docker_image_availability.py 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217
  1. """Check that required Docker images are available."""
  2. from ansible.module_utils import six
  3. from openshift_checks import OpenShiftCheck
  4. from openshift_checks.mixins import DockerHostMixin
  5. NODE_IMAGE_SUFFIXES = ["haproxy-router", "docker-registry", "deployer", "pod"]
  6. DEPLOYMENT_IMAGE_INFO = {
  7. "origin": {
  8. "namespace": "openshift",
  9. "name": "origin",
  10. "registry_console_image": "cockpit/kubernetes",
  11. },
  12. "openshift-enterprise": {
  13. "namespace": "openshift3",
  14. "name": "ose",
  15. "registry_console_image": "registry.access.redhat.com/openshift3/registry-console",
  16. },
  17. }
  18. class DockerImageAvailability(DockerHostMixin, OpenShiftCheck):
  19. """Check that required Docker images are available.
  20. Determine docker images that an install would require and check that they
  21. are either present in the host's docker index, or available for the host to pull
  22. with known registries as defined in our inventory file (or defaults).
  23. """
  24. name = "docker_image_availability"
  25. tags = ["preflight"]
  26. # we use python-docker-py to check local docker for images, and skopeo
  27. # to look for images available remotely without waiting to pull them.
  28. dependencies = ["python-docker-py", "skopeo"]
  29. skopeo_img_check_command = "timeout 10 skopeo inspect --tls-verify=false docker://{registry}/{image}"
  30. def __init__(self, *args, **kwargs):
  31. super(DockerImageAvailability, self).__init__(*args, **kwargs)
  32. # record whether we could reach a registry or not (and remember results)
  33. self.reachable_registries = {}
  34. def is_active(self):
  35. """Skip hosts with unsupported deployment types."""
  36. deployment_type = self.get_var("openshift_deployment_type")
  37. has_valid_deployment_type = deployment_type in DEPLOYMENT_IMAGE_INFO
  38. return super(DockerImageAvailability, self).is_active() and has_valid_deployment_type
  39. def run(self):
  40. msg, failed = self.ensure_dependencies()
  41. if failed:
  42. return {
  43. "failed": True,
  44. "msg": "Some dependencies are required in order to check Docker image availability.\n" + msg
  45. }
  46. required_images = self.required_images()
  47. missing_images = set(required_images) - set(self.local_images(required_images))
  48. # exit early if all images were found locally
  49. if not missing_images:
  50. return {}
  51. registries = self.known_docker_registries()
  52. if not registries:
  53. return {"failed": True, "msg": "Unable to retrieve any docker registries."}
  54. available_images = self.available_images(missing_images, registries)
  55. unavailable_images = set(missing_images) - set(available_images)
  56. if unavailable_images:
  57. registries = [
  58. reg if self.reachable_registries.get(reg, True) else reg + " (unreachable)"
  59. for reg in registries
  60. ]
  61. msg = (
  62. "One or more required Docker images are not available:\n {}\n"
  63. "Configured registries: {}\n"
  64. "Checked by: {}"
  65. ).format(
  66. ",\n ".join(sorted(unavailable_images)),
  67. ", ".join(registries),
  68. self.skopeo_img_check_command
  69. )
  70. return dict(failed=True, msg=msg)
  71. return {}
  72. def required_images(self):
  73. """
  74. Determine which images we expect to need for this host.
  75. Returns: a set of required images like 'openshift/origin:v3.6'
  76. The thorny issue of determining the image names from the variables is under consideration
  77. via https://github.com/openshift/openshift-ansible/issues/4415
  78. For now we operate as follows:
  79. * For containerized components (master, node, ...) we look at the deployment type and
  80. use openshift/origin or openshift3/ose as the base for those component images. The
  81. version is openshift_image_tag as determined by the openshift_version role.
  82. * For OpenShift-managed infrastructure (router, registry...) we use oreg_url if
  83. it is defined; otherwise we again use the base that depends on the deployment type.
  84. Registry is not included in constructed images. It may be in oreg_url or etcd image.
  85. """
  86. required = set()
  87. deployment_type = self.get_var("openshift_deployment_type")
  88. host_groups = self.get_var("group_names")
  89. # containerized etcd may not have openshift_image_tag, see bz 1466622
  90. image_tag = self.get_var("openshift_image_tag", default="latest")
  91. image_info = DEPLOYMENT_IMAGE_INFO[deployment_type]
  92. # template for images that run on top of OpenShift
  93. image_url = "{}/{}-{}:{}".format(image_info["namespace"], image_info["name"], "${component}", "${version}")
  94. image_url = self.get_var("oreg_url", default="") or image_url
  95. if 'oo_nodes_to_config' in host_groups:
  96. for suffix in NODE_IMAGE_SUFFIXES:
  97. required.add(image_url.replace("${component}", suffix).replace("${version}", image_tag))
  98. # The registry-console is for some reason not prefixed with ose- like the other components.
