This document describes how the EVE build process works, its dependencies, inputs and outputs. The planned complementary document CONTRIBUTING.md describes how to contribute to EVE.
EVE Makefile automates building and running the following artifacts (all of which are described in gory details below):
- linuxkit/Docker packages
- EVE rootfs images
- bootable EVE live images
- bootable EVE installer images
While linuxkit/Docker packages don't provide any knobs to control the flavor of the build, the rest of the artifacts do.
The four main knobs you should be aware of are:
ROOTFS_VERSION
- sets the version ID of the EVE imageZARCH
- sets the architecture (either arm64 or amd64) of the resulting imageHV
- sets the hypervisor flavor of the resulting image (acrn, xen or kvm)IMAGE_FORMAT
- sets the image format of the resulting bootable image (raw, qcow2 or gcp)
You can always specify an arbitrary combinations of these knobs to set the desired outcome of the build.
For example, the following command line will build a Google Compute Platform live image with the default
hypervisor set to kvm
, hardware architecture set to amd64
and the version ID set to snapshot
:
make ROOTFS_VERSION=snapshot ZARCH=arm64 HV=kvm IMAGE_FORMAT=gcp live
In addition to that we also provide shortcuts on the target names themselves that allow you to tweak the knobs specific only to that target. For example our previous example could've been specified as:
make ROOTFS_VERSION=snapshot ZARCH=arm64 HV=kvm live-gcp
instead - since IMAGE_FORMAT
only applies at the level of a live
target. Same way, since HV applies at
the rootfs level (rootfs binary is then fed wholesale into live and installer builds) you can build
a snapshot
rootfs with the default hypervisor set to acrn by doing either:
make ROOTFS_VERSION=snapshot HV=acrn rootfs
or
make ROOTFS_VERSION=snapshot rootfs-acrn
In this hierarchy, think of ZARCH
and ROOTFS_VERSION
as applicable to anything hence they don't get a -foo shortcut treatment.
When in doubt, always use a full specification on all the knobs spelled out on the command line.
Before describing how EVE is built, it is important to understand how EVE is installed. EVE has two distinct installation methods:
- Installing a Live Image
- Using an Installer Image
A live image is ready for an actual device. It is flashed directly to a USB drive or SD card, which is then installed into a final device. As such, the live image has all of the necessary partitions, and is not expected to boot anything but a live device.
An installer image is intended to be booted on multiple devices, each time installing a live image onto the local device. It is flashed to a USB drive or SD card. The card is then installed into a device, the device is booted, the installer installs a live image onto the device's actual long-term storage, and then the install media is disconnected and moved to the next device to repeat the process.
Since an installer is many-use, potentially across many sites, the small amount of configuration may need to change between sets of installs. The installer image can have its configuration changed between installs by connecting it to a live running system.
EVE uses several build tools, some of which are prerequisites, while others are installed as needed.
You must have the following installed in order to build EVE:
- docker
- Go (optional) Required only if you want to build packages locally. By default, all builds happen in a docker environment.
- qemu (optional) Required only if you wish to run the generated image. On macOS, easiest to install via homebrew via
brew install qemu
. - git which you must have to clone this repository.
- linuxkit - CLI used to build actual EVE bootable images.
Each "Installed as Needed" build tool will place its final executable in ${GOPATH}/bin/
, e.g. ~/go/bin/linuxkit
.
To build a specific tool, you can execute make build-tools/bin/<tool-name>
, e.g. make build-tools/bin/bin/linuxkit
.
This target does the following:
- Create a temporary directory
- Initialize git in that directory
- Fetch just the target commit to the directory
- Install tools as needed
- Remove the temporary directory
To build all of the tools, in the project root directory, run make build-tools
The normal process for installing go-based binaries is to execute go get
with options, e.g.
go get -u github.com/linuxkit/linuxkit/src/cmd/linuxkit
go get -u github.com/estesp/manifest-tool
EVE uses a somewhat non-standard build process for these tools to ensure specific versions without polluting the user's normal workspace.
The following are the output components from the build process and their purpose. There are two kinds of components: final, intended for actual direct usage, and interim, used to build the final components. Some interim components may be removed as part of the build finalization process.
rootfs-VERSION.IMG_FORMAT
- a live bootable rootfs filesystem image. This can be either squashfs (default) or ext4.rootfs.img
- a symlink to the actual, versioned rootfs image file that was built lastlive.raw
- a final bootable live disk image in raw format with only few key partitions created (the rest will be created on first boot):- UEFI partition with grub
- config partition with the content of
config.img
described below - root partition from the above
rootfs.img
live.qcow2
- the final bootable live disk image in qcow2 formatlive.vdi
- the final bootable live disk image in vdi format (used in VirtualBox systems)live.parallels
- the final bootable live virtual hard disk image in Parallels formatlive.img.tar.gz
- the final bootable live disk image in Google Compute Platform formatlive.img
- a symlink to one of the above images that was built lastinstaller.raw
- a bootable image that can install EVE on a local device. The installer is intended to be flashed to a USB or SD device, or booted via PXE, and then run to install on a local drive.installer.iso
- a bootable ISO image with a hidden EFI boot partition and an installer partition, with the contents ofinstaller.raw
. The installer is intended to be booted in a manner typical of iso files, and then run to install on a local drive.
rootfs_installer.img
- a bootable rootfs filesystem image to run as an installer.config.img
- 1MB FAT32 image file containing basic configuration information, including wpa supplicant, name of the controller, onboarding key/cert pair, and other configuration information.
The general rules for the build process are as follows.
All bootable images are built via linuxkit, using standard linuxkit yml configuration files. Read documents at the linuxkit repository to learn more about how linuxkit works, composing OCI images to create a bootable disk.
EVE builds one of two bootable images using linuxkit, depending on if you are building an installer or a live image, and then modifies them with various tools.
For a live bootable image, named live.img
, we create the following dependencies in order:
rootfs.img
config.img
live.raw
live.qcow2
rootfs.img
is a bootable root filesystem. To build it:
- Verify the existence of the linuxkit builder configuration file
images/rootfs.yml
. See notes on generating yml. - Call
makerootfs.sh images/rootfs.yml rootfs.img <format> <arch>
, which will:- Build an image for the target architecture
<arch>
usinglinuxkit
with a tar output format usingimages/rootfs.yml
as the configuration file. - Pipe the contents of the tar image to a docker container from either
mkrootfs-ext4
ormkrootfs-squash
, depending on desired output format. mkrootfs-*
takes the contents of the tar image, modifiesgrub.cf
, builds it into an ext4 filesystem image, and streams it to stdout.- Direct the output to the targeted filename, in this case
rootfs.img
.
- Build an image for the target architecture
We now have rootfs.img
.
config.img
is a simple image containing the basic configurations necessary to run EVE. These files are intended to be on their own partition on the final image.
To build config.img
:
- Verify the existence of dependencies, essentially everything in
conf/
- Call the script to create the image:
./tools/makeconfig.sh config.img conf
. This will:- tar up the contents of the config directory into a tar format.
- stream the contents of the tar format into a docker container from the image generated by
pkg/mkconf
.mkconf
is an image that contains themake-config
script and all of/opt/zededa/examples/config
from pillar. mkconf
creates a FAT32 image whose root is everything copied from pillar/conf overwritten by everything from$PWD/conf/
.mkconf
saves the image toconfig.img
live.raw
is a live bootable raw disk image with both a rootfs and a UEFI boot partition.
To build live.raw
:
- Ensure
rootfs.img
andconfig.img
are ready. - tar these two dependencies together and stream to makeflash.sh
- Call
./makeflash.sh -C <disksize> live.raw
, where disksize is normally 8192MB makeflash.sh
creates an empty image of the target size at the target path, and then passes control to a docker container from the image generated bypkg/mkimage-raw-efi
. It does not pass on the names of the partitions to be created, depending on the default.mkimage-raw-efi
:- extracts the contents of the tar stream to
/parts/
- creates a partition for each of
efi
,imga
,imgb
,conf
,persist
- Populates each partition with its appropriate contents:
efi
: contents of/EFI/BOOT/
from/parts/rootfs.img
imga
/imgb
: contents of/parts/rootfs.img
conf
: contents of/parts/config.img
as a partition of type13307e62-cd9c-4920-8f9b-91b45828b798
. This is a custom GUID for EVE configuration.persist
: contents of/parts/persist.img
if it exists, else empty
- Populates the embedded boot partition with the grub
*.EFI
binary andgrub.cfg
file - Validates the image.
- extracts the contents of the tar stream to
live.qcow2
is the final version of the live bootable image, in qcow2 format.
To build live.qcow2
:
- Ensure that
live.raw
exists. - Convert it to
live.qcow2
viaqemu-img convert
- Remove
live.raw
live.img
is a convenience universal pointer to the final image.
To build live.img
:
ln -s live.qcow2 live.img
For an installable image, named installer.img
, we create the following dependencies in order:
rootfs.img
config.img
rootfs_installer.img
installer.raw
rootfs.img
is built identically to how it is for a live bootable image, see rootfs.img
config.img
is built identically to how it is for a live bootable image, see config.img
rootfs_installer.img
is the actual bootable image that installs EVE onto another storage medium, normally an on-board disk/ssd on a device.
To build rootfs_installer.img
:
- Ensure the existence of the prerequisites:
rootfs.img
,config.img
,images/installer.yml
. Theyml
file is the configuration file for using linuxkit to build therootfs_installer.img
. See notes on generating yml. - Call
makerootfs.sh images/installer.yml rootfs_installer.img <format> <arch>
, which will:- Build an image for the target architecture
<arch>
usinglinuxkit
with a tar output format usingimages/installer.yml
as the configuration file.. - Pipe the contents of the tar image to a docker container from either
mkrootfs-ext4
ormkrootfs-squash
, depending on desired output format. mkrootfs-*
takes the contents of the tar image, modifiesgrub.cf
, builds it into an ext4 filesystem image, and streams it to stdout.- Direct the output to the targeted filename, in this case
rootfs_installer.img
.
- Build an image for the target architecture
installer.raw
is a bootable raw disk installer image with both a rootfs and a UEFI boot partition.
To build installer.raw
:
- Ensure
rootfs_installer.img
andconfig.img
are ready. - tar these two dependencies together and stream to makeflash.sh
- Call
./makeflash.sh -C <disksize> live.raw "efi imga conf_win"
, where disksize is normally 350MB makeflash.sh
creates an empty image of the target size at the target path, and then passes control to a docker container from the image generated bypkg/mkimage-raw-efi
. It does pass on the names of the partitions to be created, limiting it toefi
,imga
,conf_win
. There is no need forimgb
orpersist
partitions for an installer image that will not be persisting data, and will not be updating its root filesystem.mkimage-raw-efi
:- extracts the contents of the tar stream to
/parts/
- creates a partition for each of
efi
,imga
,conf_win
- Populates each partition with its appropriate contents:
efi
: contents of/EFI/BOOT/
from/parts/rootfs.img
imga
: contents of/parts/rootfs.img
conf_win
: contents of/parts/config.img
as partition typeEBD0A0A2-B9E5-4433-87C0-68B6B72699C7
, or Windows Data partition. Other than the partition type,conf_win
is idential toconf
. This is required so that this partition can be mounted on MacOS and Windows machines for users to add/change configuration on an installer image in between installs.persist
: contents of/parts/persist.img
if it exists, else empty
- Populates the embedded boot partition with the grub
*.EFI
binary andgrub.cfg
file - Validates the image.
