9WNVVFTmwxZHpIVVQ4dW9UNEZRNktPK2RFZFZzeEV2?= =?utf-8?B?Q2hwcFl4QnZrVFF0NDFrbWFhSFlETFlNYzN1UzY4VDdTOTRWRm4wY2ZrNmN4?= =?utf-8?B?cWtyWVZGc3QrVjNsek9aUzJNTUR2UlRTS2pkY2h6QzRObzR6a1hPNGxubEVQ?= =?utf-8?B?Z01NamEzSFpDMWxxLzJaM1VUaFNnR2tXZzZPeDN6VUVTWUthSWtidkhyMlZP?= =?utf-8?B?bXNSNHhZcmR5RTBpaWlqMDFKenNFcDZzR3lXOVArWXp2V2pOM0ViWDhFZTlh?= =?utf-8?B?a0l5dWlvakY1by8rcEduYk1kY0R0dm9YWnZKOGRPMXpubkJuWTd4NklQcHVh?= =?utf-8?B?RHZ3a1BJT3lST1FQSTZZcGhLTkU1YXlBcERZTVV4U1diaUlZajRCQjRRek9Z?= =?utf-8?B?Vm5PTGRoalowS3FoaHdWUTkxbmRpOGhCRmM4UWxaWFdoRjNvdXVnSjlNTGJq?= =?utf-8?B?bUVWT0MrZVNUZkdNQTlBcVlWdjNGc2N4R2EwbzNCSGdXYWYyclhQc3BFVGVT?= =?utf-8?B?U0FGSVlQeFk3NmJaZElpRkN6aGZkWWU5WXNTOVBMQmdBZTBEN0xXWXFNMndt?= =?utf-8?B?RjI2RWZQODE4Kyt1UytURC81K3hwck9UemplVTc5cnBpeHhtclhYZk5OM0Vm?= =?utf-8?B?NEsrdjE1eG9MalRLNGhKbUk0b1FXKytXTllPSkU4K0UxUjJhblo5QXJ5OElv?= =?utf-8?B?by8yL2ZGMTh5dXhqVHltcjcrWU9ONHNBRkdmcjdKOWpzcVp5SS9yZXVXcUFK?= =?utf-8?B?ZzRmbkRMakpOZ3pEWFE2MU9RN2lLRm4wUG5EYlA1enAxQkY3SnNZNXZJUms5?= =?utf-8?B?Vm5hQjJoaUV4UGNCT0l0QzBzQXI0Zko0U2hrR25QMmVxN2ZwUjluTDFEM3Fa?= =?utf-8?B?YUZtcDF5SG9XUy96Y250amRhMWxmVktONHphUzlEQTdPR1pDaGFTU2pmeXMy?= =?utf-8?B?ZXdjV291OUdnMWhKWmZCRXEycFZtdHFuQkdMd1MyTjNTVHZldU0wS2tjY2E3?= =?utf-8?B?WmhvaHp0ZWJkRlhvVlpYRmpBcnV6SWVsWFM4b2s5c21lWXRHaFNvS0NkUThT?= =?utf-8?B?M015R1BPSVZIMWo4aW83Y2FVNTFsZXlZeGswaXlsdWg1bU5pZ05uNmlDMkdS?= =?utf-8?B?RG9aT2h6WDVOakFNeUZZVlhlZk1DMmowUWV6bXN0OURWcm1JbDlCQUFuYU9I?= =?utf-8?B?cGN2Z3lmWmp3M2ZWdmN0WUVhL0ZXV2k1eFJRZ2dtNXJoYi9JUWtrbnVhWHhJ?= =?utf-8?B?aGxObTBLZ1p4Q09NbFVnK0dlYWowSWM1T2tsZ280aFpRZVkwZFVhck5rcVBh?= =?utf-8?B?U283OXdLSnRUUWMyNGV1Y28wL2xNNnVubkJjVjAzMFBET0Y1bEtja2dqdXNi?= =?utf-8?B?a25SRVJyK3Uramdtdk5od2dRVnBrNS8vWHhjbUV4aCt2b0RLMEVFYnJZTVcv?= =?utf-8?B?eC8yOXdEdTZtNmZ5TVVobCtlMU5kaDlNSW1xa2IydVZhYzhpQzlGeVRJUi95?= =?utf-8?Q?PR56wt5qed8mP?= X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-Network-Message-Id: e91dda40-b4f2-446f-bd31-08d8fd828eaa X-MS-Exchange-CrossTenant-AuthSource: AM0PR10MB2708.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Apr 2021 07:14:05.7883 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: nL2LHcW+mcQoNHPqrAwoNcbn8qAhtj8z0bC8iTTQ0AWHchn4ztDoxCCTffSfLCqGu5SAcRAtCfVL3675gDQE6zhslbLzWCEIaMPnKmxbytlm6EVFYbqX/ef3co+6nekB X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR10MB4293 X-TUID: N+Ri6u3qZq/R On 08/04/2021 19:55, Jan Kiszka wrote: > On 29.03.21 17:56, [ext] Silvano Cirujano Cuesta wrote: >> This class can= be used to create container images which root >> filesystem is that genera= ted by the do_rootfs task. >> >> Containerized root filesystems have follow= ing possible use-cases: - >> Using ISAR as a container image builder. - Sim= plify distribution of >> runtime rootfs (binaries, libraries, configuration= s, ...) for >> application development or testing. - Distributing SDKs. >> = >> Signed-off-by: Silvano Cirujano Cuesta >> --- >> .../classes/image-container-extension.bbclass | 82 >> ++++++= +++++++++++++ meta/classes/image.bbclass | >> 1 + 2 files=20 changed, 83 insertions(+) create mode 100644 >> meta/classes/image-containe= r-extension.bbclass >> >> diff --git a/meta/classes/image-container-extensi= on.bbclass >> b/meta/classes/image-container-extension.bbclass new file mod= e >> 100644 index 0000000..f693627 --- /dev/null +++ >> b/meta/classes/imag= e-container-extension.bbclass @@ -0,0 +1,82 @@ >> +# This software is a par= t of ISAR. +# Copyright (C) Siemens AG, >> 2021 +# +# SPDX-License-Identifier: MIT +# +# = This class extends >> the image.bbclass for containerizing the root filesys= tem. + >> +CONTAINER_FORMATS ?=3D "docker-archive" +IMAGE_INSTALL +=3D=20 >> "isar-exclude-docs isar-disable-apt-cache" + > Quirin tried latest Isar = on meta-iot2050, and that now fails during > setup of openjdk: > > Setting = up openjdk-11-jre-headless:arm64 (11.0.9.1+1-1~deb10u2) ... > > > > update-= alternatives: using > /usr/lib/jvm/java-11-openjdk-arm64/bin/rmid to provid= e /usr/bin/rmid > (rmid) in auto mode > > > update-alternatives: error: err= or creating symbolic link > '/usr/share/man/man1/rmid.1.gz.dpkg-tmp': No su= ch file or directory > > > > While watching the installation,=20 I happened to see isar-exclude-docs > suddenly being installed while not be= ing selected explicitly, > specifically not for the target image. I bet=20 it's coming in via this > class and its unconditional extension of the IMAG= E_INSTALL list. You're right, it was a late addition and I didn't realized that I was uncon= ditionally adding it to image.bbclass. My fault, I'll provide a fix. > That leads to (at least) two questions: - Why do we have > isar-exclude-d= ocs here, and also isar-disable-apt-cache? This exclusion was only meant for container images, you don't want to have = manpages and APT caches in a container image. As mentioned above, it shouldn't be an unconditional addition to the IMAGE_= INSTALL list, but only for container images. > - Does isar-exclude-docs have some issue that prevents the usage > togeth= er with openjdk, or are those simply incompatible by design? In any case if someone wants to get rid of manpages for very small devices,= the recipe isar-exclude-docs should help on that. The same applies to isar-disable-apt-cache. My error just triggered a hidden issue: the incompatibility between the imp= lementation of the isar-exclude-docs recipe and other components (for examp= le, openjdk). IMO this issue should get fix too (apart from the uncondition= al addition of the recipe). > In any case, we have a regression. Yes, we do. > Jan =C2=A0 Silvano >> +containerize_rootfs() { + local cmd=3D"/bin/dash" + local >> empt= y_tag=3D"empty" + local full_tag=3D"latest" + local >> oci_img_dir=3D"${WOR= KDIR}/oci-image" + local rootfs=3D"$1" + >> local rootfs_id=3D"$2" + local = container_formats=3D"$3" + + # >> prepare OCI container image skeleton + bb= debug 1 "prepare