forked from alt/image-forge
Compare commits
17 Commits
test-workf
...
automatic-
Author | SHA1 | Date | |
---|---|---|---|
57bcce92b5 | |||
c553e50d53 | |||
bb085c8498 | |||
dd9866702e | |||
6235bdb955 | |||
ad980dbb06 | |||
d4f88412bf | |||
0c09627b12 | |||
d095e0832e | |||
ccea111eff | |||
7fea91a372 | |||
4f1a12d561 | |||
1e018cfc07 | |||
19cc3e9200 | |||
0e21a9248a | |||
8d9a890573 | |||
b0178e587a |
@ -24,10 +24,7 @@ do
|
||||
then imgpath="$2-$1/$IM:latest"
|
||||
fi
|
||||
|
||||
entrypoint='/usr/bin/sh'
|
||||
if [[ $1 == 'p10' ]]
|
||||
then entrypoint='/bin/sh'
|
||||
fi
|
||||
entrypoint='/bin/sh'
|
||||
|
||||
command="echo empty_command"
|
||||
if [[ $test != '' ]]; then
|
||||
|
@ -26,6 +26,13 @@ jobs:
|
||||
env:
|
||||
GU: ${{ gitea.server_url }}
|
||||
GR: ${{ gitea.repository }}
|
||||
- name: Set repo for c10f2 (Temporary)
|
||||
if: ${{ contains(github.ref_name, 'c10f2') }}
|
||||
run: |
|
||||
echo "event tag=${{ github.ref_name }}"
|
||||
echo "10.4.0.3 update.altsp.su" >> /etc/hosts
|
||||
echo "cat /etc/hosts"
|
||||
cat /etc/hosts
|
||||
- name: Update apt
|
||||
uses: actions/init-alt-env@v1
|
||||
- name: Install requires
|
||||
@ -55,6 +62,9 @@ jobs:
|
||||
localimage=$(echo $EV | jq '.ref' -r | sed 's/refs\/tags\///g' | cut -d '_' -f 2)
|
||||
echo "IMAGE=$localimage" >> ${GITHUB_ENV}
|
||||
echo "IMAGE=$localimage"
|
||||
org=$(echo "$localimage" | cut -d '/' -f 1)
|
||||
echo "ORG=$org" >> ${GITHUB_ENV}
|
||||
echo "ORG=$org"
|
||||
- name: Get test for image
|
||||
run: |
|
||||
if test -f ${{ gitea.workspace }}/org/$IM/test; then testscript=$(cat ${{ gitea.workspace }}/org/$IM/test); else testscript=""; fi
|
||||
@ -65,11 +75,13 @@ jobs:
|
||||
- name: Run building script
|
||||
id: build-script
|
||||
run: |
|
||||
if [[ "$IM" == *"k8s"* ]]; then k8sarg="--tags=tags.toml --overwrite-organization $ORG-$BR"; else k8sarg=""; fi
|
||||
echo "build.py -i $IM -b $BR"
|
||||
${{ gitea.workspace }}/build.py -i $IM -b $BR
|
||||
${{ gitea.workspace }}/build.py -i $IM -b $BR $k8sarg
|
||||
env:
|
||||
IM: ${{ env.IMAGE }}
|
||||
BR: ${{ env.BRANCH }}
|
||||
ORG: ${{ env.ORG }}
|
||||
continue-on-error: true
|
||||
- name: Send notification if build crashed
|
||||
if: ${{ steps.build-script.outcome != 'success' }}
|
||||
@ -111,7 +123,7 @@ jobs:
|
||||
if: ${{ needs.build-process.outputs.test != '' }}
|
||||
continue-on-error: true
|
||||
run: |
|
||||
if [[ $BR = 'p10' ]]; then podman run --rm --entrypoint="/bin/sh" $URL/$IM:$BR -c "$TEST"; else podman run --rm --entrypoint="/usr/bin/sh" $URL/$IM:$BR -c "$TEST"; fi
|
||||
if [[ "$IM" == *"k8s"* ]]; then echo "skip tests for k8s images"; else podman run --rm --entrypoint="/bin/sh" $URL/$IM:$BR -c "$TEST"; fi
|
||||
env:
|
||||
IM: ${{ needs.build-process.outputs.image }}
|
||||
BR: ${{ needs.build-process.outputs.branch }}
|
||||
|
58
README.md
58
README.md
@ -26,6 +26,64 @@ the organization `<ORGANIZATION>`, run:
|
||||
```
|
||||
If you push to the users repository, then organiztion is your username.
