Skip to content
  1. Apr 12, 2022
  2. Mar 30, 2022
    • Joel Goddard's avatar
      tools/kas-runner: Add --no_deploy_artifacts · 382fb4e9
      Joel Goddard authored and Diego Sueiro's avatar Diego Sueiro committed
      
      
      From the command line -D or --no_deploy_artifacts can be used to
      override the deploy_artifacts setting from config files.
      
      Issue-Id: SCM-3900
      Signed-off-by: Joel Goddard's avatarJoel Goddard <joel.goddard@arm.com>
      Change-Id: I26f697dbc192f4b000cb92f3f8ad5659cf6349d2
      382fb4e9
    • Joel Goddard's avatar
      tools/kas-runner: Refactor to allow config file validation · 0e7435ee
      Joel Goddard authored and Diego Sueiro's avatar Diego Sueiro committed
      
      
      Added classes to manage settings that can be set from both
      command line arguments and config files. Each setting is
      only defined once. Default config has been merged with new
      settings classes so settings are defined in one place.
      
      Settings can have optional resolve functions for extra
      processing and validation. Internal settings are excluded
      from command line and config files.
      
      ArgumentDictionary is replaced with RunnerSettings which
      provides helpers for validation and resolution of configs.
      Setting values are now accessed as variables on the
      RunnerSettomgs.
      
      Note: Arguments previously set with the format '%(arg)s'
      should now use '{arg}' instead.
      Note: Some logging has changed.
      
      Issue-Id: SCM-3900
      Signed-off-by: Joel Goddard's avatarJoel Goddard <joel.goddard@arm.com>
      Change-Id: Iec9f418ad776e801470467a7f3aa16e546212b13
      0e7435ee
    • Kamil Dzieżyk's avatar
      ewaol-[config,distro]: Introduce ewaol-security distro feaure · e3be2609
      Kamil Dzieżyk authored and Diego Sueiro's avatar Diego Sueiro committed
      
      
      The ewaol-security brings the followng EWAOL images customizations:
       - Force password update for each user account after first log in.
       - Appends 'security.scc' to kernel configuration.
       - Appends 'seccomp' to DISTRO_FEATURES.
       - Ensures all relevant packages are configured '--with-libcap[-ng]'
       - Removes ssh 'root' access and 'debug-tweaks' from IMAGE_FEATURES.
       - Appends 'allow-empty-password' to IMAGE_FEATURES, to allow password
         update on first login either over serial or ssh.
      
      Issue-Id: SCM-3905
      Signed-off-by: Kamil Dzieżyk's avatarKamil Dziezyk <kamil.dziezyk@arm.com>
      Change-Id: I940770da2d6aa444db2405ead420fed0d1e2dc6b
      e3be2609
    • Kamil Dzieżyk's avatar
      ewaol-distro: Add additional user accounts into EWAOL images · 11a84535
      Kamil Dzieżyk authored and Diego Sueiro's avatar Diego Sueiro committed
      
      
      This patch brings the following changes:
       * Adds following packages into all EWAOL images: 'sudo', 'bash'
         and 'bash-completion'.
       * Sets up two user accounts:
         - 'user' without administrative privileges,
         - 'ewaol' with administrative privileges via the 'sudo' group.
      
      Issue-Id: SCM-3905
      Signed-off-by: Kamil Dzieżyk's avatarKamil Dziezyk <kamil.dziezyk@arm.com>
      Change-Id: Icb0ad09ef34ea93a2627d433efd0699f9a00be51
      11a84535
    • Diego Sueiro's avatar
      doc: Update changelog with v0.2.4 entry · ee3120a6
      Diego Sueiro authored
      
      
      Issue-Id: SCM-3910
      Signed-off-by: Diego Sueiro's avatarDiego Sueiro <diego.sueiro@arm.com>
      Change-Id: I56c8089eb291563c9cef3054b562e0f339b3e0b5
      ee3120a6
    • Joel Goddard's avatar
      tools/kas-runner: Fix file path resolution · 30d9bdae
      Joel Goddard authored and Diego Sueiro's avatar Diego Sueiro committed
      
      
      The common directories containing all kas config files and the
      project root to run is added as a read only volume for the
      container. Kas file paths are modified to point to the mount path
      to pass to the container.
      
      This allows configs outside project root to be used without extra
      manual configuration and absolute paths to be used. Relative paths
      will still be considered relative to project root.
      
      Issue-Id: SCM-3900
      Signed-off-by: Joel Goddard's avatarJoel Goddard <joel.goddard@arm.com>
      Change-Id: I1a5aeebdb9b12e5ca4e3f1cdc6434fbaf4872c15
      30d9bdae
  3. Mar 08, 2022
  4. Mar 07, 2022
  5. Mar 01, 2022
  6. Feb 24, 2022
    • Kamil Dzieżyk's avatar
      ewaol-distro/ewaol-image-core: Use IMAGE_INSTALL setting from core-image bbclass · 66cfe9c5
      Kamil Dzieżyk authored and Richard Neill's avatar Richard Neill committed
      
      
      For ewaol-guest-vm image 'packagegroup-base-extended' is removed from
      IMAGE_INSTALL, to not include packages based on MACHINE_FEATURES.
      
