Update YAML files with new getty/ip/sshd hashes

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
This commit is contained in:
Rolf Neugebauer 2017-10-05 12:11:51 +01:00
parent d8283fc769
commit 28303f6858
27 changed files with 34 additions and 34 deletions

View File

@ -52,7 +52,7 @@ services:
image: linuxkit/acpid:79e5c20de96e1633c9c40935b99dde45aefba37b
# Enable getty for easier debugging
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
# Run ntpd to keep time synchronised in the VM

View File

@ -18,7 +18,7 @@ services:
- name: rngd
image: linuxkit/rngd:558e86a36242bb74353bc9287b715ddb8567357e
- name: sshd
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
image: linuxkit/sshd:361e9d03f96ef5f22e61c69280ffb9291bde746f
binds:
- /var/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx

View File

@ -15,7 +15,7 @@ services:
- name: dhcpcd
image: linuxkit/dhcpcd:d4408777ed6b6e6e562a5d4938fd09804324b33e
- name: sshd
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
image: linuxkit/sshd:361e9d03f96ef5f22e61c69280ffb9291bde746f
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub

View File

@ -18,7 +18,7 @@ onboot:
command: ["/usr/bin/mountie", "/var/lib/docker"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd

View File

@ -16,13 +16,13 @@ onboot:
image: linuxkit/metadata:da3138079c168e0c5608d8f3853366c113ed91d2
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:558e86a36242bb74353bc9287b715ddb8567357e
- name: sshd
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
image: linuxkit/sshd:361e9d03f96ef5f22e61c69280ffb9291bde746f
binds:
- /var/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx

View File

@ -14,7 +14,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
# to make insecure with passwordless root login, uncomment following lines
#env:
# - INSECURE=true

View File

@ -11,7 +11,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
trust:

View File

@ -7,7 +7,7 @@ init:
- linuxkit/containerd:417f83f7b8dc1fa36acf90effe44f99c7397480a
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd

View File

@ -22,7 +22,7 @@ services:
- name: rngd
image: linuxkit/rngd:558e86a36242bb74353bc9287b715ddb8567357e
- name: sshd
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
image: linuxkit/sshd:361e9d03f96ef5f22e61c69280ffb9291bde746f
trust:
org:
- linuxkit

View File

@ -13,7 +13,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: redis

View File

@ -14,7 +14,7 @@ onboot:
command: ["/sbin/rngd", "-1"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd
@ -22,7 +22,7 @@ services:
- name: dhcpcd
image: linuxkit/dhcpcd:d4408777ed6b6e6e562a5d4938fd09804324b33e
- name: sshd
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
image: linuxkit/sshd:361e9d03f96ef5f22e61c69280ffb9291bde746f
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub

View File

@ -24,7 +24,7 @@ onboot:
command: ["/swap.sh", "--path", "/var/external/swap", "--size", "1G", "--encrypt"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd

View File

@ -14,7 +14,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: tss

View File

@ -11,7 +11,7 @@ onboot:
image: linuxkit/sysctl:154913b72c6f1f33eb408609fca9963628e8c051
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd

View File

@ -19,7 +19,7 @@ onboot:
command: ["sh", "-c", "mkdir /host_var/vpnkit && mount -v -t 9p -o trans=virtio,dfltuid=1001,dfltgid=50,version=9p2000 port /host_var/vpnkit"]
services:
- name: sshd
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
image: linuxkit/sshd:361e9d03f96ef5f22e61c69280ffb9291bde746f
- name: vpnkit-forwarder
image: linuxkit/vpnkit-forwarder:42d80758e3b6a9f58cdfd25e53c775eebe951669
binds:

View File

@ -16,13 +16,13 @@ onboot:
image: linuxkit/metadata:da3138079c168e0c5608d8f3853366c113ed91d2
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:558e86a36242bb74353bc9287b715ddb8567357e
- name: sshd
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
image: linuxkit/sshd:361e9d03f96ef5f22e61c69280ffb9291bde746f
binds:
- /var/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx

View File

@ -13,7 +13,7 @@ onboot:
image: linuxkit/dhcpcd:d4408777ed6b6e6e562a5d4938fd09804324b33e
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: wg0
image: linuxkit/ip:adedf00ca91ed0ed91a40aa76ce23309b32fcb47
image: linuxkit/ip:bdc10950043419d4eb19a10c3122e12ee472d465
net: new
binds:
- /etc/wireguard:/etc/wireguard
@ -26,7 +26,7 @@ onboot:
bindNS:
net: /run/netns/wg0
- name: wg1
image: linuxkit/ip:adedf00ca91ed0ed91a40aa76ce23309b32fcb47
image: linuxkit/ip:bdc10950043419d4eb19a10c3122e12ee472d465
net: new
binds:
- /etc/wireguard:/etc/wireguard

View File

@ -18,7 +18,7 @@ onshutdown:
command: ["/bin/echo", "so long and thanks for all the fish"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd

View File

@ -26,7 +26,7 @@ onboot:
command: ["/usr/bin/mountie", "/var/lib/"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd
@ -34,7 +34,7 @@ services:
- name: ntpd
image: linuxkit/openntpd:0d7befc79842849d0b88d6c3b64200e340d7cf67
- name: sshd
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
image: linuxkit/sshd:361e9d03f96ef5f22e61c69280ffb9291bde746f
- name: kubelet
image: linuxkitprojects/kubernetes:2a42ca12c52a756ffd83ec014f2b396891880e4a
files:

View File

@ -11,7 +11,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
trust:

View File

@ -12,7 +12,7 @@ onboot:
image: linuxkit/sysctl:154913b72c6f1f33eb408609fca9963628e8c051
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd

View File

@ -28,9 +28,9 @@ onboot:
- /lib:/lib # for ifconfig
services:
- name: sshd
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
image: linuxkit/sshd:361e9d03f96ef5f22e61c69280ffb9291bde746f
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
files:

View File

@ -13,7 +13,7 @@ services:
- name: dhcpcd
image: linuxkit/dhcpcd:d4408777ed6b6e6e562a5d4938fd09804324b33e
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
trust:

View File

@ -14,7 +14,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: rngd

View File

@ -23,7 +23,7 @@ onboot:
image: linuxkit/metadata:da3138079c168e0c5608d8f3853366c113ed91d2
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
env:
- INSECURE=true
- name: qemu-ga

View File

@ -12,7 +12,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
image: linuxkit/getty:a19851531487b7bfbe45dcf77e3309c127cc78a6
files:
- path: etc/getty.shadow
# sample sets password for root to "abcdefgh" (without quotes)

View File

@ -11,7 +11,7 @@ onboot:
image: linuxkit/dhcpcd:d4408777ed6b6e6e562a5d4938fd09804324b33e
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: wg0
image: linuxkit/ip:adedf00ca91ed0ed91a40aa76ce23309b32fcb47
image: linuxkit/ip:bdc10950043419d4eb19a10c3122e12ee472d465
net: new
binds:
- /etc/wireguard:/etc/wireguard
@ -24,7 +24,7 @@ onboot:
bindNS:
net: /run/netns/wg0
- name: wg1
image: linuxkit/ip:adedf00ca91ed0ed91a40aa76ce23309b32fcb47
image: linuxkit/ip:bdc10950043419d4eb19a10c3122e12ee472d465
net: new
binds:
- /etc/wireguard:/etc/wireguard