- Notifications
You must be signed in to change notification settings - Fork93
Docker Base Image for Arch Linux (read-only mirror)
License
archlinux/archlinux-docker
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
Arch Linux provides OCI-Compliant container images in multiple repositories:
- Weekly in the official DockerHub library:
podman pull docker.io/library/archlinux:latestordocker pull archlinux:latest - Daily in our DockerHub repository:
podman pull docker.io/archlinux/archlinux:latestordocker pull archlinux/archlinux:latest - Daily in our quay.io repository:
podman pull quay.io/archlinux/archlinux:latestordocker pull quay.io/archlinux/archlinux:latest - Daily in our ghcr.io repository:
podman pull ghcr.io/archlinux/archlinux:latestordocker pull ghcr.io/archlinux/archlinux:latest
Three versions of the image are provided:base (approx. 150 MiB),base-devel(approx. 260 MiB) andmultilib-devel (approx. 300MiB) containing therespective meta package. All of them are available astags withlatest pointing tobase. Additionally, images are tagged with theirdate and build job number, f.e.base-devel-20201118.0.9436.
While the images are regularly kept up to date it is strongly recommendedrunningpacman -Syu right after starting a container due to the rollingrelease nature of Arch Linux.
All the images, with the exception of the official DockerHub library image, aresigned by using cosign's keyless signing. The images can beverified with one of the following commands:
$ cosign verify docker.io/archlinux/archlinux:latest --certificate-identity-regexp="https://gitlab\.archlinux\.org/archlinux/archlinux-docker//\.gitlab-ci\.yml@refs/tags/v[0-9]+\.0\.[0-9]+" --certificate-oidc-issuer=https://gitlab.archlinux.org$ cosign verify quay.io/archlinux/archlinux:latest --certificate-identity-regexp="https://gitlab\.archlinux\.org/archlinux/archlinux-docker//\.gitlab-ci\.yml@refs/tags/v[0-9]+\.0\.[0-9]+" --certificate-oidc-issuer=https://gitlab.archlinux.org$ cosign verify ghcr.io/archlinux/archlinux:latest --certificate-identity-regexp="https://gitlab\.archlinux\.org/archlinux/archlinux-docker//\.gitlab-ci\.yml@refs/tags/v[0-9]+\.0\.[0-9]+" --certificate-oidc-issuer=https://gitlab.archlinux.org
- Provide the Arch experience in a Docker image
- Provide the simplest but complete image to
base,base-develandmultilib-develon a regular basis pacmanneeds to work out of the box- All installed packages have to be kept unmodified
⚠️⚠️⚠️ NOTE: For Security Reasons, these images strip the pacman lsign key. This is because the same key would be spread to all containers of the same image, allowing for malicious actors to inject packages (via, for example, a man-in-the-middle). In order to create a lsign-key run `pacman-key --init` on the first execution, but be careful to not redistribute that key.⚠️⚠️⚠️This repository contains all scripts and files needed to create an OCIimage for Arch Linux.
Install the following Arch Linux packages:
- make
- devtools (for the pacman.conf files)
- git (to fetch the commit/revision number)
- podman
- fakechroot
- fakeroot
Make sure your user can directly interact with Podman (i.e.podman info works).
There are multiplemake image-XXX targets, where each creates therespectivearchlinux:XXX image based on the corresponding meta package.Currently those includebase,base-devel andmultilib-devel.
Daily images are build with scheduledGitLab CI using our ownrunner infrastructure. Initially root filesystem archives are constructed andprovided in ourpackage registry. The releasedmulti-stage Dockerfile downloads those archives and verifies their integritybefore unpacking it into an OCI image layer. Images are built usingpodman, which also publishes them to our externalrepositories.
Weekly releases to the official DockerHub library use the same pipeline asdaily builds. Updates are provided as automaticpull requeststo theofficial-images library, whose GitHub pipeline willbuild the images using our provided rootfs archives and Dockerfiles.
Changes in Git feature branches are built and tested using the pipeline as well.Development images are uploaded to ourGitLab Container Registry.
Every year in June the content of the protectedGITLAB_PROJECT_TOKEN variable needs to be replaced. To do this a GitLab admin needs to create a newAccess Token withapi andwrite_repository scope and theMaintainer role. This will create a new Bot User which needs to be given access to the protectedreleases branch.
About
Docker Base Image for Arch Linux (read-only mirror)
Topics
Resources
License
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Packages0
Uh oh!
There was an error while loading.Please reload this page.
Uh oh!
There was an error while loading.Please reload this page.
Contributors13
Uh oh!
There was an error while loading.Please reload this page.