Compare commits

...

58 Commits

Author SHA1 Message Date
ebfa49dd1d fix(org/alt): delete config volumes from kafka and redis 2025-07-23 12:47:50 +03:00
d609016659 fix(images-info.toml): Add skip-arches for kafka image 2025-07-23 11:58:13 +03:00
a3de7f8261 fix(images-info.toml): Add skip-arches for kubevirt images 2025-07-22 13:39:34 +03:00
0a105aace4 Add kafka image 2025-07-22 11:42:41 +03:00
2db6b03aa8 Add redis image 2025-07-22 11:39:29 +03:00
3cf886ca28 add annotations to info.yaml for all images templates 2025-07-09 17:01:11 +03:00
fb6bde6ec4 add reading annotainsions form info.yaml and adding to manifest 2025-07-09 17:00:30 +03:00
14d59e886f fix(build.py): add cleaning images during building process to fix workflow's error 'no space left on device' 2025-06-26 15:39:51 +03:00
6302f3c4ef feat(k8s/coredns): simplify coredns templates 2025-06-26 13:49:08 +03:00
7df06eebcb update versions for k8s 2025-06-25 12:54:06 +03:00
e52c1c1420 fix k8s wf 2025-06-25 12:53:40 +03:00
56f573bfa9 delete duplicate excluding from images-info.toml 2025-06-24 21:50:40 +03:00
e03773565e delete special building from wf for alt/etcd 2025-06-24 21:39:51 +03:00
c329b429dd skip building 386 arch for zot in new version 2.1.4 2025-06-24 21:18:25 +03:00
daf6389f52 fix(.gitea/workflows/testscript): add quiet flag to test commands 2025-06-24 12:59:28 +03:00
6fdb4dec78 fix(org/kubevirt/virt-handler/Dockerfile.template): fix config virt-handler for new version 1.5.0 2025-06-24 12:37:04 +03:00
586fe0210e fix(.gitea/workflows/wf_k8s.yaml): ignore error in c10f2-label-setting step 2025-06-24 12:33:54 +03:00
129859feec add etcd and new version for p11 and c10f2 2025-06-24 12:33:54 +03:00
34540c6250 fix vendor label for c10f2, add version k8s for c10f2 2025-06-24 12:33:54 +03:00
b40b8691ad Add workflow for building all versions kube sound config 2025-06-24 12:33:54 +03:00
6cbde103dd fix(alt/php, alt/ruby): strip whitespace, don't use 'raw' blocks 2025-06-18 11:20:32 +03:00
14c787b0db delete org/alt/etcd (duplicate org/k8s/etcd) 2025-06-18 10:42:19 +03:00
d161930947 fix(.gitea/workflow): change vendor label for c10f2 in single workflow 2025-06-17 18:15:04 +03:00
0c426721dd k8s/coredns: check key in dict before using it 2025-06-17 17:54:49 +03:00
0d08c6f88f build: pass tasks for distroless images 2025-06-17 14:24:35 +03:00
a56bc4eb06 k8s/coredns: update templates 2025-05-28 21:15:48 +03:00
739b5d8eba better handle templates with variables and control flow in info.yaml 2025-05-28 21:14:29 +03:00
941b8fb599 support python 3.9 2025-05-16 14:52:01 +03:00
aacaf22d79 feat(k8s/etcd): add etcd image for kubernetes 2025-05-12 13:44:30 +03:00
2d5df6ea4c fix command error vendor label for c10f2 2025-05-07 12:11:51 +03:00
626b6feb4c fix vendor label for c10f2 in dostroless templates 2025-05-07 10:24:12 +03:00
69e7c13ea2 fix(.gitea/workflow): change vendor label for c10f2 2025-05-06 13:02:15 +03:00
d47bc5a030 fix(alt/nginx): listen on 0.0.0.0 in nginx image 2025-04-17 22:03:44 +03:00
9702a487d7 fix(k8s/flannel-cni-plugin): make excpetion for 1.4.0 2025-04-16 13:50:46 +03:00
c3398350b7 fix(workflow single image): fix image path in test step 2025-04-14 16:16:02 +03:00
c6011932ec add quotes buildkit-image tag info 2025-04-14 15:31:47 +03:00
b1a9067f7d delete 'v' from buildkit-image tag 2025-04-14 15:22:21 +03:00
2755b77312 fix(workflow single image): fix image path in test step 2025-04-14 15:21:12 +03:00
61993c8c67 fix(build): don't print responses 2025-04-12 22:07:48 +03:00
8831b5d4f3 fix(k8s/flannel-cni-plugin): properly set image tag 2025-04-12 22:02:53 +03:00
c9361ef016 add test for buildkit image 2025-04-10 16:50:32 +03:00
bb0eb56454 add buildkit image 2025-04-10 16:32:58 +03:00
059f378d62 Fix wf mistake 2025-03-21 17:20:30 +03:00
c0534070b3 Fix wf mistake 2025-03-21 17:15:21 +03:00
ede851f34f Add version building param for etcd 2025-03-21 16:59:51 +03:00
b1867f776f Fix wf mistake 2025-03-21 15:37:45 +03:00
686bed6efa Fix wf mistake 2025-03-21 15:23:02 +03:00
124ed4ff29 Fix wf mistake 2025-03-21 15:03:33 +03:00
a5d6c2d543 Fix wf steps order 2025-03-21 13:31:27 +03:00
ba6faf6d32 Add log-level to workflow, fix singl wf to new repo structure 2025-03-21 13:15:24 +03:00
8bd17b82bc docs: update version_template description in README.md 2025-03-21 13:08:42 +03:00
20c4e922df fix(build): remove usage of branch when it is unavailable 2025-03-21 13:08:42 +03:00
c3778f6436 feat(alt/etcd): update Dockerfile and info.yaml 2025-03-21 13:08:42 +03:00
5a22edb089 feat(build): allow version_template to be a list of strings 2025-03-21 13:08:42 +03:00
4ba29556fe feat(build): log when running external commands 2025-03-21 13:08:42 +03:00
4db1672f06 feat(build): allow querying package versions from tasks 2025-03-21 13:08:42 +03:00
24c24ddd57 feat(build): introduce logging 2025-03-21 13:08:42 +03:00
97478923d3 Add exlusion building for base image with risc arch, delete excess deps 2025-03-21 12:29:59 +03:00
92 changed files with 1301 additions and 133 deletions

View File

@ -0,0 +1,74 @@
#!/usr/bin/env python3
import argparse
import json
import subprocess
vers_path = ".gitea/workflows/k8s_vers.json"
def run(args):
result = subprocess.run(
args,
capture_output = True,
text = True
)
if result.stderr is not None:
print(result.stderr)
return False
print(result.stdout)
return True
def parse_args() -> argparse.Namespace:
parser = argparse.ArgumentParser(
formatter_class=argparse.ArgumentDefaultsHelpFormatter,
)
parser.add_argument(
"--branch",
help="used to pick the appropriate VM template to clone",
choices=["sisyphus", "c10f2", "p10", "p11"],
)
parser.add_argument(
"--other-build-args",
help="other build arg as a string",
)
parser.add_argument(
"--workspace",
help="workspace, path to builing script",
)
return parser.parse_args()
def main() -> None:
args = parse_args()
if args.branch is None or args.branch == "":
raise RuntimeError("Empty branch setting. Check your choise --branch.")
data = {}
with open(f"{args.workspace}/{vers_path}", "r") as f:
data = json.load(f)
i = 0
for br in data.get("branches"):
if br.get("name") == args.branch:
break
i += 1
vers_branch = data.get("branches")[i].get("versions")
if vers_branch == None :
raise RuntimeError(f"Unknown branch: {args.branch!r}. In {vers_path} no k8s-versions list.")
images_to_rebuild="k8s/kube-apiserver k8s/kube-scheduler k8s/kube-controller-manager k8s/kube-proxy k8s/kubelet k8s/coredns k8s/etcd"
for ver in vers_branch:
kube_ver = ver.get("kube-version")
dns_ver = ver.get("coredns")
if kube_ver != None and dns_ver != None:
packs_string=f"-b {args.branch} " + "--package-versions '{\"k8s/kube-apiserver\":" + f"\"{kube_ver}\",\"k8s/kube-scheduler\":\"{kube_ver}\",\"k8s/kube-controller-manager\":\"{kube_ver}\",\"k8s/kube-proxy\":\"{kube_ver}\",\"k8s/kubelet\":\"{kube_ver}\",\"k8s/coredns\":\"{dns_ver}\",\"k8s/etcd\":\"{kube_ver}\"" + "}'"
if ver.get("latest") != None and ver.get("latest"):
packs_string=f"-o k8s --latest {args.branch} "+packs_string
else:
packs_string=f"-i {images_to_rebuild} "+packs_string
subprocess.run(f"{args.workspace}/build.py {args.other_build_args} {packs_string}", shell=True)
subprocess.run("podman rmi -f --all", shell=True)
if __name__ == "__main__":
main()

View File

@ -0,0 +1,72 @@
{
"branches": [
{
"name": "p10",
"versions": [
{
"kube-version": "1.27",
"coredns": "1.10.1"
},
{
"kube-version": "1.28",
"coredns": "1.10.1",
"latest": true
}
]
},
{
"name": "p11",
"versions": [
{
"kube-version": "1.31",
"coredns": "1.11.3"
},
{
"kube-version": "1.32",
"coredns": "1.11.3"
},
{
"kube-version": "1.33",
"coredns": "1.33",
"latest": true
}
]
},
{
"name": "c10f2",
"versions": [
{
"kube-version": "1.31",
"coredns": "1.11.3"
},
{
"kube-version": "1.32",
"coredns": "1.11.3"
},
{
"kube-version": "1.33",
"coredns": "1.33",
"latest": true
}
]
},
{
"name": "sisyphus",
"versions": [
{
"kube-version": "1.31",
"coredns": "1.11.3"
},
{
"kube-version": "1.32",
"coredns": "1.11.3"
},
{
"kube-version": "1.33",
"coredns": "1.33",
"latest": true
}
]
}
]
}

View File

@ -32,20 +32,20 @@ do
if [ -n "$test" ]; then
command="podman run --rm --entrypoint=\"$entrypoint\" $url/$imgpath -c \"$test\""
else
if [[ "$IM" == distroless-toybox ]]; then
command="podman run --rm $url/$imgpath toysh -c true"
if [ "$IM" = distroless-toybox ]; then
command="podman run -q --rm $url/$imgpath toysh -c true"
fi
if [ "$IM" = distroless-true ]; then
command="podman run --rm $url/$imgpath \"true\""
command="podman run -q --rm $url/$imgpath \"true\""
fi
if [ "$IM" = distroless-gotop ]; then
command="podman run --rm $url/$imgpath \"--version\""
command="podman run -q --rm $url/$imgpath \"--version\""
fi
if [ "$IM" = flannel-cni-plugin ]; then
command="podman run --rm $url/$imgpath \"/flannel\""
command="podman run -q --rm $url/$imgpath \"/flannel\""
fi
if [ "$IM" == pause ]; then
command="podman run --rm $url/$imgpath \"/pause\" \"-v\""
command="podman run -q --rm $url/$imgpath \"/pause\" \"-v\""
fi
fi
echo $command
@ -58,7 +58,7 @@ do
then
if [[ -n $(cat $IM.log) ]]
then errors="TEST ERROR OF IMAGE $IM: $(cat $IM.log); $errors"
else errors="TEST ERROR OF IMAGE $IM: test returned empty error, but exit status was nozero; $errors"
#else errors="TEST ERROR OF IMAGE $IM: test returned empty error, but exit status was nozero; $errors"
fi
fi
haserr=false

View File

@ -3,6 +3,7 @@ on:
push:
tags:
- '*_*'
- '!*_k8s'
jobs:
build-process:
@ -14,6 +15,14 @@ jobs:
repo: ${{ env.REPO }}
buildres: ${{ steps.build-script.outcome }}
steps:
- name: Update apt
uses: actions/init-alt-env@v1
- name: Install requires
run: |
echo "apt-get install -y python3-module-tomli python3-module-jinja2 python3-module-yaml python3-module-requests podman buildah jq curl"
apt-get install -y python3-module-tomli python3-module-jinja2 python3-module-yaml python3-module-requests podman buildah jq curl
echo "apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-riscv qemu-user-static-binfmt-loongarch"
apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-riscv qemu-user-static-binfmt-loongarch
- name: Check workspace
run: |
repourl=$(echo $GU | cut -d '/' -f 3)
@ -25,23 +34,6 @@ jobs:
env:
GU: ${{ gitea.server_url }}
GR: ${{ gitea.repository }}
- name: Set repo for c10f2 (Temporary)
if: ${{ contains(github.ref_name, 'c10f2') }}
run: |
echo "event tag=${{ github.ref_name }}"
echo "10.4.0.3 update.altsp.su" >> /etc/hosts
echo "cat /etc/hosts"
cat /etc/hosts
- name: Update apt
uses: actions/init-alt-env@v1
- name: Install requires
run: |
echo "apt-get install -y python3-module-tomli python3-module-jinja2 python3-module-yaml python3-module-requests podman buildah jq curl"
apt-get install -y python3-module-tomli python3-module-jinja2 python3-module-yaml python3-module-requests podman buildah jq curl
echo "apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-ppc qemu-user-static-binfmt-riscv qemu-user-static-binfmt-loongarch"
apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-ppc qemu-user-static-binfmt-riscv qemu-user-static-binfmt-loongarch
- name: Check out current repo
uses: actions/checkout@v4
- name: Parse target branch and tag from events context, save to env
env:
EV: ${{ toJson(gitea.event) }}
@ -51,6 +43,26 @@ jobs:
org=$(echo $EV | jq '.ref' -r | sed 's/refs\/tags\///g' | cut -d '_' -f 2)
echo "ORG=$org" >> ${GITHUB_ENV}
echo "ORG=$org"
- name: Check out current repo
uses: actions/checkout@v4
- name: Change vendor label for c10f
if: ${{ contains(github.ref_name, 'c10f') }}
run: |
echo "sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/Dockerfile.template ||:"
sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/Dockerfile.template ||:
echo "sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/distroless.toml ||:"
sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/distroless.toml ||:
echo "sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/info.yaml ||:"
sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/info.yaml ||:
env:
ORG: ${{ env.ORG }}
- name: Set repo for c10f2 (Temporary)
if: ${{ contains(github.ref_name, 'c10f2') }}
run: |
echo "event tag=${{ github.ref_name }}"
echo "10.4.0.3 update.altsp.su" >> /etc/hosts
echo "cat /etc/hosts"
cat /etc/hosts
- name: Login podman gitea
run: |
echo "podman login ${{ env.URL }}"
@ -61,14 +73,16 @@ jobs:
- name: Run building script
id: build-script
run: |
build_args="-b $BR --latest $BR -o $ORG --registry gitea.basealt.ru/alt"
if [[ "$BR" == "sisyphus" ]]; then arches="--arches amd64 386 arm64 loong64"; else arches="--arches amd64 386 arm64"; fi
if [[ "$ORG" == "k8s" ]]; then build_args="$build_args --overwrite-organization $ORG-$BR --package-versions {\"k8s/kube-apiserver\":\"1.31\",\"k8s/kube-scheduler\":\"1.31\",\"k8s/kube-controller-manager\":\"1.31\",\"k8s/kube-proxy\":\"1.31\",\"k8s/coredns\":\"1.11.3\",\"k8s/kubelet\":\"1.31\"}"; fi
echo "build.py $build_args $arches"
#build base with riskv64 for sisyphus if it is
if [[ "$BR" == "sisyphus" && "$ORG" == "base" ]]; then echo "${{ gitea.workspace }}/build.py --log-level debug -i base/base -b $BR --latest $BR --registry $BUILD_URL"; ${{ gitea.workspace }}/build.py -i base/base -b "$BR" --latest "$BR" --registry "$BUILD_URL"; fi
build_args="-b $BR --log-level debug --latest $BR -o $ORG --registry $BUILD_URL"
if [[ "$BR" == "sisyphus" ]]; then arches="--arches amd64 386 arm64 loong64 --skip-images base/base"; else arches="--arches amd64 386 arm64"; fi
echo "${{ gitea.workspace }}/build.py $build_args $arches"
${{ gitea.workspace }}/build.py $build_args $arches
env:
ORG: ${{ env.ORG }}
BR: ${{ env.BRANCH }}
BUILD_URL: "gitea.basealt.ru/alt"
continue-on-error: true
- name: Send notification if build crashed
if: ${{ steps.build-script.outcome != 'success' }}

