blob: 879740a8996c6bc5d4418dc14fdc11673830e4db (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
|
# Maintainer: Ivan Shapovalov <intelfx@intelfx.name>
pkgname=k3s
pkgver=1.31.3+k3s1
pkgrel=1
pkgdesc='Lightweight Kubernetes'
arch=(x86_64)
url='https://k3s.io'
license=(Apache-2.0)
makedepends=(
git podman
# these are (some of) the tools that are installed into the "builder"
# docker container during the officially blessed build path
# go curl jq yq zstd pigz
)
backup=(
etc/systemd/system/k3s.service.env
etc/systemd/system/k3s-agent.service.env
etc/rancher/k3s/config.yaml
)
source=(
"git+https://github.com/k3s-io/k3s#tag=v${pkgver}"
'k3s.service.env'
'k3s-agent.service.env'
'config.yaml'
'0001-main-apply-go-fmt-to-pkg-data-zz_generated_bindata.g.patch'
'0002-.dockerignore-do-not-ignore-parts-of-GITDIR.patch'
'0003-Dockerfile.dapper-sanitize-DAPPER_OUTPUT.patch'
'0004-Dockerfile.dapper-sanitize-cache-configuration.patch'
'0005-.service-update-systemd-service-files.patch'
'0006-scripts-moar-compression-drop-pigz-and-raw-tar.patch'
)
sha256sums=('8fe579edd10208785bc4df2da6779df2539b171a4f00c6018907de93926ac14f'
'94b0dd21fa4f075d4db7f6efe7a775de476b278de72f99773ee3de0bb54e7f68'
'2f6964aed46deb38095801e124a6603f3a29e6886815d52c59c02883f7a37925'
'6f0500a656ed78c0bb689c12264dbcd79f579edc3b9e17d512be742c1b2c43a4'
'e36e378f2faec39037cf9bcd016a8915ceee9aa61ab9ff739a21a66493b961f5'
'ad47b74ad7e9cd2055e8646f9979373cf7dd1d969ad87387fc20f816287273d8'
'06467ca8182dc91b7f8b3b8dae5982cb00f4db8f98fd5e3f180808ee0d972929'
'f8eeeb45a27bceeacdda64b5604a7bd3629f9f1127f96d4000df9b67a4b062e1'
'44d4e299914e80c072e543356939c1b1fc51c586bc4d3ac587b24bddbd61aa40'
'452ae401363582616d649fc13f92a11cfa7e1c847cb252e540cc49618583b0b8')
prepare() {
cd k3s
# fix #8293, #9089, sanitize buildsystem, moar compression
for p in "${source[@]}"; do
if [[ $p == *.patch ]]; then
git am -3 "$srcdir/$p"
fi
done
}
build() {
# 1. Make a `docker` -> `podman` wrapper that does not complain to stderr
cat >docker <<"EOF"
#!/bin/sh
exec podman "$@"
EOF
chmod +x docker
export PATH="$PWD:$PATH"
# 2. Point podman to a default registry of some sort
# (pulled from https://github.com/containers/podman/blob/main/test/registries.conf)
cat >registries.conf <<"EOF"
unqualified-search-registries = ['docker.io', 'quay.io', 'registry.fedoraproject.org']
[[registry]]
# In Nov. 2020, Docker rate-limits image pulling. To avoid hitting these
# limits while testing, always use the google mirror for qualified and
# unqualified `docker.io` images.
# Ref: https://cloud.google.com/container-registry/docs/pulling-cached-images
prefix="docker.io"
location="mirror.gcr.io"
EOF
export CONTAINERS_REGISTRIES_CONF="$PWD/registries.conf"
# 3. Point podman to a suitably neutered containers.conf to prevent various failures.
cat >containers.conf <<"EOF"
[containers]
default_sysctls = []
EOF
export CONTAINERS_CONF="$PWD/containers.conf"
# 4. Run podman-system-service to create a dockerd-compatible control socket
# and point every broken tool in existence towards it.
# (Do not run podman-system-service if one is already available.)
if [[ -e /var/run/docker.sock ]]; then
:
elif [[ -e /run/user/$UID/podman/podman.sock ]]; then
export DOCKER_HOST="unix:///run/user/$UID/podman/podman.sock"
else
export DOCKER_HOST="unix://$PWD/docker.sock"
podman system service --time 0 "$DOCKER_HOST" >&2 &
podman_pid="$!"
_kill_podman() {
trap - EXIT
if [[ $podman_pid ]]; then
msg2 "Stopping podman service instance (PID ${podman_pid})..."
kill "$podman_pid"
wait "$podman_pid"
podman_pid=
fi
}
trap _kill_podman EXIT
fi
# 5. Set $DAPPER_CACHE_HOME to hopefully persist (some) caches
# FIXME: point this to $HOME after we make sure this works
export DAPPER_CACHE_HOME="$BUILDDIR/dapper-cache"
# dapper/podman won't create those subdirs for us
mkdir -pv "$DAPPER_CACHE_HOME"/{cache,go/pkg}
# 6. create a build script with only the steps we want
cat <<"EOF" | install -m755 /dev/stdin k3s/scripts/archpkg
#!/bin/bash -ex
scripts/download
scripts/build
scripts/package-cli
#REPO=... IMAGE_NAME=... scripts/package-image
scripts/package-airgap
EOF
# 7. Hopefully run the build inside of this Rube-Goldbergian contraption.
cd k3s
#scripts/archpkg
make archpkg
# 8. Stop the podman-system-service instance.
if command -v _kill_podman &>/dev/null; then
_kill_podman
fi
}
package() {
cd k3s
install -Dm755 \
dist/artifacts/k3s \
-t "$pkgdir/usr/bin"
install -Dm644 \
k3s.service \
k3s-agent.service \
-t "$pkgdir/usr/lib/systemd/system"
install -Dm644 \
k3s-rootless.service \
k3s-agent-rootless.service \
-t "$pkgdir/usr/lib/systemd/user"
install -Dm600 \
"$srcdir/k3s.service.env" \
"$srcdir/k3s-agent.service.env" \
-t "$pkgdir/etc/systemd/system"
install -Dm600 \
"$srcdir/config.yaml" \
-t "$pkgdir/etc/rancher/k3s"
# air-gapped images
install -Dm644 \
dist/artifacts/k3s-airgap-images-amd64.tar.zst \
dist/artifacts/k3s-images.txt \
-t "$pkgdir/var/lib/rancher/k3s/agent/images"
install -Dm644 \
LICENSE \
-t "$pkgdir/usr/share/licenses/$pkgname"
}
# vim: ts=2 sw=2 et:
|