- extracts the contents of the tar stream to
Note that once you flash installer.raw
on the installer media, such as USB drive or SD card, since the conf_win
partition is a Windows Data partition, most operating systems will recognize it and allow you to mount it. This allows you to update configuration on the installer media between installs.
As described earlier, the yml
files used to generate the images via linuxkit build
are in the images/ directory. The actual files, e.g. rootfs.yml
and installer.yml
, are not checked in directly to source code control. Rather, these are generated from <ymlname>.yml.in
, e.g. rootfs.yml.in and installer.yml.in. The generation is as follows:
parse-pkgs.sh <yml>.in > <yml>
This is used to replace the tags of various components in the .yml.in
file with the correct current image name and tag for various packages, including the correct architecture.
The output .yml
file is stored in the same directory as the .yml.in
file, i.e. images/.
This creates several challenges, which will, eventually, be cleaned up:
- The
images/
source directory is unclean, with both committed and non-committed code in the same directory. - The same input file, e.g.
rootfs.yml
, appears to be usable with different architectures, but actually is not, as it is architecture-specific. - It is necessary to pre-process the actual source files before generating an image. It is not possible to run
linuxkit build
manually to generate an image. This makes building and debugging individual steps harder.
These are all due to constraints within the usage of the yml
files. If a cleaner solution requires upstreaming into linuxkit, it will be added to the UPSTREAMING.md file.
As described above, the bootable images - live live.img
and installer installer.raw
- are partitioned disk images with the following layouts:
partition | purpose | source |
---|---|---|
EFI | boot via grub | makeraw.sh |
imga | Root partition A | rootfs.img from linuxkit build |
imgb | Root partition B | rootfs.img from linuxkit build |
conf | Config data | config.img from tools/makeconfig.sh |
persist | Persistent storage | empty |
partition | purpose |
---|---|
EFI | boot via grub |
imga | Root partition A |
conf_win | Config data |
The rest of this section describes the contents of the root filesystem, both rootfs.img
for live and rootfs_installer.img
for installer.
LinuxKit - which is used to build both rootfs.img
and rootfs_installer.img
- composes an operating system image from OCI container images. Depending on configuration, these are used to:
- insert a kernel directly on the booting operating system
- place files directly on the booting operating system, including
init
, via "init packages" - create one-time onboot services that run in containers via runc
- create one-time onshutdown services that run in containers via runc
- create long-running services that run in containers via containerd
EVE uses a number of standard linuxkit packages. These are enumerated below. Others may be added later.
init
packageslinuxkit/init
- for theinit
processlinuxkit/runc
- forrunc
linuxkit/containerd
- forcontainerd
linuxkit/getty
- forgetty
to log in on console
onboot
packageslinuxkit/sysctl
linuxkit/modprobe
- customized for the appropriate moduleslinuxkit/mount
- customized to mount the config partition as/var/config
services
packageslinuxkit/openntpd
- for ntp
init
packageslinuxkit/init
- for theinit
processlinuxkit/runc
- forrunc
linuxkit/getty
- forgetty
to log in on console
The remaining packages are custom images built for EVE. All of the packages - and some tools - are in the pkg/ directory. We intend at some point to separate out tools, which are used at build-time, into the tools/
directory, from packages, which are actual OCI images loaded into a runnable image, which will remain in pkg/
.
The following custom packages are used:
- kernel: EVE uses its own custom kernel package, rather than one of the standard linuxkit ones. This is primarily due to kernel modules and drivers, especially on arm, as well as Xen requirements.
init
packages:lfedge/eve-grub
- CoreOS inspired GRUB required to enable CoreOS-style dual partition upgrades. See UPSTREAMING.md for a more detailed discussion of what is unique in this grub.lfedge/eve-devices-trees
- device trees for all the ARM platforms that EVE supports.lfedge/eve-fw
- various firmware required for device drivers.lfedge/eve-xen
- a single Xen binary required to boot EVE.lfedge/eve-gpt-tools
- ChromiumOS inspired tools and sgdisk required to enable CoreOS-style dual partition upgrades. See UPSTREAMING.md for a more detailed discussion of what is unique in these versions of the gpt tools.lfedge/eve-dom0-ztools
- catch-all containers for tools helpful in developing and debugging EVE.
