Compare commits

..

48 Commits

Author SHA1 Message Date
45638dafe0 test repository dispatch 2024-09-16 04:16:56 +03:00
459b85604f tmp 2024-09-13 12:52:20 +03:00
bf6cad8a0a update readme and help 2024-09-13 12:52:20 +03:00
816c336a74 remove usage examples scripts 2024-09-13 12:52:20 +03:00
525e7d3019 build images from tasks by specifying a task id 2024-09-13 12:52:20 +03:00
549ab0d30b add p10 url 2024-09-13 12:52:20 +03:00
7eabf991a9 udpate build scripts for kubernetes
- Get source package version from the public altlinux api.
- Add build options: --dry-run, --push, --skip-build, --latest
- Separate build and push stages of images
2024-09-13 12:52:20 +03:00
ed94f75c7a [wip] add build scripts for k8s 2024-09-13 12:52:20 +03:00
e1de4abc3c wip 2024-09-13 12:52:20 +03:00
f7e8ff3059 add skip branch c10 for ansible image
Some checks failed
Building alt images / build-process (push) Successful in 6m4s
Building alt images / test-process (push) Failing after 1m46s
Full building alt images / build-process (push) Failing after 3h10m56s
Full building alt images / test-process (push) Has been cancelled
2024-09-03 15:05:37 +03:00
085e251c81 update tags.toml for cert-manager and flannel
All checks were successful
Full building alt images / build-process (push) Successful in 2h19m33s
Full building alt images / test-process (push) Has been skipped
2024-08-21 14:12:11 +03:00
704f9912e1 add ansible image
All checks were successful
Building alt images / build-process (push) Successful in 3m14s
Building alt images / test-process (push) Has been skipped
2024-08-21 12:57:54 +03:00
30c0e3df57 fix test for loki 2024-08-14 16:23:50 +03:00
430219d6d0 add temporary patchig sourceslist for p11 while it's not published
All checks were successful
Full building alt images / build-process (push) Successful in 2m11s
Full building alt images / test-process (push) Has been skipped
2024-08-14 12:27:01 +03:00
abddecf404 fix entrypoint in test by podman after usrmerge
All checks were successful
Building alt images / build-process (push) Successful in 5m47s
Building alt images / test-process (push) Successful in 1m47s
Full building alt images / build-process (push) Successful in 2m9s
Full building alt images / test-process (push) Has been skipped
2024-08-07 17:10:32 +03:00
78259d754d fix openjdk template
Some checks failed
Building alt images / build-process (push) Successful in 5m57s
Building alt images / test-process (push) Failing after 1m48s
2024-08-07 16:30:44 +03:00
cdb4d9d2f8 add new exclusion for images
Some checks failed
Building alt images / build-process (push) Successful in 6m18s
Building alt images / test-process (push) Failing after 2m8s
2024-08-07 15:59:23 +03:00
8da835e2b6 fix tests
All checks were successful
Building alt images / build-process (push) Successful in 6m31s
Building alt images / test-process (push) Successful in 1m57s
Full building alt images / build-process (push) Successful in 2h20m30s
Full building alt images / test-process (push) Has been skipped
2024-08-07 12:44:30 +03:00
3f4409b2c4 fix entrypoint in test by podman after usrmerge
Some checks failed
Building alt images / test-process (push) Has been cancelled
Building alt images / build-process (push) Has been cancelled
2024-08-07 11:46:59 +03:00
4a434a443b fix testing in single_wf
Some checks failed
Building alt images / build-process (push) Successful in 5m56s
Building alt images / test-process (push) Failing after 1m55s
2024-08-06 18:52:06 +03:00
79f5a1def4 fix build template for distroless-base image
Some checks failed
Building alt images / build-process (push) Successful in 6m22s
Building alt images / test-process (push) Failing after 1m32s
2024-08-06 18:14:07 +03:00
9145f4635d add workflow for single image building
All checks were successful
Building alt images / build-process (push) Successful in 2m55s
Building alt images / test-process (push) Has been skipped
2024-08-06 17:28:09 +03:00
2314b3aba8 add openjdk
All checks were successful
Full building alt images / build-process (push) Successful in 2h25m1s
Full building alt images / test-process (push) Has been skipped
2024-08-06 13:01:40 +03:00
63fc9e2440 add images postgresql rabbitmq 2024-08-06 13:01:40 +03:00
8e68d73e10 add tests to new images in org/alt 2024-08-06 13:01:40 +03:00
eb04d81fa7 docs: update README.md 2024-06-10 16:46:34 +03:00
4b4609ea9b add workflow for p11
Some checks failed
Full building alt images / test-process (push) Has been cancelled
Full building alt images / build-process (push) Has been cancelled
2024-06-10 13:05:48 +03:00
733f065152 fix grafana template 2024-06-10 13:05:26 +03:00
0e8a71d1cf add branch p11 2024-06-10 12:45:32 +03:00
359481a018 add images grafana loki golang php 2024-06-07 17:27:23 +03:00
8466221285 add images prometheus, python2 2024-06-04 18:47:09 +03:00
ab4b19f839 feat: add new cert-manager images
- cert-manager-startupapicheck
- cert-manager-acmesolver
2024-05-29 16:16:57 +03:00
3f432b2a9a feat: upadate cert-manager images 2024-05-29 16:16:36 +03:00
f8496320dd delete arches ppc64le arm from building script
All checks were successful
Full building alt images / build-process (push) Successful in 1h27m19s
Full building alt images / test-process (push) Successful in 5m33s
2024-05-08 18:20:50 +03:00
8cdee0b278 feat: Add trivy 2024-05-08 17:08:59 +03:00
8cc6581c18 fix systemd's label
Some checks failed
Full building alt images / build-process (push) Failing after 1m4s
Full building alt images / test-process (push) Has been skipped
2024-05-08 09:27:55 +03:00
4bef9210e6 docs: fix distroless-builder description 2024-05-03 13:05:11 +03:00
6944bb7158 feat: add labels to the k8s/kube-* images 2024-05-02 12:01:46 +03:00
e60d4a6450 refactor: make help message more readable 2024-05-01 18:50:33 +03:00
d31ae53893 fix: correct help message for -i/--images option 2024-05-01 18:49:45 +03:00
d3a5f23958 feat: add zot Dockerfile.template and test 2024-04-26 16:29:36 +03:00
f55f03f91d refactor: fix typo in install_pakage 2024-04-26 12:34:41 +03:00
fa20517058 add repo to /etc/host for building c10f2
All checks were successful
Full building alt images / build-process (push) Successful in 1h15m43s
Full building alt images / test-process (push) Successful in 5m1s
2024-04-25 11:15:52 +03:00
ad9a468aa6 update tags for k8s
Some checks failed
Full building alt images / build-process (push) Failing after 1m6s
Full building alt images / test-process (push) Has been cancelled
2024-04-23 17:43:14 +03:00
86fba1814f fix getting number of tech.issue for notifications to static number 1 (filter on tag doesn't work)
All checks were successful
Full building alt images / build-process (push) Successful in 1h16m21s
Full building alt images / test-process (push) Successful in 5m51s
2024-04-23 13:35:41 +03:00
28b280556b delete from workflow building images on c10f1/2 for arches arm, ppc
All checks were successful
Full building alt images / build-process (push) Successful in 2m17s
Full building alt images / test-process (push) Has been skipped
2024-04-23 13:09:37 +03:00
deee1706de add workflow for building all images on branches p10, c10f1/2
All checks were successful
Full building alt images / build-process (push) Successful in 5m55s
Full building alt images / test-process (push) Has been skipped
2024-04-22 17:24:17 +03:00
a59901c4bf add branches c10f1,c10f2 to list of options 2024-04-22 17:17:14 +03:00
149 changed files with 1092 additions and 1835 deletions

View File

@ -24,20 +24,25 @@ do
then imgpath="$2-$1/$IM:latest"
fi
entrypoint='/usr/bin/sh'
if [[ $1 == 'p10' ]]
then entrypoint='/bin/sh'
fi
command="echo empty_command"
if [[ $test != '' ]]; then
command="podman run --rm --entrypoint=\"/bin/sh\" $3/$imgpath -c \"$test\""
command="podman run --rm --entrypoint=\"$entrypoint\" $3/$imgpath -c \"$test\""
else
if [[ $IM = 'distroless-true' ]]; then
if [[ $IM == 'distroless-true' ]]; then
command="podman run --rm $3/$imgpath \"true\""
fi
if [[ $IM = 'distroless-gotop' ]]; then
if [[ $IM == 'distroless-gotop' ]]; then
command="podman run --rm $3/$imgpath \"--version\""
fi
if [[ $IM = 'flannel-cni-plugin' ]]; then
if [[ $IM == 'flannel-cni-plugin' ]]; then
command="podman run --rm $3/$imgpath \"/flannel\""
fi
if [[ $IM = 'pause' ]]; then
if [[ $IM == 'pause' ]]; then
command="podman run --rm $3/$imgpath \"/pause\" \"-v\""
fi
fi

View File

@ -25,6 +25,13 @@ jobs:
env:
GU: ${{ gitea.server_url }}
GR: ${{ gitea.repository }}
- name: Set repo for c10f2 (Temporary)
if: ${{ contains(github.ref_name, 'c10f2') }}
run: |
echo "event tag=${{ github.ref_name }}"
echo "10.4.0.3 update.altsp.su" >> /etc/hosts
echo "cat /etc/hosts"
cat /etc/hosts
- name: Update apt
uses: actions/init-alt-env@v1
- name: Install requires
@ -55,7 +62,6 @@ jobs:
id: build-script
run: |
build_args="-b $BR -o $ORG --skip-images alt/distroless-devel"
if [[ $BR == 'c10f1' || $BR == 'c10f2' ]]; then build_args="$build_args --skip-arches arm ppc64le"; fi
if [[ $ORG == 'k8s' ]]; then build_args="$build_args --tags tags.toml --overwrite-organization $ORG-$BR --skip-images k8s/kube-apiserver k8s/kube-controller-manager k8s/kube-proxy k8s/kube-scheduler"; fi
echo "build.py $build_args"
${{ gitea.workspace }}/build.py $build_args

