diff --git a/doc/source/deploy_install_guides/release/openstack/install.rst b/doc/source/deploy_install_guides/release/openstack/install.rst index 88546bb16..ef374e8bf 100644 --- a/doc/source/deploy_install_guides/release/openstack/install.rst +++ b/doc/source/deploy_install_guides/release/openstack/install.rst @@ -41,7 +41,7 @@ Install application manifest and helm-charts #. Get the latest StarlingX OpenStack application (|prefix|-openstack) manifest and helm charts. Use one of the following options: - * Private StarlingX build. See :ref:`Build-stx-openstack-app` for details. + * Public download from the `StarlingX mirror `_. diff --git a/doc/source/developer_resources/build_guide.rst b/doc/source/developer_resources/build_guide.rst index 48bb3b389..3645097dc 100644 --- a/doc/source/developer_resources/build_guide.rst +++ b/doc/source/developer_resources/build_guide.rst @@ -9,7 +9,7 @@ R3.0 and earlier release. :local: :depth: 1 -.. _Requirements: +.. _requirements: ------------ Requirements @@ -40,931 +40,561 @@ A workstation computer with: for more details) * Public SSH key -.. _Development-environment-setup: +.. _starlingx_build_tools: ------------------------------ -Development environment setup ------------------------------ +--------------------- +StarlingX Build Tools +--------------------- -This section describes how to set up a StarlingX development system on a -workstation computer. After completing these steps, you can build a StarlingX -ISO image on the following Linux distribution: +The Debian build is completed using a set of containers designed to run in a Kubernetes environment. -* Ubuntu 16.04 LTS 64-bit +To facilitate this we are currently making use of Minikube and Helm, later on we will provide versions +of the Helm Charts to allow for running builds directly on Kubernetes or StarlingX. + +There are five containers required to complete a build: + +* stx-builder: main developer build container +* stx-pkgbuilder: Debian package builder (uses sbuild) +* stx-repomgr: Debian local repository archive (uses aptly) +* stx-lat-tool: ISO image builder +* stx-docker: Docker in Docker (build Docker images) + +At a high level the StarlingX ISO image creation flow involves the following general steps (assuming you have +already configured Docker on your system): + +#. Install Minikube and Helm. +#. Build or download the StarlingX k8s development environment. +#. Enter the stx-builder pod/container to triger the building task. +#. Build packages/ISO creation. + +.. note:: + + The build system requires a Linux system with Docker and python 3.x installed. Building on Windows + is not supported -- please use a Virtual Machine if necessary. The steps on this page have been tested + on CentOS 7 and Ubuntu Focal. + +.. _register_on_docker_hub: + +---------------------- +Register on Docker Hub +---------------------- + +The build environment relies on the Docker Hub registry for storing container images used during the build. +Docker Hub puts `limits on the amount of data that can be downloaded `__ +by the same user/IP address. To avoid this limit, we recommend to register an account on Docker Hub and log in to +docker prior to initializing your StarlingX development environment. Note the user ID and password as we will supply +them to the ``stx-init-env`` script below. + + +.. _configure_build_environment: + +--------------------------- +Configure build environment +--------------------------- + +We need to create and start the build containers, which requires some additional configuration described below. + +************** +Install Docker +************** + +Follow these instructions: https://docs.docker.com/engine/install/ubuntu/ + +.. warning:: + + Do not install or use Docker with `Snap packages `__. Your machine + may come with a docker snap package pre-installed (Ubuntu?), please remove the snap package and install a native + package instead, using the above link. Reason: minikube (see below) doesn't work correctly within docker that + runs in a snap sandbox/container. + +************************* +Install Minikube and Helm +************************* + +Install Minikube to support the local k8s framework for building. Install Helm tools to manage the Helm Charts +required to start/stop/upgrade the pods or the deployments for the StarlingX Building system. Before installing +these components please make sure that Docker is available in your environment. + +Install minikube (https://minikube.sigs.k8s.io/docs/start/): + +:: + + curl -LO https://storage.googleapis.com/minikube/releases/latest/minikube-linux-amd64 + sudo install minikube-linux-amd64 /usr/local/bin/minikube + +.. note:: + + As of this writing minikube v 1.22.0 is current. + +.. note:: + + Minikube requires at least 2 CPU cores. + +Alternatively, we can also use a third-party Minikube binary: + +:: + + curl -LO http://kubernetes.oss-cn-hangzhou.aliyuncs.com/minikube/releases/v1.20.0/minikube-linux-amd64 + sudo install minikube-linux-amd64 /usr/local/bin/minikube + +Install Helm -- you can select the version listed here or the latest released version: + +:: + + curl -LO https://get.helm.sh/helm-v3.6.2-linux-amd64.tar.gz + tar xvf helm-v3.6.2-linux-amd64.tar.gz + sudo mv linux-amd64/helm /usr/local/bin/ + +Add your user account to docker group: + +:: + + sudo usermod -aG docker $(id -un) && newgrp docker + +************ +Install repo +************ + +:: + + https://gerrit.googlesource.com/git-repo/ **************************** -Update your operating system +Export environment variables **************************** -Before proceeding with the build, ensure your Ubuntu distribution is up to date. -You first need to update the local database list of available packages: +These variables should be set every time you start the env. A good practice is to +save them in a text file and then source the file. For more details about the STX environment +variables `click here `__. + + +:: + + export PROJECT="stx-env" + export USER_NAME="Firstname