From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6945105578761912320 X-Received: by 2002:ac2:42c8:: with SMTP id n8mr9230692lfl.450.1617376732321; Fri, 02 Apr 2021 08:18:52 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a2e:bc23:: with SMTP id b35ls1983606ljf.7.gmail; Fri, 02 Apr 2021 08:18:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxYyUFbzkcAqIlwA5rzTCPP2IYarqJ7tGFAS6S2F1JY6gFNoCqc4rIUkreGEryppuabGD5C X-Received: by 2002:a2e:5c03:: with SMTP id q3mr8862183ljb.68.1617376731226; Fri, 02 Apr 2021 08:18:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617376731; cv=none; d=google.com; s=arc-20160816; b=iIVjSzkQxsnfRokfiHp0PqyTYb1iaSEBLucYWA6czl+uZOy3TcXpP3srQrHNnEzX64 4AxPZt2RGefP75yHocEbJ6QS+YPCXLPWLxcLRgKg04JVCW9I7THG0etAkYzLaH0LKjdS xTQ2M3t0oyd4p/AcBzcREwZUTwZTC7wWXeAP2baf5toj2sVDGx83c1Y6D558/1IFU9k8 5eHiHzKxgc7FDZoHC8S+ox0eKcb0ajJdkebJq1dhUtLK1Y/urr4cXwh9I66+p0vUTWDt HLvriOpYGmiv7YJ8qkA8sG2DeAh4l3iY+mfPzFHj9s1uFfBk04eADrXUUPIPe35c/Na/ lk4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-language:content-transfer-encoding:in-reply-to:mime-version :user-agent:date:message-id:from:references:to:subject; bh=pZvmPYpCzv6ZrkWqMJnyZTFIjnpuMHG9ns0bsPlxZV4=; b=VpOafrxSzNda0iTRnARKg0DPvRze8UXUXuYJHtvGn0rrWCmvohvtVAMMmYlt6A6qtl h9OvVJzExbqmBeXXswRO2RG43DCKajl3izLlpbKaTRPGNdQgh5SIOD/eZR0VpgArQikh QYcHlLTv0UcU+Th8cTwqoS0XzlliKPkM05kEeZuutyfkWrpek8ZJEehNNmqcoebnPzJq VTGk6Gtx/SWD1CF6ViP3cLHipk51fhVplc89WsyaAGL/aiZrrPmLPEsC+wi6MtcVuknN 08aO8mihmYlEjE3XBJC2JM9cVg2tZ5usQjrkXQ6Ff2lP9uvUMWbCZwoD9H30F/WyrYhg rAJA== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of amikan@ilbers.de designates 85.214.156.166 as permitted sender) smtp.mailfrom=amikan@ilbers.de Return-Path: Received: from shymkent.ilbers.de (shymkent.ilbers.de. [85.214.156.166]) by gmr-mx.google.com with ESMTPS id a10si694056lfs.11.2021.04.02.08.18.51 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Fri, 02 Apr 2021 08:18:51 -0700 (PDT) Received-SPF: pass (google.com: domain of amikan@ilbers.de designates 85.214.156.166 as permitted sender) client-ip=85.214.156.166; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of amikan@ilbers.de designates 85.214.156.166 as permitted sender) smtp.mailfrom=amikan@ilbers.de Received: from [192.168.67.164] (mm-76-88-121-178.mgts.dynamic.pppoe.byfly.by [178.121.88.76] (may be forged)) (authenticated bits=0) by shymkent.ilbers.de (8.15.2/8.15.2/Debian-8) with ESMTPSA id 132FInBd006661 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 2 Apr 2021 17:18:50 +0200 Subject: Re: [PATCH v8 0/5] Add support for containerized root filesystems To: Silvano Cirujano Cuesta , isar-users@googlegroups.com References: <20210329155640.62445-1-silvano.cirujano-cuesta@siemens.com> From: Anton Mikanovich Message-ID: Date: Fri, 2 Apr 2021 18:18:44 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1 MIME-Version: 1.0 In-Reply-To: <20210329155640.62445-1-silvano.cirujano-cuesta@siemens.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED autolearn=unavailable autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on shymkent.ilbers.de X-TUID: ApHdXVqSY0ft 29.03.2021 18:56, Silvano Cirujano Cuesta wrote: > v8: cosmetic changes in docs and small fix in CI script > > v7: issues in sample configurations and CI script fixed and tested on > two different CI environments. > > This patch series provides support for containerized root filesystems, > for both target images and SDKs. > > For containerized target images the new image type `container-img` has > been added. > > For containerized SDKs the task `populate_sdk` has been extended. > > Containerized root filesystems are easy to distribute and run, enabling > this way following scenarios: > - Use ISAR to build container images meant to be run only in containers. > - Use the same ISAR configuration to build images for containers, VMs > and bare-metal. > - Easy SDK distribution and "installation". > - Quickly testing certain applications in the workstation using the > target root filesystem. > > In order to build containerized target root filesystems `IMAGE_TYPE` has > to be `container-img`, additionally the container image format can be > selected with the variable `CONTAINER_FORMATS`. The default format is > `docker-archive`. > > In order to build containerized SDKs the variable `SDK_FORMAT` has to > provide any of the supported container formats (e.g. `docker-archive`). > The default format is the legacy non-containerized: `tar_xz`. > > It also provides a sample machine, multiconfigs and ci-testing. > > More information about its usage is documented in the file > docs/user_manual.md. > > A PoC/demo of this functionality (only the SDK part) has been created > based on the project https://github.com/siemens/meta-iot2050. > Jan Kiszka already tested and liked it! => > https://github.com/siemens/meta-iot2050/issues/86#issuecomment-768907845 > > Successful builds of both containerized target and SDK are available on > the same PoC project: > - https://github.com/Silvanoc/meta-iot2050/actions/runs/558311580 > - https://github.com/Silvanoc/meta-iot2050/actions/runs/558311581 > and also the resulting images: > - https://github.com/users/Silvanoc/packages/container/package/meta-iot2050%2Fiot2050-debian-arm64 > - https://github.com/users/Silvanoc/packages/container/package/meta-iot2050%2Fiot2050-debian-sdk-arm64 > > In order to get a feeling about its usage (you need Docker or Podman), > follow these simple copy&paste instructions: > https://github.com/Silvanoc/meta-iot2050/blob/master/kas/BUILDING-SDK-CONTAINER.md#running-the-sdk > Build instructions are available in the upper part of that document. > > Two new dependencies (umoci and skopeo -backporting from bullseye to > buster works easily) are required to create containerized root > filesystems (as specified in the documentation). > > Typical container image management actions (e.g. push an image to a > container image regitry) are out of scope. Available tools (Docker, > Skopeo, Buildah, Podman,...) should be used for these actions. > > A patch will follow this one to get the dependencies into the container > images being provided by the project > https://github.com/siemens/kas (for `kas-container`, for example). > > Silvano Cirujano Cuesta (5): > classes: add root filesystem containerizing class > classes: add new image type 'container-img' > sdk: add support for containerized sdk > docs: document creation of container images > ci: add container image sample configurations > > doc/user_manual.md | 179 ++++++++++++++++++ > meta-isar/conf/local.conf.sample | 3 + > meta-isar/conf/machine/container.conf | 5 + > .../conf/multiconfig/container-bullseye.conf | 4 + > .../conf/multiconfig/container-buster.conf | 4 + > .../conf/multiconfig/container-stretch.conf | 4 + > meta/classes/container-img.bbclass | 18 ++ > .../classes/image-container-extension.bbclass | 82 ++++++++ > meta/classes/image-sdk-extension.bbclass | 42 +++- > meta/classes/image.bbclass | 1 + > scripts/ci_build.sh | 29 ++- > 11 files changed, 363 insertions(+), 8 deletions(-) > create mode 100644 meta-isar/conf/machine/container.conf > create mode 100644 meta-isar/conf/multiconfig/container-bullseye.conf > create mode 100644 meta-isar/conf/multiconfig/container-buster.conf > create mode 100644 meta-isar/conf/multiconfig/container-stretch.conf > create mode 100644 meta/classes/container-img.bbclass > create mode 100644 meta/classes/image-container-extension.bbclass > Applied to next, thanks. -- Anton Mikanovich Promwad Ltd. External service provider of ilbers GmbH Maria-Merian-Str. 8 85521 Ottobrunn, Germany +49 (89) 122 67 24-0 Commercial register Munich, HRB 214197 General Manager: Baurzhan Ismagulov