Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ISO version of the verification image #3197

Merged
merged 1 commit into from
Jul 11, 2023

Conversation

jsfakian
Copy link
Contributor

@jsfakian jsfakian commented May 8, 2023

  1. Created new directory pkg/mkverification-iso-efi which is similar
  2. Renamed extract_verification_info.sh to extract-verification-info.sh for homogeneity
  3. Added MKISOVERIFICATION_TAG to tools/parse-pkgs.sh
  4. Added file tools/makeverificationiso.sh which is similar to tools/makeiso.sh

@jsfakian jsfakian requested review from eriknordmark and rvs as code owners May 8, 2023 11:41
-m rootfs-\* -f -R -e boot.img -hide boot.img -hide boot.catalog -no-emul-boot -o /tmp/disk.iso .
copy /tmp/disk.iso /output.iso

# How to build a VHDX. Commented out because we are currently not using it
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This comment is already part of pkg/mkimage-iso-efi/make-efi (from where you took the code), I don't think we need to keep a copy here, you can safely remove it....

mmd -i boot.img ::/EFI/BOOT
mcopy -i boot.img EFI/BOOT/* ::/EFI/BOOT/

# pay attentio to the -f option: it follows symlinks which is exactly
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

attentio -> attention

@@ -0,0 +1,15 @@
#!/bin/sh
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please, include Copyright and SPDX header information.

Copy link
Contributor

@eriknordmark eriknordmark left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does this end up pushing some image to docker hub? If so, how to we name that image lfedge/eve-... (and we should change the lfedge/mkverification-raw-efi to have an eve prefix.)

Also, need to decide what the names should be for the actual verification images which one will download and run.

It makes sense to check how we do lfedge/eve-*, where we have a single container and its run script takes arguments by which the user can extract/generate a rootfs, an spdx file, a raw or iso installer. I think it makes sense to clone the last part i.e., build a single docker container (e.g., lfedge/eve-verification, or lfedge/eve-hwverification) which can run and output different formats like raw or iso.

Copy link
Contributor

@eriknordmark eriknordmark left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does this end up pushing some image to docker hub? If so, how to we name that image lfedge/eve-... (and we should change the lfedge/mkverification-raw-efi to have an eve prefix.)

Also, need to decide what the names should be for the actual verification images which one will download and run.

It makes sense to check how we do lfedge/eve-*, where we have a single container and its run script takes arguments by which the user can extract/generate a rootfs, an spdx file, a raw or iso installer. I think it makes sense to clone the last part i.e., build a single docker container (e.g., lfedge/eve-verification, or lfedge/eve-hwverification) which can run and output different formats like raw or iso.

@jsfakian jsfakian force-pushed the WIP-mkverification-iso-efi branch 4 times, most recently from 1d17c6c to e81c4a5 Compare June 12, 2023 09:57
@eriknordmark eriknordmark requested a review from rene June 12, 2023 20:48
@jsfakian jsfakian force-pushed the WIP-mkverification-iso-efi branch 6 times, most recently from 5fd88c2 to 77d18f2 Compare June 27, 2023 09:58
@jsfakian
Copy link
Contributor Author

jsfakian commented Jul 6, 2023

Does this end up pushing some image to docker hub? If so, how to we name that image lfedge/eve-... (and we should change the lfedge/mkverification-raw-efi to have an eve prefix.)

Also, need to decide what the names should be for the actual verification images which one will download and run.

It makes sense to check how we do lfedge/eve-*, where we have a single container and its run script takes arguments by which the user can extract/generate a rootfs, an spdx file, a raw or iso installer. I think it makes sense to clone the last part i.e., build a single docker container (e.g., lfedge/eve-verification, or lfedge/eve-hwverification) which can run and output different formats like raw or iso.

I avoided creating a new docker image, I reused the code we have in pkg/mkimage-iso-efi

@@ -1,4 +1,4 @@
FROM lfedge/eve-alpine:9fb9b9cbf7d90066a70e4704d04a6fe248ff52bb AS build
FROM lfedge/eve-alpine:c114cf1d3ea51534f061f9aa949beb6ac5c12fb3 AS build
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We've updated the most recent tag for eve-alpine. Can you check if this is the correct/current one?

Signed-off-by: Ioannis Sfakianakis <jsfakas@gmail.com>
@jsfakian jsfakian force-pushed the WIP-mkverification-iso-efi branch from 77d18f2 to f1c4951 Compare July 10, 2023 15:37
Copy link
Contributor

@eriknordmark eriknordmark left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@eriknordmark eriknordmark merged commit 794658e into lf-edge:master Jul 11, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants