Update YAML files with new getty, ip, and sshd package hashes

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
This commit is contained in:
Rolf Neugebauer 2017-09-20 11:52:42 +01:00
parent d9ffc57532
commit 60dd54670f
27 changed files with 34 additions and 34 deletions

View File

@ -48,7 +48,7 @@ services:
image: linuxkit/acpid:79e5c20de96e1633c9c40935b99dde45aefba37b
# Enable getty for easier debugging
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
# Run ntpd to keep time synchronised in the VM

View File

@ -18,7 +18,7 @@ services:
- name: rngd
image: linuxkit/rngd:558e86a36242bb74353bc9287b715ddb8567357e
- name: sshd
image: linuxkit/sshd:505a985d7bd7a90f15eca9cb4dc6ec92789d51a0
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
binds:
- /var/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx

View File

@ -15,7 +15,7 @@ services:
- name: dhcpcd
image: linuxkit/dhcpcd:f3f5413abb78fae9020e35bd4788fa93df4530b7
- name: sshd
image: linuxkit/sshd:505a985d7bd7a90f15eca9cb4dc6ec92789d51a0
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub

View File

@ -18,7 +18,7 @@ onboot:
command: ["/usr/bin/mountie", "/var/lib/docker"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd

View File

@ -16,13 +16,13 @@ onboot:
image: linuxkit/metadata:da3138079c168e0c5608d8f3853366c113ed91d2
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:558e86a36242bb74353bc9287b715ddb8567357e
- name: sshd
image: linuxkit/sshd:505a985d7bd7a90f15eca9cb4dc6ec92789d51a0
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
binds:
- /var/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx

View File

@ -14,7 +14,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
# to make insecure with passwordless root login, uncomment following lines
#env:
# - INSECURE=true

View File

@ -11,7 +11,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
trust:

View File

@ -7,7 +7,7 @@ init:
- linuxkit/containerd:06876ceef325e49e9ba119659357768d5df89075
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd

View File

@ -22,7 +22,7 @@ services:
- name: rngd
image: linuxkit/rngd:558e86a36242bb74353bc9287b715ddb8567357e
- name: sshd
image: linuxkit/sshd:505a985d7bd7a90f15eca9cb4dc6ec92789d51a0
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
trust:
org:
- linuxkit

View File

@ -13,7 +13,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: redis

View File

@ -14,7 +14,7 @@ onboot:
command: ["/sbin/rngd", "-1"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd
@ -22,7 +22,7 @@ services:
- name: dhcpcd
image: linuxkit/dhcpcd:f3f5413abb78fae9020e35bd4788fa93df4530b7
- name: sshd
image: linuxkit/sshd:505a985d7bd7a90f15eca9cb4dc6ec92789d51a0
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub

View File

@ -24,7 +24,7 @@ onboot:
command: ["/swap.sh", "--path", "/var/external/swap", "--size", "1G", "--encrypt"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd

View File

@ -14,7 +14,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: tss

View File

@ -11,7 +11,7 @@ onboot:
image: linuxkit/sysctl:154913b72c6f1f33eb408609fca9963628e8c051
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd

View File

@ -19,7 +19,7 @@ onboot:
command: ["sh", "-c", "mkdir /host_var/vpnkit && mount -v -t 9p -o trans=virtio,dfltuid=1001,dfltgid=50,version=9p2000 port /host_var/vpnkit"]
services:
- name: sshd
image: linuxkit/sshd:505a985d7bd7a90f15eca9cb4dc6ec92789d51a0
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
- name: vpnkit-forwarder
image: linuxkit/vpnkit-forwarder:42d80758e3b6a9f58cdfd25e53c775eebe951669
binds:

View File

@ -16,13 +16,13 @@ onboot:
image: linuxkit/metadata:da3138079c168e0c5608d8f3853366c113ed91d2
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:558e86a36242bb74353bc9287b715ddb8567357e
- name: sshd
image: linuxkit/sshd:505a985d7bd7a90f15eca9cb4dc6ec92789d51a0
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
binds:
- /var/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx

View File

@ -13,7 +13,7 @@ onboot:
image: linuxkit/dhcpcd:f3f5413abb78fae9020e35bd4788fa93df4530b7
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: wg0
image: linuxkit/ip:044287be54a62d1590dcd4d22543c1a1031479e6
image: linuxkit/ip:adedf00ca91ed0ed91a40aa76ce23309b32fcb47
net: new
binds:
- /etc/wireguard:/etc/wireguard
@ -26,7 +26,7 @@ onboot:
bindNS:
net: /run/netns/wg0
- name: wg1
image: linuxkit/ip:044287be54a62d1590dcd4d22543c1a1031479e6
image: linuxkit/ip:adedf00ca91ed0ed91a40aa76ce23309b32fcb47
net: new
binds:
- /etc/wireguard:/etc/wireguard

View File

@ -18,7 +18,7 @@ onshutdown:
command: ["/bin/echo", "so long and thanks for all the fish"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd

View File

@ -26,7 +26,7 @@ onboot:
command: ["/usr/bin/mountie", "/var/lib/"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd
@ -34,7 +34,7 @@ services:
- name: ntpd
image: linuxkit/openntpd:0d7befc79842849d0b88d6c3b64200e340d7cf67
- name: sshd
image: linuxkit/sshd:505a985d7bd7a90f15eca9cb4dc6ec92789d51a0
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
- name: kubelet
image: linuxkitprojects/kubernetes:8f3f75005ce56b8588b669ce5d7b02c5d705bbd4
files:

View File

@ -11,7 +11,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
trust:

View File

@ -12,7 +12,7 @@ onboot:
image: linuxkit/sysctl:154913b72c6f1f33eb408609fca9963628e8c051
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd

View File

@ -28,9 +28,9 @@ onboot:
- /lib:/lib # for ifconfig
services:
- name: sshd
image: linuxkit/sshd:505a985d7bd7a90f15eca9cb4dc6ec92789d51a0
image: linuxkit/sshd:d313eea3d9d7fbcbc927d06a6700325725db2a82
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
files:

View File

@ -13,7 +13,7 @@ services:
- name: dhcpcd
image: linuxkit/dhcpcd:f3f5413abb78fae9020e35bd4788fa93df4530b7
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
trust:

View File

@ -14,7 +14,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: rngd

View File

@ -23,7 +23,7 @@ onboot:
image: linuxkit/metadata:da3138079c168e0c5608d8f3853366c113ed91d2
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
env:
- INSECURE=true
- name: qemu-ga

View File

@ -12,7 +12,7 @@ onboot:
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:797cb79e0a229fcd16ebf44a0da74bcec03968ec
image: linuxkit/getty:bf6872ce0a9f3ab519b3e502cc41ba3958bda2a6
files:
- path: etc/getty.shadow
# sample sets password for root to "abcdefgh" (without quotes)

View File

@ -11,7 +11,7 @@ onboot:
image: linuxkit/dhcpcd:f3f5413abb78fae9020e35bd4788fa93df4530b7
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: wg0
image: linuxkit/ip:044287be54a62d1590dcd4d22543c1a1031479e6
image: linuxkit/ip:adedf00ca91ed0ed91a40aa76ce23309b32fcb47
net: new
binds:
- /etc/wireguard:/etc/wireguard
@ -24,7 +24,7 @@ onboot:
bindNS:
net: /run/netns/wg0
- name: wg1
image: linuxkit/ip:044287be54a62d1590dcd4d22543c1a1031479e6
image: linuxkit/ip:adedf00ca91ed0ed91a40aa76ce23309b32fcb47
net: new
binds:
- /etc/wireguard:/etc/wireguard