Lastname" + export USER_EMAIL="your@email.org" + + # STX_BUILD_HOME should be set to a directory owned by your userid + # the build home needs to have at least 200Gb of free space to build all packages and iso + export STX_BUILD_HOME="/home/${USER}/${PROJECT}" + export REPO_ROOT="${STX_BUILD_HOME}"/repo + export REPO_ROOT_SUBDIR="localdisk/designer/${USER}/${PROJECT}" + + # MINIKUBE + export STX_PLATFORM="minikube" + export MINIKUBENAME="minikube-${USER}" + + ############################################# + # Manifest/Repo Options: + ############################################# + # STX MASTER + export MANIFEST_URL="https://opendev.org/starlingx/manifest.git" + export MANIFEST_BRANCH="master" + export MANIFEST="default.xml" + +****************** +Create directories +****************** + +Create the ``$STX_BUILD_HOME`` directory, you may need sudo privileges if using /build + +:: + + e.g: + sudo mkdir -p /build/${USER} + sudo chown ${USER}: /build/${USER} + +:: + + mkdir -p $STX_BUILD_HOME + cd $STX_BUILD_HOME + +*************** +Initialize repo +*************** + +:: + + # create REPO_ROOT_SUBDIR and symlink + # symlink is a helper as minikube mounts the stx_build_home as its workspace + # so it works as a shortcut to access the repos + mkdir -p $REPO_ROOT_SUBDIR + ln -s $REPO_ROOT_SUBDIR $REPO_ROOT + + cd $REPO_ROOT + # download and sync the repos + repo init -u ${MANIFEST_URL} -b ${MANIFEST_BRANCH} -m ${MANIFEST} + repo sync + +****************** +Init and setup STX +****************** + +The build tools comes with a script, import-stx, which sets up your PATH and other +environment as necessary. This script must be sourced before attempting to use any tools. + +There's a number of environment variables you can set prior to sourcing this file, please +feel free to review the script and import-stx.README for a full list. + +.. warning:: + + Minikube can't work if your $HOME directory points to an NFS location, we need to point + it to some other local file system by defining $MINIKUBE_HOME in the environment before + sourcing import-stx. + +.. warning:: + + If these variables are misconfigured, the env won't be able to run commands such as + downloader and build-pkgs + +The build expects a configuration file, ``stx.conf`` (`example `__) +to exist at the root of the build tools working directory. It is a key/value file containing +various build options. The ``stx config`` command may be used to add/modify entries in the file. + +:: + + # Init stx tool + cd stx-tools + source import-stx + + # Update stx config + # Align the builder container to use your user/UID + stx config --add builder.myuname $(id -un) + stx config --add builder.uid $(id -u) + + # Embedded in ~/localrc of the build container + stx config --add project.gituser ${USER} + stx config --add project.gitemail ${USER_EMAIL} + + # This will be included in the name of your build container and the basename for $MY_REPO_ROOT_DIR + stx config --add project.name ${PROJECT} + + stx config --show + # Show usage information + stx config --help + +***************************** +Start/Create build containers +***************************** + +The ``stx-init-env`` script will download or re-create build (docker) containers, and start them: + +:: + + cd repo/stx-tools + # Type in DockerHub username & password if prompted + ./stx-init-env --dockerhub-login + # Monitor the status until they are running: + stx control status + # You should see 5 containers on Running state + +Once docker images are available locally, you can start & stop them using the ``stx`` tool: + +:: + + stx control start # start builder PODs if not running + stx control status # display POD status + stx control stop # stop PODs + stx control is-started # check if Helm release is installed + + +.. warning:: + + Any changes to ``stx.conf`` or (``stx config add`` etc) requires that the PODs are re-started. + If you want to make changes to the environment in the build container, use ``stx control stop``, + then ``stx config`` to adjust the variables, and re-start the containers. + + :: + + stx control stop + stx config add <...> + stx control start + +The script pulls build containers from DockerHub by default, where a new version is +built once per day (ie default container images may be slightly out of date when you +pull them). You can force a local re-build as follows: + +:: + + stx control stop + cd repo/stx-tools + ./stx-init-env --dockerhub-login --rebuild + +.. _entering_and_controlling_pods: + +--------------------------- +Entering & controlling Pods +--------------------------- + +Once the containers are running, one can enter them (think ``docker exec <...> /bin/bash``). +While there are 5 containers, most build tasks are driven from the "builder" container, +which is the default when using the ``stx`` tool: + +:: + + # enter the "builder" container + stx shell + +You can enter other containers as follows + +:: + + stx shell --container [builder|pkgbuilder|lat|repomgr|docker] + +Use ``exit`` command to exit from the node to host environment. + +You can use the ``stx control`` command to start/stop & monitor builder POD status: + +:: + + # control the Pods + stx control start + stx control stop + stx control status + + # more info + stx control --help + +The ``status`` command will include Helm status, including deployments and the pods. +You can use that information to manually enter or troubleshoot PODs using munikube or kubectl. + +********************************* +Every time you start/restart Pods +********************************* + +Every time you start/restart Pods, execute these mandatory steps inside the builder: :: sudo apt-get update + git config --global user.name "Firstname Lastname" + git config --global user.email "Your email" -****************************************** -Installation requirements and dependencies -****************************************** +.. note:: -#. Set up . + You may see the following errors from apt. You can ignore