add registry authentication
This commit is contained in:
parent
c9b0383859
commit
b0bfb21268
16
README.md
16
README.md
@ -111,6 +111,7 @@ More detailed instructions are in the [`example README.md`](https://github.com/R
|
|||||||
| **cap_add** | []string | no | Add individual capabilities. |
|
| **cap_add** | []string | no | Add individual capabilities. |
|
||||||
| **cap_drop** | []string | no | Drop invidual capabilities. |
|
| **cap_drop** | []string | no | Drop invidual capabilities. |
|
||||||
| **devices** | []string | no | A list of devices to be exposed to the container. |
|
| **devices** | []string | no | A list of devices to be exposed to the container. |
|
||||||
|
| **auth** | block | no | Provide authentication for a private registry. See [Auth](#auth) for more details. |
|
||||||
| **mounts** | []block | no | A list of mounts to be mounted in the container. Volume, bind and tmpfs type mounts are supported. fstab style [`mount options`](https://github.com/containerd/containerd/blob/master/mount/mount_linux.go#L211-L235) are supported. |
|
| **mounts** | []block | no | A list of mounts to be mounted in the container. Volume, bind and tmpfs type mounts are supported. fstab style [`mount options`](https://github.com/containerd/containerd/blob/master/mount/mount_linux.go#L211-L235) are supported. |
|
||||||
|
|
||||||
**Mount block**<br/>
|
**Mount block**<br/>
|
||||||
@ -162,6 +163,21 @@ config {
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### auth
|
||||||
|
|
||||||
|
If you want to pull from a private repository e.g. docker hub, you can specify `username` and `password` in the `auth` stanza. See example below.
|
||||||
|
|
||||||
|
**NOTE**: In the below example, `user` and `pass` are just placeholder values which need to be replaced by actual `username` and `password`, when specifying the credentials.
|
||||||
|
|
||||||
|
```
|
||||||
|
config {
|
||||||
|
auth {
|
||||||
|
username = "user"
|
||||||
|
password = "pass"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
## Networking
|
## Networking
|
||||||
|
|
||||||
`nomad-driver-containerd` supports **host** and **bridge** networks.<br/>
|
`nomad-driver-containerd` supports **host** and **bridge** networks.<br/>
|
||||||
|
@ -28,6 +28,7 @@ import (
|
|||||||
"github.com/containerd/containerd/contrib/seccomp"
|
"github.com/containerd/containerd/contrib/seccomp"
|
||||||
"github.com/containerd/containerd/oci"
|
"github.com/containerd/containerd/oci"
|
||||||
refdocker "github.com/containerd/containerd/reference/docker"
|
refdocker "github.com/containerd/containerd/reference/docker"
|
||||||
|
remotesdocker "github.com/containerd/containerd/remotes/docker"
|
||||||
specs "github.com/opencontainers/runtime-spec/specs-go"
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -61,7 +62,26 @@ func (d *Driver) getContainerdVersion() (containerd.Version, error) {
|
|||||||
return d.client.Version(ctxWithTimeout)
|
return d.client.Version(ctxWithTimeout)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *Driver) pullImage(imageName, imagePullTimeout string) (containerd.Image, error) {
|
type CredentialsOpt func(string) (string, string, error)
