deps: update osbuild/images to 157e798fdf8d
Update the osbuild/images dependency from 246b718310ea to 157e798fdf8d.
This commit is contained in:
parent
4c7b3dd25a
commit
a4798ea64d
55 changed files with 42304 additions and 41796 deletions
175
vendor/github.com/osbuild/images/internal/common/echo_logrus.go
generated
vendored
175
vendor/github.com/osbuild/images/internal/common/echo_logrus.go
generated
vendored
|
|
@ -1,175 +0,0 @@
|
|||
package common
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"io"
|
||||
|
||||
"github.com/labstack/gommon/log"
|
||||
"github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
// EchoLogrusLogger extend logrus.Logger
|
||||
type EchoLogrusLogger struct {
|
||||
*logrus.Logger
|
||||
}
|
||||
|
||||
var commonLogger = &EchoLogrusLogger{
|
||||
Logger: logrus.StandardLogger(),
|
||||
}
|
||||
|
||||
func Logger() *EchoLogrusLogger {
|
||||
return commonLogger
|
||||
}
|
||||
|
||||
func toEchoLevel(level logrus.Level) log.Lvl {
|
||||
switch level {
|
||||
case logrus.DebugLevel:
|
||||
return log.DEBUG
|
||||
case logrus.InfoLevel:
|
||||
return log.INFO
|
||||
case logrus.WarnLevel:
|
||||
return log.WARN
|
||||
case logrus.ErrorLevel:
|
||||
return log.ERROR
|
||||
}
|
||||
|
||||
return log.OFF
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Output() io.Writer {
|
||||
return l.Out
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) SetOutput(w io.Writer) {
|
||||
// disable operations that would change behavior of global logrus logger.
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Level() log.Lvl {
|
||||
return toEchoLevel(l.Logger.Level)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) SetLevel(v log.Lvl) {
|
||||
// disable operations that would change behavior of global logrus logger.
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) SetHeader(h string) {
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Prefix() string {
|
||||
return ""
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) SetPrefix(p string) {
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Print(i ...interface{}) {
|
||||
l.Logger.Print(i...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Printf(format string, args ...interface{}) {
|
||||
l.Logger.Printf(format, args...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Printj(j log.JSON) {
|
||||
b, err := json.Marshal(j)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
l.Logger.Println(string(b))
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Debug(i ...interface{}) {
|
||||
l.Logger.Debug(i...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Debugf(format string, args ...interface{}) {
|
||||
l.Logger.Debugf(format, args...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Debugj(j log.JSON) {
|
||||
b, err := json.Marshal(j)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
l.Logger.Debugln(string(b))
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Info(i ...interface{}) {
|
||||
l.Logger.Info(i...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Infof(format string, args ...interface{}) {
|
||||
l.Logger.Infof(format, args...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Infoj(j log.JSON) {
|
||||
b, err := json.Marshal(j)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
l.Logger.Infoln(string(b))
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Warn(i ...interface{}) {
|
||||
l.Logger.Warn(i...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Warnf(format string, args ...interface{}) {
|
||||
l.Logger.Warnf(format, args...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Warnj(j log.JSON) {
|
||||
b, err := json.Marshal(j)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
l.Logger.Warnln(string(b))
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Error(i ...interface{}) {
|
||||
l.Logger.Error(i...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Errorf(format string, args ...interface{}) {
|
||||
l.Logger.Errorf(format, args...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Errorj(j log.JSON) {
|
||||
b, err := json.Marshal(j)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
l.Logger.Errorln(string(b))
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Fatal(i ...interface{}) {
|
||||
l.Logger.Fatal(i...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Fatalf(format string, args ...interface{}) {
|
||||
l.Logger.Fatalf(format, args...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Fatalj(j log.JSON) {
|
||||
b, err := json.Marshal(j)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
l.Logger.Fatalln(string(b))
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Panic(i ...interface{}) {
|
||||
l.Logger.Panic(i...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Panicf(format string, args ...interface{}) {
|
||||
l.Logger.Panicf(format, args...)
|
||||
}
|
||||
|
||||
func (l *EchoLogrusLogger) Panicj(j log.JSON) {
|
||||
b, err := json.Marshal(j)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
l.Logger.Panicln(string(b))
|
||||
}
|
||||
22
vendor/github.com/osbuild/images/internal/common/operation_id.go
generated
vendored
22
vendor/github.com/osbuild/images/internal/common/operation_id.go
generated
vendored
|
|
@ -1,22 +0,0 @@
|
|||
package common
|
||||
|
||||
import (
|
||||
"github.com/labstack/echo/v4"
|
||||
"github.com/segmentio/ksuid"
|
||||
)
|
||||
|
||||
const OperationIDKey string = "operationID"
|
||||
|
||||
// Adds a time-sortable globally unique identifier to an echo.Context if not already set
|
||||
func OperationIDMiddleware(next echo.HandlerFunc) echo.HandlerFunc {
|
||||
return func(c echo.Context) error {
|
||||
if c.Get(OperationIDKey) == nil {
|
||||
c.Set(OperationIDKey, GenerateOperationID())
|
||||
}
|
||||
return next(c)
|
||||
}
|
||||
}
|
||||
|
||||
func GenerateOperationID() string {
|
||||
return ksuid.New().String()
|
||||
}
|
||||
8
vendor/github.com/osbuild/images/internal/dnfjson/dnfjson.go
generated
vendored
8
vendor/github.com/osbuild/images/internal/dnfjson/dnfjson.go
generated
vendored
|
|
@ -358,8 +358,9 @@ func (s *Solver) makeDepsolveRequest(pkgSets []rpmmd.PackageSet) (*Request, map[
|
|||
transactions := make([]transactionArgs, len(pkgSets))
|
||||
for dsIdx, pkgSet := range pkgSets {
|
||||
transactions[dsIdx] = transactionArgs{
|
||||
PackageSpecs: pkgSet.Include,
|
||||
ExcludeSpecs: pkgSet.Exclude,
|
||||
PackageSpecs: pkgSet.Include,
|
||||
ExcludeSpecs: pkgSet.Exclude,
|
||||
InstallWeakDeps: pkgSet.InstallWeakDeps,
|
||||
}
|
||||
|
||||
for _, jobRepo := range pkgSet.Repositories {
|
||||
|
|
@ -538,6 +539,9 @@ type transactionArgs struct {
|
|||
|
||||
// IDs of repositories to use for this depsolve
|
||||
RepoIDs []string `json:"repo-ids"`
|
||||
|
||||
// If we want weak deps for this depsolve
|
||||
InstallWeakDeps bool `json:"install_weak_deps"`
|
||||
}
|
||||
|
||||
type packageSpecs []PackageSpec
|
||||
|
|
|
|||
1
vendor/github.com/osbuild/images/internal/pathpolicy/policies.go
generated
vendored
1
vendor/github.com/osbuild/images/internal/pathpolicy/policies.go
generated
vendored
|
|
@ -24,6 +24,7 @@ var CustomDirectoriesPolicies = NewPathPolicies(map[string]PathPolicy{
|
|||
var CustomFilesPolicies = NewPathPolicies(map[string]PathPolicy{
|
||||
"/": {Deny: true},
|
||||
"/etc": {},
|
||||
"/root": {},
|
||||
"/etc/fstab": {Deny: true},
|
||||
"/etc/shadow": {Deny: true},
|
||||
"/etc/passwd": {Deny: true},
|
||||
|
|
|
|||
107
vendor/github.com/osbuild/images/pkg/blueprint/blueprint.go
generated
vendored
107
vendor/github.com/osbuild/images/pkg/blueprint/blueprint.go
generated
vendored
|
|
@ -1,15 +1,6 @@
|
|||
// Package blueprint contains primitives for representing weldr blueprints
|
||||
package blueprint
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
|
||||
"github.com/osbuild/images/pkg/crypt"
|
||||
|
||||
"github.com/coreos/go-semver/semver"
|
||||
)
|
||||
|
||||
// A Blueprint is a high-level description of an image.
