2014-02-12 08:20:37 +00:00
|
|
|
Image building tools for OpenStack
|
2012-11-09 11:04:13 +00:00
|
|
|
==================================
|
|
|
|
|
2013-07-23 03:18:05 +00:00
|
|
|
These tools are the components of TripleO
|
2013-09-18 13:17:10 +00:00
|
|
|
(https://wiki.openstack.org/wiki/TripleO) that are responsible for
|
2013-07-23 03:18:05 +00:00
|
|
|
building disk images.
|
2013-04-05 02:27:18 +00:00
|
|
|
|
|
|
|
This repository has the core functionality for building disk images, file
|
|
|
|
system images and ramdisk images for use with OpenStack (both virtual and bare
|
|
|
|
metal). The core functionality includes the various operating system specific
|
|
|
|
modules for disk/filesystem images, and deployment and hardware inventory
|
|
|
|
ramdisks.
|
|
|
|
|
|
|
|
The TripleO project also develops elements that can be used to deploy
|
|
|
|
OpenStack itself. These live in the TripleO elements repository
|
2013-09-18 13:17:10 +00:00
|
|
|
(https://git.openstack.org/cgit/openstack/tripleo-image-elements).
|
2012-11-09 11:04:13 +00:00
|
|
|
|
|
|
|
What tools are there?
|
|
|
|
---------------------
|
|
|
|
|
2013-04-08 03:10:34 +00:00
|
|
|
* disk-image-create [-a i386|amd64|armhf] -o filename {element} [{element} ...]
|
|
|
|
Create an image of element {element}, optionally mixing in other elements.
|
|
|
|
Element dependencies are automatically included. Support for other
|
2014-10-09 09:54:19 +00:00
|
|
|
architectures depends on your environment being able to run binaries of that
|
2013-04-08 03:10:34 +00:00
|
|
|
platform. For instance, to enable armhf on Ubuntu install the qemu-user-static
|
2014-04-28 22:33:59 +00:00
|
|
|
package. The default output format from disk-image-create is qcow2. To instead
|
|
|
|
output a tarball pass in "-t tar". This tarball could then be used as an image
|
|
|
|
for a linux container(see docs/docker.md).
|
2012-11-09 11:04:13 +00:00
|
|
|
|
2012-11-30 20:47:57 +00:00
|
|
|
* ramdisk-image-create -o filename {element} [{element} ...] : Create a kernel+
|
2012-11-09 11:04:13 +00:00
|
|
|
ramdisk pair for running maintenance on bare metal machines (deployment,
|
|
|
|
inventory, burnin etc).
|
|
|
|
|
2014-05-27 06:42:05 +00:00
|
|
|
To generate kernel+ramdisk pair for use with nova-baremetal, use
|
|
|
|
ramdisk-image-create -o deploy.ramdisk deploy-baremetal
|
|
|
|
|
|
|
|
To generate kernel+ramdisk pair for use with ironic, use
|
|
|
|
ramdisk-image-create -o deploy.ramdisk deploy-ironic
|
2012-11-09 22:36:24 +00:00
|
|
|
|
2012-11-30 20:47:57 +00:00
|
|
|
* elements can be found in the top level elements directory.
|
2012-11-09 11:04:13 +00:00
|
|
|
|
2013-01-22 01:35:31 +00:00
|
|
|
* element-info : Extract information about elements.
|
|
|
|
|
2015-03-31 04:53:30 +00:00
|
|
|
* tests/run_functests.sh
|
|
|
|
This runs a set of functional tests for diskimage-builder.
|
|
|
|
|
2012-11-09 11:04:13 +00:00
|
|
|
Why?
|
|
|
|
----
|
|
|
|
|
|
|
|
Automation: While users and operators can manually script or put together ram
|
|
|
|
disks and disk images, mature automation makes customisation and testing easier.
|
|
|
|
|
2013-07-17 12:36:54 +00:00
|
|
|
Installation
|
|
|
|
============
|
|
|
|
|
|
|
|
* Clone the repository locally, then add bin to your path.
|
|
|
|
|
2013-07-26 20:17:58 +00:00
|
|
|
* Make sure you have qemu-img (qemu-utils package on Ubuntu/Debian,
|
2014-08-28 16:48:11 +00:00
|
|
|
qemu on Fedora/RHEL/openSUSE) and kpartx installed.
|
2013-07-17 12:36:54 +00:00
|
|
|
|
|
|
|
Invocation
|
|
|
|
==========
|
|
|
|
|
|
|
|
The scripts can generally just be run. Options can be set on the command line
|
|
|
|
or by exporting variables to override those present in lib/img-defaults. -h to
|
|
|
|
get help.
