-
Notifications
You must be signed in to change notification settings - Fork 0
201 lines (181 loc) · 7.24 KB
/
build.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
name: build
on:
push:
branches: [ "kirkstone" ]
pull_request:
branches: [ "kirkstone" ]
schedule:
- cron: "0 0 * * 5"
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
jobs:
prepare_container:
runs-on: self-hosted
outputs:
uid: ${{ steps.uid_step.outputs.userid }}
gid: ${{ steps.uid_step.outputs.groupid }}
steps:
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- uses: actions/checkout@v4
- name: Get user id/group
id: uid_step
run: |
echo "userid=$(id -u)" >> "$GITHUB_OUTPUT"
echo "groupid=$(id -g)" >> "$GITHUB_OUTPUT"
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
with:
buildkitd-config: /etc/docker/cibuilder.toml
- name: Login to Docker Registry
uses: docker/login-action@v3
with:
registry: ciserver.ci:5000
username: ${{ secrets.CI_CACHE_REGISTRY_LOGIN }}
password: ${{ secrets.CI_CACHE_REGISTRY_PASSWORD }}
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
tags: ciserver.ci:5000/${{ github.repository_id }}:latest
cache-from: type=registry,ref=ciserver.ci:5000/${{ github.repository_id }}:cache
cache-to: type=registry,ref=ciserver.ci:5000/${{ github.repository_id }}:cache,mode=max
file: conf/docker/Dockerfile
build-args: |
USER_ID=${{ steps.uid_step.outputs.userid }}
GROUP_ID=${{ steps.uid_step.outputs.groupid }}
build_images:
needs: prepare_container
runs-on: self-hosted
container:
image: ciserver.ci:5000/${{ github.repository_id }}:latest
credentials:
username: ${{ secrets.CI_CACHE_REGISTRY_LOGIN }}
password: ${{ secrets.CI_CACHE_REGISTRY_PASSWORD }}
options: --user "${{ needs.prepare_container.outputs.uid }}:${{ needs.prepare_container.outputs.gid }}"
outputs:
build_tag: ${{ steps.tag_step.outputs.build_tag }}
steps:
- name: Checkout repo
uses: actions/checkout@v4
with:
path: meta-solidrun-arm-hailo
- name: Get build tag
id: tag_step
run: |
build_tag=$(date +%Y-%m-%d)_$(cd meta-solidrun-arm-hailo; git rev-parse --short HEAD)
echo "build_tag=$build_tag" >> "$GITHUB_OUTPUT"
- name: Set branch for kas
if: github.event_name == 'pull_request'
run: |
sed -i '/meta-solidrun-arm-hailo/{:a;n;s/branch: kirkstone/branch: ${{ github.head_ref }}/;Ta}' meta-solidrun-arm-hailo/kas/hailo15-solidrun.yaml
cat meta-solidrun-arm-hailo/kas/hailo15-solidrun.yaml
- name: Checkout dependency layers
run: |
kas checkout meta-solidrun-arm-hailo/kas/hailo15-solidrun.yaml
- name: Create cache dir
run: mkdir -p buildcache
- name: Fetch cache from server
uses: tespkg/actions-cache/restore@v1
with:
endpoint: ciserver.ci
port: 9000
insecure: true
accessKey: ${{ secrets.CI_CACHE_MINIO_ACCESS }}
secretKey: ${{ secrets.CI_CACHE_MINIO_SECRET }}
bucket: cicache
use-fallback: false
key: ${{ github.repository }}
path: |
buildcache
- name: Build board tools
shell: bash
run: |
python3 -m pip wheel meta-hailo-soc/meta-hailo-bsp/hailo15_board_tools
- name: Build
shell: bash
run: |
iceccd --no-remote -s ciserver.ci -d
WORKDIR=$(pwd)
source poky/oe-init-build-env
export CACHE_DIR="$WORKDIR/buildcache"
export BB_ENV_PASSTHROUGH_ADDITIONS="$BB_ENV_PASSTHROUGH_ADDITIONS CACHE_DIR"
echo "require conf/includes/ci.conf" >> conf/local.conf
cat conf/local.conf
bitbake -c cleanall scu-bl scu-fw u-boot u-boot-tfa-image trusted-firmware-a-hailo
bitbake core-image-minimal --runall=fetch
bitbake core-image-minimal
- name: Update cache on the server
if: github.event_name == 'schedule' || github.event_name == 'workflow_dispatch'
uses: tespkg/actions-cache/save@v1
with:
endpoint: ciserver.ci
port: 9000
insecure: true
accessKey: ${{ secrets.CI_CACHE_MINIO_ACCESS }}
secretKey: ${{ secrets.CI_CACHE_MINIO_SECRET }}
bucket: cicache
use-fallback: false
key: ${{ github.repository }}
path: |
buildcache
- name: Copy deploy artifacts
shell: bash
run: |
mkdir deploy
BUILD_PATH=build/tmp/deploy/images/hailo15-solidrun
cp $BUILD_PATH/core-image-minimal-hailo15-solidrun.wic.zst deploy/
cp $BUILD_PATH/core-image-minimal-hailo15-solidrun.wic.bmap deploy/
cp $BUILD_PATH/customer_certificate.bin deploy/
cp $BUILD_PATH/fitImage deploy/
cp $BUILD_PATH/fitImage-core-image-flashing-ramdisk-hailo15-solidrun-hailo15-solidrun deploy/
cp $BUILD_PATH/hailo15_scu_bl.bin deploy/
cp $BUILD_PATH/hailo15_scu_fw.bin deploy/
cp $BUILD_PATH/scu_bl_cfg_a.bin deploy/
cp $BUILD_PATH/u-boot.dtb.signed deploy/
cp $BUILD_PATH/u-boot-initial-env deploy/
cp $BUILD_PATH/u-boot-spl.bin deploy/
cp $BUILD_PATH/u-boot-tfa.itb deploy/
cp $BUILD_PATH/hailo15_uart_recovery_fw.bin deploy/
cp hailo15_board_tools*.whl deploy/
- name: Deploy to the local minio storage
uses: yakubique/minio-upload@v1.1.3
with:
endpoint: http://ciserver.ci:9000
insecure: true
access_key: ${{ secrets.CI_CACHE_MINIO_ACCESS }}
secret_key: ${{ secrets.CI_CACHE_MINIO_SECRET }}
bucket: cipublish
source: ./deploy
target: "/${{ github.repository_id }}/${{ steps.tag_step.outputs.build_tag }}"
recursive: true
publish_images:
needs: build_images
runs-on: self-hosted
if: github.event_name == 'push'
steps:
- name: Download an artifacts from MinIO
uses: yakubique/minio-download@v1.1.1
with:
endpoint: http://ciserver.ci:9000
insecure: true
access_key: ${{ secrets.CI_CACHE_MINIO_ACCESS }}
secret_key: ${{ secrets.CI_CACHE_MINIO_SECRET }}
bucket: cipublish
source: "/${{ github.repository_id }}/${{ needs.build_images.outputs.build_tag }}/"
target: "."
recursive: true
- name: Assign a build tag
run: |
mkdir -p s3
tar cJf s3/solidrun-hailo15_${{ needs.build_images.outputs.build_tag }}.tar.xz \
-C deploy/ .
- name: Upload to S3
uses: shallwefootball/upload-s3-action@v1.3.3
with:
aws_key_id: ${{ secrets.IMAGES_S3_ACCESS }}
aws_secret_access_key: ${{ secrets.IMAGES_S3_SECRET }}
aws_bucket: ${{ secrets.IMAGES_S3_BUCKET }}
endpoint: ${{ secrets.IMAGES_S3_HOST }}
source_dir: s3
destination_dir: Hailo/hailo15/meta-solidrun-arm-hailo/${{ needs.build_images.outputs.build_tag }}