|
||||
|
||||
## info.yaml format
|
||||
|
||||
- `is_versioned`: **bool** (REQUIRED)
|
||||
|
||||
Whether to use package version as a tag for this image
|
||||
|
||||
- `source_packages`: **list of strings** (REQUIRED)
|
||||
|
||||
List of source packages (src.rpm) this image depends on.
|
||||
If contains jinja2 template syntax, `--package-version`
|
||||
CLI option must be specified.
|
||||
|
||||
- `version_template`: **string** (OPTIONAL)
|
||||
|
||||
template to apply when construction the tag,
|
||||
`version` string variable is available in the template
|
||||
|
||||
### examples
|
||||
|
||||
|
||||
#### org/k8s/flannel-cni-plugin
|
||||
|
||||
```yaml
|
||||
is_versioned: true
|
||||
version_template: v{{ version.rsplit('.', 1) | first }}-flannel{{ version.rsplit('.', 1) | last }}
|
||||
source_packages:
|
||||
- cni-plugin-flannel
|
||||
```
|
||||
|
||||
```bash
|
||||
./build.py -i k8s/flannel-cni-plugin
|
||||
```
|
||||
|
||||
#### org/k8s/kube-apiserver
|
||||
|
||||
```yaml
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- kubernetes{{ version }}
|
||||
```
|
||||
|
||||
```bash
|
||||
./build.py -b sisyphus -i k8s/kube-apiserver --package-version '{"k8s/kube-apiserver": "1.31"}'
|
||||
```
|
||||
|
||||
#### org/k8s/pause
|
||||
|
||||
```yaml
|
||||
is_versioned: true
|
||||
source_packages:
|
||||
- kubernetes-pause
|
||||
```
|
||||
|
||||
```bash
|
||||
./build.py -i k8s/pause
|
||||
```
|
||||
|
||||
## Dependencies
|
||||
On x86_64 machine using p10 branch you need:
|
||||
- `python3-module-tomli`
|
||||
|
117
build.py
117
build.py
@ -6,25 +6,61 @@ import json
|
||||
import re
|
||||
import subprocess
|
||||
import textwrap
|
||||
from dataclasses import dataclass
|
||||
from graphlib import TopologicalSorter
|
||||
from pathlib import Path
|
||||
|
||||
import requests
|
||||
import tomli
|
||||
import yaml
|
||||
from jinja2 import Template
|
||||
|
||||
|
||||
ORG_DIR = Path("org")
|
||||
|
||||
PKG_VERSIONS: dict | None = None
|
||||
|
||||
|
||||
@dataclass
|
||||
class Image:
|
||||
def __init__(self, canonical_name):
|
||||
canonical_name: str
|
||||
is_versioned: bool | None
|
||||
verion_template: str | None
|
||||
source_packages: list[str] | None
|
||||
|
||||
def __init__(self, canonical_name: str):
|
||||
self.canonical_name = canonical_name
|
||||
self.path = ORG_DIR / canonical_name
|
||||
self.base_name = re.sub("^[^/]+/", "", canonical_name)
|
||||
|
||||
def __str__(self):
|
||||
return (f'Image(canonical_name="{self.canonical_name}", '
|
||||
f'path="{self.path}", base_name="{self.base_name}")')
|
||||
info_file = self.path / "info.yaml"
|
||||
if not info_file.exists():
|
||||
self.is_versioned = None
|
||||
self.source_packages = None
|
||||
return
|
||||
|
||||
info: dict = yaml.safe_load(info_file.read_text())
|
||||
|
||||
if "is_versioned" not in info:
|
||||
raise RuntimeError(
|
||||
f"info.yaml for {self.canonical_name} doesn't contain 'is_versioned' key"
|
||||
)
|
||||
|
||||
if "source_packages" not in info:
|
||||
raise RuntimeError(
|
||||
f"info.yaml for {self.canonical_name} doesn't contain 'source_packages' key"
|
||||
)
|
||||
|
||||
self.is_versioned = info["is_versioned"]
|
||||
self.source_packages = info["source_packages"]
|
||||
|
||||
if self.is_versioned and not self.source_packages:
|
||||
raise RuntimeError(
|
||||
f"source_packages for {self.canonical_name} doesn't contain any values"
|
||||
)
|
||||
|
||||
self.version_template = None
|
||||
if "version_template" in info:
|
||||
self.version_template = info["version_template"]
|
||||
|
||||
|
||||
class Tasks:
|
||||
@ -49,17 +85,66 @@ class Tasks:
|
||||
]
|
||||
|
||||
|
||||
def api_get_source_package_version(branch: str, package_name: str) -> str:
|
||||
api_url = "https://rdb.altlinux.org/api/site/package_versions_from_tasks"
