-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ensure a built images contains the correct binary #9758
Comments
@chrischdi: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Thx! /triage accepted This would be good as a safeguard considering that we only found out about the issue by coincidence. |
/help |
@sbueringer: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I am not sure but is it possible to leverage the SBOM generation work being done in #6153 to identify any ingredients(binary in this case) being part of OCI images. I am not sure if the SBOM specs are supposed to capture the architecture of the binaries as well. |
If the sbom generation gets done on top of an image: that data may be a good way to solve this. If the sbom gets generated from the repo it won't be able to solve the described issue. |
I am interested in this. /assign |
Fixes kubernetes-sigs#9758 Ensures build images contains the correct binary and are for the correct architecture. Signed-off-by: Akshay Gaikwad <[email protected]>
What would you like to be added (User Story)?
As a maintainer I want to be sure that the images we publish contain the correct binary and are for the correct architecture
Detailed Description
We had to revert #9753 because images which got built using google cloud build (which uses
make release-staging -j 8 -O
) did not contain the wanted binaries.To be more concrete: images for CAPD did contain the test-extension binary instead of the one for CAPD.
Anything else you would like to add?
Disclamer: we are not sure where exactly the issue happened, the current idea is it is during building the images, not when pushing the images.
The CI for building an image could try to analyse the image for having the correct binary. The used method needs to work independent of the architecture of the image.
Example which uses
docker
,go
,mkdir
andtar
:xref: #9752
Label(s) to be applied
/kind ci
The text was updated successfully, but these errors were encountered: