8dc52a6461
As we only have config.json in specs now. Signed-off-by: Qiang Huang <h.huangqiang@huawei.com>
208 lines
3.9 KiB
Markdown
208 lines
3.9 KiB
Markdown
# OCI Bundle
|
|
|
|
Since containerd consumes the OCI bundle format containers and configuration will have to be created
|
|
on the machine that containerd is running on. The easiest way to do this is to download an image
|
|
with docker and export it.
|
|
|
|
|
|
## Setup
|
|
|
|
First thing we need to do to create a bundle is setup the initial directory structure.
|
|
Create a directory with a unique name. In this example we will create a redis container.
|
|
We will create this container in a `/containers` directory.
|
|
|
|
|
|
```bash
|
|
mkdir redis
|
|
```
|
|
|
|
Inside the `redis` directory create another directory named `rootfs`
|
|
|
|
```bash
|
|
mkdir redis/rootfs
|
|
```
|
|
|
|
## Root Filesystem
|
|
|
|
Now we need to populate the `rootfs` directory with the filesystem of a redis container. To do this we
|
|
need to pull the redis image with docker and export its contents to the `rootfs` directory.
|
|
|
|
```bash
|
|
docker pull redis
|
|
|
|
# create the container with a temp name so that we can export it
|
|
docker create --name tempredis redis
|
|
|
|
# export it into the rootfs directory
|
|
docker export tempredis | tar -C redis/rootfs -xf -
|
|
|
|
# remove the container now that we have exported
|
|
docker rm tempredis
|
|
```
|
|
|
|
Now that we have the root filesystem populated we need to create the configs for the container.
|
|
|
|
## Configs
|
|
|
|
An easy way to get temp configs for the container bundle is to use the `runc`
|
|
cli tool from the [runc](https://github.com/opencontainers/runc) repository.
|
|
|
|
|
|
You need to `cd` into the `redis` directory and run the `runc spec` command. After doing this you
|
|
should have a file `config.json` created. The directory structure should look like this:
|
|
|
|
```
|
|
/containers/redis
|
|
├── config.json
|
|
└── rootfs/
|
|
```
|
|
|
|
## Edits
|
|
|
|
We need to edit the config to add `redis-server` as the application to launch inside the container,
|
|
and remove the network namespace so that you can connect to the redis server on your system.
|
|
The resulting `config.json` should look like this:
|
|
|
|
```json
|
|
{
|
|
"ociVersion": "0.4.0",
|
|
"platform": {
|
|
"os": "linux",
|
|
"arch": "amd64"
|
|
},
|
|
"process": {
|
|
"terminal": true,
|
|
"user": {},
|
|
"args": [
|
|
"redis-server", "--bind", "0.0.0.0"
|
|
],
|
|
"env": [
|
|
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
|
|
"TERM=xterm"
|
|
],
|
|
"cwd": "/",
|
|
"capabilities": [
|
|
"CAP_AUDIT_WRITE",
|
|
"CAP_KILL",
|
|
"CAP_NET_BIND_SERVICE"
|
|
],
|
|
"rlimits": [
|
|
{
|
|
"type": "RLIMIT_NOFILE",
|
|
"hard": 1024,
|
|
"soft": 1024
|
|
}
|
|
],
|
|
"noNewPrivileges": true
|
|
},
|
|
"root": {
|
|
"path": "rootfs",
|
|
"readonly": true
|
|
},
|
|
"hostname": "runc",
|
|
"mounts": [
|
|
{
|
|
"destination": "/proc",
|
|
"type": "proc",
|
|
"source": "proc"
|
|
},
|
|
{
|
|
"destination": "/dev",
|
|
"type": "tmpfs",
|
|
"source": "tmpfs",
|
|
"options": [
|
|
"nosuid",
|
|
"strictatime",
|
|
"mode=755",
|
|
"size=65536k"
|
|
]
|
|
},
|
|
{
|
|
"destination": "/dev/pts",
|
|
"type": "devpts",
|
|
"source": "devpts",
|
|
"options": [
|
|
"nosuid",
|
|
"noexec",
|
|
"newinstance",
|
|
"ptmxmode=0666",
|
|
"mode=0620",
|
|
"gid=5"
|
|
]
|
|
},
|
|
{
|
|
"destination": "/dev/shm",
|
|
"type": "tmpfs",
|
|
"source": "shm",
|
|
"options": [
|
|
"nosuid",
|
|
"noexec",
|
|
"nodev",
|
|
"mode=1777",
|
|
"size=65536k"
|
|
]
|
|
},
|
|
{
|
|
"destination": "/dev/mqueue",
|
|
"type": "mqueue",
|
|
"source": "mqueue",
|
|
"options": [
|
|
"nosuid",
|
|
"noexec",
|
|
"nodev"
|
|
]
|
|
},
|
|
{
|
|
"destination": "/sys",
|
|
"type": "sysfs",
|
|
"source": "sysfs",
|
|
"options": [
|
|
"nosuid",
|
|
"noexec",
|
|
"nodev",
|
|
"ro"
|
|
]
|
|
},
|
|
{
|
|
"destination": "/sys/fs/cgroup",
|
|
"type": "cgroup",
|
|
"source": "cgroup",
|
|
"options": [
|
|
"nosuid",
|
|
"noexec",
|
|
"nodev",
|
|
"relatime",
|
|
"ro"
|
|
]
|
|
}
|
|
],
|
|
"hooks": {},
|
|
"linux": {
|
|
"resources": {
|
|
"devices": [
|
|
{
|
|
"allow": false,
|
|
"access": "rwm"
|
|
}
|
|
]
|
|
},
|
|
"namespaces": [
|
|
{
|
|
"type": "pid"
|
|
},
|
|
{
|
|
"type": "ipc"
|
|
},
|
|
{
|
|
"type": "uts"
|
|
},
|
|
{
|
|
"type": "mount"
|
|
}
|
|
],
|
|
"devices": null
|
|
}
|
|
}
|
|
```
|
|
|
|
This is what you need to do to make a OCI compliant bundle for containerd to start.
|