|
||||
type Blueprint struct {
|
||||
Name string `json:"name" toml:"name"`
|
||||
|
|
@ -49,71 +40,6 @@ type Container struct {
|
|||
TLSVerify *bool `json:"tls-verify,omitempty" toml:"tls-verify,omitempty"`
|
||||
}
|
||||
|
||||
// DeepCopy returns a deep copy of the blueprint
|
||||
// This uses json.Marshal and Unmarshal which are not very efficient
|
||||
func (b *Blueprint) DeepCopy() Blueprint {
|
||||
bpJSON, err := json.Marshal(b)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
|
||||
var bp Blueprint
|
||||
err = json.Unmarshal(bpJSON, &bp)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return bp
|
||||
}
|
||||
|
||||
// Initialize ensures that the blueprint has sane defaults for any missing fields
|
||||
func (b *Blueprint) Initialize() error {
|
||||
if len(b.Name) == 0 {
|
||||
return fmt.Errorf("empty blueprint name not allowed")
|
||||
}
|
||||
|
||||
if b.Packages == nil {
|
||||
b.Packages = []Package{}
|
||||
}
|
||||
if b.Modules == nil {
|
||||
b.Modules = []Package{}
|
||||
}
|
||||
if b.Groups == nil {
|
||||
b.Groups = []Group{}
|
||||
}
|
||||
if b.Containers == nil {
|
||||
b.Containers = []Container{}
|
||||
}
|
||||
if b.Version == "" {
|
||||
b.Version = "0.0.0"
|
||||
}
|
||||
// Return an error if the version is not valid
|
||||
_, err := semver.NewVersion(b.Version)
|
||||
if err != nil {
|
||||
return fmt.Errorf("Invalid 'version', must use Semantic Versioning: %s", err.Error())
|
||||
}
|
||||
|
||||
err = b.CryptPasswords()
|
||||
if err != nil {
|
||||
return fmt.Errorf("Error hashing passwords: %s", err.Error())
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// BumpVersion increments the previous blueprint's version
|
||||
// If the old version string is not vaild semver it will use the new version as-is
|
||||
// This assumes that the new blueprint's version has already been validated via Initialize
|
||||
func (b *Blueprint) BumpVersion(old string) {
|
||||
var ver *semver.Version
|
||||
ver, err := semver.NewVersion(old)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
|
||||
ver.BumpPatch()
|
||||
b.Version = ver.String()
|
||||
}
|
||||
|
||||
// packages, modules, and groups all resolve to rpm packages right now. This
|
||||
// function returns a combined list of "name-version" strings.
|
||||
func (b *Blueprint) GetPackages() []string {
|
||||
|
|
@ -149,36 +75,3 @@ func (p Package) ToNameVersion() string {
|
|||
|
||||
return p.Name + "-" + p.Version
|
||||
}
|
||||
|
||||
// CryptPasswords ensures that all blueprint passwords are hashed
|
||||
func (b *Blueprint) CryptPasswords() error {
|
||||
if b.Customizations == nil {
|
||||
return nil
|
||||
}
|
||||
|
||||
// Any passwords for users?
|
||||
for i := range b.Customizations.User {
|
||||
// Missing or empty password
|
||||
if b.Customizations.User[i].Password == nil {
|
||||
continue
|
||||
}
|
||||
|
||||
// Prevent empty password from being hashed
|
||||
if len(*b.Customizations.User[i].Password) == 0 {
|
||||
b.Customizations.User[i].Password = nil
|
||||
continue
|
||||
}
|
||||
|
||||
if !crypt.PasswordIsCrypted(*b.Customizations.User[i].Password) {
|
||||
pw, err := crypt.CryptSHA512(*b.Customizations.User[i].Password)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
// Replace the password with the
|
||||
b.Customizations.User[i].Password = &pw
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/container/resolver.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/container/resolver.go
generated
vendored
|
|
@ -3,6 +3,7 @@ package container
|
|||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"sort"
|
||||
"strings"
|
||||
)
|
||||
|
||||
|
|
@ -79,5 +80,8 @@ func (r *Resolver) Finish() ([]Spec, error) {
|
|||
return specs, fmt.Errorf("failed to resolve container: %s", detail)
|
||||
}
|
||||
|
||||
// Return a stable result, sorted by Digest
|
||||
sort.Slice(specs, func(i, j int) bool { return specs[i].Digest < specs[j].Digest })
|
||||
|
||||
return specs, nil
|
||||
}
|
||||
|
|
|
|||
11
vendor/github.com/osbuild/images/pkg/distro/fedora/distro.go
generated
vendored
11
vendor/github.com/osbuild/images/pkg/distro/fedora/distro.go
generated
vendored
|
|
@ -46,7 +46,6 @@ var (
|
|||
iotServices = []string{
|
||||
"NetworkManager.service",
|
||||
"firewalld.service",
|
||||
"rngd.service",
|
||||
"sshd.service",
|
||||
"zezere_ignition.timer",
|
||||
"zezere_ignition_banner.service",
|
||||
|
|
@ -202,7 +201,7 @@ var (
|
|||
kernelOptions: defaultKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 5 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "qcow2"},
|
||||
exports: []string{"qcow2"},
|
||||
|
|
@ -230,7 +229,7 @@ var (
|
|||
kernelOptions: defaultKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 2 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc"},
|
||||
exports: []string{"vpc"},
|
||||
|
|
@ -259,7 +258,7 @@ var (
|
|||
kernelOptions: defaultKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 2 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vmdk"},
|
||||
exports: []string{"vmdk"},
|
||||
|
|
@ -277,7 +276,7 @@ var (
|
|||
kernelOptions: defaultKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 2 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vmdk", "ovf", "archive"},
|
||||
exports: []string{"archive"},
|
||||
|
|
@ -341,7 +340,7 @@ var (
|
|||
kernelOptions: defaultKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 2 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
|
|||
16
vendor/github.com/osbuild/images/pkg/distro/fedora/images.go
generated
vendored
16
vendor/github.com/osbuild/images/pkg/distro/fedora/images.go
generated
vendored
|
|
@ -200,7 +200,7 @@ func osCustomizations(
|
|||
|
||||
// IMAGES
|
||||
|
||||
func liveImage(workload workload.Workload,
|
||||
func diskImage(workload workload.Workload,
|
||||
t *imageType,
|
||||
customizations *blueprint.Customizations,
|
||||
options distro.ImageOptions,
|
||||
|
|
@ -208,7 +208,7 @@ func liveImage(workload workload.Workload,
|
|||
containers []container.SourceSpec,
|
||||
rng *rand.Rand) (image.ImageKind, error) {
|
||||
|
||||
img := image.NewLiveImage()
|
||||
img := image.NewDiskImage()
|
||||
img.Platform = t.platform
|
||||
img.OSCustomizations = osCustomizations(t, packageSets[osPkgsKey], containers, customizations)
|
||||
img.Environment = t.environment
|
||||
|
|
@ -255,17 +255,6 @@ func liveInstallerImage(workload workload.Workload,
|
|||
|
||||
img := image.NewAnacondaLiveInstaller()
|
||||
|
||||
distro := t.Arch().Distro()
|
||||
|
||||
// If the live installer is generated for Fedora 39 or higher then we enable the web ui
|
||||
// kernel options. This is a temporary thing as the check for this should really lie with
|
||||
// anaconda and their `liveinst` script to determine which frontend to start.
|
||||
if common.VersionLessThan(distro.Releasever(), "39") {
|
||||
img.AdditionalKernelOpts = []string{}
|
||||
} else {
|
||||
img.AdditionalKernelOpts = []string{"inst.webui"}
|
||||
}
|
||||
|
||||
img.Platform = t.platform
|
||||
img.Workload = workload
|
||||
img.ExtraBasePackages = packageSets[installerPkgsKey]
|
||||
|
|
@ -345,6 +334,7 @@ func iotCommitImage(workload workload.Workload,
|
|||
img.OSTreeParent = parentCommit
|
||||
img.OSVersion = t.arch.distro.osVersion
|
||||
img.Filename = t.Filename()
|
||||
img.InstallWeakDeps = false
|
||||
|
||||
return img, nil
|
||||
}
|
||||
|
|
|
|||
234
vendor/github.com/osbuild/images/pkg/distro/fedora/package_sets.go
generated
vendored
234
vendor/github.com/osbuild/images/pkg/distro/fedora/package_sets.go
generated
vendored
|
|
@ -30,7 +30,7 @@ func qcow2CommonPackageSet(t *imageType) rpmmd.PackageSet {
|
|||
}
|
||||
|
||||
func vhdCommonPackageSet(t *imageType) rpmmd.PackageSet {
|
||||
ps := rpmmd.PackageSet{
|
||||
return rpmmd.PackageSet{
|
||||
Include: []string{
|
||||
"@core",
|
||||
"chrony",
|
||||
|
|
@ -48,12 +48,10 @@ func vhdCommonPackageSet(t *imageType) rpmmd.PackageSet {
|
|||
"zram-generator-defaults",
|
||||
},
|
||||
}
|
||||
|
||||
return ps
|
||||
}
|
||||
|
||||
func vmdkCommonPackageSet(t *imageType) rpmmd.PackageSet {
|
||||
ps := rpmmd.PackageSet{
|
||||
return rpmmd.PackageSet{
|
||||
Include: []string{
|
||||
"@Fedora Cloud Server",
|
||||
"chrony",
|
||||
|
|
@ -74,139 +72,144 @@ func vmdkCommonPackageSet(t *imageType) rpmmd.PackageSet {
|
|||
"extlinux-bootloader",
|
||||
},
|
||||
}
|
||||
|
||||
return ps
|
||||
}
|
||||
|
||||
// fedora iot commit OS package set
|
||||
func iotCommitPackageSet(t *imageType) rpmmd.PackageSet {
|
||||
ps := rpmmd.PackageSet{
|
||||
Include: []string{
|
||||
"fedora-release-iot",
|
||||
"glibc",
|
||||
"glibc-minimal-langpack",
|
||||
"nss-altfiles",
|
||||
"sssd-client",
|
||||
"libsss_sudo",
|
||||
"shadow-utils",
|
||||
"dracut-network",
|
||||
"polkit",
|
||||
"lvm2",
|
||||
"cryptsetup",
|
||||
"pinentry",
|
||||
"keyutils",
|
||||
"cracklib-dicts",
|
||||
"e2fsprogs",
|
||||
"xfsprogs",
|
||||
"dosfstools",
|
||||
"gnupg2",
|
||||
"basesystem",
|
||||
"python3",
|
||||
"bash",
|
||||
"xz",
|
||||
"gzip",
|
||||
"coreutils",
|
||||
"which",
|
||||
"curl",
|
||||
"firewalld",
|
||||
"iptables",
|
||||
"NetworkManager",
|
||||
"NetworkManager-wifi",
|
||||
"NetworkManager-wwan",
|
||||
"wpa_supplicant",
|
||||
"iwd",
|
||||
"tpm2-pkcs11",
|
||||
"dnsmasq",
|
||||
"traceroute",
|
||||
"hostname",
|
||||
"iproute",
|
||||
"iputils",
|
||||
"openssh-clients",
|
||||
"openssh-server",
|
||||
"passwd",
|
||||
"policycoreutils",
|
||||
"procps-ng",
|
||||
"rootfiles",
|
||||
"rpm",
|
||||
"smartmontools-selinux",
|
||||
"setup",
|
||||
"shadow-utils",
|
||||
"sudo",
|
||||
"systemd",
|
||||
"util-linux",
|
||||
"vim-minimal",
|
||||
"less",
|
||||
"tar",
|
||||
"fwupd",
|
||||
"usbguard",
|
||||
"greenboot",
|
||||
"ignition",
|
||||
"zezere-ignition",
|
||||
"rsync",
|
||||
"aardvark-dns",
|
||||
"atheros-firmware",
|
||||
"attr",
|
||||
"ima-evm-utils",
|
||||
"authselect",
|
||||
"basesystem",
|
||||
"bash",
|
||||
"bash-completion",
|
||||
"tmux",
|
||||
"screen",
|
||||
"policycoreutils-python-utils",
|
||||
"setools-console",
|
||||
"audit",
|
||||
"rng-tools",
|
||||
"brcmfmac-firmware",
|
||||
"chrony",
|
||||
"bluez",
|
||||
"bluez-libs",
|
||||
"bluez-mesh",
|
||||
"kernel-tools",
|
||||
"libgpiod-utils",
|
||||
"podman",
|
||||
"container-selinux",
|
||||
"skopeo",
|
||||
"criu",
|
||||
