Prettify 'Developing Elements' documentation
Augment the developing_elements.rst by taking advantage of Sphinx markup. Most of the doc used to be in /README.md and thus did not leverage on Sphinx. Use inline codeblock to denote variables, files, command: ``foo`` Phase Subdirectories: List phase names in the preliminary introduction Get rid of lists in favor of definitions Highlight whether the phase runs in or outside the chroot Input parameters are now lists Use definition lists in Dependencies and Ramdisk sections. Link to elements README when they exist. Testing Element: split into two subsections: 'shell' and 'python'. Use "sourcecode:: sh" for the couple examples at the very top and very bottom of the document. Change-Id: I2421f76ec452cac243ccb2208f88c7d320ffedd3
This commit is contained in:
parent
6afe6577ac
commit
e8cecab45c
@ -6,8 +6,13 @@ Developing Elements
|
||||
Conform to the following conventions:
|
||||
|
||||
* Use the environment for overridable defaults, prefixing environment variable
|
||||
names with "DIB\_". For example: DIB\_MYDEFAULT=${DIB\_MYDEFAULT:-default}
|
||||
If you do not use the DIB\_ prefix you may find that your overrides are
|
||||
names with ``DIB_``. For example:
|
||||
|
||||
.. sourcecode:: sh
|
||||
|
||||
DIB_MYDEFAULT=${DIB_MYDEFAULT:-default}
|
||||
|
||||
If you do not use the ``DIB`` prefix you may find that your overrides are
|
||||
discarded as the build environment is sanitised.
|
||||
|
||||
* Consider that your element co-exists with many others and try to guard
|
||||
@ -15,27 +20,29 @@ Conform to the following conventions:
|
||||
|
||||
* Two elements use the source-repositories element, but use the same filename
|
||||
for the source-repositories config file. Files such as these (and indeed the
|
||||
scripts in the various .d directories listed below) should be named such
|
||||
that they are unique. If they are not unique, when the combined tree is
|
||||
created by disk-image-builder for injecting into the build environment, one
|
||||
of the files will be overwritten.
|
||||
scripts in the various .d directories :ref:`listed below
|
||||
<phase-subdirectories>`) should be named such that they are unique. If they
|
||||
are not unique, when the combined tree is created by disk-image-builder for
|
||||
injecting into the build environment, one of the files will be overwritten.
|
||||
|
||||
* Two elements copy different scripts into /usr/local/bin with the same name.
|
||||
If they both use set -e and cp -n then the conflict will be caught and cause
|
||||
the build to fail.
|
||||
* Two elements copy different scripts into ``/usr/local/bin`` with the same
|
||||
name. If they both use ``set -e`` and ``cp -n`` then the conflict will be
|
||||
caught and cause the build to fail.
|
||||
|
||||
* If your element mounts anything into the image build tree ($TMP\_BUILD\_DIR)
|
||||
then it will be automatically unmounted when the build tree is unmounted -
|
||||
and not remounted into the filesystem image - if the mount point is needed
|
||||
again, your element will need to remount it at that point.
|
||||
* If your element mounts anything into the image build tree (``$TMP_BUILD_DIR``)
|
||||
then it will be automatically unmounted when the build tree is unmounted - and
|
||||
not remounted into the filesystem image - if the mount point is needed again,
|
||||
your element will need to remount it at that point.
|
||||
|
||||
* If caching is required, elements should use a location under
|
||||
$DIB\_IMAGE\_CACHE.
|
||||
``$DIB_IMAGE_CACHE``.
|
||||
|
||||
* Elements should allow for remote data to be cached. When
|
||||
$DIB\_OFFLINE is set, this cached data should be used if
|
||||
possible. See the *Global image-build variables* section of this
|
||||
document for more information.
|
||||
* Elements should allow for remote data to be cached. When ``$DIB_OFFLINE`` is
|
||||
set, this cached data should be used if possible.
