# We're using a multistage Docker build here in order to allow us to release a self-verifying # Docker image when built on the official Docker infrastructure. # They require us to verify the source integrity in some way while making sure that this is a # reproducible build. # See https://github.com/docker-library/official-images#image-build # In order to achieve this, we externally host the rootfs archives and their checksums and then # just download and verify it in the first stage of this Dockerfile. # The second stage is for actually configuring the system a little bit. # Some templating is done in order to allow us to easily build different configurations and to # allow us to automate the releaes process. FROM alpine:3.12 AS verify RUN apk add --no-cache curl bash SHELL ["/bin/bash", "-c"] RUN ROOTFS="$(curl -sOJL --continue-at - -w "%{filename_effective}" https://gitlab.archlinux.org/archlinux/archlinux-docker/-/package_files//download)" && \ sha256sum -c <<< "70799aa132f66492e5c3645a6aff9ccb612f40b92c83f253d11fcb9f4bceca98 base-devel-20201113.0.8887.tar.xz" && \ mkdir /rootfs && \ tar -C /rootfs --extract --file "${ROOTFS}" FROM scratch AS root COPY --from=verify /rootfs/ / # manually run all alpm hooks that can't be run inside the fakechroot RUN ldconfig && update-ca-trust && locale-gen RUN sh -c 'ls usr/lib/sysusers.d/*.conf | /usr/share/libalpm/scripts/systemd-hook sysusers ' # update /etc/os-release RUN ln -s /usr/lib/os-release /etc/os-release # initialize the archlinux keyring, but discard any private key that may be shipped. RUN pacman-key --init && pacman-key --populate archlinux && bash -c "rm -rf etc/pacman.d/gnupg/{openpgp-revocs.d/,private-keys-v1.d/,pubring.gpg~,gnupg.S.}*" ENV LANG=en_US.UTF-8 CMD ["/usr/bin/bash"]