From patchwork Tue Jan 6 11:06:28 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "srinuvasan.a" X-Patchwork-Id: 4790 Return-Path: Received: from shymkent.ilbers.de ([unix socket]) by shymkent (Cyrus 2.5.10-Debian-2.5.10-3+deb9u2) with LMTPA; Tue, 06 Jan 2026 12:06:36 +0100 X-Sieve: CMU Sieve 2.4 Received: from mail-wm1-f58.google.com (mail-wm1-f58.google.com [209.85.128.58]) by shymkent.ilbers.de (8.15.2/8.15.2/Debian-8+deb9u1) with ESMTPS id 606B6aCM019559 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for ; Tue, 6 Jan 2026 12:06:36 +0100 Received: by mail-wm1-f58.google.com with SMTP id 5b1f17b1804b1-47d3ffa98fcsf6072685e9.3 for ; Tue, 06 Jan 2026 03:06:36 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1767697591; cv=pass; d=google.com; s=arc-20240605; b=iW5yS8vSucLDjw0QB1DLjf2uv82knNSZhMsClOZGk6q/tSy1nVFJKvVmOA1OKhlCTL BeZebHZ0/S9n4fGgyadODls2eczIJ2LNgASA3MX4gNZTpyMrbErDWRE4ghPYzb/fWEA8 W6F+gW1mZQmg4rDHZy1LvLHVPnjMGISNGK5nOmuJjjhLEBrvrhv2QDJdgytY0sJjaDsO Iyin2sXumgMdZdZl6H2O2JN1QGtUeYAoVYdbDteYR2daCNITCspbLV7NBf95zKgtMyEb SRreX0B+OsbmAImP4+v92lkXF2tdQLwDPIHMQMOFzP2xZcRqWRV91zFeBQhUOiyqqraI qHcA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:reply-to:feedback-id:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=nppFyAxSR59A/cfX51KKQqA3DqpUD1pZsH+80oFWjAM=; fh=dDReQUaFU00prXtTQQwyoMkKNsmU+6d6f+lGxbW1kBo=; b=VimCGa8jOzXqrTO3msttvVoGUZ0NOvvfgCcO2UjCmB+kyLSJx9NOB0NIa86fk4RAEO 8Wns+y5abFb1O6BuASex/ndqsv1RMuCHe4VmViFIAgxIgAuVxvXX3lLNbz9XWcGtkbXI OJ5OUGWY2ANw5/wZ5TycuwjTCxmkBvuz8MG6WVQoCY/E45dV87hRqBek29toR90rJdig Pc7WVryAmY/B4+M+tHYi+Om/aRawXdBBXhyBiR5FzP9B7aAZ6NXn8mQLKsG9q709/Lyu ueSbfevtzyFo/cwVgyoh18wck73aanSr9aO4yzj2axEv1ou22GAPJzBJFjrHxHjnTaV5 0n5g==; darn=isar-build.org ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=fm1 header.b="Efrl0DH/"; spf=pass (google.com: domain of fm-1324425-20260106110624035054051a000207ca-wa_qck@rts-flowmailer.siemens.com designates 185.136.65.225 as permitted sender) smtp.mailfrom=fm-1324425-20260106110624035054051a000207ca-WA_Qck@rts-flowmailer.siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlegroups.com; s=20230601; t=1767697591; x=1768302391; darn=isar-build.org; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:reply-to :x-original-authentication-results:x-original-sender:feedback-id :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:from:to:cc:subject:date:message-id:reply-to; bh=nppFyAxSR59A/cfX51KKQqA3DqpUD1pZsH+80oFWjAM=; b=RHGNspeEb5mcHBQjnCb0haRCMgX16Qbg6RUPxT0uk9aYyh7YqfAd5y+CsyGuWLgJu5 URIHCNACD9upjzUitLgYT0jZmME3v+kgTiP6v1Yx+sPncOGfcuafZGZoFbSCACkRTPNH LbFn64a8kTVnsqsVKlobcvXKVUgsdA5U4b77XM9+gJQOu4DuX0ZxEpp+/Sco6B7sk1Y9 bTbdbzsS3OVO9OA3JPfjcHvp3kUYqfw+gzceyaDauEVJfQdhN8SZN0lq5pTT6DUBm54Q s8F3CPSZPE1t5UPjCYpXMBdCCkQmwh9wXs8FxliEeJ0oQx/vGo9cr9zxiAZaqGgXWwdy ll9g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1767697591; x=1768302391; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :x-spam-checked-in-group:list-id:mailing-list:precedence:reply-to :x-original-authentication-results:x-original-sender:feedback-id :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:x-beenthere:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=nppFyAxSR59A/cfX51KKQqA3DqpUD1pZsH+80oFWjAM=; b=ei2/f8JmHUl8MHMktVF/BDryk/tUeh2x3AN94YvpXLEvaWwt0cvYG14HLahb9Lboxc