View File

@ -0,0 +1,106 @@
name: Full building alt images
on:
push:
tags:
- "*_k8s"
jobs:
build-process:
runs-on: alt-sisyphus
outputs:
branch: ${{ env.BRANCH }}
org: ${{ env.ORG }}
url: ${{ env.URL }}
repo: ${{ env.REPO }}
buildres: ${{ steps.build-script.outcome }}
steps:
- name: Check workspace
run: |
repourl=$(echo $GU | cut -d '/' -f 3)
echo "URL=$repourl" >> ${GITHUB_ENV}
echo $repourl
reponame=$(echo $GR | cut -d '/' -f 1)
echo "REPO=$reponame" >> ${GITHUB_ENV}
echo $reponame
env:
GU: ${{ gitea.server_url }}
GR: ${{ gitea.repository }}
- name: Set repo for c10f2 (Temporary)
if: ${{ contains(github.ref_name, 'c10f2') }}
run: |
echo "event tag=${{ github.ref_name }}"
echo "10.4.0.3 update.altsp.su" >> /etc/hosts
echo "cat /etc/hosts"
cat /etc/hosts
- name: Update apt
uses: actions/init-alt-env@v1
- name: Install requires
run: |
echo "apt-get install -y python3-module-tomli python3-module-jinja2 python3-module-yaml python3-module-requests podman buildah jq curl"
apt-get install -y python3-module-tomli python3-module-jinja2 python3-module-yaml python3-module-requests podman buildah jq curl
echo "apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-riscv qemu-user-static-binfmt-loongarch"
apt-get install -y qemu-user-static-binfmt-aarch64 qemu-user-static-binfmt-arm qemu-user-static-binfmt-riscv qemu-user-static-binfmt-loongarch
- name: Parse target branch and tag from events context, save to env
env:
EV: ${{ toJson(gitea.event) }}
run: |
echo $EV | jq '.ref' -r | sed "s/refs\/tags\//BRANCH=/g" | cut -d '_' -f 1
echo $EV | jq '.ref' -r | sed "s/refs\/tags\//BRANCH=/g" | cut -d '_' -f 1 >> ${GITHUB_ENV}
org=$(echo $EV | jq '.ref' -r | sed 's/refs\/tags\///g' | cut -d '_' -f 2)
echo "ORG=$org" >> ${GITHUB_ENV}
echo "ORG=$org"
- name: Check out current repo
uses: actions/checkout@v4
- name: Change vendor label for c10f
if: ${{ contains(github.ref_name, 'c10f') }}
run: |
echo "sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/Dockerfile.template ||:"
sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/Dockerfile.template ||:
echo "sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/distroless.toml ||:"
sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/distroless.toml ||:
echo "sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/info.yaml ||:"
sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/info.yaml ||:
env:
ORG: ${{ env.ORG }}
- name: Login podman gitea
run: |
echo "podman login ${{ env.URL }}"
podman login --username $P_USER --password $P_PASS ${{ env.URL }}
env:
P_USER: ${{ secrets.PODMAN_USER }}
P_PASS: ${{ secrets.PODMAN_PASS }}
- name: Run building script
id: build-script
run: |
if [[ "$BR" == "sisyphus" ]]; then arches="--arches amd64 386 arm64 loong64"; else arches="--arches amd64 386 arm64"; fi
build_args="--registry $BUILD_URL $arches"
#run build script
${{ gitea.workspace }}/.gitea/workflows/k8s_buildscript.py --branch "$BR" --other-build-args "$build_args" --workspace "${{ gitea.workspace }}"
env:
ORG: ${{ env.ORG }}
BR: ${{ env.BRANCH }}
BUILD_URL: "gitea.basealt.ru/alt"
continue-on-error: true
- name: Send notification if build crashed
if: ${{ steps.build-script.outcome != 'success' }}
run: |
issueid=1
body="Building images finish with some errors."
curl -X 'POST' "$URL/api/v1/repos/$REPO/image-forge/issues/$issueid/comments?token=$T" -H 'accept: application/json' -H 'Content-Type: application/json' -d "{ \"body\": \"$body\" }" -s
echo "notification about test error is sent to issue $issueid"
env:
T: ${{ secrets.TOKEN }}
BR: ${{ env.BRANCH }}
URL: ${{ gitea.server_url }}
REPO: ${{ env.REPO }}
- name: Delete event tag
run: |
tagname=$(echo $EV | jq '.ref' -r | sed "s/refs\/tags\///g")
curl -X 'DELETE' "$URL/api/v1/repos/$REPO/image-forge/tags/$tagname?token=$T" -H 'accept: application/json' -s
echo "tag $tagname is deleted"
env:
T: ${{ secrets.TOKEN }}
BR: ${{ env.BRANCH }}
URL: ${{ gitea.server_url }}
REPO: ${{ env.REPO }}
EV: ${{ toJson(gitea.event) }}

View File

@ -68,6 +68,17 @@ jobs:
ver=$(echo $EV | jq '.ref' -r | sed 's/refs\/tags\///g' | cut -d '_' -f 3)
echo "VER=$ver" >> ${GITHUB_ENV}
echo "VER=$ver"
- name: Change vendor label for c10f
if: ${{ contains(github.ref_name, 'c10f') }}
run: |
echo "sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/Dockerfile.template ||:"
sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/Dockerfile.template ||:
echo "sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/distroless.toml ||:"
sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/distroless.toml ||:
echo "sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/info.yaml ||:"
sed -i 's/ALT Linux Team/BaseALT LLC/g' ${{ gitea.workspace }}/org/$ORG/*/info.yaml ||:
env:
ORG: ${{ env.ORG }}
- name: Get test for image
run: |
if test -f ${{ gitea.workspace }}/org/$IM/test; then testscript=$(cat ${{ gitea.workspace }}/org/$IM/test); else testscript=""; fi
@ -78,10 +89,10 @@ jobs:
- name: Run building script
id: build-script
run: |
if [[ "$IM" == *"k8s"* ]]; then k8sarg="--overwrite-organization $ORG-$BR --package-versions {\"$IM\":\"$VER\"}"; else k8sarg=""; fi
if [[ "$IM" == *"k8s"* ]]; then k8sarg="--package-versions {\"$IM\":\"$VER\"}"; else k8sarg=""; fi
if [[ "$BR" == "sisyphus" ]]; then arches="--arches amd64 386 arm64 loong64"; else arches="--arches amd64 386 arm64"; fi
echo "build.py -i $IM -b $BR $arches $k8sarg"
${{ gitea.workspace }}/build.py -i $IM -b $BR $arches $k8sarg
${{ gitea.workspace }}/build.py -i $IM -b $BR $arches --latest $BR --log-level debug --registry gitea.basealt.ru/alt $k8sarg
env:
IM: ${{ env.IMAGE }}
VER: ${{ env.VER }}
@ -128,7 +139,8 @@ jobs:
if: ${{ needs.build-process.outputs.test != '' }}
continue-on-error: true
run: |
if [[ "$IM" == *"k8s"* ]]; then echo "skip tests for k8s images"; else podman run --rm --entrypoint="/bin/sh" $URL/$IM:$BR -c "$TEST"; fi
imname=$(echo "$IM" | cut -d "/" -f2)
if [[ "$IM" == *"k8s"* ]]; then echo "skip tests for k8s images"; else podman run --rm --entrypoint="/bin/sh" $URL/$REPO/$BR/$imname:latest -c "$TEST"; fi
env:
IM: ${{ needs.build-process.outputs.image }}
BR: ${{ needs.build-process.outputs.branch }}
@ -140,8 +152,9 @@ jobs:
if: ${{ needs.build-process.outputs.test == '' }}
continue-on-error: true
run: |
if [[ $IM = 'alt/distroless-true' ]]; then podman run --rm $URL/$IM:$BR true; fi
if [[ $IM = 'alt/distroless-gotop' ]]; then podman run --rm $URL/$IM:$BR --version; fi
imname=$(echo "$IM" | cut -d "/" -f2)
if [[ $IM = 'alt/distroless-true' ]]; then podman run --rm $URL/$REPO/$BR/$imname:latest true; fi
if [[ $IM = 'alt/distroless-gotop' ]]; then podman run --rm $URL/$REPO/$BR/$imname:latest --version; fi
env:
IM: ${{ needs.build-process.outputs.image }}
BR: ${{ needs.build-process.outputs.branch }}

