专属域名
文档搜索
轩辕助手
Run助手
邀请有礼
返回顶部
快速返回页面顶部
收起
收起工具栏

atlassian/bamboo-server Docker 镜像 - 轩辕镜像

bamboo-server
atlassian/bamboo-server
自动构建
Atlassian Bamboo Server Docker镜像提供企业级持续集成与持续部署(CI/CD)服务,用于自动化软件构建、测试和部署流程,支持团队协作与多环境管理,助力高效交付软件项目。
81 收藏0 次下载activeatlassian镜像
🚀专业版镜像服务,面向生产环境设计
版本下载
🚀专业版镜像服务,面向生产环境设计

!Atlassian Bamboo

Bamboo is a continuous integration and deployment tool that ties automated builds, tests and releases together in a single workflow.

Learn more about Bamboo: [***]

Contents

[TOC]

Overview

This Docker container makes it easy to get an instance of Bamboo up and running.

This Docker image is published as both atlassian/bamboo and atlassian/bamboo-server. These are the same image, but the -server version is deprecated and only kept for backwards-compatibility; for new installations it is recommended to use the shorter name.

NOTE: ** Use docker version >= 20.10.10 **

Quick Start

For the BAMBOO_HOME directory that is used to store the repository data (amongst other things) we recommend mounting a host directory as a data volume, or via a named volume.

Additionally, if running Bamboo in Data Center mode it is required that a shared filesystem is mounted.

To get started you can use a data volume, or named volumes. In this example we'll use named volumes.

$> docker volume create --name bambooVolume
$> docker run -v bambooVolume:/var/atlassian/application-data/bamboo --name="bamboo" -d -p 8085:8085 -p 54663:54663 atlassian/bamboo

Success. Bamboo is now available on http://localhost:8085*

Please ensure your container has the necessary resources allocated to it. We recommend 2GiB of memory allocated to accommodate the application server. See System Requirements for further information.

* Note: If you are using docker-machine on Mac OS X, please use open [***] ip default):8085 instead.

Memory / Heap Size

If you need to override Bamboo's default memory allocation, you can control the minimum heap (Xms) and maximum heap (Xmx) via the below environment variables.

  • JVM_MINIMUM_MEMORY (default: 512m)

    The minimum heap size of the JVM

  • JVM_MAXIMUM_MEMORY (default: 1024m)

    The maximum heap size of the JVM

Tomcat and Reverse Proxy Settings

If Bamboo is run behind a reverse proxy server as described here, then you need to specify extra options to make Bamboo aware of the setup. They can be controlled via the below environment variables.

  • ATL_PROXY_NAME (default: NONE)

    The reverse proxy's fully qualified hostname. CATALINA_CONNECTOR_PROXYNAME is also supported for backwards compatability.

  • ATL_PROXY_PORT (default: NONE)

    The reverse proxy's port number via which Bamboo is accessed. CATALINA_CONNECTOR_PROXYPORT is also supported for backwards compatability.

  • ATL_TOMCAT_PORT (default: 8085)

    The port for Tomcat/Bamboo to listen on. Depending on your container deployment method this port may need to be exposed and published.

  • ATL_TOMCAT_SCHEME (default: http)

    The protocol via which the application is accessed. CATALINA_CONNECTOR_SCHEME is also supported for backwards compatability.

  • ATL_TOMCAT_SECURE (default: false)

    Set 'true' if ATL_TOMCAT_SCHEME is 'https'. CATALINA_CONNECTOR_SECURE is also supported for backwards compatability.

  • ATL_TOMCAT_CONTEXTPATH (default: NONE)

    The context path the application is served over. CATALINA_CONTEXT_PATH is also supported for backwards compatability.

The following Tomcat/Catalina options are also supported. For more information, see [***]

  • ATL_TOMCAT_MGMT_PORT (default: 8007)
  • ATL_TOMCAT_MAXTHREADS (default: 150)
  • ATL_TOMCAT_MINSPARETHREADS (default: 25)
  • ATL_TOMCAT_CONNECTIONTIMEOUT (default: 20000)
  • ATL_TOMCAT_ENABLELOOKUPS (default: false)
  • ATL_TOMCAT_PROTOCOL (default: HTTP/1.1)
  • ATL_TOMCAT_ACCEPTCOUNT (default: 100)

The standard HTTP connectors (NIO, NIO2 and APR/native) settings

  • ATL_TOMCAT_ADDRESS

    For servers with more than one IP address, this attribute specifies which address will be used for listening on the specified port.

  • ATL_TOMCAT_SECRET (default: null)

    Only requests from workers with this secret keyword will be accepted. The default value is null. This attribute must be specified with a non-null, non-zero length value unless secretRequired is explicitly configured to be false. If this attribute is configured with a non-null, non-zero length value then the workers must provide a matching value else the request will be rejected irrespective of the setting of secretRequired.

  • ATL_TOMCAT_SECRET_REQUIRED (default: false)

    If this attribute is true, the AJP Connector will only start if the secret attribute is configured with a non-null, non-zero length value. This attribute only controls whether the secret attribute is required to be specified for the AJP Connector to start. It does not control whether workers are required to provide the secret. The default value is true. This attribute should only be set to false when the Connector is used on a trusted network.

  • ATL_TOMCAT_BAMBOO_ENCRYPTION_KEY

    File which contains encryption key used for Bamboo-specific connectors.

  • ATL_TOMCAT_SSL_ENABLED

    Use this attribute to enable SSL traffic on a connector.

  • ATL_TOMCAT_SSL_PROTOCOL

    JSSE only. The SSL protocol(s) to use (a single value may enable multiple protocols

    • see the JVM documentation for details).
  • ATL_TOMCAT_SSL_CERTIFICATE_FILE

    Name of the file that contains the server certificate. The format is PEM-encoded. Relative paths will be resolved against $CATALINA_BASE.

  • ATL_TOMCAT_SSL_CERTIFICATE_KEY_FILE

    Name of the file that contains the server private key. The format is PEM-encoded. The default value is the value of certificateFile and in this case both certificate and private key have to be in this file (NOT RECOMMENDED). Relative paths will be resolved against $CATALINA_BASE.

  • ATL_TOMCAT_SSL_PASS

    The password used to access the private key associated with the server certificate from the specified file.

  • ATL_TOMCAT_KEYSTORE_FILE

    JSSE only. The pathname of the keystore file where you have stored the server certificate and key to be loaded. By default, the pathname is the file .keystore in the operating system home directory of the user that is running Tomcat.

  • ATL_TOMCAT_KEYSTORE_PASS

    JSSE only. The password to use to access the keystore containing the server's private key and certificate. If not specified, a default of changeit will be used.

  • ATL_TOMCAT_KEY_PASS

    The password used to access the private key associated with the server certificate from the specified file.

  • ATL_TOMCAT_CLIENT_AUTH

    Set to required if you want the SSL stack to require a valid certificate chain from the client before accepting a connection. Set to optional if you want the SSL stack to request a client Certificate, but not fail if one isn't presented. Set to optionalNoCA if you want client certificates to be optional and you don't want Tomcat to check them against the list of trusted CAs. If the TLS provider doesn't support this option (OpenSSL does, JSSE does not) it is treated as if optional was specified. A none value (which is the default) will not require a certificate chain unless the client requests a resource protected by a security constraint that uses CLIENT-CERT authentication.

  • ATL_TOMCAT_TRUSTSTORE_FILE

    JSSE only. The trust store file to use to validate client certificates. The default is the value of the javax.net.ssl.trustStore system property. If neither this attribute nor the default system property is set, no trust store will be configured. Relative paths will be resolved against $CATALINA_BASE. A URL may also be used for this attribute.

  • ATL_TOMCAT_TRUSTSTORE_PASS

    JSSE only. The password to access the trust store. The default is the value of the javax.net.ssl.trustStorePassword system property. If that property is null, no trust store password will be configured. If an invalid trust store password is specified, a warning will be logged and an attempt will be made to access the trust store without a password which will skip validation of the trust store contents.

  • ATL_TOMCAT_COMPRESSION

    Enables HTTP compression. The acceptable values for the parameter are:

  • off or 0 - disabled compression

  • on - enabled compression

  • force - forces compression in all cases

  • numerical integer value, e.g. 100 - which is equivalent to on, but specifies the minimum amount of data before the output is compressed. If the content length is not known and compression is set to on or more aggressive, the output will also be compressed.

    If not specified, compression will remain disabled.

  • ATL_TOMCAT_COMPRESSIBLEMIMETYPE

    A comma-separated list of MIME types for which HTTP compression may be used. Only applicable if ATL_TOMCAT_COMPRESSION is set to on or force. If not specified, this attribute defaults to text/html,text/xml,text/plain,text/css,text/javascript,application/javascript,application/json,application/xml.

  • ATL_TOMCAT_COMPRESSIONMINSIZE

    The minimum amount of data before the output is compressed. Only applicable if ATL_TOMCAT_COMPRESSION is set to on or force. If not specified, this attribute defaults to 2048.

  • ATL_TOMCAT_REQUESTATTRIBUTESENABLED

    Checks for the existence of request attributes (typically set by the RemoteIpValve and similar) that should be used to override the values returned by the request for remote address, remote host, server port and protocol. This property is usually combined with ATL_TOMCAT_TRUSTEDPROXIES and ATL_TOMCAT_INTERNALPROXIES to show IP address of the remote host instead of the load ***'s. If not declared, the default value of false will be used.

  • ATL_TOMCAT_TRUSTEDPROXIES

    A list of IP addresses separated by a pipe character e.g. 10.0.9.6|10.0.9.32.
    Trusted proxies that appear in the remoteIpHeader will be trusted and will appear in the proxiesHeader value. By adding a list of Trusted Proxies, Bamboo will remove the load ***s' IP addresses from Bamboo's view of the incoming connection. This could be desired in a clustered load *** architecture where the load *** address changes depending on which node proxies the connection, requiring re-approval of Agents. If not specified, no trusted proxies will be trusted.

  • ATL_TOMCAT_INTERNALPROXIES

    A list of IP addresses separated by a pipe character e.g. 10.0.9.6|10.0.9.32.
    Trusted proxies that appear in the remoteIpHeader will be trusted and will not appear in the proxiesHeader value. By adding a list of Internal Proxies, Bamboo will remove the load ***s' IP addresses from Bamboo's view of the incoming connection. This could be desired in a clustered load *** architecture where the load *** address changes depending on which node proxies the connection, requiring re-approval of Agents. If not specified, no internal proxies will be trusted.

Access Log Settings

You can set the maximum number of days for access logs to be retained before being deleted. The default value of -1 means never delete old files.

  • ATL_TOMCAT_ACCESS_LOGS_MAXDAYS (default: -1)

JVM configuration

If you need to pass additional JVM arguments to Bamboo, such as specifying a custom trust store, you can add them via the below environment variable

  • JVM_SUPPORT_RECOMMENDED_ARGS

    Additional JVM arguments for Bamboo

Example:

$> docker run -e JVM_SUPPORT_RECOMMENDED_ARGS=-Djavax.net.ssl.trustStore=/var/atlassian/application-data/bamboo/cacerts -v bambooVolume:/var/atlassian/application-data/bamboo --name="bamboo" -d -p 8085:8085 -p 54663:54663 atlassian/bamboo

Bamboo-specific settings

  • ATL_AUTOLOGIN_COOKIE_AGE (default: ***; two weeks, in seconds)

    The maximum time a user can remain logged-in with 'Remember Me'.

  • BAMBOO_HOME

    The Bamboo home directory. This may be on an mounted volume; if so it should be writable by the user bamboo. See note below about UID mappings.

  • ATL_BROKER_URI (default: nio://0.0.0.0:54663)

    The ActiveMQ Broker URI to listen on for in-bound remote agent communication.

  • ATL_BROKER_CLIENT_URI

    The ActiveMQ Broker Client URI that remote agents will use to attempt to establish a connection to the ActiveMQ Broker on the Bamboo server.

  • ATL_BAMBOO_SKIP_CONFIG (defaults to False)

    If true skip the generation of bamboo.cfg.xml. This is only really useful for Bamboo versions >= 8.1, which added environment-based configuration (see next section).

Optional configuration pre-seeding

Optionally, for new deployments, the setup flow can be skipped by provided the required values via the environment. NOTE: This only work with Bamboo versions >= 8.1.

  • SECURITY_TOKEN

    The security token to use for server/agent authentication. Additional details are available here

  • ATL_BAMBOO_DISABLE_AGENT_AUTH (default: false)

    Whether to disable agent authentication. Defaults to false.

  • ATL_LICENSE

    The licence to supply. Licenses can be generated at [***]

  • ATL_BASE_URL

    Bamboo instance Base URL.

  • ATL_ADMIN_USERNAME

  • ATL_ADMIN_PASSWORD

  • ATL_ADMIN_FULLNAME

  • ATL_ADMIN_EMAIL

The admin details and credentials.

  • ATL_IMPORT_OPTION

    Import data from backup file during setup. Default value is 'clean' which skip import step and create Bamboo home from scratch. If value is 'import' then ATL_IMPORT_PATH should contain path to backup archive.

  • ATL_IMPORT_PATH

    Full path to backup archive.

Database configuration

It is optionally possible to configure the database from the environment, which will pre-fill it for the installation wizard. The password cannot be pre-filled.

The following variables are all must all be supplied if using this feature:

  • ATL_JDBC_URL

    The database URL; this is database-specific.

  • ATL_JDBC_USER

    The database user to connect as.

  • ATL_JDBC_PASSWORD

    The database user password to connect with.

  • ATL_DB_TYPE

    The type of database; valid supported values are:

    • h2 - for evaluation needs only
    • mssql
    • mysql
    • oracle12c
    • postgresql

Note: Due to licensing restrictions Bamboo does not ship with a MySQL or Oracle JDBC drivers (since Bamboo 7.0). To use these databases you will need to copy a suitable driver into the container and restart it. For example, to copy the MySQL driver into a container named "bamboo", you would do the following:

docker cp mysql-connector-java.x.y.z.jar bambooo:/opt/atlassian/bamboo/lib
docker restart bamboo
Optional database settings

The following variables are for the database connection pool, and are optional.

  • ATL_DB_POOLMINSIZE (default: 3)
  • ATL_DB_POOLMAXSIZE (default: 170)
  • ATL_DB_TIMEOUT (default: ***)
  • ATL_DB_CONNECTIONTIMEOUT (default: 30000)
  • ATL_DB_LEAKDETECTION (default: 0 / disabled)

Container Configuration

  • ATL_FORCE_CFG_UPDATE (default: false)

    The Docker entrypoint generates application configuration on first start; not all of these files are regenerated on subsequent starts. This is deliberate, to avoid race conditions or overwriting manual changes during restarts and upgrades. However in deployments where configuration is purely specified through the environment (e.g. Kubernetes) this behaviour may be undesirable; this flag forces an update of all generated files.

    In Bamboo the affected files are: unattended-setup.properties, bamboo.cfg.xml

    See the entrypoint code for the details of how configuration files are generated.

  • ATL_ALLOWLIST_SENSITIVE_ENV_VARS

    WARNING: When using this property, the values to sensitive environment variables will be available in clear text on the host OS. As such, this data may be exposed to users or processes running on the host OS.

    Define a comma separated list of environment variables containing keywords 'PASS', 'SECRET' or 'TOKEN' to be ignored by the unset function which is executed in the entrypoint. The function uses ^ regex. For example, if you set ATL_ALLOWLIST_SENSITIVE_ENV_VARS="PATH_TO_SECRET_FILE", all variables starting with PATH_TO_SECRET_FILE will not be unset.

  • SET_PERMISSIONS (default: true)

    Define whether to set home directory permissions on startup. Set to false to disable this behaviour.

File system permissions and user IDs

By default the Bamboo application runs as the user bamboo, with a UID and GID of 2005. Bamboo this UID must have write access to the home directory filesystem. If for some reason a different UID must be used, there are a number of options available:

  • The Docker image can be rebuilt with a different UID.
  • Under Linux, the UID can be remapped using user namespace remapping.

Upgrade

To upgrade to a more recent version of Bamboo you can simply stop the bamboo container and start a new one based on a more recent image:

$> docker stop bamboo
$> docker rm bamboo
$> docker run ... (See above)

As your data is stored in the data volume directory on the host it will still be available after the upgrade.

Note: Please make sure that you don't accidentally remove the bamboo container and its volumes using the -v option.

Backup

For evaluations you can use the built-in database that will store its files in the Bamboo home directory. In that case it is sufficient to create a backup archive of the docker volume.

If you're using an external database, you can configure Bamboo to make a backup automatically each night. This will back up the current state, including the database to the bambooVolume docker volume, which can then be archived. Alternatively you can backup the database separately, and continue to create a backup archive of the docker volume to back up the Bamboo Home directory.

Read more about data recovery and backups: [***]

Shutdown

Depending on your configuration Bamboo may take a short period to shutdown any active operations to finish before termination. If sending a docker stop this should be taken into account with the --time flag.

Alternatively, the script /shutdown-wait.sh is provided, which will initiate a clean shutdown and wait for the process to complete. This is the recommended method for shutdown in environments which provide for orderly shutdown, e.g. Kubernetes via the preStop hook.

Versioning

The latest tag matches the most recent release of Atlassian Bamboo. Thus atlassian/bamboo:latest will use the newest version of Bamboo available.

