123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210 |
- """Check that required Docker images are available."""
- from openshift_checks import OpenShiftCheck
- from openshift_checks.mixins import DockerHostMixin
- NODE_IMAGE_SUFFIXES = ["haproxy-router", "docker-registry", "deployer", "pod"]
- DEPLOYMENT_IMAGE_INFO = {
- "origin": {
- "namespace": "openshift",
- "name": "origin",
- "registry_console_image": "cockpit/kubernetes",
- },
- "openshift-enterprise": {
- "namespace": "openshift3",
- "name": "ose",
- "registry_console_image": "registry.access.redhat.com/openshift3/registry-console",
- },
- }
- class DockerImageAvailability(DockerHostMixin, OpenShiftCheck):
- """Check that required Docker images are available.
- Determine docker images that an install would require and check that they
- are either present in the host's docker index, or available for the host to pull
- with known registries as defined in our inventory file (or defaults).
- """
- name = "docker_image_availability"
- tags = ["preflight"]
- # we use python-docker-py to check local docker for images, and skopeo
- # to look for images available remotely without waiting to pull them.
- dependencies = ["python-docker-py", "skopeo"]
- skopeo_img_check_command = "timeout 10 skopeo inspect --tls-verify=false docker://{registry}/{image}"
- def __init__(self, *args, **kwargs):
- super(DockerImageAvailability, self).__init__(*args, **kwargs)
- # record whether we could reach a registry or not (and remember results)
- self.reachable_registries = {}
- def is_active(self):
- """Skip hosts with unsupported deployment types."""
- deployment_type = self.get_var("openshift_deployment_type")
- has_valid_deployment_type = deployment_type in DEPLOYMENT_IMAGE_INFO
- return super(DockerImageAvailability, self).is_active() and has_valid_deployment_type
- def run(self):
- msg, failed = self.ensure_dependencies()
- if failed:
- return {
- "failed": True,
- "msg": "Some dependencies are required in order to check Docker image availability.\n" + msg
- }
- required_images = self.required_images()
- missing_images = set(required_images) - set(self.local_images(required_images))
- # exit early if all images were found locally
- if not missing_images:
- return {}
- registries = self.known_docker_registries()
- if not registries:
- return {"failed": True, "msg": "Unable to retrieve any docker registries."}
- available_images = self.available_images(missing_images, registries)
- unavailable_images = set(missing_images) - set(available_images)
- if unavailable_images:
- registries = [
- reg if self.reachable_registries.get(reg, True) else reg + " (unreachable)"
- for reg in registries
- ]
- msg = (
- "One or more required Docker images are not available:\n {}\n"
- "Configured registries: {}\n"
- "Checked by: {}"
- ).format(
- ",\n ".join(sorted(unavailable_images)),
- ", ".join(registries),
- self.skopeo_img_check_command
- )
- return dict(failed=True, msg=msg)
- return {}
- def required_images(self):
- """
- Determine which images we expect to need for this host.
- Returns: a set of required images like 'openshift/origin:v3.6'
- The thorny issue of determining the image names from the variables is under consideration
- via https://github.com/openshift/openshift-ansible/issues/4415
- For now we operate as follows:
- * For containerized components (master, node, ...) we look at the deployment type and
- use openshift/origin or openshift3/ose as the base for those component images. The
- version is openshift_image_tag as determined by the openshift_version role.
- * For OpenShift-managed infrastructure (router, registry...) we use oreg_url if
- it is defined; otherwise we again use the base that depends on the deployment type.
- Registry is not included in constructed images. It may be in oreg_url or etcd image.
- """
- required = set()
- deployment_type = self.get_var("openshift_deployment_type")
- host_groups = self.get_var("group_names")
- # containerized etcd may not have openshift_image_tag, see bz 1466622
- image_tag = self.get_var("openshift_image_tag", default="latest")
- image_info = DEPLOYMENT_IMAGE_INFO[deployment_type]
- if not image_info:
- return required
- # template for images that run on top of OpenShift
- image_url = "{}/{}-{}:{}".format(image_info["namespace"], image_info["name"], "${component}", "${version}")
- image_url = self.get_var("oreg_url", default="") or image_url
- if 'nodes' in host_groups:
- for suffix in NODE_IMAGE_SUFFIXES:
- required.add(image_url.replace("${component}", suffix).replace("${version}", image_tag))
- # The registry-console is for some reason not prefixed with ose- like the other components.
- # Nor is it versioned the same, so just look for latest.
- # Also a completely different name is used for Origin.
- required.add(image_info["registry_console_image"])
- # images for containerized components
- if self.get_var("openshift", "common", "is_containerized"):
- components = set()
- if 'nodes' in host_groups:
- components.update(["node", "openvswitch"])
- if 'masters' in host_groups: # name is "origin" or "ose"
- components.add(image_info["name"])
- for component in components:
- required.add("{}/{}:{}".format(image_info["namespace"], component, image_tag))
- if 'etcd' in host_groups: # special case, note it is the same for origin/enterprise
- required.add("registry.access.redhat.com/rhel7/etcd") # and no image tag
- return required
- def local_images(self, images):
- """Filter a list of images and return those available locally."""
- registries = self.known_docker_registries()
- found_images = []
- for image in images:
- # docker could have the image name as-is or prefixed with any registry
- imglist = [image] + [reg + "/" + image for reg in registries]
- if self.is_image_local(imglist):
- found_images.append(image)
- return found_images
- def is_image_local(self, image):
- """Check if image is already in local docker index."""
- result = self.execute_module("docker_image_facts", {"name": image})
- return bool(result.get("images")) and not result.get("failed")
- def known_docker_registries(self):
- """Build a list of docker registries available according to inventory vars."""
- regs = list(self.get_var("openshift.docker.additional_registries", default=[]))
- deployment_type = self.get_var("openshift_deployment_type")
- if deployment_type == "origin" and "docker.io" not in regs:
- regs.append("docker.io")
- elif "enterprise" in deployment_type and "registry.access.redhat.com" not in regs:
- regs.append("registry.access.redhat.com")
- return regs
- def available_images(self, images, default_registries):
- """Search remotely for images. Returns: list of images found."""
- return [
- image for image in images
- if self.is_available_skopeo_image(image, default_registries)
- ]
- def is_available_skopeo_image(self, image, default_registries):
- """Use Skopeo to determine if required image exists in known registry(s)."""
- registries = default_registries
- # If image already includes a registry, only use that.
- # NOTE: This logic would incorrectly identify images that do not use a namespace, e.g.
- # registry.access.redhat.com/rhel7 as if the registry were a namespace.
- # It's not clear that there's any way to distinguish them, but fortunately
- # the current set of images all look like [registry/]namespace/name[:version].
- if image.count("/") > 1:
- registry, image = image.split("/", 1)
- registries = [registry]
- for registry in registries:
- if registry not in self.reachable_registries:
- self.reachable_registries[registry] = self.connect_to_registry(registry)
- if not self.reachable_registries[registry]:
- continue
- args = {"_raw_params": self.skopeo_img_check_command.format(registry=registry, image=image)}
- result = self.execute_module_with_retries("command", args)
- if result.get("rc", 0) == 0 and not result.get("failed"):
- return True
- if result.get("rc") == 124: # RC 124 == timed out; mark unreachable
- self.reachable_registries[registry] = False
- return False
- def connect_to_registry(self, registry):
- """Use ansible wait_for module to test connectivity from host to registry. Returns bool."""
- # test a simple TCP connection
- host, _, port = registry.partition(":")
- port = port or 443
- args = dict(host=host, port=port, state="started", timeout=30)
- result = self.execute_module("wait_for", args)
- return result.get("rc", 0) == 0 and not result.get("failed")
|