|
||||
See the :ref:`dev-global-image-build-variables` section of this document for
|
||||
more information.
|
||||
|
||||
.. _phase-subdirectories:
|
||||
|
||||
Phase Subdirectories
|
||||
^^^^^^^^^^^^^^^^^^^^
|
||||
@ -43,12 +50,26 @@ Phase Subdirectories
|
||||
Make as many of the following subdirectories as you need, depending on what
|
||||
part of the process you need to customise. The subdirectories are executed in
|
||||
the order given here. Scripts within the subdirectories should be named with a
|
||||
two-digit numeric prefix, and are executed in numeric order. Only files which
|
||||
are marked executable (+x) will be run, so other files can be stored in these
|
||||
directories if needed. As a convention, we try to only store executable scripts
|
||||
in the phase subdirectories and store data files elsewhere in the element.
|
||||
two-digit numeric prefix, and are executed in numeric order.
|
||||
|
||||
* root.d: Create or adapt the initial root filesystem content. This is where
|
||||
Only files which are marked executable (+x) will be run, so other files can be
|
||||
stored in these directories if needed. As a convention, we try to only store
|
||||
executable scripts in the phase subdirectories and store data files elsewhere in
|
||||
the element.
|
||||
|
||||
The phases are:
|
||||
|
||||
#. ``root.d``
|
||||
#. ``extra-data.d``
|
||||
#. ``pre-install.d``
|
||||
#. ``install.d``
|
||||
#. ``post-install.d``
|
||||
#. ``block-device.d``
|
||||
#. ``finalise.d``
|
||||
#. ``cleanup.d``
|
||||
|
||||
``root.d``
|
||||
Create or adapt the initial root filesystem content. This is where
|
||||
alternative distribution support is added, or customisations such as
|
||||
building on an existing image.
|
||||
|
||||
@ -56,60 +77,81 @@ in the phase subdirectories and store data files elsewhere in the element.
|
||||
to blindly overwrite but instead to adapt the context extracted by other
|
||||
elements.
|
||||
|
||||
* runs: outside chroot
|
||||
* inputs: $ARCH=i386|amd64|armhf $TARGET\_ROOT=/path/to/target/workarea
|
||||
* runs: **outside chroot**
|
||||
* inputs:
|
||||
|
||||
* extra-data.d: pull in extra data from the host environment that hooks may
|
||||
* ``$ARCH=i386|amd64|armhf``
|
||||
* ``$TARGET_ROOT=/path/to/target/workarea``
|
||||
|
||||
``extra-data.d``
|
||||
Pull in extra data from the host environment that hooks may
|
||||
need during image creation. This should copy any data (such as SSH keys,
|
||||
http proxy settings and the like) somewhere under $TMP\_HOOKS\_PATH.
|
||||
http proxy settings and the like) somewhere under ``$TMP_HOOKS_PATH``.
|
||||
|
||||
* runs: outside chroot
|
||||
* inputs: $TMP\_HOOKS\_PATH
|
||||
* outputs: None
|
||||
* runs: **outside chroot**
|
||||
* inputs: ``$TMP_HOOKS_PATH``
|
||||
* outputs: None
|
||||
|
||||
* pre-install.d: Run code in the chroot before customisation or packages are
|
||||
installed. A good place to add apt repositories.
|
||||
``pre-install.d``
|
||||
Run code in the chroot before customisation or packages are installed. A good
|
||||
place to add apt repositories.
|
||||
|
||||
* runs: in chroot
|
||||
* runs: **in chroot**
|
||||
|
||||
* install.d: Runs after pre-install.d in the chroot. This is a good place to
|
||||
install packages, chain into configuration management tools or do other
|
||||
image specific operations.
|
||||
``install.d``
|
||||
Runs after ``pre-install.d`` in the chroot. This is a good place to
|
||||
install packages, chain into configuration management tools or do other image
|
||||
specific operations.