|
||||||
|
|
||||||
|
func parshAuth(auth *RegistryAuth) CredentialsOpt {
|
||||||
|
return func(string) (string, string, error) {
|
||||||
|
if auth == nil {
|
||||||
|
return "", "", nil
|
||||||
|
}
|
||||||
|
return auth.Username, auth.Password, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func withResolver(creds CredentialsOpt) containerd.RemoteOpt {
|
||||||
|
resolver := remotesdocker.NewResolver(remotesdocker.ResolverOptions{
|
||||||
|
Hosts: remotesdocker.ConfigureDefaultRegistries(remotesdocker.WithAuthorizer(
|
||||||
|
remotesdocker.NewAuthorizer(nil, creds))),
|
||||||
|
})
|
||||||
|
return containerd.WithResolver(resolver)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *Driver) pullImage(imageName, imagePullTimeout string, auth *RegistryAuth) (containerd.Image, error) {
|
||||||
pullTimeout, err := time.ParseDuration(imagePullTimeout)
|
pullTimeout, err := time.ParseDuration(imagePullTimeout)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("Failed to parse image_pull_timeout: %v", err)
|
return nil, fmt.Errorf("Failed to parse image_pull_timeout: %v", err)
|
||||||
@ -75,7 +95,12 @@ func (d *Driver) pullImage(imageName, imagePullTimeout string) (containerd.Image
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
return d.client.Pull(ctxWithTimeout, named.String(), containerd.WithPullUnpack)
|
pullOpts := []containerd.RemoteOpt{
|
||||||
|
containerd.WithPullUnpack,
|
||||||
|
withResolver(parshAuth(auth)),
|
||||||
|
}
|
||||||
|
|
||||||
|
return d.client.Pull(ctxWithTimeout, named.String(), pullOpts...)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *Driver) createContainer(containerConfig *ContainerConfig, config *TaskConfig) (containerd.Container, error) {
|
func (d *Driver) createContainer(containerConfig *ContainerConfig, config *TaskConfig) (containerd.Container, error) {
|
||||||
|
@ -116,6 +116,10 @@ var (
|
|||||||
"sysctl": hclspec.NewAttr("sysctl", "list(map(string))", false),
|
"sysctl": hclspec.NewAttr("sysctl", "list(map(string))", false),
|
||||||
"readonly_rootfs": hclspec.NewAttr("readonly_rootfs", "bool", false),
|
"readonly_rootfs": hclspec.NewAttr("readonly_rootfs", "bool", false),
|
||||||
"host_network": hclspec.NewAttr("host_network", "bool", false),
|
"host_network": hclspec.NewAttr("host_network", "bool", false),
|
||||||
|
"auth": hclspec.NewBlock("auth", false, hclspec.NewObject(map[string]*hclspec.Spec{
|
||||||
|
"username": hclspec.NewAttr("username", "string", false),
|
||||||
|
"password": hclspec.NewAttr("password", "string", false),
|
||||||
|
})),
|
||||||
"mounts": hclspec.NewBlockList("mounts", hclspec.NewObject(map[string]*hclspec.Spec{
|
"mounts": hclspec.NewBlockList("mounts", hclspec.NewObject(map[string]*hclspec.Spec{
|
||||||
"type": hclspec.NewDefault(
|
"type": hclspec.NewDefault(
|
||||||
hclspec.NewAttr("type", "string", false),
|
hclspec.NewAttr("type", "string", false),
|
||||||
@ -155,6 +159,12 @@ type Mount struct {
|
|||||||
Options []string `codec:"options"`
|
Options []string `codec:"options"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Auth info to pull image from registry.