this and continue. - Make sure you are a non-root user with sudo privileges enabled when you build - the StarlingX ISO. + :: - Use either your existing user or create a separate **: + E: Failed to fetch http://stx-stx-repomgr:80/deb-local-source/dists/bullseye/main/source/Sources 404 Not Found [IP: 10.102.135.193 80] + E: Some index files failed to download. They have been ignored, or old ones used instead. - :: +.. _build_packages_iso_creation: - sudo useradd -s /bin/bash -d /home/ -m -G sudo - sudo passwd - sudo su - +--------------------------- +Build packages/ISO creation +--------------------------- +The builder is the container where you will perform most of the actions, +such as launching the task of building packages and images. -#. Set up Git. - - Install the required Git packages on the Ubuntu host system: - - :: - - sudo apt-get install make git curl - - Set up your identity in git using your actual name and email address: - - :: - - git config --global user.name "Name LastName" - git config --global user.email "Email Address" - - -#. Install the required Docker CE packages in the Ubuntu host system. - - See - `Get Docker CE for Ubuntu `__ for more information. - - Make sure to log out and log in to add your ** to the Docker group: - - :: - - sudo usermod -aG docker - -#. Install the Android Repo Tool in the Ubuntu host system. - - Follow the steps in the - `Installing Repo `__ - section. - -********************** -Install public SSH key -********************** - -Follow these instructions on GitHub to -`Generate a Public SSH Key `__. -Then upload your public key to your GitHub and Gerrit account profiles: - -* `Upload to Github `__ - -* `Upload to Gerrit `__ - -********************* -Install tools project -********************* - -#. Under your $HOME directory, clone the project: - - :: - - cd $HOME - git clone https://opendev.org/starlingx/tools.git - - The command above fetches the tools project from the latest master. Use the - commands below to switch to the tools project for STX3.0 and STX2.0 respectively. - - :: - - git checkout remotes/origin/r/stx.3.0 - git checkout remotes/origin/r/stx.2.0 - -#. Navigate to the *<$HOME/tools>* project - directory: - - :: - - cd $HOME/tools/ - -.. _Prepare_the_base_Docker_image: - ------------------------------ -Prepare the base Docker image ------------------------------ - -StarlingX base Docker image handles all steps related to StarlingX ISO -creation. This section describes how to customize the base Docker image -building process. - -******************** -Configuration values -******************** - -You can customize values for the StarlingX base Docker image using a -text-based configuration file named ``localrc``: - -* ``HOST_PREFIX`` points to the directory that hosts the 'designer' - subdirectory for source code, the 'loadbuild' subdirectory for the build - environment, generated RPMs, and the ISO image. Best practices dictate - creating the workspace directory in your $HOME directory. -* ``HOST_MIRROR_DIR`` points to the directory that hosts the CentOS mirror - repository. - -^^^^^^^^^^^^^^^^^^^^^^^^^^ -localrc configuration file -^^^^^^^^^^^^^^^^^^^^^^^^^^ - -Create your ``localrc`` configuration file. Make sure to set the project and -the user name. For example: :: - # tbuilder localrc - MYUNAME= - PROJECT= - HOST_PREFIX=$HOME/starlingx/workspace - HOST_MIRROR_DIR=$HOME/starlingx/mirror + stx shell -*************************** -Build the base Docker image -*************************** +.. _refresh_the_source_tree: -Once the ``localrc`` configuration file has been customized, it is time -to build the base Docker image. +----------------------- +Refresh the source tree +----------------------- -#. If necessary, you might have to set http/https proxy in your - Dockerfile before building the docker image: - - :: - - ENV http_proxy " http://your.actual_http_proxy.com:your_port " - ENV https_proxy " https://your.actual_https_proxy.com:your_port " - ENV ftp_proxy " http://your.actual_ftp_proxy.com:your_port " - ENV no_proxy "127.0.0.1" - RUN echo " proxy=http://your-proxy.com:port " >> /etc/yum.conf - -#. The ``tb.sh`` script automates the base Docker image build: - - :: - - ./tb.sh create - ----------------------------------- -Build the CentOS mirror repository ----------------------------------- - -The creation of the StarlingX ISO relies on a repository of RPM binaries, -RPM sources, and tar compressed files. This section describes how to build -this CentOS mirror repository. - -.. _Run_building_Docker_container: - -***************************** -Run building Docker container -***************************** - -#. Navigate to the *$HOME/tools/* project - directory: - - :: - - cd $HOME/tools/ - -#. Verify environment variables: - - :: - - bash tb.sh env - -#. Run the building Docker container: - - :: - - bash tb.sh run - -#. Execute the building Docker container: - - :: - - bash tb.sh exec - -********************************* -Download source code repositories -********************************* - -#. Inside the building Docker container, start the internal environment: - - :: - - eval $(ssh-agent) - ssh-add - -#. Use the repo tool to create a local clone of the manifest - Git repository based on the "master" branch: - - :: - - cd $MY_REPO_ROOT_DIR - repo init -u https://opendev.org/starlingx/manifest -m default.xml - - - Optionally, specify a specific branch to clone, for example the R2.0 release - branch: - - :: - - cd $MY_REPO_ROOT_DIR - repo init -u https://opendev.org/starlingx/manifest -m default.xml -b r/stx.2.0 - -#. Synchronize the repository: - - :: - - repo sync -j`nproc` - -***************** -Download packages -***************** - -#. Inside the Docker container, enter the following commands to download - the required packages to populate the CentOS mirror repository: - - :: - - cd $MY_REPO_ROOT_DIR/stx-tools/centos-mirror-tools && bash download_mirror.sh - -#. Monitor the download of packages until it is complete. When the download - is complete, the following message appears: - - :: - - step #5: done successfully - sudo rm -rf /tmp/stx_mirror_vyPozw - IMPORTANT: The following 3 files are just bootstrap versions. Based on them, the workable images - for StarlingX could be generated by running "update-pxe-network-installer" command after "build-iso" - - ./output/stx/CentOS/Binary/LiveOS/squashfs.img - - ./output/stx/CentOS/Binary/images/pxeboot/initrd.img - - ./output/stx/CentOS/Binary/images/pxeboot/vmlinuz totally 17 files are downloaded! - -*************** -Verify packages -*************** - -#. Verify no missing or failed packages exist: - - :: - - cat logs/*_missing_*.log - cat logs/*_failmoved_*.log - -#. In case missing or failed packages do exist, which is usually caused by - network instability (or timeout), you need to download the packages - manually. - Doing so assures you get all RPMs listed in - *rpms_3rdparties.lst*/*rpms_centos.lst*/*rpms_centos3rdparties.lst*. - -****************** -Packages structure -****************** - -The following is a general overview of the packages structure resulting from -downloading the packages: +The StarlingX source tree consists of multiple git repositories. The tool ``repo`` +is used to sync these repositories, if required you can sync the repos from inside the builder: :: - /localdisk/designer///stx-tools/centos-mirror-tools/output - . - └── stx - └── CentOS - ├── Binary - │   ├── EFI - │   │   └── BOOT - │   │   └── fonts - │   ├── images - │   │   └── pxeboot - │   ├── isolinux - │   ├── LiveOS - │   ├── noarch - │   └── x86_64 - ├── downloads - │   ├── integrity - │   │   ├── evm - │   │   └── ima - │   └── puppet - │   └── packstack - │   └── puppet - │   └── modules - └── Source + cd $MY_REPO_ROOT_DIR + repo sync -******************************* -Copy CentOS mirror repository -******************************* +After the ``repo sync`` is done, check the below directory: -Exit from the building Docker container. Run the following commands: +:: -#. Change the mirror folder owner to the current user and create CentOS folder - using the commands below: + ls $MY_REPO + ls $MY_REPO/stx + ls $MY_REPO_ROOT_DIR/stx-tools - :: +Before running ``build-pkgs``: - sudo chown $USER: $HOME/starlingx/mirror - mkdir -p $HOME/starlingx/mirror/CentOS/ - chmod -R ug+w $HOME/starlingx/mirror +Run below command to download the sources of all buildable packages by scanning +the repo root ``$MY_REPO/stx`` the download directory is: ``$STX_MIRROR`` -#. Copy the built CentOS mirror repository *$HOME/starlingx/mirror/* - workspace directory: +:: - :: + downloader -s -B std,rt - cp -r $HOME/starlingx/workspace/localdisk/designer///stx-tools/centos-mirror-tools/output/stx $HOME/starlingx/mirror/CentOS/ +All the below lists with build types will be scanned in the repo root ``$MY_REPO/stx``: -.. _create_stx_pkgs: +* debian_pkg_dirs +* debian_pkg_dirs_rt +* debian_pkg_dirs_installer -------------------------- -Create StarlingX packages -------------------------- +********************************** +Download 3rd-party tar & deb files +********************************** -#. Login to the container using the command below: +Run below command to download the debian binary packages (distribution: bullseye) +into directory ``$STX_MIRROR/binaries``: - :: +:: - cd $HOME/tools/ - ./tb.sh exec + downloader -b -B std,rt -#. Create a tarballs repository: +All the below lists of binary packages will be downloaded: - :: +:: - ln -s /import/mirrors/CentOS/stx/CentOS/downloads/ $MY_REPO/stx/ + $MY_REPO_ROOT_DIR/stx-tools/debian-mirror-tools/config/debian/common/base-bullseye.lst + $MY_REPO_ROOT_DIR/stx-tools/debian-mirror-tools/config/debian//os-std.lst + $MY_REPO_ROOT_DIR/stx-tools/debian-mirror-tools/config/debian//os-rt.lst - Alternatively, you can run the "populate_downloads.sh" script to copy - the tarballs instead of using a symlink: +You can also run below command to download both sources and binaries: - :: +:: - populate_downloads.sh /import/mirrors/CentOS/stx/CentOS/ + downloader -B std,rt - Outside the container + # To check all options: + downloader --help -#. Exit from the container. On the host machine, create mirror binaries: +Currently, the apt sources used to download packages are in the '/etc/apt/sources.list' +file in the builder container. - :: +*************************************** +Verify that the local repos are created +*************************************** - mkdir -p $HOME/starlingx/mirror/CentOS/stx-installer - cp $HOME/starlingx/mirror/CentOS/stx/CentOS/Binary/images/pxeboot/initrd.img $HOME/starlingx/mirror/CentOS/stx-installer/initrd.img - cp $HOME/starlingx/mirror/CentOS/stx/CentOS/Binary/images/pxeboot/vmlinuz $HOME/starlingx/mirror/CentOS/stx-installer/vmlinuz - cp $HOME/starlingx/mirror/CentOS/stx/CentOS/Binary/LiveOS/squashfs.img $HOME/starlingx/mirror/CentOS/stx-installer/squashfs.img +:: -************** + repo_manage.py list + INFO:repo_manage:No remote repo + INFO:repo_manage:3 local repos: + INFO:repo_manage:deb-local-build : bullseye : main + INFO:repo_manage:deb-local-binary : bullseye : main + INFO:repo_manage:deb-local-source : bullseye : main + +.. note:: + + All 3 repos should be seen only after ``build-pkgs [-p ]`` is done at a later time. + +.. _build_packages: + +-------------- Build packages -************** +-------------- -#. Enter the StarlingX container using below command: +The ``build-pkgs`` has two phases based on the Debian package's build: - :: - - cd $HOME/tools/ - ./tb.sh exec - -#. **Temporal!** Build-Pkgs Errors. Be prepared to have some missing / - corrupted rpm and tarball packages generated during - `Build the CentOS Mirror Repository`_, which will cause the next step - to fail. If that step does fail, manually download those missing / - corrupted packages. - -#. Update the symbolic links: - - :: - - cd $MY_REPO_ROOT_DIR/stx-tools/toCOPY - bash generate-centos-repo.sh /import/mirrors/CentOS/stx/CentOS/ - -#. Build the packages: - - :: - - build-pkgs - -#. **Optional!