Compare commits

..

No commits in common. "96daeb5dfa2e773e93206e026cace99a45f6b3bd" and "ee5fd47bbe4511487dbf3a2ad792de66cdc3b14c" have entirely different histories.

9 changed files with 67 additions and 150 deletions

View File

@ -10,10 +10,4 @@ rebase
Rebasing
SBOM(?s)
semver
Syft
[Tt]ekton
[Kk]ubernetes
uid
Minikube
kubectl
Quarkus
Syft

View File

@ -24,7 +24,7 @@ jobs:
- name: Install Dependencies
run: sudo apt-get install make curl jq
- name: Install pack
uses: buildpacks/github-actions/setup-pack@v5.9.1
uses: buildpacks/github-actions/setup-pack@v5.8.3
with:
pack-version: '0.36.0'
- name: Test

View File

@ -11,12 +11,7 @@ Environment variables are a common way to configure various buildpacks at build-
<!--more-->
Below are a few ways you can do so. All of them use the [samples] repository for
simplicity. The following documentation assumes that all participating buildpack
either use `clear-env = false` as the default in their
[buildpack.toml](https://buildpacks.io/docs/reference/config/buildpack-config/),
or if they use `clear-env = true`, that they merge in filtered user supplied
environment variables.
Below are a few ways you can do so. All of them will use our [samples] repo for simplicity.
### Using CLI arguments (`--env`)

View File

@ -50,7 +50,7 @@ find . -type f -name $(my_data_files) -delete
cat <<EOF > ${1}/launch.toml
[[processes]]
type = 'bash'
command = ['bin/bash']
command = 'bin/bash'
EOF
"""
```

View File

@ -3,30 +3,20 @@ title="Clear the buildpack environment"
weight=99
+++
"Clearing" the buildpack environment with `clear-env` is the process of preventing the lifecycle from automatically merging user-provided environment variables into the buildpack's executing process's environment variables.
"Clearing" the buildpack environment with `clear-env` is the process of preventing end-users from customizing a buildpack's behavior through environment variables.
<!--more-->
User-provided environment variables are always written to disk at `$CNB_PLATFORM_DIR/env/` as "platform" environment variables and are available to a buildpack regardless of the `clear-env` setting. For example, if someone runs `pack build --env HELLO=world`, there is always a `$CNB_PLATFORM_DIR/env/hello` file with the contents of `world`.
Buildpack authors may elect to clear user-provided environment variables when `bin/detect` and `bin/build` are executed. This is achieved by setting `clear-env` to `true` in [buildpack.toml](https://github.com/buildpacks/spec/blob/main/buildpack.md#buildpacktoml-toml); by default `clear-env` is set to `false`.
By default with `clear-env = false`, the lifecycle automatically copies these user-provided environment variables into the current process environment when executing `/bin/detect` and `/bin/build`. This provides a comprehensive stream of all user environment variables for a buildpack that wants easy access to user customization.
* When `clear-env` is set to `true` for a given buildpack, the `lifecycle` will not set user-provided environment variables when running `/bin/detect` or `/bin/build`.
* If a buildpack does allow customization by the end-user through the environment (`clear-env` is `false`), there is a special convention for naming the environment variables recognized by the buildpack, shown in the following table:
Setting `clear-env = true` in the [buildpack.toml](https://github.com/buildpacks/spec/blob/main/buildpack.md#buildpacktoml-toml) prevents this automatic merging, giving a buildpack complete control over which user-provided environment variables to use. This provides maximum isolation and predictability for a buildpack that wants to be more selective about environment variable usage.
For example, if a user has specified the `PATH` environment variable, then a buildpack written in bash might unexpectedly find that tools it relies on such as `cp` aren't the ones it expects. However, setting `clear-env = true` won't change runtime behavior.
* When you set `clear-env` to `true` for a given buildpack, the `lifecycle` writes user-provided environment variables to disk at `$CNB_PLATFORM_DIR/env/` but it won't copy those variables into the buildpack process when running `/bin/detect` or `/bin/build`.
* If a buildpack uses `clear-env = false` which allows customization by the end-user through the environment, there is a special convention for naming the environment variables recognized by the buildpack, shown in the following table:
| Environment Variable | Description | Detect | Build | Launch |
| Env Variable | Description | Detect | Build | Launch |
|------------------------|---------------------------------------------------|--------|-------|--------|
| `BP_*` | User-provided variable for buildpack | [x] | [x] | |
| `BPL_*` | User-provided variable for exec.d | | | [x] |
Buildpack that use `clear-env = true` should filter and export environment variables from `$CNB_PLATFORM_DIR/env/` while warning on the filtered variables. Emitting a warning helps users understand if runtime behavior differs from build time behavior. Sourcing the user environment variables is critical to allowing sub-processes access to credentials.
### Further Reading
For example, if a private gem server hosted on `gems.example.com` needs access in a sub-process such as `bundle install`, the user must provide `BUNDLE_GEMS__EXAMPLE__COM=<username>:<password>`. If `clear-env = true` and the buildpack doesn't use platform environment variables, then trying to access that resource would fail.
### Further reading
For more about how end-users specify environment variables, see the page for how to [customize buildpack behavior with build-time environment variables](https://buildpacks.io/docs/for-app-developers/how-to/build-inputs/configure-build-time-environment/).