|
||||
params = {"branch": branch, "name": package_name}
|
||||
response = requests.get(api_url, params)
|
||||
if response.status_code != 200:
|
||||
print(response)
|
||||
raise RuntimeError(
|
||||
f"failed to retrieve source package version: source package {package_name!r}, branch {branch!r} "
|
||||
)
|
||||
|
||||
result = response.json()
|
||||
|
||||
return result["versions"][0]["version"]
|
||||
|
||||
|
||||
class Tags:
|
||||
def __init__(self, tags_file, latest):
|
||||
def __init__(self, tags_file: str | None, latest: str):
|
||||
if tags_file is None:
|
||||
self._tags = None
|
||||
else:
|
||||
tags_file = Path(tags_file)
|
||||
self._tags = tomli.loads(tags_file.read_text())
|
||||
self._tags = tomli.loads(Path(tags_file).read_text())
|
||||
self._latest = latest
|
||||
|
||||
def tags(self, branch, image: Image):
|
||||
def tags(self, branch: str, image: Image):
|
||||
if self._tags is None:
|
||||
if image.is_versioned and image.source_packages:
|
||||
package_name = image.source_packages[0]
|
||||
|
||||
if re.search("{%.*%}", package_name):
|
||||
package_name = Template(package_name).render(branch=branch).strip()
|
||||
print(f"{package_name=}")
|
||||
|
||||
if re.search("{{.*}}", package_name):
|
||||
if PKG_VERSIONS is None:
|
||||
raise RuntimeError(
|
||||
f"--package-versions option is not specified, required for {image.canonical_name!r}"
|
||||
)
|
||||
|
||||
if image.canonical_name not in PKG_VERSIONS:
|
||||
raise RuntimeError(
|
||||
f"--package-versions option does not contain version for image {image.canonical_name!r}"
|
||||
)
|
||||
|
||||
if not PKG_VERSIONS[image.canonical_name]:
|
||||
raise RuntimeError(
|
||||
f"invalid version for image {image.canonical_name!r}: {PKG_VERSIONS[image.canonical_name]!r}"
|
||||
)
|
||||
|
||||
package_name = Template(package_name).render(
|
||||
version=PKG_VERSIONS[image.canonical_name]
|
||||
)
|
||||
version = api_get_source_package_version(branch, package_name)
|
||||
|
||||
if image.version_template is not None:
|
||||
version = (
|
||||
Template(image.version_template).render(version=version).strip()
|
||||
)
|
||||
|
||||
tags = [version]
|
||||
else:
|
||||
tags = [branch]
|
||||
else:
|
||||
tags = self._tags[image.canonical_name][branch].copy()
|
||||
@ -580,6 +665,12 @@ class DockerBuilder:
|
||||
f"--platform={platforms}",
|
||||
".",
|
||||
]
|
||||
|
||||
if PKG_VERSIONS is not None and image.canonical_name in PKG_VERSIONS:
|
||||
build_cmd.insert(
|
||||
-1, f"--build-arg=PKG_VERSION={PKG_VERSIONS[image.canonical_name]}"
|
||||
)
|
||||
|
||||
self.run(build_cmd, cwd=image.path)
|
||||
|
||||
for tag in tags[1:]:
|
||||
@ -749,6 +840,11 @@ def parse_args():
|
||||
choices=stages,
|
||||
help="list of stages to skip",
|
||||
)
|
||||
parser.add_argument(
|
||||
"--package-versions",
|
||||
type=json.loads,
|
||||
help="json string where key is image name, value is the package version",
|
||||
)
|
||||
args = parser.parse_args()
|
||||
|
||||
args.stages = set(args.stages) - set(args.skip_stages)
|
||||
@ -760,7 +856,10 @@ def parse_args():
|
||||
|
||||
|
||||
def main():
|
||||
global PKG_VERSIONS
|
||||
|
||||
args = parse_args()
|
||||
PKG_VERSIONS = args.package_versions
|
||||
arches = args.arches
|
||||
images_info = ImagesInfo()
|
||||
tags = Tags(args.tags, args.latest)
|
||||
|
@ -5,4 +5,4 @@ skip-branches = [ "p9" ]
|
||||
skip-arches = [ "386" ]
|
||||
|
||||
["alt/ansible"]
|
||||
skip-arches = [ "c10f2", "c10f1" ]
|
||||
skip-branches = [ "c10f2", "c10f1", "p10" ]
|
||||
|
@ -2,12 +2,6 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
|
||||
|
||||
MAINTAINER alt-cloud
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-acmesolver"
|
||||
LABEL org.opencontainers.image.description="HTTP server used to solve ACME challenges."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages("cert-manager") }}
