From a281cca0387edee94d6660a4ab2db31296b9b932 Mon Sep 17 00:00:00 2001 From: Monty Taylor Date: Thu, 11 Dec 2014 18:04:58 -0800 Subject: [PATCH] Add element for ubuntu-core Ubuntu has recently release their "Snappy Ubuntu Core" which is a minimal base-layer for running docker applications. Seems like the sort of thing someone might want to use for tasks. Change-Id: I6cb724451d1862121dee4ccf1f599ab8938f0b7f --- elements/ubuntu-core/README.md | 10 +++ elements/ubuntu-core/element-deps | 3 + elements/ubuntu-core/element-provides | 1 + .../environment.d/10-ubuntu-distro-name.bash | 1 + elements/ubuntu-core/package-installs.yaml | 3 + .../ubuntu-core/root.d/10-cache-ubuntu-image | 83 +++++++++++++++++++ 6 files changed, 101 insertions(+) create mode 100644 elements/ubuntu-core/README.md create mode 100644 elements/ubuntu-core/element-deps create mode 100644 elements/ubuntu-core/element-provides create mode 100644 elements/ubuntu-core/environment.d/10-ubuntu-distro-name.bash create mode 100644 elements/ubuntu-core/package-installs.yaml create mode 100755 elements/ubuntu-core/root.d/10-cache-ubuntu-image diff --git a/elements/ubuntu-core/README.md b/elements/ubuntu-core/README.md new file mode 100644 index 00000000..5c9c4760 --- /dev/null +++ b/elements/ubuntu-core/README.md @@ -0,0 +1,10 @@ +Use Ubuntu Core cloud images as the baseline for built disk images. + +Overrides: + + * To use a non-default URL for downloading base Ubuntu cloud images, + use the environment variable DIB\_CLOUD\_IMAGES + * To download a non-default release of Ubuntu cloud images, use the + environment variable DIB\_RELEASE + * To use different mirrors rather than the default of archive.ubuntu.com and + security.ubuntu.com, use the environment variable DIB\_DISTRIBUTION\_MIRROR diff --git a/elements/ubuntu-core/element-deps b/elements/ubuntu-core/element-deps new file mode 100644 index 00000000..0617448f --- /dev/null +++ b/elements/ubuntu-core/element-deps @@ -0,0 +1,3 @@ +cache-url +dib-run-parts +dpkg diff --git a/elements/ubuntu-core/element-provides b/elements/ubuntu-core/element-provides new file mode 100644 index 00000000..a72e0496 --- /dev/null +++ b/elements/ubuntu-core/element-provides @@ -0,0 +1 @@ +operating-system diff --git a/elements/ubuntu-core/environment.d/10-ubuntu-distro-name.bash b/elements/ubuntu-core/environment.d/10-ubuntu-distro-name.bash new file mode 100644 index 00000000..0fb91527 --- /dev/null +++ b/elements/ubuntu-core/environment.d/10-ubuntu-distro-name.bash @@ -0,0 +1 @@ +export DISTRO_NAME=ubuntu diff --git a/elements/ubuntu-core/package-installs.yaml b/elements/ubuntu-core/package-installs.yaml new file mode 100644 index 00000000..85d46fff --- /dev/null +++ b/elements/ubuntu-core/package-installs.yaml @@ -0,0 +1,3 @@ +apt-xapian-index: + phase: pre-install.d + uninstall: True diff --git a/elements/ubuntu-core/root.d/10-cache-ubuntu-image b/elements/ubuntu-core/root.d/10-cache-ubuntu-image new file mode 100755 index 00000000..6b63dd73 --- /dev/null +++ b/elements/ubuntu-core/root.d/10-cache-ubuntu-image @@ -0,0 +1,83 @@ +#!