forked from mgoltzsche/podman-static
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Makefile
177 lines (151 loc) · 6.78 KB
/
Makefile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
PODMAN_IMAGE_NAME ?= mgoltzsche/podman
PODMAN_IMAGE ?= $(PODMAN_IMAGE_NAME):latest
PODMAN_IMAGE_TARGET ?= podmanall
PODMAN_MINIMAL_IMAGE ?= $(PODMAN_IMAGE)-minimal
PODMAN_REMOTE_IMAGE ?= $(PODMAN_IMAGE)-remote
PODMAN_SSH_IMAGE ?= mgoltzsche/podman-ssh
GPG_IMAGE=gpg-signer
ASSET_NAME2=podman-linux-x86
ASSET_NAME=podman-linux-amd64
BUILD_DIR=build/$(ASSET_NAME)
BUILD_DIR2=build/$(ASSET_NAME2)
POD_VERSION=main
# TODO: Make the tests work with podman in podman (GitHub's workflow runner also supports podman)
#DOCKER ?= $(if $(shell podman -v),podman,docker)
DOCKER ?= docker
images: podman podman-remote podman-minimal
podman:
$(DOCKER) build --force-rm -t $(PODMAN_IMAGE) --build-arg PODMAN_VERSION=$(POD_VERSION) --target $(PODMAN_IMAGE_TARGET) .
podman2:
$(DOCKER) build --force-rm -t $(PODMAN_IMAGE) --build-arg PODMAN_VERSION=$(POD_VERSION) --target $(PODMAN_IMAGE_TARGET) -f Dockerfilex86 .
podman-minimal:
make podman PODMAN_IMAGE=$(PODMAN_MINIMAL_IMAGE) PODMAN_IMAGE_TARGET=rootlesspodmanminimal
podman-remote:
$(DOCKER) build --force-rm -t $(PODMAN_REMOTE_IMAGE) -f Dockerfile-remote .
podman-ssh: podman
$(DOCKER) build --force-rm -t $(PODMAN_SSH_IMAGE) -f Dockerfile-ssh --build-arg BASEIMAGE=$(PODMAN_IMAGE) .
test: test-local-rootless test-local-rootful test-minimal-image test-remote
test-local-rootful: podman storage-dir
IMAGE=$(PODMAN_IMAGE) ./test/test-local-rootful.sh
test-local-rootless: podman storage-dir
IMAGE=$(PODMAN_IMAGE) ./test/test-local-rootless.sh
test-minimal-image: podman-minimal storage-dir
IMAGE=$(PODMAN_MINIMAL_IMAGE) TEST_PREDICATE=MINIMAL SKIP_PORTMAPPING_TEST=true ./test/test-local-rootless.sh
storage-dir: clean-storage-dir
mkdir -p test/storage/root
mkdir -pm 1777 test/storage/user
clean-storage-dir:
$(DOCKER) run --rm -v "`pwd`/test:/test" alpine:3.12 rm -rf /test/storage
test-remote: podman podman-remote
PODMAN_IMAGE=$(PODMAN_IMAGE) \
PODMAN_REMOTE_IMAGE=$(PODMAN_REMOTE_IMAGE) \
./test/test-remote.sh
install:
cp -r build/podman-linux-amd64/usr build/podman-linux-amd64/etc /
tar: .podman-from-container
rm -f $(BUILD_DIR).tar.gz
tar -C build -czvf $(BUILD_DIR).tar.gz $(ASSET_NAME)
tar2: .podman-from-container2
rm -f $(BUILD_DIR2).tar.gz
tar -C build -czvf $(BUILD_DIR2).tar.gz $(ASSET_NAME2)
.podman-from-container2: podman2
rm -rf $(BUILD_DIR2)
mkdir -p $(BUILD_DIR2)/etc $(BUILD_DIR2)/usr/local/bin $(BUILD_DIR2)/usr/libexec
cp -r conf/containers $(BUILD_DIR2)/etc/containers
cp -r conf/cni $(BUILD_DIR2)/etc/cni
cp README.md $(BUILD_DIR2)/
curl -fsSL -o catatonit https://github.com/openSUSE/catatonit/releases/latest/download/catatonit.x86_64
chmod a+x catatonit
set -e; \
CONTAINER=`$(DOCKER) create $(PODMAN_IMAGE)`; \
for BINARY in podman runc fusermount3 fuse-overlayfs slirp4netns; do \
$(DOCKER) cp $$CONTAINER:/usr/local/bin/$$BINARY $(BUILD_DIR2)/usr/local/bin/; \
done; \
$(DOCKER) cp $$CONTAINER:/usr/libexec/podman $(BUILD_DIR2)/usr/libexec/podman; \
$(DOCKER) cp $$CONTAINER:/usr/libexec/cni $(BUILD_DIR2)/usr/libexec/cni; \
$(DOCKER) rm $$CONTAINER
cp catatonit $(BUILD_DIR2)/usr/libexec/podman/
.podman-from-container: podman
rm -rf $(BUILD_DIR)
mkdir -p $(BUILD_DIR)/etc $(BUILD_DIR)/usr/local/bin $(BUILD_DIR)/usr/libexec
cp -r conf/containers $(BUILD_DIR)/etc/containers
cp -r conf/cni $(BUILD_DIR)/etc/cni
cp rootless.bash $(BUILD_DIR)/
cp README.md $(BUILD_DIR)/
curl -fsSL -o catatonit https://github.com/openSUSE/catatonit/releases/latest/download/catatonit.x86_64
chmod a+x catatonit
curl -fsSL -o netavark.gz https://github.com/containers/netavark/releases/latest/download/netavark.gz
gunzip netavark.gz && chmod a+x netavark
set -e; \
CONTAINER=`$(DOCKER) create $(PODMAN_IMAGE)`; \
for BINARY in podman crun runc fusermount3 fuse-overlayfs slirp4netns; do \
$(DOCKER) cp $$CONTAINER:/usr/local/bin/$$BINARY $(BUILD_DIR)/usr/local/bin/; \
done; \
$(DOCKER) cp $$CONTAINER:/usr/libexec/podman $(BUILD_DIR)/usr/libexec/podman; \
$(DOCKER) cp $$CONTAINER:/usr/libexec/cni $(BUILD_DIR)/usr/libexec/cni; \
$(DOCKER) rm $$CONTAINER
cp catatonit $(BUILD_DIR)/usr/libexec/podman/
cp netavark $(BUILD_DIR)/usr/libexec/podman/
signed-tar: tar .gpg
@echo Running gpg signing container with GPG_SIGN_KEY and GPG_SIGN_KEY_PASSPHRASE
export GPG_SIGN_KEY
export GPG_SIGN_KEY_PASSPHRASE
@$(DOCKER) run --rm -v "`pwd`/build:/build" \
-e GPG_SIGN_KEY="$$GPG_SIGN_KEY" \
-e GPG_SIGN_KEY_PASSPHRASE="$$GPG_SIGN_KEY_PASSPHRASE" \
$(GPG_IMAGE) /bin/sh -c ' \
set -e; \
[ "$$GPG_SIGN_KEY" -a "$$GPG_SIGN_KEY_PASSPHRASE" ] || (echo Missing GPG_SIGN_KEY or GPG_SIGN_KEY_PASSPHRASE >&2; false); \
echo "$$GPG_SIGN_KEY" | gpg --batch --import -; \
rm -f $(BUILD_DIR).tar.gz.asc; \
echo "$$GPG_SIGN_KEY_PASSPHRASE" | (set -x; gpg --pinentry-mode loopback --command-fd 0 -a -o $(BUILD_DIR).tar.gz.asc --detach-sign $(BUILD_DIR).tar.gz)'
verify-signature:
( \
for _ in `seq 1 10`; do \
TMPDIR=$$(mktemp -d); \
export GNUPGHOME=$$TMPDIR; \
gpg --keyserver ha.pool.sks-keyservers.net --recv-keys 0CCF102C4F95D89E583FF1D4F8B5AF50344BB503 && \
gpg --list-keys && \
gpg --batch --verify $(BUILD_DIR).tar.gz.asc $(BUILD_DIR).tar.gz && \
rm -rf $$TMPDIR && \
exit 0 || \
sleep 1; \
rm -rf $$TMPDIR; \
done; \
exit 1; \
)
.gpg:
$(DOCKER) build --force-rm -t $(GPG_IMAGE) --target gpg .
run:
$(DOCKER) run -ti --rm --privileged \
-v "`pwd`/test/storage/user":/podman/.local/share/containers/storage \
$(PODMAN_IMAGE) /bin/sh
clean: clean-storage-dir
rm -rf build
run-server: podman-ssh
# TODO: make sshd log to stdout (while still ensuring that we know when it is available)
$(DOCKER) run --rm --privileged --network=host \
-v "`pwd`/storage/user":/podman/.local/share/containers/storage \
-v "`pwd`/test:/build" \
-w /build \
"${PODMAN_SSH_IMAGE}" \
sh -c 'set -x; \
ssh-keygen -b 2048 -t rsa -N "" -f /podman/.ssh/ssh_host_rsa_key; \
ssh-keygen -b 521 -t ecdsa -N "" -f /podman/.ssh/ssh_host_ecdsa_key; \
[ -f /build/storage/user/client_rsa ] || ssh-keygen -b 2048 -t rsa -N "" -f /build/storage/user/client_rsa; \
cat /build/storage/user/client_rsa.pub > /podman/.ssh/authorized_keys; \
/usr/sbin/sshd -eD -f ~/.ssh/sshd_config & \
mkdir /tmp/podman; \
podman system service -t 0 unix:///tmp/podman/podman.sock'
# TODO: fix build run for external client
# see ssh connection: https://github.com/containers/podman/blob/v2.0.4/pkg/bindings/connection.go#L73
run-client: podman-remote
$(DOCKER) run --rm -it --network=host \
-v "`pwd`/test:/build" \
-w /build \
-e PODMAN_URL=ssh://podman@127.0.0.1:2222/tmp/podman/podman.sock?secure=True \
-e CONTAINER_SSHKEY=/build/storage/user/client_rsa \
"${PODMAN_REMOTE_IMAGE}" \
/bin/sh -c 'set -ex; \
podman --url=$$PODMAN_URL --log-level=info build /build/test'
#ssh -o "StrictHostKeyChecking no" -i /build/client_rsa podman@127.0.0.1 -p 2222 echo hello