1
0
mirror of https://github.com/phusion/baseimage-docker.git synced 2026-03-26 12:29:07 +00:00

Compare commits

...

57 Commits

Author SHA1 Message Date
Travis Rowland
5078b027ba Update Makefile
Increment version
2020-06-04 02:23:15 -07:00
Travis Rowland
c2265dfda8 Merge pull request #555 from samip5/upgrade-to-ubuntu-focal
Upgrade to Ubuntu Focal (20.04)
2020-06-04 02:12:24 -07:00
Travis Rowland
1a389f0456 Merge branch 'master' into upgrade-to-ubuntu-focal 2020-06-04 01:59:29 -07:00
Travis Rowland
453f835df0 MAINTAINER has been deprecated 2020-05-29 13:15:25 -07:00
Travis Rowland
e701f1a32b Cleaning up build process 2020-05-29 13:13:36 -07:00
Skyler Mäntysaari
a418256b45 Upgraded BASE_IMAGE to 20.04. 2020-05-03 19:00:15 +03:00
Travis Rowland
541c9a075f Merge pull request #553 from bestlong/patch-2
Fix Docker registry URL
2020-04-20 16:43:28 -07:00
Shao Yu-Lung (Allen)
1115e802ee Fix Docker registry URL 2020-04-16 09:53:08 +08:00
Travis Rowland
c87dcdf546 Merge pull request #535 from CodeCutterUK/multi-arch-build
Further improvements to the multi-arch build
2019-06-11 11:00:06 -07:00
Mark Ison
9c9ffde394 Ensure building multiarch works when the image name isn't overridden
Stop tagging latest by when running the make release step
2019-05-31 08:30:02 +01:00
Travis Rowland
b5c34e9776 Merge pull request #534 from CodeCutterUK/multi-arch-build
Multiarch implementation for amd64, arm64 and arm32
2019-05-29 18:47:29 -07:00
Mark Ison
e4ae9aac10 Multiarch implementation for amd64, arm64 and arm32 2019-05-22 16:27:12 +01:00
Travis Rowland
e97d8464b9 Merge pull request #530 from iaon/master
Touch cron files to fix 'NUMBER OF HARD LINKS > 1' issue.
2019-05-10 17:04:14 -07:00
Travis Rowland
0dc0303a03 Merge branch 'master' into master 2019-05-10 17:04:02 -07:00
Travis Rowland
fc6672b4bb Merge pull request #527 from scrapinghub/master
Ability to override ubuntu:18.04
2019-05-10 16:53:10 -07:00
Matyas Markovics
d616b3bafb fix for 'ttyname failed: Inappropriate ioctl for device' during make test 2019-04-17 10:08:26 +02:00
Matyas Markovics
89597c5bc5 Use tools/docker-ssh in make ssh and in test/runner.sh to connect to container via SSH, fix SSH connection by IP issue on Mac-OS 2019-04-08 09:49:13 +02:00
Matyas Markovics
36bd41108f Default to ubuntu BASE_IMAGE in Dockerfile, modify make to only add --build-arg to build target if BASE_IMAGE is defined, document the use of BASE_IMAGE in README 2019-04-08 09:45:37 +02:00
Ivan Onushkin
386b8284d8 Touch cron files to fix 'NUMBER OF HARD LINKS > 1' issue. 2019-04-05 20:57:00 +03:00
Matyas Markovics
6d6395c58f invoke make from travis 2019-03-13 11:34:47 +01:00
Matyas Markovics
4a3476b6a6 send tests over in ssh, instead of mounting them 2019-03-13 11:09:41 +01:00
Matyas Markovics
ad88ec9226 ssh by IP in test; verbose SSH into container 2019-03-13 10:37:56 +01:00
Matyas Markovics
17a737f47b remove interactive and TTY flags when Enabling SSH in test 2019-03-13 10:12:22 +01:00
Matyas Markovics
9d29b23db2 exclude mounts (e.g.: /proc) from cleanup 2019-03-13 09:59:33 +01:00
Matyas Markovics
089258a746 if both NAME and BASE_IMAGE are defined, don't append variant to baseimage 2019-03-13 01:00:13 +01:00
Matyas Markovics
4f65f0a270 build-arg to define base-image, fix locale for Debian 2019-03-12 23:28:58 +01:00
Travis Rowland
14394bcb3f Merge pull request #523 from pmav99/python_bytecode
Remove python bytecode
2019-01-14 06:57:56 -08:00
Travis Rowland
a9fdb8878d Merge pull request #522 from silke/master
Fixed wrong line breaks in syslog-ng's logrotate config
2019-01-14 06:57:10 -08:00
Panos Mavrogiorgos
d0b150c5ef Remove python bytecode 2019-01-04 08:18:58 +02:00
Silke Meyer
c18b511311 Fixed wrong line breaks in syslog-ng's logrotate config 2018-12-25 10:34:05 +01:00
Travis Rowland
60e2cdd375 Merge pull request #520 from kingdonb/issue-459
addressing the confusion in issue #459
2018-11-26 11:00:38 -08:00
Kingdon Barrett
31fce7a874 clarifications and corrections 2018-11-20 10:03:00 -05:00
Kingdon Barrett
55bb086681 addressing the confusion in issue #459 2018-11-20 08:19:28 -05:00
Travis Rowland
dd699da614 Merge pull request #519 from kingdonb/fix-timeout-docs
documentation for #510
2018-10-23 14:14:24 -07:00
Kingdon Barrett
1be96f1edf documentation for #510
closes #517
2018-10-21 11:43:38 -04:00
Travis Rowland
8be7395886 Merge pull request #510 from jarischaefer/increase-kill-timeout
increase default kill timeout from 5 to 30 seconds
2018-10-11 11:26:29 -07:00
Travis Rowland
a9ae3334ed Merge branch 'master' into increase-kill-timeout 2018-10-11 11:26:11 -07:00
Travis Rowland
3b511622e0 Merge pull request #511 from CWelshE/master
docs(README): Add more daemon info
2018-09-14 15:50:21 -07:00
Travis Rowland
fdc1008c17 Merge pull request #512 from PikachuEXE/doc/update-os-version
Point OS version in other section to overview
2018-09-14 15:47:18 -07:00
Floor Drees
ac37bcf2bd Update contact persons 2018-09-13 08:30:55 -04:00
Niels van der Zanden
0d22512947 Add consultancy, fix logo in README 2018-09-13 13:59:48 +02:00
PikachuEXE
4e78e19a34 Point OS version in other section to overview
[ci skip]
2018-09-13 10:23:45 +08:00
Travis Rowland
14d156ce73 Merge pull request #505 from awking/master
change version from 16.04 to 18.04
2018-09-12 01:19:07 -07:00
Cody Welsh
10c7bbf3b4 docs(README): Add more daemon info
Gives the "Adding Additional Daemons" section of the README some extra
information, including another warning not to use `-it <cmd>` when
starting a given container.
2018-09-03 21:31:55 -07:00
jari.schaefer
b41f997b6c increase default kill timeout from 5 to 30 seconds 2018-08-31 22:49:08 +02:00
Kingdon Barrett
c14fecb3b1 Merge branch 'master' into master 2018-08-24 17:49:09 -04:00
Travis Rowland
3e62736510 Merge pull request #507 from tgpfeiffer/fix/506-escalate-term
use `sv force-stop` instead of `sv down` to stop services
2018-08-23 22:18:31 -07:00
Tobias Pfeiffer
8b50080470 use sv force-stop instead of sv down to stop services 2018-08-24 12:00:51 +09:00
awking
dd336f2bf0 change version from 16.04 to 18.04 2018-08-21 11:44:55 +08:00
Travis Rowland
e8d48f3af4 Update Makefile 2018-08-16 00:01:31 -07:00
Travis Rowland
d37f7aff3f Merge pull request #488 from unilynx/ubuntu-1804
Ubuntu 18.04
2018-08-15 23:56:52 -07:00
Travis Rowland
f802be0dfe Merge branch 'master' into ubuntu-1804 2018-08-15 23:55:47 -07:00
Travis Rowland
5493db5179 Update Dockerfile 2018-08-15 23:54:56 -07:00
Travis Rowland
0c9eaf3c43 Merge branch 'master' into ubuntu-1804 2018-08-13 10:11:30 -07:00
Arnold Hendriks
d796c2e32c Add gpg-agent and dirmngr so 'apt-key' works out of the box again, just like it did on the 16.04 phusion image 2018-04-27 20:40:49 +02:00
Arnold Hendriks
f936902c23 Update syslog configuration (took the diff between stock 16.04 and phusion 16.04 to figure out what to apply to the stock 18.04 syslog conf) as it complains about old config format 2018-04-27 20:40:49 +02:00
Arnold Hendriks
43791943e5 Update the baseimage to use, see https://hub.docker.com/r/library/ubuntu/tags/
Taking the bionic tag because so far the 'latest' and 18.04 tags haven't been updated yet
2018-04-27 20:40:48 +02:00
22 changed files with 354 additions and 122 deletions

21
.circleci/config.yml Normal file
View File

@@ -0,0 +1,21 @@
version: 2
jobs:
build:
machine: true
steps:
- checkout
#- run:
# name : Getting docker
# command: curl https://get.docker.com | sh
- run:
name: Enabling qemu
command: docker run --rm --privileged multiarch/qemu-user-static:register --reset
- run:
name: Building arm based image.
command: docker build -t arm-test .
- run:
name: Listing built images
command: docker images
# - run:
# name: Running arm based image.
# command: docker run --rm arm-test

2
.gitignore vendored
View File

@@ -1,3 +1,5 @@
.DS_Store .DS_Store
.vagrant .vagrant
*.swp *.swp
*.tar.gz
*.log

View File

@@ -1,22 +1,50 @@
sudo: required sudo: required
language: c
services: services:
- docker - docker
addons:
apt:
packages:
- docker-ce
- qemu-user-static
env: env:
global: global:
- NAME=phusion/baseimage
# - VERSION=${TRAVIS_TAG} # - VERSION=${TRAVIS_TAG}
- VERSION=${TRAVIS_BRANCH} - VERSION=${TRAVIS_BRANCH}
- DOCKER_CLI_EXPERIMENTAL=enabled
- QEMU_VERSION=v4.0.0
matrix:
# PLATFORM = Base image architecture to be used
# QEMU_ARCH = qemu binary to be downloaded from https://github.com/multiarch/qemu-user-static/releases
# TAG_ARCH = Tag to be applied to the image when upload to DockerHub
- PLATFORM=amd64 QEMU_ARCH=amd64 TAG_ARCH=amd64
- PLATFORM=arm64 QEMU_ARCH=aarch64 TAG_ARCH=arm64
- PLATFORM=arm QEMU_ARCH=arm TAG_ARCH=arm
stage: Compile
before_script:
- echo '{"experimental":true}' | sudo tee /etc/docker/daemon.json
- sudo service docker restart
script: script:
- docker build -t ${NAME}:${VERSION} --rm image - make build test
- env NAME=${NAME} VERSION=${VERSION} ./test/runner.sh - if [[ $TRAVIS_PULL_REQUEST == 'false' ]]; then
docker login -u "${DOCKER_USERNAME}" -p "${DOCKER_PASSWORD}";
make release;
fi
after_success: jobs:
- docker login -u "${DOCKER_USERNAME}" -p "${DOCKER_PASSWORD}"; include:
docker push ${NAME}:${VERSION}; - stage: deploy
# - if [ "${TRAVIS_BRANCH}" == "master" ]; then env:
# docker tag ${NAME}:${VERSION} ${NAME}:latest - ARCHS="amd64 arm64 arm"
# docker push ${NAME}:latest; script:
# fi - echo $NAME:$VERSION_TAG
- echo "$DOCKER_PASSWORD" | docker login --username "$DOCKER_USERNAME" --password-stdin
- make build_multiarch

View File

@@ -38,7 +38,7 @@ Instances of abusive, harassing, or otherwise unacceptable behavior may be repor
[FloorD](https://github.com/floord) (she/her), floor@phusion.nl, English / Dutch / German [FloorD](https://github.com/floord) (she/her), floor@phusion.nl, English / Dutch / German
[OnixGH](https://github.com/OnixGH) (he/his), daniel@phusion.nl, English / Dutch [Scarhand](https://github.com/scarhand) (he/his), niels@phusion.nl, English / Dutch
The project team will review and investigate all complaints, and will respond in a way that it deems appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately. The project team will review and investigate all complaints, and will respond in a way that it deems appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.

View File

@@ -1,31 +1,53 @@
NAME = phusion/baseimage VERSION ?= focal-1.0.0-pre
VERSION = 0.10.2 ifdef BASE_IMAGE
BUILD_ARG = --build-arg BASE_IMAGE=$(BASE_IMAGE)
ifndef NAME
NAME = phusion/baseimage-$(subst :,-,${BASE_IMAGE})
endif
else
NAME ?= phusion/baseimage
endif
ifdef TAG_ARCH
# VERSION_ARG = $(VERSION)-$(subst /,-,$(subst :,-,${BASE_IMAGE}))-$(TAG_ARCH)
VERSION_ARG = $(VERSION)-$(TAG_ARCH)
LATEST_VERSION = latest-$(TAG_ARCH)
else
# VERSION_ARG = $(VERSION)-$(subst /,-,$(subst :,-,${BASE_IMAGE}))
VERSION_ARG = $(VERSION)
LATEST_VERSION = latest
endif
VERSION_ARG ?= $(VERSION)
.PHONY: all build test tag_latest release ssh .PHONY: all build test tag_latest release ssh
all: build all: build
build: build:
docker build -t $(NAME):$(VERSION) --rm image ./build.sh
docker build --no-cache -t $(NAME):$(VERSION_ARG) $(BUILD_ARG) --build-arg QEMU_ARCH=$(QEMU_ARCH) --platform $(PLATFORM) --rm image
build_multiarch:
env NAME=$(NAME) VERSION=$(VERSION_ARG) ./build-multiarch.sh
test: test:
env NAME=$(NAME) VERSION=$(VERSION) ./test/runner.sh env NAME=$(NAME) VERSION=$(VERSION_ARG) ./test/runner.sh
tag_latest: tag_latest:
docker tag $(NAME):$(VERSION) $(NAME):latest docker tag $(NAME):$(VERSION_ARG) $(NAME):$(LATEST_VERSION)
release: test tag_latest tag_multiarch_latest:
@if ! docker images $(NAME) | awk '{ print $$2 }' | grep -q -F $(VERSION); then echo "$(NAME) version $(VERSION) is not yet built. Please run 'make build'"; false; fi env NAME=$(NAME) VERSION=$(VERSION) TAG_LATEST=true ./build-multiarch.sh
release: test
@if ! docker images $(NAME) | awk '{ print $$2 }' | grep -q -F $(VERSION_ARG); then echo "$(NAME) version $(VERSION_ARG) is not yet built. Please run 'make build'"; false; fi
docker push $(NAME) docker push $(NAME)
@echo "*** Don't forget to create a tag by creating an official GitHub release." @echo "*** Don't forget to create a tag by creating an official GitHub release."
ssh: SSH_COMMAND?=
ssh: ssh:
chmod 600 image/services/sshd/keys/insecure_key ID=$$(docker ps | grep -F "$(NAME):$(VERSION_ARG)" | awk '{ print $$1 }') && \
@ID=$$(docker ps | grep -F "$(NAME):$(VERSION)" | awk '{ print $$1 }') && \
if test "$$ID" = ""; then echo "Container is not running."; exit 1; fi && \ if test "$$ID" = ""; then echo "Container is not running."; exit 1; fi && \
IP=$$(docker inspect $$ID | grep IPAddr | sed 's/.*: "//; s/".*//') && \ tools/docker-ssh $$ID ${SSH_COMMAND}
echo "SSHing into $$IP" && \
ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i image/services/sshd/keys/insecure_key root@$$IP
test_release: test_release:
echo test_release echo test_release

View File

@@ -13,7 +13,7 @@ Baseimage-docker is a special [Docker](https://www.docker.com) image that is con
You can use it as a base for your own Docker images. You can use it as a base for your own Docker images.
Baseimage-docker is available for pulling from [the Docker registry](https://registry.hub.docker.com/u/phusion/baseimage/)! Baseimage-docker is available for pulling from [the Docker registry](https://registry.hub.docker.com/r/phusion/baseimage/)!
### What are the problems with the stock Ubuntu base image? ### What are the problems with the stock Ubuntu base image?
@@ -87,7 +87,7 @@ You can configure the stock `ubuntu` image yourself from your Dockerfile, so why
| Component | Why is it included? / Remarks | | Component | Why is it included? / Remarks |
| ---------------- | ------------------- | | ---------------- | ------------------- |
| Ubuntu 16.04 LTS | The base system. | | Ubuntu 18.04 LTS | The base system. |
| A **correct** init process | _Main article: [Docker and the PID 1 zombie reaping problem](http://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/)._ <br><br>According to the Unix process model, [the init process](https://en.wikipedia.org/wiki/Init) -- PID 1 -- inherits all [orphaned child processes](https://en.wikipedia.org/wiki/Orphan_process) and must [reap them](https://en.wikipedia.org/wiki/Wait_(system_call)). Most Docker containers do not have an init process that does this correctly. As a result, their containers become filled with [zombie processes](https://en.wikipedia.org/wiki/Zombie_process) over time. <br><br>Furthermore, `docker stop` sends SIGTERM to the init process, which stops all services. Unfortunately most init systems don't do this correctly within Docker since they're built for hardware shutdowns instead. This causes processes to be hard killed with SIGKILL, which doesn't give them a chance to correctly deinitialize things. This can cause file corruption. <br><br>Baseimage-docker comes with an init process `/sbin/my_init` that performs both of these tasks correctly. | | A **correct** init process | _Main article: [Docker and the PID 1 zombie reaping problem](http://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/)._ <br><br>According to the Unix process model, [the init process](https://en.wikipedia.org/wiki/Init) -- PID 1 -- inherits all [orphaned child processes](https://en.wikipedia.org/wiki/Orphan_process) and must [reap them](https://en.wikipedia.org/wiki/Wait_(system_call)). Most Docker containers do not have an init process that does this correctly. As a result, their containers become filled with [zombie processes](https://en.wikipedia.org/wiki/Zombie_process) over time. <br><br>Furthermore, `docker stop` sends SIGTERM to the init process, which stops all services. Unfortunately most init systems don't do this correctly within Docker since they're built for hardware shutdowns instead. This causes processes to be hard killed with SIGKILL, which doesn't give them a chance to correctly deinitialize things. This can cause file corruption. <br><br>Baseimage-docker comes with an init process `/sbin/my_init` that performs both of these tasks correctly. |
| Fixes APT incompatibilities with Docker | See https://github.com/dotcloud/docker/issues/1024. | | Fixes APT incompatibilities with Docker | See https://github.com/dotcloud/docker/issues/1024. |
| syslog-ng | A syslog daemon is necessary so that many services - including the kernel itself - can correctly log to /var/log/syslog. If no syslog daemon is running, a lot of important messages are silently swallowed. <br><br>Only listens locally. All syslog messages are forwarded to "docker logs".<br><br>Why syslog-ng?<br>I've had bad experience with rsyslog. I regularly run into bugs with rsyslog, and once in a while it takes my log host down by entering a 100% CPU loop in which it can't do anything. Syslog-ng seems to be much more stable. | | syslog-ng | A syslog daemon is necessary so that many services - including the kernel itself - can correctly log to /var/log/syslog. If no syslog daemon is running, a lot of important messages are silently swallowed. <br><br>Only listens locally. All syslog messages are forwarded to "docker logs".<br><br>Why syslog-ng?<br>I've had bad experience with rsyslog. I regularly run into bugs with rsyslog, and once in a while it takes my log host down by entering a 100% CPU loop in which it can't do anything. Syslog-ng seems to be much more stable. |
@@ -156,26 +156,45 @@ The image is called `phusion/baseimage`, and is available on the Docker registry
<a name="adding_additional_daemons"></a> <a name="adding_additional_daemons"></a>
### Adding additional daemons ### Adding additional daemons
You can add additional daemons (e.g. your own app) to the image by creating runit entries. You only have to write a small shell script which runs your daemon, and runit will keep it up and running for you, restarting it when it crashes, etc. A daemon is a program which runs in the background of its system, such
as a web server.
The shell script must be called `run`, must be executable, and is to be placed in the directory `/etc/service/<NAME>`. You can add additional daemons (for example, your own app) to the image
by creating runit service directories. You only have to write a small
shell script which runs your daemon;
[`runsv`](http://smarden.org/runit/runsv.8.html) will start your script,
and - by default - restart it upon its exit, after waiting one second.
Here's an example showing you how a memcached server runit entry can be made. The shell script must be called `run`, must be executable, and is to be
placed in the directory `/etc/service/<NAME>`. `runsv` will switch to
the directory and invoke `./run` after your container starts.
In `memcached.sh` (make sure this file is chmod +x): **Be certain that you do not start your container using interactive mode
(`-it`) with another command, as `runit` must be the first process to run. If you do this, your runit service directories won't be started. For instance, `docker run -it <name> bash` will bring you to bash in your container, but you'll lose all your daemons.**
Here's an example showing you how a `runit` service directory can be
made for a `memcached` server.
In `memcached.sh`, or whatever you choose to name your file (make sure
this file is chmod +x):
```bash
#!/bin/sh #!/bin/sh
# `/sbin/setuser memcache` runs the given command as the user `memcache`. # `/sbin/setuser memcache` runs the given command as the user `memcache`.
# If you omit that part, the command will be run as root. # If you omit that part, the command will be run as root.
exec /sbin/setuser memcache /usr/bin/memcached >>/var/log/memcached.log 2>&1 exec /sbin/setuser memcache /usr/bin/memcached >>/var/log/memcached.log 2>&1
```
In an accompanying `Dockerfile`:
In `Dockerfile`: ```Dockerfile
RUN mkdir /etc/service/memcached RUN mkdir /etc/service/memcached
COPY memcached.sh /etc/service/memcached/run COPY memcached.sh /etc/service/memcached/run
RUN chmod +x /etc/service/memcached/run RUN chmod +x /etc/service/memcached/run
```
Note that the shell script must run the daemon **without letting it daemonize/fork it**. Usually, daemons provide a command line flag or a config file option for that. A given shell script must run **without daemonizing or forking itself**;
this is because `runit` will start and restart your script on its own.
Usually, daemons provide a command line flag or a config file option for
preventing such behavior - essentially, you just want your script to run
in the foreground, not the background.
<a name="running_startup_scripts"></a> <a name="running_startup_scripts"></a>
### Running scripts during container startup ### Running scripts during container startup
@@ -219,6 +238,12 @@ environment variables:
# Give all other processes (such as those which have been forked) 5 minutes to timeout # Give all other processes (such as those which have been forked) 5 minutes to timeout
ENV KILL_ALL_PROCESSES_TIMEOUT=300 ENV KILL_ALL_PROCESSES_TIMEOUT=300
Note: Prior to 0.11.1, the default values for `KILL_PROCESS_TIMEOUT` and `KILL_ALL_PROCESSES_TIMEOUT`
were 5 seconds. In version 0.11.1+ the default process timeout has been adjusted to 30 seconds to
allow more time for containers to terminate gracefully. The default timeout of your container runtime
may supersede this setting, for example Docker currently applies a [10s timeout](https://docs.docker.com/engine/reference/commandline/stop/#options)
by default before sending SIGKILL, upon `docker stop` or receiving SIGTERM.
### Environment variables ### Environment variables
If you use `/sbin/my_init` as the main container command, then any environment variables set with `docker run --env` or with the `ENV` command in the Dockerfile, will be picked up by `my_init`. These variables will also be passed to all child processes, including `/etc/my_init.d` startup scripts, Runit and Runit-managed services. There are however a few caveats you should be aware of: If you use `/sbin/my_init` as the main container command, then any environment variables set with `docker run --env` or with the `ENV` command in the Dockerfile, will be picked up by `my_init`. These variables will also be passed to all child processes, including `/etc/my_init.d` startup scripts, Runit and Runit-managed services. There are however a few caveats you should be aware of:
@@ -315,7 +340,7 @@ In order to ensure that all application log messages are captured by syslog-ng,
<a name="upgrading_os"></a> <a name="upgrading_os"></a>
### Upgrading the operating system inside the container ### Upgrading the operating system inside the container
Baseimage-docker images contain an Ubuntu 16.04 operating system. You may want to update this OS from time to time, for example to pull in the latest security updates. OpenSSL is a notorious example. Vulnerabilities are discovered in OpenSSL on a regular basis, so you should keep OpenSSL up-to-date as much as you can. Baseimage-docker images contain an Ubuntu operating system (see OS version at [Overview](#overview)). You may want to update this OS from time to time, for example to pull in the latest security updates. OpenSSL is a notorious example. Vulnerabilities are discovered in OpenSSL on a regular basis, so you should keep OpenSSL up-to-date as much as you can.
While we release Baseimage-docker images with the latest OS updates from time to time, you do not have to rely on us. You can update the OS inside Baseimage-docker images yourself, and it is recommended that you do this instead of waiting for us. While we release Baseimage-docker images with the latest OS updates from time to time, you do not have to rely on us. You can update the OS inside Baseimage-docker images yourself, and it is recommended that you do this instead of waiting for us.
@@ -572,14 +597,29 @@ If you want to call the resulting image something else, pass the NAME variable,
make build NAME=joe/baseimage make build NAME=joe/baseimage
You can also change the `ubuntu` base-image to `debian` as these distributions are quite similar.
make build BASE_IMAGE=debian:stretch
The image will be: `phusion/baseimage-debian-stretch`. Use the `NAME` variable in combination with the `BASE_IMAGE` one to call it `joe/stretch`.
make build BASE_IMAGE=debian:stretch NAME=joe/stretch
To verify that the various services are started, when the image is run as a container, add `test` to the end of your make invocations, e.g.:
make build BASE_IMAGE=debian:stretch NAME=joe/stretch test
<a name="removing_optional_services"></a> <a name="removing_optional_services"></a>
### Removing optional services ### Removing optional services
The default baseimage-docker installs `syslog-ng`, `cron` and `sshd` services during the build process. The default baseimage-docker installs `syslog-ng`, `cron` and `sshd` services during the build process.
In case you don't need one or more of these services in your image, you can disable its installation. In case you don't need one or more of these services in your image, you can disable its installation through the `image/buildconfig` that is sourced within `image/system_services.sh`. Do this at build time by passing a variable in with `--build-arg` as in `docker build --build-arg DISABLE_SYSLOG=1 image/`, or you may set the variable in `image/Dockerfile` with an ENV setting above the RUN directive.
As shown in the following example, to prevent `sshd` from being installed into your image, set `1` to the `DISABLE_SSH` variable in the `./image/buildconfig` file. These represent build-time configuration, so setting them in the shell env at build-time [will not have any effect](https://github.com/phusion/baseimage-docker/issues/459#issuecomment-439177442). Setting them in child images' Dockerfiles will also not have any effect.)
You can also set them directly as shown in the following example, to prevent `sshd` from being installed into your image, set `1` to the `DISABLE_SSH` variable in the `./image/buildconfig` file.
### In ./image/buildconfig ### In ./image/buildconfig
# ... # ...
@@ -597,7 +637,8 @@ Then you can proceed with `make build` command.
* Using baseimage-docker? [Tweet about us](https://twitter.com/share) or [follow us on Twitter](https://twitter.com/phusion_nl). * Using baseimage-docker? [Tweet about us](https://twitter.com/share) or [follow us on Twitter](https://twitter.com/phusion_nl).
* Having problems? Want to participate in development? Please post a message at [the discussion forum](https://groups.google.com/d/forum/passenger-docker). * Having problems? Want to participate in development? Please post a message at [the discussion forum](https://groups.google.com/d/forum/passenger-docker).
* Looking for a more complete base image, one that is ideal for Ruby, Python, Node.js and Meteor web apps? Take a look at [passenger-docker](https://github.com/phusion/passenger-docker). * Looking for a more complete base image, one that is ideal for Ruby, Python, Node.js and Meteor web apps? Take a look at [passenger-docker](https://github.com/phusion/passenger-docker).
* Need a helping hand? Phusion also offers [consulting](https://www.phusion.nl/consultancy) on a wide range of topics, including Web Development, UI/UX Research & Design, Technology Migration and Auditing.
[<img src="http://www.phusion.nl/assets/logo.png">](http://www.phusion.nl/) [<img src="https://www.phusion.nl/images/mark_logotype.svg">](https://www.phusion.nl/)
Please enjoy baseimage-docker, a product by [Phusion](http://www.phusion.nl/). :-) Please enjoy baseimage-docker, a product by [Phusion](http://www.phusion.nl/). :-)

View File

@@ -82,7 +82,7 @@ Baseimage-docker让这一切完美。在"内容"部分描述了所有这些修
| 模块 | 为什么包含这些?以及备注 | | 模块 | 为什么包含这些?以及备注 |
| ---------------- | ------------------- | | ---------------- | ------------------- |
| Ubuntu 16.04 LTS | 基础系统。 | | Ubuntu 18.04 LTS | 基础系统。 |
| 一个**正确**的初始化进程 | *主要文章:[Docker和PID 1 僵尸进程回收问题](http://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/)*<br/><br/>根据Unix进程模型[初始化进程](https://en.wikipedia.org/wiki/Init) -- PID 1 -- 继承了所有[孤立的子进程](https://en.wikipedia.org/wiki/Orphan_process),并且必须[进行回收](https://en.wikipedia.org/wiki/Wait_(system_call))。大多数Docker容器没有一个初始化进程可以正确的完成此操作随着时间的推移会导致他们的容器出现了大量的[僵尸进程](https://en.wikipedia.org/wiki/Zombie_process)。<br/><br/>而且,`docker stop`发送SIGTERM信号给初始化进程照理说此信号应该可以停止所有服务。不幸的是由于它们对硬件进行了关闭操作导致Docker内的大多数初始化系统没有正确执行。这会导致进程强行被SIGKILL信号关闭从而丧失了一个正确取消初始化设置的机会。这会导致文件损坏。<br/><br/>Baseimage-docker配有一个名为`/sbin/my_init`的初始化进程来同时正确的完成这些任务。 | | 一个**正确**的初始化进程 | *主要文章:[Docker和PID 1 僵尸进程回收问题](http://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/)*<br/><br/>根据Unix进程模型[初始化进程](https://en.wikipedia.org/wiki/Init) -- PID 1 -- 继承了所有[孤立的子进程](https://en.wikipedia.org/wiki/Orphan_process),并且必须[进行回收](https://en.wikipedia.org/wiki/Wait_(system_call))。大多数Docker容器没有一个初始化进程可以正确的完成此操作随着时间的推移会导致他们的容器出现了大量的[僵尸进程](https://en.wikipedia.org/wiki/Zombie_process)。<br/><br/>而且,`docker stop`发送SIGTERM信号给初始化进程照理说此信号应该可以停止所有服务。不幸的是由于它们对硬件进行了关闭操作导致Docker内的大多数初始化系统没有正确执行。这会导致进程强行被SIGKILL信号关闭从而丧失了一个正确取消初始化设置的机会。这会导致文件损坏。<br/><br/>Baseimage-docker配有一个名为`/sbin/my_init`的初始化进程来同时正确的完成这些任务。 |
| 修复了APT与Docker不兼容的问题 | 详情参见https://github.com/dotcloud/docker/issues/1024 。 | | 修复了APT与Docker不兼容的问题 | 详情参见https://github.com/dotcloud/docker/issues/1024 。 |
| syslog-ng | 对于很多服务包括kernel自身都需要一个syslog后台进程以便可以正确的将log输出到/var/log/syslog中。如果没有运行syslog后台进程很多重要的信息就会默默的丢失了。<br/><br/>只对本地进行监听。所有syslog信息会被转发给“docker logs”。 | | syslog-ng | 对于很多服务包括kernel自身都需要一个syslog后台进程以便可以正确的将log输出到/var/log/syslog中。如果没有运行syslog后台进程很多重要的信息就会默默的丢失了。<br/><br/>只对本地进行监听。所有syslog信息会被转发给“docker logs”。 |

View File

@@ -82,7 +82,7 @@ Baseimage-docker讓這一切完美。在"內容"部分描述了所有這些修
| 模塊 | 爲什麼包含這些?以及備註 | | 模塊 | 爲什麼包含這些?以及備註 |
| ---------------- | ------------------- | | ---------------- | ------------------- |
| Ubuntu 16.04 LTS | 基礎系統。 | | Ubuntu 18.04 LTS | 基礎系統。 |
| 一個**正確**的初始化行程 | *主要文章:[Docker和PID 1 殭屍行程回收問題](http://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/)*<br/><br/>根據Unix行程模型[初始化行程](https://en.wikipedia.org/wiki/Init) -- PID 1 -- 繼承了所有[孤立的子行程](https://en.wikipedia.org/wiki/Orphan_process),並且必須[進行回收](https://en.wikipedia.org/wiki/Wait_(system_call))。大多數Docker容器沒有一個初始化行程可以正確的完成此操作隨着時間的推移會導致他們的容器出現了大量的[殭屍行程](https://en.wikipedia.org/wiki/Zombie_process)。<br/><br/>而且,`docker stop`發送SIGTERM信號給初始化行程照理說此信號應該可以停止所有服務。不幸的是由於它們對硬體進行了關閉操作導致Docker內的大多數初始化系統沒有正確執行。這會導致行程強行被SIGKILL信號關閉從而喪失了一個正確取消初始化設置的機會。這會導致文件損壞。<br/><br/>Baseimage-docker配有一個名爲`/sbin/my_init`的初始化行程來同時正確的完成這些任務。 | | 一個**正確**的初始化行程 | *主要文章:[Docker和PID 1 殭屍行程回收問題](http://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/)*<br/><br/>根據Unix行程模型[初始化行程](https://en.wikipedia.org/wiki/Init) -- PID 1 -- 繼承了所有[孤立的子行程](https://en.wikipedia.org/wiki/Orphan_process),並且必須[進行回收](https://en.wikipedia.org/wiki/Wait_(system_call))。大多數Docker容器沒有一個初始化行程可以正確的完成此操作隨着時間的推移會導致他們的容器出現了大量的[殭屍行程](https://en.wikipedia.org/wiki/Zombie_process)。<br/><br/>而且,`docker stop`發送SIGTERM信號給初始化行程照理說此信號應該可以停止所有服務。不幸的是由於它們對硬體進行了關閉操作導致Docker內的大多數初始化系統沒有正確執行。這會導致行程強行被SIGKILL信號關閉從而喪失了一個正確取消初始化設置的機會。這會導致文件損壞。<br/><br/>Baseimage-docker配有一個名爲`/sbin/my_init`的初始化行程來同時正確的完成這些任務。 |
| 修復了APT與Docker不兼容的問題 | 詳情參見https://github.com/dotcloud/docker/issues/1024 。 | | 修復了APT與Docker不兼容的問題 | 詳情參見https://github.com/dotcloud/docker/issues/1024 。 |
| syslog-ng | 對於很多服務包括kernel自身都需要一個syslog後臺行程以便可以正確的將log輸出到/var/log/syslog中。如果沒有運行syslog後臺行程很多重要的信息就會默默的丟失了。<br/><br/>只對本地進行監聽。所有syslog信息會被轉發給“docker logs”。 | | syslog-ng | 對於很多服務包括kernel自身都需要一個syslog後臺行程以便可以正確的將log輸出到/var/log/syslog中。如果沒有運行syslog後臺行程很多重要的信息就會默默的丟失了。<br/><br/>只對本地進行監聽。所有syslog信息會被轉發給“docker logs”。 |

113
Vagrantfile vendored
View File

@@ -1,54 +1,75 @@
# -*- mode: ruby -*- # -*- mode: ruby -*-
# vi: set ft=ruby : # vi: set ft=ruby :
ROOT = File.dirname(File.absolute_path(__FILE__))
# Vagrantfile API/syntax version. Don't touch unless you know what you're doing! # All Vagrant configuration is done below. The "2" in Vagrant.configure
VAGRANTFILE_API_VERSION = '2' # configures the configuration version (we support older styles for
# backwards compatibility). Please don't change it unless you know what
# you're doing.
Vagrant.configure("2") do |config|
# The most common configuration options are documented and commented below.
# For a complete reference, please see the online documentation at
# https://docs.vagrantup.com.
# Default env properties which can be overridden # Every Vagrant development environment requires a box. You can search for
# Example overrides: # boxes at https://atlas.hashicorp.com/search.
# echo "ENV['PASSENGER_DOCKER_PATH'] ||= '../../phusion/passenger-docker' " >> ~/.vagrant.d/Vagrantfile config.vm.box = "ubuntu/bionic64"
# echo "ENV['BASE_BOX_URL'] ||= 'd\:/dev/vm/vagrant/boxes/phusion/'" >> ~/.vagrant.d/Vagrantfile config.disksize.size = '50GB'
BASE_BOX_URL = ENV['BASE_BOX_URL'] || 'https://oss-binaries.phusionpassenger.com/vagrant/boxes/latest/'
VAGRANT_BOX_URL = ENV['VAGRANT_BOX_URL'] || BASE_BOX_URL + 'ubuntu-14.04-amd64-vbox.box'
VMWARE_BOX_URL = ENV['VMWARE_BOX_URL'] || BASE_BOX_URL + 'ubuntu-14.04-amd64-vmwarefusion.box'
BASEIMAGE_PATH = ENV['BASEIMAGE_PATH' ] || '.'
PASSENGER_DOCKER_PATH = ENV['PASSENGER_PATH' ] || '../passenger-docker'
DOCKERIZER_PATH = ENV['DOCKERIZER_PATH'] || '../dockerizer'
$script = <<SCRIPT # Disable automatic box update checking. If you disable this, then
wget -q -O - https://get.docker.io/gpg | apt-key add - # boxes will only be checked for updates when the user runs
echo deb http://get.docker.io/ubuntu docker main > /etc/apt/sources.list.d/docker.list # `vagrant box outdated`. This is not recommended.
apt-get update -qq # config.vm.box_check_update = false
apt-get install -q -y --force-yes lxc-docker
usermod -a -G docker vagrant
docker version
su - vagrant -c 'echo alias d=docker >> ~/.bash_aliases'
SCRIPT
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config| # Create a forwarded port mapping which allows access to a specific port
config.vm.box = 'phusion-open-ubuntu-14.04-amd64' # within the machine from a port on the host machine. In the example below,
config.vm.box_url = VAGRANT_BOX_URL # accessing "localhost:8080" will access port 80 on the guest machine.
config.ssh.forward_agent = true # config.vm.network "forwarded_port", guest: 80, host: 8080
passenger_docker_path = File.absolute_path(PASSENGER_DOCKER_PATH, ROOT)
if File.directory?(passenger_docker_path) # Create a private network, which allows host-only access to the machine
config.vm.synced_folder passenger_docker_path, '/vagrant/passenger-docker' # using a specific IP.
end # config.vm.network "private_network", ip: "192.168.33.10"
baseimage_path = File.absolute_path(BASEIMAGE_PATH, ROOT)
if File.directory?(baseimage_path) # Create a public network, which generally matched to bridged network.
config.vm.synced_folder baseimage_path, "/vagrant/baseimage-docker" # Bridged networks make the machine appear as another physical device on
end # your network.
dockerizer_path = File.absolute_path(DOCKERIZER_PATH, ROOT) # config.vm.network "public_network"
if File.directory?(dockerizer_path)
config.vm.synced_folder dockerizer_path, '/vagrant/dockerizer' # Share an additional folder to the guest VM. The first argument is
# the path on the host to the actual folder. The second argument is
# the path on the guest to mount the folder. And the optional third
# argument is a set of non-required options.
# config.vm.synced_folder "../data", "/vagrant_data"
# Provider-specific configuration so you can fine-tune various
# backing providers for Vagrant. These expose provider-specific options.
# Example for VirtualBox:
#
# config.vm.provider "virtualbox" do |vb|
# # Display the VirtualBox GUI when booting the machine
# vb.gui = true
#
# # Customize the amount of memory on the VM:
# vb.memory = "1024"
# end
#
# View the documentation for the provider you are using for more
# information on available options.
# Define a Vagrant Push strategy for pushing to Atlas. Other push strategies
# such as FTP and Heroku are also available. See the documentation at
# https://docs.vagrantup.com/v2/push/atlas.html for more information.
# config.push.define "atlas" do |push|
# push.app = "YOUR_ATLAS_USERNAME/YOUR_APPLICATION_NAME"
# end
# Enable provisioning with a shell script. Additional provisioners such as
# Puppet, Chef, Ansible, Salt, and Docker are also available. Please see the
# documentation for more information about their specific syntax and use.
# config.vm.provision "shell", inline: <<-SHELL
# apt-get update
# apt-get install -y apache2
# SHELL
config.vm.provision :shell,
path: "vagrant-libs/bootstrap.sh"
end end
config.vm.provider :vmware_fusion do |f, override|
override.vm.box_url = VMWARE_BOX_URL
f.vmx['displayName'] = 'baseimage-docker'
end
if Dir.glob("#{File.dirname(__FILE__)}/.vagrant/machines/default/*/id").empty?
config.vm.provision :shell, :inline => $script
end
end

22
build-multiarch.sh Executable file
View File

@@ -0,0 +1,22 @@
#!/bin/bash
set -e
set -x
for arch in $ARCHS; do
docker pull $NAME:$VERSION-${arch}
if [[ $TAG_LATEST != 'true' ]]; then
docker manifest create --amend $NAME:$VERSION $NAME:$VERSION-${arch}
docker manifest annotate $NAME:$VERSION $NAME:$VERSION-${arch} --arch ${arch}
else
docker manifest create --amend $NAME:latest $NAME:$VERSION-${arch}
docker manifest annotate $NAME:latest $NAME:$VERSION-${arch} --arch ${arch}
fi
done
echo "Push manifests"
if [[ $TAG_LATEST != 'true' ]]; then
docker manifest push $NAME:$VERSION
else
docker manifest push $NAME:latest
fi

19
build.sh Executable file
View File

@@ -0,0 +1,19 @@
#!/bin/bash
set -e
# # Prepare qemu
# if [ '$QEMU_ARCH' != 'amd64' ]; then
# # docker run --rm --privileged multiarch/qemu-user-static:register --reset
# fi
# Get qemu package
echo "Getting qemu package for $QEMU_ARCH"
# Fake qemu for amd64 builds to avoid breaking COPY in Dockerfile
if [[ $QEMU_ARCH == "amd64" ]]; then
touch x86_64_qemu-"$QEMU_ARCH"-static.tar.gz
mv x86_64_qemu-${QEMU_ARCH}-static.tar.gz image
else
curl -L -o x86_64_qemu-"$QEMU_ARCH"-static.tar.gz https://github.com/multiarch/qemu-user-static/releases/download/"$QEMU_VERSION"/x86_64_qemu-"$QEMU_ARCH"-static.tar.gz
mv x86_64_qemu-${QEMU_ARCH}-static.tar.gz image
fi

View File

@@ -1,5 +1,8 @@
FROM ubuntu:16.04 ARG BASE_IMAGE=ubuntu:20.04
MAINTAINER Phusion <info@phusion.nl> FROM $BASE_IMAGE
ARG QEMU_ARCH
ADD x86_64_qemu-${QEMU_ARCH}-static.tar.gz /usr/bin
COPY . /bd_build COPY . /bd_build

View File

@@ -14,8 +14,8 @@ import time
ENV_INIT_DIRECTORY = os.environ.get('ENV_INIT_DIRECTORY', '/etc/my_init.d') ENV_INIT_DIRECTORY = os.environ.get('ENV_INIT_DIRECTORY', '/etc/my_init.d')
KILL_PROCESS_TIMEOUT = int(os.environ.get('KILL_PROCESS_TIMEOUT', 5)) KILL_PROCESS_TIMEOUT = int(os.environ.get('KILL_PROCESS_TIMEOUT', 30))
KILL_ALL_PROCESSES_TIMEOUT = int(os.environ.get('KILL_ALL_PROCESSES_TIMEOUT', 5)) KILL_ALL_PROCESSES_TIMEOUT = int(os.environ.get('KILL_ALL_PROCESSES_TIMEOUT', 30))
LOG_LEVEL_ERROR = 1 LOG_LEVEL_ERROR = 1
LOG_LEVEL_WARN = 1 LOG_LEVEL_WARN = 1
@@ -303,7 +303,7 @@ def wait_for_runit_or_interrupt(pid):
def shutdown_runit_services(quiet=False): def shutdown_runit_services(quiet=False):
if not quiet: if not quiet:
debug("Begin shutting down runit services...") debug("Begin shutting down runit services...")
os.system("/usr/bin/sv -w %d down /etc/service/* > /dev/null" % KILL_PROCESS_TIMEOUT) os.system("/usr/bin/sv -w %d force-stop /etc/service/* > /dev/null" % KILL_PROCESS_TIMEOUT)
def wait_for_runit_services(): def wait_for_runit_services():

View File

@@ -8,4 +8,8 @@ find /bd_build/ -not \( -name 'bd_build' -or -name 'buildconfig' -or -name 'clea
rm -rf /tmp/* /var/tmp/* rm -rf /tmp/* /var/tmp/*
rm -rf /var/lib/apt/lists/* rm -rf /var/lib/apt/lists/*
# clean up python bytecode
find / -mount -name *.pyc -delete
find / -mount -name *__pycache__* -delete
rm -f /etc/ssh/ssh_host_* rm -f /etc/ssh/ssh_host_*

View File

@@ -41,7 +41,16 @@ $minimal_apt_get_install software-properties-common
apt-get dist-upgrade -y --no-install-recommends -o Dpkg::Options::="--force-confold" apt-get dist-upgrade -y --no-install-recommends -o Dpkg::Options::="--force-confold"
## Fix locale. ## Fix locale.
case $(lsb_release -is) in
Ubuntu)
$minimal_apt_get_install language-pack-en $minimal_apt_get_install language-pack-en
;;
Debian)
$minimal_apt_get_install locales locales-all
;;
*)
;;
esac
locale-gen en_US locale-gen en_US
update-locale LANG=en_US.UTF-8 LC_CTYPE=en_US.UTF-8 update-locale LANG=en_US.UTF-8 LC_CTYPE=en_US.UTF-8
echo -n en_US.UTF-8 > /etc/container_environment/LANG echo -n en_US.UTF-8 > /etc/container_environment/LANG

View File

@@ -1,2 +1,8 @@
#!/bin/sh #!/bin/sh
# Touch cron files to fix 'NUMBER OF HARD LINKS > 1' issue. See https://github.com/phusion/baseimage-docker/issues/198
touch -c /var/spool/cron/crontabs/*
touch -c /etc/crontab
touch -c /etc/cron.d/* /etc/cron.daily/* /etc/cron.hourly/* /etc/cron.monthly/* /etc/cron.weekly/*
exec /usr/sbin/cron -f exec /usr/sbin/cron -f

View File

@@ -1,5 +1,4 @@
/var/log/syslog /var/log/syslog {
{
rotate 7 rotate 7
daily daily
missingok missingok
@@ -24,8 +23,7 @@
/var/log/lpr.log /var/log/lpr.log
/var/log/cron.log /var/log/cron.log
/var/log/debug /var/log/debug
/var/log/messages /var/log/messages {
{
rotate 4 rotate 4
weekly weekly
missingok missingok

View File

@@ -1,6 +1,5 @@
@version: 3.5 @version: 3.13
@include "scl.conf" @include "scl.conf"
@include "`scl-root`/system/tty10.conf"
# Syslog-ng configuration file, compatible with default Debian syslogd # Syslog-ng configuration file, compatible with default Debian syslogd
# installation. # installation.
@@ -134,6 +133,8 @@ log { source(s_src); filter(f_mail); destination(d_mail); };
log { source(s_src); filter(f_news); filter(f_crit); destination(d_newscrit); }; log { source(s_src); filter(f_news); filter(f_crit); destination(d_newscrit); };
log { source(s_src); filter(f_news); filter(f_err); destination(d_newserr); }; log { source(s_src); filter(f_news); filter(f_err); destination(d_newserr); };
log { source(s_src); filter(f_news); filter(f_notice); destination(d_newsnotice); }; log { source(s_src); filter(f_news); filter(f_notice); destination(d_newsnotice); };
#log { source(s_src); filter(f_cnews); destination(d_console_all); };
#log { source(s_src); filter(f_cother); destination(d_console_all); };
#log { source(s_src); filter(f_ppp); destination(d_ppp); }; #log { source(s_src); filter(f_ppp); destination(d_ppp); };

View File

@@ -4,7 +4,7 @@ source /bd_build/buildconfig
set -x set -x
## Often used tools. ## Often used tools.
$minimal_apt_get_install curl less vim-tiny psmisc $minimal_apt_get_install curl less vim-tiny psmisc gpg-agent dirmngr
ln -s /usr/bin/vim.tiny /usr/bin/vim ln -s /usr/bin/vim.tiny /usr/bin/vim
## This tool runs a command as another user and sets $HOME. ## This tool runs a command as another user and sets $HOME.

View File

@@ -14,10 +14,8 @@ function cleanup()
docker rm $ID >/dev/null docker rm $ID >/dev/null
} }
PWD=`pwd`
echo " --> Starting insecure container" echo " --> Starting insecure container"
ID=`docker run -d -p 22 -v $PWD/test:/test $NAME:$VERSION /sbin/my_init --enable-insecure-key` ID=`docker run -d -p 22 $NAME:$VERSION /sbin/my_init --enable-insecure-key`
sleep 1 sleep 1
echo " --> Obtaining SSH port number" echo " --> Obtaining SSH port number"
@@ -29,14 +27,12 @@ fi
trap cleanup EXIT trap cleanup EXIT
echo " --> Enabling SSH in the container" echo " --> Enabling SSH in the container"
docker exec -t -i $ID /etc/my_init.d/00_regen_ssh_host_keys.sh -f docker exec $ID /etc/my_init.d/00_regen_ssh_host_keys.sh -f
docker exec -t -i $ID rm /etc/service/sshd/down docker exec $ID rm /etc/service/sshd/down
docker exec -t -i $ID sv start /etc/service/sshd docker exec $ID sv start /etc/service/sshd
sleep 1 sleep 1
echo " --> Logging into container and running tests" echo " --> Logging into container and running tests"
cp image/services/sshd/keys/insecure_key /tmp/insecure_key
chmod 600 /tmp/insecure_key
sleep 1 # Give container some more time to start up. sleep 1 # Give container some more time to start up.
ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i /tmp/insecure_key -p $SSHPORT root@127.0.0.1 \ DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )"
/bin/bash /test/test.sh tools/docker-ssh $ID bash < test/test.sh

View File

@@ -58,6 +58,13 @@ fi
KNOWN_HOSTS_FILE=`mktemp /tmp/docker-ssh.XXXXXXXXX` KNOWN_HOSTS_FILE=`mktemp /tmp/docker-ssh.XXXXXXXXX`
IP=`docker inspect -f "{{ .NetworkSettings.IPAddress }}" "$CONTAINER_ID"` IP=`docker inspect -f "{{ .NetworkSettings.IPAddress }}" "$CONTAINER_ID"`
PORT=`docker inspect -f '{{(index (index .NetworkSettings.Ports "22/tcp") 0).HostPort}}' "$CONTAINER_ID"`
if test "`uname`" = "Darwin"; then
IP="127.0.0.1"
else
PORT=22
fi
echo "SSHing into $IP:$PORT"
# Prevent SSH from warning about adding a host to the known_hosts file. # Prevent SSH from warning about adding a host to the known_hosts file.
ssh-keyscan "$IP" >"$KNOWN_HOSTS_FILE" 2>&1 ssh-keyscan "$IP" >"$KNOWN_HOSTS_FILE" 2>&1
@@ -68,6 +75,7 @@ if ! ssh -i ~/.baseimage_docker_insecure_key \
-o PasswordAuthentication=no \ -o PasswordAuthentication=no \
-o KbdInteractiveAuthentication=no \ -o KbdInteractiveAuthentication=no \
-o ChallengeResponseAuthentication=no \ -o ChallengeResponseAuthentication=no \
-p $PORT \
"root@$IP" "$@" "root@$IP" "$@"
then then
STATUS=$? STATUS=$?

31
vagrant-libs/bootstrap.sh Executable file
View File

@@ -0,0 +1,31 @@
#!/usr/bin/env bash
set -eux
# Update Packages
sudo apt-get update
# sudo apt-get -y upgrade
# sudo apt-get -y dist-upgrade
# Install Packages
sudo apt-get install -y build-essential checkinstall libreadline-gplv2-dev \
libncursesw5-dev libssl-dev libsqlite3-dev tk-dev libgdbm-dev libc6-dev \
libbz2-dev libffi-dev python3-pip unzip lsb-release software-properties-common \
curl wget git rsync # python-dev python3-venv
# Install Docker
sudo curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -
sudo add-apt-repository "deb [arch=amd64] https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable"
sudo apt-get update
sudo apt-cache policy docker-ce
sudo apt-get install -y docker-ce docker-compose
# Re-install docker-compose to side-step a bug
# docker build -t terraform-azure-vm . >> "free(): invalid pointer"
# https://github.com/docker/for-linux/issues/563
sudo apt-get remove -y golang-docker-credential-helpers
sudo curl -L "https://github.com/docker/compose/releases/download/1.25.5/docker-compose-$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose
echo '{"experimental": true}' > /etc/docker/daemon.json
service docker restart
# Add vagrant user to docker group
sudo usermod -aG docker vagrant