Should I make this: (distroless) containers builder, by taking list of packages or a gentoo ebuild file
I am thinking to make the following tool, but wanted to get opinions before I embark on this journey.
The tool builds container images.
The images are optionally distroless: meaning, they do not include an entire distro. They only include the application(s) you specify and its dependencies.
What else does the tool give you?
the build tool uses a package manager to do dependency resolution, so you don't have to manually resolve them like many docker files do. (NOTE: The package manager is not installed on the container image. It is only used by the build tool)
uses gentoo's portage to build the software from source (if not previously cached). This is helpful when you're using versions of software that aren't built against each other in the repos you download from
allows specifying compile flag customizations per package.
makes use of gentoo's existing library of package build or install recipes, so that you only have to write them for uncommon apps rather than in every docker file.
I find it crazy that so many dockerfiles are doing their own dependency resolution when we already have package managers.
What do you think? Is this tool useful or am I missing a reason why it wouldn't be?
So you want to build something like apko (alpine packages/repos, used in chainguard’s images) or rules_oci (used in google’s Debian-based distroless images) but for portage?
I think it’d be cool. Just keep in mind:
Container scanning tools (like trivy), afaik, tend to look for a package db. Going distroless breaks them. I believe this is why chainguard generates a SBOM (software bill of materials).
Container images are already de-duplicated, and often, the gains in pull times aren’t worth the additional debugging effort (for example, you won’t be able to have dig/curl installed without rebuilding and deploying the whole image, or even a bash prompt in most cases). They’re even more not worth it because lazily pulling OCI images is now a thing, though it’s in its infancy. See: eStargz and I believe dragonfly which uses nydus. More generally though, zstd:chunked will probably eventually become mainstream and default, which will all but eliminate the need for “minimal” starting images.
If you wanted to go really small, there’s stuff like slim which makes tailor made images.
Gentoo, afaik, doesn’t really do LTS releases, making it undesirable for server use, which is the main place containers are.
Distroless containers don’t share common base images because they are normally scratch-built. This breaks image deduplication, leading to increased disk usage instead of decreased disk usage, and why I personally swapped off chainguard’s images.
Did not know about apko. I am not attached to distroless, just thought it was a nice to have. So apko might be a reason I don't pursue this project anymore. Thanks for showing me!
Your comment is very insightful for other reasons too. Thanks a lot :)
I had a feeling nixos would have something, but I avoided it because it seemed more than a day's worth of learning (and also its a bit opinionated). But I will revisit it one day!
I think you're missing the point of distroless by trying to make a distro out of an image based on distroless with a package manager.
The entire context of that image would be immediately lost and make absolutely no sense by introducing a package manager into it.
If you're unfamiliar with combining portions of images as multi-stage builds, you may want to look into that to grasp the concepts better.
Another thing: not all containers are built with dockerfiles. You might want to get more familiar with how distroless images are built into the OCI-compliant sense, and the tools used therein.
What you're describing not only already exists, it exists in the toolchain you mean to rewrite. It's a hat on a hat, on another hat because it's in containers.
Maybe if you described the problem you're having, it might help others understand what you're trying to solve for.
The package manager would not be part of the container image. The package manager is only used to build it. The container image will only include the packages the user specifies.
combining portions of images as multi-stage builds
That's something I am making use of for this, actually :)
What you're describing not only already exists...
Can you please give an example of a tool that can build a container image by being given only a list of packages it needs to have?
My tool would be as simple as doing something like this:
Yes. In your example, the base image is nodejs, which includes yarn. Then you copy your app into it with a COPY command and set the entrypoint to execute. Dead simple.