2017-01-03 16:20:15 +01:00
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
|
|
|
;;; Copyright © 2017 Ricardo Wurmus <rekado@elephly.net>
|
2019-05-10 22:32:10 +02:00
|
|
|
;;; Copyright © 2017, 2018, 2019 Ludovic Courtès <ludo@gnu.org>
|
2018-03-15 05:09:13 +01:00
|
|
|
;;; Copyright © 2018 Chris Marusich <cmmarusich@gmail.com>
|
2017-01-03 16:20:15 +01:00
|
|
|
;;;
|
|
|
|
;;; This file is part of GNU Guix.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
;;; your option) any later version.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
;;;
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
(define-module (guix docker)
|
Switch to Guile-Gcrypt.
This removes (guix hash) and (guix pk-crypto), which now live as part of
Guile-Gcrypt (version 0.1.0.)
* guix/gcrypt.scm, guix/hash.scm, guix/pk-crypto.scm,
tests/hash.scm, tests/pk-crypto.scm: Remove.
* configure.ac: Test for Guile-Gcrypt. Remove LIBGCRYPT and
LIBGCRYPT_LIBDIR assignments.
* m4/guix.m4 (GUIX_ASSERT_LIBGCRYPT_USABLE): Remove.
* README: Add Guile-Gcrypt to the dependencies; move libgcrypt as
"required unless --disable-daemon".
* doc/guix.texi (Requirements): Likewise.
* gnu/packages/bash.scm, guix/derivations.scm, guix/docker.scm,
guix/git.scm, guix/http-client.scm, guix/import/cpan.scm,
guix/import/cran.scm, guix/import/crate.scm, guix/import/elpa.scm,
guix/import/gnu.scm, guix/import/hackage.scm,
guix/import/texlive.scm, guix/import/utils.scm, guix/nar.scm,
guix/pki.scm, guix/scripts/archive.scm,
guix/scripts/authenticate.scm, guix/scripts/download.scm,
guix/scripts/hash.scm, guix/scripts/pack.scm,
guix/scripts/publish.scm, guix/scripts/refresh.scm,
guix/scripts/substitute.scm, guix/store.scm,
guix/store/deduplication.scm, guix/tests.scm, tests/base32.scm,
tests/builders.scm, tests/challenge.scm, tests/cpan.scm,
tests/crate.scm, tests/derivations.scm, tests/gem.scm,
tests/nar.scm, tests/opam.scm, tests/pki.scm,
tests/publish.scm, tests/pypi.scm, tests/store-deduplication.scm,
tests/store.scm, tests/substitute.scm: Adjust imports.
* gnu/system/vm.scm: Likewise.
(guile-sqlite3&co): Rename to...
(gcrypt-sqlite3&co): ... this. Add GUILE-GCRYPT.
(expression->derivation-in-linux-vm)[config]: Remove.
(iso9660-image)[config]: Remove.
(qemu-image)[config]: Remove.
(system-docker-image)[config]: Remove.
* guix/scripts/pack.scm: Adjust imports.
(guile-sqlite3&co): Rename to...
(gcrypt-sqlite3&co): ... this. Add GUILE-GCRYPT.
(self-contained-tarball)[build]: Call 'make-config.scm' without
#:libgcrypt argument.
(squashfs-image)[libgcrypt]: Remove.
[build]: Call 'make-config.scm' without #:libgcrypt.
(docker-image)[config, json]: Remove.
[build]: Add GUILE-GCRYPT to the extensions Remove (guix config) from
the imported modules.
* guix/self.scm (specification->package): Remove "libgcrypt", add
"guile-gcrypt".
(compiled-guix): Remove #:libgcrypt.
[guile-gcrypt]: New variable.
[dependencies]: Add it.
[*core-modules*]: Remove #:libgcrypt from 'make-config.scm' call.
Add #:extensions.
[*config*]: Remove #:libgcrypt from 'make-config.scm' call.
(%dependency-variables): Remove %libgcrypt.
(make-config.scm): Remove #:libgcrypt.