|
||||
|
||||
* runs: in chroot
|
||||
* runs: **in chroot**
|
||||
|
||||
* post-install.d: Run code in the chroot. This is a good place to perform
|
||||
tasks you want to handle after the OS/application install but before the
|
||||
first boot of the image. Some examples of use would be: Run chkconfig
|
||||
to disable unneeded services and clean the cache left by the package
|
||||
manager to reduce the size of the image.
|
||||
``post-install.d``
|
||||
Run code in the chroot. This is a good place to perform tasks you want to
|
||||
handle after the OS/application install but before the first boot of the
|
||||
image. Some examples of use would be:
|
||||
|
||||
* runs: in chroot
|
||||
Run ``chkconfig`` to disable unneeded services
|
||||
|
||||
* block-device.d: customise the block device that the image will be made on
|
||||
(e.g. to make partitions). Runs after the target tree has been fully
|
||||
populated but before the cleanup hook runs.
|
||||
Clean the cache left by the package manager to reduce the size of the image.
|
||||
|
||||
* runs: outside chroot
|
||||
* inputs: $IMAGE\_BLOCK\_DEVICE={path} $TARGET\_ROOT={path}
|
||||
* outputs: $IMAGE\_BLOCK\_DEVICE={path}
|
||||
* runs: **in chroot**
|
||||
|
||||
* finalise.d: Perform final tuning of the root filesystem. Runs in a chroot
|
||||
after the root filesystem content has been copied into the mounted
|
||||
filesystem: this is an appropriate place to reset SELinux metadata, install
|
||||
grub bootloaders and so on. Because this happens inside the final image, it
|
||||
is important to limit operations here to only those necessary to affect the
|
||||
filesystem metadata and image itself. For most operations, post-install.d
|
||||
is preferred.
|
||||
``block-device.d``
|
||||
Customise the block device that the image will be made on (for example to
|
||||
make partitions). Runs after the target tree has been fully populated but
|
||||
before the ``cleanup.d`` phase runs.
|
||||
|
||||
* runs: in chroot
|
||||
* runs: **outside chroot**
|
||||
* inputs:
|
||||
|
||||
* cleanup.d: Perform cleanup of the root filesystem content. For
|
||||
instance, temporary settings to use the image build environment HTTP proxy
|
||||
are removed here in the dpkg element.
|
||||
* ``$IMAGE_BLOCK_DEVICE={path}``
|
||||
* ``$TARGET_ROOT={path}``
|
||||
|
||||
* outputs: ``$IMAGE_BLOCK_DEVICE={path}``
|
||||
|
||||
``finalise.d``
|
||||
Perform final tuning of the root filesystem. Runs in a chroot after the root
|
||||
filesystem content has been copied into the mounted filesystem: this is an
|
||||
appropriate place to reset SELinux metadata, install grub bootloaders and so
|
||||
on.
|
||||
|
||||
Because this happens inside the final image, it is important to limit
|
||||
operations here to only those necessary to affect the filesystem metadata and
|
||||
image itself. For most operations, ``post-install.d`` is preferred.
|
||||
|
||||
* runs: **in chroot**
|
||||
|
||||
``cleanup.d``
|
||||
Perform cleanup of the root filesystem content. For instance, temporary
|
||||
settings to use the image build environment HTTP proxy are removed here in
|
||||
the dpkg element.
|
||||
|
||||
* runs: outside chroot
|
||||
* inputs:
|
||||
|
||||
* ``$ARCH=i386|amd64|armhf``
|
||||
* ``$TARGET_ROOT=/path/to/target/workarea``
|
||||
|
||||
* runs: outside chroot
|
||||
* inputs: $ARCH=i386|amd64|armhf $TARGET\_ROOT=/path/to/target/workarea
|
||||
|
||||
Other Subdirectories
|
||||
^^^^^^^^^^^^^^^^^^^^
|
||||
@ -117,35 +159,42 @@ Other Subdirectories
|
||||
Elements may have other subdirectories that are processed by specific elements
|
||||
rather than the diskimage-builder tools themselves.
