gitee.com/bomy/docker.git@v1.13.1/Dockerfile.s390x (about) 1 # This file describes the standard way to build Docker on s390x, using docker 2 # 3 # Usage: 4 # 5 # # Assemble the full dev environment. This is slow the first time. 6 # docker build -t docker -f Dockerfile.s390x . 7 # 8 # # Mount your source in an interactive container for quick testing: 9 # docker run -v `pwd`:/go/src/github.com/docker/docker --privileged -i -t docker bash 10 # 11 # # Run the test suite: 12 # docker run --privileged docker hack/make.sh test-unit test-integration-cli test-docker-py 13 # 14 # Note: AppArmor used to mess with privileged mode, but this is no longer 15 # the case. Therefore, you don't have to disable it anymore. 16 # 17 18 FROM s390x/gcc:6.1 19 20 # Packaged dependencies 21 RUN apt-get update && apt-get install -y \ 22 apparmor \ 23 aufs-tools \ 24 automake \ 25 bash-completion \ 26 btrfs-tools \ 27 build-essential \ 28 cmake \ 29 createrepo \ 30 curl \ 31 dpkg-sig \ 32 git \ 33 iptables \ 34 jq \ 35 net-tools \ 36 libapparmor-dev \ 37 libcap-dev \ 38 libltdl-dev \ 39 libsqlite3-dev \ 40 libsystemd-journal-dev \ 41 libtool \ 42 mercurial \ 43 pkg-config \ 44 python-dev \ 45 python-mock \ 46 python-pip \ 47 python-websocket \ 48 xfsprogs \ 49 tar \ 50 vim-common \ 51 --no-install-recommends 52 53 # glibc in Debian has a bug specific to s390x that won't be fixed until Debian 8.6 is released 54 # - https://github.com/docker/docker/issues/24748 55 # - https://sourceware.org/git/?p=glibc.git;a=commit;h=890b7a4b33d482b5c768ab47d70758b80227e9bc 56 # - https://sourceware.org/git/?p=glibc.git;a=commit;h=2e807f29595eb5b1e5d0decc6e356a3562ecc58e 57 RUN echo 'deb http://httpredir.debian.org/debian jessie-proposed-updates main' >> /etc/apt/sources.list.d/pu.list \ 58 && apt-get update \ 59 && apt-get install -y libc6 \ 60 && rm -rf /var/lib/apt/lists/* 61 62 # Install seccomp: the version shipped in jessie is too old 63 ENV SECCOMP_VERSION 2.3.1 64 RUN set -x \ 65 && export SECCOMP_PATH="$(mktemp -d)" \ 66 && curl -fsSL "https://github.com/seccomp/libseccomp/releases/download/v${SECCOMP_VERSION}/libseccomp-${SECCOMP_VERSION}.tar.gz" \ 67 | tar -xzC "$SECCOMP_PATH" --strip-components=1 \ 68 && ( \ 69 cd "$SECCOMP_PATH" \ 70 && ./configure --prefix=/usr/local \ 71 && make \ 72 && make install \ 73 && ldconfig \ 74 ) \ 75 && rm -rf "$SECCOMP_PATH" 76 77 # Get lvm2 source for compiling statically 78 ENV LVM2_VERSION 2.02.103 79 RUN mkdir -p /usr/local/lvm2 \ 80 && curl -fsSL "https://mirrors.kernel.org/sourceware/lvm2/LVM2.${LVM2_VERSION}.tgz" \ 81 | tar -xzC /usr/local/lvm2 --strip-components=1 82 # See https://git.fedorahosted.org/cgit/lvm2.git/refs/tags for release tags 83 84 # Fix platform enablement in lvm2 to support s390x properly 85 RUN set -e \ 86 && for f in config.guess config.sub; do \ 87 curl -fsSL -o "/usr/local/lvm2/autoconf/$f" "http://git.savannah.gnu.org/gitweb/?p=config.git;a=blob_plain;f=$f;hb=HEAD"; \ 88 done 89 # "arch.c:78:2: error: #error the arch code needs to know about your machine type" 90 91 # Compile and install lvm2 92 RUN cd /usr/local/lvm2 \ 93 && ./configure \ 94 --build="$(gcc -print-multiarch)" \ 95 --enable-static_link \ 96 && make device-mapper \ 97 && make install_device-mapper 98 # See https://git.fedorahosted.org/cgit/lvm2.git/tree/INSTALL 99 100 ENV GO_VERSION 1.7.5 101 RUN curl -fsSL "https://golang.org/dl/go${GO_VERSION}.linux-s390x.tar.gz" \ 102 | tar -xzC /usr/local 103 104 ENV PATH /go/bin:/usr/local/go/bin:$PATH 105 ENV GOPATH /go 106 107 # Dependency for golint 108 ENV GO_TOOLS_COMMIT 823804e1ae08dbb14eb807afc7db9993bc9e3cc3 109 RUN git clone https://github.com/golang/tools.git /go/src/golang.org/x/tools \ 110 && (cd /go/src/golang.org/x/tools && git checkout -q $GO_TOOLS_COMMIT) 111 112 # Grab Go's lint tool 113 ENV GO_LINT_COMMIT 32a87160691b3c96046c0c678fe57c5bef761456 114 RUN git clone https://github.com/golang/lint.git /go/src/github.com/golang/lint \ 115 && (cd /go/src/github.com/golang/lint && git checkout -q $GO_LINT_COMMIT) \ 116 && go install -v github.com/golang/lint/golint 117 118 # Install two versions of the registry. The first is an older version that 119 # only supports schema1 manifests. The second is a newer version that supports 120 # both. This allows integration-cli tests to cover push/pull with both schema1 121 # and schema2 manifests. 122 ENV REGISTRY_COMMIT_SCHEMA1 ec87e9b6971d831f0eff752ddb54fb64693e51cd 123 ENV REGISTRY_COMMIT 47a064d4195a9b56133891bbb13620c3ac83a827 124 RUN set -x \ 125 && export GOPATH="$(mktemp -d)" \ 126 && git clone https://github.com/docker/distribution.git "$GOPATH/src/github.com/docker/distribution" \ 127 && (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT") \ 128 && GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \ 129 go build -o /usr/local/bin/registry-v2 github.com/docker/distribution/cmd/registry \ 130 && (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT_SCHEMA1") \ 131 && GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \ 132 go build -o /usr/local/bin/registry-v2-schema1 github.com/docker/distribution/cmd/registry \ 133 && rm -rf "$GOPATH" 134 135 # Install notary and notary-server 136 ENV NOTARY_VERSION v0.4.2 137 RUN set -x \ 138 && export GOPATH="$(mktemp -d)" \ 139 && git clone https://github.com/docker/notary.git "$GOPATH/src/github.com/docker/notary" \ 140 && (cd "$GOPATH/src/github.com/docker/notary" && git checkout -q "$NOTARY_VERSION") \ 141 && GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \ 142 go build -o /usr/local/bin/notary-server github.com/docker/notary/cmd/notary-server \ 143 && GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \ 144 go build -o /usr/local/bin/notary github.com/docker/notary/cmd/notary \ 145 && rm -rf "$GOPATH" 146 147 # Get the "docker-py" source so we can run their integration tests 148 ENV DOCKER_PY_COMMIT e2655f658408f9ad1f62abdef3eb6ed43c0cf324 149 RUN git clone https://github.com/docker/docker-py.git /docker-py \ 150 && cd /docker-py \ 151 && git checkout -q $DOCKER_PY_COMMIT \ 152 && pip install -r test-requirements.txt 153 154 # Set user.email so crosbymichael's in-container merge commits go smoothly 155 RUN git config --global user.email 'docker-dummy@example.com' 156 157 # Add an unprivileged user to be used for tests which need it 158 RUN groupadd -r docker 159 RUN useradd --create-home --gid docker unprivilegeduser 160 161 VOLUME /var/lib/docker 162 WORKDIR /go/src/github.com/docker/docker 163 ENV DOCKER_BUILDTAGS apparmor selinux seccomp 164 165 # Let us use a .bashrc file 166 RUN ln -sfv $PWD/.bashrc ~/.bashrc 167 168 # Register Docker's bash completion. 169 RUN ln -sv $PWD/contrib/completion/bash/docker /etc/bash_completion.d/docker 170 171 # Get useful and necessary Hub images so we can "docker load" locally instead of pulling 172 COPY contrib/download-frozen-image-v2.sh /go/src/github.com/docker/docker/contrib/ 173 RUN ./contrib/download-frozen-image-v2.sh /docker-frozen-images \ 174 s390x/buildpack-deps:jessie@sha256:4d1381224acaca6c4bfe3604de3af6972083a8558a99672cb6989c7541780099 \ 175 s390x/busybox:latest@sha256:dd61522c983884a66ed72d60301925889028c6d2d5e0220a8fe1d9b4c6a4f01b \ 176 s390x/debian:jessie@sha256:b74c863400909eff3c5e196cac9bfd1f6333ce47aae6a38398d87d5875da170a \ 177 s390x/hello-world:latest@sha256:780d80b3a7677c3788c0d5cd9168281320c8d4a6d9183892d8ee5cdd610f5699 178 # See also "hack/make/.ensure-frozen-images" (which needs to be updated any time this list is) 179 180 # Install tomlv, vndr, runc, containerd, tini, docker-proxy 181 # Please edit hack/dockerfile/install-binaries.sh to update them. 182 COPY hack/dockerfile/binaries-commits /tmp/binaries-commits 183 COPY hack/dockerfile/install-binaries.sh /tmp/install-binaries.sh 184 RUN /tmp/install-binaries.sh tomlv vndr runc containerd tini proxy 185 186 # Wrap all commands in the "docker-in-docker" script to allow nested containers 187 ENTRYPOINT ["hack/dind"] 188 189 # Upload docker source 190 COPY . /go/src/github.com/docker/docker