From patchwork Fri Jun 10 11:32:57 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Quirin Gylstorff X-Patchwork-Id: 12877505 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 353ECCCA47C for ; Fri, 10 Jun 2022 11:33:09 +0000 (UTC) Received: from mta-64-228.siemens.flowmailer.net (mta-64-228.siemens.flowmailer.net [185.136.64.228]) by mx.groups.io with SMTP id smtpd.web08.25978.1654860786261650316 for ; Fri, 10 Jun 2022 04:33:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=Quirin.Gylstorff@siemens.com header.s=fm1 header.b=AoV8hiE2; spf=pass (domain: rts-flowmailer.siemens.com, ip: 185.136.64.228, mailfrom: fm-51332-202206101133031d1e0fbf65158c1e44-hjobdx@rts-flowmailer.siemens.com) Received: by mta-64-228.siemens.flowmailer.net with ESMTPSA id 202206101133031d1e0fbf65158c1e44 for ; Fri, 10 Jun 2022 13:33:03 +0200 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; s=fm1; d=siemens.com; i=Quirin.Gylstorff@siemens.com; h=Date:From:Subject:To:Message-ID:MIME-Version:Content-Type:Content-Transfer-Encoding:References:In-Reply-To; bh=rgXplQpLLcvFQSxq5m1bfDiyO6KvbPfsk5PpKr7MykI=; b=AoV8hiE2Al2M0vwWN1rQSVF3unNFr+nrfSEi61P5amYtch8swTR1DcFUJGfOeomZGh1dW/ 3/ef2VbgI0bfcvrEr8xrTg2e1UjWRhmvMkYe/WMZ4Wp6EoQE9pdFg5lWtbO2yCP8Ug9oWILA ghPtxqdwKNy6I/Lf23e155ddfxX9s=; From: Quirin Gylstorff To: cip-dev@lists.cip-project.org, jan.kiszka@siemens.com, adriaan.schmidt@siemens.com Subject: [cip-dev][isar-cip-core][RFC v3 0/5] Adapt isar-cip-core to ISAR IMAGE_CMD_* Date: Fri, 10 Jun 2022 13:32:57 +0200 Message-Id: <20220610113302.1225351-1-Quirin.Gylstorff@siemens.com> In-Reply-To: <20220607100806.133889-1-Quirin.Gylstorff@siemens.com> References: <20220607100806.133889-1-Quirin.Gylstorff@siemens.com> MIME-Version: 1.0 X-Flowmailer-Platform: Siemens Feedback-ID: 519:519-51332:519-21489:flowmailer List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 10 Jun 2022 11:33:09 -0000 X-Groupsio-URL: https://lists.cip-project.org/g/cip-dev/message/8529 From: Quirin Gylstorff This series adapt isar-cip-core to the IMAGE_CMD_* introduced in ISAR commit [1]. See also ISAR API changelog[2]. This new feature remove the *.img from all wic images. Also as new naming convention image recipes no longer end with `-img`. The image types wic-swu-img and secure-wic-swu-img were removed. Rename `squashfs-img` to squashfs according new naming scheme. To use squashfs include: IMAGE_CLASSES += "squashfs" IMAGE_TYPEDEP_wic += "squashfs" To create a verity based image to following line need to be added to the local.conf or similar configuration: IMAGE_CLASSES += "verity" The modifications for a read-only root file system are now part of a bbclass which can be include directly into the image recipe. The modifications to generate a SWUpdate update package are also no longer part of the image build process and in a seperate bbclass. This class needs to be included in the image recipe. Please check/test the interface changes for swupdate and read-only root file system. I tested qemu-amd64/qemu-arm64 with swupdate and secure boot. Quirin [1]: https://github.com/ilbers/isar/commit/f792fd0deed1ae1d9deb3ee28b1a1add96ecdf14 [2]: https://github.com/ilbers/isar/blob/next/RECIPE-API-CHANGELOG.md#changes-to-image-types Changes in v2: - update ISAR to commit 1000df8e98b9a5849a7897698039687fd0cdd7d3 to avoid double gz compression for tar images. This also allows to drop the patch "0001-Fix-permissions-when-splitting-rootfs-folders-across.patch" - fix image option `kas/opt/wic-targz-img.yml` for ci build - fix whitespace errors - used compressed rootfs in sw-description Changes in v3: - adapt build of u-boot-qemu-arm64 - fix qemu-arm64 swupdate build, adapt wic/qemu-arm64-efibootguard.wks.in to new image names Quirin Gylstorff (5): ISAR update u-boot-qemu-arm64: Adapt to 'Do not use shell environment' start-qemu.sh: adapt to new image names Adapt swupdate and verity to use new IMAGE_CMD_* scripts/deploy-cip-core: Adapt to new image names ...u-img.bbclass => read-only-rootfs.bbclass} | 11 +--- classes/secure-wic-swu-img.bbclass | 15 ------ ...{squashfs-img.bbclass => squashfs.bbclass} | 15 ++---- ...{swupdate-img.bbclass => swupdate.bbclass} | 8 +-- .../{verity-img.bbclass => verity.bbclass} | 50 +++++++++---------- classes/wic-targz-img.bbclass | 15 ------ conf/machine/bbb.conf | 2 +- conf/machine/hihope-rzg2m.conf | 2 +- conf/machine/iwg20m.conf | 2 +- conf/machine/qemu-amd64.conf | 2 +- conf/machine/qemu-arm.conf | 2 +- conf/machine/qemu-arm64.conf | 2 +- conf/machine/simatic-ipc227e.conf | 2 +- kas-cip.yml | 6 +-- kas/opt/ebg-secure-boot-snakeoil.yml | 3 +- kas/opt/efibootguard.yml | 2 +- kas/opt/swupdate.yml | 4 +- kas/opt/targz-img.yml | 2 +- kas/opt/wic-targz-img.yml | 2 +- ...when-splitting-rootfs-folders-across.patch | 35 ------------- .../u-boot/files/{rules => rules.tmpl} | 2 +- .../u-boot/u-boot-qemu-arm64_2022.04.bb | 6 +-- recipes-core/images/swupdate.inc | 7 ++- .../initramfs-verity-hook_0.1.bb | 2 +- scripts/deploy-cip-core.sh | 8 +-- start-qemu.sh | 8 +-- wic/qemu-amd64-efibootguard-secureboot.wks.in | 4 +- wic/qemu-arm64-efibootguard-secureboot.wks.in | 4 +- wic/qemu-arm64-efibootguard.wks.in | 4 +- wic/x86-efibootguard.wks.in | 4 +- 30 files changed, 75 insertions(+), 156 deletions(-) rename classes/{wic-swu-img.bbclass => read-only-rootfs.bbclass} (75%) delete mode 100644 classes/secure-wic-swu-img.bbclass rename classes/{squashfs-img.bbclass => squashfs.bbclass} (66%) rename classes/{swupdate-img.bbclass => swupdate.bbclass} (92%) rename classes/{verity-img.bbclass => verity.bbclass} (78%) delete mode 100644 classes/wic-targz-img.bbclass delete mode 100644 patches/isar/0001-Fix-permissions-when-splitting-rootfs-folders-across.patch rename recipes-bsp/u-boot/files/{rules => rules.tmpl} (96%)