** Generate local-repo: - - While this step is optional, it improves performance on subsequent - builds. The local-repo has the dependency information that - sequences the build order. To generate or update the information, you - need to execute the following command after building modified or new - packages. - - :: - - generate-local-repo.sh - -------------------- -Build StarlingX ISO -------------------- - -Build the image: +1) Check the digest of package's source meta data, for example: :: - build-iso + if package 'dhcp' in cache: + if sha256 digest of the folder (/path/to/stx/integ/base/dhcp/debian) have not changed: + if the dsc file of package dhcp exists: + reuse the existing dsc file + return + create dsc file for package 'dhcp' and add the checksum to cache -.. _Build-installer: - ---------------- -Build installer ---------------- - -To get your StarlingX ISO ready to use, you must create the initialization -files used to boot the ISO, additional controllers, and worker nodes. - -**NOTE:** You only need this procedure during your first build and -every time you upgrade the kernel. - -After running "build-iso", run: +2) Build avoidance is enabled by default for this phase, the build option '-c' will turn 'build avoidance' off. :: - build-pkgs --installer + if build avoidance is enabled: + check whether there is build stamp for this package: + if Yes, skip the build and return + Send the build request for the package to pkgbuilder container -This builds *rpm* and *anaconda* packages. Then run: - -:: - - update-pxe-network-installer - -The *update-pxe-network-installer* covers the steps detailed in -*$MY_REPO/stx/metal/installer/initrd/README*. This script creates three files on -*/localdisk/loadbuild///pxe-network-installer/output*. - -:: - - new-initrd.img - new-squashfs.img - new-vmlinuz - -Rename the files, as the file system is read only in the container, exit from -the container and follow the commands below to rename the files: +To Build packages: :: - cd $HOME/starlingx/workspace/localdisk/loadbuild///pxe-network-installer/output - sudo mv new-initrd.img initrd.img - sudo mv new-squashfs.img squashfs.img - sudo mv new-vmlinuz vmlinuz + # Build all packages + # this should rebuild all packages (std and rt) + build-pkgs -Two ways exist for using these files: + # If you want to clean and build all: + build-pkgs --clean -#. Store the files in the */import/mirrors/CentOS/stx-installer/* folder for - future use. Follow the commands below to store files: + # If you just want to resume the previous build, please run without '-c': + # build-pkgs - :: + # Build packages in parallel + build-pkgs --parallel - cp -r $HOME/starlingx/workspace/localdisk/loadbuild///pxe-network-installer/output/* $HOME/starlingx/mirror/CentOS/stx-installer/ -#. Store the files in an arbitrary location and modify the - *$MY_REPO/stx/metal/installer/pxe-network-installer/centos/build_srpm.data* - file to point to these files. + # To define the interval to poll the packages build status during parallel build: + --poll_interval -Enter the StarlingX container, recreate the *pxe-network-installer* package, and -rebuild the image using the commands below: + # To limit the number of make jobs for a package: + --max_make_jobs + + # Build single package + build-pkgs -p + + # Build single package cleaning previous build + build-pkgs -c -p + +.. warning:: + + Be careful, ``--clean`` not only cleans the whole build directory + ``/localdisk/loadbuild///{std,rt}`` but also cleans the local + repository "deb-local-build". This means all the starlingX packages will be + built from scratch and this will take time. + +.. _build_iso: + +--------- +Build ISO +--------- + +Once you have built all of the packages you can build the iso by running the following command: :: - cd $HOME/tools/ - ./tb.sh exec - build-pkgs --clean pxe-network-installer - build-pkgs pxe-network-installer - build-iso + build-image + ls -al /localdisk/deploy/*.iso -Your ISO image should be able to boot. -**************** -Additional notes -**************** +.. _teardown_env: -* In order to get the first boot working, this complete procedure needs to be - done. However, once the init files are created, these can be stored in a shared location where different developers can make use of them. Updating these files - is not a frequent task and should be done whenever the kernel is upgraded. -* StarlingX is in active development. Consequently, it is possible that a - future version will change to a more generic solution. +------------ +Teardown env +------------ -.. _Build-stx-openstack-app: - -------------------------------------- -Build StarlingX OpenStack application -------------------------------------- - -Use the following command: +Delete minikube profile: :: - $MY_REPO_ROOT_DIR/cgcs-root/build-tools/build-helm-charts.sh + ./stx-init-env --delete-minikube-profile ---------------- -Build avoidance ---------------- - -The foundational principle of build avoidance is that it is faster to download -the rpms than it is to build them. This typically true when the host for -reference builds and the consumer are close to each other and share a high speed -link. It is not practical for ``mirror.starlingx.windriver.com`` to serve as a -provider of reference builds for the world. The real goal is for a corporate -office to have a provider of reference builds to the designers within their -corporate network. - -.. contents:: - :local: - :depth: 1 - -******* -Purpose -******* - -Build avoidance can greatly reduce build times after using ``repo`` to synchronize a local repository -with an upstream source (i.e. ``repo sync``). Build avoidance works well for -designers working within a regional office. Starting from a new workspace, -``build-pkgs`` typically requires three or more hours to complete. Build -avoidance can reduce this step to approximately 20 minutes. - -*********** -Limitations -*********** - -* Little or no benefit for