      Issue-Id: SCM-3910
      Signed-off-by: Kamil Dzieżyk's avatarKamil Dziezyk <kamil.dziezyk@arm.com>
      Change-Id: Ie2e83b03c3ec6e4c08fbf53db99f2f5bffed88a8
      66cfe9c5
    • Richard Neill's avatar
      ewaol-tests,doc: Pass Guest VM hostname variable to test suite configuration · e3f61328
      Richard Neill authored
      
      
      Issue-Id: SCM-3893
      Signed-off-by: Richard Neill's avatarRichard Neill <richard.neill@arm.com>
      Change-Id: Iadec28f33cc613446bbb9786fc15c37c20a1fe9f
      e3f61328
    • Richard Neill's avatar
      doc: Documentation updates · 8187cdbc
      Richard Neill authored
      
      
      Primary updates included in this patch:
      
      * Consistently use passive voice in documentation
      * Remove K3s usage instructions, instead relying on upstream project
      * Update yoctoproject documentation version
      * Update EWAOL overview 'major features'
      
      Issue-Id: SCM-3893
      Signed-off-by: Richard Neill's avatarRichard Neill <richard.neill@arm.com>
      Change-Id: I327d87d2e346b98debd8d854462bfd549d6d3eae
      8187cdbc
    • Richard Neill's avatar
      ewaol-[distro,config],doc: Refactor EWAOL build targets and kas config files · 654a9876
      Richard Neill authored
      
      
      This patch refactors the naming scheme for EWAOL build targets, and creates the
      EWAOL Virtualization SDK image. The build targets are now as follows:
      
      Baremetal Images:
        * ewaol-baremetal-image
        * ewaol-baremetal-sdk-image
      
      Virtualization Images:
        * ewaol-virtualization-image
        * ewaol-virtualization-sdk-image
      
      In addition, this patch refactors the kas config files to more clearly define
      the process for building the different targets via kas. It is now necessary to
      supply kas with an architecture config file (e.g. baremetal.yml) and a machine
      config file (e.g. n1sdp.yml) for a valid build. To support this, the
      `ewaol-baremetal` DISTRO_FEATURE is introduced as a counterpart to the
      `ewaol-virtualization` DISTRO_FEATURE.
      
      Issue-Id: SCM-3839
      Signed-off-by: Richard Neill's avatarRichard Neill <richard.neill@arm.com>
      Change-Id: I66b27bd55c8762cc3a389e0150554c536855bab9
      654a9876
    • Richard Neill's avatar
      doc,ewaol-[bsp,config,distro,tests]: Update EWAOL nomenclature · 00c37832
      Richard Neill authored
      
      
      This patch updates and aligns the nomenclature used for EWAOL components
      throughout the repository.
      
      The main changes are:
      
      * Images are consistently referred to according to the target architecture
        (e.g., ewaol-baremetal-image, ewaol-virtualization-image).
      
      * The VMs running on an EWAOL virtualization image are consistently referred to
        Control VM and Guest VM, provided as Xen Dom0 and DomU respectively.
      
      Issue-Id: SCM-3893
      Signed-off-by: Richard Neill's avatarRichard Neill <richard.neill@arm.com>
      Change-Id: Iae24137d394f6dfed5da3090c7f76d6845439cc4
      00c37832
    • Richard Neill's avatar
      doc: Update EWAOL project overview · 54926315
      Richard Neill authored
      
      
      Issue-Id: SCM-3893
      Signed-off-by: Richard Neill's avatarRichard Neill <richard.neill@arm.com>
      Change-Id: I961a4177ebf98f13cd04358e6556c100bd11123b
      54926315
    • Kamil Dzieżyk's avatar
      ewaol-distro: Allow to include prebuilt VMs into the Host rootfs · 3a410dab
      Kamil Dzieżyk authored and Richard Neill's avatar Richard Neill committed
      
      
      This patch introduces a new recipe that packages prebuilt VMs into the EWAOL
      Host image. 'PREBUILT_VM_INSTANCES' variable defines how many VM instances
      will be included. Each prebuilt VM requires setting:
      
       (*) PREBUILT_VM*_CFG_SRC       # path to xl domain config file
       (*) PREBUILT_VM*_KERNEL_SRC    # path to kernel image
       (*) PREBUILT_VM*_DISK_SRC      # path to disk image
      
      Issue-Id: SCM-3898
      Signed-off-by: Kamil Dzieżyk's avatarKamil Dziezyk <kamil.dziezyk@arm.com>
      Change-Id: Iea143cd0337bc57a1503aad2c87649bbae195774
      3a410dab
    • Kamil Dzieżyk's avatar
      ewaol-[distro,config,tests]: Add support for multiple VMs deployment · 542a5b65
      Kamil Dzieżyk authored and Richard Neill's avatar Richard Neill committed
      
      
      This patch brings up support for multiple EWAOL VMs, based on the same image
      and kernel recipes. Each VM can have custom settings like rootfs extra space,
      memory size and number of cpus. Currently, each VM has a different hostname,
      based on its index: 'ewaol-vm1' for the first, 'ewaol-vm2' for the second, etc.
      
      Number of VM instances is defined by 'EWAOL_VM_INSTANCES',
      and is set to '1' by default.
      
      For each VM following paremeters can be set:
       (*) EWAOL_VM*_ROOTFS_EXTRA_SPACE
       (*) EWAOL_VM*_MEMORY_SIZE
       (*) EWAOL_VM*_NUMBER_OF_CPUS
      
      This patch also updates the default "*_TEST_GUEST_NAME" variables used by the
      EWAOL runtime integration tests to 'ewaol-vm1'.
      
      Issue-Id: SCM-3898
      Signed-off-by: Kamil Dzieżyk's avatarKamil Dziezyk <kamil.dziezyk@arm.com>
      Change-Id: Ib11e6edb7596b7ff75c930ef48fd15ba6cdfdc77
      542a5b65
  7. Feb 04, 2022
  8. Feb 03, 2022
Loading