2015-07-10 11:47:29 +00:00
|
|
|
===============
|
|
|
|
Configuration
|
|
|
|
===============
|
|
|
|
|
|
|
|
Please read
|
|
|
|
`productmd documentation <http://release-engineering.github.io/productmd/index.html>`_
|
|
|
|
for
|
|
|
|
`terminology <http://release-engineering.github.io/productmd/terminology.html>`_
|
|
|
|
and other release and compose related details.
|
|
|
|
|
|
|
|
|
|
|
|
Minimal Config Example
|
|
|
|
======================
|
|
|
|
::
|
|
|
|
|
|
|
|
# RELEASE
|
|
|
|
release_name = "Fedora"
|
|
|
|
release_short = "Fedora"
|
|
|
|
release_version = "23"
|
|
|
|
|
|
|
|
# GENERAL SETTINGS
|
|
|
|
comps_file = "comps-f23.xml"
|
|
|
|
variants_file = "variants-f23.xml"
|
|
|
|
|
|
|
|
# KOJI
|
|
|
|
koji_profile = "koji"
|
|
|
|
runroot = False
|
|
|
|
|
|
|
|
# PKGSET
|
|
|
|
sigkeys = [None]
|
|
|
|
pkgset_source = "koji"
|
|
|
|
pkgset_koji_tag = "f23"
|
|
|
|
|
|
|
|
# CREATEREPO
|
|
|
|
createrepo_checksum = "sha256"
|
|
|
|
|
|
|
|
# GATHER
|
|
|
|
gather_source = "comps"
|
|
|
|
gather_method = "deps"
|
|
|
|
greedy_method = "build"
|
|
|
|
check_deps = False
|
|
|
|
|
|
|
|
# BUILDINSTALL
|
|
|
|
bootable = True
|
|
|
|
buildinstall_method = "lorax"
|
|
|
|
|
|
|
|
|
|
|
|
Release
|
|
|
|
=======
|
|
|
|
Following **mandatory** options describe a release.
|
|
|
|
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
|
|
|
**release_name** [mandatory]
|
|
|
|
(*str*) -- release name
|
|
|
|
|
|
|
|
**release_short** [mandatory]
|
|
|
|
(*str*) -- release short name, without spaces and special characters
|
|
|
|
|
|
|
|
**release_version** [mandatory]
|
|
|
|
(*str*) -- release version
|
|
|
|
|
|
|
|
**release_type** = "ga"
|
|
|
|
(*str*) -- release type, "ga" or "updates"
|
|
|
|
|
|
|
|
**release_is_layered** = False
|
|
|
|
(*bool*) -- typically False for an operating system, True otherwise
|
|
|
|
|
2016-12-06 11:35:57 +00:00
|
|
|
**release_internal** = False
|
|
|
|
(*bool*) -- whether the compose is meant for public consumption
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
release_name = "Fedora"
|
|
|
|
release_short = "Fedora"
|
|
|
|
release_version = "23"
|
|
|
|
# release_type = "ga"
|
|
|
|
|
|
|
|
|
|
|
|
Base Product
|
|
|
|
============
|
|
|
|
Base product options are **optional** and we need
|
|
|
|
to them only if we're composing a layered product
|
|
|
|
built on another (base) product.
|
|
|
|
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
|
|
|
**base_product_name**
|
|
|
|
(*str*) -- base product name
|
|
|
|
|
|
|
|
**base_product_short**
|
|
|
|
(*str*) -- base product short name, without spaces and special characters
|
|
|
|
|
|
|
|
**base_product_version**
|
|
|
|
(*str*) -- base product **major** version
|
|
|
|
|
2016-05-23 12:12:23 +00:00
|
|
|
**base_product_type** = "ga"
|
|
|
|
(*str*) -- base product type, "ga", "updates" etc., for full list see
|
|
|
|
documentation of *productmd*.
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
release_name = "RPM Fusion"
|
|
|
|
release_short = "rf"
|
|
|
|
release_version = "23.0"
|
|
|
|
|
|
|
|
release_is_layered = True
|
|
|
|
|
|
|
|
base_product_name = "Fedora"
|
|
|
|
base_product_short = "Fedora"
|
|
|
|
base_product_version = "23"
|
|
|
|
|
|
|
|
General Settings
|
|
|
|
================
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
|
|
|
**comps_file** [mandatory]
|
|
|
|
(*scm_dict*, *str* or None) -- reference to comps XML file with installation groups
|
|
|
|
|
|
|
|
**variants_file** [mandatory]
|
|
|
|
(*scm_dict* or *str*) -- reference to variants XML file that defines release variants and architectures
|
|
|
|
|
2015-12-10 14:49:00 +00:00
|
|
|
**failable_deliverables** [optional]
|
|
|
|
(*list*) -- list which deliverables on which variant and architecture can
|
2016-06-24 07:44:40 +00:00
|
|
|
fail and not abort the whole compose. This only applies to ``buildinstall``
|
|
|
|
and ``iso`` parts. All other artifacts can be configured in their
|
|
|
|
respective part of configuration.
|
2015-12-10 14:49:00 +00:00
|
|
|
|
|
|
|
Please note that ``*`` as a wildcard matches all architectures but ``src``.
|
|
|
|
|
2016-03-10 14:42:21 +00:00
|
|
|
**comps_filter_environments** [optional]
|
|
|
|
(*bool*) -- When set to ``False``, the comps files for variants will not
|
|
|
|
have their environments filtered to match the variant.
|
|
|
|
|
2016-06-24 07:44:40 +00:00
|
|
|
**tree_arches**
|
|
|
|
([*str*]) -- list of architectures which should be included; if undefined,
|
|
|
|
all architectures from variants.xml will be included
|
|
|
|
|
|
|
|
**tree_variants**
|
|
|
|
([*str*]) -- list of variants which should be included; if undefined, all
|
|
|
|
variants from variants.xml will be included
|
|
|
|
|
2017-01-26 08:19:12 +00:00
|
|
|
**repoclosure_backend**
|
|
|
|
(*str*) -- Select which tool should be used to run repoclosure over created
|
|
|
|
repositories. By default ``yum`` is used, but you can switch to ``dnf``.
|
|
|
|
Please note that when ``dnf`` is used, the build dependencies check is
|
|
|
|
skipped.
|
|
|
|
|
2016-06-24 07:44:40 +00:00
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
comps_file = {
|
|
|
|
"scm": "git",
|
|
|
|
"repo": "https://git.fedorahosted.org/git/comps.git",
|
|
|
|
"branch": None,
|
|
|
|
"file": "comps-f23.xml.in",
|
|
|
|
}
|
|
|
|
|
|
|
|
variants_file = {
|
|
|
|
"scm": "git",
|
|
|
|
"repo": "https://pagure.io/pungi-fedora.git ",
|
|
|
|
"branch": None,
|
|
|
|
"file": "variants-fedora.xml",
|
|
|
|
}
|
|
|
|
|
2015-12-10 14:49:00 +00:00
|
|
|
failable_deliverables = [
|
|
|
|
('^.*$', {
|
|
|
|
# Buildinstall can fail on any variant and any arch
|
|
|
|
'*': ['buildinstall'],
|
|
|
|
'src': ['buildinstall'],
|
|
|
|
# Nothing on i386 blocks the compose
|
|
|
|
'i386': ['buildinstall', 'iso', 'live'],
|
|
|
|
})
|
|
|
|
]
|
|
|
|
|
2016-06-24 07:44:40 +00:00
|
|
|
tree_arches = ["x86_64"]
|
|
|
|
tree_variants = ["Server"]
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
|
2015-12-10 11:51:18 +00:00
|
|
|
Image Naming
|
|
|
|
============
|
|
|
|
|
|
|
|
Both image name and volume id are generated based on the configuration. Since
|
|
|
|
the volume id is limited to 32 characters, there are more settings available.
|
|
|
|
The process for generating volume id is to get a list of possible formats and
|
|
|
|
try them sequentially until one fits in the length limit. If substitutions are
|
|
|
|
configured, each attempted volume id will be modified by it.
|
|
|
|
|
|
|
|
For layered products, the candidate formats are first
|
|
|
|
``image_volid_layered_product_formats`` followed by ``image_volid_formats``.
|
|
|
|
Otherwise, only ``image_volid_formats`` are tried.
|
|
|
|
|
|
|
|
If no format matches the length limit, an error will be reported and compose
|
|
|
|
aborted.
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
2016-01-06 11:24:01 +00:00
|
|
|
There a couple common format specifiers available for both the options:
|
2016-03-08 12:27:34 +00:00
|
|
|
* ``compose_id``
|
|
|
|
* ``release_short``
|
|
|
|
* ``version``
|
|
|
|
* ``date``
|
|
|
|
* ``respin``
|
|
|
|
* ``type``
|
|
|
|
* ``type_suffix``
|
|
|
|
* ``label``
|
|
|
|
* ``label_major_version``
|
|
|
|
* ``variant``
|
|
|
|
* ``arch``
|
|
|
|
* ``disc_type``
|
2016-01-06 11:24:01 +00:00
|
|
|
|
2015-12-10 11:51:18 +00:00
|
|
|
**image_name_format** [optional]
|
|
|
|
(*str*) -- Python's format string to serve as template for image names
|
|
|
|
|
|
|
|
This format will be used for all phases generating images. Currently that
|
|
|
|
means ``createiso``, ``live_images`` and ``buildinstall``.
|
|
|
|
|
2016-01-06 11:24:01 +00:00
|
|
|
Available extra keys are:
|
2016-03-08 12:27:34 +00:00
|
|
|
* ``disc_num``
|
|
|
|
* ``suffix``
|
2015-12-10 11:51:18 +00:00
|
|
|
|
|
|
|
**image_volid_formats** [optional]
|
|
|
|
(*list*) -- A list of format strings for generating volume id.
|
|
|
|
|
2016-01-06 11:24:01 +00:00
|
|
|
The extra available keys are:
|
2016-03-08 12:27:34 +00:00
|
|
|
* ``base_product_short``
|
|
|
|
* ``base_product_version``
|
2015-12-10 11:51:18 +00:00
|
|
|
|
|
|
|
**image_volid_layered_product_formats** [optional]
|
2016-03-08 11:36:28 +00:00
|
|
|
(*list*) -- A list of format strings for generating volume id for layered
|
2015-12-10 11:51:18 +00:00
|
|
|
products. The keys available are the same as for ``image_volid_formats``.
|
|
|
|
|
|
|
|
**volume_id_substitutions** [optional]
|
|
|
|
(*dict*) -- A mapping of string replacements to shorten the volume id.
|
|
|
|
|
2016-03-08 11:36:28 +00:00
|
|
|
**disc_types** [optional]
|
|
|
|
(*dict*) -- A mapping for customizing ``disc_type`` used in image names.
|
|
|
|
|
|
|
|
Available keys are:
|
|
|
|
* ``boot`` -- for ``boot.iso`` images created in *buildinstall* phase
|
2016-03-08 11:59:40 +00:00
|
|
|
* ``live`` -- for images created by *live_images* phase
|
2016-03-08 12:02:15 +00:00
|
|
|
* ``dvd`` -- for images created by *createiso* phase
|
2016-10-06 06:39:27 +00:00
|
|
|
* ``ostree`` -- for ostree installer images
|
2016-03-08 11:59:40 +00:00
|
|
|
|
|
|
|
Default values are the same as the keys.
|
2016-03-08 11:36:28 +00:00
|
|
|
|
2015-12-10 11:51:18 +00:00
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
# Image name respecting Fedora's image naming policy
|
|
|
|
image_name_format = "%(release_short)s-%(variant)s-%(disc_type)s-%(arch)s-%(version)s%(suffix)s"
|
|
|
|
# Use the same format for volume id
|
|
|
|
image_volid_formats = [
|
|
|
|
"%(release_short)s-%(variant)s-%(disc_type)s-%(arch)s-%(version)s"
|
|
|
|
]
|
|
|
|
# No special handling for layered products, use same format as for regular images
|
|
|
|
image_volid_layered_product_formats = []
|
|
|
|
# Replace "Cloud" with "C" in volume id etc.
|
|
|
|
volume_id_substitutions = {
|
|
|
|
'Cloud': 'C',
|
|
|
|
'Alpha': 'A',
|
|
|
|
'Beta': 'B',
|
|
|
|
'TC': 'T',
|
|
|
|
}
|
2015-07-10 11:47:29 +00:00
|
|
|
|
2016-03-08 11:36:28 +00:00
|
|
|
disc_types = {
|
|
|
|
'boot': 'netinst',
|
2016-03-08 11:59:40 +00:00
|
|
|
'live': 'Live',
|
2016-03-08 12:02:15 +00:00
|
|
|
'dvd': 'DVD',
|
2016-03-08 11:36:28 +00:00
|
|
|
}
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
|
2016-02-16 11:54:28 +00:00
|
|
|
Signing
|
|
|
|
=======
|
|
|
|
|
|
|
|
If you want to sign deliverables generated during pungi run like RPM wrapped
|
|
|
|
images. You must provide few configuration options:
|
|
|
|
|
|
|
|
**signing_command** [optional]
|
|
|
|
(*str*) -- Command that will be run with a koji build as a single
|
|
|
|
argument. This command must not require any user interaction.
|
|
|
|
If you need to pass a password for a signing key to the command,
|
|
|
|
do this via command line option of the command and use string
|
|
|
|
formatting syntax ``%(signing_key_password)s``.
|
|
|
|
(See **signing_key_password_file**).
|
|
|
|
|
|
|
|
**signing_key_id** [optional]
|
|
|
|
(*str*) -- ID of the key that will be used for the signing.
|
|
|
|
This ID will be used when crafting koji paths to signed files
|
|
|
|
(``kojipkgs.fedoraproject.org/packages/NAME/VER/REL/data/signed/KEYID/..``).
|
|
|
|
|
|
|
|
**signing_key_password_file** [optional]
|
|
|
|
(*str*) -- Path to a file with password that will be formatted
|
|
|
|
into **signing_command** string via ``%(signing_key_password)s``
|
|
|
|
string format syntax (if used).
|
|
|
|
Because pungi config is usualy stored in git and is part of compose
|
|
|
|
logs we don't want password to be included directly in the config.
|
|
|
|
Note: If ``-`` string is used instead of a filename, then you will be asked
|
|
|
|
for the password interactivelly right after pungi starts.
|
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
signing_command = '~/git/releng/scripts/sigulsign_unsigned.py -vv --password=%(signing_key_password)s fedora-24'
|
|
|
|
signing_key_id = '81b46521'
|
|
|
|
signing_key_password_file = '~/password_for_fedora-24_key'
|
|
|
|
|
|
|
|
|
2016-06-20 13:43:55 +00:00
|
|
|
.. _git-urls:
|
|
|
|
|
2016-02-25 08:07:07 +00:00
|
|
|
Git URLs
|
|
|
|
========
|
|
|
|
|
2016-06-20 13:43:55 +00:00
|
|
|
In multiple places the config requires URL of a Git repository to download some
|
|
|
|
file from. This URL is passed on to *Koji*. It is possible to specify which
|
2016-02-25 08:07:07 +00:00
|
|
|
commit to use using this syntax: ::
|
|
|
|
|
|
|
|
git://git.example.com/git/repo-name.git?#<rev_spec>
|
|
|
|
|
|
|
|
The ``<rev_spec>`` pattern can be replaced with actual commit SHA, a tag name,
|
|
|
|
``HEAD`` to indicate that tip of default branch should be used or
|
|
|
|
``origin/<branch_name>`` to use tip of arbitrary branch.
|
|
|
|
|
|
|
|
If the URL specifies a branch or ``HEAD``, *Pungi* will replace it with the
|
|
|
|
actual commit SHA. This will later show up in *Koji* tasks and help with
|
|
|
|
tracing what particular inputs were used.
|
|
|
|
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
The ``origin`` must be specified because of the way *Koji* works with the
|
|
|
|
repository. It will clone the repository then switch to requested state
|
|
|
|
with ``git reset --hard REF``. Since no local branches are created, we need
|
|
|
|
to use full specification including the name of the remote.
|
|
|
|
|
|
|
|
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
Createrepo Settings
|
|
|
|
===================
|
|
|
|
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
2017-03-11 17:14:37 +00:00
|
|
|
**createrepo_checksum**
|
2017-04-19 14:04:22 +00:00
|
|
|
(*str*) -- specify checksum type for createrepo; expected values:
|
|
|
|
``sha512``, ``sha256``, ``sha``. Defaults to ``sha256``.
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
**createrepo_c** = True
|
|
|
|
(*bool*) -- use createrepo_c (True) or legacy createrepo (False)
|
|
|
|
|
2016-02-29 11:58:21 +00:00
|
|
|
**createrepo_deltas** = False
|
|
|
|
(*bool*) -- generate delta RPMs against an older compose. This needs to be
|
|
|
|
used together with `--old-composes`` command line argument.
|
|
|
|
|
2016-09-12 09:01:45 +00:00
|
|
|
**createrepo_use_xz** = False
|
|
|
|
(*bool*) -- whether to pass ``--xz`` to the createrepo command. This will
|
|
|
|
cause the SQLite databases to be compressed with xz.
|
|
|
|
|
2016-05-31 11:34:04 +00:00
|
|
|
**product_id** = None
|
|
|
|
(*scm_dict*) -- If specified, it should point to a directory with
|
|
|
|
certificates ``<variant_uid>-<arch>-*.pem``. This certificate will be
|
|
|
|
injected into the repository.
|
|
|
|
|
|
|
|
**product_id_allow_missing** = False
|
|
|
|
(*bool*) -- When ``product_id`` is used and a certificate for some variant
|
|
|
|
is missing, an error will be reported by default. Use this option to
|
|
|
|
instead ignore the missing certificate.
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
2017-03-11 17:14:37 +00:00
|
|
|
createrepo_checksum = "sha"
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
|
|
|
|
Package Set Settings
|
|
|
|
====================
|
|
|
|
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
|
|
|
**sigkeys**
|
|
|
|
([*str* or None]) -- priority list of sigkeys, *None* means unsigned
|
|
|
|
|
|
|
|
**pkgset_source** [mandatory]
|
|
|
|
(*str*) -- "koji" (any koji instance) or "repos" (arbitrary yum repositories)
|
|
|
|
|
|
|
|
**pkgset_koji_tag** [mandatory]
|
|
|
|
(*str*) -- tag to read package set from
|
|
|
|
|
|
|
|
**pkgset_koji_inherit** = True
|
2016-05-31 11:34:04 +00:00
|
|
|
(*bool*) -- inherit builds from parent tags; we can turn it off only if we
|
|
|
|
have all builds tagged in a single tag
|
|
|
|
|
|
|
|
**pkgset_repos**
|
|
|
|
(*dict*) -- A mapping of architectures to repositories with RPMs: ``{arch:
|
|
|
|
[repo]}``. Only use when ``pkgset_source = "repos"``.