Alternatively you can use a specific major, major.minor, or major.minor.patch version of Bamboo by using a version number tag:

  • atlassian/bamboo:8
  • atlassian/bamboo:8.0
  • atlassian/bamboo:8.0.1

All versions from 8.0+ are available. Legacy builds for older versions are available but are no longer supported.

Supported JDK versions

Bamboo Docker images are JDK 11, and generated from the official Eclipse Temurin OpenJDK Docker images. Starting from Bamboo 9.4 JDK 17 based images are released as well.

The Docker images follow the Atlassian Support end-of-life policy; images for unsupported versions of the products remain available but will no longer receive updates or fixes.

However, Bamboo is an exception to this. Due to the need to support JDK 11 and Kubernetes, we currently only generate new images for Bamboo 8.0 and up. Legacy builds for JDK 8 are still available in Docker Hub, and building custom images is available (see below).

Historically, we have also generated other versions of the images, including JDK 8, Alpine, and 'slim' versions of the JDK. These legacy images still exist in Docker Hub, however they should be considered deprecated, and do not receive updates or fixes.

If for some reason you need a different version, see "Building your own image".

Building your own image

  • Clone the Atlassian repository at [***]
  • Modify or replace the Jinja templates under config; NOTE: The files must have the .j2 extensions. However you don't have to use template variables if you don't wish.
  • Build the new image with e.g: docker build --tag my-bamboo-image --build-arg BAMBOO_VERSION=8.x.x .
  • Optionally push to a registry, and deploy.

Supported architectures

Currently the Atlassian Docker images are built for the linux/amd64 target platform; we do not have other architectures on our roadmap at this point. However the Dockerfiles and support tooling have now had all architecture-specific components removed, so if necessary it is possible to build images for any platform supported by Docker.

Building on the target architecture

The simplest method of getting a platform image is to build it on a target machine; see "Building your own image" above.

Note: This method is known to work on Mac M1 and AWS ARM64 machines, but has not be extensively tested.

Troubleshooting

These images include built-in scripts to assist in performing common JVM diagnostic tasks.

Thread dumps

/opt/atlassian/support/thread-dumps.sh can be run via docker exec to easily trigger the collection of thread dumps from the containerized application. For example:

docker exec my_container /opt/atlassian/support/thread-dumps.sh

By default this script will collect 10 thread dumps at 5 second intervals. This can be overridden by passing a custom value for the count and interval, by using -c / --count and -i / --interval respectively. For example, to collect 20 thread dumps at 3 second intervals:

docker exec my_container /opt/atlassian/support/thread-dumps.sh --count 20 --interval 3

Thread dumps will be written to $APP_HOME/thread_dumps/<date>.

Note: By default this script will also capture output from top run in 'Thread-mode'. This can be disabled by passing -n / --no-top

Heap dump

/opt/atlassian/support/heap-dump.sh can be run via docker exec to easily trigger the collection of a heap dump from the containerized application. For example:

docker exec my_container /opt/atlassian/support/heap-dump.sh

A heap dump will be written to $APP_HOME/heap.bin. If a file already exists at this location, use -f / --force to overwrite the existing heap dump file.

Manual diagnostics

The jcmd utility is also included in these images and can be used by starting a bash shell in the running container:

docker exec -it my_container /bin/bash

Support

For product support, go to support.atlassian.com

You can also visit the Atlassian Data Center on Kubernetes forum for discussion on running Atlassian Data Center products in containers.

Changelog

For a detailed list of changes to the Docker image configuration see the Git commit history.

License

Copyright © 2020 Atlassian Corporation Pty Ltd. Licensed under the Apache License, Version 2.0.

查看更多 bamboo-server 相关镜像 →
atlassian/pipelines-agent logo
atlassian/pipelines-agent
by Atlassian
认证
暂无描述
4100M+ pulls
上次更新:6 年前
atlassian/pipelines-dvcstools logo
atlassian/pipelines-dvcstools
by Atlassian
认证
暂无描述
1100M+ pulls
上次更新:6 年前
atlassian/pipelines-docker-daemon logo
atlassian/pipelines-docker-daemon
by Atlassian
认证
为Bitbucket Pipelines提供Docker-in-Docker能力,支持在CI/CD流程中运行Docker命令以实现镜像构建、推送等操作的工具镜像。
950M+ pulls
上次更新:4 年前
atlassian/confluence-server logo
atlassian/confluence-server
by Atlassian
认证
官方Confluence Server镜像,用于团队创建、组织和讨论工作内容,集中管理知识,避免信息分散于邮件和共享驱动器,提升协作效率,支持项目计划、会议记录等多种场景。
59950M+ pulls
上次更新:1 年前
atlassian/default-image logo
atlassian/default-image
by Atlassian
认证
Bitbucket流水线的默认构建环境,用于支持其构建流程。
8650M+ pulls
上次更新:7 个月前
atlassian/pipelines-auth-proxy logo
atlassian/pipelines-auth-proxy
by Atlassian
认证
作为边车容器,提供Git HTTP(S)代理功能,用于访问bitbucket.org
150M+ pulls
上次更新:5 年前

轩辕镜像配置手册

探索更多轩辕镜像的使用方法,找到最适合您系统的配置方式

登录仓库拉取

通过 Docker 登录认证访问私有仓库

Linux

在 Linux 系统配置镜像服务

Windows/Mac

在 Docker Desktop 配置镜像

Docker Compose

Docker Compose 项目配置

K8s Containerd

Kubernetes 集群配置 Containerd

K3s

K3s 轻量级 Kubernetes 镜像加速

宝塔面板

在宝塔面板一键配置镜像

群晖

Synology 群晖 NAS 配置

飞牛

飞牛 fnOS 系统配置镜像

极空间

极空间 NAS 系统配置服务

爱快路由

爱快 iKuai 路由系统配置

绿联

绿联 NAS 系统配置镜像

威联通

QNAP 威联通 NAS 配置

Podman

Podman 容器引擎配置

Singularity/Apptainer

HPC 科学计算容器配置

其他仓库配置

ghcr、Quay、nvcr 等镜像仓库

专属域名拉取

无需登录使用专属域名

需要其他帮助?请查看我们的 常见问题Docker 镜像访问常见问题解答 或 提交工单

镜像拉取常见问题

轩辕镜像免费版与专业版有什么区别?

免费版仅支持 Docker Hub 访问,不承诺可用性和速度;专业版支持更多镜像源,保证可用性和稳定速度,提供优先客服响应。

轩辕镜像支持哪些镜像仓库?

专业版支持 docker.io、gcr.io、ghcr.io、registry.k8s.io、nvcr.io、quay.io、mcr.microsoft.com、docker.elastic.co 等;免费版仅支持 docker.io。

流量耗尽错误提示

当返回 402 Payment Required 错误时,表示流量已耗尽,需要充值流量包以恢复服务。

410 错误问题

通常由 Docker 版本过低导致,需要升级到 20.x 或更高版本以支持 V2 协议。

manifest unknown 错误

先检查 Docker 版本,版本过低则升级;版本正常则验证镜像信息是否正确。

镜像拉取成功后,如何去掉轩辕镜像域名前缀?

使用 docker tag 命令为镜像打上新标签,去掉域名前缀,使镜像名称更简洁。

查看全部问题→

用户好评

来自真实用户的反馈,见证轩辕镜像的优质服务

oldzhang的头像

oldzhang

运维工程师

Linux服务器

5

"Docker访问体验非常流畅,大镜像也能快速完成下载。"

轩辕镜像
镜像详情
...
atlassian/bamboo-server
官方博客Docker 镜像使用技巧与技术博客
热门镜像查看热门 Docker 镜像推荐
一键安装一键安装 Docker 并配置镜像源
提交工单
免费获取在线技术支持请 提交工单,官方QQ群:13763429 。
轩辕镜像面向开发者与科研用户,提供开源镜像的搜索和访问支持。所有镜像均来源于原始仓库,本站不存储、不修改、不传播任何镜像内容。
免费获取在线技术支持请提交工单,官方QQ群: 。
轩辕镜像面向开发者与科研用户,提供开源镜像的搜索和访问支持。所有镜像均来源于原始仓库,本站不存储、不修改、不传播任何镜像内容。
官方邮箱:点击复制邮箱
©2024-2026 源码跳动
官方邮箱:点击复制邮箱Copyright © 2024-2026 杭州源码跳动科技有限公司. All rights reserved.
轩辕镜像 官方专业版 Logo
轩辕镜像轩辕镜像官方专业版
首页个人中心搜索镜像
交易
充值流量我的订单
工具
提交工单镜像收录一键安装
Npm 源Pip 源Homebrew 源
帮助
常见问题
其他
关于我们网站地图

官方QQ群: 13763429