3833c2e59c
Ic68e8c5b839cbc2852326747c68ef89f630f26a3 removed the sudo from the tar extraction here, meaning that production is failing to create the chroot. This is hidden in testing because DIB_CONTAINERFILE_PODMAN_ROOT is set. Make the sudo here unconditional. Change-Id: I6e36e3fc65981f85fad12ea2cd10780fde9c37da
69 lines
2.1 KiB
Bash
Executable file
69 lines
2.1 KiB
Bash
Executable file
#!/bin/bash
|
|
#
|
|
# Copyright 2015 Hewlett-Packard Development Company, L.P.
|
|
# Copyright 2019 Red Hat, INC.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
if [ ${DIB_DEBUG_TRACE:-1} -gt 0 ]; then
|
|
set -x
|
|
fi
|
|
set -eu
|
|
set -o pipefail
|
|
|
|
if [ -f ${TARGET_ROOT}/.extra_settings ] ; then
|
|
. ${TARGET_ROOT}/.extra_settings
|
|
fi
|
|
|
|
if [ -z "${DIB_CONTAINERFILE_DOCKERFILE:-}" ]; then
|
|
_xtrace=$(set +o | grep xtrace)
|
|
set +o xtrace
|
|
|
|
eval declare -A image_elements=($(get_image_element_array))
|
|
|
|
for i in "${!image_elements[@]}"; do
|
|
element=$i
|
|
element_dir=${image_elements[$i]}
|
|
|
|
containerfile="${element_dir}/containerfiles/${DIB_RELEASE}"
|
|
if [ -f "${containerfile}" ]; then
|
|
echo "Found container file ${containerfile}"
|
|
DIB_CONTAINERFILE_DOCKERFILE="${containerfile}"
|
|
break
|
|
fi
|
|
done
|
|
|
|
$_xtrace
|
|
fi
|
|
|
|
# Use the image cache directory as the default context, so anything
|
|
# there is automatically available for COPY commands.
|
|
DIB_CONTAINER_CONTEXT=${DIB_CONTAINER_CONTEXT:-${DIB_IMAGE_CACHE}/containerfile}
|
|
|
|
mkdir -p $DIB_CONTAINER_CONTEXT
|
|
|
|
if [[ ${DIB_CONTAINERFILE_PODMAN_ROOT:-0} -gt 0 ]]; then
|
|
_sudo="sudo"
|
|
else
|
|
_sudo=""
|
|
fi
|
|
|
|
${_sudo} podman build -t dib-work-image -f $DIB_CONTAINERFILE_DOCKERFILE $DIB_CONTAINER_CONTEXT
|
|
container=$(${_sudo} podman run -d dib-work-image /bin/sh)
|
|
# NOTE(ianw) 2021-11-10 the tar must always be sudo to write out the chroot files
|
|
# as other uids
|
|
${_sudo} podman export $container | sudo tar -C $TARGET_ROOT --numeric-owner -xf -
|
|
${_sudo} podman rm $container
|
|
${_sudo} podman rmi dib-work-image
|
|
|
|
sudo rm -f ${TARGET_ROOT}/.extra_settings
|