From 5084052137ee16215a00f7ed1907b9fddc2a787b Mon Sep 17 00:00:00 2001 From: Tianon Gravi Date: Tue, 30 Jul 2024 11:51:53 -0700 Subject: [PATCH] Remove versions that won't get more Docker, Inc builds See https://github.com/moby/moby/blob/89bca301be72080cd8c948f76ff7818b85268975/project/BRANCHES-AND-TAGS.md --- 24/cli/Dockerfile | 167 ------- 24/cli/docker-entrypoint.sh | 61 --- 24/cli/modprobe.sh | 20 - 24/dind-rootless/Dockerfile | 55 --- 24/dind/Dockerfile | 108 ----- 24/dind/dockerd-entrypoint.sh | 234 ---------- 24/windows/windowsservercore-1809/Dockerfile | 91 ---- .../windowsservercore-ltsc2022/Dockerfile | 91 ---- 25/cli/Dockerfile | 167 ------- 25/cli/docker-entrypoint.sh | 61 --- 25/cli/modprobe.sh | 20 - 25/dind-rootless/Dockerfile | 55 --- 25/dind/Dockerfile | 108 ----- 25/dind/dockerd-entrypoint.sh | 234 ---------- 25/windows/windowsservercore-1809/Dockerfile | 91 ---- .../windowsservercore-ltsc2022/Dockerfile | 91 ---- 26/cli/Dockerfile | 167 ------- 26/cli/docker-entrypoint.sh | 61 --- 26/cli/modprobe.sh | 20 - 26/dind-rootless/Dockerfile | 55 --- 26/dind/Dockerfile | 108 ----- 26/dind/dockerd-entrypoint.sh | 234 ---------- 26/windows/windowsservercore-1809/Dockerfile | 91 ---- .../windowsservercore-ltsc2022/Dockerfile | 91 ---- generate-stackbrew-library.sh | 6 - versions.json | 423 ------------------ 26 files changed, 2910 deletions(-) delete mode 100644 24/cli/Dockerfile delete mode 100755 24/cli/docker-entrypoint.sh delete mode 100755 24/cli/modprobe.sh delete mode 100644 24/dind-rootless/Dockerfile delete mode 100644 24/dind/Dockerfile delete mode 100755 24/dind/dockerd-entrypoint.sh delete mode 100644 24/windows/windowsservercore-1809/Dockerfile delete mode 100644 24/windows/windowsservercore-ltsc2022/Dockerfile delete mode 100644 25/cli/Dockerfile delete mode 100755 25/cli/docker-entrypoint.sh delete mode 100755 25/cli/modprobe.sh delete mode 100644 25/dind-rootless/Dockerfile delete mode 100644 25/dind/Dockerfile delete mode 100755 25/dind/dockerd-entrypoint.sh delete mode 100644 25/windows/windowsservercore-1809/Dockerfile delete mode 100644 25/windows/windowsservercore-ltsc2022/Dockerfile delete mode 100644 26/cli/Dockerfile delete mode 100755 26/cli/docker-entrypoint.sh delete mode 100755 26/cli/modprobe.sh delete mode 100644 26/dind-rootless/Dockerfile delete mode 100644 26/dind/Dockerfile delete mode 100755 26/dind/dockerd-entrypoint.sh delete mode 100644 26/windows/windowsservercore-1809/Dockerfile delete mode 100644 26/windows/windowsservercore-ltsc2022/Dockerfile diff --git a/24/cli/Dockerfile b/24/cli/Dockerfile deleted file mode 100644 index 2a74c87aeb..0000000000 --- a/24/cli/Dockerfile +++ /dev/null @@ -1,167 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM alpine:3.20 - -RUN apk add --no-cache \ - ca-certificates \ -# DOCKER_HOST=ssh://... -- https://github.com/docker/cli/pull/1014 - openssh-client \ -# https://github.com/docker-library/docker/issues/482#issuecomment-2197116408 - git - -# ensure that nsswitch.conf is set up for Go's "netgo" implementation (which Docker explicitly uses) -# - https://github.com/moby/moby/blob/v24.0.6/hack/make.sh#L111 -# - https://github.com/golang/go/blob/go1.19.13/src/net/conf.go#L227-L303 -# - docker run --rm debian:stretch grep '^hosts:' /etc/nsswitch.conf -RUN [ -e /etc/nsswitch.conf ] && grep '^hosts: files dns' /etc/nsswitch.conf - -# pre-add a "docker" group for socket usage -RUN set -eux; \ - addgroup -g 2375 -S docker - -ENV DOCKER_VERSION 24.0.9 - -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://download.docker.com/linux/static/stable/x86_64/docker-24.0.9.tgz'; \ - ;; \ - 'armhf') \ - url='https://download.docker.com/linux/static/stable/armel/docker-24.0.9.tgz'; \ - ;; \ - 'armv7') \ - url='https://download.docker.com/linux/static/stable/armhf/docker-24.0.9.tgz'; \ - ;; \ - 'aarch64') \ - url='https://download.docker.com/linux/static/stable/aarch64/docker-24.0.9.tgz'; \ - ;; \ - *) echo >&2 "error: unsupported 'docker.tgz' architecture ($apkArch)"; exit 1 ;; \ - esac; \ - \ - wget -O 'docker.tgz' "$url"; \ - \ - tar --extract \ - --file docker.tgz \ - --strip-components 1 \ - --directory /usr/local/bin/ \ - --no-same-owner \ - 'docker/docker' \ - ; \ - rm docker.tgz; \ - \ - docker --version - -ENV DOCKER_BUILDX_VERSION 0.16.2 -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-amd64'; \ - sha256='43e4c928a0be38ab34e206c82957edfdd54f3e7124f1dadd7779591c3acf77ea'; \ - ;; \ - 'armhf') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm-v6'; \ - sha256='77678205fbaaead25167cd93b022996d0bafff67deb5ca82b92b25cccb06ad07'; \ - ;; \ - 'armv7') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm-v7'; \ - sha256='b4f029ed0d4d30c49857bc31f8bec5484b3f6b8104d8d49a187fb6b69fab3d82'; \ - ;; \ - 'aarch64') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm64'; \ - sha256='775f1ab64aa0e5d901dcc6ecf6843ec3261f27476873760711aa362b403f61f3'; \ - ;; \ - 'ppc64le') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-ppc64le'; \ - sha256='956b020318ad0ba94f817116792d9da8695ebab38254c9f821a85a3369175f7e'; \ - ;; \ - 'riscv64') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-riscv64'; \ - sha256='e90589ff33ad409a40a5e53cde5af4a0f230f0d8f5b6d9af522120a6900222ea'; \ - ;; \ - 's390x') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-s390x'; \ - sha256='f2dbf2dc967415e1e1f4398d040d6b5b81e4e27f37df22bd148ea4b18c8ea6eb'; \ - ;; \ - *) echo >&2 "warning: unsupported 'docker-buildx' architecture ($apkArch); skipping"; exit 0 ;; \ - esac; \ - \ - wget -O 'docker-buildx' "$url"; \ - echo "$sha256 *"'docker-buildx' | sha256sum -c -; \ - \ - plugin='/usr/local/libexec/docker/cli-plugins/docker-buildx'; \ - mkdir -p "$(dirname "$plugin")"; \ - mv -vT 'docker-buildx' "$plugin"; \ - chmod +x "$plugin"; \ - \ - docker buildx version - -ENV DOCKER_COMPOSE_VERSION 2.29.1 -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-x86_64'; \ - sha256='5ea89dd65d33912a83737d8a4bf070d5de534a32b8493a21fbefc924484786a9'; \ - ;; \ - 'armhf') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv6'; \ - sha256='5fdd0653bb04798f1448bd5bdbecea02bcf39247fcc9b8aab10c05c8e680ede0'; \ - ;; \ - 'armv7') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv7'; \ - sha256='0d675f39b3089050d0630a7151580a58abc6c189e64209c6403598b6e9fc0b21'; \ - ;; \ - 'aarch64') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-aarch64'; \ - sha256='7f0023ba726b90347e4ebc1d94ec5970390b8bddb86402c0429f163dca70d745'; \ - ;; \ - 'ppc64le') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-ppc64le'; \ - sha256='9d69aae252fa7fd3a234647951b2af496ee927134d5456d4b8bac31d4d260f5d'; \ - ;; \ - 'riscv64') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-riscv64'; \ - sha256='91b6b2f56e8cba3965a5409fa5125d3f01408c9b2d0bf5b9c119f353601d1e51'; \ - ;; \ - 's390x') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-s390x'; \ - sha256='1ea22d04bab9452de3169e22b60d77a232acdf829ac4858dc780085dd7fd4c48'; \ - ;; \ - *) echo >&2 "warning: unsupported 'docker-compose' architecture ($apkArch); skipping"; exit 0 ;; \ - esac; \ - \ - wget -O 'docker-compose' "$url"; \ - echo "$sha256 *"'docker-compose' | sha256sum -c -; \ - \ - plugin='/usr/local/libexec/docker/cli-plugins/docker-compose'; \ - mkdir -p "$(dirname "$plugin")"; \ - mv -vT 'docker-compose' "$plugin"; \ - chmod +x "$plugin"; \ - \ - ln -sv "$plugin" /usr/local/bin/; \ - docker-compose --version; \ - docker compose version - -COPY modprobe.sh /usr/local/bin/modprobe -COPY docker-entrypoint.sh /usr/local/bin/ - -# https://github.com/docker-library/docker/pull/166 -# dockerd-entrypoint.sh uses DOCKER_TLS_CERTDIR for auto-generating TLS certificates -# docker-entrypoint.sh uses DOCKER_TLS_CERTDIR for auto-setting DOCKER_TLS_VERIFY and DOCKER_CERT_PATH -# (For this to work, at least the "client" subdirectory of this path needs to be shared between the client and server containers via a volume, "docker cp", or other means of data sharing.) -ENV DOCKER_TLS_CERTDIR=/certs -# also, ensure the directory pre-exists and has wide enough permissions for "dockerd-entrypoint.sh" to create subdirectories, even when run in "rootless" mode -RUN mkdir /certs /certs/client && chmod 1777 /certs /certs/client -# (doing both /certs and /certs/client so that if Docker does a "copy-up" into a volume defined on /certs/client, it will "do the right thing" by default in a way that still works for rootless users) - -ENTRYPOINT ["docker-entrypoint.sh"] -CMD ["sh"] diff --git a/24/cli/docker-entrypoint.sh b/24/cli/docker-entrypoint.sh deleted file mode 100755 index d41cef8e3c..0000000000 --- a/24/cli/docker-entrypoint.sh +++ /dev/null @@ -1,61 +0,0 @@ -#!/bin/sh -set -eu - -# first arg is `-f` or `--some-option` -if [ "${1#-}" != "$1" ]; then - set -- docker "$@" -fi - -# if our command is a valid Docker subcommand, let's invoke it through Docker instead -# (this allows for "docker run docker ps", etc) -if docker help "$1" > /dev/null 2>&1; then - set -- docker "$@" -fi - -_should_tls() { - [ -n "${DOCKER_TLS_CERTDIR:-}" ] \ - && [ -s "$DOCKER_TLS_CERTDIR/client/ca.pem" ] \ - && [ -s "$DOCKER_TLS_CERTDIR/client/cert.pem" ] \ - && [ -s "$DOCKER_TLS_CERTDIR/client/key.pem" ] -} - -# if we have no DOCKER_HOST but we do have the default Unix socket (standard or rootless), use it explicitly -if [ -z "${DOCKER_HOST:-}" ] && [ -S /var/run/docker.sock ]; then - export DOCKER_HOST=unix:///var/run/docker.sock -elif [ -z "${DOCKER_HOST:-}" ] && XDG_RUNTIME_DIR="${XDG_RUNTIME_DIR:-/run/user/$(id -u)}" && [ -S "$XDG_RUNTIME_DIR/docker.sock" ]; then - export DOCKER_HOST="unix://$XDG_RUNTIME_DIR/docker.sock" -fi - -# if DOCKER_HOST isn't set (no custom setting, no default socket), let's set it to a sane remote value -if [ -z "${DOCKER_HOST:-}" ]; then - if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then - export DOCKER_HOST='tcp://docker:2376' - else - export DOCKER_HOST='tcp://docker:2375' - fi -fi -if [ "${DOCKER_HOST#tcp:}" != "$DOCKER_HOST" ] \ - && [ -z "${DOCKER_TLS_VERIFY:-}" ] \ - && [ -z "${DOCKER_CERT_PATH:-}" ] \ - && _should_tls \ -; then - export DOCKER_TLS_VERIFY=1 - export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client" -fi - -if [ "$1" = 'dockerd' ]; then - cat >&2 <<-'EOW' - - 📎 Hey there! It looks like you're trying to run a Docker daemon. - - You probably should use the "dind" image variant instead, something like: - - docker run --privileged --name some-docker ... docker:dind ... - - See https://hub.docker.com/_/docker/ for more documentation and usage examples. - - EOW - sleep 3 -fi - -exec "$@" diff --git a/24/cli/modprobe.sh b/24/cli/modprobe.sh deleted file mode 100755 index b357d893fd..0000000000 --- a/24/cli/modprobe.sh +++ /dev/null @@ -1,20 +0,0 @@ -#!/bin/sh -set -eu - -# "modprobe" without modprobe -# https://twitter.com/lucabruno/status/902934379835662336 - -# this isn't 100% fool-proof, but it'll have a much higher success rate than simply using the "real" modprobe - -# Docker often uses "modprobe -va foo bar baz" -# so we ignore modules that start with "-" -for module; do - if [ "${module#-}" = "$module" ]; then - ip link show "$module" || true - lsmod | grep "$module" || true - fi -done - -# remove /usr/local/... from PATH so we can exec the real modprobe as a last resort -export PATH='/usr/sbin:/usr/bin:/sbin:/bin' -exec modprobe "$@" diff --git a/24/dind-rootless/Dockerfile b/24/dind-rootless/Dockerfile deleted file mode 100644 index e105f64e4e..0000000000 --- a/24/dind-rootless/Dockerfile +++ /dev/null @@ -1,55 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM docker:24-dind - -# busybox "ip" is insufficient: -# [rootlesskit:child ] error: executing [[ip tuntap add name tap0 mode tap] [ip link set tap0 address 02:50:00:00:00:01]]: exit status 1 -RUN apk add --no-cache iproute2 fuse-overlayfs - -# "/run/user/UID" will be used by default as the value of XDG_RUNTIME_DIR -RUN mkdir /run/user && chmod 1777 /run/user - -# create a default user preconfigured for running rootless dockerd -RUN set -eux; \ - adduser -h /home/rootless -g 'Rootless' -D -u 1000 rootless; \ - echo 'rootless:100000:65536' >> /etc/subuid; \ - echo 'rootless:100000:65536' >> /etc/subgid - -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://download.docker.com/linux/static/stable/x86_64/docker-rootless-extras-24.0.9.tgz'; \ - ;; \ - 'aarch64') \ - url='https://download.docker.com/linux/static/stable/aarch64/docker-rootless-extras-24.0.9.tgz'; \ - ;; \ - *) echo >&2 "error: unsupported 'rootless.tgz' architecture ($apkArch)"; exit 1 ;; \ - esac; \ - \ - wget -O 'rootless.tgz' "$url"; \ - \ - tar --extract \ - --file rootless.tgz \ - --strip-components 1 \ - --directory /usr/local/bin/ \ - 'docker-rootless-extras/rootlesskit' \ - 'docker-rootless-extras/rootlesskit-docker-proxy' \ - 'docker-rootless-extras/vpnkit' \ - ; \ - rm rootless.tgz; \ - \ - rootlesskit --version; \ - vpnkit --version - -# pre-create "/var/lib/docker" for our rootless user -RUN set -eux; \ - mkdir -p /home/rootless/.local/share/docker; \ - chown -R rootless:rootless /home/rootless/.local/share/docker -VOLUME /home/rootless/.local/share/docker -USER rootless diff --git a/24/dind/Dockerfile b/24/dind/Dockerfile deleted file mode 100644 index ab0aa3da9c..0000000000 --- a/24/dind/Dockerfile +++ /dev/null @@ -1,108 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM docker:24-cli - -# https://github.com/moby/moby/blob/0eecd59153c03ced5f5ddd79cc98f29e4d86daec/project/PACKAGERS.md#runtime-dependencies -# https://github.com/docker/docker-ce-packaging/blob/963aa02666035d4e268f33c63d7868d6cdd1d34c/deb/common/control#L28-L41 -RUN set -eux; \ - apk add --no-cache \ - btrfs-progs \ - e2fsprogs \ - e2fsprogs-extra \ - git \ - ip6tables \ - iptables \ - openssl \ - pigz \ - shadow-uidmap \ - xfsprogs \ - xz \ - zfs \ - ; - -# dind might be used on systems where the nf_tables kernel module isn't available. In that case, -# we need to switch over to xtables-legacy. See https://github.com/docker-library/docker/issues/463 -RUN set -eux; \ - apk add --no-cache iptables-legacy; \ -# set up a symlink farm we can use PATH to switch to legacy with - mkdir -p /usr/local/sbin/.iptables-legacy; \ -# https://git.alpinelinux.org/aports/tree/main/iptables/APKBUILD?id=b215d54de159eacafecb13c68dfadce6eefd9ec9#n73 - for f in \ - iptables \ - iptables-save \ - iptables-restore \ - ip6tables \ - ip6tables-save \ - ip6tables-restore \ - ; do \ -# "iptables-save" -> "iptables-legacy-save", "ip6tables" -> "ip6tables-legacy", etc. -# https://pkgs.alpinelinux.org/contents?branch=v3.19&name=iptables-legacy&arch=x86_64 - b="/sbin/${f/tables/tables-legacy}"; \ - "$b" --version; \ - ln -svT "$b" "/usr/local/sbin/.iptables-legacy/$f"; \ - done; \ -# verify it works (and gets us legacy) - export PATH="/usr/local/sbin/.iptables-legacy:$PATH"; \ - iptables --version | grep legacy - -# set up subuid/subgid so that "--userns-remap=default" works out-of-the-box -RUN set -eux; \ - addgroup -S dockremap; \ - adduser -S -G dockremap dockremap; \ - echo 'dockremap:165536:65536' >> /etc/subuid; \ - echo 'dockremap:165536:65536' >> /etc/subgid - -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://download.docker.com/linux/static/stable/x86_64/docker-24.0.9.tgz'; \ - ;; \ - 'armhf') \ - url='https://download.docker.com/linux/static/stable/armel/docker-24.0.9.tgz'; \ - ;; \ - 'armv7') \ - url='https://download.docker.com/linux/static/stable/armhf/docker-24.0.9.tgz'; \ - ;; \ - 'aarch64') \ - url='https://download.docker.com/linux/static/stable/aarch64/docker-24.0.9.tgz'; \ - ;; \ - *) echo >&2 "error: unsupported 'docker.tgz' architecture ($apkArch)"; exit 1 ;; \ - esac; \ - \ - wget -O 'docker.tgz' "$url"; \ - \ - tar --extract \ - --file docker.tgz \ - --strip-components 1 \ - --directory /usr/local/bin/ \ - --no-same-owner \ -# we exclude the CLI binary because we already extracted that over in the "docker:24-cli" image that we're FROM and we don't want to duplicate those bytes again in this layer - --exclude 'docker/docker' \ - ; \ - rm docker.tgz; \ - \ - dockerd --version; \ - containerd --version; \ - ctr --version; \ - runc --version - -# https://github.com/docker/docker/tree/master/hack/dind -ENV DIND_COMMIT 65cfcc28ab37cb75e1560e4b4738719c07c6618e - -RUN set -eux; \ - wget -O /usr/local/bin/dind "https://raw.githubusercontent.com/docker/docker/${DIND_COMMIT}/hack/dind"; \ - chmod +x /usr/local/bin/dind - -COPY dockerd-entrypoint.sh /usr/local/bin/ - -VOLUME /var/lib/docker -EXPOSE 2375 2376 - -ENTRYPOINT ["dockerd-entrypoint.sh"] -CMD [] diff --git a/24/dind/dockerd-entrypoint.sh b/24/dind/dockerd-entrypoint.sh deleted file mode 100755 index 6c06bb8118..0000000000 --- a/24/dind/dockerd-entrypoint.sh +++ /dev/null @@ -1,234 +0,0 @@ -#!/bin/sh -set -eu - -_tls_ensure_private() { - local f="$1"; shift - [ -s "$f" ] || openssl genrsa -out "$f" 4096 -} -_tls_san() { - { - ip -oneline address | awk '{ gsub(/\/.+$/, "", $4); print "IP:" $4 }' - { - cat /etc/hostname - echo 'docker' - echo 'localhost' - hostname -f - hostname -s - } | sed 's/^/DNS:/' - [ -z "${DOCKER_TLS_SAN:-}" ] || echo "$DOCKER_TLS_SAN" - } | sort -u | xargs printf '%s,' | sed "s/,\$//" -} -_tls_generate_certs() { - local dir="$1"; shift - - # if server/{ca,key,cert}.pem && !ca/key.pem, do NOTHING except verify (user likely managing CA themselves) - # if ca/key.pem || !ca/cert.pem, generate CA public if necessary - # if ca/key.pem, generate server public - # if ca/key.pem, generate client public - # (regenerating public certs every startup to account for SAN/IP changes and/or expiration) - - if [ -s "$dir/server/ca.pem" ] && [ -s "$dir/server/cert.pem" ] && [ -s "$dir/server/key.pem" ] && [ ! -s "$dir/ca/key.pem" ]; then - openssl verify -CAfile "$dir/server/ca.pem" "$dir/server/cert.pem" - return 0 - fi - - # https://github.com/FiloSottile/mkcert/issues/174 - local certValidDays='825' - - if [ -s "$dir/ca/key.pem" ] || [ ! -s "$dir/ca/cert.pem" ]; then - # if we either have a CA private key or do *not* have a CA public key, then we should create/manage the CA - mkdir -p "$dir/ca" - _tls_ensure_private "$dir/ca/key.pem" - openssl req -new -key "$dir/ca/key.pem" \ - -out "$dir/ca/cert.pem" \ - -subj '/CN=docker:dind CA' -x509 -days "$certValidDays" - fi - - if [ -s "$dir/ca/key.pem" ]; then - # if we have a CA private key, we should create/manage a server key - mkdir -p "$dir/server" - _tls_ensure_private "$dir/server/key.pem" - openssl req -new -key "$dir/server/key.pem" \ - -out "$dir/server/csr.pem" \ - -subj '/CN=docker:dind server' - cat > "$dir/server/openssl.cnf" <<-EOF - [ x509_exts ] - subjectAltName = $(_tls_san) - EOF - openssl x509 -req \ - -in "$dir/server/csr.pem" \ - -CA "$dir/ca/cert.pem" \ - -CAkey "$dir/ca/key.pem" \ - -CAcreateserial \ - -out "$dir/server/cert.pem" \ - -days "$certValidDays" \ - -extfile "$dir/server/openssl.cnf" \ - -extensions x509_exts - cp "$dir/ca/cert.pem" "$dir/server/ca.pem" - openssl verify -CAfile "$dir/server/ca.pem" "$dir/server/cert.pem" - fi - - if [ -s "$dir/ca/key.pem" ]; then - # if we have a CA private key, we should create/manage a client key - mkdir -p "$dir/client" - _tls_ensure_private "$dir/client/key.pem" - chmod 0644 "$dir/client/key.pem" # openssl defaults to 0600 for the private key, but this one needs to be shared with arbitrary client contexts - openssl req -new \ - -key "$dir/client/key.pem" \ - -out "$dir/client/csr.pem" \ - -subj '/CN=docker:dind client' - cat > "$dir/client/openssl.cnf" <<-'EOF' - [ x509_exts ] - extendedKeyUsage = clientAuth - EOF - openssl x509 -req \ - -in "$dir/client/csr.pem" \ - -CA "$dir/ca/cert.pem" \ - -CAkey "$dir/ca/key.pem" \ - -CAcreateserial \ - -out "$dir/client/cert.pem" \ - -days "$certValidDays" \ - -extfile "$dir/client/openssl.cnf" \ - -extensions x509_exts - cp "$dir/ca/cert.pem" "$dir/client/ca.pem" - openssl verify -CAfile "$dir/client/ca.pem" "$dir/client/cert.pem" - fi -} - -# no arguments passed -# or first arg is `-f` or `--some-option` -if [ "$#" -eq 0 ] || [ "${1#-}" != "$1" ]; then - # set "dockerSocket" to the default "--host" *unix socket* value (for both standard or rootless) - uid="$(id -u)" - if [ "$uid" = '0' ]; then - dockerSocket='unix:///var/run/docker.sock' - else - # if we're not root, we must be trying to run rootless - : "${XDG_RUNTIME_DIR:=/run/user/$uid}" - dockerSocket="unix://$XDG_RUNTIME_DIR/docker.sock" - fi - case "${DOCKER_HOST:-}" in - unix://*) - dockerSocket="$DOCKER_HOST" - ;; - esac - - # add our default arguments - if [ -n "${DOCKER_TLS_CERTDIR:-}" ]; then - _tls_generate_certs "$DOCKER_TLS_CERTDIR" - # generate certs and use TLS if requested/possible (default in 19.03+) - set -- dockerd \ - --host="$dockerSocket" \ - --host=tcp://0.0.0.0:2376 \ - --tlsverify \ - --tlscacert "$DOCKER_TLS_CERTDIR/server/ca.pem" \ - --tlscert "$DOCKER_TLS_CERTDIR/server/cert.pem" \ - --tlskey "$DOCKER_TLS_CERTDIR/server/key.pem" \ - "$@" - DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS="${DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS:-} -p 0.0.0.0:2376:2376/tcp" - else - # TLS disabled (-e DOCKER_TLS_CERTDIR='') or missing certs - set -- dockerd \ - --host="$dockerSocket" \ - --host=tcp://0.0.0.0:2375 \ - "$@" - DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS="${DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS:-} -p 0.0.0.0:2375:2375/tcp" - fi -fi - -if [ "$1" = 'dockerd' ]; then - # explicitly remove Docker's default PID file to ensure that it can start properly if it was stopped uncleanly (and thus didn't clean up the PID file) - find /run /var/run -iname 'docker*.pid' -delete || : - - # XXX inject "docker-init" (tini) as pid1 to workaround https://github.com/docker-library/docker/issues/318 (zombie container-shim processes) - set -- docker-init -- "$@" - - iptablesLegacy= - if [ -n "${DOCKER_IPTABLES_LEGACY+x}" ]; then - # let users choose explicitly to legacy or not to legacy - iptablesLegacy="$DOCKER_IPTABLES_LEGACY" - if [ -n "$iptablesLegacy" ]; then - modprobe ip_tables || : - modprobe ip6_tables || : - else - modprobe nf_tables || : - fi - elif ( - # https://git.netfilter.org/iptables/tree/iptables/nft-shared.c?id=f5cf76626d95d2c491a80288bccc160c53b44e88#n420 - # https://github.com/docker-library/docker/pull/468#discussion_r1442131459 - for f in /proc/net/ip_tables_names /proc/net/ip6_tables_names /proc/net/arp_tables_names; do - if b="$(cat "$f")" && [ -n "$b" ]; then - exit 0 - fi - done - exit 1 - ); then - # if we already have any "legacy" iptables rules, we should always use legacy - iptablesLegacy=1 - elif ! iptables -nL > /dev/null 2>&1; then - # if iptables fails to run, chances are high the necessary kernel modules aren't loaded (perhaps the host is using xtables, for example) - # https://github.com/docker-library/docker/issues/350 - # https://github.com/moby/moby/issues/26824 - # https://github.com/docker-library/docker/pull/437#issuecomment-1854900620 - modprobe nf_tables || : - if ! iptables -nL > /dev/null 2>&1; then - # might be host has no nf_tables, but Alpine is all-in now (so let's try a legacy fallback) - modprobe ip_tables || : - modprobe ip6_tables || : - if /usr/local/sbin/.iptables-legacy/iptables -nL > /dev/null 2>&1; then - iptablesLegacy=1 - fi - fi - fi - if [ -n "$iptablesLegacy" ]; then - # see https://github.com/docker-library/docker/issues/463 (and the dind Dockerfile where this directory is set up) - export PATH="/usr/local/sbin/.iptables-legacy:$PATH" - fi - iptables --version # so users can see whether it's legacy or not - - uid="$(id -u)" - if [ "$uid" != '0' ]; then - # if we're not root, we must be trying to run rootless - if ! command -v rootlesskit > /dev/null; then - echo >&2 "error: attempting to run rootless dockerd but missing 'rootlesskit' (perhaps the 'docker:dind-rootless' image variant is intended?)" - exit 1 - fi - user="$(id -un 2>/dev/null || :)" - if ! grep -qE "^($uid${user:+|$user}):" /etc/subuid || ! grep -qE "^($uid${user:+|$user}):" /etc/subgid; then - echo >&2 "error: attempting to run rootless dockerd but missing necessary entries in /etc/subuid and/or /etc/subgid for $uid" - exit 1 - fi - : "${XDG_RUNTIME_DIR:=/run/user/$uid}" - export XDG_RUNTIME_DIR - if ! mkdir -p "$XDG_RUNTIME_DIR" || [ ! -w "$XDG_RUNTIME_DIR" ] || ! mkdir -p "$HOME/.local/share/docker" || [ ! -w "$HOME/.local/share/docker" ]; then - echo >&2 "error: attempting to run rootless dockerd but need writable HOME ($HOME) and XDG_RUNTIME_DIR ($XDG_RUNTIME_DIR) for user $uid" - exit 1 - fi - if [ -f /proc/sys/kernel/unprivileged_userns_clone ] && unprivClone="$(cat /proc/sys/kernel/unprivileged_userns_clone)" && [ "$unprivClone" != '1' ]; then - echo >&2 "error: attempting to run rootless dockerd but need 'kernel.unprivileged_userns_clone' (/proc/sys/kernel/unprivileged_userns_clone) set to 1" - exit 1 - fi - if [ -f /proc/sys/user/max_user_namespaces ] && maxUserns="$(cat /proc/sys/user/max_user_namespaces)" && [ "$maxUserns" = '0' ]; then - echo >&2 "error: attempting to run rootless dockerd but need 'user.max_user_namespaces' (/proc/sys/user/max_user_namespaces) set to a sufficiently large value" - exit 1 - fi - # TODO overlay support detection? - exec rootlesskit \ - --net="${DOCKERD_ROOTLESS_ROOTLESSKIT_NET:-vpnkit}" \ - --mtu="${DOCKERD_ROOTLESS_ROOTLESSKIT_MTU:-1500}" \ - --disable-host-loopback \ - --port-driver=builtin \ - --copy-up=/etc \ - --copy-up=/run \ - ${DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS:-} \ - "$@" - elif [ -x '/usr/local/bin/dind' ]; then - # if we have the (mostly defunct now) Docker-in-Docker wrapper script, use it - set -- '/usr/local/bin/dind' "$@" - fi -else - # if it isn't `dockerd` we're trying to run, pass it through `docker-entrypoint.sh` so it gets `DOCKER_HOST` set appropriately too - set -- docker-entrypoint.sh "$@" -fi - -exec "$@" diff --git a/24/windows/windowsservercore-1809/Dockerfile b/24/windows/windowsservercore-1809/Dockerfile deleted file mode 100644 index 7870f77e09..0000000000 --- a/24/windows/windowsservercore-1809/Dockerfile +++ /dev/null @@ -1,91 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM mcr.microsoft.com/windows/servercore:1809 - -# $ProgressPreference: https://github.com/PowerShell/PowerShell/issues/2138#issuecomment-251261324 -SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"] - -# PATH isn't actually set in the Docker image, so we have to set it from within the container -RUN $newPath = ('{0}\docker;{1}' -f $env:ProgramFiles, $env:PATH); \ - Write-Host ('Updating PATH: {0}' -f $newPath); \ - [Environment]::SetEnvironmentVariable('PATH', $newPath, [EnvironmentVariableTarget]::Machine); -# doing this first to share cache across versions more aggressively - -ENV DOCKER_VERSION 24.0.9 -ENV DOCKER_URL https://download.docker.com/win/static/stable/x86_64/docker-24.0.9.zip -# TODO ENV DOCKER_SHA256 -# https://github.com/docker/docker-ce/blob/5b073ee2cf564edee5adca05eee574142f7627bb/components/packaging/static/hash_files !! -# (no SHA file artifacts on download.docker.com yet as of 2017-06-07 though) - -RUN Write-Host ('Downloading {0} ...' -f $env:DOCKER_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_URL -OutFile 'docker.zip'; \ - \ - Write-Host 'Expanding ...'; \ - Expand-Archive docker.zip -DestinationPath $env:ProgramFiles; \ -# (this archive has a "docker/..." directory in it already) - \ - Write-Host 'Removing ...'; \ - Remove-Item @( \ - 'docker.zip', \ - ('{0}\docker\dockerd.exe' -f $env:ProgramFiles) \ - ) -Force; \ - \ - Write-Host 'Verifying install ("docker --version") ...'; \ - docker --version; \ - \ - Write-Host 'Complete.'; - -# https://github.com/docker-library/docker/issues/409#issuecomment-1462868414 -ENV DOCKER_BUILDX_VERSION 0.16.2 -ENV DOCKER_BUILDX_URL https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.windows-amd64.exe -ENV DOCKER_BUILDX_SHA256 0ee1234dc4bec883f9407211ae386052c45d13cf9052329f8aece8358cff5e9c -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-buildx.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_BUILDX_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_BUILDX_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_BUILDX_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_BUILDX_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker buildx version") ...'; \ - docker buildx version; \ - \ - Write-Host 'Complete.'; -ENV DOCKER_COMPOSE_VERSION 2.29.1 -ENV DOCKER_COMPOSE_URL https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-x86_64.exe -ENV DOCKER_COMPOSE_SHA256 c80155bfd2669bcdc7482ae7ccf7ccaf6b5da2149b690d806c7a4d9200abc54e -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-compose.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_COMPOSE_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_COMPOSE_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_COMPOSE_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_COMPOSE_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker compose version") ...'; \ - docker compose version; \ - \ - $link = ('{0}\docker\docker-compose.exe' -f $env:ProgramFiles); \ - Write-Host ('Linking {0} to {1} ...' -f $plugin, $link); \ - New-Item -ItemType SymbolicLink -Path $link -Target $plugin; \ - \ - Write-Host 'Verifying install ("docker-compose --version") ...'; \ - docker-compose --version; \ - \ - Write-Host 'Complete.'; diff --git a/24/windows/windowsservercore-ltsc2022/Dockerfile b/24/windows/windowsservercore-ltsc2022/Dockerfile deleted file mode 100644 index 34d07b705f..0000000000 --- a/24/windows/windowsservercore-ltsc2022/Dockerfile +++ /dev/null @@ -1,91 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM mcr.microsoft.com/windows/servercore:ltsc2022 - -# $ProgressPreference: https://github.com/PowerShell/PowerShell/issues/2138#issuecomment-251261324 -SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"] - -# PATH isn't actually set in the Docker image, so we have to set it from within the container -RUN $newPath = ('{0}\docker;{1}' -f $env:ProgramFiles, $env:PATH); \ - Write-Host ('Updating PATH: {0}' -f $newPath); \ - [Environment]::SetEnvironmentVariable('PATH', $newPath, [EnvironmentVariableTarget]::Machine); -# doing this first to share cache across versions more aggressively - -ENV DOCKER_VERSION 24.0.9 -ENV DOCKER_URL https://download.docker.com/win/static/stable/x86_64/docker-24.0.9.zip -# TODO ENV DOCKER_SHA256 -# https://github.com/docker/docker-ce/blob/5b073ee2cf564edee5adca05eee574142f7627bb/components/packaging/static/hash_files !! -# (no SHA file artifacts on download.docker.com yet as of 2017-06-07 though) - -RUN Write-Host ('Downloading {0} ...' -f $env:DOCKER_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_URL -OutFile 'docker.zip'; \ - \ - Write-Host 'Expanding ...'; \ - Expand-Archive docker.zip -DestinationPath $env:ProgramFiles; \ -# (this archive has a "docker/..." directory in it already) - \ - Write-Host 'Removing ...'; \ - Remove-Item @( \ - 'docker.zip', \ - ('{0}\docker\dockerd.exe' -f $env:ProgramFiles) \ - ) -Force; \ - \ - Write-Host 'Verifying install ("docker --version") ...'; \ - docker --version; \ - \ - Write-Host 'Complete.'; - -# https://github.com/docker-library/docker/issues/409#issuecomment-1462868414 -ENV DOCKER_BUILDX_VERSION 0.16.2 -ENV DOCKER_BUILDX_URL https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.windows-amd64.exe -ENV DOCKER_BUILDX_SHA256 0ee1234dc4bec883f9407211ae386052c45d13cf9052329f8aece8358cff5e9c -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-buildx.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_BUILDX_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_BUILDX_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_BUILDX_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_BUILDX_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker buildx version") ...'; \ - docker buildx version; \ - \ - Write-Host 'Complete.'; -ENV DOCKER_COMPOSE_VERSION 2.29.1 -ENV DOCKER_COMPOSE_URL https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-x86_64.exe -ENV DOCKER_COMPOSE_SHA256 c80155bfd2669bcdc7482ae7ccf7ccaf6b5da2149b690d806c7a4d9200abc54e -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-compose.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_COMPOSE_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_COMPOSE_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_COMPOSE_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_COMPOSE_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker compose version") ...'; \ - docker compose version; \ - \ - $link = ('{0}\docker\docker-compose.exe' -f $env:ProgramFiles); \ - Write-Host ('Linking {0} to {1} ...' -f $plugin, $link); \ - New-Item -ItemType SymbolicLink -Path $link -Target $plugin; \ - \ - Write-Host 'Verifying install ("docker-compose --version") ...'; \ - docker-compose --version; \ - \ - Write-Host 'Complete.'; diff --git a/25/cli/Dockerfile b/25/cli/Dockerfile deleted file mode 100644 index 978b8925a9..0000000000 --- a/25/cli/Dockerfile +++ /dev/null @@ -1,167 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM alpine:3.20 - -RUN apk add --no-cache \ - ca-certificates \ -# DOCKER_HOST=ssh://... -- https://github.com/docker/cli/pull/1014 - openssh-client \ -# https://github.com/docker-library/docker/issues/482#issuecomment-2197116408 - git - -# ensure that nsswitch.conf is set up for Go's "netgo" implementation (which Docker explicitly uses) -# - https://github.com/moby/moby/blob/v24.0.6/hack/make.sh#L111 -# - https://github.com/golang/go/blob/go1.19.13/src/net/conf.go#L227-L303 -# - docker run --rm debian:stretch grep '^hosts:' /etc/nsswitch.conf -RUN [ -e /etc/nsswitch.conf ] && grep '^hosts: files dns' /etc/nsswitch.conf - -# pre-add a "docker" group for socket usage -RUN set -eux; \ - addgroup -g 2375 -S docker - -ENV DOCKER_VERSION 25.0.5 - -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://download.docker.com/linux/static/stable/x86_64/docker-25.0.5.tgz'; \ - ;; \ - 'armhf') \ - url='https://download.docker.com/linux/static/stable/armel/docker-25.0.5.tgz'; \ - ;; \ - 'armv7') \ - url='https://download.docker.com/linux/static/stable/armhf/docker-25.0.5.tgz'; \ - ;; \ - 'aarch64') \ - url='https://download.docker.com/linux/static/stable/aarch64/docker-25.0.5.tgz'; \ - ;; \ - *) echo >&2 "error: unsupported 'docker.tgz' architecture ($apkArch)"; exit 1 ;; \ - esac; \ - \ - wget -O 'docker.tgz' "$url"; \ - \ - tar --extract \ - --file docker.tgz \ - --strip-components 1 \ - --directory /usr/local/bin/ \ - --no-same-owner \ - 'docker/docker' \ - ; \ - rm docker.tgz; \ - \ - docker --version - -ENV DOCKER_BUILDX_VERSION 0.16.2 -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-amd64'; \ - sha256='43e4c928a0be38ab34e206c82957edfdd54f3e7124f1dadd7779591c3acf77ea'; \ - ;; \ - 'armhf') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm-v6'; \ - sha256='77678205fbaaead25167cd93b022996d0bafff67deb5ca82b92b25cccb06ad07'; \ - ;; \ - 'armv7') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm-v7'; \ - sha256='b4f029ed0d4d30c49857bc31f8bec5484b3f6b8104d8d49a187fb6b69fab3d82'; \ - ;; \ - 'aarch64') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm64'; \ - sha256='775f1ab64aa0e5d901dcc6ecf6843ec3261f27476873760711aa362b403f61f3'; \ - ;; \ - 'ppc64le') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-ppc64le'; \ - sha256='956b020318ad0ba94f817116792d9da8695ebab38254c9f821a85a3369175f7e'; \ - ;; \ - 'riscv64') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-riscv64'; \ - sha256='e90589ff33ad409a40a5e53cde5af4a0f230f0d8f5b6d9af522120a6900222ea'; \ - ;; \ - 's390x') \ - url='https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-s390x'; \ - sha256='f2dbf2dc967415e1e1f4398d040d6b5b81e4e27f37df22bd148ea4b18c8ea6eb'; \ - ;; \ - *) echo >&2 "warning: unsupported 'docker-buildx' architecture ($apkArch); skipping"; exit 0 ;; \ - esac; \ - \ - wget -O 'docker-buildx' "$url"; \ - echo "$sha256 *"'docker-buildx' | sha256sum -c -; \ - \ - plugin='/usr/local/libexec/docker/cli-plugins/docker-buildx'; \ - mkdir -p "$(dirname "$plugin")"; \ - mv -vT 'docker-buildx' "$plugin"; \ - chmod +x "$plugin"; \ - \ - docker buildx version - -ENV DOCKER_COMPOSE_VERSION 2.29.1 -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-x86_64'; \ - sha256='5ea89dd65d33912a83737d8a4bf070d5de534a32b8493a21fbefc924484786a9'; \ - ;; \ - 'armhf') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv6'; \ - sha256='5fdd0653bb04798f1448bd5bdbecea02bcf39247fcc9b8aab10c05c8e680ede0'; \ - ;; \ - 'armv7') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv7'; \ - sha256='0d675f39b3089050d0630a7151580a58abc6c189e64209c6403598b6e9fc0b21'; \ - ;; \ - 'aarch64') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-aarch64'; \ - sha256='7f0023ba726b90347e4ebc1d94ec5970390b8bddb86402c0429f163dca70d745'; \ - ;; \ - 'ppc64le') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-ppc64le'; \ - sha256='9d69aae252fa7fd3a234647951b2af496ee927134d5456d4b8bac31d4d260f5d'; \ - ;; \ - 'riscv64') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-riscv64'; \ - sha256='91b6b2f56e8cba3965a5409fa5125d3f01408c9b2d0bf5b9c119f353601d1e51'; \ - ;; \ - 's390x') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-s390x'; \ - sha256='1ea22d04bab9452de3169e22b60d77a232acdf829ac4858dc780085dd7fd4c48'; \ - ;; \ - *) echo >&2 "warning: unsupported 'docker-compose' architecture ($apkArch); skipping"; exit 0 ;; \ - esac; \ - \ - wget -O 'docker-compose' "$url"; \ - echo "$sha256 *"'docker-compose' | sha256sum -c -; \ - \ - plugin='/usr/local/libexec/docker/cli-plugins/docker-compose'; \ - mkdir -p "$(dirname "$plugin")"; \ - mv -vT 'docker-compose' "$plugin"; \ - chmod +x "$plugin"; \ - \ - ln -sv "$plugin" /usr/local/bin/; \ - docker-compose --version; \ - docker compose version - -COPY modprobe.sh /usr/local/bin/modprobe -COPY docker-entrypoint.sh /usr/local/bin/ - -# https://github.com/docker-library/docker/pull/166 -# dockerd-entrypoint.sh uses DOCKER_TLS_CERTDIR for auto-generating TLS certificates -# docker-entrypoint.sh uses DOCKER_TLS_CERTDIR for auto-setting DOCKER_TLS_VERIFY and DOCKER_CERT_PATH -# (For this to work, at least the "client" subdirectory of this path needs to be shared between the client and server containers via a volume, "docker cp", or other means of data sharing.) -ENV DOCKER_TLS_CERTDIR=/certs -# also, ensure the directory pre-exists and has wide enough permissions for "dockerd-entrypoint.sh" to create subdirectories, even when run in "rootless" mode -RUN mkdir /certs /certs/client && chmod 1777 /certs /certs/client -# (doing both /certs and /certs/client so that if Docker does a "copy-up" into a volume defined on /certs/client, it will "do the right thing" by default in a way that still works for rootless users) - -ENTRYPOINT ["docker-entrypoint.sh"] -CMD ["sh"] diff --git a/25/cli/docker-entrypoint.sh b/25/cli/docker-entrypoint.sh deleted file mode 100755 index d41cef8e3c..0000000000 --- a/25/cli/docker-entrypoint.sh +++ /dev/null @@ -1,61 +0,0 @@ -#!/bin/sh -set -eu - -# first arg is `-f` or `--some-option` -if [ "${1#-}" != "$1" ]; then - set -- docker "$@" -fi - -# if our command is a valid Docker subcommand, let's invoke it through Docker instead -# (this allows for "docker run docker ps", etc) -if docker help "$1" > /dev/null 2>&1; then - set -- docker "$@" -fi - -_should_tls() { - [ -n "${DOCKER_TLS_CERTDIR:-}" ] \ - && [ -s "$DOCKER_TLS_CERTDIR/client/ca.pem" ] \ - && [ -s "$DOCKER_TLS_CERTDIR/client/cert.pem" ] \ - && [ -s "$DOCKER_TLS_CERTDIR/client/key.pem" ] -} - -# if we have no DOCKER_HOST but we do have the default Unix socket (standard or rootless), use it explicitly -if [ -z "${DOCKER_HOST:-}" ] && [ -S /var/run/docker.sock ]; then - export DOCKER_HOST=unix:///var/run/docker.sock -elif [ -z "${DOCKER_HOST:-}" ] && XDG_RUNTIME_DIR="${XDG_RUNTIME_DIR:-/run/user/$(id -u)}" && [ -S "$XDG_RUNTIME_DIR/docker.sock" ]; then - export DOCKER_HOST="unix://$XDG_RUNTIME_DIR/docker.sock" -fi - -# if DOCKER_HOST isn't set (no custom setting, no default socket), let's set it to a sane remote value -if [ -z "${DOCKER_HOST:-}" ]; then - if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then - export DOCKER_HOST='tcp://docker:2376' - else - export DOCKER_HOST='tcp://docker:2375' - fi -fi -if [ "${DOCKER_HOST#tcp:}" != "$DOCKER_HOST" ] \ - && [ -z "${DOCKER_TLS_VERIFY:-}" ] \ - && [ -z "${DOCKER_CERT_PATH:-}" ] \ - && _should_tls \ -; then - export DOCKER_TLS_VERIFY=1 - export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client" -fi - -if [ "$1" = 'dockerd' ]; then - cat >&2 <<-'EOW' - - 📎 Hey there! It looks like you're trying to run a Docker daemon. - - You probably should use the "dind" image variant instead, something like: - - docker run --privileged --name some-docker ... docker:dind ... - - See https://hub.docker.com/_/docker/ for more documentation and usage examples. - - EOW - sleep 3 -fi - -exec "$@" diff --git a/25/cli/modprobe.sh b/25/cli/modprobe.sh deleted file mode 100755 index b357d893fd..0000000000 --- a/25/cli/modprobe.sh +++ /dev/null @@ -1,20 +0,0 @@ -#!