X Tutup
The Wayback Machine - https://web.archive.org/web/20200917214300/https://github.com/nodejs/docker-node/pull/362
Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Introduce windows images #362

Open
wants to merge 1 commit into
base: master
from

Conversation

@StefanScherer
Copy link

StefanScherer commented Mar 22, 2017

This PR introduces Dockerfiles for both Windows base OS images windowsservercore and nanoserver.

You can use AppVeyor for test builds like the Travis builds for Linux. The appveyor.yml is provided with this PR. It runs test-build.ps1 which builds and tests the images like the test-build.sh script.

See https://ci.appveyor.com/project/StefanScherer/docker-node for an example.

Supersedes #222 and #223

@chorrell
Copy link
Contributor

chorrell commented Mar 22, 2017

A couple of things we'll need to think about:

  • Updating the update.sh script to include the new windows variants
  • Updating the generate-stackbrew-library.sh script to generate the appropriate tags for the windows variants
@pesho
Copy link
Member

pesho commented Mar 22, 2017

Updating the update.sh script to include the new windows variants

This would also involve updating their SHA256-sums which are used instead of GPG signature checking.

@StefanScherer
Copy link
Author

StefanScherer commented Mar 22, 2017

I keep the Windows Dockerfiles up to date with this update.sh
https://github.com/StefanScherer/dockerfiles-windows/blob/master/node/update.sh
This might help adding it to the update shell script.

@StefanScherer
Copy link
Author

StefanScherer commented Apr 1, 2017

We could switch over to GPG signature checking for Windows as well. But I only found https://www.gpg4win.org/package-integrity.html which burries the gpg.exe into a exe installer and eventually not working in Nanoserver. It is complex to get rid of the temporary exe installer again I guess.

But once we have PR moby/moby#31257 in offical Docker engine we could run the gpg installer in windowsservercore, then download and check GPG signature and extract the ZIPs and finally draft small windowsservercore and nanoserver images with multiple FROM instructions.

In my dockerfiles repo I could switch to this approach as I'm using AppVeyory and can switch to master builds of dockerd.exe very easily.

@StefanScherer
Copy link
Author

StefanScherer commented Apr 1, 2017

That would be a way to do it. See a proof-of-concept at

which does the gpg installation, adding the gpg keys, downloading SHA256SUMS.txt.asc checking the signature and grepping the checksum for the zip file and the final sha256 check itself.

@SimenB
Copy link
Member

SimenB commented Jul 22, 2017

@StefanScherer could you include updates to the files @chorrell mentions?

You can look at the python repo for examples of update.sh and generate-stackbrew-library.sh with Windows support. https://github.com/docker-library/python

@StefanScherer StefanScherer force-pushed the StefanScherer:introduce-windows-images branch 2 times, most recently from 2dab140 to 3d6a793 Jul 23, 2017
@StefanScherer
Copy link
Author

StefanScherer commented Jul 23, 2017

@SimenB I've updated the update.sh and generate-stackbrew-library.sh and added Windows templates to generate all version from them. The Windows builds use multi-stage builds with Docker 17.06.1-ee-1-rc1 in AppVeyor, the final EE version should be available soon.
Travis and AppVeyor build https://ci.appveyor.com/project/StefanScherer/docker-node/build/1.0.10 are green.

@SimenB
Copy link
Member

SimenB commented Jul 23, 2017

@nodejs/docker any reason not to merge this? If not, how do we handle CI?

@tianon does this look correct to you? Is using multi-stage builds ok?

@SimenB
Copy link
Member

SimenB commented Jul 23, 2017

@StefanScherer could you paste the output from running generate-stackbrew-library.sh here for verification?

Edit: oops, wrong tag. Fat thumbs!

@StefanScherer
Copy link
Author

StefanScherer commented Jul 23, 2017

Maybe I should add Yarn as well?

@SimenB
Copy link
Member

SimenB commented Jul 23, 2017

Maybe I should add Yarn as well?

Definitely!


FROM microsoft/nanoserver

SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"]

This comment has been minimized.

