Skip to content

Commit

Permalink
Merge branch 'main' of github.com:kubernetes-sigs/image-builder
Browse files Browse the repository at this point in the history
  • Loading branch information
CiraciNicolo committed Mar 28, 2024
2 parents 600c9b0 + fc50721 commit 6959f3f
Show file tree
Hide file tree
Showing 53 changed files with 1,469 additions and 96 deletions.
3 changes: 1 addition & 2 deletions OWNERS_ALIASES
Original file line number Diff line number Diff line change
Expand Up @@ -6,16 +6,15 @@ aliases:
- jsturtevant
- kkeshavamurthy
- mboersma
image-builder-reviewers:
- drew-viles
image-builder-reviewers:
- randomvariable
image-builder-azure-reviewers:
- jsturtevant
- mboersma
image-builder-openstack-reviewers:
- hidekazuna
image-builder-openstack-maintainers:
- drew-viles
- yankcrime
image-builder-cloudstack-reviewers:
- rohityadavcloud
Expand Down
4 changes: 2 additions & 2 deletions RELEASE.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
# Image Builder Releases

The current release of Image Builder is [v0.1.24][] (February 21, 2024). The corresponding container image is `registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.24`.
The current release of Image Builder is [v0.1.25][] (March 13, 2024). The corresponding container image is `registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.25`.

## Release Process

For more detail about image-builder project releases, see the [Image Builder Book][].


[v0.1.24]: https://github.com/kubernetes-sigs/image-builder/releases/tag/v0.1.24
[v0.1.25]: https://github.com/kubernetes-sigs/image-builder/releases/tag/v0.1.25
[Image Builder Book]: https://image-builder.sigs.k8s.io/capi/releasing.html
10 changes: 5 additions & 5 deletions docs/book/src/capi/container-image.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Run the docker build target of Makefile
The latest image-builder container image release is available here:

```commandline
docker pull registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.24
docker pull registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.25
```

### Examples
Expand All @@ -27,7 +27,7 @@ docker pull registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v
- If the AWS CLI is already installed on your machine, you can simply mount the `~/.aws` folder that stores all the required credentials.

```commandline
docker run -it --rm -v /Users/<user>/.aws:/home/imagebuilder/.aws registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.24 build-ami-ubuntu-2004
docker run -it --rm -v /Users/<user>/.aws:/home/imagebuilder/.aws registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.25 build-ami-ubuntu-2004
```
- Another alternative is to use an `aws-creds.env` file to load the credentials and pass it during docker run.
Expand All @@ -38,7 +38,7 @@ docker pull registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v
```
```commandline
docker run -it --rm --env-file aws-creds.env registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.24 build-ami-ubuntu-2004
docker run -it --rm --env-file aws-creds.env registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.25 build-ami-ubuntu-2004
```
- AZURE
Expand All @@ -53,7 +53,7 @@ docker pull registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v
```
```commandline
docker run -it --rm --env-file az-creds.env registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.24 build-azure-sig-ubuntu-2004
docker run -it --rm --env-file az-creds.env registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.25 build-azure-sig-ubuntu-2004
```
- vSphere OVA
Expand All @@ -62,7 +62,7 @@ docker pull registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v
- Docker's `--net=host` option to ensure http server starts with the host IP and not the Docker container IP. This option is Linux specific and thus implies that it can be run only from a Linux machine.
```commandline
docker run -it --rm --net=host --env PACKER_VAR_FILES=/home/imagebuilder/vsphere.json -v <complete path of vsphere.json>:/home/imagebuilder/vsphere.json registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.24 build-node-ova-vsphere-ubuntu-2004
docker run -it --rm --net=host --env PACKER_VAR_FILES=/home/imagebuilder/vsphere.json -v <complete path of vsphere.json>:/home/imagebuilder/vsphere.json registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.25 build-node-ova-vsphere-ubuntu-2004
```
In addition to this, further customizations can be done as discussed [here](./capi.md#customization).
9 changes: 5 additions & 4 deletions docs/book/src/capi/releasing.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Image Builder Releases

The current release of Image Builder is [v0.1.24][] (February 21, 2024). The corresponding container image is `registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.24`.
The current release of Image Builder is [v0.1.25][] (March 13, 2024). The corresponding container image is `registry.k8s.io/scl-image-builder/cluster-node-image-builder-amd64:v0.1.25`.

## Release Process

Expand Down Expand Up @@ -33,12 +33,13 @@ Pushing the tag in the previous step triggered a job to build the container imag
- Images are built by the [post-image-builder-push-images][] job. This will push the image to a [staging repository][].
- Wait for the above post-image-builder-push-images job to complete and for the tagged image to exist in the staging directory.
- If you don't have a GitHub token, create one via [Personal access tokens][]. Make sure you give the token the `repo` scope.
- Make sure you have a clone of [k8s.io](https://github.com/kubernetes/k8s.io) otherwise the next step will not work.
- Create a GitHub pull request to promote the image:
- `export GITHUB_TOKEN=<your GH token>`
- `make -C images/capi promote-image`
- Note: If your own fork isn't used as the `origin` remote you'll need to set the `USER_FORK` variable, e.g. `make -C images/capi promote-image USER_FORK=AverageMarcus`

This will create a PR in [k8s.io](https://github.com/kubernetes/k8s.io) and assign the image-builder maintainers. Example PR: https://github.com/kubernetes/k8s.io/pull/5262.
This will create a PR in [k8s.io](https://github.com/kubernetes/k8s.io) and assign the image-builder maintainers. Example PR: [https://github.com/kubernetes/k8s.io/pull/5262](https://github.com/kubernetes/k8s.io/pull/5262).

When reviewing this PR, confirm that the addition matches the SHA in the [staging repository][].

Expand Down Expand Up @@ -76,11 +77,11 @@ Wait for this PR to merge before communicating the release to users, so image-bu
In the [#image-builder channel][] on the Kubernetes Slack, post a message announcing the new release. Include a link to the GitHub release and a thanks to the contributors:
```
Image-builder v0.1.24 is now available: https://github.com/kubernetes-sigs/image-builder/releases/tag/v0.1.24
Image-builder v0.1.25 is now available: https://github.com/kubernetes-sigs/image-builder/releases/tag/v0.1.25
Thanks to all contributors!
```
[v0.1.24]: https://github.com/kubernetes-sigs/image-builder/releases/tag/v0.1.24
[v0.1.25]: https://github.com/kubernetes-sigs/image-builder/releases/tag/v0.1.25
[#image-builder channel]: https://kubernetes.slack.com/archives/C01E0Q35A8J
[Personal access tokens]: https://github.com/settings/tokens
[post-image-builder-push-images]: https://testgrid.k8s.io/sig-cluster-lifecycle-image-pushes#post-image-builder-push-images
Expand Down
67 changes: 60 additions & 7 deletions images/capi/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -320,9 +320,9 @@ CENTOS_VERSIONS := centos-7
FLATCAR_VERSIONS := flatcar
PHOTON_VERSIONS := photon-3 photon-4 photon-5
RHEL_VERSIONS := rhel-7 rhel-8
ROCKYLINUX_VERSIONS := rockylinux-8
ROCKYLINUX_VERSIONS := rockylinux-8 rockylinux-9
UBUNTU_VERSIONS := ubuntu-2004 ubuntu-2004-efi ubuntu-2204 ubuntu-2204-efi
WINDOWS_VERSIONS := windows-2019 windows-2022
WINDOWS_VERSIONS := windows-2019 windows-2019-efi windows-2022 windows-2022-efi

# Set Flatcar Container Linux channel and version if not supplied
FLATCAR_CHANNEL ?= stable
Expand Down Expand Up @@ -361,19 +361,19 @@ AZURE_BUILD_SIG_NAMES ?= $(addprefix azure-sig-,$(SIG_TARGETS))
AZURE_BUILD_SIG_GEN2_NAMES ?= $(addsuffix -gen2,$(addprefix azure-sig-,$(SIG_GEN2_TARGETS)))
AZURE_BUILD_SIG_CVM_NAMES ?= $(addsuffix -cvm,$(addprefix azure-sig-,$(SIG_CVM_TARGETS)))