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
sigkeys = [None]
|
|
|
|
pkgset_source = "koji"
|
|
|
|
pkgset_koji_tag = "f23"
|
|
|
|
|
|
|
|
|
|
|
|
Buildinstall Settings
|
|
|
|
=====================
|
|
|
|
Script or process that creates bootable images with
|
|
|
|
Anaconda installer is historically called
|
|
|
|
`buildinstall <https://git.fedorahosted.org/cgit/anaconda.git/tree/scripts/buildinstall?h=f15-branch>`_.
|
|
|
|
|
2016-05-31 11:34:04 +00:00
|
|
|
Options
|
|
|
|
-------
|
2015-07-10 11:47:29 +00:00
|
|
|
|
2015-12-08 08:29:24 +00:00
|
|
|
**bootable**
|
|
|
|
(*bool*) -- whether to run the buildinstall phase
|
|
|
|
**buildinstall_method**
|
|
|
|
(*str*) -- "lorax" (f16+, rhel7+) or "buildinstall" (older releases)
|
|
|
|
**buildinstall_upgrade_image** [deprecated]
|
|
|
|
(*bool*) -- use ``noupgrade`` with ``lorax_options`` instead
|
|
|
|
**lorax_options**
|
|
|
|
(*list*) -- special options passed on to *lorax*.
|
2015-07-10 11:47:29 +00:00
|
|
|
|
2015-12-08 08:29:24 +00:00
|
|
|
Format: ``[(variant_uid_regex, {arch|*: {option: name}})]``.
|
|
|
|
|
|
|
|
Recognized options are:
|
|
|
|
* ``bugurl`` -- *str* (default ``None``)
|
|
|
|
* ``nomacboot`` -- *bool* (default ``True``)
|
|
|
|
* ``noupgrade`` -- *bool* (default ``True``)
|
2016-05-31 11:34:04 +00:00
|
|
|
**buildinstall_kickstart**
|
|
|
|
(*scm_dict*) -- If specified, this kickstart file will be copied into each
|
|
|
|
file and pointed to in boot configuration.
|
2015-12-08 08:29:24 +00:00
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
bootable = True
|
|
|
|
buildinstall_method = "lorax"
|
|
|
|
|
2015-12-08 08:29:24 +00:00
|
|
|
# Enables macboot on x86_64 for all variants and builds upgrade images
|
|
|
|
# everywhere.
|
|
|
|
lorax_options = [
|
|
|
|
("^.*$", {
|
|
|
|
"x86_64": {
|
|
|
|
"nomacboot": False
|
|
|
|
}
|
|
|
|
"*": {
|
|
|
|
"noupgrade": False
|
|
|
|
}
|
|
|
|
})
|
|
|
|
]
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
It is advised to run buildinstall (lorax) in koji,
|
|
|
|
i.e. with **runroot enabled** for clean build environments, better logging, etc.
|
|
|
|
|
|
|
|
|
|
|
|
.. warning::
|
|
|
|
|
|
|
|
Lorax installs RPMs into a chroot. This involves running %post scriptlets
|
|
|
|
and they frequently run executables in the chroot.
|
|
|
|
If we're composing for multiple architectures, we **must** use runroot for this reason.
|
|
|
|
|
|
|
|
|
|
|
|
Gather Settings
|
|
|
|
===============
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
|
|
|
**gather_source** [mandatory]
|
|
|
|
(*str*) -- from where to read initial package list; expected values: "comps", "none"
|
|
|
|
|
|
|
|
**gather_method** [mandatory]
|
|
|
|
(*str*) -- "deps", "nodeps"
|
|
|
|
|
2016-05-31 11:34:04 +00:00
|
|
|
**gather_fulltree** = False
|
|
|
|
(*bool*) -- When set to ``True`` all RPMs built from an SRPM will always be
|
|
|
|
included. Only use when ``gather_method = "deps"``.
|
|
|
|
|
|
|
|
**gather_selfhosting** = False
|
|
|
|
(*bool*) -- When set to ``True``, *Pungi* will build a self-hosting tree by
|
|
|
|
following build dependencies. Only use when ``gather_method = "deps"``.
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
**greedy_method**
|
2017-01-19 08:24:54 +00:00
|
|
|
(*str*) -- This option controls how package requirements are satisfied in
|
|
|
|
case a particular ``Requires`` has multiple candidates.
|
|
|
|
|
|
|
|
* ``none`` -- the best packages is selected to satisfy the dependency and
|
|
|
|
only that one is pulled into the compose
|
|
|
|
* ``all`` -- packages that provide the symbol are pulled in
|
|
|
|
* ``build`` -- the best package is selected, and then all packages from the
|
|
|
|
same build that provide the symbol are pulled in
|
|
|
|
|
|
|
|
.. note::
|
|
|
|
As an example let's work with this situation: a package in the compose
|
|
|
|
has ``Requires: foo``. There are three packages with ``Provides: foo``:
|
|
|
|
``pkg-a``, ``pkg-b-provider-1`` and ``pkg-b-provider-2``. The
|
|
|
|
``pkg-b-*`` packages are build from the same source package. Best match
|
|
|
|
determines ``pkg-b-provider-1`` as best matching package.
|
|
|
|
|
|
|
|
* With ``greedy_method = "none"`` only ``pkg-b-provider-1`` will be
|
|
|
|
pulled in.
|
|
|
|
* With ``greedy_method = "all"`` all three packages will be
|
|
|
|
pulled in.
|
|
|
|
* With ``greedy_method = "build" ``pkg-b-provider-1`` and
|
|
|
|
``pkg-b-provider-2`` will be pulled in.
|
|
|
|
|
2017-03-06 14:25:55 +00:00
|
|
|
**gather_backend** = ``yum``
|
|
|
|
(*str*) -- Either ``yum`` or ``dnf``. This changes the entire codebase
|
|
|
|
doing dependency solving, so it can change the result in unpredictable
|
|
|
|
ways.
|
2017-02-10 11:20:51 +00:00
|
|
|
|
2017-03-01 09:10:10 +00:00
|
|
|
Particularly the multilib work is performed differently by using
|
|
|
|
``python-multilib`` library. Please refer to ``multilib`` option to see the
|
|
|
|
differences.
|
2015-07-10 11:47:29 +00:00
|
|
|
|
2016-01-20 11:53:08 +00:00
|
|
|
**multilib_methods** [deprecated]
|
|
|
|
([*str*]) -- use ``multilib`` instead to configure this per-variant
|
2015-07-10 11:47:29 +00:00
|
|
|
|
2016-01-20 11:53:08 +00:00
|
|
|
**multilib_arches** [deprecated]
|
|
|
|
([*str*] or None) -- use ``multilib`` to implicitly configure this: if a
|
|
|
|
variant on any arch has non-empty multilib methods, it is automatically
|
|
|
|
eligible
|
|
|
|
|
|
|
|
**multilib**
|
|
|
|
(*list*) -- mapping of variant regexes and arches to list of multilib
|
|
|
|
methods
|
|
|
|
|
|
|
|
Available methods are:
|
2017-02-10 11:20:51 +00:00
|
|
|
* ``none`` -- no package matches this method
|
|
|
|
* ``all`` -- all packages match this method
|
2017-03-01 09:10:10 +00:00
|
|
|
* ``runtime`` -- packages that install some shared object file
|
|
|
|
(``*.so.*``) will match.
|
2017-02-10 11:20:51 +00:00
|
|
|
* ``devel`` -- packages whose name ends with ``-devel`` or ``--static``
|
2017-03-01 09:10:10 +00:00
|
|
|
suffix will be matched. When ``dnf`` is used, this method automatically
|
|
|
|
enables ``runtime`` method as well. With ``yum`` backend this method
|
|
|
|
also uses a hardcoded blacklist and whitelist.
|
2017-02-10 11:20:51 +00:00
|
|
|
* ``kernel`` -- packages providing ``kernel`` or ``kernel-devel`` match
|
|
|
|
this method (only in ``yum`` backend)
|
|
|
|
* ``yaboot`` -- only ``yaboot`` package on ``ppc`` arch matches this (only
|
|
|
|
in ``yum`` backend)
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
**additional_packages**
|
2016-03-08 08:24:18 +00:00
|
|
|
(*list*) -- additional packages to be included in a variant and
|
|
|
|
architecture; format: ``[(variant_uid_regex, {arch|*: [package_globs]})]``
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
**filter_packages**
|
2016-03-08 08:24:18 +00:00
|
|
|
(*list*) -- packages to be excluded from a variant and architecture;
|
|
|
|
format: ``[(variant_uid_regex, {arch|*: [package_globs]})]``
|
2015-07-10 11:47:29 +00:00
|
|
|
|
2016-01-12 16:00:15 +00:00
|
|
|
**filter_system_release_packages**
|
|
|
|
(*bool*) -- for each variant, figure out the best system release package
|
|
|
|
and filter out all others. This will not work if a variant needs more than
|
|
|
|
one system release package. In such case, set this option to ``False``.
|
|
|
|
|
2016-05-31 11:34:04 +00:00
|
|
|
**gather_prepopulate** = None
|
|
|
|
(*scm_dict*) -- If specified, you can use this to add additional packages.
|
|
|
|
The format of the file pointed to by this option is a JSON mapping
|
|
|
|
``{variant_uid: {arch: {build: [package]}}}``. Packages added through this
|
|
|
|
option can not be removed by ``filter_packages``.
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
**multilib_blacklist**
|
2016-03-08 08:24:18 +00:00
|
|
|
(*dict*) -- multilib blacklist; format: ``{arch|*: [package_globs]}``. The
|
|
|
|
patterns are tested with ``fnmatch``, so shell globbing is used (not
|
|
|
|
regular expression).
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
**multilib_whitelist**
|
2016-03-08 08:24:18 +00:00
|
|
|
(*dict*) -- multilib blacklist; format: ``{arch|*: [package_names]}``. The
|
|
|
|
whitelist must contain exact package names; there are no wildcards or
|
|
|
|
pattern matching.
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
**gather_lookaside_repos** = []
|
2016-03-08 08:24:18 +00:00
|
|
|
(*list*) -- lookaside repositories used for package gathering; format:
|
|
|
|
``[(variant_uid_regex, {arch|*: [repo_urls]})]``
|
2015-07-10 11:47:29 +00:00
|
|
|
|
2015-07-24 08:40:55 +00:00
|
|
|
**hashed_directories** = False
|
2016-03-08 08:24:18 +00:00
|
|
|
(*bool*) -- put packages into "hashed" directories, for example
|
|
|
|
``Packages/k/kernel-4.0.4-301.fc22.x86_64.rpm``
|
2015-07-24 08:40:55 +00:00
|
|
|
|
2016-05-31 11:34:04 +00:00
|
|
|
**check_deps** = True
|
|
|
|
(*bool*) -- Set to ``False`` if you don't want the compose to abort when
|
|
|
|
some package has broken dependencies.
|
|
|
|
|
|
|
|
**gather_source_mapping**
|
|
|
|
(*str*) -- Only use when ``gather_source = "json"``. The value should be a
|
|
|
|
path to JSON file with following mapping: ``{variant: {arch: {rpm_name:
|
|
|
|
[rpm_arch|None]}}}``.
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
gather_source = "comps"
|
|
|
|
gather_method = "deps"
|
|
|
|
greedy_method = "build"
|
|
|
|
check_deps = False
|
2015-07-24 08:40:55 +00:00
|
|
|
hashed_directories = True
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
additional_packages = [
|
|
|
|
# bz#123456
|
|
|
|
('^(Workstation|Server)$', {
|
|
|
|
'*': [
|
|
|
|
'grub2',
|
|
|
|
'kernel',
|
|
|
|
],
|
|
|
|
}),
|
|
|
|
]
|
|
|
|
|
|
|
|
filter_packages = [
|
|
|
|
# bz#111222
|
|
|
|
('^.*$', {
|
|
|
|
'*': [
|
|
|
|
'kernel-doc',
|
|
|
|
],
|
|
|
|
}),
|
|
|
|
]
|
2016-01-20 11:53:08 +00:00
|
|
|
|
|
|
|
multilib = [
|
|
|
|
('^Server$', {
|
|
|
|
'x86_64': ['devel', 'runtime']
|
|
|
|
})
|
|
|
|
]
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
multilib_blacklist = {
|
|
|
|
"*": [
|
|
|
|
"gcc",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
|
|
|
multilib_whitelist = {
|
|
|
|
"*": [
|
|
|
|
"alsa-plugins-*",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
|
|
|
# gather_lookaside_repos = [
|
|
|
|
# ('^.*$', {
|
|
|
|
# 'x86_64': [
|
|
|
|
# "https://dl.fedoraproject.org/pub/fedora/linux/releases/22/Everything/x86_64/os/",
|
|
|
|
# "https://dl.fedoraproject.org/pub/fedora/linux/releases/22/Everything/source/SRPMS/",
|
|
|
|
# ]
|
|
|
|
# }),
|
|
|
|
# ]
|
|
|
|
|
|
|
|
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
It is a good practice to attach bug/ticket numbers
|
|
|
|
to additional_packages, filter_packages, multilib_blacklist and multilib_whitelist
|
|
|
|
to track decisions.
|
|
|
|
|
|
|
|
|
|
|
|
Koji Settings
|
|
|
|
=============
|
|
|
|
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
|
|
|
**koji_profile**
|
|
|
|
(*str*) -- koji profile name
|
|
|
|
|
|
|
|
**runroot** [mandatory]
|
|
|
|
(*bool*) -- run some tasks such as buildinstall or createiso in koji build root (True) or locally (False)
|
|
|
|
|
|
|
|
**runroot_channel**
|
|
|
|
(*str*) -- name of koji channel
|
|
|
|
|
|
|
|
**runroot_tag**
|
|
|
|
(*str*) -- name of koji **build** tag used for runroot
|
|
|
|
|
2017-02-23 09:28:49 +00:00
|
|
|
**runroot_weights**
|
|
|
|
(*dict*) -- customize task weights for various runroot tasks. The values in
|
|
|
|
the mapping should be integers, the keys can be selected from the following
|
|
|
|
list. By default no weight is assigned and Koji picks the default one
|
|
|
|
according to policy.
|
|
|
|
|
|
|
|
* ``buildinstall``
|
|
|
|
* ``createiso``
|
|
|
|
* ``ostree``
|
|
|
|
* ``ostree_installer``
|
|
|
|
|
2015-07-10 11:47:29 +00:00
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
koji_profile = "koji"
|
|
|
|
runroot = True
|
|
|
|
runroot_channel = "runroot"
|
|
|
|
runroot_tag = "f23-build"
|
|
|
|
|
|
|
|
|
|
|
|
Extra Files Settings
|
|
|
|
====================
|
|
|
|
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
|
|
|
**extra_files**
|
|
|
|
(*list*) -- references to external files to be placed in os/ directory and media; format: [(variant_uid_regex, {arch|*: [scm_dicts]})]
|
|
|
|
|
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
extra_files = [
|
|
|
|
('^.*$', {
|
|
|
|
'*': [
|
|
|
|
# GPG keys
|
|
|
|
{
|
|
|
|
"scm": "rpm",
|
|
|
|
"repo": "fedora-repos",
|
|
|
|
"branch": None,
|
|
|
|
"file": [
|
|
|
|
"/etc/pki/rpm-gpg/RPM-GPG-KEY-22-fedora",
|
|
|
|
],
|
|
|
|
"target": "",
|
|
|
|
},
|
|
|
|
# GPL
|
|
|
|
{
|
|
|
|
"scm": "git",
|
|
|
|
"repo": "https://pagure.io/pungi-fedora",
|
|
|
|
"branch": None,
|
|
|
|
"file": [
|
|
|
|
"GPL",
|
|
|
|
],
|
|
|
|
"target": "",
|
|
|
|
},
|
|
|
|
],
|
|
|
|
}),
|
|
|
|
]
|
2015-07-22 16:57:39 +00:00
|
|
|
|
|
|
|
|
extra-files: Write a metadata file enumerating extra files
Introduces a new metadata file to track arbitrary files added during the
extra-files phase. This file is placed in the root of each tree and is
called ``extra_files.json``. It is a JSON file containing a single
object, which contains a "header" key with an object describing the
metadata, and a "data" key, which is an array of objects, where each
object represents a file. Each object contains the "file", "checksums",
and "size" keys. "file" is the relative path from the tree root to the
extra file. "checksums" is an object containing one or more checksums,
where the key is the digest type and the value of that key is the hex
digest. Finally, the size is the size of the file in bytes.
For example:
{
"header": {"version": "1.0},
"data": [
{
"file": "GPL",
"checksums": {
"sha256": "8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643"
},
"size": 18092
},
{
"file": "release-notes/notes.html",
"checksums": {
"sha256": "82b1ba8db522aadf101dca6404235fba179e559b95ea24ff39ee1e5d9a53bdcb"
},
"size": 1120
}
]
}
Signed-off-by: Jeremy Cline <jeremy@jcline.org>
Fixes: #295
2016-05-31 13:40:20 +00:00
|
|
|
Extra Files Metadata
|
|
|
|
--------------------
|
|
|
|
If extra files are specified a metadata file, ``extra_files.json``, is placed
|
2017-04-20 06:58:27 +00:00
|
|
|
in the ``os/`` directory and media. The checksums generated are determined by
|
|
|
|
``media_checksums`` option. This metadata file is in the format:
|
extra-files: Write a metadata file enumerating extra files
Introduces a new metadata file to track arbitrary files added during the
extra-files phase. This file is placed in the root of each tree and is
called ``extra_files.json``. It is a JSON file containing a single
object, which contains a "header" key with an object describing the
metadata, and a "data" key, which is an array of objects, where each
object represents a file. Each object contains the "file", "checksums",
and "size" keys. "file" is the relative path from the tree root to the
extra file. "checksums" is an object containing one or more checksums,
where the key is the digest type and the value of that key is the hex
digest. Finally, the size is the size of the file in bytes.
For example:
{
"header": {"version": "1.0},
"data": [
{
"file": "GPL",
"checksums": {
"sha256": "8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643"
},
"size": 18092
},
{
"file": "release-notes/notes.html",
"checksums": {
"sha256": "82b1ba8db522aadf101dca6404235fba179e559b95ea24ff39ee1e5d9a53bdcb"
},
"size": 1120
}
]
}
Signed-off-by: Jeremy Cline <jeremy@jcline.org>
Fixes: #295
2016-05-31 13:40:20 +00:00
|
|
|
|
|
|
|
::
|
|
|
|
|
|
|
|
{
|
|
|
|
"header": {"version": "1.0},
|
|
|
|
"data": [
|
|
|
|
{
|
|
|
|
"file": "GPL",
|
|
|
|
"checksums": {
|
|
|
|
"sha256": "8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643"
|
|
|
|
},
|
|
|
|
"size": 18092
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"file": "release-notes/notes.html",
|
|
|
|
"checksums": {
|
|
|
|
"sha256": "82b1ba8db522aadf101dca6404235fba179e559b95ea24ff39ee1e5d9a53bdcb"
|
|
|
|
},
|
|
|
|
"size": 1120
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-22 16:57:39 +00:00
|
|
|
Productimg Settings
|
|
|
|
===================
|
|
|
|
Product images are placed on installation media and provide additional branding
|
|
|
|
and Anaconda changes specific to product variants.