@SimenB

SimenB Jul 23, 2017 Member

What does this do? Like set -e i shell?

This comment has been minimized.

@StefanScherer

StefanScherer Jul 23, 2017 Author

Three things:

  1. set the default SHELL to PowerShell to simplify the next RUN instructions.
  2. $ErrorActionPreference = 'Stop' is equivalent to set -e, correct
  3. $ProgressPreference = 'SilentlyContinue' to improve speed for downloading files and expanding ZIP files. It disables the progress output.
@@ -1,3 +1,4 @@
bashbrew-arch variants
amd64 default,alpine,onbuild,slim,wheezy
ppc64le default,onbuild,slim
windows-amd64 windowsservercore,windowsservercore/onbuild,nanoserver,nanoserver/onbuild

This comment has been minimized.

@SimenB

SimenB Jul 23, 2017 Member

@yhwang does this look good?

This comment has been minimized.

@StefanScherer

StefanScherer Jul 23, 2017 Author

I used windows-amd64 as it seems to be used for other official images, see https://github.com/docker-library/official-images/blob/master/README.md#architectures-other-than-amd64. It's a combination of OS + ARCH.

This comment has been minimized.

@yhwang

yhwang Jul 23, 2017 Member

Yes, these are correct! nice @StefanScherer !

@StefanScherer
Copy link
Author

StefanScherer commented Jul 23, 2017

@SimenB This is the output of generate-stackbrew-library.sh

$ ./generate-stackbrew-library.sh 
# this file is generated via https://github.com/nodejs/docker-node/blob/6912e1204a853e38e9439e849ef73a4a569f7b85/generate-stackbrew-library.sh

Maintainers: The Node.js Docker Team <https://github.com/nodejs/docker-node> (@nodejs)
GitRepo: https://github.com/nodejs/docker-node.git

Tags: 8.2.1, 8.2, 8, latest
Architectures: amd64, ppc64le
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 8.2

Tags: 8.2.1-alpine, 8.2-alpine, 8-alpine, alpine
Architectures: amd64
GitCommit: f547c4c7281027d5d90f4665815140126e1f70d5
Directory: 8.2/alpine

Tags: 8.2.1-onbuild, 8.2-onbuild, 8-onbuild, onbuild
Architectures: amd64, ppc64le, windows-amd64
GitCommit: f547c4c7281027d5d90f4665815140126e1f70d5
Directory: 8.2/onbuild

Tags: 8.2.1-slim, 8.2-slim, 8-slim, slim
Architectures: amd64, ppc64le
GitCommit: f547c4c7281027d5d90f4665815140126e1f70d5
Directory: 8.2/slim

Tags: 8.2.1-wheezy, 8.2-wheezy, 8-wheezy, wheezy
Architectures: amd64
GitCommit: f547c4c7281027d5d90f4665815140126e1f70d5
Directory: 8.2/wheezy

Tags: 8.2.1-windowsservercore, 8.2-windowsservercore, 8-windowsservercore, windowsservercore
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 8.2/windows/windowsservercore

Tags: 8.2.1-windowsservercore-onbuild, 8.2-windowsservercore-onbuild, 8-windowsservercore-onbuild, windowsservercore-onbuild
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 8.2/windows/windowsservercore/onbuild

Tags: 8.2.1-nanoserver, 8.2-nanoserver, 8-nanoserver, nanoserver
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 8.2/windows/nanoserver

Tags: 8.2.1-nanoserver-onbuild, 8.2-nanoserver-onbuild, 8-nanoserver-onbuild, nanoserver-onbuild
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 8.2/windows/nanoserver/onbuild

Tags: 7.10.1, 7.10, 7
Architectures: amd64, ppc64le
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 7.10

Tags: 7.10.1-alpine, 7.10-alpine, 7-alpine
Architectures: amd64
GitCommit: 0aadad9c44ff26afc81469d77df9b948be47c312
Directory: 7.10/alpine

Tags: 7.10.1-onbuild, 7.10-onbuild, 7-onbuild
Architectures: amd64, ppc64le, windows-amd64
GitCommit: 0fcdf0b2660e73ab1054f932f4beac5b3946fb21
Directory: 7.10/onbuild

Tags: 7.10.1-slim, 7.10-slim, 7-slim
Architectures: amd64, ppc64le
GitCommit: 0aadad9c44ff26afc81469d77df9b948be47c312
Directory: 7.10/slim

Tags: 7.10.1-wheezy, 7.10-wheezy, 7-wheezy
Architectures: amd64
GitCommit: 0aadad9c44ff26afc81469d77df9b948be47c312
Directory: 7.10/wheezy

Tags: 7.10.1-windowsservercore, 7.10-windowsservercore, 7-windowsservercore
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 7.10/windows/windowsservercore

Tags: 7.10.1-windowsservercore-onbuild, 7.10-windowsservercore-onbuild, 7-windowsservercore-onbuild
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 7.10/windows/windowsservercore/onbuild

Tags: 7.10.1-nanoserver, 7.10-nanoserver, 7-nanoserver
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 7.10/windows/nanoserver

Tags: 7.10.1-nanoserver-onbuild, 7.10-nanoserver-onbuild, 7-nanoserver-onbuild
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 7.10/windows/nanoserver/onbuild

Tags: 6.11.1, 6.11, 6, boron
Architectures: amd64, ppc64le
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 6.11

Tags: 6.11.1-alpine, 6.11-alpine, 6-alpine, boron-alpine
Architectures: amd64
GitCommit: bb200caf20280e436dedc56a5f194fd21e684758
Directory: 6.11/alpine

Tags: 6.11.1-onbuild, 6.11-onbuild, 6-onbuild, boron-onbuild
Architectures: amd64, ppc64le, windows-amd64
GitCommit: bb200caf20280e436dedc56a5f194fd21e684758
Directory: 6.11/onbuild

Tags: 6.11.1-slim, 6.11-slim, 6-slim, boron-slim
Architectures: amd64, ppc64le
GitCommit: bb200caf20280e436dedc56a5f194fd21e684758
Directory: 6.11/slim

Tags: 6.11.1-wheezy, 6.11-wheezy, 6-wheezy, boron-wheezy
Architectures: amd64
GitCommit: bb200caf20280e436dedc56a5f194fd21e684758
Directory: 6.11/wheezy

Tags: 6.11.1-windowsservercore, 6.11-windowsservercore, 6-windowsservercore, boron-windowsservercore
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 6.11/windows/windowsservercore

Tags: 6.11.1-windowsservercore-onbuild, 6.11-windowsservercore-onbuild, 6-windowsservercore-onbuild, boron-windowsservercore-onbuild
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 6.11/windows/windowsservercore/onbuild

Tags: 6.11.1-nanoserver, 6.11-nanoserver, 6-nanoserver, boron-nanoserver
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 6.11/windows/nanoserver

Tags: 6.11.1-nanoserver-onbuild, 6.11-nanoserver-onbuild, 6-nanoserver-onbuild, boron-nanoserver-onbuild
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 6.11/windows/nanoserver/onbuild

Tags: 4.8.4, 4.8, 4, argon
Architectures: amd64, ppc64le
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 4.8

Tags: 4.8.4-alpine, 4.8-alpine, 4-alpine, argon-alpine
Architectures: amd64
GitCommit: 3ffba881ad5a78d33b8edf888d5406222b60686e
Directory: 4.8/alpine

Tags: 4.8.4-onbuild, 4.8-onbuild, 4-onbuild, argon-onbuild
Architectures: amd64, ppc64le, windows-amd64
GitCommit: 3ffba881ad5a78d33b8edf888d5406222b60686e
Directory: 4.8/onbuild

Tags: 4.8.4-slim, 4.8-slim, 4-slim, argon-slim
Architectures: amd64, ppc64le
GitCommit: 3ffba881ad5a78d33b8edf888d5406222b60686e
Directory: 4.8/slim

Tags: 4.8.4-wheezy, 4.8-wheezy, 4-wheezy, argon-wheezy
Architectures: amd64
GitCommit: 3ffba881ad5a78d33b8edf888d5406222b60686e
Directory: 4.8/wheezy

Tags: 4.8.4-windowsservercore, 4.8-windowsservercore, 4-windowsservercore, argon-windowsservercore
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 4.8/windows/windowsservercore

Tags: 4.8.4-windowsservercore-onbuild, 4.8-windowsservercore-onbuild, 4-windowsservercore-onbuild, argon-windowsservercore-onbuild
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 4.8/windows/windowsservercore/onbuild

Tags: 4.8.4-nanoserver, 4.8-nanoserver, 4-nanoserver, argon-nanoserver
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 4.8/windows/nanoserver

Tags: 4.8.4-nanoserver-onbuild, 4.8-nanoserver-onbuild, 4-nanoserver-onbuild, argon-nanoserver-onbuild
Architectures: windows-amd64
GitCommit: 3d6a793311fdb9e3e4a18edf97a3fab429be638c
Directory: 4.8/windows/nanoserver/onbuild
@StefanScherer
Copy link
Author

StefanScherer commented Jul 23, 2017

I had a look at Yarn how to install it on Windows. I can't take the similar way as on Linux, there is no *.asc file and there is only a MSI package. But they provide a Chocolatey package that does the download + checksum check here.
So in the multi-stage build we easily can use Chocolatey.
For the MSI package we definitely should use multi-stage build as an MSI installation leaves a backup of the MSI in another folder and msiexec is not available in the nanoserver image as shown here.

local variants
variants=$(grep "$arch" architectures | sed -E 's/'"$arch"'\s*//' | sed -E 's/,/ /g')
variants=$(grep "^$arch" architectures | sed -E 's/'"$arch"'\s*//' | sed -E 's/,/ /g')

This comment has been minimized.

@yhwang

yhwang Jul 23, 2017 Member

nice! I thought about this last night before I fell into sleep.

@yhwang
yhwang approved these changes Jul 23, 2017
Copy link
Member

yhwang left a comment

I am not familiar with Windows images. I believe you verify them in your windows machine. Need people who is familiar with windows to review these Dockerfiles. and Others are LGTM

@StefanScherer
Copy link
Author

StefanScherer commented Jul 23, 2017

Oh, a choco install -y yarn -version 0.27.5 would also install Node.js choco package. This approach becomes more and more complicated.
Downloading the MSI manually I can't find a checksum or GPG signature.

Should we ask the Yarn team to provide a GPG signature for the MSI package?

@StefanScherer
Copy link
Author

StefanScherer commented Jul 23, 2017

@yhwang Don't worry. Adding AppVeyor CI would help testing further pull requests for the Windows images. I have added an appveyor.yml and also activated it for my fork to build each commit. The output of this PR build on AppVeyor can be found here and does verify the build of all Windows images and a simple test, just like in the test-build.sh.

Think of AppVeyor = Travis, but for Windows :-)

@SimenB
Copy link
Member

SimenB commented Jul 23, 2017

Do we need to use the msi? Why not just download the JS file (that's what the other images do, right?)?

/Cc @Daniel15 as he has done lots of work on yarn packaging (and use Windows!)

@StefanScherer
Copy link
Author

StefanScherer commented Jul 23, 2017

I thought about npm install -g yarn@$env:YARN_VERSION but this is not recommended as noted in https://yarnpkg.com/en/docs/install#alternatives-tab.
The Linux images download the .tar.gz + GPG signature .tar.gz.asc and verify the download with it.

@SimenB
Copy link
Member

SimenB commented Jul 23, 2017

The Linux images download the .tar.gz + GPG signature .tar.gz.asc and verify the download with it.