|
||||
|
||||
One example of this is the ``bin`` directory. The ``rpm-distro``, ``dpkg`` and
|
||||
``opensuse`` elements install all files found in the ``bin`` directory into
|
||||
``/usr/local/bin`` within the image as executable files.
|
||||
One example of this is the ``bin`` directory. The `rpm-distro`,
|
||||
:doc:`../elements/dpkg/README` and :doc:`../elements/opensuse/README` elements
|
||||
install all files found in the ``bin`` directory into ``/usr/local/bin`` within
|
||||
the image as executable files.
|
||||
|
||||
Environment Variables
|
||||
^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
To set environment variables for other hooks, add a file to environment.d.
|
||||
To set environment variables for other hooks, add a file to your element
|
||||
``environment.d``.
|
||||
|
||||
This directory contains bash script snippets that are sourced before running
|
||||
scripts in each phase.
|
||||
|
||||
DIB exposes an internal IMAGE\_ELEMENT variable which provides elements access
|
||||
to the full set of elements that are included in the image build. This can
|
||||
be used to process local in-element files across all the elements
|
||||
(pkg-map for example).
|
||||
DIB exposes an internal ``$IMAGE_ELEMENT`` variable which provides elements
|
||||
access to the full set of elements that are included in the image build. This
|
||||
can be used to process local in-element files across all the elements
|
||||
(``pkg-map`` for example).
|
||||
|
||||
Dependencies
|
||||
^^^^^^^^^^^^
|
||||
|
||||
Each element can use the following files to define or affect dependencies:
|
||||
|
||||
* element-deps: a plain text, newline separated list of elements which will
|
||||
be added to the list of elements built into the image at image creation time.
|
||||
``element-deps``
|
||||
A plain text, newline separated list of elements which will be added to the
|
||||
list of elements built into the image at image creation time.
|
||||
|
||||
* element-provides: A plain text, newline separated list of elements which
|
||||
are provided by this element. These elements will be excluded from elements
|
||||
built into the image at image creation time. For example if element A depends
|
||||
on element B and element C includes element B in its "element-provides"
|
||||
file and A and C are included when building an image, then B is not used.
|
||||
``element-provides``
|
||||
A plain text, newline separated list of elements which are provided by this
|
||||
element. These elements will be excluded from elements built into the image
|
||||
at image creation time.
|
||||
|
||||
For example if element A depends on element B and element C includes element B
|
||||
in its ``element-provides`` file and A and C are included when building an
|
||||
image, then B is not used.
|
||||
|
||||
Operating system elements
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
@ -166,18 +215,21 @@ Ramdisk Elements
|
||||
|
||||
Ramdisk elements support the following files in their element directories:
|
||||
|
||||
* binary-deps.d : text files listing executables required to be fed into the
|
||||
ramdisk. These need to be present in $PATH in the build chroot (i.e. need to
|
||||
be installed by your elements as described above).
|
||||
``binary-deps.d``
|
||||
Text files listing executables required to be fed into the ramdisk. These
|
||||
need to be present in ``$PATH`` in the build chroot (i.e. need to be installed
|
||||
by your elements as described above).
|
||||
|
||||
* init.d : POSIX shell script fragments that will be appended to the default
|
||||
script executed as the ramdisk is booted (/init).
|
||||
``init.d``
|
||||
POSIX shell script fragments that will be appended to the default script
|
||||
executed as the ramdisk is booted (``/init``).
|
||||
|
||||
* ramdisk-install.d : called to copy files into the ramdisk. The variable
|
||||
TMP\_MOUNT\_PATH points to the root of the tree that will be packed into
|
||||
the ramdisk.
|
||||
``ramdisk-install.d``
|
||||
Called to copy files into the ramdisk. The variable ``$TMP_MOUNT_PATH`` points
|
||||
to the root of the tree that will be packed into the ramdisk.
|
||||
|
||||
* udev.d : udev rules files that will be copied into the ramdisk.
|
||||
``udev.d``
|
||||
``udev`` rules files that will be copied into the ramdisk.
|
||||
|
||||
Element coding standard
|
||||
^^^^^^^^^^^^^^^^^^^^^^^
|
||||
@ -189,20 +241,24 @@ Element coding standard
|
||||
- `do` and `then` keywords should be on the same line as the if, while or
|
||||
for conditions.
|
||||
|
||||
.. _dev-global-image-build-variables:
|
||||
|
||||
Global image-build variables
|
||||
----------------------------
|
||||
|
||||
* DIB\_OFFLINE : this is always set. When not empty, any operations that
|
||||
perform remote data access should avoid it if possible. If not possible
|
||||
the operation should still be attempted as the user may have an external
|
||||
cache able to keep the operation functional.
|
||||
``DIB_OFFLINE``
|
||||
This is always set. When not empty, any operations that perform remote data
|
||||
access should avoid it if possible. If not possible the operation should still
|
||||
be attempted as the user may have an external cache able to keep the operation
|
||||
functional.
|
||||
|
||||
* DIB\_IMAGE\_ROOT\_FS\_UUID : this contains the UUID of the root fs, when
|
||||
diskimage-builder is building a disk image. This works only for ext
|
||||
filesystems.
|
||||
``DIB_IMAGE_ROOT_FS_UUID``
|
||||
This contains the UUID of the root filesystem, when diskimage-builder is
|
||||
building a disk image. This works only for ext filesystems.
|
||||
|
||||
* DIB\_IMAGE\_CACHE : path to where cached inputs to the build process
|
||||
are stored. Defaults to ~/.cache/image_create.
|
||||
``DIB_IMAGE_CACHE``
|
||||
Path to where cached inputs to the build process are stored. Defaults to
|
||||
``~/.cache/image_create``.
|
||||
|
||||
Structure of an element
|
||||
-----------------------
|
||||
@ -256,26 +312,26 @@ place it into a directory on the target image during the extra-data phase. The
|
||||
default location/branch can then be overridden by the process running
|
||||
diskimage-builder, making it possible to use the same element to track more
|
||||
then one branch of a git repository or to get source for a local cache. See
|
||||
elements/source-repositories/README.md for more information.
|
||||
:doc:`../elements/source-repositories/README` for more information.
|
||||
|
||||
Debugging elements
|
||||
------------------
|
||||
|
||||
The build-time environment and command line arguments are captured by the
|
||||
'base' element and written to /etc/dib\_environment and /etc/dib\_arguments
|
||||
inside the image.
|
||||
:doc:`../elements/base/README` element and written to ``/etc/dib_environment``
|
||||
and ``/etc/dib_arguments`` inside the image.
|
||||
|
||||
Export 'break' to drop to a shell during the image build. Break points can be
|
||||
Export ``break`` to drop to a shell during the image build. Break points can be
|
||||
set either before or after any of the hook points by exporting
|
||||
"break=[before|after]-hook-name". Multiple break points can be specified as a
|
||||
comma-delimited string. Some examples:
|
||||
|
||||
* break=before-block-device-size will break before the block device size hooks
|
||||
are called.
|
||||
* ``break=before-block-device-size`` will break before the block device size
|
||||
hooks are called.
|
||||
|
||||
* break=before-pre-install will break before the pre-install hooks.
|
||||
* ``break=before-pre-install`` will break before the pre-install hooks.
|
||||
|
||||
* break=after-error will break after an error during a in target hookpoint.
|
||||
* ``break=after-error`` will break after an error during an in target hookpoint.