View File

@ -38,10 +38,12 @@ If you push to the users repository, then organiztion is your username.
If contains jinja2 template syntax, `--package-version`
CLI option must be specified.
- `version_template`: **string** (OPTIONAL)
- `version_template`: **string** or **list of strings** (OPTIONAL)
template to apply when construction the tag,
`version` string variable is available in the template
Template to apply when construction the tag,
`version` string variable is available in the template.
If `version_template` is a list of strings, then the image wiil be tagged
with every string in the list.
### examples
@ -84,6 +86,22 @@ source_packages:
./build.py -i k8s/pause
```
#### org/k8s/etcd
```yaml
is_versioned: true
version_template:
- "v{{ version }}"
- "{{ version }}"
- "{{ version }}-0"
source_packages:
- etcd-for-kubernetes{{ version }}
```
```bash
./build.py -b sisyphus -i k8s/etcd --package-version '{"k8s/etcd": "1.32"}'
```
## Dependencies
On x86_64 machine using p10 branch you need:
- `python3-module-tomli`

191
build.py
View File

@ -3,6 +3,7 @@
import argparse
import functools
import json
import logging
import re
import subprocess
import textwrap
@ -10,23 +11,35 @@ from datetime import datetime
from dataclasses import dataclass
from graphlib import TopologicalSorter
from pathlib import Path
from typing import Optional, Union
import requests
import tomli
import yaml
from jinja2 import Template
from jinja2 import Environment, BaseLoader
logger = logging.getLogger(__name__)
clean_images_counter = 0
clean_images_limit_count = 5
ORG_DIR = Path("org")
PKG_VERSIONS: dict | None = None
PKG_VERSIONS: Optional[dict] = None
# Jinja2 custom fail filter
def fail(message: str):
raise ValueError(message)
JINJA_ENV = Environment(loader=BaseLoader())
JINJA_ENV.filters['fail'] = fail
@dataclass
class Image:
canonical_name: str
is_versioned: bool | None
version_template: str | None
source_packages: list[str] | None
is_versioned: Optional[bool]
version_template: Union[list[str], str, None]
source_packages: Optional[list[str]]
annotations: Optional[dict[str, str]]
def __init__(self, canonical_name: str):
self.canonical_name = canonical_name
@ -37,6 +50,7 @@ class Image:
if not info_file.exists():
self.is_versioned = None
self.source_packages = None
self.annotations = None
return
info: dict = yaml.safe_load(info_file.read_text())
@ -63,6 +77,10 @@ class Image:
if "version_template" in info:
self.version_template = info["version_template"]
self.annotations = None
if "annotations" in info:
self.annotations = info["annotations"]
class Tasks:
def __init__(self, tasks):
@ -91,12 +109,10 @@ def api_get_source_package_version(branch: str, package_name: str) -> str:
params = {"branch": branch, "name": package_name}
response = requests.get(api_url, params)
if response.status_code != 200:
print(response)
api_url = "https://rdb.altlinux.org/api/site/package_versions"
params = {"arch": "x86_64", "package_type": "source", "name": package_name}
response = requests.get(api_url, params)
if response.status_code != 200:
print(response)
raise RuntimeError(
f"failed to retrieve source package version: source package {package_name!r}, branch {branch!r} "
)
@ -114,15 +130,33 @@ def api_get_source_package_version(branch: str, package_name: str) -> str:
return result["versions"][0]["version"]
def api_get_source_package_version_from_task(task_id: str, package_name: str):
api_url = f"https://rdb.altlinux.org/api/task/packages/{task_id}"
response = requests.get(api_url)
if response.status_code != 200:
raise RuntimeError(
f"failed to retrieve source package version from task: source package {package_name!r}, task_id {task_id}"
)
result = response.json()
for subtask in result["subtasks"]:
if subtask["source"]["name"] == package_name:
return subtask["source"]["version"]
raise RuntimeError(
f"failed to retrieve source package version from task: source package {package_name!r}, task_id {task_id}"
)
class Tags:
def __init__(self, tags_file: str | None, latest: str):
def __init__(self, tags_file: Optional[str], latest: str):
if tags_file is None:
self._tags = None
else:
self._tags = tomli.loads(Path(tags_file).read_text())
self._latest = latest
def tags(self, branch: str, image: Image):
def tags(self, branch: str, image: Image, tasks: Optional[Tasks] = None):
if self._tags is None:
if image.is_versioned is None:
tags = [branch]
@ -132,10 +166,7 @@ class Tags:
elif image.is_versioned and image.source_packages:
package_name = image.source_packages[0]
if re.search("{%.*%}", package_name):
package_name = Template(package_name).render(branch=branch).strip()
print(f"{package_name=}")
context_version = ""
if re.search("{{.*}}", package_name):
if PKG_VERSIONS is None:
raise RuntimeError(
@ -152,29 +183,68 @@ class Tags:
f"invalid version for image {image.canonical_name!r}: {PKG_VERSIONS[image.canonical_name]!r}"
)
package_name = Template(package_name).render(
version=PKG_VERSIONS[image.canonical_name]
)
version = api_get_source_package_version(branch, package_name)
context_version = PKG_VERSIONS[image.canonical_name]
if re.search("{%.*%}", package_name) or re.search("{{.*}}", package_name):
package_name = JINJA_ENV.from_string(package_name).render(
branch=branch,
version=context_version,
)
if tasks is not None:
task_ids = tasks.get(branch, image)
else:
task_ids = []
if task_ids:
logger.info(
"getting %s package version from task %s",
package_name,
task_ids[0],
)
version = api_get_source_package_version_from_task(
task_ids[0], package_name
)
else:
logger.info(
"getting %s package version from repo %s",
package_name,
branch,
)
version = api_get_source_package_version(branch, package_name)
tags = []
if image.version_template is not None:
version = (
Template(image.version_template).render(version=version).strip()
)
if isinstance(image.version_template, str):
version_tag = (
JINJA_ENV.from_string(image.version_template).render(version=version).strip()
)
tags.append(version_tag)
elif isinstance(image.version_template, list):
for v in image.version_template:
version_tag = (
JINJA_ENV.from_string(v).render(version=version).strip()
)
tags.append(version_tag)
else:
raise RuntimeError(f"expected type for version_template: 'str' or 'list[str]', got '{type(image.version_template)}' for image {image}")
else:
tags.append(version)
tags = [version]
tags.append("latest")
else:
version = datetime.now().strftime('%Y%m%d')
if image.version_template is not None:
if not isinstance(image.version_template, str):
raise RuntimeError(f"expected type for version_template: 'str', got '{type(image.version_template)}' for image {image}")
version = (
Template(image.version_template).render(version=version).strip()
JINJA_ENV.from_string(image.version_template).render(version=version).strip()
)
tags = [version]
tags.append("latest")
else:
tags = self._tags[image.canonical_name][branch].copy()
return tags
@ -349,12 +419,13 @@ class DockerBuilder:
else:
registry = ""
alt_image = "alt"
rendered = Template(template).render(
rendered = JINJA_ENV.from_string(template).render(
alt_image=alt_image,
branch=self.branch,
install_packages=install_packages,
organization=organization,
registry=registry,
pkg_versions=PKG_VERSIONS,
**kwargs,
)
@ -455,7 +526,12 @@ class DockerBuilder:
pre_cmd = ["echo"]
else:
pre_cmd = []
logger.debug("run: %s", pre_cmd + cmd)
subprocess.run(pre_cmd + cmd, *args, **kwargs)
def run_with_result(self, cmd):
return subprocess.run(cmd, stdout=subprocess.PIPE).stdout.decode('utf-8')
def distroless_build(self, image: Image, arches):
def distroless_build_arch(arch, manifest):
@ -601,7 +677,7 @@ class DockerBuilder:
build_arches = set(arches) - set(
self.images_info.skip_arches(image.canonical_name)
)
tags = self.tags.tags(self.branch, image)
tags = self.tags.tags(self.branch, image, self.tasks)
manifest = self.render_full_tag(image, tags[0])
msg = "Building image {} for {} arches".format(
@ -652,7 +728,7 @@ class DockerBuilder:
self.images_info.skip_arches(image.canonical_name)
)
platforms = ",".join([f"linux/{a}" for a in build_arches])
tags = self.tags.tags(self.branch, image)
tags = self.tags.tags(self.branch, image, self.tasks)
manifest = self.render_full_tag(image, tags[0])
msg = "Building image {} for {} arches".format(
@ -695,24 +771,47 @@ class DockerBuilder:
f"--platform={platforms}",
".",
]
if image.annotations != None:
build_cmd = [
"podman",
"build",
"--rm",
"--force-rm",
f"--manifest={manifest}",
