docker_image_availability.py 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296
  1. """Check that required Docker images are available."""
  2. import re
  3. from pipes import quote
  4. from ansible.module_utils import six
  5. from openshift_checks import OpenShiftCheck
  6. from openshift_checks.mixins import DockerHostMixin
  7. NODE_IMAGE_SUFFIXES = ["haproxy-router", "docker-registry", "deployer", "pod"]
  8. DEPLOYMENT_IMAGE_INFO = {
  9. "origin": {
  10. "namespace": "openshift",
  11. "name": "origin",
  12. "registry_console_prefix": "cockpit/",
  13. "registry_console_basename": "kubernetes",
  14. "registry_console_default_version": "latest",
  15. },
  16. "openshift-enterprise": {
  17. "namespace": "openshift3",
  18. "name": "ose",
  19. "registry_console_prefix": "openshift3/",
  20. "registry_console_basename": "registry-console",
  21. "registry_console_default_version": "${short_version}",
  22. },
  23. }
  24. class DockerImageAvailability(DockerHostMixin, OpenShiftCheck):
  25. """Check that required Docker images are available.
  26. Determine docker images that an install would require and check that they
  27. are either present in the host's docker index, or available for the host to pull
  28. with known registries as defined in our inventory file (or defaults).
  29. """
  30. name = "docker_image_availability"
  31. tags = ["preflight"]
  32. # we use python-docker-py to check local docker for images, and skopeo
  33. # to look for images available remotely without waiting to pull them.
  34. dependencies = ["python-docker-py", "skopeo"]
  35. # command for checking if remote registries have an image, without docker pull
  36. skopeo_command = "{proxyvars} timeout 10 skopeo inspect --tls-verify={tls} {creds} docker://{registry}/{image}"
  37. skopeo_example_command = "skopeo inspect [--tls-verify=false] [--creds=<user>:<pass>] docker://<registry>/<image>"
  38. def __init__(self, *args, **kwargs):
  39. super(DockerImageAvailability, self).__init__(*args, **kwargs)
  40. self.registries = dict(
  41. # set of registries that need to be checked insecurely (note: not accounting for CIDR entries)
  42. insecure=set(self.ensure_list("openshift_docker_insecure_registries")),
  43. # set of registries that should never be queried even if given in the image
  44. blocked=set(self.ensure_list("openshift_docker_blocked_registries")),
  45. )
  46. # ordered list of registries (according to inventory vars) that docker will try for unscoped images
  47. regs = self.ensure_list("openshift_docker_additional_registries")
  48. # currently one of these registries is added whether the user wants it or not.
  49. deployment_type = self.get_var("openshift_deployment_type", default="")
  50. if deployment_type == "origin" and "docker.io" not in regs:
  51. regs.append("docker.io")
  52. elif deployment_type == 'openshift-enterprise' and "registry.access.redhat.com" not in regs:
  53. regs.append("registry.access.redhat.com")
  54. self.registries["configured"] = regs
  55. # for the oreg_url registry there may be credentials specified
  56. oreg_url = self.get_var("oreg_url", default="")
  57. oreg_url = self.template_var(oreg_url)
  58. components = oreg_url.split('/')
  59. self.registries["oreg"] = "" if len(components) < 3 else components[0]
  60. # Retrieve and template registry credentials, if provided
  61. self.skopeo_command_creds = ""
  62. oreg_auth_user = self.get_var('oreg_auth_user', default='')
  63. oreg_auth_password = self.get_var('oreg_auth_password', default='')
  64. if oreg_auth_user != '' and oreg_auth_password != '':
  65. oreg_auth_user = self.template_var(oreg_auth_user)
  66. oreg_auth_password = self.template_var(oreg_auth_password)
  67. self.skopeo_command_creds = quote("--creds={}:{}".format(oreg_auth_user, oreg_auth_password))
  68. # record whether we could reach a registry or not (and remember results)
  69. self.reachable_registries = {}
  70. # take note of any proxy settings needed
  71. proxies = []
  72. for var in ['http_proxy', 'https_proxy', 'no_proxy']:
  73. # ansible vars are openshift_http_proxy, openshift_https_proxy, openshift_no_proxy
  74. value = self.get_var("openshift_" + var, default=None)
  75. if value:
  76. proxies.append(var.upper() + "=" + quote(self.template_var(value)))
  77. self.skopeo_proxy_vars = " ".join(proxies)
  78. def is_active(self):
  79. """Skip hosts with unsupported deployment types."""
