Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add install support for binary images #2518

Merged
merged 2 commits into from
Aug 3, 2018

Conversation

crosbymichael
Copy link
Member

@crosbymichael crosbymichael commented Aug 1, 2018

This adds a way for users to programatically install containerd binary
dependencies.

With runtime v2 and new shim's being built, it will be a challenge to
get those onto machines. Users would have to find the link, download,
place it in their path, yada yada yada.

With this functionality of a managed /opt directory, containerd can
use existing image and distribution infra. to get binarys, shims, etc
onto the system.

Configuration:

default: /opt/containerd

containerd config:

[plugins.opt]
	path = "/opt/mypath"

Usage:

code:

image, err := client.Pull(ctx, "docker.io/crosbymichael/runc:latest")
client.Install(ctx, image)

ctr:

ctr content fetch docker.io/crosbymichael/runc:latest
ctr install docker.io/crosbymichael/runc:latest

You can manage versions and see what is running via standard image
commands.

Images:

These images MUST be small and only contain binaries.

FROM scratch
Add runc /bin/runc

Containerd will only extract files in /bin of the image by default, Opts can be added to replace or install libs/.

The code adds a service to manage an /opt/containerd directory and
provide that path to callers via the introspection service.

How to Test:

Delete runc from your system.

> sudo ctr run --rm  docker.io/library/redis:alpine redis
ctr: OCI runtime create failed: unable to retrieve OCI runtime error (open /run/containerd/io.containerd.runtime.v1.linux/default/redis/log.json: no such file or directory): exec: "runc": executable file not found in $PATH: unknown

> sudo ctr content fetch docker.io/crosbymichael/runc:latest
> sudo ctr  install docker.io/crosbymichael/runc:latest

> sudo ctr run --rm  docker.io/library/redis:alpine redis
1:C 01 Aug 15:59:52.864 # oO0OoO0OoO0Oo Redis is starting oO0OoO0OoO0Oo
1:C 01 Aug 15:59:52.864 # Redis version=4.0.10, bits=64, commit=00000000, modified=0, pid=1, just started
1:C 01 Aug 15:59:52.864 # Warning: no config file specified, using the default config. In order to specify a config file use redis-server /path/to/redis.conf
1:M 01 Aug 15:59:52.866 # You requested maxclients of 10000 requiring at least 10032 max file descriptors.
1:M 01 Aug 15:59:52.866 # Server can't set maximum open files to 10032 because of OS error: Operation not permitted.
1:M 01 Aug 15:59:52.866 # Current maximum open files is 1024. maxclients has been reduced to 992 to compensate for low ulimit. If you need higher maxclients increase 'ulimit -n'.
1:M 01 Aug 15:59:52.870 * Running mode=standalone, port=6379.
1:M 01 Aug 15:59:52.870 # WARNING: The TCP backlog setting of 511 cannot be enforced because /proc/sys/net/core/somaxconn is set to the lower value of 128.
1:M 01 Aug 15:59:52.870 # Server initialized
1:M 01 Aug 15:59:52.870 # WARNING overcommit_memory is set to 0! Background save may fail under low memory condition. To fix this issue add 'vm.overcommit_memory = 1' to /etc/sysctl.conf and then reboot or run the command 'sysctl vm.overcommit_memory=1' for this to take effect.
1:M 01 Aug 15:59:52.870 # WARNING you have Transparent Huge Pages (THP) support enabled in your kernel. This will create latency and memory usage issues with Redis. To fix this issue run the command 'echo never > /sys/kernel/mm/transparent_hugepage/enabled' as root, and add it to your /etc/rc.local in order to retain the setting after a reboot. Redis must be restarted after THP is disabled.
1:M 01 Aug 15:59:52.870 * Ready to accept connections
^C1:signal-handler (1533139193) Received SIGINT scheduling shutdown...
1:M 01 Aug 15:59:53.472 # User requested shutdown...
1:M 01 Aug 15:59:53.472 * Saving the final RDB snapshot before exiting.
1:M 01 Aug 15:59:53.484 * DB saved on disk
1:M 01 Aug 15:59:53.484 # Redis is now ready to exit, bye bye...