f"--platform={platforms}"
]
for akey, avalue in image.annotations.items():
build_cmd.append(
f"--annotation={akey}={avalue}")
d = datetime.now()
build_cmd.append(f"--annotation=org.opencontainers.image.created={d.isoformat("T") + "Z"}")
ver = next((tag for tag in tags if tag != 'latest'), '')
if ver != '':
build_cmd.append(f"--annotation=org.opencontainers.image.version={ver}")
build_cmd.append(".")
if PKG_VERSIONS is not None and image.canonical_name in PKG_VERSIONS:
build_cmd.insert(
-1, f"--build-arg=PKG_VERSION={PKG_VERSIONS[image.canonical_name]}"
)
self.run(build_cmd, cwd=image.path)
for tag in tags[1:]:
other_manifest = self.render_full_tag(image, tag)
tag_cmd = ["podman", "tag", manifest, other_manifest]
self.run(tag_cmd)
def podman_push(self, image: Image, sign=None):
if self.images_info.skip_branch(image.canonical_name, self.branch):
return
tags = self.tags.tags(self.branch, image)
tags = self.tags.tags(self.branch, image, self.tasks)
manifests = [self.render_full_tag(image, t) for t in tags]
for manifest in manifests:
@ -730,6 +829,24 @@ class DockerBuilder:
self.run(cmd)
global clean_images_counter
if clean_images_limit_count <= clean_images_counter:
cmd = [
"podman",
"rmi",
"--all",
"-f",
]
self.run(cmd,
check=False,
stderr=subprocess.DEVNULL,
stdout=subprocess.DEVNULL,
)
clean_images_counter = 0
else:
clean_images_counter += 1
class ImagesInfo:
def __init__(self):
@ -765,6 +882,8 @@ def parse_args():
images = [f"{o.name}/{i.name}" for o in organizations for i in o.iterdir()]
organizations = [o.name for o in organizations]
log_levels = ["debug", "info", "warning", "error", "critical"]
parser = argparse.ArgumentParser(
formatter_class=argparse.ArgumentDefaultsHelpFormatter,
)
@ -875,6 +994,12 @@ def parse_args():
type=json.loads,
help="json string where key is image name, value is the package version",
)
parser.add_argument(
"--log-level",
default="warning",
choices=log_levels,
help="log messages above specified level",
)
args = parser.parse_args()
args.stages = set(args.stages) - set(args.skip_stages)
@ -890,6 +1015,14 @@ def main():
args = parse_args()
PKG_VERSIONS = args.package_versions
numeric_level = getattr(logging, args.log_level.upper(), logging.WARNING)
logging.basicConfig(
level=numeric_level, format="%(asctime)s - %(levelname)s\t- %(message)s"
)
logger.info("PKG_VERSIONS=%s", PKG_VERSIONS)
arches = args.arches
images_info = ImagesInfo()
tags = Tags(args.tags, args.latest)

View File

@ -1,11 +1,38 @@
["alt/distroless-toybox"]
skip-branches = [ "p10", "c10f2", "c10f1" ]
["base/distroless-toybox"]
skip-branches = [ "p10", "c10f2", "c10f1" ]
["alt/openjdk21"]
skip-arches = [ "386" ]
["alt/zot"]
skip-arches = [ "386" ]
["alt/kafka"]
skip-arches = [ "386" ]
["alt/ansible"]
skip-branches = [ "c10f2", "c10f1", "p10" ]
["alt/buildkit"]
skip-branches = [ "c10f1", "p10" ]
["kubevirt/virt-api"]
skip-arches = [ "386", "loong64" ]
["kubevirt/virt-controller"]
skip-arches = [ "386", "loong64" ]
["kubevirt/virt-exportproxy"]
skip-arches = [ "386", "loong64" ]
["kubevirt/virt-exportserver"]
skip-arches = [ "386", "loong64" ]
["kubevirt/virt-handler"]
skip-arches = [ "386", "loong64" ]
["kubevirt/virt-launcher"]
skip-arches = [ "386", "loong64" ]
["kubevirt/virt-operator"]
skip-arches = [ "386", "loong64" ]

View File

@ -5,4 +5,13 @@ source_packages:
- ansible-core
- ansible-vim
- ansible-lint
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'http://www.ansible.com'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'ansible'
org.opencontainers.image.description: 'A radically simple IT automation system'
org.opencontainers.image.licenses: GPL-3.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- apache2
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'http://httpd.apache.org'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'apache2'
org.opencontainers.image.description: 'The most widely used Web server on the Internet'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -0,0 +1,16 @@
FROM {{ registry }}{{ branch }}/base:latest
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="buildkit"
LABEL org.opencontainers.image.description="Concurrent, cache-efficient, and Dockerfile-agnostic builder toolkit"
LABEL org.opencontainers.image.source="https://github.com/moby/buildkit"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_packages(
"ca-certificates",
"buildkit"
) }}
ENTRYPOINT ["/usr/bin/buildkitd"]

View File

@ -0,0 +1,15 @@
---
is_versioned: true
version_template: "{{ version }}"
source_packages:
- buildkit
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/moby/buildkit'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'buildkit'
org.opencontainers.image.description: 'Concurrent, cache-efficient, and Dockerfile-agnostic builder toolkit'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

1
org/alt/buildkit/test Normal file
View File

@ -0,0 +1 @@
buildkitd --version

View File

@ -1,17 +0,0 @@
FROM {{ registry }}{{ branch }}/{{ alt_image }}:latest
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="etcd"
LABEL org.opencontainers.image.description="Distributed reliable key-value store for the most critical data of a distributed system"
LABEL org.opencontainers.image.source="https://github.com/etcd-io/etcd"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_packages("etcd") }}
RUN ln -s /usr/sbin/etcd /usr/local/bin/etcd
VOLUME /data
ENTRYPOINT ["/usr/sbin/etcd", "--data-dir", "/data"]

View File

@ -1,13 +0,0 @@
dockerfiles-alt-etcd
=========================
ALT dockerfile for etcd.
Copy Dockerfile somewhere and build the image:
`$ docker build --rm -t <username>/etcd.`
And launch the etcd container:
`docker run -d -v <etcd data dir>:/data <username>/etcd`
If etcdclt watnted it could be run via:
`docker run --entrypoint etcdctl <username>/etcd`

View File

@ -1,6 +0,0 @@
---
is_versioned: true
version_template: "{{ version }}"
source_packages:
- etcd
...

View File

@ -1 +0,0 @@
etcdctl version

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- gitea
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/go-gitea/gitea'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'gitea'
org.opencontainers.image.description: 'Git with a cup of tea, painless self-hosted git service'
org.opencontainers.image.licenses: MIT
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- golang
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/golang/go'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'golang'
org.opencontainers.image.description: 'The Golang environment for development'
org.opencontainers.image.licenses: BSD
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- grafana
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/grafana/grafana'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'grafana'
org.opencontainers.image.description: 'Metrics dashboard and graph editor'
org.opencontainers.image.licenses: 'AGPL-3.0-only AND Apache-2.0'
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -0,0 +1,21 @@
FROM {{ registry }}{{ branch }}/{{ alt_image }}:latest
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="kafka"
LABEL org.opencontainers.image.description="Apache Kafka is a distributed event store and stream-processing platform"
LABEL org.opencontainers.image.source="https://github.com/apache/kafka"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_packages("kafka", "ca-certificates", "gpg") }}
USER kafka:kafka
EXPOSE 9092 2181
WORKDIR /var/lib/kafka
VOLUME ["/var/lib/kafka","/var/log/kafka"]
COPY kafka-entrypoint.sh /kafka-entrypoint.sh
ENTRYPOINT [ "/bin/bash" ]
CMD ["/kafka-entrypoint.sh"]

37
org/alt/kafka/README.md Normal file
View File

@ -0,0 +1,37 @@
# Kafka image
Command for run kafka server:
```
podman run --rm -it -p 9092:9092 <REGISTRY>/<BRANCH>/kafka:latest
```
To lead images running need use kafka-entrypoint.sh or change it. As default login kafka need runnig zookeeper and than kafka's start script.
Commnad for using kafka:
```
podman exec -it -u kafka <CONTAINER ID> /usr/bin/sh
```
```
sh-5.2$ /usr/lib/kafka/bin/kafka-topics.sh --create --topic quickstart-events --bootstrap-server localhost:9092
```
Created topic quickstart-events.
```
sh-5.2$ /usr/lib/kafka/bin/kafka-topics.sh --describe --topic quickstart-events --bootstrap-server localhost:9092
```
Topic: quickstart-events TopicId: kPjhCFFAS-Sg5J3Hpgr-PA PartitionCount: 1 ReplicationFactor: 1 Configs:
