All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: Quirin Gylstorff <Quirin.Gylstorff@siemens.com>,
	<cip-dev@lists.cip-project.org>, <adriaan.schmidt@siemens.com>
Subject: Re: [cip-dev][isar-cip-core][RFC v3 0/5] Adapt isar-cip-core to ISAR IMAGE_CMD_*
Date: Mon, 13 Jun 2022 13:02:48 +0200	[thread overview]
Message-ID: <8e61b3d7-78d4-a0f6-9f61-81ad6cb2d088@siemens.com> (raw)
In-Reply-To: <20220610113302.1225351-1-Quirin.Gylstorff@siemens.com>

On 10.06.22 13:32, Quirin Gylstorff wrote:
> From: Quirin Gylstorff <quirin.gylstorff@siemens.com>
> 
> This series adapt isar-cip-core to the IMAGE_CMD_* introduced in
> ISAR commit [1]. See also ISAR API changelog[2].
> 
> This new feature remove the *.img from all wic images.
> 
> Also as new naming convention image recipes no longer end with `-img`.
> 
> The image types wic-swu-img and secure-wic-swu-img were removed.
> Rename `squashfs-img` to squashfs according new naming scheme.
> 
> To use squashfs include:
> 
>     IMAGE_CLASSES += "squashfs"
>     IMAGE_TYPEDEP_wic += "squashfs"
> 
> 
> To create a verity based image to following line need to be added
> to the local.conf or similar configuration:
> 
>     IMAGE_CLASSES += "verity"
> 
> The modifications for a read-only root file system are now part
> of a bbclass which can be include directly into the image
> recipe.
> 
> The modifications to generate a SWUpdate update package are
> also no longer part of the image build process and in a seperate
> bbclass. This class needs to be included in the image recipe.
> 
> Please check/test the interface changes for swupdate and read-only root
> file system.
> 
> I tested qemu-amd64/qemu-arm64 with swupdate and secure boot.
> 
> Quirin
> 
> [1]: https://github.com/ilbers/isar/commit/f792fd0deed1ae1d9deb3ee28b1a1add96ecdf14
> [2]: https://github.com/ilbers/isar/blob/next/RECIPE-API-CHANGELOG.md#changes-to-image-types
> 
> Changes in v2:
>  - update ISAR to commit 1000df8e98b9a5849a7897698039687fd0cdd7d3 to avoid
>    double gz compression for tar images. This also allows to drop the patch
>    "0001-Fix-permissions-when-splitting-rootfs-folders-across.patch"
>  - fix image option `kas/opt/wic-targz-img.yml` for ci build 
>  - fix whitespace errors
>  - used compressed rootfs in sw-description
> 
> Changes in v3:
>  - adapt build of u-boot-qemu-arm64
>  - fix qemu-arm64 swupdate build, adapt wic/qemu-arm64-efibootguard.wks.in to new image names
> 
> Quirin Gylstorff (5):
>   ISAR update
>   u-boot-qemu-arm64: Adapt to 'Do not use shell environment'
>   start-qemu.sh: adapt to new image names
>   Adapt swupdate and verity to use new IMAGE_CMD_*
>   scripts/deploy-cip-core: Adapt to new image names
> 
>  ...u-img.bbclass => read-only-rootfs.bbclass} | 11 +---
>  classes/secure-wic-swu-img.bbclass            | 15 ------
>  ...{squashfs-img.bbclass => squashfs.bbclass} | 15 ++----
>  ...{swupdate-img.bbclass => swupdate.bbclass} |  8 +--
>  .../{verity-img.bbclass => verity.bbclass}    | 50 +++++++++----------
>  classes/wic-targz-img.bbclass                 | 15 ------
>  conf/machine/bbb.conf                         |  2 +-
>  conf/machine/hihope-rzg2m.conf                |  2 +-
>  conf/machine/iwg20m.conf                      |  2 +-
>  conf/machine/qemu-amd64.conf                  |  2 +-
>  conf/machine/qemu-arm.conf                    |  2 +-
>  conf/machine/qemu-arm64.conf                  |  2 +-
>  conf/machine/simatic-ipc227e.conf             |  2 +-
>  kas-cip.yml                                   |  6 +--
>  kas/opt/ebg-secure-boot-snakeoil.yml          |  3 +-
>  kas/opt/efibootguard.yml                      |  2 +-
>  kas/opt/swupdate.yml                          |  4 +-
>  kas/opt/targz-img.yml                         |  2 +-
>  kas/opt/wic-targz-img.yml                     |  2 +-
>  ...when-splitting-rootfs-folders-across.patch | 35 -------------
>  .../u-boot/files/{rules => rules.tmpl}        |  2 +-
>  .../u-boot/u-boot-qemu-arm64_2022.04.bb       |  6 +--
>  recipes-core/images/swupdate.inc              |  7 ++-
>  .../initramfs-verity-hook_0.1.bb              |  2 +-
>  scripts/deploy-cip-core.sh                    |  8 +--
>  start-qemu.sh                                 |  8 +--
>  wic/qemu-amd64-efibootguard-secureboot.wks.in |  4 +-
>  wic/qemu-arm64-efibootguard-secureboot.wks.in |  4 +-
>  wic/qemu-arm64-efibootguard.wks.in            |  4 +-
>  wic/x86-efibootguard.wks.in                   |  4 +-
>  30 files changed, 75 insertions(+), 156 deletions(-)
>  rename classes/{wic-swu-img.bbclass => read-only-rootfs.bbclass} (75%)
>  delete mode 100644 classes/secure-wic-swu-img.bbclass
>  rename classes/{squashfs-img.bbclass => squashfs.bbclass} (66%)
>  rename classes/{swupdate-img.bbclass => swupdate.bbclass} (92%)
>  rename classes/{verity-img.bbclass => verity.bbclass} (78%)
>  delete mode 100644 classes/wic-targz-img.bbclass
>  delete mode 100644 patches/isar/0001-Fix-permissions-when-splitting-rootfs-folders-across.patch
>  rename recipes-bsp/u-boot/files/{rules => rules.tmpl} (96%)
> 

Thanks, applied.

Jan

-- 
Siemens AG, Technology
Competence Center Embedded Linux


      parent reply	other threads:[~2022-06-13 11:03 UTC|newest]

Thread overview: 23+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-06-03 11:56 [cip-dev][isar-cip-core][RFC 0/4] Adapt isar-cip-core to ISAR IMAGE_CMD_* Quirin Gylstorff
2022-06-03 11:56 ` [cip-dev][isar-cip-core][RFC 1/4] ISAR update Quirin Gylstorff
2022-06-03 11:56 ` [cip-dev][isar-cip-core][RFC 2/4] start-qemu.sh: adapt to new image names Quirin Gylstorff
2022-06-03 11:56 ` [cip-dev][isar-cip-core][RFC 3/4] Adapt swupdate and verity to use new IMAGE_CMD_* Quirin Gylstorff
2022-06-07  7:32   ` Jan Kiszka
2022-06-07  8:39     ` Gylstorff Quirin
2022-06-03 11:56 ` [cip-dev][isar-cip-core][RFC 4/4] scripts/deploy-cip-core: Adapt to new image names Quirin Gylstorff
2022-06-03 15:27 ` [cip-dev][isar-cip-core][RFC 0/4] Adapt isar-cip-core to ISAR IMAGE_CMD_* Jan Kiszka
2022-06-03 15:29   ` Jan Kiszka
2022-06-03 15:33   ` Gylstorff Quirin
2022-06-07  7:23     ` Jan Kiszka
2022-06-07 10:08 ` [cip-dev][isar-cip-core][RFC v2 " Quirin Gylstorff
2022-06-07 10:08   ` [cip-dev][isar-cip-core][RFC v2 1/4] ISAR update Quirin Gylstorff
2022-06-07 10:08   ` [cip-dev][isar-cip-core][RFC v2 2/4] start-qemu.sh: adapt to new image names Quirin Gylstorff
2022-06-07 10:08   ` [cip-dev][isar-cip-core][RFC v2 3/4] Adapt swupdate and verity to use new IMAGE_CMD_* Quirin Gylstorff
2022-06-07 10:08   ` [cip-dev][isar-cip-core][RFC v2 4/4] scripts/deploy-cip-core: Adapt to new image names Quirin Gylstorff
2022-06-10 11:32   ` [cip-dev][isar-cip-core][RFC v3 0/5] Adapt isar-cip-core to ISAR IMAGE_CMD_* Quirin Gylstorff
2022-06-10 11:32     ` [cip-dev][isar-cip-core][RFC v3 1/5] ISAR update Quirin Gylstorff
2022-06-10 11:32     ` [cip-dev][isar-cip-core][RFC v3 2/5] u-boot-qemu-arm64: Adapt to 'Do not use shell environment' Quirin Gylstorff
2022-06-10 11:33     ` [cip-dev][isar-cip-core][RFC v3 3/5] start-qemu.sh: adapt to new image names Quirin Gylstorff
2022-06-10 11:33     ` [cip-dev][isar-cip-core][RFC v3 4/5] Adapt swupdate and verity to use new IMAGE_CMD_* Quirin Gylstorff
2022-06-10 11:33     ` [cip-dev][isar-cip-core][RFC v3 5/5] scripts/deploy-cip-core: Adapt to new image names Quirin Gylstorff
2022-06-13 11:02     ` Jan Kiszka [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8e61b3d7-78d4-a0f6-9f61-81ad6cb2d088@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=Quirin.Gylstorff@siemens.com \
    --cc=adriaan.schmidt@siemens.com \
    --cc=cip-dev@lists.cip-project.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.