"slirp4netns",
|
||||
"fuse-overlayfs",
|
||||
"clevis",
|
||||
"clevis-dracut",
|
||||
"clevis-luks",
|
||||
"clevis-pin-tpm2",
|
||||
"parsec",
|
||||
"container-selinux",
|
||||
"containernetworking-plugins",
|
||||
"coreutils",
|
||||
"cracklib-dicts",
|
||||
"criu",
|
||||
"cryptsetup",
|
||||
"curl",
|
||||
"dbus-parsec",
|
||||
"iwl7260-firmware",
|
||||
"iwlax2xx-firmware",
|
||||
"dnsmasq",
|
||||
"dosfstools",
|
||||
"dracut-config-generic",
|
||||
"dracut-network",
|
||||
"e2fsprogs",
|
||||
"efibootmgr",
|
||||
"fedora-release-iot",
|
||||
"firewalld",
|
||||
"fwupd",
|
||||
"fwupd-efi",
|
||||
"fwupd-plugin-modem-manager",
|
||||
"fwupd-plugin-uefi-capsule-data",
|
||||
"glibc",
|
||||
"glibc-minimal-langpack",
|
||||
"gnupg2",
|
||||
"greenboot",
|
||||
"greenboot-default-health-checks",
|
||||
"gzip",
|
||||
"hostname",
|
||||
"ignition",
|
||||
"ima-evm-utils",
|
||||
"iproute",
|
||||
"iputils",
|
||||
"iwd",
|
||||
"iwlwifi-mvm-firmware",
|
||||
"kernel-tools",
|
||||
"keyutils",
|
||||
"less",
|
||||
"libsss_sudo",
|
||||
"linux-firmware",
|
||||
"lvm2",
|
||||
"netavark",
|
||||
"NetworkManager",
|
||||
"NetworkManager-wifi",
|
||||
"NetworkManager-wwan",
|
||||
"nss-altfiles",
|
||||
"openssl",
|
||||
"openssh-clients",
|
||||
"openssh-server",
|
||||
"parsec",
|
||||
"passwd",
|
||||
"pinentry",
|
||||
"podman",
|
||||
"podman-plugins",
|
||||
"policycoreutils",
|
||||
"policycoreutils-python-utils",
|
||||
"polkit",
|
||||
"procps-ng",
|
||||
"realtek-firmware",
|
||||
"rootfiles",
|
||||
"rpm",
|
||||
"screen",
|
||||
"selinux-policy-targeted",
|
||||
"setools-console",
|
||||
"setup",
|
||||
"shadow-utils",
|
||||
"skopeo",
|
||||
"slirp4netns",
|
||||
"sssd-client",
|
||||
"sudo",
|
||||
"systemd",
|
||||
"systemd-resolved",
|
||||
"tar",
|
||||
"tmux",
|
||||
"tpm2-pkcs11",
|
||||
"traceroute",
|
||||
"usbguard",
|
||||
"util-linux",
|
||||
"vim-minimal",
|
||||
"wpa_supplicant",
|
||||
"wireless-regdb",
|
||||
"xfsprogs",
|
||||
"xz",
|
||||
"zezere-ignition",
|
||||
"zram-generator",
|
||||
},
|
||||
}
|
||||
|
||||
return ps
|
||||
if !common.VersionLessThan(t.arch.distro.osVersion, "38") {
|
||||
ps = ps.Append(rpmmd.PackageSet{
|
||||
Include: []string{
|
||||
"fdo-client", // added in F38
|
||||
},
|
||||
})
|
||||
}
|
||||
|
||||
return ps
|
||||
}
|
||||
|
||||
// INSTALLER PACKAGE SET
|
||||
|
||||
func installerPackageSet(t *imageType) rpmmd.PackageSet {
|
||||
ps := rpmmd.PackageSet{
|
||||
return rpmmd.PackageSet{
|
||||
Include: []string{
|
||||
"anaconda-dracut",
|
||||
"atheros-firmware",
|
||||
"brcmfmac-firmware",
|
||||
"curl",
|
||||
"dracut-config-generic",
|
||||
"dracut-network",
|
||||
"hostname",
|
||||
"iwl100-firmware",
|
||||
"iwl1000-firmware",
|
||||
"iwl105-firmware",
|
||||
"iwl135-firmware",
|
||||
"iwl2000-firmware",
|
||||
"iwl2030-firmware",
|
||||
"iwl3160-firmware",
|
||||
"iwl5000-firmware",
|
||||
"iwl5150-firmware",
|
||||
"iwl6050-firmware",
|
||||
"iwl7260-firmware",
|
||||
"iwlwifi-dvm-firmware",
|
||||
"iwlwifi-mvm-firmware",
|
||||
"kernel",
|
||||
"linux-firmware",
|
||||
"less",
|
||||
"nfs-utils",
|
||||
"openssh-clients",
|
||||
"ostree",
|
||||
"plymouth",
|
||||
"realtek-firmware",
|
||||
"rng-tools",
|
||||
"rpcbind",
|
||||
"selinux-policy-targeted",
|
||||
|
|
@ -216,8 +219,6 @@ func installerPackageSet(t *imageType) rpmmd.PackageSet {
|
|||
"xz",
|
||||
},
|
||||
}
|
||||
|
||||
return ps
|
||||
}
|
||||
|
||||
func anacondaPackageSet(t *imageType) rpmmd.PackageSet {
|
||||
|
|
@ -235,9 +236,11 @@ func anacondaPackageSet(t *imageType) rpmmd.PackageSet {
|
|||
"anaconda-dracut",
|
||||
"anaconda-install-env-deps",
|
||||
"anaconda-widgets",
|
||||
"atheros-firmware",
|
||||
"audit",
|
||||
"bind-utils",
|
||||
"bitmap-fangsongti-fonts",
|
||||
"brcmfmac-firmware",
|
||||
"bzip2",
|
||||
"cryptsetup",
|
||||
"curl",
|
||||
|
|
@ -268,19 +271,8 @@ func anacondaPackageSet(t *imageType) rpmmd.PackageSet {
|
|||
"hostname",
|
||||
"initscripts",
|
||||
"ipmitool",
|
||||
"iwl1000-firmware",
|
||||
"iwl100-firmware",
|
||||
"iwl105-firmware",
|
||||
"iwl135-firmware",
|
||||
"iwl2000-firmware",
|
||||
"iwl2030-firmware",
|
||||
"iwl3160-firmware",
|
||||
"iwl5000-firmware",
|
||||
"iwl5150-firmware",
|
||||
"iwl6000g2a-firmware",
|
||||
"iwl6000g2b-firmware",
|
||||
"iwl6050-firmware",
|
||||
"iwl7260-firmware",
|
||||
"iwlwifi-dvm-firmware",
|
||||
"iwlwifi-mvm-firmware",
|
||||
"jomolhari-fonts",
|
||||
"kacst-farsi-fonts",
|
||||
"kacst-qurn-fonts",
|
||||
|
|
@ -325,6 +317,7 @@ func anacondaPackageSet(t *imageType) rpmmd.PackageSet {
|
|||
"plymouth",
|
||||
"python3-pyatspi",
|
||||
"rdma-core",
|
||||
"realtek-firmware",
|
||||
"rit-meera-new-fonts",
|
||||
"rng-tools",
|
||||
"rpcbind",
|
||||
|
|
@ -486,7 +479,6 @@ func containerPackageSet(t *imageType) rpmmd.PackageSet {
|
|||
"dnf-yum",
|
||||
"dnf",
|
||||
"fedora-release-container",
|
||||
"fedora-repos-modular",
|
||||
"glibc-minimal-langpack",
|
||||
"rootfiles",
|
||||
"rpm",
|
||||
|
|
@ -529,6 +521,14 @@ func containerPackageSet(t *imageType) rpmmd.PackageSet {
|
|||
},
|
||||
}
|
||||
|
||||
if common.VersionLessThan(t.arch.distro.osVersion, "39") {
|
