Convert Figma logo to code with AI

openshift logosource-to-image

A tool for building artifacts from source and injecting into container images

2,452
695
2,452
8

Top Related Projects

13,584

🏗 Build container images for your Java applications.

2,528

CLI for building apps using Cloud Native Buildpacks

14,923

Easy and Repeatable Kubernetes Development

A cloud-native Pipeline resource.

Quick Overview

Source-to-Image (S2I) is an open-source toolkit and workflow for building reproducible container images from source code. It produces ready-to-run images by injecting source code into a container image and assembling a new image that can be run using Docker. S2I is primarily designed for use with OpenShift and Kubernetes.

Pros

  • Simplifies the process of building container images from source code
  • Supports multiple programming languages and frameworks
  • Enables reproducible builds with consistent results
  • Integrates well with OpenShift and Kubernetes ecosystems

Cons

  • Learning curve for users new to containerization concepts
  • Limited customization options compared to writing Dockerfiles manually
  • May not be suitable for complex build processes or highly specialized environments
  • Requires understanding of S2I builder images and their limitations

Getting Started

To get started with Source-to-Image, follow these steps:

  1. Install S2I:

    # For macOS using Homebrew
    brew install source-to-image
    
    # For Linux, download the binary
    wget https://github.com/openshift/source-to-image/releases/download/v1.3.1/source-to-image-v1.3.1-a5a77147-linux-amd64.tar.gz
    tar -xvf source-to-image-v1.3.1-a5a77147-linux-amd64.tar.gz
    sudo mv s2i /usr/local/bin
    
  2. Create a simple application (e.g., a Node.js app)

  3. Build an image using S2I:

    s2i build . centos/nodejs-10-centos7 my-nodejs-app
    
  4. Run the container:

    docker run -p 8080:8080 my-nodejs-app
    

This will build and run a containerized version of your application using the specified S2I builder image.

Competitor Comparisons

13,584

🏗 Build container images for your Java applications.

Pros of jib

  • Optimized for Java applications, providing seamless integration with Maven and Gradle
  • Generates highly efficient Docker images with better layer caching
  • Does not require Docker daemon, enabling easier CI/CD integration

Cons of jib

  • Limited to Java applications, while source-to-image supports multiple languages
  • Less flexibility in customizing the build process compared to source-to-image
  • Requires specific configuration for non-standard Java applications

Code Comparison

source-to-image example:

s2i build https://github.com/sclorg/django-ex centos/python-35-centos7 hello-python

jib example:

./gradlew jib --image=gcr.io/my-project/my-image:tag

Key Differences

  • source-to-image is a more general-purpose tool for building images from source code
  • jib is specifically designed for Java applications and integrates with build tools
  • source-to-image requires a Docker daemon, while jib can build images without it
  • jib focuses on optimizing Java application images, while source-to-image provides broader language support

Both tools aim to simplify container image creation, but they cater to different use cases and development workflows.

2,528

CLI for building apps using Cloud Native Buildpacks

Pros of pack

  • Supports multiple programming languages and frameworks out-of-the-box
  • Faster build times due to caching and parallel execution
  • More extensible with custom buildpacks and builders

Cons of pack

  • Steeper learning curve for custom buildpack creation
  • Less integrated with OpenShift ecosystem
  • May require more configuration for complex build scenarios

Code Comparison

source-to-image:

s2i build https://github.com/sclorg/django-ex centos/python-35-centos7 hello-python

pack:

pack build myapp --builder heroku/buildpacks:18

Both tools aim to simplify the process of building container images from source code, but they take different approaches. source-to-image is more tightly integrated with OpenShift and focuses on simplicity, while pack offers more flexibility and language support through the Cloud Native Buildpacks specification.

source-to-image uses a single builder image and injects source code into it, whereas pack uses a series of buildpacks to detect and build applications. This allows pack to support a wider range of languages and frameworks without requiring custom builder images for each scenario.

While source-to-image may be easier to get started with, especially in an OpenShift environment, pack offers more advanced features and customization options for complex build requirements.