|
||||||
|
type RegistryAuth struct {
|
||||||
|
Username string `codec:"username"`
|
||||||
|
Password string `codec:"password"`
|
||||||
|
}
|
||||||
|
|
||||||
// TaskConfig contains configuration information for a task that runs with
|
// TaskConfig contains configuration information for a task that runs with
|
||||||
// this plugin
|
// this plugin
|
||||||
type TaskConfig struct {
|
type TaskConfig struct {
|
||||||
@ -177,6 +187,7 @@ type TaskConfig struct {
|
|||||||
Entrypoint []string `codec:"entrypoint"`
|
Entrypoint []string `codec:"entrypoint"`
|
||||||
ReadOnlyRootfs bool `codec:"readonly_rootfs"`
|
ReadOnlyRootfs bool `codec:"readonly_rootfs"`
|
||||||
HostNetwork bool `codec:"host_network"`
|
HostNetwork bool `codec:"host_network"`
|
||||||
|
Auth RegistryAuth `codec:"auth"`
|
||||||
Mounts []Mount `codec:"mounts"`
|
Mounts []Mount `codec:"mounts"`
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -411,7 +422,7 @@ func (d *Driver) StartTask(cfg *drivers.TaskConfig) (*drivers.TaskHandle, *drive
|
|||||||
containerConfig.ContainerName = containerName
|
containerConfig.ContainerName = containerName
|
||||||
|
|
||||||
var err error
|
var err error
|
||||||
containerConfig.Image, err = d.pullImage(driverConfig.Image, driverConfig.ImagePullTimeout)
|
containerConfig.Image, err = d.pullImage(driverConfig.Image, driverConfig.ImagePullTimeout, &driverConfig.Auth)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, fmt.Errorf("Error in pulling image %s: %v", driverConfig.Image, err)
|
return nil, nil, fmt.Errorf("Error in pulling image %s: %v", driverConfig.Image, err)
|
||||||
}
|
}
|
||||||
|
24
example/auth.nomad
Normal file
24
example/auth.nomad
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
job "auth" {
|
||||||
|
datacenters = ["dc1"]
|
||||||
|
|
||||||
|
reschedule {
|
||||||
|
delay = "9s"
|
||||||
|
delay_function = "constant"
|
||||||
|
unlimited = true
|
||||||
|
}
|
||||||
|
|
||||||
|
group "auth-group" {
|
||||||
|
task "auth-task" {
|
||||||
|
driver = "containerd-driver"
|
||||||
|
|
||||||
|
config {
|
||||||
|
image = "shm32/hello-world:private"
|
||||||
|
}
|
||||||
|
|
||||||
|
resources {
|
||||||
|
cpu = 500
|
||||||
|
memory = 256
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
30
tests/009-test-auth.sh
Executable file
30
tests/009-test-auth.sh
Executable file
@ -0,0 +1,30 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
source $SRCDIR/utils.sh
|
||||||
|
|
||||||
|
job_name=auth
|
||||||
|
|
||||||
|
# test auth
|
||||||
|
test_auth_nomad_job() {
|
||||||
|
pushd ~/go/src/github.com/Roblox/nomad-driver-containerd/example
|
||||||
|
|
||||||
|
echo "INFO: Starting nomad $job_name job using nomad-driver-containerd."
|
||||||
|
nomad job run $job_name.nomad
|
||||||
|
|
||||||
|
wait_nomad_job_status $job_name failed
|
||||||
|
|
||||||
|
echo "INFO: Checking can not pull image without auth info."
|
||||||
|
local alloc_id
|
||||||
|
alloc_id=$(nomad job status auth|grep Allocations -A2|tail -n 1 |awk '{print $1}')
|
||||||
|
nomad status "$alloc_id"|grep -q "pull access denied, repository does not exist or may require authorization"
|
||||||
|
if [ $? -ne 0 ];then
|
||||||
|
echo "ERROR: Can not found pull access denied in alloc log."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "INFO: purge nomad ${job_name} job."
|
||||||
|
nomad job stop -purge ${job_name}
|
||||||
|
popd
|
||||||
|
}
|
||||||
|
|
||||||
|
test_auth_nomad_job
|
@ -1,5 +1,24 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
|
wait_nomad_job_status() {
|
||||||
|
local job_name=$1
|
||||||
|
local expected_status="$2"
|
||||||
|
|
||||||
|
local status
|
||||||
|
local i=0
|
||||||
|
while [ $i -lt 5 ]; do
|
||||||
|
status=$(nomad job status $job_name|grep Allocations -A2|tail -n 1 |awk '{print $6}')
|
||||||
|
if [ "$status" == "$expected_status" ]; then
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
sleep 4
|
||||||
|
i=$((i + 1))
|
||||||
|
done
|
||||||
|
|
||||||
|
echo "ERROR: ${job_name} didn't enter $expected_status status. exit 1."
|
||||||
|
exit 1
|
||||||
|
}
|
||||||
|
|
||||||
is_container_active() {
|
is_container_active() {
|
||||||
local job_name=$1
|
local job_name=$1
|
||||||
local is_sleep=$2
|
local is_sleep=$2
|
||||||
|
Loading…
x
Reference in New Issue
Block a user