onboot
packages:lfedge/eve-rngd
- customlfedge/eve-rngd
package, rather than the standard linuxkit one. This micro-fork accommodates the following hack which provides some semblance of seeding randomness on ARM. Without this HiKey board won't boot.
services
packages:lfedge/eve-wwan
- WWAN drivers and software. LTE/3G/2G. Mostly experimental.lfedge/eve-wlan
- WLAN drivers and software. Currently a glorified wrapper around wpa_supplicant.lfedge/eve-guacd
- Apache Guacamole service that provides console and VDI services to running VMs and containers.lfedge/eve-zedctr
- a "catch-all" package for EVE tools; see below.
- kernel: EVE uses its own custom kernel package, rather than one of the standard linuxkit ones. Technically, the installer could use a standard linux kernel from linuxkit/kernel. However, while installing has few special requirements, booting the live system does have requirements, including proper xen support and appropriate device drivers functioning. Rather than having the install function, only to have the live boot fail because of driver, module or xen issues, we boot the installer with the exact same kernel as the live system, allowing it to serve double-duty as both an installer and a verifier.
init
packages:lfedge/eve-grub
- CoreOS inspired GRUB required to enable CoreOS-style dual partition upgrades.lfedge/eve-devices-trees
- device trees for all the ARM platforms that EVE supports.lfedge/eve-xen
- a single Xen binary required to boot EVE.lfedge/eve-dom0-ztools
- catch-all containers for tools helpful in developing and debugging EVE.
onboot
packages:lfedge/eve-rngd
- custom EVE rngd package, rather than the standard linuxkit one. This micro-fork accommodates the following hack which provides some semblance of seeding randomness on ARM. Without this HiKey board won't boot.lfedge/eve-mkimage-raw-efi
- custom EVE version ofmkimage-raw-efi
to create an ext4 image, used to make the correct filesystems on the target install disk.
The package lfedge/eve-zedctr
is a "catch-all" package, composed of many different packages that would go into services
separately. Its source is pkg/zedctr, and is comprised of many different services.
The package pillar
contains, unsurprisingly, the pillar
services that are responsible for managing the various components and deployments of a running EVE system. Its source is pkg/pillar. We need to start breaking this monolith down at some point, but for now everything sits in the same container.
pillar
itself vendors EVE golang api, i.e. the golang-compiled protobufs defined in api/proto. These can be compiled for a specific language using the makefile target make proto-<language>
, e.g. make proto-go
or make proto-python
. To build them all, run:
make proto
pillar
depends upon the latest versions of these being available at its compile time in its vendor directory at pkg/pillar/vendor. The target make proto-vendor
will vendor them into pkg/pillar/vendor.
Packages are built within a docker container as defined by the Dockerfile
within the package directory. The Dockerfile
also specifies how the package will be built within the container. Some packages have a separate script to built them which is then invoked using the RUN
clause within the Dockerfile
. For some others like the kernel
package, the entire build script is specified within the Dockerfile
. Finally, the built docker images are published here.
Packages are meant to be the building blocks for reproducible builds. Currently, however, the builds are not strictly speaking reproducible, but rather guaranteed. EVE build system is not bootstrapping everything from the source up, instead it uses Alpine Linux as the source of binary artifacts. All of the Alpine binary packages that are consumed by EVE are collected in the Docker image archive and published under lfedge/eve-alpine
name. That way, EVE build system pins all Alpine packages that it needs and can guarantee that they won't change until the archive is updated. All of the packages in the archive are listed under mirrors folder and the archive can be updated by updating that list. While currently re-building of the archive image is done by fetching required packages from the official Alpine mirrors, we can always add an additional step of bootstrapping all the same packages from source (which will give EVE true reproducible builds).