/bin/bash +# These are useful, or at worst not harmful, for all images we build. + +set -eux +set -o pipefail + +[ -n "$ARCH" ] +[ -n "$TARGET_ROOT" ] + +shopt -s extglob + +DIB_CLOUD_IMAGES=${DIB_CLOUD_IMAGES:-http://cdimage.ubuntu.com/ubuntu-core/preview} +DIB_RELEASE=${DIB_RELEASE:-alpha-01} +BASE_IMAGE_FILE=${BASE_IMAGE_FILE:-ubuntu-core-$DIB_RELEASE.img} +BASE_IMAGE_TAR=$DIB_RELEASE-ubuntu-core.tgz +SHA256SUMS=${SHA256SUMS:-$DIB_CLOUD_IMAGES/SHA256SUMS} +CACHED_FILE=$DIB_IMAGE_CACHE/$BASE_IMAGE_FILE +CACHED_TAR=$DIB_IMAGE_CACHE/$BASE_IMAGE_TAR +CACHED_SUMS=$DIB_IMAGE_CACHE/SHA256SUMS.ubuntu-core.$DIB_RELEASE + +if [ -n "$DIB_OFFLINE" -a -f "$CACHED_TAR" ] ; then + echo "Not checking freshness of cached $CACHED_TAR" +else + echo "Fetching Base Image" + $TMP_HOOKS_PATH/bin/cache-url $SHA256SUMS $CACHED_SUMS + $TMP_HOOKS_PATH/bin/cache-url $DIB_CLOUD_IMAGES/$BASE_IMAGE_FILE $CACHED_FILE + + pushd $DIB_IMAGE_CACHE + if ! grep "$BASE_IMAGE_FILE" $CACHED_SUMS | sha256sum --check - ; then + # It is likely that an upstream http(s) proxy has given us a skewed + # result - either a cached SHA file or a cached image. Use cache-busting + # to get (as long as caches are compliant...) fresh files. + # Try the sha256sum first, just in case that is the stale one (avoiding + # downloading the larger image), and then if the sums still fail retry + # the image. + $TMP_HOOKS_PATH/bin/cache-url -f $SHA256SUMS $CACHED_SUMS + if ! grep "$BASE_IMAGE_FILE" $CACHED_SUMS | sha256sum --check - ; then + $TMP_HOOKS_PATH/bin/cache-url -f \ + $DIB_CLOUD_IMAGES/$BASE_IMAGE_FILE $CACHED_FILE + grep "$BASE_IMAGE_FILE" $CACHED_SUMS | sha256sum --check - + fi + fi + popd + + if [ ! -f $CACHED_TAR -o \ + $DIB_IMAGE_CACHE/$BASE_IMAGE_FILE -nt $CACHED_TAR ] ; then + + echo "Repacking base image as tarball." + WORKING=$(mktemp -d) + EACTION="rm -r $WORKING" + trap "$EACTION" EXIT + RAW_FILE=$(basename $BASE_IMAGE_FILE) + RAW_FILE=${RAW_FILE%.img}.raw + qemu-img convert -f qcow2 -O raw $CACHED_FILE $WORKING/$RAW_FILE + MAGIC_BIT=p1 + # NOTE: On RHEL, partprobe of /dev/loop0 does not create /dev/loop0p2, + # while kpartx at least creates /dev/mapper/loop0p2. + LOOPDEV=$(sudo kpartx -av $WORKING/$RAW_FILE | awk "/loop[0-9]+$MAGIC_BIT/ {print \$3}") + # If running inside Docker, make our nodes manually, because udev will not be working. + if [ -f /.dockerenv ]; then + sudo dmsetup --noudevsync mknodes + fi + export LOOPDEV=$LOOPDEV + echo "Loop device is set to: $LOOPDEV" + if ! timeout 5 sh -c "while ! [ -e /dev/mapper/$LOOPDEV ]; do sleep 1; done"; then + echo "Error: Could not find /dev/mapper/$LOOPDEV" + exit 1 + fi + EACTION="sudo kpartx -d $WORKING/$RAW_FILE;$EACTION" + trap "$EACTION" EXIT + mkdir $WORKING/mnt + sudo mount /dev/mapper/$LOOPDEV $WORKING/mnt + EACTION="sudo umount -f $WORKING/mnt;$EACTION" + trap "$EACTION" EXIT + # Chroot in so that we get the correct uid/gid + sudo chroot $WORKING/mnt bin/tar -cz . > $WORKING/tmp.tar + mv $WORKING/tmp.tar $DIB_IMAGE_CACHE/$BASE_IMAGE_TAR + fi +fi + +# Extract the base image (use --numeric-owner to avoid UID/GID mismatch between +# image tarball and host OS e.g. when building Ubuntu image on an openSUSE host) +sudo tar -C $TARGET_ROOT --numeric-owner -xzf $DIB_IMAGE_CACHE/$BASE_IMAGE_TAR