||||
ps = ps.Append(rpmmd.PackageSet{
|
||||
Include: []string{
|
||||
"fedora-repos-modular",
|
||||
},
|
||||
})
|
||||
}
|
||||
|
||||
return ps
|
||||
}
|
||||
|
||||
|
|
|
|||
2
vendor/github.com/osbuild/images/pkg/distro/rhel7/azure.go
generated
vendored
2
vendor/github.com/osbuild/images/pkg/distro/rhel7/azure.go
generated
vendored
|
|
@ -25,7 +25,7 @@ var azureRhuiImgType = imageType{
|
|||
kernelOptions: "ro crashkernel=auto console=tty1 console=ttyS0 earlyprintk=ttyS0 rootdelay=300 scsi_mod.use_blk_mq=y",
|
||||
bootable: true,
|
||||
defaultSize: 64 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/distro/rhel7/images.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/distro/rhel7/images.go
generated
vendored
|
|
@ -216,7 +216,7 @@ func osCustomizations(
|
|||
return osc
|
||||
}
|
||||
|
||||
func liveImage(workload workload.Workload,
|
||||
func diskImage(workload workload.Workload,
|
||||
t *imageType,
|
||||
customizations *blueprint.Customizations,
|
||||
options distro.ImageOptions,
|
||||
|
|
@ -224,7 +224,7 @@ func liveImage(workload workload.Workload,
|
|||
containers []container.SourceSpec,
|
||||
rng *rand.Rand) (image.ImageKind, error) {
|
||||
|
||||
img := image.NewLiveImage()
|
||||
img := image.NewDiskImage()
|
||||
img.Platform = t.platform
|
||||
img.OSCustomizations = osCustomizations(t, packageSets[osPkgsKey], options, containers, customizations)
|
||||
img.Environment = t.environment
|
||||
|
|
|
|||
2
vendor/github.com/osbuild/images/pkg/distro/rhel7/qcow2.go
generated
vendored
2
vendor/github.com/osbuild/images/pkg/distro/rhel7/qcow2.go
generated
vendored
|
|
@ -19,7 +19,7 @@ var qcow2ImgType = imageType{
|
|||
defaultImageConfig: qcow2DefaultImgConfig,
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "qcow2"},
|
||||
exports: []string{"qcow2"},
|
||||
|
|
|
|||
12
vendor/github.com/osbuild/images/pkg/distro/rhel8/ami.go
generated
vendored
12
vendor/github.com/osbuild/images/pkg/distro/rhel8/ami.go
generated
vendored
|
|
@ -20,7 +20,7 @@ func amiImgTypeX86_64(rd distribution) imageType {
|
|||
kernelOptions: "console=ttyS0,115200n8 console=tty0 net.ifnames=0 rd.blacklist=nouveau nvme_core.io_timeout=4294967295 crashkernel=auto",
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image"},
|
||||
exports: []string{"image"},
|
||||
|
|
@ -49,7 +49,7 @@ func ec2ImgTypeX86_64(rd distribution) imageType {
|
|||
kernelOptions: "console=ttyS0,115200n8 console=tty0 net.ifnames=0 rd.blacklist=nouveau nvme_core.io_timeout=4294967295 crashkernel=auto",
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
@ -77,7 +77,7 @@ func ec2HaImgTypeX86_64(rd distribution) imageType {
|
|||
kernelOptions: "console=ttyS0,115200n8 console=tty0 net.ifnames=0 rd.blacklist=nouveau nvme_core.io_timeout=4294967295 crashkernel=auto",
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
@ -98,7 +98,7 @@ func amiImgTypeAarch64(rd distribution) imageType {
|
|||
kernelOptions: "console=ttyS0,115200n8 console=tty0 net.ifnames=0 rd.blacklist=nouveau nvme_core.io_timeout=4294967295 iommu.strict=0 crashkernel=auto",
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image"},
|
||||
exports: []string{"image"},
|
||||
|
|
@ -126,7 +126,7 @@ func ec2ImgTypeAarch64(rd distribution) imageType {
|
|||
kernelOptions: "console=ttyS0,115200n8 console=tty0 net.ifnames=0 rd.blacklist=nouveau nvme_core.io_timeout=4294967295 iommu.strict=0 crashkernel=auto",
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
@ -154,7 +154,7 @@ func ec2SapImgTypeX86_64(rd distribution) imageType {
|
|||
kernelOptions: "console=ttyS0,115200n8 console=tty0 net.ifnames=0 rd.blacklist=nouveau nvme_core.io_timeout=4294967295 crashkernel=auto processor.max_cstate=1 intel_idle.max_cstate=1",
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
|
|||
10
vendor/github.com/osbuild/images/pkg/distro/rhel8/azure.go
generated
vendored
10
vendor/github.com/osbuild/images/pkg/distro/rhel8/azure.go
generated
vendored
|
|
@ -26,7 +26,7 @@ func azureRhuiImgType() imageType {
|
|||
kernelOptions: defaultAzureKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 64 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
@ -47,7 +47,7 @@ func azureSapRhuiImgType(rd distribution) imageType {
|
|||
kernelOptions: defaultAzureKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 64 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
@ -67,7 +67,7 @@ func azureByosImgType() imageType {
|
|||
kernelOptions: defaultAzureKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc"},
|
||||
exports: []string{"vpc"},
|
||||
|
|
@ -88,7 +88,7 @@ func azureImgType() imageType {
|
|||
kernelOptions: defaultAzureKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc"},
|
||||
exports: []string{"vpc"},
|
||||
|
|
@ -110,7 +110,7 @@ func azureEap7RhuiImgType() imageType {
|
|||
kernelOptions: defaultAzureKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 64 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
|
|||
2
vendor/github.com/osbuild/images/pkg/distro/rhel8/distro.go
generated
vendored
2
vendor/github.com/osbuild/images/pkg/distro/rhel8/distro.go
generated
vendored
|
|
@ -125,7 +125,7 @@ func (d *distribution) getDefaultImageConfig() *distro.ImageConfig {
