1
0
forked from brl/citadel
Commit Graph

9 Commits

Author SHA1 Message Date
5b8c330cb7 generate kernel.id in a more reliable way
The kernel id is a sha256sum that is embedded in the kernel image header
and also in the initramfs (in /etc/initrd-release). It exists so that
when resource images are being located during boot, the compatibility of
the citadel kernel image can be matched with the currently booting
kernel. This ensures that the correct set of modules will be mounted.

The kernel id had previously been calculated from the sha256sum of the
kernel binary before attaching the initramfs, but the sequence of steps
performed by poky when building a kernel changed and caused this method
to fail.

Now the sha256sum is calculated from the 'defconfig' file in the recipe
directory instead. This should work equally as well to uniquely identify
a kernel instance.
2020-11-30 10:10:56 -05:00
d623fa1746 use ext4 for images 2019-04-02 15:51:11 -04:00
e2877ad052 Only one recipe needed for citadel-tools now.
A cargo workspace was added to citadel-tools so everything can now
be built together
2019-01-17 11:47:49 -05:00
c17967b574 generate sha1sums of all files in an image 2019-01-16 21:32:42 -05:00
9d72f9638b read kernel id from a file, make compression optional 2019-01-15 12:05:28 -05:00
9695cf0964 Add build timestamp to metainfo of image 2019-01-07 18:57:38 -05:00
ab98492061 rename citadel-modules-image to citadel-kernel-image
...and add some metadata
2019-01-06 18:20:41 -05:00
6b59f72907 add cryptsetup-native as dependency, use symlinks to .ext2 image files 2019-01-05 22:39:42 -05:00
cbaad85617 New set of images: rootfs, modules, extra 2018-12-31 18:37:43 -05:00