14,923

Easy and Repeatable Kubernetes Development

Pros of Skaffold

  • Supports multiple programming languages and frameworks
  • Offers continuous development with automatic rebuilds and deployments
  • Integrates with various build tools and container registries

Cons of Skaffold

  • Steeper learning curve for beginners
  • Requires more configuration for complex scenarios
  • May have performance overhead for large projects

Code Comparison

Source-to-Image:

s2i build https://github.com/sclorg/django-ex centos/python-35-centos7 my-django-app

Skaffold:

apiVersion: skaffold/v2beta28
kind: Config
build:
  artifacts:
  - image: my-django-app
deploy:
  kubectl:
    manifests:
    - k8s-*.yaml

Source-to-Image focuses on building container images from source code, while Skaffold provides a more comprehensive development workflow for Kubernetes applications. Source-to-Image is simpler to use for basic scenarios, but Skaffold offers more flexibility and features for complex development environments. Source-to-Image is tightly integrated with OpenShift, whereas Skaffold is more platform-agnostic and works well with various Kubernetes distributions.

A cloud-native Pipeline resource.

Pros of Pipeline

  • More flexible and extensible, supporting complex workflows beyond just building images
  • Cloud-native design, integrating well with Kubernetes and other cloud platforms
  • Supports multiple languages and frameworks out of the box

Cons of Pipeline

  • Steeper learning curve due to more complex architecture
  • Requires more setup and configuration compared to Source-to-Image
  • May be overkill for simple build scenarios

Code Comparison

Source-to-Image:

s2i build https://github.com/sclorg/django-ex centos/python-35-centos7 my-django-app

Pipeline:

apiVersion: tekton.dev/v1beta1
kind: Task
metadata:
  name: build-app
spec:
  steps:
    - name: build
      image: centos/python-35-centos7
      script: |
        git clone https://github.com/sclorg/django-ex
        cd django-ex
        pip install -r requirements.txt
        python manage.py runserver

Source-to-Image focuses on simplicity, providing a one-line command to build container images from source code. Pipeline offers more granular control over the build process, allowing for custom steps and integration with other CI/CD tasks. While Source-to-Image is easier to use for straightforward builds, Pipeline provides greater flexibility for complex workflows and cloud-native environments.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

Go Reference License

Source-To-Image (S2I)

Overview

Source-to-Image (S2I) is a toolkit and workflow for building reproducible container images from source code. S2I produces ready-to-run images by injecting source code into a container image and letting the container prepare that source code for execution. By creating self-assembling builder images, you can version and control your build environments exactly like you use container images to version your runtime environments.

For a deep dive on S2I you can view this presentation.

Want to try it right now? Download the latest release and run:

$ s2i build https://github.com/sclorg/django-ex centos/python-35-centos7 hello-python
$ docker run -p 8080:8080 hello-python

Now browse to http://localhost:8080 to see the running application.

You've just built and run a new container image from source code in a git repository, no Dockerfile necessary.

How Source-to-Image works

For a dynamic language like Ruby, the build-time and run-time environments are typically the same. Starting with a builder image that describes this environment - with Ruby, Bundler, Rake, Apache, GCC, and other packages needed to set up and run a Ruby application installed - source-to-image performs the following steps:

  1. Start a container from the builder image with the application source injected into a known directory
  2. The container process transforms that source code into the appropriate runnable setup - in this case, by installing dependencies with Bundler and moving the source code into a directory where Apache has been preconfigured to look for the Ruby config.ru file.
  3. Commit the new container and set the image entrypoint to be a script (provided by the builder image) that will start Apache to host the Ruby application.

For compiled languages like C, C++, Go, or Java, the dependencies necessary for compilation might dramatically outweigh the size of the actual runtime artifacts. To keep runtime images slim, S2I enables a multiple-step build processes, where a binary artifact such as an executable or Java WAR file is created in the first builder image, extracted, and injected into a second runtime image that simply places the executable in the correct location for execution.