|
2013-08-02 10:34:56 +00:00
|
|
|
The image building scripts expect to be able to invoke commands with sudo, so if you
|
|
|
|
want them to run non-interactively, you should either run them as root, with
|
|
|
|
sudo -E, or allow your build user to run any sudo command without password.
|
2013-07-17 12:36:54 +00:00
|
|
|
|
|
|
|
Using the variable ELEMENTS\_PATH will allow to specify multiple elements locations.
|
|
|
|
It's a colon (:) separated path list, and it will work in a first path/element found,
|
|
|
|
first served approach. The included elements tree is used when no path is supplied,
|
|
|
|
and is added to the end of the path if a path is supplied.
|
|
|
|
|
2014-06-26 06:22:31 +00:00
|
|
|
By default, the image building scripts will not overwrite existing disk images,
|
|
|
|
allowing you to compare the newly built image with the existing one. To change
|
|
|
|
that behaviour, set the variable OVERWRITE\_OLD\_IMAGE to any value that isn't
|
|
|
|
0.
|
|
|
|
|
2013-07-17 12:36:54 +00:00
|
|
|
Requirements
|
|
|
|
============
|
|
|
|
|
|
|
|
If you have 4GB of available physical RAM\*, or more, diskimage-builder will
|
|
|
|
create a tmpfs mount to build the image in. This will improve image build time
|
|
|
|
by building in RAM. This can be disabled completely by passing --no-tmpfs to
|
2014-07-16 08:26:18 +00:00
|
|
|
disk-image-create. ramdisk-image-create builds a regular image and then within
|
|
|
|
that does ramdisk creation. If tmpfs is not used, you will need enough room in
|
|
|
|
/tmp to store two uncompressed cloud images. If you do have tmpfs, you will
|
|
|
|
still need /tmp space for one uncompressed cloud image and about 20% of that
|
|
|
|
for working files.
|
2013-07-17 12:36:54 +00:00
|
|
|
|
|
|
|
\* As reported by /proc/meminfo MemTotal
|
|
|
|
|
2013-07-17 21:17:01 +00:00
|
|
|
Caches and offline mode
|
|
|
|
=======================
|
|
|
|
|
|
|
|
Since retrieving and transforming operating system image files, git
|
2015-01-23 22:50:03 +00:00
|
|
|
repositories, Python or Ruby packages, and so on can be a significant
|
|
|
|
overhead, we cache many of the inputs to the build process. The cache
|
2015-02-19 00:16:36 +00:00
|
|
|
location is read from DIB\_IMAGE\_CACHE. `Writing an element`_
|
|
|
|
describes the interface within disk-image-builder for caching. When
|
|
|
|
invoking disk-image-builder, the ``--offline`` option will instruct
|
|
|
|
disk-image-builder to not refresh cached resources.
|
2015-01-23 22:50:03 +00:00
|
|
|
|
|
|
|
Note that we don't maintain operating system package caches, instead
|
|
|
|
depending on your local infrastructure (e.g. Squid cache, or an APT or
|
|
|
|
Yum proxy) to facilitate caching of that layer, so you need to arrange
|
|
|
|
independently for offline mode. For more information about setting up
|
|
|
|
a squid proxy, consult the [TripleO
|
|
|
|
documentation](http://docs.openstack.org/developer/tripleo-incubator/devtest_setup.html#f3).
|
2013-07-17 21:17:01 +00:00
|
|
|
|
2013-08-02 10:48:51 +00:00
|
|
|
Base images
|
|
|
|
-----------
|
|
|
|
|
2014-05-07 23:55:13 +00:00
|
|
|
These are cached by the standard elements - fedora, redhat, ubuntu,
|
|
|
|
debian and opensuse.
|
2013-08-02 10:48:51 +00:00
|
|
|
|
|
|
|
source-repositories
|
|
|
|
-------------------
|
|
|
|
|
|
|
|
Git repositories and tarballs obtained via the source-repositories element will
|
|
|
|
be cached.
|
|
|
|
|
2014-03-06 22:23:12 +00:00
|
|
|
Install Types
|
|
|
|
-------------
|
|
|
|
|
|
|
|
Install types permit elements to be installed from different sources, such as
|
2014-10-27 16:49:30 +00:00
|
|
|
git repositories, distribution packages, or pip. The default install type
|
|
|
|
is 'source' but it can be modified on the disk-image-create command line
|
|
|
|
via the --install-type option. For example you can set:
|
|
|
|
|
|
|
|
--install-type=package
|
|
|
|
|
|
|
|
to enable package installs by default. Alternately, you can also
|
|
|
|
set DIB\_DEFAULT\_INSTALLTYPE.
