ccws repository

ccws repository

ccws repository

Repository Summary

Checkout URI https://github.com/asherikov/ccws.git
VCS Type git
VCS Version master
Last Updated 2025-04-03
Dev Status UNMAINTAINED
CI status No Continuous Integration
Released UNRELEASED
Tags No category tags.
Contributing Help Wanted (0)
Good First Issues (0)
Pull Requests to Review (0)

Packages

Name Version
@@PACKAGE@@ 0.1.0
conan_deps 0.1.0
conan_test 0.1.0
test_dependencies 0.1.0
nix_test 0.1.0
vcpkg_deps 0.1.0
vcpkg_test 0.1.0

README

CI status Build Status

Introduction

CCWS is a development environment for ROS, which integrates functionality of traditional catkin workspaces and CI pipelines in order to facilitate (cross-)compilation, testing, linting, documetation and binary package generation. It is intended to be used both as a CI/CD backbone and a working environment for developers. Note that CCWS is not intended to be a complete solution, but rather a basis for development of a vendor-specific workflow.

CCWS is ROS version agnostic, and should work in most cases for both ROS1 and ROS2.

Features

  • Build profiles – sets of configurations for build process, e.g., cmake toolchain, colcon configuration, environment variables, etc. Profiles do not conflict with each other and can be used in parallel without using separate clones of the workspace and packages.

  • Execution profiles – simple shell mixins that are intended to modify run time environment, e.g., execute nodes in valgrind, alter node crash handling, etc.

  • A number of features implemented via build profiles:
  • Package template which demonstrates how to use some of the features.

  • The number of parallel jobs can be selected based on available RAM instead of CPU cores, since RAM is likely to be the limiting factor.

  • Based entirely on make and shell scripts. All scripts and configurations are kept in the workspace and easy to adjust for specific needs.

Build profiles

Profile configurations are located in ccws/profiles/build, common subdirectory contains default parameters, which can be overriden by specific profiles:

  • [default] reldebug – default compiler, cmake build type is RelWithDebInfo
  • scan_build – compile with clang using scan_build and clang-tidy for static checks. clang-tidy parameters are defined in cmake toolchain and must be enabled in packages as shown in package template CMakeLists.
  • clang_tidy – a simplified version of scan_build without clang and scan_build.
  • thread_sanitizer – compilation with thread sanitizer.
  • addr_undef_sanitizers – compilation with address and undefined behavior sanitizers.
  • static_checks – static checkers and their configuration.
  • doxygen – doxygen and its configuration.
  • cross_raspberry_pi – cross-compilation for Raspberry Pi.
  • cross_jetson_xavier – cross-compilation for Jetson Xavier.
  • cross_jetson_nano – cross-compilation for Jetson Nano.
  • clangd – collects compilation commands from another profile and generates clangd configuration file in the workspace root.
  • deb – debian package generation (see below).

Execution profiles

Execution profiles set environment variables that can be used in launch scripts to alter run time behavior as demonstrated in ccws/pkg_template/catkin/launch/bringup.launch, currently available profiles are:

  • common – a set of common ROS parameters, e.g., ROS_HOME, it is automatically included in binary packages.
  • test – sets CCWS_NODE_CRASH_ACTION variable so that nodes that respect it become required, i.e., termination of such nodes would result in crash of test scripts and can thus be easily detected.
  • valgrind – sets CCWS_NODE_LAUNCH_PREFIX to valgrind and some variables that control behavior of valgrind.
  • core_pattern – sets core pattern to save core files in the artifacts directory.
  • address_sanitizer – helper for addr_undef_sanitizers profile.