|
||||
|
||||
RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-manger cert-manger
|
||||
@ -15,3 +9,9 @@ RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-
|
||||
USER 1000
|
||||
|
||||
ENTRYPOINT ["/usr/bin/acmesolver"]
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-acmesolver"
|
||||
LABEL org.opencontainers.image.description="HTTP server used to solve ACME challenges."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
6
org/k8s/cert-manager-acmesolver/info.yaml
Normal file
6
org/k8s/cert-manager-acmesolver/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- cert-manager
|
||||
...
|
@ -2,12 +2,6 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
|
||||
|
||||
MAINTAINER alt-cloud
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-cainjector"
|
||||
LABEL org.opencontainers.image.description="cert-manager CA injector is a Kubernetes addon to automate the injection of CA data into webhooks and APIServices from cert-manager certificates."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages("cert-manager") }}
|
||||
|
||||
RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-manger cert-manger
|
||||
@ -15,3 +9,9 @@ RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-
|
||||
USER 1000
|
||||
|
||||
ENTRYPOINT ["/usr/bin/cainjector"]
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-cainjector"
|
||||
LABEL org.opencontainers.image.description="cert-manager CA injector is a Kubernetes addon to automate the injection of CA data into webhooks and APIServices from cert-manager certificates."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
6
org/k8s/cert-manager-cainjector/info.yaml
Normal file
6
org/k8s/cert-manager-cainjector/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- cert-manager
|
||||
...
|
@ -2,12 +2,6 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
|
||||
|
||||
MAINTAINER alt-cloud
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-controller"
|
||||
LABEL org.opencontainers.image.description="Automatically provision and manage TLS certificates in Kubernetes."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages("cert-manager") }}
|
||||
|
||||
RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-manger cert-manger
|
||||
@ -15,3 +9,9 @@ RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-
|
||||
USER 1000
|
||||
|
||||
ENTRYPOINT ["/usr/bin/controller"]
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-controller"
|
||||
LABEL org.opencontainers.image.description="Automatically provision and manage TLS certificates in Kubernetes."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
6
org/k8s/cert-manager-controller/info.yaml
Normal file
6
org/k8s/cert-manager-controller/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- cert-manager
|
||||
...
|
@ -2,12 +2,6 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
|
||||
|
||||
MAINTAINER alt-cloud
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-startupapicheck"
|
||||
LABEL org.opencontainers.image.description="Check that cert-manager started successfully."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages("cert-manager") }}
|
||||
|
||||
RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-manger cert-manger
|
||||
@ -15,3 +9,9 @@ RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-
|
||||
USER 1000
|
||||
|
||||
ENTRYPOINT ["/usr/bin/startupapicheck"]
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-startupapicheck"
|
||||
LABEL org.opencontainers.image.description="Check that cert-manager started successfully."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
6
org/k8s/cert-manager-startupapicheck/info.yaml
Normal file
6
org/k8s/cert-manager-startupapicheck/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- cert-manager
|
||||
...