|
2014-03-06 22:23:12 +00:00
|
|
|
|
|
|
|
Many elements expose different install types. The different implementations
|
2014-03-17 15:48:11 +00:00
|
|
|
live under `<install-dir-prefix>-<install-type>-install` directories under an
|
2014-03-06 22:23:12 +00:00
|
|
|
element's install.d. The base element enables the chosen install type by
|
|
|
|
symlinking the correct hook scripts under install.d directly.
|
2014-03-17 15:48:11 +00:00
|
|
|
`<install-dir-prefix>` can be a string of alphanumeric and '-' characters, but
|
2014-03-06 22:23:12 +00:00
|
|
|
typically corresponds to the element name.
|
|
|
|
|
|
|
|
For example, the nova element would provide:
|
|
|
|
|
|
|
|
nova/install.d/nova-package-install/74-nova
|
|
|
|
nova/install.d/nova-source-install/74-nova
|
|
|
|
|
|
|
|
The following symlink would be created for the package install type:
|
|
|
|
|
|
|
|
install.d/74-nova -> nova-package-install/74-nova
|
|
|
|
|
|
|
|
Or, for the source install type:
|
|
|
|
|
|
|
|
install.d/74-nova -> nova-source-install/74-nova
|
|
|
|
|
|
|
|
All other scripts that exist under install.d for an element will be executed as
|
2014-03-17 15:48:11 +00:00
|
|
|
normal. This allows common install code to live in a script under install.d.
|
2014-03-06 22:23:12 +00:00
|
|
|
|
|
|
|
To set the install type for an element define an environment variable
|
2014-03-17 15:48:11 +00:00
|
|
|
`DIB_INSTALLTYPE_<install_dir_prefx>`. Note that if you used `-` characters in
|
|
|
|
your install directory prefix, those need to be replaced with `_` in the
|
2014-03-06 22:23:12 +00:00
|
|
|
environment variable.
|
|
|
|
|
2014-03-17 15:48:11 +00:00
|
|
|
For example, to enable the package install type for the set of nova elements
|
|
|
|
that use `nova` as the install type prefix, define the following:
|
|
|
|
|
|
|
|
export DIB_INSTALLTYPE_nova=package
|
|
|
|
|
2014-03-06 22:23:12 +00:00
|
|
|
|
2013-08-02 10:48:51 +00:00
|
|
|
C and C++ compilation
|
|
|
|
---------------------
|
|
|
|
|
|
|
|
Ccache is configured by the base element. Any compilation that honours ccache
|
|
|
|
will be cached.
|
|
|
|
|
2013-08-09 13:13:15 +00:00
|
|
|
PyPI
|
|
|
|
----
|
|
|
|
|
|
|
|
The pypi element will bind mount a PyPI mirror from the cache dir and configure
|
|
|
|
pip and easy-install to use it.
|
|
|
|
|
2012-11-09 11:04:13 +00:00
|
|
|
Design
|
|
|
|
======
|
|
|
|
|
|
|
|
Images are built using a chroot and bind mounted /proc /sys and /dev. The goal
|
|
|
|
of the image building process is to produce blank slate machines that have all
|
2014-02-12 08:20:37 +00:00
|
|
|
the necessary bits to fulfill a specific purpose in the running of an OpenStack
|
2013-02-13 22:16:00 +00:00
|
|
|
cloud: e.g. a nova-compute node. Images produce either a filesystem image with
|
2013-04-02 00:25:25 +00:00
|
|
|
a label of cloudimg-rootfs, or can be customised to produce whole disk images
|
|
|
|
(but will still contain a filesystem labelled cloudimg-rootfs). Once the file
|
|
|
|
system tree is assembled a loopback device with filesystem (or partition table
|
2013-05-11 04:36:32 +00:00
|
|
|
and file system) is created and the tree copied into it. The file system
|
|
|
|
created is an ext4 filesystem just large enough to hold the file system tree
|
|
|
|
and can be resized up to 1PB in size.
|
2012-11-09 11:04:13 +00:00
|
|
|
|
2012-11-30 20:47:57 +00:00
|
|
|
An element is a particular set of code that alters how the image is built, or
|
|
|
|
runs within the chroot to prepare the image. E.g. the local-config element
|
2012-11-09 11:04:13 +00:00
|
|
|
copies in the http proxy and ssh keys of the user running the image build
|
2012-11-30 20:47:57 +00:00
|
|
|
process into the image, whereas the vm element makes the image build a regular
|
2012-11-12 21:00:33 +00:00
|
|
|
VM image with partition table and installed grub boot sector. The mellanox
|
2012-11-30 20:47:57 +00:00
|
|
|
element adds support for mellanox infiniband hardware to both the deploy
|
2012-11-12 21:00:33 +00:00
|
|
|
ramdisk and the built images.
|
|
|
|
|
2013-11-26 18:59:14 +00:00
|
|
|
Images must specify a base distribution image element. Currently base
|
2014-05-07 23:55:13 +00:00
|
|
|
distribution elements exist for fedora, rhel, ubuntu, debian and
|
|
|
|
opensuse. Other distributions may be added in future, the
|
|
|
|
infrastructure deliberately makes few assumptions about the exact
|
|
|
|
operating system in use. The base image has opensshd running (a new
|
|
|
|
key generated on first boot) and accepts keys via the cloud metadata
|
|
|
|
service, loading them into the distribution specific default user
|
|
|
|
account.
|
2012-11-12 21:00:33 +00:00
|
|
|
|
|
|
|
The goal of a built image is to have any global configuration ready to roll,
|
|
|
|
but nothing that ties it to a specific cloud instance: images should be able to
|
|
|
|
be dropped into a test cloud and validated, and then deployed into a production
|
|
|
|
cloud (usually via bare metal nova) for production use. As such, the image
|
|
|
|
contents can be modelled as three distinct portions:
|
|
|
|
|
|
|
|
- global content: the actual code, kernel, always-applicable config (like
|
|
|
|
disabling password authentication to sshd).
|
|
|
|
- metadata / config management provided configuration: user ssh keys, network
|
|
|
|
address and routes, configuration management server location and public key,
|
|
|
|
credentials to access other servers in the cloud. These are typically
|
|
|
|
refreshed on every boot.
|
|
|
|
- persistent state: sshd server key, database contents, swift storage areas,
|
|
|
|
nova instance disk images, disk image cache. These would typically be stored
|
|
|
|
on a dedicated partition and not overwritten when re-deploying the image.
|
|
|
|
|
2013-04-02 00:25:25 +00:00
|
|
|
The goal of the image building tools is to create machine images that contain
|
2012-11-12 21:00:33 +00:00
|
|
|
the correct global content and are ready for 'last-mile' configuration by the
|
|
|
|
nova metadata API, after which a configuration management system can take over
|
2014-10-09 09:54:19 +00:00
|
|
|
(until the next deploy, when it all starts over from scratch).
|
2012-11-09 11:04:13 +00:00
|
|
|
|
2012-11-30 20:47:57 +00:00
|
|
|
Existing elements
|
2012-11-09 11:04:13 +00:00
|
|
|
-----------------
|
|
|
|
|
2012-11-30 20:47:57 +00:00
|
|
|
Elements are found in the subdirectory elements. Each element is in a directory
|
|
|
|
named after the element itself. Elements *should* have a README.md in the root
|
|
|
|
of the element directory describing what it is for.
|
2012-11-09 11:04:13 +00:00
|
|
|
|
2012-11-30 20:47:57 +00:00
|
|
|
Writing an element
|
2015-01-23 22:50:03 +00:00
|
|
|
------------------
|
2012-11-09 11:04:13 +00:00
|
|
|
|
2013-04-10 11:42:00 +00:00
|
|
|
Conform to the following conventions:
|
|
|
|
|
|
|
|
* Use the environment for overridable defaults, prefixing environment variable
|
|
|
|
names with "DIB\_". For example: DIB\_MYDEFAULT=${DIB\_MYDEFAULT:-default}
|
|
|
|
If you do not use the DIB\_ prefix you may find that your overrides are
|
|
|
|
discarded as the build environment is sanitised.
|
|
|
|
|
2013-08-02 10:04:42 +00:00
|
|
|
* Consider that your element co-exists with many others and try to guard
|
|
|
|
against undefined behaviours. Some examples:
|
|
|
|
|
|
|
|
* Two elements use the source-repositories element, but use the same filename
|
|
|
|
for the source-repositories config file. Files such as these (and indeed the
|
|
|
|
scripts in the various .d directories listed below) should be named such
|
|
|
|
that they are unique. If they are not unique, when the combined tree is
|
|
|
|
created by disk-image-builder for injecting into the build environment, one
|
|
|
|
of the files will be overwritten.
|
|
|
|
|
|
|
|
* Two elements copy different scripts into /usr/local/bin with the same name.
|
|
|
|
If they both use set -e and cp -n then the conflict will be caught and cause
|
|
|
|
the build to fail.