OCI >> container image skeleton" + rm -rf "${oci_img_dir}"= + sudo >> umoci init --layout "${oci_img_dir}" + sudo umoci new --image >>= "${oci_img_dir}:${empty_tag}" + sudo umoci config --image >>=20 "${oci_img_dir}:${empty_tag}" \ + --config.cmd=3D"${cmd}" + >> sudo umoci=20 unpack --image "${oci_img_dir}:${empty_tag}" \ + >> "${oci_img_dir}_unpacke= d" + + # add root filesystem as the flesh >> of the skeleton + sudo cp -a "= ${rootfs}"/* >> "${oci_img_dir}_unpacked/rootfs/" + # clean-up temporary fi= les + >> sudo find "${oci_img_dir}_unpacked/rootfs/tmp" -mindepth 1=20 -delete >> + + # pack container image + bbdebug 1 "pack container >> image"= + sudo umoci repack --image "${oci_img_dir}:${full_tag}" >> \ + "${oci_img= _dir}_unpacked" + sudo umoci remove --image >> "${oci_img_dir}:${empty_tag}" + sudo rm -rf >> "${oci_img_dir}_u= npacked" + + # no root needed anymore + sudo >> chown --recursive $(id -u):= $(id -g) "${oci_img_dir}" + + # >> convert the OCI container image to=20 the desired format + >> image_name=3D"isar-${rootfs_id}" + for image_type=20 in >> ${CONTAINER_FORMATS} ; do + >> image_archive=3D"${DEPLOY_DIR_IMAGE}/$= {rootfs_id}-${image_type}.tar" >> + bbdebug 1 "Creating container image=20 type: ${image_type}" + >> case "${image_type}" in + "docker-archive" | >>=20 "oci-archive") + if [ "${image_type}" =3D >> "oci-archive" ] ; then + >> ta= rget=3D"${image_type}:${image_archive}:latest" + >> else + >> target=3D"${i= mage_type}:${image_archive}:${image_name}:latest" + >> fi + rm -f "${image_= archive}" "${image_archive}.xz" >> + bbdebug 2 "Converting OCI image to ${i= mage_type}" >> + skopeo --insecure-policy copy \ + >> "oci:${oci_img_dir}:$= {full_tag}" "${target}" + >> bbdebug 2 "Compressing image" + xz=20 -T0 >> "${image_archive}" + ;; + "oci") + >> tar --create --xz --directory "${oci_img_dir}" \ + >> --file "${image_archi= ve}.xz" . + ;; + >> "docker-daemon" | "containers-storage") + if [ -f >> /.= dockerenv ] || [ -f /run/.containerenv ] ; then + >> die "Adding the contai= ner image to a container runtime >> (${image_type}) not supported if runnin= g from a container (e.g. >> 'kas-container')" + fi + skopeo >> --insecure-p= olicy copy \ + >> "oci:${oci_img_dir}:${full_tag}" \ + >> "${image_type}:${= image_name}:latest" + ;; + >> *) + die "Unsupported format for >> container= ize_rootfs: ${image_type}" + ;; + >> esac + done +} + diff --git a/meta/cla= sses/image.bbclass >> b/meta/classes/image.bbclass index eddc444..ec93cab 1= 00644 --- >> a/meta/classes/image.bbclass +++ b/meta/classes/image.bbclass = @@ >> -76,6 +76,7 @@ inherit image-tools-extension inherit >> image-postpro= c-extension inherit image-locales-extension inherit=20 >> image-account-extension +inherit image-container-extension >> >> # Extra= space for rootfs in MB ROOTFS_EXTRA ?=3D "64" >> =C2=A0 Silvano Cirujano Cuesta --=20 Siemens AG, T RDA IOT SES-DE Corporate Competence Center Embedded Linux