OCI_BUILD_NAMES ?= oci-ubuntu-2004 oci-ubuntu-2204 oci-oracle-linux-8 oci-oracle-linux-9 oci-windows-2019 oci-windows-2022
OCI_BUILD_NAMES ?= oci-ubuntu-2004 oci-ubuntu-2204 oci-oracle-linux-8 oci-oracle-linux-9 oci-windows-2019 oci-windows-2022

DO_BUILD_NAMES ?= do-centos-7 do-ubuntu-2004
DO_BUILD_NAMES ?= do-centos-7 do-ubuntu-2004

OPENSTACK_BUILD_NAMES ?= openstack-ubuntu-2004 openstack-ubuntu-2204 openstack-flatcar
OPENSTACK_BUILD_NAMES ?= openstack-ubuntu-2004 openstack-ubuntu-2204 openstack-flatcar

OSC_BUILD_NAMES ?= osc-ubuntu-2004 osc-ubuntu-2204

QEMU_BUILD_NAMES ?= qemu-ubuntu-2004 qemu-ubuntu-2204 qemu-ubuntu-2304 qemu-ubuntu-2204-efi qemu-centos-7 qemu-centos-9 qemu-ubuntu-2004-efi qemu-rhel-8 qemu-rockylinux-8 qemu-rockylinux-9 qemu-flatcar qemu-ubuntu-2204-crio qemu-centos-9-crio
QEMU_BUILD_NAMES ?= qemu-ubuntu-2004 qemu-ubuntu-2204 qemu-ubuntu-2304 qemu-ubuntu-2204-efi qemu-centos-7 qemu-centos-9 qemu-ubuntu-2004-efi qemu-rhel-8 qemu-rhel-9 qemu-rockylinux-8 qemu-rockylinux-9 qemu-flatcar qemu-ubuntu-2204-crio qemu-centos-9-crio

QEMU_KUBEVIRT_BUILD_NAMES := $(addprefix kubevirt-,$(QEMU_BUILD_NAMES))

RAW_BUILD_NAMES ?= raw-ubuntu-2004 raw-ubuntu-2004-efi raw-flatcar raw-rhel-8
RAW_BUILD_NAMES ?= raw-ubuntu-2004 raw-ubuntu-2004-efi raw-flatcar raw-rhel-8 raw-rhel-9 raw-rhel-9-efi
VBOX_BUILD_NAMES ?= vbox-windows-2019

POWERVS_BUILD_NAMES ?= powervs-centos-8
Expand Down Expand Up @@ -693,6 +693,7 @@ build-node-ova-local-photon-5: ## Builds Photon 5 Node OVA w local hypervisor
build-node-ova-local-rhel-7: ## Builds RHEL 7 Node OVA w local hypervisor
build-node-ova-local-rhel-8: ## Builds RHEL 8 Node OVA w local hypervisor
build-node-ova-local-rockylinux-8: ## Builds RockyLinux 8 Node OVA w local hypervisor
build-node-ova-local-rockylinux-9: ## Builds RockyLinux 9 Node OVA w local hypervisor
build-node-ova-local-ubuntu-2004: ## Builds Ubuntu 20.04 Node OVA w local hypervisor
build-node-ova-local-windows-2019: ## Builds for Windows Server 2019 Node OVA w local hypervisor
build-node-ova-local-all: $(NODE_OVA_LOCAL_BUILD_TARGETS) ## Builds all Node OVAs w local hypervisor
Expand All @@ -705,12 +706,15 @@ build-node-ova-vsphere-photon-5: ## Builds Photon 5 Node OVA and template on vSp
build-node-ova-vsphere-rhel-7: ## Builds RHEL 7 Node OVA and template on vSphere
build-node-ova-vsphere-rhel-8: ## Builds RHEL 8 Node OVA and template on vSphere
build-node-ova-vsphere-rockylinux-8: ## Builds RockyLinux 8 Node OVA and template on vSphere
build-node-ova-vsphere-rockylinux-9: ## Builds RockyLinux 9 Node OVA and template on vSphere
build-node-ova-vsphere-ubuntu-2004: ## Builds Ubuntu 20.04 Node OVA and template on vSphere
build-node-ova-vsphere-ubuntu-2004-efi: ## Builds Ubuntu 20.04 Node OVA and template on vSphere that EFI boots
build-node-ova-vsphere-ubuntu-2204: ## Builds Ubuntu 22.04 Node OVA and template on vSphere
build-node-ova-vsphere-ubuntu-2204-efi: ## Builds Ubuntu 22.04 Node OVA and template on vSphere that EFI boots
build-node-ova-vsphere-windows-2019: ## Builds for Windows Server 2019 and template on vSphere
build-node-ova-vsphere-windows-2019-efi: ## Builds for Windows Server 2019 and template on vSphere that EFI boots
build-node-ova-vsphere-windows-2022: ## Builds for Windows Server 2022 template on vSphere
build-node-ova-vsphere-windows-2022-efi: ## Builds for Windows Server 2022 template on vSphere that EFI boots
build-node-ova-vsphere-all: $(NODE_OVA_VSPHERE_BUILD_TARGETS) ## Builds all Node OVAs and templates on vSphere

