2500 Commits
v0.4 ... v1.5.2

Author SHA1 Message Date
Avi Deitcher
d7a6bc8899 Merge pull request #4077 from deitch/docker-bump
bump docker deps to v27.2.0
2024-09-08 13:00:19 +03:00
Avi Deitcher
2159aacb09 bump docker deps to v27.2.0
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-09-08 12:22:57 +03:00
Avi Deitcher
fa3207c86e Merge pull request #4072 from christoph-zededa/docker_cache_consider_architecture
moby: check architecture for docker image
2024-08-29 22:15:19 +03:00
Avi Deitcher
1d6d5fa612 Merge pull request #4074 from deitch/efi-kernel
remove linuxefi grub EFI handover to normal linux loading
2024-08-29 21:13:48 +03:00
Avi Deitcher
ba25e59640 remove linuxefi grub EFI handover to normal linux loading
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-08-29 17:30:57 +03:00
Avi Deitcher
6979859e76 Merge pull request #4073 from deitch/init-debug-no-control
use only stdout/stderr or file for runc output
2024-08-28 15:28:33 +03:00
Avi Deitcher
5848a2856f use only stdout/stderr or file for runc output
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-08-28 14:45:26 +03:00
Christoph Ostarek
cb8f36adf3 moby: check architecture for docker image
under certain cases the container image is already in the local docker
registry, but with the wrong architecture; in this case just pretend
it is not there and let the caller decide if they want to build it

Signed-off-by: Christoph Ostarek <christoph@zededa.com>
2024-08-27 15:49:21 +02:00
Avi Deitcher
5f09346e1e Merge pull request #4070 from deitch/verbose-runc
more verbose runc messages
2024-08-22 20:55:44 +03:00
Avi Deitcher
15c808c4ee more verbose runc messages
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-08-22 20:23:44 +03:00
Avi Deitcher
745da8f4c0 Merge pull request #4069 from deitch/fix-ro-volumes
when building read-only volumes, still use overlayfs
2024-08-22 19:20:35 +03:00
Avi Deitcher
b36cad081b when building read-only volumes, still use overlayfs
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-08-22 18:49:08 +03:00
Avi Deitcher
370bf51cdf Merge pull request #4067 from deitch/runc-debug-options
support cmdline-driven debugging mode for runc
2024-08-22 15:53:46 +03:00
Avi Deitcher
2af30c5503 support cmdline-driven debugging mode for runc
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-08-22 15:14:35 +03:00
Avi Deitcher
270fd1c5aa Merge pull request #4066 from deitch/ssh-support
support for pkg build ssh
2024-07-28 13:32:42 +03:00
Avi Deitcher
51727db254 support for pkg build ssh
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-28 11:39:55 +03:00
Avi Deitcher
34304b1e63 Merge pull request #4065 from deitch/volumes
Volumes
2024-07-21 20:33:02 +03:00
Avi Deitcher
38a0cb6376 test cases for volumes
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-21 20:02:40 +03:00
Avi Deitcher
a5085fc9ea pkg/init support for volumes
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-21 17:48:39 +03:00
Avi Deitcher
b953d1781c add support for volumes
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-21 17:48:38 +03:00
Avi Deitcher
fa08581fd5 Merge pull request #4064 from deitch/containerd-config-2
containerd config.toml v2
2024-07-19 09:54:34 +03:00
Avi Deitcher
d665a978a1 containerd config.toml v2
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-18 22:01:15 +03:00
Avi Deitcher
d68494ba4b Merge pull request #4063 from deitch/bump-containerd-1.7.20
containerd to 1.7.20
2024-07-18 21:40:39 +03:00
Avi Deitcher
55e13c914e containerd to 1.7.20
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-18 20:51:31 +03:00
Avi Deitcher
c3c6dc7735 Merge pull request #4062 from deitch/debug-containerd
include example for debugging containerd
2024-07-17 14:30:46 +03:00
Avi Deitcher
5d9f3e0aa0 include example for debugging containerd
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-17 14:29:29 +03:00
Avi Deitcher
690a4eecb5 Merge pull request #4061 from deitch/multi-pkg-deps
Multi pkg deps
2024-07-16 18:33:59 +03:00
Avi Deitcher
cd65ec385b Merge pull request #4060 from deitch/linuxkit-deps
bump docker deps in linuxkit binary
2024-07-16 12:58:01 +03:00
Avi Deitcher
f13aee1041 update rngd/extend/init usage in yml
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-16 12:29:10 +03:00
Avi Deitcher
315a1dbf20 pkg/extend bump x/sys version
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-16 12:24:48 +03:00
Avi Deitcher
7ac157e61b pkg/host-timesync-daemon bump x/sys version
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-16 12:23:24 +03:00
Avi Deitcher
53f848a229 pkg/rngd bump x/sys version
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-16 12:23:23 +03:00
Avi Deitcher
4ad55951e1 bump docker deps in linuxkit binary
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-16 12:15:22 +03:00
Avi Deitcher
5d940f4770 Merge pull request #4059 from deitch/more-init-alerts
bump pkg/init containerd, runc and image-spec to fix CVEs
2024-07-16 12:07:32 +03:00
Avi Deitcher
1fe9d0ea76 bump pkg/init containerd, runc and image-spec to fix CVEs
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-16 10:55:01 +03:00
Avi Deitcher
7b114bfa36 Merge pull request #4058 from deitch/init-security-alerts
update package versions and go version for pkg/init
2024-07-16 09:50:54 +02:00
Avi Deitcher
6bbda93914 update package versions and go version for pkg/init
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-16 10:11:23 +03:00
Avi Deitcher
e6ffc8a8f3 Merge pull request #4057 from deitch/build-targets-all-not-macos
make targets separated by OS
2024-07-11 19:03:20 +02:00
Avi Deitcher
e6ac960951 make targets separated by OS
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-11 18:09:48 +02:00
Avi Deitcher
933445f071 Merge pull request #4056 from deitch/handle-cross-compilation-macos
separate release builds of macOS CGO from others
2024-07-11 17:24:05 +02:00
Avi Deitcher
7acc8262f2 separate release builds of macOS CGO from others
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-11 16:55:51 +02:00
Avi Deitcher
bfac135e4e Merge pull request #4055 from deitch/include-semver-in-version
properly save linuxkit version
2024-07-11 15:41:20 +02:00
Avi Deitcher
8bb9174b28 properly save linuxkit version
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-11 15:16:26 +02:00
Avi Deitcher
8d76ae282f Merge pull request #4054 from christoph-zededa/fix_build_command_args
cmd: allow more than one config yaml for build
2024-07-10 19:00:52 +03:00
Christoph Ostarek
04dc9042cf cmd: allow more than one config yaml for build
according to the documentation the following command is valid:
`linuxkit build equinixmetal.yml equinixmetal.arm64.yml`
(docs/platform-equinixmetal.md)

So, make it valid.

Signed-off-by: Christoph Ostarek <christoph@zededa.com>
2024-07-10 17:24:53 +02:00
Avi Deitcher
c90f2ee8f2 Merge pull request #4052 from deitch/packet-to-metal
Packet to metal
2024-07-07 16:39:18 +03:00
Avi Deitcher
ad4c97c430 switch linuxkit from deprecated packngo to equinixmetal go-sdk
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-05 17:57:48 +03:00
Avi Deitcher
8f6ea3c85e switch Packet references to Equinix Metal
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-07-05 17:22:25 +03:00
Avi Deitcher
3f80ca694f Merge pull request #4049 from danrzs/master
ensured dumpFollow of logread includes 'follow' behaviour
2024-07-03 19:57:34 +03:00
Daniel Smith
cda7577e3c ensured dumpFollow of logread includes 'follow' behaviour
Signed-off-by: Daniel Smith <daniel@razorsecure.com>
2024-07-03 13:55:46 +01:00
Avi Deitcher
be7dfdd42c Merge pull request #4046 from jalaziz/4045
Improve support for third-party registry images
2024-06-24 11:08:04 -07:00
Jameel Al-Aziz
21e9f0fa1c add tests
Signed-off-by: Jameel Al-Aziz <jameel@bastion.io>
2024-06-22 01:58:37 -04:00
Jameel Al-Aziz
5e42d050a7 Improve support for third-party registry images
Update `ReferenceExpand` to support image references from remote
registries. This fixes local image lookup and pulling with newer
versions of Docker.

fixes #4045

Signed-off-by: Jameel Al-Aziz <jameel@bastion.io>
2024-06-18 21:57:51 -07:00
Avi Deitcher
4f89f4f67e Merge pull request #4043 from deitch/buildkit-bump 2024-06-11 18:29:11 +03:00
Avi Deitcher
977afa7510 remove no longer necessary rand.Seed
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-06-11 17:42:55 +03:00
Avi Deitcher
7c46ac8c5d bump buildkit to latest v0.13.2 with deps
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-06-11 15:55:42 +03:00
Avi Deitcher
f48e442a46 Merge pull request #4044 from deitch/go-1.22
bump actions/setup-go to v5 and go-version to 1.22.3
2024-06-11 15:55:13 +03:00
Avi Deitcher
4c3d189a1a bump actions/setup-go to v5 and go-version to 1.22.3
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-06-11 15:20:58 +03:00
Avi Deitcher
9e06024567 Merge pull request #4040 from deitch/export-formats
add cache export format OCI
2024-05-16 15:48:20 +03:00
Avi Deitcher
f5dcefc7c2 add cache export format OCI
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-05-16 14:38:19 +03:00
Avi Deitcher
6d37353ca1 Merge pull request #4039 from deitch/split-moby
move moby components that do not have runtime dependencies to own directory
2024-05-07 20:27:35 +03:00
Avi Deitcher
379617ca0d move moby components that do not have runtime dependencies to own directory
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-05-07 19:51:25 +03:00
Avi Deitcher
b49e32af98 Merge pull request #4036 from deitch/fix-action-script-v7 2024-04-28 16:30:14 +03:00
Avi Deitcher
5299f948e3 use proper path for github-script properties
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-28 15:56:53 +03:00
Avi Deitcher
e171750da6 Merge pull request #4035 from deitch/action-script-v7 2024-04-28 15:25:33 +03:00
Avi Deitcher
c32c74bc1d github script v7
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-28 14:43:52 +03:00
Avi Deitcher
d3257af256 Merge pull request #4034 from deitch/token-for-actions 2024-04-28 13:58:27 +03:00
Avi Deitcher
2578ae23c6 explicitly use GITHUB_TOKEN for actions script
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-28 12:58:10 +03:00
Avi Deitcher
38e62bb61d Merge pull request #4033 from jacobweinstock/cgroupsv2-as-default
Make cgroups v2 the default in the init pkg
2024-04-28 11:45:00 +03:00
Jacob Weinstock
2fe19f7561 Update dependencies
Signed-off-by: Jacob Weinstock <jakobweinstock@gmail.com>
2024-04-27 15:40:30 -06:00
Jacob Weinstock
803747f01a Make cgroups v2 the default:
cgroups v2 has been out since 2015. Not having
to set a kernel parameter helps improve the user
experience by not requiring it when it is required
by services in a build. Making this the default was
discussed back in 2021.

Signed-off-by: Jacob Weinstock <jakobweinstock@gmail.com>
2024-04-27 15:40:00 -06:00
Avi Deitcher
8afecd5204 Merge pull request #4031 from deitch/update-actions
bump actions to v4 to avoid deprecation
2024-04-25 12:19:07 +03:00
Avi Deitcher
e6b0ae05eb Merge pull request #4030 from deitch/canonicalize-pull
use canonical ref when looking in cache
2024-04-25 11:50:19 +03:00
Avi Deitcher
04792e0d44 bump actions to v4 to avoid deprecation
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-25 11:44:38 +03:00
Avi Deitcher
c836e54d22 use canonical ref when looking in cache
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-24 15:00:39 +03:00
Avi Deitcher
bc5d08d6a3 Merge pull request #4028 from largemouth/master
chore: fix function name in comment
2024-04-24 13:27:34 +03:00
largemouth
4ce13640cd chore: fix function name in comment
Signed-off-by: largemouth <largemouth@aliyun.com>
2024-04-22 19:45:14 +08:00
Avi Deitcher
cea4c0d419 Merge pull request #4027 from deitch/not-same-file
prevent using same file for input tar and output tar
2024-04-21 13:55:30 +03:00
Avi Deitcher
dc12b9be69 prevent using same file for input tar and output tar
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-21 13:19:57 +03:00
Avi Deitcher
dd1ae909d6 Merge pull request #4026 from deitch/increment-tar-output
add support for input-tar
2024-04-19 17:08:03 +03:00
Avi Deitcher
632b4065d4 add support for input-tar
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-19 16:30:06 +03:00
Avi Deitcher
a610332100 Merge pull request #4025 from deitch/tag-sources-in-tar
include image reference as source in every tar file header
2024-04-18 16:34:05 +03:00
Avi Deitcher
1fe8cba107 include image reference as source in every tar file header
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-18 16:03:34 +03:00
Avi Deitcher
47d02ecd61 Merge pull request #4024 from deitch/fix-kernel-tools-build
fix kernel tools build.yml files to reflect correct dockerfiles
2024-04-17 11:41:18 +03:00
Avi Deitcher
4d212000ec fix kernel tools build.yml files to reflect correct dockerfiles
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-16 19:30:28 +03:00
Avi Deitcher
9e18c9247c Merge pull request #4023 from deitch/commit-tag-arg
add tag to args passed for package builds
2024-04-16 15:14:25 +03:00
Avi Deitcher
6af6291afe add tag to args passed for package builds
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-04-16 13:52:49 +03:00
Avi Deitcher
de79880fff Merge pull request #3960 from Fabsolute/fix-disk-parameter-for-virtualization 2024-04-12 16:50:03 +02:00
Fabsolute
f2240fbeea FIX disk parameter usage
Signed-off-by: Fabsolute <ahmetturk93@gmail.com>
2024-04-12 16:07:30 +02:00
Avi Deitcher
b7bb183d49 Merge pull request #4020 from christoph-zededa/fix_doc_build_iso-efi
README.md: fix format parameter
2024-03-20 09:10:12 +01:00
Christoph Ostarek
6a7cea9dbd README.md: fix format parameter
linuxkit build expects '--format' or '-f' and not
'-format'

Signed-off-by: Christoph Ostarek <christoph@zededa.com>
2024-03-19 18:01:22 +01:00
Avi Deitcher
3ff5dac063 Merge pull request #4018 from christoph-zededa/fix_pulling_from_localhost_registry
util: allow pulling from local registry
2024-03-17 00:57:54 -07:00
Christoph Ostarek
4496612c70 util: allow pulling from local registry
before a command like
linuxkit cache pull 127.0.0.1:5000/pkgalpine

would result in trying to pull the following image:
docker.io/127.0.0.1:5000/pkgalpine

and this is wrong

Signed-off-by: Christoph Ostarek <christoph@zededa.com>
2024-03-15 18:36:31 +01:00
Avi Deitcher
1b1007a9da Merge pull request #4017 from deitch/pkg-release-cmds
missing pipe in package_release workflow
2024-03-11 08:57:55 -07:00
Avi Deitcher
c3b151ea42 missing pipe in package_release workflow
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-11 17:21:22 +02:00
Avi Deitcher
7952421e2b Merge pull request #4016 from deitch/next-fix-releases
fix pkg-release flow for building linuxkit
2024-03-11 08:18:50 -07:00
Avi Deitcher
88ff3ac7a7 fix pkg-release flow for building linuxkit
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-11 16:47:12 +02:00
Avi Deitcher
719ae0082a Merge pull request #4015 from deitch/pkg-tag-workflow
ensure package release flow is picked up
2024-03-11 07:41:41 -07:00
Avi Deitcher
15730ea617 ensure package release flow is picked up
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-11 14:19:07 +02:00
Avi Deitcher
55963aa26f Merge pull request #4014 from deitch/fix-release-pkgs
fix pkg release action workflow
2024-03-11 03:30:17 -07:00
Avi Deitcher
14f5433943 fix pkg release action workflow
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-11 11:34:34 +02:00
Avi Deitcher
10bbf86397 Merge pull request #4013 from deitch/pkg-release
add support for pkg release tags
2024-03-11 01:55:24 -07:00
Avi Deitcher
4df07ddb6e add support for pkg release tags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-11 10:07:43 +02:00
Avi Deitcher
b8b00e8c82 Merge pull request #4012 from deitch/remote-tag-with-copy
remote-tag enable copying across repositories and registries
2024-03-06 03:55:22 -08:00
Avi Deitcher
51696d2905 remote-tag enable copying across repositories and registries
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-06 13:23:19 +02:00
Avi Deitcher
0d89422386 Merge pull request #4011 from deitch/kernel-push-builder
Kernel push builder
2024-03-06 01:58:21 -08:00
Avi Deitcher
3087e9055a fix builder image tagging using new remote-tag option of linuxkit
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-06 11:28:38 +02:00
Avi Deitcher
17ed8938e0 kernel builder handle push properly
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-06 10:45:21 +02:00
Avi Deitcher
67afa5d380 Merge pull request #4010 from deitch/remote-tag-rename
add pkg remote-tag option to tag descriptors remotely without pulling…
2024-03-06 00:44:59 -08:00
Avi Deitcher
58b7ae5b66 add pkg remote-tag option to tag descriptors remotely without pulling and pushing
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-06 10:14:28 +02:00
Avi Deitcher
70ae026b5d Merge pull request #4009 from deitch/cache-push-nopush-option
cache push only overrides remote if explicit
2024-03-05 10:37:56 -08:00
Avi Deitcher
71096c4301 cache push only overrides remote if explicit
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-05 20:05:01 +02:00
Avi Deitcher
60da9b92e4 Merge pull request #4008 from deitch/kernel-publish-ci
make kernel read/build and check part of CI
2024-03-05 08:27:34 -08:00
Avi Deitcher
2389221c4a make kernel read/build and check part of CI
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-05 17:49:28 +02:00
Avi Deitcher
17f5ecaefd Merge pull request #4007 from deitch/fix-update-component-too-broad-match
Fix update component too broad match
2024-03-05 00:16:15 -08:00
Avi Deitcher
533d582bad update 6.6.x test hash versions
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-04 21:33:23 +02:00
Avi Deitcher
3d0cd9d5da properly handle sed for update-component-sha.sh
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-04 21:32:19 +02:00
Avi Deitcher
470a9287e6 Merge pull request #4006 from deitch/kernel-hash-updates
hash for kernel changed, updating in test cases
2024-03-04 10:29:52 -08:00
Avi Deitcher
0abb1ac179 hash for kernel changed, updating in test cases
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-04 19:51:57 +02:00
Avi Deitcher
413f3f3e67 Merge pull request #4005 from deitch/kernel-makefile-regex
ensure kernel replacement matches middle of line too
2024-03-04 06:24:06 -08:00
Avi Deitcher
81f8a91d70 ensure kernel replacement matches middle of line too
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-04 15:54:08 +02:00
Avi Deitcher
83efa26b65 Merge pull request #4004 from deitch/missing-kernel-hashes
add missing hashes for kernel version-specific test cases
2024-03-04 05:12:28 -08:00
Avi Deitcher
3f10329ec2 add missing hashes for kernel version-specific test cases
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-04 14:25:46 +02:00
Avi Deitcher
600e12f184 Merge pull request #4003 from deitch/fix-kernel-makefile-replace
in kernel makefile tag update, ensure we only replace non-hashed semver
2024-03-04 03:40:00 -08:00
Avi Deitcher
916390860d in kernel makefile tag update, ensure we only replace non-hashed semver
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-04 12:45:28 +02:00
Avi Deitcher
b94b3af341 Merge pull request #4002 from deitch/kernel-tag-in-tests
Kernel tag in tests
2024-03-04 02:29:56 -08:00
Avi Deitcher
e381f9cac2 kernel generic test cases updated
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-04 11:53:11 +02:00
Avi Deitcher
e297d98f81 kernel series-specific test cases reference with hash
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-04 11:08:21 +02:00
Avi Deitcher
2f81ee674d Merge pull request #4001 from deitch/kernel-makefile-all-yamls-update
update kernel Makefile for targets for yamls
2024-03-04 01:04:29 -08:00
Avi Deitcher
d47a9284b4 update kernel Makefile for targets for yamls
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-03 17:06:45 +02:00
Avi Deitcher
62d04af55b Merge pull request #4000 from deitch/kernel-ci
kernel makefile target to replace tags using update-component-sha.sh
2024-03-03 06:59:23 -08:00
Avi Deitcher
b25b82c106 kernel makefile target to replace tags using update-component-sha.sh
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-03 16:19:34 +02:00
Avi Deitcher
47bd13a5a5 Merge pull request #3999 from deitch/move-kernel-version-to-directory
move kernel series status into series dir
2024-03-03 03:43:09 -08:00
Avi Deitcher
3e7df6c869 move kernel series status into series dir
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-03 12:49:17 +02:00
Avi Deitcher
de6978908f Merge pull request #3998 from deitch/missing-builder-label-on-kernel
in kernel build, have ARG in correct place to be usable
2024-03-03 01:50:38 -08:00
Avi Deitcher
a40251bf14 in kernel build, have ARG in correct place to be usable
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-03 11:17:57 +02:00
Avi Deitcher
10e6d57505 Merge pull request #3993 from deitch/kernel-build-with-linuxkit
switch kernel builds to linuxkit pkg build for simplicity
2024-03-02 12:07:40 -08:00
Avi Deitcher
000b6f4bb1 switch kernel builds to linuxkit pkg build for simplicity
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-02 21:22:05 +02:00
Avi Deitcher
7e45f8ef2e Merge pull request #3997 from deitch/build-args-files-trim
when reading build-args from file, always trim whitespace for key and…
2024-03-02 11:21:22 -08:00
Avi Deitcher
a5d5bb87c2 when reading build-args from file, always trim whitespace for key and value
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-01 16:03:54 +02:00
Avi Deitcher
58c36c9eb0 Merge pull request #3995 from deitch/cache-push-options
push arch-specific tags optional
2024-03-01 04:50:10 -08:00
Avi Deitcher
51a4c3b3eb push arch-specific tags optional
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-03-01 13:41:59 +02:00
Avi Deitcher
c72f700910 Merge pull request #3994 from deitch/pkg-build-progress
option to control progress in pkg build
2024-02-29 05:53:12 -08:00
Avi Deitcher
354c1c31e1 option to control progress in pkg build
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-29 15:21:28 +02:00
Avi Deitcher
898039595d Merge pull request #3992 from deitch/cache-tag
option to push local image to somewhere else
2024-02-28 10:49:57 -08:00
Avi Deitcher
1766f61aed option to push local image to somewhere else
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-28 16:28:07 +02:00
Avi Deitcher
41cd91e0e3 Merge pull request #3991 from deitch/cache-pull-push
add support for pushing and pulling images
2024-02-28 04:06:00 -08:00
Avi Deitcher
54d9db8650 add support for pushing and pulling images
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-28 13:08:47 +02:00
Avi Deitcher
8b9b3f673b Merge pull request #3989 from deitch/kernel-build-dirs
restructure kernel builds into directories
2024-02-27 07:01:21 -08:00
Avi Deitcher
cd12a8613d restructure kernel builds into directories
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-27 15:14:06 +02:00
Avi Deitcher
51102106b3 Merge pull request #3966 from mestery/mestery/issue3965
Enable VRF in kernel configurations
2024-02-26 07:09:46 -08:00
Kyle Mestery
bdc15ae9f6 Enable VRF in kernel configurations
Signed-off-by: Kyle Mestery <mestery@mestery.com>
2024-02-26 07:59:21 -06:00
Avi Deitcher
86d11e2879 Merge pull request #3988 from deitch/yaml-template
template in yaml file
2024-02-25 02:03:15 -08:00
Avi Deitcher
1f57ac5280 fix yaml in test case with duplicate key
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-25 11:28:54 +02:00
Avi Deitcher
06a05badf6 template in yaml file
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-23 15:43:45 +02:00
Avi Deitcher
36f379abe5 Merge pull request #3987 from deitch/build-arg-file
add support for build-arg files
2024-02-22 07:24:35 -08:00
Avi Deitcher
56543ed0a2 add support for build-arg files
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-22 16:41:49 +02:00
Avi Deitcher
72be49c81c Merge pull request #3986 from deitch/dockerfile-in-build-yml
Dockerfile in build yml and CLI; tag templates
2024-02-21 12:21:17 -08:00
Avi Deitcher
83a8c5cae2 add support for tag templates
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-21 21:45:39 +02:00
Avi Deitcher
0c31697e10 add support for specifying dockerfile in build process
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-21 21:15:08 +02:00
Avi Deitcher
2cff5681b5 Merge pull request #3985 from deitch/cache-load
enable import of images from tar files
2024-02-20 04:44:16 -08:00
Avi Deitcher
f04e28d291 enable import of images from tar files
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-20 13:59:14 +02:00
Avi Deitcher
4cdfd5ff9c Merge pull request #3983 from beriberikix/usbip
Rebased and re-implemented USBIP configs
2024-02-18 06:31:32 -08:00
Jonathan Beri
b12a7d584f Rebased and re-implemented USBIP configs
Signed-off-by: Jonathan Beri <jberi@golioth.io>

Revert to master

Signed-off-by: Jonathan Beri <jberi@golioth.io>

Modify USBIP modules by hand

Signed-off-by: Jonathan Beri <jberi@golioth.io>
2024-02-18 05:39:52 -08:00
Avi Deitcher
0895d146d4 Merge pull request #3984 from deitch/fix-dev-nul
use proper null in script and not mispelled nul
2024-02-18 05:03:56 -08:00
Avi Deitcher
bd582fa474 use proper null in script and not mispelled nul
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-18 11:40:33 +02:00
Avi Deitcher
657b33805e Merge pull request #3982 from christoph-zededa/bump_runc_cve-2024-21626
runc: bump to newest version
2024-02-05 03:44:32 -08:00
Christoph Ostarek
819d83b716 runc: bump to newest version
./scripts/update-component-sha.sh --pkg ./pkg/runc

Signed-off-by: Christoph Ostarek <christoph@zededa.com>
2024-02-05 11:45:39 +01:00
Christoph Ostarek
c2b9970241 runc: bump to newest version
This version includes a fix for CVE-2024-21626 which
allowed an attacker in bad circumstances to
"escape containerized environments".

See also https://access.redhat.com/security/cve/cve-2024-21626

Signed-off-by: Christoph Ostarek <christoph@zededa.com>
2024-02-05 11:44:41 +01:00
Avi Deitcher
23c1b5797b Merge pull request #3981 from deitch/kernel-cross-build
kernels Makefile support custom builders and archs
2024-02-01 06:38:53 -08:00
Avi Deitcher
4e070077c9 kernels Makefile support custom builders and archs
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-02-01 15:39:16 +02:00
Avi Deitcher
bafbf0ac0f Merge pull request #3980 from deitch/kernel-document
updated kernel documents
2024-01-31 01:36:09 -08:00
Avi Deitcher
c388177596 updated kernel documents
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-31 10:54:47 +02:00
Avi Deitcher
6c29f580ae Merge pull request #3971 from deitch/update-alpine-base
bump alpine base for kernel, regenerate configs
2024-01-30 04:10:00 -08:00
Avi Deitcher
fa4af07faf update deps of check-kernel-config
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-30 10:25:08 +02:00
Avi Deitcher
e5fbf8a972 update kernel perf
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-30 10:15:28 +02:00
Avi Deitcher
b405b39c48 bump xfs to use kernel 6.6 and latest format
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-30 10:15:28 +02:00
Avi Deitcher
480ff67ddc update bcc version
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-30 10:15:28 +02:00
Avi Deitcher
4b3eb1ff38 kernel 6.6.x config
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-30 10:15:27 +02:00
Avi Deitcher
316886c946 add 6.6.13 to tests
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-29 15:28:01 +02:00
Avi Deitcher
752a35b1aa restructure kernel/Makefile
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-29 15:28:00 +02:00
Avi Deitcher
421b48d43a bump alpine base for kernel, regenerate configs
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 22:27:59 +02:00
Avi Deitcher
605f09ef78 Merge pull request #3978 from deitch/zstd-static
include zstd-static library
2024-01-28 12:26:21 -08:00
Avi Deitcher
3a6398e351 Update package tags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 20:53:32 +02:00
Avi Deitcher
d018c425f6 pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 20:51:39 +02:00
Avi Deitcher
909e5c97ff Update use of test packages to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 20:51:24 +02:00
Avi Deitcher
eff77819a4 tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 20:51:16 +02:00
Avi Deitcher
927997930b Update use of tools to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 20:51:14 +02:00
Avi Deitcher
7977310c52 tools: Update to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 20:51:04 +02:00
Avi Deitcher
8bd896a955 tools/alpine: Update to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 20:50:01 +02:00
Avi Deitcher
7276939ad2 Update linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 20:47:44 +02:00
Avi Deitcher
3607a34892 Merge pull request #3977 from deitch/python3-dev
Python3 dev
2024-01-28 09:08:19 -08:00
Avi Deitcher
0d15d8d9bb Update package tags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 15:32:09 +02:00
Avi Deitcher
d907c675d2 pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 15:31:01 +02:00
Avi Deitcher
b2a3badd5f Update use of test packages to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 15:30:49 +02:00
Avi Deitcher
f8f690f6f3 tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 15:30:36 +02:00
Avi Deitcher
449ec61222 Update use of tools to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 15:30:31 +02:00
Avi Deitcher
d9027d543d tools: Update to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 15:30:18 +02:00
Avi Deitcher
1676b1a538 tools/alpine: Update to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 15:29:14 +02:00
Avi Deitcher
59bae229c2 Update linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 15:26:51 +02:00
Avi Deitcher
e4ba559605 Merge pull request #3976 from deitch/llvm17-gtest-again
Llvm17 gtest again
2024-01-28 02:44:35 -08:00
Avi Deitcher
45d7ab8fed Update package tags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 10:57:05 +02:00
Avi Deitcher
b71ac70742 pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 10:55:04 +02:00
Avi Deitcher
8a23691591 Update use of test packages to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 10:54:43 +02:00
Avi Deitcher
1bd9e9b5a2 tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 10:54:20 +02:00
Avi Deitcher
9cf5d809e8 Update use of tools to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 10:54:09 +02:00
Avi Deitcher
a538a1efcf tools: Update to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 10:53:56 +02:00
Avi Deitcher
09c85aa0ad tools/alpine: Update to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 10:53:19 +02:00
Avi Deitcher
6c4eac84c2 Update linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 10:50:35 +02:00
Avi Deitcher
66509eb115 Merge pull request #3975 from deitch/py3-pip
Py3 pip
2024-01-28 00:35:59 -08:00
Avi Deitcher
5954e9308a revert xfs changes because it is kernel sensitive
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-28 09:54:43 +02:00
Avi Deitcher
6b5be65a33 Update package tags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 22:28:11 +02:00
Avi Deitcher
cbe149e97a pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 22:27:54 +02:00
Avi Deitcher
68308dc20b Update use of test packages to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 22:27:29 +02:00
Avi Deitcher
41311cbe2b tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 22:27:20 +02:00
Avi Deitcher
79e91dedf8 Update use of tools to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 22:27:14 +02:00
Avi Deitcher
6db6bc84aa tools: Update to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 22:26:58 +02:00
Avi Deitcher
86382030f5 tools/alpine: Update to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 22:25:54 +02:00
Avi Deitcher
55fe1761e3 Update linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 22:23:03 +02:00
Avi Deitcher
44403f6f56 Merge pull request #3974 from deitch/llvm7-gtest-pkg
Add llvm17-gtest pkg
2024-01-27 11:41:11 -08:00
Avi Deitcher
7fa10ce83a Update package tags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 21:09:58 +02:00
Avi Deitcher
73d160e356 pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 21:09:45 +02:00
Avi Deitcher
791b4630ef Update use of test packages to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 21:09:43 +02:00
Avi Deitcher
c6be190454 tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 21:09:30 +02:00
Avi Deitcher
7defa568a2 Update use of tools to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 21:09:30 +02:00
Avi Deitcher
bc1a7d60df tools: Update to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 21:09:30 +02:00
Avi Deitcher
64ce82b692 tools/alpine: Update to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-27 21:09:30 +02:00
Avi Deitcher
7271619a8b Merge pull request #3973 from deitch/alpine-319
Alpine 319
2024-01-26 03:23:21 -08:00
Avi Deitcher
ab0473d953 revert xfs changes because of kernel version sensitivity
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-26 12:49:06 +02:00
Avi Deitcher
7a0ae251c0 update alpine base comments
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-26 12:44:34 +02:00
Avi Deitcher
1b3e13c880 Update package tags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-25 23:24:06 +02:00
Avi Deitcher
96df8f8fda pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-25 23:23:34 +02:00
Avi Deitcher
13926f6593 Update use of test packages to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-25 23:23:04 +02:00
Avi Deitcher
846e4c9c4e tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-25 23:22:53 +02:00
Avi Deitcher
d6f9f6129e Update use of tools to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-25 23:22:41 +02:00
Avi Deitcher
22cc9343b4 tools: Update to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-25 23:20:43 +02:00
Avi Deitcher
35dbd157bb tools/alpine: Update to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-25 23:19:18 +02:00
Avi Deitcher
3d20dfe386 Update linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-25 23:15:38 +02:00
Avi Deitcher
ed7dacb72b Merge pull request #3972 from deitch/dockerfile-bcc-extra-package
Dockerfile bcc extra package
2024-01-25 07:04:43 -08:00
Avi Deitcher
a1baf077f2 remove extra package which only is available in later alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-25 16:27:43 +02:00
Avi Deitcher
b0d8897189 Merge pull request #3969 from yzewei/master
Add support for loongarch64

Signed-off-by: Avi Deitcher <avi@deitcher.net>
2024-01-24 19:11:30 +02:00
Avi Deitcher
1957c8d126 Merge pull request #3969 from yzewei/master
Add support for loongarch64
2024-01-09 00:55:02 -08:00
yzewei
27c08f25ad Add loongarch64 support to binfmt_misc
Signed-off-by: yzewei <yangzewei@loongson.cn>
2024-01-09 09:04:36 +08:00
Avi Deitcher
59245e88e8 Merge pull request #3968 from christoph-zededa/fix_logread_socket_closed_too_early
logread: do not close socket too early
2023-12-18 06:33:32 -08:00
Christoph Ostarek
cc374a5ea8 logread: do not close socket too early
only close socket once reading is finished

Signed-off-by: Christoph Ostarek <christoph@zededa.com>
2023-12-18 14:12:40 +01:00
Avi Deitcher
3a0405298a Merge pull request #3967 from deitch/build-after-pull-if-missing
when pulling image to cache, if it is missing target arch, indicate an error
2023-12-16 23:37:25 -08:00
Avi Deitcher
821dddcffc when pulling image to cache, if it is missing target arch, indicate an error
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-12-15 14:49:07 +02:00
Avi Deitcher
e115ce8dca Merge pull request #3963 from deitch/fix-image-pull-with-attestations
Fix image pull with attestations
2023-12-04 00:34:17 -08:00
Avi Deitcher
6e54a7bd6e properly write index when pulling image, including all manifests
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-12-03 15:44:53 +02:00
Avi Deitcher
e1d3a09976 when filling cache, ensure we include attestations
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-12-03 13:57:52 +02:00
Avi Deitcher
87bbbd184b Merge pull request #3964 from deitch/list-package-cache-during-tests
report package cache contents at each stage of CI
2023-12-03 03:57:14 -08:00
Avi Deitcher
782a38dcae report package cache contents at each stage
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-12-03 13:25:46 +02:00
Avi Deitcher
d1a0596bee Merge pull request #3959 from deitch/manifest-with-sboms
fix merging indexes in pkg manifest command
2023-11-22 04:23:40 -08:00
Avi Deitcher
4e75efc8aa fix merging indexes in pkg manifest command
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-11-22 12:48:34 +02:00
Avi Deitcher
4c14831d6b Merge pull request #3958 from deitch/bump-pkgs-again
noop to force pkg rebuild
2023-11-20 06:53:04 -08:00
Avi Deitcher
a2c6ed4205 noop to force pkg rebuild
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-11-20 12:05:52 +02:00
Avi Deitcher
54bd9073c2 Merge pull request #3957 from deitch/push-with-sboms
push sboms as well
2023-11-20 01:59:22 -08:00
Avi Deitcher
6d62579c08 push sboms as well
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-11-19 15:42:02 +02:00
Avi Deitcher
483e76c7f4 Merge pull request #3956 from deitch/bump-pkgs-to-generate-sbom
changed some packages to force new package versions, rebuild with sbom
2023-11-19 00:20:44 -08:00
Avi Deitcher
f227b73a39 changed some packages to force new package versions, rebuild with sbom
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-11-16 10:28:22 +02:00
Avi Deitcher
b26c169797 Merge pull request #3920 from vouch-opensource/fix/service-restarts-with-memlogd
Allow service restarts when using memlogd
2023-11-14 06:23:58 -08:00
Avi Deitcher
bbd9b85fc1 Merge pull request #3954 from deitch/sbom-inheritor
sbom support
2023-11-14 06:16:56 -08:00
Avi Deitcher
33cd7b749a sbom support
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-11-14 14:14:45 +02:00
Avi Deitcher
9742bfa5f7 Merge pull request #3953 from deitch/handle-cgroupsv2-last-cmdline-entry
Handle cgroupsv2 last cmdline entry
2023-10-26 20:26:14 +03:00
Avi Deitcher
d052901b35 update dependencies on init
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-10-25 18:34:32 +03:00
Avi Deitcher
0e2f17a05a correctly handle fields in cmdline for cgroupsv2
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-10-25 18:33:28 +03:00
Avi Deitcher
5d78de48f7 Merge pull request #3951 from deitch/proper-efi-arch
pass target arch to final image builder as TARGETARCH; use TARGETARCH…
2023-10-08 10:08:38 +03:00
Avi Deitcher
7ab99eac1f pass target arch to final image builder as TARGETARCH; use TARGETARCH when generating raw and iso, fallback to build arch; use updated images that read TARGETARCH; ensure grub has EFI for all archs
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-10-06 12:22:09 +03:00
Avi Deitcher
6c3f3e8eb1 Merge pull request #3950 from deitch/context-for-rebuilt
ensure passing context when creating builder runner
2023-10-06 12:20:04 +03:00
Avi Deitcher
cb86e280b6 ensure passing context when creating builder runner
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-10-05 12:17:30 +03:00
Avi Deitcher
c72f6b49e2 Merge pull request #3948 from testwill/pkg-import
chore: import packages only once
2023-09-26 15:01:33 +03:00
guoguangwu
02f3bdcbe7 chore: import packages only once
Signed-off-by: guoguangwu <guoguangwu@magic-shield.com>
2023-09-26 18:47:25 +08:00
Rolf Neugebauer
959dce294c Merge pull request #3904 from qdeslandes/master
Disable CONFIG_BPFILTER for 5.4.x-x86_64 kernel configuration
2023-08-17 10:02:56 +01:00
Avi Deitcher
fec28d2493 Merge pull request #3942 from deitch/poweroff-as-package
move poweroff to full-fledged package
2023-07-26 12:02:47 +03:00
Avi Deitcher
5a9755a433 move poweroff to full-fledged package
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-07-24 20:06:14 +03:00
Avi Deitcher
03c97c3584 Merge pull request #3939 from deitch/logread-as-lib
expose logread function
2023-07-03 11:41:17 +03:00
Avi Deitcher
997c074db6 expose logread function
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-30 06:02:16 +03:00
Avi Deitcher
48e0eca4f5 Merge pull request #3938 from PIG208/doc
Fix broken links in the documentation.
2023-06-27 11:01:43 -07:00
Zixuan James Li
2d2df02a5a Fix broken links in the documentation.
Arguably the long term fix is to introduce a check for links in the
documentation with tools like markdown-link-check.

Signed-off-by: Zixuan James Li <p359101898@gmail.com>
2023-06-23 22:27:55 -04:00
Avi Deitcher
8e790a5417 Merge pull request #3937 from deitch/logread-exit-not-panic
logread should not panic on an EOF, instead exiting gracefully
2023-06-20 00:03:43 -07:00
Avi Deitcher
77b66b5572 Merge pull request #3936 from deitch/ctr-go-binaries
Ctr go binaries
2023-06-20 00:02:56 -07:00
Avi Deitcher
b7002c0eb2 logread should not panic on an EOF, instead exiting gracefully
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-19 17:50:35 +03:00
Avi Deitcher
4ee6387366 updated containerd-dev and downstream dependencies
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-19 14:17:43 +03:00
Avi Deitcher
7164b2c04d Merge pull request #3935 from deitch/ggcr-for-manifest
replace complex manifest-tool with straight go-containerregistry
2023-06-16 03:20:56 -07:00
Avi Deitcher
1b22e6f194 replace complex manifest-tool with straight go-containerregistry
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-16 10:13:24 +03:00
Avi Deitcher
9eef398d64 Merge pull request #3933 from deitch/main-version-binaries
Main version binaries
2023-06-15 00:31:24 -07:00
Avi Deitcher
3aeac872a0 update pkg/metadata with better logging
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-13 12:10:48 +03:00
Avi Deitcher
b633950059 replace ancient debian version in binfmt
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-12 15:58:04 +03:00
Avi Deitcher
0cb961e082 update examples, tests, projects, etc.
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-12 14:02:30 +03:00
Avi Deitcher
d4b5d5df79 include main.Version in binaries
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-12 14:02:30 +03:00
Avi Deitcher
655c7fb807 Merge pull request #3934 from deitch/fix-name-output-build-bug
handle conflict with name and output
2023-06-12 04:01:53 -07:00
Avi Deitcher
b1fa7d23c4 handle conflict with name and output
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-12 13:08:35 +03:00
Avi Deitcher
aab61a16de Merge pull request #3932 from deitch/build-args-with-versions
include source repo, revision and go package version as build-args
2023-06-12 01:26:08 -07:00
Avi Deitcher
de13ee521d include source repo, revision and go package version as build-args
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-06-08 18:24:25 +03:00
Avi Deitcher
aad12b570f Merge pull request #3931 from jprendes/update-capabilities
Update capabilities
2023-06-06 19:58:52 +03:00
Jorge Prendes
813f2a5bc1 Use gocapability/capability to get list of all capabilities
Signed-off-by: Jorge Prendes <jorge.prendes@gmail.com>
2023-06-06 10:44:48 +01:00
Jorge Prendes
f8b62fd0ac Vendor gocapability/capability in cmd/linuxkit
Signed-off-by: Jorge Prendes <jorge.prendes@gmail.com>
2023-06-06 10:44:26 +01:00
Avi Deitcher
740787a79e Merge pull request #3927 from deitch/multi-arch-guestfs 2023-05-22 23:45:02 -07:00
Avi Deitcher
a9f432ab34 update linuxkit command with newer vhd/dynamicvhd/vmdk/gcp images
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-05-22 10:23:35 +01:00
Avi Deitcher
23d44f6084 update downstream from guestfs
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-05-22 09:47:47 +01:00
Avi Deitcher
81f42a2b3b guestfs native arm64
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-05-22 09:34:44 +01:00
Frédéric Dalleau
c2df261e01 Add a target for building kernel with buildx (#3792)
* Use latest kernel in linuxkit

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>

* Parallelize kernel source compression

This surpringly saves a lot of time:
M1: from 340 to 90 seconds
Intel: from 527 to 222 seconds (2 cores 4 threads)

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>

* Add buildx target

buildx can use remote builders and automatically generate the multiarch manifest.
A properly configured builder is required :

First create docker context for the remote builders :
$ docker context create node-<arch> --docker "host=ssh://<user>@<host>"

Then create a buildx configuration using the remote builders:
$ docker buildx create --name kernel_builder --platform linux/amd64
$ docker buildx create --name kernel_builder --node node-arm64 --platform linux/arm64 --append
$ docker buildx use kernel_builder
$ docker buildx ls

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>

* Add a PLATFORMS variable to declare platforms needed for buildx

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>

* Make image name customizable

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>

* Do not tag use the architecture suffix for images built with buildx

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>

* Add make kconfigx to upgrade configs using buildx

To update configuration for 5.10 kernels use :
make -C kernel KERNEL_VERSIONS=5.10.104 kconfigx

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>

---------

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2023-04-28 11:49:08 +03:00
Stijn Opheide
247d919a81 remove file at fifo logging location if it exists
Signed-off-by: Stijn Opheide <stijn@opheide.be>
2023-04-18 14:28:01 +02:00
David Gageot
eb81457111 Avoid running git command 254 times (#3915)
Signed-off-by: David Gageot <david.gageot@docker.com>
2023-03-23 10:55:21 +02:00
Erik Nordmark
c79558cc5a Retain /lib/apk/db for SBOM tools (#3913)
This allows SBOM tools to look at /lib/apk/db/installed to determine
which package versions are included in the container. This should
probably be applied across all of the linuxkit containers.

Signed-off-by: eriknordmark <erik@zededa.com>
2023-03-14 18:27:09 -04:00
Birol Bilgin
d4a8e284f6 added vmware metadata provider (#3526)
cloud-init data from vmware guest info as it described in the link below
https://github.com/vmware/cloud-init-vmware-guestinfo

Signed-off-by: Birol Bilgin <birolbilgin@gmail.com>
Co-authored-by: Birol Bilgin <birol.bilgin@basefarm.com>
2023-03-04 19:50:46 +02:00
Rolf Neugebauer
7d9f1f03a8 Merge pull request #3891 from fredericdalleau/qemu-virtiofs
Add virtiofs command line option for qemu run
2023-02-28 21:32:44 +00:00
Frédéric Dalleau
e4b1a5b192 Add virtualization framework virtiofs command line option
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2023-02-25 07:53:53 +01:00
Frédéric Dalleau
13426fe805 Add qemu virtiofs command line option
Enables support for C version of virtiofs
A qemu option allows to specify virtiofsd path.
config.StatePath is used for storing the virtiofs sockets
Note that virtiofsd requires to start as root

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2023-02-25 07:52:59 +01:00
Avi Deitcher
f0f21bec52 update to latest manifest-tool, oras-v2, remove all replace in go.mod (#3912)
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-02-16 14:46:29 -08:00
Rolf Neugebauer
f4e9579e4b cmd: Remove s390x as a default arch (#3911)
* cmd: Remove s390x as a default arch

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>

* Update pkg/swap hash to latest

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>

---------

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2023-02-14 06:18:01 -08:00
Avi Deitcher
c51ce2551e use latest go-compile (#3906)
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-02-01 10:38:01 +02:00
Avi Deitcher
500fdb163b update go.mod deps (#3903)
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-01-29 11:42:36 +02:00
Quentin Deslandes
9b9d337037 Disable CONFIG_BPFILTER for 5.4.x-x86_64 kernel configuration
bpfilter is not meant to be used at all at this point. Only the module's
boilerplate is available on upstream kernels.

Signed-off-by: Quentin Deslandes <qde@naccy.de>
2023-01-27 11:55:50 +01:00
Itxaka
ea6268dd74 Bump go-diskfs to latest (#3902)
Also fix cdrom provider use of the new diskfs

Signed-off-by: Itxaka <itxaka@spectrocloud.com>

Signed-off-by: Itxaka <itxaka@spectrocloud.com>
Co-authored-by: Itxaka <itxaka@spectrocloud.com>
2023-01-23 16:19:32 +02:00
Avi Deitcher
7bba32e56c bump actions artifact upload/download and cache versions (#3901)
Signed-off-by: Avi Deitcher <avi@deitcher.net>

Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-01-22 14:08:25 +02:00
Avi Deitcher
6d95833759 ensure push when already found image locally (#3899)
Signed-off-by: Avi Deitcher <avi@deitcher.net>

Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-01-19 18:00:27 +02:00
David Gageot
f9f1ec7de4 Fix swap.sh (#3897)
The script used to compare “10M” with “10” as if
they were both integers.

Signed-off-by: David Gageot <david.gageot@docker.com>

Signed-off-by: David Gageot <david.gageot@docker.com>
2023-01-12 09:50:47 +00:00
Avi Deitcher
e668b25a82 Alpine 317 (#3888) 2023-01-05 07:26:50 +02:00
Avi Deitcher
ac8c24934c Test pkgs ci makefile (#3892)
* simplify test/pkg/Makefile

Signed-off-by: Avi Deitcher <avi@deitcher.net>

* ensure pkg and test/pkg built before downstream workflows in CI

Signed-off-by: Avi Deitcher <avi@deitcher.net>

Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-01-04 11:52:48 +02:00
Avi Deitcher
a91c4a77b0 Logwrite sync with memlogd (#3890)
* sync logwrite with memlogd

Signed-off-by: Avi Deitcher <avi@deitcher.net>

* update linuxkit/logwrite and linuxkit/memlogd dependencies

Signed-off-by: Avi Deitcher <avi@deitcher.net>

Signed-off-by: Avi Deitcher <avi@deitcher.net>
2023-01-03 10:47:42 +02:00
Rolf Neugebauer
6062f91648 Merge pull request #3889 from deitch/troubleshooting
start troubleshooting doc
2022-12-30 22:45:57 +00:00
Avi Deitcher
0b6441ccbc start troubleshooting doc
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-12-30 10:41:34 +02:00
Avi Deitcher
b84548b039 fix alpine base update docs (#3886)
Signed-off-by: Avi Deitcher <avi@deitcher.net>

Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-12-29 16:47:29 +02:00
Rolf Neugebauer
6700de3a74 Merge pull request #3830 from jf/fix_docs_aws_example
Fix examples/platform-aws.yml: add dhcpcd service to keep instance reachable after lease
2022-12-29 14:44:50 +00:00
Rolf Neugebauer
eb9376ff12 Merge pull request #3887 from deitch/fix-show-tags
allow multiple packages for show-tag
2022-12-29 14:38:42 +00:00
Avi Deitcher
0673db4493 allow multiple packages for show-tag
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-12-29 11:45:30 +02:00
Avi Deitcher
154f943d01 switch from flags to cobra (#3884)
Signed-off-by: Avi Deitcher <avi@deitcher.net>

Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-12-29 10:31:57 +02:00
Petr Fedchenkov
8b04a8c92a Update buildkit to 0.11.0-rc2 (#3882)
Seems buildkit breaks API compatibility with previous OCI implementation
 in new RC release, let's update it

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-12-15 12:53:38 +02:00
Petr Fedchenkov
893bee6b81 Fix return code of rungetty.sh (#3881)
* Fix return code of rungetty.sh

In case of INITGETTY defined we will return exit code 1 which is not
expected

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>

* Update getty sha

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>

* restore package cache in LinuxKit Build Tests

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-12-15 12:12:19 +02:00
Petr Fedchenkov
c3b4a588c9 Fix handling of platform flag (#3880)
* Update of buildkit to the last version

Commit contains the version of buildkit from output of
`go list -m -json github.com/moby/buildkit@c0ac5e8b9b51603c5a93795fcf1373d6d44d3a85`:

go get -u github.com/moby/buildkit@v0.11.0-rc1.0.20221213132957-c0ac5e8b9b51
go mod tidy
go mod vendor

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>

* Fix handling of platform flag

In case of 'FROM --platform' defined I can see 'ERROR: no match for
platform in manifest: not found'. The problem was fixed on buildkit side

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-12-13 21:04:29 +02:00
Avi Deitcher
d1452385cc unify apk installed db for base layer (#3879) 2022-12-06 16:57:04 +01:00
Avi Deitcher
bbd62314ed if nothing to build, do not push (#3876)
Signed-off-by: Avi Deitcher <avi@deitcher.net>

Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-11-20 10:29:28 -05:00
Avi Deitcher
7c5b1f1b30 catch new untracked and unignored files (#3875) 2022-11-20 10:29:05 -05:00
Avi Deitcher
dee4c37648 Merge pull request #3878 from giggsoff/manifest-issues
Do not pass credentials into PushManifest
2022-11-17 15:56:02 +02:00
Petr Fedchenkov
0c8b3c8b22 Do not pass credentials into PushManifest
Seems we should not use own credential extraction logic as it should be
aligned with resolver internally to select correct information for the
host we want to push manifest. I.e. we may want to push manifest onto
ghcr.io, and in that case we will hit errors as we will extract
credentials for docker.io instead.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-11-17 15:23:59 +03:00
Avi Deitcher
a9c7a126cf Merge pull request #3877 from giggsoff/propagate-manifest-option
Propagate manifest option into push
2022-11-16 19:35:46 +02:00
Petr Fedchenkov
d58a3fc0a3 Propagate manifest option into push
We have distinct manifest option which is not used. Let's implement
different behavior.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-11-16 11:54:00 +03:00
Avi Deitcher
61caf54c54 Merge pull request #3874 from giggsoff/update-buildkit-speedup
Update buildkit version to speed up start time
2022-11-14 19:50:39 +02:00
Petr Fedchenkov
249bc953bb Update buildkit version to speed up start time
Let's update buildkit version to include startup speed fix
0bb8505e86

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-11-14 19:45:15 +03:00
Avi Deitcher
aa24821236 Merge pull request #3871 from the-maldridge/nobind
pkg/sshd: Remove default bind of /root/.ssh
2022-11-10 10:14:17 +02:00
Michael Aldridge
06aaba5e05 pkg/sshd: Remove default bind of /root/.ssh
Signed-off-by: Michael Aldridge <aldridge.mac@gmail.com>
2022-11-09 18:50:44 -06:00
Avi Deitcher
4f23407838 Merge pull request #3870 from deitch/fix-registry-check-error-handler
when cannot get remote manifest in checking registry, that is just a …
2022-11-09 08:59:13 +02:00
Avi Deitcher
01c444ec89 Merge pull request #3866 from deitch/cache-clean-published
add options to clean only part of the cache
2022-11-09 08:53:41 +02:00
Avi Deitcher
bb9a80c80a when cannot get remote manifest in checking registry, that is just a sign that it does not exist there
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-11-08 22:51:12 +02:00
Avi Deitcher
2090b2c2b6 add options to clean only part of the cache
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-11-07 13:16:40 +02:00
Avi Deitcher
860163a9c7 Merge pull request #3863 from deitch/rationalize-build-pull
Rationalize build pull
2022-11-07 09:54:48 +02:00
Avi Deitcher
bfa4a33b0d Merge pull request #3865 from deitch/bump-vz
bump virtualization-framework library to v3.0.0
2022-11-07 09:54:08 +02:00
Avi Deitcher
121002bae4 Merge pull request #3862 from deitch/canonical-tag
option to show canonical tag
2022-11-07 09:53:50 +02:00
Avi Deitcher
11fe19138d bump virtualization-framework library to v3.0.0
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-11-02 20:20:59 +02:00
Avi Deitcher
a3995bb724 build should check and only pull if requested
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-11-01 22:00:50 +02:00
Avi Deitcher
f870c16ea6 option to show canonical tag
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-11-01 15:15:09 +02:00
Avi Deitcher
9ea2d6dcd9 rationalize pull build
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-11-01 12:51:44 +02:00
Avi Deitcher
b17c93a635 Merge pull request #3860 from deitch/shard-packages-tests
add sharding option
2022-11-01 12:50:48 +02:00
Avi Deitcher
cf7d83bb13 add sharding option
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-10-30 11:16:42 +02:00
Avi Deitcher
f8947c6ae6 Merge pull request #3859 from deitch/safety-check-platforms
catch error with descriptor missing platform
2022-10-30 11:15:58 +02:00
Avi Deitcher
302c0051ec Merge pull request #3857 from deitch/fix-network-control
fix network build modes
2022-10-30 11:15:42 +02:00
Rolf Neugebauer
5200e52816 Merge pull request #3858 from deitch/makefile-rtf-tests
move rtf commands from GHA into make test; remove unused artifacts
2022-10-25 00:10:37 +01:00
Avi Deitcher
33180047f5 catch error with descriptor missing platform
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-10-24 21:44:50 +03:00
Avi Deitcher
7c2b9b3b3a move rtf commands from GHA into make test; remove unused artifacts
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-10-24 12:50:28 +03:00
Avi Deitcher
2dfc1dcf3e fix network build modes
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-10-24 11:45:45 +03:00
Rolf Neugebauer
25c8e68f98 Merge pull request #3855 from dgageot/retore-pad4
Fix initrd image padding
2022-10-22 11:40:25 +01:00
Rolf Neugebauer
7ff1e91875 Merge pull request #3856 from deitch/update-buildkit
update latest buildkit library to support advanced dockerfile scanning, other libs, go 1.19
2022-10-22 11:38:04 +01:00
Avi Deitcher
eafdb0db0c update latest buildkit library to support advanced dockerfile scanning. Also go 1.19 and other libs
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-10-20 13:47:42 +03:00
David Gageot
c61ddd0482 Remove pad4 writer because it's buggy and doesn't seem required
According to https://docs.kernel.org/driver-api/early-userspace/buffer-format.html

Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-18 19:03:49 +02:00
Avi Deitcher
61a07e26cf Merge pull request #3853 from dgageot/faster-export
Faster image export
2022-10-12 14:34:51 +03:00
David Gageot
4867802ba1 Faster image export
Creating the container without a network takes
50 to 80ms less.

Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-12 11:35:49 +02:00
Avi Deitcher
f75b5cb18a Merge pull request #3849 from deitch/lint-vet
add go vet and go lint
2022-10-11 19:03:32 +03:00
Avi Deitcher
4e4d2d1f15 fix all lint errors
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-10-11 10:16:04 +03:00
Avi Deitcher
6217565c89 add go vet and go lint
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-10-11 10:16:03 +03:00
Avi Deitcher
45e299ce91 Merge pull request #3848 from dgageot/remove-more-dead-code-pkg
Remove dead or redundant code (packages)
2022-10-10 20:55:02 +03:00
Avi Deitcher
93896eb201 Merge pull request #3843 from dgageot/remove-more-dead-code
Remove dead or redundant code (src/cmd/linuxkit)
2022-10-10 20:52:47 +03:00
Avi Deitcher
3df26af9ed Merge pull request #3846 from dgageot/nil-empty-slides-pkg
Prefer nil empty slices (packages)
2022-10-10 20:52:21 +03:00
David Gageot
39807bb0bd Remove dead or redundant code
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-09 15:33:42 +02:00
David Gageot
810c3e788f Prefer nil empty slices
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-09 15:02:23 +02:00
David Gageot
ac62571f00 Remove dead or redundant code
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-09 15:00:36 +02:00
Avi Deitcher
ebb5ded10b Merge pull request #3840 from dgageot/release-notes-workflow
Auto generate Release Notes
2022-10-09 15:55:31 +03:00
Avi Deitcher
fe560c9440 Merge pull request #3838 from dgageot/fix-workflow-name
Fix workflow's name
2022-10-09 15:54:13 +03:00
Avi Deitcher
a3f3f5630b Merge pull request #3842 from dgageot/remove-ioutil
Remove 99% of deprecated ioutil usage (src/cmd/linuxkit)
2022-10-09 15:53:57 +03:00
Avi Deitcher
221cbf2d11 Merge pull request #3844 from dgageot/nil-empty-slides
Prefer nil empty slices (src/cmd/linuxkit)
2022-10-09 15:52:43 +03:00
Avi Deitcher
b1dda052db Merge pull request #3847 from dgageot/remove-ioutil-pkg
Remove 99% of deprecated ioutil usage (packages)
2022-10-09 15:52:27 +03:00
David Gageot
d4e132021a Remove 99% of deprecated ioutil usage
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-09 13:10:38 +02:00
David Gageot
17b92c7f5a Prefer nil empty slices
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-09 13:02:23 +02:00
David Gageot
7687de2d20 Remove 99% of deprecated ioutil usage
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-09 10:27:49 +02:00
Avi Deitcher
8ef4fa3483 Merge pull request #3845 from dgageot/fix-comments
Fix comments
2022-10-09 10:26:17 +03:00
David Gageot
998ad7eea1 Fix comments
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-08 22:41:20 +02:00
David Gageot
f2d70722c4 Generate Release Notes
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-08 22:07:17 +02:00
David Gageot
4bc274154a Fix workflow's name
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-08 21:01:29 +02:00
Avi Deitcher
1d0f49e785 Merge pull request #3837 from dgageot/remove-dead-code
Remove dead code
2022-10-08 21:17:43 +03:00
Avi Deitcher
e25cc72531 Merge pull request #3835 from dgageot/release-workflow
Add an automated release workflow
2022-10-08 21:13:53 +03:00
David Gageot
d7ec2209b1 Remove dead code
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-07 18:46:38 +02:00
Avi Deitcher
07adfa2bb8 Merge pull request #3831 from dgageot/support-docker-over-ssh
Support remote docker over ssh
2022-10-07 14:43:35 +03:00
Avi Deitcher
93c3fdcfb7 Merge pull request #3834 from dgageot/test-darwin-arm64
Add a GHA target for darwin/arm64
2022-10-07 14:01:40 +03:00
David Gageot
c75bada86b Add release workflow
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-07 13:00:46 +02:00
David Gageot
95d4b34b83 Add a GHA target for darwin/arm64
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-07 10:29:17 +02:00
Avi Deitcher
0f6ed01f2b Merge pull request #3832 from dgageot/faster-gzip
Use faster gzip library
2022-10-06 16:25:38 +03:00
David Gageot
eda59aa5ab Feedback
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-06 14:00:00 +02:00
David Gageot
c977b1b306 Use faster gzip library
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-06 13:08:56 +02:00
Rolf Neugebauer
0a223ec205 Merge pull request #3829 from jf/update_platform-aws_docs
docs/platform-aws.md: add crucial note about ENA for `linuxkit push aws`
2022-10-06 09:35:25 +01:00
David Gageot
780c28dba7 Memoize docker client to avoid consuming a new ssh connection each time
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-03 15:22:21 +02:00
David Gageot
ea863184ce Support connecting to docker over ssh
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-03 14:25:09 +02:00
David Gageot
4df610741d Don't use deprecated api
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-10-03 14:10:15 +02:00
Jeffrey 'jf' Lim
3950e55e00 Fix examples/platform-aws.yml: add dhcpcd service to keep instance reachable after lease
Signed-off-by: Jeffrey 'jf' Lim <jf@users.noreply.github.com>
2022-10-02 17:09:16 +08:00
Jeffrey 'jf' Lim
5f1ae239bb docs/platform-aws.md: add crucial note about ENA for linuxkit push aws
Signed-off-by: Jeffrey 'jf' Lim <jf@users.noreply.github.com>
2022-09-28 21:40:13 +08:00
Rolf Neugebauer
d589bd18f1 Merge pull request #3828 from deitch/set-cache-via-env-var
allow setting cache dir via env var
2022-09-24 14:05:32 +01:00
Avi Deitcher
cec33f0c84 allow setting cache dir via env var
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-09-23 13:27:14 +03:00
Avi Deitcher
e532e73108 Merge pull request #3825 from giggsoff/fix-dep
Fix github.com/docker/go-units import
2022-09-13 16:51:24 +03:00
Petr Fedchenkov
227b02a8bd Fix github.com/docker/go-units import
Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-09-13 14:52:32 +03:00
Avi Deitcher
5f3856c94c Merge pull request #3823 from giggsoff/clean_builder_cache
Builder disk usage and clean
2022-09-13 14:47:09 +03:00
Petr Fedchenkov
45a5c97931 Builder disk usage and clean
We use dedicated docker container as builder and we are able to clean
data inside only by re-creating of it. Let's add disk usage and clean
commands for builder.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-09-13 13:33:46 +03:00
Avi Deitcher
3008215556 Merge pull request #3824 from giggsoff/fix-push
Fix bug: when request to build multiple arches, if one already found, it skips the others
2022-09-13 13:21:48 +03:00
Petr Fedchenkov
57148029cd Fix consistently building of multiple arch
We cannot build for another arch after building for one arch because of
setting skipBuild to true if one arch found. In other words "linuxkit
pkg build --platforms linux/riscv64,linux/amd64 ..." after "linuxkit pkg
 build --platforms linux/amd64 ..." will not build for linux/riscv64
 which is not expected.

In general when we check for available images and able to found part of
platforms we do not want to rebuild all of them. So this PR includes
platformsToBuild slice which we fill with platforms we want to build for
.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-09-13 11:58:23 +03:00
Avi Deitcher
86cc42bf79 Merge pull request #3822 from giggsoff/allow_build_without_cgo
Allow build for darwin without CGO
2022-09-12 14:49:01 +03:00
Petr Fedchenkov
a46e6af650 Allow build for darwin without CGO
It is not easy to use cross-platform build with CGO enabled so lets
allow build without cgo for darwin and use virtualization framework only
 if we built with CGO.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-09-12 11:41:37 +03:00
Avi Deitcher
ceaeac88b6 Merge pull request #3818 from deitch/optional-tag
add option to override tag name when exporting
2022-09-12 09:48:52 +03:00
Avi Deitcher
7c4e89b652 Merge pull request #3821 from giggsoff/do-not-calculate-broken-symlinks
Skip files in contentHash()
2022-09-08 20:58:13 +03:00
Petr Fedchenkov
49f8faffe0 Skip files in contentHash()
If we cannot open file for some reason it is better to skip it instead
of exit. Also we should skip symlinks and directories.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-09-08 17:34:21 +03:00
Avi Deitcher
9b636cbf25 Merge pull request #3820 from giggsoff/fix-riscv64-arch
Add all valid arches to ImageLoad
2022-09-08 14:16:03 +03:00
Petr Fedchenkov
3699177d1a Add all valid arches to ImageLoad
We should expand the list of supported arches to be able to build them if we want. Without this we will stuck on sending tarball during build for riscv64.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-09-08 12:14:49 +03:00
Avi Deitcher
fc060cac15 Merge pull request #3819 from giggsoff/dirty-fix
Append dirty tag with content hash
2022-09-07 12:49:48 +03:00
Petr Fedchenkov
8217737525 Append dirty tag with content hash
To be able to identify successive file changes without commit, we should
 use their hash in tag alongside with dirty flag
 (<ls-tree>-dirty-<content hash>).

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-09-07 11:29:43 +03:00
Avi Deitcher
3a2ecfc6d5 add option to override tag name when exporting
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-09-06 14:18:49 +03:00
Avi Deitcher
5f37332f4a Merge pull request #3816 from deitch/cache-export-filesystem
add ability to export filesystem
2022-09-05 11:08:28 +03:00
Avi Deitcher
7e65df33be add ability to export filesystem
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-08-29 18:23:43 +03:00
Avi Deitcher
1303ae4e73 Merge pull request #3810 from giggsoff/do-not-pull-another-arch
Do not pull another arch and index cleanup
2022-08-25 15:27:12 +03:00
Petr Fedchenkov
fe46d9bf05 Do not pull another arch
We pull all arches for the image which is suboptimal in terms of storage
 consumption. Let's pull only required platforms.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-08-25 12:29:35 +03:00
Avi Deitcher
6d65e39e0a Merge pull request #3815 from giggsoff/enable-tpm-uefi-aws
Enable uefi mode and tpm support for aws
2022-08-23 11:37:15 -04:00
Petr Fedchenkov
82681c0333 uefi and tpm flags for aws push
Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-08-23 10:58:24 +03:00
Petr Fedchenkov
364f66a5b8 Update aws vendoring and mod tidy
Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-08-23 10:23:45 +03:00
Avi Deitcher
1cf22ed0ac Merge pull request #3812 from deitch/safer-cache-write
verbosity for pkg build and error catching
2022-08-22 11:32:55 -04:00
Avi Deitcher
bc5084df99 verbosity for pkg build and error catching
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-08-14 11:06:02 -07:00
Avi Deitcher
56a05f628f Merge pull request #3808 from deitch/push-manifest-only
add ability to just update manifest
2022-08-07 01:26:18 -08:00
Avi Deitcher
acdfb911ac bump manifest-tool to support OCI index media-type and consume it
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-07-29 00:18:13 +03:00
Avi Deitcher
b28621b95a add ability to just update manifest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-07-28 10:46:45 +03:00
Avi Deitcher
239d4d9502 Merge pull request #3764 from deitch/virtualization-framework
add support for virtualization framework
2022-07-28 10:46:13 +03:00
Avi Deitcher
9c149a61b5 Merge pull request #3809 from giggsoff/fix-start-of-builder
Restart of the builder container
2022-07-27 20:23:52 +03:00
Petr Fedchenkov
2fd7ff7ff0 Restart of the builder container
We check only for existence of builder container and do not start it in
case of not running state. We should start it for example after reboot
of node to be able to build something.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-07-27 19:01:47 +03:00
David Scott
4bb25bda97 Fix Makefile
Before:
```
djs55@m1 linuxkit % make
make -C ./src/cmd/linuxkit
tar cf - -C . . | docker run --rm --net=none --log-driver=none -i -e GOOS= -e GOARCH= linuxkit/go-compile:7b1f5a37d2a93cd4a9aa2a87db264d8145944006 --package github.com/linuxkit/linuxkit/src/cmd/linuxkit --ldflags "-X github.com/linuxkit/linuxkit/src/cmd/linuxkit/version.GitCommit=a201652e0dabfc7f62b14ac1a43b5572a8ecae9a -X github.com/linuxkit/linuxkit/src/cmd/linuxkit/version.Version="v0.8+"" -o linuxkit > tmp_linuxkit_bin.tar
gofmt...
govet...
golint...
ineffassign...
go build...

djs55@m1 linuxkit % file bin/linuxkit
bin/linuxkit: ELF 64-bit LSB pie executable, ARM aarch64, version 1 (SYSV), static-pie linked, Go BuildID=alxJ_URcsHKe5NnzKTgb/kT7Da_wy0_5L3jkAxzZ7/jVuNyKW2yhIE_wT0QFHL/g86-fS2la_qumeAPHD40, stripped

djs55@m1 linuxkit % ./bin/linuxkit
zsh: exec format error: ./bin/linuxkit
```

After:
```
djs55@m1 linuxkit % make
make -C ./src/cmd/linuxkit
CGO_ENABLED=1 go build -o /Users/djs55/github.com/djs55/linuxkit/bin/linuxkit  --ldflags "-X github.com/linuxkit/linuxkit/src/cmd/linuxkit/version.GitCommit=df47d22bce0a1767e6e0c967d9b516cc656d7db4 -X github.com/linuxkit/linuxkit/src/cmd/linuxkit/version.Version="v0.8+""
codesign --entitlements linuxkit.entitlements --force -s - /Users/djs55/github.com/djs55/linuxkit/bin/linuxkit
/Users/djs55/github.com/djs55/linuxkit/bin/linuxkit: replacing existing signature

djs55@m1 linuxkit % file ./bin/linuxkit
./bin/linuxkit: Mach-O 64-bit executable arm64

djs55@m1 linuxkit % ./bin/linuxkit
Please specify a command.

USAGE: linuxkit [options] COMMAND
```

Signed-off-by: David Scott <dave@recoil.org>
2022-07-25 08:01:32 +01:00
David Scott
e97dda48c5 Merge pull request #3807 from dgageot/memlogd-json
Write log entries as json
2022-07-25 07:48:11 +01:00
Avi Deitcher
de1d8cdeda add support for virtualization framework
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-07-22 16:55:47 +03:00
David Scott
2bf3726a81 Merge pull request #3778 from NeilGerring/fix-bad-rebase
Fix a merge conflict in openstack.yml example
2022-07-22 06:06:57 -07:00
David Gageot
acbef4424a Make the linter happy
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-07-22 15:02:19 +02:00
David Gageot
0b136bf80d Write log entries as json
Signed-off-by: David Gageot <david.gageot@docker.com>
2022-07-22 14:41:23 +02:00
Avi Deitcher
ea61ff95ce Merge pull request #3806 from giggsoff/update-buildkit
Update buildkit to have platform fix
2022-07-22 07:36:07 -04:00
Petr Fedchenkov
3540a1bc34 Update buildkit to have platform fix
We noticed that we use host arch when we want to use previously build
image in oci-layout. Let's use fix on buildkit side and improve test.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-07-22 12:25:39 +03:00
Avi Deitcher
3f25e09ab5 Merge pull request #3805 from giggsoff/fixes-for-chained
Ability to parse args from Dockerfile
2022-07-20 16:11:47 -04:00
Petr Fedchenkov
5763c4f4bc Ability to parse args from Dockerfile
We should check if we have args in "FROM" and replace them:

ARG IMAGE=linuxkit/img
FROM ${IMAGE} as src

will be parsed as

FROM linuxkit/img as src

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-07-20 17:07:43 +03:00
Avi Deitcher
403e8f9353 Merge pull request #3797 from deitch/use-images-from-cache
add support for building from cached images
2022-07-20 09:19:47 -04:00
Avi Deitcher
4e7f87e1ea Merge pull request #3804 from giggsoff/allow-docker-multiarch
Allow store to docker multiarch builds
2022-07-18 19:08:26 +03:00
David Scott
8070434cad Merge pull request #3542 from thaJeztah/configurable_socket
pkg/trim-after-delete: make docker socket path configurable
2022-07-17 03:26:52 -07:00
David Scott
a3327ef377 Merge pull request #3794 from giggsoff/net-admin-sysctl
Add CAP_NET_ADMIN capability to sysctl
2022-07-17 03:25:19 -07:00
Petr Fedchenkov
39f1649995 Allow store to docker multiarch builds
We do not allow to load into docker images that are targets another
platform differ from current arch. Assume this is because of no support
of manifest. But we can keep all images in place by adding arch suffix
and using tag without arch suffix to point onto current system arch. It
will help to use images from docker for another arch.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-07-15 16:51:18 +03:00
Avi Deitcher
a90ff542cd add support for building from cached images
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-07-14 12:53:34 +03:00
Avi Deitcher
44dfac2725 Merge pull request #3801 from waldner/master
New output format: iso-efi-initrd
2022-07-12 12:03:11 +03:00
Davide Brini
860934d5d9 New output format: iso-efi-initrd
This option was previously not available and required postprocessing of a `tar-kernel-initrd` output.

Comparison with `iso-efi`:

`iso-efi` only loads the kernel at boot, and the root filesystem is mounted from the actual boot media (eg, a CD-ROM - physical or emulated). This can often cause trouble (it has for us) for multiple reasons:
- the linuxkit kernel might not have the correct drivers built-in for the hardware (see #3154)
- especially with virtual or emulated CD-ROMs, performance can be abysmal: we saw the case where the server IPMI allowed using a ISO stored in AWS S3 over HTTP...you can imagine what happens when you start doing random I/O on the root fs in that case.
- The ISO image has the root device name baked in (ie, `/dev/sr0`) which fails if for some reason the CD-ROM we're running from doesn't end up using that device, so manual tweaking is required (see #2375)

`iso-efi-initrd`, on the other hand, packs the root filesystem as an initramfs (ie similar to what the raw output does, except that in this case we're preparing an ISO image), so both the kernel and the initramfs are loaded in memory by the boot loader and, once running, we don't need to worry about root devices or kernel drivers (and the speed is good, as everything runs in RAM).

Also, the generated ISO can be copied verbatim (eg with `dd`) onto a USB media and it still works.

Finally, the image size is much smaller compared to `iso-efi`.

IMHO, `iso-efi-initrd` could be used almost anywhere `iso-efi` would be used, or might even supersede it. I can't think of a scenario where one might explicitly want to use `iso-efi`.

Points to consider:

- Not tested under aarch64 as I don't have access to that arch. If the automated CI tests also test that, then it should be fine.
- I'm not sure what to put inside `images.yaml` for the `iso-efi-initrd` image. As it is it works of course (my personal image on docker hub), but I guess it'll have to be some more "official" image. However, that cannot be until this PR is merged, so it's kind of a chicken and egg situation. Please advise.
- I can look into adding the corresponding `iso-bios-initrd` builder if there is interest.

![cute seal](https://sites.psu.edu/siowfa16/files/2016/09/baby-seal-29vsgyf-288x300.jpg)

Signed-off-by: Davide Brini <waldner@katamail.com>
2022-07-11 20:26:14 +02:00
Avi Deitcher
ad3d8bdac0 Merge pull request #3800 from waldner/master
Fix: #3799 golint requires comments on non-main package for blank import
2022-07-10 17:58:49 +03:00
Davide Brini
9edeba42d7 Fix: #3799 golint requires comments on non-main package for blank import
Signed-off-by: Davide Brini <waldner@katamail.com>
2022-07-10 11:55:51 +02:00
Rolf Neugebauer
806c5c418d Merge pull request #3796 from deitch/document-cache
add docs to the cache spec
2022-07-06 10:10:10 +01:00
Avi Deitcher
9c95286a35 add docs to the cache spec
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-07-01 15:30:22 +03:00
Avi Deitcher
7778f34c0c Merge pull request #3791 from deitch/direct-buildkit
build directly with buildkit
2022-07-01 12:29:20 +03:00
Petr Fedchenkov
afefea9740 Add CAP_NET_ADMIN capability to sysctl
With linux kernel 5.15+ change of proc/sys/net/ipv4/ip_forward require
CAP_NET_ADMIN (https://github.com/torvalds/linux/commit/8292d7f6). We do
 not use ip_forward now, but we should be ready for future changes of
 conf files.

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-06-28 16:55:32 +03:00
Avi Deitcher
0929aabe50 build directly with buildkit
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-06-28 10:36:30 +03:00
Avi Deitcher
fb111d3bbf add buildkit module and update packages and vendor
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-06-28 10:35:45 +03:00
Avi Deitcher
1073b2dd8d Merge pull request #3790 from giggsoff/support-gcp-vtpm
Support for vTPM on GCP
2022-06-21 18:43:09 +02:00
Petr Fedchenkov
a51f40f68b Support for vTPM on GCP
Add options to support vTPM-enabled VMs on GCP

Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2022-06-21 16:53:41 +03:00
Avi Deitcher
74b8215f0c Merge pull request #3788 from deitch/pkg-dummy
test pkg/dummy
2022-06-08 09:29:22 +03:00
Avi Deitcher
58486bbe88 remove silent from Makefile so we can see what command it is doing; sort dirs for consistency
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-06-07 21:16:13 +03:00
Avi Deitcher
857f53cdff test pkg/dummy
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-06-07 21:16:13 +03:00
Avi Deitcher
0cb96dcfa0 Merge pull request #3789 from deitch/continue-after-noarchs
when no archs for pkg to build, should continue rather than return
2022-06-07 21:12:34 +03:00
Avi Deitcher
9218f2577d when no archs for pkg to build, should continue rather than return, or it misses other packages
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-06-07 19:45:35 +03:00
Avi Deitcher
b56a0df58d Merge pull request #3787 from deitch/skip-build-if-no-platforms 2022-06-07 13:24:59 +03:00
Avi Deitcher
02fd6c48ee do not push if the tag and digest are identical
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-06-07 10:45:29 +03:00
Avi Deitcher
6cd8a874a6 do not try to build or push if no architectures are available
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-06-07 10:25:41 +03:00
Avi Deitcher
a8c4b174a3 Merge pull request #3785 from deitch/login-docker-hub
login to docker hub before publishing
2022-06-06 21:26:38 +03:00
Rolf Neugebauer
b33bda7a33 Merge pull request #3722 from gabchab/openssl-in-kernel-build
Add openssl to the kernel-build
2022-06-03 21:55:47 +01:00
Rolf Neugebauer
9e333a1358 Merge pull request #3775 from deitch/doc-kernel-builder
add docs about how to find the builder
2022-06-03 20:48:20 +01:00
Avi Deitcher
9c673d5650 login to docker hub before publishing
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-05-29 14:52:21 -07:00
Avi Deitcher
04aaebfa71 Merge pull request #3784 from deitch/download-linuxkit-in-dir
ensure bin/ dir exists, parametrize linuxkit filename
2022-05-29 11:56:45 -07:00
Avi Deitcher
a848205f9d ensure bin/ dir exists, parametrize linuxkit filename
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-05-29 10:27:55 -07:00
Avi Deitcher
e57122d0ef Merge pull request #3783 from deitch/properly-download-linuxkit 2022-05-29 07:11:15 -07:00
Avi Deitcher
830ac050c6 download artifact from other workflow
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-05-25 09:56:08 -10:00
Avi Deitcher
c972168d02 Merge pull request #3781 from deitch/pr-without-push
remove need for maintainers to build packages
2022-05-25 08:05:11 -10:00
David Scott
563060731e Merge pull request #3768 from fredericdalleau/kernel-udpate-220309
update 5.10 and 5.15 kernels to 5.10.104 resp 5.15.27
2022-05-25 14:19:19 +01:00
Frédéric Dalleau
d308349f96 ./scripts/update-component-sha.sh --hash 5.15.15 5.15.27 2022-05-25 13:39:10 +02:00
Frédéric Dalleau
0d8a1e3033 script/update-component-sha.sh --hash 5.10.92 5.10.104
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2022-05-25 13:39:10 +02:00
Frédéric Dalleau
4ec8ef8784 Update amd64 kernel config to 5.10.104
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2022-05-25 13:39:09 +02:00
Frédéric Dalleau
71c04547b2 Update arm64 kernel config to 5.10.104
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2022-05-25 13:39:09 +02:00
Frédéric Dalleau
2028ed927d Update kernel version to 5.10.104
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2022-05-25 13:39:09 +02:00
Frédéric Dalleau
7e79fd449a Update amd64 kernel config to 5.15.27
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2022-05-25 13:39:09 +02:00
Frédéric Dalleau
420a08c709 Update arm64 kernel config to 5.15.27
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2022-05-25 13:39:09 +02:00
Frédéric Dalleau
2e62dd078c Update kernel version to 5.15.27
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2022-05-25 13:39:09 +02:00
Avi Deitcher
cd5cea8c02 remove need for maintainers to build packages
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-05-23 20:24:07 -10:00
Neil Gerring
33d86ddebe Fix a merge conflict in openstack.yml example
Signed-off-by: Neil Gerring <ng@neilgerring.co.uk>
2022-05-13 14:13:06 +01:00
Avi Deitcher
3351eee596 add docs about how to find the builder
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-04-24 17:44:24 +03:00
Avi Deitcher
b710224cdf Merge pull request #3774 from zededa-yuri/build-arg
Declare build-args in build.yml
2022-04-15 12:38:37 +03:00
Yuri Volchkov
1a013f4424 Declare build-args in build.yml
This allows multiple build flavors for a single codebase, without
sacrificing reproducible builds. The build-args are set in build.yml,
which is typically under the source control (if it is not, then no
reproducible builds are possible anyways). Meaning that mutating
build-args would result in setting "dirty" flag.

Intended use of this commit is to switch between build flavors by
specifying a different yaml file (presumably also under the version
control)  by  `-build-yml` option.

Because it is impossible to build a final image from packages in
cache, the test for this feature relies on the `RUN echo $build-arg`
output during the `pkg build` process.

Signed-off-by: Yuri Volchkov <yuri@zededa.com>
2022-04-13 17:36:55 +00:00
Avi Deitcher
e3bedd0985 Merge pull request #3772 from deitch/runc-1.1 2022-03-23 06:51:00 -07:00
Avi Deitcher
b3f276f8f9 update linuxkit/init dependencies
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-03-21 14:15:28 +02:00
Avi Deitcher
faf5a68ad6 runc to 1.1
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-03-21 14:01:54 +02:00
Avi Deitcher
109a5ed3e2 Merge pull request #3771 from deitch/containerd-separate 2022-03-21 12:38:27 +02:00
Avi Deitcher
200e0ee94a update dependencies of pkg/init and pkg/containerd
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-03-21 01:22:19 +02:00
Avi Deitcher
0b39a484b1 containerd-dev separate
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-03-21 01:20:45 +02:00
David Scott
12b59634f3 Merge pull request #3724 from djs55/cgroupv2-mkdir
service: handle creating cgroupv2 cgroups
2022-03-14 10:54:23 +01:00
David Scott
521b323270 test: extend cgroupv2 case to support runtime: cgroups:
Signed-off-by: David Scott <dave@recoil.org>
2022-03-13 19:57:28 +00:00
David Scott
f14ad44ce4 update shas for pkg/init
Signed-off-by: David Scott <dave@recoil.org>
2022-03-13 19:57:25 +00:00
David Scott
c4d7f5d993 service: handle creating cgroupv2 cgroups
These are easier to create than cgroupv1 cgroups as they are only a
single mkdir.

Detect which mode we are in by looking for the presence of the
cgroupv2-only cgroup.controllers file.

Signed-off-by: David Scott <dave@recoil.org>
2022-03-13 19:37:05 +00:00
Avi Deitcher
0e2887ce5c Merge pull request #3766 from deitch/getty-hvc0 2022-02-28 22:03:09 +02:00
Avi Deitcher
8328d4a589 update examples to latest getty
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-02-28 19:37:44 +02:00
Avi Deitcher
6fbed84347 getty with hvc0
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-02-28 19:24:45 +02:00
Rolf Neugebauer
2559fe49b6 Merge pull request #3758 from rn/kern-up
Kernel update to 5.10.92/5.4.172 add 5.15.x, remove 5.12.x
2022-01-18 20:56:23 +00:00
Rolf Neugebauer
9f2ff29e5e tests: Add 5.15.x kernel tests (renamed from 5.12)
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2022-01-18 12:55:03 +00:00
Rolf Neugebauer
bc3f72b518 Update kernel config test to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2022-01-18 12:49:30 +00:00
Rolf Neugebauer
76d4f3d03a test/pkg: Disable DEVKMEM test for kernels older than 5.13.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2022-01-18 12:42:42 +00:00
Rolf Neugebauer
1fd890a76b Bump kernel images to 5.10.92/5.4.172
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2022-01-18 12:41:58 +00:00
Rolf Neugebauer
ae87f6a1e2 kernel: Bump Intel ucode to microcode-20210608
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2022-01-18 01:08:45 +00:00
Rolf Neugebauer
bd4d8ff44e kernel: Add support for 5.15.x kernel
The kernel config is derived from the 5.12 kernel
config we used to have

We explicitly enable RANDOMIZE_KSTACK_OFFSET_DEFAULT
which is off by default.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2022-01-18 01:07:41 +00:00
Rolf Neugebauer
ff606216e4 kernel: Update to 5.10.92/5.4.156
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2022-01-18 00:46:21 +00:00
Rolf Neugebauer
8e03866f69 kernel: Remove 5.12.x kernel since it has been EOLed
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2022-01-18 00:37:23 +00:00
Avi Deitcher
1df038e1b0 Merge pull request #3753 from deitch/rationalize-args
replace Build many args with opts struct
2022-01-14 11:21:37 +02:00
Avi Deitcher
f6b9dc1717 replace Build many args with opts struct
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-01-13 12:50:58 +02:00
Dave Tucker
951a58cf06 Merge pull request #3627 from dave-tucker/mod
Go Module-ify all the things
2022-01-12 08:20:20 +00:00
Dave Tucker
0b739c80e9 pkg: update shas
Update the SHA of all packages that have been go-mod-ififed
such that they are use for testing in CI

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-12 00:04:37 +00:00
Dave Tucker
9b8ae51481 ci: Ensure binfmt is set up for arm64. Skip s390x
s390x emulation is broken. All emulated builds fail with.
Illegal Instruction and/or Segfaults.

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 21:11:49 +00:00
Marcus Weiner
e26aa2e490 Move metadata package to go modules
Signed-off-by: Marcus Weiner <marcus.weiner@gmail.com>
2022-01-11 21:11:49 +00:00
Dave Tucker
2cf5cf65b0 format: Use go modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 21:11:49 +00:00
Dave Tucker
013416f923 rngd: Use go modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 21:11:49 +00:00
Dave Tucker
01e242cad1 trim-after-delete: Add go.mod
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 21:11:48 +00:00
Dave Tucker
158461502a sysfs: Add go.mod
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 21:11:48 +00:00
Dave Tucker
3244052389 sysctl: Add go.mod
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 21:11:48 +00:00
Dave Tucker
af7b87e99a mount: Use Go Modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 21:11:43 +00:00
Dave Tucker
93df9f736c memlogd: Use Go Modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 20:18:39 +00:00
Dave Tucker
3594ec48d4 logwrite: Use Go Modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 20:18:38 +00:00
Dave Tucker
0ee4d71562 kmsg: Use Go Modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 20:18:38 +00:00
Dave Tucker
65da053ac3 host-timesync-daemon: Use Go Modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 20:18:38 +00:00
Dave Tucker
599aedc9c5 format: Use Go Modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 20:18:38 +00:00
Dave Tucker
4ededf5ca3 extend: Migrate to Go Modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 20:18:38 +00:00
Dave Tucker
b22a7853a0 binfmt: Migrate to Go Modules
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 20:18:38 +00:00
Dave Tucker
fcaab549fe init: Migrate to Go Modules
Moves vendoring over to Go modules.
Fixes issues found by Go Vet in Go 1.16

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2022-01-11 20:18:37 +00:00
Avi Deitcher
5b7466732a Merge pull request #3752 from deitch/move-arch-field 2022-01-10 20:00:34 +02:00
Avi Deitcher
84e3b80863 pass target architecture explicitly
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2022-01-10 10:36:22 +02:00
Rolf Neugebauer
b5bf29c0f6 Merge pull request #3747 from sprat/fix-sshd
Fix sshd
2022-01-01 22:46:56 +00:00
Sylvain Prat
c453e8ed26 Update sshd hashes
Signed-off-by: Sylvain Prat <sylvain.prat@gmail.com>
2022-01-01 15:24:25 +01:00
David Scott
6a11c118f4 Merge pull request #3678 from olljanat/docker-run-print-stderr
Print docker run stderr in-case of error
2021-12-30 10:37:30 +00:00
Avi Deitcher
210a308602 Merge pull request #3746 from sprat/fix-openntpd
openntpd: the "-s" flag is obsolete, this generates some error messages in the ntpd logs
2021-12-29 21:24:02 +02:00
Rolf Neugebauer
88ada58c28 Merge pull request #3745 from fredericdalleau/runc-1.0.3
Upgrade runc to 1.0.3
2021-12-29 16:31:25 +00:00
Sylvain Prat
a71a52b57c SSHd: allow access to all devices & fix a warning with tini
Signed-off-by: Sylvain Prat <sylvain.prat@gmail.com>
2021-12-22 19:03:43 +01:00
Sylvain Prat
ea0570891c Changed openntpd hashes
Signed-off-by: Sylvain Prat <sylvain.prat@gmail.com>
2021-12-22 17:20:34 +01:00
Sylvain Prat
42a3f80bec The "-s" flag is obsolete, this generates some errors messages in the ntpd logs
Signed-off-by: Sylvain Prat <sylvain.prat@gmail.com>
2021-12-22 17:13:59 +01:00
David Scott
341c4a4f5e Update shas for linuxkit/runc
./scripts/update-component-sha.sh linuxkit/runc:21dbbda709ae138de0af6b0c7e4ae49525db5e88  linuxkit/runc:9f7aad4eb5e4360cc9ed8778a5c501cce6e21601

Signed-off-by: David Scott <dave@recoil.org>
2021-12-16 19:10:58 +01:00
Frédéric Dalleau
3e38a8c323 Bump runc to 1.0.3
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2021-12-16 19:10:58 +01:00
Frédéric Dalleau
36853c74ef Revert "runc: don't mount /dev with ro"
This reverts commit 380f36cc1a.

Now that runc includes a fix for this, this patch can be reverted

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2021-12-16 19:10:58 +01:00
Rolf Neugebauer
be43e99310 Merge pull request #3743 from aoxn/master
fix: #3742 golint requires comments on non-main package for blank import
2021-12-14 17:29:14 +00:00
Rolf Neugebauer
2e9d7540ae Merge pull request #3740 from sprat/fix-acpid-binds
Fix acpid devices
2021-12-14 12:59:49 +00:00
谢瑶瑶
f5a720bcbb fix: #3742 golint requires comments on non-main package for blank import
Signed-off-by: 谢瑶瑶 <yaoyao.xyy@alibaba-inc.com>
2021-12-14 13:50:59 +08:00
Sylvain Prat
4bbb32e68c Update acpid hash
Signed-off-by: Sylvain Prat <sylvain.prat@gmail.com>
2021-12-09 21:05:34 +01:00
Sylvain Prat
1c3e40ea2b Fixes #3738: add missing devices to acpid
According to busybox' acpid code, acpid should be allowed to access /dev/input/event*, so we all all "input" devices (whose major number is 13)

Signed-off-by: Sylvain Prat <sylvain.prat@gmail.com>
2021-12-09 21:05:34 +01:00
Avi Deitcher
cd4c49b469 Merge pull request #3642 from deitch/releasing-docs
document and simplify some releasing
2021-11-29 19:38:25 +02:00
Avi Deitcher
4e7abb5250 document and simplify some releasing
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-29 16:39:06 +02:00
David Scott
33a4330cf6 Merge pull request #3737 from ebriney/memlogd-time-nano
Use RFC3339Nano for timestamps
2021-11-28 10:29:17 +00:00
David Scott
6a9c6abfba Update hashes for pkg/memlogd
Signed-off-by: David Scott <dave@recoil.org>
2021-11-27 20:01:21 +00:00
Emmanuel Briney
e254145257 Use RFC3339Nano for timestamps
Signed-off-by: Emmanuel Briney <emmanuel.briney@docker.com>
2021-11-26 16:41:51 +01:00
Avi Deitcher
46ef83c979 Merge pull request #3702 from deitch/alpine-314
bump alpine to 3.14, remove go version hack
2021-11-16 14:56:01 +02:00
David Scott
1bd84de2b3 Merge pull request #3730 from deitch/bump-gcr
bump go-containerregistry and manifest-tool to latest
2021-11-10 07:57:27 +00:00
Avi Deitcher
58813e8791 bump go-containerregistry and manifest-tool to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-09 18:48:06 +02:00
Avi Deitcher
260cc85b52 Update package tags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-09 14:02:43 +02:00
Avi Deitcher
7549a63c9f pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-09 14:02:42 +02:00
Avi Deitcher
bcbabcac28 Update use of test packages to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-09 14:02:41 +02:00
Rolf Neugebauer
78eef5b729 Merge pull request #3726 from djs55/virtiofs
Run CI with updated hashes from #3715 (CONFIG_VIRTIOFS)
2021-11-09 10:03:01 +00:00
David Scott
833b3e775d Update linuxkit/kernel:5.4.129 to linuxkit/kernel:5.4.156
Signed-off-by: David Scott <dave@recoil.org>
2021-11-08 13:51:34 +00:00
David Scott
2160964c1a Update kernel:5.10.47 to kernel:5.10.76
Signed-off-by: David Scott <dave@recoil.org>
2021-11-08 13:50:08 +00:00
Avi Deitcher
04b90b986a tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-07 16:41:36 +02:00
Avi Deitcher
897d7a5071 Update use of tools to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-07 16:40:26 +02:00
Avi Deitcher
0e69ea8f5d tools: Update to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-07 16:39:16 +02:00
Avi Deitcher
c0ef25e4b7 tools/alpine: Update to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-07 13:43:45 +02:00
Avi Deitcher
cc57d67c99 bump alpine to 3.14, remove go version hack
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-07 13:43:45 +02:00
Rolf Neugebauer
7475eb428b Merge pull request #3728 from deitch/update-component-hash-yaml-only
restrict update to just yaml files
2021-11-05 23:22:25 +00:00
Avi Deitcher
920a83da32 restrict update to just yaml files
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-05 15:32:36 +02:00
Avi Deitcher
c07b11acb9 Merge pull request #3729 from deitch/extract-more-yaml
extract more hard-coded yaml
2021-11-05 09:21:44 -04:00
Avi Deitcher
e1dd1af1b9 extract more hard-coded yaml
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-05 13:07:06 +02:00
Frédéric Dalleau
56c08df66b Refresh configs for kernel update
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2021-11-05 10:28:24 +01:00
Frédéric Dalleau
3cf25af73e kernel: update LTS kernels to 5.10.76/5.4.156
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2021-11-05 10:28:24 +01:00
Frédéric Dalleau
e9e3a8ddce Refresh configs for virtiofs
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2021-11-05 10:28:12 +01:00
Frédéric Dalleau
ad4f9a77a0 Enable CONFIG_VIRTIO_FS=y
Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2021-11-05 10:16:18 +01:00
Avi Deitcher
01a1aac73c Merge pull request #3727 from deitch/embed-hashes 2021-11-05 04:46:45 -04:00
Avi Deitcher
f8471d443c Merge pull request #3723 from deitch/update-component-hash-pkg 2021-11-04 15:18:04 -04:00
Avi Deitcher
0660ace86f extract hard-coded default image builders into file
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-11-04 14:51:15 -04:00
Rolf Neugebauer
34b0a786e7 Merge pull request #3725 from djs55/fix-windows-pkg-build
linuxkit: fix pkg build on Windows
2021-10-31 10:54:45 +00:00
Avi Deitcher
a05f612aa4 update-component-sha --pkg option
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-10-31 05:38:32 -04:00
David Scott
f5f5dce318 linuxkit: fix pkg build on Windows
Previously when we set `cmd.Stderr = os.Stderr`, the stderr from buildx
would be mixed with the image tar, corrupting it.

Work around this (Windows-specific) problem by adding an explicit
indirection via a io.Pipe()

Signed-off-by: David Scott <dave@recoil.org>
2021-10-29 12:01:35 +01:00
Gabriel Chabot
c37046f617 Add openssl to the kernel-build
Signed-off-by: Gabriel Chabot <gabriel.chabot@qarnot-computing.com>
2021-10-28 10:55:16 +02:00
Rolf Neugebauer
f5a1541e00 Merge pull request #3719 from tonistiigi/cgroupv2
init: add support for cgroupv2
2021-10-27 09:26:11 +01:00
David Scott
10599f776a test: add a case for cgroupv2
Signed-off-by: David Scott <dave@recoil.org>
2021-10-26 20:07:38 +01:00
David Scott
9d16e2a2b9 test: the README.md says the numbers correspond to the first letter
A few of these tests appear to be misnumbered, so renumber them.

Signed-off-by: David Scott <dave@recoil.org>
2021-10-26 20:04:51 +01:00
David Scott
e8f8a409e8 Update hashes for pkg/init
Signed-off-by: David Scott <dave@recoil.org>
2021-10-26 19:52:22 +01:00
Tonis Tiigi
5af7c526ec init: add support for cgroupv2
Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com>
2021-10-24 23:03:51 -07:00
Rolf Neugebauer
e71deb3862 Merge pull request #3718 from djs55/containup-test
Update runc, containerd, add devices: and fix readonly
2021-10-22 21:10:30 +01:00
David Scott
e4776e8778 Update hash for containerd 1.4.11
Signed-off-by: David Scott <dave@recoil.org>
2021-10-21 11:34:59 +01:00
David Scott
476d5a0f2e Update alpine for containerd
Signed-off-by: David Scott <dave@recoil.org>
2021-10-21 11:34:59 +01:00
David Scott
42670404f5 alpine: Update versions file
Signed-off-by: David Scott <dave@recoil.org>
2021-10-21 11:34:59 +01:00
David Scott
34d0aef7d4 Update containerd to 1.4.11
We can remove the workaround for musl using faccessat(2) and breaking
runc, because the fix is in rc93:

https://wiki.alpinelinux.org/wiki/Release_Notes_for_Alpine_3.14.0#faccessat2

Signed-off-by: David Scott <dave@recoil.org>
2021-10-21 11:34:55 +01:00
David Scott
2ff94c0d72 test: kmsg requires /dev/console
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:05:44 +01:00
David Scott
bdb1c13473 test: logwrite requires /dev/console
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:05:44 +01:00
David Scott
5a12600412 test: init-containerd requires /dev/console
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:05:44 +01:00
David Scott
dcecbe57c6 test: containerd tests need losetup which needs block device access
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:05:26 +01:00
David Scott
1c02c9ea86 test: losetup needs block device access
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:03:29 +01:00
David Scott
d4c6ab742b Update hashes for pkg/...
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:02:44 +01:00
David Scott
7434e5f5aa pkg/kmsg: grant access to /dev/kmsg
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:02:44 +01:00
David Scott
6bc99c5ff2 pkg/metadata: grant access to all block devices
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:02:36 +01:00
David Scott
9209808ac3 pkg/losetup: grant access to all block devices
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:02:18 +01:00
David Scott
344d974ae1 pkg/extend: grant access to all block devices
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:02:11 +01:00
David Scott
71fa9f2cae pkg/dm-crypt: grant access to all devices
The package needs block devices e.g. for /dev/sda

It also needs character devices for /dev/mapper/

Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:01:01 +01:00
David Scott
5895976b33 tools/mkimage: grant access to block devices
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:00:55 +01:00
David Scott
380f36cc1a runc: don't mount /dev with ro
After runc 1.0.0-rc92 mounting /dev with ro will fail to start the
container with an error trying to `mkdir /dev/...` (for example
`/dev/pts`). This can be observed following the runc example

Comparing our `config.json` with the working one generated by
`runc spec`, both have a readonly rootfs (good) but the `runc spec`
one does not set `ro` in the `/dev` mount options.

This patch fixes readonly onboot containers by removing the "ro"
option from `/dev`, to match the `runc spec` example.

Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:00:04 +01:00
David Scott
0cfaa9ce65 runc: update to v1.0.2
Signed-off-by: David Scott <dave@recoil.org>
2021-10-18 21:00:04 +01:00
Rolf Neugebauer
0dd8086d39 Update YAMLs to latest runc/containerd/test-containerd
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-10-16 16:57:15 +01:00
Rolf Neugebauer
6efae97c20 Update alpine for containerd
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-10-16 16:57:15 +01:00
Rolf Neugebauer
0e00eddd6b alpine: Fix push-manifest.sh
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-10-16 16:57:15 +01:00
Rolf Neugebauer
d2307ebae3 alpine: Update versions file
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-10-16 16:57:15 +01:00
David Scott
5124698b47 alpine: update containerd to 1.4.6
As suggested on https://github.com/linuxkit/linuxkit/pull/3554#issuecomment-852910630

Signed-off-by: David Scott <dave@recoil.org>
2021-10-16 16:57:15 +01:00
David Scott
7d76051bb0 runc: update to v1.0.0-rc95
Signed-off-by: David Scott <dave@recoil.org>
2021-10-16 16:57:15 +01:00
Rolf Neugebauer
d71299a2c1 Merge pull request #3716 from djs55/containup-devices2
Add OCI devices to yaml (needed by getty with runc v1.0.0-rc95)
2021-10-16 10:35:35 +01:00
David Scott
c2d47b47ff Update hashes for pkg/swap
Signed-off-by: David Scott <dave@recoil.org>
2021-10-15 08:19:03 +01:00
David Scott
c3642dd089 Update hashes for pkg/mount
Signed-off-by: David Scott <dave@recoil.org>
2021-10-15 08:19:03 +01:00
David Scott
97d054da5d Update hashes for pkg/getty
Signed-off-by: David Scott <dave@recoil.org>
2021-10-15 08:18:58 +01:00
David Scott
21a7155824 Update hashes for pkg/format
Signed-off-by: David Scott <dave@recoil.org>
2021-10-14 16:14:21 +01:00
David Scott
46ea02f65b moby: device "all" will add to the cgroup whitelist
After the runc security advisory[1] the default cgroup device
whitelist was changed.

In previous versions every container had "rwm" (read, write, mknod)
for every device ("a" for all). Typically this was overridden by
container engines like Docker. In LinuxKit we left the permissive
default.

In recent `runc` versions the default allow-all rule was removed,
so a container can only access a device if it is specifically
granted access, which LinuxKit handles via a device: entry.

However it is inconvenient for pkg/format, pkg/mount, pkg/swap
to list all possible block devices up-front. Therefore we add the
ability to grant access to an entire class of device with a single
rule:

```
- path: all
  type: b
```

Obviously a paranoid user can still override this with a specific
major/minor number in a device: rule.

[1] https://github.com/opencontainers/runc/security/advisories/GHSA-g54h-m393-cpwq

Signed-off-by: David Scott <dave@recoil.org>
2021-10-14 16:14:21 +01:00
David Scott
24db42dd68 moby: add a Devices array to the image yml
According to https://github.com/linuxkit/linuxkit/pull/3684#issuecomment-860128095

runc removed the console as a default device, so now it must be specified
explicitly in the OCI config.

See 60e21ec26e

The similar code in moby/moby is here: https://github.com/moby/moby/blob/master/oci/devices_linux.go

This patch allows packages to declare a `devices` array, which can contain `/dev/console` etc.

Signed-off-by: David Scott <dave@recoil.org>
2021-10-14 16:14:05 +01:00
Rolf Neugebauer
d0145160a8 Merge pull request #3717 from djs55/run-qemu-m1
Fix `linuxkit run qemu` on macOS on Apple Silicon
2021-10-13 21:16:48 +01:00
David Scott
c779e894da Fix linuxkit run qemu on macOS on Apple Silicon
Signed-off-by: David Scott <dave@recoil.org>
2021-10-13 14:38:20 +01:00
Rolf Neugebauer
46d4edc967 Merge pull request #3711 from djpbessems/patch-1
Include `lvm2`
2021-08-14 13:30:35 +01:00
Rolf Neugebauer
2eb87b7ffb Merge pull request #3713 from rn/notrust
Update YAML files
2021-08-10 23:39:44 +01:00
Rolf Neugebauer
4eb60514c9 yaml: Update use of alpine:3.11 to alpine:3.13
Seceral YAML files used alpine:3:11. Update them to 3.13

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-08-10 00:13:52 +01:00
Rolf Neugebauer
ce73340d6c examples: Prefix examples for platforms with platform-
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-08-10 00:11:48 +01:00
Rolf Neugebauer
f52c7f17c8 yaml: Remove trust section from examples and tests
With 561ce6f4be ("Remove Notary and Content Trust") we
removed support for content trust. No need to have it
in the YAMLs either.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-08-10 00:07:13 +01:00
Danny Bessems
098f5c86c0 Include lvm2
Signed-off-by: djpbessems <danny@bessems.eu>
2021-08-06 15:14:38 +02:00
Rolf Neugebauer
4e600a3790 Merge pull request #3704 from rn/kern-up
Update kernels to 5.10.47/5.4.129, remove 5.11.x and add 5.12.x
2021-07-06 23:22:57 +01:00
Rolf Neugebauer
47198556c2 Update YAMLs to latest kernel config test
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 13:54:55 +01:00
Rolf Neugebauer
88352cd358 pkg: Drop oprofile fs check from kernel config check
oprofile kernel support was dropped with 5.12.x with:
f8408264c77a ("drivers: Remove CONFIG_OPROFILE support")

However the commit stated that the userspace oprofile tools
had stopped using the kernel interface for a log time. So
drop the check.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 13:47:12 +01:00
Rolf Neugebauer
4389918aef Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 11:16:45 +01:00
Rolf Neugebauer
f4afb12454 tests: Add tests for 5.12.x kernel
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 11:16:45 +01:00
Rolf Neugebauer
f20e08bcb8 kernel: Enable CONFIG_SQUASHFS_ZSTD
requested/suggested by @olljanat

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 11:16:45 +01:00
Rolf Neugebauer
01b46ba789 kernel: Add support for 5.12.x kernel
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 11:16:45 +01:00
Rolf Neugebauer
a54b9509ae tests: Remove 5.11 tests
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 11:16:45 +01:00
Rolf Neugebauer
1e97e29be3 kernel: Remove 5.11.x as it is not longer maintained
Leave it for -rt kernels

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 11:16:45 +01:00
Rolf Neugebauer
43d3ff0630 kernel: Update LTS kernels to 5.10.47/5.4.129
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 11:16:45 +01:00
Rolf Neugebauer
25c796e854 kernel: Fix Dockerfile.kconfig
KERNEL_VERSIONS apparently needs to be specified as
argument after the FROM

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 11:16:45 +01:00
Rolf Neugebauer
a4c518f696 kernel: Remove support for s390x
WIP #3676

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-07-04 11:16:45 +01:00
Rolf Neugebauer
36d8026b17 Merge pull request #3700 from TiejunChina/master-dev
enable 5.11.x-rt
2021-07-03 10:13:15 +01:00
Rolf Neugebauer
aaa30dfc55 Merge pull request #3691 from kmjohansen/topics/kj/bcc-up
Upgrade bcc to 0.20.0 and re-enable it in the kernel build
2021-07-03 00:30:03 +01:00
Rolf Neugebauer
bf5ca81a93 Merge pull request #3701 from fredericdalleau/disable-bpfilter
Disable CONFIG_BPFILTER and CONFIG_BPFILTER_UMH
2021-07-02 09:12:08 +01:00
Tiejun Chen
a8879bac91 update example-rt
Signed-off-by: Tiejun Chen <tiejun.china@gmail.com>
2021-06-29 11:09:26 -07:00
Tiejun Chen
8183676233 enable 5.11.x-rt build
Signed-off-by: Tiejun Chen <tiejun.china@gmail.com>
2021-06-29 11:09:23 -07:00
Tiejun Chen
ab288c4526 port 5.11.4-rt
Signed-off-by: Tiejun Chen <tiejun.china@gmail.com>
2021-06-29 11:09:20 -07:00
Frederic Dalleau
194a055d1c Disable CONFIG_BPFILTER and CONFIG_BPFILTER_UMH
CONFIG_BPFILTER is aimed to provide a replacement for netfilter.

When CONFIG_BPFILTER is enabled, the kernel tries to contact a user mode helper
for each iptable rule update. However the implementation of this helper has not
been upstreamed yet. The communication thus fails and the kernel then falls back
to netfilter.
As a result, the rule update takes more than ten times the duration of the
netfilter implementation alone.

This has been reported by Docker Desktop users for whom it can take minutes to
start a container sharing a few hundred ports. https://github.com/for-mac/issues/5668

More details on the situation is described in https://lwn.net/Articles/822744/.

Signed-off-by: Frederic Dalleau <frederic.dalleau@docker.com>
2021-06-28 21:14:27 +02:00
Avi Deitcher
39ad5a1ab6 Merge pull request #3696 from deitch/fix-arch-push
check for arch when pulling to cache, push by descriptor
2021-06-25 14:20:22 +03:00
Avi Deitcher
ebbb1281f3 one-more
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-06-23 13:40:55 +03:00
Avi Deitcher
a05b0ac923 check for arch when pulling to cache, push by descriptor
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-06-21 23:33:34 +03:00
Avi Deitcher
ccece6a488 Merge pull request #3692 from deitch/bump-manifest-tool
bump manifest-tool to latest
2021-06-16 16:47:44 +03:00
Avi Deitcher
873f61e695 bump manifest-tool to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-06-15 20:28:44 +03:00
Avi Deitcher
acc34e5ee3 Merge pull request #3688 from deitch/manifest-anywhere
Push arch-specific tags, always build index from registry
2021-06-14 14:25:50 +03:00
Avi Deitcher
df36b7aa7d Push arch-specific tags, always build index from registry
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-06-10 13:33:16 +03:00
Krister Johansen
13068d54d4 Enable bcc in the kernel build again.
The bcc portion of the build had been disabled because it wasn't
building.  Now that bcc is building again, add it back to the list of
default targets in the kernel build.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2021-06-08 21:00:05 -07:00
Krister Johansen
898232ceab Get BCC building again.
This moves up to bcc 0.20.0 and builds on the latest 3.13 Alpine base
image.  It uses libelf from Alpine, which allows us to drop a number of
the patches we were carrying and reduce the number of steps taken in the
bcc build.

This builds for me on a branch of tip against 5.11.x, 5.10.x,
5.10.x-dbg, and 5.4.x on x86_65.  I have not had a chance to attempt
this on other platforms due to lack of hardware.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2021-06-08 20:57:10 -07:00
David Scott
79b32dc2c7 Merge pull request #3554 from thaJeztah/update_docker_containerd
Update docker 20.10.6
2021-06-02 10:34:40 +01:00
Rolf Neugebauer
c49cd91386 Merge pull request #3679 from rn/kern-up
Update kernels to 5.11.22/5.10.39/5.4.121
2021-06-02 08:59:24 +01:00
Rolf Neugebauer
0d8bb78f07 tests: Fix kernel builder tests
Some kernels are only build for some architectures. The
test assumed that all kernels were build for all architectures.

Now, get a list of architectures for which we have a given
kernel image and then make sure the builder images pointed
to by the label and the builder image tagged by convention
exist and point to the same thing.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-06-01 22:51:10 +00:00
Rolf Neugebauer
0e025d8fb9 Update YAMLs and tests to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-28 09:18:12 +01:00
Rolf Neugebauer
6b0e1b709d tests: Copy kernel-builder from the correct location
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-27 13:06:15 +01:00
Rolf Neugebauer
5f959a9bcd kernel: Move build label add to Makefile
where the other labels are defined

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-27 13:06:15 +01:00
Rolf Neugebauer
70ac373206 kernel: Fix ARG handling in Dockerfiles
At least for the perf image I got an error when
not having the ARG up front.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-27 00:16:26 +00:00
Rolf Neugebauer
c25cc37643 kernel: Remove remnants of DOCKER_CONTENT_TRUST
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-27 00:16:26 +00:00
Rolf Neugebauer
2c728f89d9 kernel: Update to 5.11.22/5.10.39/5.4.121
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-26 22:33:23 +01:00
Rolf Neugebauer
9c7f158bd1 kernel: Fix KERNEL_SOURCE
Declare KERNEL_SOURCE as an environment variable so it
get's picked up in kernel-source-info

fixes #3653

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-26 22:33:23 +01:00
Rolf Neugebauer
fb283d2baf kernel: Remove out of kernel WireGuard build
5.4.x is the only kernel left which does not have
WireGuard in tree and it people should be using more
recent kernels. Remove the now special case for
compiling out of tree WireGuard.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-26 22:33:23 +01:00
Rolf Neugebauer
1337e07d3e kernel: Remove 4.19 patches
Must have missed those when removing 4.19 support in
f9f85bd4b3 ("kernel: Remove older LTS kernels")

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-26 22:33:23 +01:00
Olli Janatuinen
49cbe047ce Print docker run stderr in-case of error
Signed-off-by: Olli Janatuinen <olli.janatuinen@gmail.com>
2021-05-26 22:55:52 +03:00
Dave Tucker
6312d58032 Merge pull request #3659 from edvinerikson/fix-install
fix: make command
2021-05-26 14:27:52 +01:00
Avi Deitcher
77026d5283 Merge pull request #3671 from deitch/cache-export
Add support for cache export
2021-05-26 14:26:26 +03:00
Dave Tucker
452910c625 Makefile: Don't encode bindir in the tar archive
Prior to this commit we go build -o bin/foo, archive it, and
expand the archive, leaving the resulting artifact in bin.

This doesn't allow us to easily change the bin directory, or
move parts of the makefile around to make things more modular.

This commit changes the behaviour to:
go build -o foo, archive it, expand to `bin`

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-05-26 11:18:41 +01:00
Avi Deitcher
4795c993ee Add support for cache export
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-05-26 13:13:37 +03:00
Rolf Neugebauer
c63162964f Merge pull request #3651 from deitch/kernel-tagging
tag kernel with builder version; simplify Makefile
2021-05-25 22:55:31 +01:00
Avi Deitcher
d053a0f279 tag kernel with builder version; simplify Makefile
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-05-25 15:51:01 +03:00
Rolf Neugebauer
fc09bc084a Merge pull request #3666 from deitch/alpine-hash
calculate manifest using same method as lkt pkg push via git ls-tree
2021-05-21 23:20:44 +01:00
Avi Deitcher
4adc04a24d calculate manifest hash-tag using git ls-tree
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-05-21 01:31:14 +03:00
Avi Deitcher
c4d8b1a250 Merge pull request #3670 from rvs/riscv64
Allowing linuxkit to recongnize linux/riscv64 arch
2021-05-20 09:44:03 +03:00
Roman Shaposhnik
378cfc0b3d Allowing linuxkit to recongnize linux/riscv64 arch
Signed-off-by: Roman Shaposhnik <rvs@zededa.com>
2021-05-19 12:34:07 -07:00
Avi Deitcher
1096165072 Merge pull request #3668 from deitch/build-image 2021-05-18 22:36:34 +03:00
Avi Deitcher
f7ee51d931 add v1tarreader for images and use it for docker load
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-05-18 18:14:23 +03:00
Avi Deitcher
ebf570d045 refactor buildContext into a simple stdin reader
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-05-18 18:14:23 +03:00
Avi Deitcher
dd09b7d77a simplify nobuild/force/build logic
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-05-18 18:14:22 +03:00
David Scott
84a5bc10c9 Merge pull request #3669 from djs55/trim-after-delete-arches
trim-after-delete: avoid building on s390x
2021-05-18 15:34:53 +01:00
David Scott
e463855425 trim-after-delete: avoid building on s390x
Signed-off-by: David Scott <dave@recoil.org>
2021-05-18 13:39:20 +01:00
David Scott
71598cc050 Merge pull request #3667 from aiordache/trim_after_delete_events
[POS-17] Add more docker event types to trigger fstrim
2021-05-17 14:04:01 +01:00
Rolf Neugebauer
8c16d6ac3a Merge pull request #3664 from rn/open-vm
Include open-vm-tools packages
2021-05-15 10:46:34 +01:00
Anca Iordache
d326c1b2e6 Add more event types to trigger fstrim
Signed-off-by: Anca Iordache <anca.iordache@docker.com>
2021-05-12 16:12:14 +02:00
Avi Deitcher
8dd089ae93 Merge pull request #3665 from deitch/alpine-fix-targetauth
correctly use target-arch
2021-05-10 15:32:20 +03:00
Avi Deitcher
4d9de9a583 correctly use target-arch
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-05-10 12:21:33 +03:00
Rolf Neugebauer
7b836c2bd8 Include open-vm-tools packages
In alpine version 3.12, the open-vm-tools package got split into new
smaller sub-packages. The implication of this is that features such as
reporting of hostname and ip address to vCenter stopped working.

Signed-off-by: Edvin Eriksson <edvin.erikson@leovegas.com>
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-09 11:22:12 +00:00
Edvin Eriksson
f4c4ab1c8c fix: install linuxkit in top-level bin folder
Signed-off-by: Edvin Eriksson <edvin.erikson@leovegas.com>
2021-05-07 14:22:15 +02:00
Avi Deitcher
ceef6b1ca2 Merge pull request #3650 from deitch/alpine-hash
alpine carry its own hash
2021-05-06 13:11:41 -04:00
Avi Deitcher
a571a5ac21 Merge pull request #3658 from deitch/multiple-build-push
Build or push multiple packages at once
2021-05-06 12:40:23 -04:00
Avi Deitcher
31ed260e4a Build or push multiple packages at once
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-05-05 16:52:27 -04:00
Rolf Neugebauer
be2813f51f Merge pull request #3654 from rn/kern-up
Update kernels
2021-05-03 23:45:16 +01:00
Rolf Neugebauer
be98caafb9 Update test to latest stable kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 22:09:08 +01:00
Rolf Neugebauer
031e130c8c Update default kernel to 5.10.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 22:06:31 +01:00
Rolf Neugebauer
f98a4160e4 tests: Update kernel tests to use latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 18:18:24 +01:00
Rolf Neugebauer
921af882e1 tests: Remove 4.19.x tests
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 18:17:04 +01:00
Rolf Neugebauer
c0f50012d2 kernel: Disable bcc
The build fails, see https://github.com/linuxkit/linuxkit/issues/3652

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 17:05:39 +00:00
Rolf Neugebauer
198f6222dd kernel: Update kernel config to new alpine tools
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 15:59:01 +00:00
Rolf Neugebauer
5167746df9 kernel: Add patches for 5.10.x/5.11.x
This fixes some compile issues with bcc.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 15:58:48 +00:00
Rolf Neugebauer
a87a666408 kernel: Pick python3 for bcc builds
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 14:20:24 +00:00
Rolf Neugebauer
2d92dc189c kernel: Add libelf-static to perf build
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 13:54:20 +00:00
Rolf Neugebauer
310811a6cb kernel: Update kernel build to latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 13:53:10 +00:00
Rolf Neugebauer
c6d2933b48 alpine: Add libelf-static for perf builds
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 13:51:41 +00:00
Rolf Neugebauer
c2de64a23a kernel: Build debug kernel for 5.10.x on x86
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 11:23:35 +01:00
Rolf Neugebauer
faa0450b14 kernel: Adjust perf and bcc builds
Build both only recent LTS and latest stable kernel

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 11:23:35 +01:00
Rolf Neugebauer
f3f9c56d60 kernel: Bump to 5.11.18/5.10.34/5.4.116
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 11:23:35 +01:00
Rolf Neugebauer
f9f85bd4b3 kernel: Remove older LTS kernels
- 5.4.x for amr64/s390x
- 4.19.x for x86

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-05-03 11:20:26 +01:00
Rolf Neugebauer
f3282724f5 Merge pull request #3648 from dave-tucker/skip-unsup
pkg_build: Allow skipping unsupported platforms
2021-05-02 20:19:23 +01:00
Avi Deitcher
1e99ba3dce alpine carry its own hash
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-05-02 19:44:39 +03:00
Dave Tucker
28f43e8121 docs: Document --skip-arches
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-05-02 17:31:33 +01:00
Dave Tucker
0320678133 build: Add --skip-platforms flag
This adds a --skip-platforms flag that can be used with
lkt pkg build to ignore any arch specified in build.yml

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-05-02 17:31:27 +01:00
Dave Tucker
54185c8a3f pkglib: Rename v1 to registry
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-05-02 17:30:59 +01:00
Dave Tucker
981fb7ff32 pkglib: Add missing comment to FullTag
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-05-02 17:30:53 +01:00
Dave Tucker
907dc5394b pkglib: Don't error on platform mismatch
This prevents override of the platform by the user.
lkt pkg build --platform=linux/amd64 pkg/bpftrace should
attempt to build that package for that arch even though
it is not in the build.yml

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-05-02 12:28:43 +01:00
Dave Tucker
b5429604b6 Merge pull request #3647 from dave-tucker/cache-packages
ci: Cache Package Builds
2021-05-02 10:21:42 +01:00
Dave Tucker
6334f0dde5 ci: Cache Package Builds
This commit adds the default linuxkit cache directory to the
GitHub Actions cache. This will ensure that we don't pull images
that already exist in the cache, or build them if we've already
done so. It should speed up CI.

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-05-01 18:06:37 +01:00
Avi Deitcher
58136486c6 Merge pull request #3646 from deitch/canonicalize-names
always use canonical names in the linuxkit cache
2021-04-30 16:55:48 +03:00
Dave Tucker
2acc1c013c Merge pull request #3610 from dave-tucker/Makefile
make: Fix for local builds outside of GOPATH
2021-04-30 13:20:04 +01:00
Avi Deitcher
9bb26e4c3a always use canonical names in the linuxkit cache
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-30 15:12:39 +03:00
Dave Tucker
93ada489f9 make: Fix for local builds outside of GOPATH
Go can be weird about tools having to run in a directory with
go.mod. This commit moves the linuxkit makefile to the same
directory as the code.

It also changes the semantics of the local-build target.
You can now use STATIC=0 for dynamic builds or PIE=1 to
use --buildmode=pie. The binaries we were producing in
local-static weren't actually static so I fixed that too

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-04-30 09:31:00 +01:00
Dave Tucker
a8797a5e0f Merge pull request #3645 from deitch/update-go-compile-deps
Update to proper go-compile hash
2021-04-30 09:11:34 +01:00
Avi Deitcher
f6d04977df Update to proper go-compile hash
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-30 02:01:55 +03:00
Avi Deitcher
2b95bf9e2f Merge pull request #3643 from deitch/compile-for-mac
pass linkmode=external only for Linux
2021-04-29 18:13:42 +03:00
Avi Deitcher
d091f90f81 pass linkmode=external only for Linux
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-29 16:52:44 +03:00
Avi Deitcher
ef5e3fe3fe Merge pull request #3635 from rn/maint
Add Alumni to MAINTAINERS and update Authors
2021-04-29 10:21:09 +03:00
Rolf Neugebauer
f37ae83839 Merge pull request #3638 from deitch/use-cache
handle image already in cache
2021-04-28 23:19:51 +01:00
Rolf Neugebauer
b7b83fc6d4 Merge pull request #3637 from deitch/go-compile-alt
Full update Alpine: base to 3.13, go to 1.16, mod=vendor support
2021-04-28 22:59:59 +01:00
Avi Deitcher
1fb7ff9af2 Update package tags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-28 14:18:47 +03:00
Avi Deitcher
9343616183 stick with original kernels and alpine for kernel module tests
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-28 09:13:19 +03:00
Avi Deitcher
00665e2b10 Update containerd test to match go modules off
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-28 09:13:19 +03:00
Avi Deitcher
d4d1eacdbc ensure statically built binaries when using pie
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-28 09:13:19 +03:00
Avi Deitcher
ef3e45ac02 pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-28 09:13:18 +03:00
Avi Deitcher
07ca23f8fe tests: Update tests cases to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-28 09:12:08 +03:00
Avi Deitcher
711720e0d5 Update use of test packages to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-28 09:12:07 +03:00
Avi Deitcher
911a0de14c handle image already in cache
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-28 09:09:09 +03:00
Avi Deitcher
4f603d0146 tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-27 19:53:17 +03:00
Avi Deitcher
8576579f60 Update use of tools to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-27 19:52:35 +03:00
Avi Deitcher
1270e27ba6 tools: Update to the latest linuxkit/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-27 19:14:22 +03:00
Avi Deitcher
95ce6386aa Update Alpine base to 3.13; go-compile rebuilt with mod=vendor option, go bumped to 1.16
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-27 17:38:22 +03:00
Rolf Neugebauer
a1b1325163 Update Authors
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-24 10:21:25 +01:00
Rolf Neugebauer
6977c94ef7 MAINTAINERS: Add Alumni section
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-24 10:20:32 +01:00
Rolf Neugebauer
b13b41b213 Merge pull request #3631 from thaJeztah/needs_more_daves
Add another Dave as maintainer
2021-04-23 22:49:52 +01:00
Rolf Neugebauer
182646c776 Merge pull request #3630 from deitch/doc-s390x-docker
docs to hold maintainer build platforms
2021-04-23 21:19:59 +01:00
Avi Deitcher
e4a58e0130 docs to hold maintainer build platforms
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-23 02:12:07 +03:00
Sebastiaan van Stijn
6c27d84f78 Bump docker to 20.10.6-dind
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2021-04-22 09:02:47 +02:00
Avi Deitcher
a82fff6377 Merge pull request #3612 from deitch/cross-build
cross build packages
2021-04-21 14:55:51 +03:00
Sebastiaan van Stijn
a63ff3c480 pkg/trim-after-delete: make docker socket path configurable
Docker Desktop proxies the docker socket at its default location
(/var/run/docker.sock), but allows connecting to the non-proxied
socket through /var/run/docker.sock.raw.

This patch allows the trim-after-delete utility to customize
the docker socket path, so that it can connect to the non-proxied
socket.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2021-04-21 13:11:12 +02:00
Avi Deitcher
c8ef7d0eb0 cross build packages
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-21 13:03:26 +03:00
Avi Deitcher
0dff43def5 Merge pull request #3629 from deitch/correct-name
use correct manifest name when pushing
2021-04-20 14:06:39 +03:00
Justin Cormack
65d37c428f Merge pull request #3625 from rn/kern-up
Update kernels
2021-04-20 09:57:16 +01:00
Avi Deitcher
74c7de7977 use correct manifest name when pushing
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-04-20 11:42:16 +03:00
Rolf Neugebauer
4001048426 tests: Update kernel config tests to latest package
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-19 21:58:51 +01:00
Rolf Neugebauer
c421b01b30 test: Adjust kernel config check
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-19 21:56:30 +01:00
Rolf Neugebauer
f146003b6e Update kernel to latest 5.4.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-18 21:07:45 +01:00
Rolf Neugebauer
b6883eed70 tests: Add kernel tests for 5.10.x and 5.11.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-18 21:06:04 +01:00
Rolf Neugebauer
3cb723fc58 tests: remove tests for 4.14.x and 5.6.x kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-18 21:01:12 +01:00
Frédéric Dalleau
38869459ab Add support for building the arm64 kernel on MacBook M1
On these machines, the output of `uname -m` is arm64.

Signed-off-by: Frédéric Dalleau <frederic.dalleau@docker.com>
2021-04-18 18:03:12 +01:00
Rolf Neugebauer
602a6c3ff5 kernel: Bump wirebuard to v1.0.20210219
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-18 18:03:12 +01:00
Rolf Neugebauer
86252f10ca kernel: Add 5.11.x kernel
The config file is derived from the 5.10.x kernel.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-17 20:13:41 +00:00
Rolf Neugebauer
2197d6670b kernel: Add 5.10.x
The kernel config is derived from 5.6.x by running it through
make oldconfig.

For x86_64 changed manually:
- CONFIG_VIRTIO_MEM=m -> y
- CONFIG_PLDMFW=y -> not set

For aarch64 changed manually:
- CONFIG_SMSC_PHY=m -> not set
- CONFIG_PLDMFW=y -> not set

No adjustment to s390x config

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-17 15:24:40 +01:00
Rolf Neugebauer
ad4aec4965 kernel: Bump 5.4.113/4.19.188
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-17 12:16:15 +01:00
Rolf Neugebauer
24bd2f64d7 kernel: Remove support for 5.6.x kernels
5.6.x was EOLed

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-17 11:23:11 +01:00
Rolf Neugebauer
7b012919b3 kernel: Remove support for 4.14.x kernels
With 4.19.x and 5.4.x we already carry several
LTS kernels.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-17 11:17:51 +01:00
Dave Tucker
60919fee96 Merge pull request #3619 from rn/rtf-up
build: Bump rtf to latest
2021-04-06 14:11:38 +01:00
Rolf Neugebauer
e48d5294ee Merge pull request #3539 from djs55/trim-after-delete-container
trim-after-delete: handle containers and volumes as well as images
2021-04-05 13:21:02 +01:00
Rolf Neugebauer
2d6290199b Merge pull request #3615 from linuxkit/no-go-get
README: Don't go get
2021-04-05 12:45:16 +01:00
Rolf Neugebauer
a24c51e43c build: Bump rtf to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-05 11:19:42 +01:00
Rolf Neugebauer
e362dc6100 Merge pull request #3617 from rn/ci-cross
ci: Enable linuxkit cross compile
2021-04-05 10:13:50 +01:00
Rolf Neugebauer
ffe5dedb0a ci: Fix multi-arch builds
- Introduce separate os/arch to the matrix
- Pass os/arch to the local build
- Switch to upload-artifact@v0 and cache@v2
- Fetch linuxkit binary from artefacts rather than using cache
- Add some debug (print file and hashes)

While at it, add some debug for the generated artefacts.

fixes https://github.com/linuxkit/linuxkit/issues/3522

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-04 10:46:07 +01:00
Dave Tucker
4e03ccc66f README: Don't go get
`go get -u` will try to update modules dependencies
`go get` (no `-u`) incorrectly resolves dependencies
we should instead advise users to `go install`

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-04-03 11:30:09 +01:00
Rolf Neugebauer
e02ccb6008 Merge pull request #3616 from rn/gomod
Fix go-compile for go.mod
2021-04-03 11:16:58 +01:00
Rolf Neugebauer
c7e753eb16 build: Update go-compile package
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-02 18:45:38 +01:00
Rolf Neugebauer
765e5f0b88 gp-compile: Use '-mod=vendor' when using go modules
fixes https://github.com/linuxkit/linuxkit/issues/3599

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2021-04-02 18:45:38 +01:00
Rolf Neugebauer
4542998629 Merge pull request #3606 from qarnot/up-intel-microcode-20210216
Bump Intel microcode version to 20210216
2021-04-02 18:08:19 +01:00
Rolf Neugebauer
48accd6ebe Merge pull request #3609 from dave-tucker/rm-notary
Remove Notary and Content Trust
2021-04-02 14:23:24 +01:00
Dave Tucker
561ce6f4be Remove Notary and Content Trust
This commit removes Notary and Content Trust.
Notary v1 is due to be replaced with Notary v2 soon.
There is no clean migration path from one to the other.
For now, this removes all signing from LinuxKit.
We will look to add this back once a new Notary alternative
becomes available.

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2021-03-30 14:51:11 +01:00
Yoann Ricordel
4e31b87da0 Bump Intel microcode version to 20210216
Signed-off-by: Yoann Ricordel <yoann.ricordel@qarnot-computing.com>
2021-03-08 15:07:22 +01:00
Avi Deitcher
1f93eab506 Merge pull request #3600 from deitch/build-target
build images to cache with buildx
2021-02-15 19:57:56 +02:00
Avi Deitcher
9633d23d37 write to cache
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-02-12 16:18:21 +02:00
Sebastiaan van Stijn
dd4aa47c02 Add another Dave as maintainer
Dave Scott works on the Docker Desktop team, and maintains
LinuxKit changes internally for that. I think Dave would
make a good addition to the list of maintainers to help
out. :)

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2021-02-12 12:51:18 +01:00
Avi Deitcher
4cdf6bc56d Merge pull request #3593 from the-maldridge/metaldata
Support metaldata metadata provider
2021-01-22 10:43:08 +02:00
Michael Aldridge
b820b0a129 Support metaldata metadata provider
Signed-off-by: Michael Aldridge <aldridge.mac@gmail.com>
2021-01-21 23:03:49 -08:00
Rolf Neugebauer
5005e05b3c Merge pull request #3595 from deitch/gomodules-docs
update docs
2021-01-19 20:32:37 +00:00
Avi Deitcher
4e23d08a8c update docs
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-01-19 09:55:16 +02:00
Avi Deitcher
80c4edd5c5 Merge pull request #3594 from deitch/gomodules
switch to go modules
2021-01-19 09:46:51 +02:00
Avi Deitcher
f8f214110b switch to go modules
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-01-18 20:46:52 +02:00
Avi Deitcher
1b8e6c586b Merge pull request #3588 from giggsoff/strip-containerd
strip containerd binaries
2021-01-18 18:09:45 +02:00
Petr Fedchenkov
301e7ef13e update to linuxkit/containerd:1ae8f054e9fe792d1dbdb9a65f1b5e14491cb106
Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2021-01-18 16:54:37 +03:00
Petr Fedchenkov
564a4ece26 strip containerd binaries
Signed-off-by: Petr Fedchenkov <giggsoff@gmail.com>
2021-01-06 19:04:49 +03:00
Avi Deitcher
1ec1768d18 Merge pull request #3589 from deitch/fix-ineffassign
provide wildcards to ineffassign
2021-01-06 18:00:26 +02:00
Avi Deitcher
933738a177 provide wildcards to ineffassign
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2021-01-06 15:13:54 +02:00
Avi Deitcher
ec80e6cf07 Merge pull request #3573 from deitch/dockerless
pull and cache images locally without docker
2020-12-30 20:02:49 +02:00
Avi Deitcher
0b7502f130 pull and cache images locally without docker
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-12-30 18:27:02 +02:00
Rolf Neugebauer
c1b02ee4f0 Merge pull request #3583 from deitch/lib-manifest-tool
Replace copied code with manifest-tool library
2020-12-23 11:20:52 +00:00
Rolf Neugebauer
80d4abaf44 Merge pull request #3584 from alex1989hu/contrib/add-control-plane-toleration
contrib: add control-plane toleration for open-vm-tools
2020-12-23 11:16:57 +00:00
Alex Szakaly
0cf34953ff contrib: add control-plane toleration for open-vm-tools
From Kubernetes v1.20.0 Release notes:
The label applied to control-plane nodes "node-role.kubernetes.io/master"
is now deprecated and will be removed in a future release after a GA
deprecation period.

Introduce a new label "node-role.kubernetes.io/control-plane" that will
be applied in parallel to "node-role.kubernetes.io/master" until the
removal of the "node-role.kubernetes.io/master" label.

xref: https://kubernetes.io/docs/setup/release/notes/#no-really-you-must-read-this-before-you-upgrade

Signed-off-by: Alex Szakaly <alex.szakaly@gmail.com>
2020-12-22 22:25:58 +01:00
Avi Deitcher
a37c0f48e1 Replace copied code with manifest-tool library
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-12-18 08:25:08 +02:00
Rolf Neugebauer
a13ff6bc45 Merge pull request #3582 from Clovel/fix/prefixMakefile
Removed extraneous "/" at end of PREFIX in Makefile
2020-12-15 22:57:47 +00:00
Clovis Durand
5b9458f33e Removed extraneous "/" at end of PREFIX in Makefile
Signed-off-by: Clovis Durand <cd.clovel19@gmail.com>
2020-12-08 13:36:04 +01:00
Justin Cormack
a57ebdd8ef Merge pull request #3581 from deitch/lint
fix lint issue
2020-12-07 17:34:45 +00:00
Avi Deitcher
4ceaf86416 fix lint issue
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-12-07 18:04:57 +02:00
Justin Cormack
ffea2a2807 Merge pull request #3575 from deitch/bump-manifest-list
bump manifest-tool to latest
2020-11-27 09:09:59 +00:00
Avi Deitcher
9fe09dbba8 bump manifest-list to latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-11-27 01:13:13 +02:00
Justin Cormack
0af595e49b Merge pull request #3577 from justincormack/darwin-arm64
Update containerd vendor
2020-11-26 19:09:14 +00:00
Justin Cormack
c9a38e135f Merge pull request #3576 from justincormack/nginx-up
Update nginx image in example
2020-11-26 17:36:36 +00:00
Justin Cormack
3937cc6619 Update containerd vendor
This fixes arm64 mac

Signed-off-by: Justin Cormack <justin@specialbusservice.com>
2020-11-26 17:06:02 +00:00
Justin Cormack
b14ddef1a0 Update nginx image in example
The original one is not supported on arm64

Signed-off-by: Justin Cormack <justin@specialbusservice.com>
2020-11-25 21:58:50 +00:00
Justin Cormack
7f479817ab Merge pull request #3574 from deitch/fix-set-env
fix deprecation of set-env
2020-11-24 16:27:08 +00:00
Avi Deitcher
bc06558e26 fix deprecation of set-env
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-11-24 15:36:36 +02:00
Justin Cormack
ad809fa3b6 Merge pull request #3570 from deitch/doc-signing
describe how to sign tags manually
2020-11-12 14:30:28 +00:00
Avi Deitcher
34373e3b52 describe how to sign tags manually
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-11-12 14:40:36 +02:00
Avi Deitcher
fe2ca14452 Merge pull request #3564 from deitch/containerd-opts
multiple containerd options
2020-11-01 11:00:14 +02:00
Avi Deitcher
863e8c77b7 update sha hashes for pkg/init
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-10-21 11:13:52 +03:00
Avi Deitcher
203cbd9b9f multiple containerd options
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-10-21 11:11:48 +03:00
Avi Deitcher
9f1825f2f6 Merge pull request #3563 from deitch/fix-equals-error
Fix equals error
2020-10-20 09:25:29 +03:00
Avi Deitcher
279ee46f39 update hashes for pkg/init
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-10-19 20:54:16 +03:00
Avi Deitcher
54be4048f0 fix reversed equals error
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-10-19 20:54:14 +03:00
Avi Deitcher
f0b002718d Merge pull request #3559 from deitch/containerd-opts
add support for containerd args
2020-10-19 16:27:53 +03:00
Avi Deitcher
eae1c2461a update hashes for containerd opts
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-10-19 14:49:40 +03:00
Avi Deitcher
865ed8a1ce add containerd cli opts
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-10-19 14:49:15 +03:00
David Scott
18669576cc trim-after-delete: update examples to use new image
Signed-off-by: David Scott <dave@recoil.org>
2020-10-16 16:59:15 +01:00
David Scott
76c7f6c1a6 trim-after-delete: also handle containers and volumes
We already run the command after an image delete but

- a container delete
- a volume delete

will also free space on the filesystem.

Co-authored-by: Sebastiaan van Stijn <github@gone.nl>
Signed-off-by: David Scott <dave@recoil.org>
2020-10-16 16:56:53 +01:00
Avi Deitcher
a1427d0b7b Merge pull request #3558 from deitch/containerd-141
containerd 1.4.1 from latest version of lkt/alpine
2020-10-08 10:39:44 +03:00
Avi Deitcher
e305e52b41 Merge pull request #3557 from deitch/openssh-client
include openssh-client in sshd pkg
2020-10-08 10:39:25 +03:00
Avi Deitcher
3143c04de9 containerd 1.4.1 from latest version of lkt/alpine
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-10-07 20:33:08 +03:00
Avi Deitcher
26d46d6c82 include openssh-client in sshd pkg
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-10-07 20:15:28 +03:00
Avi Deitcher
1daec53ccc Merge pull request #3556 from deitch/openssh-client
bump alpine version, add openssh-client, wireguard apk, containerd 1.4.1
2020-10-07 18:54:12 +03:00
Avi Deitcher
fd45bc2ead bump alpine version, add openssh-client, wireguard apk, containerd 1.4.1
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-10-07 16:08:15 +03:00
Rolf Neugebauer
bc7205900c Merge pull request #3550 from alex1989hu/contrib/update-open-vm-tools-tolerations
contrib: extend list of tolerations for open-vm-tools
2020-09-12 10:43:51 +01:00
Alex Szakaly
de017f652e contrib: extend list of tolerations for open-vm-tools
Keep previous toleration to being backward compatible

Fixes #3549

Signed-off-by: Alex Szakaly <alex.szakaly@gmail.com>
2020-09-11 08:41:26 +02:00
Rolf Neugebauer
a2869a3546 Merge pull request #3541 from rn/post-v0.8
Post v0.8 cleanup
2020-07-27 13:01:49 +01:00
Rolf Neugebauer
015948148a Update Changelog to what was posted on release page
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-07-27 09:06:43 +01:00
Rolf Neugebauer
235412bc4f Bump version to v0.8+
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-07-27 09:06:43 +01:00
Avi Deitcher
612d46e23a Merge pull request #3540 from Kdockerfiles/pkg_build_fix
Make `pkg build` build the image
2020-07-26 14:35:58 +03:00
Karol Woźniak
9d2e7e9281 Make pkg build build the image
Signed-off-by: Karol Woźniak <wozniakk@gmail.com>
2020-07-24 22:34:11 +02:00
Avi Deitcher
00b9bb56a0 Merge pull request #3532 from deitch/split-push-sign
options to split image steps and manifest steps
2020-06-10 11:13:01 +03:00
Avi Deitcher
ea18be414e options to split image steps and manifest steps
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-05-24 16:23:46 +03:00
Justin Cormack
9d5a22d44a Merge pull request #3511 from deitch/append-binds
support merge yaml flags
2020-05-18 20:18:00 +01:00
Avi Deitcher
bcd36a4661 support merge yaml flags
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-05-18 17:41:36 +03:00
Rolf Neugebauer
319005e849 Merge pull request #3521 from rn/rel_v0.8
Release packages as v0.8
2020-05-11 21:41:23 +01:00
Rolf Neugebauer
2884ed1996 Update CHANGELOG
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-10 17:35:41 +01:00
Rolf Neugebauer
b1fbe40712 tool: Bump version to v0.8
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-10 16:04:52 +01:00
Rolf Neugebauer
0331aacfe2 Update package tags to v0.8
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-10 16:04:52 +01:00
Rolf Neugebauer
ea8ecd146d pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-10 14:52:05 +01:00
Rolf Neugebauer
58434279cb Merge pull request #3520 from rn/kern-up
Update kernels, re-enable -perf, disable -rt kernels, bump wireguard
2020-05-09 19:30:38 +01:00
Justin Cormack
3ae7fb4e25 Merge pull request #3519 from rn/authors
Update AUTHORS
2020-05-09 17:16:08 +01:00
Rolf Neugebauer
13dd8a7e9e Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-09 11:57:08 +01:00
Rolf Neugebauer
a9516a346c kernel: Vump wireguard to 1.0.20200506
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-09 11:57:07 +01:00
Rolf Neugebauer
2959fc52c5 kernel: Re-enable perf build
resolves #3498

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-09 11:57:07 +01:00
Rolf Neugebauer
f3a0d1c4d8 kernel: Fix perf build
- add static zlib
- add python

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-09 11:57:07 +01:00
Rolf Neugebauer
6a92e2292b kernel: Adjust config files
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-09 11:57:07 +01:00
Rolf Neugebauer
c1f4c392cc kernel: Disable -rt kernel temporarily
The patch we carry for 5.4 and 5.6 does not apply to
5.4.28. Disable the -rt kernel until the version has
been bumped.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-09 11:57:07 +01:00
Rolf Neugebauer
019b4274ea kernel: Update to 5.6.11/5.4.39/4.19.121/4.14.179
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-09 11:57:07 +01:00
Rolf Neugebauer
26f1c75950 test: Update kernel tests to latest alpine base
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-09 11:57:07 +01:00
Rolf Neugebauer
1c5e799782 kernel: Update kernel build to latest alpine base
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-09 11:57:07 +01:00
Rolf Neugebauer
2914fadc47 Update AUTHORS
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-05-08 12:44:42 +01:00
Rolf Neugebauer
47063eee62 Merge pull request #3512 from saljam/master
metadata: add support for digitalocean
2020-05-08 11:53:50 +01:00
Rolf Neugebauer
38b1ee8ff5 Merge pull request #3514 from Kdockerfiles/scw_update
Update, fix (and extend a bit) Scaleway support
2020-05-08 11:48:06 +01:00
Rolf Neugebauer
5bab073bbf Merge pull request #3518 from justincormack/smaller-qemu
Smaller qemu
2020-05-07 23:36:37 +01:00
Justin Cormack
c63ec77e3f Update binfmt package
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2020-05-07 11:58:44 +01:00
Justin Cormack
c01f72d556 Add Risc-V support and only ship binaries we use
Ported from https://github.com/docker/binfmt/pull/21

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2020-05-07 11:53:30 +01:00
Rolf Neugebauer
dbcf2611a0 Merge pull request #3515 from justincormack/qemu-up
Update to Qemu 4.2.0 from Debian testing
2020-05-06 23:27:53 +01:00
Justin Cormack
3887a281b2 Update packages
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2020-05-06 20:03:50 +01:00
Avi Deitcher
c29056aa7a Merge pull request #3516 from errordeveloper/mount-sys-fs-bpf
pkg/init: Mount /sys/fs/bpf
2020-05-06 14:32:01 +03:00
Ilya Dmitrichenko
86fb6ba0aa pkg/init: Mount /sys/fs/bpf
NOTE: This will be a shared mount, due to root being turned into a
shared with `MC_REC` set: `mount("", "/", "", rec|shared, "")`.
For some reason setting `shared` when mounting `/sys/fs/bpf` doesn't
work at all, perhaps that's just a kernel feature.

Signed-off-by: Ilya Dmitrichenko <errordeveloper@gmail.com>
2020-05-06 11:06:54 +01:00
Justin Cormack
d2f55af35c Update to Qemu 4.2.0 from Debian testing
This has fixed a lot of outstanding emulation issues, see comments
in https://github.com/docker/binfmt/pull/24

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2020-05-04 16:22:52 +01:00
salman aljammaz
35ae4e028c metadata: add support for digitalocean
This adds support for fetching metadata and user data from the
DigitalOcean metadata service.

https://www.digitalocean.com/docs/droplets/resources/metadata/

Signed-off-by: salman aljammaz <s@aljmz.com>
2020-05-02 11:24:11 -04:00
Avi Deitcher
39aafb21d0 Merge pull request #3509 from deitch/cidata
find cloud-init on cdrom by label
2020-05-01 17:50:37 +03:00
Karol Woźniak
d861987b79 scaleway: Fix bugs and add option for changing image size
* Fix using ams1 as zone
* Allow specifying image size (+ calculate default from ISO size)
* Fix mangling logs when asking for ssh passphrase
* Some minor code and docs cleanups

Signed-off-by: Karol Woźniak <wozniakk@gmail.com>
2020-05-01 01:15:24 +02:00
Karol Woźniak
c750f54cb0 Update scaleway-sdk-go to v1.0.0-beta.6
Signed-off-by: Karol Woźniak <wozniakk@gmail.com>
2020-05-01 01:15:24 +02:00
Avi Deitcher
3678adeca8 find cloud-init on cdrom by label
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-04-27 17:00:42 +03:00
Rolf Neugebauer
0b488d805e Merge pull request #3513 from rn/ctr-134
Update containerd to v1.3.4
2020-04-27 09:08:25 +01:00
Rolf Neugebauer
6643090752 Update YAMLs to latest containerd/runc/init
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-26 23:52:57 +01:00
Rolf Neugebauer
76d0ed84be tests: Update containerd test to v1.3.4
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-26 23:21:30 +01:00
Rolf Neugebauer
2427145dfc pkg/init: Revert "workaround bad containerd bug"
This reverts commit 6653c3387e.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-26 22:49:48 +01:00
Rolf Neugebauer
1b8cb8b235 pkg/runc: Update to v1.0.0-rc10
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-26 22:47:48 +01:00
Rolf Neugebauer
db1f9c8dc8 pkgs" Update containerd to v1.3.4
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-26 22:47:48 +01:00
Rolf Neugebauer
1c4a4060f1 tools/alpine: Update package
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-26 17:38:54 -04:00
Rolf Neugebauer
bec1041534 tools/alpine: Update containerd to v1.3.4
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-26 18:18:32 +01:00
Rolf Neugebauer
bd336ef94d tools/alpine: Add zlib-static
Needed for kernel perf builds

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-26 18:15:05 +01:00
Rolf Neugebauer
3e12a52a06 Merge pull request #3493 from deitch/native-manifest
Native manifest
2020-04-26 13:31:06 +01:00
Avi Deitcher
afcb0f8abe use manifest-tool as library instead of cmd exec
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-04-26 14:09:12 +03:00
Avi Deitcher
6d1ffc9118 Merge pull request #3508 from federico-pellegatta/extend-pkg-gpt-support
Add GUID Partition Table (GPT) support to `extend` and `mount` packages
2020-04-24 16:16:50 +03:00
Federico Pellegatta
6133c561fd Add GUID Partition Table (GPT) support to extend and mount packages
Signed-off-by: Federico Pellegatta <12744504+federico-pellegatta@users.noreply.github.com>
2020-04-24 12:54:48 +02:00
Avi Deitcher
966cf121a3 Merge pull request #3504 from federico-pellegatta/format-pkg-gpt-support
Add GUID Partition Table (GPT) support to the `format` package
2020-04-23 13:48:25 +03:00
Federico Pellegatta
5fc196c289 Add partition table type selector (defaulted to DOS/MBR) to format package
Signed-off-by: Federico Pellegatta <12744504+federico-pellegatta@users.noreply.github.com>
2020-04-23 10:16:36 +02:00
Rolf Neugebauer
cab95cfc51 Merge pull request #3503 from deitch/metadata-cdrom-cloudinit
read cdrom userdata from spec location
2020-04-20 12:34:51 +01:00
Avi Deitcher
84bfea53b0 Add examples
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-04-20 11:51:31 +03:00
Avi Deitcher
59697ffc62 read cdrom userdata from spec location
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-04-20 10:03:17 +03:00
Rolf Neugebauer
d4c135dbb6 Merge pull request #3502 from deitch/go-1.13
match go version in CI to version in go-compile
2020-04-19 11:47:10 +01:00
Avi Deitcher
fbe9b98d4d match go version in CI to version in go-compile
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-04-19 11:22:32 +03:00
Rolf Neugebauer
a44ea341ca Merge pull request #3500 from rn/alpine_3.11
Update to Alpine 3.11
2020-04-18 12:45:05 +01:00
Rolf Neugebauer
4c0d156042 test: Increase disk size for dm-crypt LUKS test
Otherwise it fails with:

+ cryptsetup --key-file /etc/dm-crypt/key --cipher aes-cbc-essiv:sha256 luksFormat /dev/sda
+ cryptsetup --key-file /etc/dm-crypt/key luksOpen /dev/sda it_is_encrypted
Requested offset is beyond real size of device /dev/sda.
dm-crypt test suite FAILED

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-18 10:54:47 +01:00
Rolf Neugebauer
8278b7311d tool: Revert linuxkit/mkimage-gcp
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 22:45:30 +01:00
Rolf Neugebauer
0f844541cb Revert "Removed size arg from GCP make-fs command."
This reverts commit 1653e9dffb.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 22:40:21 +01:00
Rolf Neugebauer
8f480cc578 kernel/bcc: Disbale -Werror for elfutils buils
with the new C tool chain elfutils fails with with warnings:

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
169f031ce9 kernel: Disable perf build for now.
See: https://github.com/linuxkit/linuxkit/issues/3498

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
ea750c8b7b kernel: Only build bcc/perf on x86 and latest stable and LTS
This was previously build for 5.4 and 4.19. Latest LTS is 5.4 and
latest stable is 5.6. Also skip s390x build for perf

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
0dd1283dec kernel: add findutils to perf build and make it more verbose
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
72fe47557f kernel: Switch -dbg kernel to default 5.4.x kernel
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
db36750deb kernel: Adjust configs to new compiler
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
dbb76cf4d4 kernel: Update kernel builds to latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
ce89479b2d Update use of packages to the latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
463216acda pkg: Add gcc for all packages build for arm64
This is a workaround for https://github.com/linuxkit/linuxkit/issues/3496

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
25d5ba8ef8 Update linuxkit/go-compile to the latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
3eb9a75f9e tools/go-compile: Workaround for go requiring gcc on arm64
See: https://github.com/linuxkit/linuxkit/issues/3496

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
8a03a04454 Bump dind to 19.03.8-dind
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
5301dbf352 pkg/firmware: Disable firmware packages for s390x
Reduce the number of packages to build for s390x. Firmware
is only used for physical devices, so disable it for s390x
where we mostly run in virtual machines.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
cd92ad3f16 pkg/firmware: Fix firmware extraction
Some drivers offer mutliple firmwares with the WHENCE file
defining the default. Use the cope-firmware.sh script to
create a copy of the firmware repository with the defaults
copied in to the right place.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
384b439d05 pkg/firmware: Use kernel v5.4.x as the base
this determines which firmware packages are included.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
bd5fb29ba1 pkg/firmware: update to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
0b750af7cd pkg/node_exporter: Fix build
Add curla and gcc

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
facc612603 pkg/node_exporter: Bump to v0.18.1
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
5c190c96e1 pkg/cadvisor: Bump to v0.36.0
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
2f4034d36c pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
6ae22d1754 tests: Update tests cases to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
678e904ae3 Update all uses of alpine:3.9 to alpine:3.11
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
336f7b44d3 Update use of test packages to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
21852ee16b tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
5d2f1ccbd0 Update use of tools to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
45dcbc38af tools: Update to the latest linuxkit/alpine
with the exception of grub. It does not compile
with the latest version, see: https://github.com/linuxkit/linuxkit/issues/3494

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
2817cdac7c alpine: Update packages
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
2ad6a61079 alpine: Bump containerd to v1.3.3
Note this release has the workaround for the disabling tests.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
2320529f3d alpine/go-compile: Fix go-compile
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
2e0e0fb5e7 alpine: Bump base to 3.11
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-17 10:36:03 +01:00
Rolf Neugebauer
3716b312f6 Merge pull request #3484 from deitch/eliminate-jq
eliminate manifest-push-script, jq dependency, odd logic
2020-04-11 19:15:40 +01:00
Rolf Neugebauer
b1c344828e Merge pull request #3492 from rn/kern-up
Update kernel to 5.4.30/4.19.114/4.14.175 and add 5.6.2
2020-04-11 19:05:42 +01:00
Rolf Neugebauer
673303575d test: Add kernel tests for 5.6.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-10 18:13:03 +01:00
Rolf Neugebauer
1e768f56eb Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-10 18:06:58 +01:00
Rolf Neugebauer
57d5ab8fdf kernel: Tweak s390x config
For some reason, the 'make ARCH=s390 oldconfig' yields
a different config when executing on a real s390c system...

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-10 15:56:20 +01:00
Rolf Neugebauer
0bfaa3becc kernel: Don't install libunwind-dev on s390x
This is a part revert of f49042545e ("libunwind-dev
workaround on x86 is no longer required")

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-10 15:12:15 +01:00
Rolf Neugebauer
42c51fab2b kernel: Use in kernel WireGuard if present
5.6.x has WireGuard upstream. Skip pulling it for kernel
where WireGuard is present.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-10 12:15:25 +01:00
Rolf Neugebauer
e208e3050c kernel: Add v5.6.x kernels
The config is based on 5.4.x and has WireGaurd enabled
manually as a module afterwards.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-10 12:15:25 +01:00
Rolf Neugebauer
51f833aa51 kernel: Update to 5.4.30/4.19.114/4.14.175
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-10 10:28:13 +01:00
Rolf Neugebauer
46f96c5572 kernel: Remove 4.19.x-rt patches and configs
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-04-10 10:19:15 +01:00
Rolf Neugebauer
f98fa5ca41 Merge pull request #3491 from TiejunChina/master-dev
enable rt for 5.4.x
2020-04-09 23:34:21 +01:00
Rolf Neugebauer
447e5fa27c Merge pull request #3487 from TiejunChina/master-dev
update -rt to 4.19.106-rt46
2020-04-09 09:09:35 +01:00
Tiejun Chen
6f40ada81c enable rt for 5.4.x
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2020-04-08 20:18:14 -07:00
Tiejun Chen
98ffcd7b43 update rt example file for 4.19.106-rt
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2020-04-06 11:12:46 -07:00
Rolf Neugebauer
172b04ff67 Merge pull request #3489 from rvs/kernel
libunwind-dev workaround on x86 is no longer required
2020-04-05 14:01:05 +01:00
Roman Shaposhnik
f49042545e libunwind-dev workaround on x86 is no longer required
Signed-off-by: Roman Shaposhnik <rvs@zededa.com>
2020-04-04 14:20:04 -07:00
Rolf Neugebauer
49b62442cb Merge pull request #3488 from zx2c4-forks/jd/longoverduebump
wireguard: bump to 1.0.20200401
2020-04-04 10:46:55 +01:00
Jason A. Donenfeld
3993486b6f wireguard: bump to 1.0.20200401
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2020-04-03 23:48:22 -06:00
Tiejun Chen
a3afa91d9a update -rt to 4.19.106-rt46
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2020-04-03 12:05:02 -07:00
Avi Deitcher
8a81fd0ffc eliminate manifest-push-script, jq dependency, odd logic
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-03-30 11:26:52 +03:00
Avi Deitcher
87f2e75424 Merge pull request #3482 from deitch/handle-containerd-bug
workaround bad containerd bug
2020-03-29 17:46:30 +03:00
Rolf Neugebauer
b32eb2afd9 Merge pull request #3483 from rn/kern-up
Update kernels to 5.4.28/4.19.113/4.14.174 and switch to 5.4.x as default
2020-03-29 00:20:03 +00:00
Rolf Neugebauer
ac94cdc5ec Update dm-crypt/losetup tests/examples to 5.4.x kernel
For some reason these were still using the old 4.14.x kernels.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-03-28 20:29:56 +00:00
Rolf Neugebauer
dfc605d703 Update kernel test YAMLs to the latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-03-28 12:01:50 +00:00
Rolf Neugebauer
6938fe5aa8 Update default kernel to 5.4.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-03-28 11:58:57 +00:00
Rolf Neugebauer
f58d487072 kernel: Adjust kernel config files
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-03-27 17:52:08 +00:00
Rolf Neugebauer
920a2e98cb kernel: Update to 5.4.28/4.19.113/4.14.174
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-03-27 17:41:58 +00:00
Rolf Neugebauer
5c336a9ae7 kernel: Remove 4.19.x for arm64 and s390x
A subsequent commit will make the 5.4 kernel the default.

This is primarily to reduce the number of kernels we need
to compile for every upgrade.

Note, we keep the 4.19 config file for arm64 around since the
-rt kernel config needs it.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-03-27 17:41:58 +00:00
Avi Deitcher
7c1df34c38 update hashes
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-03-24 12:13:41 +02:00
Avi Deitcher
6653c3387e workaround bad containerd bug
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2020-03-23 12:18:14 +02:00
Rolf Neugebauer
07f1bae9ce Merge pull request #3479 from guillaumerose/vendoring
Upgrade vpnkit vendoring
2020-03-14 19:25:58 +01:00
Guillaume Rose
57bf9f39de Upgrade vpnkit vendoring
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2020-03-11 14:03:45 +01:00
Rolf Neugebauer
badd791072 Merge pull request #3463 from alex1989hu/feat/add-kubernetes-deployment-open-vm-tools
contrib: Add kubernetes manifest for open-vm-tools
2020-03-07 12:34:53 +01:00
Alex Szakaly
adc649d022 contrib: Add kubernetes manifest for open-vm-tools
This should allow end-users to gracefully reboot or shutdown Kubernetes
nodes (incuding control planes) running on vSphere Hypervisor

There are several use cases when cluster administrators are not able to
install extra packages onto the host OS

Fixes #3462

Signed-off-by: Alex Szakaly <alex.szakaly@gmail.com>
2020-03-04 22:42:42 +01:00
Rolf Neugebauer
a2617fbd39 Merge pull request #3471 from arthurlogilab/patch-1
[README] deprecated infrakit
2020-02-26 00:29:21 +01:00
Arthur Lutz
17619c39d5 [README] deprecated infrakit
deploykit archived in 2018 (review)

Signed-off-by: Arthur Lutz <arthur.lutz@logilab.fr>
2020-02-25 12:20:26 +01:00
Rolf Neugebauer
7b057f503b Merge pull request #3475 from rn/kern-up
Update kernels to 4.14.171/4.19.104/5.4.19
2020-02-21 09:35:35 +01:00
Rolf Neugebauer
03701f44bd Merge pull request #3476 from eon01/fix-aws-howto
add SG to linuxkit run command
2020-02-18 21:59:22 +01:00
Aymen EL AMRI
a7a42e986d add SG to linuxkit run command
Signed-off-by: Aymen EL AMRI <aymen@eralabs.io>
2020-02-17 13:41:09 +01:00
Rolf Neugebauer
7fc0d8a8b2 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-02-15 18:11:03 +00:00
Rolf Neugebauer
66ccad84a6 kernel: Update config files
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-02-14 23:16:02 +00:00
Rolf Neugebauer
25b09592b9 kernel: Update to 5.4.19/4.19.104/5.4.19
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-02-14 22:54:16 +00:00
Rolf Neugebauer
17359f2ed1 Merge pull request #3469 from rn/kern-up
Update kernel to 4.14.168/4.19.99/5.4.9
2020-01-30 19:57:10 +00:00
Rolf Neugebauer
57034d8a49 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-30 09:11:32 +00:00
Rolf Neugebauer
96cfc0919e kernel: Adjust 5.4.x kernel config file
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-30 09:11:32 +00:00
Rolf Neugebauer
7438dcaf08 kernel: Update to 4.14.168/4.19.99/5.4.9
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-30 09:11:32 +00:00
Rolf Neugebauer
c6164a4ca5 kernel: Remove support for v5.3.x kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-30 09:11:32 +00:00
Rolf Neugebauer
4a06b88d1e kernel: Remove support for 4.9.x kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-30 09:11:32 +00:00
Rolf Neugebauer
f06c39545a Merge pull request #3466 from justincormack/nocircle
Remove circleCI
2020-01-27 22:17:52 +00:00
Justin Cormack
2012f4a3a4 Merge pull request #3465 from rvs/eve
Updating pointer to EVE
2020-01-27 22:12:05 +00:00
Justin Cormack
6ebeabc061 Remove circleCI
Using GitHub actions now.

Signed-off-by: Justin Cormack <justin@specialbusservice.com>
2020-01-27 20:59:36 +00:00
Roman Shaposhnik
d07dd2c28c Updating pointer to EVE
Signed-off-by: Roman Shaposhnik <rvs@zededa.com>
2020-01-27 12:02:05 -08:00
Rolf Neugebauer
1e85ff1050 Merge pull request #3458 from rn/ctr-132
Bump containerd to v1.3.2 and runc to v1.0.0-rc9
2020-01-22 10:42:33 +00:00
Rolf Neugebauer
d1c8eae6a9 Update YAMLs to latest init/containerd/runc packages
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-21 23:17:17 +00:00
Rolf Neugebauer
b5aca63ffc tests: Increase memory for containerd tests to 3GB
It ran out of space with 2GB

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-21 23:17:17 +00:00
Rolf Neugebauer
d9671ee29f tests: Disable containerd devmapper tests
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-21 23:17:17 +00:00
Rolf Neugebauer
7bcd19058b pkg/runc: Update to v1.0.0-rc9
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-21 23:17:17 +00:00
Rolf Neugebauer
11d9acf35b pkg/containerd: Add containerd-shim-runc-v2
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-21 23:17:17 +00:00
Rolf Neugebauer
f14ad3af82 pkgs: Update to containerd v1.3.2
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-21 23:17:17 +00:00
Rolf Neugebauer
44e27a1dfb tools/alpine: Update containerd to v1.3.2
- Disable the devmapper snapshotter. We are not using it
- Cherry-pick and upstream commit to be able to disable
  the devmapper integration tests

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-21 23:17:17 +00:00
Rolf Neugebauer
fb14ee6854 Merge pull request #3461 from dave-tucker/action-fix
actions: Clean Up Post Merge
2020-01-21 23:16:57 +00:00
Dave Tucker
0fb8b116bb actions: Clean Up Post Merge
This commit moves the linuxkit binary in to /usr/local/bin.
It also removes trailing spaces (oops)

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2020-01-21 12:25:26 +00:00
Dave Tucker
4028c363b1 Merge pull request #3442 from dave-tucker/actions
Add GitHub Actions
2020-01-21 12:16:42 +00:00
Dave Tucker
c1644b1d02 actions: Install RTF in /usr/local/bin
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2020-01-14 23:40:54 +00:00
Dave Tucker
f5da1680a1 GitHub Actions: Implement Caching
This commit uses the GitHub Actions cache to ensure that the `rtf`
binary can be re-used between runs if it hasn't changed.
It also caches the linuxkit binaries for use in future stages.

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2020-01-14 23:40:54 +00:00
Dave Tucker
63849b606f test: Add GCP Run Test
This commit adds the GCP test that formerly ran in LinuxKitCI to run
under rtf.

As GitHub Actions doesn't currently support adding secret files, I've
skipped this test for now. Credentials can be passed via environment
variable but as RTF runs with `-x` the contents is viewable in the logs.

I will create an issue to follow up and find either a way of writing the
variable to file that doesn't compromise it. Or perhaps another approach
that is more compatible with GH actions

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2020-01-14 23:40:54 +00:00
Dave Tucker
a98046999f Add GitHub Action Workflow for CI
This commit adds a GitHub Actions workflow to replace both CircleCI and
LinuxKit CI.

It will build the Linuxkit binary, run tests and upload artifacts

It replaces the Integration Tests that are run by Linuxkit CI via
the make ci or make ci-pr targets with multiple sets of Integration
Tests that are run in parallel.

It does not yet test GCP. The GCP test in LinuxKit CI could be moved to RTF

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2020-01-14 23:40:54 +00:00
Justin Cormack
fce020a111 Merge pull request #3456 from rn/wg-up
Update WireGuard tools to 0.0.20191219
2020-01-03 16:40:52 +00:00
Rolf Neugebauer
51864cd03c Update YAMLs to latest pkg/ip package
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-03 00:22:06 +00:00
Rolf Neugebauer
bbf174d374 pkg/ip: Pick up the new version of wireguard-tools
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-03 00:15:43 +00:00
Rolf Neugebauer
f7e0dcba0b tools/alpine: Update wireguard-tools to 0.0.20191219
Also update other packages while at it.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-03 00:11:23 +00:00
Rolf Neugebauer
27f829f4f5 tools/alpine: Fix WireGuard tools build
The alpine patch is no longer needed

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2020-01-02 23:32:27 +00:00
Rolf Neugebauer
c4aef40418 Merge pull request #3455 from zx2c4-forks/jd/wgbump
wireguard: update to 0.0.20191226
2019-12-31 12:15:26 +00:00
Rolf Neugebauer
2208ee062b Merge pull request #3451 from rn/update
Update use of packages and AUTHORS
2019-12-31 10:34:49 +00:00
Jason A. Donenfeld
08bd5ddbaa wireguard: update to 0.0.20191226
This new snapshot comes from the brand new linux-compat repo, which
follows the recent upstreaming into net-next. When Linux 5.6 lands in
LinuxKit, we'll be able to remove the module entirely.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2019-12-30 12:31:53 +01:00
Rolf Neugebauer
98de655db1 Merge pull request #3400 from simonferquel/metadata-config-file
Metadata: add support for loading from a file
2019-12-20 17:52:29 +00:00
Rolf Neugebauer
eba4d9de83 Update AUTHORS
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-20 17:52:00 +00:00
Rolf Neugebauer
70df1123d6 Update YAMLs to latest swap and metadata packages
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-20 17:52:00 +00:00
Simon Ferquel
3f56669576 Metadata: add support for loading from a file
This adds a new configuration provider that just reads a file.
This is needed for Docker Desktop, where we will run a LinuxKit distro in an isolated namespace within WSL 2.
In this scenario, the config will be accessible trough the WSL2 built-in 9p mount of the Windows filesystem.

Signed-off-by: Simon Ferquel <simon.ferquel@docker.com>
2019-12-20 11:21:20 +01:00
Rolf Neugebauer
8c1fdf8737 Merge pull request #3274 from yankcrime/os-client-config
[OpenStack] Support os-client-config usage for authentication
2019-12-19 19:47:15 +00:00
Rolf Neugebauer
a09b86a8e1 Merge pull request #3371 from guillaumerose/error
Skip disk resize for dos partition if no free space is available
2019-12-19 19:31:58 +00:00
Rolf Neugebauer
868d14803e Merge pull request #3300 from danrzs/bugfix-make-gcp-size-limit
Removed fixed size arg from mkimage-gcp script.
2019-12-19 18:02:58 +00:00
Rolf Neugebauer
547521d146 Merge pull request #3349 from ptone/gcp-fixes
Update GCP metadata provider
2019-12-19 18:00:47 +00:00
Rolf Neugebauer
f0ac623b11 Merge pull request #3430 from Sh4d1/fix_scaleway_metadata
remove sendBootSignal in scaleway metadata package
2019-12-19 17:41:51 +00:00
Rolf Neugebauer
80f0765097 Merge pull request #3429 from zimme/metadata-fix-provider-scaleway
Fix the Scaleway provider in the metadata package
2019-12-19 17:41:10 +00:00
Rolf Neugebauer
725dc47a37 Merge pull request #3431 from zimme/metadata-fix-provider-hetzner
Fix the Hetzner provider in the metadata package
2019-12-19 17:39:45 +00:00
Rolf Neugebauer
2475233653 Merge pull request #3441 from djs55/swap-bigger-blocksize
swap: speed up by preferring a 1MiB blocksize
2019-12-19 17:38:22 +00:00
Justin Cormack
de4364fe68 Merge pull request #3450 from rn/kern-up
Update kernels, and Intel ucode, add support for 5.4.x kernels
2019-12-19 16:59:43 +00:00
Rolf Neugebauer
48f1008ec8 tests: Add kernel tests for 5.4.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 23:44:13 +00:00
Rolf Neugebauer
54a2654501 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 23:41:09 +00:00
Rolf Neugebauer
02ed4c261f kernel: Adjust kernel configs
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 18:54:25 +00:00
Rolf Neugebauer
4e2b69bc2f kernel: Remove 5.3.x kernels for arm64 and s390x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 15:26:46 +00:00
Rolf Neugebauer
a28ebce2f4 kernel: Build perf/bcc for 5.4.x kernels not 5.3.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 15:25:49 +00:00
Rolf Neugebauer
f9fee518a7 kernel: Add support for 5.4.x kernels
The kernel config files are derived from the 5.3.x
config files run through 'make oldconfig'.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 15:24:11 +00:00
Rolf Neugebauer
991eebaeab tests: Re-arrange the kernel tests
This is a simple rename of directories to make more space
in the test namespace for future kernels.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 14:54:48 +00:00
Rolf Neugebauer
7ae9b7b141 kernel: Remove support for 5.2.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 14:48:30 +00:00
Rolf Neugebauer
a638c2814c kernel: Update Intel uCode to microcode-20191115
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 14:44:42 +00:00
Rolf Neugebauer
81c148a3c4 kernel: Update to 5.3.17/4.19.90/4.14.159/4.9.206
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-12-18 14:42:32 +00:00
Rolf Neugebauer
c84b79d9b0 Merge pull request #3439 from kmjohansen/topics/kj/perf-bcc
Re-enable perf build; upgrade bcc
2019-12-17 08:21:45 +00:00
Krister Johansen
4dbdfb65d2 Move up to the 0.11.0 bcc release.
Allows us to drop some patches we were carrying, since the bugs were
fixed upstream.  Gives numerous tooling improvements too.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2019-12-16 14:02:34 -08:00
Krister Johansen
a0d797916d Re-enable perf build. Update bcc build.
Re-enable perf builds for 5.3.x and 4.19.x since they're the latest
stable and LTS, respectively.

Update the bcc build rules to map to these same kernel releases, too.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2019-12-16 14:02:34 -08:00
Krister Johansen
dad20f2e91 Add a patch that ensures that bcc can run on the 5.3.x kernel.
Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2019-12-16 14:00:42 -08:00
Krister Johansen
59481bd5d3 Add patches to unbreak perf and bcc.
The first patch re-adds symbol definitions that were temporarily omitted
from the 4.19 stable branch.

The latter patch corrects the uapi swab.h to that errors about "unknown
type name '__always_inline'" are no longer present in builds.  Without
this patch, bcc would build but attempts to compile the internal
programs at runtime would fail.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2019-12-16 14:00:42 -08:00
Rolf Neugebauer
d47bf4bb3e Merge pull request #3448 from djs55/wireguard.0.0.20191212
wireguard: update to 0.0.20191212
2019-12-16 20:53:42 +00:00
David Scott
e2e941dad3 wireguard: update to 0.0.20191212
Signed-off-by: David Scott <dave.scott@docker.com>
2019-12-16 11:32:02 +00:00
Simon Fridlund
4005082664 Fix the Hetzner provider in the metadata package
There were some mistakes made in the initial code where writes didn't work, this commit fixes that.

Signed-off-by: Simon Fridlund <simon@fridlund.email>
2019-12-04 23:01:40 +01:00
Justin Cormack
3375bd86b3 Merge pull request #3445 from dave-tucker/maintainer
Add Dave Tucker as a Maintainer
2019-12-04 00:42:28 +00:00
Dave Tucker
c31bff1462 Add Dave Tucker as a Maintainer
Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2019-12-03 13:27:53 +01:00
Justin Cormack
59d81814f8 Merge pull request #3444 from riyazdf/riyazdf-maintainer
Remove riyazdf from MAINTAINERS
2019-12-03 11:30:09 +00:00
Riyaz Faizullabhoy
ede56b0625 Remove riyazdf from MAINTAINERS
Signed-off-by: Riyaz Faizullabhoy <riyazdf@berkeley.edu>
2019-12-02 08:14:42 -08:00
Justin Cormack
843f7583b8 Merge pull request #3443 from dave-tucker/no-qemu
linuxkit: Remove QEMU Container Backend
2019-11-29 13:53:24 +00:00
Dave Tucker
9a91435076 linuxkit: Remove QEMU Container Backend
This commit removes the container backend for QEMU.
QEMU and it's tools are available on all platforms.

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2019-11-27 18:02:12 +00:00
David Scott
57dd4029c8 swap: speed up preferring a 1MiB blocksize
If the swap disk is larger than 1MiB, then use a 1MiB blocksize in `dd`

On my machine using a large block size speeds up swap file creation:

```
/ # time dd if=/dev/zero of=output bs=1024 count=1048576
1048576+0 records in
1048576+0 records out
real    0m 4.61s
user    0m 0.79s
sys     0m 3.77s
/ # time dd if=/dev/zero of=output bs=1048576 count=1024
1024+0 records in
1024+0 records out
real    0m 1.06s
user    0m 0.00s
sys     0m 1.04s
```

Signed-off-by: David Scott <dave.scott@docker.com>
2019-11-22 20:48:31 +00:00
Rolf Neugebauer
4092a10063 Merge pull request #3436 from Ptitpote/kconfig-tag-patch
Add the possibility to tag linuxkit/kconfig with a custom tag
2019-11-06 19:50:02 +00:00
Gabriel Chabot
db10873122 Add the possibility to tag linuxkit/kconfig with a custom tag instead of latest
KCONFIG_TAG variable can be used to set a custom kconfig tag.
If KCONFIG_TAG is not set, the the image is tagged as linuxkit/kconfig:latest
This is useful for projects requiring to build multiple kernels that have
different patches.
When trying to edit an unpatched kernel config after working on a patched
kernel config (same kernel version), one had to rerun make kconfig first
in order to edit the config of an unpatched kernel.
Now it is possible to generate a tegged kconfig image and then, get the wanted
config by selecting the corresponding linuxkit/kexec:tag.

Signed-off-by: Gabriel Chabot <gabriel.chabot@qarnot-computing.com>
2019-10-29 09:26:59 +01:00
Simon Fridlund
ea5f542450 Fix the Scaleway provider in the metadata package
This commit will update the Scaleway provider to fetch the cloud-init/cloud-config data from the user_data/cloud-init endpoint it will also make sure the whole public ssh key is fetched and no longer strip out the `ssh-rsa` part of the keys

Signed-off-by: Simon Fridlund <simon@fridlund.email>
2019-10-15 12:38:52 +02:00
Patrik Cyvoct
1e1326b40a remove sendBootSignal in scaleway metadata package
It's now not needed to send a boot signal when booting an instance on
Scaleway, thus the method is not needed anymore.

Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2019-10-15 09:35:35 +02:00
Avi Deitcher
afff608c49 Merge pull request #3428 from deitch/update-metadata-tags
Update linuxkit/metadata in yml to latest commit
2019-10-09 22:15:39 +03:00
Avi Deitcher
37806f158e Update linuxkit/metadata in yml to latest commit
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2019-10-09 20:57:04 +03:00
Nick Jones
10b2436eec [OpenStack] Support os-client-config usage for authentication
Update Gophercloud dependencies and also bring in the 'utils'
package.  This provides support for configuring access to OpenStack
clouds as detailed in the [official
documentation](https://docs.openstack.org/os-client-config/latest/user/configuration.html).

By relying on this package we can simplify the code required to
interact with OpenStack's APIs.  Support is also provided upstream for
self-signed and insecure SSL configurations.

Tested with a public cloud running OpenStack 'Rocky', the latest release.

Signed-off-by: Nick Jones <nick@dischord.org>
2019-10-08 12:46:43 +01:00
Avi Deitcher
668dc5a6ca Merge pull request #3425 from zimme/metadata-provider-hetzner
Add Hetzner provider in the metadata package
2019-10-07 21:51:02 +03:00
Simon Fridlund
69b586d8c9 Add Hetzner to examples
Signed-off-by: Simon Fridlund <simon@fridlund.email>
2019-10-07 19:34:12 +02:00
Simon Fridlund
fc88e2104e Add Hetzner provider in the metadata package
Signed-off-by: Simon Fridlund <simon@fridlund.email>
2019-10-07 17:31:57 +02:00
Rolf Neugebauer
7dc2fb19c5 Merge pull request #3424 from rn/kern-up
Update kernels, Intel uCode, add 5.3.x kernels
2019-10-02 23:58:18 +01:00
Rolf Neugebauer
da1d859fa8 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 22:29:40 +01:00
Rolf Neugebauer
c2566e8dd0 kernel: Drop 5.2.x kernel from arm64 and s390x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 20:05:44 +01:00
Rolf Neugebauer
b457648c40 kernel: Update to 5.3.2/5.2.18/4.19.76
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 20:05:05 +01:00
Rolf Neugebauer
4379275f45 Update YAMLs with new kernel config test
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:56:45 +01:00
Rolf Neugebauer
5fae83934d tests: Remove rootfs from kernel config test
The rootfs fs was removed in 5.3.x but was mostly a
irrelevant entry in the filesystems list anyway.

Here is the upstream commit:

commit fd3e007f6c6a0f677e4ee8aca4b9bab8ad6cab9a
Author: Al Viro <viro@zeniv.linux.org.uk>
Date:   Thu May 30 17:48:35 2019 -0400

    don't bother with registering rootfs

    init_mount_tree() can get to rootfs_fs_type directly and that simplifies
    a lot of things.  We don't need to register it, we don't need to look
    it up *and* we don't need to bother with preventing subsequent userland
    mounts.  That's the way we should've done that from the very beginning.

    There is a user-visible change, namely the disappearance of "rootfs"
    from /proc/filesystems.  Note that it's been unmountable all along
    and it didn't show up in /proc/mounts; however, it *is* a user-visible
    change and theoretically some script might've been using its presence
    in /proc/filesystems to tell 2.4.11+ from earlier kernels.

    *IF* any complaints about behaviour change do show up, we could fake
    it in /proc/filesystems.  I very much doubt we'll have to, though.

    Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:46:52 +01:00
Rolf Neugebauer
9f4895c25a tests: Add 5.3.x kernel tests
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
a87d90332b Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
eeafff3d27 kernel: Add rsync (required by 5.3.x kernel compile)
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
d1d731105b kernel: Enable GVE for 5.3.x kernel for x86
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
615303a1e3 kernel: Add support for 5.3.x kernels
The kernel config is copied from the 5.2.x config and
run through make oldconfig

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
4f0cd57748 kernel: Update to 5.2.17/4.19.75/4.14.146/4.9.194
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
c7cf340fd2 kernel: Update Intel ucode to 20190918
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
805271f12c kernel: Adjust kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
acab34371a kernel: Update to 5.2.16/4.19.74/4.14.145/4.9.193
This skips 5.2.10-15, 4.19.72-73, and 4.14.143-144

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
177de7512f kernel: Re-enable 5.2.x kernel for s390x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Rolf Neugebauer
84375a65b9 kernel: Add -fPIC to kernel compile on s390x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-10-02 19:45:33 +01:00
Justin Cormack
9e3f61058f Merge pull request #3389 from rn/mac-qemu-rng
cmd/qemu: Disable rng on macOS
2019-10-02 16:49:37 +01:00
Rolf Neugebauer
d903a8a215 Merge pull request #3422 from justincormack/building
Add local build requirements
2019-10-01 19:45:26 +01:00
Justin Cormack
a0305873c7 Add local build requirements
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2019-10-01 14:27:19 +01:00
Rolf Neugebauer
d94064e65e Merge pull request #3418 from guillaumerose/fixerrormsg
Error message is related to init image, not on boot.
2019-10-01 01:31:27 +02:00
Rolf Neugebauer
9a47b294f1 Merge pull request #3420 from justincormack/fix-parse-new-go
Expand all image references before passing to containerd reference.Parse
2019-10-01 01:30:12 +02:00
Justin Cormack
da533297c1 Expand all image references before passing to containerd reference.Parse
Short references without domains will now fail parsing on recent versions
of Go as net/url parser is more strict.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2019-09-30 12:14:15 +01:00
Rolf Neugebauer
648d0729d4 Merge pull request #3417 from hyperized/patch-1
Fix label argument mkfs.btrfs
2019-09-30 12:54:07 +02:00
Gerben Geijteman
9002602960 Apply image bump: https://github.com/linuxkit/linuxkit/pull/3417\#issuecomment-536217626 (now in correct branch)
Signed-off-by: Gerben Geijteman <gerben@isset.nl>
2019-09-30 09:18:21 +02:00
hyperized
680c6ebd8c Fix label argument mkfs.btrfs
Signed-off-by: Gerben Geijteman <gerben@hyperized.net>
2019-09-30 09:14:40 +02:00
Guillaume Rose
4ffb639105 Error message is related to init image, not on boot.
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2019-09-30 09:13:48 +02:00
Rolf Neugebauer
3be6466e00 Merge pull request #3399 from guillaumerose/trust
Add trust parameter for docker pull in moby.Formats
2019-09-28 20:24:01 +02:00
Rolf Neugebauer
6db75ee1ab Merge pull request #3416 from qarnot/earlier-microcode-download
Move microcode download earlier in Dockerfile
2019-09-24 06:38:49 +02:00
Yoann Ricordel
1ee293bcc2 Move microcode download earlier in Dockerfile
Intel microrode download is moved earlier in the Dockerfile, before the
kernel is actually built, so that it's available in the context of a
build and can be referenced in CONFIG_EXTRA_FIRMWARE for people who want
the microcode to be built-in the kernel.
It is still copied in the out/ directory and so that it is still
available for addition in a 'ucode:' section in linuxkit.yml.

Signed-off-by: Yoann Ricordel <yoann.ricordel@qarnot-computing.com>
2019-09-23 12:30:35 +02:00
Justin Cormack
27f21a6917 Merge pull request #3413 from rn/kern-up
Update kernel to 5.2.9/4.19.71/4.14.142/4.9.192 and WireGuard to 0.0.20190913
2019-09-19 10:48:31 +02:00
Rolf Neugebauer
3f94b129a5 tests: Update alpine base in kernel tests
Because we updated the alpine for the kernel builds

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:54 +01:00
Rolf Neugebauer
135d9de261 tests: Add 5.2.x tests
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:54 +01:00
Rolf Neugebauer
461fa41176 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:54 +01:00
Rolf Neugebauer
a89c556125 kernel: Disable 5.2.x kernel for s390x for now
see: https://github.com/linuxkit/linuxkit/issues/3412

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:54 +01:00
Rolf Neugebauer
3b00838d6d kernel: Adjust s390x defconfig location
With 5.2.x the location moved to the configs subdirectory
to be more in line with other architectures.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:54 +01:00
Rolf Neugebauer
6649327285 kernel: Bump WireGuard to 0.0.20190913
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:54 +01:00
Rolf Neugebauer
0b352bae73 kernel: Update kernel build to latest alpine base
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:54 +01:00
Rolf Neugebauer
81b78e87a6 tests: Remove 5.1.x kernel tests
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:54 +01:00
Rolf Neugebauer
b406e5358b kernel: Remove 5.1.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:54 +01:00
Rolf Neugebauer
f620837773 kernel: Tweak 5.2.x kernel config
Disable Backlight drivers.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:53 +01:00
Rolf Neugebauer
a1cd1a9c43 kernel: Add 5.2.x kernels
The kernel config is derived from the 5.1.x config and
run through make oldconfig

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:53 +01:00
Rolf Neugebauer
515505b76e kernel: Adjust kernel config files
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:53 +01:00
Rolf Neugebauer
afd271fb85 kernel: Update to v4.19.71/4.14.142/4.9.192
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:53 +01:00
Rolf Neugebauer
ac4786ebb8 kernel: Make VSOCKETS a module in all kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-09-17 21:36:53 +01:00
Rolf Neugebauer
b4e0fdb891 Merge pull request #3407 from djs55/module-vsock
Switch to vsock as a module
2019-09-15 12:03:30 +01:00
Rolf Neugebauer
402184fd1f Merge pull request #3408 from TiejunChina/master-dev
update -rt to 4.19.59-rt24
2019-09-15 10:16:11 +01:00
Tiejun Chen
05b6bb5284 update rt example file
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2019-09-10 17:55:30 -07:00
Tiejun Chen
0388410192 update -rt to 4.19.59-rt24
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2019-09-10 17:54:21 -07:00
Avi Deitcher
c050fb7276 Merge pull request #2742 from deitch/getty-dedup
Keep track of processed ttys and only start same one once
2019-09-10 09:15:35 -04:00
Avi Deitcher
7cca26e3ad Merge pull request #3404 from deitch/proxy-option
Add docker-standard ftp_proxy + socks-standard all_proxy env vars
2019-09-05 18:51:38 +03:00
Avi Deitcher
fad3354448 Add docker-standard ftp_proxy/FTP_PROXY env var, and socks-standard all_proxy/ALL_PROXY
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2019-09-03 11:00:26 +03:00
Justin Cormack
d9bdd77ba7 Merge pull request #3387 from rn/kern-up
Update kernels to 5.1.15/4.19.56/4.14.131/4.9.184
2019-09-02 13:07:25 +01:00
Rolf Neugebauer
c1370780d0 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-29 09:04:42 +01:00
Rolf Neugebauer
472c7d944f kernel: Update to 5.1.15/4.19.56/4.14.131/4.9.184
Note, this skips 4.14.130 and 4.9.183 as the diff
is just one commit.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-29 09:04:42 +01:00
Rolf Neugebauer
315ddf88e2 kernel: Enable WIRELESS and WLAN in x86 and arm64 configs
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-29 09:04:41 +01:00
Rolf Neugebauer
380a05e416 kernel: Update to 5.1.14/4.19.55/4.14.129
This skips 5.1.13 and 4.19.54 because the diff was
a single commit.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-29 09:04:41 +01:00
Rolf Neugebauer
54f54f0791 kernel: Update to 5.1.12/4.19.53/4.14.128
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-29 09:04:41 +01:00
Rolf Neugebauer
d32c4a1c4b Merge pull request #3403 from rn/containerd-1.28
Update to containerd v1.2.8
2019-08-29 09:03:48 +01:00
Avi Deitcher
49ffa978d3 Keep track of processed ttys and only start same one once
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2019-08-29 11:03:18 +03:00
Rolf Neugebauer
cf4be444df Update YAMLs to latest containerd
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-25 14:23:14 +01:00
Rolf Neugebauer
2018f5f499 Bump packages to new alpine w/ containerd v1.2.8
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-25 14:11:09 +01:00
Rolf Neugebauer
71f0cb364d alpine: Update alpine package
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-25 08:56:49 -04:00
Rolf Neugebauer
8940ba5e34 alpine: Bump containerd to v1.2.8
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-25 13:21:29 +01:00
Guillaume Rose
22fb927f2f Add trust parameter for docker pull in moby.Formats
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2019-08-07 22:56:58 +02:00
Justin Cormack
aa0a76b58b Merge pull request #3397 from rn/fw-fix
Fix path in firmware image (and update while at it)
2019-08-02 10:45:27 +01:00
Rolf Neugebauer
a380dd70d4 examples: Update firmware image to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-02 00:46:11 +01:00
Rolf Neugebauer
3c0131e2e1 pkg/firmware: Update to latest firmware package
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-02 00:32:09 +01:00
Rolf Neugebauer
f6695a7e03 pkg/firmware: Update the kernel package to a newer version.
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-02 00:28:39 +01:00
Rolf Neugebauer
b1bed08f72 pkg/firmware: Fix directory layout
Copy firmaware files to the correct directory. Instead of

<vendor>/<fw-name>/<fw-name> copy it to <vendor>/<fw-name>.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-08-02 00:26:17 +01:00
Justin Cormack
2c89f304ce Merge pull request #3390 from nakato/vultr-ssh
Vultr ssh
2019-07-22 10:09:44 +01:00
Sachi King
d4c6c5be47 Explicitly define metadata provider for Vultr
Vultr provides an API that looks a lot like the AWS api, resulting in
the AWS provider succeeding, but missing certain metadata parts that one
would expect to work out of the box on Vultr, such as SSH PubKey
fetching.

Signed-off-by: Sachi King <nakato@nakato.io>
2019-07-22 17:26:51 +10:00
Sachi King
f966dea6ff metadata: Fix Vultr provider SSH pubkey fetching
The Vultr provider currently never calls handleSSH, resulting in it
being impossible to bring up a LinuxKit image in vultr with the SSH
pubkey provided via the Vultr metadata API.

Signed-off-by: Sachi King <nakato@nakato.io>
2019-07-22 17:14:25 +10:00
Guillaume Rose
97ad842018 Update extend package
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2019-07-17 21:57:01 +02:00
Guillaume Rose
6a6d169af9 Use ioctl instead of blockdev
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2019-07-17 21:56:21 +02:00
Guillaume Rose
0fb16ac8b0 Don’t resize dos partition if no free space is available
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2019-07-17 16:56:02 +02:00
Guillaume Rose
518220ee44 LastLBA is only present for GPT table
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2019-07-17 16:56:02 +02:00
Guillaume Rose
65f3d9bcc1 Propagate error instead of log.Fatalf()
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2019-07-17 16:56:02 +02:00
David Scott
138199299a Switch to vsock as a module
Signed-off-by: David Scott <dave.scott@docker.com>
2019-07-09 15:30:01 +01:00
Rolf Neugebauer
5426ae55af cmd/qemu: Disable rng on macOS
With rng-random, booting hangs before switching
to the initrd.

fixes https://github.com/linuxkit/linuxkit/issues/3320

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-07-08 20:04:36 +01:00
Rolf Neugebauer
66cd2b6ee5 Merge pull request #3377 from Sh4d1/update_scaleway_provider
Update Scaleway Provider with new Go SDK
2019-07-05 18:33:14 +01:00
Avi Deitcher
54a13caa8d Merge pull request #3385 from rn/wireguard-up
kernel: Update wireguard to 0.0.20190601
2019-07-03 10:06:31 +03:00
Rolf Neugebauer
8db41028b4 Merge pull request #3386 from rn/containerd-up
Bump containerd to v1.2.7
2019-07-02 21:03:40 +01:00
Rolf Neugebauer
d4d74f0117 Update YAMLs to latest containerd
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-28 02:05:02 +01:00
Rolf Neugebauer
c0fcc3ddac Bump packages to new alpine w/ containerd v1.2.7
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-28 01:56:20 +01:00
Rolf Neugebauer
e927e25c0e alpine: Update alpine package
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-27 20:53:08 -04:00
Rolf Neugebauer
8b9d510467 alpine: Use community instead of testing for wireguard-tools
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-28 01:20:43 +01:00
Rolf Neugebauer
8fd4e7c2fd alpine: Bump contianerd to v1.2.7
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-28 01:13:17 +01:00
Rolf Neugebauer
f7b3eb38ef kernel: Update wireguard to 0.0.20190601
This skips 0.0.20190531

Changelog for 0.0.20190601

== Changes ==

  * compat: don't call xgetbv on cpus with no XSAVE

  There was an issue with the backport compat layer in yesterday's snapshot,
  causing issues on certain (mostly Atom) Intel chips on kernels older than
  4.2, due to the use of xgetbv without checking cpu flags for xsave support.
  This manifested itself simply at module load time. Indeed it's somewhat tricky
  to support 33 different kernel versions (3.10+), plus weird distro
  frankenkernels.

Changelog for 0.0.20190531

== Changes ==

  * tools: add wincompat layer to wg(8)

  Consistent with a lot of the Windows work we've been doing this last cycle,
  wg(8) now supports the WireGuard for Windows app by talking through a named
  pipe. You can compile this as `PLATFORM=windows make -C src/tools` with mingw.
  Because programming things for Windows is pretty ugly, we've done this via a
  separate standalone wincompat layer, so that we don't pollute our pretty *nix
  utility.

  * compat: udp_tunnel: force cast sk_data_ready

  This is a hack to work around broken Android kernel wrapper scripts.

  * wg-quick: freebsd: workaround SIOCGIFSTATUS race in FreeBSD kernel

  FreeBSD had a number of kernel race conditions, some of which we can vaguely
  work around. These are in the process of being fixed upstream, but probably
  people won't update for a while.

  * wg-quick: make darwin and freebsd path search strict like linux

  Correctness.

  * socket: set ignore_df=1 on xmit

  This was intended from early on but didn't work on IPv6 without the ignore_df
  flag. It allows sending fragments over IPv6.

  * qemu: use newer iproute2 and kernel
  * qemu: build iproute2 with libmnl support
  * qemu: do not check for alignment with ubsan

  The QEMU build system has been improved to compile newer versions. Linking
  against libmnl gives us better error messages. As well, enabling the alignment
  check on x86 UBSAN isn't realistic.

  * wg-quick: look up existing routes properly
  * wg-quick: specify protocol to ip(8), because of inconsistencies

  The route inclusion check was wrong prior, and Linux 5.1 made it break
  entirely. This makes a better invocation of `ip route show match`.

  * netlink: use new strict length types in policy for 5.2
  * kbuild: account for recent upstream changes
  * zinc: arm64: use cpu_get_elf_hwcap accessor for 5.2

  The usual churn of changes required for the upcoming 5.2.

  * timers: add jitter on ack failure reinitiation

  Correctness tweak in the timer system.

  * blake2s,chacha: latency tweak
  * blake2s: shorten ssse3 loop

  In every odd-numbered round, instead of operating over the state
      x00 x01 x02 x03
      x05 x06 x07 x04
      x10 x11 x08 x09
      x15 x12 x13 x14
  we operate over the rotated state
      x03 x00 x01 x02
      x04 x05 x06 x07
      x09 x10 x11 x08
      x14 x15 x12 x13
  The advantage here is that this requires no changes to the 'x04 x05 x06 x07'
  row, which is in the critical path. This results in a noticeable latency
  improvement of roughly R cycles, for R diagonal rounds in the primitive. As
  well, the blake2s AVX implementation is now SSSE3 and considerably shorter.

  * tools: allow setting WG_ENDPOINT_RESOLUTION_RETRIES

  System integrators can now specify things like
  WG_ENDPOINT_RESOLUTION_RETRIES=infinity when building wg(8)-based init
  scripts and services, or 0, or any other integer.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-28 00:39:23 +01:00
Rolf Neugebauer
d58859dd7f Merge pull request #3363 from lpottier/fix-kconfig-urls
Fixed urls used to download kernel images from kernel.org in kernel/Dockerfile.kconfig, used by make kconfig
2019-06-25 22:52:39 +02:00
Loïc Pottier
52aa902800 Added --create-dirs to Dockerfile.kconfig to fix a crash when
the sources/ directory does not exist

Signed-off-by: Loïc Pottier <lpottier@isi.edu>
2019-06-25 11:37:45 -07:00
Rolf Neugebauer
4dc5d0a3fb Merge pull request #3370 from guillaumerose/swap
Create swap file only if absent
2019-06-20 12:36:38 +01:00
Rolf Neugebauer
24eb7b048c Merge pull request #3381 from bjornin/update-zfs-0.8.1
Update zfs to 0.8.1
2019-06-20 01:02:38 +01:00
Björn Ingeson
3322e7ad18 Update zfs to 0.8.1
Since SPL is included in the ZFS repo from 0.8.0 this change will not be backwards compatible.

Signed-off-by: Björn Ingeson <bjorn.ingeson@gmail.com>
2019-06-19 23:30:44 +02:00
Rolf Neugebauer
1fd88b1dcc Merge pull request #3380 from TiejunChina/master-dev
update -rt to 4.19.50-rt22
2019-06-19 09:18:32 +01:00
Tiejun Chen
ee4ebc7f2a update -rt to 4.19.50-rt22
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2019-06-18 16:39:12 -07:00
Justin Cormack
2ddfdad1b1 Merge pull request #3378 from rn/kern-up
Update kernels to 5.1.10/4.19.51/4.14.126/4.9.181
2019-06-17 23:57:24 +01:00
Rolf Neugebauer
8922b437dd kernel: Update to 5.1.11/4.19.52/4.14.127/4.9.182/4.4.182
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-17 23:05:46 +01:00
Rolf Neugebauer
5dcccbca50 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-17 21:05:32 +01:00
Patrik Cyvoct
6a4d127fd3 Update Scaleway Provider with new Go SDK
Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2019-06-17 19:12:47 +02:00
Guillaume Rose
e57cb35015 Update linuxkit/swap image
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2019-06-17 10:06:17 +02:00
Guillaume Rose
fa1cd40a2a Create swap file only if absent
Signed-off-by: Guillaume Rose <guillaume.rose@docker.com>
2019-06-17 10:06:17 +02:00
Rolf Neugebauer
b1991877f6 kernel: Update to 5.1.10/4.19.51/4.14.126/4.9.181
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-17 08:38:26 +01:00
Rolf Neugebauer
c77ef1560f kernel: Update to 5.1.9/4.19.50/4.14.125
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-16 21:53:37 +01:00
Justin Cormack
ea23fecdee Merge pull request #3372 from rn/kern-up
Update kernels to 5.1.8/4.19.49/4.14.124 (remove 5.0.x kernel)
2019-06-10 16:48:02 +01:00
Rolf Neugebauer
a59b3a1e01 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-10 09:35:08 +01:00
Rolf Neugebauer
b3805745f2 kernel: Update to 5.1.8/4.19.49/4.14.124
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-10 09:35:08 +01:00
Rolf Neugebauer
4a86f4423d kernel: Adjust 4.19.x kernel config file
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-10 09:35:08 +01:00
Rolf Neugebauer
ae53b3f28f kernel: Update to 5.1.7/4.19.48
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-10 09:35:08 +01:00
Rolf Neugebauer
fcb618822b Remove the 5.0.x kernel
It was EOLed with 5.0.21

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-10 09:35:08 +01:00
Rolf Neugebauer
d50ac51d48 Merge pull request #3367 from singe/patch-1
Update kernel Dockerfile with openssl-dev dep
2019-06-06 19:47:15 +01:00
Rolf Neugebauer
7ca3f6684f Merge pull request #3368 from ndauten/mem-update
Memorizer update
2019-06-06 19:46:26 +01:00
Dominic White
340dba89a0 Update kernel Dockerfile with openssl-dev dep
Kernel series 5.1.x requires openssl headers to compile scripts/extract-cert.c.

Signed-off-by: singe <singe-github@singe.za.net>
2019-06-06 15:24:08 +02:00
Nathan Dautenhahn
d503a77dd4 Update and modify kconfig for memorizer
Signed-off-by: Nathan Dautenhahn <ndd@rice.edu>
2019-06-06 07:58:26 -05:00
Nathan Dautenhahn
6f8510a1fe Use non dirty tag for memorizer
Signed-off-by: Nathan Dautenhahn <ndd@rice.edu>
2019-06-06 07:58:26 -05:00
Justin Cormack
02913f8950 Merge pull request #3366 from rn/may-2019
May 2019 development report (and Author update)
2019-06-05 12:31:09 +01:00
Rolf Neugebauer
cd7ea94fb8 Merge pull request #3345 from kmjohansen/topics/kj/rngd-eintr
rngd exits after being stopped and resumed
2019-06-05 08:39:46 +01:00
Krister Johansen
8159efcf8f Update rngd image.
Move linuxkit/rngd up to 02c555b50c

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2019-06-04 13:25:16 -07:00
Krister Johansen
3b20802be7 rngd exits after being stopped and resumed
Linux has documented but somewhat unusual behavior around
SIGSTOP/SIGCONT and certain syscalls, of which epoll_wait(2) is one.  In
this particular case, rngd exited unexpectedly after getting ptrace'd
mid-epoll_wait.  Fix this by handling EINTR from this syscall, and
continuing to add entropy and wait.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2019-06-04 13:22:50 -07:00
Rolf Neugebauer
4dbba2540b Merge pull request #3357 from riconnon/uboot-dtbs
Support for dynamic selection of Raspberry Pi DTB
2019-06-04 11:20:01 +01:00
Richard Connon
30b78d7e82 Update mkimage-rpi3 tool reference in linuxkit CLI
Update the image tag for the mkimage-rpi3 tool used by the CLI to adopt
the dynamic DTB selection feature.

Signed-off-by: Richard Connon <richard@connon.me.uk>
2019-06-04 08:04:10 +00:00
Richard Connon
5ffbfbbf67 Support loading correct DTB for RPi 3 model B+
U-Boot sets the variable fdtfile to the correct file name for the
detected hardware revision. Use this in the boot script to load either
the 3-b or 3-b-plus DTB

Signed-off-by: Richard Connon <richard@connon.me.uk>
2019-06-04 08:03:31 +00:00
Richard Connon
b97f47b0aa Update rpi3 u-boot to detect newer hardware
Update the u-boot image included in the mkimage-rpi3 image to support
detecting newer hardware versions and setting the fdtfile variable
accordingly
Shallow clone the u-boot repository during docker build to improve build
efficiency

Signed-off-by: Richard Connon <richard@connon.me.uk>
2019-06-04 08:03:31 +00:00
Rolf Neugebauer
ce8e8595d9 May 2019 development report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-03 20:59:11 +01:00
Rolf Neugebauer
7fff877732 Update AUTHORS file
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-03 20:18:06 +01:00
Justin Cormack
38ac762f8b Merge pull request #3362 from rn/kern-up
Update kernels to 5.1.6/5.0.20/4.19.47/4.9.180
2019-06-03 16:53:33 +01:00
Justin Cormack
b980fa72da Merge pull request #3365 from justincormack/log-driver
Do not use a log driver while running containers
2019-06-03 13:03:01 +01:00
Justin Cormack
213d9b0380 Do not use a log driver while running containers
This stops the output from also being copied to logs if the user
has a log driver configured.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2019-06-03 10:44:02 +01:00
Rolf Neugebauer
848ba99223 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-02 00:50:34 +01:00
Rolf Neugebauer
07847a51a5 kernel: Adjust arm64 kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-01 19:26:11 +01:00
Rolf Neugebauer
409a06ba5d kernel: Update to 5.1.6/5.0.20/4.19.47/4.9.180
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-06-01 13:46:12 +01:00
Rolf Neugebauer
845e25a569 Merge pull request #3361 from jterry75/update_linuxkit/runc
Update to latest linuxkit/runc:c1f0db2
2019-06-01 11:43:05 +01:00
Rolf Neugebauer
4d9b9853f0 Merge pull request #3338 from jterry75/update_runc-v1.0.0-rc8
Update opencontainers/runc to v1.0.0-rc8
2019-06-01 11:42:45 +01:00
Rolf Neugebauer
ca376d70db Merge pull request #3359 from TiejunChina/master-dev
update -rt to 4.19.37-rt20
2019-06-01 01:58:24 +01:00
Tiejun Chen
2fc3151ccd update -rt to 4.19.37-rt20
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2019-05-30 17:57:53 -07:00
Justin Terry (VM)
45a354bba9 Update to latest linuxkit/runc:c1f0db2
Signed-off-by: Justin Terry (VM) <juterry@microsoft.com>
2019-05-30 11:36:57 -07:00
Justin Cormack
80379b41fd Merge pull request #3358 from rn/kern-up
Upte kernels to 5.1.5/5.0.19/4.19.46/4.14.122/4.9.179
2019-05-30 11:19:45 +03:00
Rolf Neugebauer
64cd724a34 Merge pull request #3351 from riconnon/update-rpi-firmware
Update referenced Raspberry Pi firmware
2019-05-27 14:37:12 -07:00
Rolf Neugebauer
72c0cda916 Update YAMLs to the latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-27 22:31:32 +01:00
Rolf Neugebauer
7b784fedb5 kernel: Adjust kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-27 08:39:19 +01:00
Rolf Neugebauer
747138ca72 kernel: Update to 5.1.5/5.0.19/4.19.46/4.14.122/4.9.179
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-26 23:14:14 +01:00
Rolf Neugebauer
3c983a78e8 kernel: Adjust s390x config file
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-26 16:22:53 +01:00
Rolf Neugebauer
76e9d95fda kernel: Update to 5.1.4/5.0.18/4.19.45/4.14.121/4.9.178
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-26 14:35:06 +01:00
Rolf Neugebauer
fde7e0e612 kernel: Update to 5.1.3/5.0.17/4.19.44/4.14.120/4.9.177
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-26 12:09:27 +01:00
Richard Connon
2f6876b2c1 Update referenced Raspberry Pi firmware
Update Raspberry Pi firmware used in mkimage-rpi3 to the latest stable
version to support newer hardware models such as the 3B+

Signed-off-by: Richard Connon <richard@connon.me.uk>
2019-05-26 08:14:14 +01:00
Rolf Neugebauer
f040d05d20 kernel: Enable HOTPLUG_PCI_ACPI for x86
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-25 18:53:41 +01:00
Rolf Neugebauer
7cb48d2e82 kernel: Update kernels to 5.1.2/5.0.16/4.19.43/4.14.119/4.9.176
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-25 18:37:18 +01:00
Rolf Neugebauer
13e232519b kernel: Update Intel microcode
Intel seem to have switched to hosting the microcode on GitHub.
Use this source and update to the 20190514 version.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-25 18:32:35 +01:00
Rolf Neugebauer
d7d2f1af8e kernel: Remove 5.0.x kernel for arm64 and s390x
To reduce the number of kernels to compile...

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-25 18:32:35 +01:00
Rolf Neugebauer
750bdfd5eb Merge pull request #3350 from schrotthaufen/rpi3bp
kernel: Include lan78xx kernel module for use with rpi3b+
2019-05-25 10:31:35 -07:00
Rolf Neugebauer
d3b28c951e Merge pull request #3355 from rn/wg-0.0.20190406
Update to WireGuard  0.0.20190406
2019-05-25 09:23:15 -07:00
Rolf Neugebauer
20d47a9bc3 Revert "kernel: Disable WireGuard for 5.1.x kernels"
This reverts commit 0a46f29a05.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-25 14:16:25 +01:00
Rolf Neugebauer
9f6b8ee81d kernel: Update WireGuard to 0.0.20190406
== Changes ==

  * allowedips: initialize list head when removing intermediate nodes

  Fix for an important regression in removing allowed IPs from the last
  snapshot. We have new test cases to catch these in the future as well.

  * wg-quick: freebsd: rebreak interface loopback, while fixing localhost
  * wg-quick: freebsd: export TMPDIR when restoring and don't make empty

  Two fixes for FreeBSD which have already been backported into ports.

  * tools: genkey: account for short reads of /dev/urandom
  * tools: add support for Haiku

  The tools now support Haiku! Maybe somebody is working on a WireGuard
  implementation for it?

  * tools: warn if an AllowedIP has a nonzero host part

  If you try to run `wg set wg0 peer ... allowed-ips 192.168.1.82/24`, wg(8)
  will now print a warning. Even though we mask this automatically down to
  192.168.1.0/24, usually when people specify it like this, it's a mistake.

  * wg-quick: add 'strip' subcommand

  The new strip subcommand prints the config file to stdout after stripping
  it of all wg-quick-specific options. This enables tricks such as:
  `wg addconf $DEV <(wg-quick strip $DEV)`.

  * tools: avoid unneccessary next_peer assignments in sort_peers()

  Small C optimization the compiler was probably already doing.

  * peerlookup: rename from hashtables
  * allowedips: do not use __always_inline
  * device: use skb accessor functions where possible

  Suggested tweaks from Dave Miller.

  * qemu: set framewarn 1280 for 64bit and 1024 for 32bit

  These should indicate to us more clearly when we cross the most strict stack
  thresholds expected when using recent compilers with the kernel.

  * blake2s: simplify
  * blake2s: remove outlen parameter from final

  The blake2s implementation has been simplified, since we don't use any of the
  fancy tree hashing parameters or the like. We also no longer separate the
  output length at initialization time from the output length at finalization
  time.

  * global: the _bh variety of rcu helpers have been unified
  * compat: nf_nat_core.h was removed upstream
  * compat: backport skb_mark_not_on_list

  The usual assortment of compat fixes for Linux 5.1.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-25 14:05:51 +01:00
schrotthaufen
0120b7dc74 kernel: Include lan78xx kernel module for use with rpi3b+
Signed-off-by: schrotthaufen <schrotthaufen@invalid.invalid>
2019-05-16 20:32:43 +02:00
Preston Holmes
00b0f8fa90 Change userdata key in cmd src
Signed-off-by: Preston Holmes <preston@ptone.com>
2019-05-15 14:06:42 -07:00
Preston Holmes
d11404ca97 Update GCP metadata provider
Signed-off-by: Preston Holmes <preston@ptone.com>
2019-05-15 13:51:58 -07:00
Rolf Neugebauer
bdf1d0558f Merge pull request #3348 from rn/report-apr-2019
April 2019 report and authors update
2019-05-13 11:25:31 +01:00
Rolf Neugebauer
34b00fa8aa Merge pull request #3347 from rn/kern-up
Update kernels to 5.0.15/4.19.42/4.14.118/4.9.175 and add 5.1.1 kernel
2019-05-12 22:33:50 +01:00
Rolf Neugebauer
59ddbe3f9c Update Authors
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-12 22:08:39 +01:00
Rolf Neugebauer
726a9ee4c9 Development report for April 2019
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-12 22:07:22 +01:00
Rolf Neugebauer
626c6ccef1 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-12 20:58:32 +01:00
Rolf Neugebauer
d72c928a1e tests: Add tests for the 5.1.x kernel
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-12 20:56:26 +01:00
Rolf Neugebauer
0a46f29a05 kernel: Disable WireGuard for 5.1.x kernels
Getting compile errors:

AS [M]  /wireguard/crypto/zinc/chacha20/chacha20-x86_64.o
In file included from <command-line>:
/wireguard/compat/compat.h:795:10: fatal error: net/netfilter/nf_nat_core.h: No such file or directory
 #include <net/netfilter/nf_nat_core.h>
          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-12 18:24:40 +01:00
Rolf Neugebauer
63a120c4a1 kernel: Add support for 5.1.x kernels
The config files were derived from the 5.0.x config
files and run through make oldconfig.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-12 16:10:51 +01:00
Rolf Neugebauer
7bebc0fae5 kernel: Update to 5.0.15/4.19.42/4.14.118/4.9.175
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-12 11:54:15 +01:00
Rolf Neugebauer
7cb1d40a4a kernel: Update to 5.0.14/4.19.41/4.14.117/4.9.174
Skip 5.0.13 and 4.19.40 as the delta to the previous
version is like ~25 patches.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-11 18:36:13 +01:00
Justin Cormack
8129070a90 Merge pull request #3344 from rn/kern-up
Update kernels to 5.0.12/4.9.39/4.14.116/4.9.173
2019-05-07 08:03:27 -07:00
Rolf Neugebauer
c16bef3520 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-06 08:49:06 +01:00
Rolf Neugebauer
7e6f117f9e kernel: Update to 5.0.12/4.19.39/4.14.116/4.9.173
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-05 13:31:12 +01:00
Rolf Neugebauer
93a59dc440 Merge pull request #3341 from deitch/fix-kernel-mkimage
Fix issue wherein multiple files named kernel in the tar break various mkimage utils
2019-05-05 12:50:31 +01:00
Rolf Neugebauer
9a969a6bbe kernels: Update to 5.0.11/4.19.38/4.14.115/4.9.172
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-05-05 10:31:40 +01:00
Avi Deitcher
0cb9d79b51 Simplify to static kernel file location
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2019-05-05 12:28:17 +03:00
Justin Terry (VM)
1d9cedc0bb Update opencontainers/runc to v1.0.0-rc8
Signed-off-by: Justin Terry (VM) <juterry@microsoft.com>
2019-04-29 16:24:02 -07:00
Rolf Neugebauer
a3ac8f7443 Merge pull request #3335 from nakato/RPi3bp
Update RPi firmware
2019-04-28 22:05:38 +01:00
Rolf Neugebauer
473426229f Merge pull request #3337 from rn/kern-up
Update kernel to 5.0.10/4.19.37/4.14.114/4.9.171
2019-04-28 20:03:03 +01:00
Rolf Neugebauer
4ec32a215d Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-28 16:27:06 +01:00
Rolf Neugebauer
44b91954b6 kernel: Update to 5.0.10/4.19.37/4.14.114/4.9.172
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-28 11:10:30 +01:00
Sachi King
df41414d82 Update RPi builder hash to include FW
Fixes #3324

Signed-off-by: Sachi King <nakato@nakato.io>
2019-04-28 15:38:02 +10:00
Sachi King
ea66def1fb Update RPi3 firmware to fix startup on newer kit
With the current firmware being pulled for the RPi3, recent revisions of
the RPi hardware, such as the 3 B+ will fail to boot.

The issue is exhibited as when RPi 3 B+ receives power and attempts to
boot, the power LED will turn off and the ACT LED will flash 8 times.
According to elinux.org troubleshooting guide[0] this correlates to an
SDRAM initialisation error that can be fixed by updating the firmware.

After updating this firmware the power light stays on, and UBoot can be
seen booting.

[0] - https://elinux.org/R-Pi_Troubleshooting#Green_LED_blinks_in_a_specific_pattern

Signed-off-by: Sachi King <nakato@nakato.io>
2019-04-23 10:30:31 +10:00
Sachi King
0bd28bd3a8 Vendor RPi firmware blob licenese
As per the license, the license must be provided with the binaries.

Signed-off-by: Sachi King <nakato@nakato.io>
2019-04-23 10:30:13 +10:00
Rolf Neugebauer
dd81f840a2 Merge pull request #3334 from rn/kern-up
Update kernels to 5.0.9/4.19.36/4.14.113/4.9.170
2019-04-22 22:35:27 +01:00
Rolf Neugebauer
b837d1125d Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-22 16:47:58 +01:00
Rolf Neugebauer
b22ba61a2b kernel: Update to 5.0.9/4.19.36/4.14.113/4.9.170
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-22 11:03:01 +01:00
Rolf Neugebauer
a39ee60478 kernel: Remove dependency on 'sources'
Commit d47b283df4 ("kernel: Remove fetch target") removed
the 'fetch' target to simplify the Makefile. This left
dependencies on 'sources' lingering. Remove it.

resolves #3333

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-22 11:03:01 +01:00
Rolf Neugebauer
7214e48715 Merge pull request #3332 from rn/kern-up
Kernel update to 5.0.8/4.19.35/4.14.112/4.9.169
2019-04-19 20:25:40 +01:00
Rolf Neugebauer
8c1c7dbf7e Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-19 14:44:31 +01:00
Rolf Neugebauer
724c807b49 kernel: Update config files
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-19 11:19:21 +01:00
Rolf Neugebauer
719a2753db kernel: Update to 5.0.8/4.19.35/4.14.112/4.9.169
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-19 10:54:27 +01:00
Rolf Neugebauer
82a75d4b0f Merge pull request #3330 from deitch/grub-coreos-alpine-3.9
Build coreos grub off of alpine:3.9 and separate build steps for caching
2019-04-18 18:47:39 +01:00
Avi Deitcher
a02537ebe5 Build coreos grub off of alpine:3.9 and separate build steps for caching
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2019-04-18 11:50:05 +03:00
Justin Cormack
e08e5caed7 Merge pull request #3331 from rn/post-v0.7
Bump version to v0.7+
2019-04-17 23:57:51 +01:00
Rolf Neugebauer
8e1b6b0d0b Bump version to v0.7+
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-17 21:57:11 +01:00
Rolf Neugebauer
4f4f7feae1 Merge pull request #3329 from rn/rel_v0.7
Release v0.7
2019-04-17 21:38:31 +01:00
Rolf Neugebauer
ea9a9dd763 Update CHANGELOG
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-17 09:48:29 +01:00
Rolf Neugebauer
ac81de2ac3 Update version in top-level Makefile
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-17 09:48:29 +01:00
Rolf Neugebauer
087badc8b7 Update AUTHORS
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-17 09:48:29 +01:00
Rolf Neugebauer
51fd2916c6 kernel: Update gcc version in kernel config files
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-17 08:28:21 +01:00
Rolf Neugebauer
03e0d67051 kernel: Update alpine to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-17 07:43:18 +01:00
Rolf Neugebauer
291a95d3fa Update package tags to v0.7
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-16 23:46:27 +01:00
Rolf Neugebauer
c7799a9080 pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-16 23:25:22 +01:00
Rolf Neugebauer
ba9a266b6a tests: Update tests cases to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-16 23:23:41 +01:00
Rolf Neugebauer
344cba78e5 Update use of test packages to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-16 23:23:27 +01:00
Rolf Neugebauer
bb313ac560 tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-16 23:16:56 +01:00
Rolf Neugebauer
da3f1e9c6c Update use of tools to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-16 23:16:18 +01:00
Rolf Neugebauer
94bfb97ba3 tools: Update to the latest linuxkit/alpine
Skip tools/grub as this still requires alpine 3.8
to build

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-16 22:53:26 +01:00
Avi Deitcher
6e67121486 Merge pull request #3328 from deitch/grub-coreos
Move coreos-grub build to its own image
2019-04-16 21:04:30 +01:00
Avi Deitcher
99b785f3ee change image used by linuxkit output format for latest mkimage-*-efi
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2019-04-16 15:21:26 +01:00
Avi Deitcher
d6b80396bb Move coreos-grub build to its own image
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2019-04-15 13:00:52 +03:00
Rolf Neugebauer
2f3e42a68c Merge pull request #3327 from rn/containerd-1.2.6
Update containerd to v1.2.6
2019-04-14 14:49:27 +03:00
Rolf Neugebauer
c42569a570 Bump YAMLs to containerd v1.2.6 (and update runc)
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-14 11:29:43 +01:00
Rolf Neugebauer
53485a1f83 Bump packages to new alpine w/ containerd v1.2.6
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-14 11:29:08 +01:00
Rolf Neugebauer
fd67969697 pkg/runc: Bump to v1.0.0-rc7-6-g029124da
This is the recommended version for containerd v1.2.6

While at it, also bump the alpine base.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-14 11:29:08 +01:00
Rolf Neugebauer
2b32dde645 alpine: Bump containerd to v1.2.6
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-14 11:29:08 +01:00
Justin Cormack
916b20a919 Merge pull request #3326 from rn/kern-up
Update kernels to 5.0.7/4.19.34/4.14.111/4.9.168
2019-04-14 10:50:34 +01:00
Rolf Neugebauer
f670d0d352 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-13 23:23:42 +01:00
Rolf Neugebauer
74c8caa450 kernel: Update to 5.0.7/4.19.34/4.14.111/4.9.168
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-13 18:36:44 +01:00
Justin Cormack
bd9547fee6 Merge pull request #3323 from rn/kern-up
Update kernels to 5.0.6/4.19.33/4.14.110/4.9.167
2019-04-07 12:13:05 +01:00
Rolf Neugebauer
510f26581f tests: Use elfutils-dev for kmod tests
Commit 250b14661b ("kernel: Use elfutils-dev instead
of libelf-dev") switched the kernel build to use
elfutils-dev instead of libelf-dev. This caused the kernel
module tests to fail. The still installed libelf-dev and
the dunamically linked objtool (and friends) from the
kernel source package failed to execute.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-05 22:55:51 +01:00
Rolf Neugebauer
7f3b13aa92 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-05 20:57:22 +01:00
Rolf Neugebauer
250b14661b kernel: Use elfutils-dev instead of libelf-dev
With kernel 5.0.6 we start seeing compile errors such as:

  HOSTCXX -fPIC scripts/gcc-plugins/randomize_layout_plugin.o
In file included from <stdin>:1:
/usr/include/libelf/libelf.h:28:5: error: "__LIBELF_INTERNAL__" is not defined, evaluates to 0 [-Werror=undef]
 #if __LIBELF_INTERNAL__
     ^~~~~~~~~~~~~~~~~~~
cc1: all warnings being treated as errors

elutils-dev installs a different version of libelf.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-05 19:01:51 +01:00
Justin Cormack
da1854050e Merge pull request #3322 from rn/mar-2019
March 2019 development report
2019-04-05 16:55:55 +01:00
Rolf Neugebauer
50a182936e March 2019 development report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-05 08:25:16 +01:00
Rolf Neugebauer
658da5b94a kernel: Update to 5.0.6/4.19.33/4.14.110/4.9.167
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-04-03 23:26:06 +01:00
Justin Cormack
9d4ebc8ada Merge pull request #3319 from rn/kern-up
Kernel update to 5.0.5/4.19.32/4.14.109/4.9.166
2019-04-01 11:19:19 +01:00
Rolf Neugebauer
1203c54c0a Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-31 22:21:42 +01:00
Rolf Neugebauer
32920fb018 Merge pull request #3317 from justincormack/dockerapi
Update Docker API version
2019-03-31 12:07:57 -07:00
Rolf Neugebauer
01b7472e98 kernel: Update to 5.0.5/4.19.32/4.14.109/4.9.166
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-31 19:45:53 +01:00
Rolf Neugebauer
5737db1429 Merge pull request #3315 from jmccoy555/master
Add static IP example
2019-03-31 11:30:01 -07:00
Justin Cormack
ec31261706 Update Docker API version
Signed-off-by: Justin Cormack <justin@specialbusservice.com>
2019-03-31 18:12:34 +01:00
mcy
91bd111dd0 Add static IP example
Signed-off-by: mcy <james@mcy.email>
2019-03-30 19:15:34 +00:00
Rolf Neugebauer
680de1eacf Merge pull request #3314 from rn/kern-up
Update kernels up to 5.0.4/4.19.31/4.14.108/4.9.165
2019-03-25 12:41:05 -07:00
Rolf Neugebauer
2853f71fe5 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-25 17:48:08 +00:00
Rolf Neugebauer
b1249c28ca kernel: Update to 5.0.4/4.19.31
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-25 09:11:10 +00:00
Rolf Neugebauer
e1b94133f1 kernel: Remove 4.20.x
It has been EOLed

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-25 09:07:29 +00:00
Rolf Neugebauer
edb8c29e8e kernel: Update to 5.03/4.20.17/4.19.30/4.14.108/4.9.165
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-24 23:21:29 +00:00
Rolf Neugebauer
f3e7087114 kernel: Enable BFQ in 5.x kernels
All our 4.x kernels had CFQ enabled. This was removed
in 5.x and replaced with BFQ. Enable it.

resolves #3308

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-24 13:41:33 +00:00
Rolf Neugebauer
cf5221eca9 kernel: Adjust 4.20.x/4.19.x x86 kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-24 13:14:18 +00:00
Rolf Neugebauer
0a8d501c41 kernel: Update to 5.02/4.20.16/5/19.29/4.14.107/4.9.164
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-24 13:00:34 +00:00
Rolf Neugebauer
aed0401150 kernel: Adjust 4.14.x/4.9.x config files
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-23 23:21:49 +00:00
Rolf Neugebauer
410aefb425 kernel: Update Intel microcode
Hmm, the URL changed, the md5 changed, but the date
on the website and the file stayed the same...

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-23 21:17:09 +00:00
Rolf Neugebauer
e5d8ded27e kernel: Update to 4.14106/4.9.163
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-23 19:38:49 +00:00
Rolf Neugebauer
8972f35d9a kernel: Remove 4.14.x for s390x and arm64
To reduce the number of kernels we maintain, for s390x
and ar64 we only support the latest LTS and newer kernels.
v4.19.x has been out for a while, so lets remove support for
v4.14.x.

resolves #3302

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-23 19:31:23 +00:00
Rolf Neugebauer
6bc3d2be2f Merge pull request #3310 from sethp/patch-1
Update example link
2019-03-23 11:24:54 -07:00
sethp
993b392bdd Update example link
The directory the link previously went to has changed.

Signed-off-by: Seth Pellegrino <seth@codecopse.net>
2019-03-20 21:58:12 -07:00
Justin Cormack
26e8a72674 Merge pull request #3305 from rn/kern-up
Add support for 5.0.x kernels and update to 4.20.15/4.19.28
2019-03-18 12:07:15 +00:00
Rolf Neugebauer
a43091d27a Merge pull request #3307 from jmccoy555/master
Updated Compose and Docker versions.
2019-03-17 16:16:16 -07:00
Rolf Neugebauer
29aee97416 tests: Update kernel-config check image
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-17 11:59:09 -07:00
Rolf Neugebauer
25e25da424 tests: Skip Moby kernel config checks on 5.x
See https://github.com/moby/moby/issues/38887
for details. Basically 5.x removed support for
CFQ with f382fb0bcef4 ("block: remove legacy IO
schedulers") and the Moby check still requires it.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-17 11:56:46 -07:00
James McCoy
a43a3f7165 Updated Compose and Docker versions.
Signed-off-by: James McCoy <james@mcy.email>
2019-03-17 18:18:37 +00:00
Rolf Neugebauer
500c79b970 tests: Use latest moby kernel config test
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-17 11:05:01 -07:00
Rolf Neugebauer
bf81dec5cc tests: Adjust kernel config test for 5.x kernel
Many places where checking for -ge 4 and some minor version.
This will fail for 5.x kernels if their minor version is less.
Fix it.

While at it, also restructure/simplify the code, make it easier
to run against arbitrary kernel configs, and tidy up some
whitespaces.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-17 11:01:24 -07:00
Justin Cormack
9504b935e7 Merge pull request #3306 from ijc/containerd-v1.2.5
Containerd v1.2.5
2019-03-15 13:10:19 +00:00
Ian Campbell
66c72e7444 Bump yml to pickup containerd v1.2.5
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-03-14 10:29:29 +00:00
Ian Campbell
3510c792ea Bump packages to new alpine w/ containerd v1.2.5
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-03-14 10:18:56 +00:00
Ian Campbell
5e97fa4f69 alpine: Bump to containerd v1.2.5
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-03-13 07:15:23 -04:00
Rolf Neugebauer
3df49b9727 tests: Add tests for the 5.0.x kernel
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-10 23:29:48 +00:00
Rolf Neugebauer
72827bc860 Updates YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-10 23:29:41 +00:00
Rolf Neugebauer
419c808f07 kernel: Update to 4.20.15/4.19.28
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-10 23:29:31 +00:00
Rolf Neugebauer
74d9638275 kernel: Add support for the v5.0.x kernel
The kernel config files are 4.20.x config files run through
make oldconfig for the 5.0 kernel.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-10 23:29:19 +00:00
Rolf Neugebauer
d47b283df4 kernel: Remove fetch target
This target allowed to locally download the kernel source
tar balls. We haven't used this foir a while and adding
v5.x kernel support for it would add yet another conditional.

Remove it to keep the Makefile simpler.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-10 23:29:04 +00:00
Rolf Neugebauer
d79e8d9d6c kernel: Support v5.x kernels in kconfig build
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-10 23:28:49 +00:00
Rolf Neugebauer
9502197456 kernel: Add support for building v5.x kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-10 23:28:37 +00:00
Justin Cormack
b5c03581e7 Merge pull request #3304 from rn/feb-report
February 2019 report
2019-03-08 15:30:17 +00:00
Justin Cormack
51a75448d9 Merge pull request #3303 from rn/kern-up
Update kernel to 4.20.14/4.19.27/4,14.105/4.9.162
2019-03-08 13:15:29 +00:00
Rolf Neugebauer
1a954bc873 February 2019 report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-08 00:56:00 +00:00
Rolf Neugebauer
6f30b820a6 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-08 00:52:36 +00:00
Rolf Neugebauer
00b0abcf59 kernel: Update to 4.20.14/4.19.37/4.14.105/4.9.162
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-08 00:52:36 +00:00
Rolf Neugebauer
7d31ea1135 kernel: Reorder build targets to be in numerical order
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-08 00:52:36 +00:00
Rolf Neugebauer
05c8849a97 kernel: Build a 4.19 debug kernel on x86 (instead of 4.14)
We switched to 4.19.x as the default kernel and debug
kernel build was not updated. Fix it.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-08 00:52:36 +00:00
Rolf Neugebauer
043faae78e Merge pull request #3298 from TiejunChina/master-dev
Enable Preempt-RT Linux 4.19.x into Linuxkit
2019-03-07 20:16:17 +00:00
Daniel Dean
1653e9dffb Removed size arg from GCP make-fs command.
The make-gcp script in the mkimage-gcp tool creates a virtual fs of 1GB, excactly. If your filesystem needs to be larger, then make-gcp errors in a poorly explained way. Simply removing the arg makes the fs the same size as the image used to build it.

Signed-off-by: Daniel Smith <daniel@razorsecure.com>
2019-03-07 14:20:42 +00:00
Justin Cormack
ff9a659213 Merge pull request #3297 from rn/alpine_3.9
Update to Alpine Linux 3.9 (plus cadvisor and linux-firmware update)
2019-03-07 11:19:12 +00:00
Rolf Neugebauer
3228d21abf kernel: Update gcc version in 4.19.x and 4.20 kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-06 20:12:00 +00:00
Rolf Neugebauer
94cdfb55b6 kernel: Skip perf build for now
See https://github.com/linuxkit/linuxkit/issues/3299

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-06 01:04:54 +00:00
Rolf Neugebauer
d041e7d2bf kernel: Factor our perf build from main kernel build
The build of the perf utility has been quite bothersome,
with different arches and kernel versions failing.

Since we now have the ful kernel source in the package,
factor out the actual build into Dockerfile.perf

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-06 00:37:31 +00:00
Rolf Neugebauer
94516fe2a8 kernel: Remove libressl from kernel build Dockerfile
Alpine 3.9 no longer uses libressl

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-05 23:18:58 +00:00
Tiejun Chen
92ebe10a62 enable 4.19.x-rt with preempt-rt Linux 4.19.15
Signed-off-by: Tiejun Chen <tiejun.china@gmail.com>
2019-03-04 13:43:55 -08:00
Tiejun Chen
daab1a1ecc remove 4.14.x-rt stuff
Signed-off-by: Tiejun Chen <tiejun.china@gmail.com>
2019-03-04 13:43:48 -08:00
Rolf Neugebauer
a0e49c68bf src: De-lint run_packet.go
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 15:11:20 +00:00
Rolf Neugebauer
e71a88a929 src: De-lint scaleway code
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 15:09:13 +00:00
Rolf Neugebauer
e340827c5c src: De-lint push_aws.go
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 15:08:05 +00:00
Rolf Neugebauer
9f9252c3f3 src: De-lint run_qemu.go
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 15:07:05 +00:00
Rolf Neugebauer
27f8e8c850 cmd: de-lint moby/docker.go
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 15:03:37 +00:00
Rolf Neugebauer
7750ac10bf circleci: Bump go to 1.11
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 14:49:46 +00:00
Rolf Neugebauer
7c1952785d Update Authors
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 14:33:53 +00:00
Rolf Neugebauer
e8a80665dc examples: Update to Alpine 3.9
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 14:32:40 +00:00
Rolf Neugebauer
71f87cc6a9 Update package tags to the latest version
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 14:31:42 +00:00
Rolf Neugebauer
a53bfe1b81 tests: Disable the bpftrace test
The package does not build at the moment:
https://github.com/linuxkit/linuxkit/issues/3296

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 14:30:02 +00:00
Rolf Neugebauer
14039d0597 pkg/bpftrace: Disable the package
The compile fails with:

[ 30%] Building CXX object src/ast/CMakeFiles/ast.dir/codegen_llvm.cpp.o
[ 30%] Building CXX object src/ast/CMakeFiles/ast.dir/irbuilderbpf.cpp.o
[ 31%] Building CXX object src/ast/CMakeFiles/ast.dir/printer.cpp.o
[ 31%] Building CXX object src/ast/CMakeFiles/ast.dir/semantic_analyser.cpp.o
/bpftrace/src/ast/irbuilderbpf.cpp: In member function 'llvm::CallInst* bpftrace::ast::IRBuilderBPF::CreateProbeReadStr(llvm::AllocaInst*, size_t, llvm::Value*)':
/bpftrace/src/ast/irbuilderbpf.cpp:279:16: error: 'BPF_FUNC_probe_read_str' was not declared in this scope
       getInt64(BPF_FUNC_probe_read_str),
                ^~~~~~~~~~~~~~~~~~~~~~~
/bpftrace/src/ast/irbuilderbpf.cpp: In member function 'llvm::CallInst* bpftrace::ast::IRBuilderBPF::CreateProbeReadStr(llvm::Value*, size_t, llvm::Value*)':
/bpftrace/src/ast/irbuilderbpf.cpp:294:16: error: 'BPF_FUNC_probe_read_str' was not declared in this scope
       getInt64(BPF_FUNC_probe_read_str),
                ^~~~~~~~~~~~~~~~~~~~~~~
/bpftrace/src/ast/irbuilderbpf.cpp: In member function 'llvm::CallInst* bpftrace::ast::IRBuilderBPF::CreateGetCurrentCgroupId()':
/bpftrace/src/ast/irbuilderbpf.cpp:422:16: error: 'BPF_FUNC_get_current_cgroup_id' was not declared in this scope
       getInt64(BPF_FUNC_get_current_cgroup_id),
                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/bpftrace/src/ast/irbuilderbpf.cpp: In member function 'llvm::CallInst* bpftrace::ast::IRBuilderBPF::CreateGetCurrentTask()':
/bpftrace/src/ast/irbuilderbpf.cpp:461:16: error: 'BPF_FUNC_get_current_task' was not declared in this scope
       getInt64(BPF_FUNC_get_current_task),
                ^~~~~~~~~~~~~~~~~~~~~~~~~
/bpftrace/src/ast/irbuilderbpf.cpp: In member function 'llvm::CallInst* bpftrace::ast::IRBuilderBPF::CreateGetStackId(llvm::Value*, bool)':
/bpftrace/src/ast/irbuilderbpf.cpp:497:16: error: 'BPF_FUNC_get_stackid' was not declared in this scope
       getInt64(BPF_FUNC_get_stackid),
                ^~~~~~~~~~~~~~~~~~~~
/bpftrace/src/ast/semantic_analyser.cpp: In member function 'int bpftrace::ast::SemanticAnalyser::create_maps(bool)':
/bpftrace/src/ast/semantic_analyser.cpp:871:68: error: 'BPF_MAP_TYPE_STACK_TRACE' was not declared in this scope
       bpftrace_.stackid_map_ = std::make_unique<bpftrace::FakeMap>(BPF_MAP_TYPE_STACK_TRACE);
                                                                    ^~~~~~~~~~~~~~~~~~~~~~~~
/bpftrace/src/ast/semantic_analyser.cpp:885:64: error: 'BPF_MAP_TYPE_STACK_TRACE' was not declared in this scope
       bpftrace_.stackid_map_ = std::make_unique<bpftrace::Map>(BPF_MAP_TYPE_STACK_TRACE);
                                                                ^~~~~~~~~~~~~~~~~~~~~~~~
make[2]: *** [src/ast/CMakeFiles/ast.dir/build.make:89: src/ast/CMakeFiles/ast.dir/irbuilderbpf.cpp.o] Error 1
make[2]: *** Waiting for unfinished jobs....
make[2]: *** [src/ast/CMakeFiles/ast.dir/build.make:115: src/ast/CMakeFiles/ast.dir/semantic_analyser.cpp.o] Error 1
make[1]: *** [CMakeFiles/Makefile2:276: src/ast/CMakeFiles/ast.dir/all] Error 2
make: *** [Makefile:141: all] Error 2

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 14:02:09 +00:00
Rolf Neugebauer
82d6f949c7 pkg/firmware: Update to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 12:25:40 +00:00
Rolf Neugebauer
0552c47a26 pkg/cadvisor: Update to v0.33.0
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 12:25:40 +00:00
Rolf Neugebauer
4fdad53190 pkgs: Update packages to the latest linuxkit/alpine
except for bpftrace, since it does not compile:
https://github.com/linuxkit/linuxkit/pull/3230

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 12:25:40 +00:00
Rolf Neugebauer
9a9d9670e8 kernel: Update build to use the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 11:18:21 +00:00
Rolf Neugebauer
d341fdc666 tools/alpine: Update the package
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 06:16:57 -05:00
Rolf Neugebauer
f0815f755a tools/alpine: Add more wireguard packages
The wireguard package has some sub-packages which are
now dependencies. Include them in the alpine base.

Also include openresolv, which is required by one
of the wireguard packages.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 10:28:57 +00:00
Rolf Neugebauer
d236874874 tool: Fix azure.go gofmt
Looks like the newer gofmt is a little pickier.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 09:41:10 +00:00
Rolf Neugebauer
c52e831dca tests: Update alpine 3.8 to 3.9
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 09:41:10 +00:00
Rolf Neugebauer
f0ee28cd6e tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-03 09:40:57 +00:00
Rolf Neugebauer
903ff4ef64 Update use of test packages to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-02 19:57:53 +00:00
Rolf Neugebauer
75422a7ca8 tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-02 19:19:13 +00:00
Rolf Neugebauer
5910713bae Update use of tools to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-02 19:18:46 +00:00
Rolf Neugebauer
4f715f5f2a tools: Update to the latest linuxkit/alpine
Skip the packages which use grub to boot EFI images.

The grub build fails, see:
https://github.com/linuxkit/linuxkit/issues/3295

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-02 19:06:59 +00:00
Rolf Neugebauer
f6f13d6c4b tools/alpine: Update to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-02 18:27:03 +00:00
Rolf Neugebauer
c217a7c7d1 tools/alpine: Move strace to x86 and arm64 only
It does not seem to be avail on s390x

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-02 17:57:02 +00:00
Rolf Neugebauer
ec5e383de4 tools/alpine: Update to Alpine Linux 3.9
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-02 10:39:31 +00:00
Justin Cormack
b46ec8a906 Merge pull request #3294 from rn/kern-up
Update kernels to 4.20.13/4.19.26/4.14.104/4.9.161
2019-03-02 10:37:20 +00:00
Rolf Neugebauer
376cb1000a Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-01 19:24:42 +00:00
Rolf Neugebauer
1e916001f0 kernel: Adjust kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-01 08:33:49 +00:00
Rolf Neugebauer
5a1e83e639 kernel: Update to 4.20.13/4.19.26/4.14.104/4.9.161
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-03-01 08:06:52 +00:00
Rolf Neugebauer
731b796fa9 Merge pull request #3293 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20190227
2019-02-28 09:11:06 +00:00
Jason A. Donenfeld
572c7c221a wireguard: upgrade to 0.0.20190227
* wg-quick: freebsd: allow loopback to work

FreeBSD adds a route for point-to-point destination addresses. We don't
really want to specify any destination address, but unfortunately we
have to. Before we tried to cheat by giving our own address as the
destination, but this had the unfortunate effect of preventing
loopback from working on our local ip address. We work around this with
yet another kludge: we set the destination address to 127.0.0.1. Since
127.0.0.1 is already assigned to an interface, this has the same effect
of not specifying a destination address, and therefore we accomplish the
intended behavior. Note that the bad behavior is still present in Darwin,
where such workaround does not exist.

* tools: remove unused check phony declaration
* highlighter: when subtracting char, cast to unsigned
* chacha20: name enums
* tools: fight compiler slightly harder
* tools: c_acc doesn't need to be initialized
* queueing: more reasonable allocator function convention

Usual nits.

* systemd: wg-quick should depend on nss-lookup.target

Since wg-quick(8) calls wg(8) which does hostname lookups, we should
probably only run this after we're allowed to look up hostnames.

* compat: backport ALIGN_DOWN
* noise: whiten the nanoseconds portion of the timestamp

This mitigates unrelated sidechannel attacks that think they can turn
WireGuard into a useful time oracle.

* hashtables: decouple hashtable allocations from the main device allocation

The hashtable allocations are quite large, and cause the device allocation in
the net framework to stall sometimes while it tries to find a contiguous
region that can fit the device struct. To fix the allocation stalls, decouple
the hashtable allocations from the device allocation and allocate the
hashtables with kvmalloc's implicit __GFP_NORETRY so that the allocations fall
back to vmalloc with little resistance.

* chacha20poly1305: permit unaligned strides on certain platforms

The map allocations required to fix this are mostly slower than unaligned
paths.

* noise: store clamped key instead of raw key

This causes `wg show` to now show the right thing. Useful for doing
comparisons.

* compat: ipv6_stub is sometimes null

On ancient kernels, ipv6_stub is sometimes null in cases where IPv6 has
been disabled with a command line flag or other failures.

* Makefile: don't duplicate code in install and modules-install
* Makefile: make the depmod path configurable

* queueing: net-next has changed signature of skb_probe_transport_header

A 5.1 change. This could change again, but for now it allows us to keep this
snapshot aligned with our upstream submissions.

* netlink: don't remove allowed ips for new peers
* peer: only synchronize_rcu_bh and traverse trie once when removing all peers
* allowedips: maintain per-peer list of allowedips

This is a rather big and important change that makes it much much faster to do
operations involving thousands of peers. Batch peer/allowedip addition and
clearing is several orders of magnitude faster now.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2019-02-28 00:35:24 +01:00
Justin Cormack
3441f4f333 Merge pull request #3292 from rn/kern-up
Update kernels to 4.20.12/4.19.25/4.14.103/4.9.160
2019-02-25 10:10:27 +00:00
Rolf Neugebauer
6b988171cf Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-24 23:21:42 +00:00
Rolf Neugebauer
9440e48f4f kernels: Update to 4.20.12/4.19.25/4.14.103/4.9.160
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-24 19:48:17 +00:00
Rolf Neugebauer
882ee6afb5 kernels: Update to 4.20.11/4.19.24/4.14.102/4.9.159
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-24 13:12:28 +00:00
Rolf Neugebauer
402d712ed6 kernel: Adjust 4.9.x kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-24 10:20:43 +00:00
Rolf Neugebauer
0ebc73d57f kernels: Update to 4.20.10/4.19.23/4.14.101/4.9.158
This skiks 4.20.9/4.19.22/4.14.100/4.9.157 because they
contained a bug. See:
https://lwn.net/Articles/779934/

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-23 13:26:12 +00:00
Rolf Neugebauer
fee4e492fd kernels: Update to 4.20.8/4.19.21/4.14.99/4.19.156
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-23 09:47:19 +00:00
Ian Campbell
6b17ff4ff2 Merge pull request #3290 from ijc/containerd-v1.2.4
Containerd v1.2.4
2019-02-14 13:12:18 +00:00
Ian Campbell
16df1af139 Bump yml to pickup containerd v1.2.4
Also pick a newer version of runc.

Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-14 10:16:47 +00:00
Ian Campbell
39ee6c0e9b Bump packages to new alpine w/ containerd v1.2.4
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-14 10:01:33 +00:00
Ian Campbell
24c13f222c Bump runc to version from containerd v1.2.4
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-14 10:01:33 +00:00
Ian Campbell
236d68f409 alpine: Bump to containerd v1.2.4
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-14 05:01:19 -05:00
Ian Campbell
f3ec48417c Redirect $TMPDIR when running containerd tests
These tests expect a $TMPDIR which supports user xattrs, which the tmpfs on
/tmp does not. Redirect it to the persistent disk which does.

Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-13 11:41:40 +00:00
Ian Campbell
b5c6c3ceeb test/pkg/containerd: move config to build.yml
... from the old-skool label scheme.

No semantic change intended. Some keys are in different orders and the "mounts"
entry gained an empty "destination" key, neither of which makes a practical
difference.

Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-13 11:41:12 +00:00
Justin Cormack
1fb71a127e Merge pull request #3286 from ijc/containerd-v1.2.3
Containerd v1.2.3
2019-02-11 11:47:58 +00:00
Ian Campbell
6e16071bfe Bump yml to pickup containerd v1.2.3
Also pick a newer version of runc.

Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-11 10:05:14 +00:00
Ian Campbell
61ff76a7e3 Bump packages to new alpine w/ containerd v1.2.3
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-11 09:47:37 +00:00
Ian Campbell
d56442cf2e Bump runc to version from containerd v1.2.3
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-11 09:47:36 +00:00
Ian Campbell
baa56f8b22 alpine: Bump to containerd v1.2.3
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-02-11 04:47:22 -05:00
Justin Cormack
af6cad2ca6 Merge pull request #3285 from rn/kern-up
Kernel update to 4.20.7/4.19.20/4.14.98/4.9.155
2019-02-09 15:06:49 +00:00
Rolf Neugebauer
f408d6cfee iUpdate YAMLs to the latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-09 10:40:09 +00:00
Rolf Neugebauer
5ffa60f639 kernel: Update to 4.20.7/4.19.20/4.14.98/4.9.155
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-08 23:25:28 +00:00
Rolf Neugebauer
1d19a27e08 Merge pull request #3238 from kppk/master
Add support for named pipes to init
2019-02-08 10:04:28 +00:00
Tomas Knappek
e62a6b3e51 Update YAMLs to latest init
Signed-off-by: Tomas Knappek <tomas.knappek@gmail.com>
2019-02-07 10:38:42 -08:00
Tomas Knappek
63a6a60fed Fixes linuxkit#3237: add support for named pipes to init
Signed-off-by: Tomas Knappek <tomas.knappek@gmail.com>
2019-02-07 10:37:15 -08:00
Rolf Neugebauer
c44cf1293f Merge pull request #3253 from johanneswuerbach/s390x-support
Add s390x support to binfmt_misc
2019-02-07 00:20:19 +00:00
Johannes Würbach
a10227ab28 Update linuxkit/binfmt references
Signed-off-by: Johannes Würbach <johannes.wuerbach@googlemail.com>
2019-02-06 10:17:55 +01:00
Rolf Neugebauer
5aea2afb8b Merge pull request #3284 from rn/jan-2019
January 2019 development report
2019-02-06 08:31:45 +00:00
Rolf Neugebauer
2f6e864149 January 2019 development report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-05 23:52:48 +00:00
Rolf Neugebauer
f77af9bd3b Merge pull request #3281 from rn/kern-up
Update kernels to 4.20.6/4.19.19/4.14.97/4.9.154
2019-02-04 10:44:16 +00:00
Rolf Neugebauer
235639999b Merge pull request #3283 from rn/author
Update Authors
2019-02-02 18:26:49 +00:00
Rolf Neugebauer
5f9cd0eb16 Update Authors
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-02 11:12:41 +00:00
Rolf Neugebauer
13f63bf9f7 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-02 11:03:39 +00:00
Rolf Neugebauer
1c49fa2c8f kernels: Update to 4.20.6/4.19.19/4.14.97/4.9.154
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-02-01 19:34:57 +00:00
Rolf Neugebauer
c5b3f24de6 Merge pull request #3279 from rn/kern-up
Kernel update to 4.20.5/4.19.18/4.14.96/4.9.153
2019-01-29 10:51:15 +00:00
Rolf Neugebauer
a10fba6f62 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-29 08:22:32 +00:00
Rolf Neugebauer
405500aac0 kernels: Adjust 4.14.x config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-28 19:34:27 +00:00
Rolf Neugebauer
ab527e7afb kernels: Update to 4.2.5/4.19.18/4.14.96/4.9.153
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-28 18:20:01 +00:00
Justin Cormack
6fcfc99e4d Merge pull request #3277 from rn/kern-up
Update kernels to 4.20.4/4.19.17/4.14.95/4.9.152
2019-01-27 15:27:56 +00:00
Rolf Neugebauer
4018bbcbfd Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-26 10:00:21 +00:00
Rolf Neugebauer
f85b16e0bd kernel: Update to 4.20.4/4.19.17/4.14.95/4.9.152
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-25 20:16:00 +00:00
Rolf Neugebauer
9a2d651407 Merge pull request #3276 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20190123
2019-01-23 23:06:20 +00:00
Jason A. Donenfeld
a94099639e wireguard: upgrade to 0.0.20190123
* tools: curve25519: handle unaligned loads/stores safely

This should fix sporadic crashes with `wg pubkey` on certain architectures.

* netlink: auth socket changes against namespace of socket

In WireGuard, the underlying UDP socket lives in the namespace where the
interface was created and doesn't move if the interface is moved. This
allows one to create the interface in some privileged place that has
Internet access, and then move it into a container namespace that only
has the WireGuard interface for egress. Consider the following
situation:

1. Interface created in namespace A. Socket therefore lives in namespace A.
2. Interface moved to namespace B. Socket remains in namespace A.
3. Namespace B now has access to the interface and changes the listen
port and/or fwmark of socket. Change is reflected in namespace A.

This behavior is arguably _fine_ and perhaps even expected or
acceptable. But there's also an argument to be made that B should have
A's cred to do so. So, this patch adds a simple ns_capable check.

* ratelimiter: build tests with !IPV6

Should reenable building in debug mode for systems without IPv6.

* noise: replace getnstimeofday64 with ktime_get_real_ts64
* ratelimiter: totalram_pages is now a function
* qemu: enable FP on MIPS

Linux 5.0 support.

* keygen-html: bring back pure javascript implementation

Benoît Viguier has proofs that values will stay well within 2^53. We
also have an improved carry function that's much simpler. Probably more
constant time than emscripten's 64-bit integers.

* contrib: introduce simple highlighter library

This is the highlighter library being used in:
- https://twitter.com/EdgeSecurity/status/1085294681003454465
- https://twitter.com/EdgeSecurity/status/1081953278248796165

It's included here as a contrib example, so that others can paste it into
their own GUI clients for having the same strictly validating highlighting.

* netlink: use __kernel_timespec for handshake time

This readies us for Y2038. See https://lwn.net/Articles/776435/ for more info.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2019-01-23 14:50:55 +01:00
Rolf Neugebauer
9a818a1446 Merge pull request #3273 from errordeveloper/fix-zfs-4.14.x
Use latest stable release of ZFS
2019-01-21 20:00:58 +00:00
Ilya Dmitrichenko
872a92849b Use latest stable release of ZFS
Signed-off-by: Ilya Dmitrichenko <errordeveloper@gmail.com>
2019-01-19 10:04:34 +00:00
Rolf Neugebauer
5cf518b89b Merge pull request #3272 from rn/kern-up
Update kernels to 4.20.3/4.19.16/4.14.94/4.9.151
2019-01-18 10:34:26 +00:00
Rolf Neugebauer
c28d72169d Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-18 08:12:55 +00:00
Rolf Neugebauer
eeb2d546d1 Merge pull request #3249 from chriswue/master
Adding support to mount an encrypted filesystem
2019-01-18 01:28:50 +01:00
Christian Wuerdig
a9bc7372de Adding dm-crypt as core pkg
Signed-off-by: Christian Wuerdig <christian.wuerdig@gmail.com>
2019-01-18 11:56:18 +13:00
Rolf Neugebauer
ffd8d19cfd kernel: Update to 4.20.3/4.19.16/4.14.94/4.9.151
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-17 19:51:32 +00:00
Rolf Neugebauer
6412cfa117 Merge pull request #3271 from rn/kern-up
Update kernel to 4.20.2/4.19.15/4.14.93/4.9.150
2019-01-17 17:12:10 +01:00
Rolf Neugebauer
567d4e2f54 Update YAMLs to latest kernels
This also fixes up test/cases/020_kernel/110_namespace/common.yml
and test/cases/040_packages/032_bcc/test.yml to use the 4.19.x
kernel. I missed these when making the 4.19 kernel the default.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-17 11:56:04 +00:00
Rolf Neugebauer
3b4f70dd76 kernel: Update to 4.20.2/4.19.15/4.14.93/4.9.150
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-16 22:28:57 +00:00
Rolf Neugebauer
49ed462379 Merge pull request #3269 from rn/def-kern
Switch the default kernel to 4.19.x
2019-01-16 21:08:18 +01:00
Rolf Neugebauer
6ab6467d78 Switch the default kernel to 4.19.x
4.19.x is the new LTS kernel and has been out for a while. Switch
all examples and tests to using it instead of the 4.14.x kernel.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-16 16:30:24 +00:00
Rolf Neugebauer
8aee979b72 Merge pull request #3267 from TiejunChina/master-dev
update -rt to 4.14.87-rt50
2019-01-15 12:23:09 +01:00
Tiejun Chen
ef9302bc01 update -rt to 4.14.87-rt50
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2019-01-14 20:49:28 -08:00
Rolf Neugebauer
13bfb5c238 Merge pull request #3265 from rn/kern-up
Update kernels to 4.20.1/4.19.14/4.14.92/4.9.149
2019-01-14 12:29:56 +01:00
Christian Wuerdig
8cd16c4904 Adding losetup utility package to core pkg
Signed-off-by: Christian Wuerdig <christian.wuerdig@gmail.com>
2019-01-14 06:24:00 +13:00
Rolf Neugebauer
4b66ef2e2a Merge pull request #3266 from bensallen/master
Fix link to ADOPTERS.md
2019-01-12 19:33:57 +01:00
Ben Allen
c0049f051d Fix link to ADOPTERS.md
Signed-off-by: Ben Allen <bsallen@alcf.anl.gov>
2019-01-12 12:25:40 -06:00
Rolf Neugebauer
4d20f2c476 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-12 18:01:24 +00:00
Rolf Neugebauer
be99dbcda2 kernel: Adjust the 4.20/4.19 configs for x86 and arm64
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-12 13:28:22 +00:00
Rolf Neugebauer
d9504a7904 kernel: Update to 4.20.1/4.19.14/4.14.92/4.9.149
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-12 11:55:36 +00:00
Ian Campbell
eb7e07542f Merge pull request #3262 from ijc/containerd-v1.2.2
Containerd v1.2.2
2019-01-09 10:01:57 +00:00
Ian Campbell
7386a32afe pkg/runc: bump alpine base to newest one.
Corresponding to the similar changes in ed2dd46cd0.

Signed-off-by: Ian Campbell <ijc@docker.com>
2019-01-08 16:28:36 +00:00
Ian Campbell
3a3b742ca3 Bump yml to pickup containerd v1.2.2
Also pick a newer version of runc.

Signed-off-by: Ian Campbell <ijc@docker.com>
2019-01-08 12:13:36 +00:00
Ian Campbell
ddd8c0c017 Bump runc to version from containerd v1.2.2
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-01-08 11:52:42 +00:00
Ian Campbell
ed2dd46cd0 Bump packages to new alpine w/ containerd v1.2.2
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-01-08 11:52:42 +00:00
Ian Campbell
b4187fe6ea alpine: Bump to containerd v1.2.2
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-01-08 06:52:27 -05:00
Ian Campbell
c52e20a932 tools/alpine: Grab another file needed for wireguard APK build.
Signed-off-by: Ian Campbell <ijc@docker.com>
2019-01-08 11:37:13 +00:00
Rolf Neugebauer
c033d6892e Merge pull request #3260 from TiejunChina/master-dev
update -rt to 4.14.87-rt49
2019-01-08 10:46:47 +01:00
Tiejun Chen
e7481213e4 update -rt to 4.14.87-rt49
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2019-01-06 13:29:54 -08:00
Justin Cormack
bfb37f20b1 Merge pull request #3257 from keyki/master
log the actual error message when creating the Docker API client
2019-01-05 19:25:49 +00:00
Justin Cormack
0956685d44 Merge pull request #3259 from rn/report-dec-2018
December 2018 development report
2019-01-04 09:53:18 +00:00
Rolf Neugebauer
b0bf58f073 December 2018 development report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-04 09:06:02 +00:00
Justin Cormack
246a491e3c Merge pull request #3258 from rn/kern-4.20
Remove 4.4.x kernels, add 4.20.x kernels
2019-01-03 11:04:35 +00:00
Rolf Neugebauer
eb0fa4b150 tests: Add kernel module test for 4.20.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-03 00:47:29 +00:00
Rolf Neugebauer
8069c88396 tests: Add 4.20.x kernel config test
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-03 00:44:28 +00:00
Rolf Neugebauer
77422d26c0 kernel/arm64: Enable ENA driver
The new AWS A1 instances use the ENA network driver.
Enable it.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-02 22:17:36 +00:00
Rolf Neugebauer
ae1f2dd6af kernel/x86_64,arm64: Enable STACKLEAK GCC plugin
Enable the STACKLEAK GCC plugin which erases the
kernel stack before returning from system calls.
This security options has a reported performance
hit of around 1% which seem like a reasonable amount.

For more details see: https://outflux.net/blog/archives/2018/12/24/security-things-in-linux-v4-20/

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-02 22:17:36 +00:00
Rolf Neugebauer
ce3dc79509 kernel: Add support for 4.20.x kernels
The kernel config was derived from the 4.19.13 kernel config
run through the 'make oldconfig' with all defaults accepted,
except for:
- NET_VENDOR_MICROCHIP (defauly 'y', set to 'n')

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-02 22:17:36 +00:00
Rolf Neugebauer
6c59e083f4 kernel: Simplify perf and bcc build logic
Since we removed the 4.4.x kernel, simply don't build
perf and bcc for 4.9.x kernels.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-02 22:17:36 +00:00
Krisztian Horvath
c68f52c76f log: log the actual error message when creating the Docker API client
Signed-off-by: Krisztian Horvath <keyki.kk@gmail.com>
2019-01-02 17:12:40 +01:00
Rolf Neugebauer
2ab3b0a24e Remove 4.4 kernel
We already have 4.9.x, 4.14.x, and 4,19.x as LTS releases.
4.9.x has a longer lifetime as 4.4.x as well and fewer security
fixes can be backported to 4.4.x. Remove it.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2019-01-01 17:06:06 +00:00
Justin Cormack
cf20f3d66b Merge pull request #3256 from rn/kern-up
Update kernels to 4.19.13/4.14.91/4.9.148
2018-12-31 12:21:16 +00:00
Rolf Neugebauer
78e05de197 Update YAMLs to the latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-31 00:07:02 +00:00
Rolf Neugebauer
8ba5e2416d kernel: Update to 4.19.13/4.14.92/4.9.148
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-30 21:06:50 +00:00
Rolf Neugebauer
2b826be453 Merge pull request #3255 from rn/repeat
Initial support for reproducible builds
2018-12-30 11:27:51 +00:00
Rolf Neugebauer
416ccd6f5d docs: Dev reports are monthly not weekly
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-29 15:46:57 +00:00
Rolf Neugebauer
3da93a3c7a docs: Link reproducible build doc from top-level README
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-29 15:43:50 +00:00
Rolf Neugebauer
e7b85b6589 docs: Add details about reproducible builds
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-29 15:38:02 +00:00
Rolf Neugebauer
8008811aad tests: Add tests for reproducible builds
Test the 'tar' and 'kernel+initrd' formats for now.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-29 14:10:38 +00:00
Rolf Neugebauer
78281af751 build: Make list of mounts deterministic
Sort the list of mount points by destination. This makes the list
deterministic for reproducible builds and also ensures that, e.g.,
the mount for /dev happens before the mount for /dev/pts.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-29 14:10:38 +00:00
Rolf Neugebauer
2fec949cd9 build: Make list of capabilities deterministic
Sort list of capabilities that go into config.json.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-29 14:10:38 +00:00
Rolf Neugebauer
93596225da build: Fix timestamp of files created by 'docker export'
Currently 'docker export' is used to convert a linuxkit entry
in the YAML file to a tar file of the root filesystem. This
process creates a number of files and directories which have
the timestamp of when the 'docker export' is run. Fix 'em up.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-29 14:10:38 +00:00
Rolf Neugebauer
5cbc156faf build: Improve debug output
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-29 14:10:38 +00:00
Rolf Neugebauer
02579b22e5 build: Fix the ModTime for files created during build
When creating files for the "intermediate" tar ball,
fix the ModTime. This reduces the difference between
LinuxKit images build from identical inputs.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-29 14:10:38 +00:00
Justin Cormack
1616b18fb0 Merge pull request #3252 from rn/kern-up
Update kernels to 4.19.12/4.14.90/4.9.147/4.4.169
2018-12-23 10:08:47 +00:00
Johannes Würbach
81d17a19c4 Add s390x support to binfmt_misc
Signed-off-by: Johannes Würbach <johannes.wuerbach@googlemail.com>
2018-12-22 22:50:37 +01:00
Rolf Neugebauer
618c8675e3 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-22 13:29:37 +00:00
Rolf Neugebauer
4863059b7e kernels: Enable Netronome drivers for x86/arm64
packet.net will soon have x86 and arm64 machines with NFPs.
Enable the driver for it.

The 4.9 kernel only has support for the NFP VF driver,
so don't enable it there.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-22 11:11:27 +00:00
Rolf Neugebauer
6bda9db3fc kernel: Adjust kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-22 11:04:51 +00:00
Rolf Neugebauer
cdcfcb7347 kernel: Update to 4.19.12/4.14.90/4.9.147/4.4.169
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-22 10:19:45 +00:00
Rolf Neugebauer
4e634e3b29 Merge pull request #3173 from duraki/3172-enable-CAN
Enable CAN networking subsystem
2018-12-20 23:47:31 +00:00
Rolf Neugebauer
5b5f272890 Merge pull request #3205 from alicefr/fix_qemu_dockerfile
Missing s390x in the switch for qemu Dockerfile
2018-12-20 23:45:14 +00:00
Rolf Neugebauer
9d1838d812 Merge pull request #3235 from kkroo/qemu_usb
Add qemu USB device pass through
2018-12-20 23:42:53 +00:00
Rolf Neugebauer
884ec0ad0e Merge pull request #3248 from rn/kern-up
Update kernels to 4.9.11/4.14.89/4.9.146/4.4.168
2018-12-20 23:41:16 +00:00
Rolf Neugebauer
42bb50d22b Update YAMLs to the latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-20 00:58:15 +00:00
Rolf Neugebauer
4ae342c097 kernel: Update to 4.19.11/4.14.89/4.9.146/4.4.168
Note this skips 4.19.10. The diff is pretty small.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-19 22:28:00 +00:00
Rolf Neugebauer
581e924e13 Merge pull request #3247 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20181218
2018-12-18 22:16:56 +00:00
Jason A. Donenfeld
4621b91939 wireguard: upgrade to 0.0.20181218
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-12-18 18:06:35 +01:00
Rolf Neugebauer
3f164b3648 Merge pull request #3246 from fntlnz/update-influxdb
Update InfluxDB example to 1.7
2018-12-17 08:24:33 +00:00
Lorenzo Fontana
344b27ab4f Update InfluxDB example to 1.7
Signed-off-by: Lorenzo Fontana <lo@linux.com>
2018-12-17 00:23:32 +01:00
Rolf Neugebauer
2ee84cbac7 Merge pull request #3244 from rn/kern-up
Update kernel to 4.19.9/4.14.88/4.9.145/4.4.167
2018-12-14 11:03:19 +00:00
Rolf Neugebauer
9c0e356d2c Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-14 01:18:30 +00:00
Rolf Neugebauer
65e2c50b88 kernel: Update to 4.19.9/4.14.88/4.9.145/4.4.167
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-13 23:24:01 +00:00
Rolf Neugebauer
52d2d21501 Merge pull request #3243 from rn/kern-up
Kernel update to 4.19.8/4.14.87/4.9.144
2018-12-09 19:40:29 +00:00
Rolf Neugebauer
1d92c003f9 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-09 17:53:48 +00:00
Rolf Neugebauer
a26ff89ce8 kernel: Update to 4.19.8/4.14.87/4.9.144
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-09 13:46:31 +00:00
Rolf Neugebauer
b987627a1f Merge pull request #3230 from simar7/bpftrace-pkg
pkg/bpftrace: Add bpftrace as a core pkg
2018-12-08 09:44:35 +00:00
Simarpreet Singh
5c4523939b pkg/bpftrace: Add a trivial test for pkg/bpftrace
Signed-off-by: Simarpreet Singh <simar@linux.com>
2018-12-07 15:18:06 -08:00
Simarpreet Singh
3e0686e5c2 pkg/bpftrace: Add bpftrace as a core pkg
Signed-off-by: Simarpreet Singh <simar@linux.com>
2018-12-07 14:31:43 -08:00
Rolf Neugebauer
7dab747345 Merge pull request #3242 from rn/kern-up
Update kernels to 4.19.7/4.14.86/4.9.143
2018-12-07 13:44:40 +00:00
Rolf Neugebauer
a5e65cfeea Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-07 00:36:45 +00:00
Rolf Neugebauer
055c0f8403 kernel: Tweak the x86 kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-06 21:55:49 +00:00
Rolf Neugebauer
765cf6c917 kernel: Update to 4.19.7/4.14.86/4.9.143
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-06 20:38:45 +00:00
Rolf Neugebauer
953e63ec55 Merge pull request #3239 from rn/kern-up
Update kernels up to 4.19.6/4.14.85/4.9.142/4.4.166
2018-12-06 15:27:20 +00:00
Justin Cormack
9fbf50c303 Merge pull request #3240 from rn/nov-2018
November 2018 development report
2018-12-06 13:46:58 +01:00
Rolf Neugebauer
37db2de25d November 2018 development report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-04 19:12:17 +00:00
Rolf Neugebauer
2a1f90fff1 Update YAMLs to latest kernel
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-04 08:32:56 +00:00
Rolf Neugebauer
2b6a0e15bb kernel: Update to 4.19.6/4.14.85/4.9.142/4.4.166
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-03 23:51:48 +00:00
Rolf Neugebauer
1d405ae5cf kernel: Update to 4.19.5/4.14.84/4.9.141/4.4.165
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-12-03 22:03:55 +00:00
Omar Ramadan
71808a004d Add qemu USB devices
Signed-off-by: Omar Ramadan <omar.ramadan93@gmail.com>
2018-11-27 09:39:12 -08:00
Rolf Neugebauer
ed57c3d1e2 Merge pull request #3234 from rn/kern-up
Update kernels to 4.19.3/4.18.20/4.14.82/4.9.138/4.4.164
2018-11-26 13:46:29 -08:00
Rolf Neugebauer
7f22f68152 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-24 14:41:48 +00:00
Rolf Neugebauer
63cfbb28d2 kernel: Disable ACPI_WMI for x86
WMI is mostly used for laptops and not relevant for
VMs and servers. Disable it.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-23 23:59:15 +00:00
Rolf Neugebauer
70f320db20 kernels: Update to 4.19.4/4,14.83/4.9.140
This skips 4.9.139 which is just two revert commits from
4.9.140.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-23 23:44:34 +00:00
Rolf Neugebauer
28ce2bbdca kernel: Remove support for 4.18.x
4.18.20 was the last 4.18.x release. Remove it.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-23 23:40:44 +00:00
Rolf Neugebauer
07064da303 Update YAMLs to lates kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-23 20:13:55 +00:00
Justin Cormack
36aa581400 Merge pull request #3225 from rn/vmlinux
Add experimental support for building uncompressed kernels
2018-11-23 11:18:19 +00:00
Rolf Neugebauer
f1667aac67 contrib: Update crosvm README
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-22 23:03:26 +00:00
Rolf Neugebauer
fa719063a8 contrib: Update crosvm to latest version
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-22 23:03:26 +00:00
Rolf Neugebauer
f635cad7a6 build: Add support for decompressing bzLinux kernels
Support plain gzip'ed files, as used on arm64, and bzImage with
embedded gzip'ed kernel, as used on x86.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-22 23:03:26 +00:00
Rolf Neugebauer
1257fd9ce9 kernel: Adjust 4.4 config for x86
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-22 22:42:00 +00:00
Rolf Neugebauer
ab3f4950aa kernel: Adjust arm64 4.14 config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-22 22:06:44 +00:00
Rolf Neugebauer
92d6966307 kernel: Updat to 4.19.3/4.18.20/4.14.82/4.9.138/4.4.164
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-22 20:44:45 +00:00
Rolf Neugebauer
09fbcb59d7 cmd: Add scaffolding to decompress the kernel
Add the '-vmlinux' flag to build and pass it all
the way to the kernel filter.

Note, this commit only adds the flag but does not
yet perform the decompression. This will be added
with the next commit.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-20 21:22:49 +00:00
Rolf Neugebauer
4f0cec5c14 build: Restructure the kernel filter
Stash the kernel image in a local buffer and
flush it out once done.

This is preparation work for supporting uncompressed
kernels in the next commit.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-20 21:22:49 +00:00
Rolf Neugebauer
a33d8024cb Merge pull request #3232 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20181119
2018-11-19 19:36:14 +00:00
Jason A. Donenfeld
dfc05c676f wireguard: upgrade to 0.0.20181119
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-11-19 18:30:34 +01:00
Rolf Neugebauer
82a4b54290 Merge pull request #3231 from TiejunChina/master-dev
update -rt to 4.14.78-rt47
2018-11-19 08:26:45 +00:00
Tiejun Chen
116f9be99b update -rt to 4.14.78-rt47
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2018-11-18 15:56:01 -08:00
Justin Cormack
8e205102b6 Merge pull request #3229 from rn/kern-up
Kernel update to 4.19.2/14.18.19/4.14.81/4.9.137
2018-11-16 10:35:31 +00:00
Rolf Neugebauer
fc571c65a8 Merge pull request #3228 from asbjornenge/patch-1
Update ADOPTERS.md
2018-11-16 08:48:35 +00:00
Asbjorn Enge
0e53147270 Update ADOPTERS.md
Added us 😄👍

Signed-off-by: Asbjørn Enge <asbjorn@hanafjedle.net>
2018-11-16 08:40:46 +01:00
Rolf Neugebauer
c0b826c088 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-16 00:55:38 +00:00
Rolf Neugebauer
535cbfaf32 kernel: Adjust 4.18.x kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-15 22:54:05 +00:00
Rolf Neugebauer
8b816a87a5 kernel: Adjust 4.19.x kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-15 22:14:28 +00:00
Rolf Neugebauer
9482281f5b kernel: Update to 4.19.2/4.18.19/4.14.81/4.9.137
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-15 22:11:30 +00:00
Rolf Neugebauer
1d2389b20f Merge pull request #3227 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20181115
2018-11-15 22:10:14 +00:00
Jason A. Donenfeld
7494396812 wireguard: upgrade to 0.0.20181115
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-11-15 12:13:38 -08:00
Justin Cormack
67fdff0c4e Merge pull request #3226 from justincormack/adopters
Add incomplete ADOPTERS file
2018-11-15 13:16:41 +00:00
Justin Cormack
59ccb84338 Add incomplete ADOPTERS file
Please add your use cases here. There are many adopters that I know about but have not
documented here, please fill this in.

I divided this into production users, and also linked a selection of open source projects
that I know about here.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-11-15 11:28:50 +00:00
Rolf Neugebauer
0c5adbde54 Merge pull request #3223 from rn/kern-up
Kernel update to 4.18.18/4.14.80/4.9.136/4.4.163
2018-11-13 14:58:57 +00:00
Rolf Neugebauer
9f38b4c9aa Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-13 08:30:12 +00:00
Rolf Neugebauer
cc544d1cf2 kernel: Update to 4.18.18/4.14.80/4.9.136/4.4.163
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-12 21:49:34 +00:00
Justin Cormack
14233c2322 Merge pull request #3222 from rn/kup
Update kernel to 4.19.1/4.18.17/4.14.79
2018-11-10 14:55:03 +00:00
Rolf Neugebauer
e746d3e2c7 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-10 12:18:57 +00:00
Rolf Neugebauer
3c5062ff9b kernel: Update to 4.19.1/4.18.17/4.14.79
Also fix the boolean expression for 'perf' in the Dockerfile.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-10 10:26:22 +00:00
Rolf Neugebauer
077e31c10a kernel: Remove unused config files
A previosu commit removed suppoer for 4.18.x kernels for
arm64 and s390x but did not remove the config files. Fix it.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-09 22:51:22 +00:00
Justin Cormack
77d7debd40 Merge pull request #3218 from rn/2018-oct
October 2018 development report
2018-11-02 08:43:53 -07:00
Rolf Neugebauer
58f94915d9 October 2018 development report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-11-02 00:22:30 +00:00
Ian Campbell
292dbdf46f Merge pull request #3212 from ijc/containerd-v1.2.0
containerd v1.2.0
2018-10-30 15:05:31 +00:00
Ian Campbell
ab8524d3d1 Bump yml to pickup containerd v1.2.0
Also pick a newer version of runc.

Signed-off-by: Ian Campbell <ijc@docker.com>
2018-10-30 11:08:50 +00:00
Ian Campbell
ce126caf3a Bump runc to version from containerd v1.2.0
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-10-30 10:53:47 +00:00
Ian Campbell
1292f7aa87 Bump packages to new alpine w/ containerd v1.2.0
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-10-30 10:53:47 +00:00
Ian Campbell
544c8256ea alpine: Bump to containerd v1.2.0
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-10-30 06:53:32 -04:00
Ian Campbell
a4ca9fa674 getty&ssh: bind /var/lib/containerd
Needed for containerd v1.2.0 otherwise:

    $ ctr run -t docker.io/library/hello-world@sha256:f3b3b28a45160805bb16542c9531888519430e9e6d6ffc09d72261b0d26ff74f test
    [ 1311.667587] overlayfs: failed to resolve '/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/5/fs': -2
    ctr: failed to mount /tmp/containerd-mount111658703: no such file or directory

Signed-off-by: Ian Campbell <ijc@docker.com>
2018-10-30 09:29:54 +00:00
Ian Campbell
e78b25062c scripts: support credentials helpers on Linux
On Linux a key in `~/.docker/config.json` indicates if a credentials helper is
in use (and which), if one is then the method is identical to the Darwin case
so refactor to support that.

Signed-off-by: Ian Campbell <ijc@docker.com>
2018-10-30 09:29:19 +00:00
Rolf Neugebauer
eac17cc85f Merge pull request #3214 from rn/crosvm
Update crosvm
2018-10-29 23:58:41 +00:00
Rolf Neugebauer
e2f0c496cb contrib/crosvm: Update to the latest crosvm version
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-29 22:37:14 +00:00
Rolf Neugebauer
19826fe96a contrib/crosvm: Update rust to 1.30
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-29 22:30:28 +00:00
Rolf Neugebauer
3f35a7e594 contrib/crosvm: Fix crosvm README
Fix the 'linuxkit build' invocation and remove the duplicated
'minimal.yml' file.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-29 22:30:21 +00:00
Rolf Neugebauer
09420e89f1 Merge pull request #3213 from rn/build-improv
build: Don't create empty kernel/cmdline files
2018-10-29 22:27:24 +00:00
Rolf Neugebauer
1ec59f9aeb build: Don't create empty kernel/cmdline files
If the YAML does not specify a kernel, kernel commandline
or any containers, don't create empty files. Note, an
initrd file is still created if the kernel image contains
CPU ucode.

This only applies to kernel+initrd and tar-kernel-initrd
output formats.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-29 21:03:47 +00:00
Rolf Neugebauer
ddb0fa509e Merge pull request #3211 from rn/kern19
Add 4.19 kernels (and remove 4.18 for arm64 and s390x)
2018-10-29 18:46:16 +00:00
Rolf Neugebauer
26b692d815 tests: Add 4.19 tests
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-29 00:24:27 +00:00
Rolf Neugebauer
e90c9a0687 kernel: perf only for LTS and latest stable/disable for arm64
The logic for perf became too complex. Just build for latest LTS
and latest stable.

Disable for arm64 for now as it is broken for 4.19 due to a header
mismatch:

In file included from /linux/tools/arch/arm64/include/uapi/asm/unistd.h:20:0,
                 from libbpf.c:36:
/linux/tools/include/uapi/asm-generic/unistd.h:754:0: error: "__NR_fcntl" redefined [-Werror]

In file included from /usr/include/sys/syscall.h:4:0,
                 from /linux/tools/perf/perf-sys.h:7,
                 from libbpf.c:35:
/usr/include/bits/syscall.h:26:0: note: this is the location of the previous definition

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-28 21:46:14 +00:00
Rolf Neugebauer
1467a70b44 kernel: Compile bcc for 4.19 instead of 4.18 (x86_64 only)
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-27 12:37:51 +01:00
Rolf Neugebauer
936d47fd2f kernel: Remove 4.18.x for arm64 and s390x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-27 12:37:16 +01:00
Rolf Neugebauer
2d483ca898 kernel: Add support for the 4.19 kernel
The kernel configs were constructed by running the 4.18.x config
through the 4.19 oldconfig process.

The 4.19.x has a new option, RANDOM_TRUST_CPU, which indicates
if the CPUs random instruction is to be trusted. It defaults to
"no" and this default was accepted.

Most of the defaults were accepted, except for:
BLK_CGROUP_IOLATENCY=y
NFT_TUNNEL=y
NFT_OSF=y
NFT_TPROXY=y
NETFILTER_XT_MATCH_SOCKET=y
NET_VENDOR_CADENCE=n
NET_VENDOR_NETERION=n
NET_VENDOR_PACKET_ENGINES=n

We also disallow CIFS for insecure legacy servers:
CIFS_ALLOW_INSECURE_LEGACY=n

For arm64, the following changes were made to the default:
SENSORS_RASPBERRYPI_HWMON=y
CRYPTO_DEV_QCOM_RNG=m
CRYPTO_DEV_HISI_SEC=m

For s390x, the additional changes were made to the default:
KERNEL_BZIP2 (default is gzip)
GCC_PLUGINS=y
GCC_PLUGIN_STRUCTLEAK=y
GCC_PLUGIN_STRUCTLEAK_BYREF_ALL=y
GCC_PLUGIN_RANDSTRUCT=y
GCC_PLUGIN_RANDSTRUCT_PERFORMANCE=y

Running the 4.18 and 4.19 kernel config through
./scripts/kconfig-split.py yields the following 4.19.x
only config options for x86_64:

The x86_64 kernel difference to 4.18 for

CONFIG_ARCH_SUPPORTS_ACPI=y
CONFIG_BLK_CGROUP_IOLATENCY=y
CONFIG_BNXT_HWMON=y
CONFIG_BUILD_SALT=""
CONFIG_CONSOLE_LOGLEVEL_QUIET=4
CONFIG_CRASH_CORE=y
CONFIG_HAVE_ARCH_PREL32_RELOCATIONS=y
CONFIG_HAVE_RELIABLE_STACKTRACE=y
CONFIG_MEMCG_KMEM=y
CONFIG_MLX5_EN_ARFS=y
CONFIG_MLX5_EN_RXNFC=y
CONFIG_NETFILTER_NETLINK_OSF=y
CONFIG_NETFILTER_XT_MATCH_SOCKET=y
CONFIG_NFT_OSF=y
CONFIG_NFT_TPROXY=y
CONFIG_NFT_TUNNEL=y
CONFIG_NF_SOCKET_IPV4=y
CONFIG_NF_SOCKET_IPV6=y
CONFIG_XEN_SCRUB_PAGES_DEFAULT=y

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-27 12:23:52 +01:00
Rolf Neugebauer
899c242430 Merge pull request #3210 from rn/kern-up
Kernel update to 4.18.16/4.14.78/4.9.135/4.4.162
2018-10-21 14:54:10 -07:00
Rolf Neugebauer
6cf141011c Update YAMLs to the latest kernel
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-21 18:51:09 +01:00
Rolf Neugebauer
35a72cc63c kernel: Update to 4.18.16/4.14.78/4.9.135/4.4.162
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-21 13:04:44 +01:00
Rolf Neugebauer
6b7b64fb08 kernel: Update to 4.18.15/4.14.77/4.9.134/4.4.161
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-20 14:16:28 +01:00
Rolf Neugebauer
40d223b654 kernel: Update to 4.18.14/4.14.76/4.9.133/4.4.160
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-20 11:40:30 +01:00
Rolf Neugebauer
4ed9e4f0d3 kernel: Adjust 4.18.x kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-20 01:27:15 +01:00
Rolf Neugebauer
2f9528f278 Merge pull request #3208 from justincormack/authorsup
Update Authors
2018-10-19 17:25:39 -07:00
Rolf Neugebauer
564a2e85d0 kernel: Update to 4.18.13/4.14.75/4.9.132
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-20 01:08:53 +01:00
Rolf Neugebauer
5b2bdd3ef7 kernel: Print unified diff if kernel config does not match
After 'make oldconfig' we check that that the kernel config
is as we expect and error if they don't. We used to print
the default 'diff' output on a mismatch but a unified diff
is easier to read.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-20 01:05:05 +01:00
Justin Cormack
d3dfdedb0b Update Authors
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-10-19 16:42:53 +01:00
Rolf Neugebauer
73dd7b219d Merge pull request #3206 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20181018
2018-10-18 00:02:44 -07:00
Jason A. Donenfeld
bbb459c2ad wireguard: upgrade to 0.0.20181018
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-10-18 03:48:12 +02:00
Alice Frosi
8dd28e8e92 Add missing s390x in the switch for qemu Dockerfile
Signed-off-by: Alice Frosi <afrosi@de.ibm.com>
2018-10-17 17:41:58 +02:00
Justin Cormack
31e7201413 Merge pull request #3199 from zimbatm/patch-1
README: add the LinuxKit Nix project
2018-10-16 16:01:27 +01:00
Justin Cormack
b7119b2ca5 Merge pull request #3202 from ebriand/gcp-validate-project-name
GCP: validate project name
2018-10-16 14:53:06 +01:00
Eric Briand
4fb5ecd066 gcp: output error message when client could not be created
Signed-off-by: Eric Briand <eric.briand@gmail.com>
2018-10-16 11:57:30 +02:00
Eric Briand
0c6a059f71 gcp: check if bucket exists after client creation
Signed-off-by: Eric Briand <eric.briand@gmail.com>
2018-10-16 11:57:30 +02:00
Eric Briand
b15d0963f4 gcp: validate if project name is filled
Signed-off-by: Eric Briand <eric.briand@gmail.com>
2018-10-16 11:57:30 +02:00
zimbatm
720cfbe249 README: add the LinuxKit Nix project
Signed-off-by: zimbatm <zimbatm@zimbatm.com>
2018-10-16 10:53:30 +02:00
Rolf Neugebauer
34b1b2207f Merge pull request #3198 from TiejunChina/master-dev
update -rt
2018-10-15 22:29:46 -07:00
Tiejun Chen
59cf2ceea6 update -rt to 4.14.71-rt44
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2018-10-15 12:57:29 -07:00
Rolf Neugebauer
40905a2117 Merge pull request #3203 from justincormack/lint
Fix golint on circleci and GCP testing
2018-10-15 12:31:54 -07:00
Justin Cormack
50dd28899f Sleep in GCP test
It seems we exit before we connect to the serial console.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-10-15 18:03:17 +01:00
Justin Cormack
78005d87ec Fix golint on circleci
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-10-15 13:53:42 +01:00
Rolf Neugebauer
2e710766e3 Merge pull request #3194 from rn/kup
Kernel update to 4.18.12/4.14.74/4.9.131
2018-10-08 02:46:55 +01:00
Rolf Neugebauer
f268754257 Merge pull request #3196 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20181006
2018-10-06 10:41:17 +01:00
Jason A. Donenfeld
49e6aed4fb wireguard: upgrade to 0.0.20181006
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-10-06 05:07:57 +02:00
Rolf Neugebauer
116acb9de2 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-06 01:11:13 +01:00
Rolf Neugebauer
1854a59e9f kernel: Update to 4.18.12/4.14.74/4.9.131
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-04 21:07:47 +01:00
Rolf Neugebauer
893bc8fea2 Merge pull request #3193 from rn/kern-up
Kernel update to 4.18.11/4.14.73/4.9.130/4.4.159
2018-10-02 08:03:40 +01:00
Rolf Neugebauer
841026d311 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-01 22:50:46 +01:00
Rolf Neugebauer
d026556652 Merge pull request #3192 from rn/rep-09-2018
September 2018 development report
2018-10-01 21:46:24 +01:00
Rolf Neugebauer
6c9f15522e September 2018 development report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-01 19:18:03 +01:00
Rolf Neugebauer
7b1c1b1818 kernel: Update to 4.18.11/4.14.73/4.9.130/4.4.159
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-10-01 19:03:09 +01:00
Rolf Neugebauer
5a6fb46b6e Merge pull request #3191 from rn/kup
Kernel update to 4.18.10/4.14.72/4.9.129/4.4.158
2018-09-28 20:29:35 +03:00
Rolf Neugebauer
6bed1aa330 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-28 08:15:08 +01:00
Rolf Neugebauer
617154e2a4 kernel: Update to 4.18.10/4.14.72/4.9.129/4.4.158
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-27 19:42:54 +01:00
Rolf Neugebauer
f5cf0bd054 kernel: Update build to latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-27 19:38:33 +01:00
Justin Cormack
77b6cf0b50 Merge pull request #3190 from ijc/containerd-v1.1.4
Containerd v1.1.4
2018-09-25 09:48:36 -07:00
Ian Campbell
c60cef7be2 Bump yml to pickup containerd v1.1.4
Also pick a newer version of runc.

Signed-off-by: Ian Campbell <ijc@docker.com>
2018-09-25 16:28:56 +01:00
Ian Campbell
2ddce9bdea Bump runc to version from containerd v1.1.4
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-09-25 15:55:08 +01:00
Ian Campbell
809d257502 Bump packages to new alpine w/ containerd v1.1.4
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-09-25 15:55:07 +01:00
Ian Campbell
2ad451867e alpine: Bump to containerd v1.1.4
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-09-25 10:54:53 -04:00
Justin Cormack
d7da083c5e Merge pull request #3189 from rn/kern-up
Update kernels to 4.18.9/4.14.71/4.9.128/4.4.157
2018-09-22 16:55:05 +01:00
Rolf Neugebauer
8f8d8e3beb Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-21 21:48:32 +01:00
Rolf Neugebauer
9c1277787b kernel: Update to 4.18.9/4.14.71/4.9.128/4.4.157
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-20 21:19:31 +01:00
Rolf Neugebauer
ae0ddb2053 Merge pull request #3187 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180918
2018-09-18 20:36:00 +03:00
Jason A. Donenfeld
10c3de3ded wireguard: upgrade to 0.0.20180918
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-09-18 16:56:10 +02:00
Rolf Neugebauer
51a476c8aa Merge pull request #3186 from rn/kup
Update kernels to 4.18.8/4.14.70/4.9.127/4.4.156
2018-09-16 20:27:20 +03:00
Rolf Neugebauer
e61a1a7078 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-16 13:21:12 +01:00
Rolf Neugebauer
a6f7d40d07 kernel: Update to 4.18.8/4.14.70/4.9.127/4.4.156
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-15 19:40:16 +01:00
Rolf Neugebauer
8d7586b867 kernel: Adjust arm64 kernel config
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-15 16:45:14 +01:00
Rolf Neugebauer
c33c14d810 kernel: Update to 4.18.7/4.14.69/4.9.126/4.4.155
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-15 16:02:40 +01:00
Rolf Neugebauer
a503f8c3f3 Merge pull request #3185 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180910
2018-09-11 05:23:18 +01:00
Jason A. Donenfeld
8be1a84dee wireguard: upgrade to 0.0.20180910
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-09-10 18:59:29 -06:00
Rolf Neugebauer
0532b2889a Merge pull request #3184 from mat007/fix-windows
Fix path separator on Windows
2018-09-10 22:26:43 +01:00
Mathieu Champlon
54868329e6 Fix path separator on Windows
On Windows os.PathSeparator is \ but here it's all unix file paths being manipulated.

Signed-off-by: Mathieu Champlon <mathieu.champlon@docker.com>
2018-09-10 21:53:09 +02:00
Justin Cormack
576eab21c1 Merge pull request #3183 from mat007/fix-windows
Fix relative path under Windows
2018-09-10 15:17:49 +01:00
Mathieu Champlon
e17b603be8 Fix relative path under Windows
Using filepath primitives instead of manipulating file paths manually takes care of platform specific formats.

Signed-off-by: Mathieu Champlon <mathieu.champlon@docker.com>
2018-09-10 14:41:43 +02:00
Rolf Neugebauer
816ef159d5 Merge pull request #3182 from rn/lern-up
Update kernels to 4.18.6/4.14.68/4.9.125/4.4.154
2018-09-07 22:16:18 +01:00
Rolf Neugebauer
98961e962c Update YAMLs to latest kernel
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-06 07:47:15 +01:00
Rolf Neugebauer
2743d53a7c kernel: Adjust x86_64 kernel config for 4.18.x and 4.14.x
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-06 07:47:15 +01:00
Rolf Neugebauer
4c725f0318 kernel: Cherry pick multicast fixes into 4.9.x
This cherry picks:
- b6fe0440c637 ("bridge: implement missing ndo_uninit()")
- b1b9d366028f ("bridge: move bridge multicast cleanup to ndo_uninit")

The fix is in b1b9d366028f ("bridge: move bridge multicast cleanup
to ndo_uninit") but it requires b6fe0440c637 ("bridge: implement missing
ndo_uninit()"). Furthermore, b1b9d366028f needed some manual resolution
of a cherry-pick conflict because the surrounding code had changed.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-06 07:47:15 +01:00
Rolf Neugebauer
0a9361d769 kernel: Update to 4.18.6/4.14.68/4.9.125/4.4.154
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-05 21:23:15 +01:00
Rolf Neugebauer
32bc34d168 Merge pull request #3177 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180904
2018-09-05 01:32:09 +02:00
Jason A. Donenfeld
e446af1659 wireguard: upgrade to 0.0.20180904
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-09-04 12:34:05 -06:00
Rolf Neugebauer
c8449ba2db Merge pull request #3175 from rn/kmisc
EOL 4.17.x, update to 4.4.153, fix BCC build
2018-09-04 00:16:14 +02:00
Justin Cormack
07470f43b8 Merge pull request #3176 from rn/2018-aug-report
Add August 2018 development report
2018-09-03 22:48:53 +01:00
Rolf Neugebauer
fc8079bf98 Add August 2018 development report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-03 21:43:12 +01:00
Rolf Neugebauer
a83e4ca5ba Update YAMLs to linuxkit/kernel:4.4.153
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-03 21:26:42 +01:00
Rolf Neugebauer
763deafd03 kernel: Update to 4.4.153
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-03 20:52:56 +01:00
Rolf Neugebauer
973c62a7f8 tests: Remove 4.17.x kernel tests
4.17 has been EOLed

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-03 20:52:56 +01:00
Rolf Neugebauer
4f29de94ad kernel: Remove 4.17.x. It has been EOLed
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-03 20:52:50 +01:00
Rolf Neugebauer
287c579934 kernel: Compile bcc for 4.18 not 4.17
We want to compile BCC for the latest LTS and the latest
stable and missed the update to 4.18 when enabling it. Do
it now.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-09-03 20:52:50 +01:00
Rolf Neugebauer
66f85ffeba Merge pull request #3170 from rn/kup
Update kernels up to 4.18.5/4,17.19/4.14.67/4.9.124/4.4.152
2018-09-03 21:40:28 +02:00
duraki
1a23054800 Enables CAN networking subsystem (introduced Linux 2.6.25 2008-04-17), to
support SPI in container environment (introduced Linux 4.12 2017-06-02).

Abstraction define interface EP for CAN module in containered environment. This
namespace is available and introduced with Linux Kernel 4.12 by M.  Kicherer
and later O. Hartkopp, to allow containers bridging such device.

@see linux-kernel/net/can@fc4c581

Although KSPP did not explicilty noted `CAN` as secure kernel flag, this
would aim to bring such conclusion. As for security concerns, CAN protocol did
not yield any user-land or host-level vulnerabilities since introduced as
SocketCAN module in Linux Kernel. Lower-layer [protocol] standards is not
secured by default since applications are supposed to implement their own
security mechanism.

This global abstraction currently supports CAN raw, proc and af_can
codes. Does not support GW and BCM. Namespace uses _NEWNET on pseudo-file
system.  Allows modprobe to environment, works by recv `pnet` for the given
interface.

Signed-off-by: Halis Duraki <duraki@linuxmail.org>
2018-08-31 13:22:19 +02:00
Rolf Neugebauer
262e6ed3ec Merge pull request #3171 from ijc/containerd-v1.1.3
Containerd v1.1.3
2018-08-30 20:13:47 +02:00
Ian Campbell
610bfd3e11 Bump yml to pickup containerd v1.1.3
Also pick a newer version of runc.

Signed-off-by: Ian Campbell <ijc@docker.com>
2018-08-30 13:58:12 +01:00
Ian Campbell
e1c6ae1678 Bump runc to version from containerd v1.1.3
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-08-30 13:40:00 +01:00
Ian Campbell
ad556eab78 Bump packages to new alpine w/ containerd v1.1.3
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-08-30 13:40:00 +01:00
Ian Campbell
f7c93dc4eb alpine: Bump to containerd v1.1.3
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-08-30 08:39:46 -04:00
Rolf Neugebauer
97ef9fb47c Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-28 22:31:46 +01:00
Rolf Neugebauer
323043fdd8 kernel: Update to 4.18.5/4.17.19/4.14.67/4.9.124/4.4.152
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-28 07:24:36 +01:00
Rolf Neugebauer
77b3496d9f kernel: Update to 4.18.4/4.17.18/4.14.66/4.9.123/4.4.151
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-27 21:45:04 +01:00
Rolf Neugebauer
d66c2c6f45 kernel: Update to 4.18.3/4.17.17/4.14.65/4.9.122/4.4.150
Note, this update skips 4.18.2/4.17.16/4.14.64/4.9.121/4.4.149
as the change was a single patch, a bug fix.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-27 18:38:42 +01:00
Rolf Neugebauer
621f88f47e Merge pull request #3169 from TiejunChina/master-dev
update -rt to 4.14.63-rt40
2018-08-27 18:29:52 +02:00
Rolf Neugebauer
89063f4ec5 Merge pull request #3160 from kmjohansen/topics/container-perf
Improve docker container startup times on 4.14, 4.17, and 4.18
2018-08-27 18:28:46 +02:00
Tiejun Chen
a302b2dfa2 update -rt to 4.14.63-rt40
Signed-off-by: Tiejun Chen <tiejunc@vmware.com>
2018-08-26 17:07:40 -07:00
Rolf Neugebauer
0278d74e41 Merge pull request #3166 from l0rd/fix-docker-for-mac-sample
Update docker for mac sample to use iso-efi format
2018-08-23 11:19:51 +02:00
Mario Loriedo
5b1852cfcb Update docker for mac sample to use iso-efi format
Signed-off-by: Mario Loriedo <mario.loriedo@gmail.com>
2018-08-22 13:54:22 +02:00
Rolf Neugebauer
0560fa409f Merge pull request #3164 from l0rd/fix-typo
Fix typo in examples/docker-for-mac.md
2018-08-21 12:11:57 +02:00
Krister Johansen
1095c2721d Convert slow net subsystems to modules on 4.14.
In setup_net() there are a few particularly slow subsystems that
contribute more than 140ms of time to the new net namespace creation
path.  The docker daemon doesn't depend on these, and won't modprobe
them into the kernel.  Convert these to modules to reduce the amount of
time it takes for docker to start a container.  This change takes an
additional ~120 ms of time off container start time.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2018-08-20 17:45:54 -07:00
Krister Johansen
fac99683a7 Switch kernel hz to 1000.
While investigating performance problems around 'docker run' times, it
was observed that a large amount of time was spent in network namespace
creation.  Of that time, a large portion involved waiting for RCU grace
periods to elapse.  Increasing HZ causes the periodic timer to check for
quiesced periods more frequently, which consequently reduces the amount
of time RCU callers spend waiting for grace periods and in barrier
waits.

By itself, this change took the amount of time to execute a 'docker run
hello-world' down to 570ms from over 2000ms on 4.14, and down to 390ms
from 1260 on 4.17 and 4.18.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2018-08-20 17:45:03 -07:00
Rolf Neugebauer
38766bf2b9 Merge pull request #3163 from rn/kernel-up
Update kernels, Intel ucode and add 4.18.x kernels
2018-08-20 17:32:42 +01:00
Mario Loriedo
62c46e10f2 Fix typo in examples/docker-for-mac.md
Signed-off-by: Mario Loriedo <mario.loriedo@gmail.com>
2018-08-20 18:29:09 +02:00
Rolf Neugebauer
6a4d5c970d tests: Update YAMLs to latest kernel config package
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-18 15:47:28 +01:00
Rolf Neugebauer
d003df7b91 tests/kernel-config: Adjust STACKPROTECTOR check for 4.18
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-18 15:42:38 +01:00
Rolf Neugebauer
c6a5439c67 tests: Update bcc test
This updates the package to versions which actually exist
on hub but does not enable the test.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-18 10:56:38 +01:00
Rolf Neugebauer
ab48e4d5e4 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 21:17:04 +01:00
Rolf Neugebauer
64f7e544df tests: Add 4.18.x kernel module test
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 21:13:25 +01:00
Rolf Neugebauer
509e07e63e tests: Add 4.18.x kernel config test
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 21:11:54 +01:00
Rolf Neugebauer
4977514c99 tests: Compact kernel tests
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 21:10:46 +01:00
Rolf Neugebauer
bcd87f6f33 kernel: Remove 4.17.x kernel for s390x and arm64
4.17 will be EOLed soon anyway so save some cycles
compiling kernels on the "slower" arches.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 21:07:08 +01:00
Rolf Neugebauer
dfa6076900 kernel: Add support for 4.18.x kernels
The kernel config was derived from the 4.17.x kernel config
and then tweaked a little. Specifically:
- Enable XDP_SOCKETS
- Enable NFT_CONNLIMIT
- Enable IP_VS_MH
- Enable BPFILTER (as module)

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 16:57:36 +01:00
Rolf Neugebauer
a3bca0ea59 kernel: Add more packages to Dockerfile.kconfig
These packages are needed to enable the GCC_PLUGINS
during 'make oldconfig' for 4.18.x kernels.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 16:57:36 +01:00
Rolf Neugebauer
f93fa6ba9b kernel: Adjust 4.9 kernel config (x86 only)
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 16:57:36 +01:00
Rolf Neugebauer
85369b936f kernel: Adjust 4.14. kernel config (x86 only)
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 16:57:36 +01:00
Rolf Neugebauer
c0fc7b3b01 kernel: Adjust 4.17 kernel config (x86 only)
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 16:57:36 +01:00
Avi Deitcher
a9da8c624d Merge pull request #3162 from deitch/update-compose
Update and fix compose project
2018-08-17 15:19:38 +03:00
Rolf Neugebauer
a1380fcd1c kernel: Update to 4.17.15/4.14.63/4.9.120/4.4.148
The 4.14.63 contains important security fixes in particular
against L1TF (CVE-2018-3615, CVE-2018-3620, CVE-2018-3646) and
userspace-userspace SpectreRSB.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 12:11:04 +01:00
Rolf Neugebauer
5011c473ca kernel: Update Intel microcode to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 11:58:42 +01:00
Avi Deitcher
219e9ec727 Fix static where it tries to delete read-only containers
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2018-08-17 13:33:35 +03:00
Rolf Neugebauer
4792fa5015 kernel: Tidy up Dockerfile.bcc
Use less layers and group it a little better. There should
be no real code change here.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-17 11:18:38 +01:00
Rolf Neugebauer
c0aecf8f26 Merge pull request #3101 from kmjohansen/topics/ebpf
Enable building of bcc in kernel build
2018-08-16 14:57:43 +02:00
Krister Johansen
6e48041dee Add a test case for bcc to packages.
Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2018-08-13 17:18:56 -07:00
Krister Johansen
0643093f6a Remove ebpf from projects
Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2018-08-13 17:18:56 -07:00
Krister Johansen
a6ac644703 Add some documentation.
Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2018-08-13 17:18:55 -07:00
Krister Johansen
188595fcb5 Pull bcc into kernel build.
Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2018-08-13 17:18:55 -07:00
Krister Johansen
194fef33cf Get bcc project building again.
Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2018-08-13 11:28:44 -07:00
Rolf Neugebauer
50904b9f9d Merge pull request #3150 from djs55/revendor-virtsock
Update the vendoring of virtsock
2018-08-13 17:46:00 +02:00
David Scott
4f389eb5a6 Update yamls following virtsock revendor
linuxkit/vsudd:98e554e4f3024c318e42c1f6876b541b654acd9f
linuxkit/host-timesync-daemon:613dc55e67470ec375335a1958650c3711dc4aa6
linuxkit/test-virtsock:57883002c2bc824709efa6cd3818e1ff51a11889
linuxkit/test-ns:a21f996641f391d467a7842e85088a304d24fae5

Signed-off-by: David Scott <dave.scott@docker.com>
2018-08-13 14:16:47 +01:00
Rolf Neugebauer
972c41c4fa Merge pull request #3158 from rn/dock-up
Update all uses of DinD to 18.06.0-ce
2018-08-12 23:18:16 +02:00
Rolf Neugebauer
ff02f6eaa8 Merge pull request #3157 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180809
2018-08-12 12:40:09 +02:00
Rolf Neugebauer
0cb45e0dff doc: Update release doc with DinD uses which should get updated
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-12 10:50:20 +01:00
Rolf Neugebauer
e392ccce5c tests: Update docker bench to 18.0.6-ce
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-12 10:42:37 +01:00
Rolf Neugebauer
971c7fb251 examples: Update all DinD uses to 18.06.0-ce
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-12 10:42:03 +01:00
Jason A. Donenfeld
d987c058bd wireguard: upgrade to 0.0.20180809
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-08-12 01:27:53 -07:00
Rolf Neugebauer
086aa356e7 Merge pull request #3156 from rn/july-report
July 2018 report
2018-08-11 18:51:43 +02:00
Rolf Neugebauer
2eefd6db67 Merge pull request #3155 from rn/kups
Update kernels up to 4.17.14/414/62/4.9.119/4.4.147
2018-08-11 18:51:29 +02:00
Rolf Neugebauer
11d95b61d8 July 2018 report
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-11 11:56:06 +01:00
Rolf Neugebauer
468cbef99d Update YAMLs to the latest kernels
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-11 11:09:47 +01:00
Rolf Neugebauer
394b07da4a kernel: Update to 4.17.14/4.14.62/4.9.119/4.4.147
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-11 09:36:23 +01:00
Rolf Neugebauer
ac48c843e0 kernel: Update to 4.17.13/4.14.61/4.9.118/4.4.146
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-11 00:23:50 +01:00
Rolf Neugebauer
2e32902c98 kernel: Update to 4.17.12/4.14.60/4.9.117/4.4.145
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-10 23:20:43 +01:00
Rolf Neugebauer
9ac0a9a6e3 kernel: Update to 4.17.11/4.14.59/4.9.116
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-08-10 14:26:16 +01:00
Rolf Neugebauer
bdae7d72f7 Merge pull request #3149 from TiejunChina/master-dev
update -rt to 4.14.59-rt37
2018-08-07 16:37:35 +01:00
Rolf Neugebauer
9945d5f6b7 Merge pull request #3151 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180802
2018-08-07 16:36:38 +01:00
Jason A. Donenfeld
7a74c0a212 wireguard: upgrade to 0.0.20180802
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-08-03 22:12:29 +02:00
David Scott
1aae3e309b pkg/virtsock: update vendording of linuxkit/virtsock
Signed-off-by: David Scott <dave.scott@docker.com>
2018-08-02 16:09:35 +01:00
David Scott
5d44a0a33d pkg/ns: update vendoring of virtsock
Signed-off-by: David Scott <dave.scott@docker.com>
2018-08-02 16:09:35 +01:00
David Scott
24a6112548 pkg/host-timesync-daemon: update vendoring of linuxkit/virtsock
Signed-off-by: David Scott <dave.scott@docker.com>
2018-08-02 16:09:29 +01:00
David Scott
50199d5bd5 pkg/vsudd: update the vendoring of linuxkit/virtsock
In addition to bug fixes, this removes the special protocol used
for `shutdown` needed by old Windows builds < 14393.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-08-02 16:09:24 +01:00
Justin Cormack
ccf7ac8081 Merge pull request #3148 from masterzen/fix/3140-vbox-multiple-disks
Enhance `run vbox` to support multiple disks and network adapters
2018-08-02 11:26:02 +01:00
Brice Figureau
02e5f70589 Allow to specify more than one networking adapter for vbox
Note: this patch introduces an incompatibility in the
`linuxkit run vbox` arguments.

It wasn't impossible to specify more than one network adapter
to the `linuxkit run vbox` command.

This patch allows to specify more than one `-networking` argument to specify
different network adapters.

For instance:
~~~sh
linuxkit run vbox -networking type=nat -networking type=hostonly,adapter=vboxnet0
~~~
will setup the VM with 2 NICs.

It is also possible to get rid of the `type` argument.

Signed-off-by: Brice Figureau <brice@daysofwonder.com>
2018-08-02 10:34:26 +02:00
Tiejun Chen
b8928d6c56 update -rt to 4.14.59-rt37
Signed-off-by: Tiejun Chen <tiejun.china@gmail.com>
2018-08-01 21:19:37 -07:00
Brice Figureau
f1f128c6dd Allow linuxkit run vbox to use multiple drives
VirtualBox hardware (like physical hardware) has only a limited number
of IDE device on an IDE Controller.
Unfortunately when using an additional drive, it was given the port
value of 2, which doesn't exists in VirtualBox IDE controllers (as
only 0 and 1 are permitted).

This change makes use of the SATA Controller which can host much
more drives, to hook the additional drives.

Signed-off-by: Brice Figureau <brice@daysofwonder.com>
2018-07-31 18:27:54 +02:00
Justin Cormack
4968390a92 Merge pull request #3141 from masterzen/fix/3091-enforce-PAX-for-all-files
Fix #3091 enforce all outgoing tar files to use PAX
2018-07-29 11:35:48 -07:00
Brice Figureau
7a7f5f66c2 Fix #3091 enforce all outgoing tar files to use PAX
While processing the content of a tar image, linuxkit's moby tool is
blindly reusing the original tar format.

Moreover it locates the files under a new prefix, so if the original
file was stored as USTAR in the original archive, the filename length
and new prefix could be greater than the USTAR name limit leading
to a fatal error.

The fix is to always enforce PAX format on all copied files from the
original image archive.

Signed-off-by: Brice Figureau <brice-puppet@daysofwonder.com>
2018-07-29 11:03:44 +02:00
Rolf Neugebauer
deb627e56b Merge pull request #3143 from rn/symlink-fix
cmd/pkg: Fix symlink handling in pkg build context
2018-07-27 20:23:52 +01:00
Rolf Neugebauer
23555494fe cmd/pkg: Fix symlink handling in pkg build context
When building the build context, symlink need special
treatment as the link name needs to be added when
building the tar.FileInfoHeader. This code does that.

We may also need to add a special case for hard links
as the moby/moby package 'archive' does, but this
should for now
fixes #3142

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-27 18:39:08 +01:00
Rolf Neugebauer
26ae9a0246 Merge pull request #3139 from rn/post_v0.6
Update version to v0.6+
2018-07-27 01:37:27 +01:00
Rolf Neugebauer
434ee1dffd Update version to v0.6+
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-27 00:06:06 +01:00
Rolf Neugebauer
10f07ca162 Merge pull request #3138 from rn/rel_v0.6
Release prep for v0.6
2018-07-27 00:03:32 +01:00
Rolf Neugebauer
483e7fd111 Update CHANGELOG
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 21:10:37 +01:00
Rolf Neugebauer
9edd8b232b Bump version to v0.6
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 21:02:29 +01:00
Rolf Neugebauer
8f841600a4 doc: Add updating AUTHORS to release steps
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 21:01:59 +01:00
Rolf Neugebauer
bb7961344d Update my email in AUTHORS and MAINTAINERS
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 21:00:24 +01:00
Rolf Neugebauer
d5d4d6fe0d Update package tags to v0.6
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 20:57:30 +01:00
Rolf Neugebauer
3084225180 example: Update docker DIND to 18.06.0
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 20:06:45 +01:00
Rolf Neugebauer
21ff90c4c7 pkgs: Update packages to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 20:03:09 +01:00
Rolf Neugebauer
6fcd0e8429 tests: Update tests cases to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 20:02:29 +01:00
Rolf Neugebauer
27bb10a14c Update use of test packages to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 20:02:12 +01:00
Rolf Neugebauer
2b1428b3d6 tests: Update packages to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 19:49:40 +01:00
Rolf Neugebauer
169e97fe52 Update use of tools to latest
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 19:49:18 +01:00
Rolf Neugebauer
768593b951 tools: Update to the latest linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-26 19:22:42 +01:00
Rolf Neugebauer
ca53674154 tools/alpine: Update to latest
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-26 14:20:05 -04:00
Rolf Neugebauer
bfa8be505b Merge pull request #3136 from rn/sources
Allow external directories for 'linuxkit pkg build'
2018-07-26 18:06:15 +01:00
Rolf Neugebauer
29dd9f2004 doc: Add 'sources' documentation
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-26 16:23:35 +01:00
Rolf Neugebauer
bebde3a2ea cmd/pkg: Build a build context from 'sources'
This is the final piece. If 'sources' are defined, tar up
the sources and rewrite them accordingly. Pass it as build
build context to 'docker'.

This allows building from something like this:

  ├── etc
  │   ├── foo
  └── foo
      ├── Dockerfile
          ├── build.yml
          └── main.go

With 'build.yml':

  image: foo
  extra-sources:
    - ../etc:etc

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-26 16:23:35 +01:00
Rolf Neugebauer
b03288f5b4 cmd/pkg: Add the ability to pass a build context to docker
This commit adds the ability to add a build context to
docker for the package build. The build context is passed
on stdin to the docker process.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-26 16:23:34 +01:00
Rolf Neugebauer
ba4d1c79b0 cmd/pkg: Extract 'extra-sources' and adjust hash calculation
If the build.yml specifies 'extra-sources', ie sources
outside the package directory, calculate the hash based on
the tree hash of all source directories and the package
directory.

Note, this requires the source directories to be under
git revision control.

Also clean up the src and dst of the path and stash the
result in the Pkg structure.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-26 16:23:34 +01:00
Rolf Neugebauer
75149c56c2 cmd/pkg: Add 'extra-source' field to the pkg schema
And 'sources' to the Pkg structure

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-26 14:27:54 +01:00
Rolf Neugebauer
ce6b15c0b6 Merge pull request #3137 from rn/kup
Kernel update to 4.17.10/4.14.58/4.9.115/4.4.144
2018-07-26 07:51:36 +01:00
Rolf Neugebauer
0c631d104f Update YAMLs to latest kernels.
Looks like I missed a few 4.4.x updates to the YAMLs.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-25 23:02:39 +01:00
Rolf Neugebauer
21fb4db99b kernel: Update to 4.17.10/4.14.58/4.9.115/4.4.144
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-25 21:09:25 +01:00
Rolf Neugebauer
d2b8f5291d Merge pull request #3135 from rn/kernel-iso
Add kernel+iso output
2018-07-25 13:14:19 +01:00
Rolf Neugebauer
cad4248024 tests: Fix summary for build format tests
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-25 11:41:36 +01:00
Rolf Neugebauer
b0212e7023 tests: Test kernel+iso format
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-25 11:41:32 +01:00
Rolf Neugebauer
69d913c5a7 cmd: Add 'kernel+iso' output format
This output format create a kernel + and straight data ISO.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-25 11:34:36 +01:00
Rolf Neugebauer
594ce1251d tools: Add a mkimage variant to build a non-bootable ISO.
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-25 11:25:59 +01:00
Rolf Neugebauer
1f9b598b1c Merge pull request #3134 from rn/tools-fix
Fix mkimage- builds
2018-07-24 23:57:17 +01:00
Rolf Neugebauer
66b7417819 cmd: Update mkimage-* hashes
Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-24 22:30:53 +01:00
Rolf Neugebauer
a9552aee2d tools: Fix mkimage-squashfs
Us a scratch image as the base instead of the alpine
base image.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-24 22:30:53 +01:00
Rolf Neugebauer
fe569b627a tools: Fix mkimage-raw-efi
Use a scratch image as the base instead of the full
alpine base.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-24 22:30:53 +01:00
Rolf Neugebauer
24d8ecc943 tools: Fix mkimage-raw-bios
Build the final image from scratch instead of the full
alpine base image.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-24 22:30:53 +01:00
Rolf Neugebauer
99e65ef998 tools: Fix mkimage-qcow2-efi
Build the final image from scratch instead of the full
alpine base.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-24 22:30:53 +01:00
Rolf Neugebauer
47bff24b94 tools: Fix mkimage-iso-efi
Build the final image from SCRATCH instead of the alpine base.
Should be a lot smaller now.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-24 22:30:53 +01:00
Rolf Neugebauer
4ca0458526 tools: Use a multi-stage build for mkimage-iso-bios
mkimage-iso-bios contained the full alpine base. Only
copy packages actually needed.

Signed-off-by: Rolf Neugebauer <rn@rneugeba.io>
2018-07-24 22:30:53 +01:00
Rolf Neugebauer
d04a42868f Merge pull request #3132 from rn/kernel-up
Update kernels to 4.17.8/4.17.9/4.14.57/4.9.114/4.4.142/4.4.143
2018-07-24 19:15:23 +01:00
Rolf Neugebauer
c2a083118e Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-24 16:25:52 +01:00
Rolf Neugebauer
6bfba4e85c kernel: Adjust arm64 kernel config to upstream changes
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-24 13:13:42 +01:00
Rolf Neugebauer
480a8bc860 kernel: Update to 4.17.9/4.14.57/4.9.114/4.4.143
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-24 11:56:25 +01:00
Rolf Neugebauer
5ab7eaac89 kernel: Update to 4.17.8/4.4.142
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-24 10:26:37 +01:00
Rolf Neugebauer
8dcddf6be4 Merge pull request #3126 from djs55/logwrite-extension
memlogd/logwrite: use the same naming convention as init
2018-07-20 20:08:44 +01:00
David Scott
d6e7fb9549 Update yaml to linuxkit/memlogd:ba4fcf55c35a3833546a1e39125bf0fa940327b0
Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-20 17:06:15 +01:00
Rolf Neugebauer
eede8a5dc7 Merge pull request #3125 from rn/auth
Enable 'linuxkit build' with private repositories and registries
2018-07-20 16:47:26 +01:00
David Scott
ddee5f27f3 memlogd/logwrite: use the same naming convention as init
In e8786d73bb the logwrite package will
automatically append .log to every log.

In 5201049f2c the init package will send
stderr of a service `s` to a log named `s` and the stdout to `s.out`.
Therefore the files we create on disk are `s.log` and `s.out.log`.

This patch modifies the memlogd `logwrite` command-line wrapper to use
the same convention.

Note there is a confusing name clash between `pkg/logwrite` and `cmd/logwrite`
in `memlogd` modified here.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-20 15:31:29 +01:00
Rolf Neugebauer
5dcb3d48cb docs: Update documentation regarding private repos
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-20 14:35:45 +01:00
Rolf Neugebauer
04c061fb8c docs: Remove note on private images
It no longer applies.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-20 13:48:27 +01:00
Rolf Neugebauer
615b122767 cmd: Add support for private repositories and registries
This commit adds support for authentication for image pulls for
'linuxkit build'. For each image reference we look up credentials
via the docker CLI configuration and use it if defined for
a given registry server. The code caches credentials to avoid
lookups for every image.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-20 13:48:26 +01:00
Rolf Neugebauer
1679668121 cmd: Vendor 'github.com/docker/cli' and its deps
This vendors the bits from 'github.com/docker/cli' needed
to pull private images.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-20 13:48:26 +01:00
Rolf Neugebauer
e410070401 cmd: Use "context" instead of "x/net/context"
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-20 13:11:20 +01:00
Rolf Neugebauer
c4f8af23ff cmd: Update vendoring to for docker/docker and dependencies
A subsequent commit will enable support for private repositories.
This requires some functions from 'github.com/docker/cli' which
in turn relies on some newer versions of some of the vendored
packages here.

In this commit, update all packages used here to the versions
used by 'github.com/docker/cli' release 18.06 (the latest stable).

This requires vendoring a bunch of additional packages, such
as prometheus

Also run 'sort' over 'vendor.conf' to keep things in order.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-20 13:11:20 +01:00
Rolf Neugebauer
5d7c1b215a Merge pull request #3124 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180718
2018-07-19 08:13:41 +01:00
Jason A. Donenfeld
f8b14ba25a wireguard: upgrade to 0.0.20180718
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-07-19 00:00:08 +02:00
Rolf Neugebauer
3520778dcf Merge pull request #3122 from rn/kup
Kernel update to 4.17.7/4.14.56/4.9.113/4.4.141
2018-07-17 18:59:06 +01:00
Rolf Neugebauer
3a03177791 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-17 16:57:50 +01:00
Rolf Neugebauer
1896951b04 kernel: Tweak config for x86
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-17 15:00:23 +01:00
Rolf Neugebauer
f70fc83b1d kernel: Update to 4.17.7/4.14.56/4.9.113/4.4.141
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-17 13:48:18 +01:00
Rolf Neugebauer
aa37cf250f Merge pull request #3121 from rn/authors
Update AUTHORS
2018-07-17 13:20:15 +01:00
Rolf Neugebauer
9b0173a183 Update AUTHORS
We had a few contributors to `moby/tool`. Since this is merged here
update AUTHORS list.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-17 11:51:17 +01:00
Rolf Neugebauer
090f461e7f Merge pull request #3117 from steeve/patch-1
Change GCP metadata SSH keys URL
2018-07-16 20:40:59 +01:00
Rolf Neugebauer
358f1a812a Merge pull request #3115 from justincormack/merge-moby-tool
Merge moby tool back into LinuxKit
2018-07-16 17:52:37 +01:00
Steeve Morin
0748457296 examples: Update linux/metadata:721562e6f3ba9b6c003f9e746ff7ee94796f5251
Signed-off-by: Steeve Morin <steeve.morin@gmail.com>
2018-07-16 18:50:01 +02:00
Justin Cormack
cf5cec204d Update LinuxKit for merge of moby tool
- use the mkimage hashes that we had in LinuxKit as more up to date than tool.
- update docs
- move the code from moby under src/cmd/linuxkit

Signed-off-by: Justin Cormack <justin@specialbusservice.com>
2018-07-16 14:22:15 +01:00
Ian Campbell
5fd9470215 Merge pull request #3119 from ijc/containerd-v1.1.2
Containerd v1.1.2
2018-07-16 12:40:57 +01:00
Ian Campbell
1dfe16e570 Bump yml to pickup containerd v1.1.2
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-07-16 10:57:37 +01:00
Ian Campbell
eb48b1284c Bump packages to new alpine w/ containerd v1.1.2
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-07-16 10:29:41 +01:00
Ian Campbell
6b6596f881 alpine: Bump to containerd v1.1.2
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-07-16 05:29:27 -04:00
Steeve Morin
33b6fc77ea Change GCP metadata SSH keys URL
According to [1] the URL is not sshKeys but ssh-keys now.

[1] https://cloud.google.com/compute/docs/storing-retrieving-metadata

Signed-off-by: Steeve Morin <steeve.morin@gmail.com>
2018-07-15 01:29:31 +02:00
Rolf Neugebauer
d05c9c0af6 Merge pull request #3116 from rn/kernel-up
Update kernels to 4.17.6/4.14.55/4.9.112/4.4.140 + test fixes
2018-07-14 21:42:31 +01:00
Rolf Neugebauer
68cacfe871 tests: Fix the kernel in some tests
These must have fallen through the crack during various
kernel updates. Move everything to the latest 4.14.x kernel.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-14 14:47:52 +01:00
Rolf Neugebauer
e3369b11a6 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-14 14:45:55 +01:00
Rolf Neugebauer
c9dc3b97de kernel: Update to 4.17.6/4.14.55/4.9.112/4.4.140
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-14 13:10:03 +01:00
Justin Cormack
021b5718f8 Merge moby/tool into LinuxKit
Note these ended up with unrelated histories in the export process.

Signed-off-by: Justin Cormack <justin@specialbusservice.com>
2018-07-14 11:26:02 +01:00
Justin Cormack
b807994372 Remove all the parts we do not need when merged back into LinuxKit
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-07-14 10:44:21 +01:00
Rolf Neugebauer
3e4a5342b2 Merge pull request #3113 from rn/test-fix
Update linuxkit/alpine for test cases
2018-07-13 21:35:46 +01:00
Rolf Neugebauer
6b6c93d9d8 Merge pull request #3114 from djs55/kmsg.stderr
Write stderr to /var/log/<name>.log
2018-07-13 13:45:54 +01:00
David Scott
887810a773 Update yml to linuxkit/kmsg:cf3dc833591838596427aac032c829ea592599d0
Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-13 11:48:16 +01:00
David Scott
637b1bdb3f pkg/kmsg: write to stderr (instead of stdout)
Part of #3111

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-13 11:48:16 +01:00
David Scott
70385eb86e Update yml to linuxkit/init:3f1e5c32d6ca9e83a7ea7ad9854da2032971a83f
Signed-off-by: David Scott <dave@recoil.org>
2018-07-13 11:48:16 +01:00
David Scott
7c243a8e8b pkg/init: only create /var/log/onboot symlink if not using memlogd
When logging directly to files (the not-using-memlogd case) the onboot
services must log to /run/log because /var/log might be overmounted
by a persistent disk. Therefore we create a symlink at the end of
the onboot section.

When logging via memlogd, all logs are buffered until a logwrite service
starts, so no symlink is needed.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-13 11:47:43 +01:00
David Scott
5201049f2c pkg/init: write stderr to <name> rather than <name>.err
This will then be written to disk as <name>.log by logwrite.

Part of #3111

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-13 10:48:31 +01:00
Justin Cormack
72e919f4b3 Merge pull request #3112 from rn/bcc-pkg
Add packages needed for iovisor/bcc
2018-07-12 11:06:35 +01:00
Rolf Neugebauer
59e04612b4 docs: Add update of test cases to release doc
While at it also improve the commit messages.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-12 10:38:32 +01:00
Rolf Neugebauer
1ebc8c0099 tests: Update linuxkit/alpine for tests as well.
I missed this during the recent updates.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-12 10:34:12 +01:00
Rolf Neugebauer
3beb03c684 tools/alpine: Update linuxkit/alpine
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-11 23:59:20 +00:00
Rolf Neugebauer
7d9457382c tools/alpine: Add packages needed for the iovisor/bcc tools
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-12 00:25:30 +01:00
Rolf Neugebauer
ecd412d087 Merge pull request #3109 from rn/log
Add '.log' as file extension to 'pkg/logwrite' files
2018-07-11 22:03:35 +01:00
Rolf Neugebauer
71b5dc8010 Update YAMLs to new logwrite package
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-11 19:17:01 +01:00
Rolf Neugebauer
83f3c58c50 examples: Use alpine:3.8 in logging example
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-11 15:55:28 +01:00
Rolf Neugebauer
d92ca6d6e4 tests: Adjust logging test to new .log extension
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-11 15:55:28 +01:00
Rolf Neugebauer
e8786d73bb pkg/logwrite: Append .log to the log files
Also simplify the code by directly storing the path to
the log file in the LogFile structure.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-11 15:55:27 +01:00
Rolf Neugebauer
90765efac5 Merge pull request #3107 from rn/typo
Fix typo in CHANGELOG
2018-07-11 13:27:23 +01:00
Rolf Neugebauer
77eafc5d6d Fix typo in CHANGELOG
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-11 10:26:02 +01:00
Rolf Neugebauer
fa3bbe3867 Merge pull request #3105 from rn/post_rev0.5
Bump version to v0.5+
2018-07-11 10:21:21 +01:00
Rolf Neugebauer
095bacc396 Bump version to v0.5+
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-11 00:00:10 +01:00
Rolf Neugebauer
811ba12cb0 Merge pull request #3104 from rn/rel_v0.5
Preparation for v0.5 release
2018-07-10 23:58:09 +01:00
Rolf Neugebauer
3181a8f182 Update Authors
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-10 18:46:57 +01:00
Rolf Neugebauer
3ab5e19b2f Update CHANGELOG
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-10 18:44:37 +01:00
Rolf Neugebauer
88afbcae15 build: Bump version to v0.5
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-10 18:32:57 +01:00
Rolf Neugebauer
ea9b29bd19 Update package tags to v0.5
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 18:16:02 +01:00
Rolf Neugebauer
b4c3f9db1f pkg/tss: Switch SF repository to our mirror hosted on github
sourceforge git access is not very reliable...

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 18:00:00 +01:00
Rolf Neugebauer
5b4059fcfd docs: Update release documentation
Add notes to update various external packages.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 16:53:49 +01:00
Rolf Neugebauer
4debffafa4 examples/docker: Update to 18.05.0-ce-dind
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 16:53:49 +01:00
Rolf Neugebauer
3672843dc9 pkg/node_exporter: Update to 0.16.0
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 16:53:49 +01:00
Rolf Neugebauer
1a6b6b2db9 pkg/firmware,firmware-all: Update to latest version
Update the the firmware packages to the latest commit
of the upstream linux-firmware repository.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 16:53:49 +01:00
Rolf Neugebauer
46184e258b pkg/cadvisor: Update to 0.30.2
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 16:53:49 +01:00
Rolf Neugebauer
c1e10002b0 pkgs: Update packages to latest alpine base
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 15:49:20 +01:00
Rolf Neugebauer
1b22e1e2be Update use of test packages to latest
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 15:37:09 +01:00
Rolf Neugebauer
ccc6e48f38 tests: Update packages to latest alpine base
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 15:14:12 +01:00
Rolf Neugebauer
a0a4ec5449 Update use of tools to latest
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 15:13:58 +01:00
Rolf Neugebauer
cd4d50920a tools: Update to latest alpine base
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 14:59:45 +01:00
Rolf Neugebauer
4eddd90ae2 Merge pull request #3103 from rn/kup
Update kernel to 4.17.5/4.14.54
2018-07-10 14:21:06 +01:00
Rolf Neugebauer
4ee42d63b9 Merge pull request #3102 from ijc/containerd-v1.1.1
Containerd v1.1.1
2018-07-10 13:05:11 +01:00
Rolf Neugebauer
a90d4a92d5 Update YAMLs to the latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 13:03:09 +01:00
Rolf Neugebauer
6a7b336ade kernel: Update to 4.17.5/4.14.54
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-10 10:58:18 +01:00
Ian Campbell
ec2dfa6625 Revert "tests: Temporarily disable containerd test"
This reverts commit 177008fe0c. The underlying
issue was fixed in containerd v1.1.1.

Signed-off-by: Ian Campbell <ijc@docker.com>
2018-07-10 10:46:42 +01:00
Ian Campbell
93496067ea Bump yml to pickup containerd v1.1.1
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-07-10 10:19:14 +01:00
Ian Campbell
18f11b2834 Bump packages to new alpine w/ containerd v1.1.1
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-07-10 09:53:11 +01:00
Ian Campbell
8ad9f65ec8 alpine: Bump to containerd v1.1.1
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-07-10 04:52:57 -04:00
Rolf Neugebauer
20bd54c6b0 Merge pull request #3095 from djs55/more-logging
Support log rotation and logging of /dev/kmsg
2018-07-09 22:34:43 +01:00
David Scott
facadbf548 examples/logging: add kmsg to read /dev/kmsg
Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-09 20:36:58 +01:00
David Scott
9344473ba5 pkg/kmsg: add simple test case
Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-09 20:36:58 +01:00
David Scott
e7fc5b59a3 pkg/kmsg: re-run vndr
Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-09 20:36:58 +01:00
David Scott
793dd1b257 Add pkg/kmsg
This very simple program reads from `/dev/kmsg` and logs the output.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-09 20:36:58 +01:00
David Scott
565f787bb3 Add pkg/logwrite which writes and rotates log files
This process connects to memlogd and streams logs to individual files,
one per log. It keeps track of how many bytes have been written to each
file and rotates when the file size exceeds a defined threshold.

By default the maximum size of each file before rotation is 1MiB and
we keep up to 10 files per log.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-09 20:36:51 +01:00
Rolf Neugebauer
4b4d56913d Merge pull request #3100 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180708
2018-07-09 08:39:50 +01:00
Jason A. Donenfeld
05753e7341 wireguard: upgrade to 0.0.20180708
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-07-08 19:43:03 +02:00
Rolf Neugebauer
b305db0ae5 Merge pull request #3098 from rn/alpine3.8
Update to Alpine 3.8
2018-07-07 23:54:07 +01:00
Rolf Neugebauer
177008fe0c tests: Temporarily disable containerd test
Looks like brtfs-prog v4.17 as shipped with alpine:3.8 requires
a loopback device of 109MB while the containerd tests only
create a 100MB device. This causes the test to fail.

Disable it until https://github.com/containerd/containerd/issues/2447
is fixed.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 21:59:40 +01:00
Rolf Neugebauer
8301540809 Update remaining uses of alpine:3.7 to alpine:3.8
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 19:26:58 +01:00
Rolf Neugebauer
63ae346152 Update YAMLs to latest pkg versions
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 19:25:21 +01:00
Rolf Neugebauer
6045ddaf51 pkg: Use alpine 3.8 version of go (no need for go1.10)
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 18:24:56 +01:00
Rolf Neugebauer
a9acdd827e pkg: Update packages to latest alpine base
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 18:05:29 +01:00
Rolf Neugebauer
d7d995cab5 kernel: Update build to use updated alpine base
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 17:51:08 +01:00
Rolf Neugebauer
21f65528d2 Update use of test packages to latest
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 17:50:34 +01:00
Rolf Neugebauer
38636e80d9 tests: Use go (not go1.10) for containerd test
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 14:05:42 +01:00
Rolf Neugebauer
c6c502c631 tests: Update packages to latest alpine base
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 14:03:01 +01:00
Rolf Neugebauer
5c8df3837d Update use of tools to latest
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 14:00:07 +01:00
Rolf Neugebauer
48ca3f1302 tools: Update to latest alpine base
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 13:27:48 +01:00
Rolf Neugebauer
20e71cf09e tools/alpine: Update alpine base
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 08:21:54 -04:00
Rolf Neugebauer
1b23313bb3 tools/alpine: Remove gummiboot for arm64
The package does not exist any more in 3.8 and I can't
see any uses for it.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 11:43:06 +01:00
Rolf Neugebauer
53af0ce80c tools/alpine: Remove go1.10
alpine:3.8 comes with go 1.10 as default

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 09:30:51 +01:00
Rolf Neugebauer
3c492fe40a tools/alpine: Update to alpine:3.8
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-07-07 09:29:59 +01:00
Rolf Neugebauer
29c3ef0aa0 Merge pull request #3085 from djs55/update-logging
Support pluggable logging systems
2018-07-07 09:21:13 +01:00
David Scott
5d614468a0 Update linuxkit/init and linuxkit/memlogd yamls
Signed-off-by: David Scott <dave@recoil.org>
2018-07-06 21:51:04 +01:00
David Scott
9bbc0ecbee projects/logging: delete the remaining unused bits
Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:49:26 +01:00
David Scott
92a9a64a1b examples: add the example from projects/logging
This simplifies the example by adding a service which writes to the
log every 1s and a getty for introspection.

To see the logs:

  /proc/1/root/usr/bin/logread -F

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:49:26 +01:00
David Scott
a07ecf60d5 memlogd: use kmsg format for reading the logs
Switch to a more formally-specified `kmsg`-style format for reading
the logs.

- update the spec in docs/logging.md
- check for bad names in pkg/memlogd with unit test

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:49:26 +01:00
David Scott
fe64f33430 memlogd: add test cases
- check writing to the log does not block
- check the log doesn't expand -- it should be finite
- check that client connections don't buffer arbitrary amounts of
  data if the client is slow

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:49:26 +01:00
David Scott
6aca715ad8 memlogd: replace an unbounded buffer with bounded channel
Previously we had a per-connection

  bytes.Buffer // to be written to the connection
  sync.Cond    // to allow us to Wait for more data

This had the major disadvantage that the buffer was unbounded and so
a slow client could cause memory exhaustion in the server. This patch
replaces these with a single

  chan *logEntry

which is naturally bounded and supports blocking read. We make write
non-blocking using select i.e. we drop messages rather than allocate
more space.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:49:26 +01:00
David Scott
3e742018d6 memlogd: use net.Conn rather than *net.UnixConn
There's no need to be so specific about the connection implementation.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:49:25 +01:00
David Scott
c92af038fb projects/logging: promote pkg/memlogd to a toplevel package
This is an example external logging service which can be enabled by
adding it to the `init` section of the .yml, for example:

    ...
    init:
      - linuxkit/init:35866bb276c264a5f664bfac7456f4b9eeb87a4d
      - linuxkit/runc:v0.4
      - linuxkit/containerd:f2bc1bda1ab18146967fa1a149800aaf14bee81b
      - linuxkit/ca-certificates:v0.4
      - linuxkit/memlogd:cc035e5c9e4011ec1ba97a181a6689fc90965ce9
    onboot:
    ...

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:49:25 +01:00
David Scott
638c455dd2 docs: document how to use an external logging service
This is an updated version of projects/logging/README.md

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:49:25 +01:00
David Scott
f4bbce7a6c service: use the logging system with runc
If external logging is enabled, this patch sets the stdout and stderr
of the `runc` invocations to one end of a socketpair and the other end is
sent to the logging service. Otherwise we log to files as before.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:49:21 +01:00
David Scott
4dc75bc67b service: use the logging system with containerd
An external logging system exists if the socket

  /var/run/linuxkit-external-logging.sock

exists.

If an external logging system is enabled then create FIFOs for
containerd and send the other end of the FIFOs to the logging service.
Otherwise use /var/log files as before.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:48:57 +01:00
David Scott
1795c15276 projects/logging: start memlogd from init.d
Previously memlogd would always run in the foreground. This patch
adds a `-daemonize` option which binds the /var/run sockets, forks
and execs itself and immediately returns. Therefore the program won't
block (important for an init.d script) but guarantees the sockets will
be available for any program started afterwards.

This also removes the alpine base from the memlogd image as `init`
"containers" are treated as simple file overlays.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:47:50 +01:00
David Scott
6dfd40a639 projects/linuxkit: bind /var/run in the memlogd container
We will place the control sockets in the root /var/run and then share
with all services who need access.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:47:50 +01:00
David Scott
d09fbe04fb projects/logging: use /var/run for sockets by default
Previously we used /tmp, but /var/run is a better place for these.

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:47:49 +01:00
David Scott
8727bcb4f3 projects/logging: fix govet composite literal error
This fixes the error

net.UnixAddr composite literal uses unkeyed fields

Signed-off-by: David Scott <dave.scott@docker.com>
2018-07-06 21:47:49 +01:00
David Scott
6eabfdcb96 projects/logging: add modern build.yml and Dockerfile
Signed-off-by: David Scott <dave@recoil.org>
2018-07-06 21:47:49 +01:00
Rolf Neugebauer
2c8438f64b Merge pull request #3093 from TiejunChina/master-dev
update -rt to 4.14.53-rt34
2018-07-06 11:11:03 +01:00
Tiejun Chen
a1d47ff766 update -rt to 4.14.53-rt34
Signed-off-by: Tiejun Chen <tiejun.china@gmail.com>
2018-07-06 14:02:07 +08:00
Rolf Neugebauer
9088e3f843 Merge pull request #3088 from rn/kernel-up
Update kernel to 4.17.4/4.14.53/4.9.11/4.4.139
2018-07-05 10:15:07 +01:00
Justin Cormack
e1cff3614a Merge pull request #3090 from rn/june-report
June 2018 LinuxKit report
2018-07-05 10:00:06 +01:00
Rolf Neugebauer
977dec7ae2 Merge pull request #216 from justincormack/gnutar2
Use PAX tar format
2018-07-04 16:08:57 +01:00
Rolf Neugebauer
91bed426f1 Merge pull request #3089 from masterzen/fix/3087-faq-and-motd
Some FAQ and motd update
2018-07-04 15:05:54 +01:00
Brice Figureau
9a1d9fb1eb Add FAQ entries to help troubleshoot running containers
Since I struggled to understand and find information about how to
troubleshoot a running linuxkit instance, I propose to add these two
FAQ entries.
The first one explains why it is possible to not see the `containerd` or
`init` outputs at boot in the console.
The second one gives a few `ctr` example to list containers, running
containers or how to open a shell in a given container.

Signed-off-by: Brice Figureau <brice@daysofwonder.com>
2018-07-04 13:51:19 +02:00
Rolf Neugebauer
b859e7ab4d June 2018 LinuxKit report
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-04 11:24:25 +01:00
Rolf Neugebauer
498d4f1a91 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-04 10:38:55 +01:00
Brice Figureau
f7ff31382b Make sure motd contains the correct ctr command
The listed namespace wasn't correct, and thus the given `ctr` command
wasn't working.

Signed-off-by: Brice Figureau <brice@daysofwonder.com>
2018-07-04 11:32:36 +02:00
Rolf Neugebauer
909a9fac68 Merge pull request #3086 from mat007/fix-windows-build
Fix windows build
2018-07-03 18:19:46 +01:00
Rolf Neugebauer
dcc4a5e799 kernel: Update to 4.17.4/4.14.53/4.9.111/4.4.139
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-07-03 11:49:36 +01:00
Mathieu Champlon
d3e3df3d73 Append .exe to binaries on Windows
Signed-off-by: Mathieu Champlon <mathieu.champlon@docker.com>
2018-07-03 12:03:43 +02:00
Mathieu Champlon
82867aa114 Set proper GOOS for Windows
Signed-off-by: Mathieu Champlon <mathieu.champlon@docker.com>
2018-07-03 12:02:35 +02:00
Rolf Neugebauer
9dac66b831 Merge pull request #3078 from justincormack/dhcp-hook-fix
Fix dhcpcd hooks config
2018-06-29 19:02:24 +01:00
Justin Cormack
f6af74b6bf Update hashes
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-06-29 16:40:52 +01:00
Justin Cormack
157c73cfed Fix dhcpcd hooks config
These were being added to the incorrect directory.