Topic: quickstart-events Partition: 0 Leader: 0 Replicas: 0 Isr: 0 Elr: N/A LastKnownElr: N/A
```
sh-5.2$ /usr/lib/kafka/bin/kafka-console-producer.sh --topic quickstart-events --bootstrap-server localhost:9092
```
>hello 1
>hello 2
>hello 3
```
sh-5.2$ /usr/lib/kafka/bin/kafka-console-consumer.sh --topic quickstart-events --from-beginning --bootstrap-server localhost:9092
```
hello 1
hello 2
hello 3
^CProcessed a total of 3 messages

15
org/alt/kafka/info.yaml Normal file
View File

@ -0,0 +1,15 @@
---
is_versioned: true
version_template: "{{ version }}"
source_packages:
- kafka
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/apache/kafka'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'kafka'
org.opencontainers.image.description: 'Apache Kafka is a distributed event store and stream-processing platform'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -0,0 +1,4 @@
#!/bin/sh -eux
nohup /usr/lib/kafka/bin/zookeeper-server-start.sh /etc/kafka/zookeeper.properties &
/usr/lib/kafka/bin/kafka-server-start.sh /etc/kafka/server.properties

1
org/alt/kafka/test Normal file
View File

@ -0,0 +1 @@
ls -a /usr/lib/kafka/bin/ | grep kafka && /usr/lib/kafka/bin/kafka-topics.sh --version

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- loki
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/grafana/loki'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'loki'
org.opencontainers.image.description: 'Like Prometheus, but for logs'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -15,7 +15,7 @@ RUN cd /etc/nginx/sites-enabled.d && ln -s ../sites-available.d/default.conf .
RUN ln -sf /dev/stdout /var/log/nginx/access.log
RUN ln -sf /dev/stderr /var/log/nginx/error.log
RUN sed -Ei 's/^([[:space:]]*listen[[:space:]]+)localhost(:80)/\10.0.0.0\2/' \
RUN sed -Ei 's/^([[:space:]]*listen[[:space:]]+)(localhost|127.0.0.1)(:80)/\10.0.0.0\3/' \
/etc/nginx/sites-available.d/default.conf
EXPOSE 80

View File

@ -5,4 +5,13 @@ source_packages:
- nginx
- apache2
- tzdata
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://nginx.org/'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'nginx'
org.opencontainers.image.description: 'Fast HTTP server, extremely useful as an Apache frontend'
org.opencontainers.image.licenses: BSD
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -4,4 +4,13 @@ version_template: "{{ version }}"
source_packages:
- node
- yarn
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/nodejs/node'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'node'
org.opencontainers.image.description: 'Evented I/O for V8 Javascript'
org.opencontainers.image.licenses: MIT
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- java-21-openjdk
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://openjdk-sources.osci.io'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'openjdk21'
org.opencontainers.image.description: 'OpenJDK 21 Runtime Environment'
org.opencontainers.image.licenses: 'Apache-1.1 and Apache-2.0 and BSD and BSD with advertising and GPL-2.0 and GPL-2.0 with exceptions and IJG and LGPL-2.0+ and MIT and MPL-2.0 and ALT-Public-Domain and W3C and Zlib and ISC and FTL and RSA-MD'
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,9 +3,18 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- >
{% if branch in [ "p10", "c10f1", "c10f2"] %}
{% raw %}php8.2{% endraw %}
{% else %}
{%- if branch in [ "p10", "c10f1", "c10f2"] -%}
php8.2
{%- else -%}
php8.3
{% endif %}
{%- endif -%}
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/php/php-src'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'php'
org.opencontainers.image.description: 'The PHP language environment for development'
org.opencontainers.image.licenses: PHP-3.01
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- postgresql16
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/postgres/postgres'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'postgresql16'
org.opencontainers.image.description: 'PostgreSQL rograms and libraries'
org.opencontainers.image.licenses: PostgreSQL
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -2,7 +2,7 @@ FROM {{ registry }}{{ branch }}/{{ alt_image }}:latest
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="alertmanager"
LABEL org.opencontainers.image.title="prometheus-alertmanager"
LABEL org.opencontainers.image.description="The Alertmanager handles alerts sent by client applications"
LABEL org.opencontainers.image.source="https://github.com/prometheus/alertmanager"
LABEL org.opencontainers.image.licenses="Apache-2.0"

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- prometheus-alertmanager
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/prometheus/alertmanager'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'prometheus-alertmanager'
org.opencontainers.image.description: 'The Alertmanager handles alerts sent by client applications'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- prometheus-node_exporter
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/prometheus/node_exporter'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'prometheus-node_exporter'
org.opencontainers.image.description: 'Prometheus exporter for hardware and OS metrics exposed by *NIX kernels'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- prometheus
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/prometheus/prometheus'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'prometheus'
org.opencontainers.image.description: 'Prometheus monitoring system and time series database'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -6,4 +6,13 @@ source_packages:
- python3-module-setuptools
- python3-module-pip
- gcc-defaults
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/python/cpython'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'python'
org.opencontainers.image.description: 'Python 3 and tools needed for development'
org.opencontainers.image.licenses: Python
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -5,4 +5,13 @@ source_packages:
- python
- python-module-setuptools
- gcc-defaults
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://www.python.org/downloads/source'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'python'
org.opencontainers.image.description: 'Python 2 and tools needed for development'
org.opencontainers.image.licenses: Python-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- rabbitmq-server
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/rabbitmq/rabbitmq-server'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'rabbitmq'
org.opencontainers.image.description: 'The RabbitMQ server'
org.opencontainers.image.licenses: MPL-1.1
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -0,0 +1,19 @@
FROM {{ registry }}{{ branch }}/{{ alt_image }}:latest
MAINTAINER alt-cloud
LABEL org.opencontainers.image.title="redis"
LABEL org.opencontainers.image.description="Redis is an advanced key-value store"
LABEL org.opencontainers.image.source="http://redis.io"
LABEL org.opencontainers.image.licenses="BSD-3-Clause AND BSD-2-Clause AND MIT AND BSL-1.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_packages("ca-certificates","redis","redis-cli") }}
USER _redis:_redis
EXPOSE 6379
VOLUME ["/var/lib/redis","/var/log/redis"]
WORKDIR /var/lib/redis
ENTRYPOINT [ "/usr/sbin/redis-server" ]
CMD [ "/etc/redis/redis.conf" ]

8
org/alt/redis/README.md Normal file
View File

@ -0,0 +1,8 @@
# Redis image
Command for run redis-db server:
```
podman run --rm -it -v ./redis.conf:/etc/redis/redis.conf -p 6379:6379 <REGISTRY>/<BRANCH>/redis:latest
```
For testing running server you can run redis.py, if it's working you will see version redis

15
org/alt/redis/info.yaml Normal file
View File

@ -0,0 +1,15 @@
---
is_versioned: true
version_template: "{{ version }}"
source_packages:
- redis
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'http://redis.io/'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'redis'
org.opencontainers.image.description: 'Redis is an advanced key-value store'
org.opencontainers.image.licenses: 'BSD-3-Clause AND BSD-2-Clause AND MIT AND BSL-1.0'
org.opencontainers.image.vendor: 'ALT Linux Team'
...

22
org/alt/redis/redis.py Executable file
View File

@ -0,0 +1,22 @@
#!/usr/bin/python3
import redis
def main():
r = redis.Redis(host='127.0.0.1', port=6379, db=0, username='test', password='test')
try:
info = r.info()
print(info['redis_version'])