Since updating content of the lfedge/eve-alpine
package is a bit of an unusual process -- it is described in details in the How to update eve-alpine package section below.
Reliance on lfedge/eve-alpine
archive enforces a particular structure on individual Dockerfile from EVE packages. For one, they always start with FROM lfedge/eve-alpine:TAG
and they always produce the final output in the FROM scratch
step (to avoid layer dependency on the large lfedge/eve-alpine
package). In addition, lfedge/eve-alpine
archive package defines a helper script eve-alpine-deploy.sh
that provides and easy entry point for setting up of the build environment and the final, Alpine-based output of the build. This helper script is driven by looking up the following environment variable (which are very similar to Requires and BuildRequires in RPMs):
- PKGS, PKGS_amd64, PKGS_arm64: used to list packages required for the final binary output of the build
- BUILD_PKGS, BUILD_PKGS_amd64, BUILD_PKGS_arm64: used to list packages required to be present for the build itself, but not in the final output
The only tiny annoyance is that one should not forget an explicit RUN eve-alpine-deploy.sh
stanza in the Dockerfile after these ENV variables are defined. Calling eve-alpine-deploy.sh
in the RUN stanza has an effect of all the BUILD time packages getting installed in the build context and all the runtime packages getting installed in the special folder /out
(if there are additional binary artifacts produced by the build -- they too need to be added to the /out
folder).
A typical EVE Dockerfile drving the build will start from something like:
FROM lfedge/eve-alpine:XXX as build
ENV PKGS foo bar
ENV PKGS_arm64 baz-for-arm
ENV BUILD_PKGS gcc go
RUN eve-alpine-deploy.sh
...
FROM scratch
COPY --from=build /out/ /
One can build each package independently via:
make pkg/<name>
For example, to build guacd
:
make pkg/guacd
To build all of the dependent packages:
make pkgs
In some cases, the pkg/<name>
rule may rebuild more than intended, as they
specify required dependencies. In this case, it may be more efficient to use
make eve-<name>
, such as when testing changes in the pillar
package:
make eve-pillar
All of these packages are published regularly to the dockerhub registry, so it is not strictly necessary to rebuild them, unless you are changing a package and want to publish, or are working with a local custom build.
Note: The net effect of this is that if you try to build rootfs.img
or installer.img
and reference a package that is not published on the docker hub or available as a local image, it will not try to build it locally for you; this functionality is not available in linuxkit. Instead, it will simply fail. You must build the package and at least have it available in your local cache for the rootfs.img
or installer.img
build to succeed.
This section provides an overview of the processes used to create the following components:
- Live Images
- Installer Images
+-------+ +--------+
| pkg/* +-------+ +--+ conf/ |
+-------+ | | +--------+
+-------+ | |
| pkg/* +-------+ |
+-------+ |linuxkit via |
|makerootfs.sh |
| |
+-------+ | |
| pkg/* +-------+ |
+-------+ v v
+--------+--------+ +--------+---------+
| | | |
| rootfs.img | | config.img |
| | | |
+-+---------------+ +----------------+-+
| |
| live.raw |
| +---------------------------+ |
| | efi | |
| +---------------------------+ |
+-----> imga | |
| | | |
| +---------------------------+ |
+-----> imgb | |
| | |
+---------------------------+ |
| conf <--+
| |
+---------------------------+
| persist |
| |
+----------------+----------+
|
live.qcow2 |
+----------------v----------+
| |
| |
+---------------------------+
+-------+ +--------+
| pkg/* +-------+ +--+ conf/ |
+-------+ | | +--------+
+-------+ | |
| pkg/* +-------+ |
+-------+ |linuxkit via |
|makerootfs.sh |
| |
+-------+ | |
| pkg/* +-------+ |
+-------+ v v
+--------+--------+ +--------+---------+
| | | |
| rootfs.img | | config.img |
| | | |
+--------+--------+ +--------------+---+
| |
+-------+ +------------------------+ |
| pkg/* +-----+ linuxkit via | |
+-------+ | makerootfs.sh | |
+-------+ | | |
| pkg/* +-----+ rootfs_installer.img | |
+-------+ +v-----------------------+ | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| /bits/rootfs.img <--------+ |
| /bits/config.img <-----------+
| |
| |
+------------------------+
|makeflash.sh
installer.raw |
+------------------v-----+
| |
| |
+------------------------+
The following are build tools used to create EVE images, their purpose and source:
- linuxkit - build bootable operating system images by composing OCI images and raw files together. Used to create
rootfs.img
androotfs_installer.img
. Installed inbuild-tools/bin/
- manifest-tool - create OCI v2 manifest images that can reference other images based on architecture or operating system. Enables a single image tag, e.g.
