Giter Site home page Giter Site logo

circleci-public / cimg-go Goto Github PK

View Code? Open in Web Editor NEW
17.0 14.0 24.0 350 KB

The CircleCI Go (Golang) Docker Convenience Image.

Home Page: https://circleci.com/developer/images/image/cimg/go

License: MIT License

Dockerfile 89.84% Shell 10.16%
cimg circleci golang docker circleci-cimg convenience-image

cimg-go's Introduction

CircleCI Logo Docker Logo Go Logo

CircleCI Convenience Images => Go

A Continuous Integration focused Go Docker image built to run on CircleCI

CircleCI Build Status Software License Docker Pulls CircleCI Community Repository

This image is designed to supercede the legacy CircleCI Go image, circleci/golang.

cimg/go is a Docker image created by CircleCI with continuous integration builds in mind. Each tag contains a complete Go version and toolchain, the testing wrapper gotestsum, and any binaries and tools that are required for builds to complete successfully in a CircleCI environment.

Support Policy

The CircleCI Docker Convenience Image support policy can be found on the CircleCI docs site. This policy outlines the release, update, and deprecation policy for CircleCI Docker Convenience Images.

Table of Contents

Getting Started

This image can be used with the CircleCI docker executor. For example:

jobs:
  build:
    docker:
      - image: cimg/go:1.17
    steps:
      - checkout
      - run: go version

In the above example, the CircleCI Go Docker image is used for the primary container. More specifically, the tag 1.17 is used meaning the version of Go will be Go v1.17. You can now use Go within the steps for this job.

How This Image Works

This image contains the Go programming language and its complete toolchain. This includes support for Go modules, the official Go Proxy Server, etc.

Changes From Legacy Image

If you're coming from the legacy version of this image, circleci/golang, here's any changes that you might want to be aware of:

  • GOPATH - this envar has changed from /go to $HOME/go. The latter will expand to the full path of /home/circleci/go. On first run, this change may affect caching and some other commands if you don’t correct the page in your config.

Variants

Variant images typically contain the same base software, but with a few additional modifications.

Node.js

The Node.js variant is the same Go image but with Node.js also installed. The Node.js variant will be used by appending -node to the end of an existing cimg/go tag.

jobs:
  build:
    docker:
      - image: cimg/go:1.17-node
    steps:
      - checkout
      - run: go version
      - run: node --version

Browsers

The browsers variant is the same Go image but with Node.js, Java, Selenium, and browser dependencies pre-installed via apt. The browsers variant can be used by appending -browser to the end of an existing cimg/go tag. The browsers variant is designed to work in conjunction with the CircleCI Browser Tools orb. You can use the orb to install a version of Google Chrome and/or Firefox into your build. The image contains all of the supporting tools needed to use both the browser and its driver.

orbs:
  browser-tools: circleci/[email protected]
jobs:
  build:
    docker:
      - image: cimg/go:1.17-browsers
    steps:
      - browser-tools/install-browser-tools
      - checkout
      - run: |
          go version
          node --version
          java --version
          google-chrome --version

Tagging Scheme

This image has the following tagging scheme:

cimg/go:<go-version>[-variant]

<go-version> - The version of Go to use. This can be a full SemVer point release (such as 1.12.7) or just the minor release (such as 1.12.0). If you use the minor release tag, it will automatically point to future patch updates as they are released by the Go Team. For example, the tag 1.17 points to Go v1.17 now, but when the next release comes out, it will point to Go v1.17.1.

[-variant] - Variant tags, if available, can optionally be used. Once the Node.js variant is available, it could be used like this: cimg/go:1.17-node.

Development

Images can be built and run locally with this repository. This has the following requirements:

  • local machine of Linux (Ubuntu tested) or macOS
  • modern version of Bash (v4+)
  • modern version of Docker Engine (v19.03+)

Cloning For Community Users (no write access to this repository)

Fork this repository on GitHub. When you get your clone URL, you'll want to add --recurse-submodules to the clone command in order to populate the Git submodule contained in this repo. It would look something like this:

git clone --recurse-submodules <my-clone-url>

If you missed this step and already cloned, you can just run git submodule update --init to populate the submodule. Then you can optionally add this repo as an upstream to your own:

git remote add upstream https://github.com/CircleCI-Public/cimg-go.git

Cloning For Maintainers ( you have write access to this repository)

Clone the project with the following command so that you populate the submodule:

git clone --recurse-submodules [email protected]:CircleCI-Public/cimg-go.git

Generating Dockerfiles

Dockerfiles can be generated for a specific Go version using the gen-dockerfiles.sh script. For example, to generate the Dockerfile for Go v1.18, you would run the following from the root of the repo:

./shared/gen-dockerfiles.sh 1.18.0

The generated Dockerfile will be located at ./1.18/Dockefile. To build this image locally and try it out, you can run the following:

cd 1.18
docker build -t test/go:1.18.0 .
docker run -it test/go:1.18.0 bash

Building the Dockerfiles

To build the Docker images locally as this repository does, you'll want to run the build-images.sh script:

./build-images.sh

This would need to be run after generating the Dockerfiles first. When releasing proper images for CircleCI, this script is run from a CircleCI pipeline and not locally.

Publishing Official Images (for Maintainers only)

The individual scripts (above) can be used to create the correct files for an image, and then added to a new git branch, committed, etc. A release script is included to make this process easier. To make a proper release for this image, let's use the fake Go version of Go v9.99, you would run the following from the repo root:

./shared/release.sh 9.99

This will automatically create a new Git branch, generate the Dockerfile(s), stage the changes, commit them, and push them to GitHub. The commit message will end with the string [release]. This string is used by CircleCI to know when to push images to Docker Hub. All that would need to be done after that is:

  • wait for build to pass on CircleCI
  • review the PR
  • merge the PR

The main branch build will then publish a release.

Incorporating Changes

How changes are incorporated into this image depends on where they come from.

build scripts - Changes within the ./shared submodule happen in its own repository. For those changes to affect this image, the submodule needs to be updated. Typically like this:

cd shared
git pull
cd ..
git add shared
git commit -m "Updating submodule for foo."

parent image - By design, when changes happen to a parent image, they don't appear in existing Go images. This is to aid in "determinism" and prevent breaking customer builds. New Go images will automatically pick up the changes.

If you really want to publish changes from a parent image into the Go image, you have to build a specific image version as if it was a new image. This will create a new Dockerfile and once published, a new image.

Go specific changes - Editing the Dockerfile.template file in this repo will modify the Go image specifically. Don't forget that to see any of these changes locally, the gen-dockerfiles.sh script will need to be run again (see above).

Contributing

We encourage issues and pull requests against this repository.

Please check out our contributing guide which outlines best practices for contributions and what you can expect from the images team at CircleCI.

Additional Resources

CircleCI Docs - The official CircleCI Documentation website. CircleCI Configuration Reference - From CircleCI Docs, the configuration reference page is one of the most useful pages we have. It will list all of the keys and values supported in .circleci/config.yml. Docker Docs - For simple projects this won't be needed but if you want to dive deeper into learning Docker, this is a great resource.

License

This repository is licensed under the MIT license. The license can be found here.

cimg-go's People

Contributors

adomaskizogian avatar bytesguy avatar cpe-image-bot avatar dsayling avatar felicianotech avatar jalexchen avatar joshhsoj1902 avatar mkusaka avatar mrothstein74 avatar nelzkiddom avatar parikshit-hooda avatar renovate[bot] avatar roopakv avatar seddarj avatar teesloane avatar trilopin avatar wavemoran avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

cimg-go's Issues

$GOPATH is unset

$GOPATH is unset during image build, and because of that, $PATH would be wrong as well.

Expected (let's assume that GOPATH='/go')

$ echo $PATH
/go/bin:/usr/local/go/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin

Actual:

$ echo $PATH
/bin:/usr/local/go/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin

Notice that /bin is duplicated.

Feature Request: Govulncheck

Describe the Feature Request
This is a Go vulnerability scanning tool. It just hit v1.0.0 and is made by Google thus virtually 1st-party.

Is your feature request related to a particular problem?
This aids users in security scanning for their Go code.

How will this feature request benefit CircleCI jobs using this image?
This aids users in security scanning for their Go code.

Describe the solution you would like to see
Explained fairly well above. Here is the announcement blog post: https://go.dev/blog/govulncheck?linkId=8881038

Describe alternatives you have considered
There are others out there, sure, but this being 1st party lends itself to inclusion IMO.

Add a latest/current tag

We use the current tag on cimg/node and find it very useful to ensure we're always 100% up to date on the latest releases. As we use Dependabot on our dockerfiles, but Dependabot can't keep track of the images referenced in our CircleCI config of course.

Could you please add an equivalent current or latest tag to this one?

Obviously it would be expected that breaking changes etc could break our builds, but that's totally fine - that's what we'd want it to do, same as with Node 👍

Thanks

Fix submodule command

We suggest running git submodule update --recursive when I think it should be git submodule update --init.

Go patch 0 releases don't get generated correctly

Unlike the other 15+ images we have in Convenience Images, the Go team releases the first minor release series without the 0 patch number. This causes the rendering of the tag to show up incorrectly in the DevHub.

This needs to be either fixed here or in the indexer.

For example, the latest Go release is 1.18 and not 1.18.0 which our build system is struggling with.

Permission denied error with cimg/go:1.16, cimg/go:1.16-browsers, cimg/go:1.17

Issue with cimg/go:1.16, cimg/go:1.17:

Using SSH Config Dir '/home/circleci/.ssh'
git version 2.34.1
Cloning git repository
mkdir: cannot create directory ‘/go’: Permission denied

exit status 1
CircleCI received exit code 1


Similar issue when using cimg/go:1.16-browsers

Unable to create directory '/go/src/github.com/HolimaX/libcontimig': mkdir /go: permission denied

golangci-lint error in cimg-go:1.19

Meta:

Operating System: OSX Monterey 12.0.1, Intel chip

Current behavior:

I can't run golangci-lint with cimg/go:1.19.0.

docker run -it cimg/go:1.19.0

circleci@61aaede53bc0:~/project$ golangci-lint version
panic: load embedded ruleguard rules: rules/rules.go:13: can't load fmt

goroutine 1 [running]:
github.com/go-critic/go-critic/checkers.init.22()
	github.com/go-critic/[email protected]/checkers/embedded_rules.go:47 +0x4b4

Stop clearing apt lists

Hi,

I see apt lists are being cleared at build time, which makes the image non-extendable, as it becomes impossible to install additional packages.

My repository relies on libxml2-dev to run, and I would like to be able to add a - run: sudo apt-get install libxml2-dev to my CircleCI config, but I can't due to the apt list being cleared.

Publish images for Go beta and RC versions

Currently go 1.17rc1 is available as a preview for the upcoming release. Providing images with beta and rc versions would be very convenient for the users who want to test their projects against the upcoming versions.

Without such images the users have to either not use cimg at all, or have different workflows for stable and preview versions of Go.

[1.17] Unpinned minor version breaking pipeline

Description

We’ve noticed an issue when using an unpinned (minor) version of your cimg/go/ image (e.g: 1.17). We are reasonably confident this relates to dependencies in your docker image, and nothing on our end.

The latest minor version resolves to 1.17.9 , which is producing this error in our CCI pipeline (where we are docker-compose:ing):

[+] Building 0.0s (0/0)
listing workers for Build: failed to list workers: Unavailable: connection error: desc = "transport: Error while dialing unable to upgrade to h2c, received 404"

This error is consistent with messages in your public forums, and seems to be a “sort of” known issue (though there’s no CCI :ack: on the issue!).

Manual workaround (short-term fix)

Our workaround is to pin the minor version to 1.17.8, which resolves the error. But this creates a problem for our migration to 1.18 - which is also producing the aforementioned error.

Expected Behaviour

  • CCI's go image should not break our pipeline when minor version isn't manually pinned
  • Our migration to go 1.18 should be unaffected by CCI images.

Go 1.20 was released...

... and there's no image available here. Why do new Go versions work immediately on GitHub Actions, but not on CircleCI?

publish images based on Ubuntu 20.04

So I've been trying to upgrade to cimg from circleci/golang for a hour ish now, hunted down the source of a lot of my problems to this image being based on cimg/base:2020.06 which is ubuntu 18.04. (fzf is only available in the 19 and up ubuntu repos)

Could y'all add a variant of this image based on cimg/base:2020.08-20.04 ? I don't think I've missed a release of this based on that version of ubuntu.

Thanks

OpenSSL CVE in the Go images

Hello there!

This may already be on your radar, but the available cimg/go images have an OpenSSL vulnerability that we're hoping to patch in our build pipeline. This is from a scan of the current 1.18 tag (I believe it's 1.18.0):

✗ High severity vulnerability found in openssl
  Description: Loop with Unreachable Exit Condition ('Infinite Loop')
  Info: https://snyk.io/vuln/SNYK-UBUNTU2004-OPENSSL-2426343
  Introduced through: ca-certificates@20210119~20.04.2, meta-common-packages@meta, openssl/[email protected]
  From: ca-certificates@20210119~20.04.2 > [email protected]
  From: meta-common-packages@meta > openssl/[email protected]
  From: openssl/[email protected]
  Image layer: Introduced by your base image (ubuntu:20.04)
  Fixed in: 1.1.1f-1ubuntu2.12

Update `golangci-lint` version to 1.51.2

We use CircleCI images for linting issues in CI. Since introducing generics we have been having problems with golangci-lint version to 1.51.1 which local testing suggests are resolved in version 1.51.2. But CircleCI images having the older version are forcing use the older version leading us to disable linters such gocritic.

I can open a PR if required 🙂

1.17 should be published as 1.17.0

Hey all, mostly a feature request I guess, but it'd be nice if 1.17 could also be published as 1.17.0 (and future 1.X.0 releases) so that we could consume 1.17 images without automatically being upgraded to the latest patch release. This is the same behaviour that golang currently follows.

Side note: Your docs currently say that 1.17.0 is a valid tag, but it's not.

add golangci-lint

Because the user doesn't exist, using golangci/golangci-lint directly for lint steps when using this executor (or the go orb) for other steps doesn't work too well. It would be nice to add the option to have a golangci-lint run step in the go orb as well.

This is Ok for projects without private dependencies (i.e., just run the golangci-lint image separately without using the cache etc. from this step), but with more complicated setups, it would be nice to have golangci-lint baked in.

Would it be possible to bake that into this image, since I imagine it's a common toolset people would like to use (only challenge might be keeping the version up to date)

Dependency Dashboard

This issue lists Renovate updates and detected dependencies. Read the Dependency Dashboard docs to learn more.

Open

These updates have all been created already. Click a checkbox below to force a retry/rebase of any.

Detected dependencies

circleci
.circleci/config.yml
  • cimg 0.6.5
  • slack 4.13.2
dockerfile
Dockerfile.template
  • cimg/base 2024.05
regex
Dockerfile.template
  • gotestyourself/gotestsum 1.11.0
  • golangci/golangci-lint 1.58.2
  • golang/vuln 1.1.0

  • Check this box to trigger a request for Renovate to run again on this repository

Failed to download go dependencies

Builds running on cimg/go:1.13 failing with

#!/bin/bash -eo pipefail
go mod download
go: writing go.mod cache: mkdir /go/pkg: permission denied
...

Basic testing

Maybe we can do the following:

  • try running the image
  • try running go version
  • try building a hello work Go app

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.