msGKS8f6o8h83k9tVdv4jdRmPNXR+vp5ERQointG4AfUIvKX2DjWn8iSR21VAzVLaxll kSYXSYuF/VxKWzZnzPnG5PaYThQXxSRWLzCf5vEnCzw5261FHeXDyfGMSDDxA6sEV5cc 8/zMgMtufOzBAgFqb7LaM1VSXxYFcqmao74JR2sb5X3FPz7lCZqz+ZGyMW+t1mzgJD+s mnLC0JCe0waTP6dJ9QJ3m7Vp91WoS7n53287mZgS7+hifkHrMl6JEgCIYeSQ2FVbrJRD B94w== X-Forwarded-Encrypted: i=2; AJvYcCVd5/8Egy/fZdkSWlIkm6lAjmmMMCs9ttubZf2caonH+lL3nWkTeCm91wQUaSCE0yoyDQvjuck=@isar-build.org X-Gm-Message-State: AOJu0Yy0Ici0zLMr9GA7gBqhznUFQ7ivV60fBgFbJ9hMScgSFdBbsM3g jAJHQqp82G5aDTzcHRU3+WPSHSSPRDXIbqSJkro2J7cjPcvkgGEiz9Gi X-Google-Smtp-Source: AGHT+IF4+oFixLA6zPzRgSZ9gIz9bocjkezQ5+yeEki9CuR2UhSuPNQdUUOqVQRBialWZTLUycKSQA== X-Received: by 2002:a05:600c:4e0d:b0:476:d494:41d2 with SMTP id 5b1f17b1804b1-47d7f09dc8bmr27285695e9.29.1767697590360; Tue, 06 Jan 2026 03:06:30 -0800 (PST) X-BeenThere: isar-users@googlegroups.com; h="AWVwgWbFgbL3Fq1BRGkYx47UhDBs0eqzXhOUZfjTW/++caAyxw==" Received: by 2002:a05:600c:1f16:b0:477:5a45:da9e with SMTP id 5b1f17b1804b1-47d7eab6718ls5271285e9.0.-pod-prod-04-eu; Tue, 06 Jan 2026 03:06:27 -0800 (PST) X-Received: by 2002:a05:600c:4e16:b0:477:63b5:6f3a with SMTP id 5b1f17b1804b1-47d7f09d505mr32822325e9.27.1767697587450; Tue, 06 Jan 2026 03:06:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1767697587; cv=none; d=google.com; s=arc-20240605; b=XLSK9vyVI0a7+biPRNba/qufluU5Gpnunt+EIcicO1ZUAII1n0Qc2mN3nmST/VZszq H6JzH6i6DDvaQi9AbAJ6ov5XWCbmYRLfOGHY016e8zAM7rKrp9C7ZgUeGnapbCkFRvtK QARESP7Yd4H3vFzUu4G1ugbgA6FU5CitBdVILF/ZEOIGGliqXSFWu0qgOqLB5CbR5SSN hJnem3om3umeQPShBvFGEYmd/S27AnA/LTYvfHI365i6RC71zhRDmBqemedoPVRONVeX JXKxzFCzxM9R6sZPA8S+c0q+OvsPO2MDe8kURY5EAn09XOxYLJR9na8b0YZ6W6tsfR6C SeOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=feedback-id:content-transfer-encoding:mime-version:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature; bh=hqvL9LAbjInEB6E9DZbcUhwcX/sRcM92G9FQ8oYJpsY=; fh=q34A+PDu/veyKhQmJ8Sf9YPiZusI+h3MND2WD1Gk9tg=; b=De3fbpKeTsfiyiotaMJguZMoygJ1imPTg2s5H9NxbNoI65cbtPqb/S0eGoSkpuvmb9 cpCbBPhUgw8HBgYH+ZEdY6VK/NKhHZ9boSC43BlLfXlyhaGj7hTjGawX8vl+56cXK5F+ RDFiDr03NSab57vOzbGZabbdH/Muu5AURoz4kq3uYF61vW7Ajwq0ckbO9dFZqD3rVuhq jfn0PVjHXgChCssIWF8qih1FqC+k6LucJbLa0fCz/vEwaDs2MQv/qnSaCImZbCCdMB20 +3kAQ7FfS5BAkUOZET8wCl9wNZuWMGtfJ0wHrvhhGZH+LzTucVtuGkyXFhLO53fB0AR6 CgLg==; dara=google.com ARC-Authentication-Results: i=1; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=fm1 header.b="Efrl0DH/"; spf=pass (google.com: domain of fm-1324425-20260106110624035054051a000207ca-wa_qck@rts-flowmailer.siemens.com designates 185.136.65.225 as permitted sender) smtp.mailfrom=fm-1324425-20260106110624035054051a000207ca-WA_Qck@rts-flowmailer.siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com Received: from mta-65-225.siemens.flowmailer.net (mta-65-225.siemens.flowmailer.net. [185.136.65.225]) by gmr-mx.google.com with ESMTPS id 5b1f17b1804b1-47d7fb13c8csi163735e9.3.2026.01.06.03.06.27 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 06 Jan 2026 03:06:27 -0800 (PST) Received-SPF: pass (google.com: domain of fm-1324425-20260106110624035054051a000207ca-wa_qck@rts-flowmailer.siemens.com designates 185.136.65.225 as permitted sender) client-ip=185.136.65.225; Received: by mta-65-225.siemens.flowmailer.net with ESMTPSA id 20260106110624035054051a000207ca for ; Tue, 06 Jan 2026 12:06:26 +0100 X-Patchwork-Original-From: "srinuvasan.a via isar-users" From: "srinuvasan.a" To: isar-users@googlegroups.com Cc: Srinuvasan A Subject: [PATCH v2] kas: update to kas-container 5.1 Date: Tue, 6 Jan 2026 16:36:28 +0530 Message-Id: <20260106110628.52844-1-srinuvasan.a@siemens.com> In-Reply-To: References: MIME-Version: 1.0 X-Flowmailer-Platform: Siemens Feedback-ID: 519:519-1324425:519-21489:flowmailer X-Original-Sender: srinuvasan.a@siemens.com X-Original-Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=fm1 header.b="Efrl0DH/"; spf=pass (google.com: domain of fm-1324425-20260106110624035054051a000207ca-wa_qck@rts-flowmailer.siemens.com designates 185.136.65.225 as permitted sender) smtp.mailfrom=fm-1324425-20260106110624035054051a000207ca-WA_Qck@rts-flowmailer.siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com X-Original-From: srinuvasan.a@siemens.com Reply-To: srinuvasan.a@siemens.com Precedence: list Mailing-list: list isar-users@googlegroups.com; contact isar-users+owners@googlegroups.com List-ID: X-Spam-Checked-In-Group: isar-users@googlegroups.com X-Google-Group-Id: 914930254986 List-Post: , List-Help: , List-Archive: , List-Unsubscribe: , X-Spam-Status: No, score=-4.9 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H2,RCVD_IN_RP_CERTIFIED, RCVD_IN_RP_RNBL,RCVD_IN_RP_SAFE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on shymkent.ilbers.de X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= From: Srinuvasan A Additionally, set KAS_CONTAINER_IMAGE_DISTRO_DEFAULT to debian-bookworm, as bookworm images fail to build when using the trixie container. Ref: https://groups.google.com/g/isar-users/c/H1AuILdBBMI Signed-off-by: Srinuvasan A --- kas/kas-container | 42 ++++++++++++++++++++++++++++++++++++++---- 1 file changed, 38 insertions(+), 4 deletions(-) mode change 100755 => 100644 kas/kas-container diff --git a/kas/kas-container b/kas/kas-container old mode 100755 new mode 100644 index 476724c7..b46682e4 --- a/kas/kas-container +++ b/kas/kas-container @@ -27,8 +27,9 @@ set -e -KAS_CONTAINER_SCRIPT_VERSION="4.8.2" +KAS_CONTAINER_SCRIPT_VERSION="5.1" KAS_IMAGE_VERSION_DEFAULT="${KAS_CONTAINER_SCRIPT_VERSION}" +KAS_CONTAINER_IMAGE_DISTRO_DEFAULT="debian-bookworm" KAS_CONTAINER_IMAGE_PATH_DEFAULT="ghcr.io/siemens/kas" KAS_CONTAINER_IMAGE_NAME_DEFAULT="kas" KAS_CONTAINER_SELF_NAME="$(basename "$0")" @@ -64,7 +65,8 @@ usage() printf "%b" "menu\t\t\tProvide configuration menu and trigger " \ "configured build.\n" printf "%b" "\nOptional arguments:\n" - printf "%b" "--isar\t\t\tUse kas-isar container to build Isar image.\n" + printf "%b" "--isar\t\t\tUse kas-isar container to build Isar image. To force\n" + printf "%b" " \t\t\tthe use of run0 over sudo, set KAS_SUDO_CMD=run0.\n" printf "%b" "--with-loop-dev Pass a loop device to the " \ "container. Only required if\n" printf "%b" "\t\t\tloop-mounting is used by recipes.