From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by mx.groups.io with SMTP id smtpd.web11.4727.1660133006856178482 for ; Wed, 10 Aug 2022 05:03:27 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=gLBhH/Lt; spf=pass (domain: redhat.com, ip: 170.10.129.124, mailfrom: osteffen@redhat.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1660133005; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=QkYZUbauRkCgfUIDYhkIcTNa5xSWjZQTq/VqP3F7u4M=; b=gLBhH/LtjwsI186/6wEOQ5NrJliT75hqNe91X36/4mBVUOobpxjsdyGfipCjamR+1tGXYg ySoOeRbXcPAxQc9iStDSpAm/VVph4J5paWn+iy9ywqh266XfZEiLauqLMRycewhVpyDIJu 2owJWyrc4fo+BYg69kSaGQLgXFAcAUE= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-201-bRN63qhGPY2q1NYbz0fgMA-1; Wed, 10 Aug 2022 08:03:20 -0400 X-MC-Unique: bRN63qhGPY2q1NYbz0fgMA-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id C2F491019C91; Wed, 10 Aug 2022 12:03:19 +0000 (UTC) Received: from osteffen-laptop.fritz.box (unknown [10.39.194.179]) by smtp.corp.redhat.com (Postfix) with ESMTP id 051881121314; Wed, 10 Aug 2022 12:03:15 +0000 (UTC) From: "Oliver Steffen" To: devel@edk2.groups.io Cc: Oliver Steffen , Andrew Fish , Ard Biesheuvel , Bob Feng , Bret Barkelew , Eric Dong , Gerd Hoffmann , Jiewen Yao , Jordan Justen , Leif Lindholm , Liming Gao , Michael D Kinney , Rahul Kumar , Ray Ni , Sami Mujawar , Sean Brogan , Yuwei Chen , Ard Biesheuvel Subject: [PATCH v4 0/4] CI: Use Fedora 35 container for Linux jobs Date: Wed, 10 Aug 2022 14:03:09 +0200 Message-Id: <20220810120313.203609-1-osteffen@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII"; x-default=true Update CI, run all Linux (aka Ubuntu-GCC5) based jobs in custom containers. The container image provides the required compiler toolchains and Qemu for the supported architectures. These are then no longer downloaded at runtime, avoiding CI failures due to download errors. This approach also makes it easier to switch to other or newer compilers. It makes the CI setup independent from the default images that Azure DevOps provides. It can also help debugging CI problems, because the CI environment can be reproduced on a local machine. The container images are hosted on ghcr.io and are automatically generated using GitHub Actions. The Dockerfiles are maintained in the Tianocore "containers" repository: https://github.com/tianocore/containers. The current image is based on Fedora 35, with gcc 11. Fedora was chosen because of its fast release cycle which makes it easy to keep the toolchains up-to-date. Some further possible changes not included in this series: - The Tianocore/containers repository provides stack of layered images. One image for general purpose (build+test) and build-only jobs. The build+test image is based on the build-only one and adds Qemu, for the testing job that involve Qemu. This reduces the total download size. This was suggested by Chris Fernald. The work in the image side is done, we just need to change the CI setup accordingly. This patch set uses the build+test images for all jobs. - Further reduce the number of external dependencies that need to be downloaded at runtime. Candidates are iasl and nasm, which are already included in the image but not used yet. PR: https://github.com/tianocore/edk2/pull/2935 v4: - Use the latest image from the tianocode/containers repository which - does not include acpica-tools - includes Pyhton 3.10 v3: - Use the latest image from the tianocode/containers repository which pins down version numbers of gcc, iasl, and nasm in the Dockerfile. v2: - Images are now hosted under the Tianocore Organization https://github.com/tianocore/containers v1: - Thread: https://edk2.groups.io/g/devel/message/89058 - Images were hosted at https://github.com/osteffenrh/edk2-build-images Signed-off-by: Oliver Steffen Acked-by: Ard Biesheuvel Acked-by: Gerd Hoffmann Oliver Steffen (4): CI: don't force python verison (Linux only) CI: add ~/.local/bin to PATH (Linux only) CI: Use Fedora 35 container (Linux only) BaseTools: Remove ext. gcc dependencies (Linux only) .../templates/basetools-build-steps.yml | 9 -------- .../templates/platform-build-run-steps.yml | 7 ++++++ .../templates/pr-gate-build-job.yml | 3 +++ .azurepipelines/templates/pr-gate-steps.yml | 7 ++++++ .../.azurepipelines/Ubuntu-GCC5.yml | 6 ++--- BaseTools/Bin/gcc_aarch64_linux_ext_dep.yaml | 21 ------------------ BaseTools/Bin/gcc_arm_linux_ext_dep.yaml | 21 ------------------ .../Bin/gcc_riscv64_unknown_ext_dep.yaml | 22 ------------------- .../.azurepipelines/Ubuntu-GCC5.yml | 2 ++ .../.azurepipelines/Ubuntu-GCC5.yml | 6 ++--- 10 files changed, 23 insertions(+), 81 deletions(-) delete mode 100644 BaseTools/Bin/gcc_aarch64_linux_ext_dep.yaml delete mode 100644 BaseTools/Bin/gcc_arm_linux_ext_dep.yaml delete mode 100644 BaseTools/Bin/gcc_riscv64_unknown_ext_dep.yaml -- 2.37.1