From patchwork Fri May 17 15:12:34 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jan Kiszka X-Patchwork-Id: 13667145 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D4786C04FFE for ; Fri, 17 May 2024 15:12:45 +0000 (UTC) Received: from EUR04-VI1-obe.outbound.protection.outlook.com (EUR04-VI1-obe.outbound.protection.outlook.com [40.107.8.51]) by mx.groups.io with SMTP id smtpd.web10.42562.1715958760401302251 for ; Fri, 17 May 2024 08:12:41 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@siemens.com header.s=selector2 header.b=UaqMnbHb; spf=pass (domain: siemens.com, ip: 40.107.8.51, mailfrom: jan.kiszka@siemens.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kTBRHjasnnBmpyFUpVd/06P2TNQL0YSTWdLoGBUBaRCSsjAnI4exSRzfKGe3nSXZztMRVuh4OrmQa7SLTkxtuqFZU/63XqM+3U0Es6EhTAAsnHnXdvcVXIEWgUSgW/Dqq9/njd/fUA6SftD79OUj3G9mdmQu0ofvamgG6yQF2eDw5HrBQ2dW+terhxrGItTbm5BZPmM++o2Fz6ssVoPUZuwPnsnRzqlKCw56L+DicZgZJO87v845UQtOBatutoG517x8PdJGERlDWGsl1NuKtnRHUFRX4K6xh83Y3AlK6RXswT0SxTTqir8Hn7OBMyqYe6BaEoecIrO7QZ9zrwAdvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8U0NZRvtlDsh+Y+RerQt56q6TgMuoyS2O3f8kfJ4QTM=; b=YL1MnMTYZO8JfzKrOX6tzFqlJ34gOESe5qCENZBa1Jn5gyFEiup/kGvTQ+VdCGFyXX0fN7bfqzpSxNmY/D8aGZnxGBfD2I3CTm0GCjMMC/qlMXJDx3fxGL2s2kynkTzEUYwA4BgWshIeJZVXYhVVW19DTdSA76ijqGbIO4MbzRrZ75UNABiXeLE9z7R8PPt0jLHpEJ5O/QPHa9fM3FYq4wq9xeK2oxXP/7od0zM1QYpwnDMVU1JABVnf5E4oH8pim8wlwny51oDBjpnX+s0lVW6MbZtGCDkxOiPLShtNaY0gKMSLPt2xw86idqub2lK5T91M2wwR/vNGfIZpI6XaJw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8U0NZRvtlDsh+Y+RerQt56q6TgMuoyS2O3f8kfJ4QTM=; b=UaqMnbHbeTdoyOs4sisI1gnbYW4fyHYAzhVUpafft+FhAmRJDLcMapaHZNFm0x6TtUwfUPaidrrxpLSxM7bv9dHDB/51Ss/n8sfdL8wfxiMD1CeOeEK1nOunp/58edyz4Ojrpz7p0RkJIvFeSq89i0mFK/4k61gURfNj4xbaUW0zpU2oifR/0yYLONwcoSu5qNBVNtIgU97DP6rdzWY5DbcxBzEmNpxO26JBk/g8QB4GVVYzheZ7WY6JRs4JN6L06uWl+tjyr1Hw/Y5SfHWJ3R3sM950yudc1P+rF5PK2xuIFEPh2ZEPfv9tdxlJ8igijLdNMA0KDhgGhX8F2ONlsQ== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=siemens.com; Received: from AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:588::19) by DB9PR10MB5502.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:10:305::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7587.27; Fri, 17 May 2024 15:12:36 +0000 Received: from AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM ([fe80::8fe1:7e71:cf4a:7408]) by AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM ([fe80::8fe1:7e71:cf4a:7408%7]) with mapi id 15.20.7587.026; Fri, 17 May 2024 15:12:36 +0000 Message-ID: Date: Fri, 17 May 2024 17:12:34 +0200 User-Agent: Mozilla Thunderbird From: Jan Kiszka To: cip-dev Subject: [isar-cip-core][PATCH] Refactor tar.gz image option Content-Language: en-US Cc: Nobuhiro Iwamatsu , Chris Paterson , Quirin Gylstorff X-ClientProxiedBy: FR2P281CA0050.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:92::13) To AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:588::19) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS4PR10MB6181:EE_|DB9PR10MB5502:EE_ X-MS-Office365-Filtering-Correlation-Id: 2b420865-08fd-47e7-2210-08dc7683c8fd X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230031|366007|376005|1800799015; X-Microsoft-Antispam-Message-Info: =?utf-8?q?lifoACNY+Rmdk1PK+egfCLiAp8R+w3E?= =?utf-8?q?k/X290NGPZDv50x5BVCKHXsbWv8Cox+TrodV9u02XEZyTxQYfFerkDSd9X+0KoO1J?= =?utf-8?q?BfVNr+N+agiYqWgZqLlxu5inZ6b32hOu0bJxyShjTIs1xxH/HRpsGrZo6LaRVtEvg?= =?utf-8?q?f9hYbEgAM2W45xRaf+MSX/ODnfNnKNMiAuO0eHSsO1lGbvmM1uRiszeQT1zanTktu?= =?utf-8?q?L6/J8WoozsPz0Y5k8CZ2x944Y02xz/jueV4XBC6SqYjVOpzrY6H6TDkZZZ0n6uSAP?= =?utf-8?q?m98Ycm82X48Q4YT5VurVMBYQEMwdQrLchfCncFeKhAilNC8sjPvF3G2fquoGC9bHf?= =?utf-8?q?IqfiA9pEQbZe8PLCuIo0MpX6EldHDaaMXkefZay0SqgWnF8RL6Hh3oXb4KSkClFH9?= =?utf-8?q?4brwd43RLeLr0vLUdYwd/gufEWsNSbjDeGzXF3m6IW2yiWCWEXkrVPjGzGZmfkzqs?= =?utf-8?q?M9yCMGNdUyOYFTotlR1hIYa885qBK9FkmfLXCw8PXVHOXa3g0oGd+4SJUI9Ef3Z2M?= =?utf-8?q?xbu201fQlcHTsmGGuD+mIhkQ5ndw5Zuy0Mzwzqp50mpEHaoOuhFN4tizHEJsw8yL7?= =?utf-8?q?/fJez70LVFk81YLrD0ICWmDjqF1gwS7hjl7tf7uvw1TC0cMoVG1DpTH2X96TqQL8C?= =?utf-8?q?g2Fved3s2rkK1ILe+l2NdrRZbllA+WpBvoQ/7BeIIEiai+vp1mPUd/WJ7jtR+XRZq?= =?utf-8?q?VisNh/d9uU1vGWnD0Jzg18VD1DBQdCGZMR1pj6kXkFoDX/DSyUjofM610GD7ltI53?= =?utf-8?q?8quv0DXf2A/fW2KF6XoDvToKYXpb0cJKrK/6VuDBLhfqsKYoWZ9wRw5P7vS1dSeRM?= =?utf-8?q?hu4aXlegkYmT5un+AdflU4XJlBEBEQUOK1D9qRy83bCvbOZrNBHiv8PGA/Ib36Ig7?= =?utf-8?q?AtCADsLukEFvRzkax47/fO6Yalav4j1vGaD2BvoCSq7qFgHSlwLXiFOBG5jrLbP6b?= =?utf-8?q?3sWiVoeflYV/N6LckgayHDAsE46kecUH1gOPSjnKszmu3XWcfy+NF6UdG+YFP28Se?= =?utf-8?q?FKwbVr6+z0fmHpu3vREZlSLimD78fRCVGW1eYdYvCqCX+zyTxQKs1+Y4rvhMdwvUJ?= =?utf-8?q?37OXt6I4X4Htd7nNq9KMBZrZbDyZl9G0nW6PCruCprOis9ENDy9p1XbLTGvDMlr68?= =?utf-8?q?dr04B8FjDGkvQaXrf43l+g1FjR3cxjZiSgrXbmeskLuU7OE6KEjhJe63A2POemhMr?= =?utf-8?q?NQr/LZUvALjUxtSWX85tqjQqDmRMjyz46oBQ=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230031)(366007)(376005)(1800799015);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?UISHUxEe0r/FyqLxuRIOWic5LM5m?= =?utf-8?q?yWUq6JH4Jop2fp+8xLeQJpEGpPgrp05Ei0cLPq6B+m2AxYeLLWmaX4ftDj5DoIqFQ?= =?utf-8?q?w5VipTa94Ug9WepanILMGq+lGXGCUQ0qCzIvNxHs4l7DPr1PLsGU2KlX63URAqJCF?= =?utf-8?q?yb8s2trP3HqOG8sR8V0eD0w87MkFLxzNC+thY9FBWPiJppiltm/Ij1YfT0Is2f6Et?= =?utf-8?q?3s1fmUa4PuqYF2v+yyeu1AhQVWmUQ+f1/Jnguf/IHn6XbIjGxVlZEouQUQOAKTF69?= =?utf-8?q?fqHi5pA4oJycfSU0XN41zur4orILVlsr8w+lH4ROz1myAvXaczB9bYbhmkS3qQKMh?= =?utf-8?q?Fa7QnpsWnOLtXH1cAh5R7PASEwmUGlS0cy9NxM+kZAfWKv6x3WVy73gHAqxiaIarM?= =?utf-8?q?v99b6GXdxYbJV2GicDPwMZ8wHYnT5WhteJ1QwihKSj9GzmRHhHK9PgAymYpmcRYnF?= =?utf-8?q?QFzXzkzZ7lxB+bD9VXDRTIoP1qOovauo9K+yaCr+BqnGSDqJGeDablX2nxKKPA2y5?= =?utf-8?q?p+gaCh4bGa8YaN5wtKSF4wC/q0cuojaVJdzhYBff7938srLnO8WQWkaxVNsLucChn?= =?utf-8?q?lLeaYvI1tY7jbbJYMqFBCZGgVLS2XSv0oVUIbD5AUhsMrRdHVvuFqMzFG7URZa2eb?= =?utf-8?q?XyQMra7y9cwsW/GwCIyij5eVTSo8v2M2P2/gtq0BBwgowiS8i4Tg5iPqZrQy/nBiS?= =?utf-8?q?JpM/f0GhWVSIt0pfCscXM9HywrU5zODaJd4rZIYg9tUfAlkVX5FKxHvxLeWXmRuv2?= =?utf-8?q?n7zvYKeCdNbHTJTC5j0Tc0t21tydhv0feGgNSEYlNAuXapug6JZrulRemT1TSTGop?= =?utf-8?q?J0FQKigk/lQnZxJ8tCaNfj7sTUgg8MOtmsdOD6kN9dPNun10Tqp5/wzgPwgSglqvC?= =?utf-8?q?veudq/qpM65MdN8yvawnaK8hqibwW7nKGnhPNOZhYu2iIBaRFabzLIX/qMQNZ4i5a?= =?utf-8?q?3jCDNLZQPXYqNEb/mh8WeCSvXgXJ78I05fvs3l0xWTfJwpembr/GcuRUxrUvi/HB+?= =?utf-8?q?RQjomcPZW+VIWAljLFkzt50FVgwPfd6/8Tpc+qGpnQQNheHip9hUX4a1PQJrRQU5o?= =?utf-8?q?yfMCT5o6SknxsXw3Laor6Pur4dta6qLGsKEnGGa+mVd6prg6O/xtUDzbGCDuhSs5D?= =?utf-8?q?vlNuw2SjEjSg1z8lv/t5TWkt9AYKzLeMFFyLtzxxZGPzB3wZVgEX4CJYV1Z85X3lC?= =?utf-8?q?CCwwTbhccnwRpozGkcFnE0huZ1SNpLrgnh4DndbvZJeVYksqB9xFVcqUdLT6f0eZK?= =?utf-8?q?DaonD+fiQi8jSk3rVr8chTOSFnqHzTLlPSg4enOkt8nhx7ayqJRK+zKC4B3WqvtIT?= =?utf-8?q?4r02AnT3CLf4AFXAsoFZLMAGIBo+PSKx+ArLjsnR/tZ7ozUDxAuJx6A/NI2KFojPp?= =?utf-8?q?wcxtnwuQ0czUSbAqP/yRijkpJLyFt3OLmKIDjcEvS19HXN//v0ZEsgjwwbFA4m2TT?= =?utf-8?q?u+Jw3Zu+GFvCT+Xa5hFsEpwEHCpvgOqjzujyjvIq0OiLPFdpEUBLoiWqxn5N+Zsjp?= =?utf-8?q?9rXoirH8ws3T/7qI5ABl5WF4hw8YwZzwiQ=3D=3D?= X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2b420865-08fd-47e7-2210-08dc7683c8fd X-MS-Exchange-CrossTenant-AuthSource: AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 May 2024 15:12:36.5470 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: H+Ej8D6AhSsmWF1QuZvJRXhBcpEoEr93hwRieQP+FWnAAWWaXfUq1O1mDtwqYFdNx1pNAIAVUdUemabp+mz49A== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR10MB5502 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 May 2024 15:12:45 -0000 X-Groupsio-URL: https://lists.cip-project.org/g/cip-dev/message/15911 From: Jan Kiszka We have wic-targz.img, we have targz-img - that'c confusion. What we need is a way to say "generate (also) tarball of the image" so that we can feed LAVA specifically. If the normal target image is wic or already a raw partition (simple QEMU targets) should not matter. So, consolidate the kas options and the kconfig menu. Furthermore, simplify the CI options so that tarballs are by default on and turn it off actively in case that format has no user or cannot work in the first place. Signed-off-by: Jan Kiszka --- Please double-check that we aren't missing relevant artifacts for testing now. CI passes, means that something to deploy was found when we requested to deploy. .gitlab-ci.yml | 40 +++++++--------------------- Kconfig | 14 ++-------- kas/opt/{targz-img.yml => targz.yml} | 4 +-- kas/opt/wic-targz-img.yml | 20 -------------- 4 files changed, 14 insertions(+), 64 deletions(-) rename kas/opt/{targz-img.yml => targz.yml} (71%) delete mode 100644 kas/opt/wic-targz-img.yml diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml index 72084f33..b4291d0d 100644 --- a/.gitlab-ci.yml +++ b/.gitlab-ci.yml @@ -20,8 +20,7 @@ variables: extension: none use_rt: enable encrypt: disable - wic_targz: enable - targz: disable + targz: enable dtb: none deploy: enable deploy_kernelci: disable @@ -58,8 +57,7 @@ default: script: - if [ "${use_rt}" = "enable" ]; then base_yaml="${base_yaml}:kas/opt/rt.yml"; fi - if [ "${extension}" != "none" ]; then base_yaml="${base_yaml}:kas/opt/${extension}.yml"; fi - - if [ "${wic_targz}" = "enable" ]; then base_yaml="${base_yaml}:kas/opt/wic-targz-img.yml"; fi - - if [ "${targz}" = "enable" ]; then base_yaml="${base_yaml}:kas/opt/targz-img.yml"; fi + - if [ "${targz}" = "enable" ]; then base_yaml="${base_yaml}:kas/opt/targz.yml"; fi - if [ "${release}" = "buster" ]; then base_yaml="${base_yaml}:kas/opt/buster.yml"; fi - if [ "${release}" = "bullseye" ]; then base_yaml="${base_yaml}:kas/opt/bullseye.yml"; fi - if [ "${release}" = "bookworm" ]; then base_yaml="${base_yaml}:kas/opt/bookworm.yml"; fi @@ -111,8 +109,6 @@ build:qemu-amd64-base: target: qemu-amd64 extension: security use_rt: disable - wic_targz: disable - targz: enable build_swu_v2: enable build:qemu-amd64-base-kernelci: @@ -122,8 +118,6 @@ build:qemu-amd64-base-kernelci: target: qemu-amd64 extension: kernelci use_rt: disable - wic_targz: disable - targz: enable deploy: disable deploy_kernelci: enable @@ -134,8 +128,6 @@ build:qemu-arm64-base: target: qemu-arm64 extension: security use_rt: disable - wic_targz: disable - targz: enable build_swu_v2: enable build:qemu-arm64-base-kernelci: @@ -145,8 +137,6 @@ build:qemu-arm64-base-kernelci: target: qemu-arm64 extension: kernelci use_rt: disable - wic_targz: disable - targz: enable deploy: disable deploy_kernelci: enable @@ -157,8 +147,6 @@ build:qemu-arm-base: target: qemu-arm extension: security use_rt: disable - wic_targz: disable - targz: enable build_swu_v2: enable build:qemu-arm-base-kernelci: @@ -168,8 +156,6 @@ build:qemu-arm-base-kernelci: target: qemu-arm extension: kernelci use_rt: disable - wic_targz: disable - targz: enable deploy: disable deploy_kernelci: enable @@ -211,8 +197,6 @@ build:qemu-amd64-test: variables: target: qemu-amd64 extension: test - wic_targz: disable - targz: enable build:qemu-arm64-test: extends: @@ -220,8 +204,6 @@ build:qemu-arm64-test: variables: target: qemu-arm64 extension: test - wic_targz: disable - targz: enable build:qemu-arm-test: extends: @@ -229,8 +211,6 @@ build:qemu-arm-test: variables: target: qemu-arm extension: test - wic_targz: disable - targz: enable # secure boot images build:qemu-amd64-secure-boot: @@ -240,7 +220,7 @@ build:qemu-amd64-secure-boot: target: qemu-amd64 extension: ebg-secure-boot-snakeoil use_rt: disable - wic_targz: disable + targz: disable deploy: disable build:qemu-amd64-secure-boot-encrypt: @@ -250,7 +230,7 @@ build:qemu-amd64-secure-boot-encrypt: target: qemu-amd64 extension: ebg-secure-boot-snakeoil use_rt: disable - wic_targz: disable + targz: disable deploy: disable encrypt: enable @@ -261,7 +241,7 @@ build:qemu-amd64-swupdate: target: qemu-amd64 extension: ebg-swu use_rt: disable - wic_targz: disable + targz: disable deploy: disable # secure boot images arm64 @@ -272,7 +252,7 @@ build:qemu-arm64-secure-boot: target: qemu-arm64 extension: ebg-secure-boot-snakeoil use_rt: disable - wic_targz: disable + targz: disable deploy: disable # secure boot images arm @@ -283,7 +263,7 @@ build:qemu-arm-secure-boot: target: qemu-arm extension: ebg-secure-boot-snakeoil use_rt: disable - wic_targz: disable + targz: disable deploy: disable # bullseye images @@ -312,7 +292,7 @@ build:qemu-amd64-secure-boot-bullseye: target: qemu-amd64 extension: ebg-secure-boot-snakeoil use_rt: disable - wic_targz: disable + targz: disable deploy: disable swupdate_version: "2022.12" @@ -342,7 +322,7 @@ build:qemu-amd64-secure-boot-buster: target: qemu-amd64 extension: ebg-secure-boot-snakeoil use_rt: disable - wic_targz: disable + targz: disable deploy: disable encrypt: enable @@ -354,7 +334,7 @@ build:qemu-riscv64: target: qemu-riscv64 release: sid use_rt: disable - wic_targz: disable + targz: disable deploy: disable cve-checks: diff --git a/Kconfig b/Kconfig index 600e568a..e88cb5fe 100644 --- a/Kconfig +++ b/Kconfig @@ -151,22 +151,12 @@ config KAS_INCLUDE_DEBIAN comment "Image features" -choice - prompt "Image formats" - default IMAGE_FLASH - -config IMAGE_FLASH - bool "Flashable image" - config IMAGE_ARTIFACTS bool "Separate artifacts for NFS boot" -endchoice - -config KAS_INCLUDE_IMAGE_FORMAT +config KAS_INCLUDE_TAR_FORMAT string - default "kas/opt/targz-img.yml" if IMAGE_ARTIFACTS && (TARGET_QEMU_AMD64 || TARGET_QEMU_ARM64 || TARGET_QEMU_ARM) - default "kas/opt/wic-targz-img.yml" if IMAGE_ARTIFACTS && !(TARGET_QEMU_AMD64 || TARGET_QEMU_ARM64 || TARGET_QEMU_ARM) + default "kas/opt/targz.yml" if IMAGE_ARTIFACTS config IMAGE_SECURITY bool "Security extensions" diff --git a/kas/opt/targz-img.yml b/kas/opt/targz.yml similarity index 71% rename from kas/opt/targz-img.yml rename to kas/opt/targz.yml index fd8303e4..5c0b87bf 100644 --- a/kas/opt/targz-img.yml +++ b/kas/opt/targz.yml @@ -1,7 +1,7 @@ # # CIP Core, generic profile # -# Copyright (c) Siemens AG, 2019 +# Copyright (c) Siemens AG, 2019-2024 # # Authors: # Quirin Gylstorff @@ -14,4 +14,4 @@ header: local_conf_header: image-type: | - IMAGE_FSTYPES = "tar.gz" + IMAGE_FSTYPES:append = " tar.gz" diff --git a/kas/opt/wic-targz-img.yml b/kas/opt/wic-targz-img.yml deleted file mode 100644 index 74053f52..00000000 --- a/kas/opt/wic-targz-img.yml +++ /dev/null @@ -1,20 +0,0 @@ -# -# CIP Core, generic profile -# -# Copyright (c) Siemens AG, 2019 -# -# Authors: -# Quirin Gylstorff -# -# SPDX-License-Identifier: MIT -# - -header: - version: 14 - -# lava uses nfs to deploy the image. For this we need a tarball instead of -# full image - -local_conf_header: - image-type: | - IMAGE_FSTYPES = "wic tar.gz"