designers who refresh a pre-existing workspace at - least daily (e.g. download_mirror.sh, repo sync, generate-centos-repo.sh, build-pkgs, build-iso). In these cases, an incremental build (i.e. reuse of - same workspace without a :command:`build-pkgs --clean`) is often just as - efficient. -* Not likely to be useful to solo designers, or teleworkers that wish to compile - on using their home computers. Build avoidance downloads build artifacts from a reference build, and WAN speeds are generally too slow. - -************************ -Reference build overview -************************ - -* A server in the regional office performs regular (e.g. daily) automated - builds using existing methods. These builds are called *reference builds*. -* The builds are time-stamped and preserved for some time (i.e. a number of weeks). -* A build CONTEXT, which is a file produced by ``build-pkgs`` at location - ``$MY_WORKSPACE/CONTEXT``, is captured. It is a bash script that can cd to - each and every Git and check out the SHA that contributed to the build. -* For each package built, a file captures the md5sums of all the source code - inputs required to build that package. These files are also produced by - ``build-pkgs`` at location ``$MY_WORKSPACE//rpmbuild/SOURCES//srpm_reference.md5``. -* All these build products are accessible locally (e.g. a regional office) - using ``rsync``. - - .. Note:: - - Other protocols can be added later. - -On the reference builds side: - -* Build contexts of all builds are collected into a common directory. -* Context files are prefixed by the build time stamp allowing chronological traversal of the files. - -On the consumer side: - -* The set of available reference build context are downloaded. -* Traverse the set of available build contexts from newest to oldest. - - * If all SHA of all gits in a candidate reference build are also present in the local git context, stop traversal and use this reference build. - - * If selected reference build is newer than the last (if any) reference build that was downloaded, then download the selected build context, else do nothing. - - -************* -Prerequisites -************* - - -* Reference build server data file - - * Data file describing your reference build server is required in the location - ``$MY_REPO/local-build-data/build_avoidance_source``. (This file is not - supplied by the StarlingX gits.) - - * Required fields and hypothetical values for the data file include: - - :: - - BUILD_AVOIDANCE_DATE_FORMAT="%Y%m%d" - BUILD_AVOIDANCE_TIME_FORMAT="%H%M%S" - BUILD_AVOIDANCE_DATE_TIME_DELIM="T" - BUILD_AVOIDANCE_DATE_TIME_POSTFIX="Z" - BUILD_AVOIDANCE_DATE_UTC=0 - - BUILD_AVOIDANCE_FILE_TRANSFER="rsync" - - BUILD_AVOIDANCE_USR="jenkins" - BUILD_AVOIDANCE_HOST="my-builder.my-company.com" - BUILD_AVOIDANCE_DIR="/localdisk/loadbuild/jenkins/master" - -* Reference build server requirements - - * The reference build server should build regularly, e.g. daily. - * The ``MY_WORKSPACE`` variable set prior to a reference build follows the format: - - :: - - TIMESTAMP=$(date +${BUILD_AVOIDANCE_DATE_FORMAT}${BUILD_AVOIDANCE_DATE_TIME_DELIM}${BUILD_AVOIDANCE_TIME_FORMAT}${BUILD_AVOIDANCE_DATE_TIME_POSTFIX}) - export MY_WORKSPACE=${BUILD_AVOIDANCE_DIR}/${TIMESTAMP} - - * Builds should be preserved for a useful period of time. e.g. at least two weeks. - - * The reference build server is configured to accept rsync requirements. It - serves files under the ``BUILD_AVOIDANCE_DIR`` directory, which is - ``/localdisk/loadbuild/jenkins/master`` in this example. - -*********************************** -Download a selected reference build -*********************************** - -The list of artifacts to download is captured in the datafile -``$MY_REPO/build-data/build_avoidance_source``. - -The following paths are relative to ``$MY_WORKSPACE/$BUILD_TYPE`` +Delete chroots + restart pods: :: - BUILD_AVOIDANCE_SRPM_DIRECTORIES="inputs srpm_assemble rpmbuild/SRPMS rpmbuild/SOURCES" - BUILD_AVOIDANCE_SRPM_FILES="" - BUILD_AVOIDANCE_RPM_DIRECTORIES="results rpmbuild/RPMS rpmbuild/SPECS repo/local-repo/dependancy-cache" - BUILD_AVOIDANCE_RPM_FILES=".platform_release" + ./stx-init-env --reset -Details of the files and directories downloaded include: - -* ``inputs`` = Working directory used to assemble srpms from git or tarball -* ``srpm_assemble`` = Working directory used to assemble srpms from upstream - srpms -* ``rpmbuild/SRPMS`` = Assembled stx src.rpms to build -* ``rpmbuild/SOURCES`` = Additional per package metadata data collected to - support build avoidance -* ``rpmbuild/SOURCES//srpm_reference.md5`` = md5sums of all files - that go into building the STX src.rpm -* ``results`` = Per package build logs and artifacts generated by mockchain -* ``rpmbuild/RPMS`` = Build RPMs -* ``rpmbuild/SPECS`` = Spec files of build RPMs -* ``repo/local-repo/dependancy-cache`` = build-pkgs data summarizing: - - * The 'Requires' of RPMs - * The 'BuildRequires' of src.rpms - * Which RPMs are derived from which src.rpms -* ``.platform_release`` = Platform release value - -On the reference builds side, the only extra step to support build avoidance is -to generate ``rpmbuild/SOURCES//srpm_reference.md5`` files. - -On the consumer side, for each build type: - -* For each file or subdirectory listed in - ``$MY_REPO/build-data/build_avoidance_source``, ``rsync`` the file or - directory with options to preserve the file time stamp. - -********************* -Build tool operations -********************* - -The build tools automatically perform the tasks described below. There are no -required configuration steps for setting up reference builds and no actions for -consuming reference builds. - -For each build type and for each package, build src.rpms: - -* Generate a list of input files for the current package. -* Generate a srpm_reference.md5 file for the current inputs. -* Compare srpm_reference.md5 files for current and reference builds. If - differences are found (list of files, or md5sum of those files), then rebuild - this src.rpm. - -For each build type, for each package, and for the list of RPMs built by -src.rpm: - -* If rpm is missing, must rebuild package. -* If rpm is wrong version, must rebuild package. -* If rpm older than src.rpm, must rebuild package. - - .. Note:: - - Assumes reference build and consumer are on NTP time, and any drift is - well below the download time for the reference build. - -**************** -Designer actions -**************** - -* Request a build avoidance build. Recommended after you have - synchronized the repository using ``repo sync`` as shown below: - - :: - - repo sync - generate-centos-repo.sh - populate_downloads.sh - build-pkgs --build-avoidance - -* Use combinations of additional arguments, environment variables, and a - configuration file unique to the regional office to specify an URL - to the reference builds. - -* Using a configuration file to specify the location of your reference build: - - :: - - mkdir -p $MY_REPO/local-build-data - - cat <<- EOF > $MY_REPO/local-build-data/build_avoidance_source - # Optional, these are already the default values. - BUILD_AVOIDANCE_DATE_FORMAT="%Y%m%d" - BUILD_AVOIDANCE_TIME_FORMAT="%H%M%S" - BUILD_AVOIDANCE_DATE_TIME_DELIM="T" - BUILD_AVOIDANCE_DATE_TIME_POSTFIX="Z" - BUILD_AVOIDANCE_DATE_UTC=1 - BUILD_AVOIDANCE_FILE_TRANSFER="rsync" - - # Required, unique values for each regional office - BUILD_AVOIDANCE_USR="jenkins" - BUILD_AVOIDANCE_HOST="stx-builder.mycompany.com" - BUILD_AVOIDANCE_DIR="/localdisk/loadbuild/jenkins/StarlingX_Reference_Build" - EOF - -* Using command-line arguments to specify the location of your reference - build: - - :: - - build-pkgs --build-avoidance --build-avoidance-dir /localdisk/loadbuild/jenkins/StarlingX_Reference_Build --build-avoidance-host stx-builder.mycompany.com --build-avoidance-user jenkins - -* You must accept the host key **before** your build attempt to prevent - ``rsync`` failures on a ``yes/no`` prompt. You only have to do this once. - - :: - - grep -q $BUILD_AVOIDANCE_HOST $HOME/.ssh/known_hosts - if [ $? != 0 ]; then - ssh-keyscan $BUILD_AVOIDANCE_HOST >> $HOME/.ssh/known_hosts - fi - - -* ``build-pkgs`` does the following: - - * From newest to oldest, scans the CONTEXTs of the various reference builds. - Selects the first (i.e. most recent) context that satisfies the following - requirement: every Git the SHA specifies in the CONTEXT is present. - * The selected context might be slightly out of date, but not by more than - a day. This assumes daily reference builds are run. - * If the context has not been previously downloaded, then download it now. - This means you need to download select portions of the reference build - workspace into the designer's workspace. This includes all the SRPMS, - RPMS, MD5SUMS, and miscellaneous supporting files. Downloading these files - usually takes about 10 minutes over an office LAN. - * The designer could have additional commits or uncommitted changes not - present in the reference builds. Affected packages are identified by the - differing md5sum values. In these cases, the packages are rebuilt. Rebuilds - usually take five or more minutes, depending on the packages that have changed. - -* What if no valid reference build is found? Then ``build-pkgs`` will fall back - to a regular build. - -**************** -Reference builds -**************** - -* The regional office implements an automated build that pulls the latest - StarlingX software and builds it on a regular basis (e.g. daily builds). - Jenkins, cron, or similar tools can trigger these builds. -* Each build is saved to a unique directory, and preserved for a time that is - reflective of how long a designer might be expected to work on a private branch - without synchronizing with the master branch. This takes about two weeks. - -* We recommend that the ``MY_WORKSPACE`` directory for the build has a common - root directory, and a leaf directory that is a sortable time stamp. The - suggested format is ``YYYYMMDDThhmmss``. - - :: - - sudo apt-get update - BUILD_AVOIDANCE_DIR="/localdisk/loadbuild/jenkins/StarlingX_Reference_Build" - BUILD_TIMESTAMP=$(date -u '+%Y%m%dT%H%M%SZ') - MY_WORKSPACE=${BUILD_AVOIDANCE_DIR}/${BUILD_TIMESTAMP} - -* Designers can access all build products over the internal network of the - regional office. The current prototype employs ``rsync``. Other protocols that - can efficiently share, copy, or transfer large directories of content can be - added as needed. - -************** -Advanced usage -************** - -Can the reference build itself use build avoidance? Yes, it can. -Can it reference itself? Yes, it can. -However, in both these cases, caution is advised. To protect against any possible -'divergence from reality', you should limit how many steps you remove -a build avoidance build from a full build. - -Suppose we want to implement a self-referencing daily build in an -environment where a full build already occurs every Saturday. -To protect ourselves from a -build failure on Saturday, we also want a limit of seven days since -the last full build. Your build script might look like this: +Stop pods, delete local workspaces, chroots, aptly, docker & minikube profile: :: - ... - BUILD_AVOIDANCE_DIR="/localdisk/loadbuild/jenkins/StarlingX_Reference_Build" - BUILD_AVOIDANCE_HOST="stx-builder.mycompany.com" - FULL_BUILD_DAY="Saturday" - MAX_AGE_DAYS=7 + ./stx-init-env --reset-hard - LAST_FULL_BUILD_LINK="$BUILD_AVOIDANCE_DIR/latest_full_build" - LAST_FULL_BUILD_DAY="" - NOW_DAY=$(date -u "+%A") - BUILD_TIMESTAMP=$(date -u '+%Y%m%dT%H%M%SZ') - MY_WORKSPACE=${BUILD_AVOIDANCE_DIR}/${BUILD_TIMESTAMP} +.. _log_files: - # update software - repo init -u ${BUILD_REPO_URL} -b ${BUILD_BRANCH} - repo sync --force-sync - $MY_REPO_ROOT_DIR/tools/toCOPY/generate-centos-repo.sh - $MY_REPO_ROOT_DIR/tools/toCOPY/populate_downloads.sh +--------- +Log files +--------- - # User can optionally define BUILD_METHOD equal to one of 'FULL', 