\n" @@ -117,6 +119,26 @@ trace() "$@" } +prepare_sudo_cmd() +{ + if [ -z "${KAS_SUDO_CMD}" ]; then + # Try to auto-detect a privileged executor + if command -v sudo >/dev/null; then + KAS_SUDO_CMD="sudo" + elif command -v run0 >/dev/null; then + KAS_SUDO_CMD="run0" + else + fatal_error "No privileged executor found, need sudo or run0." + fi + fi + + case "$KAS_SUDO_CMD" in + sudo) _KAS_SUDO_CMD="sudo --preserve-env";; + run0) _KAS_SUDO_CMD="run0 --background= --unit=kas-container@$$";; + *) fatal_error "Unsupported KAS_SUDO_CMD ('${KAS_SUDO_CMD}'), use sudo or run0.";; + esac +} + enable_isar_mode() { if [ -n "${ISAR_MODE}" ]; then @@ -128,15 +150,17 @@ enable_isar_mode() KAS_ISAR_ARGS="--privileged" if [ "${KAS_CONTAINER_ENGINE}" = "podman" ]; then + prepare_sudo_cmd # sudo is needed for a privileged podman container - KAS_CONTAINER_COMMAND="sudo --preserve-env ${KAS_CONTAINER_COMMAND}" + KAS_CONTAINER_COMMAND="${_KAS_SUDO_CMD} ${KAS_CONTAINER_COMMAND}" # preserved user PATH may lack sbin needed by privileged podman export PATH="${PATH}:/usr/sbin" elif [ "${KAS_DOCKER_ROOTLESS}" = "1" ]; then + prepare_sudo_cmd export DOCKER_HOST="${DOCKER_HOST:-unix:///var/run/docker.sock}" debug "kas-isar does not support rootless docker. Using system docker" # force use of well-known system docker socket - KAS_CONTAINER_COMMAND="sudo --preserve-env ${KAS_CONTAINER_COMMAND}" + KAS_CONTAINER_COMMAND="${_KAS_SUDO_CMD} ${KAS_CONTAINER_COMMAND}" KAS_DOCKER_ROOTLESS=0 fi } @@ -267,10 +291,14 @@ trap kas_container_cleanup EXIT INT TERM set_container_image_var() { KAS_IMAGE_VERSION="${KAS_IMAGE_VERSION:-${KAS_IMAGE_VERSION_DEFAULT}}" + KAS_CONTAINER_IMAGE_DISTRO="${KAS_CONTAINER_IMAGE_DISTRO:-${KAS_CONTAINER_IMAGE_DISTRO_DEFAULT}}" KAS_CONTAINER_IMAGE_NAME="${KAS_CONTAINER_IMAGE_NAME:-${KAS_CONTAINER_IMAGE_NAME_DEFAULT}}" KAS_CONTAINER_IMAGE_PATH="${KAS_CONTAINER_IMAGE_PATH:-${KAS_CONTAINER_IMAGE_PATH_DEFAULT}}" KAS_CONTAINER_IMAGE_DEFAULT="${KAS_CONTAINER_IMAGE_PATH}/${KAS_CONTAINER_IMAGE_NAME}:${KAS_IMAGE_VERSION}" KAS_CONTAINER_IMAGE="${KAS_CONTAINER_IMAGE:-${KAS_CONTAINER_IMAGE_DEFAULT}}" + if [ -n "${KAS_CONTAINER_IMAGE_DISTRO}" ]; then + KAS_CONTAINER_IMAGE="${KAS_CONTAINER_IMAGE}-${KAS_CONTAINER_IMAGE_DISTRO}" + fi } # SC2034: DIR appears unused (ignore, as they are used inside eval) @@ -283,6 +311,7 @@ setup_kas_dirs() KAS_REPO_REF_DIR="$(check_and_expand KAS_REPO_REF_DIR required)" DL_DIR="$(check_and_expand DL_DIR createrec)" SSTATE_DIR="$(check_and_expand SSTATE_DIR createrec)" + KAS_BUILDTOOLS_DIR="$(check_and_expand KAS_BUILDTOOLS_DIR createrec)" } setup_kas_dirs @@ -339,6 +368,10 @@ while [ $# -gt 0 ]; do if [ "$(id -u)" -eq 0 ]; then fatal_error "loop device not available!" fi + prepare_sudo_cmd + if ! [ "$KAS_SUDO_CMD" = "sudo" ]; then + fatal_error '--with-loop-dev requires sudo for device setup.' + fi sudo_command="/sbin/losetup -f" sudo_message="[sudo] enter password to setup loop" sudo_message="$sudo_message devices by calling" @@ -593,6 +626,7 @@ forward_dir KAS_BUILD_DIR "/build" "rw" forward_dir DL_DIR "/downloads" "rw" forward_dir KAS_REPO_REF_DIR "/repo-ref" "rw" forward_dir SSTATE_DIR "/sstate" "rw" +forward_dir KAS_BUILDTOOLS_DIR "/buildtools" "rw" if git_com_dir=$(git -C "${KAS_REPO_DIR}" rev-parse --git-common-dir 2>/dev/null) \ && [ "$git_com_dir" != "$(git -C "${KAS_REPO_DIR}" rev-parse --git-dir)" ]; then