Signed-off-by: Evan Hazlett [email protected]
Signed-off-by: Michael Crosby [email protected]

@codecov-io
Copy link

codecov-io commented Aug 1, 2018

Codecov Report

Merging #2518 into master will decrease coverage by 0.01%.
The diff coverage is 37.5%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #2518      +/-   ##
==========================================
- Coverage   45.07%   45.05%   -0.02%     
==========================================
  Files          93       94       +1     
  Lines        9780     9796      +16     
==========================================
+ Hits         4408     4414       +6     
- Misses       4654     4662       +8     
- Partials      718      720       +2
Flag Coverage Δ
#linux 49.08% <38.46%> (-0.02%) ⬇️
#windows 41.57% <37.5%> (-0.01%) ⬇️
Impacted Files Coverage Δ
archive/tar_opts_windows.go 0% <ø> (ø) ⬆️
archive/tar_opts.go 28.57% <28.57%> (ø)
archive/tar.go 43.13% <44.44%> (+0.02%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 9ca687b...5a47c5e. Read the comment docs.

Copy link
Contributor

@seemethere seemethere left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Type: plugin.InternalPlugin,
ID: "opt",
Config: &Config{
Path: "/opt/containerd",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we add OS specific defaults i.e. Windows, etc? Although I'm not sure what the default install path is for Windows.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@johnstep can you help us out on how to make this work on windows? The idea is that we modify the daemon's %PATH% to some type of managed directory that we can install binaries to

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure. Is there an expectation that only one containerd will be installed on a given Windows system? In other words, should it be a global directory, or under the containerd root directory? I lean toward the latter.

@mlaventure
Copy link
Contributor

This is cool! :)

Copy link
Contributor

@mlaventure mlaventure left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

func init() {
plugin.Register(&plugin.Registration{
Type: plugin.InternalPlugin,
ID: "opt",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, so we now have an opt plugin to allow introspection of the opt location for binary resolution. Is that how this is working?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yup, it seems like a cleaner way to provide configuration from the daemon to clients

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

and it allows you to disable it in the config as well. our plugin setup is nice

@crosbymichael
Copy link
Member Author

I also have an image docker.io/crosbymichael/checkpoint:latest to install criu on the system with this setup

Copy link
Contributor

@seemethere seemethere left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@dmcgowan
Copy link
Member

dmcgowan commented Aug 1, 2018

LGTM

@thaJeztah
Copy link
Member

This looks really cool!

Curious; how does "replace" work if the binary is running? (thinking of upgrade scenarios etc)

@crosbymichael crosbymichael added this to the 1.2 milestone Aug 1, 2018
@ehazlett
Copy link
Member

ehazlett commented Aug 2, 2018

LGTM

@@ -103,6 +104,7 @@ containerd CLI
run.Command,
snapshots.Command,
tasks.Command,
install.Command,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How about putting this under ctr packages so that we can have ctr packages list/uninstall/update/upgrade

@estesp
Copy link
Member

estesp commented Aug 2, 2018

Do you want to do docs in a different PR or should we add some basic information via this PR? Seems like there are a few corner cases that need a FAQ (like "text busy" type issues that could occur per @thaJeztah's comment) or at least just some clear documentation on expectations.

@Random-Liu
Copy link
Member

This is cool! Good idea. :)

@thaJeztah
Copy link
Member

Seems like there are a few corner cases that need a FAQ (like "text busy" type issues

I wasn't sure if the current implementation is considered "feature complete" or if future enhancements were planned.

I love the simplicity (its elegant), but yes, there may be scenarios that are not covered. OTOH, it should not become over-engineered, over-complicated

ehazlett and others added 2 commits August 2, 2018 17:11
This adds a way for users to programatically install containerd binary
dependencies.

With runtime v2 and new shim's being built, it will be a challenge to
get those onto machines.  Users would have to find the link, download,
place it in their path, yada yada yada.

With this functionality of a managed `/opt` directory, containerd can
use existing image and distribution infra. to get binarys, shims, etc
onto the system.

Configuration:

*default:* `/opt/containerd`

*containerd config:*
```toml
[plugins.opt]
	path = "/opt/mypath"

```

Usage:

*code:*

```go
image, err := client.Pull(ctx, "docker.io/crosbymichael/runc:latest")
client.Install(ctx, image)
```

*ctr:*

```bash
ctr content fetch docker.io/crosbymichael/runc:latest
ctr install docker.io/crosbymichael/runc:latest
```

You can manage versions and see what is running via standard image
commands.