build-node-ova-vsphere-clone-centos-7: ## Builds CentOS 7 Node OVA and template on vSphere
Expand All @@ -720,6 +724,7 @@ build-node-ova-vsphere-clone-photon-5: ## Builds Photon 5 Node OVA and template
build-node-ova-vsphere-clone-rhel-7: ## Builds RHEL 7 Node OVA and template on vSphere
build-node-ova-vsphere-clone-rhel-8: ## Builds RHEL 8 Node OVA and template on vSphere
build-node-ova-vsphere-clone-rockylinux-8: ## Builds RockyLinux 8 Node OVA and template on vSphere
build-node-ova-vsphere-clone-rockylinux-9: ## Builds RockyLinux 9 Node OVA and template on vSphere
build-node-ova-vsphere-clone-ubuntu-2004: ## Builds Ubuntu 20.04 Node OVA and template on vSphere
build-node-ova-vsphere-clone-ubuntu-2204: ## Builds Ubuntu 22.04 Node OVA and template on vSphere
build-node-ova-vsphere-clone-ubuntu-2204-efi: ## ## Builds Ubuntu 22.04 Node OVA and template on vSphere that EFI boots
Expand All @@ -732,6 +737,7 @@ build-node-ova-vsphere-base-photon-5: ## Builds base Photon 5 Node OVA and templ
build-node-ova-vsphere-base-rhel-7: ## Builds base RHEL 7 Node OVA and template on vSphere
build-node-ova-vsphere-base-rhel-8: ## Builds base RHEL 8 Node OVA and template on vSphere
build-node-ova-vsphere-base-rockylinux-8: ## Builds base RockyLinux 8 Node OVA and template on vSphere
build-node-ova-vsphere-base-rockylinux-9: ## Builds base RockyLinux 9 Node OVA and template on vSphere
build-node-ova-vsphere-base-ubuntu-2004: ## Builds base Ubuntu 20.04 Node OVA and template on vSphere
build-node-ova-vsphere-base-ubuntu-2204: ## Builds base Ubuntu 22.04 Node OVA and template on vSphere
build-node-ova-vsphere-base-ubuntu-2204-efi: ## Builds Ubuntu 22.04 Node OVA and template on vSphere that EFI boots
Expand All @@ -744,6 +750,7 @@ build-node-ova-local-vmx-centos-7: ## Builds Centos 7 Node OVA from VMX file w l
build-node-ova-local-vmx-rhel-7: ## Builds RHEL 7 Node OVA from VMX file w local hypervisor
build-node-ova-local-vmx-rhel-8: ## Builds RHEL 8 Node OVA from VMX file w local hypervisor
build-node-ova-local-vmx-rockylinux-8: ## Builds RockyLinux 8 Node OVA from VMX file w local hypervisor
build-node-ova-local-vmx-rockylinux-9: ## Builds RockyLinux 9 Node OVA from VMX file w local hypervisor
build-node-ova-local-vmx-ubuntu-2004: ## Builds Ubuntu 20.04 Node OVA from VMX file w local hypervisor