* build-aux/build-self.scm (guile-gcrypt): New variable.
(make-config.scm): Remove #:libgcrypt.
(build-program)[fake-gcrypt-hash]: New variable.
Add (gcrypt hash) to the imported modules. Adjust load path
assignments.
* gnu/packages/package-management.scm (guix)[propagated-inputs]: Add
GUILE-GCRYPT.
[arguments]: In 'wrap-program' phase, add GUILE-GCRYPT to the search
path.
2018-08-31 17:07:07 +02:00
|
|
|
#:use-module (gcrypt hash)
|
utils: Move base16 procedures to (guix base16).
* guix/utils.scm (bytevector->base16-string, base16-string->bytevector):
Move to...
* guix/base16.scm: ... here. New file.
* tests/utils.scm ("bytevector->base16-string->bytevector"): Move to...
* tests/base16.scm: ... here. New file.
* Makefile.am (MODULES): Add guix/base16.scm.
(SCM_TESTS): Add tests/base16.scm.
* build-aux/download.scm, guix/derivations.scm,
guix/docker.scm, guix/import/snix.scm, guix/pk-crypto.scm,
guix/scripts/authenticate.scm, guix/scripts/download.scm,
guix/scripts/hash.scm, guix/store.scm, tests/hash.scm,
tests/pk-crypto.scm: Adjust imports accordingly.
2017-03-15 21:54:34 +01:00
|
|
|
#:use-module (guix base16)
|
2017-01-03 16:20:15 +01:00
|
|
|
#:use-module ((guix build utils)
|
2017-03-16 22:40:06 +01:00
|
|
|
#:select (mkdir-p
|
|
|
|
delete-file-recursively
|
2018-03-15 05:09:13 +01:00
|
|
|
with-directory-excursion
|
|
|
|
invoke))
|
2018-11-03 21:53:07 +01:00
|
|
|
#:use-module (gnu build install)
|
2018-05-28 18:22:24 +02:00
|
|
|
#:use-module (json) ;guile-json
|
2017-03-16 21:41:38 +01:00
|
|
|
#:use-module (srfi srfi-19)
|
2018-03-15 05:09:13 +01:00
|
|
|
#:use-module (srfi srfi-26)
|
|
|
|
#:use-module ((texinfo string-utils)
|
|
|
|
#:select (escape-special-chars))
|
2017-01-03 16:20:15 +01:00
|
|
|
#:use-module (rnrs bytevectors)
|
|
|
|
#:use-module (ice-9 match)
|
|
|
|
#:export (build-docker-image))
|
|
|
|
|
2018-03-15 05:09:13 +01:00
|
|
|
;; Generate a 256-bit identifier in hexadecimal encoding for the Docker image.
|
2017-01-03 16:20:15 +01:00
|
|
|
(define docker-id
|
|
|
|
(compose bytevector->base16-string sha256 string->utf8))
|
|
|
|
|
|
|
|
(define (layer-diff-id layer)
|
|
|
|
"Generate a layer DiffID for the given LAYER archive."
|
|
|
|
(string-append "sha256:" (bytevector->base16-string (file-sha256 layer))))
|
|
|
|
|
|
|
|
;; This is the semantic version of the JSON metadata schema according to
|
|
|
|
;; https://github.com/docker/docker/blob/master/image/spec/v1.2.md
|
|
|
|
;; It is NOT the version of the image specification.
|
|
|
|
(define schema-version "1.0")
|
|
|
|
|
|
|
|
(define (image-description id time)
|
|
|
|
"Generate a simple image description."
|
|
|
|
`((id . ,id)
|
|
|
|
(created . ,time)
|
|
|
|
(container_config . #nil)))
|
|
|
|
|
|
|
|
(define (generate-tag path)
|
|
|
|
"Generate an image tag for the given PATH."
|
|
|
|
(match (string-split (basename path) #\-)
|
|
|
|
((hash name . rest) (string-append name ":" hash))))
|
|
|
|
|
|
|
|
(define (manifest path id)
|
|
|
|
"Generate a simple image manifest."