Why can't we do the same for windows? AFAIK there are no native dependencies, it should be pure JS

@StefanScherer
Copy link
Author

StefanScherer commented Jul 23, 2017

@SimenB Good idea. Yes, even the .tar.gz has the yarn.cmd which is needed on Windows.

root@b77d7633e398:/# ls -l /opt/yarn/bin/
total 20
-rwxr-xr-x 1 node node 868 Jun 30 23:28 yarn
-rw-r--r-- 1 node node  34 Jun 30 23:28 yarn.cmd
-rwxr-xr-x 1 node node 177 Jun 30 23:28 yarn.js
-rwxr-xr-x 1 node node  42 Jun 30 23:28 yarnpkg
-rw-r--r-- 1 node node  30 Jun 30 23:28 yarnpkg.cmd
@StefanScherer
Copy link
Author

StefanScherer commented Jul 23, 2017

Still not so easy, I need 7-Zip to extract the .tar.gz 😂

@StefanScherer
Copy link
Author

StefanScherer commented Aug 3, 2017

Hm, trying to make atomic multi-line RUN instructions with installing gpg, using it, removing it seems a nightmare to me. It won't work very well. And having no nanoserver based Node.js image is also not very useful as it forces Windows 10 users downloading the fat windowsservercore image which gives a bad experience.
So I suggest to wait for multi-stage builds.

@SimenB
Copy link
Member

SimenB commented Aug 9, 2017

So I suggest to wait for multi-stage builds.

If you think having no windows images is better than somewhat heftier images, that's perfectly fine. 🙂 We're gonna rewrite the other images once we can use multi-stage later though, so we'll circle back to it either way

@StefanScherer
Copy link
Author

StefanScherer commented Dec 19, 2017

Oh we're coming closer to nanoserver images without a multi-stage build. tar + curl will be part of next nanoserver images ( https://blogs.technet.microsoft.com/virtualization/2017/12/19/tar-and-curl-come-to-windows/ ). So we only have to convince that yarn should be shipped as tar or zip instead of an msi and have the gpg binary.

@SimenB
Copy link
Member

SimenB commented Dec 19, 2017

We just download a tarball for linux, why not windows (as long as we check the signature)?

(I might have forgotten some reasons why since summer, but I'd love to land this)

@Daniel15
Copy link

Daniel15 commented Dec 19, 2017

Yarn has no native dependencies, so the same tarball works on both Linux and Windows. The installer contains the exact same files as the tarball, it just does some extra config (adds Yarn to the system path) and is Authenticode signed.

@StefanScherer
Copy link
Author

StefanScherer commented Dec 19, 2017

I will review nanoserver + yarn once the new nanoserver-insider:17063 are available. Today's announcement was only for Windows 10.

@fkorotkov
Copy link

fkorotkov commented Feb 21, 2018

Thank you for working on node images! It's a great help for the whole community.

I've noticed that taskkill command is missing inside nano images. taskkill is pretty crucial for some application since Node's process.kill not quite working with windows processes and community uses taskkill on win32 platform.

I was wondering if we can include taskkill by default with these images?

@v-karbovnichy
Copy link

v-karbovnichy commented Mar 3, 2018

Anyone, any news on this?

@StefanScherer
Copy link
Author

StefanScherer commented Mar 10, 2018

We will see new Docker images with next semi-annual Windows Server 1803(?) in the next few weeks. These have curl and tar preinstalled, both in windowsservercore and nanoserver. NanoServer image comes without PowerShell.

With these two binaries it would be possible to download and extract eg. node-v8.10.0-win-x64.zip and the yarn.tar.gz. But in NanoServer we still have no sha checksum tool and also the GPG binaries I use are 32bit, so they won't work in NanoServer.

To produce NanoServer based images we still depend on multi-stage builds.

The Windows Server Core based images have the disadvantage that you maybe have to download a really fat Windows Update layer if your Windows Server does not have the correct base image already pulled.
Let's say your Windows Server has microsoft/windowsservercore:10.0.14393.2007 already pulled but the node image uses the newer (or older) microsoft/windowsservercore:10.0.14393.2068 you have to pull 1.3 GByte update layer which is really annoying. With the microsoft/windowsservercore:1709 images it's better, but an update layer is still 740 MByte. With Windows update layers every month this really is an issue if you want to switch from one Node version to another (using a new Windows base image).
The effect with microsoft/nanoserver:1709 is much much better, with an update layer of about 45 MByte extra download cost. And the 1803 update layers will be even smaller.