View File

@ -0,0 +1,133 @@
name: Full building alt images
on:
push:
tags:
- 'p11_*'
jobs:
build-process:
runs-on: alt-sisyphus
outputs:
branch: ${{ env.BRANCH }}
org: ${{ env.ORG }}
url: ${{ env.URL }}
repo: ${{ env.REPO }}
buildres: ${{ steps.build-script.outcome }}
steps:
- name: Check workspace
run: |
repourl=$(echo $GU | cut -d '/' -f 3)
echo "URL=$repourl" >> ${GITHUB_ENV}
echo $repourl
reponame=$(echo $GR | cut -d '/' -f 1)
echo "REPO=$reponame" >> ${GITHUB_ENV}
echo $reponame
env:
GU: ${{ gitea.server_url }}
GR: ${{ gitea.repository }}
- name: Set repo for p11 (Temporary)
if: ${{ contains(github.ref_name, 'p11') }}
run: |
echo "event tag=${{ github.ref_name }}"
echo "10.4.0.3 update.altsp.su" >> /etc/hosts
echo "cat /etc/hosts"
cat /etc/hosts
- name: Update apt
uses: actions/init-alt-env@v1
- name: Install requires
run: |
echo "apt-get install -y python3-module-tomli python3-module-jinja2 podman buildah jq curl"
apt-get install -y python3-module-tomli python3-module-jinja2 podman buildah jq curl
echo "apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-ppc"
apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-ppc
- name: Check out current repo
uses: actions/checkout@v4
- name: Parse target branch and tag from events context, save to env
env:
EV: ${{ toJson(gitea.event) }}
run: |
echo $EV | jq '.ref' -r | sed "s/refs\/tags\//BRANCH=/g" | cut -d '_' -f 1
echo $EV | jq '.ref' -r | sed "s/refs\/tags\//BRANCH=/g" | cut -d '_' -f 1 >> ${GITHUB_ENV}
org=$(echo $EV | jq '.ref' -r | sed 's/refs\/tags\///g' | cut -d '_' -f 2)
echo "ORG=$org" >> ${GITHUB_ENV}
echo "ORG=$org"
- name: Login podman gitea
run: |
echo "podman login ${{ env.URL }}"
podman login --username $P_USER --password $P_PASS ${{ env.URL }}
env:
P_USER: ${{ secrets.PODMAN_USER }}
P_PASS: ${{ secrets.PODMAN_PASS }}
- name: Run building script
id: build-script
run: |
build_args="-b $BR -o $ORG --skip-images alt/distroless-devel"
if [[ $ORG == 'k8s' ]]; then build_args="$build_args --tags tags.toml --overwrite-organization $ORG-$BR --skip-images k8s/kube-apiserver k8s/kube-controller-manager k8s/kube-proxy k8s/kube-scheduler"; fi
echo "build.py $build_args"
${{ gitea.workspace }}/build.py $build_args
env:
ORG: ${{ env.ORG }}
BR: ${{ env.BRANCH }}
continue-on-error: true
- name: Send notification if build crashed
if: ${{ steps.build-script.outcome != 'success' }}
run: |
issueid=1
body="Building images finish with some errors."
curl -X 'POST' "$URL/api/v1/repos/$REPO/image-forge/issues/$issueid/comments?token=$T" -H 'accept: application/json' -H 'Content-Type: application/json' -d "{ \"body\": \"$body\" }" -s
echo "notification about test error is sent to issue $issueid"
env:
T: ${{ secrets.TOKEN }}
BR: ${{ env.BRANCH }}
URL: ${{ gitea.server_url }}
REPO: ${{ env.REPO }}
- name: Delete event tag
run: |
tagname=$(echo $EV | jq '.ref' -r | sed "s/refs\/tags\///g")
curl -X 'DELETE' "$URL/api/v1/repos/$REPO/image-forge/tags/$tagname?token=$T" -H 'accept: application/json' -s
echo "tag $tagname is deleted"
env:
T: ${{ secrets.TOKEN }}
BR: ${{ env.BRANCH }}
URL: ${{ gitea.server_url }}
REPO: ${{ env.REPO }}
EV: ${{ toJson(gitea.event) }}
test-process:
needs: build-process
if: ${{ needs.build-process.outputs.buildres == 'success' }}
runs-on: alt-sisyphus
steps:
- name: Update apt
uses: actions/init-alt-env@v1
- name: Install requires
run: |
echo "apt-get install -y python3-module-tomli python3-module-jinja2 podman buildah jq curl"
apt-get install -y python3-module-tomli python3-module-jinja2 podman buildah jq curl
- name: Check out current repo
uses: https://gitea.com/actions/checkout@v4
- name: Test
id: test-script
continue-on-error: true
run: |
$WS/.gitea/workflows/testscript $BR $ORG $URL $REPO $WS
cat haserr.log >> ${GITHUB_ENV}
echo "test process finished"
env:
BR: ${{ needs.build-process.outputs.branch }}
ORG: ${{ needs.build-process.outputs.org }}
URL: ${{ needs.build-process.outputs.url }}
REPO: ${{ needs.build-process.outputs.repo }}
WS: ${{ gitea.workspace }}
- name: Send notification if test crashed
if: ${{ env.ERR == 'true' || steps.test-script.outcome == 'failure' }}
run: |
issueid=1
errors=$(cat errors.log)
body="Testing images finish with some errors. $errors"
curl -X 'POST' "$URL/api/v1/repos/$REPO/image-forge/issues/$issueid/comments?token=$T" -H 'accept: application/json' -H 'Content-Type: application/json' -d "{ \"body\": \"$body\" }" -s
echo "notification about test error is sent to issue $issueid"
env:
T: ${{ secrets.TOKEN }}
BR: ${{ needs.build-process.outputs.branch }}
URL: ${{ gitea.server_url }}
REPO: ${{ needs.build-process.outputs.repo }}

View File

@ -55,7 +55,6 @@ jobs:
id: build-script
run: |
build_args="-b $BR -o $ORG --skip-images alt/distroless-devel"
if [[ $BR == 'sisyphus' ]]; then build_args="$build_args --skip-arches arm"; fi
if [[ $ORG == 'k8s' ]]; then build_args="$build_args --tags tags.toml --overwrite-organization $ORG-$BR --skip-images k8s/kube-apiserver k8s/kube-controller-manager k8s/kube-proxy k8s/kube-scheduler"; fi
echo "build.py $build_args"
${{ gitea.workspace }}/build.py $build_args

View File

@ -0,0 +1,147 @@
name: Building alt images
on:
push:
tags:
- '*_*/*'
jobs:
build-process:
runs-on: alt-latest
outputs:
branch: ${{ env.BRANCH }}
image: ${{ env.IMAGE }}
url: ${{ env.URL }}
repo: ${{ env.REPO }}
buildres: ${{ steps.build-script.outcome }}
test: ${{ env.TEST }}
steps:
- name: Check workspace
run: |
repourl=$(echo $GU | cut -d '/' -f 3)
echo "URL=$repourl" >> ${GITHUB_ENV}
echo "URL=$repourl"
reponame=$(echo $GR | cut -d '/' -f 1)
echo "REPO=$reponame" >> ${GITHUB_ENV}
echo "REPO=$reponame"
env:
GU: ${{ gitea.server_url }}
GR: ${{ gitea.repository }}
- name: Update apt
uses: actions/init-alt-env@v1
- name: Install requires
run: |
echo "apt-get install -y python3-module-tomli python3-module-jinja2 podman buildah jq curl"
apt-get install -y python3-module-tomli python3-module-jinja2 podman buildah jq curl
echo "apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-ppc"
apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-ppc
- name: Check out current repo
uses: actions/checkout@v4
- name: Login podman gitea
run: |
echo "podman login ${{ env.URL }}"
podman login --username $P_USER --password $P_PASS ${{ env.URL }}
env:
P_USER: ${{ secrets.PODMAN_USER }}
P_PASS: ${{ secrets.PODMAN_PASS }}
- name: Check files in the repository
run: |
ls -a ${{ gitea.workspace }}
- name: Parse target branch and tag from events context, save to env
env:
EV: ${{ toJson(gitea.event) }}
run: |
echo $EV | jq '.ref' -r | sed "s/refs\/tags\//BRANCH=/g" | cut -d '_' -f 1
echo $EV | jq '.ref' -r | sed "s/refs\/tags\//BRANCH=/g" | cut -d '_' -f 1 >> ${GITHUB_ENV}
localimage=$(echo $EV | jq '.ref' -r | sed 's/refs\/tags\///g' | cut -d '_' -f 2)
echo "IMAGE=$localimage" >> ${GITHUB_ENV}
echo "IMAGE=$localimage"
- name: Get test for image
run: |
if test -f ${{ gitea.workspace }}/org/$IM/test; then testscript=$(cat ${{ gitea.workspace }}/org/$IM/test); else testscript=""; fi
echo "TEST=$testscript" >> ${GITHUB_ENV}
env:
IM: ${{ env.IMAGE }}
BR: ${{ env.BRANCH }}
- name: Run building script
id: build-script
run: |
echo "build.py -i $IM -b $BR"
${{ gitea.workspace }}/build.py -i $IM -b $BR
env:
IM: ${{ env.IMAGE }}
BR: ${{ env.BRANCH }}
continue-on-error: true
- name: Send notification if build crashed
if: ${{ steps.build-script.outcome != 'success' }}
run: |
issueid=1
body="Building image $IM finish with some errors."
curl -X 'POST' "$URL/api/v1/repos/$REPO/image-forge/issues/$issueid/comments?token=$T" -H 'accept: application/json' -H 'Content-Type: application/json' -d "{ \"body\": \"$body\" }" -s
echo "notification about test error is sent to issue $issueid"
env:
T: ${{ secrets.TOKEN }}
BR: ${{ env.BRANCH }}
URL: ${{ gitea.server_url }}
REPO: ${{ env.REPO }}
IM: ${{ env.IMAGE }}
- name: Delete event tag
run: |
tagname=$(echo $EV | jq '.ref' -r | sed "s/refs\/tags\///g")
curl -X 'DELETE' "$URL/api/v1/repos/$REPO/image-forge/tags/$tagname?token=$T" -H 'accept: application/json' -s
echo "tag $tagname is deleted"
env:
T: ${{ secrets.TOKEN }}
BR: ${{ env.BRANCH }}
URL: ${{ gitea.server_url }}
REPO: ${{ env.REPO }}
EV: ${{ toJson(gitea.event) }}
test-process:
needs: build-process
if: ${{ needs.build-process.outputs.buildres == 'success' }}
runs-on: alt-latest
steps:
- name: Update apt
uses: https://gitea.basealt.ru/actions/init-alt-env@v1
- name: Install requires
run: |
echo "apt-get install -y python3-module-tomli python3-module-jinja2 podman buildah curl"
apt-get install -y python3-module-tomli python3-module-jinja2 podman buildah curl
- name: Run test
id: test-script
if: ${{ needs.build-process.outputs.test != '' }}
continue-on-error: true
run: |
if [[ $BR = 'p10' ]]; then podman run --rm --entrypoint="/bin/sh" $URL/$IM:$BR -c "$TEST"; else podman run --rm --entrypoint="/usr/bin/sh" $URL/$IM:$BR -c "$TEST"; fi
env:
IM: ${{ needs.build-process.outputs.image }}
BR: ${{ needs.build-process.outputs.branch }}
URL: ${{ needs.build-process.outputs.url }}
REPO: ${{ needs.build-process.outputs.repo }}
TEST: ${{ needs.build-process.outputs.test }}
- name: Run special test
id: special-test
if: ${{ needs.build-process.outputs.test == '' }}
continue-on-error: true
run: |
if [[ $IM = 'alt/distroless-true' ]]; then podman run --rm $URL/$IM:$BR true; fi
if [[ $IM = 'alt/distroless-gotop' ]]; then podman run --rm $URL/$IM:$BR --version; fi
env:
IM: ${{ needs.build-process.outputs.image }}
BR: ${{ needs.build-process.outputs.branch }}
URL: ${{ needs.build-process.outputs.url }}
REPO: ${{ needs.build-process.outputs.repo }}
- name: Send notification if test crashed
if: ${{ steps.test-script.outcome == 'failure' || steps.special-test.outcome == 'failure' }}
run: |
issueid=1
errors=$(cat errors.log)
body="Testing image $IM finish with some errors."
curl -X 'POST' "$URL/api/v1/repos/$REPO/image-forge/issues/$issueid/comments?token=$T" -H 'accept: application/json' -H 'Content-Type: application/json' -d "{ \"body\": \"$body\" }" -s
echo "notification about test error is sent to issue $issueid"
env:
T: ${{ secrets.TOKEN }}
BR: ${{ needs.build-process.outputs.branch }}
URL: ${{ gitea.server_url }}
REPO: ${{ needs.build-process.outputs.repo }}
IM: ${{ needs.build-process.outputs.image }}