|
@ -2,12 +2,6 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
|
||||
|
||||
MAINTAINER alt-cloud
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-webhook"
|
||||
LABEL org.opencontainers.image.description="The webhook component provides API validation, mutation and conversion functionality for cert-manager."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages("cert-manager") }}
|
||||
|
||||
RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-manger cert-manger
|
||||
@ -15,3 +9,9 @@ RUN groupadd -r -g 1000 cert-manger && useradd --no-log-init -r -u 1000 -g cert-
|
||||
USER 1000
|
||||
|
||||
ENTRYPOINT ["/usr/bin/webhook"]
|
||||
|
||||
LABEL org.opencontainers.image.title="cert-manager-webhook"
|
||||
LABEL org.opencontainers.image.description="The webhook component provides API validation, mutation and conversion functionality for cert-manager."
|
||||
LABEL org.opencontainers.image.source="https://github.com/cert-manager/cert-manager"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
6
org/k8s/cert-manager-webhook/info.yaml
Normal file
6
org/k8s/cert-manager-webhook/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- cert-manager
|
||||
...
|
@ -8,6 +8,13 @@ LABEL org.opencontainers.image.source="https://github.com/coredns/coredns"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{% if branch in ["sisyphus", "p11", "c10f2"] %}
|
||||
ARG PKG_VERSION
|
||||
|
||||
{{ install_packages("coredns${PKG_VERSION}") }}
|
||||
{% else %}
|
||||
{{ install_packages("coredns") }}
|
||||
{% endif %}
|
||||
|
||||
|
||||
ENTRYPOINT ["/usr/bin/coredns"]
|
||||
|
11
org/k8s/coredns/info.yaml
Normal file
11
org/k8s/coredns/info.yaml
Normal file
@ -0,0 +1,11 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- >
|
||||
{% if branch in ["sisyphus", "p11", "c10f2"] %}
|
||||
{% raw %}coredns{{ version }}{% endraw %}
|
||||
{% else %}
|
||||
coredns
|
||||
{% endif %}
|
||||
...
|
12
org/k8s/etcd/info.yaml
Normal file
12
org/k8s/etcd/info.yaml
Normal file
@ -0,0 +1,12 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: >
|
||||
{% set version_patch = version.split(".")[2] | int %}
|
||||
{% if version_patch < 16 %}
|
||||
{{ version }}-0
|
||||
{% else %}
|
||||
v{{ version }}
|
||||
{% endif %}
|
||||
source_packages:
|
||||
- etcd
|
||||
...
|
6
org/k8s/flannel-cni-plugin/info.yaml
Normal file
6
org/k8s/flannel-cni-plugin/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version.rsplit('.', 1) | first }}-flannel{{ version.rsplit('.', 1) | last }}
|
||||
source_packages:
|
||||
- cni-plugin-flannel
|
||||
...
|
4
org/k8s/flannel/info.yaml
Normal file
4
org/k8s/flannel/info.yaml
Normal file
@ -0,0 +1,4 @@
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- flannel
|
@ -2,12 +2,14 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
|
||||
|
||||
MAINTAINER alt-cloud
|
||||
|
||||
ARG PKG_VERSION
|
||||
|
||||
{{ install_packages("kubernetes${PKG_VERSION}-master") }}
|
||||
|
||||
ENTRYPOINT ["/usr/bin/kube-apiserver"]
|
||||
|
||||
LABEL org.opencontainers.image.title="kube-apiserver"
|
||||
LABEL org.opencontainers.image.description="The Kubernetes API server validates and configures data for the api objects which include pods, services, replicationcontrollers, and others."
|
||||
LABEL org.opencontainers.image.source="https://github.com/kubernetes/kubernetes"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages("kubernetes-master") }}
|
||||
|
||||
ENTRYPOINT ["/usr/bin/kube-apiserver"]
|
||||
|
6
org/k8s/kube-apiserver/info.yaml
Normal file
6
org/k8s/kube-apiserver/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- kubernetes{{ version }}
|
||||
...
|
@ -2,12 +2,14 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
|
||||
|
||||
MAINTAINER alt-cloud
|
||||
|
||||
ARG PKG_VERSION
|
||||
|
||||
{{ install_packages("kubernetes${PKG_VERSION}-master") }}
|
||||
|
||||
ENTRYPOINT ["/usr/bin/kube-controller-manager"]
|
||||
|
||||
LABEL org.opencontainers.image.title="kube-controller-manager"
|
||||
LABEL org.opencontainers.image.description="The Kubernetes controller manager is a daemon that embeds the core control loops shipped with Kubernetes."
|
||||
LABEL org.opencontainers.image.source="https://github.com/kubernetes/kubernetes"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages("kubernetes-master") }}
|
||||
|
||||
ENTRYPOINT ["/usr/bin/kube-controller-manager"]
|
||||
|
6
org/k8s/kube-controller-manager/info.yaml
Normal file
6
org/k8s/kube-controller-manager/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- kubernetes{{ version }}
|
||||
...
|
@ -2,14 +2,16 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
|
||||
|
||||
MAINTAINER alt-cloud
|
||||
|
||||
ARG PKG_VERSION
|
||||
|
||||
{{ install_packages("kubernetes${PKG_VERSION}-node") }}
|
||||
|
||||
RUN ln -s /usr/bin/kube-proxy /usr/local/bin/kube-proxy
|
||||
|
||||
ENTRYPOINT ["/usr/bin/kube-proxy"]
|
||||
|
||||
LABEL org.opencontainers.image.title="kube-proxy"
|
||||
LABEL org.opencontainers.image.description="The Kubernetes network proxy runs on each node."
|
||||
LABEL org.opencontainers.image.source="https://github.com/kubernetes/kubernetes"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages("kubernetes-node") }}
|
||||
|
||||
RUN ln -s /usr/bin/kube-proxy /usr/local/bin/kube-proxy
|
||||
|
||||
ENTRYPOINT ["/usr/bin/kube-proxy"]
|
||||
|
6
org/k8s/kube-proxy/info.yaml
Normal file
6
org/k8s/kube-proxy/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- kubernetes{{ version }}
|
||||
...
|
@ -2,12 +2,14 @@ FROM {{ registry }}{{ alt_image }}:{{ branch }}
|
||||
|
||||
MAINTAINER alt-cloud
|
||||
|
||||
ARG PKG_VERSION
|
||||
|
||||
{{ install_packages("kubernetes${PKG_VERSION}-master") }}
|
||||
|
||||
ENTRYPOINT ["/usr/bin/kube-scheduler"]
|
||||
|
||||
LABEL org.opencontainers.image.title="kube-scheduler"
|
||||
LABEL org.opencontainers.image.description="The Kubernetes scheduler is a control plane process which assigns Pods to Nodes."
|
||||
LABEL org.opencontainers.image.source="https://github.com/kubernetes/kubernetes"
|
||||
LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages("kubernetes-master") }}
|
||||
|
||||
ENTRYPOINT ["/usr/bin/kube-scheduler"]
|
||||
|
6
org/k8s/kube-scheduler/info.yaml
Normal file
6
org/k8s/kube-scheduler/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- kubernetes{{ version }}
|
||||
...
|
6
org/k8s/kubelet/info.yaml
Normal file
6
org/k8s/kubelet/info.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
is_versioned: true
|
||||
version_template: v{{ version }}
|
||||
source_packages:
|
||||
- kubernetes{{ version }}
|
||||
...
|
5
org/k8s/pause/info.yaml
Normal file
5
org/k8s/pause/info.yaml
Normal file
@ -0,0 +1,5 @@
|
||||
---
|
||||
is_versioned: true
|
||||
source_packages:
|
||||
- kubernetes-pause
|
||||
...
|
@ -9,7 +9,8 @@ LABEL org.opencontainers.image.licenses="Apache-2.0"
|
||||
LABEL org.opencontainers.image.vendor="ALT Linux Team"
|
||||
|
||||
{{ install_packages(
|
||||
"k8s-trivy-node-collector"
|
||||
"k8s-trivy-node-collector",
|
||||
"procps"
|
||||
) }}
|
||||
|
||||
RUN ln -s /usr/bin/k8s-trivy-node-collector /usr/bin/node-collector
|
||||
|
5
org/k8s/trivy-node-collector/info.yaml
Normal file
5
org/k8s/trivy-node-collector/info.yaml
Normal file
@ -0,0 +1,5 @@
|
||||
---
|
||||
is_versioned: true
|
||||
source_packages:
|
||||
- k8s-trivy-node-collector
|
||||
...
|
Reference in New Issue
Block a user