Execution profiles have no effect on build process and are taken into account in *test* targets or debian packages. test execution profile is always used in tests and additional profiles can be provided with `EXEC_PROFILE=”

"`. These targets load profiles using `setup.bash` script located in the root folder of `CCWS`, which can also be used manually, e.g., `source setup.bash [ [ ...]]`. Note that the setup script always includes `common` profile, and uses `test` execution profile if no other execution profiles are specified. Dependencies ------------ Dependencies can be installed using `make bp_install_build BUILD_PROFILE=[,...]`, which is going to install the following tools and profile specific dependencies: - `colcon` - `yq` -- <https://github.com/asherikov/wshandler> dependency - `cmake` - `ccache` -- can be disabled in cmake toolchains - `wget` Usage ===== See `.ccws/test_main.mk` for command usage hints. Initial setup ------------- - Override developer and vendor specific parameters by adding them to `make/config.mk`, available parameters can be found in the top section of `Makefile`. - Install dependencies using `make bp_install_build BUILD_PROFILE=` targets, cross compilation profiles would require some extra steps as described below. In some minimalistic environments you may need to run `./ccws/scripts/bootstrap.sh` before using `bp_install_build` target in order to install `make` and other utils. - Clone packages in `src` subdirectory, or create new using `make new PKG=`. Compilation ----------- - `make build PKG=""` where `` is one or more space separated package names. - `make ` -- a shortcut for `make build`, but `` can be a substring of package name. All packages matching the given substring will be built. - The number of jobs can be overriden with `JOBS=X` parameter. - `make build PKG= BUILD_PROFILE=scan_build` overrides default profile. Running ------- - Source `setup.bash ` to be able to use packages. Setup scripts generated by `colcon` can also be used directly, e.g., `install//local_setup.sh`, but in this case some of `CCWS` functionality won't be available. Testing ------- - `make test PKG=` test with `colcon`, or `make wstest` to test all. - `make ctest PKG=` bypass `colcon` and run `ctest` directly or `make wsctest` to test all. Documentation ------------- - `make BUILD_PROFILE=doxygen`, `firefox artifacts/doxygen/index.html` - See example at <https://asherikov.github.io/ccws/> Debian package generation ------------------------- ### Overview `CCWS` takes a somewhat uncommon approach to binary package generation which is a middle ground between traditional ROS (1 package = 1 deb) and docker containers: all packages built in the workspace are packed together into a single debian 'superpackage'. Unlike `bloom` `CCWS` generates binary packages directly instead of generating source packages first. Binary package generation is implemented as a build profile mixin that can be overlayed over an arbitrary build profile: `make BUILD_PROFILE=deb,reldebug`. `CCWS` approach has a number of advantages: - Binary compatibility issues are minimized compared to traditional ROS approach: - no need to worry about compatibilities between multiple standalone binary packages and perform ABI checks; - if base ROS packages are included, it is also possible to avoid binary incompatibilities between syncs of the same ROS release (those actually happen). - Package repository management can be sloppier compared to ROS when it comes to tags, versions, git submodules, etc, e.g., there is no need to maintain release repos for all packages. - Debian 'superpackages' are easier to handle than both standalone packages and docker containers, e.g., they can be generated by developers from their working branches and easily copied and installed on the target. - Debian packages have some advantages over docker containers in general: - Zero overhead during execution. - Straightforward access to hardware. - Easy installation of system services, udev rules, configs, etc. - Multiple variants of binary 'superpackage' can be installed simultaneously if they are built using different `VERSION` parameter. Note that it alters installation path, so some workspace packages that are being "smart" with `cmake` may require cleaning build directory if they have been built earlier. ### Building packages Generally, it is necessary to install packages to the filesystem root during compilation in order to get all paths right in `catkin` `cmake` files and properly install system files. `CCWS` avoids this using `proot` similarly to cross-compilation profiles. Cross-compilation ----------------- Here `` stands for `cross_raspberry_pi`, `cross_jetson_xavier`, `cross_jetson_nano`. Cross-compilation make targets can be found in `ccws/make/cross.mk` and `ccws/profiles//targets.mk` Note on `cross_jetson_xavier` and `cross_jetson_nano`: these profiles require Ubuntu 18.04 / ROS melodic and install `nvcc`, you may want to do this in a container. The general workflow is documented below, for more technical details see `ccws/doc/cross-compilation.md` and `CCWS` CI test in `.ccws/test_cross.mk`: 1. Install profile dependencies with `make bp_install_build BUILD_PROFILE=` 2. Obtain system image: - `cross_raspberry_pi` -- `bp_install_build` target automatically downloads standard image; - `cross_jetson_xavier`, `cross_jetson_nano` -- `CCWS` does not obtain these images automatically, you have to manualy copy system partition image to `ccws/profiles/cross_jetson_xavier/system.img`. 3. Initialize source repositories: - `make wsinit REPOS="https://github.com/asherikov/staticoma.git"` - [when building all ROS packages] add ROS dependencies of all your packages to the workspace `make dep_to_repolist ROS_DISTRO=melodic`, or a specific package `make dep_to_repolist PKG= ROS_DISTRO=melodic`; - fetch all packages `make wsupdate`. 4. Install system dependencies of packages in your workspace to the system image: `make cross_install PKG=staticoma BUILD_PROFILE= ROS_DISTRO=` 5. Compile packages: - mount sysroot with `make cross_mount BUILD_PROFILE=` - build packages, e.g. `make staticoma BUILD_PROFILE=` or build and generate deb package `make deb PKG=staticoma BUILD_PROFILE=` - unmount sysroot when done with `make cross_umount BUILD_PROFILE=` Using `CCWS` docker =================== A docker image with preinstalled `CCWS` and dependencies is available for testing, but it is recommended to build a tailored image using `ccws/examples/Dockerfile` as an example. The image can be used in the following way: - `docker pull asherikov/ccws` - `mkdir tmp_ws` # sources, build, install, cache will go here - `docker run --rm -ti -v ./tmp_ws:/ccws/workspace asherikov/ccws bash` - `make wsinit REPOS="https://github.com/asherikov/qpmad.git"` - `...` Extending `CCWS` ================ `CCWS` functionality can be extended in multiple ways: - by adding new build profiles, e.g., `make bp_new BUILD_PROFILE=vendor_static_checks,static_checks`, all profiles starting with `vendor` prefix are ignored by git; - by adding execution profiles; - `make` targets can be added by creating a `ccws/profiles/build/vendor/.mk` file; - common `cmake` toolchain suffix can be added to `ccws/profiles/build/vendor/toolchain_suffix.cmake`. Known issues ============ - Segmentation fault during cross-compilation or debian package generation indside docker containers (both require `proot`): presumably due to `seccomp` Linux feature, which can be disabled with `--security-opt seccomp:unconfined` docker parameter. Disabling `seccomp` for `proot` with `PROOT_NO_SECCOMP=1` seems to be unnecessary. - Programs compiled with sanitizers (`addr_undef_sanitizers` or `thread_sanitizer` build profiles) output `2: AddressSanitizer:DEADLYSIGNAL` or `FATAL: ThreadSanitizer: unexpected memory mapping` when executed: the reason is tightened memory security with ASLR (address space layout randomization) in modern Linux kernels, see <https://github.com/google/sanitizers/issues/1614>. The issue can be alleviated by setting `sudo sysctl vm.mmap_rnd_bits=28`. - Some of ROS2 core packages cannot be built with `CCWS` due to cmake misuse, e.g., see <https://github.com/ament/google_benchmark_vendor/issues/17>. - `proot` segfault while building on arm64 in Ubuntu 22, e.g., while building debian packages. Newer version of `proot` has to be used, see <https://github.com/proot-me/proot/issues/312>. Related software ================ - <https://github.com/ros-industrial/industrial_ci> -- ROS specific CI scripts, noninteractive, "one-shot" design, no sanitizers, emulated cross compilation. - <https://github.com/ros-tooling/cross_compile/> -- emulated cross compilation for ROS and ROS2. - <https://github.com/HesselM/rpicross_notes> -- cross compilation for Raspberry Pi done in a different way. - <https://github.com/ros-tooling/action-ros-ci> -- `github` action that covers some of `CCWS` functionality. - <https://github.com/ros-infrastructure/ros_buildfarm>, <http://wiki.ros.org/buildfarm> -- the core of ROS packaging infrastructure. Complicated, specialized on handling of individual packages rather than workspaces, not suitable for quick field redeployments. - <https://github.com/colcon/colcon-bundle> provides functionality similar to 'superpackages' allowing to pack install space into a single archive. Naturally, it does not provide all the package features like dependencies, install scripts, etc. Moreover, it does not rely on chroot-like environment to ensure correct paths. TODO ==== Testing ------- - Fuzzing <https://github.com/rosin-project/ros2_fuzz>, <https://github.com/sslab-gatech/RoboFuzz>, <https://github.com/AFLplusplus/AFLplusplus>, <https://github.com/google/clusterfuzzlite>. - Add code coverage profile. - cmake 3.21: `--output-junit = Output test results to JUnit XML file.` Static checks ------------- - <https://github.com/myint/cppclean> might be useful for unnecessary header detection, but looks stale. - <https://github.com/mrtazz/checkmake> might be useful for makefile linting. - <https://github.com/include-what-you-use/include-what-you-use> - Potential replacement for `scan_build` <https://github.com/Ericsson/codechecker> with extra checks and caching. Dynamic checks -------------- - Add memory sanitizer profile as an alternative to `valgrind`. - Execution profile with <https://github.com/yugr/libdebugme> to automatically start debugger on a signal. - <https://github.com/yugr/valgrind-preload> as an alternative to `valgrind` execution profile -- an overkill in general case though. Build performance ----------------- - Replace `ccache` with <https://github.com/mbitsnbites/buildcache>. - <https://github.com/ejfitzgerald/clang-tidy-cache> or <https://github.com/mbitsnbites/buildcache> can be used to cache `clang-tidy` runs. - Cache cmake checks with <https://github.com/cristianadam/cmake-checks-cache>, <https://github.com/polysquare/cmake-forward-cache> might be useful too. - Build time analysis with clang <https://github.com/aras-p/ClangBuildAnalyzer> and / or <https://github.com/jrmadsen/compile-time-perf>. - Distributed compilation support with <https://github.com/distcc/distcc> can be useful. Build ----- - Reproducible builds <https://reproducible-builds.org/>. Packaging --------- - Investigate generation of debug and development packages, in particular stripping of static libraries and headers. - <https://github.com/jordansissel/fpm> -- generic binary package generator, potential replacement for `dpkg-deb`. Containers and images --------------------- - Build/deploy containers. - System images as OCI artifacts <https://oras.land/docs/>. - Generate system images in layered, container-like fashion <https://osinside.github.io/kiwi/overview.html>. - Root filesystem for crosscompilation from a container. Bookmarks (not going to be supported) ------------------------------------- - Shell formatter <https://github.com/mvdan/sh>. - <https://github.com/Tencent/TscanCode> -- C++ static analysis tool. - <https://github.com/DLu/roscompile/tree/main/roscompile> -- linter for catkin packages. - <https://github.com/git-afsantos/haros> -- ROS-aware static analysis, might have issues with non `catkin_make` build environments. - Control symbol visibility and verify with <https://github.com/yugr/ShlibVisibilityChecker>. - Integrate <https://github.com/oclint/oclint> - Source code spellcheck <https://github.com/myint/scspell>. - <https://github.com/sscpac/statick> is not going to be used, but some of its linters can be integrated. - Add `CodeQL` profile (<https://github.com/github/codeql>). - Use <https://libguestfs.org/> or <https://github.com/alperakcan/fuse-ext2> instead of loop devices, to avoid using sudo. There are some issues in Ubuntu though, bug 759725, see <https://libguestfs.org/guestfs-faq.1.html>. `guestfs` is too slow to be practical.

CONTRIBUTING

No CONTRIBUTING.md found.

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository

ccws repository