/bin/sh -set -eu - -# "modprobe" without modprobe -# https://twitter.com/lucabruno/status/902934379835662336 - -# this isn't 100% fool-proof, but it'll have a much higher success rate than simply using the "real" modprobe - -# Docker often uses "modprobe -va foo bar baz" -# so we ignore modules that start with "-" -for module; do - if [ "${module#-}" = "$module" ]; then - ip link show "$module" || true - lsmod | grep "$module" || true - fi -done - -# remove /usr/local/... from PATH so we can exec the real modprobe as a last resort -export PATH='/usr/sbin:/usr/bin:/sbin:/bin' -exec modprobe "$@" diff --git a/25/dind-rootless/Dockerfile b/25/dind-rootless/Dockerfile deleted file mode 100644 index 7023e591c1..0000000000 --- a/25/dind-rootless/Dockerfile +++ /dev/null @@ -1,55 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM docker:25-dind - -# busybox "ip" is insufficient: -# [rootlesskit:child ] error: executing [[ip tuntap add name tap0 mode tap] [ip link set tap0 address 02:50:00:00:00:01]]: exit status 1 -RUN apk add --no-cache iproute2 fuse-overlayfs - -# "/run/user/UID" will be used by default as the value of XDG_RUNTIME_DIR -RUN mkdir /run/user && chmod 1777 /run/user - -# create a default user preconfigured for running rootless dockerd -RUN set -eux; \ - adduser -h /home/rootless -g 'Rootless' -D -u 1000 rootless; \ - echo 'rootless:100000:65536' >> /etc/subuid; \ - echo 'rootless:100000:65536' >> /etc/subgid - -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://download.docker.com/linux/static/stable/x86_64/docker-rootless-extras-25.0.5.tgz'; \ - ;; \ - 'aarch64') \ - url='https://download.docker.com/linux/static/stable/aarch64/docker-rootless-extras-25.0.5.tgz'; \ - ;; \ - *) echo >&2 "error: unsupported 'rootless.tgz' architecture ($apkArch)"; exit 1 ;; \ - esac; \ - \ - wget -O 'rootless.tgz' "$url"; \ - \ - tar --extract \ - --file rootless.tgz \ - --strip-components 1 \ - --directory /usr/local/bin/ \ - 'docker-rootless-extras/rootlesskit' \ - 'docker-rootless-extras/rootlesskit-docker-proxy' \ - 'docker-rootless-extras/vpnkit' \ - ; \ - rm rootless.tgz; \ - \ - rootlesskit --version; \ - vpnkit --version - -# pre-create "/var/lib/docker" for our rootless user -RUN set -eux; \ - mkdir -p /home/rootless/.local/share/docker; \ - chown -R rootless:rootless /home/rootless/.local/share/docker -VOLUME /home/rootless/.local/share/docker -USER rootless diff --git a/25/dind/Dockerfile b/25/dind/Dockerfile deleted file mode 100644 index 4b836621fb..0000000000 --- a/25/dind/Dockerfile +++ /dev/null @@ -1,108 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM docker:25-cli - -# https://github.com/moby/moby/blob/0eecd59153c03ced5f5ddd79cc98f29e4d86daec/project/PACKAGERS.md#runtime-dependencies -# https://github.com/docker/docker-ce-packaging/blob/963aa02666035d4e268f33c63d7868d6cdd1d34c/deb/common/control#L28-L41 -RUN set -eux; \ - apk add --no-cache \ - btrfs-progs \ - e2fsprogs \ - e2fsprogs-extra \ - git \ - ip6tables \ - iptables \ - openssl \ - pigz \ - shadow-uidmap \ - xfsprogs \ - xz \ - zfs \ - ; - -# dind might be used on systems where the nf_tables kernel module isn't available. In that case, -# we need to switch over to xtables-legacy. See https://github.com/docker-library/docker/issues/463 -RUN set -eux; \ - apk add --no-cache iptables-legacy; \ -# set up a symlink farm we can use PATH to switch to legacy with - mkdir -p /usr/local/sbin/.iptables-legacy; \ -# https://git.alpinelinux.org/aports/tree/main/iptables/APKBUILD?id=b215d54de159eacafecb13c68dfadce6eefd9ec9#n73 - for f in \ - iptables \ - iptables-save \ - iptables-restore \ - ip6tables \ - ip6tables-save \ - ip6tables-restore \ - ; do \ -# "iptables-save" -> "iptables-legacy-save", "ip6tables" -> "ip6tables-legacy", etc. -# https://pkgs.alpinelinux.org/contents?branch=v3.19&name=iptables-legacy&arch=x86_64 - b="/sbin/${f/tables/tables-legacy}"; \ - "$b" --version; \ - ln -svT "$b" "/usr/local/sbin/.iptables-legacy/$f"; \ - done; \ -# verify it works (and gets us legacy) - export PATH="/usr/local/sbin/.iptables-legacy:$PATH"; \ - iptables --version | grep legacy - -# set up subuid/subgid so that "--userns-remap=default" works out-of-the-box -RUN set -eux; \ - addgroup -S dockremap; \ - adduser -S -G dockremap dockremap; \ - echo 'dockremap:165536:65536' >> /etc/subuid; \ - echo 'dockremap:165536:65536' >> /etc/subgid - -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://download.docker.com/linux/static/stable/x86_64/docker-25.0.5.tgz'; \ - ;; \ - 'armhf') \ - url='https://download.docker.com/linux/static/stable/armel/docker-25.0.5.tgz'; \ - ;; \ - 'armv7') \ - url='https://download.docker.com/linux/static/stable/armhf/docker-25.0.5.tgz'; \ - ;; \ - 'aarch64') \ - url='https://download.docker.com/linux/static/stable/aarch64/docker-25.0.5.tgz'; \ - ;; \ - *) echo >&2 "error: unsupported 'docker.tgz' architecture ($apkArch)"; exit 1 ;; \ - esac; \ - \ - wget -O 'docker.tgz' "$url"; \ - \ - tar --extract \ - --file docker.tgz \ - --strip-components 1 \ - --directory /usr/local/bin/ \ - --no-same-owner \ -# we exclude the CLI binary because we already extracted that over in the "docker:25-cli" image that we're FROM and we don't want to duplicate those bytes again in this layer - --exclude 'docker/docker' \ - ; \ - rm docker.tgz; \ - \ - dockerd --version; \ - containerd --version; \ - ctr --version; \ - runc --version - -# https://github.com/docker/docker/tree/master/hack/dind -ENV DIND_COMMIT 65cfcc28ab37cb75e1560e4b4738719c07c6618e - -RUN set -eux; \ - wget -O /usr/local/bin/dind "https://raw.githubusercontent.com/docker/docker/${DIND_COMMIT}/hack/dind"; \ - chmod +x /usr/local/bin/dind - -COPY dockerd-entrypoint.sh /usr/local/bin/ - -VOLUME /var/lib/docker -EXPOSE 2375 2376 - -ENTRYPOINT ["dockerd-entrypoint.sh"] -CMD [] diff --git a/25/dind/dockerd-entrypoint.sh b/25/dind/dockerd-entrypoint.sh deleted file mode 100755 index 6c06bb8118..0000000000 --- a/25/dind/dockerd-entrypoint.sh +++ /dev/null @@ -1,234 +0,0 @@ -#!/bin/sh -set -eu - -_tls_ensure_private() { - local f="$1"; shift - [ -s "$f" ] || openssl genrsa -out "$f" 4096 -} -_tls_san() { - { - ip -oneline address | awk '{ gsub(/\/.+$/, "", $4); print "IP:" $4 }' - { - cat /etc/hostname - echo 'docker' - echo 'localhost' - hostname -f - hostname -s - } | sed 's/^/DNS:/' - [ -z "${DOCKER_TLS_SAN:-}" ] || echo "$DOCKER_TLS_SAN" - } | sort -u | xargs printf '%s,' | sed "s/,\$//" -} -_tls_generate_certs() { - local dir="$1"; shift - - # if server/{ca,key,cert}.pem && !ca/key.pem, do NOTHING except verify (user likely managing CA themselves) - # if ca/key.pem || !ca/cert.pem, generate CA public if necessary - # if ca/key.pem, generate server public - # if ca/key.pem, generate client public - # (regenerating public certs every startup to account for SAN/IP changes and/or expiration) - - if [ -s "$dir/server/ca.pem" ] && [ -s "$dir/server/cert.pem" ] && [ -s "$dir/server/key.pem" ] && [ ! -s "$dir/ca/key.pem" ]; then - openssl verify -CAfile "$dir/server/ca.pem" "$dir/server/cert.pem" - return 0 - fi - - # https://github.com/FiloSottile/mkcert/issues/174 - local certValidDays='825' - - if [ -s "$dir/ca/key.pem" ] || [ ! -s "$dir/ca/cert.pem" ]; then - # if we either have a CA private key or do *not* have a CA public key, then we should create/manage the CA - mkdir -p "$dir/ca" - _tls_ensure_private "$dir/ca/key.pem" - openssl req -new -key "$dir/ca/key.pem" \ - -out "$dir/ca/cert.pem" \ - -subj '/CN=docker:dind CA' -x509 -days "$certValidDays" - fi - - if [ -s "$dir/ca/key.pem" ]; then - # if we have a CA private key, we should create/manage a server key - mkdir -p "$dir/server" - _tls_ensure_private "$dir/server/key.pem" - openssl req -new -key "$dir/server/key.pem" \ - -out "$dir/server/csr.pem" \ - -subj '/CN=docker:dind server' - cat > "$dir/server/openssl.cnf" <<-EOF - [ x509_exts ] - subjectAltName = $(_tls_san) - EOF - openssl x509 -req \ - -in "$dir/server/csr.pem" \ - -CA "$dir/ca/cert.pem" \ - -CAkey "$dir/ca/key.pem" \ - -CAcreateserial \ - -out "$dir/server/cert.pem" \ - -days "$certValidDays" \ - -extfile "$dir/server/openssl.cnf" \ - -extensions x509_exts - cp "$dir/ca/cert.pem" "$dir/server/ca.pem" - openssl verify -CAfile "$dir/server/ca.pem" "$dir/server/cert.pem" - fi - - if [ -s "$dir/ca/key.pem" ]; then - # if we have a CA private key, we should create/manage a client key - mkdir -p "$dir/client" - _tls_ensure_private "$dir/client/key.pem" - chmod 0644 "$dir/client/key.pem" # openssl defaults to 0600 for the private key, but this one needs to be shared with arbitrary client contexts - openssl req -new \ - -key "$dir/client/key.pem" \ - -out "$dir/client/csr.pem" \ - -subj '/CN=docker:dind client' - cat > "$dir/client/openssl.cnf" <<-'EOF' - [ x509_exts ] - extendedKeyUsage = clientAuth - EOF - openssl x509 -req \ - -in "$dir/client/csr.pem" \ - -CA "$dir/ca/cert.pem" \ - -CAkey "$dir/ca/key.pem" \ - -CAcreateserial \ - -out "$dir/client/cert.pem" \ - -days "$certValidDays" \ - -extfile "$dir/client/openssl.cnf" \ - -extensions x509_exts - cp "$dir/ca/cert.pem" "$dir/client/ca.pem" - openssl verify -CAfile "$dir/client/ca.pem" "$dir/client/cert.pem" - fi -} - -# no arguments passed -# or first arg is `-f` or `--some-option` -if [ "$#" -eq 0 ] || [ "${1#-}" != "$1" ]; then - # set "dockerSocket" to the default "--host" *unix socket* value (for both standard or rootless) - uid="$(id -u)" - if [ "$uid" = '0' ]; then - dockerSocket='unix:///var/run/docker.sock' - else - # if we're not root, we must be trying to run rootless - : "${XDG_RUNTIME_DIR:=/run/user/$uid}" - dockerSocket="unix://$XDG_RUNTIME_DIR/docker.sock" - fi - case "${DOCKER_HOST:-}" in - unix://*) - dockerSocket="$DOCKER_HOST" - ;; - esac - - # add our default arguments - if [ -n "${DOCKER_TLS_CERTDIR:-}" ]; then - _tls_generate_certs "$DOCKER_TLS_CERTDIR" - # generate certs and use TLS if requested/possible (default in 19.03+) - set -- dockerd \ - --host="$dockerSocket" \ - --host=tcp://0.0.0.0:2376 \ - --tlsverify \ - --tlscacert "$DOCKER_TLS_CERTDIR/server/ca.pem" \ - --tlscert "$DOCKER_TLS_CERTDIR/server/cert.pem" \ - --tlskey "$DOCKER_TLS_CERTDIR/server/key.pem" \ - "$@" - DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS="${DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS:-} -p 0.0.0.0:2376:2376/tcp" - else - # TLS disabled (-e DOCKER_TLS_CERTDIR='') or missing certs - set -- dockerd \ - --host="$dockerSocket" \ - --host=tcp://0.0.0.0:2375 \ - "$@" - DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS="${DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS:-} -p 0.0.0.0:2375:2375/tcp" - fi -fi - -if [ "$1" = 'dockerd' ]; then - # explicitly remove Docker's default PID file to ensure that it can start properly if it was stopped uncleanly (and thus didn't clean up the PID file) - find /run /var/run -iname 'docker*.pid' -delete || : - - # XXX inject "docker-init" (tini) as pid1 to workaround https://github.com/docker-library/docker/issues/318 (zombie container-shim processes) - set -- docker-init -- "$@" - - iptablesLegacy= - if [ -n "${DOCKER_IPTABLES_LEGACY+x}" ]; then - # let users choose explicitly to legacy or not to legacy - iptablesLegacy="$DOCKER_IPTABLES_LEGACY" - if [ -n "$iptablesLegacy" ]; then - modprobe ip_tables || : - modprobe ip6_tables || : - else - modprobe nf_tables || : - fi - elif ( - # https://git.netfilter.org/iptables/tree/iptables/nft-shared.c?id=f5cf76626d95d2c491a80288bccc160c53b44e88#n420 - # https://github.com/docker-library/docker/pull/468#discussion_r1442131459 - for f in /proc/net/ip_tables_names /proc/net/ip6_tables_names /proc/net/arp_tables_names; do - if b="$(cat "$f")" && [ -n "$b" ]; then - exit 0 - fi - done - exit 1 - ); then - # if we already have any "legacy" iptables rules, we should always use legacy - iptablesLegacy=1 - elif ! iptables -nL > /dev/null 2>&1; then - # if iptables fails to run, chances are high the necessary kernel modules aren't loaded (perhaps the host is using xtables, for example) - # https://github.com/docker-library/docker/issues/350 - # https://github.com/moby/moby/issues/26824 - # https://github.com/docker-library/docker/pull/437#issuecomment-1854900620 - modprobe nf_tables || : - if ! iptables -nL > /dev/null 2>&1; then - # might be host has no nf_tables, but Alpine is all-in now (so let's try a legacy fallback) - modprobe ip_tables || : - modprobe ip6_tables || : - if /usr/local/sbin/.iptables-legacy/iptables -nL > /dev/null 2>&1; then - iptablesLegacy=1 - fi - fi - fi - if [ -n "$iptablesLegacy" ]; then - # see https://github.com/docker-library/docker/issues/463 (and the dind Dockerfile where this directory is set up) - export PATH="/usr/local/sbin/.iptables-legacy:$PATH" - fi - iptables --version # so users can see whether it's legacy or not - - uid="$(id -u)" - if [ "$uid" != '0' ]; then - # if we're not root, we must be trying to run rootless - if ! command -v rootlesskit > /dev/null; then - echo >&2 "error: attempting to run rootless dockerd but missing 'rootlesskit' (perhaps the 'docker:dind-rootless' image variant is intended?)" - exit 1 - fi - user="$(id -un 2>/dev/null || :)" - if ! grep -qE "^($uid${user:+|$user}):" /etc/subuid || ! grep -qE "^($uid${user:+|$user}):" /etc/subgid; then - echo >&2 "error: attempting to run rootless dockerd but missing necessary entries in /etc/subuid and/or /etc/subgid for $uid" - exit 1 - fi - : "${XDG_RUNTIME_DIR:=/run/user/$uid}" - export XDG_RUNTIME_DIR - if ! mkdir -p "$XDG_RUNTIME_DIR" || [ ! -w "$XDG_RUNTIME_DIR" ] || ! mkdir -p "$HOME/.local/share/docker" || [ ! -w "$HOME/.local/share/docker" ]; then - echo >&2 "error: attempting to run rootless dockerd but need writable HOME ($HOME) and XDG_RUNTIME_DIR ($XDG_RUNTIME_DIR) for user $uid" - exit 1 - fi - if [ -f /proc/sys/kernel/unprivileged_userns_clone ] && unprivClone="$(cat /proc/sys/kernel/unprivileged_userns_clone)" && [ "$unprivClone" != '1' ]; then - echo >&2 "error: attempting to run rootless dockerd but need 'kernel.unprivileged_userns_clone' (/proc/sys/kernel/unprivileged_userns_clone) set to 1" - exit 1 - fi - if [ -f /proc/sys/user/max_user_namespaces ] && maxUserns="$(cat /proc/sys/user/max_user_namespaces)" && [ "$maxUserns" = '0' ]; then - echo >&2 "error: attempting to run rootless dockerd but need 'user.max_user_namespaces' (/proc/sys/user/max_user_namespaces) set to a sufficiently large value" - exit 1 - fi - # TODO overlay support detection? - exec rootlesskit \ - --net="${DOCKERD_ROOTLESS_ROOTLESSKIT_NET:-vpnkit}" \ - --mtu="${DOCKERD_ROOTLESS_ROOTLESSKIT_MTU:-1500}" \ - --disable-host-loopback \ - --port-driver=builtin \ - --copy-up=/etc \ - --copy-up=/run \ - ${DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS:-} \ - "$@" - elif [ -x '/usr/local/bin/dind' ]; then - # if we have the (mostly defunct now) Docker-in-Docker wrapper script, use it - set -- '/usr/local/bin/dind' "$@" - fi -else - # if it isn't `dockerd` we're trying to run, pass it through `docker-entrypoint.sh` so it gets `DOCKER_HOST` set appropriately too - set -- docker-entrypoint.sh "$@" -fi - -exec "$@" diff --git a/25/windows/windowsservercore-1809/Dockerfile b/25/windows/windowsservercore-1809/Dockerfile deleted file mode 100644 index 4f64019119..0000000000 --- a/25/windows/windowsservercore-1809/Dockerfile +++ /dev/null @@ -1,91 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM mcr.microsoft.com/windows/servercore:1809 - -# $ProgressPreference: https://github.com/PowerShell/PowerShell/issues/2138#issuecomment-251261324 -SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"] - -# PATH isn't actually set in the Docker image, so we have to set it from within the container -RUN $newPath = ('{0}\docker;{1}' -f $env:ProgramFiles, $env:PATH); \ - Write-Host ('Updating PATH: {0}' -f $newPath); \ - [Environment]::SetEnvironmentVariable('PATH', $newPath, [EnvironmentVariableTarget]::Machine); -# doing this first to share cache across versions more aggressively - -ENV DOCKER_VERSION 25.0.5 -ENV DOCKER_URL https://download.docker.com/win/static/stable/x86_64/docker-25.0.5.zip -# TODO ENV DOCKER_SHA256 -# https://github.com/docker/docker-ce/blob/5b073ee2cf564edee5adca05eee574142f7627bb/components/packaging/static/hash_files !! -# (no SHA file artifacts on download.docker.com yet as of 2017-06-07 though) - -RUN Write-Host ('Downloading {0} ...' -f $env:DOCKER_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_URL -OutFile 'docker.zip'; \ - \ - Write-Host 'Expanding ...'; \ - Expand-Archive docker.zip -DestinationPath $env:ProgramFiles; \ -# (this archive has a "docker/..." directory in it already) - \ - Write-Host 'Removing ...'; \ - Remove-Item @( \ - 'docker.zip', \ - ('{0}\docker\dockerd.exe' -f $env:ProgramFiles) \ - ) -Force; \ - \ - Write-Host 'Verifying install ("docker --version") ...'; \ - docker --version; \ - \ - Write-Host 'Complete.'; - -# https://github.com/docker-library/docker/issues/409#issuecomment-1462868414 -ENV DOCKER_BUILDX_VERSION 0.16.2 -ENV DOCKER_BUILDX_URL https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.windows-amd64.exe -ENV DOCKER_BUILDX_SHA256 0ee1234dc4bec883f9407211ae386052c45d13cf9052329f8aece8358cff5e9c -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-buildx.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_BUILDX_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_BUILDX_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_BUILDX_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_BUILDX_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker buildx version") ...'; \ - docker buildx version; \ - \ - Write-Host 'Complete.'; -ENV DOCKER_COMPOSE_VERSION 2.29.1 -ENV DOCKER_COMPOSE_URL https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-x86_64.exe -ENV DOCKER_COMPOSE_SHA256 c80155bfd2669bcdc7482ae7ccf7ccaf6b5da2149b690d806c7a4d9200abc54e -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-compose.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_COMPOSE_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_COMPOSE_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_COMPOSE_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_COMPOSE_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker compose version") ...'; \ - docker compose version; \ - \ - $link = ('{0}\docker\docker-compose.exe' -f $env:ProgramFiles); \ - Write-Host ('Linking {0} to {1} ...' -f $plugin, $link); \ - New-Item -ItemType SymbolicLink -Path $link -Target $plugin; \ - \ - Write-Host 'Verifying install ("docker-compose --version") ...'; \ - docker-compose --version; \ - \ - Write-Host 'Complete.'; diff --git a/25/windows/windowsservercore-ltsc2022/Dockerfile b/25/windows/windowsservercore-ltsc2022/Dockerfile deleted file mode 100644 index b9ebef0c50..0000000000 --- a/25/windows/windowsservercore-ltsc2022/Dockerfile +++ /dev/null @@ -1,91 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM mcr.microsoft.com/windows/servercore:ltsc2022 - -# $ProgressPreference: https://github.com/PowerShell/PowerShell/issues/2138#issuecomment-251261324 -SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"] - -# PATH isn't actually set in the Docker image, so we have to set it from within the container -RUN $newPath = ('{0}\docker;{1}' -f $env:ProgramFiles, $env:PATH); \ - Write-Host ('Updating PATH: {0}' -f $newPath); \ - [Environment]::SetEnvironmentVariable('PATH', $newPath, [EnvironmentVariableTarget]::Machine); -# doing this first to share cache across versions more aggressively - -ENV DOCKER_VERSION 25.0.5 -ENV DOCKER_URL https://download.docker.com/win/static/stable/x86_64/docker-25.0.5.zip -# TODO ENV DOCKER_SHA256 -# https://github.com/docker/docker-ce/blob/5b073ee2cf564edee5adca05eee574142f7627bb/components/packaging/static/hash_files !! -# (no SHA file artifacts on download.docker.com yet as of 2017-06-07 though) - -RUN Write-Host ('Downloading {0} ...' -f $env:DOCKER_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_URL -OutFile 'docker.zip'; \ - \ - Write-Host 'Expanding ...'; \ - Expand-Archive docker.zip -DestinationPath $env:ProgramFiles; \ -# (this archive has a "docker/..." directory in it already) - \ - Write-Host 'Removing ...'; \ - Remove-Item @( \ - 'docker.zip', \ - ('{0}\docker\dockerd.exe' -f $env:ProgramFiles) \ - ) -Force; \ - \ - Write-Host 'Verifying install ("docker --version") ...'; \ - docker --version; \ - \ - Write-Host 'Complete.'; - -# https://github.com/docker-library/docker/issues/409#issuecomment-1462868414 -ENV DOCKER_BUILDX_VERSION 0.16.2 -ENV DOCKER_BUILDX_URL https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.windows-amd64.exe -ENV DOCKER_BUILDX_SHA256 0ee1234dc4bec883f9407211ae386052c45d13cf9052329f8aece8358cff5e9c -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-buildx.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_BUILDX_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_BUILDX_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_BUILDX_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_BUILDX_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker buildx version") ...'; \ - docker buildx version; \ - \ - Write-Host 'Complete.'; -ENV DOCKER_COMPOSE_VERSION 2.29.1 -ENV DOCKER_COMPOSE_URL https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-x86_64.exe -ENV DOCKER_COMPOSE_SHA256 c80155bfd2669bcdc7482ae7ccf7ccaf6b5da2149b690d806c7a4d9200abc54e -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-compose.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_COMPOSE_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_COMPOSE_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_COMPOSE_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_COMPOSE_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker compose version") ...'; \ - docker compose version; \ - \ - $link = ('{0}\docker\docker-compose.exe' -f $env:ProgramFiles); \ - Write-Host ('Linking {0} to {1} ...' -f $plugin, $link); \ - New-Item -ItemType SymbolicLink -Path $link -Target $plugin; \ - \ - Write-Host 'Verifying install ("docker-compose --version") ...'; \ - docker-compose --version; \ - \ - Write-Host 'Complete.'; diff --git a/26/cli/Dockerfile b/26/cli/Dockerfile deleted file mode 100644 index 8b1ffe3036..0000000000 --- a/26/cli/Dockerfile +++ /dev/null @@ -1,167 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM alpine:3.20 - -RUN apk add --no-cache \ - ca-certificates \ -# DOCKER_HOST=ssh://... -- https://github.com/docker/cli/pull/1014 - openssh-client \ -# https://github.com/docker-library/docker/issues/482#issuecomment-2197116408 - git - -# ensure that nsswitch.conf is set up for Go's "netgo" implementation (which Docker explicitly uses) -# - https://github.com/moby/moby/blob/v24.0.6/hack/make.sh#L111 -# - https://github.com/golang/go/blob/go1.19.13/src/net/conf.go#L227-L303 -# - docker run --rm debian:stretch grep '^hosts:' /etc/nsswitch.conf -RUN [ -e /etc/nsswitch.conf ] && grep '^hosts: files dns' /etc/nsswitch.conf - -# pre-add a "docker" group for socket usage -RUN set -eux; \ - addgroup -g 2375 -S docker - -ENV DOCKER_VERSION 26.1.4 - -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://download.docker.com/linux/static/stable/x86_64/docker-26.1.4.tgz'; \ - ;; \ - 'armhf') \ - url='https://download.docker.com/linux/static/stable/armel/docker-26.1.4.tgz'; \ - ;; \ - 'armv7') \ - url='https://download.docker.com/linux/static/stable/armhf/docker-26.1.4.tgz'; \ - ;; \ - 'aarch64') \ - url='https://download.docker.com/linux/static/stable/aarch64/docker-26.1.4.tgz'; \ - ;; \ - *) echo >&2 "error: unsupported 'docker.tgz' architecture ($apkArch)"; exit 1 ;; \ - esac; \ - \ - wget -O 'docker.tgz' "$url"; \ - \ - tar --extract \ - --file docker.tgz \ - --strip-components 1 \ - --directory /usr/local/bin/ \ - --no-same-owner \ - 'docker/docker' \ - ; \ - rm docker.tgz; \ - \ - docker --version - -ENV DOCKER_BUILDX_VERSION 0.16.1 -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-amd64'; \ - sha256='62c2cb471c765b48a2b6fd0c09c8149b789695eb631bc1b7b60c047f75907f3f'; \ - ;; \ - 'armhf') \ - url='https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-arm-v6'; \ - sha256='e8092bdfe77337b27d963d5a0090b7be73e293e1c59ff0ceaac560b749fe42ba'; \ - ;; \ - 'armv7') \ - url='https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-arm-v7'; \ - sha256='8acad24cbefa6e8614c55fed2ac5c822303647563a4e14019eb9e8907ac02b5b'; \ - ;; \ - 'aarch64') \ - url='https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-arm64'; \ - sha256='024f62e6bcd20d29f9ab45ecb49963f93311991465dddc62b8d8a32443aa36ce'; \ - ;; \ - 'ppc64le') \ - url='https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-ppc64le'; \ - sha256='328dc59f720f59aef58af35af3202a479bac7ccbb8c02fd9db60e8dd4561a2a1'; \ - ;; \ - 'riscv64') \ - url='https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-riscv64'; \ - sha256='2f6a0703e3359395574621a071896d02ea4240570813a5ea154febbe6d39fba0'; \ - ;; \ - 's390x') \ - url='https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-s390x'; \ - sha256='3423d552b0ed13538890b054cf5bc1605a396f77ef800a9a8192024cb5e90230'; \ - ;; \ - *) echo >&2 "warning: unsupported 'docker-buildx' architecture ($apkArch); skipping"; exit 0 ;; \ - esac; \ - \ - wget -O 'docker-buildx' "$url"; \ - echo "$sha256 *"'docker-buildx' | sha256sum -c -; \ - \ - plugin='/usr/local/libexec/docker/cli-plugins/docker-buildx'; \ - mkdir -p "$(dirname "$plugin")"; \ - mv -vT 'docker-buildx' "$plugin"; \ - chmod +x "$plugin"; \ - \ - docker buildx version - -ENV DOCKER_COMPOSE_VERSION 2.29.1 -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-x86_64'; \ - sha256='5ea89dd65d33912a83737d8a4bf070d5de534a32b8493a21fbefc924484786a9'; \ - ;; \ - 'armhf') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv6'; \ - sha256='5fdd0653bb04798f1448bd5bdbecea02bcf39247fcc9b8aab10c05c8e680ede0'; \ - ;; \ - 'armv7') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv7'; \ - sha256='0d675f39b3089050d0630a7151580a58abc6c189e64209c6403598b6e9fc0b21'; \ - ;; \ - 'aarch64') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-aarch64'; \ - sha256='7f0023ba726b90347e4ebc1d94ec5970390b8bddb86402c0429f163dca70d745'; \ - ;; \ - 'ppc64le') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-ppc64le'; \ - sha256='9d69aae252fa7fd3a234647951b2af496ee927134d5456d4b8bac31d4d260f5d'; \ - ;; \ - 'riscv64') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-riscv64'; \ - sha256='91b6b2f56e8cba3965a5409fa5125d3f01408c9b2d0bf5b9c119f353601d1e51'; \ - ;; \ - 's390x') \ - url='https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-s390x'; \ - sha256='1ea22d04bab9452de3169e22b60d77a232acdf829ac4858dc780085dd7fd4c48'; \ - ;; \ - *) echo >&2 "warning: unsupported 'docker-compose' architecture ($apkArch); skipping"; exit 0 ;; \ - esac; \ - \ - wget -O 'docker-compose' "$url"; \ - echo "$sha256 *"'docker-compose' | sha256sum -c -; \ - \ - plugin='/usr/local/libexec/docker/cli-plugins/docker-compose'; \ - mkdir -p "$(dirname "$plugin")"; \ - mv -vT 'docker-compose' "$plugin"; \ - chmod +x "$plugin"; \ - \ - ln -sv "$plugin" /usr/local/bin/; \ - docker-compose --version; \ - docker compose version - -COPY modprobe.sh /usr/local/bin/modprobe -COPY docker-entrypoint.sh /usr/local/bin/ - -# https://github.com/docker-library/docker/pull/166 -# dockerd-entrypoint.sh uses DOCKER_TLS_CERTDIR for auto-generating TLS certificates -# docker-entrypoint.sh uses DOCKER_TLS_CERTDIR for auto-setting DOCKER_TLS_VERIFY and DOCKER_CERT_PATH -# (For this to work, at least the "client" subdirectory of this path needs to be shared between the client and server containers via a volume, "docker cp", or other means of data sharing.) -ENV DOCKER_TLS_CERTDIR=/certs -# also, ensure the directory pre-exists and has wide enough permissions for "dockerd-entrypoint.sh" to create subdirectories, even when run in "rootless" mode -RUN mkdir /certs /certs/client && chmod 1777 /certs /certs/client -# (doing both /certs and /certs/client so that if Docker does a "copy-up" into a volume defined on /certs/client, it will "do the right thing" by default in a way that still works for rootless users) - -ENTRYPOINT ["docker-entrypoint.sh"] -CMD ["sh"] diff --git a/26/cli/docker-entrypoint.sh b/26/cli/docker-entrypoint.sh deleted file mode 100755 index d41cef8e3c..0000000000 --- a/26/cli/docker-entrypoint.sh +++ /dev/null @@ -1,61 +0,0 @@ -#!/bin/sh -set -eu - -# first arg is `-f` or `--some-option` -if [ "${1#-}" != "$1" ]; then - set -- docker "$@" -fi - -# if our command is a valid Docker subcommand, let's invoke it through Docker instead -# (this allows for "docker run docker ps", etc) -if docker help "$1" > /dev/null 2>&1; then - set -- docker "$@" -fi - -_should_tls() { - [ -n "${DOCKER_TLS_CERTDIR:-}" ] \ - && [ -s "$DOCKER_TLS_CERTDIR/client/ca.pem" ] \ - && [ -s "$DOCKER_TLS_CERTDIR/client/cert.pem" ] \ - && [ -s "$DOCKER_TLS_CERTDIR/client/key.pem" ] -} - -# if we have no DOCKER_HOST but we do have the default Unix socket (standard or rootless), use it explicitly -if [ -z "${DOCKER_HOST:-}" ] && [ -S /var/run/docker.sock ]; then - export DOCKER_HOST=unix:///var/run/docker.sock -elif [ -z "${DOCKER_HOST:-}" ] && XDG_RUNTIME_DIR="${XDG_RUNTIME_DIR:-/run/user/$(id -u)}" && [ -S "$XDG_RUNTIME_DIR/docker.sock" ]; then - export DOCKER_HOST="unix://$XDG_RUNTIME_DIR/docker.sock" -fi - -# if DOCKER_HOST isn't set (no custom setting, no default socket), let's set it to a sane remote value -if [ -z "${DOCKER_HOST:-}" ]; then - if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then - export DOCKER_HOST='tcp://docker:2376' - else - export DOCKER_HOST='tcp://docker:2375' - fi -fi -if [ "${DOCKER_HOST#tcp:}" != "$DOCKER_HOST" ] \ - && [ -z "${DOCKER_TLS_VERIFY:-}" ] \ - && [ -z "${DOCKER_CERT_PATH:-}" ] \ - && _should_tls \ -; then - export DOCKER_TLS_VERIFY=1 - export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client" -fi - -if [ "$1" = 'dockerd' ]; then - cat >&2 <<-'EOW' - - 📎 Hey there! It looks like you're trying to run a Docker daemon. - - You probably should use the "dind" image variant instead, something like: - - docker run --privileged --name some-docker ... docker:dind ... - - See https://hub.docker.com/_/docker/ for more documentation and usage examples. - - EOW - sleep 3 -fi - -exec "$@" diff --git a/26/cli/modprobe.sh b/26/cli/modprobe.sh deleted file mode 100755 index b357d893fd..0000000000 --- a/26/cli/modprobe.sh +++ /dev/null @@ -1,20 +0,0 @@ -#!/bin/sh -set -eu - -# "modprobe" without modprobe -# https://twitter.com/lucabruno/status/902934379835662336 - -# this isn't 100% fool-proof, but it'll have a much higher success rate than simply using the "real" modprobe - -# Docker often uses "modprobe -va foo bar baz" -# so we ignore modules that start with "-" -for module; do - if [ "${module#-}" = "$module" ]; then - ip link show "$module" || true - lsmod | grep "$module" || true - fi -done - -# remove /usr/local/... from PATH so we can exec the real modprobe as a last resort -export PATH='/usr/sbin:/usr/bin:/sbin:/bin' -exec modprobe "$@" diff --git a/26/dind-rootless/Dockerfile b/26/dind-rootless/Dockerfile deleted file mode 100644 index d176fdbae3..0000000000 --- a/26/dind-rootless/Dockerfile +++ /dev/null @@ -1,55 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM docker:26-dind - -# busybox "ip" is insufficient: -# [rootlesskit:child ] error: executing [[ip tuntap add name tap0 mode tap] [ip link set tap0 address 02:50:00:00:00:01]]: exit status 1 -RUN apk add --no-cache iproute2 fuse-overlayfs - -# "/run/user/UID" will be used by default as the value of XDG_RUNTIME_DIR -RUN mkdir /run/user && chmod 1777 /run/user - -# create a default user preconfigured for running rootless dockerd -RUN set -eux; \ - adduser -h /home/rootless -g 'Rootless' -D -u 1000 rootless; \ - echo 'rootless:100000:65536' >> /etc/subuid; \ - echo 'rootless:100000:65536' >> /etc/subgid - -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://download.docker.com/linux/static/stable/x86_64/docker-rootless-extras-26.1.4.tgz'; \ - ;; \ - 'aarch64') \ - url='https://download.docker.com/linux/static/stable/aarch64/docker-rootless-extras-26.1.4.tgz'; \ - ;; \ - *) echo >&2 "error: unsupported 'rootless.tgz' architecture ($apkArch)"; exit 1 ;; \ - esac; \ - \ - wget -O 'rootless.tgz' "$url"; \ - \ - tar --extract \ - --file rootless.tgz \ - --strip-components 1 \ - --directory /usr/local/bin/ \ - 'docker-rootless-extras/rootlesskit' \ - 'docker-rootless-extras/rootlesskit-docker-proxy' \ - 'docker-rootless-extras/vpnkit' \ - ; \ - rm rootless.tgz; \ - \ - rootlesskit --version; \ - vpnkit --version - -# pre-create "/var/lib/docker" for our rootless user -RUN set -eux; \ - mkdir -p /home/rootless/.local/share/docker; \ - chown -R rootless:rootless /home/rootless/.local/share/docker -VOLUME /home/rootless/.local/share/docker -USER rootless diff --git a/26/dind/Dockerfile b/26/dind/Dockerfile deleted file mode 100644 index 7698d1ecce..0000000000 --- a/26/dind/Dockerfile +++ /dev/null @@ -1,108 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM docker:26-cli - -# https://github.com/moby/moby/blob/0eecd59153c03ced5f5ddd79cc98f29e4d86daec/project/PACKAGERS.md#runtime-dependencies -# https://github.com/docker/docker-ce-packaging/blob/963aa02666035d4e268f33c63d7868d6cdd1d34c/deb/common/control#L28-L41 -RUN set -eux; \ - apk add --no-cache \ - btrfs-progs \ - e2fsprogs \ - e2fsprogs-extra \ - git \ - ip6tables \ - iptables \ - openssl \ - pigz \ - shadow-uidmap \ - xfsprogs \ - xz \ - zfs \ - ; - -# dind might be used on systems where the nf_tables kernel module isn't available. In that case, -# we need to switch over to xtables-legacy. See https://github.com/docker-library/docker/issues/463 -RUN set -eux; \ - apk add --no-cache iptables-legacy; \ -# set up a symlink farm we can use PATH to switch to legacy with - mkdir -p /usr/local/sbin/.iptables-legacy; \ -# https://git.alpinelinux.org/aports/tree/main/iptables/APKBUILD?id=b215d54de159eacafecb13c68dfadce6eefd9ec9#n73 - for f in \ - iptables \ - iptables-save \ - iptables-restore \ - ip6tables \ - ip6tables-save \ - ip6tables-restore \ - ; do \ -# "iptables-save" -> "iptables-legacy-save", "ip6tables" -> "ip6tables-legacy", etc. -# https://pkgs.alpinelinux.org/contents?branch=v3.19&name=iptables-legacy&arch=x86_64 - b="/sbin/${f/tables/tables-legacy}"; \ - "$b" --version; \ - ln -svT "$b" "/usr/local/sbin/.iptables-legacy/$f"; \ - done; \ -# verify it works (and gets us legacy) - export PATH="/usr/local/sbin/.iptables-legacy:$PATH"; \ - iptables --version | grep legacy - -# set up subuid/subgid so that "--userns-remap=default" works out-of-the-box -RUN set -eux; \ - addgroup -S dockremap; \ - adduser -S -G dockremap dockremap; \ - echo 'dockremap:165536:65536' >> /etc/subuid; \ - echo 'dockremap:165536:65536' >> /etc/subgid - -RUN set -eux; \ - \ - apkArch="$(apk --print-arch)"; \ - case "$apkArch" in \ - 'x86_64') \ - url='https://download.docker.com/linux/static/stable/x86_64/docker-26.1.4.tgz'; \ - ;; \ - 'armhf') \ - url='https://download.docker.com/linux/static/stable/armel/docker-26.1.4.tgz'; \ - ;; \ - 'armv7') \ - url='https://download.docker.com/linux/static/stable/armhf/docker-26.1.4.tgz'; \ - ;; \ - 'aarch64') \ - url='https://download.docker.com/linux/static/stable/aarch64/docker-26.1.4.tgz'; \ - ;; \ - *) echo >&2 "error: unsupported 'docker.tgz' architecture ($apkArch)"; exit 1 ;; \ - esac; \ - \ - wget -O 'docker.tgz' "$url"; \ - \ - tar --extract \ - --file docker.tgz \ - --strip-components 1 \ - --directory /usr/local/bin/ \ - --no-same-owner \ -# we exclude the CLI binary because we already extracted that over in the "docker:26-cli" image that we're FROM and we don't want to duplicate those bytes again in this layer - --exclude 'docker/docker' \ - ; \ - rm docker.tgz; \ - \ - dockerd --version; \ - containerd --version; \ - ctr --version; \ - runc --version - -# https://github.com/docker/docker/tree/master/hack/dind -ENV DIND_COMMIT 65cfcc28ab37cb75e1560e4b4738719c07c6618e - -RUN set -eux; \ - wget -O /usr/local/bin/dind "https://raw.githubusercontent.com/docker/docker/${DIND_COMMIT}/hack/dind"; \ - chmod +x /usr/local/bin/dind - -COPY dockerd-entrypoint.sh /usr/local/bin/ - -VOLUME /var/lib/docker -EXPOSE 2375 2376 - -ENTRYPOINT ["dockerd-entrypoint.sh"] -CMD [] diff --git a/26/dind/dockerd-entrypoint.sh b/26/dind/dockerd-entrypoint.sh deleted file mode 100755 index 6c06bb8118..0000000000 --- a/26/dind/dockerd-entrypoint.sh +++ /dev/null @@ -1,234 +0,0 @@ -#!/bin/sh -set -eu - -_tls_ensure_private() { - local f="$1"; shift - [ -s "$f" ] || openssl genrsa -out "$f" 4096 -} -_tls_san() { - { - ip -oneline address | awk '{ gsub(/\/.+$/, "", $4); print "IP:" $4 }' - { - cat /etc/hostname - echo 'docker' - echo 'localhost' - hostname -f - hostname -s - } | sed 's/^/DNS:/' - [ -z "${DOCKER_TLS_SAN:-}" ] || echo "$DOCKER_TLS_SAN" - } | sort -u | xargs printf '%s,' | sed "s/,\$//" -} -_tls_generate_certs() { - local dir="$1"; shift - - # if server/{ca,key,cert}.pem && !ca/key.pem, do NOTHING except verify (user likely managing CA themselves) - # if ca/key.pem || !ca/cert.pem, generate CA public if necessary - # if ca/key.pem, generate server public - # if ca/key.pem, generate client public - # (regenerating public certs every startup to account for SAN/IP changes and/or expiration) - - if [ -s "$dir/server/ca.pem" ] && [ -s "$dir/server/cert.pem" ] && [ -s "$dir/server/key.pem" ] && [ ! -s "$dir/ca/key.pem" ]; then - openssl verify -CAfile "$dir/server/ca.pem" "$dir/server/cert.pem" - return 0 - fi - - # https://github.com/FiloSottile/mkcert/issues/174 - local certValidDays='825' - - if [ -s "$dir/ca/key.pem" ] || [ ! -s "$dir/ca/cert.pem" ]; then - # if we either have a CA private key or do *not* have a CA public key, then we should create/manage the CA - mkdir -p "$dir/ca" - _tls_ensure_private "$dir/ca/key.pem" - openssl req -new -key "$dir/ca/key.pem" \ - -out "$dir/ca/cert.pem" \ - -subj '/CN=docker:dind CA' -x509 -days "$certValidDays" - fi - - if [ -s "$dir/ca/key.pem" ]; then - # if we have a CA private key, we should create/manage a server key - mkdir -p "$dir/server" - _tls_ensure_private "$dir/server/key.pem" - openssl req -new -key "$dir/server/key.pem" \ - -out "$dir/server/csr.pem" \ - -subj '/CN=docker:dind server' - cat > "$dir/server/openssl.cnf" <<-EOF - [ x509_exts ] - subjectAltName = $(_tls_san) - EOF - openssl x509 -req \ - -in "$dir/server/csr.pem" \ - -CA "$dir/ca/cert.pem" \ - -CAkey "$dir/ca/key.pem" \ - -CAcreateserial \ - -out "$dir/server/cert.pem" \ - -days "$certValidDays" \ - -extfile "$dir/server/openssl.cnf" \ - -extensions x509_exts - cp "$dir/ca/cert.pem" "$dir/server/ca.pem" - openssl verify -CAfile "$dir/server/ca.pem" "$dir/server/cert.pem" - fi - - if [ -s "$dir/ca/key.pem" ]; then - # if we have a CA private key, we should create/manage a client key - mkdir -p "$dir/client" - _tls_ensure_private "$dir/client/key.pem" - chmod 0644 "$dir/client/key.pem" # openssl defaults to 0600 for the private key, but this one needs to be shared with arbitrary client contexts - openssl req -new \ - -key "$dir/client/key.pem" \ - -out "$dir/client/csr.pem" \ - -subj '/CN=docker:dind client' - cat > "$dir/client/openssl.cnf" <<-'EOF' - [ x509_exts ] - extendedKeyUsage = clientAuth - EOF - openssl x509 -req \ - -in "$dir/client/csr.pem" \ - -CA "$dir/ca/cert.pem" \ - -CAkey "$dir/ca/key.pem" \ - -CAcreateserial \ - -out "$dir/client/cert.pem" \ - -days "$certValidDays" \ - -extfile "$dir/client/openssl.cnf" \ - -extensions x509_exts - cp "$dir/ca/cert.pem" "$dir/client/ca.pem" - openssl verify -CAfile "$dir/client/ca.pem" "$dir/client/cert.pem" - fi -} - -# no arguments passed -# or first arg is `-f` or `--some-option` -if [ "$#" -eq 0 ] || [ "${1#-}" != "$1" ]; then - # set "dockerSocket" to the default "--host" *unix socket* value (for both standard or rootless) - uid="$(id -u)" - if [ "$uid" = '0' ]; then - dockerSocket='unix:///var/run/docker.sock' - else - # if we're not root, we must be trying to run rootless - : "${XDG_RUNTIME_DIR:=/run/user/$uid}" - dockerSocket="unix://$XDG_RUNTIME_DIR/docker.sock" - fi - case "${DOCKER_HOST:-}" in - unix://*) - dockerSocket="$DOCKER_HOST" - ;; - esac - - # add our default arguments - if [ -n "${DOCKER_TLS_CERTDIR:-}" ]; then - _tls_generate_certs "$DOCKER_TLS_CERTDIR" - # generate certs and use TLS if requested/possible (default in 19.03+) - set -- dockerd \ - --host="$dockerSocket" \ - --host=tcp://0.0.0.0:2376 \ - --tlsverify \ - --tlscacert "$DOCKER_TLS_CERTDIR/server/ca.pem" \ - --tlscert "$DOCKER_TLS_CERTDIR/server/cert.pem" \ - --tlskey "$DOCKER_TLS_CERTDIR/server/key.pem" \ - "$@" - DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS="${DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS:-} -p 0.0.0.0:2376:2376/tcp" - else - # TLS disabled (-e DOCKER_TLS_CERTDIR='') or missing certs - set -- dockerd \ - --host="$dockerSocket" \ - --host=tcp://0.0.0.0:2375 \ - "$@" - DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS="${DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS:-} -p 0.0.0.0:2375:2375/tcp" - fi -fi - -if [ "$1" = 'dockerd' ]; then - # explicitly remove Docker's default PID file to ensure that it can start properly if it was stopped uncleanly (and thus didn't clean up the PID file) - find /run /var/run -iname 'docker*.pid' -delete || : - - # XXX inject "docker-init" (tini) as pid1 to workaround https://github.com/docker-library/docker/issues/318 (zombie container-shim processes) - set -- docker-init -- "$@" - - iptablesLegacy= - if [ -n "${DOCKER_IPTABLES_LEGACY+x}" ]; then - # let users choose explicitly to legacy or not to legacy - iptablesLegacy="$DOCKER_IPTABLES_LEGACY" - if [ -n "$iptablesLegacy" ]; then - modprobe ip_tables || : - modprobe ip6_tables || : - else - modprobe nf_tables || : - fi - elif ( - # https://git.netfilter.org/iptables/tree/iptables/nft-shared.c?id=f5cf76626d95d2c491a80288bccc160c53b44e88#n420 - # https://github.com/docker-library/docker/pull/468#discussion_r1442131459 - for f in /proc/net/ip_tables_names /proc/net/ip6_tables_names /proc/net/arp_tables_names; do - if b="$(cat "$f")" && [ -n "$b" ]; then - exit 0 - fi - done - exit 1 - ); then - # if we