  80. deployment_type = self.get_var("openshift_deployment_type")
  81. has_valid_deployment_type = deployment_type in DEPLOYMENT_IMAGE_INFO
  82. return super(DockerImageAvailability, self).is_active() and has_valid_deployment_type
  83. def run(self):
  84. msg, failed = self.ensure_dependencies()
  85. if failed:
  86. return {
  87. "failed": True,
  88. "msg": "Some dependencies are required in order to check Docker image availability.\n" + msg
  89. }
  90. required_images = self.required_images()
  91. missing_images = set(required_images) - set(self.local_images(required_images))
  92. # exit early if all images were found locally
  93. if not missing_images:
  94. return {}
  95. available_images = self.available_images(missing_images)
  96. unavailable_images = set(missing_images) - set(available_images)
  97. if unavailable_images:
  98. unreachable = [reg for reg, reachable in self.reachable_registries.items() if not reachable]
  99. unreachable_msg = "Failed connecting to: {}\n".format(", ".join(unreachable))
  100. blocked_msg = "Blocked registries: {}\n".format(", ".join(self.registries["blocked"]))
  101. msg = (
  102. "One or more required container images are not available:\n {missing}\n"
  103. "Checked with: {cmd}\n"
  104. "Default registries searched: {registries}\n"
  105. "{blocked}"
  106. "{unreachable}"
  107. ).format(
  108. missing=",\n ".join(sorted(unavailable_images)),
  109. cmd=self.skopeo_example_command,
  110. registries=", ".join(self.registries["configured"]),
  111. blocked=blocked_msg if self.registries["blocked"] else "",
  112. unreachable=unreachable_msg if unreachable else "",
  113. )
  114. return dict(failed=True, msg=msg)
  115. return {}
  116. def required_images(self):
  117. """
  118. Determine which images we expect to need for this host.
  119. Returns: a set of required images like 'openshift/origin:v3.6'
  120. The thorny issue of determining the image names from the variables is under consideration
  121. via https://github.com/openshift/openshift-ansible/issues/4415
  122. For now we operate as follows:
  123. * For containerized components (master, node, ...) we look at the deployment type and
  124. use openshift/origin or openshift3/ose as the base for those component images. The
  125. version is openshift_image_tag as determined by the openshift_version role.
  126. * For OpenShift-managed infrastructure (router, registry...) we use oreg_url if
  127. it is defined; otherwise we again use the base that depends on the deployment type.
  128. Registry is not included in constructed images. It may be in oreg_url or etcd image.
  129. """
  130. required = set()
  131. deployment_type = self.get_var("openshift_deployment_type")
  132. host_groups = self.get_var("group_names")
  133. # containerized etcd may not have openshift_image_tag, see bz 1466622
  134. image_tag = self.get_var("openshift_image_tag", default="latest")
  135. image_info = DEPLOYMENT_IMAGE_INFO[deployment_type]
  136. # template for images that run on top of OpenShift
  137. image_url = "{}/{}-{}:{}".format(image_info["namespace"], image_info["name"], "${component}", "${version}")
  138. image_url = self.get_var("oreg_url", default="") or image_url
  139. image_url = self.template_var(image_url)
  140. if 'oo_nodes_to_config' in host_groups:
  141. for suffix in NODE_IMAGE_SUFFIXES:
  142. required.add(image_url.replace("${component}", suffix).replace("${version}", image_tag))
  143. if self.get_var("osm_use_cockpit", default=True, convert=bool):
  144. required.add(self._registry_console_image(image_tag, image_info))
  145. # images for containerized components
  146. def add_var_or_default_img(var_name, comp_name):
  147. """Returns: default image from comp_name, overridden by var_name in task_vars"""
  148. default = "{}/{}:{}".format(image_info["namespace"], comp_name, image_tag)
  149. required.add(self.template_var(self.get_var(var_name, default=default)))
  150. if self.get_var("openshift_is_containerized", convert=bool):
  151. if 'oo_nodes_to_config' in host_groups:
  152. add_var_or_default_img("osn_image", "node")
  153. add_var_or_default_img("osn_ovs_image", "openvswitch")
  154. if 'oo_masters_to_config' in host_groups: # name is "origin" or "ose"
  155. add_var_or_default_img("osm_image", image_info["name"])
  156. if 'oo_etcd_to_config' in host_groups:
  157. # special case, note default is the same for origin/enterprise and has no image tag
  158. etcd_img = self.get_var("osm_etcd_image", default="registry.access.redhat.com/rhel7/etcd")
  159. required.add(self.template_var(etcd_img))
  160. return required
  161. def _registry_console_image(self, image_tag, image_info):
  162. """Returns image with logic to parallel what happens with the registry-console template."""
