-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Drop of commontorizon/?
images usage
#271
Comments
My preference is (1). We can try to bring down compile times, but the optimization only works for C++ anyway and not Rust. Another idea would be for Slint to provide C++ binary arm packages. We have some for Linux x86-64 already. |
What do you mean with this sentence? Thanks |
@escherstair let me address this relevant question Historically, CommonTorizon (including the https://github.com/commontorizon organization on GitHub) was born as an experiment to address two points:
At a later point in time, Toradex has created the https://github.com/torizon organization to keep some projects that were previously (some before CommonTorizon, some after) outside the more generic https://github.com/toradex organization That led to mismatch expectations and harder for customers to understand the relationship and stakes of Toradex and the SW development community. Due to this, we are planning to sunset the CommonTorizon organization, so all Torizon projects (even 3rd-party HW support and foster of an open-source SW community around Torizon) are all kept united under a single GitHub organization, https://github.com/torizon We understand this will make it easier for you, as a collaborator, and @tronical as a partner, to collaborate with us in the long term. In the short term, there will be decisions to make, things to move, questions to answer, and this might be a bit disruptive. For that I ask a bit of patience, and as you have more questions keep them coming so I also have a clear understanding of the community expectations. |
@escherstair from the Common Torizon github page: Acknowledgements
It was a mistake to have the If you would like to continue your contributions please follow up on https://github.com/torizon Thanks! |
@leograba I thought a little bit about your answer. Is this because Toradex (big thanks to Toradex for the Torizon OS) has the final word on what can or can't be handled inside torizon organization? |
@escherstair that's a good point.
This is a valid approach. I would be ok having the In practice, the https://github.com/torizon/torizon-containers/ repo is not yet structured in a way to receive external contributions and if anyone sends a PR there probably the first time we'll have to solve it - which may delay things a bit until we're ready. I'm just saying it to acknowledge you won't find concrete instructions or evidence that it's a community repo yet, because we are in the middle of this transition; but you can consider that repo as the place (at least for now) that will cherry-pick whatever makes sense from https://github.com/commontorizon/Containerfiles in the long-term.
I don't think this is binary. On one hand, Toradex has big stakes in fostering a community and is a major stakeholder in guiding the community and negotiating what is acceptable, what isn't, and especially transparently stating the reasons why - even if non-technical sometimes. Therefore, I feel it is our duty as maintainers to deny things that we don't agree with. But I also expect this will be the exception, not the rule. On the other hand, if Toradex starts blocking each and every contribution that will be bad (I don't expect this to happen), it is very likely that frustrated members of the community will start forking stuff as a response to a policy they don't agree with. This is a beautiful point of FOSS I think, because it empowers people to diverge if they can't agree and work together. But also I want to avoid it as much as I can and so far I don't remember any community contribution that was radically, unilaterally blocked. |
I agree to this. It makes sense. |
I've got some time to work on the Slint template and could drop the common torizon bits. I'm wondering: Should I based this work on torizon 6 and the current dev branch, or is this better done with Torizon 7? (How could that be done?) |
Hello @tronical, |
Thanks. Do those containers run with a torizon 6 host OS? |
With Torizon OS 6 they are still ok, the commontorizon ones will still work. Is just Torizon OS 7 which doesn't have the commontorizon ones |
@tronical /me as a community contributor decided to keep maintaining the So, with this clear, let me know if it's ok to you guys continue using the Obs: already updated and published images with Slint 1.9.1 commontorizon/Containerfiles@c3819f1 |
It’s okay to continue with the slint images. I’ll work on transitioning away from them. Wanted to do this in December but unfortunately more pressing things came up. Hoping to do this in Jan. For Rust dev they don’t provide any advantage. For C++ they do, but perhaps in the future we can solve that via binary C++ packages for armv7/v8 that we could add to our GitHub releases and then install in the app‘s docker container. |
Thank you! Much appreciated! |
The Common Torizon organization will be archived, and we should not use the containers from the
commontorizon/?
org anymore. This will be an issue for Torizon OS 7 update.Of the templates that "depend" on these images yet, the most important one is from the Slint partnership. So, @tronical we will have some options, and I would like your help to make the final decision and maintenance action.
slint/slint-sdk
or/andslint/slint-runtime
images:The text was updated successfully, but these errors were encountered: