Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Split out entrypoint resolution and injection, and script conversion #1616

Merged
merged 1 commit into from
Nov 26, 2019
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion cmd/controller/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ var (
func main() {
flag.Parse()
images := pipeline.Images{
EntryPointImage: *entrypointImage,
EntrypointImage: *entrypointImage,
NopImage: *nopImage,
GitImage: *gitImage,
CredsImage: *credsImage,
Expand Down
3 changes: 1 addition & 2 deletions examples/taskruns/steps-run-in-order.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,7 @@ spec:
taskSpec:
steps:
- image: busybox
command: ['/bin/sh']
# NB: command is not set, so it must be looked up from the registry.
args: ['-c', 'sleep 3 && touch foo']
- image: busybox
command: ['/bin/sh']
args: ['-c', 'ls', 'foo']
4 changes: 2 additions & 2 deletions pkg/apis/pipeline/images.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@ package pipeline
// Images holds the images reference for a number of container images used
// across tektoncd pipelines.
type Images struct {
// EntryPointImage is container image containing our entrypoint binary.
EntryPointImage string
// EntrypointImage is container image containing our entrypoint binary.
EntrypointImage string
// NopImage is the container image used to kill sidecars.
NopImage string
// GitImage is the container image with Git that we use to implement the Git source step.
Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/pipeline/v1alpha1/build_gcs_resource_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ import (
)

var images = pipeline.Images{
EntryPointImage: "override-with-entrypoint:latest",
EntrypointImage: "override-with-entrypoint:latest",
NopImage: "tianon/true",
GitImage: "override-with-git:latest",
CredsImage: "override-with-creds:latest",
Expand Down
2 changes: 1 addition & 1 deletion pkg/artifacts/artifact_storage_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ import (

var (
images = pipeline.Images{
EntryPointImage: "override-with-entrypoint:latest",
EntrypointImage: "override-with-entrypoint:latest",
NopImage: "tianon/true",
GitImage: "override-with-git:latest",
CredsImage: "override-with-creds:latest",
Expand Down
180 changes: 180 additions & 0 deletions pkg/pod/entrypoint.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,180 @@
package pod

import (
"errors"
"fmt"
"path/filepath"
"strings"

corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
)

const (
toolsVolumeName = "tools"
mountPoint = "/builder/tools"
entrypointBinary = mountPoint + "/entrypoint"

downwardVolumeName = "downward"
downwardMountPoint = "/builder/downward"
downwardMountReadyFile = "ready"
ReadyAnnotation = "tekton.dev/ready"
ReadyAnnotationValue = "READY"

StepPrefix = "step-"
SidecarPrefix = "sidecar-"
)

var (
// TODO(#1605): Generate volumeMount names, to avoid collisions.
// TODO(#1605): Unexport these vars when Pod conversion is entirely within
// this package.
imjasonh marked this conversation as resolved.
Show resolved Hide resolved
ToolsMount = corev1.VolumeMount{
Name: toolsVolumeName,
MountPath: mountPoint,
}
ToolsVolume = corev1.Volume{
Name: toolsVolumeName,
VolumeSource: corev1.VolumeSource{EmptyDir: &corev1.EmptyDirVolumeSource{}},
}

// TODO(#1605): Signal sidecar readiness by injecting entrypoint,
// remove dependency on Downward API.
DownwardVolume = corev1.Volume{
Name: downwardVolumeName,
VolumeSource: corev1.VolumeSource{
DownwardAPI: &corev1.DownwardAPIVolumeSource{
Items: []corev1.DownwardAPIVolumeFile{{
Path: downwardMountReadyFile,
FieldRef: &corev1.ObjectFieldSelector{
FieldPath: fmt.Sprintf("metadata.annotations['%s']", ReadyAnnotation),
},
}},
},
},
}
DownwardMount = corev1.VolumeMount{
Name: downwardVolumeName,
MountPath: downwardMountPoint,
}
)

// OrderContainers returns the specified steps, modified so that they are
// executed in order by overriding the entrypoint binary. It also returns the
// init container that places the entrypoint binary pulled from the
// entrypointImage.
//
// Containers must have Command specified; if the user didn't specify a
// command, we must have fetched the image's ENTRYPOINT before calling this
// method, using entrypoint_lookup.go.
//
// TODO(#1605): Also use entrypoint injection to order sidecar start/stop.
func OrderContainers(entrypointImage string, steps []corev1.Container) (corev1.Container, []corev1.Container, error) {
toolsInit := corev1.Container{
Name: "place-tools",
Image: entrypointImage,
Command: []string{"cp", "/ko-app/entrypoint", entrypointBinary},
VolumeMounts: []corev1.VolumeMount{ToolsMount},
}

