Skip to content

Commit f6e6096

Browse files
committed
Update the post HOWTO develop an OpenShift application
1 parent 57eae86 commit f6e6096

File tree

1 file changed

+132
-5
lines changed

1 file changed

+132
-5
lines changed

_posts/2024-11-11-howto-develop-openshift-application.md

+132-5
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,118 @@
11
---
22
layout: post
33
title: HOWTO develop an OpenShift application
4-
date: 2023-11-11 16:40:16
5-
description: march & april, looking forward to summer
4+
date: 2024-11-11 16:40:16
5+
description: OpenShift container runtime poses restrictions, and simple application containerization will not work in the vast majority of cases. In this post, steps are described to download CRC locally, containerize an application, apply necessary adjustments to overcome the restrictions, and push the resulting tested image to a registry, from which a production OpenShift instance will pull it.
66
tags: OpenShift crc application development CodeReadyContainers
7-
categories: sample-posts
7+
categories: OpenShift
88
---
9-
# Understanding Security Context Constraints (SCCs) in OpenShift
9+
10+
# HOWTO develop an OpenShift application
11+
Since OpenShift's container runtime poses constraints, one can't simply create a `Containerfile` (or `Dockerfile`) and test a containerized application with Podman (or Docker), expecting it to be flawlessly deployed and work on OpenShift just because it worked with the Podman (or Docker) runtime.
12+
13+
One possible approach (subject to limitations described below) is installing an all-in-one version of OpenShift and proceeding with the deployment, testing, and debugging cycles on the local machine.
14+
15+
Using a local instance of OpenShift can save a considerable amount of time by eliminating the step of pushing large container images to a container registry. This allows you to create a container image locally and perform an OpenShift application deployment directly from that local image. However, this all-in-one version of OpenShift has limitations compared to a full-fledged OpenShift deployment across multiple nodes with dedicated hardware. For more details, see the [Red Hat CodeReady Containers documentation](https://docs.redhat.com/en/documentation/red_hat_codeready_containers/2.0/html/getting_started_guide/introducing-codeready-containers_gsg#differences-from-production-openshift-install_gsg).
16+
17+
If your application requires features that are not supported by the all-in-one version, this method may not work for those applications (or may not test all the features of the application). Nevertheless, it can be useful for an initial kickstart and a subset of features.
18+
19+
20+
21+
## How to install Red Hat OpenShift Local on your machine
22+
With that said, follow the steps to deploy CRC locally as outlined in the [Red Hat OpenShift Local documentation](https://docs.redhat.com/en/documentation/red_hat_codeready_containers/2.0/html/getting_started_guide/index).
23+
The process of installation is very well explained just go throught it.
24+
25+
26+
## Download
27+
A registration to [Red Hat Hybrid Cloud console](https://console.redhat.com/openshift) is required in order to download CRC.
28+
Olthout there are several ways available I have choosen to authorize RedHat SSO with my github account
29+
```
30+
"Red Hat SSO by rh-sso wants to access your github_user account"
31+
```
32+
33+
and after filling a short form with details required to create a RedHat account, I was able to download the latest version of the OpenShift Local along with `pull secret`.
34+
35+
36+
## Configuration changes
37+
38+
During the installation I have changed the CRC VM to take 12 VCPUs and 32 Gb of RAM even though less beaffy VM might also suite
39+
your application needs.
40+
41+
```
42+
crc config set cpus 12
43+
crc config set memory 32768
44+
```
45+
46+
## Troubleshooting
47+
If something goes wrong with CRC instance simply delete the CRC VM, run cleanup to remove ~/.crc/machines and start over:
48+
```
49+
crc delete
50+
crc cleanup
51+
crc setup
52+
crc start
53+
```
54+
55+
As mentioned at the begining Openshift containers have resringts. E.g. pods running on CoreOS
56+
are running as `root` and no writing is allowed as `root`.
57+
```
58+
59+
dev: could not create app data folder /.local/share/virtualenv due to PermissionError(13, 'Permission denied')
60+
dev: find interpreter for spec PythonSpec(major=3, minor=12)
61+
dev: proposed PythonInfo(spec=CPython3.12.0.final.0-64, exe=/usr/local/bin/python3.12, platform=linux, version='3.12.0 (main, Dec 9 2024, 01:35:29) [GCC 14.2.1 20240912 (Red Hat 14.2.1-3)]', encoding_fs_io=utf-8-utf-8)
62+
usage: virtualenv [--version] [--with-traceback] [-v | -q] [--read-only-app-data] [--app-data APP_DATA] [--reset-app-data] [--upgrade-embed-wheels] [--discovery {builtin}] [-p py] [--try-first-with py_exe]
63+
[--creator {builtin,cpython3-posix,venv}] [--seeder {app-data,pip}] [--no-seed] [--activators comma_sep_list] [--clear] [--no-vcs-ignore] [--system-site-packages] [--symlinks | --copies] [--no-download | --download]
64+
[--extra-search-dir d [d ...]] [--pip version] [--setuptools version] [--wheel version] [--no-pip] [--no-setuptools] [--no-wheel] [--no-periodic-update] [--symlink-app-data] [--prompt prompt] [-h]
65+
dest
66+
virtualenv: error: argument dest: the destination . is not write-able at /app/.tox/dev
67+
dev: FAIL code 2 (0.03 seconds)
68+
evaluation failed :( (0.07 seconds)
69+
```
70+
71+
72+
73+
Coping your application to /tmp might work in some cases but not in their vast majority since application usually
74+
update folders in users' HOMEDIR (e.g. local or .cache). So we will not consider this approach.
75+
76+
77+
78+
A viable approach is to change the Containerfile to allow writing.
79+
```
80+
cat ~/.crc/machines/crc/kubeadmin-password
81+
or
82+
crc console --credentials
83+
84+
85+
oc login -u kubeadmin https://api.crc.testing:6443
86+
87+
oc get route default-route -n openshift-image-registry --template='{{ .spec.host }}'
88+
89+
podman login -u developer -p $(oc whoami -t) default-route-openshift-image-registry.apps-crc.testing
90+
91+
podman tag images.paas.redhat.com/atropos/eodweb default-route-openshift-image-registry.apps-crc.testing/demo/my-image:latest
92+
93+
podman push default-route-openshift-image-registry.apps-crc.testing/demo/my-image:latest
94+
```
95+
96+
97+
--------------------
98+
Another probem one might have is
99+
```
100+
"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/disk-pressure: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."
101+
```
102+
103+
To see what's going on the CRC VM ssh command is
104+
```
105+
ssh core@$(sudo virsh domifaddr crc | awk '/ipv4/ {print $4}' | cut -d'/' -f1) -i ~/.crc/machines/crc/id_ed25519
106+
```
107+
108+
if it does not looks ok, restart CRC configuring more space
109+
```
110+
crc config set disk-size 100
111+
```
112+
113+
## puch an image form
114+
115+
## Understanding Security Context Constraints (SCCs) in OpenShift
10116

11117
In OpenShift, Security Context Constraints (SCCs) play a crucial role in controlling the permissions of containers and maintaining the security of the cluster. To grasp the significance of SCCs, it’s essential to understand how containers interact with protected Linux functions.
12118

@@ -17,7 +123,6 @@ When a container runs a process, it inherently restricts that process from acces
17123
- Accessing shared file systems
18124
- Running as a privileged container or as root
19125
- Executing specific Linux commands, such as `kill`
20-
21126
These restrictions are in place to maintain container isolation. If processes within containers had unrestricted access, they could interfere with other processes and potentially compromise the isolation and security of the system.
22127

23128
However, there are situations where applications require access to some of these protected functions. This is where Security Contexts and Security Context Constraints come into play.
@@ -64,6 +169,28 @@ SCCs can either be predefined or custom-made by cluster administrators. Here’s
64169
- **Restricted SCC**: This built-in SCC in OpenShift enforces strict limitations. It drops most capabilities and restricts user and group permissions, ensuring minimal access beyond default settings.
65170
- **Custom SCC**: Administrators can create tailored SCCs that provide specific permissions, such as allowing a user ID range (e.g., 1000-2000) or granting additional capabilities.
66171

172+
173+
```yaml
174+
containers:
175+
- resources: {}
176+
terminationMessagePath: /dev/termination-log
177+
name: demo
178+
command:
179+
- tox
180+
- -v
181+
- -e dev
182+
securityContext:
183+
capabilities:
184+
drop:
185+
- ALL
186+
runAsUser: 1234
187+
runAsGroup: 5678
188+
runAsNonRoot: true
189+
allowPrivilegeEscalation: false
190+
```
191+
192+
Let me know if you need any additional formatting or edits!
193+
67194
## Conclusion
68195
69196
SCCs are essential for maintaining a secure and controlled environment in OpenShift. While containers by default limit access to protect system integrity, SCCs provide the flexibility needed when applications require elevated permissions. This balance ensures that cluster administrators can grant necessary permissions while maintaining overall security.

0 commit comments

Comments
 (0)