|
|
|
|
`(((Config . "config.json")
|
|
|
|
(RepoTags . (,(generate-tag path)))
|
|
|
|
(Layers . (,(string-append id "/layer.tar"))))))
|
|
|
|
|
|
|
|
;; According to the specifications this is required for backwards
|
|
|
|
;; compatibility. It duplicates information provided by the manifest.
|
|
|
|
(define (repositories path id)
|
|
|
|
"Generate a repositories file referencing PATH and the image ID."
|
|
|
|
`((,(generate-tag path) . ((latest . ,id)))))
|
|
|
|
|
|
|
|
;; See https://github.com/opencontainers/image-spec/blob/master/config.md
|
2019-05-10 22:32:10 +02:00
|
|
|
(define* (config layer time arch #:key entry-point)
|
2017-01-03 16:20:15 +01:00
|
|
|
"Generate a minimal image configuration for the given LAYER file."
|
|
|
|
;; "architecture" must be values matching "platform.arch" in the
|
|
|
|
;; runtime-spec at
|
|
|
|
;; https://github.com/opencontainers/runtime-spec/blob/v1.0.0-rc2/config.md#platform
|
|
|
|
`((architecture . ,arch)
|
|
|
|
(comment . "Generated by GNU Guix")
|
|
|
|
(created . ,time)
|
2019-05-10 22:32:10 +02:00
|
|
|
(config . ,(if entry-point
|
|
|
|
`((entrypoint . ,entry-point))
|
|
|
|
#nil))
|
2017-01-03 16:20:15 +01:00
|
|
|
(container_config . #nil)
|
|
|
|
(os . "linux")
|
|
|
|
(rootfs . ((type . "layers")
|
|
|
|
(diff_ids . (,(layer-diff-id layer)))))))
|
|
|
|
|
2017-03-16 21:56:10 +01:00
|
|
|
(define %tar-determinism-options
|
|
|
|
;; GNU tar options to produce archives deterministically.
|
|
|
|
'("--sort=name" "--mtime=@1"
|
|
|
|
"--owner=root:0" "--group=root:0"))
|
|
|
|
|
2017-03-16 22:40:06 +01:00
|
|
|
(define symlink-source
|
|
|
|
(match-lambda
|
|
|
|
((source '-> target)
|
|
|
|
(string-trim source #\/))))
|
|
|
|
|
|
|
|
(define (topmost-component file)
|
|
|
|
"Return the topmost component of FILE. For instance, if FILE is \"/a/b/c\",
|
|
|
|
return \"a\"."
|
|
|
|
(match (string-tokenize file (char-set-complement (char-set #\/)))
|
|
|
|
((first rest ...)
|
|
|
|
first)))
|
|
|
|
|
2018-03-15 05:09:13 +01:00
|
|
|
(define* (build-docker-image image paths prefix
|
|
|
|
#:key
|
2017-03-16 22:40:06 +01:00
|
|
|
(symlinks '())
|
2018-03-15 05:09:13 +01:00
|
|
|
(transformations '())
|
2017-03-17 22:45:32 +01:00
|
|
|
(system (utsname:machine (uname)))
|
2018-11-03 21:53:07 +01:00
|
|
|
database
|
2019-05-10 22:32:10 +02:00
|
|
|
entry-point
|
2018-03-15 05:09:13 +01:00
|
|
|
compressor
|
2017-03-16 21:41:38 +01:00
|
|
|
(creation-time (current-time time-utc)))
|
2018-03-15 05:09:13 +01:00
|
|
|
"Write to IMAGE a Docker image archive containing the given PATHS. PREFIX
|
|
|
|
must be a store path that is a prefix of any store paths in PATHS.
|
|
|
|
|
2018-11-03 21:53:07 +01:00
|
|
|
When DATABASE is true, copy it to /var/guix/db in the image and create
|
|
|
|
/var/guix/gcroots and friends.