if len(steps) == 0 {
return corev1.Container{}, nil, errors.New("No steps specified")
}

for i, s := range steps {
var argsForEntrypoint []string
switch i {
case 0:
argsForEntrypoint = []string{
// First step waits for the Downward volume file.
"-wait_file", filepath.Join(downwardMountPoint, downwardMountReadyFile),
"-wait_file_content", // Wait for file contents, not just an empty file.
// Start next step.
"-post_file", filepath.Join(mountPoint, fmt.Sprintf("%d", i)),
}
default:
// All other steps wait for previous file, write next file.
argsForEntrypoint = []string{
"-wait_file", filepath.Join(mountPoint, fmt.Sprintf("%d", i-1)),
"-post_file", filepath.Join(mountPoint, fmt.Sprintf("%d", i)),
}
}

cmd, args := s.Command, s.Args
if len(cmd) == 0 {
return corev1.Container{}, nil, fmt.Errorf("Step %d did not specify command", i)
}
if len(cmd) > 1 {
args = append(cmd[1:], args...)
cmd = []string{cmd[0]}
}
argsForEntrypoint = append(argsForEntrypoint, "-entrypoint", cmd[0], "--")
argsForEntrypoint = append(argsForEntrypoint, args...)

steps[i].Command = []string{entrypointBinary}
steps[i].Args = argsForEntrypoint
steps[i].VolumeMounts = append(steps[i].VolumeMounts, ToolsMount)
}
// Mount the Downward volume into the first step container.
steps[0].VolumeMounts = append(steps[0].VolumeMounts, DownwardMount)
imjasonh marked this conversation as resolved.
Show resolved Hide resolved

return toolsInit, steps, nil
}

// UpdateReady updates the Pod's annotations to signal the first step to start
// by projecting the ready annotation via the Downward API.
func UpdateReady(kubeclient kubernetes.Interface, pod corev1.Pod) error {
newPod, err := kubeclient.CoreV1().Pods(pod.Namespace).Get(pod.Name, metav1.GetOptions{})
if err != nil {
return fmt.Errorf("Error getting Pod %q when updating ready annotation: %w", pod.Name, err)
imjasonh marked this conversation as resolved.
Show resolved Hide resolved
}

// Update the Pod's "READY" annotation to signal the first step to
// start.
if newPod.ObjectMeta.Annotations == nil {
newPod.ObjectMeta.Annotations = map[string]string{}
}
if newPod.ObjectMeta.Annotations[ReadyAnnotation] != ReadyAnnotationValue {
newPod.ObjectMeta.Annotations[ReadyAnnotation] = ReadyAnnotationValue
if _, err := kubeclient.CoreV1().Pods(newPod.Namespace).Update(newPod); err != nil {
return fmt.Errorf("Error adding ready annotation to Pod %q: %w", pod.Name, err)
}
}
return nil
}

// StopSidecars updates sidecar containers in the Pod to a nop image, which
// exits successfully immediately.
func StopSidecars(nopImage string, kubeclient kubernetes.Interface, pod corev1.Pod) error {
newPod, err := kubeclient.CoreV1().Pods(pod.Namespace).Get(pod.Name, metav1.GetOptions{})
if err != nil {
return fmt.Errorf("Error getting Pod %q when stopping sidecars: %w", pod.Name, err)
}

updated := false
if newPod.Status.Phase == corev1.PodRunning {
for _, s := range newPod.Status.ContainerStatuses {
if IsContainerSidecar(s.Name) && s.State.Running != nil {
for j, c := range newPod.Spec.Containers {
if c.Name == s.Name && c.Image != nopImage {
updated = true
newPod.Spec.Containers[j].Image = nopImage
}
}
}
}
}
if updated {
if _, err := kubeclient.CoreV1().Pods(newPod.Namespace).Update(newPod); err != nil {
return fmt.Errorf("Error adding ready annotation to Pod %q: %w", pod.Name, err)
}
}
return nil
}

func IsContainerStep(name string) bool { return strings.HasPrefix(name, StepPrefix) }
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: can we have docstring here too (just for godoc.org 😛 🤗 )

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah good point. I'll make sure to have doc strings everywhere before calling this done.

func IsContainerSidecar(name string) bool { return strings.HasPrefix(name, SidecarPrefix) }

func TrimStepPrefix(name string) string { return strings.TrimPrefix(name, StepPrefix) }
func TrimSidecarPrefix(name string) string { return strings.TrimPrefix(name, SidecarPrefix) }
126 changes: 126 additions & 0 deletions pkg/pod/entrypoint_lookup.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,126 @@
package pod

import (
"fmt"

"github.com/google/go-containerregistry/pkg/authn"
"github.com/google/go-containerregistry/pkg/authn/k8schain"
"github.com/google/go-containerregistry/pkg/name"
"github.com/google/go-containerregistry/pkg/v1/remote"
lru "github.com/hashicorp/golang-lru"
corev1 "k8s.io/api/core/v1"
"k8s.io/client-go/kubernetes"
)

// ResolveEntrypoints looks up container image ENTRYPOINTs for all steps that
// don't specify a Command.
//
// Images that are not specified by digest will be specified by digest after
// lookup in the resulting list of containers.
func ResolveEntrypoints(cache EntrypointCache, namespace, serviceAccountName string, steps []corev1.Container) ([]corev1.Container, error) {
// Keep a local cache of image->digest lookups, just for the scope of
// resolving this set of steps. If the image is pushed to, we need to
// resolve its digest and entrypoint again, but we can skip lookups
// while resolving the same TaskRun.
type result struct {
digest name.Digest
ep []string
}
localCache := map[string]result{}
for i, s := range steps {
if len(s.Command) != 0 {
// Nothing to resolve.
continue
}

var digest name.Digest
var ep []string
var err error
if r, found := localCache[s.Image]; found {
digest = r.digest
ep = r.ep
} else {
// Look it up in the cache, which will also resolve the digest.
ep, digest, err = cache.Get(s.Image, namespace, serviceAccountName)
if err != nil {
return nil, err
}
localCache[s.Image] = result{digest, ep} // Cache it locally in case another step specifies the same image.
}

steps[i].Image = digest.String() // Specify image by digest, since we know it now.
imjasonh marked this conversation as resolved.
Show resolved Hide resolved
steps[i].Command = ep // Specify the command explicitly.
}
return steps, nil
}

const cacheSize = 1024

type EntrypointCache interface {
Get(imageName, namespace, serviceAccountName string) (cmd []string, d name.Digest, err error)
}

type entrypointCache struct {
kubeclient kubernetes.Interface
lru *lru.Cache // cache of digest string -> image entrypoint []string
}

func NewEntrypointCache(kubeclient kubernetes.Interface) (EntrypointCache, error) {
lru, err := lru.New(cacheSize)
if err != nil {
return nil, err
}
return &entrypointCache{
kubeclient: kubeclient,
lru: lru,
}, nil
}

func (e *entrypointCache) Get(imageName, namespace, serviceAccountName string) (cmd []string, d name.Digest, err error) {
ref, err := name.ParseReference(imageName, name.WeakValidation)
if err != nil {
return nil, name.Digest{}, fmt.Errorf("Error parsing reference %q: %v", imageName, err)
}

// If image is specified by digest, check the local cache.
if digest, ok := ref.(name.Digest); ok {
if ep, ok := e.lru.Get(digest.String()); ok {
return ep.([]string), digest, nil
}
}

// If the image wasn't specified by digest, or if the entrypoint
// wasn't found, we have to consult the remote registry, using
// imagePullSecrets.
kc, err := k8schain.New(e.kubeclient, k8schain.Options{
Namespace: namespace,
ServiceAccountName: serviceAccountName,
})
if err != nil {
return nil, name.Digest{}, fmt.Errorf("Error creating k8schain: %v", err)
}
mkc := authn.NewMultiKeychain(kc)
img, err := remote.Image(ref, remote.WithAuthFromKeychain(mkc))
if err != nil {
return nil, name.Digest{}, fmt.Errorf("Error getting image manifest: %v", err)
}
digest, err := img.Digest()
if err != nil {
return nil, name.Digest{}, fmt.Errorf("Error getting image digest: %v", err)
}
cfg, err := img.ConfigFile()
if err != nil {
return nil, name.Digest{}, fmt.Errorf("Error getting image config: %v", err)
}
ep := cfg.Config.Entrypoint
if len(ep) == 0 {
ep = cfg.Config.Cmd
}
e.lru.Add(digest.String(), ep) // Populate the cache.

d, err = name.NewDigest(imageName+"@"+digest.String(), name.WeakValidation)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: I wonder if we could use name:tag@digest notation here (thinking outloud, ignore me 👼)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not really sure what it would buy us, this string is never surfaced directly to users.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Isn't it surfaced in the final pod spec ? (anyway it's really not that big of a deal)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is, but that pod spec is intended to be an implementation detail, and we shouldn't expect users to see it. The user's specified tag will be shown in the TaskRun's .spec, and the resolved digest will be shown in the TaskRun's .status, that's all that really matters.

if err != nil {
return nil, name.Digest{}, fmt.Errorf("Error constructing resulting digest: %v", err)
}
return ep, d, nil
}
Loading