already have any "legacy" iptables rules, we should always use legacy - iptablesLegacy=1 - elif ! iptables -nL > /dev/null 2>&1; then - # if iptables fails to run, chances are high the necessary kernel modules aren't loaded (perhaps the host is using xtables, for example) - # https://github.com/docker-library/docker/issues/350 - # https://github.com/moby/moby/issues/26824 - # https://github.com/docker-library/docker/pull/437#issuecomment-1854900620 - modprobe nf_tables || : - if ! iptables -nL > /dev/null 2>&1; then - # might be host has no nf_tables, but Alpine is all-in now (so let's try a legacy fallback) - modprobe ip_tables || : - modprobe ip6_tables || : - if /usr/local/sbin/.iptables-legacy/iptables -nL > /dev/null 2>&1; then - iptablesLegacy=1 - fi - fi - fi - if [ -n "$iptablesLegacy" ]; then - # see https://github.com/docker-library/docker/issues/463 (and the dind Dockerfile where this directory is set up) - export PATH="/usr/local/sbin/.iptables-legacy:$PATH" - fi - iptables --version # so users can see whether it's legacy or not - - uid="$(id -u)" - if [ "$uid" != '0' ]; then - # if we're not root, we must be trying to run rootless - if ! command -v rootlesskit > /dev/null; then - echo >&2 "error: attempting to run rootless dockerd but missing 'rootlesskit' (perhaps the 'docker:dind-rootless' image variant is intended?)" - exit 1 - fi - user="$(id -un 2>/dev/null || :)" - if ! grep -qE "^($uid${user:+|$user}):" /etc/subuid || ! grep -qE "^($uid${user:+|$user}):" /etc/subgid; then - echo >&2 "error: attempting to run rootless dockerd but missing necessary entries in /etc/subuid and/or /etc/subgid for $uid" - exit 1 - fi - : "${XDG_RUNTIME_DIR:=/run/user/$uid}" - export XDG_RUNTIME_DIR - if ! mkdir -p "$XDG_RUNTIME_DIR" || [ ! -w "$XDG_RUNTIME_DIR" ] || ! mkdir -p "$HOME/.local/share/docker" || [ ! -w "$HOME/.local/share/docker" ]; then - echo >&2 "error: attempting to run rootless dockerd but need writable HOME ($HOME) and XDG_RUNTIME_DIR ($XDG_RUNTIME_DIR) for user $uid" - exit 1 - fi - if [ -f /proc/sys/kernel/unprivileged_userns_clone ] && unprivClone="$(cat /proc/sys/kernel/unprivileged_userns_clone)" && [ "$unprivClone" != '1' ]; then - echo >&2 "error: attempting to run rootless dockerd but need 'kernel.unprivileged_userns_clone' (/proc/sys/kernel/unprivileged_userns_clone) set to 1" - exit 1 - fi - if [ -f /proc/sys/user/max_user_namespaces ] && maxUserns="$(cat /proc/sys/user/max_user_namespaces)" && [ "$maxUserns" = '0' ]; then - echo >&2 "error: attempting to run rootless dockerd but need 'user.max_user_namespaces' (/proc/sys/user/max_user_namespaces) set to a sufficiently large value" - exit 1 - fi - # TODO overlay support detection? - exec rootlesskit \ - --net="${DOCKERD_ROOTLESS_ROOTLESSKIT_NET:-vpnkit}" \ - --mtu="${DOCKERD_ROOTLESS_ROOTLESSKIT_MTU:-1500}" \ - --disable-host-loopback \ - --port-driver=builtin \ - --copy-up=/etc \ - --copy-up=/run \ - ${DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS:-} \ - "$@" - elif [ -x '/usr/local/bin/dind' ]; then - # if we have the (mostly defunct now) Docker-in-Docker wrapper script, use it - set -- '/usr/local/bin/dind' "$@" - fi -else - # if it isn't `dockerd` we're trying to run, pass it through `docker-entrypoint.sh` so it gets `DOCKER_HOST` set appropriately too - set -- docker-entrypoint.sh "$@" -fi - -exec "$@" diff --git a/26/windows/windowsservercore-1809/Dockerfile b/26/windows/windowsservercore-1809/Dockerfile deleted file mode 100644 index 01b3e5c1ca..0000000000 --- a/26/windows/windowsservercore-1809/Dockerfile +++ /dev/null @@ -1,91 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM mcr.microsoft.com/windows/servercore:1809 - -# $ProgressPreference: https://github.com/PowerShell/PowerShell/issues/2138#issuecomment-251261324 -SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"] - -# PATH isn't actually set in the Docker image, so we have to set it from within the container -RUN $newPath = ('{0}\docker;{1}' -f $env:ProgramFiles, $env:PATH); \ - Write-Host ('Updating PATH: {0}' -f $newPath); \ - [Environment]::SetEnvironmentVariable('PATH', $newPath, [EnvironmentVariableTarget]::Machine); -# doing this first to share cache across versions more aggressively - -ENV DOCKER_VERSION 26.1.4 -ENV DOCKER_URL https://download.docker.com/win/static/stable/x86_64/docker-26.1.4.zip -# TODO ENV DOCKER_SHA256 -# https://github.com/docker/docker-ce/blob/5b073ee2cf564edee5adca05eee574142f7627bb/components/packaging/static/hash_files !! -# (no SHA file artifacts on download.docker.com yet as of 2017-06-07 though) - -RUN Write-Host ('Downloading {0} ...' -f $env:DOCKER_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_URL -OutFile 'docker.zip'; \ - \ - Write-Host 'Expanding ...'; \ - Expand-Archive docker.zip -DestinationPath $env:ProgramFiles; \ -# (this archive has a "docker/..." directory in it already) - \ - Write-Host 'Removing ...'; \ - Remove-Item @( \ - 'docker.zip', \ - ('{0}\docker\dockerd.exe' -f $env:ProgramFiles) \ - ) -Force; \ - \ - Write-Host 'Verifying install ("docker --version") ...'; \ - docker --version; \ - \ - Write-Host 'Complete.'; - -# https://github.com/docker-library/docker/issues/409#issuecomment-1462868414 -ENV DOCKER_BUILDX_VERSION 0.16.1 -ENV DOCKER_BUILDX_URL https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.windows-amd64.exe -ENV DOCKER_BUILDX_SHA256 34b8bd302364e9df99ebcd86658eae6ade175baf8baf6e74123ae04fcb2675c3 -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-buildx.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_BUILDX_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_BUILDX_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_BUILDX_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_BUILDX_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker buildx version") ...'; \ - docker buildx version; \ - \ - Write-Host 'Complete.'; -ENV DOCKER_COMPOSE_VERSION 2.29.1 -ENV DOCKER_COMPOSE_URL https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-x86_64.exe -ENV DOCKER_COMPOSE_SHA256 c80155bfd2669bcdc7482ae7ccf7ccaf6b5da2149b690d806c7a4d9200abc54e -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-compose.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_COMPOSE_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_COMPOSE_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_COMPOSE_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_COMPOSE_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker compose version") ...'; \ - docker compose version; \ - \ - $link = ('{0}\docker\docker-compose.exe' -f $env:ProgramFiles); \ - Write-Host ('Linking {0} to {1} ...' -f $plugin, $link); \ - New-Item -ItemType SymbolicLink -Path $link -Target $plugin; \ - \ - Write-Host 'Verifying install ("docker-compose --version") ...'; \ - docker-compose --version; \ - \ - Write-Host 'Complete.'; diff --git a/26/windows/windowsservercore-ltsc2022/Dockerfile b/26/windows/windowsservercore-ltsc2022/Dockerfile deleted file mode 100644 index d9bd360f2c..0000000000 --- a/26/windows/windowsservercore-ltsc2022/Dockerfile +++ /dev/null @@ -1,91 +0,0 @@ -# -# NOTE: THIS DOCKERFILE IS GENERATED VIA "apply-templates.sh" -# -# PLEASE DO NOT EDIT IT DIRECTLY. -# - -FROM mcr.microsoft.com/windows/servercore:ltsc2022 - -# $ProgressPreference: https://github.com/PowerShell/PowerShell/issues/2138#issuecomment-251261324 -SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"] - -# PATH isn't actually set in the Docker image, so we have to set it from within the container -RUN $newPath = ('{0}\docker;{1}' -f $env:ProgramFiles, $env:PATH); \ - Write-Host ('Updating PATH: {0}' -f $newPath); \ - [Environment]::SetEnvironmentVariable('PATH', $newPath, [EnvironmentVariableTarget]::Machine); -# doing this first to share cache across versions more aggressively - -ENV DOCKER_VERSION 26.1.4 -ENV DOCKER_URL https://download.docker.com/win/static/stable/x86_64/docker-26.1.4.zip -# TODO ENV DOCKER_SHA256 -# https://github.com/docker/docker-ce/blob/5b073ee2cf564edee5adca05eee574142f7627bb/components/packaging/static/hash_files !! -# (no SHA file artifacts on download.docker.com yet as of 2017-06-07 though) - -RUN Write-Host ('Downloading {0} ...' -f $env:DOCKER_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_URL -OutFile 'docker.zip'; \ - \ - Write-Host 'Expanding ...'; \ - Expand-Archive docker.zip -DestinationPath $env:ProgramFiles; \ -# (this archive has a "docker/..." directory in it already) - \ - Write-Host 'Removing ...'; \ - Remove-Item @( \ - 'docker.zip', \ - ('{0}\docker\dockerd.exe' -f $env:ProgramFiles) \ - ) -Force; \ - \ - Write-Host 'Verifying install ("docker --version") ...'; \ - docker --version; \ - \ - Write-Host 'Complete.'; - -# https://github.com/docker-library/docker/issues/409#issuecomment-1462868414 -ENV DOCKER_BUILDX_VERSION 0.16.1 -ENV DOCKER_BUILDX_URL https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.windows-amd64.exe -ENV DOCKER_BUILDX_SHA256 34b8bd302364e9df99ebcd86658eae6ade175baf8baf6e74123ae04fcb2675c3 -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-buildx.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_BUILDX_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_BUILDX_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_BUILDX_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_BUILDX_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker buildx version") ...'; \ - docker buildx version; \ - \ - Write-Host 'Complete.'; -ENV DOCKER_COMPOSE_VERSION 2.29.1 -ENV DOCKER_COMPOSE_URL https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-x86_64.exe -ENV DOCKER_COMPOSE_SHA256 c80155bfd2669bcdc7482ae7ccf7ccaf6b5da2149b690d806c7a4d9200abc54e -RUN $dir = ('{0}\docker\cli-plugins' -f $env:ProgramFiles); \ - Write-Host ('Creating {0} ...' -f $dir); \ - New-Item -ItemType Directory $dir -Force; \ - \ - $plugin = ('{0}\docker-compose.exe' -f $dir); \ - Write-Host ('Downloading {0} ...' -f $env:DOCKER_COMPOSE_URL); \ - Invoke-WebRequest -Uri $env:DOCKER_COMPOSE_URL -OutFile $plugin; \ - \ - Write-Host ('Verifying sha256 ({0}) ...' -f $env:DOCKER_COMPOSE_SHA256); \ - if ((Get-FileHash $plugin -Algorithm sha256).Hash -ne $env:DOCKER_COMPOSE_SHA256) { \ - Write-Host 'FAILED!'; \ - exit 1; \ - }; \ - \ - Write-Host 'Verifying install ("docker compose version") ...'; \ - docker compose version; \ - \ - $link = ('{0}\docker\docker-compose.exe' -f $env:ProgramFiles); \ - Write-Host ('Linking {0} to {1} ...' -f $plugin, $link); \ - New-Item -ItemType SymbolicLink -Path $link -Target $plugin; \ - \ - Write-Host 'Verifying install ("docker-compose --version") ...'; \ - docker-compose --version; \ - \ - Write-Host 'Complete.'; diff --git a/generate-stackbrew-library.sh b/generate-stackbrew-library.sh index bbc69c8380..11e3c9199c 100755 --- a/generate-stackbrew-library.sh +++ b/generate-stackbrew-library.sh @@ -175,12 +175,6 @@ for version; do suiteAliases=( "${suiteAliases[@]//latest-/}" ) variantAliases+=( "${suiteAliases[@]}" ) if [ "$variant" = 'dind' ]; then - # add "git" aliases https://github.com/docker-library/docker/issues/482#issuecomment-1955609423 - if [ "$version" = '24' ] || [ "$version" = '25' ]; then - gitAliases=( "${versionAliases[@]/%/-git}" ) - gitAliases=( "${gitAliases[@]//latest-/}" ) - variantAliases+=( "${gitAliases[@]}" ) - fi # add "latest" aliases suiteAliases=( "${versionAliases[0]}" ) # only "X.Y.Z-foo" suiteAliases=( "${suiteAliases[@]/%/-alpine$alpine}" ) diff --git a/versions.json b/versions.json index 87cbc3bed3..fbce3c87a1 100644 --- a/versions.json +++ b/versions.json @@ -1,427 +1,4 @@ { - "24": { - "arches": { - "amd64": { - "dockerUrl": "https://download.docker.com/linux/static/stable/x86_64/docker-24.0.9.tgz", - "rootlessExtrasUrl": "https://download.docker.com/linux/static/stable/x86_64/docker-rootless-extras-24.0.9.tgz" - }, - "arm32v6": { - "dockerUrl": "https://download.docker.com/linux/static/stable/armel/docker-24.0.9.tgz" - }, - "arm32v7": { - "dockerUrl": "https://download.docker.com/linux/static/stable/armhf/docker-24.0.9.tgz" - }, - "arm64v8": { - "dockerUrl": "https://download.docker.com/linux/static/stable/aarch64/docker-24.0.9.tgz", - "rootlessExtrasUrl": "https://download.docker.com/linux/static/stable/aarch64/docker-rootless-extras-24.0.9.tgz" - }, - "windows-amd64": { - "dockerUrl": "https://download.docker.com/win/static/stable/x86_64/docker-24.0.9.zip" - } - }, - "buildx": { - "arches": { - "amd64": { - "file": "buildx-v0.16.2.linux-amd64", - "sha256": "43e4c928a0be38ab34e206c82957edfdd54f3e7124f1dadd7779591c3acf77ea", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-amd64" - }, - "arm32v6": { - "file": "buildx-v0.16.2.linux-arm-v6", - "sha256": "77678205fbaaead25167cd93b022996d0bafff67deb5ca82b92b25cccb06ad07", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm-v6" - }, - "arm32v7": { - "file": "buildx-v0.16.2.linux-arm-v7", - "sha256": "b4f029ed0d4d30c49857bc31f8bec5484b3f6b8104d8d49a187fb6b69fab3d82", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm-v7" - }, - "arm64v8": { - "file": "buildx-v0.16.2.linux-arm64", - "sha256": "775f1ab64aa0e5d901dcc6ecf6843ec3261f27476873760711aa362b403f61f3", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm64" - }, - "ppc64le": { - "file": "buildx-v0.16.2.linux-ppc64le", - "sha256": "956b020318ad0ba94f817116792d9da8695ebab38254c9f821a85a3369175f7e", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-ppc64le" - }, - "riscv64": { - "file": "buildx-v0.16.2.linux-riscv64", - "sha256": "e90589ff33ad409a40a5e53cde5af4a0f230f0d8f5b6d9af522120a6900222ea", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-riscv64" - }, - "s390x": { - "file": "buildx-v0.16.2.linux-s390x", - "sha256": "f2dbf2dc967415e1e1f4398d040d6b5b81e4e27f37df22bd148ea4b18c8ea6eb", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-s390x" - }, - "windows-amd64": { - "file": "buildx-v0.16.2.windows