response = r.ping()
if response:
print("Подключение успешно!")
else:
print("Не удалось подключиться к Redis.")
except redis.exceptions.RedisError as e:
print(f"Ошибка: {e}")
if __name__ == "__main__":
main()

1
org/alt/redis/test Normal file
View File

@ -0,0 +1 @@
redis-cli --version && redis-server --version

View File

@ -0,0 +1,5 @@
bind 0.0.0.0
requirepass test
appendonly yes
appendfsync everysec
user test on -DEBUG +@all ~* >test

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- docker-registry
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/docker/distribution'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'registry'
org.opencontainers.image.description: 'The Docker toolset to pack, ship, store, and deliver content'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,9 +3,18 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- >
{% if branch in ["p10", "c10f2", "c10f1"] %}
{% raw %}ruby{% endraw %}
{% else %}
{%- if branch in ["p10", "c10f2", "c10f1"] -%}
ruby
{%- else -%}
gem-irb
{% endif %}
{%- endif -%}
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/ruby/ruby'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'ruby'
org.opencontainers.image.description: 'Interactive Ruby Shell'
org.opencontainers.image.licenses: 'BSD-2-Clause or Ruby'
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- systemd
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/systemd/systemd'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'systemd'
org.opencontainers.image.description: 'System and Session Manager'
org.opencontainers.image.licenses: LGPLv2.1+
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- trivy
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://aquasecurity.github.io/trivy'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'trivy'
org.opencontainers.image.description: 'A Fast Vulnerability Scanner for Containers'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -5,4 +5,13 @@ source_packages:
- unit
- curl
- tzdata
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/nginx/unit'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'unit'
org.opencontainers.image.description: 'NGINX Unit is a lightweight and versatile web-server'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- zot
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/project-zot/zot'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'zot'
org.opencontainers.image.description: 'A production-ready vendor-neutral OCI-native container image registry (purely based on OCI Distribution Specification)'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -4,4 +4,13 @@ version_template: "{{ version }}"
source_packages:
- glibc
- tzdata
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: base
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
org.opencontainers.image.description: 'Base image with localization and timezone packages'
...

View File

@ -6,4 +6,13 @@ source_packages:
- curl
- gnupg
- wget
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'buildpack-deps-curl'
org.opencontainers.image.description: 'Transfer data environment'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -7,4 +7,13 @@ source_packages:
- openssh
- procps
- subversion
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'buildpack-deps-scm'
org.opencontainers.image.description: 'Software configuration management environment'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: false
version_template: "{{ version }}"
source_packages:
- gcc-defaults
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'buildpack-deps'
org.opencontainers.image.description: 'Projects building environment'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -14,4 +14,13 @@ source_packages:
- ripgrep
- zsh
- make
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'devel'
org.opencontainers.image.description: 'This image is only for devel or testing purposes'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -6,4 +6,13 @@ source_packages:
- tzdata
- zlib
- libselinux
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'distroless-base'
org.opencontainers.image.description: 'Base image for running dynamically linked programs'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -4,4 +4,13 @@ version_template: "{{ version }}"
source_packages:
- glibc
- apt-repo
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'distroless-builder'
org.opencontainers.image.description: 'This image is used to build tarballs for distroless images'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -7,4 +7,13 @@ source_packages:
- glibc
- iproute2
- vim
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'distroless-devel'
org.opencontainers.image.description: 'Base image for creating and debugging distroless images'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: false
version_template: "{{ version }}"
source_packages:
- gotop
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'distroless-gotop'
org.opencontainers.image.description: 'Gotop image'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: false
version_template: "{{ version }}"
source_packages:
- distroless-static
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'distroless-static'
org.opencontainers.image.description: 'Base image for running statically linked programs'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: false
version_template: "{{ version }}"
source_packages:
- toybox
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'distroless-toybox'
org.opencontainers.image.description: 'Base image with toybox environment'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: false
version_template: "{{ version }}"
source_packages:
- distroless-true
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'distroless-true'
org.opencontainers.image.description: 'True-command image for zero status returning'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- cert-manager
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/cert-manager/cert-manager'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'cert-manager-acmesolver'
org.opencontainers.image.description: 'HTTP server used to solve ACME challenges'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- cert-manager
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/cert-manager/cert-manager'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'cert-manager-cainjector'
org.opencontainers.image.description: 'cert-manager CA injector is a Kubernetes addon to automate the injection of CA data into webhooks and APIServices from cert-manager certificates'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- cert-manager
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/cert-manager/cert-manager'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'cert-manager-controller'
org.opencontainers.image.description: 'Automatically provision and manage TLS certificates in Kubernetes'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- cert-manager
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/cert-manager/cert-manager'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'cert-manager-startupapicheck'
org.opencontainers.image.description: 'Check that cert-manager started successfully'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- cert-manager
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/cert-manager/cert-manager'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'cert-manager-webhook'
org.opencontainers.image.description: 'The webhook component provides API validation, mutation and conversion functionality for cert-manager'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -8,7 +8,17 @@ LABEL org.opencontainers.image.source="https://github.com/coredns/coredns"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{% if branch in ["sisyphus", "p11", "c10f2"] %}
{% if pkg_versions and "k8s/coredns" in pkg_versions %}
{% set num_version_parts = (pkg_versions["k8s/coredns"].split('.') | length) %}
{% else %}
{% set num_version_parts = 0 %}
{% endif %}
{% if num_version_parts == 2 %}
ARG PKG_VERSION
{{ install_packages("coredns-for-kubernetes${PKG_VERSION}") }}
{% elif num_version_parts == 3 %}
ARG PKG_VERSION
{{ install_packages("coredns${PKG_VERSION}") }}

View File

@ -3,9 +3,21 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- >
{% if branch in ["sisyphus", "p11", "c10f2"] %}
{% raw %}coredns{{ version }}{% endraw %}
{% else %}
{%- set num_version_parts = (version.split('.') | length) -%}
{%- if num_version_parts == 2 -%}
coredns-for-kubernetes{{ version }}
{%- elif num_version_parts == 3 -%}
coredns{{ version }}
{%- else -%}
coredns
{% endif %}
{%- endif -%}
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/coredns/coredns'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'coredns'
org.opencontainers.image.description: 'CoreDNS is a DNS server that chains plugins'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -8,9 +8,13 @@ LABEL org.opencontainers.image.source="https://github.com/etcd-io/etcd"
LABEL org.opencontainers.image.licenses="Apache-2.0"
LABEL org.opencontainers.image.vendor="ALT Linux Team"
{{ install_packages("etcd") }}
ARG PKG_VERSION
RUN ln -s /usr/sbin/etcd /usr/local/bin/etcd
{{ install_packages("etcd-for-kubernetes${PKG_VERSION}") }}
RUN ln -s /usr/sbin/etcd /usr/local/bin/etcd && ln -s /usr/bin/etcdctl /usr/local/bin/etcdctl
EXPOSE 2379 2380
VOLUME /data

19
org/k8s/etcd/README.md Normal file
View File

@ -0,0 +1,19 @@
dockerfiles-alt-etcd
=========================
ALT dockerfile for etcd.
Copy Dockerfile somewhere and build the image:
```console
$ podman build --rm -t <username>/etcd.
```
And launch the etcd container:
```console
$ podman run -d -v <etcd data dir>:/data <username>/etcd
```
If etcdclt is wanted, it could be run via:
```console
$ podman run --entrypoint etcdctl <username>/etcd
```

View File

@ -1,12 +1,18 @@
---
is_versioned: true
version_template: >
{% set version_patch = version.split(".")[2] | int %}
{% if version_patch < 16 %}
{{ version }}-0
{% else %}
v{{ version }}
{% endif %}
version_template:
- "v{{ version }}"
- "{{ version }}"
- "{{ version }}-0"
source_packages:
- etcd
- etcd-for-kubernetes{{ version }}
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/etcd-io/etcd'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'etcd'
org.opencontainers.image.description: 'Distributed reliable key-value store for the most critical data of a distributed system'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -1 +1 @@
etcd --version
etcd --version && etcdctl --version

View File

@ -1,6 +1,27 @@
---
is_versioned: true
version_template: v{{ version.rsplit('.', 1) | first }}-flannel{{ version.rsplit('.', 1) | last }}
version_template: >-
{%- set version_parts = version.split('.') -%}
{%- if version_parts | length == 3 -%}
{%- if version == "1.4.0" -%}
v{{ version }}-flannel1
{%- else -%}
v{{ version }}
{%- endif %}
{%- elif version_parts | length == 4 -%}
v{{ version.rsplit('.', 1) | first }}-flannel{{ version.rsplit('.', 1) | last }}
{%- else -%}
{{ "Invalid version format: must have 3 or 4 parts" | fail }}
{%- endif %}
source_packages:
- cni-plugin-flannel
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/flannel-io/cni-plugin'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'flannel-cni-plugin'
org.opencontainers.image.description: 'CNI network plugin that is powered by flannel'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -2,3 +2,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- flannel
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/flannel-io/flannel'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'flannel'
org.opencontainers.image.description: 'Network fabric for containers'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- kubernetes{{ version }}
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubernetes/kubernetes'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'kube-apiserver'
org.opencontainers.image.description: 'The Kubernetes API server validates and configures data for the api objects which include pods, services, replicationcontrollers, and others'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- kubernetes{{ version }}
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubernetes/kubernetes'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'kube-controller-manager'
org.opencontainers.image.description: 'The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- kubernetes{{ version }}
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubernetes/kubernetes'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'kube-proxy'
org.opencontainers.image.description: 'The Kubernetes network proxy runs on each node'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- kubernetes{{ version }}
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubernetes/kubernetes'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'kube-scheduler'
org.opencontainers.image.description: 'The Kubernetes scheduler is a control plane process which assigns Pods to Nodes'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: v{{ version }}
source_packages:
- kubernetes{{ version }}
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubernetes/kubernetes'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'kubelet'
org.opencontainers.image.description: 'An agent that runs on each node in the cluster. It makes sure that containers are running in a Pod'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -2,4 +2,13 @@
is_versioned: true
source_packages:
- kubernetes-pause
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: ''
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'pause'
org.opencontainers.image.description: 'Simple pause image'
org.opencontainers.image.licenses: GPLv2
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -2,4 +2,13 @@
is_versioned: true
source_packages:
- k8s-trivy-node-collector
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/aquasecurity/k8s-node-collector'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'trivy-node-collector'
org.opencontainers.image.description: 'Open source collector who collect Node information (fs and process data) and output in a table/json format'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- kubevirt
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubevirt/kubevirt'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'virt-api'
org.opencontainers.image.description: 'Kubevirt API server'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- kubevirt
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubevirt/kubevirt'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'virt-controller'
org.opencontainers.image.description: 'Controller for kubevirt'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- kubevirt
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubevirt/kubevirt'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'virt-exportproxy'
org.opencontainers.image.description: 'Export proxy for kubevirt'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- kubevirt
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubevirt/kubevirt'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'virt-exportserver'
org.opencontainers.image.description: 'Export server for kubevirt'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -16,6 +16,6 @@ RUN useradd -g qemu -m -d /home/qemu -s /bin/bash -c "qemu user" -u 107 qemu > /
"kubevirt-container-disk"
) }}
RUN cp -f /usr/share/kube-virt/virt-handler/nsswitch.conf /etc/ && cp -f /usr/share/kube-virt/virt-handler/virt_launcher.cil /
RUN cp -f /usr/share/kube-virt/virt-handler/nsswitch.conf /etc/
ENTRYPOINT ["/usr/bin/virt-handle"]

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- kubevirt
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubevirt/kubevirt'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'virt-handler'
org.opencontainers.image.description: 'Handler component for kubevirt'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- kubevirt
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubevirt/kubevirt'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'virt-launcher'
org.opencontainers.image.description: 'Launcher component for kubevirt'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...

View File

@ -3,4 +3,13 @@ is_versioned: true
version_template: "{{ version }}"
source_packages:
- kubevirt
annotations:
org.opencontainers.image.revision: ''
org.opencontainers.image.source: 'https://github.com/kubevirt/kubevirt'
org.opencontainers.image.url: ''
org.opencontainers.image.version: ''
org.opencontainers.image.title: 'virt-operator'
org.opencontainers.image.description: 'Operator component for kubevirt'
org.opencontainers.image.licenses: Apache-2.0
org.opencontainers.image.vendor: 'ALT Linux Team'
...