|
|||
// New creates a new distro object, defining the supported architectures and image types
|
||||
func New() distro.Distro {
|
||||
// default minor: create default minor version (current GA) and rename it
|
||||
d := newDistro("rhel", 7)
|
||||
d := newDistro("rhel", 8)
|
||||
d.name = "rhel-8"
|
||||
return d
|
||||
|
||||
|
|
|
|||
2
vendor/github.com/osbuild/images/pkg/distro/rhel8/edge.go
generated
vendored
2
vendor/github.com/osbuild/images/pkg/distro/rhel8/edge.go
generated
vendored
|
|
@ -152,7 +152,7 @@ func minimalRawImgType(rd distribution) imageType {
|
|||
kernelOptions: "ro no_timer_check console=ttyS0,115200n8 biosdevname=0 net.ifnames=0",
|
||||
bootable: true,
|
||||
defaultSize: 2 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/distro/rhel8/gce.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/distro/rhel8/gce.go
generated
vendored
|
|
@ -22,7 +22,7 @@ func gceImgType(rd distribution) imageType {
|
|||
kernelOptions: gceKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 20 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "archive"},
|
||||
exports: []string{"archive"},
|
||||
|
|
@ -43,7 +43,7 @@ func gceRhuiImgType(rd distribution) imageType {
|
|||
kernelOptions: gceKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 20 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "archive"},
|
||||
exports: []string{"archive"},
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/distro/rhel8/images.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/distro/rhel8/images.go
generated
vendored
|
|
@ -227,7 +227,7 @@ func osCustomizations(
|
|||
return osc
|
||||
}
|
||||
|
||||
func liveImage(workload workload.Workload,
|
||||
func diskImage(workload workload.Workload,
|
||||
t *imageType,
|
||||
customizations *blueprint.Customizations,
|
||||
options distro.ImageOptions,
|
||||
|
|
@ -235,7 +235,7 @@ func liveImage(workload workload.Workload,
|
|||
containers []container.SourceSpec,
|
||||
rng *rand.Rand) (image.ImageKind, error) {
|
||||
|
||||
img := image.NewLiveImage()
|
||||
img := image.NewDiskImage()
|
||||
img.Platform = t.platform
|
||||
img.OSCustomizations = osCustomizations(t, packageSets[osPkgsKey], options, containers, customizations)
|
||||
img.Environment = t.environment
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/distro/rhel8/qcow2.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/distro/rhel8/qcow2.go
generated
vendored
|
|
@ -22,7 +22,7 @@ func qcow2ImgType(rd distribution) imageType {
|
|||
},
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "qcow2"},
|
||||
exports: []string{"qcow2"},
|
||||
|
|
@ -58,7 +58,7 @@ func openstackImgType() imageType {
|
|||
kernelOptions: "ro net.ifnames=0",
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "qcow2"},
|
||||
exports: []string{"qcow2"},
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/distro/rhel8/vmdk.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/distro/rhel8/vmdk.go
generated
vendored
|
|
@ -18,7 +18,7 @@ func vmdkImgType() imageType {
|
|||
kernelOptions: vmdkKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vmdk"},
|
||||
exports: []string{"vmdk"},
|
||||
|
|
@ -37,7 +37,7 @@ func ovaImgType() imageType {
|
|||
kernelOptions: vmdkKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vmdk", "ovf", "archive"},
|
||||
exports: []string{"archive"},
|
||||
|
|
|
|||
12
vendor/github.com/osbuild/images/pkg/distro/rhel9/ami.go
generated
vendored
12
vendor/github.com/osbuild/images/pkg/distro/rhel9/ami.go
generated
vendored
|
|
@ -21,7 +21,7 @@ var (
|
|||
kernelOptions: amiKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image"},
|
||||
exports: []string{"image"},
|
||||
|
|
@ -39,7 +39,7 @@ var (
|
|||
kernelOptions: amiKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
@ -58,7 +58,7 @@ var (
|
|||
kernelOptions: amiKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
@ -76,7 +76,7 @@ var (
|
|||
kernelOptions: "console=ttyS0,115200n8 console=tty0 net.ifnames=0 rd.blacklist=nouveau nvme_core.io_timeout=4294967295 iommu.strict=0",
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image"},
|
||||
exports: []string{"image"},
|
||||
|
|
@ -95,7 +95,7 @@ var (
|
|||
kernelOptions: "console=ttyS0,115200n8 console=tty0 net.ifnames=0 rd.blacklist=nouveau nvme_core.io_timeout=4294967295 iommu.strict=0",
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
@ -114,7 +114,7 @@ var (
|
|||
kernelOptions: "console=ttyS0,115200n8 console=tty0 net.ifnames=0 rd.blacklist=nouveau nvme_core.io_timeout=4294967295 processor.max_cstate=1 intel_idle.max_cstate=1",
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
|
|||
6
vendor/github.com/osbuild/images/pkg/distro/rhel9/azure.go
generated
vendored
6
vendor/github.com/osbuild/images/pkg/distro/rhel9/azure.go
generated
vendored
|
|
@ -23,7 +23,7 @@ var (
|
|||
kernelOptions: defaultAzureKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc"},
|
||||
exports: []string{"vpc"},
|
||||
|
|
@ -42,7 +42,7 @@ var (
|
|||
kernelOptions: defaultAzureKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc"},
|
||||
exports: []string{"vpc"},
|
||||
|
|
@ -62,7 +62,7 @@ var (
|
|||
