Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add container-based build workflow and improve build tooling #93

Open
wants to merge 7 commits into
base: main
Choose a base branch
from

Conversation

ynezz
Copy link

@ynezz ynezz commented Dec 1, 2024

This PR introduces a new container-based build workflow and several improvements to the build system:

Major Changes

  • Added a new Makefile for streamlined container-based builds
  • Created tools/build_firmware.sh script to standardize build steps
  • Updated CI to use the new build script
  • Added QA checks for shell scripts using reviewdog
  • Fixed various build-related issues
  • Mitigate certain supply chain attacks using sha256sums for external dependencies

New Build Workflow Features

  • Simple make-based commands for building firmware
  • Support for both Docker and Podman
  • Flexible firmware manifest selection
  • Shared build steps between local and CI environments

Technical Improvements

  • Fixed permission issues with extension symlinks under rootless podman
  • Improved error reporting in build_project.py
  • Added shellcheck and shfmt QA checks
  • Standardized build steps between local and CI environments

Usage Example

Build all firmware

make

Build specific manifest

make build_firmware MANIFESTS=manifests/nabucasa/yellow_bootloader.yaml

Documentation

Added comprehensive documentation in README.md covering:

  • Prerequisites installation
  • Build workflow usage
  • Available make targets
  • Customization options

Fixes

  • Permission issues with rootless podman
  • Git commit ID error reporting
  • Build step standardization

Currently if get_git_commit_id() fails, its not clear why:

  Generation for Bootloader to /build_dir has completed.
    ...snip...
     File "/usr/lib/python3.11/subprocess.py", line 571, in run
       raise CalledProcessError(retcode, process.args,
   subprocess.CalledProcessError: Command '['git', '-C', '/build', 'rev-parse', 'HEAD']' returned non-zero exit status 128.

So lets fix it by providing stderr output, thus making the issue
obvious:

  Generation for Bootloader to /build_dir has completed.
    ...snip...
    File "/build/tools/build_project.py", line 113, in git
      raise RuntimeError(
      RuntimeError: Git command `git -C /build rev-parse HEAD` failed: fatal: detected dubious ownership in repository at '/build'
      To add an exception for this directory, call:

          git config --global --add safe.directory /build

Signed-off-by: Petr Štetiar <[email protected]>
Using the build workflow with rootless podman containers and volumes
results into following permssions issues:

  $ make build_firmware MANIFESTS=manifests/nabucasa/yellow_openthread_rcp.yaml
  podman run --rm -it \
     -v /silabs/silabs-firmware-builder:/build:z \
     -v /silabs/silabs-firmware-builder/outputs:/outputs:z \
     -v /silabs/silabs-firmware-builder/build_dir:/build_dir:z silabs-firmware-builder \
	bash -c " \
		build_firmware.sh \
		--build-dir /build_dir \
		--output-dir /outputs \
		--manifest manifests/nabucasa/skyconnect_openthread_rcp.yaml \
	"
  The sdk /gecko_sdk_4.4.4/ ( com.silabs.sdk.stack.super:4.4.4._1207041799 )  is now trusted.
  ln: failed to create symbolic link '/gecko_sdk_4.4.4/extension': Permission denied

  The sdk /simplicity_sdk_2024.6.2/ ( com.silabs.sdk.stack.sisdk:2024.6.2._-620023087 )  is now trusted.
  ln: failed to create symbolic link '/simplicity_sdk_2024.6.2/extension': Permission denied

This is happening due to the user/group mapping between container and
the host, where currently the simplicity_sdk and gecko_sdk directories
are owned as root, thus builder user won't be able to create an
extension symlink, resulting in this failures.

So lets fix it by chown-ing the simplicity_sdk and gecko_sdk folders for builder user.

References: https://www.redhat.com/en/blog/debug-rootless-podman-mounted-volumes
Signed-off-by: Petr Štetiar <[email protected]>
…ality

Currently its not possible to easily reuse the steps taken on the GitHub
CI to build the firmware, so lets factor out those common bits into new
build_firmware.sh script help which basically mimics the current
firmware build flow on the GitHub CI and can be as well reused for
example in local container based workflow.

Signed-off-by: Petr Štetiar <[email protected]>
Currently it needs a lot of steps to build single firmware, so lets
streamline this workflow by using container.

 Usage: make [all|build_container|build_firmware]
 Targets:
   all             Build container and firmware
   build_container Build container
   build_firmware  Build firmware
   help            Show this help message

 Options:
   build_firmware MANIFESTS=<path>  Override default manifest files (default: all .yaml/.yml files in manifests/)

 Examples:
   # Build the container image
   make build_container

   # Build all firmware manifests
   make build_firmware

   # Build a specific firmware manifest
   make build_firmware MANIFESTS=manifests/nabucasa/yellow_bootloader.yaml

Signed-off-by: Petr Štetiar <[email protected]>
In commit 3eae968 ("tools: add build_firmware.sh providing firmware
build functionality") new build_firmware.sh shell script was added, so
lets keep the code quality with reviewdog's shfmt and shellcheck based
GitHub actions.

Signed-off-by: Petr Štetiar <[email protected]>
Use new build_firmware.sh script in GitHub actions as well, so the build
steps are shared with local container based workflow.

Signed-off-by: Petr Štetiar <[email protected]>
Currently, the Dockerfile downloads various tools and SDKs from external sources
without verifying their integrity. This poses a potential security risk as the
downloaded files could be tampered with during transit or at the source (supply
chain attack).

This change introduces SHA256 checksums for all downloaded artifacts and
verifies them before installation. This ensures that the files we receive
match exactly what we expect, mitigating the risk of supply chain attacks
where malicious actors might try to inject compromised versions of these
tools.

Signed-off-by: Petr Štetiar <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant