OLD | NEW |
1 #!/bin/bash | 1 #!/bin/bash |
2 | 2 |
3 # Copyright (c) 2009 The Chromium OS Authors. All rights reserved. | 3 # Copyright (c) 2009 The Chromium OS Authors. All rights reserved. |
4 # Use of this source code is governed by a BSD-style license that can be | 4 # Use of this source code is governed by a BSD-style license that can be |
5 # found in the LICENSE file. | 5 # found in the LICENSE file. |
6 | 6 |
7 # Script to build a bootable keyfob-based chromeos system image from within | 7 # Script to build a bootable keyfob-based chromeos system image from within |
8 # a chromiumos setup. This assumes that all needed packages have been built into | 8 # a chromiumos setup. This assumes that all needed packages have been built into |
9 # the given target's root with binary packages turned on. This script will | 9 # the given target's root with binary packages turned on. This script will |
10 # build the Chrome OS image using only pre-built binary packages. | 10 # build the Chrome OS image using only pre-built binary packages. |
(...skipping 286 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
297 --rootfs_hash="${ROOT_FS_HASH}" | 297 --rootfs_hash="${ROOT_FS_HASH}" |
298 --rootfs_mountpoint="${ROOT_FS_DIR}" | 298 --rootfs_mountpoint="${ROOT_FS_DIR}" |
299 --statefulfs_mountpoint="${STATEFUL_FS_DIR}" | 299 --statefulfs_mountpoint="${STATEFUL_FS_DIR}" |
300 --espfs_mountpoint="${ESP_FS_DIR}" | 300 --espfs_mountpoint="${ESP_FS_DIR}" |
301 --verity_error_behavior="${FLAGS_verity_error_behavior}" | 301 --verity_error_behavior="${FLAGS_verity_error_behavior}" |
302 --verity_depth="${FLAGS_verity_depth}" | 302 --verity_depth="${FLAGS_verity_depth}" |
303 --verity_max_ios="${FLAGS_verity_max_ios}" | 303 --verity_max_ios="${FLAGS_verity_max_ios}" |
304 --verity_algorithm="${FLAGS_verity_algorithm}" | 304 --verity_algorithm="${FLAGS_verity_algorithm}" |
305 --keys_dir="${DEVKEYSDIR}" | 305 --keys_dir="${DEVKEYSDIR}" |
306 --usb_disk="${FLAGS_usb_disk}" | 306 --usb_disk="${FLAGS_usb_disk}" |
| 307 --arm_extra_bootargs="${FLAGS_arm_extra_bootargs}" |
307 --nocleanup_dirs | 308 --nocleanup_dirs |
308 ${enable_rootfs_verification_flag} | 309 ${enable_rootfs_verification_flag} |
309 EOF | 310 EOF |
310 } | 311 } |
311 | 312 |
312 # Modifies an existing image to add development packages | 313 # Modifies an existing image to add development packages |
313 update_dev_packages() { | 314 update_dev_packages() { |
314 local image_name=$1 | 315 local image_name=$1 |
315 | 316 |
316 echo "Adding developer packages to ${image_name}" | 317 echo "Adding developer packages to ${image_name}" |
(...skipping 351 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
668 echo "Developer image created as ${DEVELOPER_IMAGE_NAME}" | 669 echo "Developer image created as ${DEVELOPER_IMAGE_NAME}" |
669 fi | 670 fi |
670 | 671 |
671 print_time_elapsed | 672 print_time_elapsed |
672 | 673 |
673 echo "To copy to USB keyfob, OUTSIDE the chroot, do something like:" | 674 echo "To copy to USB keyfob, OUTSIDE the chroot, do something like:" |
674 echo " ./image_to_usb.sh --from=${OUTSIDE_OUTPUT_DIR} --to=/dev/sdX" | 675 echo " ./image_to_usb.sh --from=${OUTSIDE_OUTPUT_DIR} --to=/dev/sdX" |
675 echo "To convert to VMWare image, INSIDE the chroot, do something like:" | 676 echo "To convert to VMWare image, INSIDE the chroot, do something like:" |
676 echo " ./image_to_vm.sh --from=${OUTSIDE_OUTPUT_DIR}" | 677 echo " ./image_to_vm.sh --from=${OUTSIDE_OUTPUT_DIR}" |
677 echo "from the scripts directory where you entered the chroot." | 678 echo "from the scripts directory where you entered the chroot." |
OLD | NEW |