So I'm really looking forward to use multi-stage builds for the Windows Dockerfiles. :-)

@JustinBeckwith
Copy link

JustinBeckwith commented May 6, 2019

I know this issue has been floating around for a while, but we're really excited to see something like this land :) Anything we can do to help?

@SimenB
Copy link
Member

SimenB commented Jun 28, 2019

docker-library/official-images#5929 has landed, so we should be able to use multi-staged builds now. @StefanScherer wanna refresh this?

@StefanScherer
Copy link
Author

StefanScherer commented Jun 28, 2019

Thanks @SimenB for the heads-up. That are very good news. A lot things changed since then, a lot of base images for different Windows OS versions are available, nanoserver:sac2016 and 1709 is already deprecated.

Do you know if this repo also has access to multiple Windows Server versions? The golang repo uses eg. %%MICROSOFT-TAG%% (update.sh line 116) to create multiple Windows Dockerfiles and to build images for Windows Server 1803, 1809 and 2016 (update.sh line 109-110).

@SimenB
Copy link
Member

SimenB commented Jun 28, 2019

I don't know, maybe @tianon could chime in? 🙂

@PeterDaveHello
Copy link
Member

PeterDaveHello commented Jun 30, 2019

If any other official images can, I believe that we also can, just need help from official image team.

Maybe we can resolve some of the conflicts first?

@LaurentGoderre
Copy link
Contributor

LaurentGoderre commented Jul 3, 2019

The main obstacles at the time was that there was that we were unable to install a GPG tool to validate the download on nanoserver.

@tianon
Copy link
Contributor

tianon commented Jul 3, 2019

I would recommend just ditching PGP verification for Windows -- IMO the added overhead of installing a tool isn't worth the benefit (a SHA256 or similar should be sufficient).

What I'd recommend for getting Nano Server accepted here is to structure this with Windows Server Core variants that Nano Server uses via COPY --from=node:....

See docker-library/openjdk@e4f01b5 for an example of this approach I've just played with over on OpenJDK (although that one will ultimately likely not end up getting published due to https://bugs.openjdk.java.net/browse/JDK-8218486 / https://bugs.openjdk.java.net/browse/JDK-8225425 which still plagues even OpenJDK 13 -- Nano Server really just doesn't seem to be actually supported by OpenJDK, and I'd caution only going forward with Nano Server here if the Node.js community is going to support Nano Server officially).

@Daniel15
Copy link

Daniel15 commented Jul 3, 2019

Do you even need PGP verification on Windows, if you're using Authenticode verification?

@nschonni
Copy link
Member

nschonni commented Jul 4, 2019

I have a version with MSI and Authenticode in #827, but that won't work on nanoserver

@SimenB
Copy link
Member

SimenB commented Jul 4, 2019

I'd caution only going forward with Nano Server here if the Node.js community is going to support Nano Server officially

@nodejs/build is this something you can chime in on?


Regardless of ^, we could start with windowsservercore versions and add nanoserver later if that makes sense?

@mhdawson
Copy link
Member

mhdawson commented Jul 4, 2019

I've not seen any discussion of nanoserver on the Node side and there are no instances in our CI. @joaocgreis is this in your plans at all?

@joaocgreis
Copy link
Member

joaocgreis commented Jul 8, 2019

It might be possible to add Nano Server to CI, we are looking into this.

cc @MichelLopez

@StefanScherer
Copy link
Author

StefanScherer commented Jul 10, 2019

Well, for nanoserver you only need a Windows Server 2016/2019 with Docker engine, then you can run nanoserver containers. There is no nanoserver OS anymore, only as a lightweight container image.

@dmbarry86
Copy link

dmbarry86 commented Jul 27, 2020

What's the latest status with this PR? Doesn't appear to have been any activity for quite a while. I ask because I am looking for exactly this image (node + windowsservercore) for one of our projects.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Linked issues

Successfully merging this pull request may close these issues.

None yet

You can’t perform that action at this time.
X Tutup