kernelOptions: defaultAzureKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 64 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vpc", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
|
|||
2
vendor/github.com/osbuild/images/pkg/distro/rhel9/distro.go
generated
vendored
2
vendor/github.com/osbuild/images/pkg/distro/rhel9/distro.go
generated
vendored
|
|
@ -126,7 +126,7 @@ func (d *distribution) getDefaultImageConfig() *distro.ImageConfig {
|
|||
|
||||
func New() distro.Distro {
|
||||
// default minor: create default minor version (current GA) and rename it
|
||||
d := newDistro("rhel", 1)
|
||||
d := newDistro("rhel", 2)
|
||||
d.name = "rhel-9"
|
||||
return d
|
||||
}
|
||||
|
|
|
|||
2
vendor/github.com/osbuild/images/pkg/distro/rhel9/edge.go
generated
vendored
2
vendor/github.com/osbuild/images/pkg/distro/rhel9/edge.go
generated
vendored
|
|
@ -184,7 +184,7 @@ var (
|
|||
kernelOptions: "ro no_timer_check console=ttyS0,115200n8 biosdevname=0 net.ifnames=0",
|
||||
bootable: true,
|
||||
defaultSize: 2 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "xz"},
|
||||
exports: []string{"xz"},
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/distro/rhel9/gce.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/distro/rhel9/gce.go
generated
vendored
|
|
@ -21,7 +21,7 @@ var (
|
|||
kernelOptions: gceKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 20 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "archive"},
|
||||
exports: []string{"archive"},
|
||||
|
|
@ -39,7 +39,7 @@ var (
|
|||
kernelOptions: gceKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 20 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "archive"},
|
||||
exports: []string{"archive"},
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/distro/rhel9/images.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/distro/rhel9/images.go
generated
vendored
|
|
@ -224,7 +224,7 @@ func osCustomizations(
|
|||
return osc
|
||||
}
|
||||
|
||||
func liveImage(workload workload.Workload,
|
||||
func diskImage(workload workload.Workload,
|
||||
t *imageType,
|
||||
customizations *blueprint.Customizations,
|
||||
options distro.ImageOptions,
|
||||
|
|
@ -232,7 +232,7 @@ func liveImage(workload workload.Workload,
|
|||
containers []container.SourceSpec,
|
||||
rng *rand.Rand) (image.ImageKind, error) {
|
||||
|
||||
img := image.NewLiveImage()
|
||||
img := image.NewDiskImage()
|
||||
img.Platform = t.platform
|
||||
img.OSCustomizations = osCustomizations(t, packageSets[osPkgsKey], options, containers, customizations)
|
||||
img.Environment = t.environment
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/distro/rhel9/qcow2.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/distro/rhel9/qcow2.go
generated
vendored
|
|
@ -23,7 +23,7 @@ var (
|
|||
kernelOptions: "ro net.ifnames=0",
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "qcow2"},
|
||||
exports: []string{"qcow2"},
|
||||
|
|
@ -162,7 +162,7 @@ func mkQcow2ImgType(d distribution) imageType {
|
|||
},
|
||||
bootable: true,
|
||||
defaultSize: 10 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "qcow2"},
|
||||
exports: []string{"qcow2"},
|
||||
|
|
|
|||
4
vendor/github.com/osbuild/images/pkg/distro/rhel9/vmdk.go
generated
vendored
4
vendor/github.com/osbuild/images/pkg/distro/rhel9/vmdk.go
generated
vendored
|
|
@ -22,7 +22,7 @@ var vmdkImgType = imageType{
|
|||
kernelOptions: vmdkKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vmdk"},
|
||||
exports: []string{"vmdk"},
|
||||
|
|
@ -42,7 +42,7 @@ var ovaImgType = imageType{
|
|||
kernelOptions: vmdkKernelOptions,
|
||||
bootable: true,
|
||||
defaultSize: 4 * common.GibiByte,
|
||||
image: liveImage,
|
||||
image: diskImage,
|
||||
buildPipelines: []string{"build"},
|
||||
payloadPipelines: []string{"os", "image", "vmdk", "ovf", "archive"},
|
||||
exports: []string{"archive"},
|
||||
|
|
|
|||
|
|
@ -16,7 +16,7 @@ import (
|
|||
"github.com/osbuild/images/pkg/runner"
|
||||
)
|
||||
|
||||
type LiveImage struct {
|
||||
type DiskImage struct {
|
||||
Base
|
||||
Platform platform.Platform
|
||||
PartitionTable *disk.PartitionTable
|
||||
|
|
@ -34,14 +34,14 @@ type LiveImage struct {
|
|||
OSNick string
|
||||
}
|
||||
|
||||
func NewLiveImage() *LiveImage {
|
||||
return &LiveImage{
|
||||
Base: NewBase("live-image"),
|
||||
func NewDiskImage() *DiskImage {
|
||||
return &DiskImage{
|
||||
Base: NewBase("disk"),
|
||||
PartTool: osbuild.PTSfdisk,
|
||||
}
|
||||
}
|
||||
|
||||
func (img *LiveImage) InstantiateManifest(m *manifest.Manifest,
|
||||
func (img *DiskImage) InstantiateManifest(m *manifest.Manifest,
|
||||
repos []rpmmd.RepoConfig,
|
||||
runner runner.Runner,
|
||||
rng *rand.Rand) (*artifact.Artifact, error) {
|
||||
8
vendor/github.com/osbuild/images/pkg/image/ostree_archive.go
generated
vendored
8
vendor/github.com/osbuild/images/pkg/image/ostree_archive.go
generated
vendored
|
|
@ -29,12 +29,15 @@ type OSTreeArchive struct {
|
|||
|
||||
OSVersion string
|
||||
Filename string
|
||||
|
||||
InstallWeakDeps bool
|
||||
}
|
||||
|
||||
func NewOSTreeArchive(ref string) *OSTreeArchive {
|
||||
return &OSTreeArchive{
|
||||
Base: NewBase("ostree-archive"),
|
||||