For example, to create a reproducible build pipeline for Tomcat (the popular Java webserver) and Maven:

  1. Create a builder image containing OpenJDK and Tomcat that expects to have a WAR file injected
  2. Create a second image that layers on top of the first image Maven and any other standard dependencies, and expects to have a Maven project injected
  3. Invoke source-to-image using the Java application source and the Maven image to create the desired application WAR
  4. Invoke source-to-image a second time using the WAR file from the previous step and the initial Tomcat image to create the runtime image

By placing our build logic inside of images, and by combining the images into multiple steps, we can keep our runtime environment close to our build environment (same JDK, same Tomcat JARs) without requiring build tools to be deployed to production.

Goals

Reproducibility

Allow build environments to be tightly versioned by encapsulating them within a container image and defining a simple interface (injected source code) for callers. Reproducible builds are a key requirement to enabling security updates and continuous integration in containerized infrastructure, and builder images help ensure repeatability as well as the ability to swap runtimes.

Flexibility

Any existing build system that can run on Linux can be run inside of a container, and each individual builder can also be part of a larger pipeline. In addition, the scripts that process the application source code can be injected into the builder image, allowing authors to adapt existing images to enable source handling.

Speed

Instead of building multiple layers in a single Dockerfile, S2I encourages authors to represent an application in a single image layer. This saves time during creation and deployment, and allows for better control over the output of the final image.

Security

Dockerfiles are run without many of the normal operational controls of containers, usually running as root and having access to the container network. S2I can be used to control what permissions and privileges are available to the builder image since the build is launched in a single container. In concert with platforms like OpenShift, source-to-image can enable admins to tightly control what privileges developers have at build time.

Anatomy of a builder image

Creating builder images is easy. s2i looks for you to supply the following scripts to use with an image:

  1. assemble - builds and/or deploys the source
  2. run- runs the assembled artifacts
  3. save-artifacts (optional) - captures the artifacts from a previous build into the next incremental build
  4. usage (optional) - displays builder image usage information

Additionally for the best user experience and optimized s2i operation we suggest images to have /bin/sh and tar commands available.

See a practical tutorial on how to create a builder image and read a detailed description of the requirements and scripts along with examples of builder images.

Build workflow

The s2i build workflow is:

  1. s2i creates a container based on the build image and passes it a tar file that contains:
    1. The application source in src, excluding any files selected by .s2iignore
    2. The build artifacts in artifacts (if applicable - see incremental builds)
  2. s2i sets the environment variables from .s2i/environment (optional)
  3. s2i starts the container and runs its assemble script
  4. s2i waits for the container to finish
  5. s2i commits the container, setting the CMD for the output image to be the run script and tagging the image with the name provided.

Filtering the contents of the source tree is possible if the user supplies a .s2iignore file in the root directory of the source repository, where .s2iignore contains regular expressions that capture the set of files and directories you want filtered from the image s2i produces.

Specifically:

  1. Specify one rule per line, with each line terminating in \n.
  2. Filepaths are appended to the absolute path of the root of the source tree (either the local directory supplied, or the target destination of the clone of the remote source repository s2i creates).
  3. Wildcards and globbing (file name expansion) leverage Go's filepath.Match and filepath.Glob functions.
  4. Search is not recursive. Subdirectory paths must be specified (though wildcards and regular expressions can be used in the subdirectory specifications).
  5. If the first character is the # character, the line is treated as a comment.
  6. If the first character is the !, the rule is an exception rule, and can undo candidates selected for filtering by prior rules (but only prior rules).

Here are some examples to help illustrate:

With specifying subdirectories, the */temp* rule prevents the filtering of any files starting with temp that are in any subdirectory that is immediately (or one level) below the root directory. And the */*/temp* rule prevents the filtering of any files starting with temp that are in any subdirectory that is two levels below the root directory.

Next, to illustrate exception rules, first consider the following example snippet of a .s2iignore file:

*.md
!README.md

With this exception rule example, README.md will not be filtered, and remain in the image s2i produces. However, with this snippet:

!README.md
*.md

README.md, if filtered by any prior rules, but then put back in by !README.md, would be filtered, and not part of the resulting image s2i produces. Since *.md follows !README.md, *.md takes precedence.

Users can also set extra environment variables in the application source code. They are passed to the build, and the assemble script consumes them. All environment variables are also present in the output application image. These variables are defined in the .s2i/environment file inside the application sources. The format of this file is a simple key-value, for example:

FOO=bar

In this case, the value of FOO environment variable will be set to bar.

Using ONBUILD images

In case you want to use one of the official Dockerfile language stack images for your build you don't have do anything extra. S2I is capable of recognizing the container image with ONBUILD instructions and choosing the OnBuild strategy. This strategy will trigger all ONBUILD instructions and execute the assemble script (if it exists) as the last instruction.

Since the ONBUILD images usually don't provide any entrypoint, in order to use this build strategy you will have to provide one. You can either include the 'run', 'start' or 'execute' script in your application source root folder or you can specify a valid S2I script URL and the 'run' script will be fetched and set as an entrypoint in that case.

Incremental builds

s2i automatically detects:

  • Whether a builder image is compatible with incremental building
  • Whether a previous image exists, with the same name as the output name for this build

If a save-artifacts script exists, a prior image already exists, and the --incremental=true option is used, the workflow is as follows:

  1. s2i creates a new container image from the prior build image
  2. s2i runs save-artifacts in this container - this script is responsible for streaming out a tar of the artifacts to stdout
  3. s2i builds the new output image:
    1. The artifacts from the previous build will be in the artifacts directory of the tar passed to the build
    2. The build image's assemble script is responsible for detecting and using the build artifacts

NOTE: The save-artifacts script is responsible for streaming out dependencies in a tar file.

Dependencies

  1. docker >= 1.6
  2. Go >= 1.7.1
  3. (optional) Git

Installation

Using go install

You can install the s2i binary using go install which will download the source-to-image code to your Go module cache, build the s2i binary, and install it into your $GOBIN, or $GOPATH/bin if $GOBIN is not set, or $HOME/go/bin if the GOPATH environment variable is also not set.

$ go install github.com/openshift/source-to-image/cmd/s2i@latest

For Mac

You can either follow the installation instructions for Linux (and use the darwin-amd64 link) or you can just install source-to-image with Homebrew:

$ brew install source-to-image

For Linux

Go to the releases page and download the correct distribution for your machine. Choose either the linux-386 or the linux-amd64 links for 32 and 64-bit, respectively.

Unpack the downloaded tar with

$ tar -xvzf release.tar.gz.

You should now see an executable called s2i. Either add the location of s2i to your PATH environment variable, or move it to a pre-existing directory in your PATH. For example,

# cp /path/to/s2i /usr/local/bin

will work with most setups.

For Windows

Download the latest 64-bit Windows release. Extract the zip file through a file browser. Add the extracted directory to your PATH. You can now use s2i from the command line.

Note: We have had some reports of Windows Defender falsely alerting reporting that the Windows binaries contain "Trojan:Win32/Azden.A!cl". This appears to be a common false alert for other applications as well.

From source

Assuming Go, Git, and Docker are installed and configured, execute the following commands:

$ git clone https://github.com/openshift/source-to-image
$ cd source-to-image
$ export PATH=${PATH}:`pwd`/_output/local/bin/`go env GOOS`/`go env GOHOSTARCH`/
$ ./hack/build-go.sh

Security

Since the s2i command uses the Docker client library, it has to run in the same security context as the docker command. For some systems, it is enough to add yourself into the 'docker' group to be able to work with Docker as 'non-root'. In the latest versions of Fedora/RHEL, it is recommended to use the sudo command as this way is more auditable and secure.

If you are using the sudo docker command already, then you will have to also use sudo s2i to give S2I permission to work with Docker directly.

Be aware that being a member of the 'docker' group effectively grants root access, as described here.

Getting Started

You can start using s2i right away (see releases) with the following test sources and publicly available images:

$ s2i build https://github.com/openshift/ruby-hello-world registry.redhat.io/ubi8/ruby-27 test-ruby-app
$ docker run --rm -i -p :8080 -t test-ruby-app
$ s2i build --ref=10.x --context-dir=helloworld https://github.com/wildfly/quickstart openshift/wildfly-101-centos7 test-jee-app
$ docker run --rm -i -p 8080:8080 -t test-jee-app

Want to know more? Read the following resources: