No description
Find a file
Tomas Hozza a4b0efb278 provision.sh: add none authentication method for on-premise scenario
`tools/provision.sh` is provisioning SUT always in the same way for
both, the Service scenario and the on-premise scenario. While this is
not causing any issues, it does not realistically represent how we
expect osbuild-composer and worker to be used in these scenarios.

The script currently supports the following authentication options:
- `none`
  - Intended for the on-premise scenario with Weldr API.
  - NO certificates are generated.
  - NO osbuild-composer configuration file is created.
  - NO osbuild-worker configuration file is created. This means that no
    cloud provider credentials are configured directly in the worker.
  - Only the local worker is started and used.
  - Only the Weldr API socker is started.
  - Appropriate repository definitions are copied to
    `/etc/osbuild-composer/repositories/`.
- `jwt`
  - Intended for the Service scenario with Cloud API.
  - Should be the only method supported in the Service scenario in the
    future.
  - Certificates are generated and copied to `/etc/osbuild-composer`.
  - osbuild-composer configuration file is created and configured for
    JWT authentication.
  - osbuild-worker configuration file is created, configured for JWT
    authentication and with appropriate cloud provider credentials.
  - Local worker unit is masked. Only the remote worker is used (the
    socket is started and one remote-worker instance is created).
  - Only the Cloud API socket is started (Weldr API socket is stopped).
  - NO repository definitions are copied to
    `/etc/osbuild-composer/repositories/`.
- `tls`
  - Intended for the Service scenario with Cloud API.
  - Should eventually go away.
  - Certificates are generated and copied to `/etc/osbuild-composer`.
  - osbuild-composer configuration file is created and configured for
    TLS client cert authentication.
  - osbuild-worker configuration file is created, configured for TLS
    authentication and with appropriate cloud provider credentials.
  - Services and sockets are started as they used to be originally:
    - Both local and remote worker sockets are started.
    - Both Weldr and Cloud API sockets are started.
    - Only the local worker unit will be started automatically.
  - NO repository definitions are copied to
    `/etc/osbuild-composer/repositories/`.
2022-08-04 11:55:43 +02:00
.devcontainer Devcontainer update to Fedora 36. 2022-05-04 10:44:21 +02:00
.github tools/koji-compose.py: test with pylint and fix found issues 2022-08-04 11:55:43 +02:00
cmd worker: fix crash if no autoscale instance is defined 2022-08-04 11:26:42 +02:00
containers containers/osbuild-composer: Remove dnf-json 2022-07-05 11:04:20 +02:00
distribution test: suffix the currently used test configurations with -tls 2022-08-04 11:55:43 +02:00
docs Doc: remove unused doc/news directory 2021-11-24 14:55:47 +01:00
image-types image-types: Add research document for GCE image type 2022-04-14 19:07:31 +01:00
internal cloudapi: Add test for osbuild job failure due to target errors 2022-08-03 13:51:52 +02:00
pkg/jobqueue dbjobqueue: fix bad errors.As usages 2022-07-27 18:29:59 +02:00
repositories remove all traces of fedora 34 2022-07-18 20:38:33 +02:00
schutzbot schutzbot: add thozza's SSH public key 2022-08-04 11:55:43 +02:00
templates templates: filter worker dashboard on arch 2022-08-03 13:38:52 +02:00
test provision.sh: add none authentication method for on-premise scenario 2022-08-04 11:55:43 +02:00
tools provision.sh: add none authentication method for on-premise scenario 2022-08-04 11:55:43 +02:00
vendor container: ability to resolve containers to specs 2022-07-21 13:32:07 +02:00
.env docker-compose: integrate dev container 2022-02-27 20:55:03 +00:00
.gitignore tools: AppSRE packer build 2022-01-05 22:13:55 +01:00
.gitlab-ci.yml tests/api: add container related test 2022-08-01 21:50:03 +01:00
.gitleaks.toml gitleaks: add allow list for test passwords and keys 2021-10-01 16:56:26 +02:00
.golangci.yml golangci: enable gosec in golangci 2021-12-13 12:17:30 +02:00
.packit.yaml packit: Enable Bodhi update feature 2022-07-13 10:08:23 +02:00
.pylintrc github/workflows: check dnf-json with pylint 2022-03-08 12:42:12 +01:00
codecov.yml codevoc: fix threshold 2020-05-17 10:12:06 +02:00
CONTRIBUTING.md Improve contributing.md 2021-11-23 08:25:07 +01:00
DEPLOYING.md Add DEPLOYING.md 2020-10-20 15:43:30 +02:00
dnf-json dnf-json: fix depsolve error handling 2022-06-27 20:41:34 +02:00
docker-compose.yml docker-compose: integrate dev container 2022-02-27 20:55:03 +00:00
go.mod container: ability to resolve containers to specs 2022-07-21 13:32:07 +02:00
go.sum build(deps): bump gopkg.in/ini.v1 from 1.66.4 to 1.66.6 2022-07-07 13:19:10 +02:00
HACKING.md docker-compose: integrate dev container 2022-02-27 20:55:03 +00:00
krb5.conf upload/koji: add support for GSSAPI/Kerberos auth 2020-08-27 17:29:57 +01:00
LICENSE Revert "Fill in the license template" 2019-11-15 15:26:51 +01:00
Makefile osbuild-service-maintenance: Move maintenance queries out of jobqueue 2022-07-04 15:37:28 +02:00
osbuild-composer.spec test: extract common JTW code from the multi-tenancy.sh test 2022-08-04 11:55:43 +02:00
README.md Add build requirement in README.md 2022-01-28 15:16:47 +01:00
Schutzfile ci: pin osbuild to include pytoml fix 2022-07-26 17:07:31 +02:00

