gecko-dev/testing/docker
Dustin J. Mitchell 01c1583e72 Bug 1212877: improve build.sh to run from any directory; r=wcosta DONTBUILD
--HG--
extra : commitid : L8ez8ZvzwzH
extra : rebase_source : 6144fe60c67193439a66b7da881a71440b481384
extra : amend_source : 3dde9b72f910faf531d98bb853befdbe49f3602e
2015-10-08 10:43:20 -04:00
..
b2g-build
base-build
base-test Bug 1176031: fix up image versions, registries; r=ahal 2015-10-07 16:59:23 -04:00
builder Bug 1203965 - Update images to use taskcluster-vcs 2.3.12 r=wcosta 2015-09-11 08:23:01 -05:00
centos6-build Bug 1208029: bump image version numbers to capture subversion install; r=ehsan 2015-09-30 09:11:59 -04:00
centos6-build-upd Bug 1203158: add a centos6-build-upd layer to include frequent yum updates; r=ted.mielczarek 2015-09-10 17:42:03 -04:00
decision
desktop-build Bug 1199720 - Setup builds for b2gdroid, taskcluster and mozharness bits, r=dustin 2015-09-30 13:57:52 -07:00
phone-builder Bug 1207986 part2: Install openjdk in the phone builder docker image. r=garndt 2015-09-29 07:28:04 -03:00
tester Bug 1176031: fix up image versions, registries; r=ahal 2015-10-07 16:59:23 -04:00
tester-device Bug 1203965 - Update images to use taskcluster-vcs 2.3.12 r=wcosta 2015-09-11 08:23:01 -05:00
build.sh Bug 1212877: improve build.sh to run from any directory; r=wcosta DONTBUILD 2015-10-08 10:43:20 -04:00
README.md
REGISTRY

Docker Images for use in TaskCluster

This folder contains various docker images used in taskcluster as well as other misc docker images which may be useful for hacking on gecko.

Organization

Each folder describes a single docker image. These images depend on one another, as described in the FROM line at the top of the Dockerfile in each folder. Each image has a version, given by its VERSION file. This should be bumped when any changes are made that will be deployed into taskcluster. Then, older tasks which were designed to run on an older version of the image can still be executed in taskcluster, while new tasks can use the new version.

Each image also has a REGISTRY, defaulting to the REGISTRY in this directory, and specifying the image registry to which the completed image should be uploaded.

Building images

Generally images can be pulled from the registry rather then build locally, but for developing new images its often helpful to hack on them locally.

To build an image, invoke build.sh with the name of the folder (without a trailing slash):

./build.sh base

This is a tiny wrapper around building the docker images via docker build -t $REGISTRY/$FOLDER:$FOLDER_VERSION

On completion, build.sh gives a command to upload the image to the registry, but this is not necessary until the image is ready for production usage. Docker will successfully find the local, tagged image while you continue to hack on the image definitions.

Adding a new image

The docker image primitives are very basic building block for constructing an "image" but generally don't help much with tagging it for deployment so we have a wrapper (./build.sh) which adds some sugar to help with tagging/versioning... Each folder should look something like this:

  - your_amazing_image/
    - your_amazing_image/Dockerfile: Standard docker file syntax
    - your_amazing_image/VERSION: The version of the docker file
      (required* used during tagging)
    - your_amazing_image/REGISTRY: Override default registry
      (useful for secret registries)

Conventions

In some image folders you will see .env files these can be used in conjunction with the --env-file flag in docker to provide a environment with the given environment variables. These are primarily for convenience when manually hacking on the images.

You will also see a system-setup.sh script used to build the image. Do not replicate this technique - prefer to include the commands and options directly in the Dockerfile.