No description
Find a file
Tomas Hozza 1a3cbb282a image-info: Add workaround for listing services by status
`image-info` tools parses output of `systemctl list-unit-files` run on a
different tree (with `--root` option), to determine the list of enabled
and disabled services on the inspected image. However since Fedora 33
(and presumably since systemd v246), the output of `systemctl
list-unit-files` changed. Some units previously reported as "enabled" or
"disabled" are now reported as "alias", which means, that they are just
a symlink to a different unit.

There is no systemd command, that would take an "alias" unit and would
report its state as "enabled" or "disabled" and could run on a different
tree (with "--root" option).

To make the list of reported services in the given state consistent on
systems with older and new (v246+) systemd version, check all "alias"
units and append them to the list of services with a specific status,
if their target is also listed in in the list.

Example of the `systemctl list-unit-files` output change:

~]# rpm -q systemd
systemd-246.6-3.fc33.x86_64
~]# systemctl list-unit-files ctrl-alt-del.target
UNIT FILE           STATE VENDOR PRESET
ctrl-alt-del.target alias -

~]# rpm -q systemd
systemd-245.8-2.fc32.x86_64
~]# systemctl list-unit-files ctrl-alt-del.target
UNIT FILE           STATE   VENDOR PRESET
ctrl-alt-del.target enabled disabled

This change makes it possible to produce consistent output for an
inspected image, regardless if the `image-info` tool is run on Fedora
32, Fedora 33 or RHEL-8.

Also regenerate all Fedora 33 test cases, since this commit changes the
content of produced list of enabled / disabled services since Fedora 33.
The list is now consistent with what would be produced by `image-info`
for an image on older Fedora (e.g. 32) or RHEL-8.

Signed-off-by: Tomas Hozza <thozza@redhat.com>
2021-02-01 11:22:57 +01:00
.github .github: add checklist to PR template 2021-01-15 13:21:12 +01:00
cmd test/image: Fix test cases directory path in doc and code 2021-01-12 15:36:52 +01:00
containers/osbuild-composer containers: Specify port for the composer-api as argument 2020-12-23 17:31:29 +01:00
distribution containers: Make config path configurable 2021-01-30 13:20:11 +00:00
docs docs/news: rhel84 remove rng from added packaged/services 2021-02-01 11:20:35 +01:00
image-types image-types: Update RHEL8 Amazon EC2 image information 2021-01-15 17:48:19 +01:00
internal distro/rhel84: remove rng-tools from qcow2 2021-02-01 11:20:35 +01:00
repositories tree-wide: drop f31 support 2020-10-21 09:04:13 +02:00
schutzbot schutzbot: prolong the timeout to 12 hours 2021-01-16 13:36:47 +01:00
test image-info: Add workaround for listing services by status 2021-02-01 11:22:57 +01:00
tools image-info: Add workaround for listing services by status 2021-02-01 11:22:57 +01:00
vendor upload/azure: use the new azure/azblob API on Fedora 33+ & RHEL 2021-01-06 16:31:28 +01:00
.gitignore .gitignore: ignore vscode state 2020-11-11 18:16:42 +01:00
.golangci.yml ci/lint: add integration tag 2020-03-17 20:36:58 +01:00
codecov.yml codevoc: fix threshold 2020-05-17 10:12:06 +02:00
CONTRIBUTING.md rcm: drop sub-package 2020-07-17 19:13:15 +01:00
DEPLOYING.md Add DEPLOYING.md 2020-10-20 15:43:30 +02:00
dnf-json dnf-json: don't initialize dnf plugins 2020-08-23 16:08:25 +02:00
go.mod upload/azure: use the new azure/azblob API on Fedora 33+ & RHEL 2021-01-06 16:31:28 +01:00
go.sum upload/azure: use the new azure/azblob API on Fedora 33+ & RHEL 2021-01-06 16:31:28 +01:00
HACKING.md HACKING: Describe disadvantages of container setup 2021-01-30 13:20:11 +00:00
krb5.conf upload/koji: add support for GSSAPI/Kerberos auth 2020-08-27 17:29:57 +01:00
LICENSE Revert "Fill in the license template" 2019-11-15 15:26:51 +01:00
Makefile Makefile: define commit on make (s)rpm 2020-11-17 08:56:17 +00:00
NEWS.md 26 2020-12-16 18:54:26 +01:00
osbuild-composer.spec spec: Add tools/gen-certs.sh to test package 2021-01-30 13:20:11 +00:00
README.md bump minimal Go version to 1.13 2020-08-25 10:42:21 +02:00
Schutzfile tests: pre-install EPEL for koji-osbuild rev dep test on RHEL 2020-12-18 09:04:38 +01:00

OSBuild Composer

Operating System Image Composition Services

The composer project is a set of HTTP services for composing operating system images. It builds on the pipeline execution engine of osbuild and defines its own class of images that it supports building.

Multiple APIs are available to access a composer service. This includes support for the lorax-composer API, and as such can serve as drop-in replacement for lorax-composer.

You can control a composer instance either directly via the provided APIs, or through higher-level user-interfaces from external projects. This, for instance, includes a Cockpit Module or using the composer-cli command-line tool.

Project

About

Composer is a middleman between the workhorses from osbuild and the user-interfaces like cockpit-composer, composer-cli, or others. It defines a set of high-level image compositions that it supports building. Builds of these compositions can be requested via the different APIs of Composer, which will then translate the requests into pipeline-descriptions for osbuild. The pipeline output is then either provided back to the user, or uploaded to a user specified target.

The following image visualizes the overall architecture of the OSBuild infrastructure and the place that Composer takes:

overview

Consult the osbuild-composer(7) man-page for an introduction into composer, information on running your own composer instance, as well as details on the provided infrastructure and services.

Requirements

The requirements for this project are:

  • osbuild >= 11
  • systemd >= 244

At build-time, the following software is required:

  • go >= 1.13
  • python-docutils >= 0.13

Build

The standard go package system is used. Consult upstream documentation for detailed help. In most situations the following commands are sufficient to build and install from source:

mkdir build
go build -o build ./...

The man-pages require python-docutils and can be built via:

make man

Repository:

Pull request gating

Each pull request against osbuild-composer starts a series of automated tests. Tests run via GitHub Actions and Jenkins. Each push to the pull request will launch theses tests automatically.

Jenkins only tests pull requests from members of the osbuild organization in GitHub. A member of the osbuild organization must say ok to test in a pull request comment to approve testing. Anyone can ask for testing to run by saying the bot's favorite word, schutzbot, in a pull request comment. Testing will begin shortly after the comment is posted.

Test results in Jenkins are available by clicking the Details link on the right side of the Schutzbot check in the pull request page.

License:

  • Apache-2.0
  • See LICENSE file for details.