-amd64.exe", - "sha256": "0ee1234dc4bec883f9407211ae386052c45d13cf9052329f8aece8358cff5e9c", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.windows-amd64.exe" - }, - "windows-arm64v8": { - "file": "buildx-v0.16.2.windows-arm64.exe", - "sha256": "2a79b06bbe0f557e271cb10182d4bcb54c7af68b8e2375ee9b67053b892cab5a", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.windows-arm64.exe" - } - }, - "version": "0.16.2" - }, - "compose": { - "arches": { - "amd64": { - "file": "docker-compose-linux-x86_64", - "sha256": "5ea89dd65d33912a83737d8a4bf070d5de534a32b8493a21fbefc924484786a9", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-x86_64" - }, - "arm32v6": { - "file": "docker-compose-linux-armv6", - "sha256": "5fdd0653bb04798f1448bd5bdbecea02bcf39247fcc9b8aab10c05c8e680ede0", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv6" - }, - "arm32v7": { - "file": "docker-compose-linux-armv7", - "sha256": "0d675f39b3089050d0630a7151580a58abc6c189e64209c6403598b6e9fc0b21", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv7" - }, - "arm64v8": { - "file": "docker-compose-linux-aarch64", - "sha256": "7f0023ba726b90347e4ebc1d94ec5970390b8bddb86402c0429f163dca70d745", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-aarch64" - }, - "darwin-amd64": { - "file": "docker-compose-darwin-x86_64", - "sha256": "170acf9a5754ec244904fb63494c50249ba4aea22d84c1fad9a9eeadc8c87c66", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-darwin-x86_64" - }, - "darwin-arm64v8": { - "file": "docker-compose-darwin-aarch64", - "sha256": "b4a5b264ecddeeced9c14116e1b726c6529f286bea0a14325fb6436a4b35d7ec", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-darwin-aarch64" - }, - "ppc64le": { - "file": "docker-compose-linux-ppc64le", - "sha256": "9d69aae252fa7fd3a234647951b2af496ee927134d5456d4b8bac31d4d260f5d", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-ppc64le" - }, - "riscv64": { - "file": "docker-compose-linux-riscv64", - "sha256": "91b6b2f56e8cba3965a5409fa5125d3f01408c9b2d0bf5b9c119f353601d1e51", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-riscv64" - }, - "s390x": { - "file": "docker-compose-linux-s390x", - "sha256": "1ea22d04bab9452de3169e22b60d77a232acdf829ac4858dc780085dd7fd4c48", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-s390x" - }, - "windows-amd64": { - "file": "docker-compose-windows-x86_64.exe", - "sha256": "c80155bfd2669bcdc7482ae7ccf7ccaf6b5da2149b690d806c7a4d9200abc54e", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-x86_64.exe" - }, - "windows-arm64v8": { - "file": "docker-compose-windows-aarch64.exe", - "sha256": "de8fe58e1ae5330597267499c2ee818ec11d5ca05ef00c29697c1cff4abcacbf", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-aarch64.exe" - } - }, - "version": "2.29.1" - }, - "dindCommit": "65cfcc28ab37cb75e1560e4b4738719c07c6618e", - "variants": [ - "cli", - "dind", - "dind-rootless", - "windows/windowsservercore-ltsc2022", - "windows/windowsservercore-1809" - ], - "version": "24.0.9" - }, - "24-rc": null, - "25": { - "arches": { - "amd64": { - "dockerUrl": "https://download.docker.com/linux/static/stable/x86_64/docker-25.0.5.tgz", - "rootlessExtrasUrl": "https://download.docker.com/linux/static/stable/x86_64/docker-rootless-extras-25.0.5.tgz" - }, - "arm32v6": { - "dockerUrl": "https://download.docker.com/linux/static/stable/armel/docker-25.0.5.tgz" - }, - "arm32v7": { - "dockerUrl": "https://download.docker.com/linux/static/stable/armhf/docker-25.0.5.tgz" - }, - "arm64v8": { - "dockerUrl": "https://download.docker.com/linux/static/stable/aarch64/docker-25.0.5.tgz", - "rootlessExtrasUrl": "https://download.docker.com/linux/static/stable/aarch64/docker-rootless-extras-25.0.5.tgz" - }, - "windows-amd64": { - "dockerUrl": "https://download.docker.com/win/static/stable/x86_64/docker-25.0.5.zip" - } - }, - "buildx": { - "arches": { - "amd64": { - "file": "buildx-v0.16.2.linux-amd64", - "sha256": "43e4c928a0be38ab34e206c82957edfdd54f3e7124f1dadd7779591c3acf77ea", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-amd64" - }, - "arm32v6": { - "file": "buildx-v0.16.2.linux-arm-v6", - "sha256": "77678205fbaaead25167cd93b022996d0bafff67deb5ca82b92b25cccb06ad07", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm-v6" - }, - "arm32v7": { - "file": "buildx-v0.16.2.linux-arm-v7", - "sha256": "b4f029ed0d4d30c49857bc31f8bec5484b3f6b8104d8d49a187fb6b69fab3d82", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm-v7" - }, - "arm64v8": { - "file": "buildx-v0.16.2.linux-arm64", - "sha256": "775f1ab64aa0e5d901dcc6ecf6843ec3261f27476873760711aa362b403f61f3", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-arm64" - }, - "ppc64le": { - "file": "buildx-v0.16.2.linux-ppc64le", - "sha256": "956b020318ad0ba94f817116792d9da8695ebab38254c9f821a85a3369175f7e", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-ppc64le" - }, - "riscv64": { - "file": "buildx-v0.16.2.linux-riscv64", - "sha256": "e90589ff33ad409a40a5e53cde5af4a0f230f0d8f5b6d9af522120a6900222ea", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-riscv64" - }, - "s390x": { - "file": "buildx-v0.16.2.linux-s390x", - "sha256": "f2dbf2dc967415e1e1f4398d040d6b5b81e4e27f37df22bd148ea4b18c8ea6eb", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.linux-s390x" - }, - "windows-amd64": { - "file": "buildx-v0.16.2.windows-amd64.exe", - "sha256": "0ee1234dc4bec883f9407211ae386052c45d13cf9052329f8aece8358cff5e9c", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.windows-amd64.exe" - }, - "windows-arm64v8": { - "file": "buildx-v0.16.2.windows-arm64.exe", - "sha256": "2a79b06bbe0f557e271cb10182d4bcb54c7af68b8e2375ee9b67053b892cab5a", - "url": "https://github.com/docker/buildx/releases/download/v0.16.2/buildx-v0.16.2.windows-arm64.exe" - } - }, - "version": "0.16.2" - }, - "compose": { - "arches": { - "amd64": { - "file": "docker-compose-linux-x86_64", - "sha256": "5ea89dd65d33912a83737d8a4bf070d5de534a32b8493a21fbefc924484786a9", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-x86_64" - }, - "arm32v6": { - "file": "docker-compose-linux-armv6", - "sha256": "5fdd0653bb04798f1448bd5bdbecea02bcf39247fcc9b8aab10c05c8e680ede0", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv6" - }, - "arm32v7": { - "file": "docker-compose-linux-armv7", - "sha256": "0d675f39b3089050d0630a7151580a58abc6c189e64209c6403598b6e9fc0b21", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv7" - }, - "arm64v8": { - "file": "docker-compose-linux-aarch64", - "sha256": "7f0023ba726b90347e4ebc1d94ec5970390b8bddb86402c0429f163dca70d745", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-aarch64" - }, - "darwin-amd64": { - "file": "docker-compose-darwin-x86_64", - "sha256": "170acf9a5754ec244904fb63494c50249ba4aea22d84c1fad9a9eeadc8c87c66", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-darwin-x86_64" - }, - "darwin-arm64v8": { - "file": "docker-compose-darwin-aarch64", - "sha256": "b4a5b264ecddeeced9c14116e1b726c6529f286bea0a14325fb6436a4b35d7ec", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-darwin-aarch64" - }, - "ppc64le": { - "file": "docker-compose-linux-ppc64le", - "sha256": "9d69aae252fa7fd3a234647951b2af496ee927134d5456d4b8bac31d4d260f5d", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-ppc64le" - }, - "riscv64": { - "file": "docker-compose-linux-riscv64", - "sha256": "91b6b2f56e8cba3965a5409fa5125d3f01408c9b2d0bf5b9c119f353601d1e51", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-riscv64" - }, - "s390x": { - "file": "docker-compose-linux-s390x", - "sha256": "1ea22d04bab9452de3169e22b60d77a232acdf829ac4858dc780085dd7fd4c48", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-s390x" - }, - "windows-amd64": { - "file": "docker-compose-windows-x86_64.exe", - "sha256": "c80155bfd2669bcdc7482ae7ccf7ccaf6b5da2149b690d806c7a4d9200abc54e", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-x86_64.exe" - }, - "windows-arm64v8": { - "file": "docker-compose-windows-aarch64.exe", - "sha256": "de8fe58e1ae5330597267499c2ee818ec11d5ca05ef00c29697c1cff4abcacbf", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-aarch64.exe" - } - }, - "version": "2.29.1" - }, - "dindCommit": "65cfcc28ab37cb75e1560e4b4738719c07c6618e", - "variants": [ - "cli", - "dind", - "dind-rootless", - "windows/windowsservercore-ltsc2022", - "windows/windowsservercore-1809" - ], - "version": "25.0.5" - }, - "25-rc": null, - "26": { - "arches": { - "amd64": { - "dockerUrl": "https://download.docker.com/linux/static/stable/x86_64/docker-26.1.4.tgz", - "rootlessExtrasUrl": "https://download.docker.com/linux/static/stable/x86_64/docker-rootless-extras-26.1.4.tgz" - }, - "arm32v6": { - "dockerUrl": "https://download.docker.com/linux/static/stable/armel/docker-26.1.4.tgz" - }, - "arm32v7": { - "dockerUrl": "https://download.docker.com/linux/static/stable/armhf/docker-26.1.4.tgz" - }, - "arm64v8": { - "dockerUrl": "https://download.docker.com/linux/static/stable/aarch64/docker-26.1.4.tgz", - "rootlessExtrasUrl": "https://download.docker.com/linux/static/stable/aarch64/docker-rootless-extras-26.1.4.tgz" - }, - "windows-amd64": { - "dockerUrl": "https://download.docker.com/win/static/stable/x86_64/docker-26.1.4.zip" - } - }, - "buildx": { - "arches": { - "amd64": { - "file": "buildx-v0.16.1.linux-amd64", - "sha256": "62c2cb471c765b48a2b6fd0c09c8149b789695eb631bc1b7b60c047f75907f3f", - "url": "https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-amd64" - }, - "arm32v6": { - "file": "buildx-v0.16.1.linux-arm-v6", - "sha256": "e8092bdfe77337b27d963d5a0090b7be73e293e1c59ff0ceaac560b749fe42ba", - "url": "https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-arm-v6" - }, - "arm32v7": { - "file": "buildx-v0.16.1.linux-arm-v7", - "sha256": "8acad24cbefa6e8614c55fed2ac5c822303647563a4e14019eb9e8907ac02b5b", - "url": "https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-arm-v7" - }, - "arm64v8": { - "file": "buildx-v0.16.1.linux-arm64", - "sha256": "024f62e6bcd20d29f9ab45ecb49963f93311991465dddc62b8d8a32443aa36ce", - "url": "https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-arm64" - }, - "ppc64le": { - "file": "buildx-v0.16.1.linux-ppc64le", - "sha256": "328dc59f720f59aef58af35af3202a479bac7ccbb8c02fd9db60e8dd4561a2a1", - "url": "https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-ppc64le" - }, - "riscv64": { - "file": "buildx-v0.16.1.linux-riscv64", - "sha256": "2f6a0703e3359395574621a071896d02ea4240570813a5ea154febbe6d39fba0", - "url": "https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-riscv64" - }, - "s390x": { - "file": "buildx-v0.16.1.linux-s390x", - "sha256": "3423d552b0ed13538890b054cf5bc1605a396f77ef800a9a8192024cb5e90230", - "url": "https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.linux-s390x" - }, - "windows-amd64": { - "file": "buildx-v0.16.1.windows-amd64.exe", - "sha256": "34b8bd302364e9df99ebcd86658eae6ade175baf8baf6e74123ae04fcb2675c3", - "url": "https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.windows-amd64.exe" - }, - "windows-arm64v8": { - "file": "buildx-v0.16.1.windows-arm64.exe", - "sha256": "1533b0dd26aada59b891e7c94416955ab0e3720d4930438a64df497689fc1155", - "url": "https://github.com/docker/buildx/releases/download/v0.16.1/buildx-v0.16.1.windows-arm64.exe" - } - }, - "version": "0.16.1" - }, - "compose": { - "arches": { - "amd64": { - "file": "docker-compose-linux-x86_64", - "sha256": "5ea89dd65d33912a83737d8a4bf070d5de534a32b8493a21fbefc924484786a9", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-x86_64" - }, - "arm32v6": { - "file": "docker-compose-linux-armv6", - "sha256": "5fdd0653bb04798f1448bd5bdbecea02bcf39247fcc9b8aab10c05c8e680ede0", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv6" - }, - "arm32v7": { - "file": "docker-compose-linux-armv7", - "sha256": "0d675f39b3089050d0630a7151580a58abc6c189e64209c6403598b6e9fc0b21", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-armv7" - }, - "arm64v8": { - "file": "docker-compose-linux-aarch64", - "sha256": "7f0023ba726b90347e4ebc1d94ec5970390b8bddb86402c0429f163dca70d745", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-aarch64" - }, - "darwin-amd64": { - "file": "docker-compose-darwin-x86_64", - "sha256": "170acf9a5754ec244904fb63494c50249ba4aea22d84c1fad9a9eeadc8c87c66", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-darwin-x86_64" - }, - "darwin-arm64v8": { - "file": "docker-compose-darwin-aarch64", - "sha256": "b4a5b264ecddeeced9c14116e1b726c6529f286bea0a14325fb6436a4b35d7ec", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-darwin-aarch64" - }, - "ppc64le": { - "file": "docker-compose-linux-ppc64le", - "sha256": "9d69aae252fa7fd3a234647951b2af496ee927134d5456d4b8bac31d4d260f5d", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-ppc64le" - }, - "riscv64": { - "file": "docker-compose-linux-riscv64", - "sha256": "91b6b2f56e8cba3965a5409fa5125d3f01408c9b2d0bf5b9c119f353601d1e51", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-riscv64" - }, - "s390x": { - "file": "docker-compose-linux-s390x", - "sha256": "1ea22d04bab9452de3169e22b60d77a232acdf829ac4858dc780085dd7fd4c48", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-linux-s390x" - }, - "windows-amd64": { - "file": "docker-compose-windows-x86_64.exe", - "sha256": "c80155bfd2669bcdc7482ae7ccf7ccaf6b5da2149b690d806c7a4d9200abc54e", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-x86_64.exe" - }, - "windows-arm64v8": { - "file": "docker-compose-windows-aarch64.exe", - "sha256": "de8fe58e1ae5330597267499c2ee818ec11d5ca05ef00c29697c1cff4abcacbf", - "url": "https://github.com/docker/compose/releases/download/v2.29.1/docker-compose-windows-aarch64.exe" - } - }, - "version": "2.29.1" - }, - "dindCommit": "65cfcc28ab37cb75e1560e4b4738719c07c6618e", - "variants": [ - "cli", - "dind", - "dind-rootless", - "windows/windowsservercore-ltsc2022", - "windows/windowsservercore-1809" - ], - "version": "26.1.4" - }, - "26-rc": null, "27": { "arches": { "amd64": {