View File

@ -0,0 +1,14 @@
name: Test repository dispatch
on:
repository_dispatch:
types: [build-single-image]
jobs:
test-repository-dispatch:
runs-on: alt-sisyphus
steps:
- name: Print debug message
run: |
echo $MESSAGE
env:
MESSAGE: ${{ gitea.event.client_payload.message }}

1
.gitignore vendored
View File

@ -0,0 +1 @@
Dockerfile

View File

@ -1,5 +1,22 @@
# image-forge
## Wrapper
### Examples
From the repository
```shell
image-build -b sisyphus -r registry.altlinux.org --prefix=k8s-sisyphus kube-apiserver kubernetes1.28
```
From a task
```shell
image-build -b sisyphus -r test.registry.altlinux.org -t 335250 --prefix=k8s-sisyphus kube-apiserver kubernetes1.28
```
## alt images
To build `alt` images, run:
```bash
@ -29,6 +46,7 @@ If you push to the users repository, then organiztion is your username.
## Dependencies
On x86_64 machine using p10 branch you need:
- `python3-module-tomli`
- `python3-module-jinja2`
- `qemu-user-static-binfmt-aarch64` to build for arm64 architecture
- `qemu-user-static-binfmt-arm` to build for arm architecture
- `qemu-user-static-binfmt-ppc` to build for ppc64le architecture

View File

@ -1,153 +0,0 @@
# Описание структуры каталогов для автоматизации рабочео процесса создания образов
## Общая структура каталогов
- Вместо каталога `org` предлагается использовать каталог `branch`
- Каталог `branch` содержит подкаталога бранчей (платформ):
* `sisyphus`;
* `p10`;
* `c10f1`;
* `c10f2`;
* ...
Подкаталоги бранчей содержат дерево групп образов.
Корневая группа `base` содержит образы, которые тегируются по дате создания.
Остальные группы тегируются по версии основного ПО, входящего в состав образа.
Каталог группы может содержать yml-файл `images.yml` описания группы.
Пример дерева описания образов:
<pre>
branch/sisyphus/
├── apache
├── base
│   ├── alt
│   ├── buildpack
│   │   ├── buildpack-deps-curl
│   │   └── buildpack-deps-scm
│   ├── devel
│   ├── distroless
│   │   ├── distroless-base
│   │   ├── distroless-builder
│   │   ├── distroless-devel
│   │   ├── distroless-gotop
│   │   ├── distroless-static
│   │   └── distroless-true
│   ├── systemd
│   └── unit
├── cert-manager
│   ├── cert-manager-cainjector
│   ├── cert-manager-controller
│   └── cert-manager-webhook
├── cni
│   └── flannel
│   ├── flannel
│   └── flannel-cni-plugin
├── gitea
├── k8s
│   ├── coredns
│   ├── deckhouse
│   │   ├── coredns
│   │   ├── etcd
│   │   ├── kube-apiserver
│   │   ├── kube-controller-manager
│   │   ├── kube-proxy
│   │   ├── kube-scheduler
│   │   └── pause
│   ├── etcd
│   ├── kube-apiserver
│   ├── kube-controller-manager
│   ├── kube-proxy
│   ├── kube-scheduler
│   └── pause
├── nginx
├── prometheus
├── python
├── registry
├── ruby
└── trivy
└── trivy-node-collector
</pre>
Конечный каталог дерева содержит файлы:
- **`Dockerfile`** - файл для сборки образа;
- **`image.yml`** - файл описания метаданных для образа.
Кроме этого конечный каталог может содержать файлы и каталоги, которые помещаются в образ командами `COPY` и `ADD`.
Все вышележащие до каталога конкретного бранча (`sisyphus`, `p10`, `c10f1`, `c10f2`, ...) описывают группу (возможно пустую), в которую входит образ.
Имя образа формируется как тропа дерева каталогов.
Например:
- `sisyphus/apache`
- `sisyphus/k8s/kube-apiserver`
Имя тега берется либо из файла `image.yml` описания образа, либо из файла описания группы `images.yml`.
## Конечный каталог описания образа
### Dockerfile
Предлагается заменить шаблон `Dockerfile.template` заменить на нативный `Dockerfile`.
Все параметры, подставляемые функцией `render_dockerfiles` скрипта
[/build.py](https://gitea.basealt.ru/alt/image-forge/src/branch/feature-new-layout/build.py#L249)
заменяются на аргументы (`ARG`), инициализируемые непосредственно в `Dockerfile`или передаваемые (с заиещением) при сборко образа параметрами `--build-arg="<ARG>=<VALUE>"`.
За исключением шаблона `{{ install_pakages("<пакет>" ...) }}`
Предлагается во все базовые дистрибутивы включить `shell-скрипт` `alt_install_pakages`, выполняющий функции аналогичные
python-функции [install_pakages](https://gitea.basealt.ru/alt/image-forge/src/branch/feature-new-layout/build.py#L250).
Шаблон `{{ install_pakages("<пакет>" ...) }}` заменяется в `Dockerfile` оператором:
```
RUN alt_install_pakages <пакет> ...
```
Пример файла образа `sisyphus/k8s/kube-apiserver`:
<pre>
ARG BRANCH REGISTRY=gitea.basealt.ru ALT_IMAGE=base/alt:$BRANCH MAINTAINER=alt-cloud ALT_TESTSCRIPT=/bin/true
FROM $REGISTRY/$ALT_IMAGE:$BRANCH
MAINTAINER $MAINTAINER
LABEL org.altlinux.testscript=$ALT_TESTSCRIPT
RUN alt_install_pakages kubernetes-master
ENTRYPOINT ["/usr/bin/kube-apiserver"]
</pre>
### Файл image.yml описания метаданных для образа
В настоящий момент он содержит (жирным шрифтом обязательные элементы):
* **`image.maintainer`** - E-mail майнтейнера для создания и проверки электронной подписи образа;
* `image.alias` - список возможных алиасов образа;
* `image.tag` - тер образа (может при сборке перекрываться тегом, взятым из вышележащего файла `images.yml` описания группы)
* `image.labels` - список дополнительных метов образа, в частности:
- `org.altlinux.testscript` - shell код для тестоиования образа при его запуске в режиме `podman ... -it --- <образ>`
Пример файла образа `sisyphus/k8s/kube-apiserver`:
<pre>
version: 1.0
image:
alias:
- k8s-${BRANCH}/${IMAGE}:${TAG}
labels:
org.altlinux.testscript: /bin/true
maintainer: stepchenkoas@basealt.ru
</pre>
## Каталог группы
### Файл `images.yml` описания метаданных группы

View File

@ -1,403 +0,0 @@
version: 1.0
imageSet:
- version: v1.26.0
cert-manager-cainjector:
tag: v1.26.0
cert-manager-controller:
tag: v1.26.0
cert-manager-webhook:
tag: v1.26.0
- version: v1.26.1
cert-manager-cainjector:
tag: v1.26.1
cert-manager-controller:
tag: v1.26.1
cert-manager-webhook:
tag: v1.26.1
- version: v1.26.2
cert-manager-cainjector:
tag: v1.26.2
cert-manager-controller:
tag: v1.26.2
cert-manager-webhook:
tag: v1.26.2
- version: v1.26.3
cert-manager-cainjector:
tag: v1.26.3
cert-manager-controller:
tag: v1.26.3
cert-manager-webhook:
tag: v1.26.3
- version: v1.26.4
cert-manager-cainjector:
tag: v1.26.4
cert-manager-controller:
tag: v1.26.4
cert-manager-webhook:
tag: v1.26.4
- version: v1.26.5
cert-manager-cainjector:
tag: v1.26.5
cert-manager-controller:
tag: v1.26.5
cert-manager-webhook:
tag: v1.26.5
- version: v1.26.6
cert-manager-cainjector:
tag: v1.26.6
cert-manager-controller:
tag: v1.26.6
cert-manager-webhook:
tag: v1.26.6
- version: v1.26.7
cert-manager-cainjector:
tag: v1.26.7
cert-manager-controller:
tag: v1.26.7
cert-manager-webhook:
tag: v1.26.7
- version: v1.26.8
cert-manager-cainjector:
tag: v1.26.8
cert-manager-controller:
tag: v1.26.8
cert-manager-webhook:
tag: v1.26.8
- version: v1.26.9
cert-manager-cainjector:
tag: v1.26.9
cert-manager-controller:
tag: v1.26.9
cert-manager-webhook:
tag: v1.26.9
- version: v1.26.10
cert-manager-cainjector:
tag: v1.26.10
cert-manager-controller:
tag: v1.26.10
cert-manager-webhook:
tag: v1.26.10
- version: v1.26.11
cert-manager-cainjector:
tag: v1.26.11
cert-manager-controller:
tag: v1.26.11
cert-manager-webhook:
tag: v1.26.11
- version: v1.26.12
cert-manager-cainjector:
tag: v1.26.12
cert-manager-controller:
tag: v1.26.12
cert-manager-webhook:
tag: v1.26.12
- version: v1.26.13
cert-manager-cainjector:
tag: v1.26.13
cert-manager-controller:
tag: v1.26.13
cert-manager-webhook:
tag: v1.26.13
- version: v1.26.14
cert-manager-cainjector:
tag: v1.26.14
cert-manager-controller:
tag: v1.26.14
cert-manager-webhook:
tag: v1.26.14
- version: v1.26.15
cert-manager-cainjector:
tag: v1.26.15
cert-manager-controller:
tag: v1.26.15
cert-manager-webhook:
tag: v1.26.15
- version: v1.27.0
cert-manager-cainjector:
tag: v1.27.0
cert-manager-controller:
tag: v1.27.0
cert-manager-webhook:
tag: v1.27.0
- version: v1.27.1
cert-manager-cainjector:
tag: v1.27.1
cert-manager-controller:
tag: v1.27.1
cert-manager-webhook:
tag: v1.27.1
- version: v1.27.2
cert-manager-cainjector:
tag: v1.27.2
cert-manager-controller:
tag: v1.27.2
cert-manager-webhook:
tag: v1.27.2
- version: v1.27.3
cert-manager-cainjector:
tag: v1.27.3
cert-manager-controller:
tag: v1.27.3
cert-manager-webhook:
tag: v1.27.3
- version: v1.27.4
cert-manager-cainjector:
tag: v1.27.4
cert-manager-controller:
tag: v1.27.4
cert-manager-webhook:
tag: v1.27.4
- version: v1.27.5
cert-manager-cainjector:
tag: v1.27.5
cert-manager-controller:
tag: v1.27.5
cert-manager-webhook:
tag: v1.27.5
- version: v1.27.6
cert-manager-cainjector:
tag: v1.27.6
cert-manager-controller:
tag: v1.27.6
cert-manager-webhook:
tag: v1.27.6
- version: v1.27.7
cert-manager-cainjector:
tag: v1.27.7
cert-manager-controller:
tag: v1.27.7
cert-manager-webhook:
tag: v1.27.7
- version: v1.27.8
cert-manager-cainjector:
tag: v1.27.8
cert-manager-controller:
tag: v1.27.8
cert-manager-webhook:
tag: v1.27.8
- version: v1.27.9
cert-manager-cainjector:
tag: v1.27.9
cert-manager-controller:
tag: v1.27.9
cert-manager-webhook:
tag: v1.27.9
- version: v1.27.10
cert-manager-cainjector:
tag: v1.27.10
cert-manager-controller:
tag: v1.27.10
cert-manager-webhook:
tag: v1.27.10
- version: v1.27.11
cert-manager-cainjector:
tag: v1.27.11
cert-manager-controller:
tag: v1.27.11
cert-manager-webhook:
tag: v1.27.11
- version: v1.27.12
cert-manager-cainjector:
tag: v1.27.12
cert-manager-controller:
tag: v1.27.12
cert-manager-webhook:
tag: v1.27.12
- version: v1.27.13
cert-manager-cainjector:
tag: v1.27.13
cert-manager-controller:
tag: v1.27.13
cert-manager-webhook:
tag: v1.27.13
- version: v1.27.14
cert-manager-cainjector:
tag: v1.27.14
cert-manager-controller:
tag: v1.27.14
cert-manager-webhook:
tag: v1.27.14
- version: v1.28.0
cert-manager-cainjector:
tag: v1.28.0
cert-manager-controller:
tag: v1.28.0
cert-manager-webhook:
tag: v1.28.0
- version: v1.28.1
cert-manager-cainjector:
tag: v1.28.1
cert-manager-controller:
tag: v1.28.1
cert-manager-webhook:
tag: v1.28.1
- version: v1.28.2
cert-manager-cainjector:
tag: v1.28.2
cert-manager-controller:
tag: v1.28.2
cert-manager-webhook:
tag: v1.28.2
- version: v1.28.3
cert-manager-cainjector:
tag: v1.28.3
cert-manager-controller:
tag: v1.28.3
cert-manager-webhook:
tag: v1.28.3
- version: v1.28.4
cert-manager-cainjector:
tag: v1.28.4
cert-manager-controller:
tag: v1.28.4
cert-manager-webhook:
tag: v1.28.4
- version: v1.28.5
cert-manager-cainjector:
tag: v1.28.5
cert-manager-controller:
tag: v1.28.5
cert-manager-webhook:
tag: v1.28.5
- version: v1.28.6
cert-manager-cainjector:
tag: v1.28.6
cert-manager-controller:
tag: v1.28.6
cert-manager-webhook:
tag: v1.28.6
- version: v1.28.7
cert-manager-cainjector:
tag: v1.28.7
cert-manager-controller:
tag: v1.28.7
cert-manager-webhook:
tag: v1.28.7
- version: v1.28.8
cert-manager-cainjector:
tag: v1.28.8
cert-manager-controller:
tag: v1.28.8
cert-manager-webhook:
tag: v1.28.8
- version: v1.28.9
cert-manager-cainjector:
tag: v1.28.9
cert-manager-controller:
tag: v1.28.9
cert-manager-webhook:
tag: v1.28.9
- version: v1.28.10
cert-manager-cainjector:
tag: v1.28.10
cert-manager-controller:
tag: v1.28.10
cert-manager-webhook:
tag: v1.28.10
- version: v1.29.0
cert-manager-cainjector:
tag: v1.29.0
cert-manager-controller:
tag: v1.29.0
cert-manager-webhook:
tag: v1.29.0
- version: v1.29.1
cert-manager-cainjector:
tag: v1.29.1
cert-manager-controller:
tag: v1.29.1
cert-manager-webhook:
tag: v1.29.1
- version: v1.29.2
cert-manager-cainjector:
tag: v1.29.2
cert-manager-controller:
tag: v1.29.2
cert-manager-webhook:
tag: v1.29.2
- version: v1.29.3
cert-manager-cainjector:
tag: v1.29.3
cert-manager-controller:
tag: v1.29.3
cert-manager-webhook:
tag: v1.29.3
- version: v1.29.4
cert-manager-cainjector:
tag: v1.29.4
cert-manager-controller:
tag: v1.29.4
cert-manager-webhook:
tag: v1.29.4
- version: v1.29.5
cert-manager-cainjector:
tag: v1.29.5
cert-manager-controller:
tag: v1.29.5
cert-manager-webhook:
tag: v1.29.5
- version: v1.30.0
cert-manager-cainjector:
tag: v1.30.0
cert-manager-controller:
tag: v1.30.0
cert-manager-webhook:
tag: v1.30.0
- version: v1.30.1
cert-manager-cainjector:
tag: v1.30.1
cert-manager-controller:
tag: v1.30.1
cert-manager-webhook:
tag: v1.30.1

View File

@ -1,13 +0,0 @@
FROM {{ registry }}{{ alt_image }}:{{ branch }}
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="flannel-cni-plugin"
LABEL org.opencontainers.image.description="CNI network plugin that is powered by flannel"
LABEL org.opencontainers.image.source="https://github.com/flannel-io/cni-plugin"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_pakages("cni-plugin-flannel") }}
RUN cp /usr/libexec/cni/flannel /flannel

View File

@ -1,28 +0,0 @@
FROM {{ registry }}{{ alt_image }}:{{ branch }}
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="flannel"
LABEL org.opencontainers.image.description="Network fabric for containers"
LABEL org.opencontainers.image.source="https://github.com/flannel-io/flannel"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_pakages(
"iproute2",
"net-tools",
"ca-certificates",
"iptables",
"iptables-nft",
"strongswan",
"wireguard-tools",
"flannel",
"wget",
) }}
RUN update-ca-trust
RUN mkdir -p /opt/bin/ && cp /usr/sbin/flanneld /opt/bin/flanneld
RUN cp /usr/libexec/flannel/mk-docker-opts.sh /opt/bin/
ENTRYPOINT ["/opt/bin/flanneld"]

View File

@ -1,147 +0,0 @@
version: 1.0
imageSet:
- version: v0.19.0
flannel:
tag: v0.19.0
'flannel-cni-plugin':
tag: v1.1.0
- version: v0.19.1
flannel:
tag: v0.19.1
'flannel-cni-plugin':
tag: v1.1.0
- version: v0.19.2
flannel:
tag: v0.19.2
'flannel-cni-plugin':
tag: v1.1.0
- version: v0.20.0
flannel:
tag: v0.20.0
'flannel-cni-plugin':
tag: v1.1.0
- version: v0.20.1
flannel:
tag: v0.20.1
'flannel-cni-plugin':
tag: v1.1.0
- version: v0.20.2
flannel:
tag: v0.20.2
'flannel-cni-plugin':
tag: v1.1.0
- version: v0.21.0
flannel:
tag: v0.21.0
'flannel-cni-plugin':
tag: v1.1.2
- version: v0.21.1
flannel:
tag: v0.21.1
'flannel-cni-plugin':
tag: v1.1.2
- version: v0.21.2
flannel:
tag: v0.21.2
'flannel-cni-plugin':
tag: v1.1.2
- version: v0.21.3
flannel:
tag: v0.21.3
'flannel-cni-plugin':
tag: v1.1.2
- version: v0.21.4
flannel:
tag: v0.21.4
'flannel-cni-plugin':
tag: v1.1.2
- version: v0.21.5
flannel:
tag: v0.21.5
'flannel-cni-plugin':
tag: v1.1.2
- version: v0.22.0
flannel:
tag: v0.22.0
'flannel-cni-plugin':
tag: v1.1.2
- version: v0.22.1
flannel:
tag: v0.22.1
'flannel-cni-plugin':
tag: v1.2.0
- version: v0.22.2
flannel:
tag: v0.22.2
'flannel-cni-plugin':
tag: v1.2.0
- version: v0.22.3
flannel:
tag: v0.22.3
'flannel-cni-plugin':
tag: v1.2.0
- version: v0.23.0
flannel:
tag: v0.23.0
'flannel-cni-plugin':
tag: v1.2.0
- version: v0.24.0
flannel:
tag: v0.24.0
'flannel-cni-plugin':
tag: v1.2.0
- version: v0.24.1
flannel:
tag: v0.24.1
'flannel-cni-plugin':
tag: v1.2.0
- version: v0.24.2
flannel:
tag: v0.24.2
'flannel-cni-plugin':
tag: v1.4.0-flannel1
- version: v0.24.3
flannel:
tag: v0.24.3
'flannel-cni-plugin':
tag: v1.4.0-flannel1
- version: v0.24.4
flannel:
tag: v0.24.4
'flannel-cni-plugin':
tag: v1.4.0-flannel1
- version: v0.25.0
flannel:
tag: v0.25.0
'flannel-cni-plugin':
tag: v1.4.0-flannel1
- version: v0.25.1
flannel:
tag: v0.25.1
'flannel-cni-plugin':
tag: v1.4.0-flannel1

View File

@ -1 +0,0 @@
../target/coredns/

View File

@ -1 +0,0 @@
../target/etcd/

View File

@ -1,803 +0,0 @@
version: 1.0
imageSet:
- version: v1.26.0
kube-apiserver:
tag: v1.26.0
kube-controllermanager:
tag: v1.26.0
kube-proxy:
tag: v1.26.0
kube-scheduler:
tag: v1.26.0
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.1
kube-apiserver:
tag: v1.26.1
kube-controllermanager:
tag: v1.26.1
kube-proxy:
tag: v1.26.1
kube-scheduler:
tag: v1.26.1
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.2
kube-apiserver:
tag: v1.26.2
kube-controllermanager:
tag: v1.26.2
kube-proxy:
tag: v1.26.2
kube-scheduler:
tag: v1.26.2
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.3
kube-apiserver:
tag: v1.26.3
kube-controllermanager:
tag: v1.26.3
kube-proxy:
tag: v1.26.3
kube-scheduler:
tag: v1.26.3
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.4
kube-apiserver:
tag: v1.26.4
kube-controllermanager:
tag: v1.26.4
kube-proxy:
tag: v1.26.4
kube-scheduler:
tag: v1.26.4
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.5
kube-apiserver:
tag: v1.26.5
kube-controllermanager:
