Comments (1)
Related: #86
I'm not sure of the security implications of this, since an acbuild script is normally a shell script that runs as root. If we're running it in a container that gets blown away at the end of the build, is a user uploading a script that can break out of the container a concern? If so maybe revisiting the subject of an acbuild script mode could help.
Step 1 could be accomplished with some github integration, which would be very convenient for CD reasons.
Ideally at the end of a successful build it would just push a new image to quay or a private acserver or something with acpush, which would remove the need for step 3.
Regardless of if this thing serves the image itself or pushes it somewhere, it'll need to be able to sign it for the user. I don't like the idea of asking users to upload a private key, so maybe just generate a new key on the server for each project and sign it with that? That would complicate pushing the images somewhere else though, since the current push proposal for appc has the public gpg key sent to the server OOB.
from build.
Related Issues (20)
- `acbuild end` accepts running as non-superuser, then fails because of that HOT 2
- script: ending the build results in "no build in progress" HOT 3
- "acbuild run" with dependency fails form inside a container HOT 5
- OCI: update for new -rc5 image-layout format
- acbuild's dependent image discovery fails when server responses with redirection HOT 1
- Negative numbers in environment variables gets translated to opt flags HOT 1
- feature request: bind mounts from the host during build HOT 1
- overlayfs does not support rename operations HOT 7
- Can I build and push to registry an OCI image which will run in docker? HOT 12
- Provide Image ID on "write" HOT 3
- echo with acbuild run writes a file on the host HOT 2
- .aci increases in size with each build HOT 5
- 'file name too long' error on aci's built with v0.4.0 HOT 4
- Incremental build? HOT 5
- 'Error: overlayfs not supported on your system' with LXD Container HOT 4
- /dev, /proc and /sys are not mounted in my running rkt container HOT 6
- systemd-nspawn: unrecognized option '--setenv' HOT 1
- Created date annotation restrictions need to be documented or removed. HOT 3
- New import path for xz package HOT 1
- archive? HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from build.