'AVOIDANCE', or 'AUTO' - # Sanitize BUILD_METHOD - if [ "$BUILD_METHOD" != "FULL" ] && [ "$BUILD_METHOD" != "AVOIDANCE" ]; then - BUILD_METHOD="AUTO" - fi +While inside the build container, log files may be found here: - # First build test - if [ "$BUILD_METHOD" != "FULL" ] && [ ! -L $LAST_FULL_BUILD_LINK ]; then - echo "latest_full_build symlink missing, forcing full build" - BUILD_METHOD="FULL" - fi +* Top-level build controller log files - # Build day test - if [ "$BUILD_METHOD" == "AUTO" ] && [ "$NOW_DAY" == "$FULL_BUILD_DAY" ]; then - echo "Today is $FULL_BUILD_DAY, forcing full build" - BUILD_METHOD="FULL" - fi + * ``/localdisk/builder.log`` - # Build age test - if [ "$BUILD_METHOD" != "FULL" ]; then - LAST_FULL_BUILD_DATE=$(basename $(readlink $LAST_FULL_BUILD_LINK) | cut -d '_' -f 1) - LAST_FULL_BUILD_DAY=$(date -d $LAST_FULL_BUILD_DATE "+%A") - AGE_SECS=$(( $(date "+%s") - $(date -d $LAST_FULL_BUILD_DATE "+%s") )) - AGE_DAYS=$(( $AGE_SECS/60/60/24 )) - if [ $AGE_DAYS -ge $MAX_AGE_DAYS ]; then - echo "Haven't had a full build in $AGE_DAYS days, forcing full build" - BUILD_METHOD="FULL" - fi - BUILD_METHOD="AVOIDANCE" - fi + * ``/localdisk/pkgbuilder.log`` - #Build it - if [ "$BUILD_METHOD" == "FULL" ]; then - build-pkgs --no-build-avoidance - else - build-pkgs --build-avoidance --build-avoidance-dir $BUILD_AVOIDANCE_DIR --build-avoidance-host $BUILD_AVOIDANCE_HOST --build-avoidance-user $USER - fi - if [ $? -ne 0 ]; then - echo "Build failed in build-pkgs" - exit 1 - fi +* Individual package build logs - build-iso - if [ $? -ne 0 ]; then - echo "Build failed in build-iso" - exit 1 - fi - - if [ "$BUILD_METHOD" == "FULL" ]; then - # A successful full build. Set last full build symlink. - if [ -L $LAST_FULL_BUILD_LINK ]; then - rm -rf $LAST_FULL_BUILD_LINK - fi - ln -sf $MY_WORKSPACE $LAST_FULL_BUILD_LINK - fi - ... - -To use the full build day as your avoidance build reference point, -modify the ``build-pkgs`` commands above to use ``--build-avoidance-day``, -as shown in the following two examples: - -:: - - build-pkgs --build-avoidance --build-avoidance-dir $BUILD_AVOIDANCE_DIR --build-avoidance-host $BUILD_AVOIDANCE_HOST --build-avoidance-user $USER --build-avoidance-day $FULL_BUILD_DAY - - # Here is another example with a bit more shuffling of the above script. - - build-pkgs --build-avoidance --build-avoidance-dir $BUILD_AVOIDANCE_DIR --build-avoidance-host $BUILD_AVOIDANCE_HOST --build-avoidance-user $USER --build-avoidance-day $LAST_FULL_BUILD_DAY - -The advantage is that our build is never more than one step removed -from a full build. This assumes the full build was successful. - -The disadvantage is that by the end of the week, the reference build is getting -rather old. During active weeks, build times could approach build times for -full builds. + * ``${MY_WORKSPACE}///*.build`` diff --git a/doc/source/developer_resources/layered_build_guide.rst b/doc/source/developer_resources/layered_build_guide.rst index 26a55f28b..8d7bde36b 100644 --- a/doc/source/developer_resources/layered_build_guide.rst +++ b/doc/source/developer_resources/layered_build_guide.rst @@ -11,13 +11,13 @@ For more detailed explanation of layered build, please refer :ref:`Layered-Build :depth: 1 ------------------- -:ref:`Requirements` +:ref:`requirements` ------------------- Layered build has the same requirements as StarlingX R3.0 build. Click the heading above for details. ------------------------------------ -:ref:`Development-environment-setup` +:ref:`starlingx_build_tools` ------------------------------------ Layered build uses the same development environment setup as StarlingX R3.0 build. Click the heading above for details. @@ -30,8 +30,6 @@ Build compiler layer Prepare the base Docker image ***************************** -Follow :ref:`Prepare_the_base_Docker_image` for creating the base StarlingX -image with changes only in localrc file as below. Since, we are building compiler layer, create and modify only localrc file. Make sure to set the project and layer as compiler and user name as desired. For example: @@ -59,8 +57,6 @@ this CentOS mirror repository. Run building Docker container ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -Follow the :ref:`building docker container ` for -more details. At the end of this procedure, you will be inside the Starlingx container. Quick command summary is as below: @@ -267,8 +263,6 @@ project and layer as distro. For example: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Run building Docker container ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -Follow the :ref:`building docker container ` for -more details. At the end of this procedure, you will be inside the Starlingx container. Quick command summary is as below: @@ -551,8 +545,6 @@ project and layer as flock. For example: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Run building Docker container ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -Follow the :ref:`building docker container ` for -more details. At the end of this procedure, you will be inside the Starlingx container. Quick command summary is as below: @@ -843,7 +835,7 @@ Build the image: build-iso ---------------------- -:ref:`Build-installer` +Build-installer ---------------------- Layered build has the same procedure for build installer as StarlingX R3.0 build except for the changes in path of files as below. Click the heading above for details. diff --git a/doc/source/developer_resources/packaging_ref.rst b/doc/source/developer_resources/packaging_ref.rst index ec7c392b0..21520c9ec 100644 --- a/doc/source/developer_resources/packaging_ref.rst +++ b/doc/source/developer_resources/packaging_ref.rst @@ -552,11 +552,11 @@ Build your package ****************** Complete instructions can be found in the -:ref:`Create StarlingX packages section of the Build Guide `. +:ref:`Create StarlingX packages section of the Build Guide `. :: - build-rpms fm-common + build-pkgs fm-common ******************* Commit your changes