tag: v1.26.5
kube-proxy:
tag: v1.26.5
kube-scheduler:
tag: v1.26.5
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.6
kube-apiserver:
tag: v1.26.6
kube-controllermanager:
tag: v1.26.6
kube-proxy:
tag: v1.26.6
kube-scheduler:
tag: v1.26.6
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.7
kube-apiserver:
tag: v1.26.7
kube-controllermanager:
tag: v1.26.7
kube-proxy:
tag: v1.26.7
kube-scheduler:
tag: v1.26.7
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.8
kube-apiserver:
tag: v1.26.8
kube-controllermanager:
tag: v1.26.8
kube-proxy:
tag: v1.26.8
kube-scheduler:
tag: v1.26.8
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.9
kube-apiserver:
tag: v1.26.9
kube-controllermanager:
tag: v1.26.9
kube-proxy:
tag: v1.26.9
kube-scheduler:
tag: v1.26.9
coredns:
tag: v1.9.3
etcd:
tag: 3.5.6-0
pause:
tag: 3.9
- version: v1.26.10
kube-apiserver:
tag: v1.26.10
kube-controllermanager:
tag: v1.26.10
kube-proxy:
tag: v1.26.10
kube-scheduler:
tag: v1.26.10
coredns:
tag: v1.9.3
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.26.11
kube-apiserver:
tag: v1.26.11
kube-controllermanager:
tag: v1.26.11
kube-proxy:
tag: v1.26.11
kube-scheduler:
tag: v1.26.11
coredns:
tag: v1.9.3
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.26.12
kube-apiserver:
tag: v1.26.12
kube-controllermanager:
tag: v1.26.12
kube-proxy:
tag: v1.26.12
kube-scheduler:
tag: v1.26.12
coredns:
tag: v1.9.3
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.26.13
kube-apiserver:
tag: v1.26.13
kube-controllermanager:
tag: v1.26.13
kube-proxy:
tag: v1.26.13
kube-scheduler:
tag: v1.26.13
coredns:
tag: v1.9.3
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.26.14
kube-apiserver:
tag: v1.26.14
kube-controllermanager:
tag: v1.26.14
kube-proxy:
tag: v1.26.14
kube-scheduler:
tag: v1.26.14
coredns:
tag: v1.9.3
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.26.15
kube-apiserver:
tag: v1.26.15
kube-controllermanager:
tag: v1.26.15
kube-proxy:
tag: v1.26.15
kube-scheduler:
tag: v1.26.15
coredns:
tag: v1.9.3
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.27.0
kube-apiserver:
tag: v1.27.0
kube-controllermanager:
tag: v1.27.0
kube-proxy:
tag: v1.27.0
kube-scheduler:
tag: v1.27.0
coredns:
tag: v1.10.1
etcd:
tag: 3.5.7-0
pause:
tag: 3.9
- version: v1.27.1
kube-apiserver:
tag: v1.27.1
kube-controllermanager:
tag: v1.27.1
kube-proxy:
tag: v1.27.1
kube-scheduler:
tag: v1.27.1
coredns:
tag: v1.10.1
etcd:
tag: 3.5.7-0
pause:
tag: 3.9
- version: v1.27.2
kube-apiserver:
tag: v1.27.2
kube-controllermanager:
tag: v1.27.2
kube-proxy:
tag: v1.27.2
kube-scheduler:
tag: v1.27.2
coredns:
tag: v1.10.1
etcd:
tag: 3.5.7-0
pause:
tag: 3.9
- version: v1.27.3
kube-apiserver:
tag: v1.27.3
kube-controllermanager:
tag: v1.27.3
kube-proxy:
tag: v1.27.3
kube-scheduler:
tag: v1.27.3
coredns:
tag: v1.10.1
etcd:
tag: 3.5.7-0
pause:
tag: 3.9
- version: v1.27.4
kube-apiserver:
tag: v1.27.4
kube-controllermanager:
tag: v1.27.4
kube-proxy:
tag: v1.27.4
kube-scheduler:
tag: v1.27.4
coredns:
tag: v1.10.1
etcd:
tag: 3.5.7-0
pause:
tag: 3.9
- version: v1.27.5
kube-apiserver:
tag: v1.27.5
kube-controllermanager:
tag: v1.27.5
kube-proxy:
tag: v1.27.5
kube-scheduler:
tag: v1.27.5
coredns:
tag: v1.10.1
etcd:
tag: 3.5.7-0
pause:
tag: 3.9
- version: v1.27.6
kube-apiserver:
tag: v1.27.6
kube-controllermanager:
tag: v1.27.6
kube-proxy:
tag: v1.27.6
kube-scheduler:
tag: v1.27.6
coredns:
tag: v1.10.1
etcd:
tag: 3.5.7-0
pause:
tag: 3.9
- version: v1.27.7
kube-apiserver:
tag: v1.27.7
kube-controllermanager:
tag: v1.27.7
kube-proxy:
tag: v1.27.7
kube-scheduler:
tag: v1.27.7
coredns:
tag: v1.10.1
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.27.8
kube-apiserver:
tag: v1.27.8
kube-controllermanager:
tag: v1.27.8
kube-proxy:
tag: v1.27.8
kube-scheduler:
tag: v1.27.8
coredns:
tag: v1.10.1
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.27.9
kube-apiserver:
tag: v1.27.9
kube-controllermanager:
tag: v1.27.9
kube-proxy:
tag: v1.27.9
kube-scheduler:
tag: v1.27.9
coredns:
tag: v1.10.1
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.27.10
kube-apiserver:
tag: v1.27.10
kube-controllermanager:
tag: v1.27.10
kube-proxy:
tag: v1.27.10
kube-scheduler:
tag: v1.27.10
coredns:
tag: v1.10.1
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.27.11
kube-apiserver:
tag: v1.27.11
kube-controllermanager:
tag: v1.27.11
kube-proxy:
tag: v1.27.11
kube-scheduler:
tag: v1.27.11
coredns:
tag: v1.10.1
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.27.12
kube-apiserver:
tag: v1.27.12
kube-controllermanager:
tag: v1.27.12
kube-proxy:
tag: v1.27.12
kube-scheduler:
tag: v1.27.12
coredns:
tag: v1.10.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.27.13
kube-apiserver:
tag: v1.27.13
kube-controllermanager:
tag: v1.27.13
kube-proxy:
tag: v1.27.13
kube-scheduler:
tag: v1.27.13
coredns:
tag: v1.10.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.27.14
kube-apiserver:
tag: v1.27.14
kube-controllermanager:
tag: v1.27.14
kube-proxy:
tag: v1.27.14
kube-scheduler:
tag: v1.27.14
coredns:
tag: v1.10.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.28.0
kube-apiserver:
tag: v1.28.0
kube-controllermanager:
tag: v1.28.0
kube-proxy:
tag: v1.28.0
kube-scheduler:
tag: v1.28.0
coredns:
tag: v1.10.1
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.28.1
kube-apiserver:
tag: v1.28.1
kube-controllermanager:
tag: v1.28.1
kube-proxy:
tag: v1.28.1
kube-scheduler:
tag: v1.28.1
coredns:
tag: v1.10.1
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.28.2
kube-apiserver:
tag: v1.28.2
kube-controllermanager:
tag: v1.28.2
kube-proxy:
tag: v1.28.2
kube-scheduler:
tag: v1.28.2
coredns:
tag: v1.10.1
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.28.3
kube-apiserver:
tag: v1.28.3
kube-controllermanager:
tag: v1.28.3
kube-proxy:
tag: v1.28.3
kube-scheduler:
tag: v1.28.3
coredns:
tag: v1.10.1
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.28.4
kube-apiserver:
tag: v1.28.4
kube-controllermanager:
tag: v1.28.4
kube-proxy:
tag: v1.28.4
kube-scheduler:
tag: v1.28.4
coredns:
tag: v1.10.1
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.28.5
kube-apiserver:
tag: v1.28.5
kube-controllermanager:
tag: v1.28.5
kube-proxy:
tag: v1.28.5
kube-scheduler:
tag: v1.28.5
coredns:
tag: v1.10.1
etcd:
tag: 3.5.9-0
pause:
tag: 3.9
- version: v1.28.6
kube-apiserver:
tag: v1.28.6
kube-controllermanager:
tag: v1.28.6
kube-proxy:
tag: v1.28.6
kube-scheduler:
tag: v1.28.6
coredns:
tag: v1.10.1
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.28.7
kube-apiserver:
tag: v1.28.7
kube-controllermanager:
tag: v1.28.7
kube-proxy:
tag: v1.28.7
kube-scheduler:
tag: v1.28.7
coredns:
tag: v1.10.1
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.28.8
kube-apiserver:
tag: v1.28.8
kube-controllermanager:
tag: v1.28.8
kube-proxy:
tag: v1.28.8
kube-scheduler:
tag: v1.28.8
coredns:
tag: v1.10.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.28.9
kube-apiserver:
tag: v1.28.9
kube-controllermanager:
tag: v1.28.9
kube-proxy:
tag: v1.28.9
kube-scheduler:
tag: v1.28.9
coredns:
tag: v1.10.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.28.10
kube-apiserver:
tag: v1.28.10
kube-controllermanager:
tag: v1.28.10
kube-proxy:
tag: v1.28.10
kube-scheduler:
tag: v1.28.10
coredns:
tag: v1.10.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.29.0
kube-apiserver:
tag: v1.29.0
kube-controllermanager:
tag: v1.29.0
kube-proxy:
tag: v1.29.0
kube-scheduler:
tag: v1.29.0
coredns:
tag: v1.11.1
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.29.1
kube-apiserver:
tag: v1.29.1
kube-controllermanager:
tag: v1.29.1
kube-proxy:
tag: v1.29.1
kube-scheduler:
tag: v1.29.1
coredns:
tag: v1.11.1
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.29.2
kube-apiserver:
tag: v1.29.2
kube-controllermanager:
tag: v1.29.2
kube-proxy:
tag: v1.29.2
kube-scheduler:
tag: v1.29.2
coredns:
tag: v1.11.1
etcd:
tag: 3.5.10-0
pause:
tag: 3.9
- version: v1.29.3
kube-apiserver:
tag: v1.29.3
kube-controllermanager:
tag: v1.29.3
kube-proxy:
tag: v1.29.3
kube-scheduler:
tag: v1.29.3
coredns:
tag: v1.11.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.29.4
kube-apiserver:
tag: v1.29.4
kube-controllermanager:
tag: v1.29.4
kube-proxy:
tag: v1.29.4
kube-scheduler:
tag: v1.29.4
coredns:
tag: v1.11.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.29.5
kube-apiserver:
tag: v1.29.5
kube-controllermanager:
tag: v1.29.5
kube-proxy:
tag: v1.29.5
kube-scheduler:
tag: v1.29.5
coredns:
tag: v1.11.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.30.0
kube-apiserver:
tag: v1.30.0
kube-controllermanager:
tag: v1.30.0
kube-proxy:
tag: v1.30.0
kube-scheduler:
tag: v1.30.0
coredns:
tag: v1.11.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9
- version: v1.30.1
kube-apiserver:
tag: v1.30.1
kube-controllermanager:
tag: v1.30.1
kube-proxy:
tag: v1.30.1
kube-scheduler:
tag: v1.30.1
coredns:
tag: v1.11.1
etcd:
tag: 3.5.12-0
pause:
tag: 3.9

View File

@ -1,11 +0,0 @@
ARG BRANCH REGISTRY=gitea.basealt.ru ALT_IMAGE=base/alt:$BRANCH MAINTAINER=alt-cloud ALT_TESTSCRIPT=/bin/true
FROM $REGISTRY/$ALT_IMAGE:$BRANCH
MAINTAINER $MAINTAINER
LABEL org.altlinux.testscript=$ALT_TESTSCRIPT
RUN alt_install_pakages kubernetes-master
ENTRYPOINT ["/usr/bin/kube-apiserver"]

View File

@ -1,7 +0,0 @@
version: 1.0
image:
alias:
- k8s-${BRANCH}/${IMAGE}:${TAG}
labels:
org.altlinux.testscript: /bin/true
maintainer: stepchenkoas@basealt.ru

View File

@ -1,9 +0,0 @@
ARG BRANCH REGISTRY=gitea.basealt.ru ALT_IMAGE=base/alt:$BRANCH MAINTAINER=alt-cloud ALT_TESTSCRIPT=/bin/true
FROM $REGISTRY/$ALT_IMAGE:$BRANCH
MAINTAINER $MAINTAINER
RUN alt_install_pakages kubernetes-master
ENTRYPOINT ["/usr/bin/kube-controller-manager"]

View File

@ -1,7 +0,0 @@
version: 1.0
image:
alias:
- k8s-${BRANCH}/${IMAGE}:${TAG}
labels:
org.altlinux.testscript: /bin/true
maintainer: stepchenkoas@basealt.ru

View File

@ -1,11 +0,0 @@
ARG BRANCH REGISTRY=gitea.basealt.ru ALT_IMAGE=base/alt:$BRANCH MAINTAINER=alt-cloud ALT_TESTSCRIPT=/bin/true
FROM $REGISTRY/$ALT_IMAGE:$BRANCH
MAINTAINER $MAINTAINER
RUN alt_install_pakages kubernetes-node
RUN ln -s /usr/bin/kube-proxy /usr/local/bin/kube-proxy
ENTRYPOINT ["/usr/bin/kube-proxy"]

View File

@ -1,7 +0,0 @@
version: 1.0
image:
alias:
- k8s-${BRANCH}/${IMAGE}:${TAG}
labels:
org.altlinux.testscript: /bin/true
maintainer: stepchenkoas@basealt.ru

View File

@ -1,9 +0,0 @@
ARG BRANCH REGISTRY=gitea.basealt.ru ALT_IMAGE=base/alt:$BRANCH MAINTAINER=alt-cloud ALT_TESTSCRIPT=/bin/true
FROM $REGISTRY/$ALT_IMAGE:$BRANCH
MAINTAINER $MAINTAINER
RUN alt_install_pakages kubernetes-master
ENTRYPOINT ["/usr/bin/kube-scheduler"]

View File

@ -1,7 +0,0 @@
version: 1.0
image:
alias:
- k8s-${BRANCH}/${IMAGE}:${TAG}
labels:
org.altlinux.testscript: /bin/true
maintainer: stepchenkoas@basealt.ru

View File

@ -1,13 +0,0 @@
ARG BRANCH REGISTRY=gitea.basealt.ru ALT_IMAGE=base/alt:$BRANCH MAINTAINER=alt-cloud ALT_TESTSCRIPT=/bin/true
FROM $REGISTRY/$ALT_IMAGE:$BRANCH as installer
RUN alt_install_pakages kubernetes-pause
FROM scratch
MAINTAINER $MAINTAINER
COPY --from=installer /usr/bin/kubernetes-pause /pause
CMD ["/pause"]

View File

@ -1,7 +0,0 @@
version: 1.0
image:
alias:
- k8s-${BRANCH}/${IMAGE}:${TAG}
labels:
org.altlinux.testscript: /bin/true
maintainer: stepchenkoas@basealt.ru

View File

@ -1,17 +0,0 @@
ARG BRANCH REGISTRY=gitea.basealt.ru ALT_IMAGE=base/alt:$BRANCH MAINTAINER=alt-cloud ALT_TESTSCRIPT=/bin/true
FROM $REGISTRY/$ALT_IMAGE:$BRANCH
MAINTAINER $MAINTAINER
LABEL org.opencontainers.image.title="apache2"
LABEL org.opencontainers.image.description="The most widely used Web server on the Internet"
LABEL org.opencontainers.image.source="http://httpd.apache.org"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
RUN alt_install_pakages apache2
EXPOSE 80
CMD ["/usr/sbin/httpd2", "-D", "NO_DETACH", "-k", "start"]

View File

@ -1,16 +0,0 @@
ARG BRANCH REGISTRY=gitea.basealt.ru ALT_IMAGE=base/alt:$BRANCH MAINTAINER=alt-cloud ALT_TESTSCRIPT=/bin/true
FROM $REGISTRY/$ALT_IMAGE:$BRANCH
MAINTAINER $MAINTAINER
LABEL org.opencontainers.image.title="coredns"
LABEL org.opencontainers.image.description="CoreDNS is a DNS server that chains plugins"
LABEL org.opencontainers.image.source="https://github.com/coredns/coredns"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
LABEL org.altlinux.testscript=$ALT_TESTSCRIPT
RUN alt_install_pakages coredns
ENTRYPOINT ["/usr/bin/coredns"]

View File

@ -1,7 +0,0 @@
version: 1.0
image:
alias:
- k8s-${BRANCH}/${IMAGE}:${TAG}
labels:
org.altlinux.testscript: /bin/true
maintainer: stepchenkoas@basealt.ru

View File

@ -1,17 +0,0 @@
FROM {{ registry }}{{ alt_image }}:{{ branch }}
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="trivy-node-collector"
LABEL org.opencontainers.image.description="Open source collector who collect Node information (fs and process data) and output in a table/json format"
LABEL org.opencontainers.image.source="https://github.com/aquasecurity/k8s-node-collector"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_pakages(
"k8s-trivy-node-collector"
) }}
RUN ln -s /usr/bin/k8s-trivy-node-collector /usr/bin/node-collector
ENTRYPOINT ["node-collector"]

View File

@ -15,6 +15,7 @@ from jinja2 import Template
ORG_DIR = Path("org")
PKG_VERSION: str = ""
class Image:
def __init__(self, canonical_name):
@ -225,7 +226,7 @@ class DockerBuilder:
self,
template: str,
organization: str,
install_pakages=None,
install_packages=None,
**kwargs,
) -> str:
if self.registry:
@ -237,7 +238,7 @@ class DockerBuilder:
rendered = Template(template).render(
alt_image=alt_image,
branch=self.branch,
install_pakages=install_pakages,
install_packages=install_packages,
organization=organization,
registry=registry,
**kwargs,
@ -247,7 +248,7 @@ class DockerBuilder:
@forall_images(consume_result=True)
def render_dockerfiles(self, **kwargs):
def install_pakages(*names):
def install_packages(*names):
tasks = self.tasks.get(self.branch, kwargs["image"])
linux32 = '$([ "$(rpm --eval %_host_cpu)" = i586 ] && echo linux32)'
if tasks:
@ -273,7 +274,7 @@ class DockerBuilder:
rendered = self.render_template(
dockerfile_template.read_text(),
self.overwrite_organization,
install_pakages,
install_packages,
)
kwargs["dockerfile"].write_text(rendered + "\n")
@ -578,6 +579,7 @@ class DockerBuilder:
"--force-rm",
f"--manifest={manifest}",
f"--platform={platforms}",
f'--build-arg=PKG_VERSION={PKG_VERSION}',
".",
]
self.run(build_cmd, cwd=image.path)
@ -638,8 +640,8 @@ class ImagesInfo:
def parse_args():
stages = ["build", "remove_dockerfiles", "render_dockerfiles", "push"]
arches = ["amd64", "386", "arm64", "arm", "ppc64le"]
branches = ["p9", "p10", "sisyphus", "c10f1", "c10f2"]
arches = ["amd64", "386", "arm64"]
branches = ["p11", "p10", "sisyphus", "c10f1", "c10f2"]
organizations = list(ORG_DIR.iterdir())
images = [f"{o.name}/{i.name}" for o in organizations for i in o.iterdir()]
organizations = [o.name for o in organizations]
@ -654,7 +656,8 @@ def parse_args():
nargs="+",
default=images,
choices=images,
help="list of branches",
metavar="IMAGE_NAME",
help="list of images to build",
)
images_group.add_argument(
"-o",
@ -664,6 +667,14 @@ def parse_args():
choices=organizations,
help="build all images from these organizations",
)
parser.add_argument(
"--skip-images",
nargs="+",
default=[],
choices=images,
metavar="IMAGE_NAME",
help="list of images to skip",
)
parser.add_argument(
"-r",
"--registry",
@ -696,27 +707,20 @@ def parse_args():
parser.add_argument(
"--sign",
)
parser.add_argument(
"--skip-images",
nargs="+",
default=[],
choices=images,
help="list of skipping images",
)
parser.add_argument(
"-a",
"--arches",
nargs="+",
default=arches,
choices=arches,
help="list of arches",
help="build images for these architectures",
)
parser.add_argument(
"--skip-arches",
nargs="+",
default=[],
choices=arches,
help="list of skipping arches",
help="list of architectures to skip",
)
parser.add_argument(
"-b",
@ -724,28 +728,32 @@ def parse_args():
nargs="+",
default=branches,
choices=branches,
help="list of branches",
help="build images for these branches",
)
parser.add_argument(
"--skip-branches",
nargs="+",
default=[],
choices=branches,
help="list of skipping branches",
help="list of branches to skip",