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
|
|
|
**productimg** = False
|
|
|
|
(*bool*) -- create product images; requires bootable=True
|
|
|
|
|
|
|
|
**productimg_install_class**
|
|
|
|
(*scm_dict*, *str*) -- reference to install class **file**
|
|
|
|
|
|
|
|
**productimg_po_files**
|
|
|
|
(*scm_dict*, *str*) -- reference to a **directory** with po files for install class translations
|
|
|
|
|
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
productimg = True
|
|
|
|
productimg_install_class = {
|
|
|
|
"scm": "git",
|
|
|
|
"repo": "http://git.example.com/productimg.git",
|
|
|
|
"branch": None,
|
|
|
|
"file": "fedora23/%(variant_id)s.py",
|
|
|
|
}
|
|
|
|
productimg_po_files = {
|
|
|
|
"scm": "git",
|
|
|
|
"repo": "http://git.example.com/productimg.git",
|
|
|
|
"branch": None,
|
|
|
|
"dir": "po",
|
|
|
|
}
|
2015-07-23 14:58:35 +00:00
|
|
|
|
|
|
|
|
|
|
|
CreateISO Settings
|
|
|
|
==================
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
|
|
|
|
**createiso_skip** = False
|
|
|
|
(*list*) -- mapping that defines which variants and arches to skip during createiso; format: [(variant_uid_regex, {arch|*: True})]
|
|
|
|
|
2015-09-15 18:37:27 +00:00
|
|
|
**create_jigdo** = True
|
2015-09-01 22:14:46 +00:00
|
|
|
(*bool*) -- controls the creation of jigdo from ISO
|
|
|
|
|
2016-05-31 11:34:04 +00:00
|
|
|
**create_optional_isos** = False
|
|
|
|
(*bool*) -- when set to ``True``, ISOs will be created even for
|
|
|
|
``optional`` variants. By default only variants with type ``variant`` or
|
|
|
|
``layered-product`` will get ISOs.
|
|
|
|
|
2016-06-01 14:53:51 +00:00
|
|
|
**iso_size** = 4700000000
|
|
|
|
(*int|str*) -- size of ISO image. The value should either be an integer
|
|
|
|
meaning size in bytes, or it can be a string with ``k``, ``M``, ``G``
|
|
|
|
suffix (using multiples of 1024).
|
|
|
|
|
|
|
|
**split_iso_reserve** = 10MiB
|
|
|
|
(*int|str*) -- how much free space should be left on each disk. The format
|
|
|
|
is the same as for ``iso_size`` option.
|
|
|
|
|
2015-07-23 14:58:35 +00:00
|
|
|
.. note::
|
|
|
|
|
|
|
|
Source architecture needs to be listed explicitly.
|
|
|
|
Excluding '*' applies only on binary arches.
|
2015-09-01 22:14:46 +00:00
|
|
|
Jigdo causes significant increase of time to ISO creation.
|
2015-07-23 14:58:35 +00:00
|
|
|
|
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
|
|
|
createiso_skip = [
|
|
|
|
('^Workstation$', {
|
|
|
|
'*': True,
|
|
|
|
'src': True
|
|
|
|
}),
|
|
|
|
]
|
2015-09-01 08:03:34 +00:00
|
|
|
|
2016-01-18 13:24:25 +00:00
|
|
|
|
2017-04-07 13:11:29 +00:00
|
|
|
.. _auto-version:
|
|
|
|
|
|
|
|
Automatic generation of version and release
|
|
|
|
===========================================
|
|
|
|
|
|
|
|
Version and release values for certain artifacts can be generated automatically
|
|
|
|
based on release version, compose label, date, type and respin. This can be
|
|
|
|
used to shorten the config and keep it the same for multiple uses.
|
|
|
|
|
|
|
|
+----------------------------+-------------------+--------------+------------------+
|
|
|
|
| Compose ID | Label | Version | Release |
|
|
|
|
+============================+===================+==============+==================+
|
|
|
|
| ``F-Rawhide-20170406.n.0`` | ``-`` | ``Rawhide`` | ``20170406.n.0`` |
|
|
|
|
+----------------------------+-------------------+--------------+------------------+
|
|
|
|
| ``F-26-20170329.1`` | ``Alpha-1.6`` | ``26_Alpha`` | ``1.6`` |
|
|
|
|
+----------------------------+-------------------+--------------+------------------+
|
|
|
|
| ``F-Atomic-25-20170407.0`` | ``RC-20170407.0`` | ``25`` | ``20170407.0`` |
|
|
|
|
+----------------------------+-------------------+--------------+------------------+
|
|
|
|
| ``F-Atomic-25-20170407.0`` | ``-`` | ``25`` | ``20170407.0`` |
|
|
|
|
+----------------------------+-------------------+--------------+------------------+
|
|
|
|
|
|
|
|
All non-``RC`` milestones from label get appended to the version. For release
|
|
|
|
either label is used or date, type and respin.
|
|
|
|
|
|
|
|
|
2016-04-14 12:23:42 +00:00
|
|
|
Common options for Live Images, Live Media and Image Build
|
|
|
|
==========================================================
|
|
|
|
|
|
|
|
All images can have ``ksurl``, ``version``, ``release`` and ``target``
|
|
|
|
specified. Since this can create a lot of duplication, there are global options
|
|
|
|
that can be used instead.
|
|
|
|
|
|
|
|
For each of the phases, if the option is not specified for a particular
|
|
|
|
deliverable, an option named ``<PHASE_NAME>_<OPTION>`` is checked. If that is
|
|
|
|
not specified either, the last fallback is ``global_<OPTION>``. If even that is
|
|
|
|
unset, the value is considered to not be specified.
|
|
|
|
|
|
|
|
The kickstart URL is configured by these options.
|
|
|
|
|
|
|
|
* ``global_ksurl`` -- global fallback setting
|
|
|
|
* ``live_media_ksurl``
|
|
|
|
* ``image_build_ksurl``
|
|
|
|
* ``live_images_ksurl``
|
|
|
|
|
|
|
|
Target is specified by these settings. For live images refer to ``live_target``.
|
|
|
|
|
|
|
|
* ``global_target`` -- global fallback setting
|
|
|
|
* ``live_media_target``
|
|
|
|
* ``image_build_target``
|
|
|
|
|
2016-08-30 07:51:36 +00:00
|
|
|
Version is specified by these options. If no version is set, a default value
|
2017-04-07 13:11:29 +00:00
|
|
|
will be provided according to :ref:`automatic versioning <auto-version>`.
|
2016-04-14 12:23:42 +00:00
|
|
|
|
|
|
|
* ``global_version`` -- global fallback setting
|
|
|
|
* ``live_media_version``
|
|
|
|
* ``image_build_version``
|
|
|
|
* ``live_images_version``
|
|
|
|
|
2017-04-07 13:33:43 +00:00
|
|
|
Release is specified by these options. If set to a magic value to
|
|
|
|
``!RELEASE_FROM_LABEL_DATE_TYPE_RESPIN``, a value will be generated according
|
|
|
|
to :ref:`automatic versioning <auto-version>`.
|
2016-04-14 12:23:42 +00:00
|
|
|
|
|
|
|
* ``global_release`` -- global fallback setting
|
|
|
|
* ``live_media_release``
|
|
|
|
* ``image_build_release``
|
|
|
|
* ``live_images_release``
|
|
|
|
|
2016-11-28 14:57:54 +00:00
|
|
|
Each configuration block can also optionally specify a ``failable`` key. For
|
|
|
|
live images it should have a boolean value. For live media and image build it
|
|
|
|
should be a list of strings containing architectures that are optional. If any
|
|
|
|
deliverable fails on an optional architecture, it will not abort the whole
|
|
|
|
compose. If the list contains only ``"*"``, all arches will be substituted.
|
2016-06-24 07:44:40 +00:00
|
|
|
|
2016-04-14 12:23:42 +00:00
|
|
|
|
2016-01-18 13:24:25 +00:00
|
|
|
Live Images Settings
|
|
|
|
====================
|
|
|
|
|
|
|
|
**live_target**
|
|
|
|
(*str*) -- Koji build target for which to build the images. This gets
|
|
|
|
passed to ``koji spin-livecd``.
|
|
|
|
|
|
|
|
**live_images**
|
|
|
|
(*list*) -- Configuration for the particular image. The elements of the
|
|
|
|
list should be tuples ``(variant_uid_regex, {arch|*: config})``. The config
|
|
|
|
should be a dict with these keys:
|
|
|
|
|
2016-02-17 13:35:28 +00:00
|
|
|
* ``kickstart`` (*str*)
|
|
|
|
* ``ksurl`` (*str*) [optional] -- where to get the kickstart from
|
2016-01-18 13:24:25 +00:00
|
|
|
* ``name`` (*str*)
|
|
|
|
* ``version`` (*str*)
|
2017-03-27 21:53:08 +00:00
|
|
|
* ``repo`` (*str|[str]*) -- repos specified by URL or variant UID
|
2016-01-18 13:24:25 +00:00
|
|
|
* ``specfile`` (*str*) -- for images wrapped in RPM
|
|
|
|
* ``scratch`` (*bool*) -- only RPM-wrapped images can use scratch builds,
|
|
|
|
but by default this is turned off
|
2016-02-11 10:54:30 +00:00
|
|
|
* ``type`` (*str*) -- what kind of task to start in Koji. Defaults to
|
|
|
|
``live`` meaning ``koji spin-livecd`` will be used. Alternative option
|
|
|
|
is ``appliance`` corresponding to ``koji spin-appliance``.
|
2016-02-16 11:54:28 +00:00
|
|
|
* ``sign`` (*bool*) -- only RPM-wrapped images can be signed
|
2016-01-18 13:24:25 +00:00
|
|
|
|
2017-02-22 02:48:05 +00:00
|
|
|
Deprecated options:
|
|
|
|
|
2017-03-27 21:53:08 +00:00
|
|
|
* ``additional_repos`` -- deprecated, use ``repo`` instead
|
|
|
|
* ``repo_from`` -- deprecated, use ``repo`` instead
|
2017-02-22 02:48:05 +00:00
|
|
|
|
2016-02-22 09:13:04 +00:00
|
|
|
**live_images_no_rename**
|
|
|
|
(*bool*) -- When set to ``True``, filenames generated by Koji will be used.
|
|
|
|
When ``False``, filenames will be generated based on ``image_name_format``
|
|
|
|
configuration option.
|
|
|
|
|
|
|
|
|
2016-01-28 15:03:20 +00:00
|
|
|
Live Media Settings
|
|
|
|
===================
|
|
|
|
|
|
|
|
**live_media**
|
|
|
|
(*dict*) -- configuration for ``koji spin-livemedia``; format:
|
|
|
|
``{variant_uid_regex: [{opt:value}]}``
|
|
|
|
|
2016-02-10 17:26:43 +00:00
|
|
|
Required options:
|
2016-01-28 15:03:20 +00:00
|
|
|
|
2016-02-10 17:26:43 +00:00
|
|
|
* ``name`` (*str*)
|
|
|
|
* ``version`` (*str*)
|
2016-01-28 15:03:20 +00:00
|
|
|
* ``target`` (*str*)
|
|
|
|
* ``arches`` (*[str]*) -- what architectures to build the media for; by default uses
|
|
|
|
all arches for the variant.
|
|
|
|
* ``kickstart`` (*str*) -- name of the kickstart file
|
2016-02-10 17:26:43 +00:00
|
|
|
|
|
|
|
Available options:
|
|
|
|
|
2016-01-28 15:03:20 +00:00
|
|
|
* ``ksurl`` (*str*)
|
|
|
|
* ``ksversion`` (*str*)
|
|
|
|
* ``scratch`` (*bool*)
|
2017-04-07 13:33:43 +00:00
|
|
|
* ``release`` (*str*) -- a string with the release, or
|
|
|
|
``!RELEASE_FROM_LABEL_DATE_TYPE_RESPIN`` to automatically generate a
|
|
|
|
suitable value. See :ref:`automatic versioning <auto-version>` for
|
|
|
|
details.
|
2016-01-28 15:03:20 +00:00
|
|
|
* ``skip_tag`` (*bool*)
|
2017-03-27 21:53:08 +00:00
|
|
|
* ``repo`` (*str|[str]*) -- repos specified by URL or variant UID
|
2016-01-28 15:03:20 +00:00
|
|
|
* ``title`` (*str*)
|
2016-02-11 09:21:56 +00:00
|
|
|
* ``install_tree_from`` (*str*) -- variant to take install tree from
|
2016-01-28 15:03:20 +00:00
|
|
|
|
2017-03-27 21:53:08 +00:00
|
|
|
Deprecated options:
|
|
|
|
|
|
|
|
* ``repo_from`` -- deprecated, use ``repo`` instead
|
|
|
|
|
2016-01-18 13:24:25 +00:00
|
|
|
|
2015-09-01 08:03:34 +00:00
|
|
|
Image Build Settings
|
|
|
|
====================
|
|
|
|
|
|
|
|
**image_build**
|
2016-01-05 08:27:20 +00:00
|
|
|
(*dict*) -- config for ``koji image-build``; format: {variant_uid_regex: [{opt: value}]}
|
|
|
|
|
|
|
|
By default, images will be built for each binary arch valid for the
|
|
|
|
variant. The config can specify a list of arches to narrow this down.
|
2015-09-01 08:03:34 +00:00
|
|
|
|
|
|
|
.. note::
|
|
|
|
Config can contain anything what is accepted by
|
2015-12-08 13:29:18 +00:00
|
|
|
``koji image-build --config configfile.ini``
|
|
|
|
|
2016-01-21 13:30:44 +00:00
|
|
|
Repo can be specified either as a string or a list of strings. It will be
|
2016-01-05 08:27:20 +00:00
|
|
|
automatically transformed into format suitable for ``koji``. A repo for the
|
|
|
|
currently built variant will be added as well.
|
2015-09-01 08:03:34 +00:00
|
|
|
|
2017-04-07 13:33:43 +00:00
|
|
|
If you explicitly set ``release`` to
|
|
|
|
``!RELEASE_FROM_LABEL_DATE_TYPE_RESPIN``, it will be replaced with a value
|
|
|
|
generated as described in :ref:`automatic versioning <auto-version>`.
|
2016-01-21 13:30:44 +00:00
|
|
|
|
2016-01-08 12:37:09 +00:00
|
|
|
Please don't set ``install_tree``. This gets automatically set by *pungi*
|
|
|
|
based on current variant. You can use ``install_tree_from`` key to use
|
|
|
|
install tree from another variant.
|
|
|
|
|
2016-01-05 08:27:20 +00:00
|
|
|
The ``format`` attr is [('image_type', 'image_suffix'), ...].
|
|
|
|
See productmd documentation for list of supported types and suffixes.
|
2015-09-01 08:03:34 +00:00
|
|
|
|
2015-12-08 13:29:18 +00:00
|
|
|
If ``ksurl`` ends with ``#HEAD``, Pungi will figure out the SHA1 hash of
|
|
|
|
current HEAD and use that instead.
|
|
|
|
|
2016-01-26 11:46:50 +00:00
|
|
|
Setting ``scratch`` to ``True`` will run the koji tasks as scratch builds.
|
|
|
|
|
2015-12-08 13:29:18 +00:00
|
|
|
|
2015-09-01 08:03:34 +00:00
|
|
|
Example
|
|
|
|
-------
|
|
|
|
::
|
|
|
|
|
2016-01-05 08:27:20 +00:00
|
|
|
image_build = {
|
|
|
|
'^Server$': [
|
|
|
|
{
|
2016-02-10 16:24:45 +00:00
|
|
|
'image-build': {
|
|
|
|
'format': [('docker', 'tar.gz'), ('qcow2', 'qcow2')]
|
|
|
|
'name': 'fedora-qcow-and-docker-base',
|
|
|
|
'target': 'koji-target-name',
|
|
|
|
'ksversion': 'F23', # value from pykickstart
|
|
|
|
'version': '23',
|
|
|
|
# correct SHA1 hash will be put into the URL below automatically
|
|
|
|
'ksurl': 'https://git.fedorahosted.org/git/spin-kickstarts.git?somedirectoryifany#HEAD',
|
|
|
|
'kickstart': "fedora-docker-base.ks",
|
2016-08-25 10:17:40 +00:00
|
|
|
'repo': ["http://someextrarepos.org/repo", "ftp://rekcod.oi/repo"],
|
2016-02-10 16:24:45 +00:00
|
|
|
'distro': 'Fedora-20',
|
|
|
|
'disk_size': 3,
|
|
|
|
|
|
|
|
# this is set automatically by pungi to os_dir for given variant
|
|
|
|
# 'install_tree': 'http://somepath',
|
|
|
|
},
|
|
|
|
'factory-parameters': {
|
|
|
|
'docker_cmd': "[ '/bin/bash' ]",
|
|
|
|
'docker_env': "[ 'PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin' ]",
|
2016-08-25 10:17:40 +00:00
|
|
|
'docker_labels': "{'Name': 'fedora-docker-base', 'License': u'GPLv2', 'RUN': 'docker run -it --rm ${OPT1} --privileged -v \`pwd\`:/atomicapp -v /run:/run -v /:/host --net=host --name ${NAME} -e NAME=${NAME} -e IMAGE=${IMAGE} ${IMAGE} -v ${OPT2} run ${OPT3} /atomicapp', 'Vendor': 'Fedora Project', 'Version': '23', 'Architecture': 'x86_64' }",
|
2016-02-10 16:24:45 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
'image-build': {
|
|
|
|
'format': [('docker', 'tar.gz'), ('qcow2', 'qcow2')]
|
|
|
|
'name': 'fedora-qcow-and-docker-base',
|
|
|
|
'target': 'koji-target-name',
|
|
|
|
'ksversion': 'F23', # value from pykickstart
|
|
|
|
'version': '23',
|
|
|
|
# correct SHA1 hash will be put into the URL below automatically
|
|
|
|
'ksurl': 'https://git.fedorahosted.org/git/spin-kickstarts.git?somedirectoryifany#HEAD',
|
|
|
|
'kickstart': "fedora-docker-base.ks",
|
2016-08-25 10:17:40 +00:00
|
|
|
'repo': ["http://someextrarepos.org/repo", "ftp://rekcod.oi/repo"],
|
2016-02-10 16:24:45 +00:00
|
|
|
'distro': 'Fedora-20',
|
|
|
|
'disk_size': 3,
|
|
|
|
|
|
|
|
# this is set automatically by pungi to os_dir for given variant
|
|
|
|
# 'install_tree': 'http://somepath',
|
|
|
|
}
|
2016-01-05 08:27:20 +00:00
|
|
|
},
|
|
|
|
{
|
2016-02-10 16:24:45 +00:00
|
|
|
'image-build': {
|
|
|
|
'format': [('qcow2','qcow2')]
|
|
|
|
'name': 'fedora-qcow-base',
|
|
|
|
'target': 'koji-target-name',
|
|
|
|
'ksversion': 'F23', # value from pykickstart
|
|
|
|
'version': '23',
|
|
|
|
'ksurl': 'https://git.fedorahosted.org/git/spin-kickstarts.git?somedirectoryifany#HEAD',
|
|
|
|
'kickstart': "fedora-docker-base.ks",
|
|
|
|
'distro': 'Fedora-23',
|
|
|
|
|
|
|
|
# only build this type of image on x86_64
|
|
|
|
'arches': ['x86_64']
|
|
|
|
|
|
|
|
# Use install tree and repo from Everything variant.
|
|
|
|
'install_tree_from': 'Everything',
|
2017-03-27 21:53:08 +00:00
|
|
|
'repo': ['Everything'],
|
2016-02-10 16:24:45 +00:00
|
|
|
|
2016-08-26 08:05:25 +00:00
|
|
|
# Set release automatically.
|
2017-04-07 13:33:43 +00:00
|
|
|
'release': '!RELEASE_FROM_LABEL_DATE_TYPE_RESPIN',
|
2016-02-10 16:24:45 +00:00
|
|
|
}
|
2016-01-05 08:27:20 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
2015-09-01 08:03:34 +00:00
|
|
|
|
2015-11-20 12:14:24 +00:00
|
|
|
|
2016-03-23 09:38:34 +00:00
|
|
|
OSTree Settings
|
|
|
|
===============
|
|
|
|
|
2016-10-27 07:23:58 +00:00
|
|
|
The ``ostree`` phase of *Pungi* can create ostree repositories. This is done by
|
|
|
|
running ``rpm-ostree compose`` in a Koji runroot environment. The ostree
|
|
|
|
repository itself is not part of the compose and should be located in another
|
|
|
|
directory. Any new packages in the compose will be added to the repository with
|
|
|
|
a new commit.
|
2016-03-23 09:38:34 +00:00
|
|
|
|
|
|
|
**ostree**
|
|
|
|
(*dict*) -- a variant/arch mapping of configuration. The format should be
|
|
|
|
``[(variant_uid_regex, {arch|*: config_dict})]``.
|
|
|
|
|
|
|
|
The configuration dict for each variant arch pair must have these keys:
|
|
|
|
|
|
|
|
* ``treefile`` -- (*str*) Filename of configuration for ``rpm-ostree``.
|
|
|
|
* ``config_url`` -- (*str*) URL for Git repository with the ``treefile``.
|
2017-03-27 21:53:08 +00:00
|
|
|
* ``repo`` -- (*str|dict|[str|dict]*) repos specified by URL or variant UID
|
|
|
|
or a dict of repo options, ``baseurl`` is required in the dict.
|
2016-04-05 07:13:01 +00:00
|
|
|
* ``ostree_repo`` -- (*str*) Where to put the ostree repository
|
2016-03-23 09:38:34 +00:00
|
|
|
|
|
|
|
These keys are optional:
|
|
|
|
|
2016-11-07 05:23:13 +00:00
|
|
|
* ``keep_original_sources`` -- (*bool*) Keep the existing source repos in
|
|
|
|
the tree config file. If not enabled, all the original source repos will
|
|
|
|
be removed from the tree config file.
|
2016-03-23 09:38:34 +00:00
|
|
|
* ``config_branch`` -- (*str*) Git branch of the repo to use. Defaults to
|
|
|
|
``master``.
|
2016-06-24 07:44:40 +00:00
|
|
|
* ``failable`` -- (*[str]*) List of architectures for which this
|
|
|
|
deliverable is not release blocking.
|
2016-11-03 12:59:00 +00:00
|
|
|
* ``update_summary`` -- (*bool*) Update summary metadata after tree composing.
|
|
|
|
Defaults to ``False``.
|
2016-11-04 08:07:26 +00:00
|
|
|
* ``version`` -- (*str*) Version string to be added as versioning metadata.
|
2017-04-07 13:11:29 +00:00
|
|
|
If this option is set to ``!OSTREE_VERSION_FROM_LABEL_DATE_TYPE_RESPIN``,
|
|
|
|
a value will be generated automatically as ``$VERSION.$RELEASE``.
|
|
|
|
:ref:`See how those values are created <auto-version>`.
|
2016-10-27 07:23:58 +00:00
|
|
|
* ``tag_ref`` -- (*bool*, default ``True``) If set to ``False``, a git
|
|
|
|
reference will not be created.
|
2016-03-23 09:38:34 +00:00
|
|
|
|
2017-02-22 02:48:05 +00:00
|
|
|
Deprecated options:
|
|
|
|
|
2017-03-27 21:53:08 +00:00
|
|
|
* ``repo_from`` -- Deprecated, use ``repo`` instead.
|
|
|
|
* ``source_repo_from`` -- Deprecated, use ``repo`` instead.
|
|
|
|
* ``extra_source_repos`` -- Deprecated, use ``repo`` instead.
|
|
|
|
|
2017-02-22 02:48:05 +00:00
|
|
|
|
2016-03-23 09:38:34 +00:00
|
|
|
|
|
|
|
Example config
|
|
|
|
--------------
|
|
|
|
::
|
|
|
|
|
|
|
|
ostree = [
|
|
|
|
("^Atomic$", {
|
|
|
|
"x86_64": {
|
|
|
|
"treefile": "fedora-atomic-docker-host.json",
|
|
|
|
"config_url": "https://git.fedorahosted.org/git/fedora-atomic.git",
|
2017-02-22 02:48:05 +00:00
|
|
|
"repo": [
|
2017-03-27 21:53:08 +00:00
|
|
|
"Server",
|
|
|
|
"http://example.com/repo/x86_64/os",
|
|
|
|
{"baseurl": "Everything"},
|
|
|
|
{"baseurl": "http://example.com/linux/repo", "exclude": "systemd-container"},
|
2016-11-07 05:23:13 +00:00
|
|
|
],
|
|
|
|
"keep_original_sources": True,
|
2016-11-03 12:59:00 +00:00
|
|
|
"ostree_repo": "/mnt/koji/compose/atomic/Rawhide/",
|
2016-11-04 08:07:26 +00:00
|
|
|
"update_summary": True,
|
2017-04-07 13:11:29 +00:00
|
|
|
# Automatically generate a reasonable version
|
|
|
|
"version": "!OSTREE_VERSION_FROM_LABEL_DATE_TYPE_RESPIN",
|
2016-03-23 09:38:34 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
]
|
|
|
|
|
|
|
|
|
2016-04-05 07:13:01 +00:00
|
|
|
Ostree Installer Settings
|
2016-03-23 09:40:16 +00:00
|
|
|
=========================
|
|
|
|
|
2016-04-05 07:13:01 +00:00
|
|
|
The ``ostree_installer`` phase of *Pungi* can produce installer image bundling
|
2016-03-23 09:40:16 +00:00
|
|
|
an OSTree repository. This always runs in Koji as a ``runroot`` task.
|
|
|
|
|
2016-04-05 07:13:01 +00:00
|
|
|
**ostree_installer**
|
2016-03-23 09:40:16 +00:00
|
|
|
(*dict*) -- a variant/arch mapping of configuration. The format should be
|
|
|
|
``[(variant_uid_regex, {arch|*: config_dict})]``.
|
|
|
|
|
|
|
|
The configuration dict for each variant arch pair must have this key:
|
|
|
|
|
|
|
|
These keys are optional:
|
|
|
|
|
2017-03-27 21:53:08 +00:00
|
|
|
* ``repo`` -- (*str|[str]*) repos specified by URL or variant UID
|
2016-03-23 09:40:16 +00:00
|
|
|
* ``release`` -- (*str*) Release value to set for the installer image. Set
|
2017-04-07 13:33:43 +00:00
|
|
|
to ``!RELEASE_FROM_LABEL_DATE_TYPE_RESPIN`` to generate the value
|
|
|
|
:ref:`automatically <auto-version>`.
|
2016-06-24 07:44:40 +00:00
|
|
|
* ``failable`` -- (*[str]*) List of architectures for which this
|
|
|
|
deliverable is not release blocking.
|
2016-03-23 09:40:16 +00:00
|
|
|
|
|
|
|
These optional keys are passed to ``lorax`` to customize the build.
|
|
|
|
|
|
|
|
* ``installpkgs`` -- (*[str]*)
|
|
|
|
* ``add_template`` -- (*[str]*)
|
|
|
|
* ``add_arch_template`` -- (*[str]*)
|
|
|
|
* ``add_template_var`` -- (*[str]*)
|
|
|
|
* ``add_arch_template_var`` -- (*[str]*)
|
2016-11-17 15:15:03 +00:00
|
|
|
* ``rootfs_size`` -- (*[str]*)
|
2016-04-11 08:25:10 +00:00
|
|
|
* ``template_repo`` -- (*str*) Git repository with extra templates.
|
|
|
|
* ``template_branch`` -- (*str*) Branch to use from ``template_repo``.
|
|
|
|
|
|
|
|
The templates can either be absolute paths, in which case they will be used
|
|
|
|
as configured; or they can be relative paths, in which case
|
|
|
|
``template_repo`` needs to point to a Git repository from which to take the
|
|
|
|
templates.
|
2016-03-23 09:40:16 +00:00
|
|
|
|
2017-02-22 02:48:05 +00:00
|
|
|
Deprecated options:
|
|
|
|
|
2017-03-27 21:53:08 +00:00
|
|
|
* ``repo_from`` -- Deprecated, use ``repo`` instead.
|
|
|
|
* ``source_repo_from`` -- Deprecated, use ``repo`` instead.
|
2016-03-23 09:40:16 +00:00
|
|
|
|
|
|
|
Example config
|
|
|
|
--------------
|
|
|
|
::
|
|
|
|
|
2016-04-05 07:13:01 +00:00
|
|
|
ostree_installer = [
|
2016-03-23 09:40:16 +00:00
|
|
|
("^Atomic$", {
|
|
|
|
"x86_64": {
|
2017-03-27 21:53:08 +00:00
|
|
|
"repo": [
|
|
|
|
"Everything",
|
|
|
|
"https://example.com/extra-repo1.repo",
|
|
|
|
"https://example.com/extra-repo2.repo",
|
|
|
|
],
|
2017-04-07 13:33:43 +00:00
|
|
|
"release": "!RELEASE_FROM_LABEL_DATE_TYPE_RESPIN",
|
2016-03-23 09:40:16 +00:00
|
|
|
"installpkgs": ["fedora-productimg-atomic"],
|
2016-04-11 08:25:10 +00:00
|
|
|
"add_template": ["atomic-installer/lorax-configure-repo.tmpl"],
|
2016-03-23 09:40:16 +00:00
|
|
|
"add_template_var": [
|
|
|
|
"ostree_osname=fedora-atomic",
|
|
|
|
"ostree_ref=fedora-atomic/Rawhide/x86_64/docker-host",
|
|
|
|
],
|
2016-04-11 08:25:10 +00:00
|
|
|
"add_arch_template": ["atomic-installer/lorax-embed-repo.tmpl"],
|
2016-03-23 09:40:16 +00:00
|
|
|
"add_arch_template_var": [
|
|
|
|
"ostree_repo=https://kojipkgs.fedoraproject.org/compose/atomic/Rawhide/",
|
|
|
|
"ostree_osname=fedora-atomic",
|
|
|
|
"ostree_ref=fedora-atomic/Rawhide/x86_64/docker-host",
|
|
|
|
]
|
2016-04-11 08:25:10 +00:00
|
|
|
'template_repo': 'https://git.fedorahosted.org/git/spin-kickstarts.git',
|
|
|
|
'template_branch': 'f24',
|
2016-03-23 09:40:16 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
]
|
|
|
|
|
|
|
|
|
2016-06-20 13:43:55 +00:00
|
|
|
OSBS Settings
|
|
|
|
=============
|
|
|
|
|
|
|
|
*Pungi* can build docker images in OSBS. The build is initiated through Koji
|
|
|
|
``container-build`` plugin. The base image will be using RPMs from the current
|
|
|
|
compose and a ``Dockerfile`` from specified Git repository.
|
|
|
|
|
|
|
|
Please note that the image is uploaded to a Docker v2 registry and not exported
|
|
|
|
into compose directory. There will be a metadata file in
|
|
|
|
``compose/metadata/osbs.json`` with details about the built images (assuming
|
|
|
|
they are not scratch builds).
|
|
|
|
|
|
|
|
**osbs**
|
|
|
|
(*dict*) -- a mapping from variant regexes to configuration blocks. The
|
|
|
|
format should be ``{variant_uid_regex: [config_dict]}``.
|
|
|
|
|
|
|
|
The configuration for each image must have at least these keys:
|
|
|
|
|
|
|
|
* ``url`` -- (*str*) URL pointing to a Git repository with ``Dockerfile``.
|
|
|
|
Please see :ref:`git-urls` section for more details.
|
|
|
|
* ``target`` -- (*str*) A Koji target to build the image for.
|
|
|
|
|
2016-06-24 07:44:40 +00:00
|
|
|
Optionally you can specify ``failable``. If it has a truthy value, failure
|
|
|
|
to create the image will not abort the whole compose.
|
|
|
|
|
|
|
|
.. note::
|
|
|
|
Once OSBS gains support for multiple architectures, the usage of this
|
|
|
|
option will most likely change to list architectures that are allowed
|
|
|
|
to fail.
|
|
|
|
|
2016-06-20 13:43:55 +00:00
|
|
|
The configuration will pass other attributes directly to the Koji task.
|
2016-07-20 10:16:47 +00:00
|
|
|
This includes ``name``, ``version``, ``scratch`` and ``priority``.
|
2016-06-20 13:43:55 +00:00
|
|
|
|
|
|
|
A value for ``yum_repourls`` will be created automatically and point at a
|
2017-01-04 08:15:27 +00:00
|
|
|
repository in the current compose. You can add extra repositories with
|
2017-03-27 21:53:08 +00:00
|
|
|
``repo`` key having a list of urls pointing to ``.repo`` files or just
|
|
|
|
variant uid, Pungi will create the .repo file for that variant. ``gpgkey``
|
|
|
|
can be specified to enable gpgcheck in repo files for variants.
|
2016-06-20 13:43:55 +00:00
|
|
|
|
|
|
|
|
|
|
|
Example config
|
|
|
|
--------------
|
|
|
|
::
|
|
|
|
|
|
|
|
osbs = {
|
|
|
|
"^Server$": {
|
2017-01-05 08:32:22 +00:00
|
|
|
# required
|
2016-06-20 13:43:55 +00:00
|
|
|
"url": "git://example.com/dockerfiles.git?#HEAD",
|
|
|
|
"target": "f24-docker-candidate",
|
2017-01-05 08:32:22 +00:00
|
|
|
|
|
|
|
# optional
|
|
|
|
"name": "fedora-docker-base",
|
2016-06-20 13:43:55 +00:00
|
|
|
"version": "24",
|
2017-03-27 21:53:08 +00:00
|
|
|
"repo": ["Everything", "https://example.com/extra-repo.repo"],
|
2017-01-05 08:32:22 +00:00
|
|
|
# This will result in three repo urls being passed to the task.
|
|
|
|
# They will be in this order: Server, Everything, example.com/
|
2017-01-17 04:54:41 +00:00
|
|
|
"gpgkey": 'file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release',
|
2016-06-20 13:43:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-11-20 12:14:24 +00:00
|
|
|
Media Checksums Settings
|
|
|
|
========================
|
|
|
|
|
|
|
|
**media_checksums**
|
2017-04-19 14:09:14 +00:00
|
|
|
(*list*) -- list of checksum types to compute, allowed values are anything
|
|
|
|
supported by Python's ``hashlib`` module (see `documentation for details
|
|
|
|
<https://docs.python.org/2/library/hashlib.html>`_).
|
2015-11-20 12:14:24 +00:00
|
|
|
|
|
|
|
**media_checksum_one_file**
|
|
|
|
(*bool*) -- when ``True``, only one ``CHECKSUM`` file will be created per
|
|
|
|
directory; this option requires ``media_checksums`` to only specify one
|
|
|
|
type
|
|
|
|
|
2015-12-03 08:03:50 +00:00
|
|
|
**media_checksum_base_filename**
|
|
|
|
(*str*) -- when not set, all checksums will be save to a file named either
|
|
|
|
``CHECKSUM`` or based on the digest type; this option allows adding any
|
|
|
|
prefix to that name
|
|
|
|
|
|
|
|
It is possible to use format strings that will be replace by actual values.
|
2016-04-04 07:38:48 +00:00
|
|
|
The allowed keys are:
|
|
|
|
|
|
|
|
* ``arch``
|
|
|
|
* ``compose_id``
|
|
|
|
* ``date``
|
|
|
|
* ``label``
|
|
|
|
* ``label_major_version``
|
|
|
|
* ``release_short``
|
|
|
|
* ``respin``
|
|
|
|
* ``type``
|
|
|
|
* ``type_suffix``
|
|
|
|
* ``version``
|
|
|
|
* ``version``
|
2015-12-03 08:03:50 +00:00
|
|
|
|
|
|
|
For example, for Fedora the prefix should be
|
|
|
|
``%(release_short)s-%(variant)s-%(version)s-%(date)s%(type_suffix)s.%(respin)s``.
|
|
|
|
|
|
|
|
|
2015-09-01 08:03:34 +00:00
|
|
|
Translate Paths Settings
|
|
|
|
========================
|
|
|
|
|
|
|
|
**translate_paths**
|
2016-03-07 14:09:07 +00:00
|
|
|
(*list*) -- list of paths to translate; format: ``[(path, translated_path)]``
|
2015-09-01 08:03:34 +00:00
|
|
|
|
|
|
|
.. note::
|
|
|
|
This feature becomes useful when you need to transform compose location
|
2016-03-07 14:09:07 +00:00
|
|
|
into e.g. a HTTP repo which is can be passed to ``koji image-build``.
|
|
|
|
The ``path`` part is normalized via ``os.path.normpath()``.
|
extra-files: Write a metadata file enumerating extra files
Introduces a new metadata file to track arbitrary files added during the
extra-files phase. This file is placed in the root of each tree and is
called ``extra_files.json``. It is a JSON file containing a single
object, which contains a "header" key with an object describing the
metadata, and a "data" key, which is an array of objects, where each
object represents a file. Each object contains the "file", "checksums",
and "size" keys. "file" is the relative path from the tree root to the
extra file. "checksums" is an object containing one or more checksums,
where the key is the digest type and the value of that key is the hex
digest. Finally, the size is the size of the file in bytes.
For example:
{
"header": {"version": "1.0},
"data": [
{
"file": "GPL",
"checksums": {
"sha256": "8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643"
},
"size": 18092
},
{
"file": "release-notes/notes.html",
"checksums": {
"sha256": "82b1ba8db522aadf101dca6404235fba179e559b95ea24ff39ee1e5d9a53bdcb"
},
"size": 1120
}
]
}
Signed-off-by: Jeremy Cline <jeremy@jcline.org>
Fixes: #295
2016-05-31 13:40:20 +00:00
|
|
|
|
2015-09-01 08:03:34 +00:00
|
|
|
|
|
|
|
Example config
|
|
|
|
--------------
|
|
|
|
::
|
2015-11-26 07:45:33 +00:00
|
|
|
|
2015-09-01 08:03:34 +00:00
|
|
|
translate_paths = [
|
|
|
|
("/mnt/a", "http://b/dir"),
|
|
|
|
]
|
|
|
|
|
|
|
|
Example usage
|
|
|
|
-------------
|
|
|
|
::
|
2015-11-26 07:45:33 +00:00
|
|
|
|
2017-03-24 21:20:55 +00:00
|
|
|
>>> from pungi.util import translate_paths
|
2015-09-01 08:03:34 +00:00
|
|
|
>>> print translate_paths(compose_object_with_mapping, "/mnt/a/c/somefile")
|
|
|
|
http://b/dir/c/somefile
|
2016-05-31 11:34:04 +00:00
|
|
|
|
|
|
|
|
|
|
|
Miscelanous Settings
|
|
|
|
====================
|
|
|
|
|
|
|
|
**paths_module**
|
|
|
|
(*str*) -- Name of Python module implementing the same interface as
|
|
|
|
``pungi.paths``. This module can be used to override where things are
|
|
|
|
placed.
|
|
|
|
|
|
|
|
**link_type** = ``hardlink-or-copy``
|
|
|
|
(*str*) -- Method of putting packages into compose directory.
|
|
|
|
|
|
|
|
Available options:
|
|
|
|
|
|
|
|
* ``hardlink-or-copy``
|
|
|
|
* ``hardlink``
|
|
|
|
* ``copy``
|
|
|
|
* ``symlink``
|
|
|
|
* ``abspath-symlink``
|
|
|
|
|
|
|
|
**skip_phases**
|
|
|
|
(*list*) -- List of phase names that should be skipped. The same
|
|
|
|
functionality is available via a command line option.
|
|
|
|
|
|
|
|
**release_discinfo_description**
|
|
|
|
(*str*) -- Override description in ``.discinfo`` files. The value is a
|
|
|
|
format string accepting ``%(variant_name)s`` and ``%(arch)s`` placeholders.
|
|
|
|
|
|
|
|
**symlink_isos_to**
|
|
|
|
(*str*) -- If set, the ISO files from ``buildinstall``, ``createiso`` and
|
|
|
|
``live_images`` phases will be put into this destination, and a symlink
|
|
|
|
pointing to this location will be created in actual compose directory.
|