  163. # The registry-console is for some reason not prefixed with ose- like the other components.
  164. # Nor is it versioned the same. Also a completely different name is used for Origin.
  165. prefix = self.get_var(
  166. "openshift_cockpit_deployer_prefix",
  167. default=image_info["registry_console_prefix"],
  168. )
  169. basename = self.get_var(
  170. "openshift_cockpit_deployer_basename",
  171. default=image_info["registry_console_basename"],
  172. )
  173. # enterprise template just uses v3.6, v3.7, etc
  174. match = re.match(r'v\d+\.\d+', image_tag)
  175. short_version = match.group() if match else image_tag
  176. version = image_info["registry_console_default_version"].replace("${short_version}", short_version)
  177. version = self.get_var("openshift_cockpit_deployer_version", default=version)
  178. return prefix + basename + ':' + version
  179. def local_images(self, images):
  180. """Filter a list of images and return those available locally."""
  181. found_images = []
  182. for image in images:
  183. # docker could have the image name as-is or prefixed with any registry
  184. imglist = [image] + [reg + "/" + image for reg in self.registries["configured"]]
  185. if self.is_image_local(imglist):
  186. found_images.append(image)
  187. return found_images
  188. def is_image_local(self, image):
  189. """Check if image is already in local docker index."""
  190. result = self.execute_module("docker_image_facts", {"name": image})
  191. return bool(result.get("images")) and not result.get("failed")
  192. def ensure_list(self, registry_param):
  193. """Return the task var as a list."""
  194. # https://bugzilla.redhat.com/show_bug.cgi?id=1497274
  195. # If the result was a string type, place it into a list. We must do this
  196. # as using list() on a string will split the string into its characters.
  197. # Otherwise cast to a list as was done previously.
  198. registry = self.get_var(registry_param, default=[])
  199. if not isinstance(registry, six.string_types):
  200. return list(registry)
  201. return self.normalize(registry)
  202. def available_images(self, images):
  203. """Search remotely for images. Returns: list of images found."""
  204. return [
  205. image for image in images
  206. if self.is_available_skopeo_image(image)
  207. ]
  208. def is_available_skopeo_image(self, image):
  209. """Use Skopeo to determine if required image exists in known registry(s)."""
  210. registries = self.registries["configured"]
  211. # If image already includes a registry, only use that.
  212. # NOTE: This logic would incorrectly identify images that do not use a namespace, e.g.
  213. # registry.access.redhat.com/rhel7 as if the registry were a namespace.
  214. # It's not clear that there's any way to distinguish them, but fortunately
  215. # the current set of images all look like [registry/]namespace/name[:version].
  216. if image.count("/") > 1:
  217. registry, image = image.split("/", 1)
  218. registries = [registry]
  219. for registry in registries:
  220. if registry in self.registries["blocked"]:
  221. continue # blocked will never be consulted
  222. if registry not in self.reachable_registries:
  223. self.reachable_registries[registry] = self.connect_to_registry(registry)
  224. if not self.reachable_registries[registry]:
  225. continue # do not keep trying unreachable registries
  226. args = dict(
  227. proxyvars=self.skopeo_proxy_vars,
  228. tls="false" if registry in self.registries["insecure"] else "true",
  229. creds=self.skopeo_command_creds if registry == self.registries["oreg"] else "",
  230. registry=quote(registry),
  231. image=quote(image),
  232. )
  233. result = self.execute_module_with_retries("command", {
  234. "_uses_shell": True,
  235. "_raw_params": self.skopeo_command.format(**args),
  236. })
  237. if result.get("rc", 0) == 0 and not result.get("failed"):
  238. return True
  239. if result.get("rc") == 124: # RC 124 == timed out; mark unreachable
  240. self.reachable_registries[registry] = False
  241. return False
  242. def connect_to_registry(self, registry):
  243. """Use ansible wait_for module to test connectivity from host to registry. Returns bool."""
  244. if self.skopeo_proxy_vars != "":
  245. # assume we can't connect directly; just waive the test
  246. return True
  247. # test a simple TCP connection
  248. host, _, port = registry.partition(":")
  249. port = port or 443
  250. args = dict(host=host, port=port, state="started", timeout=30)
  251. result = self.execute_module("wait_for", args)
  252. return result.get("rc", 0) == 0 and not result.get("failed")