2017-06-14 13:36:37 +02:00
|
|
|
Setup tool for bitbake based projects
|
|
|
|
=====================================
|
|
|
|
|
2020-09-23 11:36:12 +02:00
|
|
|
+--------------------+
|
|
|
|
| Build Status |
|
|
|
|
+====================+
|
|
|
|
| |workflow-master|_ |
|
|
|
|
+--------------------+
|
|
|
|
| |workflow-next|_ |
|
|
|
|
+--------------------+
|
2017-06-21 15:50:24 +02:00
|
|
|
|
2020-09-23 11:36:12 +02:00
|
|
|
.. |workflow-master| image:: https://github.com/siemens/kas/workflows/master/badge.svg
|
|
|
|
.. _workflow-master: https://github.com/siemens/kas/actions?query=workflow%3Amaster
|
|
|
|
.. |workflow-next| image:: https://github.com/siemens/kas/workflows/next/badge.svg
|
|
|
|
.. _workflow-next: https://github.com/siemens/kas/actions?query=workflow%3Anext
|
2017-06-21 15:50:24 +02:00
|
|
|
|
2017-06-14 13:36:37 +02:00
|
|
|
This tool provides an easy mechanism to setup bitbake based
|
|
|
|
projects.
|
|
|
|
|
|
|
|
The OpenEmbedded tooling support starts at step 2 with bitbake. The
|
|
|
|
downloading of sources and then configuration has to be done by
|
|
|
|
hand. Usually, this is explained in a README. Instead kas is using a
|
|
|
|
project configuration file and does the download and configuration
|
|
|
|
phase.
|
|
|
|
|
2017-06-18 09:55:12 +02:00
|
|
|
Key features provided by the build tool:
|
2017-07-17 22:38:02 +02:00
|
|
|
|
2017-06-18 09:55:12 +02:00
|
|
|
- clone and checkout bitbake layers
|
|
|
|
- create default bitbake settings (machine, arch, ...)
|
|
|
|
- launch minimal build environment, reducing risk of host contamination
|
|
|
|
- initiate bitbake build process
|
2017-06-14 13:36:37 +02:00
|
|
|
|
2017-07-17 22:38:02 +02:00
|
|
|
See the `kas documentation <https://kas.readthedocs.io>`_ for further details.
|
2023-02-12 18:43:42 +01:00
|
|
|
|
|
|
|
SECURITY NOTICE
|
|
|
|
---------------
|
|
|
|
|
|
|
|
At this stage, kas does not validate the integrity of fetched repositories.
|
|
|
|
Make sure to only pull from trusted sources to ensure that the selected
|
|
|
|
revisions are the expected ones, specifically when using mirrors. Later
|
|
|
|
versions of kas may introduce integrity validation mechanisms such as
|
|
|
|
cryptographic checksums to strengthen supply chain security.
|