build-node-ova-local-base-photon-3: ## Builds Photon 3 Base Node OVA w local hypervisor
Expand All @@ -753,6 +760,7 @@ build-node-ova-local-base-centos-7: ## Builds Centos 7 Base Node OVA w local hyp
build-node-ova-local-base-rhel-7: ## Builds RHEL 7 Base Node OVA w local hypervisor
build-node-ova-local-base-rhel-8: ## Builds RHEL 8 Base Node OVA w local hypervisor
build-node-ova-local-base-rockylinux-8: ## Builds RockyLinux 8 Base Node OVA w local hypervisor
build-node-ova-local-base-rockylinux-9: ## Builds RockyLinux 9 Base Node OVA w local hypervisor
build-node-ova-local-base-ubuntu-2004: ## Builds Ubuntu 20.04 Base Node OVA w local hypervisor

build-openstack-ubuntu-2004: ## Builds Ubuntu 20.04 OpenStack image
Expand All @@ -771,6 +779,7 @@ build-qemu-centos-7: ## Builds CentOS 7 QEMU image
build-qemu-centos-9: ## Builds CentOS 9 Stream QEMU image
build-qemu-centos-9-crio: ## Builds CentOOS 9 Stream image using CRI-O as CRI
build-qemu-rhel-8: ## Builds RHEL 8 QEMU image
build-qemu-rhel-9: ## Builds RHEL 9 QEMU image
build-qemu-rockylinux-8: ## Builds Rocky 8 QEMU image
build-qemu-rockylinux-9: ## Builds Rocky 9 QEMU image
build-qemu-all: $(QEMU_BUILD_TARGETS) ## Builds all Qemu images
Expand All @@ -779,6 +788,8 @@ build-raw-flatcar: ## Builds Flatcar RAW image
build-raw-ubuntu-2004: ## Builds Ubuntu 20.04 RAW image
build-raw-ubuntu-2004-efi: ## Builds Ubuntu 20.04 RAW image that EFI boots
build-raw-rhel-8: ## Builds RHEL 8 RAW image
build-raw-rhel-9: ## Builds RHEL 9 RAW image
build-raw-rhel-9-efi: ## Builds RHEL 9 RAW image that EFI boots
build-raw-all: $(RAW_BUILD_TARGETS) ## Builds all RAW images

build-oci-ubuntu-2004: ## Builds the OCI ubuntu-2004 image
Expand Down Expand Up @@ -875,6 +886,7 @@ validate-node-ova-local-photon-5: ## Validates Photon 5 Node OVA Packer config w
validate-node-ova-local-rhel-7: ## Validates RHEL 7 Node OVA Packer config w local hypervisor
validate-node-ova-local-rhel-8: ## Validates RHEL 8 Node OVA Packer config w local hypervisor
validate-node-ova-local-rockylinux-8: ## Validates RockyLinux 8 Node OVA Packer config w local hypervisor
validate-node-ova-local-rockylinux-9: ## Validates RockyLinux 9 Node OVA Packer config w local hypervisor
validate-node-ova-local-ubuntu-2004: ## Validates Ubuntu 20.04 Node OVA Packer config w local hypervisor
validate-node-ova-local-ubuntu-2204: ## Validates Ubuntu 22.04 Node OVA Packer config w local hypervisor
validate-node-ova-local-windows-2019: ## Validates Windows Server 2019 Node OVA Packer config w local hypervisor
Expand All @@ -888,6 +900,7 @@ validate-node-ova-local-vmx-centos-7: ## Validates Centos 7 Node OVA from VMX fi
validate-node-ova-local-vmx-rhel-7: ## Validates RHEL 7 Node OVA from VMX file w local hypervisor
validate-node-ova-local-vmx-rhel-8: ## Validates RHEL 8 Node OVA from VMX file w local hypervisor
validate-node-ova-local-vmx-rockylinux-8: ## Validates RockyLinux 8 Node OVA from VMX file w local hypervisor
validate-node-ova-local-vmx-rockylinux-9: ## Validates RockyLinux 9 Node OVA from VMX file w local hypervisor
validate-node-ova-local-vmx-ubuntu-2004: ## Validates Ubuntu 20.04 Node OVA from VMX file w local hypervisor
validate-node-ova-local-vmx-ubuntu-2204: ## Validates Ubuntu 22.04 Node OVA from VMX file w local hypervisor

