No description
Find a file
Tomas Hozza 6f464949f5 target: move Filename from target options to Target
The filename of the image as produced by osbuild for a given export is
currently set in each target options type in the `Filename` struct
member. However, the value is not really specific to any target type,
but to the specific export used for the target. For this reason move the
value form target type options to the `Target` struct inside a new
struct `OsbuildArtifact` under the name`ExportFilename`.

The backward compatibility with older implementations of the composer
and workers is kept on the JSON (Un)mashaling level, where the JSON
object is always a super-set of the old and new way of providing the
export filename in the Target.
2022-07-01 18:55:01 +01:00
.devcontainer Devcontainer update to Fedora 36. 2022-05-04 10:44:21 +02:00
.github container: add support for uploading to registries 2022-06-29 10:02:46 +02:00
cmd target: move Filename from target options to Target 2022-07-01 18:55:01 +01:00
containers entrypoint - add parameters for socket bind address and port 2022-05-04 09:13:40 +02:00
distribution docker-compose: fix osbuild-worker unable load libcrypt.so.1 2022-06-18 11:39:10 +01:00
docs Doc: remove unused doc/news directory 2021-11-24 14:55:47 +01:00
image-types image-types: Add research document for GCE image type 2022-04-14 19:07:31 +01:00
internal target: move Filename from target options to Target 2022-07-01 18:55:01 +01:00
repositories distro: add an alias for rhel-91 2022-05-03 18:13:28 +02:00
schutzbot Fedora - Use vendor instead of rpm dependencies 2022-06-23 18:02:09 +02:00
templates packer: pin the vector version 2022-06-07 09:08:22 +02:00
test tests/libvirt: boot with uefi on rhel and centos 2022-07-01 13:00:52 +03:00
tools tools/generic_s3: remove unused condition 2022-07-01 13:00:52 +03:00
vendor container: add support for uploading to registries 2022-06-29 10:02:46 +02:00
.env docker-compose: integrate dev container 2022-02-27 20:55:03 +00:00
.gitignore tools: AppSRE packer build 2022-01-05 22:13:55 +01:00
.gitlab-ci.yml CI: Don't run ContainerUpload job on scheduled pipelines 2022-07-01 13:00:52 +03:00
.gitleaks.toml gitleaks: add allow list for test passwords and keys 2021-10-01 16:56:26 +02:00
.golangci.yml golangci: enable gosec in golangci 2021-12-13 12:17:30 +02:00
.packit.yaml Fedora - Use vendor instead of rpm dependencies 2022-06-23 18:02:09 +02:00
.pylintrc github/workflows: check dnf-json with pylint 2022-03-08 12:42:12 +01:00
codecov.yml codevoc: fix threshold 2020-05-17 10:12:06 +02:00
CONTRIBUTING.md Improve contributing.md 2021-11-23 08:25:07 +01:00
DEPLOYING.md Add DEPLOYING.md 2020-10-20 15:43:30 +02:00
dnf-json dnf-json: fix depsolve error handling 2022-06-27 20:41:34 +02:00
docker-compose.yml docker-compose: integrate dev container 2022-02-27 20:55:03 +00:00
go.mod container: add support for uploading to registries 2022-06-29 10:02:46 +02:00
go.sum container: add support for uploading to registries 2022-06-29 10:02:46 +02:00
HACKING.md docker-compose: integrate dev container 2022-02-27 20:55:03 +00:00
krb5.conf upload/koji: add support for GSSAPI/Kerberos auth 2020-08-27 17:29:57 +01:00
LICENSE Revert "Fill in the license template" 2019-11-15 15:26:51 +01:00
Makefile Fedora - Use vendor instead of rpm dependencies 2022-06-23 18:02:09 +02:00
osbuild-composer.spec remove cloud cleaner 2022-07-01 17:47:44 +02:00
README.md Add build requirement in README.md 2022-01-28 15:16:47 +01:00
Schutzfile rpmbuild: add fedora-36 2022-06-23 12:30:20 +02:00

OSBuild Composer

Operating System Image Composition Services

The composer project is a set of HTTP services for composing operating system images. It builds on the pipeline execution engine of osbuild and defines its own class of images that it supports building.

Multiple APIs are available to access a composer service. This includes support for the lorax-composer API, and as such can serve as drop-in replacement for lorax-composer.

You can control a composer instance either directly via the provided APIs, or through higher-level user-interfaces from external projects. This, for instance, includes a Cockpit Module or using the composer-cli command-line tool.

Project

Contributing

Please refer to the developer guide to learn about our workflow, code style and more.

About

Composer is a middleman between the workhorses from osbuild and the user-interfaces like cockpit-composer, composer-cli, or others. It defines a set of high-level image compositions that it supports building. Builds of these compositions can be requested via the different APIs of Composer, which will then translate the requests into pipeline-descriptions for osbuild. The pipeline output is then either provided back to the user, or uploaded to a user specified target.

The following image visualizes the overall architecture of the OSBuild infrastructure and the place that Composer takes:

overview

Consult the osbuild-composer(7) man-page for an introduction into composer, information on running your own composer instance, as well as details on the provided infrastructure and services.

Requirements

The requirements for this project are:

  • osbuild >= 26
  • systemd >= 244

At build-time, the following software is required:

  • go >= 1.16
  • python-docutils >= 0.13
  • krb5-devel for fedora/rhel or libkrb5-dev for debian/ubuntu`

Build

The standard go package system is used. Consult upstream documentation for detailed help. In most situations the following commands are sufficient to build and install from source:

mkdir build
go build -o build ./...

The man-pages require python-docutils and can be built via:

make man

Repository:

Pull request gating

Each pull request against osbuild-composer starts a series of automated tests. Tests run via GitHub Actions and Jenkins. Each push to the pull request will launch theses tests automatically.

Jenkins only tests pull requests from members of the osbuild organization in GitHub. A member of the osbuild organization must say ok to test in a pull request comment to approve testing. Anyone can ask for testing to run by saying the bot's favorite word, schutzbot, in a pull request comment. Testing will begin shortly after the comment is posted.

Test results in Jenkins are available by clicking the Details link on the right side of the Schutzbot check in the pull request page.

License:

  • Apache-2.0
  • See LICENSE file for details.