Also move config file to /etc to be more standard.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-06-29 16:31:44 +01:00
Ian Campbell
380e24391d Merge pull request #3084 from ijc/containerd-v1.1.0-rc.2
Containerd v1.1.0-rc.2
2018-06-29 13:30:04 +01:00
Ian Campbell
ad85828d87 Bump yml to pickup containerd v1.1.0-rc.2
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-06-29 10:48:10 +01:00
Ian Campbell
34666cd87d Bump packages to new alpine w/ containerd v1.1.0-rc.2
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-06-28 17:35:04 +01:00
Ian Campbell
779a611d6b alpine: Bump to containerd v1.1.0-rc.2
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-06-28 12:34:50 -04:00
Rolf Neugebauer
b37527c23d Merge pull request #3082 from rn/kup
Update kernels to 4.17.3/4.16.18/4.14.52/4.9.110 and then remove 4.16.x (EOLed)
2018-06-27 16:25:57 +01:00
Rolf Neugebauer
0ee4ab7b7f Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-27 14:52:26 +01:00
Rolf Neugebauer
f7cf178ead kernel: Remove 4.16.x as it is EOLed
The previous commit updated to 4.16.18, which is the last
4.16.x kernel. The 4.16.18 kernel was compiled and pushed
but we may as well now remove it as it has been EOLed.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-27 14:49:08 +01:00
Rolf Neugebauer
e7a7fe9339 kernels: Update to 4.17.3/4.16.18/4.14.52/4.9.110
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-27 13:10:44 +01:00
Rolf Neugebauer
e5a3b36d38 Merge pull request #3080 from alanraison/3079-apk-architecture
Use apk --print-arch to discover architecture
2018-06-27 13:03:26 +01:00
Alan Raison
412857be96 Use apk --print-arch to discover architecture
When dealing with apk, `uname -m` doesn't always match the architecture
name that apk uses. Instead `apk --print-arch` is used.

Signed-off-by: Alan Raison <alanraison@users.noreply.github.com>
2018-06-26 23:16:20 +01:00
Rolf Neugebauer
ef47cd9c98 Merge pull request #3077 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180625
2018-06-25 23:28:57 +01:00
Jason A. Donenfeld
bfd0ba0983 wireguard: upgrade to 0.0.20180625
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-06-25 19:58:49 +02:00
Rolf Neugebauer
8f962b9e4a Merge pull request #3076 from rn/kernel-up
kernel update to 4.16.17/4.14.51/4.4.137/4.4.138
2018-06-22 17:55:07 +01:00
Rolf Neugebauer
e36eae4820 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-22 16:12:34 +01:00
Justin Cormack
561e9375e8 Merge pull request #3075 from justincormack/binfmt_mount
Binfmt fixes
2018-06-22 16:09:34 +01:00
Justin Cormack
8ac642e4e0 Update yaml files for new package
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-06-22 14:18:31 +01:00
Justin Barrick
14ba30f418 Workaround DNS issue with qemu-user-static on alpine by using Debian in the first stage #2710
DNS lookups fail in qemu-user when it is built on Alpine: https://bugs.alpinelinux.org/issues/8131

Until this is resolved, we fetch the binaries from Debian and use those instead. The final stage
of the Dockerfile is still based on scratch.

We can revert this once the Alpine issue is fixed.

Signed-off-by: Justin Barrick <jbarrick@cloudflare.com>
2018-06-22 14:10:50 +01:00
Justin Cormack
a6dbe8ceba Rather than bind mounting binfmt_misc filesystem, mount a copy.
For some reason, bind mounting does not always seem to work,
sometimes the filesystem is empty. Mounting a fresh copy seems
a better solution, and simplifies things. The container does
need `CAP_SYS_ADMIN` but only on boot.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-06-22 14:10:43 +01:00
Rolf Neugebauer
2eec092862 kernel: Adjust kernel configs
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-22 10:01:18 +01:00
Rolf Neugebauer
9f1f99026d kernel: Update to 4.16.17/4.14.51/4.4.138
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-22 10:01:18 +01:00
Rolf Neugebauer
ef5c128a8c kernel: Update to 4.4.137
Somehow I missed this kernel update when it happened...

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-21 16:17:29 +01:00
Rolf Neugebauer
f347ba9412 Merge pull request #3074 from rn/kup
Kernel update to 4.17.2/4.16.16/4.14.50/4.9.109
2018-06-21 08:10:58 +01:00
Rolf Neugebauer
aed5328d2b Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-20 15:36:12 +01:00
Rolf Neugebauer
2ff0491ac1 kernel: Update to 4.17.2/4.16.16/4.14.50/4.9.109
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-20 13:50:23 +01:00
Rolf Neugebauer
268b5269f9 kernel: Update to 4.9.108
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-20 13:19:24 +01:00
Rolf Neugebauer
9817d7eb3c Merge pull request #3073 from ijc/containerd-v1.1.1-rc.1
Containerd v1.1.1-rc.1
2018-06-20 08:17:18 +01:00
Ian Campbell
bb307079b0 Bump yml to pickup containerd v1.1.1-rc.1
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-06-19 16:50:56 +01:00
Ian Campbell
90f7d1bed9 Bump packages to new alpine w/ containerd v1.1.1-rc.1
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-06-19 16:01:20 +01:00
Ian Campbell
a5ed0cf40a alpine: Bump to containerd v1.1.1-rc.1
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-06-19 11:00:45 -04:00
Rolf Neugebauer
fe4c7cdb75 Merge pull request #3070 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180613
2018-06-15 00:12:54 +01:00
Jason A. Donenfeld
8ce01c5736 wireguard: upgrade to 0.0.20180613
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-06-14 18:26:41 +02:00
Rolf Neugebauer
ccfdc71a2f Merge pull request #3068 from rn/kernel-up
Update kernel to 4.17.1/4.16.15/4.14.49
2018-06-14 16:45:05 +01:00
Rolf Neugebauer
b698d26c87 Merge pull request #3018 from Sh4d1/scaleway_provider
Add Scaleway provider to linuxkit
2018-06-14 13:18:49 +01:00
Patrik Cyvoct
f088b05e9a Update examples yaml to use new metadata package
Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2018-06-14 12:27:41 +02:00
Patrik Cyvoct
8d5ced3a1d Add documentation for scaleway provider
Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2018-06-14 11:51:06 +02:00
Patrik Cyvoct
3c6434e022 Add scaleway yaml examples
Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2018-06-14 11:51:05 +02:00
Patrik Cyvoct
a6783261f3 Add Scaleway support for linuxkit command line tool
Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2018-06-14 11:51:04 +02:00
Patrik Cyvoct
f8d399490e Add new dependencies
Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2018-06-14 11:51:04 +02:00
Patrik Cyvoct
5ab6b88029 Add Scaleway provider in metadata package
Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2018-06-14 11:51:03 +02:00
Rolf Neugebauer
3a3b487907 Merge pull request #3069 from justincormack/aws-meta
Add support for aws metadata and security groups in linuxkit run
2018-06-14 08:17:11 +01:00
Justin Cormack
068df79031 Add support for aws metadata and security groups in linuxkit run
- set userdata for AWS
- set security group

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-06-13 19:07:12 -07:00
Rolf Neugebauer
1ff88a957c Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-13 13:31:27 +01:00
Avi Deitcher
15b5057a8b Merge pull request #3063 from justinbarrick/master
Add a restart and stop command to service.
2018-06-12 16:54:13 -07:00
justinbarrick
338b1bb017 Update init image hashes.
Signed-off-by: justinbarrick <jbarrick@cloudflare.com>
2018-06-12 15:10:54 -07:00
Justin Barrick
9821180548 Add a restart and stop command to service.
Signed-off-by: justinbarrick <jbarrick@cloudflare.com>
2018-06-12 15:04:16 -07:00
Rolf Neugebauer
45f563fc66 kernel: Update to 4.17.1/4.16.15/4.14.49
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-12 17:18:11 +01:00
Rolf Neugebauer
a6f50ff565 Merge pull request #3066 from rn/auth
Update authors
2018-06-11 22:19:38 +01:00
Rolf Neugebauer
e0c411f5ef Update authors
Also add another alias for @ijc

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-06-11 20:14:30 +01:00
Rolf Neugebauer
a4420a789d Merge pull request #3030 from kmjohansen/kmj-reboot
Reboot should reboot instead of powering off.
2018-06-11 19:54:41 +01:00
Krister Johansen
45222dfaaf Move init image to fbcbbe3ace0b3e9455300017dd07625293a0d4d4.
This attempts to work around a CI issue where we're running out of disk
space when rebuilding the init package.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2018-06-11 08:29:20 -07:00
Krister Johansen
16604bc039 Reboot should reboot instead of powering off.
When busybox's reboot processing occurs in init, it runs all SHUTDOWN
actions that are defined in inittab.  Once those are complete, it will
trigger either a halt, poweroff, or reboot, depending upon what signal
is received.  The mechanism that's used to shell out through inittab
does not allow us to pass through exactly which invocation was
requested.

Due to the way that rc.shutdown works, it invokes the poweroff action
for any and all SHUTDOWN callbacks, whether they're a reboot, poweroff,
or halt.  Instead of handling the reboot(2) syscall in rc.shutdown,
return after killing and unmounting and let busybox's init process
decide which reboot(2) action to use.

Signed-off-by: Krister Johansen <krister.johansen@oracle.com>
2018-06-11 08:29:08 -07:00
Justin Cormack
154a5b3ea6 Merge pull request #3065 from rn/wireguard
tests: Fix wireguard test shutdown
2018-06-09 10:27:50 -07:00
Rolf Neugebauer
00c21a652a tests: Fix wireguard test shutdown
With PR #3030 the behaviour of poweroff/halt is changed. This
test relies on on-shutdown containers to be executed to display
the test result (service containers have their stdout redirected).
Use 'poweroff' (note, no '-f') to ensure that:
- the machine actually powers off
- the on-shutdown container is executed

Note, there are subtle differences between 'poweroff' and 'halt'
between hypervisors. With HyperKit, 'halt' actually works, but with
qemu/kvm, with 'halt' the process does not exit.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-06-09 12:47:46 +01:00
Rolf Neugebauer
3195451ec4 Merge pull request #3062 from rn/kern-up
Update kernels to 4.16.14/4.14.48/4.9.10[67]/4.4.136
2018-06-08 21:55:50 +01:00
Rolf Neugebauer
7dbd1a52cd Update YAML files to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-07 15:43:10 +01:00
Rolf Neugebauer
6b629fa30b kernel: Tweak 4.4.x kernel config file
Add new (disabled) option CONFIG_CC_OPTIMIZE_FOR_PERFORMANCE

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-07 13:54:53 +01:00
Rolf Neugebauer
4e830a35a1 kernel: Update to 4.16.14/4.14.48/4.9.107/4.4.136
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-07 12:10:22 +01:00
Rolf Neugebauer
17d9870dd7 kernel: Update to 4.9.106
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-07 11:42:54 +01:00
Rolf Neugebauer
6ad3055401 Merge pull request #3060 from rn/kern-src
Stash kernel source and WireGuard source in the package
2018-06-07 11:29:40 +01:00
Rolf Neugebauer
8a7ba7197e Merge pull request #3061 from justincormack/gcp-userdata
Add support for userdata on GCP plus custom name
2018-06-07 11:29:08 +01:00
Justin Cormack
42397f7f1d Add support for setting different name on GCP
Previously name and image were always the same so running two hosts
from one image was not possible!

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-06-06 16:22:20 -07:00
Justin Cormack
c9db3f0625 Add support for userdata on GCP
This was missing in the linuxkit CLI, even though we support it in the
metadata package.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-06-06 16:05:51 -07:00
Rolf Neugebauer
18ec668c91 kernel: Consistently use curl -f
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-06 18:32:23 +01:00
Rolf Neugebauer
5176ce7dd3 kernel: Stash kernel source and WireGuard source in the package
While we can re-create the kernel source code we don't have it
handily available in one place. This commit stashes the kernel
and the WireGuard source as /src/linux.tar.xz and
/src/wireguard.tar.xz in the kernel package.

This increases the size of the hub image by around 100MB.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-06 18:32:23 +01:00
Avi Deitcher
414b4c5275 Merge pull request #3059 from deitch/motd-namespace-warning
Add services.linuxkit warning to motd for sshd and getty
2018-06-06 17:16:23 +03:00
Rolf Neugebauer
a0e7417968 Merge pull request #3058 from rn/kup
kernel: Add 4.17, update 4.14.47/4.9.106/4.4.135, remove 4.16.x for arm64/s390x
2018-06-06 14:56:55 +01:00
Avi Deitcher
d85ce30e0e Change image sha tags to match latest
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2018-06-06 15:52:49 +03:00
Avi Deitcher
643414f6f4 Add services.linuxkit warning to motd for sshd and getty
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2018-06-06 14:32:12 +03:00
Rolf Neugebauer
193c4fa4da Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-06-06 08:26:54 +01:00
Rolf Neugebauer
3792a61ccb test: Add 4.17.x kernel tests
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-06 08:26:54 +01:00
Rolf Neugebauer
fc6bcde1fd kernel: Remove 4.16 for arm64 and s390x
Trying to keep the number of kernels we compile for these
platforms small and 4.16 is likely to be EOLed soon anyway.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-06 08:26:54 +01:00
Rolf Neugebauer
25738c0768 kernel: Add support for 4.17.x kernels
The kernel configs are the 4.16.x configs run through
a 'make defconfig && make oldconfig' cycle.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-06 08:26:54 +01:00
Rolf Neugebauer
ba5e75a24e kernel: Update to 4.14.47/4.9.105/4.4.135
These releases are a single patch only, fixing  a bug.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-06 08:26:54 +01:00
Rolf Neugebauer
25c74cbfe8 Merge pull request #3056 from rn/sntpc
tools/alpine: Add sntpc to alpine base
2018-06-05 15:11:35 +01:00
Rolf Neugebauer
910d453769 tools/alpine: Add sntpc to alpine base
sntpc is a very simple ntpc client, which may be useful
for some setups.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-06-05 08:10:18 -04:00
Rolf Neugebauer
197f438d1e Merge pull request #3055 from rn/may-report
LinuxKit report May 2018
2018-06-03 15:56:01 +01:00
Rolf Neugebauer
b5a00f17ec LinuxKit report May 2018
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-06-03 14:26:17 +01:00
Ian Campbell
a6925908a6 Merge pull request #3054 from ijc/containerd-v1.1.1-rc.0
Bump to containerd v1.1.1-rc.0
2018-06-01 16:12:00 +01:00
Ian Campbell
56f7a8c9f3 Bump yml to pickup containerd v1.1.1-rc.0
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-06-01 14:24:06 +01:00
Ian Campbell
525ff1c1a8 Bump packages to new alpine w/ containerd v1.1.1-rc.0
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-06-01 14:09:05 +01:00
Ian Campbell
55d66b434f alpine: Bump to containerd v1.1.1-rc.0
Signed-off-by: Ian Campbell <ijc@docker.com>
2018-06-01 08:49:28 -04:00
Rolf Neugebauer
dae753cf0a Merge pull request #3053 from ndauten/memorizer-remove-poison
Memorizer: remove kasan poison on boot
2018-06-01 08:14:52 +01:00
Nathan Dautenhahn
3ddca63774 Memorizer: remove kasan poison on boot
Originally, Memorizer kernel fed inputs to add boot printouts from a debug tool, however, it creates unnecessary output. Remove the kernel boot option parameter.

Signed-off-by: Nathan Dautenhahn <ndd@cis.upenn.edu>
2018-05-31 16:49:27 -04:00
Rolf Neugebauer
81c9e9c58f Merge pull request #3051 from rn/test-wg
tests: Use poweroff instead of halt for wireguard test
2018-05-31 15:55:33 +01:00
Rolf Neugebauer
0676bc7592 tests: Use poweroff instead of halt for wireguard test
The proposed change in https://github.com/linuxkit/linuxkit/pull/3030
seems to timeout on the wireguard test. Try 'poweroff -f' instead
of 'halt' to stop the test VM.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-31 14:04:43 +01:00
Rolf Neugebauer
bd59dbf793 Merge pull request #3050 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180531
2018-05-31 07:56:05 +01:00
Jason A. Donenfeld
5e10631fe2 wireguard: upgrade to 0.0.20180531
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-05-31 02:21:28 +02:00
Rolf Neugebauer
946712460b Merge pull request #3049 from rn/kern-up
Update kernels to 4.16.12/4.16.13/4.14.44/4.14.46/4.9.103/4.9.104/4.4.133/4.4.134
2018-05-30 20:09:15 +01:00
Rolf Neugebauer
932ed11e06 Update YAMLs to latest kernels.
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-30 18:34:10 +01:00
Rolf Neugebauer
9e8f458780 kernel: Adjust kernel config for arm64/x86 for 4.14.x and 4.16.x
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-30 16:14:53 +01:00
Rolf Neugebauer
acc059e6c8 kernel: Updatr to 4.16.13/4.14.46/4.9.104/4.4.134
Note, we skip 4.14.45 because 4.14.46 only has 3 patches
in it which unbreak 'perf' compilation.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-30 15:59:03 +01:00
Rolf Neugebauer
8acb257012 kernel: Fix s390x config for 4.16.x
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-30 14:51:45 +01:00
Rolf Neugebauer
d9a1ea45ce kernel: Update to 4.16.12/4.14.44/4.9.103/4.4.133
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-30 14:36:14 +01:00
Rolf Neugebauer
679edce979 Merge pull request #3047 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180524
2018-05-24 15:39:44 +01:00
Rolf Neugebauer
78e974e04f Merge pull request #3048 from rn/kup
Update kernels to 4.16.10/4.16.11/4.14.42/4.14.43/4.9.101/4.9.102
2018-05-24 15:39:29 +01:00
Rolf Neugebauer
697b904803 Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-24 14:00:34 +01:00
Jason A. Donenfeld
e945773f63 wireguard: upgrade to 0.0.20180524
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-05-24 14:45:29 +02:00
Rolf Neugebauer
00ce115df9 kernel: Update to 4.16.11/4.14.43/4.9.102
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-24 13:11:31 +01:00
Rolf Neugebauer
454d2142f3 kernel: Update to 4.16.10/4.14.42/4.9.101
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-24 10:54:45 +01:00
Rolf Neugebauer
8687c79482 Merge pull request #3045 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180519
2018-05-23 16:28:28 +01:00
Avi Deitcher
250604a680 Merge pull request #3046 from mingrammer/readme
Add a missing right parenthesis in README.md
2018-05-22 18:26:50 +03:00
mingrammer
30795173b9 Add a missing right parenthesis
Signed-off-by: mingrammer <mingrammer@gmail.com>
2018-05-22 23:02:03 +09:00
Jason A. Donenfeld
6e04261450 wireguard: upgrade to 0.0.20180519
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-05-19 03:19:21 +02:00
Justin Cormack
653d9805a9 Merge pull request #3043 from rn/kernup
Kernel update to 4.16.9/4.14.41/4.9.100/4.4.132
2018-05-16 21:08:53 +01:00
Rolf Neugebauer
ec82c4989c Update YAMLs to latest kernels
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-05-16 19:44:07 +01:00
Rolf Neugebauer
bc7103d1a3 kernel: Fixup arm64 kernel config for 4.14.41
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-16 18:04:29 +01:00
Rolf Neugebauer
c4a265c77f kernel: Update to 4.16.9/4.14.41/4.9.100/4.4.132
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-05-16 17:55:10 +01:00
Rolf Neugebauer
a326f9e084 Merge pull request #3042 from TiejunChina/master-dev
update -rt to 4.14.40-rt30
2018-05-16 10:36:54 +01:00
Tiejun Chen
ccd9998461 update -rt to 4.14.40-rt30
Signed-off-by: Tiejun Chen <tiejun.china@gmail.com>
2018-05-15 13:46:26 +08:00
Rolf Neugebauer
90fb6316c2 Merge pull request #3041 from zx2c4-forks/wireguard-bump
wireguard: upgrade to 0.0.20180513
2018-05-14 08:11:58 +01:00
Jason A. Donenfeld
49c1f0007c wireguard: upgrade to 0.0.20180513
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-05-13 21:38:28 +02:00
Rolf Neugebauer
ce9c5eb6fb Merge pull request #3040 from TiejunChina/master-dev
update -rt to 4.14.39-rt29
2018-05-12 21:00:17 +01:00
Rolf Neugebauer
21cb73257b Merge pull request #3039 from rn/docs
docs: Add document on how to do releases
2018-05-12 18:53:16 +01:00
Justin Cormack
2d034db7f8 Merge pull request #3038 from rn/post_relv0.4
Bump version to v0.4+
2018-05-12 18:19:13 +01:00
Rolf Neugebauer
9af0179d1b docs: Add document on how to do releases
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-05-12 17:14:47 +01:00
Rolf Neugebauer
e920eea1c4 Bump version to v0.4+
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-05-12 16:55:27 +01:00
Tiejun Chen
ac2e5c53ec update -rt to 4.14.39-rt29
Signed-off-by: Tiejun Chen <tiejun.china@gmail.com>
2018-05-12 23:43:14 +08:00
Justin Cormack
d3a1de393f Use PAX tar format
The default Go tar has restrictions on filename length for example.

PAX is recommended over GNU.

Requires Go 1.10

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-04-24 16:46:26 +01:00
Justin Cormack
3a3a4560a3 Merge pull request #217 from justincormack/go1.10
Move to Go 1.10
2018-04-24 16:42:37 +01:00
Justin Cormack
0eb9076675 Move to Go 1.10
We need the Format exptension in the tar package.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-04-24 16:20:15 +01:00
Justin Cormack
3dbad3b7da Merge pull request #214 from rn/squash
Add  'kernel+squashfs' output format
2018-04-16 14:46:47 +01:00
Rolf Neugebauer
a39cee3f18 initrd: Skip rest of ./boot
For the initrd we only want to extract kernel, cmdline, and
the ucode CPIO archive. Skip whatever is left in ./boot

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-04-16 14:42:14 +01:00
Rolf Neugebauer
ad11be6b83 moby: Add 'kernel+squashfs' output
This output produces a kernel and a root filesystem
in squashfs format. squashfs is a read-only, compressed
filesystem.

The 'kernel+squashfs' output can be used in a similar way as
the default 'kernel+initrd' output format with the benefit
that the rootfs does not consume any memory.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-04-16 14:35:38 +01:00
Rolf Neugebauer
52cb0e1cfe moby: Improve debug output for 'docker run'
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-04-16 14:12:19 +01:00
Rolf Neugebauer
4a569d2815 Merge pull request #213 from rn/mkimage
Add ability to overwrite images used for outputs
2018-04-13 13:56:16 +01:00
Rolf Neugebauer
4cae8c95e3 Add ability to overwrite images used for outputs
We currently hardcode the Linuxkit/mkimage- images. This has the
unfortunate consequence that, if we update the LinuxKit image used
to generate the output, we have to update the Moby tool and then
vendor it back into the LinuxKit repository.

This commit introduces UpdateOutputImages() which allows a client
of the Moby tools package to selectively overwrite the packages
used to generate the outputs.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
2018-04-13 13:50:33 +01:00
Justin Cormack
9534e84ffe Merge pull request #212 from justincormack/notaryup
Update Notary vendor
2018-04-12 11:37:44 +01:00
Justin Cormack
ede65b6445 Update Notary vendor
Bring some other vendoring in line with Notary

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-04-11 11:13:10 +01:00
Rolf Neugebauer
486e313fe3 Merge pull request #211 from rn/update
Update mkimage images based on linuxkit/alpine to latest.
2018-04-05 11:37:59 +01:00
Rolf Neugebauer
f848bc9a3c Update mkimage images based on linuxkit/alpine to latest.
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-04-05 11:07:53 +01:00
Justin Cormack
f1ae82c9eb Merge pull request #210 from justincormack/bind-shared
Default bind mounts to rshared not rprivate if not specified
2018-04-04 18:54:44 +01:00
Justin Cormack
25cfac5463 Default bind mounts to rshared not rprivate if not specified
It is quite confusing that from the host or another container that
binds `/containers` you cannot see the bind mounts, you have to enter
the container namespace. I think `rshared` is a better default. You
can always be explicit and add `private` if you want a private bind mount.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-03-26 13:54:49 -07:00
Justin Cormack
749585dd13 Merge pull request #208 from rn/up
Update mkimage packages
2018-03-19 21:23:35 -07:00
Rolf Neugebauer
efeb0ac185 Update mkimage packages
They have been update in linuxkit/linuxkit in prep for
s390x support.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-03-16 09:53:35 +00:00
Justin Cormack
ed49ca3aa0 Merge pull request #207 from nogoegst/fix-dup-string-readme
Reword the README to remove repeating statements
2018-03-12 14:17:34 +00:00
Ivan Markin
47986c53e9 Reword the README to remove repeating statements
Signed-off-by: Ivan Markin <sw@nogoegst.net>
2018-03-11 20:28:52 +00:00
Justin Cormack
c9d52b5787 Merge pull request #206 from justincormack/notaryup
Update notary vendor to 0.6.0
2018-03-01 11:23:24 +00:00
Justin Cormack
8682dd213f Merge pull request #205 from garthy/qcow2-efi-support
Add qcow2 EFI image building support
2018-03-01 11:23:18 +00:00
Justin Cormack
d3919d0a79 Update notary vendor to 0.6.0
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-03-01 11:15:50 +00:00
Garth Bushell
e1b4f769cb Add qcow2 EFI image building support
Signed-off-by: Garth Bushell <garth.bushell@oracle.com>
2018-03-01 11:11:23 +00:00
Justin Cormack
830794f3c0 Merge pull request #204 from deitch/fix-doc-typos
Fix typos
2018-02-16 11:48:36 +00:00
Avi Deitcher
07878aa631 Fix typos
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2018-02-15 21:37:38 +02:00
Justin Cormack
4a0d9e1247 Merge pull request #203 from deitch/docs-for-private-repos
Add documentation about using images from private registries
2018-02-15 13:24:21 +00:00
Avi Deitcher
01ea437bd1 Add documentation about using images from private registries
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2018-02-15 14:43:17 +02:00
Justin Cormack
bd556c86f7 Merge pull request #201 from rn/fix
The vmdk and dynamic-vhd packages had a bug in them
2018-01-25 19:35:07 +00:00
Rolf Neugebauer
8fb1a88757 The vmdk and dynamic-vhd packages had a bug in them
This picks up a newer version

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-01-25 18:04:07 +00:00
Rolf Neugebauer
7fb28974b6 Merge pull request #200 from rn/up
Update LinuxKit images to the latest
2018-01-25 14:48:36 +00:00
Rolf Neugebauer
5c1ebdbaa2 Update LinuxKit images to the latest
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-01-25 14:15:52 +00:00
Justin Cormack
caca03c097 Merge pull request #199 from justincormack/namespace
Add support for setting containerd namespace in runtime config
2018-01-17 14:19:45 +00:00
Justin Cormack
2dd65d27b6 Add support for setting containerd namespace in runtime config
This adds a namespace field to override the LinuxKit containerd
default namespace, in case you want to run a container in another
namespace.

Needs a patch in LinuxKit to implement this that I will open soon.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-01-17 14:12:15 +00:00
Justin Cormack
978deceed0 Merge pull request #198 from justincormack/annotations
Add support for OCI annotations in config
2018-01-17 12:40:31 +00:00
Justin Cormack
929a837d65 Add support for OCI annotations
Annotations do not do anything by default but get passed through to the runtime,
which can be useful. I never metadata I didn't like...

Also fix sysctl to be a map in the validation, not an array. I can't see any
examples using this in LinuxKit, but this matches OCI so is correct.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-01-17 12:26:08 +00:00
Justin Cormack
7918437b72 Make test should be phony
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2018-01-17 12:02:32 +00:00
Rolf Neugebauer
57b6e2ab94 Merge pull request #197 from rn/ucode
Add support for Intel ucode
2018-01-15 17:00:03 +00:00
Rolf Neugebauer
1d995e198a docs: Document the 'ucode' kernel option.
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-01-15 16:49:43 +00:00
Rolf Neugebauer
5d5a13526b output: Add support for CPU ucode to the kernel+initrd format
This prepends 'ucode.cpio' to the initrd if present. Padding
should not be necessary as the ucode.cpio should be padded
to the right size.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-01-15 16:49:43 +00:00
Rolf Neugebauer
1d24454438 output: Add ucode.cpio to the tar-kernel-initrd format
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-01-15 16:49:42 +00:00
Rolf Neugebauer
2b1a611bab output: Extract ucode if present
For now the backends for the different formats do not yet
use the extracted ucode cpio archive, but '// TODO' are
placed for the backends which should eventually handle it.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-01-15 16:49:42 +00:00
Rolf Neugebauer
0c1b1def13 build: Add ucode to the intermediate tar ball if specified
This extends the kernel filter to also look for the CPU microcode
file if specified in the YAML. If found, the ucode cpio archive
is placed into the intermediate tar file as '/boot/ucode.cpio'.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-01-15 16:49:42 +00:00
Rolf Neugebauer
b4704b8ba1 config: Add 'ucode' to the kernel schema
This optional option will allow users to specify a CPU
microcode cpio archive to be prepended to the initrd file.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2018-01-15 16:49:42 +00:00
Justin Cormack
f816553d2f Merge pull request #195 from ijc/prepend-rootfs-mounts
Prepend the rootfs mounts to the user specified runtime.mounts.
2018-01-11 12:15:18 +00:00
Ian Campbell
0a6d69d2d3 Prepend the rootfs mounts to the user specified runtime.mounts.
User specified mounts should be able to rely on the rootfs being mounted, in
particular for a writeable container they should expect the writeable overlay
to already be in place.

Signed-off-by: Ian Campbell <ijc@docker.com>
2018-01-11 11:42:25 +00:00
Justin Cormack
1aca4eefa5 Merge pull request #190 from ijc/containerd-v1.0.0-rc.0
Bump to containerd v1.0.0
2018-01-04 11:28:10 +00:00
Justin Cormack
b5615a3714 Merge pull request #192 from w9n/fix_empty_container_config
allow ImageInspect.Config to be nil when parsing
2018-01-04 11:27:42 +00:00
Justin Cormack
41d67e3bf3 Merge pull request #194 from w9n/yml_omitempty
add omitempty for yml config
2018-01-04 11:26:54 +00:00
Robin Winkelewski
175fadb3d4 add omitempty for yml config
Signed-off-by: Robin Winkelewski <w9ncontact@gmail.com>
2017-12-27 03:08:44 +01:00
Robin Winkelewski
1b06de3136 fix inspect.Config usage
Signed-off-by: Robin Winkelewski <w9ncontact@gmail.com>
2017-12-14 07:11:17 +01:00
Justin Cormack
d9d2a91780 Merge pull request #193 from ijc/bugfix-191
Defer dockerRm until we are finished with the contents
2017-12-13 09:35:13 -08:00
Ian Campbell
307f13b129 Defer dockerRm until we are finished with the contents
This was introduced by #191 but somehow did not trigger either for me in local
testing or in CI.

It did trigger in initial CI of https://github.com/linuxkit/linuxkit/pull/2811
which can be seen at https://linuxkit.datakit.ci/linuxkit/linuxkit/pr/2811?history=1637690296123e9a15307b3a41b290da6e27e7cc
The error is:

    Failed to docker rm container «...»: «...»: aufs: unmount error after retries: «...»: device or resource busy

No doubt because we were still holding an open fd while trying to remove the
container.

Unclear why this didn't repro for me (docker 17.11.0-ce with overlay2) or
whatever CI uses.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-12-13 11:44:32 +00:00
Ian Campbell
12629fcb96 Bump to containerd v1.0.0
Since that bumps to gogo protobuf v0.5 too do the same.

Note that there are no actual containerd changes here, although there are some
gogo proto ones.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-12-13 10:12:42 +00:00
Justin Cormack
ebd7228a44 Merge pull request #191 from ijc/reduce-memory-via-tempfiles
Reduce maximum memory usage via tempfiles
2017-12-12 13:27:32 -08:00
Ian Campbell
3045a80c85 Stream docker export directly to consumer
Rather than queueing up into a `bytes.Buffer`.

In my test case (building kube master image) this reduces Maximum RSS (as
measured by time(1)) compared with the previous patch from 2.8G to 110M. The
tar output case goes from 2.1G to 110M also. Overall allocations are ~715M in
both cases.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-12-06 16:41:42 +00:00
Ian Campbell
9f44acf8e3 Generate intermediate image into a temp file
All of the `output*` functions took a `[]byte` and immediately wrapped it in a
`bytes.Buffer` to produce an `io.Reader`. Make them take an `io.Reader` instead
and satisfy this further up the call chain by directing `moby.Build` to output
to a temp file instead of another `bytes.Buffer`.

In my test case (building kube master image) this reduces Maximum RSS (as
measured by time(1)) from 6.7G to 2.8G and overall allocations from 9.7G to
5.3G. When building a tar (output to /dev/null) the Maximum RSS fell slightly
from 2.2G to 2.1G. Overall allocations remained stable at around 5.3G.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-12-06 16:07:46 +00:00
Ian Campbell
9558740c11 Add cpu and mem profiling options
Following https://golang.org/pkg/runtime/pprof/. When attempting to build
images in https://github.com/linuxkit/kubernetes CI the process is mysteriously
being SIGKILL'd, which I think might be down to OOMing due to the resource
limits placed on the build container.

I haven't done so yet but I'm intending to use these options to investigate and
they seem potentially useful in any case, even if this turns out to be a
red-herring.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-12-06 15:54:48 +00:00
Justin Cormack
656bd87fd2 Merge pull request #189 from ijc/image-config-substruct
Split config-related fields of Image into a substruct.
2017-11-28 11:59:25 +00:00
Ian Campbell
f9893d9a9b Fixup test after Image → ImageConfig split.
The syntax used for the yaml definitions is changed by the need to include the
substruct in the struct literal.

For the label switch to `ImageConfig` directly, which is actually more correct
in that it avoids spurious `name` and `image` fields in the label.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-11-27 14:47:21 +00:00
Ian Campbell
aec82c4cdf Split config-related fields of Image into a substruct.
Where "config-related" here means "ones you might find in the
"org.mobyproject.config" label on an image.

By making this new struct an anonymous member of the existing Image struct the
Go json parser does the right thing (i.e. inlines into the parent) when parsing
a complete image (from a yml assembly) by default. The Go yaml library which we
use requires a tag on the anonymous field to achieve the same.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-11-27 14:16:59 +00:00
Justin Cormack
63a5dedd28 Merge pull request #188 from justincormack/make-tmp-dir
Create tmp dir in case required
2017-11-20 16:59:27 +00:00
Justin Cormack
3389f89c44 Create tmp dir in case required
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-11-20 16:50:58 +00:00
Justin Cormack
ad2fda5769 Merge pull request #187 from justincormack/build-improvements
Make easier to use as a library
2017-11-20 14:05:25 +00:00
Justin Cormack
6395e339b9 Do not error if cache/config directory not specified
Just use the default. Easier to use as an external library.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-11-20 13:52:53 +00:00
Justin Cormack
e3a7739f42 Make easier to embed in LinuxKit
Split out util file in same way.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-11-20 12:04:08 +00:00
Justin Cormack
6ba3288963 Merge pull request #186 from gesellix/fix-docker-build-cmd
Fix docker format build example
2017-11-19 10:11:16 +00:00
Tobias Gesellchen
5aebd207d0 Fix docker format build example
Signed-off-by: Tobias Gesellchen <tobias@gesellix.de>
2017-11-18 22:22:33 +01:00
Justin Cormack
315e5f80e8 Merge pull request #185 from justincormack/fix-make
Stop make test from removing binary
2017-11-17 15:21:08 +00:00
Justin Cormack
f85e019d2e Merge pull request #183 from ijc/static-builds
Build a static binary
2017-11-17 14:43:08 +00:00
Justin Cormack
8f75b635ec Stop make test from removing binary
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-11-17 14:40:49 +00:00
Ian Campbell
532b41ff8b Disable CGO so as to build a static binary
https://github.com/linuxkit/kubernetes/pull/1#issuecomment-345253075 lead to
https://circleci.com/gh/linuxkit/kubernetes/15

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-11-17 14:39:19 +00:00
Justin Cormack
eceb6d11f8 Merge pull request #181 from justincormack/runtime-cgroups
Add Cgroups to runtime config
2017-11-17 14:12:08 +00:00
Justin Cormack
c9bb1ecdf1 Add Cgroups to runtime config
This will create the list of cgroups specified

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-11-17 13:22:38 +00:00
Justin Cormack
91311b9de8 Merge pull request #178 from tristanls/master
Prob: Files section does not work for /var dir
2017-11-16 17:20:33 +00:00
Justin Cormack
7c3e0e87b2 Merge pull request #182 from ijc/circleci-artefacts
Tweak circleci config to try and fix artifact upload
2017-11-16 17:19:58 +00:00
Ian Campbell
c180946fb4 Publish a checksum of the binaries.
Signed-off-by: Ian Campbell <ijc@docker.com>
2017-11-16 17:15:06 +00:00
Ian Campbell
fff4f0ce79 Try and put dist artifacts at the top level.
Signed-off-by: Ian Campbell <ijc@docker.com>
2017-11-16 17:13:41 +00:00
Ian Campbell
e6bdd72158 Tweak circleci config to try and fix artifact upload
It appears that the `$GOPATH` in `working_directory` is being treated as a literal
`GOPATH` at least when processing the `state_artifacts.path`. Inlining it seems
to have worked, at the cost of some duplication.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-11-16 17:13:11 +00:00
Tristan Slominski
11c90c4cdb Prob: Files section does not work for /var dir
Solv: Updated documentation to point out limits of
files section regarding /var, /run, and /tmp dirs.

Signed-off-by: Tristan Slominski <tristan.slominski@gmail.com>
2017-11-14 15:08:07 -06:00
Justin Cormack
a14db39956 Merge pull request #180 from ehazlett/poule-config
Initial poule config
2017-11-14 17:20:38 +00:00
Evan Hazlett
36c5bf55ed add initial poule config
Signed-off-by: Evan Hazlett <ejhazlett@gmail.com>
2017-11-14 12:16:54 -05:00
Justin Cormack
b262aaa058 Merge pull request #177 from arm64b/docker-efi-images
EFI image hash value update
2017-11-14 16:04:34 +00:00
Dennis Chen
90f1582988 EFI image hash value update
Update the hash value of EFI-* docker image

Signed-off-by: Dennis Chen <dennis.chen@arm.com>
2017-11-10 08:10:22 +00:00
Justin Cormack
76035cec2f Merge pull request #176 from justincormack/sirupsen
Update dependencies to use sirupsen not Sirupsen
2017-11-01 15:23:10 +00:00
Justin Cormack
45333d2480 Update dependencies to use sirupsen not Sirupsen
That entailed a few other fixes, eg small Notary API changes.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-11-01 15:14:58 +00:00
Justin Cormack
99480b5dd0 Merge pull request #175 from deitch/fix-prereqs
Fix prereqs in output.go
2017-10-31 10:37:55 +00:00
Avi Deitcher
31187652ce Fix prereqs, raw images with correct calcs
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2017-10-31 10:51:55 +02:00
Justin Cormack
3b03f76cd4 Merge pull request #174 from justincormack/no-gopath
Add a build target which works when GOPATH is not set or correct
2017-10-30 14:44:08 +00:00
Justin Cormack
a7158e1cb2 Add a build target which works when GOPATH is not set or correct
Getting Homebrew to work with a GOPATH is horrible...

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-10-30 14:39:59 +00:00
Justin Cormack
df201350c0 Merge pull request #172 from justincormack/fix-clean
rm -rf for clean
2017-10-30 13:36:25 +00:00
Justin Cormack
71dfe66ee1 rm -rf for clean
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-10-30 13:31:33 +00:00
Justin Cormack
a12e954d92 Merge pull request #173 from justincormack/lint-fix
Fix some lint errors with error checking
2017-10-30 13:31:11 +00:00
Justin Cormack
14ed0953cd Fix some lint errors with error checking
This is due to lack of rebase after linter changes.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-10-30 13:25:22 +00:00
Justin Cormack
4a95c04300 Merge pull request #169 from deitch/add-raw-efi-bios-rename-aws
Add raw file formats, rename raw to aws and qcow2 to qcow2-bios
2017-10-30 11:28:53 +00:00
Justin Cormack
626b41fd30 Merge pull request #162 from ebriand/init-processing-logging
Add back init image processing logging
2017-10-30 11:24:53 +00:00
Justin Cormack
4ed9d49d3a Merge pull request #168 from dnephin/improve-the-build
Improvements to Makefile, linting, and circleci.yml
2017-10-30 11:24:24 +00:00
Avi Deitcher
60c1ce5156 Add raw file formats, rename raw to aws and qcow2 to qcow2-bios
Signed-off-by: Avi Deitcher <avi@deitcher.net>
2017-10-23 20:27:47 -04:00
Justin Cormack
57c6720356 Merge pull request #171 from ijc/pull-before-run
Do an explicit docker pull before docker run.
2017-10-20 17:26:16 +02:00
Ian Campbell
d9d6b56153 Do an explicit docker pull before docker run.
This avoids https://github.com/docker/cli/issues/631

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-10-20 15:51:47 +01:00
Daniel Nephin
ec741857ef Remove unnecessary vendor.
Signed-off-by: Daniel Nephin <dnephin@gmail.com>
2017-10-17 17:32:05 -04:00
Daniel Nephin
a224547540 Fix lint errors
Signed-off-by: Daniel Nephin <dnephin@gmail.com>
2017-10-17 17:30:47 -04:00
Daniel Nephin
e009b670f3 Improve makefile and circleci config
Use gometalinter for linting
put build artifact in dist/
store artifacts in circleci

Signed-off-by: Daniel Nephin <dnephin@gmail.com>
2017-10-17 17:30:44 -04:00
Justin Cormack
b23d883ca5 Merge pull request #167 from rn/fix
Fix mkimage-iso-bios hash
2017-10-16 13:59:10 +02:00
Rolf Neugebauer
67ce80d213 Fix mkimage-iso-bios hash
Looks like a6b89f1137 ("Update linuxkit/mkimage-*") updated to a
non-existing tag.

linuxkit pkg show-tag tools/mkimage-iso-bios
linuxkit/mkimage-iso-bios:165b051322578cb0c2a4f16253b20f7d2797a502

and docker pull of that image works.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-10-16 12:52:02 +02:00
ebriand
0754e4d662 Add back init image processing logging
Signed-off-by: ebriand <eric.briand@gmail.com>
2017-10-16 11:00:19 +02:00
Justin Cormack
2fea21c0d7 Merge pull request #166 from rn/rpi3
output: Add support for creating Raspberry Pi images
2017-10-14 08:33:13 +01:00
Rolf Neugebauer
c1da07b3a8 output: Add support for creating Raspberry Pi images
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-10-13 18:02:17 +01:00
Justin Cormack
17865a1c3e Merge pull request #160 from nuald/docs
Updated the documentation regarding binds options.
2017-10-13 16:31:39 +01:00
Justin Cormack
f75e4f8291 Merge pull request #164 from ijc/update-mkimage-plus-no-docker-network
Update mkimage plus no docker network
2017-10-13 16:28:22 +01:00
Ian Campbell
52de62206d Ensure moby is rebuilt if deps change.
Signed-off-by: Ian Campbell <ijc@docker.com>
2017-10-13 10:59:55 +01:00
Ian Campbell
a6b89f1137 Update linuxkit/mkimage-*
These versions were created by https://github.com/linuxkit/linuxkit/pull/2607
which enables content trust, so drop the sha256 from all of them and ensure
DOCKER_CONTENT_TRUST is unconditionally set when running, since these
references are hardcoded we know they must be signed.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-10-13 10:56:21 +01:00
Ian Campbell
8825ca2e66 Disable network in dockerRun
AFAICT none of the callers (which all involve one of `linuxkit/mkimage-*`) have
any reason to hit the network.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-10-13 10:42:40 +01:00
Alexander Slesarev
76c36afc60 Updated the documentation regarding binds options.
Signed-off-by: Alexander Slesarev <alex.slesarev@gmail.com>
2017-10-10 08:51:08 +10:00
Justin Cormack
70c6aebd26 Merge pull request #159 from rn/img-ref
Restructure Image and image reference code
2017-10-09 12:29:13 +01:00
Justin Cormack
9abca80507 Merge pull request #158 from justincormack/tar-kernel-initrd
Add a "tar-kernel-initrd" output format
2017-10-09 12:27:11 +01:00
Rolf Neugebauer
1aee0c3d30 Update Image strings before writing them out
If the YAML file contains:
  - path: etc/linuxkit.yml
    metadata: yaml
in the fil section, the image was build with content trust,
then the linuxkit.yml file image contains fully qualified
image references (including the sha256).

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-10-04 17:59:02 +01:00
Rolf Neugebauer
ad83cb8928 Use containerd reference.Spec in place of the Image string
Instead of passing the image name as string use the a reference
to a containerd reference.Spec. This allows us, for example,
to update the reference in place when verifying content trust
with more specific information, such as the sha256

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-10-04 17:37:22 +01:00
Rolf Neugebauer
d9b79548a5 Add a containerd reference.Spec for the Image name
When constructing a Moby structure from a YAML also
extract a containerd reference.Spec for each image
and the kernel.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-10-04 17:26:42 +01:00
Rolf Neugebauer
1713f59e4f Turn Images into references
We want to modify some of the content of the Image structure
and thus have to pass them by reference.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-10-04 17:26:42 +01:00
Justin Cormack
e73a7b0315 Add a "tar-kernel-initrd" output format
This is a tarball of the kernel, initrd and cmdline files, suitable for
sending to the mkimage images that expect this format.

Note you can't currently stream this output format using `-o` will clean this
up in future commits.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-10-04 17:01:13 +01:00
Rolf Neugebauer
e8a5728ca3 Vendor containerd
The next commit will start using some components of containerd
so vendor the latest version.

The latest vndr also removed some un-needed files previously vendored.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-10-04 14:17:02 +01:00
Justin Cormack
61ff1e5bba Merge pull request #157 from justincormack/no-hyperkit
Remove the hyperkit option
2017-10-03 15:58:59 +01:00
Justin Cormack
aca26f00c2 Remove the hyperkit option
We are going to phase out the LinuxKit build option, in favour of keeping Docker
or a native Linux build option for CI use cases, as it is faster. So the
hyperkit option that only worked in one very limited use case is not needed.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-10-03 15:55:02 +01:00
Justin Cormack
ccaba8acc1 Merge pull request #156 from justincormack/no-init
Remove unused init package
2017-10-03 14:10:16 +01:00
Justin Cormack
fdee7f3792 Remove unused init package
We now use the same on as linuxkit.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-10-03 13:42:48 +01:00
Justin Cormack
cc823286f4 Merge pull request #153 from ijc/subassign-runtime
More granular merge of Runtime from labels & yaml
2017-10-02 11:40:14 +01:00
Justin Cormack
177969dc4a Merge pull request #154 from justincormack/iso-efi-update
Update to use new common iso EFI for amd64 and arm64
2017-09-25 11:11:24 -07:00
Justin Cormack
1fc16c4580 Update to use new common iso EFI for amd64 and arm64
See https://github.com/linuxkit/linuxkit/pull/2524

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-09-25 11:02:37 -07:00
Ian Campbell
a5a3b778c0 More granular merge of Runtime from labels & yaml
Previously any Runtime specified in yml would completely override anything from
the image label, even if they set distinct fields. This pushes the merging down
to the next layer, and in the case of BindNS down two layers.

Most of the fields involved needed to become pointers to support this, which
required a smattering of other changes to cope. As well as the local test suite
this has been put through the linuxkit test suite (as of cc200d296a).

I also tested in the scenario which caused me to file #152.

Fixes #152.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-09-22 13:18:36 +01:00
Justin Cormack
63eae8abee Merge pull request #149 from justincormack/shared-init
Used shared init with LinuxKit
2017-09-18 18:10:08 -07:00
Justin Cormack
dff6dc2876 Used shared init with LinuxKit
With https://github.com/linuxkit/linuxkit/pull/2500 the init script
can be used for both bare metal and in Docker.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-09-18 13:11:37 -07:00
Justin Cormack
7ee5ff77d1 Merge pull request #150 from ijc/updates
Couple of minor updates to metadata file output
2017-09-18 13:10:24 -07:00
Ian Campbell
411a21ae07 Make "metadata: yaml" actually output yaml
The existing code made json...

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-09-18 15:13:32 +01:00
Ian Campbell
2f01ab25ed Correct example yaml
Without the space I get:

    FATA[0000] Invalid config: yaml: line 66: could not find expected ':'

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-09-18 15:13:32 +01:00
Justin Cormack
1ff0e3beee Merge pull request #146 from justincormack/formats
Rename "output" to "format"
2017-09-01 23:51:27 +01:00
Justin Cormack
11b573c6fb Rename "output" to "format"
This was confusing as there is an option to output to a file as well.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-09-01 23:45:25 +01:00
Justin Cormack
69596e17dd Merge pull request #145 from justincormack/runtime-mount
Add support for mount in runtime config
2017-08-23 16:44:13 +01:00
Justin Cormack
cfa5d273b7 De-dup container root filesystems
With the mount framework we can de-dup containers that share the same image.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-22 17:27:08 +01:00
Justin Cormack
6b98aff58b Use the runtime config to specify how overlay should be created
This puts the build side in charge of the runtime layout, which enables
additional optimisations later, like sharing the rootfs if it is
used multiple times.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-22 16:21:56 +01:00
Justin Cormack
ee0901762f Add support for mount in runtime config
This could be used in LinuxKit now, as there are some examples, eg
https://github.com/linuxkit/linuxkit/blob/master/blueprints/docker-for-mac/base.yml#L33
which are creating containers to do a mount.

The main reason though is to in future change the ad hoc code that generates
overlay mounts for writeable containers with a runtime config which does
the same thing; this code needs to create both tmpfs and overlay mounts.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-22 15:17:54 +01:00
Justin Cormack
0d58d332be Merge pull request #144 from justincormack/runtime-config
Add support for runtime configuration
2017-08-18 15:50:39 +01:00
Justin Cormack
ea60eff557 Add support for runtime configuration
This adds a `runtime` section in the config that can be used
to move network interfaces into a container, create directories,
and bind mount container namespaces into the filesystem.

See also https://github.com/linuxkit/linuxkit/pull/2413

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-17 17:36:49 +01:00
Justin Cormack
d9546ee1ce Merge pull request #143 from justincormack/filepathjoin
Do not use filepath.Join if constructing LinuxKit paths
2017-08-14 17:36:59 +01:00
Justin Cormack
4da3c09e19 Do not use filepath.Join if constructing LinuxKit paths
This will do the wrong thing on Windows, and construct paths with \.

fix #142

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-14 15:38:58 +01:00
Justin Cormack
7a549fda07 Merge pull request #141 from justincormack/update-docker
Update docker examples
2017-08-10 15:05:22 +01:00
Justin Cormack
13b1eb7d0c Do not use rm as may not be in root filesystem
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-10 14:59:32 +01:00
Justin Cormack
2a097f543d update xeamples to new hashes
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-10 14:58:50 +01:00
Justin Cormack
0e65f04ab4 update init for containers for recent changes
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-10 14:57:53 +01:00
Justin Cormack
680fafd705 Merge pull request #140 from justincormack/device-cgroup
Add Cgroup resource limits into Yaml spec
2017-08-10 11:16:41 +01:00
Justin Cormack
13a1ffdd44 Add Cgroup resource limits into Yaml spec
This adds all the cgroup restrictions into the spec.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-09 16:39:10 +01:00
Justin Cormack
c2b081ed8a Merge pull request #137 from justincormack/efi-tar
Output EFI ISO as for BIOS ISO with filesystem on.
2017-08-07 17:45:26 +01:00
Justin Cormack
7b36db8358 Output EFI ISO as for BIOS ISO with filesystem on.
The image is multi-arch and should work on arm64 as it has no boot loader...

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-07 16:44:13 +01:00
Justin Cormack
b9de5ff4c6 Merge pull request #135 from justincormack/iso-tar
Use new style ISO BIOS mkimage from Linuxkit which unpacks filesystem
2017-08-02 14:46:50 +01:00
Justin Cormack
2d930bc8e5 Use new style ISO BIOS mkimage from Linuxkit which unpacks filesystem
Rather than using an initrd, unpack full filesystem for ISO BIOS.

Stream docker output direct to file rather than via a buffer, to save
memory.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-02 14:24:24 +01:00
Justin Cormack
305ad031e8 Merge pull request #134 from justincormack/hardlink-path
Fix hardlinks in tar output
2017-08-02 11:34:47 +01:00
Justin Cormack
48e42540d2 Fix hardlinks in tar output
When we converted these to cpio we were not noticing that they
were invalid as they had incorrect paths as we converted the
path to a symlink anyway. Only the busybox images have hard links
in, the Alpine ones are symlinks anyway, which is why it was
less visible too.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-08-01 17:04:57 +01:00
Justin Cormack
14a4d923ae Merge pull request #132 from justincormack/fix-ro
Fix read only output when defined in a label
2017-07-28 14:40:52 +01:00
Justin Cormack
3dec6855e0 Fix read only output when defined in a label
Also do some code cleanup.

Related to #131 we need to read the OCI config to find if the container
is read only, not rely on the yaml, as it may just be set in the label.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-28 14:34:18 +01:00
Justin Cormack
51005b42c5 Merge pull request #130 from justincormack/update-mkimage
Update mkimage used for building to lastest hashes
2017-07-28 13:57:49 +01:00
Justin Cormack
7010eae061 Update mkimage used for building to lastest hashes
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-28 13:35:59 +01:00
Justin Cormack
b65a8f86bc Merge pull request #129 from justincormack/ro-rw-setup
Rework setup of container for read only/read write
2017-07-28 11:10:53 +01:00
Justin Cormack
e388c0ff14 Rework setup of container for read only/read write
To work with truly immutable filesystems, rather than ones
we sneakily remount `rw`, we are going to use overlay for
writeable containers. To leave the final mount as `rootfs`,
in the writeable case we make a new `lower` path for the read
only filesystem, and leave `rootfs` as a mount point for an
overlay, with the writable layer and workdir mounted as a tmpfs
on `tmp`.

See https://github.com/linuxkit/linuxkit/issues/2288

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-27 14:52:13 +01:00
Justin Cormack
36217e5145 Merge pull request #128 from justincormack/resolvconf-init
In the init section use a symlink for /etc/resolv.conf
2017-07-25 15:39:34 +01:00
Justin Cormack
6403215635 In the init section use a symlink for /etc/resolv.conf
Unfortunately there are a lot of issues with resolv.conf as we
cannot actually write it into the image from any docker image, as docker will
always have something bind mounted in.

In addition, normally we expect the filesystem to br read only for images
that moby generates, so the actual etc/resolv.conf is likely not to be writeable.

Previously we were adding in a default resolv.conf into every image pointing at
Google's name servers but that is really a bad idea.

Instead, normal images now get an empty default, while images in the `init`
section will get a symlink, currently hard coded to `/run/resolvconf/resolv.conf`
but you can override this with the `files` section to be static or a different
link.

In future, if we have an easy way to build and extract images with user control
of this, we can drop this.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-25 14:40:40 +01:00
Justin Cormack
2c4d567781 Merge pull request #125 from justincormack/tmpdir
Add a tmp directory for each container to be used as a mount point
2017-07-24 17:19:32 +01:00
Justin Cormack
8e720bff08 Merge pull request #126 from ijc/containerd-alpha1-update
Containerd alpha1 update
2017-07-20 13:28:51 +01:00
Ian Campbell
feba1d7d98 Bump to image-spec v1.0.0 and runtime-spec v1.0.0
No substantive changes.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-07-20 12:23:09 +01:00
Ian Campbell
e8d5005b0e Synchronise vendoring with containerd v1.0.0-alpha1
Some of these are arbitrary and just syncing for the sake of it, however the
image- and runtime-spec are relevant. Interesting changes:

- runtime spec:
  - LinuxRLimit is now POSIXRLimit.
  - Specs.Config is now a pointer.
  - LinuxResources.DisableOOMKiller moved to
    LinuxResources.LinuxMemory.DisableOOMKiller
- image spec:
  - Platform.Features is removed (unused here).

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-07-20 12:03:22 +01:00
Ian Campbell
dec42921d7 Rerun vndr with latest version
This removes some files which are marked `// +build ignore`.

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-07-20 12:03:22 +01:00
Justin Cormack
4720490c92 Add a tmp directory for each container to be used as a mount point
This is to clean up how we do writeable containers in LinuxKit.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-19 11:29:03 +01:00
Justin Cormack
a261a33812 Merge pull request #124 from justincormack/onshutdown
Add support for onshutdown
2017-07-18 14:17:53 +01:00
Justin Cormack
6eb74b2f2b Add support for onshutdown
This is a list of images to run on a clean shutdown. Note that you must not rely on these
being run at all, as machines may be be powered off or shut down without having time to run
these scripts. If you add anything here you should test both in the case where they are
run and when they are not. Most systems are likely to be "crash only" and not have any setup here,
but you can attempt to deregister cleanly from a network service here, rather than relying
on timeouts, for example.

Fix https://github.com/linuxkit/linuxkit/issues/1988

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-18 13:55:52 +01:00
Justin Cormack
43bd663816 Merge pull request #123 from justincormack/json-for-top-level
Add json config for top level config
2017-07-18 13:34:27 +01:00
Justin Cormack
55f7df577a Add json config for top level config
Otherwise JSON output as metadata cannot actually be used as it
has capitalised field names.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-18 13:16:58 +01:00
Justin Cormack
4105b7ea31 Merge pull request #122 from justincormack/metadata
Add a "metadata" file contents flag
2017-07-17 15:56:06 +01:00
Justin Cormack
5a013825dd Add metadata into test image
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-17 15:44:12 +01:00
Justin Cormack
12439d947d Do not modify data structure while building
This will give odd effects if we output the yaml structure into the image.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-17 15:42:26 +01:00
Justin Cormack
760521e197 Document metadata in files section
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-17 15:40:07 +01:00
Justin Cormack
040c500648 Add more omitempty to json spec
The metadata config was rather verbose.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-17 15:31:31 +01:00
Justin Cormack
389dd8c0fa Add a "metadata" file contents flag
Currently this supports "yaml" as the only option, which will output
the yaml config (as JSON) into the file specified in the image.

Fix #107

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-17 15:31:24 +01:00
Justin Cormack
f035995b22 Merge pull request #120 from riyazdf/system-pool-fix
trust: do not call x509.SystemCertPool as nil will use this as default
2017-07-14 22:53:24 +01:00
Riyaz Faizullabhoy
c3b2c7d575 trust: do not call x509.SystemCertPool as nil will use this as default
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-07-14 14:39:39 -07:00
Justin Cormack
f255d671c6 Merge pull request #117 from justincormack/uid
Allow uid, gid fields to be numeric or names
2017-07-14 18:05:12 +01:00
Justin Cormack
cc33e67492 Allow uid, gid fields to be numeric or names
Previously I was forcing them to be strings, which is horrible. Now you
can either specify a numeric uid or the name of a service to use the
allocated id for that service.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-14 16:57:12 +01:00
Justin Cormack
a824287800 Merge pull request #116 from justincormack/kernel-options
Allow specifying the kernel and tarball names, or omitting tarball
2017-07-14 14:32:53 +01:00
Justin Cormack
830be373da Allow specifying the kernel and tarball names, or omitting tarball
fix #113

Use `tar: none` or `tar: ""` to omit the tarball.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-14 14:09:42 +01:00
Justin Cormack
1664445ad6 Merge pull request #115 from justincormack/contrib-move
Move Contributing to top level
2017-07-14 11:55:04 +01:00
Justin Cormack
7bc763a628 Move Contributing to top level
- accidentally committed to wrong directory

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-14 11:50:51 +01:00
Justin Cormack
d12d1f12c0 Merge pull request #114 from dave-tucker/make
Makefile: Update for ease of Homebrew installation
2017-07-14 11:46:26 +01:00
Dave Tucker
5934a24206 Makefile: Update for ease of Homebrew installation
This removes the `lint` dependency from building Moby.
I've also added ineffassign to check ineffecutal assignments alongside
checks to ensure that both it and golint are installed.

Signed-off-by: Dave Tucker <dave@dtucker.co.uk>
2017-07-14 10:03:44 +01:00
Justin Cormack
4db06aa173 Merge pull request #111 from ijc/master
Update LinuxKit components used for build
2017-07-13 14:48:38 +01:00
Ian Campbell
f20828bf7e Update LinuxKit components used for build
This updates to the current set of images as of
https://github.com/linuxkit/linuxkit/pull/2159

Signed-off-by: Ian Campbell <ijc@docker.com>
2017-07-13 14:43:34 +01:00
Justin Cormack
75cc04a03d Merge pull request #109 from justincormack/contributing
Add Contributing doc
2017-07-12 12:20:14 +01:00
Justin Cormack
b4804b69e8 Add Contributing doc
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-12 12:04:33 +01:00
Justin Cormack
51b4e20154 Merge pull request #103 from ijc/master
Build for Darwin and Windows
2017-07-11 11:07:36 +01:00
Ian Campbell
6c6499bdd5 Update docker/docker vendor to 6978a6e25a2e6063f280ec842bd0f3eae99426e1
This includes https://github.com/moby/moby/pull/34040 which fixes Windows build
issues.

Note that this pulls in more than 500 (non merge) commits as well as the fix we
are interested in. A couple of new deps are pulled in, versions taken from
vendor/github.com/docker/docker/vendor.conf.

Signed-off-by: Ian Campbell <ian.campbell@docker.com>
2017-07-11 10:47:39 +01:00
Justin Cormack
5bf74cbfa9 Merge pull request #105 from justincormack/unique-names
Error if there are duplicate service names
2017-07-11 10:22:05 +01:00
Justin Cormack
3ee4fdc43a Error if there are duplicate service names
Continue to allow onboot to have duplicates as we do not run simultaneously
so that is ok (and we number them anyway), but services are run together
so we will get a runtime error if duplicated as this is the containerd/runc
id.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-10 14:50:04 +01:00
Ian Campbell
3c5fad4539 Remove dependency on docker/docker/cli
We were pulling in this whole stack of packages just for `trust.ReleasesRole`.
Just define it locally.

Signed-off-by: Ian Campbell <ian.campbell@docker.com>
2017-07-10 14:38:21 +01:00
Justin Cormack
ec7e73b304 Merge pull request #100 from justincormack/userns
Add partial user namespace support
2017-07-10 14:30:30 +01:00
Ian Campbell
5e75f8ca8b Only run go test and go vet if not cross building (i.e. ${GOOS} unset)
They will try to run things and hence cannot be done when cross building.

Signed-off-by: Ian Campbell <ian.campbell@docker.com>
2017-07-07 10:27:19 +01:00
Ian Campbell
48f1dd042f Build for Darwin and Windows in CI
Signed-off-by: Ian Campbell <ian.campbell@docker.com>
2017-07-06 17:51:43 +01:00
Justin Cormack
d87a3f9990 Merge pull request #102 from ijc/master
revendor runc + runtime-spec to match containerd 8e1a04ff9ee3
2017-07-06 16:57:01 +02:00
Ian Campbell
c3edfec759 revendor runc + runtime-spec to match containerd 8e1a04ff9ee3
Note that various fields have changed moved around in the JSON as a result:

* `Platform` has been removed.
* `Process` is now a pointer.
* `OOMScoreAdj` has moved into `Process`, from `Linux.Resources` (resolving a
  TODO here).

Also updates golang.org/x/sys which is less critical.

Signed-off-by: Ian Campbell <ian.campbell@docker.com>
2017-07-06 15:34:01 +01:00
Justin Cormack
a73c3d3667 Add partial user namespace support
This adds the OCI parts needed into the yaml, but there are still
permissions issues in practise so marked as experimental.

It may just need further documentation to resolve the issues.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-07-03 14:45:58 +01:00
Justin Cormack
c7c4c9ef2a Merge pull request #98 from justincormack/named-uids
Assign each container a uid and gid it can use
2017-06-30 19:40:47 +01:00
Justin Cormack
0acaaa71fe Assign each container a uid and gid it can use
In order to support not running containers as root, allocate
each of them a uid and gid, a bit like traditional Unix system
service IDs. These can be referred to elsewhere by the name of
the container, eg if you wish to create a file owned by a
particular esrvice.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-30 17:40:08 +01:00
Justin Cormack
e9b9c56137 Merge pull request #99 from justincormack/ambient-docs
Add docs for ambient capabilities
2017-06-30 17:17:46 +01:00
Justin Cormack
c5070dfc8c Add docs for ambient capabilities
Missed in intitial PR.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-30 17:05:34 +01:00
Justin Cormack
5f49f6695a Merge pull request #97 from justincormack/ambient
Add support for ambient capabilities
2017-06-30 14:41:40 +01:00
Justin Cormack
66b4aed239 Add support for ambient capabilities
Allow setting ambient capabilities, as a seperate option to the standard
ones. If you are running as a non root user you should use these.

Note that unless you add `CAP_DAC_OVERRIDE` and similar permissions you
need to be careful about file ownership. Added support to set ownership
in the `files` section to help out with this.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-30 14:08:16 +01:00
Justin Cormack
70c5c2e1a0 Merge pull request #94 from davefreitag/ibm-vhd
Adding 'dynamic-vhd' Output Format
2017-06-27 15:29:20 +01:00
Justin Cormack
518fd2b0d6 Merge pull request #93 from tych0/check-caps
check that caps are valid
2017-06-27 15:28:52 +01:00
Tycho Andersen
c2e460fee5 check that caps are valid
Rather than build the image and have something weird happen, let's check
that the capabilities specified are actually valid capabilities.

Signed-off-by: Tycho Andersen <tycho@docker.com>
2017-06-27 08:25:10 -06:00
Dave Freitag
b605e61d1f Adding dynamic-vhd Output Format
Adding support for the dynamic-vhd output format.

Signed-off-by: Dave Freitag <dcfreita@us.ibm.com>
2017-06-27 08:53:56 -05:00
Justin Cormack
31384b6780 Merge pull request #91 from justincormack/library
Split out into a small stub command line and a library
2017-06-23 11:58:18 -07:00
Justin Cormack
e7ebabdb05 Split out into a small stub command line and a library
- this is pretty much the smallest change to split this out and it
  exposes a few things that can be improved later
- no change to logging yet

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-21 16:19:31 -07:00
Justin Cormack
a7e3fd29b4 Merge pull request #90 from justincormack/dockerinput
Rename the docker run function
2017-06-21 11:17:07 -07:00
Justin Cormack
4401e7d0f0 Rename the docker run function
This is a remnant of when there were multiple versions.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-21 11:10:38 -07:00
Justin Cormack
c9d8739b32 Merge pull request #86 from justincormack/error
Return errors from build internal function
2017-06-20 20:16:42 -07:00
Justin Cormack
c5cccad62e Return errors from build internal function
This makes it easier to convert to a library.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-20 17:25:16 -07:00
Justin Cormack
7149b0f7b8 Merge pull request #85 from justincormack/empty
Allow creation of empty files
2017-06-20 13:34:09 -07:00
Justin Cormack
618dc424de Allow creation of empty files
- change to a pointer type so we can distinguish empty from unset.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-20 13:25:36 -07:00
Justin Cormack
b928a9b203 Merge pull request #84 from justincormack/rlimit
Add support for rlimits
2017-06-18 15:37:04 -07:00
Justin Cormack
ad3de8f858 Add support for rlimits
Use a microformat eg `nofile,100,200`. You can use `unlimited`
to set no limit.

Needed for https://github.com/linuxkit/linuxkit/issues/1852

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-17 16:37:24 -07:00
Justin Cormack
2e22b3adc6 Merge pull request #83 from justincormack/hyperkit-support
Use hyperkit to make raw disks
2017-06-15 16:31:59 -07:00
Justin Cormack
13da5e08ea Use hyperkit to make raw disks
- enable the hyperkit option by default on MacOS
- use it for creating raw disk images

fix #68

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-15 15:10:55 -07:00
Justin Cormack
d8cc1b3f08 Merge pull request #82 from justincormack/source-ifpresent
Allow some files specified with `source` to be optional
2017-06-15 11:22:21 -07:00
Justin Cormack
4d64a46ae9 Allow some files specified with source to be optional
See discussion in https://github.com/linuxkit/linuxkit/pull/2027

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-15 11:07:58 -07:00
Justin Cormack
d534273407 Merge pull request #81 from ijc/no-default-hostname
Do not force default hostname `moby`.
2017-06-13 17:42:18 +02:00
Ian Campbell
755c6a0bf7 Do not force default hostname moby.
This disables the code in LinuxKit's `/bin/rc.init` which attempts to detect an
unconfigured hostname and generate a unique (ish) version from the MAC address.

Anyone who wants a specific fallback hostname can populate `etc/hostname`
through the `files` stanza in their `yml` file.

Signed-off-by: Ian Campbell <ian.campbell@docker.com>
2017-06-13 16:37:42 +01:00
Justin Cormack
464396c63f Merge pull request #80 from justincormack/http-fetch-yaml
Add support to fetch yaml file with http
2017-06-13 16:58:51 +02:00
Justin Cormack
d7ca674ea6 Add support to fetch yaml file with http
For example you can do
```
moby build https://raw.githubusercontent.com/linuxkit/linuxkit/master/linuxkit.yml
```

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-12 18:11:21 +02:00
Justin Cormack
90fd3e7e41 Merge pull request #79 from justincormack/tilde
Allow ~ for home directory when specifying source of file
2017-06-12 16:43:28 +02:00
Justin Cormack
1988b312d2 Allow ~ for home directory when specifying source of file
Useful when adding ssh keys

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-12 16:37:00 +02:00
Justin Cormack
e94d0d8093 Merge pull request #78 from justincormack/add-initrd
Move the initrd library to this repo
2017-06-12 15:43:47 +02:00
Justin Cormack
322d06f906 Update vendoring to use initrd library from this repo
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-12 15:36:30 +02:00
Justin Cormack
528b430789 Clean up initrd creation library
Remove duplicated code and clean up file handling a little.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-12 15:34:30 +02:00
Justin Cormack
ddc92b8846 Code in the initrd generator to split a single tarball
In the WIP code in `moby` we now have a standard base tarball format,
that includes the kernel and cmdline as files in `/boot` so that the
entire output of the yaml file can default to a single tarball. Then
this can be split back up by LinuxKit into initrd, kernel and cmdline
as needed. This will probably become the only output of the `moby build`
stage, with a `moby package` stage dealing with output formats.

We may remove the output format specification from the yaml file as well,
and just have it in the command.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-12 15:34:22 +02:00
Justin Cormack
ecf14815f7 Update Go path to linuxkit/linuxkit for libraries
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-12 15:34:11 +02:00
Tycho Andersen
c313e39250 init: fake supporting hard links slightly differently
Instead, make a hard link a symlink. This isn't much better, but it allows
some cases (e.g. installing GCC on moby via alpine) to work.

Signed-off-by: Tycho Andersen <tycho@docker.com>
2017-06-12 15:34:02 +02:00
Justin Cormack
6bce274b81 Move Go code to src/cmd
This does not get everything where we want it finally, see #1266
nor the optimal way of building, but it gets it out of top level.

Added instructions to build if you have a Go installation.

Not moving `vendor` yet.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-12 15:33:53 +02:00
Justin Cormack
49002e7a1d Out with the old, in with the new Moby
- remove remainder of editions code
- add a new check container to run tests without Docker
- switch over `make test` to use new command to build tests

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-12 15:33:45 +02:00
Justin Cormack
ed832e185f Rough first version of the moby tool
- terrible code
- lots needs changing
- can build a Moby from a config yaml that boots

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-12 15:33:34 +02:00
Justin Cormack
6b4bae6832 Merge pull request #77 from justincormack/tar-abs
Remove absolute paths from files
2017-06-09 11:49:26 +01:00
Justin Cormack
796d943054 Remove absolute paths from files
tarballs should only have relative paths in.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-09 11:39:52 +01:00
Justin Cormack
e7fc277fd2 Merge pull request #76 from justincormack/docs
Add docs
2017-06-08 15:53:54 +01:00
Justin Cormack
eea5c6f126 Updates to the docs
Some of this was out of date or missing.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-08 15:45:49 +01:00
Justin Cormack
0eb4a49b24 Import yaml documentation from LinuxKit
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-08 14:58:29 +01:00
Justin Cormack
35ee128bfd Merge pull request #75 from justincormack/perm
Allow setting of mode in files section
2017-06-08 14:54:39 +01:00
Justin Cormack
83c166d3f2 Allow setting of mode in files section
Also keep track of directory creation there, so you can explicitly
set directory permissions if required, and to avoid duplicates.

We should really keep track of files created elsewhere in the build
as well as we still might create some extras, but at least you can
set the write permisisons.

We can add uid, gid support too if required...

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-08 14:44:02 +01:00
Justin Cormack
e0aac90f44 Merge pull request #74 from justincormack/raw-name
Fixes for output types
2017-06-07 16:52:35 +01:00
Justin Cormack
98732e8936 Fixes for output types
Make `raw` output type call its file `.raw` as well, other minor fixes.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-07 16:46:36 +01:00
Justin Cormack
68ffbb5e7e Merge pull request #72 from justincormack/rename-images
Rename img→raw and gcp-img→gcp
2017-06-07 16:38:29 +01:00
Justin Cormack
d906292096 Merge pull request #73 from justincormack/docker
Add an output format for running images with Docker
2017-06-07 16:38:14 +01:00
Justin Cormack
9a3ac36236 Add an example of building an application and running in Docker or LinuxKit
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-07 16:24:32 +01:00
Justin Cormack
dbe50976c3 Add suitable init for running in a container
This goes with the experimental `docker` output format.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-07 15:33:52 +01:00
Justin Cormack
8abeffde59 Add Docker output format
This will add a Dockerfile which will build the contents into an
image and then call `tinit` to start it.

This is fairly experimental, but is a prototype for other non
LinuxKit outputs. The container will need to run as `privileged`
as `runc` needs quite a few capabilities and `containerd` needs to
mount.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-07 15:32:02 +01:00
Justin Cormack
eabe03b702 Rename img→raw and gcp-img→gcp
- generally people refer to a plain disk image as `raw`
- `gcp` is shorter and it is the only image type supported
- remove `img-gz` as it is not needed. It does not really save space
  as you have to build the full image and compress it anyway. On
  many platforms the `raw` image will be a sparse file anyway,
  even on the Mac soon.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-07 14:43:43 +01:00
Justin Cormack
ca677b3c40 Merge pull request #71 from justincormack/output-file
Use streaming output where possible
2017-06-07 14:28:44 +01:00
Justin Cormack
c2806000e0 Use streaming APIs rather than buffers for building
This should lower memory usage a lot and should be faster.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-07 12:13:12 +01:00
Justin Cormack
b086231008 Allow streaming output for tar
This is a little ugly in terms of the validation now, but it is a move towards
splitting "build" and "package".

The "tar" output (and soon others) can output direct to a file or to stdout.
Obviously you can only build a single output format like this.

The LinuxKit output formats that build disk images cannot stream as they
have to build whole images. These allow multiple outputs.

In future we will probably change to
```
moby build | moby package
```

or similar, but that is a bit ugly, so currently have a compromise where
there are essentially two output types.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-06 14:50:28 +01:00
Justin Cormack
181c66d42c Merge pull request #70 from justincormack/multiple-yaml
Allow specification of multiple yaml files for a single build
2017-06-05 16:39:31 +01:00
Justin Cormack
3a16c02f10 Merge pull request #69 from justincormack/gcp-fix
Do not use Linuxkit to build GCP images for now
2017-06-05 15:37:48 +01:00
Justin Cormack
e879037646 Disable use of linuxkit for GCP for now
GCP does not recognise the images, even though they appear identical to those made
by libguestfs and work on qemu fine. Their validation code does not like them for some
reason.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-05 15:31:45 +01:00
Justin Cormack
503545a2de Merge pull request #67 from riyazdf/trust-caching
trust: check local image cache to not pull every time
2017-06-04 19:31:47 +01:00
Justin Cormack
54e58f2808 Allow specification of multiple yaml files for a single build
Each section will be appended in order of the CLI, other then
kernel where last specified one wins.

This is useful if you eg want to have a base version for (say)
AWS and GCP and then add your own image on top.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-04 17:50:13 +01:00
Riyaz Faizullabhoy
6c6190172c trust: include trust configuration in docker inspect for OCI config
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-06-02 15:18:55 -07:00
Justin Cormack
058ce768f4 Merge pull request #66 from justincormack/linuxkit-part2
Add the temporary directories under ~/.moby
2017-06-02 22:39:41 +01:00
Justin Cormack
5b73f53dcf Put tmp direcories under ~/.moby
Docker4Mac won't bind mount default tmp dir into containers

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-02 22:36:21 +01:00
Riyaz Faizullabhoy
6221552204 trust: check local image cache to not pull every time
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-06-02 13:03:47 -07:00
Justin Cormack
294389aef9 Merge pull request #49 from justincormack/linuxkit
Use linuxkit to build qcow2 and raw image disks, rather than docker containers with libguestfs
2017-06-02 16:39:28 +01:00
Justin Cormack
249bbc56ed Use linuxkit to build qcow2 and raw image disks, rather than docker containers with libguestfs
- does not require docker if user has qemu natively, will still fall back to docker
- allow specifying size for fixed size disk images
- add a raw disk output format
- more dogfooding
- marginally slower, but can be improved later

The images used to do the build are cached to make the process quicker.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-02 16:33:06 +01:00
Justin Cormack
d599aedb7f Merge pull request #62 from riyazdf/config-dir-trust
add default trust config and cache dir
2017-06-02 16:25:52 +01:00
Riyaz Faizullabhoy
46b77f699f add default config and cache dir, initially use for trust
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-06-02 08:14:03 -07:00
Justin Cormack
dd60edc884 Merge pull request #65 from justincormack/mobydir
Add a ~/.moby directory for config
2017-06-02 15:16:31 +01:00
Justin Cormack
cf8d8ca014 Add a ~/.moby directory for config
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-06-02 15:12:00 +01:00
Justin Cormack
cde8329d2f Merge pull request #61 from FrenchBen/validate-output
Validate output before doing the work
2017-06-01 22:39:56 +01:00
Justin Cormack
edcf4d0362 Merge pull request #59 from riyazdf/trust-parse-fixes-and-tests
trust: parsing fixes and tests
2017-06-01 22:35:59 +01:00
French Ben
23856c1e46 Validate output before doing the work
Signed-off-by: French Ben <frenchben@docker.com>
2017-06-01 14:30:41 -07:00
Riyaz Faizullabhoy
e0fc007b5a test cases with default golang lib
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-06-01 11:27:01 -07:00
Riyaz Faizullabhoy
99eeb981a7 trust: improve org checks to enable library official repo checks
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-06-01 11:20:36 -07:00
Justin Cormack
dec7f8bb2b Merge pull request #58 from riyazdf/disable-trust-flag
add disable-content-trust flag for one-off build
2017-06-01 10:52:36 +01:00
Riyaz Faizullabhoy
32f167bd9e trust: fix splitting on tags and digests and add tests
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-31 16:42:42 -07:00
Riyaz Faizullabhoy
1ecfc11160 add disable-content-trust flag for one-off build
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-31 14:51:59 -07:00
Justin Cormack
5cd1e4e2ae Merge pull request #56 from justincormack/host-root
Change the default namespaces
2017-05-30 15:35:01 +01:00
Justin Cormack
dfd57aeeee Change the default namespaces
Default to sharing net, ipc, uts namespaces between containers in config.
This makes most sense, as this is normal other than if we want to specifically
isolate system containers, in which case we will specify in config.

- explicitly support the value "new" if you want to isolate
- support the synonym "root" for "host" as in non LinuxKit setups it may
  not actually be the host, it will be the current namespace.
- only support "none" as a synonym for "new" for network namespace where it is
  carried over from Docker.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-30 14:41:33 +01:00
Justin Cormack
101fa30ef3 Merge pull request #54 from riyazdf/trust-tag-fix
trust: always tag after pull
2017-05-27 10:33:27 +01:00
Riyaz Faizullabhoy
81d17913d1 trust: always tag after pull
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-26 18:44:58 -07:00
Justin Cormack
5111146a4f Merge pull request #53 from riyazdf/rbind
Always include rbind in user-specified volume options
2017-05-26 23:56:06 +01:00
Riyaz Faizullabhoy
11ebab55e2 Always include rbind in user-specified options
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-26 15:39:57 -07:00
Justin Cormack
4e4629e05c Merge pull request #51 from riyazdf/trust-tmpdir
trust: use a tempdir and remove after build
2017-05-26 22:47:37 +01:00
Riyaz Faizullabhoy
92aa526b9d trust: use a tempdir and remove after build
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-26 14:29:44 -07:00
Justin Cormack
e8dc61e910 Merge pull request #48 from justincormack/dir-fixes
Fix build in directory
2017-05-26 15:28:18 +01:00
Justin Cormack
b8cdb985fd Fix build in directory
Remove unnecessary argument to buildInternal function, does not need to know the name.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-26 15:22:12 +01:00
Justin Cormack
2cd3a5b141 Merge pull request #47 from justincormack/dir
Add a -dir option for location of output files
2017-05-26 15:02:29 +01:00
Justin Cormack
f73558a98a Add a -dir option for location of output files
Fix #17

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-26 14:53:17 +01:00
Justin Cormack
5de12a0085 Merge pull request #46 from justincormack/gitignore
Fix gitignore to not ignore moby directory
2017-05-26 14:47:45 +01:00
Justin Cormack
27709ce1c0 Fix gitignore to not ignore moby directory
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-26 14:45:19 +01:00
Justin Cormack
1cb9fab3e1 Merge pull request #45 from justincormack/clean
Add make clean, .gitignore
2017-05-26 13:34:06 +01:00
Justin Cormack
f6b9076649 Merge pull request #43 from justincormack/outputs-not-in-yaml
Remove output formats from the Yaml file, put in CLI
2017-05-26 13:33:17 +01:00
Justin Cormack
cbbedbfc57 Remove output formats from the Yaml file, put in CLI
This removes outputs from yaml, instead you can do
```
moby build -output tar -output qcow2 file.yaml
```
or alternative syntax
```
moby build -output tar,qcow2 file.yaml
```

In future we may change this to be available in a `moby package`
step, but lets try this for now.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-26 13:00:45 +01:00
Justin Cormack
dfd1cd9c1c Add make clean, .gitignore
Also tidy Makefile a bit

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-26 12:47:06 +01:00
Justin Cormack
f65146c844 Merge pull request #41 from riyazdf/remove-run
Remove docker run function as it is unused
2017-05-26 10:43:56 +01:00
Justin Cormack
ff4a19c5fb Merge pull request #44 from AkihiroSuda/fix-tmpfs
config: fix tmpfs parsing
2017-05-26 10:42:22 +01:00
Akihiro Suda
41c536908d config: fix tmpfs parsing
Signed-off-by: Akihiro Suda <suda.akihiro@lab.ntt.co.jp>
2017-05-26 08:24:48 +00:00
Riyaz Faizullabhoy
dfca3b9775 Remove docker run function as it is unused
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-23 13:30:29 -07:00
Justin Cormack
b47f3dec4a Merge pull request #27 from chanwit/add_source
add Source attribute to File
2017-05-22 11:28:06 +01:00
Justin Cormack
339aa5ec86 Merge pull request #39 from justincormack/nullable
Add support for override of parameters using a label
2017-05-18 23:09:37 +01:00
Justin Cormack
c734b47e9c Add support for override of parameters using a label
Using the label `org.mobyproject.config` will use that JSON
(or yaml, but it is very hard to get yaml into a label as newlines are
not respected) for parameters that are not explicitly set in the yaml file.

Had to change parameter definitions so override behaves as expected.

fix #16

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-18 17:48:15 +01:00
Justin Cormack
df7f50a755 Merge pull request #37 from riyazdf/circle-fix
Fixup circle CI
2017-05-15 19:59:51 +01:00
Riyaz Faizullabhoy
57f1a5bdf2 Fixup circle CI
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-15 11:55:53 -07:00
Justin Cormack
219847ff1a Merge pull request #36 from riyazdf/fix-circle
Update working dir and get golint for circle tests
2017-05-15 18:25:45 +01:00
Riyaz Faizullabhoy
62f8a69b38 Update working dir and get golint for circle tests
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-15 10:17:16 -07:00
Justin Cormack
b48e969bf8 Merge pull request #34 from riyazdf/simple-test
Simple test target
2017-05-15 17:59:22 +01:00
Riyaz Faizullabhoy
039e4f6f60 Change to tar output
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-15 09:58:26 -07:00
Justin Cormack
d7611ee0e3 Merge pull request #35 from justincormack/windows-fixes
Update vendoring for Windows support
2017-05-15 17:36:29 +01:00
Justin Cormack
5a226337a9 Update vendoring for Windows support
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-15 17:32:10 +01:00
Riyaz Faizullabhoy
d020a54aa7 Sample circle yml, not hooked in yet
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-15 09:27:34 -07:00
Riyaz Faizullabhoy
39d74773fc Simple make test target
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-15 09:27:29 -07:00
Justin Cormack
a9a00fae62 Merge pull request #33 from justincormack/img-gz
Add a compressed disk image format
2017-05-12 14:43:13 +01:00
Justin Cormack
1274f81f81 Add a compressed disk image format
This is a fairly generic bootable disk with syslinux. Should
work if you dd it onto a USB stick, and should also work for AWS.

You need to uncompress it of course! Default size is 1G.

Will add cli option to set the size once I split out `moby build`
and `moby package` shortly.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-12 14:29:14 +01:00
Justin Cormack
1135cdddcc Merge pull request #32 from justincormack/fix-pull
Fix docker pull
2017-05-12 13:08:17 +01:00
Justin Cormack
0ade84e151 Fix docker pull
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-12 13:04:19 +01:00
Justin Cormack
91e78b73b9 Merge pull request #31 from justincormack/fix-exec
Add missing import
2017-05-12 11:42:03 +01:00
Justin Cormack
8a71fbdbb6 Add missing import
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-12 11:41:37 +01:00
Justin Cormack
9afbc24c79 Merge pull request #30 from riyazdf/revert-run-api
Revert "Use Docker API for run"
2017-05-12 11:31:33 +01:00
Justin Cormack
4bef9648f9 Merge pull request #18 from riyazdf/docker-pull-api
implement docker pull using docker API + notary library
2017-05-12 11:30:49 +01:00
Riyaz Faizullabhoy
e26f2878d3 Revert "Use Docker API for run"
This reverts commit ec6fea1d67.
2017-05-11 17:32:32 -07:00
Chanwit Kaewkasi
d83c35259a add Source attribute to File
Signed-off-by: Chanwit Kaewkasi <chanwit@gmail.com>
2017-05-12 01:01:53 +07:00
Riyaz Faizullabhoy
9afeda3c78 Vendoring for notary
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-11 10:11:38 -07:00
Riyaz Faizullabhoy
abf0028ee8 Use docker and notary API for pull
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-11 10:11:19 -07:00
Justin Cormack
ba07bbfb0d Merge pull request #26 from justincormack/gitignore-del
Remove .gitignore
2017-05-10 17:00:17 +01:00
Justin Cormack
0ea9dfdfe1 Remove .gitignore
Was ignoring too much...

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-10 16:59:25 +01:00
Justin Cormack
11b913606d Merge pull request #11 from riyazdf/run-api
Use Docker API for run
2017-05-09 16:31:57 +01:00
Justin Cormack
0a06eb2cea Merge pull request #25 from justincormack/fix-symlinks-misc
Fix symlinks handling in initramfs
2017-05-09 13:54:17 +01:00
Justin Cormack
fbdd5047dd Update linuxkit vendor
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-09 13:45:48 +01:00
Justin Cormack
6187570b7a Add missing Close in initrd creation
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-09 13:34:41 +01:00
Justin Cormack
cc2a3a645f Add support for symlinks in files section
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-09 13:15:11 +01:00
Justin Cormack
96ae98d2d5 Do not log information about empty sections
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-09 13:12:51 +01:00
Justin Cormack
e25033f70d Allow no kernel to be specified
This is needed for non LinuxKit use cases.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-09 13:03:58 +01:00
Justin Cormack
a1b24b4de2 Merge pull request #24 from MagnusS/fix-build
Don't exit after pulling init or kernel image without -pull
2017-05-08 20:14:03 +01:00
Magnus Skjegstad
09c2904994 Don't exit after pulling init or kernel image
Due to a missing else the tool would previously terminate with an error
message showing that the kernel or init image didn't exist, even if it
was pulled successfully. Invoking the tool again would continue to the
next image.

Signed-off-by: Magnus Skjegstad <magnus@skjegstad.com>
2017-05-08 20:48:20 +02:00
Justin Cormack
86b4d1cdb2 Merge pull request #23 from justincormack/fmt
Go fmt
2017-05-08 17:50:44 +01:00
Justin Cormack
7c33eb81b6 Go fmt
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-08 17:50:11 +01:00
Justin Cormack
aa51e43be9 Merge pull request #22 from justincormack/tar-boot-rework
Add tar output format
2017-05-08 17:31:01 +01:00
Justin Cormack
dd08b2b70a Add tar output format
Add a canonical single tarball output format. This
adds kernel and cmdline to `/boot` where LinuxKit output
formats will find them.

Make the other output formats use that as a base.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-08 17:19:08 +01:00
Justin Cormack
30d6bc5f5a Merge pull request #21 from justincormack/vndr-cleanup
Revendor with a newer `vndr`
2017-05-08 17:12:05 +01:00
Justin Cormack
20bf9d44ea Revendor with a newer vndr
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-05-08 17:10:44 +01:00
Justin Cormack
3e3eec7642 Merge pull request #13 from riyazdf/linting
Add standard lint tools to Makefile
2017-05-03 16:47:09 +01:00
Riyaz Faizullabhoy
b93922a1c5 Add standard lint tools to Makefile
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-05-01 10:49:54 -07:00
Justin Cormack
45a3e4ccd2 Merge pull request #15 from alexellis/support_none
Support `capabilities: none` in YML - Fix #14
2017-05-01 16:35:57 +01:00
Alex Ellis
b046618027 Support none as capabilities.
Signed-off-by: Alex Ellis <alexellis2@gmail.com>
2017-05-01 16:08:23 +01:00
Justin Cormack
0b149e7c83 Merge pull request #12 from riyazdf/img-not-found-err
Use IsErrNotFound to tighten err handling
2017-05-01 11:22:28 +01:00
Riyaz Faizullabhoy
95a9a4ff67 Use IsErrNotFound to tighten err handling
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-04-28 10:50:58 -07:00
Riyaz Faizullabhoy
ec6fea1d67 Use Docker API for run
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-04-28 10:45:37 -07:00
Justin Cormack
d504afe479 Merge pull request #10 from justincormack/pull-before-create
Make sure we always pull images if create fails
2017-04-28 16:23:36 +01:00
Justin Cormack
d0f867e9b2 Make sure we always pull images if create fails
`docker create` will not pull an image so we need an additional fallback.

Rework the pull and trust code so it is in one place to facilitate this.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-28 16:14:15 +01:00
Justin Cormack
dbd2593328 Merge pull request #8 from justincormack/no-bzimage
Switch from bzImage to kernel for kernel image
2017-04-28 13:56:59 +01:00
Justin Cormack
ef017ac223 Support both kernel and bzImage for now
Also do not require `tar` to be in container, use the standard
image export code that we already have and find the files we
want.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-28 12:48:04 +01:00
Justin Cormack
2cd9bead88 Switch from bzImage to kernel for kernel image
This was too architecture specific previously.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-28 12:38:04 +01:00
Justin Cormack
3375f32d51 Merge pull request #9 from riyazdf/docker-api-usage
Use Docker API for part of tool
2017-04-28 11:48:52 +01:00
Riyaz Faizullabhoy
37f57cfa84 Use Docker API for rm, create, export, and inspect
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-04-27 14:09:17 -07:00
Riyaz Faizullabhoy
fcdfe5c356 vendor new client and api
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-04-27 13:31:16 -07:00
Justin Cormack
4694f5a7ec Merge pull request #7 from justincormack/makefile
Add a simple Makefile
2017-04-27 14:29:26 +01:00
Justin Cormack
719025a708 Add a simple Makefile
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-27 14:25:07 +01:00
Justin Cormack
7517c830d7 Merge pull request #6 from AkihiroSuda/stdin
build: support reading yaml from stdin
2017-04-27 14:12:34 +01:00
Akihiro Suda
d98f23c2ba build: support reading yaml from stdin
Signed-off-by: Akihiro Suda <suda.akihiro@lab.ntt.co.jp>
2017-04-25 10:26:34 +00:00
Justin Cormack
75a784f74b Merge pull request #3 from justincormack/clean-vendor
Clean vendor directory
2017-04-25 00:07:00 +01:00
Justin Cormack
08e1ca0795 Clean vendor directory
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-25 00:06:11 +01:00
Justin Cormack
3527ecc6d9 Merge pull request #2 from justincormack/license
Add license files
2017-04-24 23:09:21 +01:00
Justin Cormack
ba3d79a258 Add license files
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-24 23:08:30 +01:00
Justin Cormack
8fa71bd1a9 Merge pull request #1 from justincormack/vendor
Add vendoring and move to cmd
2017-04-24 23:07:08 +01:00
Justin Cormack
fa88ca8ede Move src/cmd to cmd
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-24 22:58:37 +01:00
Justin Cormack
81288f9221 Add vendoring
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-24 22:56:08 +01:00
Justin Cormack
8968335e59 Split cli into moby and linuxkit
moby just does the simple `build` cases, while `linuxkit` does
`push` and `run`.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-24 20:03:22 +01:00
Justin Cormack
4e1317d213 Split build and push, and remove push code from run
This currently only changes the `gcp` target, but is the new
model - the `build` command will only do things locally, then
you need to `push` to an image store such as GCP or other ones
in order to `run` for platforms that cannot boot directly from
a local image.

Fix #1618

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-24 17:12:05 +01:00
Dave Tucker
b556f51b47 moby: Add container fallback for moby run qemu
This commit allows moby run qemu to fallback to using a container if
qemu isn't installed on the host OS

Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-24 15:16:57 +01:00
Rolf Neugebauer
9deb9c044d src: Use hyperkit from the the moby org
HyperKit got moved from docker to moby. Update vendoring and
imports.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-24 10:53:59 +01:00
Riyaz Faizullabhoy
c1a5c412fb Merge pull request #1653 from dave-tucker/ltp-ci
Changes required to run LTP tests in CI
2017-04-23 13:22:40 -07:00
Dave Tucker
327138876a moby: add skip-cleanup flag to moby run gcp
This is used as the CI will cleanup after itself

Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-19 16:02:48 +01:00
Daniel Finneran
85b33baf58 Fix for prefix for linuxkit
Signed-off-by: Dan Finneran <daniel.finneran@gmail.com>
2017-04-18 19:00:31 -05:00
solidnerd
bd8017a4e1 Rename package initrd in build.go
This will rename github.com/docker/moby/src/initrd to github.com/linuxkit/linuxkit/src/initrd

Signed-off-by: solidnerd <niclas@mietz.io>
2017-04-18 20:19:21 +02:00
Rolf Neugebauer
49d735bc2f cli: Unify environment variables for GCP run
GCP defines some "standard" environment variables for project and
zone. Use them for 'moby run gcp'. Change the other environment
variables to follow the same pattern.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-15 12:36:46 -05:00
Rolf Neugebauer
481d584659 cli: Update images to use the linuxkit hub org
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-12 21:28:17 +01:00
Ilya Dmitrichenko
31f5a0baa8 Generate VM UUID
Signed-off-by: Ilya Dmitrichenko <errordeveloper@gmail.com>
2017-04-12 17:33:26 +01:00
Thomas Gazagnaire
4504e6d386 fix yaml validation for image mounts
Signed-off-by: Thomas Gazagnaire <thomas@gazagnaire.org>
2017-04-12 15:28:02 +02:00
Justin Cormack
8f18d92bee Merge pull request #1599 from avsm/packet-net-run
Add `moby run packet` to boot on baremetal Packet.net hosts
2017-04-12 13:40:50 +01:00
Thomas Gazagnaire
b9a964060b better comment in converter for yaml validation
Signed-off-by: Thomas Gazagnaire <thomas@gazagnaire.org>
2017-04-12 14:10:27 +02:00
Anil Madhavapeddy
0175778e83 Add moby run packet to boot on baremetal Packet.net hosts
This uses the Packet.net API and iPXE to boot a Moby host.
There are several enhancements coming soon, such as SSH key
customisation, but this PR is sufficient to boot a host and
then use the web interface to get console access.

The user must currently upload the built artefacts to a public
URL and specify it via --base-url, e.g.:
moby run packet --api-key <key> --project-id <id> \
  --base-url http://recoil.org/~avsm/ipxe --hostname test-moby packet

See #1424 #1245 for related issues.

Signed-off-by: Anil Madhavapeddy <anil@docker.com>
2017-04-12 12:59:05 +01:00
Thomas Gazagnaire
02038f512d Add Yaml validation
Fix #1292

Transform the Yaml struct to JSON and validate it against a JSON schema.

Signed-off-by: Thomas Gazagnaire <thomas@gazagnaire.org>
2017-04-12 13:42:15 +02:00
Justin Cormack
c9c6d20a45 Merge pull request #1596 from thebsdbox/qemu_raw_disk
Fixed qemu argument typo and also correct use of raw disk
2017-04-12 12:03:33 +01:00
thebsdbox
f7210ab4b4 Fixed qemu argument typo and also correct use of raw disk
Signed-off-by: Dan Finneran <daniel.finneran@gmail.com>
2017-04-12 11:19:58 +01:00
Dave Tucker
d5264ac9e7 moby: Add system disk and disk size parameter to GCP
This makes gcp behave in a similar way to the qemu backend.
The minimum size on GCP 1GB, whereas qemu uses 256MB.
Without this, the LTP tests fail on GCP.

Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-12 00:52:01 +01:00
Dave Tucker
52f62bb30c moby: enable internet access for GCP VM's
Adds an "access config" with a type of "ONE_TO_ONE_NAT" that
allows an instance to obtain an ephemeral IP address and access the
internet

Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-11 23:36:31 +01:00
thebsdbox
b6e8d4fd63 Added Linux $PATH support and fixed FlagSet typo
Signed-off-by: Dan Finneran <daniel.finneran@gmail.com>
2017-04-11 11:48:51 +01:00
Anil Madhavapeddy
eae5422a0d tweak moby run CLI help to reflect that it supports GCP as well
Signed-off-by: Anil Madhavapeddy <anil@docker.com>
2017-04-11 11:18:55 +01:00
Justin Cormack
5527a3b6a1 Merge pull request #1577 from riyazdf/errchecking
catch and handle errors in src/cmd/moby
2017-04-10 21:48:41 +01:00
Riyaz Faizullabhoy
37adb881f7 catch and handle errors in src/cmd/moby
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-04-10 13:36:46 -07:00
Riyaz Faizullabhoy
0aaeb92a44 qemu: catch error on disk create and exit with message
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-04-10 12:09:54 -07:00
Justin Cormack
d11a78982a Merge pull request #1571 from dave-tucker/panic
Fix panic in gcp code
2017-04-10 17:37:52 +01:00
Dave Tucker
7d519cb9b8 moby: use type assertion to avoid panic in gcp code
Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-10 17:29:59 +01:00
Rolf Neugebauer
650d9011f4 cli: Adjust run_hyperkit to changed API
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-10 15:56:20 +01:00
Justin Cormack
66467544be Merge pull request #1521 from thebsdbox/qemu
CLI: Added qemu backend
2017-04-09 13:56:09 +01:00
thebsdbox
3446edbd0b CLI: Added qemu backend
Signed-off-by: Dan Finneran <daniel.finneran@gmail.com>
2017-04-09 13:49:00 +01:00
Riyaz Faizullabhoy
bd2211b645 trust: clean up logic for digests and orgs
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-04-08 17:25:18 -07:00
Justin Cormack
8176403426 system → onboot daemon → services
As suggested by @shykes these are clearer

- onboot for things that are run at boot time to completion
- services for persistent services

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-08 16:56:47 +01:00
Riyaz Faizullabhoy
68d8788e3b Enforce content trust with trust key and yaml subkeys for image and org
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-04-07 16:29:25 -07:00
Dave Tucker
799879d76d moby: Add -img-name flag to moby run gcp
This allows overriding the name used of the file in google storage,
image name or instance name. This will vary depending on how much `moby
run` is doing which is goverened by whether the positional argument
contains an `.img.tar.gz` or not.

For example:

`moby run gcp -img-name test-ea34d1 test` creates an instance called
`test-ea34d1` from the image `test`

`moby run gcp -img-name test-ea34d1` test.img.tar.gz` will upload the
file as `test-ea34d1.tar.gz`, create image `test-ea34d1` and create an
instance called `test-ea34d1`.

The use case for this is for CI to be able to spawn many concurrent test
machines and provide it's own name for them.

Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-07 15:35:54 +01:00
Dave Tucker
0d8850d5d1 moby: Allow combination of env vars and flags for gcp
Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-07 15:22:27 +01:00
Justin Cormack
7e1f2088d3 Make init accept a list of images not just a single one.
fix #1527

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-07 14:25:28 +01:00
Justin Cormack
be9ee95c4c Write the initrd incrementally
Slightly better for demo flow as no long pause at the end

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-07 11:37:40 +01:00
Rolf Neugebauer
2cce03f19e cli: Add option to the IP address for HyperKit VM
Note: This currently requires a custom version of VPNKit.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-07 10:52:40 +01:00
Justin Cormack
7a5cdfd90c Merge pull request #1530 from ijc25/create-directories-from-yaml
Support creating of directories in files section
2017-04-07 10:28:23 +01:00
Ian Campbell
a3ac69639b Support creating of directories in files section
e.g.
    files:
     - path: etc/docker/daemon.json
       contents: '{"debug": true}'
     - path: var/lib/mydaemon
       directory: true

Signed-off-by: Ian Campbell <ian.campbell@docker.com>
2017-04-07 09:55:18 +01:00
Justin Cormack
430f03b6a0 Merge pull request #1522 from dave-tucker/gce-gcp
Use GCP everywhere for consistency
2017-04-06 17:27:15 +01:00
Dave Tucker
78c49b247a moby: Add gcp platform to usage in moby run
Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-06 17:10:04 +01:00
Dave Tucker
420661277a moby: Replace references to GCE with GCP
Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-06 17:00:53 +01:00
Justin Cormack
57e2076031 Add more OCI features
- masked paths
- readonly paths
- allow attaching to existing namespaces, eg if bind mounted by a system container

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-06 15:05:08 +01:00
Justin Cormack
781b05da9d Merge pull request #1514 from rneugeba/cli-up
Improvements to the CLI
2017-04-06 13:01:58 +01:00
Rolf Neugebauer
048218f7c8 cli: Add a 'version' version
Pass version and git commit hash from the Makefile
into main.go. Add a 'version' subcommand to print
the information.

While at it also tweak the help output to only print the
command name and not the entire path.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-06 12:29:52 +01:00
Rolf Neugebauer
ae4b9ba897 cli: Fix "build" when the basename contains a "."
Something like "moby-4.10.yml" did not work when invoked
like "moby build moby-4.10".

While at it, also allow .yaml as an extension.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-06 10:55:18 +01:00
Justin Cormack
d0aff83a21 Add more OCI options
- Sysctl
- CgroupsPath
- RootfsPropagation

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-05 20:46:16 +01:00
Justin Cormack
1602277ba7 Merge pull request #1492 from dave-tucker/gcp
Add gcp backend for moby run
2017-04-05 15:17:01 +01:00
Justin Cormack
bc1dd84337 Merge pull request #1500 from justincormack/mount-overrides
Allow overriding the default mount options
2017-04-05 15:13:06 +01:00
Justin Cormack
c1c71a7f68 Allow overriding the default mount options
This refactors the mount handling, without changing any defaults.

Any specification of a mount destination will override the default,
so if you want to make `sysfs` read only you can add

```
mounts:
  - type: sysfs
    options: ["ro"]
```

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-05 15:00:13 +01:00
Dave Tucker
6521cd05f8 run: Add gcp backend
This commit implements `moby run gcp` which allows for testing of moby
images on the Google Cloud Platform

This backend attaches (via SSH) to the serial console.
It generates instance-only SSH keys and adds the public key to the
image metadata. These are used by the `moby` tool only.

It will also automatically upload a file and creates an image if the prefix
given to `moby run` is a filename

Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-05 14:50:23 +01:00
Dave Tucker
af16e13672 build: Use older GCP API and support service account auth
This commit uses the older GCP API as it supports both compute and
storage. As a result, we can now use either Application Default
Credentials that are generated using the `gcloud` tool or by supplying the
service account credentials in JSON format

Signed-off-by: Dave Tucker <dt@docker.com>
2017-04-05 14:50:16 +01:00
Justin Cormack
8d22f19618 Fix typo that meant modules were missing from image
fix #1393 thanks @deitch

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-05 13:24:42 +01:00
Justin Cormack
a7bda72430 Merge pull request #1496 from justincormack/all-caps
Allow setting capabilities to "all"
2017-04-05 13:04:26 +01:00
Justin Cormack
8de5ab5d74 Add the standard options Docker sets for /proc
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-05 11:52:17 +01:00
Justin Cormack
475d29eae1 Allow setting capabilities to "all"
This adds every capability. We had this before the OCI changes as we
passed these values to Docker. Makes fully privileged containers less verbose.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-05 11:18:46 +01:00
Justin Cormack
ee2f8bc7e3 Split out OCI generation function
This is to make unit testing easier for #1481

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-04 11:28:30 +01:00
Justin Cormack
69b96d3aa7 Merge pull request #1479 from justincormack/command
Revert Command->Args but remove from yaml where not needed
2017-04-04 10:49:32 +01:00
Justin Cormack
bd87295e43 Revert Command->Args but remove from yaml where not needed
In the riddler change I changed "command" in the yaml to "args"
but did not change the files. In fact we basically used the
default command everywhere so this did not actually break.

Remove the unnecessary "command" lines to simplify yaml.

Revert the command to args change for now as I think I prefer
command, but its easier to switch now. Need to think if the
entrypoint/command distinction matters before finalizing.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-04 09:51:17 +01:00
Justin Cormack
b6b7eb08d2 Disable log driver for docker run
We are generally outputting to stdout pipe which the log driver does
not cope with very well; always did this in older builds.

Saves another 5% of build time.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-04 09:36:25 +01:00
Rolf Neugebauer
c6ba8ab4eb Merge pull request #1447 from thebsdbox/vmware
VMware backend support
2017-04-04 09:07:25 +01:00
Justin Cormack
d293eeadf6 Replace riddler with code that constructs config.json directly
Generated largely from the specified config; small parts taken from `docker image inspect`,
such as the command line.

Renamed some of the yaml keys to match the OCI spec rather than Docker Compose as
we decided they are more readable, no more underscores.

Add some extra functionality
- tmpfs specification
- fully general mount specification
- no new privileges can be specified now

For nostalgic reasons, using engine-api to talk to the docker cli as
we only need an old API version, and it is nice and easy to vendor...

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-04-03 23:28:55 +01:00
Ian Campbell
1477639e09 Update to runc ef9a4b315558d31eae520725ff67383c2f79c3cb
This is compatible with containerd 8353da59c6ae7e1933aac2228df23541ef8b163f
which was picked up by d2caae4c1a.

This required jiggering with riddler output some more to update to new OCI
config.json format for capabilities.

Signed-off-by: Ian Campbell <ian.campbell@docker.com>
2017-04-03 16:47:14 +01:00
thebsdbox
ab2ec26949 VMware Fusion 8.x / Workstation 12+ / VMware VIX vmrun support
Signed-off-by: Dan Finneran <daniel.finneran@gmail.com>
2017-04-03 14:19:13 +01:00
Rolf Neugebauer
156aab8b7d cli: Add support for passing meta data to a hyperkit VM
Add a -data option to the HyperKit "run" backend. This either
adds a string or a file to a ISO which is attached to the VM.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-02 19:35:45 +01:00
Rolf Neugebauer
2c91f6273f cli: Simplify run_hyperkit.go
Separating command line option parsing from executing hyperkit
makes the code awkward with many parameters passed between functions.

Having everything in one function makes the code simpler.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-02 19:33:25 +01:00
Rolf Neugebauer
681076f1a3 cli: Don't default to "moby" for run
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-02 19:33:25 +01:00
Rolf Neugebauer
397c4332f2 cli: Make the ".yml" extension optional for builds
This provides a consistent UX between build and run:
moby build foo   # build from foo.yml
moby run foo     # boot, e.g., foo-bzImage, foo-initrd.img

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-02 19:33:25 +01:00
Rolf Neugebauer
598dd31a7d cli: Don't default to moby.yml
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-02 19:33:25 +01:00
Rolf Neugebauer
5f9b98e8a7 cli: Use fixed mkimage-iso-efi image
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-04-01 16:25:02 +01:00
Rolf Neugebauer
35e1444cf2 cli: Add option to specify hyperkit to use
Some users seem to have Docker for Mac/hyperkit in a non-standard
path. Allow them to specify the path to the hyperkit executable.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-31 19:21:02 +01:00
Rolf Neugebauer
b64f74bd27 cli: Add support for multiple backends for "moby run"
- Move HyperKit code into a separate file. It should be compilable
  on all supported OSes now.
- Add a (optional) subcommand to "moby run" to select a backend
  i.e., "moby run hyperkit [options] [prefix]"
- On macOS the default is "hyperkit" so that:
  "moby run [options] [prefix]"
  just works
- Add enough command line parsing to make it easy to add new
  backends to the run command
Update help messages.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-30 18:59:07 +01:00
Rolf Neugebauer
cc77b36bba cli: Move "run" flag processing into the run implmentation
While at it also fix up the HyperKit run help message.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-30 16:00:06 +01:00
Rolf Neugebauer
df292ed56e cli: Move "build" flag processing into build.go
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-30 15:59:52 +01:00
Rolf Neugebauer
9297e70def moby: Create custom formatter for Info() log events
This formatter strips the prefix from Info() events to
make the default output of "moby build" more readable.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-29 13:43:27 +01:00
Rolf Neugebauer
71ee15c005 moby: Add informational output to build
This adds log.Info() to the main steps of the "moby build"
process. By default the Info() output is shown to the user
so it provides some idea of progress and what is happening.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-29 10:53:18 +01:00
Rolf Neugebauer
32b32ea78d moby: Add debug logging to "moby build" code
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-29 10:25:28 +01:00
Rolf Neugebauer
6814e21c0a moby: Add verbose and quiet flags to moby commandline
These set the log level to Debug and Error. The default
log level is set to Info.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-29 10:25:28 +01:00
Rolf Neugebauer
7c6eca2e8e moby: Switch to use logrus instead of default logger
logrus offers better control over log-levels.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-29 10:25:28 +01:00
Thomas Gazagnaire
0ab9624897 Fix typo in moby run
Signed-off-by: Thomas Gazagnaire <thomas@gazagnaire.org>
2017-03-28 11:08:28 +02:00
Rolf Neugebauer
9507f102cc Rename .yaml to .yml
docker-compose and other utilities use the .yml extension.
For consistency rename all .yaml to .yml

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-27 09:53:26 +02:00
Riyaz Faizullabhoy
594253b0a8 fmt string fixes
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-03-24 10:19:21 -07:00
Justin Cormack
af846e8014 Add a moby build --pull option to force pulling images
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-24 17:15:34 +00:00
Justin Cormack
630cafe592 Merge pull request #1378 from justincormack/riddler-files
Use Go code to extract rootfs from system containers
2017-03-24 13:36:51 +00:00
Justin Cormack
dd4ee77a23 Use Go code to extract rootfs from system containers
- this removes the use of riddler to extract the rootfs, use code
  we were using for rootfs. riddler now just geenrates the config,
  next stage is to generate this ourselves
- change the naming of the daemons so no longer include number as we
  do not guarantee ordering as they start up simultaneously

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-24 13:05:28 +00:00
Justin Cormack
c33896dcdc Merge pull request #1357 from thebsdbox/vmdk
added the capability to produce a vmdk file through Moby
2017-03-23 11:25:58 +00:00
dan
3fa494cb60 Added the capability to output moby images as vmdk files for use with VMware Workstation/Fusion
Corrected naming from vmware->vmdk and fixed Makfile

Fixed mistake outputting a vhd instead of a vmdk in output.go

Build vmdk image and added to Docker Hub, corrected link in output.go

Modified directories to confirm to standard mkimage-<imgType>

Signed-off-by: Dan Finneran <dan@thebsdbox.co.uk>
2017-03-23 11:16:40 +00:00
Justin Cormack
a2049a0da9 Merge pull request #1370 from justincormack/no-docker2tar
Remove docker2tar docker image, use Docker directly from Go
2017-03-23 09:44:21 +00:00
Justin Cormack
b63d27d405 Remove docker2tar docker image, use Docker directly from Go
Removing the left over indirect creates that use the Docker socket
and run in containers not directly.

See #1347

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-22 22:26:13 +00:00
Rolf Neugebauer
b8af990d62 moby: Log error when the kernel untar fails
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-22 15:14:17 +00:00
Rolf Neugebauer
d6e50e72d0 moby: Add a 'run' command to execute an image on hyperkit
'moby run' will use the kernel and initrd image produced
by 'moby build' and, on macOS, will run it inside a
hyperkit VM. This assumes that you have a recent version
of Docker for Mac installed as it re-uses the hyperkit
and VPNKit from it.

Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-22 14:47:56 +00:00
Rolf Neugebauer
7a6bc781de moby: Introduce the "build" subcommand
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-22 14:38:02 +00:00
Rolf Neugebauer
547a3e9380 moby: Factor out build code into a separate source file
Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
2017-03-22 14:38:02 +00:00
Justin Cormack
bede7847e3 Move Go code to src/cmd
This does not get everything where we want it finally, see #1266
nor the optimal way of building, but it gets it out of top level.

Added instructions to build if you have a Go installation.

Not moving `vendor` yet.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-21 14:37:23 +00:00
Justin Cormack
3c58702d42 Fix accidental removal of /etc/mtab from images
This was breaking some containers that use it, was a mistake.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-20 23:27:37 +00:00
Justin Cormack
4da9303b17 Output kernel command line to a file in the kernel+initrd output case
Trying to find the relevant yaml file was an issue as we now support
`--name` and it might be in a different directory, so although it is
a bit verbose outputing a whole file at least it is more consistent.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-20 13:43:09 +00:00
Justin Cormack
c4c7c1e8d8 Add a metadata handler for GCP which allows ssh login
- this needs improvements to make it more "platform native", in
  particular GCP supports multiple users and more ssh key mangement
  options.
- at present you can login as root with any platform ssh key
- add support for uts=host and ipc=host
- set the hostname from the metadata as well

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-16 18:45:44 +00:00
Justin Cormack
ee76e8bdfd GCP image handling enhancements
- the `public` option was not previously implemented
- add `replace` only for GCP images which will error otherwise. Only
  recommended for use in development, in production use the `--name` option
  to provide a different name eaxch time. Note only applies to GCP images,
  will document these options properly soon.
- add a `family` option; this allows you to upload many images and the
  user can select the latest using the `family` option instead of a specific
  image.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-16 13:20:21 +00:00
Justin Cormack
7149da4b4f Add a --name cli option to the moby tool
This sets the base name of the built images which otherwise
defaults to the basename of your yaml file. This allows
building different versions easily eg adding git sha to the
output names.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-16 11:51:49 +00:00
Justin Cormack
a7d650f5be Merge pull request #1307 from ijc25/isoefi-autosize
tools: Calculate EFI ESP FAT FS size based on contents.
2017-03-15 14:22:20 +00:00
Ian Campbell
728115f0ee tools: Calculate EFI ESP FAT FS size based on contents.
This requires switching to the dosfstools from alpine:edge since neither the
busybox nor alpine:3.5 dosfstools supports the -C option (in fact alpine:3.5
only has mkfs.fat and not mkfs.vfat).

The 511k slack seems like a lot to me, but 256k was somehow not enough.

Fixes #1304.

Signed-off-by: Ian Campbell <ian.campbell@docker.com>
2017-03-15 13:30:20 +00:00
Justin Cormack
ee3379290b Add upload to Google Cloud Storage and Google Compute Image creation
- the image upload uses the cloud API
- currently auth and image creation need the `gcloud` CLI tool.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-14 14:45:05 +00:00
Riyaz Faizullabhoy
450e39305b Merge pull request #1290 from riyazdf/ro-system-containers
Add read-only option to containers, apply to all except nginx
2017-03-13 16:23:44 +00:00
Riyaz Faizullabhoy
e8d88ece91 Add read-only option to containers, apply to all except nginx
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
2017-03-13 15:51:03 +00:00
Justin Cormack
7a58dad3a3 Fix typo/copy paste for IPC namespaces
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-13 15:00:22 +00:00
Justin Cormack
40ce7977ae Add qcow2 output support
- outputs compressed qcow2 image
- 1GB underlying size, may need changing

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-10 16:38:37 +00:00
Justin Cormack
64d388d3fe Add VHD and GCE output formats
- VHD is uncompressed VHD. Currently hard coded at 1GB, which may need to change. Use `format: vhd`
- GCE is the GCE compressed tarred raw image. Use `format: gce-img` - reserving `gce` for actually
  uploading the image.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-10 16:10:48 +00:00
Tycho Andersen
3fa9192f56 better debugging output in more error cases
Signed-off-by: Tycho Andersen <tycho@docker.com>
2017-03-09 14:29:40 -08:00
Tycho Andersen
183fb49d71 hoist kernel cmdline into moby.yaml
Signed-off-by: Tycho Andersen <tycho@docker.com>
2017-03-09 14:29:40 -08:00
Justin Cormack
befb0bcdec Add in sysctl container
- based on @riyazdf earlier unmerged Go version 891c006d34/alpine/containers/cloud-config/main.go

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-09 14:41:19 +00:00
Tycho Andersen
1cfe28aaa4 better debugging output in some error cases
from:

2017/03/07 09:59:30 Failed to extract kernel image and tarball

to

2017/03/07 10:06:04 Failed to extract kernel image and tarball: Unable to find image 'mobylinux/kernel:7fa748810d7866797fd807a5682d5cb3c9c98111' locally

Signed-off-by: Tycho Andersen <tycho@docker.com>
2017-03-07 10:50:12 -08:00
Justin Cormack
3637f0a5bd Out with the old, in with the new Moby
- remove remainder of editions code
- add a new check container to run tests without Docker
- switch over `make test` to use new command to build tests

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-06 22:28:41 +00:00
Justin Cormack
4cf1e1290d Add output types for BIOS and EFI ISOs
Note that the EFI ISO is not yet automatically sized, and the
kernel command lines are currently hard coded in the builders.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-03 18:44:47 -08:00
Justin Cormack
2c789d84d6 Add initial support for specifying the output type
Currently only supports kernel+initrd output but will add the rest
soon.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-03 14:49:47 -08:00
Justin Cormack
890097dc8e Refactoring of Moby tool
- split out config processing a bit
- just use `capabilities` not `cap-add` and `cap-drop`
- allow use of CAP_ prefix on capabilities, as this is what `runc` uses
- add nginx to example config
- fix bind mounts

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-03-01 15:52:51 -08:00
Justin Cormack
22298c7761 Rough first version of the moby tool
- terrible code
- lots needs changing
- can build a Moby from a config yaml that boots

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-02-20 21:44:23 +00:00
10495 changed files with 3002591 additions and 630651 deletions

View File

@@ -1,62 +0,0 @@
version: 2
jobs:
build:
working_directory: /go/src/github.com/linuxkit/linuxkit
docker:
- image: circleci/golang:1.9-stretch
steps:
- checkout
- run: mkdir -p ./bin
- run:
name: Versions
command: |
set -x
go version
cat /etc/os-release
- run:
name: Dependencies
command: |
go get -u github.com/golang/lint/golint
go get -u github.com/gordonklaus/ineffassign
- run:
name: Lint
command: make local-check
- run:
name: Build amd64/linux
environment:
GOOS: linux
GOARCH: amd64
command: make LOCAL_TARGET=bin/linuxkit-$GOOS-$GOARCH local-build
- run:
name: Build arm64/linux
environment:
GOOS: linux
GOARCH: arm64
command: make LOCAL_TARGET=bin/linuxkit-$GOOS-$GOARCH local-build
- run:
name: Build s390x/linux
environment:
GOOS: linux
GOARCH: s390x
command: make LOCAL_TARGET=bin/linuxkit-$GOOS-$GOARCH local-build
- run:
name: Build amd64/darwin
environment:
GOOS: darwin
GOARCH: amd64
command: make LOCAL_TARGET=bin/linuxkit-$GOOS-$GOARCH local-build
- run:
name: Build amd64/windows
environment:
GOOS: windows
GOARCH: amd64
command: make LOCAL_TARGET=bin/linuxkit-$GOOS-$GOARCH.exe local-build
- run:
name: Test
command: make local-test
- run:
name: Checksum
command: cd bin && sha256sum linuxkit-*-* > SHA256SUM
- store_artifacts:
path: ./bin
destination: .

434
.github/workflows/ci.yml vendored Normal file
View File

@@ -0,0 +1,434 @@
name: LinuxKit CI
on: [push, pull_request]
jobs:
build:
name: Build & Test
strategy:
matrix:
target:
- os: linux
arch: amd64
suffix: amd64-linux
runner: ubuntu-latest
- os: linux
arch: arm64
suffix: arm64-linux
runner: ubuntu-latest
- os: linux
arch: s390x
suffix: s390x-linux
runner: ubuntu-latest
- os: darwin
arch: amd64
suffix: amd64-darwin
runner: macos-latest
- os: darwin
arch: arm64
suffix: arm64-darwin
runner: macos-latest
- os: windows
arch: amd64
suffix: amd64-windows.exe
runner: ubuntu-latest
runs-on: ${{ matrix.target.runner }}
steps:
- name: Set up Go 1.22
uses: actions/setup-go@v5
with:
go-version: 1.22.3
id: go
- name: Check out code
uses: actions/checkout@v4
- name: Set path
run: echo "$(go env GOPATH)/bin" >> $GITHUB_PATH
env:
GOPATH: ${{runner.workspace}}
- name: golangci-lint CLI
uses: golangci/golangci-lint-action@v6
with:
version: v1.59.0
working-directory: src/cmd/linuxkit
args: --verbose --timeout=10m
- name: go vet CLI
run: |
cd src/cmd/linuxkit && go vet ./...
- name: Build
run: |
make GOARCH=${{matrix.target.arch}} GOOS=${{matrix.target.os}} LOCAL_TARGET=$(pwd)/bin/linuxkit-${{matrix.target.suffix}} local-build
file bin/linuxkit-${{matrix.target.suffix}}
env:
GOPATH: ${{runner.workspace}}
- name: Checksum
run: |
cd bin
if command -v sha256sum > /dev/null; then sha256sum linuxkit-${{matrix.target.suffix}} > linuxkit-${{matrix.target.suffix}}.SHA256SUM
else openssl sha256 -r linuxkit-${{matrix.target.suffix}} | tr -d '*' > linuxkit-${{matrix.target.suffix}}.SHA256SUM
fi
cat linuxkit-${{matrix.target.suffix}}.SHA256SUM
- name: Test
run: make local-test
env:
GOPATH: ${{runner.workspace}}
- name: Upload binary
uses: actions/upload-artifact@v4
with:
name: linuxkit-${{matrix.target.suffix}}
path: |
bin/linuxkit-${{matrix.target.suffix}}
bin/linuxkit-${{matrix.target.suffix}}.SHA256SUM
if-no-files-found: error
build_packages:
name: Build Packages
needs: build
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4
- name: Set up binfmt
# Only register arm64 as we are on amd64 already. s390x is not reliable
run: docker run --privileged --rm tonistiigi/binfmt --install arm64
- name: Download linuxkit
uses: actions/download-artifact@v4
with:
name: linuxkit-amd64-linux
path: bin
- name: Symlink Linuxkit
run: |
chmod ugo+x bin/linuxkit-amd64-linux
sudo ln -s $(pwd)/bin/linuxkit-amd64-linux /usr/local/bin/linuxkit
/usr/local/bin/linuxkit version
- name: Cache Packages
uses: actions/cache@v4
with:
path: ~/.linuxkit/cache/
key: ${{ runner.os }}-linuxkit-${{ github.sha }}
restore-keys: |
${{ runner.os }}-linuxkit-
- name: Build Packages
# Skip s390x as emulation is unreliable
run: |
make OPTIONS="-v --skip-platforms linux/s390x" -C pkg build
- name: Build Test Packages
# ensures that the test packages are in linuxkit cache when we need them for tests later
# Skip s390x as emulation is unreliable
run: |
make OPTIONS="-v --skip-platforms linux/s390x" -C test/pkg build
- name: Check Kernel Dependencies up to date
# checks that any kernel dependencies are up to date.
# if they are, then running `make update-kernel-yamls` will not change anything
run: |
echo "checking git diff before running make update-kernel-yamls"
git diff --exit-code
echo "running make update-kernel-yamls"
make -C kernel update-kernel-yamls
echo "checking git diff again after running make update-kernel-yamls; should be no changes"
git diff --exit-code
- name: Build Kernels
# ensures that the kernel packages are in linuxkit cache when we need them for tests later
# no need for excluding s390x, as each build.yml in the kernel explicitly lists archs
run: |
make OPTIONS="-v" -C kernel build
- name: list cache contents
run: |
linuxkit cache ls
test_packages:
name: Packages Tests
needs: [ build_packages, build ]
runs-on: ubuntu-latest
strategy:
matrix:
shard: [1/10,2/10,3/10,4/10,5/10,6/10,7/10,8/10,9/10,10/10]
steps:
- name: Check out code
uses: actions/checkout@v4
- name: Install Pre-Requisites
run: |
export DEBIAN_FRONTEND=noninteractive
sudo apt-get update
sudo apt-get install -qy qemu-utils qemu-system-x86 expect
- name: Restore RTF From Cache
id: cache-rtf
uses: actions/cache@v4
with:
path: bin
key: rtf-${{hashFiles('Makefile')}}
- name: Build RTF
if: steps.cache-rtf.outputs.cache-hit != 'true'
run: make bin/rtf
- name: Symlink RTF
run: |
sudo ln -s $(pwd)/bin/rtf /usr/local/bin/rtf
- name: Download linuxkit
uses: actions/download-artifact@v4
with:
name: linuxkit-amd64-linux
path: bin
- name: Symlink Linuxkit
run: |
chmod ugo+x bin/linuxkit-amd64-linux
sudo ln -s $(pwd)/bin/linuxkit-amd64-linux /usr/local/bin/linuxkit
/usr/local/bin/linuxkit version
- name: Restore Package Cache
uses: actions/cache@v4
with:
path: ~/.linuxkit/cache/
key: ${{ runner.os }}-linuxkit-${{ github.sha }}
restore-keys: |
${{ runner.os }}-linuxkit-
- name: list cache contents
run: |
linuxkit cache ls
- name: Run Tests
run: make test TEST_SUITE=linuxkit.packages TEST_SHARD=${{ matrix.shard }}
test_kernel:
name: Kernel Tests
needs: [ build_packages, build ]
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4
- name: Install Pre-Requisites
run: |
export DEBIAN_FRONTEND=noninteractive
sudo apt-get update
sudo apt-get install -qy qemu-utils qemu-system-x86 expect
- name: Restore RTF From Cache
id: cache-rtf
uses: actions/cache@v4
with:
path: bin
key: rtf-${{hashFiles('Makefile')}}
- name: Build RTF
if: steps.cache-rtf.outputs.cache-hit != 'true'
run: make bin/rtf
- name: Symlink RTF
run: |
sudo ln -s $(pwd)/bin/rtf /usr/local/bin/rtf
- name: Download linuxkit
uses: actions/download-artifact@v4
with:
name: linuxkit-amd64-linux
path: bin
- name: Symlink Linuxkit
run: |
chmod ugo+x bin/linuxkit-amd64-linux
sudo ln -s $(pwd)/bin/linuxkit-amd64-linux /usr/local/bin/linuxkit
/usr/local/bin/linuxkit version
- name: Restore Package Cache
uses: actions/cache@v4
with:
path: ~/.linuxkit/cache/
key: ${{ runner.os }}-linuxkit-${{ github.sha }}
restore-keys: |
${{ runner.os }}-linuxkit-
- name: list cache contents
run: |
linuxkit cache ls
- name: Run Tests
run: make test TEST_SUITE=linuxkit.kernel
test_linuxkit:
name: LinuxKit Build Tests
needs: [ build_packages, build ]
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4
- name: Install Pre-Requisites
run: |
export DEBIAN_FRONTEND=noninteractive
sudo apt-get update
sudo apt-get install -qy qemu-utils qemu-system-x86 expect
- name: Restore RTF From Cache
id: cache-rtf
uses: actions/cache@v4
with:
path: bin
key: rtf-${{hashFiles('Makefile')}}
- name: Restore Package Cache
uses: actions/cache@v4
with:
path: ~/.linuxkit/cache/
key: ${{ runner.os }}-linuxkit-${{ github.sha }}
restore-keys: |
${{ runner.os }}-linuxkit-
- name: Build RTF
if: steps.cache-rtf.outputs.cache-hit != 'true'
run: make bin/rtf
- name: Symlink RTF
run: |
sudo ln -s $(pwd)/bin/rtf /usr/local/bin/rtf
- name: Download linuxkit
uses: actions/download-artifact@v4
with:
name: linuxkit-amd64-linux
path: bin
- name: Symlink Linuxkit
run: |
chmod ugo+x bin/linuxkit-amd64-linux
sudo ln -s $(pwd)/bin/linuxkit-amd64-linux /usr/local/bin/linuxkit
/usr/local/bin/linuxkit version
- name: list cache contents
run: |
linuxkit cache ls
- name: Run Tests
run: make test TEST_SUITE=linuxkit.build
test_platforms:
name: Platform Tests
needs: [ build_packages, build ]
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4
- name: Install Pre-Requisites
run: |
export DEBIAN_FRONTEND=noninteractive
sudo apt-get update
sudo apt-get install -qy qemu-utils qemu-system-x86 expect
- name: Restore RTF From Cache
id: cache-rtf
uses: actions/cache@v4
with:
path: bin
key: rtf-${{hashFiles('Makefile')}}
- name: Build RTF
if: steps.cache-rtf.outputs.cache-hit != 'true'
run: make bin/rtf
- name: Symlink RTF
run: |
sudo ln -s $(pwd)/bin/rtf /usr/local/bin/rtf
- name: Download linuxkit
uses: actions/download-artifact@v4
with:
name: linuxkit-amd64-linux
path: bin
- name: Symlink Linuxkit
run: |
chmod ugo+x bin/linuxkit-amd64-linux
sudo ln -s $(pwd)/bin/linuxkit-amd64-linux /usr/local/bin/linuxkit
/usr/local/bin/linuxkit version
- name: Restore Package Cache
uses: actions/cache@v4
with:
path: ~/.linuxkit/cache/
key: ${{ runner.os }}-linuxkit-${{ github.sha }}
restore-keys: |
${{ runner.os }}-linuxkit-
- name: list cache contents
run: |
linuxkit cache ls
- name: Run Tests
run: make test TEST_SUITE=linuxkit.platforms
test_security:
name: Security Tests
needs: [ build_packages, build ]
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4
- name: Install Pre-Requisites
run: |
export DEBIAN_FRONTEND=noninteractive
sudo apt-get update
sudo apt-get install -qy qemu-utils qemu-system-x86 expect
- name: Restore RTF From Cache
id: cache-rtf
uses: actions/cache@v4
with:
path: bin
key: rtf-${{hashFiles('Makefile')}}
- name: Build RTF
if: steps.cache-rtf.outputs.cache-hit != 'true'
run: make bin/rtf
- name: Symlink RTF
run: |
sudo ln -s $(pwd)/bin/rtf /usr/local/bin/rtf
- name: Download linuxkit
uses: actions/download-artifact@v4
with:
name: linuxkit-amd64-linux
path: bin
- name: Symlink Linuxkit
run: |
chmod ugo+x bin/linuxkit-amd64-linux
sudo ln -s $(pwd)/bin/linuxkit-amd64-linux /usr/local/bin/linuxkit
/usr/local/bin/linuxkit version
- name: Restore Package Cache
uses: actions/cache@v4
with:
path: ~/.linuxkit/cache/
key: ${{ runner.os }}-linuxkit-${{ github.sha }}
restore-keys: |
${{ runner.os }}-linuxkit-
- name: list cache contents
run: |
linuxkit cache ls
- name: Run Tests
run: make test TEST_SUITE=linuxkit.security

38
.github/workflows/package_release.yml vendored Normal file
View File

@@ -0,0 +1,38 @@
name: Release Tagged Packages
on:
create:
jobs:
release:
name: Release packages
if: github.ref_type == 'tag' && startsWith(github.ref, 'refs/tags/pkg-v')
runs-on: ubuntu-latest
steps:
- name: Set up Go 1.22
uses: actions/setup-go@v5
with:
go-version: 1.22.3
id: go
- name: Check out code
uses: actions/checkout@v4
- name: Ensure bin/ directory
run: mkdir -p bin
- name: Install linuxkit
run: |
go -C ./src/cmd/linuxkit build -o $(pwd)/bin/linuxkit
sudo mv bin/linuxkit /usr/local/bin/
- name: Login to Docker Hub
uses: docker/login-action@v2
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
- name: Publish Packages as Release
# this should not build anything, as they all should be built already
# however, it can fail if we push the tag before the merge-to-master build is complete, since that may publish
# so *always* wait for any merge-to-master to complete before publishing pkg-v* tags
run: |
RELEASE_TAG=${GITHUB_REF#refs/tags/pkg-}
echo "RELEASE_TAG=${RELEASE_TAG}"
[ -n "${RELEASE_TAG}" ] || { echo "Not a tag"; exit 1; }
make OPTIONS="--skip-platforms linux/s390x" -C pkg push PUSHOPTIONS="--nobuild --release ${RELEASE_TAG}"

74
.github/workflows/publish.yaml vendored Normal file
View File

@@ -0,0 +1,74 @@
# publish changes that are merged to master
name: Packages Push
on:
workflow_run:
workflows: [LinuxKit CI]
types: [completed]
branches: [master, main]
jobs:
packages:
env:
linuxkit_file: linuxkit-amd64-linux
name: Publish Changed Packages
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4
- name: Ensure bin/ directory
run: mkdir -p bin
- name: Download linuxkit
uses: actions/github-script@v7
with:
github-token: ${{secrets.GITHUB_TOKEN}}
script: |
var artifacts = await github.rest.actions.listWorkflowRunArtifacts({
owner: context.repo.owner,
repo: context.repo.repo,
run_id: ${{github.event.workflow_run.id }},
});
var matchArtifact = artifacts.data.artifacts.filter((artifact) => {
return artifact.name == "${{ env.linuxkit_file }}"
})[0];
var download = await github.rest.actions.downloadArtifact({
owner: context.repo.owner,
repo: context.repo.repo,
artifact_id: matchArtifact.id,
archive_format: 'zip',
});
var fs = require('fs');
fs.writeFileSync('${{github.workspace}}/bin/${{ env.linuxkit_file }}.zip', Buffer.from(download.data));
- name: unzip linuxkit
run: cd bin && unzip ${{ env.linuxkit_file }}.zip
- name: Symlink Linuxkit
run: |
chmod ugo+x bin/${{ env.linuxkit_file }}
sudo ln -s $(pwd)/bin/${{ env.linuxkit_file }} /usr/local/bin/linuxkit
/usr/local/bin/linuxkit version
- name: Restore Package Cache
uses: actions/cache@v4
with:
path: ~/.linuxkit/cache/
key: ${{ runner.os }}-linuxkit-${{ github.sha }}
restore-keys: |
${{ runner.os }}-linuxkit-
- name: Login to Docker Hub
uses: docker/login-action@v2
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
- name: Publish Packages
# this should only push changed ones:
# - unchanged: already in the registry
# - changed: already built and cached, so only will push
# Skip s390x as emulation is unreliable
run: |
make OPTIONS="--skip-platforms linux/s390x" -C pkg push PUSHOPTIONS="--nobuild"
- name: Publish Kernels
# this should only push changed ones:
# - unchanged: already in the registry
# - changed: already built and cached, so only will push
# No need to skip s390x, since kernel build.yml files all have explicit archs
run: |
make -C kernel push

97
.github/workflows/release.yml vendored Normal file
View File

@@ -0,0 +1,97 @@
name: Release Tagged Linuxkit
on:
create:
jobs:
build-all:
name: Build all targets expect macOS
if: github.ref_type == 'tag' && startsWith(github.ref, 'refs/tags/v')
runs-on: ubuntu-latest
steps:
- name: Set up Go 1.122
uses: actions/setup-go@v5
with:
go-version: 1.22.3
id: go
- name: Check out code
uses: actions/checkout@v4
- name: Set path
run: echo "$(go env GOPATH)/bin" >> $GITHUB_PATH
env:
GOPATH: ${{runner.workspace}}
- name: Build
run: |
make build-targets-linux build-targets-windows
env:
GOPATH: ${{runner.workspace}}
- uses: actions/upload-artifact@v4
with:
name: release-targets-except-cgo
path: bin/
# separate macos build because macos needs CGO, and it is very hard to cross-compile that
build-macos:
name: Build macOS target
if: github.ref_type == 'tag' && startsWith(github.ref, 'refs/tags/v')
runs-on: macos-latest
steps:
- name: Set up Go 1.122
uses: actions/setup-go@v5
with:
go-version: 1.22.3
id: go
- name: Check out code
uses: actions/checkout@v4
- name: Set path
run: echo "$(go env GOPATH)/bin" >> $GITHUB_PATH
env:
GOPATH: ${{runner.workspace}}
- name: Build
run: |
make build-targets-macos
env:
GOPATH: ${{runner.workspace}}
- uses: actions/upload-artifact@v4
with:
name: release-targets-macos
path: bin/
release-artifacts:
needs: [build-all, build-macos]
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions/download-artifact@v4
with:
name: release-targets-except-cgo
path: bintmp/release-targets-except-cgo
- uses: actions/download-artifact@v4
with:
name: release-targets-macos
path: bintmp/release-targets-macos
- name: Combine Artifacts
run: |
mkdir -p bin/
cp bintmp/*/* bin/
- name: Checksum Artifacts
run: |
make checksum-targets
- name: GitHub Release
uses: softprops/action-gh-release@1e07f4398721186383de40550babbdf2b84acfc5
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
with:
draft: true
files: bin/*
generate_release_notes: true

1
.gitignore vendored
View File

@@ -19,3 +19,4 @@ Dockerfile.media
*-cmdline
*-state
artifacts/*
tools/alpine/iid

View File

@@ -1,5 +1,3 @@
# Generate AUTHORS: scripts/generate-authors.sh
# Tip for finding duplicates (besides scanning the output of AUTHORS for name
# duplicates that aren't also email duplicates): scan the output of:
# git log --format='%aE - %aN' | sort -uf
@@ -7,6 +5,7 @@
# For explanation on this file format: man git-shortlog
Alice Frosi <alice@linux.vnet.ibm.com> <alice@linux.vnet.ibm.comx>
Alice Frosi <alice@linux.vnet.ibm.com> <afrosi@de.ibm.com>
Amir Chaudhry <amir.chaudhry@docker.com> <amirmc@gmail.com>
Anil Madhavapeddy <anil.madhavapeddy@docker.com> <anil@recoil.org>
Dan Finneran <dan@thebsdbox.co.uk> <dan@dev.fnnrn.me>
@@ -21,21 +20,27 @@ Dave Tucker <dt@docker.com> <dave@dtucker.co.uk>
David Gageot <david.gageot@docker.com> <david@gageot.net>
David Sheets <david.sheets@docker.com> <dsheets@docker.com>
David Sheets <david.sheets@docker.com> <sheets@alum.mit.edu>
Eric Briand <eric.briand@gmail.com>
Ian Campbell <ian.campbell@docker.com> <ijc25@users.noreply.github.com>
Ian Campbell <ian.campbell@docker.com> <ijc@docker.com>
Ian Campbell <ian.campbell@docker.com> <ijc@users.noreply.github.com>
Ian Campbell <ian.campbell@docker.com> <ijc@lxdeb01.marist.edu>
Isaac Rodman <isaac@eyz.us> <isaac.rodman@healthtrio.com>
Isaac Rodman <isaac@eyz.us>
Istvan Szukacs <l1x@users.noreply.github.com>
James McCoy <james@mcy.email>
Jeff Wu <jeff.wu.junfei@gmail.com> <JeffWuBJ@users.noreply.github.com>
Jeremy Yallop <yallop@docker.com> <yallop@gmail.com>
Justin Cormack <justin.cormack@docker.com> <justin.cormack@unikernel.com>
Justin Cormack <justin.cormack@docker.com> <justin@specialbusservice.com>
Justin Barrick <jbarrick@cloudflare.com>
Ken Cochrane <ken.cochrane@docker.com> <KenCochrane@gmail.com>
Magnus Skjegstad <magnus.skjegstad@docker.com> <magnus@skjegstad.com>
Marten Cassel <marten.cassel@gmail.com> <mcpop28@hotmail.com>
Mindy Preston <mindy.preston@docker.com> <meetup@yomimono.org>
Nathan Dautenhahn <ndd@seas.upenn.edu> <ndd@cis.upenn.edu>
MinJae Kwon <mingrammer@gmail.com>
Nathan Dautenhahn <ndd@rice.edu> <ndd@seas.upenn.edu>
Nathan Dautenhahn <ndd@rice.edu> <ndd@cis.upenn.edu>
Nathan LeClaire <nathan.leclaire@docker.com> <nathan.leclaire@gmail.com>
Nathan LeClaire <nathan.leclaire@docker.com> <nathanleclaire@gmail.com>
Niclas Mietz <niclas@mietz.io>
@@ -44,9 +49,10 @@ Radu Matei <matei.radu94@gmail.com>
Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com> <riyazdf@berkeley.edu>
Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com> <riyazdf@gmail.com>
Robin Winkelewski <w9ncontact@gmail.com>
Rolf Neugebauer <rolf.neugebauer@docker.com> <rneugeba@users.noreply.github.com>
Rolf Neugebauer <rolf.neugebauer@docker.com> <rn@users.noreply.github.com>
Rolf Neugebauer <rolf.neugebauer@docker.com> <rolf.neugebauer@gmail.com>
Rolf Neugebauer <rn@rneugeba.io> <rneugeba@users.noreply.github.com>
Rolf Neugebauer <rn@rneugeba.io> <rn@users.noreply.github.com>
Rolf Neugebauer <rn@rneugeba.io> <rolf.neugebauer@gmail.com>
Rolf Neugebauer <rn@rneugeba.io> <rolf.neugebauer@docker.com>
Sebastiaan van Stijn <sebastiaan.vanstijn@docker.com> <github@gone.nl>
Simon Ferquel <simon.ferquel@docker.com> <simon.ferquel@hotmail.fr>
Thomas Gazagnaire <thomas.gazagnaire@docker.com> <thomas@gazagnaire.com>

19
ADOPTERS.md Normal file
View File

@@ -0,0 +1,19 @@
## LinuxKit Adopters
_This list is currently under construction. Please add your use cases to this with a PR. Thanks!_
# Production Users
**_[Docker Desktop](https://www.docker.com/products/docker-desktop)_** - Docker Desktop for Mac and Windows uses LinuxKit to provide an embedded, invisible virtual machine in order to run Linux containers and to run Kubernetes. There are currently millions of active users.
**_[TagHub](https://www.taghub.net)_** - TagHub is a SaaS product for doing asset management. We use LinuxKit to have small and secure linux nodes powering our multi-cloud infrastructure. TagHub is made by [Smart Management](http://www.smartm.no/).
# Projects Using LinuxKit
**_[LinuxKit Nix](https://github.com/nix-community/linuxkit-nix)_** aims to provide a Linux Nix VM for macOS.
**_[cfdev](https://github.com/cloudfoundry-incubator/cfdev)_** A fast and easy local Cloud Foundry experience on native hypervisors, powered by LinuxKit with VPNKit
**_[dm-linuxkit](https://github.com/dotmesh-io/dm-linuxkit)_** A dotmesh controller for LinuxKit persistent storage management.
**_[Linux Foundation Edge EVE](https://github.com/lf-edge/eve)_** Edge Virtualization Engine Operating System

57
AUTHORS
View File

@@ -3,17 +3,31 @@
Ajeet Singh Raina, Docker Captain, {Code} Catalysts, Dell EMC R&D <ajeetraina@gmail.com>
Akihiro Suda <suda.akihiro@lab.ntt.co.jp>
Alan Raison <alanraison@users.noreply.github.com>
Alex Ellis <alexellis2@gmail.com>
Alex Johnson <hello@alex-johnson.net>
Alex Szakaly <alex.szakaly@gmail.com>
Alexander Slesarev <alex.slesarev@nudatasecurity.com>
Alice Frosi <alice@linux.vnet.ibm.com>
Amir Chaudhry <amir.chaudhry@docker.com>
Anil Madhavapeddy <anil.madhavapeddy@docker.com>
Arthur Lutz <arthur.lutz@logilab.fr>
Asbjorn Enge <asbjorn@hanafjedle.net>
Avi Deitcher <avi@deitcher.net>
Aymen EL AMRI <aymen@eralabs.io>
Ben Allen <bsallen@alcf.anl.gov>
Bill Kerr <bill@generalbill.com>
Björn Ingeson <bjorn.ingeson@gmail.com>
Brice Figureau <brice-puppet@daysofwonder.com>
Carlton-Semple <carlton.semple@ibm.com>
Chanwit Kaewkasi <chanwit@gmail.com>
Christian Wuerdig <christian.wuerdig@gmail.com>
Clovis Durand <cd.clovel19@gmail.com>
Craig Ingram <cingram@heroku.com>
Damiano Donati <damiano.donati@gmail.com>
Dan Finneran <dan@thebsdbox.co.uk>
Daniel Caminada <daniel.caminada@ergon.ch>
Daniel Dean <daniel@razorsecure.com>
Daniel Hiltgen <daniel.hiltgen@docker.com>
Daniel Nephin <dnephin@gmail.com>
Dave Freitag <dcfreita@us.ibm.com>
@@ -25,74 +39,108 @@ David Scott <dave.scott@docker.com>
David Sheets <david.sheets@docker.com>
Dennis Chen <dennis.chen@arm.com>
Dieter Reuter <dieter.reuter@me.com>
Dominic White <singe-github@singe.za.net>
duraki <duraki@linuxmail.org>
Edward Vielmetti <edward.vielmetti@gmail.com>
Emily Casey <ecasey@pivotal.io>
Eric Briand <eric.briand@gmail.com>
Evan Hazlett <ejhazlett@gmail.com>
Federico Pellegatta <12744504+federico-pellegatta@users.noreply.github.com>
French Ben <frenchben@docker.com>
Frédéric Dalleau <frederic.dalleau@docker.com>
functor <meehow@gmail.com>
Gabriel Chabot <gabriel.chabot@qarnot-computing.com>
Garth Bushell <garth.bushell@oracle.com>
George Papanikolaou <g3orge.app@gmail.com>
Gerben Geijteman <gerben@isset.nl>
Gianluca Arbezzano <gianarb92@gmail.com>
Guillaume Rose <guillaume.rose@docker.com>
Hans van den Bogert <hansbogert@gmail.com>
hyperized <gerben@hyperized.net>
Ian Campbell <ian.campbell@docker.com>
Ilya Dmitrichenko <errordeveloper@gmail.com>
Isaac Rodman <isaac@eyz.us>
Istvan Szukacs <l1x@users.noreply.github.com>
Ivan Markin <sw@nogoegst.net>
James McCoy <james@mcy.email>
Jason A. Donenfeld <Jason@zx2c4.com>
Jeff Wu <jeff.wu.junfei@gmail.com>
Jeffrey Hogan <jeff.hogan1@gmail.com>
Jeremy Yallop <yallop@docker.com>
Jes Ferrier <jes.ferrier@gmail.com>
Jesse Adametz <jesseadametz@gmail.com>
Johannes Würbach <johannes.wuerbach@googlemail.com>
John Albietz <inthecloud247@gmail.com>
Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
Justin Barrick <jbarrick@cloudflare.com>
Justin Cormack <justin.cormack@docker.com>
Justin Ko <justin.ko@oracle.com>
Justin Terry (VM) <juterry@microsoft.com>
Karol Woźniak <wozniakk@gmail.com>
Ken Cochrane <ken.cochrane@docker.com>
Krister Johansen <krister.johansen@oracle.com>
Krisztian Horvath <keyki.kk@gmail.com>
Kunal Kushwaha <kushwaha_kunal_v7@lab.ntt.co.jp>
Liqdfire <liqdfire@gmail.com>
Lorenzo Fontana <lo@linux.com>
Loïc Pottier <lpottier@isi.edu>
Luke Hodkinson <furious.luke@gmail.com>
Madhu Venugopal <madhu@docker.com>
Magnus Skjegstad <magnus.skjegstad@docker.com>
Marco Mariani <marco.mariani@alterway.fr>
Marcus van Dam <marcus@marcusvandam.nl>
Mario Loriedo <mario.loriedo@gmail.com>
marten <marten.cassel@gmail.com>
Mathieu Champlon <mathieu.champlon@docker.com>
Mathieu Pasquet <mathieu.pasquet@alterway.fr>
Matt Bajor <matt.bajor@workday.com>
Matt Bentley <matt.bentley@docker.com>
Matt Johnson <matjohn2@cisco.com>
Michael Aldridge <aldridge.mac@gmail.com>
Michel Courtine <michel.courtine@docker.com>
Mickaël Salaün <mic@digikod.net>
Mindy Preston <mindy.preston@docker.com>
MinJae Kwon <mingrammer@gmail.com>
Natanael Copa <natanael.copa@docker.com>
Nathan Dautenhahn <ndd@seas.upenn.edu>
Nathan Dautenhahn <ndd@rice.edu>
Nathan LeClaire <nathan.leclaire@docker.com>
Nick Jones <nick@dischord.org>
Niclas Mietz <niclas@mietz.io>
Nico Di Rocco <dirocco.nico@gmail.com>
Olaf Bergner <olaf.bergner@gmx.de>
Olaf Flebbe <of@oflebbe.de>
Omar Ramadan <omar.ramadan93@gmail.com>
Patrik Cyvoct <patrik@ptrk.io>
Petr Fedchenkov <giggsoff@gmail.com>
Phil Estes <estesp@linux.vnet.ibm.com>
Pierre Gayvallet <pierre.gayvallet@docker.com>
Pratik Mallya <mallya@us.ibm.com>
Preston Holmes <preston@ptone.com>
Radu Matei <matei.radu94@gmail.com>
Richard Connon <richard@connon.me.uk>
Richard Mortier <mort@cantab.net>
Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
Robb Kistler <robb.kistler@docker.com>
Robin Winkelewski <w9ncontact@gmail.com>
Rolf Neugebauer <rolf.neugebauer@docker.com>
Rolf Neugebauer <rn@rneugeba.io>
Roman Shaposhnik <rvs@zededa.com>
Rui Lopes <rgl@ruilopes.com>
Ryoga Saito <proelbtn@gmail.com>
Sachi King <nakato@nakato.io>
salman aljammaz <s@aljmz.com>
schrotthaufen <schrotthaufen@invalid.invalid>
Scott Coulton <scott.coulton@puppet.com>
Sebastiaan van Stijn <sebastiaan.vanstijn@docker.com>
sethp <seth.pellegrino@gmail.com>
Simarpreet Singh <simar@linux.com>
Simon Ferquel <simon.ferquel@docker.com>
Simon Fridlund <simon@fridlund.email>
Sotiris Salloumis <sotiris.salloumis@gmail.com>
Steeve Morin <steeve.morin@gmail.com>
Stefan Bourlon <stefan.bourlon@ca.com>
Stephen J Day <stephen.day@docker.com>
Steve Hiehn <shiehn@pivotal.io>
Sukchan Lee <acetcom@gmail.com>
Theo Koulouris <theo.koulouris@hpe.com>
Thomas Conte <thomas@conte.com>
Thomas Gazagnaire <thomas.gazagnaire@docker.com>
@@ -101,8 +149,13 @@ Thomas Shaw <tomwillfixit@users.noreply.github.com>
Tiago Pires <tandrepires@gmail.com>
Tiejun Chen <tiejun.china@gmail.com>
Tim Potter <tpot@hpe.com>
Tobias Gesellchen <tobias@gesellix.de>
Tobias Klauser <tklauser@distanz.ch>
Tomas Knappek <tomas.knappek@gmail.com>
Tristan Slominski <tristan.slominski@gmail.com>
Tycho Andersen <tycho@docker.com>
Vincent Demeester <Vincent.Demeester@docker.com>
Yoann Ricordel <yoann.ricordel@qarnot-computing.com>
Zachery Hostens <zacheryph@gmail.com>
zimbatm <zimbatm@zimbatm.com>
zlim <zlim.lnx@gmail.com>

View File

@@ -3,6 +3,93 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/).
## [v0.8] - 2020-05-10
### Added
- Removed dependency on external `notary` and `manifest-tool` binaries for package builds
- Risc-V support for `binfmt`
- Support for GPT partitions
- `metadata` package support for Digital Ocean and Hetzner as well as loading from a file
- Support for `/sys/fs/bpf` in `init`
- Github Actions for CI
### Changed
- `alpine` base updated to 3.11
- `containerd` updated to v1.3.4
- `runc` updated to v1.0.0-rc9
- `binfmt` updated to qemu 4.2
- `node_exporter` updated to v0.18.1
- `cadvisor` updated to v0.36.0
- WireGuard updated to 1.0.20200319
- Improved CDROM support and fixes to GCP and Scaleway providers in the `metadata` package
- Improved creation of `swap` files
- Improved RPI3 build
### Removed
- Containerized `qemu`
- Windows binary from release
## [v0.7] - 2019-04-17
### Added
- Reproducible `linuxkit build` for some output formats
- Support uncompressed kernels, e.g., for crosvm and firecracker.
- Support encrypted disks via `dm-crypt`
- New `bpftrace` package
- Support for USB devices in `qemu`
### Changed
- Alpine base updated to 3.9
- `containerd` updated to v1.2.6
- WireGuard updated to 0.0.20190227
- Updated Docker base API level
- VirtualBox improvements (multiple drives and network adapters)
- Fixed Windows path handling in `linuxkit`
- GCP: Improve error checking/handling
### Removed
## [v0.6] - 2018-07-26
### Added
- `linuxkit build` now works with private repositories and registries.
- `linuxkit pkg build` can build packages with sources outside the package directory.
- New `kernel+iso` format for `linuxkit build`.
### Changed
- `containerd` updated to v1.1.2.
- WireGuard updated to 0.0.20180718.
- Fixed SSH key handling on GCP.
- Changed name of logfiles when memlogd/logwrite is used.
- `moby/tool` code merged back into `linuxkit/linuxkit`
- Smaller `mkimage-*` packages.
### Removed
## [v0.5] - 2018-07-10
### Added
- New logging support with log rotation.
- Scaleway provider.
- Support for v4.17.x kernels.
- Kernel source are now included in the kernel packages.
- Improved documentation about debugging LinuxKit.
### Changed
- Switched to Alpine Linux 3.8 as the base.
- `containerd` updated to v1.1.1.
- `pkg/cadvisor` updated to v0.30.2
- `pkg/node_exporter` updated to 0.16.0
- WireGuard updated to 0.0.20180708.
- Linux firmware binaries update to latest.
- Improved support for building on Windows.
- Improved support for AWS/GCP metadata.
- Better handling of reboot/poweroff.
### Removed
- Support for v4.16.x. kernels as they have been EOLed.
## [v0.4] - 2018-05-12
### Added
- Support for v4.16.x kernels.

View File

@@ -159,13 +159,24 @@ on disputes for technical matters."
[Org]
[Org."Core maintainers"]
people = [
"dave-tucker",
"deitch",
"djs55",
"ijc",
"justincormack",
"riyazdf",
"rn",
]
[Org.Alumni]
# This list contains maintainers that are no longer active on the project.
# It is thanks to these people that the project has become what it is today.
# Thank you!
people = [
"riyazdf",
]
[people]
# A reference list of all people associated with the project.
@@ -173,11 +184,21 @@ on disputes for technical matters."
# in the people section.
# ADD YOURSELF HERE IN ALPHABETICAL ORDER
[People.dave-tucker]
Name = "Dave Tucker"
Email = "dave@dtucker.co.uk"
Github = "dave-tucker"
[People.deitch]
Name = "Avi Deitcher"
Email = "avi@atomicinc.com"
GitHub = "deitch"
[People.djs55]
Name = "David Scott"
Email = "dave@recoil.org"
Github = "djs55"
[People.ijc]
Name = "Ian Campbell"
Email = "ian.campbell@docker.com"
@@ -195,5 +216,5 @@ on disputes for technical matters."
[people.rn]
Name = "Rolf Neugebauer"
Email = "rolf.neugebauer@docker.com"
Email = "rn@rneugeba.io"
GitHub = "rn"

138
Makefile
View File

@@ -1,17 +1,20 @@
.DELETE_ON_ERROR:
VERSION="v0.8+"
.PHONY: default all
default: bin/linuxkit bin/rtf
all: default
# test suite to run, blank for all
TEST_SUITE ?=
TEST_SHARD ?=
VERSION="v0.4"
GIT_COMMIT=$(shell git rev-list -1 HEAD)
GO_COMPILE=linuxkit/go-compile:c97703655e8510b7257ffc57f25e40337b0f0813
GO_COMPILE=linuxkit/go-compile:a8bffe875268a973ea82e5937b0fb23a5b08cc79
LINUXKIT?=bin/linuxkit
ifeq ($(OS),Windows_NT)
LINUXKIT?=$(CURDIR)/bin/linuxkit.exe
RTF?=bin/rtf.exe
GOOS?=windows
else
LINUXKIT?=$(CURDIR)/bin/linuxkit
RTF?=bin/rtf
GOOS?=$(shell uname -s | tr '[:upper:]' '[:lower:]')
GOARCH?=amd64
endif
ifneq ($(GOOS),linux)
CROSS+=-e GOOS=$(GOOS)
endif
@@ -19,18 +22,28 @@ ifneq ($(GOARCH),amd64)
CROSS+=-e GOARCH=$(GOARCH)
endif
PREFIX?=/usr/local/
PREFIX?=/usr/local
RTF_COMMIT=171155c375706f2616f0b9c96afe2240e15d1de1
LOCAL_TARGET?=$(CURDIR)/bin/linuxkit
export VERSION GO_COMPILE GOOS GOARCH LOCAL_TARGET LINUXKIT
.DELETE_ON_ERROR:
.PHONY: default all
default: linuxkit $(RTF)
all: default
RTF_COMMIT=b74a4f7c78e5cddcf7e6d2e6be7be312b9f645fc
RTF_CMD=github.com/linuxkit/rtf/cmd
RTF_VERSION=0.0
bin/rtf: tmp_rtf_bin.tar | bin
tar xf $<
$(RTF): tmp_rtf_bin.tar | bin
tar -C $(dir $(RTF)) -xf $<
rm $<
touch $@
tmp_rtf_bin.tar: Makefile
docker run --rm --log-driver=none -e http_proxy=$(http_proxy) -e https_proxy=$(https_proxy) $(CROSS) $(GO_COMPILE) --clone-path github.com/linuxkit/rtf --clone https://github.com/linuxkit/rtf.git --commit $(RTF_COMMIT) --package github.com/linuxkit/rtf --ldflags "-X $(RTF_CMD).GitCommit=$(RTF_COMMIT) -X $(RTF_CMD).Version=$(RTF_VERSION)" -o bin/rtf > $@
docker run --rm --log-driver=none -e http_proxy=$(http_proxy) -e https_proxy=$(https_proxy) $(CROSS) $(GO_COMPILE) --clone-path github.com/linuxkit/rtf --clone https://github.com/linuxkit/rtf.git --commit $(RTF_COMMIT) --package github.com/linuxkit/rtf --ldflags "-X $(RTF_CMD).GitCommit=$(RTF_COMMIT) -X $(RTF_CMD).Version=$(RTF_VERSION)" -o $(notdir $(RTF)) > $@
# Manifest tool for multi-arch images
MT_COMMIT=bfbd11963b8e0eb5f6e400afaebeaf39820b4e90
@@ -43,63 +56,33 @@ bin/manifest-tool: tmp_mt_bin.tar | bin
tmp_mt_bin.tar: Makefile
docker run --rm --log-driver=none -e http_proxy=$(http_proxy) -e https_proxy=$(https_proxy) $(CROSS) $(GO_COMPILE) --clone-path github.com/estesp/manifest-tool --clone $(MT_REPO) --commit $(MT_COMMIT) --package github.com/estesp/manifest-tool --ldflags "-X main.gitCommit=$(MT_COMMIT)" -o bin/manifest-tool > $@
LINUXKIT_DEPS=$(wildcard src/cmd/linuxkit/*.go) $(wildcard src/cmd/linuxkit/*/*.go) Makefile src/cmd/linuxkit/vendor.conf
bin/linuxkit: tmp_linuxkit_bin.tar
tar xf $<
rm $<
touch $@
tmp_linuxkit_bin.tar: $(LINUXKIT_DEPS)
tar cf - -C src/cmd/linuxkit . | docker run --rm --net=none --log-driver=none -i $(CROSS) $(GO_COMPILE) --package github.com/linuxkit/linuxkit/src/cmd/linuxkit --ldflags "-X github.com/linuxkit/linuxkit/src/cmd/linuxkit/version.GitCommit=$(GIT_COMMIT) -X github.com/linuxkit/linuxkit/src/cmd/linuxkit/version.Version=$(VERSION)" -o bin/linuxkit > $@
.PHONY: linuxkit
linuxkit: bin
make -C ./src/cmd/linuxkit
.PHONY: test-cross
test-cross:
$(MAKE) clean
$(MAKE) -j 3 GOOS=darwin tmp_rtf_bin.tar tmp_mt_bin.tar tmp_linuxkit_bin.tar
$(MAKE) clean
$(MAKE) -j 3 GOOS=windows tmp_rtf_bin.tar tmp_mt_bin.tar tmp_linuxkit_bin.tar
$(MAKE) clean
$(MAKE) -j 3 GOOS=linux tmp_rtf_bin.tar tmp_mt_bin.tar tmp_linuxkit_bin.tar
$(MAKE) clean
make -C ./src/cmd/linuxkit test-cross
LOCAL_LDFLAGS += -X github.com/linuxkit/linuxkit/src/cmd/linuxkit/version.GitCommit=$(GIT_COMMIT) -X github.com/linuxkit/linuxkit/src/cmd/linuxkit/version.Version=$(VERSION)
LOCAL_TARGET ?= bin/linuxkit
.PHONY: local local-%
local:
make -C ./src/cmd/linuxkit local
.PHONY: local-check local-build local-test local-static-pie local-static local-dynamic local
local-check: $(LINUXKIT_DEPS)
@echo gofmt... && o=$$(gofmt -s -l $(filter %.go,$(LINUXKIT_DEPS))) && if [ -n "$$o" ] ; then echo $$o ; exit 1 ; fi
@echo govet... && go tool vet -printf=false $(filter %.go,$(LINUXKIT_DEPS))
@echo golint... && set -e ; for i in $(filter %.go,$(LINUXKIT_DEPS)); do golint $$i ; done
@echo ineffassign... && ineffassign $(filter %.go,$(LINUXKIT_DEPS))
local-build: local-static
local-static-pie: $(LINUXKIT_DEPS) | bin
CGO_ENABLED=0 go build -o $(LOCAL_TARGET) --buildmode pie --ldflags "-s -w -extldflags \"-static\" $(LOCAL_LDFLAGS)" github.com/linuxkit/linuxkit/src/cmd/linuxkit
local-static: $(LINUXKIT_DEPS) | bin
CGO_ENABLED=0 go build -o $(LOCAL_TARGET) --ldflags "$(LOCAL_LDFLAGS)" github.com/linuxkit/linuxkit/src/cmd/linuxkit
local-dynamic: $(LINUXKIT_DEPS) | bin
go build -o $(LOCAL_TARGET) --ldflags "$(LOCAL_LDFLAGS)" github.com/linuxkit/linuxkit/src/cmd/linuxkit
local-test: $(LINUXKIT_DEPS)
go test $(shell go list github.com/linuxkit/linuxkit/src/cmd/linuxkit/... | grep -v ^github.com/linuxkit/linuxkit/src/cmd/linuxkit/vendor/)
local: local-check local-build local-test
local-%:
make -C ./src/cmd/linuxkit $@
bin:
mkdir -p $@
install:
cp -R ./bin/* $(PREFIX)/bin
cp -R bin/* $(PREFIX)/bin
sign:
codesign --entitlements linuxkit.entitlements --force -s - $(PREFIX)/bin/linuxkit
.PHONY: test
test:
$(MAKE) -C test
.PHONY: collect-artifacts
collect-artifacts: artifacts/test.img.tar.gz artifacts/test-ltp.img.tar.gz
$(MAKE) -C test TEST_SUITE=$(TEST_SUITE) TEST_SHARD=$(TEST_SHARD)
.PHONY: ci ci-tag ci-pr
ci: test-cross
@@ -123,3 +106,40 @@ ci-pr: test-cross
.PHONY: clean
clean:
rm -rf bin *.log *-kernel *-cmdline *-state *.img *.iso *.gz *.qcow2 *.vhd *.vmx *.vmdk *.tar *.raw
update-package-tags:
ifneq ($(LK_RELEASE),)
$(eval tags := $(shell cd pkg; make show-tag | cut -d ':' -f1))
$(eval image := :$(LK_RELEASE))
else
$(eval tags := $(shell cd pkg; make show-tag))
$(eval image := )
endif
for img in $(tags); do \
./scripts/update-component-sha.sh --image $${img}$(image); \
done
.PHONY: build-targets-all build-targets-linux build-targets-windows build-targets-macos checksum-targets
build-targets-all: build-targets-linux build-targets-windows build-targets-macos
build-targets-linux: bin
$(MAKE) GOOS=linux GOARCH=arm64 LOCAL_TARGET=$(CURDIR)/bin/linuxkit-linux-arm64 local-build
file bin/linuxkit-linux-arm64
$(MAKE) GOOS=linux GOARCH=amd64 LOCAL_TARGET=$(CURDIR)/bin/linuxkit-linux-amd64 local-build
file bin/linuxkit-linux-amd64
$(MAKE) GOOS=linux GOARCH=s390x LOCAL_TARGET=$(CURDIR)/bin/linuxkit-linux-s390x local-build
file bin/linuxkit-linux-s390x
build-targets-windows: bin
$(MAKE) GOOS=windows GOARCH=amd64 LOCAL_TARGET=$(CURDIR)/bin/linuxkit-windows-amd64.exe local-build
file bin/linuxkit-windows-amd64.exe
build-targets-macos: bin
$(MAKE) GOOS=darwin GOARCH=arm64 LOCAL_TARGET=$(CURDIR)/bin/linuxkit-darwin-arm64 local-build
file bin/linuxkit-darwin-arm64
$(MAKE) GOOS=darwin GOARCH=amd64 LOCAL_TARGET=$(CURDIR)/bin/linuxkit-darwin-amd64 local-build
file bin/linuxkit-darwin-amd64
checksum-targets: bin
cd bin && openssl sha256 -r linuxkit-* | tr -d '*' > checksums.txt

View File

@@ -10,12 +10,13 @@ LinuxKit, a toolkit for building custom minimal, immutable Linux distributions.
- Completely stateless, but persistent storage can be attached
- Easy tooling, with easy iteration
- Built with containers, for running containers
- Designed to create [reproducible builds](./docs/reproducible-builds.md) [WIP]
- Designed for building and running clustered applications, including but not limited to container orchestration such as Docker or Kubernetes
- Designed from the experience of building Docker Editions, but redesigned as a general-purpose toolkit
- Designed to be managed by external tooling, such as [Infrakit](https://github.com/docker/infrakit) or similar tools
- Designed to be managed by external tooling, such as [Infrakit](https://github.com/docker/infrakit) (renamed to [deploykit](https://github.com/docker/deploykit) which has been archived in 2019) or similar tools
- Includes a set of longer-term collaborative projects in various stages of development to innovate on kernel and userspace changes, particularly around security
LinuxKit currently supports the `x86_64`, `arm64`, and `s390x` architectures on a variety of platforms, both as virtual machines and baremetal (see [below](#booting-and-testing) for details.
LinuxKit currently supports the `x86_64`, `arm64`, and `s390x` architectures on a variety of platforms, both as virtual machines and baremetal (see [below](#booting-and-testing) for details).
## Subprojects
@@ -24,6 +25,7 @@ LinuxKit currently supports the `x86_64`, `arm64`, and `s390x` architectures on
- [linux](https://github.com/linuxkit/linux) A copy of the Linux stable tree with branches LinuxKit kernels.
- [virtsock](https://github.com/linuxkit/virtsock) A `go` library and test utilities for `virtio` and Hyper-V sockets.
- [rtf](https://github.com/linuxkit/rtf) A regression test framework used for the LinuxKit CI tests (and other projects).
- [homebrew](https://github.com/linuxkit/homebrew-linuxkit) Homebrew packages for the `linuxkit` tool.
## Getting Started
@@ -34,7 +36,7 @@ LinuxKit uses the `linuxkit` tool for building, pushing and running VM images.
Simple build instructions: use `make` to build. This will build the tool in `bin/`. Add this
to your `PATH` or copy it to somewhere in your `PATH` eg `sudo cp bin/* /usr/local/bin/`. Or you can use `sudo make install`.
If you already have `go` installed you can use `go get -u github.com/linuxkit/linuxkit/src/cmd/linuxkit` to install the `linuxkit` tool.
If you already have `go` installed you can use `go install github.com/linuxkit/linuxkit/src/cmd/linuxkit@latest` to install the `linuxkit` tool.
On MacOS there is a `brew tap` available. Detailed instructions are at [linuxkit/homebrew-linuxkit](https://github.com/linuxkit/homebrew-linuxkit),
the short summary is
@@ -43,11 +45,17 @@ brew tap linuxkit/linuxkit
brew install --HEAD linuxkit
```
Build requirements from source:
Build requirements from source using a container
- GNU `make`
- Docker
- optionally `qemu`
For a local build using `make local`
- `go`
- `make`
- `go get -u golang.org/x/lint/golint`
- `go get -u github.com/gordonklaus/ineffassign`
### Building images
Once you have built the tool, use
@@ -55,10 +63,8 @@ Once you have built the tool, use
```
linuxkit build linuxkit.yml
```
to build the example configuration. You can also specify different output formats, eg `linuxkit build -format raw-bios linuxkit.yml` to
output a raw BIOS bootable disk image, or `linuxkit build -format iso-efi linuxkit.yml` to output an EFI bootable ISO image. See `linuxkit build -help` for more information.
Since `linuxkit build` is built around the [Moby tool](https://github.com/moby/tool) the input yml files are described in the [Moby tool documentation](https://github.com/moby/tool/blob/master/docs/yaml.md).
to build the example configuration. You can also specify different output formats, eg `linuxkit build --format raw-bios linuxkit.yml` to
output a raw BIOS bootable disk image, or `linuxkit build --format iso-efi linuxkit.yml` to output an EFI bootable ISO image. See `linuxkit build -help` for more information.
### Booting and Testing
@@ -69,6 +75,7 @@ for example VMWare. See `linuxkit run --help`.
Currently supported platforms are:
- Local hypervisors
- [Virtualization.Framework (macOS)](docs/platform-virtualization-framework.md) `[x86_64, arm64]`
- [HyperKit (macOS)](docs/platform-hyperkit.md) `[x86_64]`
- [Hyper-V (Windows)](docs/platform-hyperv.md) `[x86_64]`
- [qemu (macOS, Linux, Windows)](docs/platform-qemu.md) `[x86_64, arm64, s390x]`
@@ -78,8 +85,9 @@ Currently supported platforms are:
- [Google Cloud](docs/platform-gcp.md) `[x86_64]`
- [Microsoft Azure](docs/platform-azure.md) `[x86_64]`
- [OpenStack](docs/platform-openstack.md) `[x86_64]`
- [Scaleway](docs/platform-scaleway.md) `[x86_64]`
- Baremetal:
- [packet.net](docs/platform-packet.md) `[x86_64, arm64]`
- [deploy.equinix.com](docs/platform-equinixmetal.md) `[x86_64, arm64]`
- [Raspberry Pi Model 3b](docs/platform-rpi3.md) `[arm64]`
@@ -117,7 +125,7 @@ To customise, copy or modify the [`linuxkit.yml`](linuxkit.yml) to your own `fil
generate its specified output. You can run the output with `linuxkit run file`.
The yaml file specifies a kernel and base init system, a set of containers that are built into the generated image and started at boot time. You can specify the type
of artifact to build with the `moby` tool eg `linuxkit build -format vhd linuxkit.yml`.
of artifact to build eg `linuxkit build -format vhd linuxkit.yml`.
If you want to build your own packages, see this [document](docs/packages.md).
@@ -131,7 +139,7 @@ The yaml format specifies the image to be built:
- `services` is the system services, which normally run for the whole time the system is up
- `files` are additional files to add to the image
For a more detailed overview of the options see [yaml documentation](https://github.com/moby/tool/blob/master/docs/yaml.md)
For a more detailed overview of the options see [yaml documentation](docs/yaml.md)
## Architecture and security
@@ -156,7 +164,11 @@ This is an open project without fixed judgements, open to the community to set t
## Development reports
There are weekly [development reports](reports/) summarizing work carried out in the week.
There are monthly [development reports](reports/) summarising the work carried out each month.
## Adopters
We maintain an incomplete list of [adopters](ADOPTERS.md). Please open a PR if you are using LinuxKit in production or in your project, or both.
## FAQ

View File

@@ -1,7 +1,7 @@
FROM rust:1.25.0-stretch
FROM rust:1.30.0-stretch
ENV CROSVM_REPO=https://chromium.googlesource.com/chromiumos/platform/crosvm
ENV CROSVM_COMMIT=7a7268faf0a43c79b6a4520f5c2f35c3e0233932
ENV CROSVM_COMMIT=c527c1a7e8136dae1e8ae728dfd9932bf3967e7e
ENV MINIJAIL_REPO=https://android.googlesource.com/platform/external/minijail
ENV MINIJAIL_COMMIT=d45fc420bb8fd9d1fc9297174f3c344db8c20bbd

View File

@@ -25,56 +25,30 @@ You may also have to create an empty directory `/var/empty`.
## Use with LinuxKit images
You can build a LinuxKit image suitable for `crosvm` with the
`kernel+squashfs` build format. For example, using this LinuxKit
YAML file (`minimal.yml`):
```
kernel:
image: linuxkit/kernel:4.9.91
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
services:
- name: getty
image: linuxkit/getty:v0.4
env:
- INSECURE=true
trust:
org:
- linuxkit
```
run:
`kernel+squashfs` build format. For example, using `minimal.yml` from
the `./examples` directory, run (but also see the known issues):
```sh
linuxkit build -output kernel+squashfs minimal.yml
linuxkit build -format kernel+squashfs -decompress-kernel minimal.yml
```
The kernel this produces (`minimal-kernel`) needs to be converted as
`crosvm` does not grok `bzImage`s. You can convert the LinuxKit kernel
image with
[extract-vmlinux](https://raw.githubusercontent.com/torvalds/linux/master/scripts/extract-vmlinux):
```sh
extract-vmlinux minimal-kernel > minimal-vmlinux
```
The `-vmlinux` switch is needed since `crosvm` does not grok
compressed linux kernel images.
Then you can run `crosvm`:
```sh
./crosvm run --seccomp-policy-dir=./seccomp/x86_64 \
crosvm run --disable-sandbox \
--root ./minimal-squashfs.img \
--mem 2048 \
--multiprocess \
--socket ./linuxkit-socket \
minimal-vmlinux
minimal-kernel
```
## Known issues
- With 4.14.x, a `BUG_ON()` is hit in `drivers/base/driver.c`. 4.9.x
kernels seem to work.
- With the latest version, I don't seem to get a interactive console.
- Networking does not yet work, so don't include a `onboot` `dhcpd` service.
- `poweroff` from the command line does not work (crosvm does not seem
to support ACPI). So to stop a VM you can use the control socket

View File

@@ -1,4 +1,4 @@
FROM alpine:3.7 AS extract
FROM alpine:3.8 AS extract
ARG DEB_URLS

View File

@@ -1,4 +1,4 @@
FROM alpine:3.7 AS extract
FROM alpine:3.8 AS extract
ARG RPM_URLS

View File

@@ -0,0 +1,10 @@
# open-vm-tools
This should allow end-users to gracefully reboot or shutdown Kubernetes nodes (incuding control planes) running on vSphere Hypervisor.
Furthermore, it is also mandatory to have `open-vm-tools` installed on your Kubernetes nodes to use vSphere Cloud Provider (i.e. determinte virtual machine's FQDN).
## Remarks:
- `spec.template.spec.hostNetwork: true`: correctly report node IP address; required
- `spec.template.spec.hostPID: true`: send the right signal to node, instead of killing the container itself; required
- `spec.template.spec.priorityClassName: system-cluster-critical`: critical to a fully functional cluster
- `spec.template.spec.securityContext.privileged: true`: gain more privileges than its parent process; required

View File

@@ -0,0 +1,45 @@
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
app: open-vm-tools
name: open-vm-tools
namespace: kube-system
spec:
selector:
matchLabels:
app: open-vm-tools
template:
metadata:
labels:
app: open-vm-tools
spec:
hostNetwork: true
hostPID: true
priorityClassName: system-cluster-critical
tolerations:
- key: node.cloudprovider.kubernetes.io/uninitialized
value: "true"
effect: NoSchedule
- key: node-role.kubernetes.io/master
- key: node-role.kubernetes.io/master
operator: Exists
effect: NoSchedule
- key: node-role.kubernetes.io/control-plane
- key: node-role.kubernetes.io/control-plane
operator: Exists
effect: NoSchedule
containers:
- image: linuxkit/open-vm-tools:728ddf726474178eea97604c0baeabd52edab7e9
name: open-vm-tools
resources:
requests:
memory: "5Mi"
cpu: "100m"
limits:
memory: "25Mi"
cpu: "500m"
securityContext:
privileged: true
dnsPolicy: ClusterFirst
restartPolicy: Always

238
docs/alpine-base-update.md Normal file
View File

@@ -0,0 +1,238 @@
# Updating Alpine Base
This document describes the steps to update the `linuxkit/alpine` image.
This image is at the base of all other linuxkit images.
It is built out of the directory `tools/alpine/`.
While you do not need to update every downstream image _immediately_ when you update
this image, you do need to be aware that changes to this image will affect the
downstream images when it is next adopted. Those downstream images should be updated
as soon as possible after updating `linuxkit/alpine`.
When you make a linuxkit release, you _must_ update all of the downstream images.
See [releasing.md](./releasing.md) for the release process.
## Pre-requisites
Updating `linuxkit/alpine` can be done by any maintainer. Maintainers need to have
access to build machines for all architectures support by LinuxKit.
## Process
At a high-level, we are going to do the following:
1. Preparatory steps
1. Create a new branch
1. Make our desired changes to `tools/alpine` and commit them
1. Build and push out our alpine changes, and commit the `versions` files
1. Update all affected downstream changes and commit them: `tools/`, `test/pkg`, `pkg`, `test/`, `examples/`
1. Push out all affected downstream changes: `tools/`, `test/pkg`, `pkg`, `test/`, `examples/`
For each of the affected downstream changes, we could update and then push, then move to the next. However,
since the push out can be slow and require retries, we try to make all of the changes first, and then push them out.
### Preparation
As a starting point you have to be on the update to date master branch
and be in the root directory of your local git clone. You should also
have the same setup on all build machines used.
To make the steps below cut-and-pastable, define the following
environment variables:
```sh
LK_ROOT=$(pwd)
LK_REMOTE=origin # or whatever your personal remote is
LK_BRANCH=alpine-update # or whatever the name of the branch on which you are working is
```
Note that if you are cutting a release, the `LK_BRANCH` may have a release-type name, e.g. `rel_v0.4`.
Make sure that you have the latest version of the `linuxkit`
utility in the path. Alternatively, you may wish to compile the latest version from
master.
### Create a new branch
On one of the build machines (preferably the `x86_64` machine), create
the branch:
```sh
git checkout -b $LK_BRANCH
```
### Update `linuxkit/alpine`
You must perform the arch-specific image builds, pushes and updates on each
architecture first - these can be done in parallel, if you choose. When done,
you then copy the updated `versions.<arch>` to one place, commit them, and
push the manifest.
#### Make alpine changes
Make any changes in `tools/alpine` that you desire, then commit them.
In the below, change the commit message to something meaningful to the change you are making.
```sh
cd tools/alpine
# make changes
git commit -s -a -m "Update linuxkit/alpine"
git push origin $LK_BRANCH
```
#### Build and Push Alpine Per-Architecture
On each supported platform, build and update `linuxkit/alpine`, which will update the `versions.<arch>`
file.:
```sh
git fetch
git checkout $LK_BRANCH
cd $LK_ROOT/tools/alpine
make push
```
Repeat on each platform.
#### Commit Changed Versions Files
When all of the platforms are done, copy the changed `versions.<arch>` from each platform to one place, commit and push.
In the below, replace `linuxkit-arch` with each build machine's name:
```sh
# one of these will not be necessary, as you will likely be executing it on one of these machines
scp linuxkit-s390x:$LK_ROOT/tools/alpine/versions.s390x $LK_ROOT/tools/alpine/versions.s390x
scp linuxkit-aarch64:$LK_ROOT/tools/alpine/versions.aarch64 $LK_ROOT/tools/alpine/versions.aarch64
scp linuxkit-x86_64:$LK_ROOT/tools/alpine/versions.x86_64 $LK_ROOT/tools/alpine/versions.x86_64
git commit -a -s -m "tools/alpine: Update to latest"
git push $LK_REMOTE $LK_BRANCH
```
#### Update and Push Multi-Arch Index
Push out the multi-arch index:
```sh
make push-manifest
```
Stash the tag of the alpine base image in an environment variable:
```sh
LK_ALPINE=$(make show-tag)
```
### Update affected downstream packages
This section describes all of the steps. Below follows a straight copyable list of steps to take,
following which is an explanation of each one.
```sh
# Update tools packages
cd $LK_ROOT/tools
$LK_ROOT/scripts/update-component-sha.sh --image $LK_ALPINE
git checkout grub-dev/Dockerfile
git checkout mkimage-rpi3/Dockerfile
git commit -a -s -m "tools: Update to the latest linuxkit/alpine"
# Update tools dependencies
cd $LK_ROOT
for img in $(cd tools; make show-tag); do
$LK_ROOT/scripts/update-component-sha.sh --image $img
done
git commit -a -s -m "Update use of tools to latest"
# Update test packages
cd $LK_ROOT/test/pkg
$LK_ROOT/scripts/update-component-sha.sh --image $LK_ALPINE
git commit -a -s -m "tests: Update packages to the latest linuxkit/alpine"
# Update test packages dependencies
cd $LK_ROOT
for img in $(cd test/pkg; make show-tag); do
$LK_ROOT/scripts/update-component-sha.sh --image $img
done
git commit -a -s -m "Update use of test packages to latest"
# Update test cases to latest linuxkit/alpine
cd $LK_ROOT/test/cases
$LK_ROOT/scripts/update-component-sha.sh --image $LK_ALPINE
git commit -a -s -m "tests: Update tests cases to the latest linuxkit/alpine"
# Update packages to latest linuxkit/alpine
cd $LK_ROOT/pkg
$LK_ROOT/scripts/update-component-sha.sh --image $LK_ALPINE
git commit -a -s -m "pkgs: Update packages to the latest linuxkit/alpine"
# update package tags - may want to include the release in it if set
cd $LK_ROOT
make update-package-tags
MSG=""
[ -n "$LK_RELEASE" ] && MSG="to $LK_RELEASE"
git commit -a -s -m "Update package tags $MSG"
git push $LK_REMOTE $LK_BRANCH
```
#### Update tools packages
On your primary build machine, update the other tools packages.
Note, the `git checkout` reverts the changes made by
`update-component-sha.sh` to files which are accidentally updated.
Important is the `git checkout` of some sensitive packages that only can be built with
specific older versions of upstream packages:
* `grub-dev`
* `mkimage-rpi3`
Only update those if you know what you are doing with them.
Then we update any dependencies of these tools.
#### Update test packages
Next, we update the test packages to the updated alpine base.
Next, we update the use of test packages to latest.
Some tests also use `linuxkit/alpine`, so we update them as well.
### Update packages
Next, we update the LinuxKit packages. This is really the core of the
release. The other steps above are just there to ensure consistency
across packages.
#### External Tools
Most of the packages are build from `linuxkit/alpine` and source code
in the `linuxkit` repository, but some packages wrap external
tools. When updating all packages, and especially during the time of a release,
is a good opportunity to check if there have been updates. Specifically:
- `pkg/cadvisor`: Check for [new releases](https://github.com/google/cadvisor/releases).
- `pkg/firmware` and `pkg/firmware-all`: Use latest commit from [here](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git).
- `pkg/node_exporter`: Check for [new releases](https://github.com/prometheus/node_exporter/releases).
- Check [docker hub](https://hub.docker.com/r/library/docker/tags/) for the latest `dind` tags. and update `examples/docker.yml`, `examples/docker-for-mac.yml`, `examples/cadvisor.yml`, and `test/cases/030_security/000_docker-bench/test.yml` if necessary.
This is at your discretion.
### Build and push affected downstream packages
<ul>Note</ul>: All of the `make push` and `make forcepush` in this section use `linuxkit pkg push`, which will build for all architectures and push
the images out. See [Build Platforms](./packages.md#Build_Platforms).
```sh
# build and push out the tools packages
cd $LK_ROOT/tools
make forcepush
# Build and push out test packages
cd $LK_ROOT/test/pkg
make push
# build and push out the packages
cd $LK_ROOT/pkg
make push
```

19
docs/cmdline.md Normal file
View File

@@ -0,0 +1,19 @@
# Kernel command-line options
The kernel command-line is a string of text that the kernel parses as it is starting up. It is passed by the boot loader
to the kernel and specifies parameters that the kernel uses to configure the system. The command-line is a list of command-line
options separated by spaces. The options are parsed by the kernel and can be used to enable or disable certain features.
LinuxKit passes all command-line options to the kernel, which uses them in the usual way.
There are several options that can be used to control the behaviour of linuxkit itself, or specifically packages
within linuxkit. Unless standard Linux options exist, these all are prefaced with `linuxkit.`.
| Option | Description |
|---|---|
| `linuxkit.unified_cgroup_hierarchy=0` | Start up cgroups v1. If not present or set to 1, default to cgroups v1. |
| `linuxkit.runc_debug=1` | Start runc for `onboot` and `onshutdown` containers to run with `--debug`, and add extra logging messages for each stage of starting those containers. If not present or set to 0, default to usual mode. |
| `linuxkit.runc_console=1` | Send logs for runc for `onboot` and `onshutdown` containers, as well as the output of the containers themselves, to the console, instead of the normal output to logfiles. If not present or set to 0, default to usual mode. |
It often is useful to combine both of the `linuxkit.runc_debug` and `linuxkit.runc_console` options to get the most
information about what is happening with `onboot` containers.

81
docs/developer-setup.md Normal file
View File

@@ -0,0 +1,81 @@
# Build Platforms
This document describes how to install and maintain a LinuxKit development platform. It will grow over time.
The LinuxKit team also maintains several Linux-based build platforms. These are donated by Equinix Metal (arm64) and IBM (s390x).
## Platform-Specific Installation
### arm64 and amd64
The `amd64` and `arm64` platforms are fully supported by most OS vendors and Docker. Just upgrade to the latest OS and install the latest Docker using the
packaging tools. As of this writing, that is:
* Ubuntu/Debian with `apt`
* RHEL/CentOS/Fedora with `yum`. For any of these, use the CentOS 7/8 packages as released by Docker.
Docker does not recommend that you using the packages released by the OS vendors, as those tend to be out of date. Follow the instructions
[from Docker](https://docs.docker.com/engine/install/).
### s390x
The s390x has modern versions of most OSes, including RHEL and Ubuntu, but does not have recent versions of docker, neither as
`apt` packages for Ubuntu, nor as static downloads. In any case, these static downloads mostly are replicas.
This section describes how to install modern versions of Docker on these platforms.
#### RHEL
RHEL 7 on s390x only has releases from Docker. Follow the instructions from Docker to install. The rpm packages for RHEL are available at
https://download.docker.com/linux/rhel/
#### Ubuntu
Docker does not release packages for Ubuntu on s390x. The most recent release was for Ubuntu 18.04 Bionic, with Docker version 18.06.3.
This is quite old, and does not support modern capabilities, e.g. buildkit.
To install a more modern version:
1. Upgrade any dependent apt packages `apt upgrade`
1. Upgrade the operating system to your desired version `do-release-upgrade -d`. Note that you can set which versions to suggest via changing `/etc/update-manager/release-upgrades`
1. Download the necessary rpms (yes, rpms) from the Docker RHEL7 site. These are available [here](https://download.docker.com/linux/rhel/7/s390x/stable/Packages/). You need the following packages:
* `containerd.io-*.rpm`
* `docker-ce-*.rpm`
* `docker-ce-cli-*.rpm`
1. Install alien: `apt install alien`
1. Convert each package to a dpkg `alien --scripts <source-rpm-file.rpm>`
1. Install each package with `dpkg -i <source-dpkg>.dpkg`. Dependency management is not great, so we recommend installing them in order:
1. `containerd.io`
1. `docker-ce`
1. `docker-ce-cli`
1. Install devmapper `apt install libdevmapper-dev`
1. Check the missing version of libdevmapper, if any, with `ldd /usr/bin/dockerd`. In our example, it needs `libdevmapper.so.1.02`
1. Ensure that the library can be found where needed via `cd /lib/s390x-linux-gnu/ && ln -s $(ls -1 libdevmapper.so.*) libdevmapper.so.1.02`
1. Check again that dockerd is ok: `ldd /usr/bin/dockerd`
1. Start docker `system ctl restart docker`
1. Check that everything works:
* `docker version`
* `docker run --rm hello-world`
## Common Notes
On all platforms, if you want to run tests, you will need:
* `jq`
* `expect`
* `qemu-kvm`
These should be installed using your normal platform package installation, e.g. `apt install -y jq expect qemu-kvm`.
You also will need `rtf`, which can be installed with `make bin/rtf && make install`.
For pushing our kernels, you will need [manifest-tool](http://github.com/estesp/manifest-tool), which can be installed with
`make bin/manifest-tool && make install`.
Finally, to enable your regular user to run the tools, we recommend:
```
usermod -aG docker $USER
usermod -aG kvm $USER
usermod -aG sudo $USER
```

86
docs/encrypted-disk.md Normal file
View File

@@ -0,0 +1,86 @@
# Device encryption with dm-crypt
In the packages section you can find an image to setup dm-crypt encrypted devices in [linuxkit](https://github.com/linuxkit/linuxkit)-generated images.
## Usage
The setup is a one time step during boot:
```yaml
onboot:
- name: dm-crypt
image: linuxkit/dm-crypt:<hash>
command: ["/usr/bin/crypto", "dm_crypt_name", "/dev/sda1"]
- name: mount
image: linuxkit/mount:<hash>
command: ["/usr/bin/mountie", "/dev/mapper/dm_crypt_name", "/var/secure_storage"]
files:
- path: etc/dm-crypt/key
contents: "abcdefghijklmnopqrstuvwxyz123456"
```
The above will map `/dev/sda1` as an encrypted device under `/dev/mapper/dm_crypt_name` and mount it under `/var/secure_storage`
The `dm-crypt` container by default bind-mounts `/dev:/dev` and `/etc/dm-crypt:/etc/dm-crypt`. It expects the encryption key to be present in the file `/etc/dm-crypt/key`. You can pass an alternative location as encryption key which can be either a file path relative to `/etc/dm-crypt` or an absolute path.
Providing an alternative encryption key file name:
```yaml
onboot:
- name: dm-crypt
image: linuxkit/dm-crypt:<hash>
command: ["/usr/bin/crypto", "-k", "some_other_key", "dm_crypt_name", "/dev/sda1"]
- name: mount
image: linuxkit/mount:<hash>
command: ["/usr/bin/mountie", "/dev/mapper/dm_crypt_name", "/var/secure_storage"]
files:
- path: etc/dm-crypt/some_other_key
contents: "abcdefghijklmnopqrstuvwxyz123456"
```
Providing an alternative encryption key file name as absolute path:
```yaml
onboot:
- name: dm-crypt
image: linuxkit/dm-crypt:<hash>
command: ["/usr/bin/crypto", "-k", "/some/other/key", "dm_crypt_name", "/dev/sda1"]
binds:
- /dev:/dev
- /etc/dm-crypt/some_other_key:/some/other/key
- name: mount
image: linuxkit/mount:<hash>
command: ["/usr/bin/mountie", "/dev/mapper/dm_crypt_name", "/var/secure_storage"]
files:
- path: etc/dm-crypt/some_other_key
contents: "abcdefghijklmnopqrstuvwxyz123456"
```
Note that you have to also map `/dev:/dev` explicitly if you override the default bind-mounts.
The `dm-crypt` container
* Will create an `ext4` file system on the encrypted device if none is present.
* It will also initialize the encrypted device by filling it from `/dev/zero` prior to creating the filesystem. Which means if the device is being setup for the first time it might take a bit longer.
* Uses the `aes-cbc-essiv:sha256` cipher (it's explicitly specified in case the default ever changes)
* Consequently the encryption key is expected to be 32 bytes long, a random one can be created via
```shell
dd if=/dev/urandom of=dm-crypt.key bs=32 count=1
```
If you see the error `Cannot read requested amount of data.` next to the log message `Creating dm-crypt mapping for ...` then this means your keyfile doesn't contain enough data.
### Examples
There are two examples in the `examples/` folder:
1. `dm-crypt.yml` - formats an external disk and mounts it encrypted.
2. `dm-crypt-loop.yml` - mounts an encrypted loop device backed by a regular file sitting on an external disk
### Options
|Option|Default|Required|Notes|
|---|---|---|---|
|`-k` or `--key`|`key`|No|Encryption key file name. Must be either relative to `/etc/dm-crypt` or an absolute file path.|
|`-l` or `--luks`||No|Use LUKS format for encryption|
|`<dm_name>`||**Yes**|The device-mapper device name to use. The device will be mapped under `/dev/mapper/<dm_name>`|
|`<device>`||**Yes**|Device to encrypt.|

View File

@@ -7,7 +7,8 @@
## Make Disk Available
In order to make the disk available, you need to tell `linuxkit` where the disk file or block device is.
All local `linuxkit run` methods (currently `hyperkit`, `qemu`, and `vmware`) take a `-disk` argument:
All local `linuxkit run` methods (currently `hyperkit`, `qemu`, `virtualization.framework` and `vmware`)
take a `-disk` argument:
* `-disk path,size=100M,format=qcow2`. For size the default is in GB but an `M` can be appended to specify sizes in MB. The format can be omitted for the platform default, and is only useful on `qemu` at present.
@@ -52,9 +53,17 @@ onboot:
command: ["/usr/bin/format", "-force", "-type", "xfs", "-label", "DATA", "-verbose", "/dev/vda"]
```
```
onboot:
- name: format
image: linuxkit/format:<hash>
command: ["/usr/bin/format", "-type", "ext4", "-partition", "gpt", "/dev/vda"]
```
- `-force` can be used to force the partition to be cleared and recreated (if applicable), and the recreated partition formatted. This option would be used to re-init the partition on every boot, rather than persisting the partition between boots.
- `-label` can be used to give the disk a label
- `-type` can be used to specify the type. This is `ext4` by default but `btrfs` and `xfs` are also supported
- `-partition` can be used to specify the partition table type. This is `dos` by default but `gpt` is also supported
- `-verbose` enables verbose logging, which can be used to troubleshoot device auto-detection and (re-)partitioning
- The final (optional) argument specifies the device name

View File

@@ -6,7 +6,7 @@ Please open an issue if you want to add a question here.
LinuxKit does not require being installed on a disk, it is often run from an ISO, PXE or other
such means, so it does not require an on disk upgrade method such as the ChromeOS code that
is often used. It would definitely be possible to use that type of upgrade method if the
is often used. It would definitely be possible to use that type of upgrade method if the
system is installed, and it would be useful to support this for that use case, and an
updater container to control this for people who want to use this.
@@ -30,3 +30,95 @@ of dependencies and functionality that we do not need. At present we are using t
`init` process, and a small set of minimal scripts, but we expect to replace that with a small
standalone `init` process and a small piece of code to bring up the system containers where the
real work takes place.
## Console not displaying init or containerd output at boot
If you're not seeing `containerd` logs in the console during boot, make sure that your kernel `cmdline` configuration doesn't list multiple consoles.
`init` and other processes like `containerd` will use the last defined console in the kernel `cmdline`. When using `qemu`, to see the console you need to list `ttyS0` as the last console to properly see the output.
## Enabling and controlling containerd logs
On startup, linuxkit looks for and parses a file `/etc/containerd/runtime-config.toml`. If it exists, the content is used to configure containerd runtime.
Sample config is below:
```toml
cliopts="--log-level debug"
stderr="/var/log/containerd.out.log"
stdout="stdout"
```
The options are as follows:
* `cliopts`: options to pass to the containerd command-line as is.
* `stderr`: where to send stderr from containerd. If blank, it sends it to the default stderr, which is the console.
* `stdout`: where to send stdout from containerd. If blank, it sends it to the default stdout, which is the console. containerd normally does not have any stdout.
The `stderr` and `stdout` options can take exactly one of the following options:
* `stderr` - send to stderr
* `stdout` - send to stdout
* any absolute path (beginning with `/`) - send to that file. If the file exists, append to it; if not, create it and append to it.
Thus, to enable
a higher log level, for example `debug`, create a file whose contents are `--log-level debug` and place it on the image:
```yml
files:
- path: /etc/containerd/runtime-config.toml
source: "/path/to/runtime-config.toml"
mode: "0644"
```
Note that the package that parses the `cliopts` splits on _all_ whitespace. It does not, as of this writing, support shell-like parsing, so the following will work:
```
--log-level debug --arg abcd
```
while the following will not:
```
--log-level debug --arg 'abcd def'
```
## Troubleshooting containers
Linuxkit runs all services in a specific `containerd` namespace called `services.linuxkit`. To list all the defined containers:
```sh
(ns: getty) linuxkit-befde23bc535:~# ctr -n services.linuxkit container ls
CONTAINER IMAGE RUNTIME
getty - io.containerd.runtime.v1.linux
```
To list all running containers and their status:
```sh
(ns: getty) linuxkit-befde23bc535:~# ctr -n services.linuxkit task ls
TASK PID STATUS
getty 661 RUNNING
```
To list all processes running in a container:
```sh
(ns: getty) linuxkit-befde23bc535:/containers/services/getty# ctr -n services.linuxkit task ps getty
PID INFO
661 &ProcessDetails{ExecID:getty,}
677 -
685 -
686 -
687 -
1237 -
```
To attach a shell to a running container:
```sh
(ns: getty) linuxkit-befde23bc535:/containers/services/getty# ctr -n services.linuxkit tasks exec --tty --exec-id sh sshd /bin/ash -l
(ns: sshd) linuxkit-befde23bc535:/#
```
Containers are defined as OCI bundles in `/containers`.

61
docs/image-cache.md Normal file
View File

@@ -0,0 +1,61 @@
# Image Caching
linuxkit builds each runtime OS image from a combination of Docker images.
These images are pulled from a registry and cached locally.
linuxkit does not use the docker image cache to store these images. This is
for two key reasons.
First, docker does not provide support for different architecture versions. For
example, if you want to pull down `docker.io/library/alpine:3.13` by manifest,
with its signature, but get the `arm64` version while you are on an `amd64` device,
it is not supported.
Second, and more importantly, this requires a running docker daemon. Since the
very essence of linuxkit is removing daemons and operating systems where unnecessary,
just laying down bits in a file, removing docker from the image build process
is valuable. It also simplifies many use cases, like CI, where a docker daemon
may be unavailable.
## How LinuxKit Caches Images
LinuxKit pulls images down from a registry and stores them in a local cache.
It stores the root manifest or index of the image, the manifest, and all of the layers
for the requested architecture. It does not pull down layers, manifest or config
for all available architectures, only the requested one. If none is requested, it
defaults to the architecture on which you are running.
By default, LinuxKit caches images in `~/.linuxkit/cache/`. It can be changed
via a command-line option. The structure of the cache directory matches the
[OCI spec for image layout](http://github.com/opencontainers/image-spec/blob/master/image-layout.md).
Image names are kept in `index.json` in the [annotation](https://github.com/opencontainers/image-spec/blob/master/annotations.md) `org.opencontainers.image.ref.name`. For example"
```json
{
"schemaVersion": 2,
"manifests": [
{
"mediaType": "application/vnd.docker.distribution.manifest.list.v2+json",
"size": 1638,
"digest": "sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54",
"annotations": {
"org.opencontainers.image.ref.name": "docker.io/library/alpine:3.13"
}
}
]
}
```
## How LinuxKit Uses the Cache and Registry
For each image that linuxkit needs to read, it does the following. Note that if the `--pull` option
is provided, it always will pull, independent of what is in the cache.
1. Check in the cache for the image name in the cache `index.json`. If it does not find it, pull it down and store it in cache.
1. Read the root hash from `index.json`.
1. Find the root blob in the `blobs/` directory via the hash and read it.
1. Proceed to read the manifest, config and layers.
The read process is smart enough to check each blob in the local cache before downloading
it from a registry.

31
docs/kernel-bcc.md Normal file
View File

@@ -0,0 +1,31 @@
# Using the bcc utility with LinuxKit
The `bcc` utility is a standard Linux tool to access performance
counters, trace events and access various other kernel internals for
performance analysis.
The `bcc` utility needs to matched be with the kernel. For recent
kernel build, LinuxKit provides a `linuxkit/kernel-bcc` package with
a matching tag for each kernel under `linuxkit/kernel`.
The preferred way of using the `linuxkit/kernel-bcc` package is to
add it to the `init` section. This adds `/usr/share/bcc` to the
systems' root filesystem. From there it can be
- bind mounted into your container
- accessed via `/proc/1/root/usr/share/bcc/tools` from with in the `getty`
or `ssh` container.
- accessed via a nsenter of `/bin/ash` of proc 1.
If you want to use `bcc` you may also want to remove the `sysctl`
container, or alternatively, disable the kernel pointer restriction it
enables by default:
```
echo 0 > /proc/sys/kernel/kptr_restrict
```
Now, `bcc` is ready to use. The LinuxKit `bcc` package contains
the `bcc` binary, example and tool scripts, and kernel headers for the
associated kernel build.

View File

@@ -10,17 +10,51 @@ The LinuxKit kernels are based on the latest stable releases and are
updated frequently to include bug and security fixes. For some
kernels we do carry additional patches, which are mostly back-ported
fixes from newer kernels. The full kernel source with patches can be
found on [github](https://github.com/linuxkit/linux). Each kernel
image is tagged with the full kernel version (e.g.,
`linuxkit/kernel:4.9.33`) and with the full kernel version plus the
hash of the files it was created from (git tree hash of the `./kernel`
directory). For selected kernels (mostly the LTS kernels and latest
stable kernels) we also compile/push kernels with additional debugging
enabled. The hub images for these kernels have the `-dbg` suffix in
the tag. For some kernels, we also provide matching packages
containing the `perf` utility for debugging and performance tracing.
The perf package is called `kernel-perf` and is tagged the same way as
the kernel packages.
found on [github](https://github.com/linuxkit/linux).
## Kernel Image Naming and Tags
We publish the following kernel images:
* primary kernel
* debug kernel
* tools for the specific kernel build - bcc and perf
* builder image for the specific kernel build, useful for compiling compatible kernel modules
### Primary Kernel Images
Each kernel image is tagged with:
* the full kernel version, e.g. `linuxkit/kernel:6.6.13`. This is a multi-arch index, and should be used whenever possible.
* the full kernel version plus hash of the files it was created from (git tree hash of the `./kernel` directory), e.g. `6.6.13-c0d96951e9892a7447a8e7965d2d6bd7e621c3fd`. This is a multi-arch index.
* the full kernel version plus architecture, e.g. `linuxkit/kernel:6.6.13-amd64` or `linuxkit/kernel:6.6.13-arm64`. Each of these is architecture specific.
* the full kernel version plus hash of the files it was created from (git tree hash of the `./kernel` directory) plus architecture, e.g. `6.6.13-c0d96951e9892a7447a8e7965d2d6bd7e621c3fd-arm64`.
### Debug Kernel Images
With each kernel image, we also publish kernels with additional debugging enabled.
These have the same image name and the same tags as the primary kernel, with the `-dbg`
suffix added immediately after the version. E.g.
* `linuxkit/kernel:6.6.13-dbg`
* `linuxkit/kernel:6.6.13-dbg-c0d96951e9892a7447a8e7965d2d6bd7e621c3fd`
* `linuxkit/kernel:6.6.13-dbg-amd64`
* `linuxkit/kernel:6.6.13-dbg-c0d96951e9892a7447a8e7965d2d6bd7e621c3fd-amd64`
### Tools
With each kernel image, we also publish images with various tools. As of this writing,
those tools are `perf` and `bcc`.
The tools images are named `linuxkit/kernel-<tool>`, followed by the same tags as the
primary kernel. For example:
* `linuxkit/kernel-perf:6.6.13`
* `linuxkit/kernel-perf:6.6.13-c0d96951e9892a7447a8e7965d2d6bd7e621c3fd`
* `linuxkit/kernel-perf:6.6.13-amd64`
* `linuxkit/kernel-perf:6.6.13-c0d96951e9892a7447a8e7965d2d6bd7e621c3fd-amd64`
## Additional Contributions
In addition to the official images, there are also some
[scripts](../contrib/foreign-kernels) which repackage kernels packages
@@ -32,7 +66,6 @@ use cases for the promising IoT scenarios. All -rt patches are grabbed from
https://www.kernel.org/pub/linux/kernel/projects/rt/. But so far we just
enable it over 4.14.x.
## Loading kernel modules
Most kernel modules are autoloaded with `mdev` but if you need to `modprobe` a module manually you can use the `modprobe` package in the `onboot` section like this:
@@ -45,22 +78,36 @@ Most kernel modules are autoloaded with `mdev` but if you need to `modprobe` a m
## Compiling external kernel modules
This section describes how to build external (out-of-tree) kernel
modules. It is assumed you have the source available to those modules,
and require the correct kernel version headers and compile tools.
modules. You need the following to build external modules. All of
these are to be built for a specific version of the kernel. For
the examples, we will assume 5.10.104; replace with your desired
version.
The LinuxKit kernel packages include `kernel-dev.tar` which contains
* source available to your modules - you need to get those on your own
* kernel development headers - available in the `linuxkit/kernel` image as `kernel-dev.tar`, e.g. `linuxkit/kernel:5.10.104`
* OS with sources and compiler - this **must** be the exact same version as that used to compile the kernel
As described above, the `linuxkit/kernel` images include `kernel-dev.tar` which contains
the headers and other files required to compile kernel modules against
the specific version of the kernel. Currently, the headers are not
included in the initial RAM disk, but it is possible to compile custom
modules offline and then include the modules in the initial RAM disk.
There is a [example](../test/cases/020_kernel/010_kmod_4.9.x), but
The source is available as the same name as the `linuxkit/kernel` image, with the addition of `-builder` on the tag.
For example:
* `linuxkit/kernel:5.10.92` has builder `linuxkit/kernel:5.10.92-builder`
* `linuxkit/kernel:5.15.15` has builder `linuxkit/kernel:5.15.15-builder`
With the above in hand, you can create a multi-stage `Dockerfile` build to compile your modules.
There is an [example](../test/cases/020_kernel/113_kmod_5.10.x), but
basically one can use a multi-stage build to compile the kernel
modules:
```
FROM linuxkit/kernel:4.9.33 AS ksrc
FROM linuxkit/alpine:<hash> AS build
```dockerfile
FROM linuxkit/kernel:5.10.104 AS ksrc
FROM linuxkit/kernel:5.10.104-builder AS build
RUN apk add build-base
COPY --from=ksrc /kernel-dev.tar /
@@ -73,55 +120,275 @@ To use the kernel module, we recommend adding a final stage to the
Dockerfile above, which copies the kernel module from the `build`
stage and performs a `insmod` as the entry point. You can add this
package to the `onboot` section in your YAML
file. [kmod.yml](../test/cases/020_kernel/010_kmod_4.9.x/kmod.yml)
file. [test.yml](../test/cases/020_kernel/113_kmod_5.10.x/test.yml)
contains an example for the configuration.
### Builder Backups
## Modifying the kernel config
As described above, the OS builder is referenced via `<kernel-image>-builder`, e.g.
`linuxkit/kernel:5.15.15-builder`.
Each series of kernels has a config file dedicated to it
in [../kernel/](../kernel),
e.g.
[config-4.9.x-x86_64](../kernel/config-4.9.x-x86_64),
which is applied during the kernel build process.
As a fallback, in case the `-builder` image is not available or you cannot access it from your development environment,
you have 3 total places to determine the correct version of the OS image with sources and compiler:
If you need to modify the kernel config, `make kconfig` in
the [kernel](../kernel) directory will create a local
`linuxkit/kconfig` Docker image, which contains the patched sources
for all support kernels and architectures in
`/linux-4.<minor>.<rev>`. The kernel source also has the kernel config
copied to the default kernel config.
* `-builder` tag added to the kernel version, e.g. `linuxkit/kernel:5.10.104-builder`
* labels on the kernel image, e.g. `docker inspect linuxkit/kernel:5.10.104 | jq -r '.[].Config.Labels["org.mobyproject.linuxkit.kernel.buildimage"]'`
* `/kernel-builder` file in the kernel image
Running the image like:
You **should** use `-builder` tag as the `AS build` in your `Dockerfile`, but you **can** use
the direct source, extracted from the labels or `/kernel-builder` file in the kernel image, in the `AS build`.
```sh
docker run --rm -ti -v $(pwd):/src linuxkit/kconfig
For example, in the case of `5.10.104`, the label and `/kernel-builder` file show `linuxkit/alpine:2be490394653b7967c250e86fd42cef88de428ba`,
so you can use either `linuxkit/alpine:2be490394653b7967c250e86fd42cef88de428ba` or
`linuxkit/kernel:5.10.104-builder` to build the modules.
Thus, the following are equivalent:
```dockerfile
FROM linuxkit/kernel:5.10.104 AS ksrc
FROM linuxkit/kernel:5.10.104-builder AS build
```
will give you a interactive shell where you can modify the kernel
configuration you want, either by editing the config file, or via
`make menuconfig` etc. Once you are done, save the file as `.config`
and copy it back to the source tree,
e.g. `/src/kernel-config-4.9.x-x86_64`.
You can also configure other architectures other than the native
one. For example to configure the arm64 kernel on x86_64, use:
```dockerfile
FROM linuxkit/kernel:5.10.104 AS ksrc
FROM linuxkit/alpine:2be490394653b7967c250e86fd42cef88de428ba AS build
```
make ARCH=arm64 defconfig
make ARCH=arm64 oldconfig # or menuconfig
## Building and Modifying
This section describes how to build kernels, and how to modify existing ones.
Throughout the document, the terms used are:
* kernel version: actual semver version of a kernel, e.g. `6.6.13` or `5.15.27`
* kernel series: major.minor version of a kernel, e.g. `6.6.x` or `5.15.x`
Throughout this document, the architecture used is the kernel-recognized one, available
on most systems as `uname -m`, e.g. `aarch64` or `x86_64`. You may be familiar with the alpine
or golang one, e.g. `amd64` or `amd64`, which are not used here.
**Note:** After changing _and committing any changes_ to the kernel directory or any
subdirectories, you must update tests, examples and other dependencies. This is done
via:
```bash
make update-kernel-yamls
```
Each series of kernels has a dedicated directory in [../kernel/](../kernel),
e.g. [6.6.x](../kernel/6.6.x) or [5.15.x](../kernel/5.15.x).
Variants, like rt kernels, have their own directory as well, e.g. [5.11.x-rt](../kernel/5.11.x-rt).
However, for variants, the patches from _both_ the common kernel, e.g. [5.11.x](../kernel/5.11.x),
and the variant, e.g. [5.11.x-rt](../kernel/5.11.x-rt), are applied, and the configs from _both_ are combined.
Within the series-dedicated directory, there are:
* kernel config file for each architecture named `config-<arch>`, e.g. [6.6.13/config-x86_64](../kernel/6.6.13/config-x86_64), one per target architecture.
* optional patches directory, e.g. [6.6.13/patches](../kernel/6.6.13/patches), which contains patches to apply to the kernel source
The config file and patches are applied during the kernel build process.
**Note**: We try to keep the differences between kernel versions and
architectures to a minimum, so if you make changes to one
configuration also try to apply it to the others. The script [kconfig-split.py](../scripts/kconfig-split.py) can be used to compare kernel config files. For example:
```sh
../scripts/kconfig-split.py config-4.9.x-aarch64 config-4.9.x-x86_64
../scripts/kconfig-split.py 5.15.x/config-aarch64 5.15.x/config-x86_64
```
creates a file with the common and the x86_64 and arm64 specific
config options for the 4.9.x kernel series.
config options for the 5.15.x kernel series.
**Note**: The CI pipeline does *not* push out kernel images.
Anyone modifying a kernel should:
1. Follow the steps below for the desired changes and commit them.
1. Run appropriate `make build` or variants to ensure that it works.
1. Open a PR with the changes. This may fail, as the CI pipeline may not have access to the modified kernels.
1. A maintainer should run `make push` to push out the images.
1. Run (or rerun) the tests.
#### Build options
The targets and variants for building are as follows:
* `make build` - make all kernels in the version list and their variants
* `make build-<version>` - make all variants of a specific kernel version
* `make buildkernel-<version>` - make all variants of a specific kernel version
* `make buildplainkernel-<version>` - make just the provided version's kernel
* `make builddebugkernel-<version>` - make just the provided version's debug kernel
* `make buildtools-<version>` - make just the provided version's tools
To push:
* `make push` - push all kernels in the version list and their variants
* `make push-<version>` - push all variants of a specific kernel version
Finally, for convenience:
* `make list` - list all kernels in the version list
By default, it builds for all supported architectures. To build just for a specific
architecture:
```sh
make build ARCH=amd64
```
The variable `ARCH` should use the golang variants only, i.e. `amd64` and `arm64`.
To build for multiple architectures, call it multiple times:
```sh
make build ARCH=amd64
make build ARCH=arm64
```
When building for a specific architecture, the build process will use your local
Docker, passing it `--platforms` for the architecture. If you have a builder on a different
architecture, e.g. you are running on an Apple Silicon Mac (arm64) and want to build for
`x86_64` without emulating (which can be very slow), you can use the `BUILDER` variable:
```sh
make build ARCH=x86_64 BUILDER=remote-amd64-builder
```
Builder also supports a builder pattern. If `BUILDER` contains the string `{{.Arch}}`,
it will be replaced with the architecture being built.
For example:
```sh
make build ARCH=x86_64 BUILDER=remote-{{.Arch}}-builder
make build ARCH=aarch64 BUILDER=remote-{{.Arch}}-builder
```
will build `x86_64` on `remote-amd64-builder` and `aarch64` on `remote-arm64-builder`.
Finally, if no `BUILDER` is specified, the build will look for a builder named
`linuxkit-linux-{{.Arch}}-builder`, e.g. `linuxkit-linux-amd64-builder` or
`linuxkit-linux-arm64-builder`. If that builder does not exist, it will fall back to
your local Docker setup.
### Modifying the kernel config
The process of modifying the kernel configuration is as follows:
1. Create a `linuxkit/kconfig` container image: `make kconfig`. This is not pushed out.
1. Run a container based on `linuxkit/kconfig`.
1. In the container, modify the config to suit your needs using normal kernel tools like `make defconfig` or `make menuconfig`.
1. Save the config from the image.
The `linuxkit/kconfig` image contains the patched sources
for all support kernels and architectures in `/linux-<major>.<minor>.<rev>`.
The kernel source also has the kernel config copied to the default kernel config location,
so that `make menuconfig` and `make defconfig` work correctly.
Run the container as follows:
```sh
docker run --rm -ti -v $(pwd):/src linuxkit/kconfig
```
This will give you a interactive shell where you can modify the kernel
configuration you want, while mounting the directory, so that you can save the
modified config.
To create or modify the config, you must cd to the correct directory,
e.g.
```sh
cd /linux-6.6.13
# or
cd /linux-5.15.27
```
Now you can build the config.
When `make defconfig` or `make menuconfig` is done,
the modified config file will be in `.config`; save the file back to `/src`,
e.g.
```sh
cp .config /src/6.6.x/config-x86_64
```
You can also configure other architectures other than the native
one. For example to configure the arm64 kernel on x86_64, use:
```sh
make ARCH=arm64 defconfig
make ARCH=arm64 oldconfig # or menuconfig
```
Note that the generated file **must** be final. When you actually build the kernel,
it will check that running `make defconfig` will have no changes. If there are changes,
the build will fail.
The easiest way to check it is to rerun `make defconfig` inside the kconfig container.
1. Finish your creation of the config file, as above.
1. Copy the `.config` file to the target location, as above.
1. Copy the `.config` file to the source location for defconfig, e.g. `cp .config arch/x86/configs/x86_64_config` or `cp. config /linux/arch/arm64/configs/defconfig`
1. Run `make defconfig` again, and check that there are no changes, e.g. `diff .config arch/x86/configs/x86_64_config` or `diff .config /linux/arch/arm64/configs/defconfig`
If there are no differences, then you can commit the new config file.
Finally, test that you can build the kernel with that config as `make build-<version>`, e.g. `make build-5.15.148`.
## Adding a new kernel version
If you want to add a new kernel version within an existing series, e.g. `5.15.27` already exists
and you want to add (or replace it with) `5.15.148`, apply the following process.
1. Determine the series, i.e. the kernel major.minor version, followed by `x`. E.g. for `5.15.148`, the series is `5.15.x`.
1. Modify the `KERNEL_VERSION` in the `build-args` file in the series directory to the new version. E.g. `5.15.x/build-args`.
1. Create a new `linuxkit/kconfig` container image: `make kconfig`. This is not pushed out.
1. Run a container based on `linuxkit/kconfig`.
```sh
docker run --rm -ti -v $(pwd):/src linuxkit/kconfig
```
1. In the container, change directory to the kernel source directory for the new version, e.g. `cd /linux-5.15.148`.
1. Run `make defconfig` to create the default config file.
1. If the config file has changed, copy it out of the container and check it in, e.g. `cp .config /src/5.15.x/config-x86_64`.
1. Repeat for other architectures.
1. Commit the changed config files.
1. Test that you can build the kernel with that config as `make build-<version>`, e.g. `make build-5.15.148`.
## Adding a new kernel series
To add a new kernel series, you need to:
1. Create new directory for the series, e.g. `6.7.x`
1. Create config files for each architecture in that directory
1. Optionally, create a `patches/` subdirectory in that directory with any patches to add
1. Create a `build-args` file in that directory with at least the following settings:
```bash
KERNEL_VERSION=<version>
KERNEL_SERIES=<series>
BUILD_IMAGE=linuxkit/alpine:<builder>
```
Since the last major series likely is the best basis for the new one, subject to additional modifications, you can use
the previous one as a starting point.
1. Make the directory for the new series, e.g. `mkdir 7.0.x`
1. Create a new `linuxkit/kconfig` container image: `make kconfig`. This is not pushed out.
1. Run a container based on `linuxkit/kconfig`.
```sh
docker run --rm -ti -v $(pwd):/src linuxkit/kconfig
```
1. In the container, change directory to the kernel source directory for the new version, e.g. `cd /linux-7.0.5`.
1. Copy the existing config file for the previous series, e.g. `cp /src/6.6.x/config-x86_64 .config`.
1. Run `make oldconfig` to create the config file for the new series from the old one. Answer any questions.
1. Save the newly generated config file `.config` to the source directory, e.g. `cp .config /src/7.0.x/config-x86_64`.
1. Repeat for other architectures.
1. Commit the new config files.
1. Test that you can build the kernel with that config as `make build-<version>`, e.g. `make build-7.0.5`.
In addition, there are tests that are applied to a specific kernel version, notably the tests in
[020_kernel](../test/cases/020_kernel/). You will need to add a new test case for the new series,
copying an existing one and modifying it as needed.
## Building and using custom kernels
@@ -149,7 +416,7 @@ appended. Then you can also override the Hub organisation to use the
image elsewhere with (and also disable image signing):
```sh
make ORG=<your hub org> NOTRUST=1
make ORG=<your hub org>
```
The image will be uploaded to Hub and can be use in a YAML file as
@@ -322,7 +589,7 @@ yourself:
```sh
cd kernel
make ORG=<foo> NOTRUST=1 push_zfs_4.9.x # or different kernel version
make ORG=<foo> push_zfs_4.9.x # or different kernel version
```
will build and push a `zfs-kmod-4.9.<version>` image to Docker Hub
@@ -347,3 +614,31 @@ Alpine `zfs` utilities are available in `linuxkit/alpine` and the
version of the kernel module should match the version of the
tools. The container where you run the `zfs` tools might also need
`CAP_SYS_MODULE` to be able to load the kernel modules.
## Kernels in examples and tests
All of the linuxkit `.yml` files use the images from `linuxkit/kernel:<tag>`.
When updating the kernel, you run commands to update the tests. The updates to any file that contains
references to `linuxkit/kernel` in this repository work as follows:
- Semver tags are replaced by the most recent kernel version. For example, `linuxkit/kernel:5.10.104` will become `6.6.13` when available, and then `6.6.15`, and then `7.0.1`, etc. The highest semver always is used.
- Semver+hash tags are replaced by the most recent hash and patch version for that series. For example, `linuxkit/kernel:5.10.104-abcdef1234` will become `5.10.104-aaaa54232` (same semver, newer hash), and then `5.10.105-bbbb12345` (newer semver, newer hash), etc. The highest semver+hash always is used.
This is not an inherent characteristic of `linuxkit` tool, which **never** will change your `.yml` files. It is part of
the update process for yml files _in this repository_.
The net of the above is the following rule:
* If you want a reference to a specific kernel series, e.g. a test or example that works only with `5.10.x`, then use a specific hash, e.g. `linuxkit/kernel:5.10.104-abcdef1234`. The hash and patch version will update, but not more. The most common use case for this is kernel version-specific tests.
* If you want a reference to the most recent kernel, whatever version it is, then use a semver tag, e.g. `linuxkit/kernel:6.6.13`. The most common use case for this is examples that work with any kernel version, which is the vast majority of cases.
You can get the current hash by executing the following:
```bash
$ cd kernel
$ make tag-plain-kernel-<version>
# for example:
$ make tag-plain-kernel-6.6.13
linuxkit/kernel:6.6.13-3a8b3faf92390265b1fbee792b9a3fe14d14c26e
```

94
docs/logging.md Normal file
View File

@@ -0,0 +1,94 @@
# Logging
By default LinuxKit will write onboot and service logs directly to files in
`/var/log` and `/var/log/onboot`.
It is tricky to write the logs to a disk or a network service as no disks
or networks are available until the `onboot` containers run. We work around
this by splitting the logging into 2 pieces:
1. `memlogd`: an in-memory circular buffer which receives logs (including
all the early `onboot` logs)
2. a log writing `service` that starts later and can download and process
the logs from `memlogd`
To use this new logging system, you should add the `memlogd` container to
the `init` block in the LinuxKit yml. On boot `memlogd` will be started
from `init.d` and it will listen on a Unix domain socket:
```
/var/run/linuxkit-external-logging.sock
```
The `init`/`service` process will look for this socket and redirect the
`stdout` and `stderr` of both `onboot` and `services` to `memlogd`.
## memlogd: an in-memory circular buffer
The `memlogd` daemon reads the logs from the `onboot` and `services` containers
and stores them together with a timestamp and the name of the originating
container in a circular buffer in memory.
The contents of the circular buffer can be read over the Unix domain socket
```
/var/run/memlogq.sock
```
The circular buffer has a fixed size (overridden by the command-line argument
`-max-lines`) and when it fills up, the oldest messages will be overwritten.
To store the logs somewhere more permanent, for example a disk or a remote
network service, a service should be added to the yaml which connects to
`memlogd` and streams the logs. The `logwrite` service described below shows
how to do this.
### Message format
The format used to read logs is similar to [kmsg](https://www.kernel.org/doc/Documentation/ABI/testing/dev-kmsg):
```
<timestamp>,<log>;<body>
```
where `<timestamp>` is an RFC3339-formatted timestamp, `<log>` is the name of
the log (e.g. `docker-ce.out`) and `<body>` is the output. The `<log>` must
not contain the character `;`.
## logwrite: writing logs to disk
The service `pkg/logwrite` connects to `memlogd` and streams the logs to files
in `/var/log`. The logs are automatically rotated; by default each file has
a maximum size of 1 MiB and up to 10 files are kept per log. The arguments
`-max-log-files` and `-max-log-size` can be used to override these defaults.
Here is an example log file:
```
# cat /var/log/onboot.001-dhcpcd.out
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: waiting for carrier
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: carrier acquired
2018-07-08T09:16:53Z onboot.001-dhcpcd.out DUID 00:01:00:01:22:d4:93:05:02:50:00
:00:00:06
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: IAID 00:00:00:06
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: adding address fe80::f346:56a6:590d:5ea4
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: soliciting an IPv6 router
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: soliciting a DHCP lease
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: offered 192.168.65.8 from 192.168.65.1 `vpnkit'
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: leased 192.168.65.8 for 7200 se
conds
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: adding route to 192.168.65.0/24
2018-07-08T09:16:53Z onboot.001-dhcpcd.out eth0: adding default route via 192.16
8.65.1
2018-07-08T09:16:53Z onboot.001-dhcpcd.out exiting due to oneshot
2018-07-08T09:16:53Z onboot.001-dhcpcd.out dhcpcd exited
```
## Current issues and limitations:
- No docker logger plugin support yet - it could be nice to add support to
memlogd, so the docker container logs would also be gathered in one place
- No syslog compatibility at the moment and `/dev/log` doesnt exist. This
socket could be created to keep syslog compatibility, e.g. by using
https://github.com/mcuadros/go-syslog. Processes that require syslog should
then be able to log directly to memlogd.
- Currently no direct external hooks exposed - but options available that
could be added. Should also be possible to pipe output to e.g. `oklog`
from `logread` (https://github.com/oklog/oklog)

27
docs/losetup.md Normal file
View File

@@ -0,0 +1,27 @@
# LinuxKit losetup
Image to setup a loop device backed by a regular file in a [linuxkit](https://github.com/linuxkit/linuxkit)-generated image. The typical use case is to have a portable storage location which can be used to persist settings or other files. Can be combined with the `linuxkit/dm-crypt` package for protection.
## Usage
The setup is a one time step during boot:
```yaml
onboot:
- name: losetup
image: linuxkit/losetup:<hash>
command: ["/usr/bin/loopy", "-c", "/var/test.img"]
```
The above will associate the file `/var/test.img` with `/dev/loop0` and will also create it if it's not present.
The container by default bind-mounts `/var:/var` and `/dev:/dev`. Usually the loop-file will reside on external storage which should be typically mounted under `/var` hence the choice of the defaults. If the loop-file is located somewhere else and you need a different bind-mount for it then do not forget to explicitly bind-mount `/dev:/dev` as well or else `losetup` will fail.
### Options
|Option|Default|Required|Notes|
|---|---|---|---|
|`-c` or `--create`||No|Creates the file if not present. If `--create` is not specified and the file is missing then the loop setup will obviously fail.|
|`-s` or `--size`|10|No|If `--create` was specified and the file is not present then this sets the size in MiB of the created file. The file will be filled from `/dev/zero`.|
|`-d` or `--dev`|`/dev/loop0`|No|Loop device which should be associated with the file.|
|`<file>`||**Yes**|The file to use as backing storage.|

View File

@@ -63,6 +63,21 @@ This hierarchy can then be used by individual containers, who can bind
mount the config sub-directory into their namespace where it is
needed.
## A note on SSH
Supported providers will extract public keys from metadata to a file
located at `/run/config/ssh/authorized_keys`. You must bind this path
into the `sshd` namespace in order to make use of these keys. Use a
configuration similar to the one shown below to enable root login
based on keys from the metadata service:
```
- name: sshd
image: linuxkit/sshd:4696ba61c3ec091328e1c14857d77e675802342f
binds.add:
- /run/config/ssh/authorized_keys:/root/.ssh/authorized_keys
```
# Metadata image creation
`linuxkit run` backends accept two options to pass metadata to the VM in a platform specific
@@ -101,9 +116,23 @@ hostname and populate the `/run/config/ssh/authorized_keys` from metadata.
AWS userdata is extracted from `http://169.254.169.254/latest/user-data` and
and made available in `/run/config/userdata`.
## Hetzner
Hetzner metadata is reached via the following URL
(`http://169.254.169.254/latest/meta-data/`) and currently we extract the
hostname and populate the `/run/config/ssh/authorized_keys` from metadata.
Hetzner userdata is extracted from `http://169.254.169.254/latest/user-data` and
and made available in `/run/config/userdata`.
## HyperKit
HyperKit does not distinguish metadata and userdata, it's simply
refered to as data, which is passed to the VM as a disk image
in ISO9660 format.
## Virtualization.Framework
Virtualization.Framework does not distinguish metadata and userdata, it's simply
refered to as data, which is passed to the VM as a disk image
in ISO9660 format.

View File

@@ -7,23 +7,37 @@ packages, as it's very easy. Packages are the unit of customisation
in a LinuxKit-based project, if you know how to build a container,
you should be able to build a LinuxKit package.
All LinuxKit packages are:
- Signed with Docker Content Trust.
- Enabled with multi-arch manifests to work on multiple architectures.
- Derived from well-known (and signed) sources for repeatable builds.
All official LinuxKit packages are:
- Enabled with multi-arch indexes to work on multiple architectures.
- Derived from well-known sources for repeatable builds.
- Built with multi-stage builds to minimise their size.
## CI and Package Builds
When building and merging packages, it is important to note that our CI process builds packages. The targets `make ci` and `make ci-pr` execute `make -C pkg build`. These in turn execute `linuxkit pkg build` for each package under `pkg/`. This in turn will try to pull the image whose tag matches the tree hash or, failing that, to build it.
We do not want the builds to happen with each CI run for two reasons:
Any released image, i.e. any package under `pkg/` that has _not_ changed as
part of a pull request,
already will be released to Docker Hub. This will cause it to download that image, rather
than try to build it.
Any non-releaed image, i.e. any package under `pkg/` that _has_ changed as part of
a pull request, will not be in Docker Hub until the PR has merged.
This will cause the download to fail, leading `linuxkit pkg build` to try and build the
image and save it in the cache.
This does have two downsides:
1. It is slower to do a package build than to just pull the latest image.
2. If any of the steps of the build fails, e.g. a `curl` download that depends on an intermittent target, it can cause all of CI to fail.
Thus, if, as a maintainer, you merge any commits into a `pkg/`, even if the change is documentation alone, please do a `linuxkit package push`.
In the past, each PR required a maintainer to build, and push to Docker Hub, every
changed package in `pkg/`. This placed the maintainer in the PR cycle, with the
following downsides:
1. A maintainer had to be involved in every PR, not just reviewing but actually building and pushing. This reduces the ability for others to contribute.
1. The actual package is pushed out by a person, violating good supply-chain practice.
## Package source
@@ -36,11 +50,13 @@ A package source consists of a directory containing at least two files:
- `image` _(string)_: *(mandatory)* The name of the image to build
- `org` _(string)_: The hub/registry organisation to which this package belongs
- `dockerfile` _(string)_: The dockerfile to use to build this package, must be in this directory or below (default: `Dockerfile`)
- `arches` _(list of string)_: The architectures which this package should be built for (valid entries are `GOARCH` names)
- `extra-sources` _(list of strings)_: Additional sources for the package outside the package directory. The format is `src:dst`, where `src` can be relative to the package directory and `dst` is the destination in the build context. This is useful for sharing files, such as vendored go code, between packages.
- `gitrepo` _(string)_: The git repository where the package source is kept.
- `network` _(bool)_: Allow network access during the package build (default: no)
- `disable-content-trust` _(bool)_: Disable Docker content trust for this package (default: no)
- `disable-cache` _(bool)_: Disable build cache for this package (default: no)
- `buildArgs` will forward a list of build arguments down to docker. As if `--build-arg` was specified during `docker build`
- `config`: _(struct `github.com/moby/tool/src/moby.ImageConfig`)_: Image configuration, marshalled to JSON and added as `org.mobyproject.config` label on image (default: no label)
- `depends`: Contains information on prerequisites which must be satisfied in order to build the package. Has subfields:
- `docker-images`: Docker images to be made available (as `tar` files via `docker image save`) within the package build context. Contains the following nested fields:
@@ -52,9 +68,9 @@ A package source consists of a directory containing at least two files:
### Prerequisites
Before you can build packages you need:
- Docker version 17.06 or newer. If you are on a Mac you also need
`docker-credential-osxkeychain.bin`, which comes with Docker for Mac.
- `make`, `notary`, `base64`, `jq`, and `expect`
- Docker version 19.03 or newer.
- If you are on a Mac you also need `docker-credential-osxkeychain.bin`, which comes with Docker for Mac.
- `make`, `base64`, `jq`, and `expect`
- A *recent* version of `manifest-tool` which you can build with `make
bin/manifest-tool`, or `go get github.com:estesp/manifest-tool`, or
via the LinuxKit homebrew tap with `brew install --HEAD
@@ -65,68 +81,258 @@ Further, when building packages you need to be logged into hub with
`docker login` as some of the tooling extracts your hub credentials
during the build.
### Build Targets
LinuxKit builds packages as docker images. It deposits the built package as a docker image in one or both of two targets:
* the linuxkit cache, which is at `~/.linuxkit/cache/` (configurable)
* the docker image cache (optional)
The package _always_ is built and saved in the linuxkit cache. However, you _also_ can load the package for the current
architecture, if available, into the docker image cache.
If you want to build images and test and run them _in a standalone_ fashion locally, then you should add the docker image cache.
Otherwise, you don't need anything more than the default linuxkit cache. LinuxKit defaults to building OS images using docker
images from this cache, only looking in the docker cache if instructed to via `linuxkit build --docker`.
In the linuxkit cache, it creates all of the layers, the manifest that can be uploaded
to a registry, and the multi-architecture index. If an image already exists for a different architecture in the cache,
it updates the index to include additional manifests created.
The order of building is as follows:
1. Build the image to the linuxkit cache
1. If `--docker` is provided, load the image into the docker image cache
For example:
```bash
linuxkit pkg build pkg/foo # builds pkg/foo and places it in the linuxkit cache
linuxkit pkg build pkg/foo --docker # builds pkg/foo and places it in the linuxkit cache and also loads it into docker
```
#### Build Platforms
By default, `linuxkit pkg build` builds for all supported platforms in the package's `build.yml`, whose syntax is available
[here][Package source]. If no platforms are provided in the `build.yml`, it builds for all platforms that linuxkit supports.
As of this writing, those are:
* `linux/amd64`
* `linux/arm64`
* `linux/s390x`
You can choose to skip one of the platforms from `build.yml` or those selected
by default using the `--skip-platforms` flag.
For example:
```
linuxkit pkg build --skip-platforms linux/s390x ...
```
You can override the target build platform by passing it the `--platforms` option:
```
linuxkit pkg build --platforms <platform1,platform2,...platformN>
```
The options for `--platforms` are identical to those for [docker build](https://docs.docker.com/engine/reference/commandline/build/).
An example is available in the official [buildx documentation](https://docs.docker.com/buildx/working-with-buildx/#build-multi-platform-images).
Given that this is linuxkit, i.e. all builds are for linux, the `OS` part would seem redundant, and it should be sufficient to pass `--platform arm64`. However, for complete consistency, the _entire_ platform, e.g. `--platforms linux/amd64,linux/arm64`, must be provided.
#### Where it builds
You are running the `linuxkit pkg build` command on a single platform, e.g. your local linux cloud instance running on `amd64`, or
a MacBook with Apple Silicon running on `arm64`.
How does linuxkit determine where to build the target images?
linuxkit uses [buildkit](https://github.com/moby/buildkit) directly to build all images.
It uses docker contexts to determine _where_ to run those buildkit containers, based on the target
architecture.
When running a package build, linuxkit looks for a container named `linuxkit-builder`, running the appropriate
version of buildkit. If it cannot find a container with that name, it creates it.
If the container already exists but is not running buildkit, or if the version is incorrect, linuxkit stops and removes
the existing `linuxkit-builder` container and creates one running the correct version of buildkit.
When linuxkit needs to build a package for a particular architecture:
1. If a context for that architecture was provided, use that context, looking for and/or starting a buildkit container named `linuxkit-builder`.
1. If no context for that architecture was provided, use the `default` context.
The actual building then will be one of:
1. native, if the provided context has the same architecture as the target build architecture; else
1. cross-build, if the provided context has a different architecture, but the package's `Dockerfile` supports cross-building; else
1. emulated build, using docker's qemu binfmt capabilities
Cross-building, i.e. building on one platform using that platform's binaries to create outputs for a different platform,
depends on the package's `Dockerfile`. Details are available in the
[official Docker buildx docs](https://docs.docker.com/buildx/working-with-buildx/#build-multi-platform-images).
* if the image is just `FROM something`, then it runs it under qemu using binfmt
* if the image is `FROM --platform=$BUILDPLATFORM something`, then it runs it using the local architecture, invoking cross-builders
Read the official docs to learn more how to leverage cross-building with buildx.
**Important:** When building, if the local architecture is not one of those being build,
selecting `--docker` to load the images into the docker image cache will result in an error.
You _must_ be building for the local architecture - optionally for others as well - in order to
pass the `--docker` option.
#### Providing native builder nodes
linuxkit is capable of using native build nodes to do the build, even remotely. To do so, you must:
1. Create a [docker context](https://docs.docker.com/engine/context/working-with-contexts/) that references the build node
1. Tell linuxkit to use that context for that architecture
linuxkit will then use that provided context to look for and/or start a container in which to run buildkit for that architecture.
linuxkit looks for contexts in the following descending order of priority:
1. CLI option `--builders <platform>=<context>,<platform>=<context>`, e.g. `--builders linux/arm64=linuxkit-arm64,linux/amd64=default`
1. Environment variable `LINUXKIT_BUILDERS=<platform>=<context>,<platform>=<context>`, e.g. `LINUXKIT_BUILDERS=linux/arm64=linuxkit-arm64,linux/amd64=default`
1. Existing context named `linuxkit-<platform>`, e.g. `linuxkit-linux-arm64` or `linuxkit-linux-s390x`, with "/" replaced by "-", as "/" is an invalid character.
1. Default context
If a builder name is provided for a specific platform, and it doesn't exist, it will be treated as a fatal error.
#### Examples
##### Simple build
There are no contexts starting with `linuxkit-`, no environment variable `LINUXKIT_BUILDERS`, no command-line argument `--builders`.
linuxkit will build any requested packages using `default` context on the local platform, with a container (created, if necessary) named `linuxkit-builder`.
Builds for the same architecture will be native, builds for other platforms will use either qemu or cross-building.
##### Specified target
You create a context named `my-remote-arm64` and then run:
```bash
linuxkit pkg build --platforms=linux/arm64,linux/amd64 --builders linux/arm64=my-remote-arm64
```
linuxkit will build:
* for arm64 using the context `my-remote-arm64`, since you specified in `--builders` to use `my-remote-arm64` for `linux/arm64`
* for amd64 using the context `default`, as that is the default fallback
The same would happen if you used `LINUXKIT_BUILDERS=linux/arm64=my-remote-arm64` instead of the `--builders` flag.
In both cases - the remote context `my-remote-arm64` and the local `default` context - it will do the build inside
a container named `linuxkit-builder`.
##### Named context
You create a context named `linuxkit-linux-arm64` and then run:
```bash
linuxkit pkg build --platforms=linux/arm64,linux/amd64
```
linuxkit will build:
* for arm64 using the context `linuxkit-linux-arm64`, since there is a context with the name `linuxkit-<platform>`, and you did not override it using `--builders` or the environment variable `LINUXKIT_BUILDERS`
* for amd64 using the context `default` and the `linuxkit` builder, as that is the default fallback
##### Combination
You create a context named `linuxkit-linux-arm64`, and another named `my-remote-builder-amd64` and then run:
```bash
linuxkit pkg build --platforms=linux/arm64,linux/amd64 --builders linux/amd64=my-remote-builder-amd64
```
linuxkit will build:
* for arm64 using the context `linuxkit-linux-arm64`, since there is a context with the name `linuxkit-<platform>`, and you did not override that particular architecture using `--builders` or the environment variable `LINUXKIT_BUILDERS`
* for amd64 using the context `my-remote-builder-amd64`, since you specified for that architecture using `--builders`
The same would happen if you used `LINUXKIT_BUILDERS=linux/arm64=my-remote-builder-amd64` instead of the `--builders` flag.
##### Missing context
You do not have a context named `my-remote-arm64`, and run:
```bash
linuxkit pkg build --platforms=linux/arm64 --builders linux/arm64=my-remote-arm64
```
linuxkit will try to build for `linux/arm64` using the context `my-remote-arm64`. Since that context does not exist, you will get an error.
##### Preset build arguments
When building packages, the following build-args automatically are set for you:
* `SOURCE` - the source repository of the package
* `REVISION` - the git commit that was used for the build
* `GOPKGVERSION` - the go package version or pseudo-version per https://go.dev/ref/mod#glos-pseudo-version
* `PKG_HASH` - the git tree hash of the package directory, e.g. `45a1ad5919f0b6acf0f0cf730e9434abfae11fe6`; tag part of `linuxkit pkg show-tag`
* `PKG_IMAGE` - the name of the image that is being built, e.g. `linuxkit/init`; image name part of `linuxkit pkg show-tag`. Combine with `PKG_HASH` for the full tag.
Note that the above are set **only** if you do not set them in `build.yaml`. Your settings _always_
override these built-in ones.
To use them, simply address them in your `Dockerfile`:
```dockerfile
ARG SOURCE
```
### Build packages as a maintainer
If you have write access to the `linuxkit` organisation on hub, you
should also be set up with signing keys for packages and your signing
key should have a passphrase, which we call `<passphrase>` throughout.
All official LinuxKit packages are multi-arch manifests and most of
them are available for `amd64`, `arm64`, and `s390x`. Official images
*must* be build on both architectures and they must be build *in
sequence*, i.e., they can't be build in parallel.
them are available for the following platforms:
To build a package on an architecture:
* `linux/amd64`
* `linux/arm64`
* `linux/s390x`
```
DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE="<passphrase>" linuxkit pkg push «path-to-package»
```
Official images *must* be built for all architectures for which they are available.
`«path-to-package»` is the path to the package's source directory
Pushing out a package as a maintainer involves two stages:
1. Building and pushing out the platform-specific images
1. Creating and pushing out the multi-arch manifest, a.k.a. OCI image index
The `linuxkit pkg` command contains automation which performs all of the steps.
Note that `«path-to-package»` is the path to the package's source directory
(containing at least `build.yml` and `Dockerfile`). It can be `.` if
the package is in the current directory.
**Note:** You *must* be logged into hub (`docker login`) and the
passphrase for the key *must* be supplied as an environment
variable. The build process has to resort to using `expect` to drive
`notary` so none of the credentials can be entered interactively.
This will:
- Build a local images as `linuxkit/<image>:<hash>-<arch>`
- Push it to hub
- Sign it with your key
- Create a manifest called `linuxkit/<image>:<hash>` (note no `-<arch>`)
- Push the manifest to hub
- Sign the manifest
If you repeat the same on another architecture, a new manifest will be
pushed and signed containing the previous and the new
architecture. The YAML files should consume the package as:
`linuxkit/<image>:<hash>`.
Since it is not very good to have your passphrase in the clear (or
even stashed in your shell history), we recommend using a password
manager with a CLI interface, such as LastPass or `pass`. You can then
invoke the build like this (for LastPass):
```
DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE=$(lpass show <key> --password) linuxkit pkg push «path-to-package»
```
or alternatively you may add the command to `~/.moby/linuxkit/config.yml` e.g.:
```
pkg:
content-trust-passphrase-command: "lpass show <key> --password"
linuxkit pkg push «path-to-package»
```
This will do the following:
1. Determine the name and tag for the image as follows:
* The tag is from the hash of the git tree for that package. You can see it by doing `linuxkit pkg show-tag «path-to-package»`.
* The name for the image is from `«path-to-package»/build.yml`
* The organization for the package is given on the command-line, default to `linuxkit`.
1. Build the package in the given path using your local docker instance for all the platforms in `«path-to-package»/build.yml`
1. Save the built image in the linuxkit cache
1. Tag each built image as `«image-name»:«hash»-«arch»`
1. Create a multi-arch manifest called `«image-name»:«hash»` (note no `-«arch»`)
1. Push the manifest and all of the images to the hub
Note that for actual release images, these steps normally are performed as part
of CI, by the merge-to-master process.
#### Prerequisites
* For all of the steps, you *must* be logged into hub (`docker login`).
### Build packages as a developer
If you want to develop packages or test them locally, it is best to
override the hub organisation used. You may also want to disable
signing while developing. A typical example would be:
```
linuxkit pkg build -org=wombat -disable-content-trust «path-to-package»
linuxkit pkg build -org=wombat «path-to-package»
```
This will create a local image: `wombat/<image>:<hash>-<arch>` which
@@ -135,7 +341,7 @@ on other systems you can push the image to your hub account and pull
from a different system by issuing:
```
linuxkit pkg build -org=wombat -disable-content-trust push
linuxkit pkg build -org=wombat push
```
This will push both `wombat/<image>:<hash>-<arch>` and
@@ -145,8 +351,45 @@ Finally, if you are tired of the long hashes you can override the hash
with:
```
linuxkit pkg build -org=wombat -disable-content-trust -hash=foo push
linuxkit pkg build -org=wombat -hash=foo push
```
and this will create `wombat/<image>:foo-<arch>` and
`wombat/<image>:foo` for use in your YAML files.
### Proxies
If you are building packages from behind a proxy, `linuxkit pkg build` respects
the following environment variables, and will set them as `--build-arg` to
`docker build` when building a package.
* `http_proxy` / `HTTP_PROXY`
* `https_proxy` / `HTTPS_PROXY`
* `ftp_proxy` / `FTP_PROXY`
* `no_proxy` / `NO_PROXY`
* `all_proxy` / `ALL_PROXY`
Note that the first four of these are the standard built-in `build-arg` options available
for `docker build`; see the [docker build documentation](https://docs.docker.com/v17.09/engine/reference/builder/#arg).
The last, `all_proxy`, is a standard var used for socks proxying. Since it is not built into `docker build`,
if you want to use it, you will need to add the following line to the dockerfile:
```dockerfile
ARG all_proxy
```
LinuxKit does not judge between lower-cased or upper-cased variants of these options, e.g. `http_proxy` vs `HTTP_PROXY`,
as `docker build` does not either. It just passes them through "as-is".
## Releases
Normally, whenever a package is updated, CI will build and push the package to Docker Hub by calling `linuxkit pkg push`.
This automatically creates a tag based on the git tree hash of the package's directory.
For example, the package in `./pkg/init` is tagged as `linuxkit/init:45a1ad5919f0b6acf0f0cf730e9434abfae11fe6`.
In addition, you can release semver tags for packages by adding a tag to the git repository that begins with `pkg-` and is
followed by a valid semver tag. For example, `pkg-v1.0.0`. This will cause CI to build and push the package to Docker Hub
with the tag `v1.0.0`.
Pure semver tags, like `v1.0.0`, are not used for package releases. They are used for the linuxkit project itself and to
publish releases of the `linuxkit` binary.

View File

@@ -35,7 +35,7 @@ specified bucket, and create a bootable image from the stored image.
Alternatively, you can use the `AWS_BUCKET` environment variable to specify the bucket name.
**Note:** If the push times out before it finishes, you can use the `-timeout` flag to extend the timeout.
**Note:** If the push times out before it finishes, you can use the `-timeout` flag to extend the timeout. You may also want to consider passing `-ena` to enable enhanced networking in the AMI.
```
linuxkit push aws -bucket bucketname -timeout 1200 aws.raw
@@ -47,7 +47,7 @@ With the image created, we can now create an instance.
You won't be able to see the serial console output until after it has terminated.
```
linuxkit run aws aws
linuxkit run aws -security-group "<security_group_id>" aws
```
You can edit the AWS example to allow you to SSH to your instance in order to use it.

View File

@@ -0,0 +1,142 @@
# LinuxKit with bare metal on Equinix Metal
[Equinix Metal](http://deploy.equinix.com) is a bare metal hosting provider.
You will need to [create an Equinix Metal account] and a project to
put this new machine into. You will also need to [create an API key]
with appropriate read/write permissions to allow the image to boot.
[create an Equinix Metal account]:https://console.equinix.com/sign-up
[create an API key]:https://deploy.equinix.com/developers/docs/metal/identity-access-management/api-keys/
The `linuxkit run equinixmetal` command can mostly either be configured via
command line options or with environment variables. see `linuxkit run
equinixmetal --help` for the options and environment variables.
By default, `linuxkit run` will provision a new machine and remove it
once you are done. With the `-keep` option the provisioned machine
will not be removed. You can then use the `-device` option with the
device ID on subsequent `linuxkit run` invocations to re-use an
existing machine. These subsequent runs will update the iPXE data so
you can boot alternative kernels on an existing machine.
There is an example YAML file for [x86_64](../examples/equinixmetal.yml) and
an additional YAML for [arm64](../examples/equinixmetal.arm64.yml) servers
which provide both access to the serial console and via ssh and
configures bonding for network devices via metadata (if supported).
For x86_64 builds for Intel servers we strongly recommend adding
`ucode: intel-ucode.cpio` to the kernel section in the YAML. This
updates the Intel CPU microcode to the latest by prepending it to the
generated initrd file. The `ucode` entry is only recommended when
booting on baremetal. It should be omitted (but is harmless) when
building images to boot in VMs.
**Note**: The update of the iPXE configuration sometimes may take some
time and the first boot may fail. Hitting return on the console to
retry the boot typically fixes this.
## Boot
LinuxKit on Equinix Metal boots the `kernel+initrd` output from moby via
[iPXE](https://deploy.equinix.com/developers/docs/metal/operating-systems/custom-ipxe/)
which also requires a iPXE script. iPXE booting requires a HTTP server
on which you can store your images. The `-base-url` option specifies
the URL to a HTTP server from which `<name>-kernel`,
`<name>-initrd.img`, and `<name>-equinixmetal.ipxe` can be downloaded during
boot.
If you have your own HTTP server, you can use `linuxkit push equinixmetal`
to create the files (including the iPXE script) you need to make
available.
If you don't have a public HTTP server at hand, you can use the
`-serve` option. This will create a local HTTP server which can either
be run on another Equinix Metal machine or be made accessible with tools
like [ngrok](https://ngrok.com/).
For example, to boot the [example](../examples/platform-equinixmetal.yml)
with a local HTTP server:
```sh
linuxkit build platform-equinixmetal.yml
# run the web server
# run 'ngrok http 8080' in another window
METAL_AUTH_TOKEN=<API key> METAL_PROJECT_ID=<Project ID> \
linuxkit run equinixmetal -serve :8080 -base-url <ngrok url> equinixmetal
```
To boot a `arm64` image for Type 2a machine (`-machine baremetal_2a`)
you currently need to build using `linuxkit build equinixmetal.yml
equinixmetal.arm64.yml` and then un-compress both the kernel and the initrd
before booting, e.g:
```sh
mv equinixmetal-initrd.img equinixmetal-initrd.img.gz && gzip -d equinixmetal-initrd.img.gz
mv equinixmetal-kernel equinixmetal-kernel.gz && gzip -d equinixmetal-kernel.gz
```
The LinuxKit image can then be booted with:
```sh
METAL_API_TOKEN=<API key> METAL_PROJECT_ID=<Project ID> \
linuxkit run equinixmetal -machine baremetal_2a -serve :8080 -base-url -base-url <ngrok url> equinixmetal
```
Alternatively, `linuxkit push equinixmetal` will uncompress the kernel and
initrd images on arm machines (or explicitly via the `-decompress`
flag. There is also a `linuxkit serve` command which will start a
local HTTP server serving the specified directory.
**Note**: It may take several minutes to deploy a new server. If you
are attached to the console, you should see the BIOS and the boot
messages.
## Console
By default, `linuxkit run equinixmetal ...` will connect to the
Equinix Metal
[SOS ("Serial over SSH") console](https://deploy.equinix.com/developers/docs/metal/resilience-recovery/serial-over-ssh/). This
requires `ssh` access, i.e., you must have uploaded your SSH keys to
Equinix Metal beforehand.
You can exit the console vi `~.` on a new line once you are
disconnected from the serial, e.g. after poweroff.
**Note**: We also require that the Equinix Metal SOS host is in your
`known_hosts` file, otherwise the connection to the console will
fail. There is a Equinix Metal SOS host per zone.
You can disable the serial console access with the `-console=false`
command line option.
## Disks
At this moment the Linuxkit server boots from RAM, with no persistent
storage. We are working on adding persistent storage support on Equinix Metal.
## Networking
On the baremetal type 2a system (arm64 Cavium Thunder X) the network device driver does not get autoloaded by `mdev`. Please add:
```
- name: modprobe
image: linuxkit/modprobe:<hash>
command: ["modprobe", "nicvf"]
```
to your YAML files before any containers requiring the network to be up, e.g., the `dhcpcd` container.
Some Equinix Metal server types have bonded networks; the `metadata` package has support for setting
these up, and also for adding additional IP addresses.
## Integration services and Metadata
Equinix Metal supports [user state](https://deploy.equinix.com/developers/docs/metal/server-metadata/user-data/)
during system bringup, which enables the boot process to be more informative about the
current state of the boot process once the kernel has loaded but before the
system is ready for login.

View File

@@ -20,7 +20,7 @@ The HyperKit backend currently supports booting:
You need to select the boot method manually using the command line
options. The default is `kernel+initrd`. `kernel+squashfs` can be
selected using `-squashfs` and to boot a ISO with EFI you have to
specify `-iso -uefi`.
specify `--iso --uefi`.
The `kernel+initrd` uses a RAM disk for the root filesystem. If you
have RAM constraints or large images we recommend using either the

View File

@@ -8,7 +8,7 @@ manage the Hyper-V VMs.
Example:
```sh
linuxkit.exe run -disk size=1 linuxkit-efi.iso
linuxkit.exe run --disk size=1 linuxkit-efi.iso
```
The Hyper-V VM, by default, is named after the prefix of the ISO, ie

View File

@@ -11,17 +11,7 @@ Supported (tested) versions of the relevant OpenStack APIs are:
## Authentication
LinuxKit's support for OpenStack handles two ways of providing the endpoint and authentication details. You can either set the standard set of environment variables and the commands detailed below will inherit those, or you can explicitly provide them on the command-line as options to `push` and `run`. The examples below use the latter, but if you prefer the former then you'll need to set the following:
```shell
OS_USERNAME="admin"
OS_PASSWORD="xxx"
OS_TENANT_NAME="linuxkit"
OS_AUTH_URL="https://keystone.com:5000/v3"
OS_USER_DOMAIN_NAME=default
OS_CACERT=/path/to/cacert.pem
OS_INSECURE=false
```
LinuxKit's support for OpenStack includes configuring access to your cloud as detailed in the official [os-client-config](https://docs.openstack.org/os-client-config/latest/user/configuration.html) documentation.
## Push
@@ -40,32 +30,17 @@ Images generated with Moby can be uploaded into OpenStack's image service with `
```shell
./linuxkit push openstack \
-authurl=https://keystone.example.com:5000/v3 \
-username=admin \
-password=XXXXXXXXXXX \
-project=linuxkit \
-img-name=LinuxKitTest
./linuxkit.iso
```
If successful, this will return the image's UUID. If you've set your environment variables up as described above, this command can then be simplified:
```shell
./linuxkit push openstack \
-img-name "LinuxKitTest" \
~/Desktop/linuxkitmage.qcow2
```
## Run
Virtual machines can be launched using `linuxkit run openstack`. As an example:
```shell
linuxkit run openstack \
-authurl https://keystone.example.com:5000/v3 \
-username=admin \
-password=xxx \
-project=linuxkit \
-flavor=hotdog
-keyname=deadline_ed25519 \
-sec-groups=allow_ssh,nginx \
-network c5d02c5f-c625-4539-8aed-1dab3aa85a0a \

View File

@@ -1,151 +0,0 @@
# LinuxKit with bare metal on Packet
[Packet](http://packet.net) is a bare metal hosting provider.
You will need to [create a Packet account] and a project to
put this new machine into. You will also need to [create an API key]
with appropriate read/write permissions to allow the image to boot.
[create a Packet account]:https://app.packet.net/#/registration/
[create an API key]:https://help.packet.net/quick-start/api-integrations
Linuxkit is known to boot on the [Type 0]
and [Type 1] servers at Packet.
Support for other server types, including the [Type 2A] ARM server,
is a work in progress.
[Type 0]:https://www.packet.net/bare-metal/servers/type-0/
[Type 1]:https://www.packet.net/bare-metal/servers/type-1/
[Type 2A]:https://www.packet.net/bare-metal/servers/type-2a/
The `linuxkit run packet` command can mostly either be configured via
command line options or with environment variables. see `linuxkit run
packet --help` for the options and environment variables.
By default, `linuxkit run` will provision a new machine and remove it
once you are done. With the `-keep` option the provisioned machine
will not be removed. You can then use the `-device` option with the
device ID on subsequent `linuxkit run` invocations to re-use an
existing machine. These subsequent runs will update the iPXE data so
you can boot alternative kernels on an existing machine.
There is an example YAML file for [x86_64](../examples/packet.yml) and
an additional YAML for [arm64](../examples/packet.arm64.yml) servers
which provide both access to the serial console and via ssh and
configures bonding for network devices via metadata (if supported).
For x86_64 builds for Intel servers we strongly recommend adding
`ucode: intel-ucode.cpio` to the kernel section in the YAML. This
updates the Intel CPU microcode to the latest by prepending it to the
generated initrd file. The `ucode` entry is only recommended when
booting on baremetal. It should be omitted (but is harmless) when
building images to boot in VMs.
**Note**: The update of the iPXE configuration sometimes may take some
time and the first boot may fail. Hitting return on the console to
retry the boot typically fixes this.
## Boot
LinuxKit on Packet boots the `kernel+initrd` output from moby via
[iPXE](https://help.packet.net/technical/infrastructure/custom-ipxe)
which also requires a iPXE script. iPXE booting requires a HTTP server
on which you can store your images. The `-base-url` option specifies
the URL to a HTTP server from which `<name>-kernel`,
`<name>-initrd.img`, and `<name>-packet.ipxe` can be downloaded during
boot.
If you have your own HTTP server, you can use `linuxkit push packet`
to create the files (including the iPXE script) you need to make
available.
If you don't have a public HTTP server at hand, you can use the
`-serve` option. This will create a local HTTP server which can either
be run on another Packet machine or be made accessible with tools
like [ngrok](https://ngrok.com/).
For example, to boot the [example](../examples/packet.net)
with a local HTTP server:
```sh
linuxkit build packet.yml
# run the web server
# run 'ngrok http 8080' in another window
PACKET_API_KEY=<API key> PACKET_PROJECT_ID=<Project ID> \
linuxkit run packet -serve :8080 -base-url <ngrok url> packet
```
To boot a `arm64` image for Type 2a machine (`-machine baremetal_2a`)
you currently need to build using `linuxkit build packet.yml
packet.arm64.yml` and then un-compress both the kernel and the initrd
before booting, e.g:
```sh
mv packet-initrd.img packet-initrd.img.gz && gzip -d packet-initrd.img.gz
mv packet-kernel packet-kernel.gz && gzip -d packet-kernel.gz
```
The LinuxKit image can then be booted with:
```sh
PACKET_API_KEY=<API key> PACKET_PROJECT_ID=<Project ID> \
linuxkit run packet -machine baremetal_2a -serve :8080 -base-url -base-url <ngrok url> packet
```
Alternatively, `linuxkit push packet` will uncompress the kernel and
initrd images on arm machines (or explicitly via the `-decompress`
flag. There is also a `linuxkit serve` command which will start a
local HTTP server serving the specified directory.
**Note**: It may take several minutes to deploy a new server. If you
are attached to the console, you should see the BIOS and the boot
messages.
## Console
By default, `linuxkit run packet ...` will connect to the
Packet
[SOS ("Serial over SSH") console](https://help.packet.net/technical/networking/sos-rescue-mode). This
requires `ssh` access, i.e., you must have uploaded your SSH keys to
Packet beforehand.
You can exit the console vi `~.` on a new line once you are
disconnected from the serial, e.g. after poweroff.
**Note**: We also require that the Packet SOS host is in your
`known_hosts` file, otherwise the connection to the console will
fail. There is a Packet SOS host per zone.
You can disable the serial console access with the `-console=false`
command line option.
## Disks
At this moment the Linuxkit server boots from RAM, with no persistent
storage. We are working on adding persistent storage support on Packet.
## Networking
On the baremetal type 2a system (arm64 Cavium Thunder X) the network device driver does not get autoloaded by `mdev`. Please add:
```
- name: modprobe
image: linuxkit/modprobe:<hash>
command: ["modprobe", "nicvf"]
```
to your YAML files before any containers requiring the network to be up, e.g., the `dhcpcd` container.
Some Packet server types have bonded networks; the `metadata` package has support for setting
these up, and also for adding additional IP addresses.
## Integration services and Metadata
Packet supports [user state](https://help.packet.net/technical/infrastructure/user-state)
during system bringup, which enables the boot process to be more informative about the
current state of the boot process once the kernel has loaded but before the
system is ready for login.

View File

@@ -24,9 +24,9 @@ specified with `-arch` and currently accepts `x86_64`, `aarch64`, and
`linuxkit run qemu` can boot in different types of images:
- `kernel+initrd`: This is the default mode of `linuxkit run qemu` [`x86_64`, `arm64`, `s390x`]
- `kernel+squashfs`: `linuxkit run qemu -squashfs <path to directory>`. This expects a kernel and a squashfs image. [`x86_64`, `arm64`, `s390x`]
- `iso-bios`: `linuxkit run qemu -iso <path to iso>` [`x86_64`]
- `iso-efi`: `linuxkit run qemu -iso -uefi <path to iso>`. This looks in `/usr/share/ovmf/bios.bin` for the EFI firmware by default. Can be overwritten with `-fw`. [`x86_64`, `arm64`]
- `kernel+squashfs`: `linuxkit run qemu --squashfs <path to directory>`. This expects a kernel and a squashfs image. [`x86_64`, `arm64`, `s390x`]
- `iso-bios`: `linuxkit run qemu --iso <path to iso>` [`x86_64`]
- `iso-efi`: `linuxkit run qemu --iso --uefi <path to iso>`. This looks in `/usr/share/ovmf/bios.bin` for the EFI firmware by default. Can be overwritten with `-fw`. [`x86_64`, `arm64`]
- `qcow-bios`: `linuxkit run qemu disk.qcow2` [`x86_64`]
- `raw-bios`: `linuxkit run qemu disk.img` [`x86_64`]
- `aws`: `linuxkit run qemu disk.img` boots a raw AWS disk image. [`x86_64`]

View File

@@ -70,4 +70,11 @@ LinuxKit YAML file:
command: ["modprobe", "smsc95xx"]
```
For Raspberry Pi 3b+ use:
```
- name: netdev
image: linuxkit/modprobe:<hash>
command: ["modprobe", "lan78xx"]
```
**TODO:** Figure out why mdev is not loading the driver.

62
docs/platform-scaleway.md Normal file
View File

@@ -0,0 +1,62 @@
# Using LinuxKit on Scaleway
This is a quick guide to run LinuxKit on Scaleway (only VPS x86_64 for now)
## Setup
You must create a Scaleway API Token (combination of Access and Secret Key), available at [Scaleway Console](https://console.scaleway.com/account/credentials), first.
Then you can use it either with the `SCW_ACCESS_KEY` and `SCW_SECRET_KEY` environment variables or the `-access-key` and `-secret-key` flags
of the `linuxkit push scaleway` and `linuxkit run scaleway` commands.
In addition, Organization ID value has to be set, either with the `SCW_DEFAULT_ORGANIZATION_ID` environment variable or the `-organization-id` command line flag.
The environment variable `SCW_DEFAULT_ZONE` is used to set the zone (there is also the `-zone` flag)
## Build an image
Scaleway requires a `iso-efi` image. To create one:
```
$ linuxkit build -format iso-efi examples/scaleway.yml
```
### Changes needed in the yaml
* You have to set `root=/dev/vda` in the `cmdline` to have the right device set on boot
* The metadata package is not only used to set the metadata, but also to signal Scaleway that the instance has booted. So it is encouraged to use it (dhcpcd must be set before)
## Push image
You have to do `linuxkit push scaleway scaleway.iso` to upload it to your Scaleway images.
By default the image name is the name of the ISO file without the extension.
It can be overidden with the `-img-name` flag or the `SCW_IMAGE_NAME` environment variable.
**Note 1:** If an image (and snapshot) of the same name exists, it will be replaced.
**Note 2:** The image is zone specific: if you create an image in `par1` you can't use is in `ams1`.
### Push process
Building a Scaleway image have a special process. Basically:
* Create an `image-builder` instance with an additional volume, based on Ubuntu Bionic (only x86_64 for now)
* Copy the ISO image on this instance
* Use `dd` to write the image on the additional volume (`/dev/vdb` by default)
* Terminate the instance, create a snapshot, and create an image from the snapshot
**Note 1:** An image is linked to a snapshot, so you can't delete a snapshot before the image.
**Note 2:** You can specify an already running instance to act as the image builder with the `-instance-id` flag. But if you don't specify the `-no-clean` flag it will be destroyed upon completion.
## Create an instance and connect to it
With the image created, we can now create an instance.
```
linuxkit run scaleway scaleway
```
By default, the instance name is `linuxkit`. It can be overidden with the `-instance-name` flag.
If you don't set the `-no-attach` flag, you will be connected to the serial port.
You can edit the Scaleway example to allow you to SSH to your instance in order to use it.

View File

@@ -20,11 +20,20 @@ stdio, providing interactive access to the VM.
## Disks
The Virtualbox backend support configuring a persistent disk using the
standard `linuxkit` `-disk` syntax. Multiple disks are
standard `linuxkit` `-disk` syntax. Multiple disks are
supported and can be created in `raw` format; other formats that VirtualBox
supports can be attached
supports can be attached. Note that additional drives are attached to the
SATA Controller, unlike the VM disk which is on the IDE Controller.
## Networking
You can select the networking mode, which defaults to the standard `nat`, but
some networking modes may require additional configuration.
You can select the networking mode, which defaults to the standard `nat`, by using the
`-networking` command-line option. Some networking modes (`hostonly`, `bridge`) will require
the additional `adapter` parameter to the `-networking` option:
~~~
-networking hostonly,adapter=vboxnet0
~~~
You can specify more than one `-networking` option to setup multiple adapters. It is
recommended to setup the first adapter as `nat`.

View File

@@ -0,0 +1,205 @@
# LinuxKit with Virtualization.Framework (macOS)
We recommend using LinuxKit in conjunction with
[Docker for Mac](https://docs.docker.com/docker-for-mac/install/). For
the time being it's best to be on the latest edge release. `linuxkit
run` uses [Virtualization.Framework](https://developer.apple.com/documentation/virtualization) and
[VPNKit](https://github.com/moby/vpnkit) and the edge release ships
with updated versions of both.
Alternatively, you can install Virtualization.Framework and VPNKit standalone and use it without Docker for Mac.
Virtualization.Framework is enabled on macOS only when built with CGO enabled.
## Boot
The Virtualization.Framework backend currently supports booting:
- `kernel+initrd` output from `linuxkit build`.
- `kernel+squashfs` output from `linuxkit build`.
- EFI ISOs using the EFI firmware.
You need to select the boot method manually using the command line
options. The default is `kernel+initrd`. `kernel+squashfs` can be
selected using `-squashfs` and to boot a ISO with EFI you have to
specify `--iso --uefi`.
The `kernel+initrd` uses a RAM disk for the root filesystem. If you
have RAM constraints or large images we recommend using either the
`kernel+squashfs` or the EFI ISO boot.
## Console
With `linuxkit run` on Virtualization.Framework the serial console is redirected to
stdio, providing interactive access to the VM. The output of the VM
can be re-directed to a file or pipe, but then stdin is not available.
Virtualization.Framework does not provide a console device.
## Disks
The Virtualization.Framework backend support configuring a persistent disk using the
standard `linuxkit` `-disk` syntax. Multiple disks are
supported and the disks are in raw format.
## Power management
Virtualization.Framework sends an ACPI power event when it receives SIGTERM to allow the VM to
shut down properly. The VM has to be able to receive ACPI events to initiate the
shutdown. This is provided by the [`acpid` package](../pkg/acpid). An example
is available in the [Docker for Mac example](../examples/docker-for-mac.yml).
## Networking
By default, `linuxkit run` creates a VM with a single network
interface which, logically, is attached to a L2 bridge. The bridge
also has the VM used by Docker for Mac attached to it. This means that
the LinuxKit VMs, created with `linuxkit run`, can be accessed from
containers running on Docker for Mac.
The LinuxKit VMs have IP addresses on the `192.168.65.0/24` subnet
assigned by a DHCP server part of VPNKit. `192.168.65.1` is reserved
for VPNKit as the default gateway and `192.168.65.2` is used by the
Docker for Mac VM.
By default, LinuxKit VMs get incrementally increasing IP addresses,
but you can assign a fixed IP address with `linuxkit run -ip`. It's
best to choose an IP address from the DHCP address range above, but
care must be taken to avoid clashes of IP address.
*NOTE:* The LinuxKit VMs can *not* be directly accessed by IP address
from the host. Enabling this would require use of the macOS `vmnet`
framework, which requires the VMs to run as `root`. We don't consider
this option palatable, and provide alternative options to access the
VMs over the network below.
### Accessing network services
Virtualization.Framework offers a number of ways for accessing network services
running inside the LinuxKit VM from the host. These depend on the
networking mode selected via `-networking`. The default mode is
`vmnet`, where it sets up a network bridge. We intend to add support for
`docker-for-mac`, where the same VPNkit instance is shared between
LinuxKit VMs and the VM running as part of Docker for Mac, in the future.
#### Access from the Docker for Mac VM (`-networking docker-for-mac`)
The simplest way to access networking services exposed by a LinuxKit
VM is to use a Docker for Mac container. For example, to access an ssh
server in a LinuxKit VM, create a ssh client container from:
```
FROM alpine:edge
RUN apk add --no-cache openssh-client
```
and then run
```
docker build -t ssh .
docker run --rm -ti -v ~/.ssh:/root/.ssh ssh ssh <IP address of VM>
```
#### Forwarding ports with `socat` (`-networking docker-for-mac`)
A `socat` container on Docker for Mac can be used to proxy between the
LinuxKit VM's ports and localhost. For example, to expose the redis
port from the [RedisOS example](../examples/redis-os.yml), use this
Dockerfile:
```
FROM alpine:edge
RUN apk add --no-cache socat
ENTRYPOINT [ "/usr/bin/socat" ]
```
and then:
```
docker build -t socat .
docker run --rm -t -d -p 6379:6379 socat tcp-listen:6379,reuseaddr,fork tcp:<IP address of VM>:6379
```
#### Port forwarding with VPNKit (`-networking docker-for-mac`)
There is **experimental** support for exposing selected ports of the
guest on `localhost` using the `-publish` command line option. For
example, using `-publish 2222:22/tcp` exposes the guest TCP port 22 on
localhost on port 2222. Multiple `-publish` options can be
specified. For example, the image build from the [`sshd
example`](../examples/sshd.yml) can be started with:
```
linuxkit run -publish 2222:22/tcp sshd
```
and then you can log into the LinuxKit VM with `ssh -p 2222
root@localhost`.
Note, this mode is **experimental** and may cause the VPNKit instance
shared with Docker for Mac being confused about which ports are
currently in use, in particular if the LinuxKit VM does not exit
gracefully. This can typically be fixed by restarting Docker for Mac.
#### Port forwarding with VPNKit (`-networking vpnkit`)
An alternative to the previous method is to start your own copy of
`vpnkit` (or connect to an already running instance). This can be done
using the `-networking vpnkit` command line option.
VPNKit uses a 9P mount in `/port` for coordination between
components. The first VM on a VPNKit instance currently needs mount
the 9P filesystem and also needs to run the `vpnkit-forwarder` service
to enable port forwarding to localhost. A full example with `vpnkit`
forwarding of `sshd` is available in
[examples/vpnkit-forwarder.yml](/examples/vpnkit-forwarder.yml).
To run this example with its own instance of VPNKit, use:
```
linuxkit run -networking vpnkit -publish 2222:22/tcp vpnkit-forwarder
```
You can then access it via:
```
ssh -p 2222 root@localhost
```
More details about the VPNKit forwarding mechanism is available in the
[VPNKit
documentation](https://github.com/moby/vpnkit/blob/master/docs/ports.md#signalling-from-the-vm-to-the-host).
## Integration services and Metadata
There are no special integration services available for Virtualization.Framework, but
there are a number of packages, such as `vsudd`, which enable
tighter integration of the VM with the host (see below).
The Virtualization.Framework backend also allows passing custom userdata into the
[metadata package](./metadata.md) using either the `-data` or `-data-file` command-line
option. This attaches a CD device with the data on.
### `vsudd` unix domain socket forwarding
The [`vsudd` package](/pkg/vsudd) provides a daemon that exposes unix
domain socket inside the VM to the host via virtio or Hyper-V sockets.
With Virtualization.Framework, the virtio sockets can be exposed as unix domain
sockets on the host, enabling access to other daemons, like
`containerd` and `dockerd`, from the host. An example configuration
file is available in [examples/vsudd-containerd.yml](/examples/vsudd-containerd.yml).
After building the example, run it with `linuxkit run virtualization.framework
-vsock-ports 2374 vsudd`. This will create a unix domain socket in the state directory that maps to the `containerd` control socket. The socket is called `guest.00000946`.
If you install the `ctr` tool on the host you should be able to access the
`containerd` running in the VM:
```
$ go get -u -ldflags -s github.com/containerd/containerd/cmd/ctr
...
$ ctr -a vsudd-state/guest.00000946 list
ID IMAGE PID STATUS
vsudd 466 RUNNING
```

88
docs/releasing.md Normal file
View File

@@ -0,0 +1,88 @@
# Making a LinuxKit release
This document describes the steps to make a LinuxKit release. A
LinuxKit release consists of:
- A git tag of the form vX.Y on a specific commit.
- Packages on Docker hub, tagged with the release tag.
- All sample `YAML` files updated to use the release packages
- `linuxkit` binaries for all supported architectures.
- Changelog entry
Note, we explicitly do not tag kernel images with LinuxKit release
tags as we encourage users to stay current with the kernel
releases. We also do not tag test and `mkimage` packages as these are
not end-user facing.
## Pre-requisites
Releases can be done by any maintainer. Maintainers need to have
access to build machines for all architectures support by LinuxKit and
signing keys set up to sign Docker hub images.
## Release preparation
The release preparation is by far the most time consuming task as it
involves updating all packages and YAML files.
The release preparation is performed on a branch of your up-to-date
LinuxKit clone. This document assumes that your clone of the LinuxKit
repository is available as the `origin` remote in your local `git`
clone (in my setup the official LinuxKit repository is available as
`upstream` remote). If your setup is different, you may have to adjust
some of the commands below.
As a starting point you have to be on the update to date master branch
and be in the root directory of your local git clone. You should also
have the same setup on all build machines used.
### Update `linuxkit/alpine`
This step is not necessarily required if the alpine base image has
recently been updated, but it is good to pick up any recent bug
fixes. Follow the process in [alpine-base-update.md](./alpine-base-update.md)
There are several important notes to consider when updating alpine base:
* `LK_BRANCH` is set to `rel_$LK_RELEASE`, when cutting a release, for e.g. `LK_BRANCH=rel_v0.9`
* It not necessarily required to update the alpine base image if it has recently been updated, but it is good to pick up any recent bug
fixes. However, you do need to update the tools, packages and tests.
* Releases are a particularly good time to check for updates in wrapped external dependencies, as highlighted in [alpine-base-update.md#External Tools](./alpine-base-update.md#External_Tools)
### Final preparation steps
- Update AUTHORS by running `./scripts/generate-authors.sh`
- Update the `VERSION` variable in the top-level `Makefile`
- Create an entry in `CHANGELOG.md`. Take a look at `git log v0.3..HEAD` and pick interesting updates (of course adjust `v0.3` to the previous version).
- Create a PR with your changes.
## Releasing
Once the PR is merged we can do the actual release.
- Update your local git clone to the lastest
- Identify the merge commit for your PR and tag it and push it to the main LinuxKit repository (remote `upstream` in my case):
```
git tag $LK_RELEASE master
git push upstream $LK_RELEASE
```
Then head over to GitHub and look at the `Releases` tab. You should see the new tag. Edit it:
- Add the changelog message
- Head over to the Circle CI page of the master build (try the Circle CI badge in the top level `README.md`)
- Download the artefacts and SHA256 sums file.
- Add the downloaded binaries to the release page (drag-and-drop below the editor window)
- Add the `sha256` sums to the release notes on the release page
Hit the `Publish release` button.
This completes the release, but you are not done, one more step is required.
## Post release
Create a PR which bumps the version number in the top-level `Makefile`
to `$LK_RELEASE+` to make sure that the version reported by `linuxkit
version` gets updated.

View File

@@ -0,0 +1,71 @@
# Reproducible builds
We aim to make the outputs of `linuxkit build` reproducible, i.e. the
build artefacts should be bit-by-bit identical copies if invoked with
the same inputs and run with the same version of the `linuxkit`
command. See [this
document](https://reproducible-builds.org/docs/buy-in/) on why this
matters.
_Note, we do not (yet) aim to make `linuxkit pkg build` builds
reproducible._
## Current status
Currently, the following output formats provide reproducible builds:
- `tar` (Tested as part of the CI)
- `tar-kernel-initrd`
- `docker`
- `kernel+initrd` (Tested as part of the CI)
## Details
In general, `linuxkit build` lends itself for reproducible
builds. LinuxKit packages, used during `linuxkit build`, are (signed)
docker images. Packages are tagged with the content hash of the source
code (and optionally release version) and are typically only updated
if the source of the package changed (in which case the tag
changes). For all intents and purposes, when pulled by tag, the
contents of a packages should be bit-by-bit identical. Alternatively,
the digest of the package, in which case, the pulled image will always
be the same.
The first phase of the `linuxkit build` mostly untars and retars the
images of the packages to produce an tar file of the root filesystem.
This then serves as input for other output formats. During this first
phase, there are a number of things to watch out for to generate
reproducible builds:
- Timestamps of generated files. The `docker export` command, as well
as `linuxkit build` itself, creates a small number of files. The
`ModTime` for these files needs to be clamped to a fixed date
(otherwise the current time is used). Use the `defaultModTime`
variable to set the `ModTime` of created files to a specific time.
- Generated JSON files. `linuxkit build` generates a number of JSON
files by marshalling Go `struct` variables. Examples are the OCI
specification `config.json` and `runtime.json` files for
containers. The default Go `json.Marshal()` function seems to do a
reasonable good job in generating reproducible output from internal
structures, including for JSON objects. However, during `linuxkit
build` some of the OCI runtime spec fields are generated/modified
and care must be taken to ensure consistent ordering. For JSON
arrays (Go slices) it is best to sort them before Marshalling them.
Reproducible builds for the first phase of `linuxkit build` can be
tested using `-output tar` and comparing the output of subsequent
builds with tools like `diff` or the excellent
[`diffoscope`](https://diffoscope.org/).
The second phase of `linuxkit build` converts the intermediary `tar`
format into the desired output format. Making this phase reproducible
depends on the tools used to generate the output.
Builds, which produce ISO formats should probably be converted to use
[`go-diskfs`](https://github.com/diskfs/go-diskfs) before attempting
to make them reproducible.
For ideas on how to make the builds for other output formats
reproducible, see [this
page](https://reproducible-builds.org/docs/system-images/).

72
docs/sbom.md Normal file
View File

@@ -0,0 +1,72 @@
# Software Bill-of-Materials
LinuxKit bootable images are composed of existing OCI images.
OCI images, when built, often are scanned to create a
software bill-of-materials (SBoM). The buildkit builder
system itself contains the [ability to integrate SBoM scanning and generation into the build process](https://docs.docker.com/build/attestations/sbom/).
When LinuxKit composes an operating system image using `linuxkit build`,
it will, by default, combine the SBoMs of all the OCI images used to create
the final image.
It looks for SBoMs in the following locations:
* [image attestation storage](https://docs.docker.com/build/attestations/attestation-storage/)
Future support for [OCI Image-Spec v1.1 Artifacts](https://github.com/opencontainers/image-spec)
is under consideration, and will be reviewed when it is generally available.
When building packages with `linuxkit pkg build`, it also has the ability to generate an SBoM for the
package, which later can be consumed by `linuxkit build`.
## Consuming SBoM From Packages
When `linuxkit build` is run, it does the following for dealing with SBoMs:
1. For each OCI image that it processes:
1. check if the image contains an SBoM attestation; it not, skip this step.
1. Retrieve the SBoM attestation.
1. After generating the root filesystem, combine all of the individual SBoMs into a single unified SBoM.
1. Save the output single SBoM into the root of the image as `sbom.spdx.json`.
Currently, only SPDX json format is supported.
### SBoM Scanner and Output Format
By default, linuxkit combines the SBoMs into a file with output format SPDX json,
and the file saved to the filename `sbom.spdx.json`.
In addition, in order to assist with reproducible builds, the creation date/time of the SBoM is
a fixed date/time set by linuxkit, rather than the current date/time. Note, however, that even
with a fixed date/time, reproducible builds depends on reproducible SBoMs on the underlying container images.
This is not always the case, as the unique IDs for each package and file might be deterministic, but it might not.
This can be overridden by using the CLI flags:
* `--no-sbom`: do not find and consolidate the SBoMs
* `--sbom-output <filename>`: the filename to save the output to in the image.
* `--sbom-current-time true|false`: whether or not to use the current time for the SBoM creation date/time (default `false`)
### Disable SBoM for Images
To disable SBoM generation when running `linuxkit build`, use the CLI flag `--sbom false`.
## Generating SBoM For Packages
When `linuxkit pkg build` is run, by default it enables generating an SBoM using the
[SBoM generating capabilities of buildkit](https://www.docker.com/blog/generate-sboms-with-buildkit/).
This means that it inherits all of those capabilities as well, and saves the SBoM in the same location,
as an attestation on the image.
### SBoM Scanner
By default, buildkit runs [syft](http://hub.docker.com/r/anchore/syft) with output format SPDX json,
specifically via its integration image [buildkit-syft-scanner](docker.io/docker/buildkit-syft-scanner).
You can select a different image to run a scanner, provided it complies with the
[buildkit SBoM protocol](https://github.com/moby/buildkit/blob/master/docs/attestations/sbom-protocol.md),
by passing the CLI flag `--sbom-scanner <image>`.
### Disable SBoM for Packages
To disable SBoM generation when running `linuxkit pkg build`, use the CLI flag `--sbom-scanner=false`.

View File

@@ -50,8 +50,6 @@ and namespaced separately from the host as appropriate.
LinuxKit's build process heavily leverages Docker images for packaging. Of note, all intermediate build images
are referenced by digest to ensures reproducibility across LinuxKit builds. Tags are mutable, and thus subject to override
(intentionally or maliciously) - referencing by digest mitigates classes of registry poisoning attacks in LinuxKit's buildchain.
Certain images, such as the kernel image, will be signed by LinuxKit maintainers using [Docker Content Trust](https://docs.docker.com/engine/security/trust/content_trust/),
which guarantees authenticity, integrity, and freshness of the image.
Moreover, LinuxKit's build process leverages [Alpine Linux's](https://alpinelinux.org/) hardened userspace tools such as
Musl libc, and compiler options that include `-fstack-protector` and position-independent executable output. Go binaries

View File

@@ -1,49 +0,0 @@
# Signing LinuxKit Hub Images
We sign and verify LinuxKit component images, such as `linuxkit/kernel`, using [Notary](https://github.com/docker/notary).
This document details the process for setting this up, intended for maintainers.
## Initialize a New Repository
Let's say we're publishing a new `linuxkit/foo` image that we want to sign and verify in LinuxKit.
We first need to initialize the Notary repository:
```
notary -s https://notary.docker.io -d ~/.docker/trust init -p docker.io/linuxkit/foo
```
This command will generate some private keys in `~/.docker/trust` and ask you for passphrases such that they are encrypted at rest.
All linuxkit repositories are currently using the same root key so we can pin trust on key ID `1908a0cf4f55710138e63f65ab2a97e8fa3948e5ca3b8857a29f235a3b61ea1b`.
We'll also let the notary server take control of the snapshot key, for easier delegation collaboration:
```
notary -s https://notary.docker.io -d ~/.docker/trust key rotate docker.io/linuxkit/foo snapshot -r
```
## Add maintainers to delegation roles:
Maintainers are to sign with `delegation` keys, which are adminstered by a non-root key.
Thusly, they are easily rotated without having to bring the root key online.
Additionally, maintainers can be added to separate roles for auditing purposes: the current setup is to add maintainers to both the `targets/releases` role that is intended
for release consumption, as well as an individual `targets/<maintainer_name>` role for auditing.
Docker will automatically sign into both roles when pushing with Docker Content Trust.
Here's what the command looks like to add all maintainers to the `targets/releases` role:
```
notary -s https://notary.docker.io -d ~/.docker/trust delegation add -p docker.io/linuxkit/foo targets/releases alice.crt bob.crt charlie.crt --all-paths
```
Here's what the commands look like to add all maintainers to their individually named roles:
```
notary -s https://notary.docker.io -d ~/.docker/trust delegation add -p docker.io/linuxkit/foo targets/alice alice.crt --all-paths
notary -s https://notary.docker.io -d ~/.docker/trust delegation add -p docker.io/linuxkit/foo targets/bob bob.crt --all-paths
notary -s https://notary.docker.io -d ~/.docker/trust delegation add -p docker.io/linuxkit/foo targets/charlie charlie.crt --all-paths
```
## Maintainers import their private keys
It's important that each maintainer imports their private key into Docker's key storage, so Docker can use it to sign:
```
notary -d ~/.docker/trust key import alice.key -r user
```

View File

@@ -50,7 +50,7 @@ You must copy an existing `group.sh` in to this folder and adjust as required or
[example](https://github.com/linuxkit/rtf/tree/master/etc/templates/group.sh)
To write your test, create a folder within the group using the `000_name` format as described above.
You should then copy an existing `test.sh` in to this directory and amdend it,
You should then copy an existing `test.sh` in to this directory and amend it,
or start from an [example](http://github.com/linuxkit/rtf/tree/master/etc/templates/test.sh)
If your test can only be run when certain conditions are met, you should consider adding a label to

36
docs/troubleshooting.md Normal file
View File

@@ -0,0 +1,36 @@
# Troubleshooting
This document contains a list of known issues related to using, building or testing linuxkit.
## Images
## Packages
### Invalid MediaType
**Problem**
```
Error: error building and pushing "linuxkit/mkimage-iso-efi-initrd:0e66171ffde9bb735b0e014f811f9626fc8b9bc9": PUT https://index.docker.io/v2/linuxkit/mkimage-iso-efi-initrd/manifests/0e66171ffde9bb735b0e014f811f9626fc8b9bc9: MANIFEST_INVALID: manifest invalid; if present, mediaType in image index should be 'application/vnd.oci.image.index.v1+json' not 'application/vnd.docker.distribution.manifest.list.v2+json'
```
The above message is caused by registries, notably docker hub, refusing to accept indexes with the
docker media type of `application/vnd.docker.distribution.manifest.list.v2+json`, rather than the OCI
one `application/vnd.oci.image.index.v1+json`.
Linuxkit _does_ use the OCI media type, however, if the image _already_ exists in the registry, linuxkit will
pull the index down, update it, and push it back up. The above error occurs because the index that exists in
the hub, the one that is pulled down, has the older media type, from when the registry accepted it.
**Solution**
The solution is to force an entirely new build, which will generate the images and index with the correct media
type.
```
linuxkit pkg build --force <path>
linuxkit pkg push <path>
```
## Testing

View File

@@ -2,22 +2,24 @@ Vendoring
=========
The Go code in this repo depends on a number of Go libraries.
These are vendored in to the `src/cmd/linuxkit/vendor` directory using [`vndr`](https://github.com/lk4d4/vndr)
The `vendor.conf` file contains a list of the repositories and the git SHA or branch name that should be vendored
These are vendored in to the `src/cmd/linuxkit/vendor` directory using [go modules](https://golang.org/ref/mod)
## Updating dependencies
Update `src/cmd/linuxkit/vendor.conf` with the dependency that you would like to add.
Details of usage of the `vndr` tool and the format of `vendor.conf` can be found [here](https://github.com/LK4D4/vndr/blob/master/README.md)
Go modules should install any required dependencies to `go.mod` and `go.sum` when running normal go commands such as `go build`,
`go vet`, etc. To install specific versions, use `go get <dependency>@<reference>`.
Once done, you must run the `vndr` tool to add the necessary files to the `vendor` directory.
The easiest way to do this is in a container.
See the [go modules](https://golang.org/ref/mod) documentation for more information.
Currently if updating `github.com/moby/tool` it is also necessary to
update `src/cmd/linuxkit/build.go` manually after updating `vendor.conf`:
LinuxKit vendors all dependencies to make it completely self-contained. Once `go.mod` is up to date,
you must update the dependencies, either using your local go toolchain or in a container.
hash=$(awk '/^github.com\/moby\/tool/ { print $2 }' src/cmd/linuxkit/vendor.conf)
curl -fsSL -o src/cmd/linuxkit/build.go https://raw.githubusercontent.com/moby/tool/${hash}/cmd/moby/build.go
## Updating locally
To vendor all dependencies:
1. `cd src/cmd/linuxkit`
1. Run `go mod vendor`
## Updating in a container
@@ -27,39 +29,7 @@ To update all dependencies:
docker run -it --rm \
-v $(pwd):/go/src/github.com/linuxkit/linuxkit \
-w /go/src/github.com/linuxkit/linuxkit/src/cmd/linuxkit \
--entrypoint /go/bin/vndr \
linuxkit/go-compile:a8bffe875268a973ea82e5937b0fb23a5b08cc79
```
To update a single dependency:
```
docker run -it --rm \
-v $(pwd):/go/src/github.com/linuxkit/linuxkit \
-w /go/src/github.com/linuxkit/linuxkit/src/cmd/linuxkit \
--entrypoint /go/bin/vndr \
linuxkit/go-compile:a8bffe875268a973ea82e5937b0fb23a5b08cc79
github.com/docker/docker
```
## Updating locally
First you must install `vndr` and ensure that `$GOPATH/bin` is on your `$PATH`
```
go get -u github.com/LK4D4/vndr
```
To update all dependencies:
```
cd src/cmd/linuxkit
vndr
```
To update a single dependency:
```
cd /src/cmd/linuxkit
vndr github.com/docker/docker
--entrypoint=go
linuxkit/go-compile:7b1f5a37d2a93cd4a9aa2a87db264d8145944006
mod vendor
```

394
docs/yaml.md Normal file
View File

@@ -0,0 +1,394 @@
# Configuration Reference
The `linuxkit build` command assembles a set of containerised components into in image. The simplest
type of image is just a `tar` file of the contents (useful for debugging) but more useful
outputs add a `Dockerfile` to build a container, or build a full disk image that can be
booted as a linuxkit VM. The main use case is to build an assembly that includes
`containerd` to run a set of containers, but the tooling is very generic.
The yaml configuration specifies the components used to build up an image . All components
are downloaded at build time to create an image. The image is self-contained and immutable,
so it can be tested reliably for continuous delivery.
Components are specified as Docker images which are pulled from a registry during build if they
are not available locally. See [image-cache](./image-cache.md) for more details on local caching.
The Docker images are optionally verified with Docker Content Trust.
For private registries or private repositories on a registry credentials provided via
`docker login` are re-used.
## Sections
The configuration file is processed in the order `kernel`, `init`, `onboot`, `onshutdown`,
`services`, `files`, `volumes`. Each section adds files to the root file system. Sections may be omitted.
Each container that is specified is allocated a unique `uid` and `gid` that it may use if it
wishes to run as an isolated user (or user namespace). Anywhere you specify a `uid` or `gid`
field you specify either the numeric id, or if you use a name it will refer to the id allocated
to the container with that name.
```
services:
- name: redis
image: redis:latest
uid: redis
gid: redis
binds:
- /etc/redis:/etc/redis
files:
- path: /etc/redis/redis.conf
contents: "..."
uid: redis
gid: redis
mode: "0600"
```
### `kernel`
The `kernel` section is only required if booting a VM. The files will be put into the `boot/`
directory, where they are used to build bootable images.
The `kernel` section defines the kernel configuration. The `image` field specifies the Docker image,
which should contain a `kernel` file that will be booted (eg a `bzImage` for `amd64`) and a file
called `kernel.tar` which is a tarball that is unpacked into the root, which should usually
contain a kernel modules directory. `cmdline` specifies the kernel command line options if required.
The contents of `cmdline` are passed to the kernel as-is. There are several special values that are
used to control the behaviour of linuxkit packages. See [kernel command line options](../docs/cmdline.md).
To override the names, you can specify the kernel image name with `binary: bzImage` and the tar image
with `tar: kernel.tar` or the empty string or `none` if you do not want to use a tarball at all.
Kernel packages may also contain a cpio archive containing CPU microcode which needs prepending to
the initrd. To select this option, recommended when booting on bare metal, add `ucode: intel-ucode.cpio`
to the kernel section.
### `init`
The `init` section is a list of images that are used for the `init` system and are unpacked directly
into the root filesystem. This should bring up `containerd`, start the system and daemon containers,
and set up basic filesystem mounts. in the case of a LinuxKit system. For ease of
modification `runc` and `containerd` images, which just contain these programs are added here
rather than bundled into the `init` container.
### `onboot`
The `onboot` section is a list of images. These images are run before any other
images. They are run sequentially and each must exit before the next one is run.
These images can be used to configure one shot settings. See [Image
specification](#image-specification) for a list of supported fields.
### `onshutdown`
This is a list of images to run on a clean shutdown. Note that you must not rely on these
being run at all, as machines may be be powered off or shut down without having time to run
these scripts. If you add anything here you should test both in the case where they are
run and when they are not. Most systems are likely to be "crash only" and not have any setup here,
but you can attempt to deregister cleanly from a network service here, rather than relying
on timeouts, for example.
### `services`
The `services` section is a list of images for long running services which are
run with `containerd`. Startup order is undefined, so containers should wait
on any resources, such as networking, that they need. See [Image
specification](#image-specification) for a list of supported fields.
### `volumes`
The volumes section is a list of named volumes that can be used by other containers,
including those in `services`, `onboot` and `onshutdown`. The volumes are created in a directory
chosen by linuxkit at build-time. The volumes then can be referenced by other containers and
mounted into them.
Volumes normally are blank directories. If an image is provided, the contents of that image
will be used to populate the volume.
The `volumes` section can declare a volume to be read-write or read-only. If the volume is read-write,
a volume that is mounted into a container can be mounted read-only or read-write. If the volume is read-only,
it can be mounted into a container read-only; attempting to do so read-write will generate a build-time error.
By default, volumes are created read-write, and are mounted read-write.
Volume names **must** be unique, and must contain only lower-case alphanumeric characters, hyphens, and
underscores.
Sample `volumes` section:
```yml
volumes:
- name: vola
image: alpine:latest
readonly: true
- name: volb
image: alpine:latest
readonly: false
- name: volc
readonly: false
```
In the above example:
* `vola` is populated by the contents of `alpine:latest` and is read-only.
* `volb` is populated by the contents of `alpine:latest` and is read-write.
* `volc` is an empty volume and is read-write.
Sample usage of volumes in `services` section:
```yml
services:
- name: myservice
image: alpine:latest
binds:
- volA:/mnt/volA:ro
- volB:/mnt/volB
```
### `files`
The files section can be used to add files inline in the config, or from an external file.
```yml
files:
- path: dir
directory: true
mode: "0777"
- path: dir/name1
source: "/some/path/on/local/filesystem"
mode: "0666"
- path: dir/name2
source: "/some/path/that/it/is/ok/to/omit"
optional: true
mode: "0666"
- path: dir/name3
contents: "orange"
mode: "0644"
uid: 100
gid: 100
```
Specifying the `mode` is optional, and will default to `0600`. Leading directories will be
created if not specified. You can use `~/path` in `source` to specify a path in the build
user's home directory.
In addition there is a `metadata` option that will generate the file. Currently the only value
supported here is `"yaml"` which will output the yaml used to generate the image into the specified
file:
```yml
- path: etc/linuxkit.yml
metadata: yaml
```
Note that if you use templates in the yaml, the final resolved version will be included in the image,
and not the original input template.
Because a `tmpfs` is mounted onto `/var`, `/run`, and `/tmp` by default, the `tmpfs` mounts will shadow anything specified in `files` section for those directories.
## Image specification
Entries in the `onboot`, `onshutdown`, `volumes` and `services` sections specify an OCI image and
options. Default values may be specified using the `org.mobyproject.config` image label.
For more details see the [OCI specification](https://github.com/opencontainers/runtime-spec/blob/master/spec.md).
If the `org.mobylinux.config` label is set in the image, that specifies default values for these fields if they
are not set in the yaml file. While most fields are _replaced_ if they are specified in the yaml file,
some support _add_ via the format `<field>.add`; see below.
You can override the label entirely by setting the value, or setting it to be empty to remove
the specification for that value in the label.
If you need an OCI option that is not specified here please open an issue or pull request as the list is not yet
complete.
By default the containers will be run in the host `net`, `ipc` and `uts` namespaces, as that is the usual requirement;
in many ways they behave like pods in Kubernetes. Mount points must already exist, as must a file or directory being
bind mounted into a container.
- `name` a unique name for the program being executed, used as the `containerd` id.
- `image` the Docker image to use for the root filesystem. The default command, path and environment are
extracted from this so they need not be filled in.
- `capabilities` the Linux capabilities required, for example `CAP_SYS_ADMIN`. If there is a single
capability `all` then all capabilities are added.
- `capabilities.add` the Linux capabilities required, but these are added to the defaults, rather than overriding them.
- `ambient` the Linux ambient capabilities (capabilities passed to non root users) that are required.
- `mounts` is the full form for specifying a mount, which requires `type`, `source`, `destination`
and a list of `options`. If any fields are omitted, sensible defaults are used if possible, for example
if the `type` is `dev` it is assumed you want to mount at `/dev`. The default mounts and their options
can be replaced by specifying a mount with new options here at the same mount point.
- `binds` is a simpler interface to specify bind mounts, accepting a string like `/src:/dest:opt1,opt2`
similar to the `-v` option for bind mounts in Docker.
- `binds.add` is a simpler interface to specify bind mounts, but these are added to the defaults, rather than overriding them.
- `tmpfs` is a simpler interface to mount a `tmpfs`, like `--tmpfs` in Docker, taking `/dest:opt1,opt2`.
- `command` will override the command and entrypoint in the image with a new list of commands.
- `env` will override the environment in the image with a new environment list. Specify variables as `VAR=value`.
- `cwd` will set the working directory, defaults to `/`.
- `net` sets the network namespace, either to a path, or if `none` or `new` is specified it will use a new namespace.
- `ipc` sets the ipc namespace, either to a path, or if `new` is specified it will use a new namespace.
- `uts` sets the uts namespace, either to a path, or if `new` is specified it will use a new namespace.
- `pid` sets the pid namespace, either to a path, or if `host` is specified it will use the host namespace.
- `readonly` sets the root filesystem to read only, and changes the other default filesystems to read only.
- `maskedPaths` sets paths which should be hidden.
- `readonlyPaths` sets paths to read only.
- `uid` sets the user id of the process.
- `gid` sets the group id of the process.
- `additionalGids` sets a list of additional groups for the process.
- `noNewPrivileges` is `true` means no additional capabilities can be acquired and `suid` binaries do not work.
- `hostname` sets the hostname inside the image.
- `oomScoreAdj` changes the OOM score.
- `rootfsPropagation` sets the rootfs propagation, eg `shared`, `slave` or (default) `private`.
- `cgroupsPath` sets the path for cgroups.
- `resources` sets cgroup resource limits as per the OCI spec.
- `sysctl` sets a map of `sysctl` key value pairs that are set inside the container namespace.
- `rmlimits` sets a list of `rlimit` values in the form `name,soft,hard`, eg `nofile,100,200`. You can use `unlimited` as a value too.
- `annotations` sets a map of key value pairs as OCI metadata.
There are experimental `userns`, `uidMappings` and `gidMappings` options for user namespaces but these are not yet supported, and may have
permissions issues in use.
In addition to the parts of the specification above used to generate the OCI spec, there is a `runtime` section in the image specification
which specifies some actions to take place when the container is being started.
- `cgroups` takes a list of cgroups that will be created before the container is run.
- `mounts` takes a list of mount specifications (`source`, `destination`, `type`, `options`) and mounts them in the root namespace before the container is created. It will
try to make any missing destination directories.
- `mkdir` takes a list of directories to create at runtime, in the root mount namespace. These are created before the container is started, so they can be used to create
directories for bind mounts, for example in `/tmp` or `/run` which would otherwise be empty.
- `interface` defines a list of actions to perform on a network interface:
- `name` specifies the name of an interface. An existing interface with this name will be moved into the container's network namespace.
- `add` specifies a type of interface to be created in the containers namespace, with the specified name.
- `createInRoot` is a boolean which specifes that the interface being `add`ed should be created in the root namespace first, then moved. This is needed for `wireguard` interfaces.
- `peer` specifies the name of the other end when creating a `veth` interface. This end will remain in the root namespace, where it can be attached to a bridge. Specifying this implies `add: veth`.
- `bindNS` specifies a namespace type and a path where the namespace from the container being created will be bound. This allows a namespace to be set up in an `onboot` container, and then
using `net: path` for a `service` container to use that network namespace later.
- `namespace` overrides the LinuxKit default containerd namespace to put the container in; only applicable to services.
An example of using the `runtime` config to configure a network namespace with `wireguard` and then run `nginx` in that namespace is shown below:
```yml
onboot:
- name: dhcpcd
image: linuxkit/dhcpcd:<hash>
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: wg
image: linuxkit/ip:<hash>
net: new
binds:
- /etc/wireguard:/etc/wireguard
command: ["sh", "-c", "ip link set dev wg0 up; ip address add dev wg0 192.168.2.1 peer 192.168.2.2; wg setconf wg0 /etc/wireguard/wg0.conf; wg show wg0"]
runtime:
interfaces:
- name: wg0
add: wireguard
createInRoot: true
bindNS:
net: /run/netns/wg
services:
- name: nginx
image: nginx:alpine
net: /run/netns/wg
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
```
## `devices`
To access the console, it's necessary to explicitly add a "device" definition, for example:
```
devices:
- path: "/dev/console"
type: c
major: 5
minor: 1
mode: 0666
```
See the [getty package](../pkg/getty/build.yml) for a more complete example
and see [runc](https://github.com/opencontainers/runc/commit/60e21ec26e15945259d4b1e790e8fd119ee86467) for context.
To grant access to all block devices use:
```
devices:
- path: all
type: b
```
See the [format package](../pkg/format/build.yml) for an example.
### Mount Options
When mounting filesystem paths into a container - whether as part of `onboot` or `services` - there are several options of which you need to be aware. Using them properly is necessary for your containers to function properly.
For most containers - e.g. nginx or even docker - these options are not needed. Simply doing the following will work fine:
```yml
binds:
- /var:/some/var/path
```
Please note that `binds` doesn't **add** the mount points, but **replaces** them.
You can examine the `Dockerfile` of the component (in particular, `binds` value of
`org.mobyproject.config` label) to get the list of the existing binds.
However, in some circumstances you will need additional options. These options are used primarily if you intend to make changes to mount points _from within your container_ that should be visible from outside the container, e.g., if you intend to mount an external disk from inside the container but have it be visible outside.
In order for new mounts from within a container to be propagated, you must set the following on the container:
1. `rootfsPropagation: shared`
2. The mount point into the container below which new mounts are to occur must be `rshared,rbind`. In practice, this is `/var` (or some subdir of `/var`), since that is the only true read-write area of the filesystem where you will mount things.
Thus, if you have a regular container that is only reading and writing, go ahead and do:
```yml
binds:
- /var:/some/var/path
```
On the other hand, if you have a container that will make new mounts that you wish to be visible outside the container, do:
```yml
binds:
- /var:/var:rshared,rbind
rootfsPropagation: shared
```
## Templates
The `yaml` file supports templates for the names of images. Anyplace an image is used in a file and begins
with the character `@`, it indicates that it is not an actual name, but a template. The first word after
the `@` indicates the type of template, and the rest of the line is the argument to the template. The
templates currently supported are:
* `@pkg:` - the argument is the path to a linuxkit package. For example, `@pkg:./pkg/init`.
For `pkg`, linuxkit will resolve the path to the package, and then run the equivalent of `linuxkit pkg show-tag <dir>`.
For example:
```yaml
init:
- "@pkg:../pkg/init"
```
Will cause linuxkit to resolve `../pkg/init` to a package, and then run `linuxkit pkg show-tag ../pkg/init`.
The paths are relative to the directory of the yaml file.
You can specify absolute paths, although it is not recommended, as that can make the yaml file less portable.
The `@pkg:` templating is supported **only** when the yaml file is being read from a local filesystem. It does not
support when using via stdin, e.g. `cat linuxkit.yml | linuxkit build -`, or URLs, e.g. `linuxkit build https://example.com/foo.yml`.
The `@pkg:` template currently supports only default `linuxkit pkg` options, i.e. `build.yml` and `tag` options. There
are no command-line options to override them.
**Note:** The character `@` is reserved in yaml. To use it in the beginning of a string, you must put the entire string in
quotes.
If you use the template, the actual derived value, and not the initial template, is what will be stored in the final
image when adding it via:
```yaml
files:
- path: etc/linuxkit.yml
metadata: yaml
```

26
examples/addbinds.yml Normal file
View File

@@ -0,0 +1,26 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0 console=ttysclp0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
binds.add:
# this will keep all of the existing ones as well
- /var/tmp:/var/tmp
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
files:
- path: etc/getty.shadow
# sample sets password for root to "abcdefgh" (without quotes)
contents: 'root:$6$6tPd2uhHrecCEKug$8mKfcgfwguP7f.BLdZsT1Wz7WIIJOBY1oUFHzIv9/O71M2J0EPdtFqFGTxB1UK5ejqQxRFQ.ZSG9YXR0SNsc11:17322:0:::::'

View File

@@ -1,37 +0,0 @@
kernel:
image: linuxkit/kernel:4.14.40
cmdline: "console=ttyS0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:v0.4
services:
- name: rngd
image: linuxkit/rngd:v0.4
- name: sshd
image: linuxkit/sshd:v0.4
binds:
- /run/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf
trust:
org:
- linuxkit
- library

View File

@@ -1,26 +0,0 @@
kernel:
image: linuxkit/kernel:4.14.40
cmdline: "console=ttyS0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
services:
- name: rngd
image: linuxkit/rngd:v0.4
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
- name: sshd
image: linuxkit/sshd:v0.4
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub
mode: "0600"
optional: true
trust:
org:
- linuxkit

View File

@@ -1,37 +1,37 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0 console=ttysclp0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: sysfs
image: linuxkit/sysfs:v0.4
image: linuxkit/sysfs:ec174e06ca756f492e7a3fd6200d5c1672b97511
- name: format
image: linuxkit/format:v0.4
image: linuxkit/format:e040f4f045f03138a1ee8a22bb6feae7fd5596a6
- name: mount
image: linuxkit/mount:v0.4
image: linuxkit/mount:19ff89c251a4156bda8ed11c95faad2f40eb770e
command: ["/usr/bin/mountie", "/var/lib/docker"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: ntpd
image: linuxkit/openntpd:v0.4
image: linuxkit/openntpd:c90c6dd90f5dfb0ca71a73aac2dad69c8d956af3
- name: docker
image: docker:17.10.0-ce-dind
image: docker:20.10.6-dind
capabilities:
- all
net: host
@@ -46,14 +46,10 @@ services:
- /etc/docker/daemon.json:/etc/docker/daemon.json
command: ["/usr/local/bin/docker-init", "/usr/local/bin/dockerd"]
- name: cadvisor
image: linuxkit/cadvisor:v0.4
image: linuxkit/cadvisor:c57efffad1139b2c5df1c3f66c1e3d586ce9e07d
files:
- path: var/lib/docker
directory: true
- path: etc/docker/daemon.json
contents: '{"debug": true, "hosts": ["unix:///var/run/docker.sock"]}'
mode: "0644"
trust:
org:
- linuxkit
- library

View File

@@ -0,0 +1,4 @@
cliopts="--log-level trace"
stderr="/var/log/containerd.err.log"
stdout="/var/log/containerd.out.log"

View File

@@ -0,0 +1,42 @@
# example with volumes, both blank and populated
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
onshutdown:
- name: shutdown
image: busybox:latest
command: ["/bin/echo", "so long and thanks for all the fish"]
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:cdb919e4aee49fed0bf6075f0a104037cba83c39
- name: nginx
image: nginx:1.19.5-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf
files:
- path: etc/linuxkit-config
metadata: yaml
- path: /etc/containerd/runtime-config.toml
source: "containerd-debug-runtime-config.toml" # must include the file runtime-config.toml in this directory
mode: "0644"

View File

@@ -0,0 +1,46 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: format
image: linuxkit/format:e040f4f045f03138a1ee8a22bb6feae7fd5596a6
command: ["/usr/bin/format", "/dev/sda"]
- name: mount
image: linuxkit/mount:19ff89c251a4156bda8ed11c95faad2f40eb770e
command: ["/usr/bin/mountie", "/dev/sda1", "/var/external"]
- name: loop
image: linuxkit/losetup:65e3ad6336a321749394f58c3f28003cfce1e28c
command: ["/usr/bin/loopy", "--create", "/var/external/storage_file"]
- name: dm-crypt
image: linuxkit/dm-crypt:d49723bc9d10c5ada9e03b0670f4e57416d5d084
command: ["/usr/bin/crypto", "crypt_loop_dev", "/dev/loop0"]
- name: mount
image: linuxkit/mount:19ff89c251a4156bda8ed11c95faad2f40eb770e
command: ["/usr/bin/mountie", "/dev/mapper/crypt_loop_dev", "/var/secure_storage"]
- name: bbox
image: busybox
command: ["sh", "-c", "echo 'secret things' >/var/secure_storage/secrets"]
binds:
- /var:/var
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
files:
- path: etc/dm-crypt/key
# the below key is just to keep the example self-contained
# !!! provide a proper key for production use here !!!
contents: "abcdefghijklmnopqrstuvwxyz123456"

40
examples/dm-crypt.yml Normal file
View File

@@ -0,0 +1,40 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: format
image: linuxkit/format:e040f4f045f03138a1ee8a22bb6feae7fd5596a6
command: ["/usr/bin/format", "/dev/sda"]
- name: dm-crypt
image: linuxkit/dm-crypt:d49723bc9d10c5ada9e03b0670f4e57416d5d084
command: ["/usr/bin/crypto", "crypt_dev", "/dev/sda1"]
- name: mount
image: linuxkit/mount:19ff89c251a4156bda8ed11c95faad2f40eb770e
command: ["/usr/bin/mountie", "/dev/mapper/crypt_dev", "/var/secure_storage"]
- name: bbox
image: busybox
command: ["sh", "-c", "echo 'secret things' >/var/secure_storage/secrets"]
binds:
- /var:/var
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
files:
- path: etc/dm-crypt/key
# the below key is just to keep the example self-contained
# !!! provide a proper key for production use here !!!
contents: "abcdefghijklmnopqrstuvwxyz123456"

View File

@@ -10,13 +10,13 @@ moment is to install a recent version of Docker for Mac.
To build it with the latest Docker CE:
```
$ linuxkit build docker-for-mac.yml
$ linuxkit build -format iso-efi docker-for-mac.yml
```
To run the VM with a 4G disk:
```
linuxkit run hyperkit -networking=vpnkit -vsock-ports=2376 -disk size=4096M -data-file ./metadata.json docker-for-mac
linuxkit run hyperkit --networking=vpnkit --vsock-ports=2376 --disk size=4096M --data-file ./metadata.json --iso --uefi docker-for-mac-efi
```
Where the file `./metadata.json` should contain the desired docker daemon
@@ -35,10 +35,10 @@ configuration, for example:
```
In another terminal you should now be able to access docker via the
socket `guest.00000947` in the state directory
(`docker-for-mac-state/` by default):
socket `guest.00000948` in the state directory
(`docker-for-mac-efi-state/` by default):
```
$ docker -H unix://docker-for-mac-state/guest.00000948 ps
$ docker -H unix://docker-for-mac-efi-state/guest.00000948 ps
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
```

View File

@@ -1,36 +1,36 @@
# This is an example for building the open source components of Docker for Mac
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=ttyS0 page_poison=1"
init:
- linuxkit/vpnkit-expose-port:v0.4 # install vpnkit-expose-port and vpnkit-iptables-wrapper on host
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/vpnkit-expose-port:77e45e4681c78d59f1d8a48818260948d55f9d05 # install vpnkit-expose-port and vpnkit-iptables-wrapper on host
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
# support metadata for optional config in /run/config
- name: metadata
image: linuxkit/metadata:v0.4
image: linuxkit/metadata:b082f1bf97a9034d1e4c0e36a5d2923f4e58f540
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: sysfs
image: linuxkit/sysfs:v0.4
image: linuxkit/sysfs:ec174e06ca756f492e7a3fd6200d5c1672b97511
- name: binfmt
image: linuxkit/binfmt:v0.4
image: linuxkit/binfmt:68604c81876812ca1c9e2d9f098c28f463713e61
# Format and mount the disk image in /var/lib/docker
- name: format
image: linuxkit/format:v0.4
image: linuxkit/format:e040f4f045f03138a1ee8a22bb6feae7fd5596a6
- name: mount
image: linuxkit/mount:v0.4
image: linuxkit/mount:19ff89c251a4156bda8ed11c95faad2f40eb770e
command: ["/usr/bin/mountie", "/var/lib"]
# make a swap file on the mounted disk
- name: swap
image: linuxkit/swap:v0.4
image: linuxkit/swap:c57f3319ce770515357f0058035e40519c22b752
command: ["/swap.sh", "--path", "/var/lib/swap", "--size", "1024M"]
# mount-vpnkit mounts the 9p share used by vpnkit to coordinate port forwarding
- name: mount-vpnkit
image: alpine:3.7
image: alpine:3.13
binds:
- /var/:/host_var:rbind,rshared
capabilities:
@@ -39,51 +39,51 @@ onboot:
command: ["sh", "-c", "mkdir -p /host_var/vpnkit/port && mount -v -t 9p -o trans=virtio,dfltuid=1001,dfltgid=50,version=9p2000 port /host_var/vpnkit"]
# move logs to the mounted disk (this is a temporary fix until we can limit the log sizes)
- name: move-logs
image: alpine:3.7
image: alpine:3.13
binds:
- /var:/host_var
command: ["sh", "-c", "mv -v /host_var/log /host_var/lib && ln -vs /var/lib/log /host_var/log"]
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
# Enable acpi to shutdown on power events
- name: acpid
image: linuxkit/acpid:v0.4
image: linuxkit/acpid:3b1560c81d3884e049ebbd9d9bf94ccb394e6cd3
# Enable getty for easier debugging
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
# Run ntpd to keep time synchronised in the VM
- name: ntpd
image: linuxkit/openntpd:v0.4
image: linuxkit/openntpd:c90c6dd90f5dfb0ca71a73aac2dad69c8d956af3
# VSOCK to unix domain socket forwarding. Forwards guest /var/run/docker.sock
# to a socket on the host.
- name: vsudd
image: linuxkit/vsudd:v0.4
image: linuxkit/vsudd:b4d80d243733f80906cdbcf77f367a7b5744dc09
binds:
- /var/run:/var/run
command: ["/vsudd", "-inport", "2376:unix:/var/run/docker.sock"]
# vpnkit-forwarder forwards network traffic to/from the host via VSOCK port 62373.
# It needs access to the vpnkit 9P coordination share
- name: vpnkit-forwarder
image: linuxkit/vpnkit-forwarder:v0.4
image: linuxkit/vpnkit-forwarder:a89ec807d7d675dccd53773c07382bc707db3396
binds:
- /var/vpnkit:/port
net: host
command: ["/vpnkit-forwarder", "-vsockPort", "62373"]
# Monitor for image deletes and invoke a TRIM on the container filesystem
- name: trim-after-delete
image: linuxkit/trim-after-delete:v0.4
image: linuxkit/trim-after-delete:6ba98bfb111a808b7a1ca890aca9fc2b3709fca2
# When the host resumes from sleep, force a clock resync
- name: host-timesync-daemon
image: linuxkit/host-timesync-daemon:v0.4
image: linuxkit/host-timesync-daemon:0d351aee24b5cf853927647e4f5e6998014959db
# Run dockerd with the vpnkit userland proxy from the vpnkit-forwarder container.
# Bind mounts /var/run to allow vsudd to connect to docker.sock, /var/vpnkit
# for vpnkit coordination and /run/config/docker for the configuration file.
- name: docker-dfm
image: docker:17.07.0-ce-dind
image: docker:20.10.6-dind
capabilities:
- all
net: host
@@ -106,8 +106,3 @@ services:
"--storage-driver", "overlay2" ]
runtime:
mkdir: ["/var/lib/docker"]
trust:
org:
- linuxkit
- library

View File

@@ -1,34 +1,34 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0 console=ttysclp0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: sysfs
image: linuxkit/sysfs:v0.4
image: linuxkit/sysfs:ec174e06ca756f492e7a3fd6200d5c1672b97511
- name: format
image: linuxkit/format:v0.4
image: linuxkit/format:e040f4f045f03138a1ee8a22bb6feae7fd5596a6
- name: mount
image: linuxkit/mount:v0.4
image: linuxkit/mount:19ff89c251a4156bda8ed11c95faad2f40eb770e
command: ["/usr/bin/mountie", "/var/lib/docker"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
- name: ntpd
image: linuxkit/openntpd:v0.4
image: linuxkit/openntpd:c90c6dd90f5dfb0ca71a73aac2dad69c8d956af3
- name: docker
image: docker:17.09.0-ce-dind
image: docker:20.10.6-dind
capabilities:
- all
net: host
@@ -46,7 +46,3 @@ files:
directory: true
- path: etc/docker/daemon.json
contents: '{"debug": true}'
trust:
org:
- linuxkit
- library

View File

@@ -1,41 +0,0 @@
kernel:
image: linuxkit/kernel:4.14.40
cmdline: "console=ttyS0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:v0.4
services:
- name: getty
image: linuxkit/getty:v0.4
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
- name: sshd
image: linuxkit/sshd:v0.4
binds:
- /run/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf
trust:
org:
- linuxkit
- library

View File

@@ -1,29 +1,26 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0 console=ttysclp0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
# to make insecure with passwordless root login, uncomment following lines
#env:
# - INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
files:
- path: etc/getty.shadow
# sample sets password for root to "abcdefgh" (without quotes)
contents: 'root:$6$6tPd2uhHrecCEKug$8mKfcgfwguP7f.BLdZsT1Wz7WIIJOBY1oUFHzIv9/O71M2J0EPdtFqFGTxB1UK5ejqQxRFQ.ZSG9YXR0SNsc11:17322:0:::::'
trust:
org:
- linuxkit

View File

@@ -1,16 +1,16 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0 console=ttysclp0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
onshutdown:
- name: shutdown
@@ -18,7 +18,7 @@ onshutdown:
command: ["/bin/echo", "so long and thanks for all the fish"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
runtime:
@@ -30,7 +30,7 @@ services:
destination: writeable-host-etc
options: ["rw", "lowerdir=/etc", "upperdir=/run/hostetc/upper", "workdir=/run/hostetc/work"]
- name: rngd
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
@@ -41,7 +41,3 @@ services:
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf
trust:
org:
- linuxkit
- library

View File

@@ -1,48 +1,44 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: influxdb
image: influxdb:1.4
image: influxdb:1.7
net: host
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_DAC_OVERRIDE
- name: kapacitor
image: kapacitor:1.4
image: kapacitor:1.5
net: host
capabilities:
- all
env:
- KAPACITOR_INFLUXDB_0_URLS_0=http://influxdb:8086
- name: telegraf
image: telegraf:1.4
image: telegraf:1.9
net: host
capabilities:
- all
- name: chronograf
image: chronograf:1.4
image: chronograf:1.7
net: host
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_DAC_OVERRIDE
env:
- INFLUXDB_URL=http://localhost:8086
- KAPACITOR_URL=http://localhost:9092
trust:
org:
- linuxkit
- library
- INFLUXDB_URL=http://127.0.0.1:8086
- KAPACITOR_URL=http://127.0.0.1:9092

30
examples/logging.yml Normal file
View File

@@ -0,0 +1,30 @@
# Simple example of using an external logging service
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
- linuxkit/memlogd:cb79fd19e6485cfc61b85c607ca172cd860554c5
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
# Inside the getty type `/proc/1/root/usr/bin/logread -F` to follow the log
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
# A service which generates log messages for testing
- name: write-to-the-logs
image: alpine:3.13
command: ["/bin/sh", "-c", "while /bin/true; do echo hello $(date); sleep 1; done" ]
- name: write-and-rotate-logs
image: linuxkit/logwrite:c1c66d246080a40658903916d650206f2dcd707a
- name: kmsg
image: linuxkit/kmsg:423844f262467e1199480dc93d69e38610c78133

View File

@@ -1,19 +1,16 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
onboot:
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
trust:
org:
- linuxkit

View File

@@ -1,21 +1,18 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
- name: node_exporter
image: linuxkit/node_exporter:v0.4
trust:
org:
- linuxkit
image: linuxkit/node_exporter:9bcd8479b7ba2844773ef4f01a60c901c4800982

View File

@@ -1,26 +1,26 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=ttyS0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:v0.4
image: linuxkit/metadata:b082f1bf97a9034d1e4c0e36a5d2923f4e58f540
command: ["/usr/bin/metadata", "openstack"]
services:
- name: rngd
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: sshd
image: linuxkit/sshd:v0.4
binds:
image: linuxkit/sshd:75f399fbfb6455dfccd4cb30543d0b4b494d28c8
binds.add:
- /run/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx
image: nginx:1.13.8-alpine
@@ -32,7 +32,3 @@ services:
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf
trust:
org:
- linuxkit
- library

View File

@@ -1,14 +0,0 @@
# This YAML snippet is to be used in conjunction with packet.yml to
# build a arm64 image for packet.net. It adds a modprobe of the NIC
# driver and overrides the kernel section to disable prepending the
# Intel CPU microcode to the initrd. If writing a YAML specifically
# for arm64 then the 'ucode' line in the kernel section can be left
# out.
kernel:
image: linuxkit/kernel:4.14.40
cmdline: "console=ttyAMA0"
ucode: ""
onboot:
- name: modprobe
image: linuxkit/modprobe:v0.4
command: ["modprobe", "nicvf"]

View File

@@ -1,39 +0,0 @@
kernel:
image: linuxkit/kernel:4.14.40
cmdline: console=ttyS1
ucode: intel-ucode.cpio
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/firmware:v0.4
onboot:
- name: rngd1
image: linuxkit/rngd:v0.4
command: ["/sbin/rngd", "-1"]
- name: sysctl
image: linuxkit/sysctl:v0.4
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:v0.4
command: ["/usr/bin/metadata", "packet"]
services:
- name: rngd
image: linuxkit/rngd:v0.4
- name: getty
image: linuxkit/getty:v0.4
env:
- INSECURE=true
- name: sshd
image: linuxkit/sshd:v0.4
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub
mode: "0600"
optional: true
trust:
org:
- linuxkit

36
examples/platform-aws.yml Normal file
View File

@@ -0,0 +1,36 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=ttyS0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:b082f1bf97a9034d1e4c0e36a5d2923f4e58f540
services:
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: dhcpcd2
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf"]
- name: sshd
image: linuxkit/sshd:75f399fbfb6455dfccd4cb30543d0b4b494d28c8
binds.add:
- /run/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf

View File

@@ -0,0 +1,25 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=ttyS0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
services:
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
- name: sshd
image: linuxkit/sshd:75f399fbfb6455dfccd4cb30543d0b4b494d28c8
binds.add:
- /root/.ssh:/root/.ssh
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub
mode: "0600"
optional: true

View File

@@ -0,0 +1,14 @@
# This YAML snippet is to be used in conjunction with equinixmetal.yml to
# build a arm64 image for Equinix Metal. It adds a modprobe of the NIC
# driver and overrides the kernel section to disable prepending the
# Intel CPU microcode to the initrd. If writing a YAML specifically
# for arm64 then the 'ucode' line in the kernel section can be left
# out.
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=ttyAMA0"
ucode: ""
onboot:
- name: modprobe
image: linuxkit/modprobe:ab5ac4d5e7e7a5f2d103764850f7846b69230676
command: ["modprobe", "nicvf"]

View File

@@ -0,0 +1,38 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: console=ttyS1
ucode: intel-ucode.cpio
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
- linuxkit/firmware:8def159583422181ddee3704f7024ecb9c02d348
onboot:
- name: rngd1
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
command: ["/sbin/rngd", "-1"]
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:b082f1bf97a9034d1e4c0e36a5d2923f4e58f540
command: ["/usr/bin/metadata", "equinixmetal"]
services:
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: sshd
image: linuxkit/sshd:75f399fbfb6455dfccd4cb30543d0b4b494d28c8
binds.add:
- /root/.ssh:/root/.ssh
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub
mode: "0600"
optional: true

37
examples/platform-gcp.yml Normal file
View File

@@ -0,0 +1,37 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=ttyS0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:b082f1bf97a9034d1e4c0e36a5d2923f4e58f540
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: sshd
image: linuxkit/sshd:75f399fbfb6455dfccd4cb30543d0b4b494d28c8
binds.add:
- /run/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf

View File

@@ -0,0 +1,38 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: console=ttyS1
ucode: intel-ucode.cpio
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
- linuxkit/firmware:8def159583422181ddee3704f7024ecb9c02d348
onboot:
- name: rngd1
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
command: ["/sbin/rngd", "-1"]
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:b082f1bf97a9034d1e4c0e36a5d2923f4e58f540
command: ["/usr/bin/metadata", "hetzner"]
services:
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: sshd
image: linuxkit/sshd:75f399fbfb6455dfccd4cb30543d0b4b494d28c8
binds.add:
- /root/.ssh:/root/.ssh
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub
mode: "0600"
optional: true

View File

@@ -0,0 +1,32 @@
kernel:
image: linuxkit/kernel:6.6.13-rt
cmdline: "console=tty0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
- name: open-vm-tools
image: linuxkit/open-vm-tools:728ddf726474178eea97604c0baeabd52edab7e9
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf

View File

@@ -0,0 +1,26 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0 console=ttysclp0 root=/dev/vda"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: rngd1
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
command: ["/sbin/rngd", "-1"]
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:b082f1bf97a9034d1e4c0e36a5d2923f4e58f540
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd

View File

@@ -0,0 +1,30 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf

View File

@@ -0,0 +1,38 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=ttyS0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:b082f1bf97a9034d1e4c0e36a5d2923f4e58f540
command: ["/usr/bin/metadata", "vultr"]
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: sshd
image: linuxkit/sshd:75f399fbfb6455dfccd4cb30543d0b4b494d28c8
binds.add:
- /run/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf

View File

@@ -1,19 +1,19 @@
# Minimal YAML to run a redis server (used at DockerCon'17)
# connect: nc localhost 6379
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0 console=ttysclp0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
onboot:
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
# Currently redis:4.0.6-alpine has trust issue with multi-arch
@@ -27,7 +27,3 @@ services:
- CAP_SETGID
- CAP_DAC_OVERRIDE
net: host
trust:
org:
- linuxkit
- library

View File

@@ -1,36 +0,0 @@
kernel:
image: linuxkit/kernel:4.14.34-rt
cmdline: "console=tty0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
services:
- name: getty
image: linuxkit/getty:v0.4
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
- name: open-vm-tools
image: linuxkit/open-vm-tools:v0.4
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf
trust:
org:
- linuxkit
- library

View File

@@ -1,33 +1,32 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0 console=ttysclp0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: rngd1
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
command: ["/sbin/rngd", "-1"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
- name: sshd
image: linuxkit/sshd:v0.4
image: linuxkit/sshd:75f399fbfb6455dfccd4cb30543d0b4b494d28c8
binds.add:
- /root/.ssh:/root/.ssh
files:
- path: root/.ssh/authorized_keys
source: ~/.ssh/id_rsa.pub
mode: "0600"
optional: true
trust:
org:
- linuxkit

29
examples/static-ip.yml Normal file
View File

@@ -0,0 +1,29 @@
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
onboot:
- name: ip
image: linuxkit/ip:bb250017b05de5e16ac436b1eb19a39c87b5a252
binds:
- /etc/ip:/etc/ip
command: ["ip", "-b", "/etc/ip/eth0.conf"]
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
files:
- path: etc/ip/eth0.conf
contents: |
address add 10.10.1.225/24 dev eth0
link set eth0 up
route add default via 10.10.1.100 dev eth0
- path: etc/resolv.conf
contents: |
# domain test.local
nameserver 10.10.1.101
nameserver 10.10.1.100

View File

@@ -1,35 +1,31 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0 console=ttysclp0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: format
image: linuxkit/format:v0.4
image: linuxkit/format:e040f4f045f03138a1ee8a22bb6feae7fd5596a6
- name: mount
image: linuxkit/mount:v0.4
image: linuxkit/mount:19ff89c251a4156bda8ed11c95faad2f40eb770e
command: ["/usr/bin/mountie", "/var/external"]
- name: swap
image: linuxkit/swap:v0.4
image: linuxkit/swap:c57f3319ce770515357f0058035e40519c22b752
# to use unencrypted swap, use:
# command: ["/swap.sh", "--path", "/var/external/swap", "--size", "1G"]
command: ["/swap.sh", "--path", "/var/external/swap", "--size", "1G", "--encrypt"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
trust:
org:
- linuxkit
- library
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd

View File

@@ -1,30 +1,27 @@
kernel:
image: linuxkit/kernel:4.9.38
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: tss
image: linuxkit/tss:v0.4
image: linuxkit/tss:856286012a613598d6ef6869b196f9a72245b7d2
- name: rngd
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
files:
- path: etc/getty.shadow
# sample sets password for root to "abcdefgh" (without quotes)
contents: 'root:$6$6tPd2uhHrecCEKug$8mKfcgfwguP7f.BLdZsT1Wz7WIIJOBY1oUFHzIv9/O71M2J0EPdtFqFGTxB1UK5ejqQxRFQ.ZSG9YXR0SNsc11:17322:0:::::'
trust:
org:
- linuxkit

View File

@@ -1,34 +0,0 @@
kernel:
image: linuxkit/kernel:4.14.40
cmdline: "console=tty0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
services:
- name: getty
image: linuxkit/getty:v0.4
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf
trust:
org:
- linuxkit
- library

45
examples/volumes.yml Normal file
View File

@@ -0,0 +1,45 @@
# example with volumes, both blank and populated
kernel:
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0"
init:
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
onshutdown:
- name: shutdown
image: busybox:latest
command: ["/bin/echo", "so long and thanks for all the fish"]
services:
- name: getty
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:cdb919e4aee49fed0bf6075f0a104037cba83c39
- name: nginx
image: nginx:1.19.5-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf
- blank:/blank
- alpine:/alpine
volumes:
- name: blank # blank volume
- name: alpine # populated volume
image: alpine:3.19
files:
- path: etc/linuxkit-config
metadata: yaml

View File

@@ -1,16 +1,16 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=ttyS0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
onboot:
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: mount-vpnkit
image: alpine:3.7
image: alpine:3.13
binds:
- /var/:/host_var:rbind,rshared
capabilities:
@@ -19,9 +19,11 @@ onboot:
command: ["sh", "-c", "mkdir /host_var/vpnkit && mount -v -t 9p -o trans=virtio,dfltuid=1001,dfltgid=50,version=9p2000 port /host_var/vpnkit"]
services:
- name: sshd
image: linuxkit/sshd:v0.4
image: linuxkit/sshd:75f399fbfb6455dfccd4cb30543d0b4b494d28c8
binds.add:
- /root/.ssh:/root/.ssh
- name: vpnkit-forwarder
image: linuxkit/vpnkit-forwarder:v0.4
image: linuxkit/vpnkit-forwarder:a89ec807d7d675dccd53773c07382bc707db3396
binds:
- /var/vpnkit:/port
net: host
@@ -32,7 +34,3 @@ files:
source: ~/.ssh/id_rsa.pub
mode: "0600"
optional: true
trust:
org:
- linuxkit

View File

@@ -1,22 +1,18 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=ttyS0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
onboot:
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
services:
- name: vsudd
image: linuxkit/vsudd:v0.4
image: linuxkit/vsudd:b4d80d243733f80906cdbcf77f367a7b5744dc09
binds:
- /run/containerd/containerd.sock:/run/containerd/containerd.sock
command: ["/vsudd",
"-inport", "2374:unix:/run/containerd/containerd.sock"]
trust:
org:
- linuxkit

View File

@@ -1,41 +0,0 @@
kernel:
image: linuxkit/kernel:4.14.40
cmdline: "console=ttyS0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: metadata
image: linuxkit/metadata:v0.4
services:
- name: getty
image: linuxkit/getty:v0.4
env:
- INSECURE=true
- name: rngd
image: linuxkit/rngd:v0.4
- name: sshd
image: linuxkit/sshd:v0.4
binds:
- /run/config/ssh/authorized_keys:/root/.ssh/authorized_keys
- name: nginx
image: nginx:1.13.8-alpine
capabilities:
- CAP_NET_BIND_SERVICE
- CAP_CHOWN
- CAP_SETUID
- CAP_SETGID
- CAP_DAC_OVERRIDE
binds:
- /etc/resolv.conf:/etc/resolv.conf
trust:
org:
- linuxkit
- library

View File

@@ -1,19 +1,19 @@
kernel:
image: linuxkit/kernel:4.14.40
image: linuxkit/kernel:6.6.13
cmdline: "console=tty0 console=ttyS0 console=ttyAMA0"
init:
- linuxkit/init:v0.4
- linuxkit/runc:v0.4
- linuxkit/containerd:v0.4
- linuxkit/ca-certificates:v0.4
- linuxkit/init:e120ea2a30d906bd1ee1874973d6e4b1403b5ca3
- linuxkit/runc:6062483d748609d505f2bcde4e52ee64a3329f5f
- linuxkit/containerd:39301e7312f13eedf19bd5d5551af7b37001d435
- linuxkit/ca-certificates:5aaa343474e5ac3ac01f8b917e82efb1063d80ff
onboot:
- name: sysctl
image: linuxkit/sysctl:v0.4
image: linuxkit/sysctl:5a374e4bf3e5a7deeacff6571d0f30f7ea8f56db
- name: dhcpcd
image: linuxkit/dhcpcd:v0.4
image: linuxkit/dhcpcd:e9e3580f2de00e73e7b316a007186d22fea056ee
command: ["/sbin/dhcpcd", "--nobackground", "-f", "/dhcpcd.conf", "-1"]
- name: wg0
image: linuxkit/ip:v0.4
image: linuxkit/ip:bb250017b05de5e16ac436b1eb19a39c87b5a252
net: new
binds:
- /etc/wireguard:/etc/wireguard
@@ -26,7 +26,7 @@ onboot:
bindNS:
net: /run/netns/wg0
- name: wg1
image: linuxkit/ip:v0.4
image: linuxkit/ip:bb250017b05de5e16ac436b1eb19a39c87b5a252
net: new
binds:
- /etc/wireguard:/etc/wireguard
@@ -40,12 +40,12 @@ onboot:
net: /run/netns/wg1
services:
- name: getty
image: linuxkit/getty:v0.4
image: linuxkit/getty:5d86a2ce2d890c14ab66b13638dcadf74f29218b
env:
- INSECURE=true
net: /run/netns/wg1
- name: rngd
image: linuxkit/rngd:v0.4
image: linuxkit/rngd:83a6481f04da73e710c1d416355920b8ff4dc1dd
- name: nginx
image: nginx:1.13.8-alpine
net: /run/netns/wg0
@@ -77,7 +77,3 @@ files:
PublicKey = AcS5t3PC5nL/oj0sYhc3yFpDlRaXoJ0mfEq6iq0rFF4=
AllowedIPs = 0.0.0.0/0
Endpoint = 127.0.0.1:51820
trust:
org:
- linuxkit
- library

5180
kernel/5.10.x/config-aarch64 Normal file

File diff suppressed because it is too large Load Diff

4796
kernel/5.10.x/config-x86_64 Normal file

File diff suppressed because it is too large Load Diff

0
kernel/5.10.x/deprecated Normal file
View File

View File

@@ -0,0 +1,55 @@
From 3635a8090f2271103511b68a5853b1d7e0a925b5 Mon Sep 17 00:00:00 2001
From: Matt Redfearn <matt.redfearn@mips.com>
Date: Wed, 3 Jan 2018 09:57:30 +0000
Subject: [PATCH] include/uapi/linux/swab: Fix potentially missing
__always_inline
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Commit bc27fb68aaad ("include/uapi/linux/byteorder, swab: force inlining
of some byteswap operations") added __always_inline to swab functions
and commit 283d75737837 ("uapi/linux/stddef.h: Provide __always_inline to
userspace headers") added a definition of __always_inline for use in
exported headers when the kernel's compiler.h is not available.
However, since swab.h does not include stddef.h, if the header soup does
not indirectly include it, the definition of __always_inline is missing,
resulting in a compilation failure, which was observed compiling the
perf tool using exported headers containing this commit:
In file included from /usr/include/linux/byteorder/little_endian.h:12:0,
from /usr/include/asm/byteorder.h:14,
from tools/include/uapi/linux/perf_event.h:20,
from perf.h:8,
from builtin-bench.c:18:
/usr/include/linux/swab.h:160:8: error: unknown type name __always_inline
static __always_inline __u16 __swab16p(const __u16 *p)
Fix this by replacing the inclusion of linux/compiler.h with
linux/stddef.h to ensure that we pick up that definition if required,
without relying on it's indirect inclusion. compiler.h is then included
indirectly, via stddef.h.
Fixes: 283d75737837 ("uapi/linux/stddef.h: Provide __always_inline to userspace headers")
Signed-off-by: Matt Redfearn <matt.redfearn@mips.com>
---
include/uapi/linux/swab.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/uapi/linux/swab.h b/include/uapi/linux/swab.h
index 7272f85d6d6a..3736f2fe1541 100644
--- a/include/uapi/linux/swab.h
+++ b/include/uapi/linux/swab.h
@@ -3,7 +3,7 @@
#define _UAPI_LINUX_SWAB_H
#include <linux/types.h>
-#include <linux/compiler.h>
+#include <linux/stddef.h>
#include <asm/bitsperlong.h>
#include <asm/swab.h>
--
2.26.2

Some files were not shown because too many files have changed in this diff Show More