lfedge/foo:1.2
to be resolved automatically to the actual image that works on the current architecture and operating system at run-time. Installed inbuild-tools/bin/
- makerootfs.sh - call
linuxkit
to build a bootable image's filesystem, in tar format, forrootfs.img
orrootfs_installer.img
. Passes the resultant tar stream to a container frompkg/mkrootfs-squash
orpkg/mkrootfs-ext4
, depending on desired output format. - mkrootfs-squash or mkrootfs-ext4 - take a build rootfs from the previous step as stdin in tar stream format, customize it with a filesystem UUID and other parameters, and create a squashfs or ext4 filesystem.
- makeflash.sh - take an input tar stream of several images, primarily
rootfs.img
andconfig.img
. Create a file to use as an image of a target size or default. Passes the resultant tar stream to a container frompkg/mkimage-raw-efi
. - mkimage-raw-efi - create an output file that represents an entire disk, with multiple partitions. By default,
efi
,imga
,imgb
,config
,persist
. The installer image creates onlyefi
,img
,config
. - tools/makeconfig.sh - package up the provided directory, normally conf/ into a tar stream, and pass to a container from
pkg/mkconf
. - mkconf - combine the input tar stream with defaults in
/conf/
fromlfedge/eve-pillar
into a new container image in/
. Create a FAT32 disk image from it. - parse-pkgs.sh - determine the correct latest hash to use for all packages and higher-order components. See parse-pks.
In many cases, we want to build an image not from a specific commit we actively know for individual packages, but from the latest specific version currently available. For example, if our linuxkit config yml
looks as follows:
kernel:
image: lfedge/eve-kernel:7cfa13614bb99a84030db209b6c9a0696c7d3315-amd64
cmdline: "rootdelay=3"
init:
- lfedge/eve-grub:97e7b1404e7c9d141eddb58294fcff019f61571b-amd64
- lfedge/eve-device-trees:18377dd0bc3c33a1602e94a4c43aa0b3c51badb9-amd64
- lfedge/eve-fw:1d8c22ae31c42d767ba648b186db4ea967a9c569-amd64
- lfedge/eve-xen:f51bf3d17fad15b71242befbddec96e177132a99-amd64
- lfedge/eve-gpt-tools:fe878611e4e032ea10946cbc9a1c3d5b22349dc4-amd64
- lfedge/eve-dom0-ztools:b53cd1b5785c128371a5997e3a6e16007718c12d-amd64
We may want to rebuild using the latest version currently available to us of each of the above packages. If we changed 1, 3 or even all of them, it is a tedious and error-prone job to change the hashes of the commits for each of them.
Similarly, a pkg/
may be sourced from another package which, in turn, has a specific commit. For example, the first line of the generated qrexec-lib Dockerfile is:
FROM lfedge/eve-xen-tools@sha256:4a6d0bcfc33a3096398b4daa0931f9583c674358eeb47241e0df5f96e24c0110 as xentools
The Dockerfile mentioned above is not checked into the repository, but instead generated from a teampled by a parse-pkgs script.
The purpose of parse-pkgs is to collect the actual hashes of the latest version of every relevant package and either report them to stdout or modify a template file à la sed.
It does the following:
- Receive the
DOCKER_ARCH_TAG
var and, if not present, determine it fromuname -m
and canonicalize it. - Receive the
EVE_VERSION
var and, if not present, determine it fromeve_version
. - Determine the latest tag for each package in a list, roughly approximating every directory in
pkg/
usinglinuxkit pkg show-tag pkg/<dir>
and save it as a var with name<pkg-as-uppercase>_TAG
, e.g.STRONGSWAN_TAG
- For internal packages that combine other packages -
lfedge/eve-zedctr
andlfedge/eve
- do a more complicated versioning:cat pkg/<pkg>/Dockerfile.in
- resolve all of the tags to actual latest versions to create a ready-to-run
Dockerfile
- create a hash of the generated
Dockerfile
- Modify all stdin to replace any tags with the appropriate named and hashed packages, e.g.
STRONGSWAN_TAG
tolfedge/eve-strongswan@sha256:abcdef5678
The current build process with parse-pkgs.sh
creates some challenges:
- The templated inputs, e.g.
Dockerfile.in
orrootfs.yml.in
, are easily checked into version control, while the generatedDockerfile
orrootfs.yml
are not. These leave artifacts throughout the tree that are the sources of actual builds and should be checked in. - The generated files tend to be architecture-specific. These can be resolved by using multi-arch manifests. This, in turn, will make the previous issue easier to solve.
parse-pkgs.sh
is run with every invocation ofmake
, evenmake -n
. The lists of local packages to be resolved withlinuxkit pkg show-tag
is fairly quick, pulling down and resolving the actual images for external packages is slow. In all cases, if possible, these should be deferred until actual build requires them. This is resolvable viaMakefile
changes.- The list of packages is hard-coded into
parse-pkgs.sh
. This makes it brittle and hard to add packages. If possible, this should be moved to parsing thepkg/
directory.
Last but not least, is this completely necessary?
images/*.yml
: The need to updateimages/*.yml
is understood, as these packages change a lot. Even so, the utilities might be better structured as a separate external utility that is run manually. Most of the time, you just build from a staticrootfs.yml
orinstaller.yml
. When you want to update them, you runupdate-images
(or similar) and it updates them. Finally, you commit when a good build is ready.pkg/*/Dockerfile
: The need to generateDockerfile
for many of the packages may mean too much cross-dependency, which can be brittle. It is possible that this is necessary, and there is no other way around it. However, we should explore how we can simplify dependencies.
Unlike a lot of other Linux distributions, Alpine Linux doesn't provide historical versions of all its packages. In fact, Alpine Linux reserves the right to update packages with security patches behind the scenes resulting in content of Alpine x.y.z repositories shifting slightly from time to time. This, obviously, goes against the principle of reproducible builds and makes our lfedge/eve-alpine
cache serve a double function: not only it is used to speed up the build, but it also may end up being the only place on the Internet where a certain Alpine Linux package version x.y.z could be available from.
The latter aspect makes maintaining lfedge/eve-alpine
a bit tricky, even though at its core it is simply driven by the list of packages recorded in the manifest files under pkg/alpine/mirrors. Removing packages from the cache is not advisable (and should really only be done during major EVE version updates). Adding packages to the cache consists of two steps:
- adding new package names to the the right manifest file (under
pkg/alpine/mirrors/<BASE ALPINE VERSION>/[main|community]
) - updating
FROM ... AS cache
line in pkg/alpine/Dockerfile to point to the last version of the cache
Step #2 guarantees that all existing packages will simply be re-used from the previous version of the cache and NOT re-downloaded from the Alpine http mirrors (remember that re-downloading always runs the risk of getting a different version of the same package). Step #1, of course, will download new packages and pin them in the new version of the cache.
If the above seems a bit confusing, don't despair: here's an actual example of adding 4 new packages libfdt
, dtc
, dtc-dev
and uboot-tools
to the lfedge/eve-alpine
cache.