Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.2/patches/802057/?format=api
{ "id": 802057, "url": "http://patchwork.ozlabs.org/api/1.2/patches/802057/?format=api", "web_url": "http://patchwork.ozlabs.org/project/swupdate/patch/1502889144-13237-1-git-send-email-sbabic@denx.de/", "project": { "id": 58, "url": "http://patchwork.ozlabs.org/api/1.2/projects/58/?format=api", "name": "swupdate development", "link_name": "swupdate", "list_id": "swupdate.googlegroups.com", "list_email": "swupdate@googlegroups.com", "web_url": "https://github.com/sbabic/swupdate", "scm_url": "git://github.com/sbabic/swupdate", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<1502889144-13237-1-git-send-email-sbabic@denx.de>", "list_archive_url": null, "date": "2017-08-16T13:12:24", "name": "doc: howto using meta-swupdate", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "bc574cb73e4b440062e61e801785f426bcf8c208", "submitter": { "id": 5771, "url": "http://patchwork.ozlabs.org/api/1.2/people/5771/?format=api", "name": "Stefano Babic", "email": "sbabic@denx.de" }, "delegate": { "id": 1693, "url": "http://patchwork.ozlabs.org/api/1.2/users/1693/?format=api", "username": "sbabic", "first_name": "Stefano", "last_name": "Babic", "email": "sbabic@denx.de" }, "mbox": "http://patchwork.ozlabs.org/project/swupdate/patch/1502889144-13237-1-git-send-email-sbabic@denx.de/mbox/", "series": [], "comments": "http://patchwork.ozlabs.org/api/patches/802057/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/802057/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<swupdate+bncBAABBRUJ2HGAKGQESN526NY@googlegroups.com>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org", "Authentication-Results": [ "ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=googlegroups.com\n\t(client-ip=2a00:1450:400c:c0c::238;\n\thelo=mail-wr0-x238.google.com;\n\tenvelope-from=swupdate+bncbaabbruj2hgakgqesn526ny@googlegroups.com;\n\treceiver=<UNKNOWN>)", "ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=googlegroups.com header.i=@googlegroups.com\n\theader.b=\"oY82YvWT\"; dkim-atps=neutral" ], "Received": [ "from mail-wr0-x238.google.com (mail-wr0-x238.google.com\n\t[IPv6:2a00:1450:400c:c0c::238])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xXVBf5MZ0z9sRg\n\tfor <incoming@patchwork.ozlabs.org>;\n\tWed, 16 Aug 2017 23:12:41 +1000 (AEST)", "by mail-wr0-x238.google.com with SMTP id w63sf1896888wrc.2\n\tfor <incoming@patchwork.ozlabs.org>;\n\tWed, 16 Aug 2017 06:12:41 -0700 (PDT)", "by 10.25.31.211 with SMTP id f202ls97703lff.24.gmail; Wed, 16 Aug\n\t2017 06:12:37 -0700 (PDT)", "from mail-out.m-online.net (mail-out.m-online.net. [212.18.0.9])\n\tby gmr-mx.google.com with ESMTPS id\n\th133si1328632wmg.2.2017.08.16.06.12.37\n\tfor <swupdate@googlegroups.com>\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);\n\tWed, 16 Aug 2017 06:12:37 -0700 (PDT)", "from frontend01.mail.m-online.net (unknown [192.168.8.182])\n\tby mail-out.m-online.net (Postfix) with ESMTP id 3xXVBY46gkz1qsDB;\n\tWed, 16 Aug 2017 15:12:37 +0200 (CEST)", "from localhost (dynscan1.mnet-online.de [192.168.6.70])\n\tby mail.m-online.net (Postfix) with ESMTP id 3xXVBY3pTFz3jgYn;\n\tWed, 16 Aug 2017 15:12:37 +0200 (CEST)", "from mail.mnet-online.de ([192.168.8.182])\n\tby localhost (dynscan1.mail.m-online.net [192.168.6.70]) (amavisd-new,\n\tport 10024)\n\twith ESMTP id SXWPUcdIW07Z; Wed, 16 Aug 2017 15:12:36 +0200 (CEST)", "from babic.homelinux.org\n\t(host-88-217-136-221.customer.m-online.net [88.217.136.221])\n\t(using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits))\n\t(No client certificate requested)\n\tby mail.mnet-online.de (Postfix) with ESMTPS;\n\tWed, 16 Aug 2017 15:12:36 +0200 (CEST)", "from localhost (mail.babic.homelinux.org [127.0.0.1])\n\tby babic.homelinux.org (Postfix) with ESMTP id 817F54540495;\n\tWed, 16 Aug 2017 15:12:35 +0200 (CEST)", "from babic.homelinux.org ([127.0.0.1])\n\tby localhost (mail.babic.homelinux.org [127.0.0.1]) (amavisd-new,\n\tport 10024)\n\twith ESMTP id cA6WP7Bdg6qa; Wed, 16 Aug 2017 15:12:32 +0200 (CEST)", "from papero.fritz.box (papero.fritz.box [192.168.178.132])\n\tby babic.homelinux.org (Postfix) with ESMTP id 6EDC2454035C;\n\tWed, 16 Aug 2017 15:12:32 +0200 (CEST)" ], "ARC-Seal": [ "i=2; a=rsa-sha256; t=1502889158; cv=pass;\n\td=google.com; s=arc-20160816;\n\tb=g0vtrnltUsKPcsbq5dpOnbyn5s2YkgWjPZMxRqDgK7nqsE11gOYACIlNcPp5IMobGa\n\tQUejxmKdNFepJtE/2nCfSSZmRNii7/UOxJ226IpwlMfAT2VQxAYO2hbSX/IAqKprPNiP\n\tWTptRhrNd+vGh3IFs057/M/JB/5xBfX8ipa9saW/rcJz4/A1u9ueg+Walywrrll8/DMD\n\t3Dn8b0KIE6pM9BYVaGwXHES1nJ+slCkvVtQ6+OtctCTvnwvlskMJKTdEIbNKIebPhuUe\n\twvx9Rkn0yqwDMRPEE4u9YnouJ8HXTGvgAS6h8vuyUDd3QQE37HwqOdKVgXHBjMb57WZc\n\ttk2w==", "i=1; a=rsa-sha256; t=1502889157; cv=none;\n\td=google.com; s=arc-20160816;\n\tb=IJkvetWGA3ex8y5/hABlHsu+nDq6miObJl+HUw0A1e7KrHmILBNcBUJbCBamNMIMMP\n\t2Vvu5S+rI43x8d1KEAKrKaCeGIkPtkDNBPHYuq5HCI+2gCe1Y6XM34rS1CbmE2xbkSyq\n\txaSrACpK8K/nQc/TuBjw7CM2futODcuOtafKHUBFC1/j4LmkMjUwJjVees3goaYOkHbN\n\tnGe7bKRPsPY94BEArP2Nh3pThbVa40jmjHLAsM74TChMYdBRTJsnxe/CJD73GQ0C7dgw\n\tSdm/kBYCh4Ww+cJPxBhlI4eHow0TNF9RDYfWe1Rj/zSocyplWWrEfpbQOzghuOZjnGvU\n\tcKtA==" ], "ARC-Message-Signature": [ "i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n\ts=arc-20160816; \n\th=list-unsubscribe:list-subscribe:list-archive:list-help:list-post\n\t:list-id:mailing-list:precedence:message-id:date:subject:cc:to:from\n\t:arc-authentication-results:arc-message-signature:mime-version\n\t:sender:dkim-signature:arc-authentication-results;\n\tbh=Qf85L9J+Kb9UQND76/l1fVv5ynknNkILurmIEFJKlfs=;\n\tb=BH3IOVyxjEK1WOTJKZDwis5GgXwOEPmAEcwQFrzMB9AD5Sdn1OuId1/dnR0t+9TSBh\n\tqvCqNcJVy8tsjo2/LlBCw79/rL9T4lNLiuejZpcssbXotGnzSYAP0eJfCBbkGMPB0JTQ\n\ttrqdufkHeygPzGpkQOnz2+/NGna2mAxxQg45ai+dErZMlwwoBVhTIZBeyXa2ufBDyB9j\n\tmDyUldJMKI1RQr1Ccrj3pJP/ndmMe9O0WMlHqxs96jKG74/vP1LsO7pUBabCIgCWDOUC\n\tVtzFZvQWpYeEx0SHws20O7fZIkHL62+Gk5jt5AIlEgoEpNoSTIqihCObkuxayKiNYHzO\n\tfXvA==", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n\ts=arc-20160816; \n\th=message-id:date:subject:cc:to:from:arc-authentication-results;\n\tbh=iFS4ktyr6cW598YmxlElRp3IoJ4l5NCOdZWXEYj88MI=;\n\tb=QQWxSZkR98veEW6sZjSezJ+k0IY81+Y/sb2M2apIl/9qy1SooJtwc5ssfOXWq2wlEg\n\tz5MaIAiBos7Uy/pOORidf8LBIMmTvbPLDs7jR0hdnyrctOS1XadHi2AviFqyhkab6Pvh\n\tl7nynfkOzmS0U8nJqUXVnHRuNSv953Nx41DWKCy2uH645q8HkjYXBBJAGy6vOAEdYuaw\n\tci9IMfm8xKfSu/ND/jqmU61pZd0vcoDmflvhjNJ89HzBx1B3jnolWj2Wxhm+YpUMPLW+\n\tEcwZJjMjxIa4riY1X+YshFkkoHyvO8QRTBC1nfh0P9PMfAeEuDFj0nIeA4bXWxGF3kPQ\n\t/u/g==" ], "ARC-Authentication-Results": [ "i=2; gmr-mx.google.com;\n\tspf=neutral (google.com: 212.18.0.9 is neither permitted nor denied\n\tby best guess record for domain of sbabic@denx.de)\n\tsmtp.mailfrom=sbabic@denx.de", "i=1; gmr-mx.google.com;\n\tspf=neutral (google.com: 212.18.0.9 is neither permitted nor denied\n\tby best guess record for domain of sbabic@denx.de)\n\tsmtp.mailfrom=sbabic@denx.de" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=googlegroups.com; s=20161025;\n\th=sender:mime-version:from:to:cc:subject:date:message-id\n\t:x-original-sender:x-original-authentication-results:precedence\n\t:mailing-list:list-id:list-post:list-help:list-archive\n\t:list-subscribe:list-unsubscribe;\n\tbh=Qf85L9J+Kb9UQND76/l1fVv5ynknNkILurmIEFJKlfs=;\n\tb=oY82YvWT4NjZA5UpHjFeL/2IoJf8VdxByW1Ye1EP8v0gh6RY5zeXqHGj33XyMfAG2c\n\t3H1tLFwSWhPR+I5VlZLUPPp+M/S3pZtxJwI2dyuSSyln+r2fDhbG3gclGkBkZyIxTi73\n\taOfoBC9ZXRf9DI2a22AEs5L4lBr2OFAMkfqulQDCKqLVXjYkluUNhGrUdEsRLrexDZwv\n\tCQQe5WWRPv1Uh7oJ60Q7qWmU4CI3jnnc5+ydfSVmYwusncmNTLZrjIACyX77qFS5fRba\n\t53SnQfgFVTlZwB4qhvZ7K3SiHl4AxDL9JTOKcUxVKRyQ5RnqvCZYQROclUWt3diFnyhA\n\tvF6A==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=sender:x-gm-message-state:mime-version:from:to:cc:subject:date\n\t:message-id:x-original-sender:x-original-authentication-results\n\t:precedence:mailing-list:list-id:x-spam-checked-in-group:list-post\n\t:list-help:list-archive:list-subscribe:list-unsubscribe;\n\tbh=Qf85L9J+Kb9UQND76/l1fVv5ynknNkILurmIEFJKlfs=;\n\tb=F5kCcm5mdvcichecYIgj+Ehocb686ueb/G9gOUkkGushDQ3a6k2TvbWE4t3dtaGI5+\n\tamAT11hezOdror2nqkIVg45y5YncUYbzxOh0MdBIkVPMG+GgLYqR8MS83jRRNIDYzgWI\n\t2cFP6GyUMUYQ0fgxhnHWzyTWg1NWZI21MwBBBZ9BlTEZq694YFVVk7397/3Wd5ZawJpd\n\t/1bsCTZLnnfQsFs2UsmKo5g+mK7VPCVfJClEdqhjeGTDwsTemF1MbBQNKwuunLCD3Vsk\n\tidRXw6E2T5fpfWDdphoWcGDkJBZDjJOQp5Ia/P3zshESa4SdCQXb0pntP5mpn4YsojQX\n\t1EnA==", "Sender": "swupdate@googlegroups.com", "X-Gm-Message-State": "AHYfb5gfdpcFQQ7U+uNhgRr1F3OvUXSuRPM1C3X3vyPKjmsiq3AiCS10\n\tSR9DiNw6FRYKJQ==", "X-Received": [ "by 10.25.20.215 with SMTP id 84mr2483lfu.20.1502889158349;\n\tWed, 16 Aug 2017 06:12:38 -0700 (PDT)", "by 10.25.169.68 with SMTP id s65mr355592lfe.34.1502889157852;\n\tWed, 16 Aug 2017 06:12:37 -0700 (PDT)" ], "MIME-Version": "1.0", "X-BeenThere": "swupdate@googlegroups.com", "Received-SPF": "neutral (google.com: 212.18.0.9 is neither permitted nor\n\tdenied by best guess record for domain of sbabic@denx.de)\n\tclient-ip=212.18.0.9; ", "X-Virus-Scanned": [ "amavisd-new at mnet-online.de", "Debian amavisd-new at babic.homelinux.org" ], "From": "Stefano Babic <sbabic@denx.de>", "To": "swupdate@googlegroups.com", "Cc": "Stefano Babic <sbabic@denx.de>", "Subject": "[swupdate] [PATCH] doc: howto using meta-swupdate", "Date": "Wed, 16 Aug 2017 15:12:24 +0200", "Message-Id": "<1502889144-13237-1-git-send-email-sbabic@denx.de>", "X-Mailer": "git-send-email 2.7.4", "X-Original-Sender": "sbabic@denx.de", "X-Original-Authentication-Results": "gmr-mx.google.com; spf=neutral\n\t(google.com: 212.18.0.9 is neither permitted nor denied by best guess\n\trecord\n\tfor domain of sbabic@denx.de) smtp.mailfrom=sbabic@denx.de", "Content-Type": "text/plain; charset=\"UTF-8\"", "Precedence": "list", "Mailing-list": "list swupdate@googlegroups.com;\n\tcontact swupdate+owners@googlegroups.com", "List-ID": "<swupdate.googlegroups.com>", "X-Spam-Checked-In-Group": "swupdate@googlegroups.com", "X-Google-Group-Id": "605343134186", "List-Post": "<https://groups.google.com/group/swupdate/post>,\n\t<mailto:swupdate@googlegroups.com>", "List-Help": "<https://groups.google.com/support/>,\n\t<mailto:swupdate+help@googlegroups.com>", "List-Archive": "<https://groups.google.com/group/swupdate", "List-Subscribe": "<https://groups.google.com/group/swupdate/subscribe>,\n\t<mailto:swupdate+subscribe@googlegroups.com>", "List-Unsubscribe": "<mailto:googlegroups-manage+605343134186+unsubscribe@googlegroups.com>,\n\t<https://groups.google.com/group/swupdate/subscribe>" }, "content": "Add a section about building with Yocto and how to use the swupdate\nclass to generate the SWU image.\n\nSigned-off-by: Stefano Babic <sbabic@denx.de>\n---\n doc/source/building-with-yocto.rst | 115 +++++++++++++++++++++++++++++++++++++\n doc/source/index.rst | 1 +\n 2 files changed, 116 insertions(+)\n create mode 100644 doc/source/building-with-yocto.rst", "diff": "diff --git a/doc/source/building-with-yocto.rst b/doc/source/building-with-yocto.rst\nnew file mode 100644\nindex 0000000..0e0702c\n--- /dev/null\n+++ b/doc/source/building-with-yocto.rst\n@@ -0,0 +1,115 @@\n+==================================\n+meta-swupdate: building with Yocto\n+==================================\n+\n+Overview\n+========\n+\n+The Yocto-Project_ is a community project under the umbrella of the Linux\n+Foundation that provides tools and template to create the own custom Linux-based\n+software for embedded systems.\n+\n+.. _Yocto-Project: http://www.yoctoproject.org\n+.. _meta-SWUpdate: https://github.com/sbabic/meta-swupdate.git\n+\n+Add-on features can be added using *layers*. meta-swupdate_ is the layer to\n+cross-compile the SWUpdate application and to generate the compound SWU images\n+containing the release of the product. As described in Yocto's documentation\n+about layers, you should include it in your *bblayers.conf* file to use it.\n+\n+The swupdate class\n+==================\n+\n+meta-swupdate contains a class specific for SWUpdate. It helps to generate the\n+SWU image starting from images built inside the Yocto. It requires that all\n+components, that means the artifacts that are part of the SWU image, are present\n+in the Yocto's deploy directory. This class should be inherited by recipes\n+generating the SWU. The class defines new variables, all of them have the prefix\n+*SWUPDATE_* in the name.\n+\n+- **SWUPDATE_IMAGES** : this is a list of the artifacts to be packaged together.\n+ The list contains the name of images without any extension for MACHINE or\n+ filetype, that are added automatically.\n+ Example :\n+\n+::\n+\n+ SWUPDATE_IMAGES = \"core-image-full-cmdline uImage\"\n+\n+- **SWUPDATE_IMAGES_FSTYPES** : extension of the artifact. Each artifact can\n+ have multiple extension according to the IMAGE_FSTYPES variable.\n+ For example, an image can be generated as tarball and as UBIFS for target.\n+ Setting the variable for each artifact telles the class which file must\n+ be packed into the SWU image.\n+\n+\n+::\n+\n+ SWUPDATE_IMAGES_FSTYPES[core-image-full-cmdline] = \".ubifs\"\n+\n+- **SWUPDATE_IMAGES_NOAPPEND_MACHINE** : flag to use drop the machine name from the\n+ artifact file. Most images in *deploy* have the name of the Yocto's machine in the\n+ filename. The class adds automatically the name of the MACHINE to the file, but some\n+ artifacts can be deploes without it.\n+\n+::\n+\n+ SWUPDATE_IMAGES_NOAPPEND_MACHINE[my-image] = \"1\"\n+\n+- **SWUPDATE_SIGNING** : if set, the SWU is signed.\n+- **SWUPDATE_SIGN_TOOL** : instead of using openssl, use SWUPDATE_SIGN_TOOL to sign\n+ the image. A typical use case is together with a hardware key.\n+- **SWUPDATE_PRIVATE_KEY** : this is the file with the private key used to sign the\n+ image.\n+- **SWUPDATE_PASSWORD_FILE** : an optional file containing the password for the private\n+ key.\n+\n+Automatic sha256 in sw-description\n+----------------------------------\n+\n+The swupdate class takes care of computing and inserting sha256 hashes in the\n+sw-description file. The attribute *sha256* **must** be set in case the image\n+is signed. Each artifact must have the attribute:\n+\n+::\n+\n+ sha256 = \"@artifact-file-name@\"\n+\n+For example, to add sha256 to the standard Yocto core-image-full-cmdline:\n+\n+::\n+\n+ sha256 = \"@core-image-full-cmdline-machine.ubifs\";\n+\n+\n+The name of the file must be the same as in deploy directory.\n+\n+\n+Template for recipe using the class\n+-----------------------------------\n+\n+::\n+\n+ DESCRIPTION = \"Example recipe generating SWU image\"\n+ SECTION = \"\"\n+\n+ LICENSE = \"\"\n+\n+ # Add all local files to be added to the SWU\n+ # sw-description must always be in the list.\n+ # You can extend with scripts or wahtever you need\n+ SRC_URI = \" \\\n+ file://sw-description \\\n+ \"\n+\n+ # images to build before building swupdate image\n+ IMAGE_DEPENDS = \"core-image-full-cmdline virtual/kernel\"\n+\n+ # images and files that will be included in the .swu image\n+ SWUPDATE_IMAGES = \"core-image-full-cmdline uImage\"\n+\n+ # a deployable image can have multiple format, choose one\n+ SWUPDATE_IMAGES_FSTYPES[core-image-full-cmdline] = \".ubifs\"\n+ SWUPDATE_IMAGES_FSTYPES[uImage] = \".bin\"\n+\n+ inherit swupdate\ndiff --git a/doc/source/index.rst b/doc/source/index.rst\nindex 2f74c7d..f7c4b85 100644\n--- a/doc/source/index.rst\n+++ b/doc/source/index.rst\n@@ -32,6 +32,7 @@ SWUpdate Documentation\n suricatta.rst\n swupdate-ipc.rst\n progress.rst\n+ building-with-yocto.rst\n \n ############################################\n Help and support\n", "prefixes": [] }