For more about how environment variables are specified by end-users, see the page for how to [customize buildpack behavior with build-time environment variables](https://buildpacks.io/docs/for-app-developers/how-to/build-inputs/configure-build-time-environment/).

View File

@ -84,7 +84,7 @@ Reusing layer 'examples/node-js:node-js'
Now, let's implement the caching logic. We need to record the version of the NodeJS runtime that is used in a build. On subsequent builds, the caching logic will detect if the NodeJS version is the same as the version in the cached layer. We restore the previous layer from the cache if the current requested NodeJS version matches the previous NodeJS runtime version.
<!-- test:file=node-js-buildpack/bin/build -->
```bash
```
#!/usr/bin/env bash
set -eo pipefail

View File

@ -9,14 +9,16 @@ weight=6
[Tekton][tekton] is an open-source CI/CD system running on k8s.
The CNB project has created a reference "task" for performing buildpacks builds with or without extensions (aka Dockerfile to be applied) top
of the [lifecycle][lifecycle] tool (i.e. they do not use `pack`).
The CNB project has created two reference "tasks" for performing buildpacks builds,
both of which use the [lifecycle][lifecycle] directly (i.e. they do not use `pack`).
The [Buildpacks Phases Task][buildpacks-phases] calls the individual [lifecycle][lifecycle] binaries (prepare, analyze, detect, restore, build or extender, export), to run each phase in a separate container.
<!--more-->
The uid and gid as defined part of the builder image will be used to build the image.
They are:
The different parameters to customize the task are defined part of the task's documentation under the section `parameters`.
1. [buildpacks][buildpacks-task] `task` &rarr; This task, which we recommend using, calls the `creator` binary of the
[lifecycle][lifecycle] to construct, and optionally publish, a runnable image.
2. [buildpacks-phases][buildpacks-phases] `task` &rarr; This task calls the individual [lifecycle][lifecycle] binaries, to run each phase in a separate container.
## Set Up
@ -30,22 +32,28 @@ Before we get started, make sure you've got the following installed:
### 1. Install Tekton and Tekton Dashboard
To start, set up a `Tekton` version `>= 1.0`, using the Tekton [documentation][tekton-setup].
To start, set up `Tekton`, using the Tekton [documentation][tekton-setup].
We also recommend using the `Tekton dashboard`. To install it, follow the steps in the [dashboard docs][tekton-dashboard-setup], and
start the dashboard server.
> NOTE: If you run Tekton on a Kind or Minikube Kubernetes cluster, be sure to set the `coschedule` flag to `disabled` within the `feature-flags` ConfigMap.
### 2. Install the Buildpacks Task
Install the latest version of the buildpacks task (currently `0.3`), by running:
Install the latest version of the buildpacks task (currently `0.6`), by running:
```shell
kubectl apply -f https://raw.githubusercontent.com/tektoncd/catalog/refs/heads/main/task/buildpacks-phases/0.3/buildpacks-phases.yaml
kubectl apply -f https://raw.githubusercontent.com/tektoncd/catalog/master/task/buildpacks/0.6/buildpacks.yaml
```
### 3. Define and Apply Tekton Pipeline Resources
### 3. Install git-clone Task
For our `pipeline`, we will use the `git-clone` task to clone a repository. Install the latest version (currently `0.4`), by running:
```shell
kubectl apply -f https://raw.githubusercontent.com/tektoncd/catalog/master/task/git-clone/0.4/git-clone.yaml
```
### 4. Define and Apply Tekton Pipeline Resources
In order to set up our pipeline, we will need to define a few things:
@ -55,9 +63,9 @@ In order to set up our pipeline, we will need to define a few things:
- PersistentVolumeClaim &rarr; A `PersistentVolumeClaim` (a general Kubernetes concept, generally shortened to PVC) is
a request for storage by a user.
#### 4.1 Persistent Volume
#### 4.1 PVCs
Create a file `resources.yml` that defines a `PersistentVolumeClaim` able to store the git cloned project and buildpacks files:
Create a file `resources.yml` that defines a `PersistentVolumeClaim`:
```yaml
apiVersion: v1
@ -75,12 +83,12 @@ spec:
#### 4.2 Authorization
> NOTE: You don't need to use authorization if you are pushing to a local registry. However, if you are pushing to a
> remote registry (e.g. `DockerHub`, `GCR`, `quay.io), you need to add authorization
> remote registry (e.g. `DockerHub`, `GCR`), you need to add authorization
Create a `Secret` containing username and password that the build should use to authenticate to the container registry.
```shell
kubectl create secret docker-registry registry-user-pass \
kubectl create secret docker-registry docker-user-pass \
--docker-username=<USERNAME> \
--docker-password=<PASSWORD> \
--docker-server=<LINK TO REGISTRY, e.g. https://index.docker.io/v1/ > \
@ -95,70 +103,57 @@ kind: ServiceAccount
metadata:
name: buildpacks-service-account
secrets:
- name: registry-user-pass
- name: docker-user-pass
```
> NOTE: This service account will be used by Tekton in order to mount the credentials as docker config file part of the pod running buildpacks
#### 4.3 Pipeline
Create a file `pipeline.yml` that defines the `Pipeline`, and relevant resources:
```yaml
apiVersion: tekton.dev/v1
apiVersion: tekton.dev/v1beta1
kind: Pipeline
metadata:
name: buildpacks-test-pipeline
spec:
params:
- name: git-url
type: string
description: URL of the project to git clone
- name: source-subpath
type: string
description: The subpath within the git project
- name: image
type: string
description: image URL to push
- name: builder
type: string
description: builder image URL
- name: env-vars
type: array
description: env vars to pass to the lifecycle binaries
workspaces:
- name: source-workspace # Directory where application source is located. (REQUIRED)
- name: cache-workspace # Directory where cache is stored (OPTIONAL)
tasks:
- name: fetch-repository # This task fetches a repository from github, using the `git-clone` task you installed
taskRef:
resolver: http
params:
- name: url
value: https://raw.githubusercontent.com/tektoncd/catalog/refs/heads/main/task/git-clone/0.9/git-clone.yaml
name: git-clone
workspaces:
- name: output
workspace: source-workspace
params:
- name: url
value: "$(params.git-url)"
value: https://github.com/buildpacks/samples
- name: subdirectory
value: ""
- name: deleteExisting
value: "true"
- name: buildpacks # This task uses the `buildpacks phases` task to build the application
- name: buildpacks # This task uses the `buildpacks` task to build the application
taskRef:
name: buildpacks-phases
name: buildpacks
runAfter:
- fetch-repository
workspaces:
- name: source
workspace: source-workspace
- name: cache
workspace: cache-workspace
params:
- name: APP_IMAGE
value: "$(params.image)"
- name: SOURCE_SUBPATH
value: "$(params.source-subpath)"
- name: CNB_BUILDER_IMAGE
value: "$(params.builder)"
- name: CNB_ENV_VARS
value: "$(params.env-vars[*])"
value: "apps/java-maven" # This is the path within the samples repo you want to build (OPTIONAL, default: "")
- name: BUILDER_IMAGE
value: paketobuildpacks/builder:base # This is the builder we want the task to use (REQUIRED)
- name: display-results
runAfter:
- buildpacks
@ -190,13 +185,12 @@ kubectl apply -f resources.yml -f sa.yml -f pipeline.yml
Create a file `run.yml`, which defines the `PipelineRun`:
```yaml
apiVersion: tekton.dev/v1
apiVersion: tekton.dev/v1beta1
kind: PipelineRun
metadata:
name: buildpacks-test-pipeline-run
spec:
taskRunTemplate:
serviceAccountName: buildpacks-service-account # Only needed if you set up authorization
serviceAccountName: buildpacks-service-account # Only needed if you set up authorization
pipelineRef:
name: buildpacks-test-pipeline
workspaces:
@ -204,16 +198,11 @@ spec:
subPath: source
persistentVolumeClaim:
claimName: buildpacks-source-pvc
- name: cache-workspace
subPath: cache
persistentVolumeClaim:
claimName: buildpacks-source-pvc
params:
- # The url of the git project to clone (REQURED).
name: git-url
value: https://github.com/buildpacks/samples
- # This is the path within the git project you want to build (OPTIONAL, default: "")
name: source-subpath
value: "apps/java-maven"
- # This is the builder image we want the task to use (REQUIRED).
name: builder
value: cnbs/sample-builder:noble
- name: image
value: <REGISTRY/IMAGE NAME, eg gcr.io/test/image > # This defines the name of output image
```
@ -236,73 +225,27 @@ kubectl describe pipelinerun buildpacks-test-pipeline-run
or by using the Tekton Dashboard.
Once the application is successfully built, you can pull and run it by running:
Once the application is successfully built, you can pull it and run it by running:
```shell
docker | podman pull <REGISTRY/IMAGE NAME>
docker | podman run -it <REGISTRY/IMAGE NAME>
docker pull some-output-image
```
### 7. Using extension
If your builder image supports the [extension][extension] mechanism able to customize the [build][extension-build] or the [run (aka execution)][extension-run], then you can replay this scenario by simply changing within the `PipelineRun` resource file the builder parameter
```yaml
apiVersion: tekton.dev/v1
kind: PipelineRun
metadata:
name: buildpacks-test-pipeline-run
spec:
taskRunTemplate:
serviceAccountName: buildpacks-service-account
pipelineRef:
name: buildpacks-test-pipeline
workspaces:
- name: source-workspace
subPath: source
persistentVolumeClaim:
claimName: buildpacks-source-pvc
params:
- name: image
value: <REGISTRY/IMAGE NAME, eg gcr.io/test/image>
- name: git-url
value: https://github.com/quarkusio/quarkus-quickstarts
- name: source-subpath
value: "getting-started"
- name: builder
value: paketobuildpacks/builder-ubi8-base:0.1.30
- name: env-vars
value:
- BP_JVM_VERSION=21
```
When the build process starts, then you should see, part of the extender step, if you build a Java runtime (Quarkus, Spring boot, etc) such log messages if the extension installs by example a different JDK
```txt
2025-06-27T11:32:25.067007701Z time="2025-06-27T11:32:25Z" level=info msg="Performing slow lookup of group ids for root"
2025-06-27T11:32:25.067243910Z time="2025-06-27T11:32:25Z" level=info msg="Running: [/bin/sh -c echo ${build_id}]"
2025-06-27T11:32:25.095150183Z 9e447871-e415-4018-a860-d5a66d925a57
2025-06-27T11:32:25.096877516Z time="2025-06-27T11:32:25Z" level=info msg="Taking snapshot of full filesystem..."
2025-06-27T11:32:25.280396774Z time="2025-06-27T11:32:25Z" level=info msg="Pushing layer oci:/kaniko/cache/layers/cached:a035cdb3949daa8f4e7b2c523ea0d73741c7c2d5b09981c261ebae99fd2f3233 to cache now"
2025-06-27T11:32:25.280572023Z time="2025-06-27T11:32:25Z" level=info msg="RUN microdnf --setopt=install_weak_deps=0 --setopt=tsflags=nodocs install -y openssl-devel java-21-openjdk-devel nss_wrapper which && microdnf clean all"
2025-06-27T11:32:25.280577315Z time="2025-06-27T11:32:25Z" level=info msg="Cmd: /bin/sh"
2025-06-27T11:32:25.280578398Z time="2025-06-27T11:32:25Z" level=info msg="Args: [-c microdnf --setopt=install_weak_deps=0 --setopt=tsflags=nodocs install -y openssl-devel java-21-openjdk-devel nss_wrapper which && microdnf clean all]"
...
```
### 8. Cleanup (Optional)
### 7. Cleanup (Optional)
To clean up, run:
```shell
kubectl delete -n default pipelinerun buildpacks-test-pipeline-run
kubectl delete -n default pipeline buildpacks-test-pipeline
kubectl delete -n default buildpacks-phases
kubectl delete -n default pvc buildpacks-source-pvc
kubectl delete taskrun --all
kubectl delete pvc --all
kubectl delete pv --all
```
## References
The Buildpacks task can be accessed at:
The Buildpacks tasks can be accessed at:
- [Buildpacks Task Source][buildpacks-task]
- [Buildpacks Phases Task Source][buildpacks-phases]
Some general resources for Tekton are:
@ -319,8 +262,6 @@ Some general resources for Tekton are:
[tekton-setup]: https://tekton.dev/docs/getting-started/
[tekton-dashboard-setup]: https://tekton.dev/docs/dashboard/
[tekton-concepts]: https://tekton.dev/docs/concepts/
[git-clone-task]: https://github.com/tektoncd/catalog/tree/master/task/git-clone
[kubectl-install]: https://kubernetes.io/docs/tasks/tools/install-kubectl/
[tekton-auth]: https://tekton.dev/docs/pipelines/auth/
[extension]: https://buildpacks.io/docs/for-buildpack-authors/tutorials/basic-extension/02_why-dockerfiles/
[extension-build]: https://buildpacks.io/docs/for-buildpack-authors/tutorials/basic-extension/04_build-dockerfile/
[extension-run]: https://buildpacks.io/docs/for-buildpack-authors/tutorials/basic-extension/06_run-dockerfile-extend/

View File

@ -29,10 +29,7 @@ The schema is as follows:
Human readable name.
- **`clear-env`** _(boolean, optional, default: `false`)_\
When `true`, prevents the lifecycle from automatically merging user-provided
environment variables into the buildpack process environment during
`bin/detect` and `bin/build`. User-provided environment variables remain
available at `$CNB_PLATFORM_DIR/env/` regardless of this setting.
Clears user-defined environment variables when `true` on executions of `bin/detect` and `bin/build`.
- **`homepage`** _(string, optional)_\
Buildpack homepage.

View File

@ -75,7 +75,7 @@
1. Add the SSH key for the podman VM to your keychain:
```shell=zsh
ssh-add -k $(podman system connection list --format="{{.URI}} {{.Identity}}" | grep root | cut -d' ' -f2)
ssh-add -k "$HOME/.ssh/podman-machine-default"
```
2. Change default connection to use `root`:
```shell=zsh