|
|
|
|
|
2019-05-10 22:32:10 +02:00
|
|
|
When ENTRY-POINT is true, it must be a list of strings; it is stored as the
|
|
|
|
entry point in the Docker image JSON structure.
|
|
|
|
|
2018-03-15 05:09:13 +01:00
|
|
|
SYMLINKS must be a list of (SOURCE -> TARGET) tuples describing symlinks to be
|
|
|
|
created in the image, where each TARGET is relative to PREFIX.
|
|
|
|
TRANSFORMATIONS must be a list of (OLD -> NEW) tuples describing how to
|
|
|
|
transform the PATHS. Any path in PATHS that begins with OLD will be rewritten
|
|
|
|
in the Docker image so that it begins with NEW instead. If a path is a
|
|
|
|
non-empty directory, then its contents will be recursively added, as well.
|
|
|
|
|
|
|
|
SYSTEM is a GNU triplet (or prefix thereof) of the system the binaries in
|
|
|
|
PATHS are for; it is used to produce metadata in the image. Use COMPRESSOR, a
|
|
|
|
command such as '(\"gzip\" \"-9n\"), to compress IMAGE. Use CREATION-TIME, a
|
|
|
|
SRFI-19 time-utc object, as the creation time in metadata."
|
|
|
|
(define (sanitize path-fragment)
|
|
|
|
(escape-special-chars
|
|
|
|
;; GNU tar strips the leading slash off of absolute paths before applying
|
|
|
|
;; the transformations, so we need to do the same, or else our
|
|
|
|
;; replacements won't match any paths.
|
|
|
|
(string-trim path-fragment #\/)
|
|
|
|
;; Escape the basic regexp special characters (see: "(sed) BRE syntax").
|
|
|
|
;; We also need to escape "/" because we use it as a delimiter.
|
|
|
|
"/*.^$[]\\"
|
|
|
|
#\\))
|
|
|
|
(define transformation->replacement
|
|
|
|
(match-lambda
|
|
|
|
((old '-> new)
|
|
|
|
;; See "(tar) transform" for details on the expression syntax.
|
|
|
|
(string-append "s/^" (sanitize old) "/" (sanitize new) "/"))))
|
|
|
|
(define (transformations->expression transformations)
|
|
|
|
(let ((replacements (map transformation->replacement transformations)))
|
|
|
|
(string-append
|
|
|
|
;; Avoid transforming link targets, since that would break some links
|
|
|
|
;; (e.g., symlinks that point to an absolute store path).
|
|
|
|
"flags=rSH;"
|
|
|
|
(string-join replacements ";")
|
|
|
|
;; Some paths might still have a leading path delimiter even after tar
|
|
|
|
;; transforms them (e.g., "/a/b" might be transformed into "/b"), so
|
|
|
|
;; strip any leading path delimiters that remain.
|
|
|
|
";s,^//*,,")))
|
|
|
|
(define transformation-options
|
|
|
|
(if (eq? '() transformations)
|
|
|
|
'()
|
|
|
|
`("--transform" ,(transformations->expression transformations))))
|
|
|
|
(let* ((directory "/tmp/docker-image") ;temporary working directory
|
|
|
|
(id (docker-id prefix))
|
|
|
|
(time (date->string (time-utc->date creation-time) "~4"))
|
|
|
|
(arch (let-syntax ((cond* (syntax-rules ()
|
|
|
|
((_ (pattern clause) ...)
|
|
|
|
(cond ((string-prefix? pattern system)
|
|
|
|
clause)
|
|
|
|
...
|
|
|
|
(else
|
|
|
|
(error "unsupported system"
|
|
|
|
system)))))))
|
|
|
|
(cond* ("x86_64" "amd64")
|
|
|
|
("i686" "386")
|
|
|
|
("arm" "arm")
|
|
|
|
("mips64" "mips64le")))))
|
2017-03-16 18:02:59 +01:00
|
|
|
;; Make sure we start with a fresh, empty working directory.
|
|
|
|
(mkdir directory)
|
2018-03-15 05:09:13 +01:00
|
|
|
(with-directory-excursion directory
|
|
|
|
(mkdir id)
|
|
|
|
(with-directory-excursion id
|
|
|
|
(with-output-to-file "VERSION"
|
|
|
|
(lambda () (display schema-version)))
|
|
|
|
(with-output-to-file "json"
|
|
|
|
(lambda () (scm->json (image-description id time))))
|
|
|
|
|
|
|
|
;; Create SYMLINKS.
|
|
|
|
(for-each (match-lambda
|
|
|
|
((source '-> target)
|
|
|
|
(let ((source (string-trim source #\/)))
|
|
|
|
(mkdir-p (dirname source))
|
|
|
|
(symlink (string-append prefix "/" target)
|
|
|
|
source))))
|
|
|
|
symlinks)
|
|
|
|
|
2018-11-03 21:53:07 +01:00
|
|
|
(when database
|
|
|
|
;; Initialize /var/guix, assuming PREFIX points to a profile.
|
|
|
|
(install-database-and-gc-roots "." database prefix))
|
|
|
|
|
2018-03-15 05:09:13 +01:00
|
|
|
(apply invoke "tar" "-cf" "layer.tar"
|
|
|
|
`(,@transformation-options
|
|
|
|
,@%tar-determinism-options
|
|
|
|
,@paths
|
2018-11-03 21:53:07 +01:00
|
|
|
,@(if database '("var") '())
|
2018-03-15 05:09:13 +01:00
|
|
|
,@(map symlink-source symlinks)))
|
|
|
|
;; It is possible for "/" to show up in the archive, especially when
|
|
|
|
;; applying transformations. For example, the transformation
|
|
|
|
;; "s,^/a,," will (perhaps surprisingly) cause GNU tar to transform
|
|
|
|
;; the path "/a" into "/". The presence of "/" in the archive is
|
|
|
|
;; probably benign, but it is definitely safe to remove it, so let's
|
|
|
|
;; do that. This fails when "/" is not in the archive, so use system*
|
2018-11-29 09:30:00 +01:00
|
|
|
;; instead of invoke to avoid an exception in that case, and redirect
|
|
|
|
;; stderr to the bit bucket to avoid "Exiting with failure status"
|
|
|
|
;; error messages.
|
|
|
|
(with-error-to-port (%make-void-port "w")
|
|
|
|
(lambda ()
|
|
|
|
(system* "tar" "--delete" "/" "-f" "layer.tar")))
|
|
|
|
|
2018-03-15 05:09:13 +01:00
|
|
|
(for-each delete-file-recursively
|
|
|
|
(map (compose topmost-component symlink-source)
|
2018-11-03 21:53:07 +01:00
|
|
|
symlinks))
|
|
|
|
|
|
|
|
;; Delete /var/guix.
|
|
|
|
(when database
|
|
|
|
(delete-file-recursively "var")))
|
2018-03-15 05:09:13 +01:00
|
|
|
|
|
|
|
(with-output-to-file "config.json"
|
|
|
|
(lambda ()
|
|
|
|
(scm->json (config (string-append id "/layer.tar")
|
2019-05-10 22:32:10 +02:00
|
|
|
time arch
|
|
|
|
#:entry-point entry-point))))
|
2018-03-15 05:09:13 +01:00
|
|
|
(with-output-to-file "manifest.json"
|
|
|
|
(lambda ()
|
|
|
|
(scm->json (manifest prefix id))))
|
|
|
|
(with-output-to-file "repositories"
|
|
|
|
(lambda ()
|
|
|
|
(scm->json (repositories prefix id)))))
|
|
|
|
|
|
|
|
(apply invoke "tar" "-cf" image "-C" directory
|
|
|
|
`(,@%tar-determinism-options
|
|
|
|
,@(if compressor
|
|
|
|
(list "-I" (string-join compressor))
|
|
|
|
'())
|
|
|
|
"."))
|
|
|
|
(delete-file-recursively directory)))
|