[bitnami/kaniko] Release 1.19.0-debian-11-r0 (#53303)

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
Bitnami Bot 2023-11-30 02:13:37 +01:00 committed by GitHub
parent a4b91b3129
commit db6f7ff1ef
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 16 additions and 16 deletions

View File

@ -9,21 +9,21 @@ ENV HOME="/root" \
OS_ARCH="${TARGETARCH:-amd64}"
COPY prebuildfs /
SHELL ["/bin/bash", "-o", "pipefail", "-c"]
SHELL ["/bin/bash", "-o", "errexit", "-o", "nounset", "-o", "pipefail", "-c"]
# Install required system packages and dependencies
RUN install_packages ca-certificates curl
RUN mkdir -p /tmp/bitnami/pkg/cache/ && cd /tmp/bitnami/pkg/cache/ && \
RUN mkdir -p /tmp/bitnami/pkg/cache/ ; cd /tmp/bitnami/pkg/cache/ ; \
COMPONENTS=( \
"kaniko-1.18.0-1-linux-${OS_ARCH}-debian-11" \
) && \
"kaniko-1.19.0-0-linux-${OS_ARCH}-debian-11" \
) ; \
for COMPONENT in "${COMPONENTS[@]}"; do \
if [ ! -f "${COMPONENT}.tar.gz" ]; then \
curl -SsLf "https://downloads.bitnami.com/files/stacksmith/${COMPONENT}.tar.gz" -O ; \
curl -SsLf "https://downloads.bitnami.com/files/stacksmith/${COMPONENT}.tar.gz.sha256" -O ; \
fi && \
sha256sum -c "${COMPONENT}.tar.gz.sha256" && \
tar -zxf "${COMPONENT}.tar.gz" -C /opt/bitnami --strip-components=2 --no-same-owner --wildcards '*/files' && \
fi ; \
sha256sum -c "${COMPONENT}.tar.gz.sha256" ; \
tar -zxf "${COMPONENT}.tar.gz" -C /opt/bitnami --strip-components=2 --no-same-owner --wildcards '*/files' ; \
rm -rf "${COMPONENT}".tar.gz{,.sha256} ; \
done
@ -40,19 +40,19 @@ ENV HOME="/root" \
LABEL com.vmware.cp.artifact.flavor="sha256:1e1b4657a77f0d47e9220f0c37b9bf7802581b93214fff7d1bd2364c8bf22e8e" \
org.opencontainers.image.base.name="scratch" \
org.opencontainers.image.created="2023-11-08T23:27:10Z" \
org.opencontainers.image.created="2023-11-30T00:53:10Z" \
org.opencontainers.image.description="Application packaged by VMware, Inc" \
org.opencontainers.image.licenses="Apache-2.0" \
org.opencontainers.image.ref.name="1.18.0-debian-11-r1" \
org.opencontainers.image.ref.name="1.19.0-debian-11-r0" \
org.opencontainers.image.title="kaniko" \
org.opencontainers.image.vendor="VMware, Inc." \
org.opencontainers.image.version="1.18.0"
org.opencontainers.image.version="1.19.0"
COPY prebuildfs /
COPY rootfs /
COPY --from=builder /out /
ENV APP_VERSION="1.18.0" \
ENV APP_VERSION="1.19.0" \
BITNAMI_APP_NAME="kaniko" \
DOCKER_CONFIG="/kaniko/.docker" \
DOCKER_CREDENTIAL_GCR_CONFIG="/kaniko/.config/gcloud/docker_credential_gcr_config.json" \

View File

@ -3,6 +3,6 @@
"arch": "amd64",
"distro": "debian-11",
"type": "NAMI",
"version": "1.18.0-1"
"version": "1.19.0-0"
}
}

View File

@ -10,7 +10,7 @@ fi
script=$1
exit_code="${2:-96}"
fail_if_not_present="${3:-n}"
fail_if_not_present="${3:-y}"
if test -f "$script"; then
sh $script

View File

@ -1,5 +1,5 @@
rolling-tags:
- "1"
- 1-debian-11
- 1.18.0
- 1.19.0
- latest

View File

@ -1,4 +1,4 @@
# Kaniko packaged by Bitnami
# Bitnami package for Kaniko
## What is Kaniko?
@ -25,7 +25,7 @@ docker-compose up -d
* Bitnami closely tracks upstream source changes and promptly publishes new versions of this image using our automated systems.
* With Bitnami images the latest bug fixes and features are available as soon as possible.
* Bitnami containers, virtual machines and cloud images use the same components and configuration approach - making it easy to switch between formats based on your project needs.
* All our images are based on [minideb](https://github.com/bitnami/minideb) a minimalist Debian based container image which gives you a small base container image and the familiarity of a leading Linux distribution.
* All our images are based on [**minideb**](https://github.com/bitnami/minideb) -a minimalist Debian based container image that gives you a small base container image and the familiarity of a leading Linux distribution- or **scratch** -an explicitly empty image-.
* All Bitnami images available in Docker Hub are signed with [Docker Content Trust (DCT)](https://docs.docker.com/engine/security/trust/content_trust/). You can use `DOCKER_CONTENT_TRUST=1` to verify the integrity of the images.
* Bitnami container images are released on a regular basis with the latest distribution packages available.