)
parser.add_argument(
"--stages",
nargs="+",
default=stages,
choices=stages,
help="list of stages",
help="list of stages to go through",
)
parser.add_argument(
"--skip-stages",
nargs="+",
default=[],
choices=stages,
help="list of skipping stages",
help="list of stages to skip",
)
parser.add_argument(
"--package-version",
help="from which package to build",
)
args = parser.parse_args()
@ -758,7 +766,10 @@ def parse_args():
def main():
global PKG_VERSION
args = parse_args()
PKG_VERSION = args.package_version
arches = args.arches
images_info = ImagesInfo()
tags = Tags(args.tags, args.latest)

267
image-build Executable file
View File

@ -0,0 +1,267 @@
#!/bin/sh
set -uo pipefail
PROG='image-build'
HELP_MSG="$(cat <<EOF
$PROG - build an OCI image from a package
Usage: $PROG [options] <image name> <package name>
Options:
-b <branch> package repository branch
-r <registry> OCI destination registry
-t <task id> task id
--latest also tag this image as latest
--push push the image to the registry after build
--skip-build if push is true, then skip the build stage
--dry-run only print what would be done
--prefix <prefix> image name prefix
--help show this text and exit
Notes:
The image is only pushed to the destination registry
if the option --push is present.
EOF
)"
function show_help() {
printf '%s' "$HELP_MSG"
exit
}
function show_usage() {
echo "$PROG: $1" >&2
echo "Try \`image-build --help' for more information." >&2
exit 1
}
TEMP="$(getopt -n "$PROG" -o b:r:t: -l help,latest,push,skip-build,dry-run,prefix:: -- "$@")" || show_usage ""
eval set -- "$TEMP"
branch='sisyphus'
registry='registry.altlinux.org'
task_id=
latest=
push=
skip_build=
dry_run=
prefix=
while :; do
case "$1" in
--) shift; break ;;
-b) shift; branch="$1" ;;
-r) shift; registry="$1" ;;
-t) shift; task_id="$1" ;;
--latest) latest="1" ;;
--push) push="1" ;;
--skip-build) skip_build="1" ;;
--dry-run) dry_run="1" ;;
--prefix) shift; prefix="$1" ;;
-h|--help) show_help ;;
*) show_usage "unrecognized option: $1" ;;
esac
shift
done
[ "$#" -ge 2 ] || show_usage "not enough arguments"
image="$1"
package="$2"
declare -A package_urls
package_urls["c10f2"]="http://update.altsp.su/pub/distributions/ALTLinux/c10f2/branch/files/x86_64/RPMS/"
package_urls["p10"]="http://ftp.altlinux.org/pub/distributions/archive/p10/release/latest/files/x86_64/RPMS/"
package_urls["sisyphus"]="http://ftp.altlinux.org/pub/distributions/archive/sisyphus/latest/files/x86_64/RPMS/"
function handle_error() {
echo "$PROG: $1" >&2
exit 2
}
function get_binary_package_version() {
local branch="$1"
local package="$2"
local line;
line="$(curl -s "${package_urls["$branch"]}" | grep "$package")"
[ "$?" -eq 0 ] || handle_error "package not found: $package"
local version;
version="$(echo "$line" | sed -E "s/.*href=\"$package-(.+)-.+\".+/\1/")"
[ "$?" -eq 0 ] || handle_error "package version not found: $package"
echo "$version"
}
function api_get_source_package_version() {
local branch="$1"
local package="$2"
local version;
version="$(curl -s "https://rdb.altlinux.org/api/site/package_versions_from_tasks?branch=$branch&name=$package" | jq -e -r '.versions[0].version')"
[ "$?" -eq 0 ] || handle_error "error getting package version: no package $package for branch $branch"
echo "$version"
}
function api_get_source_package_version_from_task() {
local task_id="$1"
local package="$2"
local version;
version="$(curl -s "https://rdb.altlinux.org/api/task/packages/$task_id" | jq -e -r --arg package "$package" '.subtasks[].source | select(.name == $package).version')"
[ "$?" -eq 0 ] || handle_error "error getting package version: no package $package in task $task_id"
echo "$version"
}
case "$image" in
'coredns' | \
'etcd' | \
'flannel' | \
'flannel-cni-plugin' | \
'pause' | \
'cert-manager-acmesolver' | \
'cert-manager-cainjector' | \
'cert-manager-controller' | \
'cert-manager-startupapicheck' | \
'cert-manager-webhook')
image="k8s/$image"
version=
additional_options=
if [ -n "$task_id" ]; then
version="$(api_get_source_package_version_from_task "$task_id" "$package")"
[ "$?" -eq 0 ] || handle_error "error getting remote rpm package version: $package, task: $task_id"
tasks_file='/tmp/k8s-tasks.toml'
jq --null-input --arg branch "$branch" --arg task_id "$task_id" --arg image "$image" '{
$branch: {$task_id: [$image]},
}' | dasel -r json -w toml > "$tasks_file"
additional_options+="--tasks $tasks_file "
else
# temporary, why does rdb return 'not found'?
case "$image" in
'k8s/pause')
version='3.9'
;;
*)
version="$(api_get_source_package_version "$branch" "$package")"
[ "$?" -eq 0 ] || handle_error "error getting remote rpm package version: $package, branch: $branch"
;;
esac
fi
tags_file="/tmp/k8s-tags.toml"
case "$image" in
'k8s/flannel-cni-plugin')
# up to the last number in version
flannel_version="${version%.*}"
# the last number in version
flannel_release="${version##*.}"
jq --null-input --arg image "$image" --arg branch "$branch" --arg version "v$flannel_version-flannel$flannel_release" '{
$image: {$branch: [$version]},
}' | dasel -r json -w toml > "$tags_file"
;;
'k8s/etcd')
jq --null-input --arg image "$image" --arg branch "$branch" --arg version "$version-0" '{
$image: {$branch: [$version]},
}' | dasel -r json -w toml > "$tags_file"
;;
'k8s/pause')
jq --null-input --arg image "$image" --arg branch "$branch" --arg version "$version" '{
$image: {$branch: [$version]},
}' | dasel -r json -w toml > "$tags_file"
;;
*)
jq --null-input --arg image "$image" --arg branch "$branch" --arg version "v$version" '{
$image: {$branch: [$version]},
}' | dasel -r json -w toml > "$tags_file"
;;
esac
if [ -n "$latest" ]; then
additional_options+="--latest $branch "
fi
if [ -z "$push" ]; then
additional_options+='--skip-stages push '
elif [ -n "$skip_build" ]; then
additional_options+='--stages push '
fi
if [ -n "$dry_run" ]; then
additional_options+='--dry-run '
fi
./build.py \
--branch "$branch" \
--registry "$registry" \
--overwrite-organization "$prefix" \
--images "$image" \
--tags "$tags_file" \
$additional_options
;;
'kube-apiserver' | 'kube-controller-manager' | 'kube-scheduler' | 'kube-proxy')
image="k8s/$image"
version=
additional_options=
if [ -n "$task_id" ]; then
version="$(api_get_source_package_version_from_task "$task_id" "$package")"
[ "$?" -eq 0 ] || handle_error "error getting remote rpm package version: $package, task: $task_id"
tasks_file='/tmp/k8s-tasks.toml'
jq --null-input --arg branch "$branch" --arg task_id "$task_id" --arg image "$image" '{
$branch: {$task_id: [$image]},
}' | dasel -r json -w toml > "$tasks_file"
additional_options+="--tasks $tasks_file "
else
version="$(api_get_source_package_version "$branch" "$package")"
[ "$?" -eq 0 ] || handle_error "error getting remote rpm package version: $package, branch: $branch"
fi
# if binary package
#version_str="$(echo "$package" | sed -E 's/kubernetes(.+)-.+/\1/')"
#[ "$?" -eq 0 ] || handle_error "error getting specified rpm package version: $package"
# if source package
version_str="$(echo "$package" | sed -E 's/kubernetes(.+)/\1/')"
[ "$?" -eq 0 ] || handle_error "error getting specified rpm package version: $package"
tags_file="/tmp/k8s-tags.toml"
jq --null-input --arg image "$image" --arg branch "$branch" --arg version "v$version" '{
$image: {$branch: [$version]},
}' | dasel -r json -w toml > "$tags_file"
if [ -n "$latest" ]; then
additional_options+="--latest $branch "
fi
if [ -z "$push" ]; then
additional_options+="--skip-stages push "
elif [ -n "$skip_build" ]; then
additional_options+="--stages push "
fi
if [ -n "$dry_run" ]; then
additional_options+="--dry-run "
fi
./build.py \
--branch "$branch" \
--registry "$registry" \
--overwrite-organization "$prefix" \
--images "$image" \
--tags "$tags_file" \
--package-version "$version_str" \
$additional_options
;;
esac

View File

@ -1,65 +1,8 @@
["alt/buildpack-deps"]
skip-branches = [ "p9" ]
["alt/distroless-base"]
skip-branches = [ "p9" ]
["alt/openjdk21"]
skip-arches = [ "386" ]
["alt/distroless-builder"]
skip-branches = [ "p9" ]
["alt/distroless-devel"]
skip-branches = [ "p9" ]
["alt/distroless-gotop"]