|
|
|
|
|
2013-08-09 10:53:32 +00:00
|
|
|
* If your element mounts anything into the image build tree ($TMP\_BUILD\_DIR)
|
|
|
|
then it will be automatically unmounted when the build tree is unmounted -
|
|
|
|
and not remounted into the filesystem image - if the mount point is needed
|
|
|
|
again, your element will need to remount it at that point.
|
|
|
|
|
2015-01-23 22:50:03 +00:00
|
|
|
* If caching is required, elements should use a location under
|
|
|
|
$DIB\_IMAGE\_CACHE.
|
|
|
|
|
|
|
|
* Elements should allow for remote data to be cached. When
|
|
|
|
$DIB\_OFFLINE is set, this cached data should be used if
|
|
|
|
possible. See the *Global image-build variables* section of this
|
|
|
|
document for more information.
|
|
|
|
|
|
|
|
### Phase Subdirectories ###
|
2014-02-21 18:50:42 +00:00
|
|
|
|
2012-11-09 11:04:13 +00:00
|
|
|
Make as many of the following subdirectories as you need, depending on what
|
2014-02-21 18:50:42 +00:00
|
|
|
part of the process you need to customise. The subdirectories are executed in
|
|
|
|
the order given here. Scripts within the subdirectories should be named with a
|
|
|
|
two-digit numeric prefix, and are executed in numeric order.
|
2012-11-09 11:04:13 +00:00
|
|
|
|
2013-02-11 04:01:36 +00:00
|
|
|
* root.d: Create or adapt the initial root filesystem content. This is where
|
|
|
|
alternative distribution support is added, or customisations such as
|
2014-10-09 09:54:19 +00:00
|
|
|
building on an existing image.
|
2013-11-26 18:59:14 +00:00
|
|
|
|
2013-02-13 22:16:00 +00:00
|
|
|
Only one element can use this at a time unless particular care is taken not
|
|
|
|
to blindly overwrite but instead to adapt the context extracted by other
|
|
|
|
elements.
|
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
* runs: outside chroot
|
2013-04-08 03:10:34 +00:00
|
|
|
* inputs: $ARCH=i386|amd64|armhf $TARGET\_ROOT=/path/to/target/workarea
|
2013-02-13 22:16:00 +00:00
|
|
|
|
2012-11-09 11:04:13 +00:00
|
|
|
* extra-data.d: pull in extra data from the host environment that hooks may
|
|
|
|
need during image creation. This should copy any data (such as SSH keys,
|
|
|
|
http proxy settings and the like) somewhere under $TMP\_HOOKS\_PATH.
|
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
* runs: outside chroot
|
2012-11-09 11:04:13 +00:00
|
|
|
* inputs: $TMP\_HOOKS\_PATH
|
2014-02-21 18:50:42 +00:00
|
|
|
* outputs: None
|
2012-11-09 11:04:13 +00:00
|
|
|
|
|
|
|
* pre-install.d: Run code in the chroot before customisation or packages are
|
|
|
|
installed. A good place to add apt repositories.
|
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
* runs: in chroot
|
|
|
|
|
2012-11-09 11:04:13 +00:00
|
|
|
* install.d: Runs after pre-install.d in the chroot. This is a good place to
|
|
|
|
install packages, chain into configuration management tools or do other
|
|
|
|
image specific operations.
|
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
* runs: in chroot
|
|
|
|
|
2013-04-15 10:31:04 +00:00
|
|
|
* post-install.d: Run code in the chroot. This is a good place to perform
|
|
|
|
tasks you want to handle after the OS/application install but before the
|
|
|
|
first boot of the image. Some examples of use would be: Run chkconfig
|
|
|
|
to disable unneeded services and clean the cache left by the package
|
|
|
|
manager to reduce the size of the image.
|
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
* runs: in chroot
|
2013-07-09 22:01:33 +00:00
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
* block-device.d: customise the block device that the image will be made on
|
|
|
|
(e.g. to make partitions). Runs after the target tree has been fully
|
|
|
|
populated but before the cleanup hook runs.
|
|
|
|
|
|
|
|
* runs: outside chroot
|
|
|
|
* inputs: $IMAGE\_BLOCK\_DEVICE={path} $TARGET\_ROOT={path}
|
|
|
|
* outputs: $IMAGE\_BLOCK\_DEVICE={path}
|
|
|
|
|
|
|
|
* finalise.d: Perform final tuning of the root filesystem. Runs in a chroot
|
|
|
|
after the root filesystem content has been copied into the mounted
|
|
|
|
filesystem: this is an appropriate place to reset SELinux metadata, install
|
|
|
|
grub bootloaders and so on. Because this happens inside the final image, it
|
|
|
|
is important to limit operations here to only those necessary to affect the
|
|
|
|
filesystem metadata and image itself. For most operations, post-install.d
|
|
|
|
is preferred.
|
|
|
|
|
|
|
|
* runs: in chroot
|
|
|
|
|
|
|
|
* cleanup.d: Perform cleanup of the root filesystem content. For
|
|
|
|
instance, temporary settings to use the image build environment HTTP proxy
|
|
|
|
are removed here in the dpkg element.
|
|
|
|
|
|
|
|
* runs: outside chroot
|
|
|
|
* inputs: $ARCH=i386|amd64|armhf $TARGET\_ROOT=/path/to/target/workarea
|
|
|
|
|
2015-02-07 10:30:02 +00:00
|
|
|
Other Subdirectories
|
|
|
|
^^^^^^^^^^^^^^^^^^^^
|
2014-07-10 13:05:02 +00:00
|
|
|
|
|
|
|
Elements may have other subdirectories that are processed by specific elements
|
|
|
|
rather than the diskimage-builder tools themselves.
|
|
|
|
|
|
|
|
One example of this is the ``bin`` directory. The ``rpm-distro``, ``dpkg`` and
|
|
|
|
``opensuse`` elements install all files found in the ``bin`` directory into
|
|
|
|
``/usr/local/bin`` within the image as executable files.
|
|
|
|
|
2015-02-07 10:30:02 +00:00
|
|
|
Environment Variables
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^
|
2014-02-21 18:50:42 +00:00
|
|
|
|
|
|
|
To set environment variables for other hooks, add a file to environment.d.
|
|
|
|
This directory contains bash script snippets that are sourced before running
|
|
|
|
scripts in each phase.
|
|
|
|
|
2014-05-01 16:13:47 +00:00
|
|
|
DIB exposes an internal IMAGE\_ELEMENT variable which provides elements access
|
|
|
|
to the full set of elements that are included in the image build. This can
|
|
|
|
be used to process local in-element files across all the elements
|
|
|
|
(pkg-map for example).
|
2014-02-21 18:50:42 +00:00
|
|
|
|
2015-02-07 10:30:02 +00:00
|
|
|
Dependencies
|
|
|
|
^^^^^^^^^^^^
|
2014-02-21 18:50:42 +00:00
|
|
|
|
2014-03-10 13:46:44 +00:00
|
|
|
Each element can use the following files to define or affect dependencies:
|
|
|
|
|
|
|
|
* element-deps: a plain text, newline separated list of elements which will
|
|
|
|
be added to the list of elements built into the image at image creation time.
|
|
|
|
|
|
|
|
* element-provides: A plain text, newline separated list of elements which
|
|
|
|
are provided by this element. These elements will be excluded from elements
|
|
|
|
built into the image at image creation time. For example if element A depends
|
|
|
|
on element B and element C includes element B in its "element-provides"
|
|
|
|
file and A and C are included when building an image, then B is not used.
|
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
|
2013-09-27 16:42:51 +00:00
|
|
|
|
2015-02-07 10:30:02 +00:00
|
|
|
Ramdisk Elements
|
|
|
|
^^^^^^^^^^^^^^^^
|
2014-02-21 18:50:42 +00:00
|
|
|
|
2012-11-30 20:47:57 +00:00
|
|
|
Ramdisk elements support the following files in their element directories:
|
2012-11-09 21:16:06 +00:00
|
|
|
|
2014-10-09 09:54:19 +00:00
|
|
|
* binary-deps.d : text files listing executables required to be fed into the
|
2013-07-01 16:20:15 +00:00
|
|
|
ramdisk. These need to be present in $PATH in the build chroot (i.e. need to
|
|
|
|
be installed by your elements as described above).
|
2012-11-09 21:48:23 +00:00
|
|
|
|
2013-07-01 16:20:15 +00:00
|
|
|
* init.d : POSIX shell script fragments that will be appended to the default
|
|
|
|
script executed as the ramdisk is booted (/init).
|
|
|
|
|
2014-07-16 06:59:49 +00:00
|
|
|
* ramdisk-install.d : called to copy files into the ramdisk. The variable
|
|
|
|
TMP\_MOUNT\_PATH points to the root of the tree that will be packed into
|
|
|
|
the ramdisk.
|
|
|
|
|
2013-07-01 16:20:15 +00:00
|
|
|
* udev.d : udev rules files that will be copied into the ramdisk.
|
2012-11-09 21:16:06 +00:00
|
|
|
|
2015-02-07 10:30:02 +00:00
|
|
|
Element coding standard
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^
|
2014-04-03 08:53:06 +00:00
|
|
|
|
2014-07-01 09:27:41 +00:00
|
|
|
- lines should not include trailing whitespace.
|
|
|
|
- there should be no hard tabs in the file.
|
2014-04-03 08:53:06 +00:00
|
|
|
- indents are 4 spaces, and all indentation should be some multiple of
|
2014-07-01 09:27:41 +00:00
|
|
|
them.
|
|
|
|
- `do` and `then` keywords should be on the same line as the if, while or
|
|
|
|
for conditions.
|
2014-04-03 08:53:06 +00:00
|
|
|
|
2013-07-17 21:17:01 +00:00
|
|
|
Global image-build variables
|
|
|
|
----------------------------
|
|
|
|
|
|
|
|
* DIB\_OFFLINE : this is always set. When not empty, any operations that
|
|
|
|
perform remote data access should avoid it if possible. If not possible
|
|
|
|
the operation should still be attempted as the user may have an external
|
|
|
|
cache able to keep the operation functional.
|
|
|
|
|
2014-10-09 09:54:19 +00:00
|
|
|
* DIB\_IMAGE\_ROOT\_FS\_UUID : this contains the UUID of the root fs, when
|
|
|
|
diskimage-builder is building a disk image. This works only for ext
|
|
|
|
filesystems.
|
|
|
|
|
2015-01-23 22:50:03 +00:00
|
|
|
* DIB\_IMAGE\_CACHE : path to where cached inputs to the build process
|
|
|
|
are stored. Defaults to ~/.cache/image_create.
|
|
|
|
|
2012-12-17 02:44:46 +00:00
|
|
|
Structure of an element
|
|
|
|
-----------------------
|
|
|
|
|
|
|
|
The above-mentioned global content can be further broken down in a way that
|
|
|
|
encourages composition of elements and reusability of their components. One
|
|
|
|
possible approach to this would be to label elements as either a "driver",
|
|
|
|
"service", or "config" element. Below are some examples.
|
|
|
|
|
|
|
|
- Driver-specific elements should only contain the necessary bits for that
|
|
|
|
driver:
|
2014-02-21 18:50:42 +00:00
|
|
|
|
2012-12-17 02:44:46 +00:00
|
|
|
elements/
|
|
|
|
driver-mellanox/
|
|
|
|
init - modprobe line
|
|
|
|
install.d/
|
|
|
|
10-mlx - package installation
|
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
- An element that installs and configures Nova might be a bit more complex,
|
|
|
|
containing several scripts across several phases:
|
|
|
|
|
2012-12-17 02:44:46 +00:00
|
|
|
elements/
|
|
|
|
service-nova/
|
2013-07-09 09:46:00 +00:00
|
|
|
source-repository-nova - register a source repository
|
2012-12-17 02:44:46 +00:00
|
|
|
pre-install.d/
|
2013-07-09 09:46:00 +00:00
|
|
|
50-my-ppa - add a PPA
|
2012-12-17 02:44:46 +00:00
|
|
|
install.d/
|
2013-07-09 09:46:00 +00:00
|
|
|
10-user - common Nova user accts
|
|
|
|
50-my-pack - install packages from my PPA
|
|
|
|
60-nova - install nova and some dependencies
|
2012-12-17 02:44:46 +00:00
|
|
|
|
|
|
|
- In the general case, configuration should probably be handled either by the
|
2014-10-08 07:53:31 +00:00
|
|
|
meta-data service (eg, o-r-c) or via normal CM tools
|
2012-12-17 02:44:46 +00:00
|
|
|
(eg, salt). That being said, it may occasionally be desirable to create a
|
|
|
|
set of elements which express a distinct configuration of the same software
|
2014-10-08 07:53:31 +00:00
|
|
|
components.
|
2012-12-17 02:44:46 +00:00
|
|
|
|
|
|
|
In this way, depending on the hardware and in which availability zone it is
|
|
|
|
to be deployed, an image would be composed of:
|
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
* zero or more driver-elements
|
|
|
|
* one or more service-elements
|
|
|
|
* zero or more config-elements
|
2012-12-17 02:44:46 +00:00
|
|
|
|
|
|
|
It should be noted that this is merely a naming convention to assist in
|
|
|
|
managing elements. Diskimage-builder is not, and should not be, functionally
|
|
|
|
dependent upon specific element names.
|
|
|
|
|
2014-02-21 18:50:42 +00:00
|
|
|
diskimage-builder has the ability to retrieve source code for an element and
|
|
|
|
place it into a directory on the target image during the extra-data phase. The
|
|
|
|
default location/branch can then be overridden by the process running
|
|
|
|
diskimage-builder, making it possible to use the same element to track more
|
|
|
|
then one branch of a git repository or to get source for a local cache. See
|
|
|
|
elements/source-repositories/README.md for more information.
|
2013-07-09 09:46:00 +00:00
|
|
|
|
2012-12-14 07:17:00 +00:00
|
|
|
Debugging elements
|
|
|
|
------------------
|
|
|
|
|
2013-04-05 08:59:30 +00:00
|
|
|
The build-time environment and command line arguments are captured by the
|
|
|
|
'base' element and written to /etc/dib\_environment and /etc/dib\_arguments
|
|
|
|
inside the image.
|
|
|
|
|
2012-12-14 07:17:00 +00:00
|
|
|
Export 'break' to drop to a shell during the image build. Break points can be
|
|
|
|
set either before or after any of the hook points by exporting
|
|
|
|
"break=[before|after]-hook-name". Multiple break points can be specified as a
|
|
|
|
comma-delimited string. Some examples:
|
|
|
|
|
|
|
|
* break=before-block-device-size will break before the block device size hooks
|
|
|
|
are called.
|
|
|
|
|
2014-10-08 07:53:31 +00:00
|
|
|
* break=before-pre-install will break before the pre-install hooks.
|
2012-12-14 07:17:00 +00:00
|
|
|
|
2013-08-01 14:50:17 +00:00
|
|
|
* break=after-error will break after an error during a in target hookpoint.
|
|
|
|
|
2013-05-14 13:29:45 +00:00
|
|
|
Images are built such that the Linux kernel is instructed not to switch into
|
|
|
|
graphical consoles (i.e. it will not activate KMS). This maximises
|
|
|
|
compatibility with remote console interception hardware, such as HP's iLO.
|
2015-08-24 08:31:02 +00:00
|
|
|
However, you will typically only see kernel messages on the console - init
|
2013-05-14 13:29:45 +00:00
|
|
|
daemons (e.g. upstart) will usually be instructed to output to a serial
|
|
|
|
console so nova's console-log command can function. There is an element in the
|
|
|
|
tripleo-image-elements repository called "remove-serial-console" which will
|
|
|
|
force all boot messages to appear on the main console.
|
|
|
|
|
2013-11-18 19:45:59 +00:00
|
|
|
Ramdisk images can be debugged at run-time by passing "troubleshoot" as a
|
|
|
|
kernel command line argument, or by pressing "t" when an error is reached. This
|
|
|
|
will spawn a shell on the console (this can be extremely useful when network
|
|
|
|
interfaces or disks are not detected correctly).
|
|
|
|
|
2012-12-14 00:25:18 +00:00
|
|
|
Testing Elements
|
|
|
|
----------------
|
|
|
|
|
|
|
|
Elements can be tested using python. To create a test:
|
|
|
|
|
|
|
|
* Create a directory called 'tests' in the element directory.
|
|
|
|
|
|
|
|
* Create an empty file called '\_\_init\_\_.py' to make it into a python
|
|
|
|
package.
|
|
|
|
|
|
|
|
* Create your test files as 'test\_whatever.py', using regular python test
|
|
|
|
code.
|
|
|
|
|
|
|
|
To run all the tests use testr - `testr run`. To run just some tests provide
|
|
|
|
one or more regex filters - tests matching any of them are run -
|
|
|
|
`testr run apt-proxy`.
|
|
|
|
|
2012-11-30 20:47:57 +00:00
|
|
|
Third party elements
|
2012-11-09 11:04:13 +00:00
|
|
|
--------------------
|
|
|
|
|
2015-02-13 21:12:31 +00:00
|
|
|
Additional elements can be incorporated by setting ELEMENTS_PATH, for example
|
|
|
|
if one were building tripleo-images, the variable would be set like::
|
|
|
|
|
|
|
|
export ELEMENTS_PATH=tripleo-image-elements/elements
|
|
|
|
disk-image-create rhel7 cinder-api
|
2012-11-09 11:04:13 +00:00
|
|
|
|
2012-11-15 03:20:32 +00:00
|
|
|
Copyright
|
|
|
|
=========
|
|
|
|
|
|
|
|
Copyright 2012 Hewlett-Packard Development Company, L.P.
|
2014-10-09 09:54:19 +00:00
|
|
|
Copyright (c) 2012 NTT DOCOMO, INC.
|
2012-11-15 03:20:32 +00:00
|
|
|
|
|
|
|
All Rights Reserved.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
not use this file except in compliance with the License. You may obtain
|
|
|
|
a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
License for the specific language governing permissions and limitations
|
|
|
|
under the License.
|