
This adds a way for users to programatically install containerd binary dependencies. With runtime v2 and new shim's being built, it will be a challenge to get those onto machines. Users would have to find the link, download, place it in their path, yada yada yada. With this functionality of a managed `/opt` directory, containerd can use existing image and distribution infra. to get binarys, shims, etc onto the system. Configuration: *default:* `/opt/containerd` *containerd config:* ```toml [plugins.opt] path = "/opt/mypath" ``` Usage: *code:* ```go image, err := client.Pull(ctx, "docker.io/crosbymichael/runc:latest") client.Install(ctx, image) ``` *ctr:* ```bash ctr content fetch docker.io/crosbymichael/runc:latest ctr install docker.io/crosbymichael/runc:latest ``` You can manage versions and see what is running via standard image commands. Images: These images MUST be small and only contain binaries. ```Dockerfile FROM scratch Add runc /bin/runc ``` Containerd will only extract files in `/bin` of the image. Later on, we can add support for `/lib`. The code adds a service to manage an `/opt/containerd` directory and provide that path to callers via the introspection service. How to Test: Delete runc from your system. ```bash > sudo ctr run --rm docker.io/library/redis:alpine redis ctr: OCI runtime create failed: unable to retrieve OCI runtime error (open /run/containerd/io.containerd.runtime.v1.linux/default/redis/log.json: no such file or directory): exec: "runc": executable file not found in $PATH: unknown > sudo ctr content fetch docker.io/crosbymichael/runc:latest > sudo ctr install docker.io/crosbymichael/runc:latest > sudo ctr run --rm docker.io/library/redis:alpine redis 1:C 01 Aug 15:59:52.864 # oO0OoO0OoO0Oo Redis is starting oO0OoO0OoO0Oo 1:C 01 Aug 15:59:52.864 # Redis version=4.0.10, bits=64, commit=00000000, modified=0, pid=1, just started 1:C 01 Aug 15:59:52.864 # Warning: no config file specified, using the default config. In order to specify a config file use redis-server /path/to/redis.conf 1:M 01 Aug 15:59:52.866 # You requested maxclients of 10000 requiring at least 10032 max file descriptors. 1:M 01 Aug 15:59:52.866 # Server can't set maximum open files to 10032 because of OS error: Operation not permitted. 1:M 01 Aug 15:59:52.866 # Current maximum open files is 1024. maxclients has been reduced to 992 to compensate for low ulimit. If you need higher maxclients increase 'ulimit -n'. 1:M 01 Aug 15:59:52.870 * Running mode=standalone, port=6379. 1:M 01 Aug 15:59:52.870 # WARNING: The TCP backlog setting of 511 cannot be enforced because /proc/sys/net/core/somaxconn is set to the lower value of 128. 1:M 01 Aug 15:59:52.870 # Server initialized 1:M 01 Aug 15:59:52.870 # WARNING overcommit_memory is set to 0! Background save may fail under low memory condition. To fix this issue add 'vm.overcommit_memory = 1' to /etc/sysctl.conf and then reboot or run the command 'sysctl vm.overcommit_memory=1' for this to take effect. 1:M 01 Aug 15:59:52.870 # WARNING you have Transparent Huge Pages (THP) support enabled in your kernel. This will create latency and memory usage issues with Redis. To fix this issue run the command 'echo never > /sys/kernel/mm/transparent_hugepage/enabled' as root, and add it to your /etc/rc.local in order to retain the setting after a reboot. Redis must be restarted after THP is disabled. 1:M 01 Aug 15:59:52.870 * Ready to accept connections ^C1:signal-handler (1533139193) Received SIGINT scheduling shutdown... 1:M 01 Aug 15:59:53.472 # User requested shutdown... 1:M 01 Aug 15:59:53.472 * Saving the final RDB snapshot before exiting. 1:M 01 Aug 15:59:53.484 * DB saved on disk 1:M 01 Aug 15:59:53.484 # Redis is now ready to exit, bye bye... ``` Signed-off-by: Evan Hazlett <ejhazlett@gmail.com> Signed-off-by: Michael Crosby <crosbymichael@gmail.com>
77 lines
2.0 KiB
Go
77 lines
2.0 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package containerd
|
|
|
|
import (
|
|
"archive/tar"
|
|
"context"
|
|
"errors"
|
|
"path/filepath"
|
|
|
|
introspectionapi "github.com/containerd/containerd/api/services/introspection/v1"
|
|
"github.com/containerd/containerd/archive"
|
|
"github.com/containerd/containerd/archive/compression"
|
|
"github.com/containerd/containerd/content"
|
|
"github.com/containerd/containerd/images"
|
|
"github.com/containerd/containerd/platforms"
|
|
)
|
|
|
|
// Install a binary image into the opt service
|
|
func (c *Client) Install(ctx context.Context, image Image) error {
|
|
resp, err := c.IntrospectionService().Plugins(ctx, &introspectionapi.PluginsRequest{
|
|
Filters: []string{
|
|
"id==opt",
|
|
},
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(resp.Plugins) != 1 {
|
|
return errors.New("opt service not enabled")
|
|
}
|
|
path := resp.Plugins[0].Exports["path"]
|
|
if path == "" {
|
|
return errors.New("opt path not exported")
|
|
}
|
|
var (
|
|
cs = image.ContentStore()
|
|
platform = platforms.Default()
|
|
)
|
|
manifest, err := images.Manifest(ctx, cs, image.Target(), platform)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, layer := range manifest.Layers {
|
|
ra, err := cs.ReaderAt(ctx, layer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
cr := content.NewReader(ra)
|
|
r, err := compression.DecompressStream(cr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer r.Close()
|
|
if _, err := archive.Apply(ctx, path, r, archive.WithFilter(func(hdr *tar.Header) bool {
|
|
return filepath.Dir(hdr.Name) == "bin"
|
|
})); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|