|
||||
|
||||
Images are built such that the Linux kernel is instructed not to switch into
|
||||
graphical consoles (i.e. it will not activate KMS). This maximises
|
||||
@ -286,7 +342,7 @@ console so nova's console-log command can function. There is an element in the
|
||||
tripleo-image-elements repository called "remove-serial-console" which will
|
||||
force all boot messages to appear on the main console.
|
||||
|
||||
Ramdisk images can be debugged at run-time by passing "troubleshoot" as a
|
||||
Ramdisk images can be debugged at run-time by passing ``troubleshoot`` as a
|
||||
kernel command line argument, or by pressing "t" when an error is reached. This
|
||||
will spawn a shell on the console (this can be extremely useful when network
|
||||
interfaces or disks are not detected correctly).
|
||||
@ -294,42 +350,53 @@ interfaces or disks are not detected correctly).
|
||||
Testing Elements
|
||||
----------------
|
||||
|
||||
An element can have functional tests encapsulated inside the element itself. In
|
||||
order to create a test case, follow these steps:
|
||||
An element can have functional tests encapsulated inside the element itself. The
|
||||
tests can be written either as shell or python unit tests.
|
||||
|
||||
* Create a directory called 'test-elements' inside your element.
|
||||
shell
|
||||
"""""
|
||||
|
||||
In order to create a test case, follow these steps:
|
||||
|
||||
* Create a directory called ``test-elements`` inside your element.
|
||||
|
||||
* Inside the test-elements directory, create a directory with the name of your
|
||||
test case. The test case directory should have the same structure as an
|
||||
element.
|
||||
i.e. elements/apt-sources/test-elements/test-case-1
|
||||
element. For example::
|
||||
|
||||
elements/apt-sources/test-elements/test-case-1
|
||||
|
||||
* Assert state during each of the element build phases you would like to test.
|
||||
You can exit 1 to indicate a failure.
|
||||
|
||||
* To exit early and indicate a success, touch a file /tmp/dib-test-should-fail
|
||||
in the image chroot, then exit 1.
|
||||
* To exit early and indicate a success, touch a file
|
||||
``/tmp/dib-test-should-fail`` in the image chroot, then exit 1.
|
||||
|
||||
python
|
||||
""""""
|
||||
|
||||
Additionally, elements can be tested using python unittests. To create a
|
||||
a python test:
|
||||
|
||||
* Create a directory called 'tests' in the element directory.
|
||||
* Create a directory called ``tests`` in the element directory.
|
||||
|
||||
* Create an empty file called '\_\_init\_\_.py' to make it into a python
|
||||
* Create an empty file called ``__init__.py`` to make it into a python
|
||||
package.
|
||||
|
||||
* Create your test files as 'test\_whatever.py', using regular python test
|
||||
* Create your test files as ``test\whatever.py``, using regular python test
|
||||
code.
|
||||
|
||||
To run all the tests use testr - `testr run`. To run just some tests provide
|
||||
To run all the tests use testr - ``testr run``. To run just some tests provide
|
||||
one or more regex filters - tests matching any of them are run -
|
||||
`testr run apt-proxy`.
|
||||
``testr run apt-proxy``.
|
||||
|
||||
Third party elements
|
||||
--------------------
|
||||
|
||||
Additional elements can be incorporated by setting ELEMENTS_PATH, for example
|
||||
if one were building tripleo-images, the variable would be set like::
|
||||
Additional elements can be incorporated by setting ``ELEMENTS_PATH``, for
|
||||
example if one were building tripleo-images, the variable would be set like:
|
||||
|
||||
export ELEMENTS_PATH=tripleo-image-elements/elements
|
||||
disk-image-create rhel7 cinder-api
|
||||
.. sourcecode:: sh
|
||||
|
||||
export ELEMENTS_PATH=tripleo-image-elements/elements
|
||||
disk-image-create rhel7 cinder-api
|
||||
|
Loading…
x
Reference in New Issue
Block a user