skip-branches = [ "p9" ]
["alt/distroless-static"]
skip-branches = [ "p9" ]
["alt/distroless-true"]
skip-branches = [ "p9" ]
["alt/gitea"]
skip-branches = [ "p9" ]
["alt/node"]
skip-branches = [ "p9" ]
["alt/unit"]
skip-branches = [ "p9" ]
["alt/prometheus"]
skip-branches = [ "p9" ]
["alt/registry"]
skip-branches = [ "p9" ]
["k8s/cert-manager-cainjector"]
skip-branches = [ "p9" ]
["k8s/cert-manager-controller"]
skip-branches = [ "p9" ]
["k8s/cert-manager-webhook"]
skip-branches = [ "p9" ]
["k8s/coredns"]
skip-branches = [ "p9" ]
["k8s/etcd"]
skip-branches = [ "p9" ]
["k8s/kube-apiserver"]
skip-branches = [ "p9" ]
["k8s/kube-controller-manager"]
skip-branches = [ "p9" ]
["k8s/kube-proxy"]
skip-branches = [ "p9" ]
["k8s/kube-scheduler"]
skip-branches = [ "p9" ]
["k8s/pause"]
skip-branches = [ "p9" ]
["alt/ansible"]
skip-arches = [ "c10f2", "c10f1" ]

View File

@ -0,0 +1,17 @@
FROM {{ registry }}{{ organization }}/node:{{ branch }}
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="ansible"
LABEL org.opencontainers.image.description="A radically simple IT automation system"
LABEL org.opencontainers.image.source="http://www.ansible.com"
LABEL org.opencontainers.image.licenses="GPL-3.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_packages(
"ansible-vim",
"ansible-core",
"ansible-lint"
) }}
WORKDIR /etc/ansible/playbooks

1
org/alt/ansible/test Normal file
View File

@ -0,0 +1 @@
ansible --version

View File

@ -8,7 +8,7 @@ LABEL org.opencontainers.image.source="http://httpd.apache.org"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_pakages("apache2") }}
{{ install_packages("apache2") }}
EXPOSE 80

View File

@ -2,6 +2,6 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
MAINTAINER alt-cloud
{{ install_pakages("glibc-gconv-modules", "glibc-locales", "tzdata") }}
{{ install_packages("glibc-gconv-modules", "glibc-locales", "tzdata") }}
CMD ["bash"]

View File

@ -6,7 +6,7 @@ LABEL org.opencontainers.image.title="buildpack-deps-curl"
LABEL org.opencontainers.image.licenses="GPLv2"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_pakages(
{{ install_packages(
"ca-certificates",
"curl",
"gnupg",

View File

@ -6,7 +6,7 @@ LABEL org.opencontainers.image.title="buildpack-deps-scm"
LABEL org.opencontainers.image.licenses="GPLv2"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_pakages(
{{ install_packages(
"git",
"mercurial",
"openssh-clients",

View File

@ -6,7 +6,7 @@ LABEL org.opencontainers.image.title="buildpack-deps"
LABEL org.opencontainers.image.licenses="GPLv2"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_pakages(
{{ install_packages(
"ImageMagick",
"autoconf",
"automake",

View File

@ -8,27 +8,27 @@ LABEL org.opencontainers.image.licenses="GPLv2"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
# install editor
{{ install_pakages("vim-console") }}
{{ install_packages("vim-console") }}
# install debugging tools
{{ install_pakages("strace", "gdb") }}
{{ install_packages("strace", "gdb") }}
# install document viewers
{{ install_pakages("man") }}
{{ install_packages("man") }}
# install version control system
{{ install_pakages("git-core", "perl-Git") }}
{{ install_packages("git-core", "perl-Git") }}
# install network utils
{{ install_pakages("iproute2", "iputils", "wget", "curl") }}
{{ install_packages("iproute2", "iputils", "wget", "curl") }}
# install file utils
{{ install_pakages("lsof", "ripgrep") }}
{{ install_packages("lsof", "ripgrep") }}
# install shell and completions
{{ install_pakages("zsh", "zsh-completions") }}
{{ install_packages("zsh", "zsh-completions") }}
# install compilation utils
{{ install_pakages("make", "gcc", "gcc-c++") }}
{{ install_packages("make", "gcc", "gcc-c++") }}
CMD ["zsh"]

View File

@ -4,8 +4,8 @@ builder-install-packages = [
'{{if_branches(["p10"], "glibc-nss")}}',
"glibc-timezones",
"libselinux",
'{{if_branches(["p9", "p10"], "libssl1.1")}}',
'{{if_branches(["sisyphus"], "libssl1.1")}}',
'{{if_branches(["p10"], "libssl1.1")}}',
'{{if_branches(["p11"], "libssl3")}}',
'{{if_branches(["sisyphus"], "libssl3")}}',
"tzdata",
"zlib",

View File

@ -3,13 +3,13 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="distroless-builder"
LABEL org.opencontainers.image.description="This images is using to build tarball for distroless images"
LABEL org.opencontainers.image.description="This image is used to build tarballs for distroless images"
LABEL org.opencontainers.image.licenses="GPLv2"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
RUN echo %_excludedocs 1 >> /etc/rpm/macros
RUN rpm -qalds | awk '/^normal/{print $2}' | xargs rm -rf
{{ install_pakages("python3", "glibc-utils", "apt-repo") }}
{{ install_packages("python3", "glibc-utils", "apt-repo") }}
WORKDIR /usr/src/distroless
RUN mkdir file-lists
RUN useradd -m nonroot

View File

@ -1,3 +1,3 @@
ALT dockerfile for distroless-builder image.
This images is using to build tarball for distroless images.
This image is used to build tarballs for distroless images.

View File

@ -8,7 +8,7 @@ LABEL org.opencontainers.image.source="https://github.com/etcd-io/etcd"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_pakages("etcd") }}
{{ install_packages("etcd") }}
VOLUME /data

View File

@ -8,7 +8,7 @@ LABEL org.opencontainers.image.source="https://github.com/go-gitea/gitea"
LABEL org.opencontainers.image.licenses="MIT"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_pakages("gitea", "openssh-server", "gosu") }}
{{ install_packages("gitea", "openssh-server", "gosu") }}
ENV USER gitea
ENV HOME /var/lib/gitea

View File

@ -0,0 +1,11 @@
FROM {{ registry }}{{ organization }}/base:{{ branch }}
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="golang"
LABEL org.opencontainers.image.description="The Golang environment for development"
LABEL org.opencontainers.image.source="https://github.com/golang/go"
LABEL org.opencontainers.image.licenses="BSD"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_packages("golang") }}

1
org/alt/golang/test Normal file
View File

@ -0,0 +1 @@
go version

View File

@ -0,0 +1,22 @@
FROM {{ registry }}{{ alt_image }}:{{ branch }}
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="grafana"
LABEL org.opencontainers.image.description="Metrics dashboard and graph editor"
LABEL org.opencontainers.image.source="https://github.com/grafana/grafana"
LABEL org.opencontainers.image.licenses="AGPL-3.0-only AND Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_packages("grafana") }}
USER grafana
EXPOSE 3000
VOLUME ["/var/lib/grafana"]
ENV GF_PATHS_PROVISIONING=/etc/grafana/provisioning
ENV GF_AUTH_ANONYMOUS_ENABLED=true
ENV GF_AUTH_ANONYMOUS_ORG_ROLE=Admin
ENTRYPOINT [ "/usr/bin/grafana" ]
CMD [ "server", "--config=/etc/grafana/grafana.ini", "--homepath=/usr/share/grafana", "--packaging=docker", "-configOverrides='cfg:default.paths.provisioning=/etc/grafana/provisioning cfg:default.paths.data=/var/lib/grafana cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins'" ]

View File

@ -0,0 +1,6 @@
# Prometheus image
Command for run:
```
docker run -d --name="grafana" -p 3000:3000 -v grafana-data:/var/lib/grafana IMAGENAME
```

1
org/alt/grafana/test Normal file
View File

@ -0,0 +1 @@
grafana --version

View File

@ -0,0 +1,19 @@
FROM {{ registry }}{{ alt_image }}:{{ branch }}
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="loki"
LABEL org.opencontainers.image.description="Like Prometheus, but for logs"
LABEL org.opencontainers.image.source="https://github.com/grafana/loki"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_packages("loki") }}
USER _loki:_loki
VOLUME ["/var/lib/loki", "/etc/loki/loki.yml"]
EXPOSE 3100
ENTRYPOINT ["/usr/bin/loki"]
CMD ["-config.file=/etc/loki/loki.yaml"]

6
org/alt/loki/README.md Normal file
View File

@ -0,0 +1,6 @@
# Prometheus image
Command for run:
```
docker run -d --name="loki" -p 3100:3100 -v loki-data:/var/lib/loki -v loki-config:/etc/loki/loki.yaml IMAGENAME
```

1
org/alt/loki/test Normal file
View File

@ -0,0 +1 @@
loki -version -config.file=/etc/loki/loki.yaml

Some files were not shown because too many files have changed in this diff Show More