Skip to main content

CLI tool for managing and automating Red Hat software releases

Project description

[![Build Status](https://travis-ci.com/openshift/doozer.svg?branch=master)](https://travis-ci.com/openshift/doozer)

## Doozer

Doozer is a build management utility that currently has the capability to build RPMs and Container Images via OSBS/Brew This repository is an in-progress migration from the older https://github.com/openshift/enterprise-images

## Deployment

For local development pull the code and run:

python setup.py develop

For new releases, Travis-CI is already setup and deployment to PyPi is easy:

That’s it. Travis CI will do the rest automatically.

## Installation

To install the latest released version of doozer, run:

` pip install -U rh-doozer `

If instead, you would like to run with the latest and greatest from source, but potential unstable, run:

` pip install https://github.com/openshift/doozer/archive/master.zip `

The Doozer installation will of course automatically pull in the required python modules but it is dependent on the following packages and CLI tools already being installed on your system:

### devel packages*

[dnf|yum] install krb5-devel python2-devel libffi

### git

Likely already on your system. If not:

[dnf|yum] install git

### brew & rhpkg

Enable the following repos on your syste:

Then install with:

[yum|dnf] install koji rhpkg

### tito

Fedora:

dnf install tito

RHEL/CentOS: ` #enable EPEL - https://fedoraproject.org/wiki/EPEL#How_can_I_use_these_extra_packages.3F yum install tito `

### docker

### repoquery (from yum, not dnf) and rsync

[yum|dnf] install yum-utils rsync

# Local Image Builds

### Install ImageBuilder

Some images are built with imagebuilder instead of docker build (this is configured in the image’s config yaml) and therefore you need to install imagebuilder:

go get -u github.com/openshift/imagebuilder/cmd/imagebuilder

Note: by default go “gets” binaries into $GOPATH/bin, which you may want to put in your $PATH. If there is no $GOPATH golang defaults to $HOME/go

### Registry Setup

Because many images require resources on internal registries is it important to setup your local docker to search for images in the right place. Note: This is just one example and your mileage may vary depending on your system and tool versions

  • Add the following entry to your /etc/docker/daemon.json:

    “insecure-registries”: [“http://brew-pulp-docker01.web.prod.ext.phx2.redhat.com:8888/”]

  • In /etc/containers/registries.conf ` add `http://brew-pulp-docker01.web.prod.ext.phx2.redhat.com:8888 to both [registries.search:registries] and [registries.insecure:registries]. We recommend adding it to the beginning of the list if possible so that docker does not pull public versions of an image.

  • Restart docker

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

rh-doozer-0.3.19.tar.gz (80.4 kB view details)

Uploaded Source

File details

Details for the file rh-doozer-0.3.19.tar.gz.

File metadata

  • Download URL: rh-doozer-0.3.19.tar.gz
  • Upload date:
  • Size: 80.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.21.0 setuptools/40.8.0 requests-toolbelt/0.9.1 tqdm/4.31.1 CPython/2.7.14

File hashes

Hashes for rh-doozer-0.3.19.tar.gz
Algorithm Hash digest
SHA256 a28b20f4d8c04b1a3da423bfb94810aea84eec0802b6de2b1779a69830f5bd9e
MD5 214bc9a183dd23e28eeebb6c18fdd5d0
BLAKE2b-256 d0d34ee27282ce6df2ec7a9de27599039d6a69b3b9c2c8a0f77ed6cb3e008964

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page