Expand All @@ -898,6 +911,7 @@ validate-node-ova-local-base-centos-7: ## Validates Centos 7 Base Node OVA w loc
validate-node-ova-local-base-rhel-7: ## Validates RHEL 7 Base Node OVA w local hypervisor
validate-node-ova-local-base-rhel-8: ## Validates RHEL 8 Base Node OVA w local hypervisor
validate-node-ova-local-base-rockylinux-8: ## Validates RockyLinux 8 Base Node OVA w local hypervisor
validate-node-ova-local-base-rockylinux-9: ## Validates RockyLinux 9 Base Node OVA w local hypervisor
validate-node-ova-local-base-ubuntu-2004: ## Validates Ubuntu 20.04 Base Node OVA w local hypervisor
validate-node-ova-local-base-ubuntu-2204: ## Validates Ubuntu 22.04 Base Node OVA w local hypervisor

Expand All @@ -912,6 +926,7 @@ validate-qemu-centos-7: ## Validates CentOS 7 QEMU image packer config
validate-qemu-centos-9: ## Validates CentOS 7 QEMU image packer config
validate-qemu-centos-9-crio: ## Validates CentOS 7 QEMU CRIO image packer config
validate-qemu-rhel-8: ## Validates RHEL 8 QEMU image
validate-qemu-rhel-9: ## Validates RHEL 9 QEMU image
validate-qemu-rockylinux-8: ## Validates Rocky Linux 8 QEMU image packer config
validate-qemu-rockylinux-9: ## Validates Rocky Linux 9 QEMU image packer config
validate-qemu-all: $(QEMU_VALIDATE_TARGETS) ## Validates all Qemu Packer config
Expand Down Expand Up @@ -1085,3 +1100,41 @@ json-sort: ## Sort all JSON files alphabetically
ignition_files = bootstrap-pass-auth bootstrap-cloud
gen-ignition: deps-ignition ## Generates Ignition files from CLC
for f in $(ignition_files); do (ct < packer/files/flatcar/clc/$$f.yaml | jq '.' > packer/files/flatcar/ignition/$$f.json) || exit 1; done

## --------------------------------------
## ISO checksum updates
## --------------------------------------
##@ ISO checksum updates
.PHONY: update-all-iso-checksums
update-all-iso-checksums: update-ubuntu-iso-checksums \
update-rockylinux-iso-checksums \
update-centos-7-iso-checksums \
update-centos-9-iso-checksums \
update-photon-iso-checksums \

update-all-iso-checksums: ## Updates checksums for all ISOs

.PHONY: update-ubuntu-iso-checksums
update-ubuntu-iso-checksums: ## Updates checksums for Ubuntu ISOs
hack/update-iso-checksums.sh ubuntu false SHA256SUMS "*iso_file_name" 1
$(MAKE) json-sort

.PHONY: update-rockylinux-iso-checksums
update-rockylinux-iso-checksums: ## Updates checksums for Rocky Linux ISOs
hack/update-iso-checksums.sh rockylinux false CHECKSUM "SHA256 (iso_file_name)" 4
$(MAKE) json-sort

.PHONY: update-centos-7-iso-checksums
update-centos-7-iso-checksums: ## Updates checksums for Centos 7 ISOs
hack/update-iso-checksums.sh centos-7 false sha256sum.txt "iso_file_name" 1
$(MAKE) json-sort

.PHONY: update-centos-9-iso-checksums
update-centos-9-iso-checksums: ## Updates checksums for Centos 9 ISOs
hack/update-iso-checksums.sh centos-9 false SHA256SUM "SHA256 (iso_file_name)" 4
$(MAKE) json-sort

.PHONY: update-photon-iso-checksums
update-photon-iso-checksums: ## Updates checksums for Photon ISOs
hack/update-iso-checksums.sh photon true
$(MAKE) json-sort
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
disable-ec2-metadata: false
datasource_list: [ Outscale ]
datasource_list: [ Ec2 ]
Loading

0 comments on commit 6959f3f

Please sign in to comment.