OSBuild Composer

Operating System Image Composition Services

The composer project is a set of HTTP services for composing operating system images. It builds on the pipeline execution engine of osbuild and defines its own class of images that it supports building.

Multiple APIs are available to access a composer service. This includes support for the lorax-composer API, and as such can serve as drop-in replacement for lorax-composer.

You can control a composer instance either directly via the provided APIs, or through higher-level user-interfaces from external projects. This, for instance, includes a Cockpit Module or using the composer-cli command-line tool.

Project

Contributing

Please refer to the developer guide to learn about our workflow, code style and more.

About

Composer is a middleman between the workhorses from osbuild and the user-interfaces like cockpit-composer, composer-cli, or others. It defines a set of high-level image compositions that it supports building. Builds of these compositions can be requested via the different APIs of Composer, which will then translate the requests into pipeline-descriptions for osbuild. The pipeline output is then either provided back to the user, or uploaded to a user specified target.

The following image visualizes the overall architecture of the OSBuild infrastructure and the place that Composer takes:

overview

Consult the osbuild-composer(7) man-page for an introduction into composer, information on running your own composer instance, as well as details on the provided infrastructure and services.

Requirements

The requirements for this project are:

  • osbuild >= 26
  • systemd >= 244

At build-time, the following software is required:

  • go >= 1.16
  • python-docutils >= 0.13
  • krb5-devel for fedora/rhel or libkrb5-dev for debian/ubuntu`

Build

The standard go package system is used. Consult upstream documentation for detailed help. In most situations the following commands are sufficient to build and install from source:

mkdir build
go build -o build ./...

The man-pages require python-docutils and can be built via:

make man

Repository:

Pull request gating

Each pull request against osbuild-composer starts a series of automated tests. Tests run via GitHub Actions and Jenkins. Each push to the pull request will launch theses tests automatically.

Jenkins only tests pull requests from members of the osbuild organization in GitHub. A member of the osbuild organization must say ok to test in a pull request comment to approve testing. Anyone can ask for testing to run by saying the bot's favorite word, schutzbot, in a pull request comment. Testing will begin shortly after the comment is posted.

Test results in Jenkins are available by clicking the Details link on the right side of the Schutzbot check in the pull request page.

License:

  • Apache-2.0
  • See LICENSE file for details.