ARMDeveloperEnvironment

Differences between revisions 28 and 30 (spanning 2 versions)
Revision 28 as of 2010-05-27 17:48:11
Size: 7225
Editor: bd7a3fd5
Comment:
Revision 30 as of 2010-05-27 18:56:50
Size: 7544
Editor: bd7a3fd5
Comment:
Deletions are marked like this. Additions are marked like this.
Line 24: Line 24:
{{{  {{{
Line 27: Line 27:
# Append the all packages from the PPA containing the private bits to the newly created archive. # Append all packages from the PPA containing the private bits to the newly created archive.
Line 31: Line 31:
}}}  }}}
Line 34: Line 34:
{{{  {{{
Line 43: Line 43:
tbd build # Make sure it builds correctly with your changes.
Line 45: Line 46:
}}}  }}}
Line 48: Line 49:
{{{  {{{
Line 53: Line 54:
}}}  }}}
Line 56: Line 57:
{{{  {{{
Line 58: Line 59:
}}}  }}}
Line 61: Line 62:
  * I think the delta visualization is going to be on the web UI, so this doesn't make sense here. -- GuilhermeSalgado
Line 64: Line 64:
  * Not sure this makes sense here either. -- GuilhermeSalgado
Line 67: Line 66:
{{{  {{{
Line 69: Line 68:
}}}  }}}
Line 79: Line 78:
The goal here is to provide a high-level interface with sensible defaults,
abstracting some of the low-level complexity of other utilities/frameworks that require more knowledge to be operated. 
The goal here is to provide a high-level interface with sensible defaults, abstracting some of the low-level complexity of the underlying utilities/frameworks.
Line 84: Line 82:
The tools should be able to operate on both local and remote archives, for both read and write operations. When writing they'll probably use the archive's HTTP RESTFUL API, and sftp to upload packages. Also they should be able to deal with archives hosted either on Launchpad or on [[Specs/M/ARMArchiveBranching|vostok]]. The tools should be able to operate on both local and remote archives, for both read and write operations. When writing they'll probably use the archive's HTTP RESTFUL API, and sftp to upload packages. Also they should be able to deal with archives hosted on either Launchpad.net or a [[Specs/M/ARMArchiveBranching|vostok]] instance.

- For long running operations, do we want to try and design some sort of progress report or should we rely just on an email sent by vostok when it's done?

- We'll need multiple OAuth credentials (e.g. for launchpad.net, archives.yap.com, etc), so we need to figure out which credentials to use depending on the arguments given.

The tools should not try to enforce any sort of version number rules, but it must provide appropriate version numbers by default so that users don't need to worry about that.
Line 88: Line 92:
- Protocol used when talking to server: HTTP; RESTFUL API, with OAuth for auth
- Data we might want to store locally:
   - global cache of packages!
   - OAuth credentials!
   - bazaar branches?
Line 101: Line 110:
 * A way of enforcing version number rules in a particular archive would be good. this is because we'll have to use fairly odd version numbering in downstream archives, so it'd be nice to have archives enforce their own rules for version numbering.
  * I assume this is to be enforced server-side, so should probably be moved to another spec? -- GuilhermeSalgado

 * automatic superseding and merging, to keep the archive in sync with its upstream. Must also be able to stop the automatic superseding/merging at any point (e.g. when freezing for a release).
  * This also sounds like server-side to me. -- GuilhermeSalgado
 * If we go with OAuth for the authentication, it means the user will need a browser to obtain the OAuth credentials, so it will be tricky to run the tools on a server. To workaround that we can either copy existing credentials to the server or ask the user for their password and do the oauth dance ourselves (a la ground control). The latter is a really nasty trick, IMO.

Summary

We want to provide a simple yet powerful set of tools to allow ARM developers to easily create/manage archives (including package uploads/builds) and generate images.

Rationale

Organizations need to generate their own images for testing and evaluation purposes, possibly including software that supports unreleased hardware or software with restricted redistribution rights. To generate such images they need to maintain an integrated set of software packages that can be installed on to their devices.

Definitions

See the Definitions section of ARMArchiveBranching and ARMArchiveFeatures

User stories

  1. Ted wants to generate an image for marvel doves, which require non-free software packages that are not included in Ubuntu but instead are packaged in a marvel PPA. Ted must be able to create a new archive (by branching the Ubuntu archive and marvel's PPA) and generate the image using the new archive.

    # Create a new archive containing the "standard" platform of Ubuntu's main archive.
    tbd branch http://archives.ubuntu.com/main https://archives.yap.com/marvel --platform=standard
    # Append all packages from the PPA containing the private bits to the newly created archive.
    tbd append-archive https://launchpad.net/~yap/+archive/private https://archives.yap.com/marvel
    # Generate an image to test the marvel doves.
    tbd gen-image https://archives.yap.com/marvel
  2. A partner is experimenting with a custom netbook UI but doesn't want to include it in their main archive until they've done some more testing, so they use the tools to create a slim archive and do any UI changes (or add new packages) there. Once they decide the UI has had enough testing, they push the changes from the slim archive back to their main one. (The slim archive could be hosted on LP, like a [private] PPA, as soon enough we'll be able to upload packages through sftp).
    # Create a new empty archive.
    tbd create https://archives.yap.com/new-netbook-ui
    # Create a workspace associated with the new archive.
    tbd make-workspace https://archives.yap.com/new-netbook-ui
    # Hack on an existing package or create a new one.
    apt-get source unity
    cd unity
    vi  # That's how you do it, right? ;)
    tbd build  # Make sure it builds correctly with your changes.
    # Push the package to the archive.
    tbd push
  3. YAP (Yet Another Partner) is working on optimizing their new (not-yet-released) chip, but for that they need a version of GCC newer than the one on the Ubuntu archive. They want to create a new (private) archive where they'll upload the new GCC version, but upgrading to that new version of GCC is known to break binary compatibility, so it must be possible for them to easily rebuild all packages using the new GCC and generate images out of the new binaries to ensure the resulting system works as expected.
    tbd branch https://archives.u.c/main https://archives.yap.com/new-gcc --platform=standard 
    tbd push gcc-4.5.dsc https://archives.yap.com/new-gcc
    tbd rebuild https://archives.yap.com/new-gcc  # This is going to take ages!
    tbd gen-image https://archives.yap.com/new-gcc
  4. YAP also has a separate team working on the UI for a device which will use their new chip, so they want to have yet another archive, based on the one containing the new GCC, where they'll make their UI changes without affecting other users of the archive containing the new GCC. The tools should allow them to do that as well.
    tbd branch https://archives.yap.com/new-gcc https://archives.yap.com/new-gcc-and-UI --platform=standard 
  5. During the development of YAP's latest device, it should be possible for them to easily see the changes done to the upstream archive since both archives diverged. They should also be able to review those changes and pull the ones they want into their archive.
  6. YAP has finished development of a new device and want to upstream the changes they've done when developing. They need to be able to see what are those changes, decide which ones should go upstream and submit them. Similarly, they should be able to easily pull some/all changes from the upstream archive.
  7. At the end of the development of their new device, YAP's engineers want to freeze their archive so that all package uploads have to be reviewed by their release team before they're accepted.
    tbd freeze https://archives.yap.com/new-device

Some of the features described here will depend on DerivedArchiveRebuild

Assumptions

  • Archives can be refered to by their URLs. (I think this is how we're going to tell the tools the archives they'll operate on)

Design

The goal here is to provide a high-level interface with sensible defaults, abstracting some of the low-level complexity of the underlying utilities/frameworks.

Users must be able to run any of the tools on either a Desktop or a Server. Also, the tools must not be tied to Launchpad, although they should probably take advantage of anything provided by Launchpad whenever desirable.

The tools should be able to operate on both local and remote archives, for both read and write operations. When writing they'll probably use the archive's HTTP RESTFUL API, and sftp to upload packages. Also they should be able to deal with archives hosted on either Launchpad.net or a vostok instance.

- For long running operations, do we want to try and design some sort of progress report or should we rely just on an email sent by vostok when it's done?

- We'll need multiple OAuth credentials (e.g. for launchpad.net, archives.yap.com, etc), so we need to figure out which credentials to use depending on the arguments given.

The tools should not try to enforce any sort of version number rules, but it must provide appropriate version numbers by default so that users don't need to worry about that.

Implementation

- Protocol used when talking to server: HTTP; RESTFUL API, with OAuth for auth - Data we might want to store locally:

  • - global cache of packages! - OAuth credentials! - bazaar branches?

UI Changes

All tools will probably have no UI other than their command-line arguments.

Test/Demo Plan

It's important that we are able to test new features, and demonstrate them to users. Use this section to describe a short plan that anybody can follow that demonstrates the feature is working. This can then be used during testing, and to show off after release. Please add an entry to http://testcases.qa.ubuntu.com/Coverage/NewFeatures for tracking test coverage.

This need not be added or completed until the specification is nearing beta.

Unresolved issues

  • If we go with OAuth for the authentication, it means the user will need a browser to obtain the OAuth credentials, so it will be tricky to run the tools on a server. To workaround that we can either copy existing credentials to the server or ask the user for their password and do the oauth dance ourselves (a la ground control). The latter is a really nasty trick, IMO.


CategorySpec

Specs/M/ARMDeveloperEnvironment (last edited 2010-06-08 10:57:12 by fw-unat)