78d389526c
This is a squash of two changes that have unfortunately simultaneously broken the gate. The functests are failing with sha256sum: bionic-server-cloudimg-amd64.squashfs.manifest: No such file or directory I think what has happened here is that the SHA256 sums file being used has got a new entry "bionic-server-cloudimg-amd64.squashfs.manifest" which is showing up in a grep for "bionic-server-cloudimg-amd64.squashfs". sha256 then tries to also check this hash, and has started failing. To avoid this, add an EOL marker to the grep so it only matches the exact filename. Change I7fb585bc5ccc52803eea107e76dddf5e9fde8646 updated the containerfile tests to Jammy and it seems that cgroups v2 prevents podman running inside docker [1]. While we investigate, move this testing back to focal. [1] https://github.com/containers/podman/issues/14884 Change-Id: I1af9f5599168aadc1e7fcdfae281935e6211a597 |
||
---|---|---|
.. | ||
environment.d | ||
post-install.d | ||
pre-install.d | ||
root.d | ||
test-elements | ||
element-deps | ||
element-provides | ||
package-installs.yaml | ||
README.rst |
====== ubuntu ====== Use Ubuntu cloud images as the baseline for built disk images. Overrides: * To use a non-default URL for downloading base Ubuntu cloud images, use the environment variable ``DIB_CLOUD_IMAGES`` * To download a non-default release of Ubuntu cloud images, use the environment variable ``DIB_RELEASE``. This element will export the ``DIB_RELEASE`` variable. * Use ``DIB_DISTRIBUTION_MIRROR`` to override the ``sources.list`` with an alternative mirror * Setting ``DIB_DISTRIBUTION_MIRROR_UBUNTU_IGNORE`` to an extended-regexp (i.e. the argument to the ``=~`` bash comparitor) which, when matched, will *not* set that line to the ``DIB_DISTRIBUTION_MIRROR``. For example, if your local mirror does not mirror the universe and multiverse components, set this to ``(universe|multiverse)`` * Setting ``DIB_DISTRIBUTION_MIRROR_UBUNTU_INSECURE`` updates apt settings to allow insecure/unuthenticated repositories. * Setting ``DIB_OFFLINE`` will prevent to download again the source image if is already present in to $DIB_IMAGE_CACHE path. * Setting ``DIB_LOCAL_IMAGE`` to use a image from a local source (full path and file name) and not download image from internet. Local source for release Trusty have to be tar.gz format. For other more recent release get the squashfs image. .. element_deps::