  99. # Nor is it versioned the same, so just look for latest.
  100. # Also a completely different name is used for Origin.
  101. required.add(image_info["registry_console_image"])
  102. # images for containerized components
  103. if self.get_var("openshift", "common", "is_containerized"):
  104. components = set()
  105. if 'oo_nodes_to_config' in host_groups:
  106. components.update(["node", "openvswitch"])
  107. if 'oo_masters_to_config' in host_groups: # name is "origin" or "ose"
  108. components.add(image_info["name"])
  109. for component in components:
  110. required.add("{}/{}:{}".format(image_info["namespace"], component, image_tag))
  111. if 'oo_etcd_to_config' in host_groups: # special case, note it is the same for origin/enterprise
  112. required.add("registry.access.redhat.com/rhel7/etcd") # and no image tag
  113. return required
  114. def local_images(self, images):
  115. """Filter a list of images and return those available locally."""
  116. registries = self.known_docker_registries()
  117. found_images = []
  118. for image in images:
  119. # docker could have the image name as-is or prefixed with any registry
  120. imglist = [image] + [reg + "/" + image for reg in registries]
  121. if self.is_image_local(imglist):
  122. found_images.append(image)
  123. return found_images
  124. def is_image_local(self, image):
  125. """Check if image is already in local docker index."""
  126. result = self.execute_module("docker_image_facts", {"name": image})
  127. return bool(result.get("images")) and not result.get("failed")
  128. def known_docker_registries(self):
  129. """Build a list of docker registries available according to inventory vars."""
  130. regs = self.get_var("openshift_docker_additional_registries", default=[])
  131. # https://bugzilla.redhat.com/show_bug.cgi?id=1497274
  132. # if the result was a string type, place it into a list. We must do this
  133. # as using list() on a string will split the string into its characters.
  134. if isinstance(regs, six.string_types):
  135. regs = [regs]
  136. else:
  137. # Otherwise cast to a list as was done previously
  138. regs = list(regs)
  139. deployment_type = self.get_var("openshift_deployment_type")
  140. if deployment_type == "origin" and "docker.io" not in regs:
  141. regs.append("docker.io")
  142. elif deployment_type == 'openshift-enterprise' and "registry.access.redhat.com" not in regs:
  143. regs.append("registry.access.redhat.com")
  144. return regs
  145. def available_images(self, images, default_registries):
  146. """Search remotely for images. Returns: list of images found."""
  147. return [
  148. image for image in images
  149. if self.is_available_skopeo_image(image, default_registries)
  150. ]
  151. def is_available_skopeo_image(self, image, default_registries):
  152. """Use Skopeo to determine if required image exists in known registry(s)."""
  153. registries = default_registries
  154. # If image already includes a registry, only use that.
  155. # NOTE: This logic would incorrectly identify images that do not use a namespace, e.g.
  156. # registry.access.redhat.com/rhel7 as if the registry were a namespace.
  157. # It's not clear that there's any way to distinguish them, but fortunately
  158. # the current set of images all look like [registry/]namespace/name[:version].
  159. if image.count("/") > 1:
  160. registry, image = image.split("/", 1)
  161. registries = [registry]
  162. for registry in registries:
  163. if registry not in self.reachable_registries:
  164. self.reachable_registries[registry] = self.connect_to_registry(registry)
  165. if not self.reachable_registries[registry]:
  166. continue
  167. args = {"_raw_params": self.skopeo_img_check_command.format(registry=registry, image=image)}
  168. result = self.execute_module_with_retries("command", args)
  169. if result.get("rc", 0) == 0 and not result.get("failed"):
  170. return True
  171. if result.get("rc") == 124: # RC 124 == timed out; mark unreachable
  172. self.reachable_registries[registry] = False
  173. return False
  174. def connect_to_registry(self, registry):
  175. """Use ansible wait_for module to test connectivity from host to registry. Returns bool."""
  176. # test a simple TCP connection
  177. host, _, port = registry.partition(":")
  178. port = port or 443
  179. args = dict(host=host, port=port, state="started", timeout=30)
  180. result = self.execute_module("wait_for", args)
  181. return result.get("rc", 0) == 0 and not result.get("failed")