Images:

These images MUST be small and only contain binaries.

```Dockerfile
FROM scratch
Add runc /bin/runc
```

Containerd will only extract files in `/bin` of the image.

Later on, we can add support for `/lib`.

The code adds a service to manage an `/opt/containerd` directory and
provide that path to callers via the introspection service.

How to Test:

Delete runc from your system.

```bash
> sudo ctr run --rm  docker.io/library/redis:alpine redis
ctr: OCI runtime create failed: unable to retrieve OCI runtime error (open /run/containerd/io.containerd.runtime.v1.linux/default/redis/log.json: no such file or directory): exec: "runc": executable file not found in $PATH: unknown

> sudo ctr content fetch docker.io/crosbymichael/runc:latest
> sudo ctr  install docker.io/crosbymichael/runc:latest

> sudo ctr run --rm  docker.io/library/redis:alpine redis
1:C 01 Aug 15:59:52.864 # oO0OoO0OoO0Oo Redis is starting oO0OoO0OoO0Oo
1:C 01 Aug 15:59:52.864 # Redis version=4.0.10, bits=64, commit=00000000, modified=0, pid=1, just started
1:C 01 Aug 15:59:52.864 # Warning: no config file specified, using the default config. In order to specify a config file use redis-server /path/to/redis.conf
1:M 01 Aug 15:59:52.866 # You requested maxclients of 10000 requiring at least 10032 max file descriptors.
1:M 01 Aug 15:59:52.866 # Server can't set maximum open files to 10032 because of OS error: Operation not permitted.
1:M 01 Aug 15:59:52.866 # Current maximum open files is 1024. maxclients has been reduced to 992 to compensate for low ulimit. If you need higher maxclients increase 'ulimit -n'.
1:M 01 Aug 15:59:52.870 * Running mode=standalone, port=6379.
1:M 01 Aug 15:59:52.870 # WARNING: The TCP backlog setting of 511 cannot be enforced because /proc/sys/net/core/somaxconn is set to the lower value of 128.
1:M 01 Aug 15:59:52.870 # Server initialized
1:M 01 Aug 15:59:52.870 # WARNING overcommit_memory is set to 0! Background save may fail under low memory condition. To fix this issue add 'vm.overcommit_memory = 1' to /etc/sysctl.conf and then reboot or run the command 'sysctl vm.overcommit_memory=1' for this to take effect.
1:M 01 Aug 15:59:52.870 # WARNING you have Transparent Huge Pages (THP) support enabled in your kernel. This will create latency and memory usage issues with Redis. To fix this issue run the command 'echo never > /sys/kernel/mm/transparent_hugepage/enabled' as root, and add it to your /etc/rc.local in order to retain the setting after a reboot. Redis must be restarted after THP is disabled.
1:M 01 Aug 15:59:52.870 * Ready to accept connections
^C1:signal-handler (1533139193) Received SIGINT scheduling shutdown...
1:M 01 Aug 15:59:53.472 # User requested shutdown...
1:M 01 Aug 15:59:53.472 * Saving the final RDB snapshot before exiting.
1:M 01 Aug 15:59:53.484 * DB saved on disk
1:M 01 Aug 15:59:53.484 # Redis is now ready to exit, bye bye...
```

Signed-off-by: Evan Hazlett <[email protected]>
Signed-off-by: Michael Crosby <[email protected]>
Some images like `criu` will have extra libs that it requires.  This
adds lib support via LD_LIBRARY_PATH and InstallOpts

Signed-off-by: Michael Crosby <[email protected]>
@crosbymichael
Copy link
Member Author

There is no issues replacing the binaries when they are running

Copy link
Member

@estesp estesp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM; we can handle docs in another PR

@estesp estesp merged commit 2783a19 into containerd:master Aug 3, 2018
@crosbymichael crosbymichael deleted the install branch August 3, 2018 14:19
@crosbymichael
Copy link
Member Author

What type of docs are we thinking? I was going to add release notes for it but I can add other things.

@estesp
Copy link
Member

estesp commented Aug 3, 2018

I think just a simple example somewhere in our markdown docs that shows usage via both the API and the ctr install cli is enough; but without it mentioned anywhere I don't know how someone would know it exists as a feature.

@crosbymichael
Copy link
Member Author

Is the PR description/commit message good enough to port over?

@thaJeztah
Copy link
Member

(PR description with some tweaking looks good to me)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.