OSTreeRef: ref,
|
||||
Base: NewBase("ostree-archive"),
|
||||
OSTreeRef: ref,
|
||||
InstallWeakDeps: true,
|
||||
}
|
||||
}
|
||||
|
||||
|
|
@ -51,6 +54,7 @@ func (img *OSTreeArchive) InstantiateManifest(m *manifest.Manifest,
|
|||
osPipeline.Workload = img.Workload
|
||||
osPipeline.OSTreeParent = img.OSTreeParent
|
||||
osPipeline.OSTreeRef = img.OSTreeRef
|
||||
osPipeline.InstallWeakDeps = img.InstallWeakDeps
|
||||
|
||||
ostreeCommitPipeline := manifest.NewOSTreeCommit(m, buildPipeline, osPipeline, img.OSTreeRef)
|
||||
ostreeCommitPipeline.OSVersion = img.OSVersion
|
||||
|
|
|
|||
5
vendor/github.com/osbuild/images/pkg/manifest/anaconda_installer.go
generated
vendored
5
vendor/github.com/osbuild/images/pkg/manifest/anaconda_installer.go
generated
vendored
|
|
@ -145,8 +145,9 @@ func (p *AnacondaInstaller) getPackageSetChain(Distro) []rpmmd.PackageSet {
|
|||
}
|
||||
return []rpmmd.PackageSet{
|
||||
{
|
||||
Include: append(packages, p.ExtraPackages...),
|
||||
Repositories: append(p.repos, p.ExtraRepos...),
|
||||
Include: append(packages, p.ExtraPackages...),
|
||||
Repositories: append(p.repos, p.ExtraRepos...),
|
||||
InstallWeakDeps: true,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
|
|
|||
5
vendor/github.com/osbuild/images/pkg/manifest/build.go
generated
vendored
5
vendor/github.com/osbuild/images/pkg/manifest/build.go
generated
vendored
|
|
@ -59,8 +59,9 @@ func (p *Build) getPackageSetChain(distro Distro) []rpmmd.PackageSet {
|
|||
|
||||
return []rpmmd.PackageSet{
|
||||
{
|
||||
Include: packages,
|
||||
Repositories: p.repos,
|
||||
Include: packages,
|
||||
Repositories: p.repos,
|
||||
InstallWeakDeps: true,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
|
|
|||
5
vendor/github.com/osbuild/images/pkg/manifest/commit_server_tree.go
generated
vendored
5
vendor/github.com/osbuild/images/pkg/manifest/commit_server_tree.go
generated
vendored
|
|
@ -66,8 +66,9 @@ func (p *OSTreeCommitServer) getPackageSetChain(Distro) []rpmmd.PackageSet {
|
|||
packages := []string{"nginx"}
|
||||
return []rpmmd.PackageSet{
|
||||
{
|
||||
Include: append(packages, p.ExtraPackages...),
|
||||
Repositories: append(p.repos, p.ExtraRepos...),
|
||||
Include: append(packages, p.ExtraPackages...),
|
||||
Repositories: append(p.repos, p.ExtraRepos...),
|
||||
InstallWeakDeps: true,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
|
|
|||
5
vendor/github.com/osbuild/images/pkg/manifest/coreos_installer.go
generated
vendored
5
vendor/github.com/osbuild/images/pkg/manifest/coreos_installer.go
generated
vendored
|
|
@ -113,8 +113,9 @@ func (p *CoreOSInstaller) getPackageSetChain(Distro) []rpmmd.PackageSet {
|
|||
packages := p.getBootPackages()
|
||||
return []rpmmd.PackageSet{
|
||||
{
|
||||
Include: append(packages, p.ExtraPackages...),
|
||||
Repositories: append(p.repos, p.ExtraRepos...),
|
||||
Include: append(packages, p.ExtraPackages...),
|
||||
Repositories: append(p.repos, p.ExtraRepos...),
|
||||
InstallWeakDeps: true,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
|
|
|||
17
vendor/github.com/osbuild/images/pkg/manifest/os.go
generated
vendored
17
vendor/github.com/osbuild/images/pkg/manifest/os.go
generated
vendored
|
|
@ -164,6 +164,8 @@ type OS struct {
|
|||
OSProduct string
|
||||
OSVersion string
|
||||
OSNick string
|
||||
|
||||
InstallWeakDeps bool
|
||||
}
|
||||
|
||||
// NewOS creates a new OS pipeline. build is the build pipeline to use for
|
||||
|
|
@ -175,9 +177,10 @@ func NewOS(m *Manifest,
|
|||
repos []rpmmd.RepoConfig) *OS {
|
||||
name := "os"
|
||||
p := &OS{
|
||||
Base: NewBase(m, name, buildPipeline),
|
||||
repos: filterRepos(repos, name),
|
||||
platform: platform,
|
||||
Base: NewBase(m, name, buildPipeline),
|
||||
repos: filterRepos(repos, name),
|
||||
platform: platform,
|
||||
InstallWeakDeps: true,
|
||||
}
|
||||
buildPipeline.addDependent(p)
|
||||
m.addPipeline(p)
|
||||
|
|
@ -227,11 +230,13 @@ func (p *OS) getPackageSetChain(Distro) []rpmmd.PackageSet {
|
|||
}
|
||||
|
||||
osRepos := append(p.repos, p.ExtraBaseRepos...)
|
||||
|
||||
chain := []rpmmd.PackageSet{
|
||||
{
|
||||
Include: append(packages, p.ExtraBasePackages...),
|
||||
Exclude: p.ExcludeBasePackages,
|
||||
Repositories: osRepos,
|
||||
Include: append(packages, p.ExtraBasePackages...),
|
||||
Exclude: p.ExcludeBasePackages,
|
||||
Repositories: osRepos,
|
||||
InstallWeakDeps: p.InstallWeakDeps,
|
||||
},
|
||||
}
|
||||
|
||||
|
|
|
|||
7
vendor/github.com/osbuild/images/pkg/rpmmd/repository.go
generated
vendored
7
vendor/github.com/osbuild/images/pkg/rpmmd/repository.go
generated
vendored
|
|
@ -123,9 +123,10 @@ func (pkg Package) ToPackageInfo() PackageInfo {
|
|||
// to exclude. The Repositories are used when depsolving this package set in
|
||||
// addition to the base repositories.
|
||||
type PackageSet struct {
|
||||
Include []string
|
||||
Exclude []string
|
||||
Repositories []RepoConfig
|
||||
Include []string
|
||||
Exclude []string
|
||||
Repositories []RepoConfig
|
||||
InstallWeakDeps bool
|
||||
}
|
||||
|
||||
// Append the Include and Exclude package list from another PackageSet and
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue