You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: _posts/2024-11-11-howto-develop-openshift-application.md
+132-5
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,118 @@
1
1
---
2
2
layout: post
3
3
title: HOWTO develop an OpenShift application
4
-
date: 2023-11-11 16:40:16
5
-
description: march & april, looking forward to summer
4
+
date: 2024-11-11 16:40:16
5
+
description: OpenShift container runtime poses restrictions, and simple application containerization will not work in the vast majority of cases. In this post, steps are described to download CRC locally, containerize an application, apply necessary adjustments to overcome the restrictions, and push the resulting tested image to a registry, from which a production OpenShift instance will pull it.
6
6
tags: OpenShift crc application development CodeReadyContainers
7
-
categories: sample-posts
7
+
categories: OpenShift
8
8
---
9
-
# Understanding Security Context Constraints (SCCs) in OpenShift
9
+
10
+
# HOWTO develop an OpenShift application
11
+
Since OpenShift's container runtime poses constraints, one can't simply create a `Containerfile` (or `Dockerfile`) and test a containerized application with Podman (or Docker), expecting it to be flawlessly deployed and work on OpenShift just because it worked with the Podman (or Docker) runtime.
12
+
13
+
One possible approach (subject to limitations described below) is installing an all-in-one version of OpenShift and proceeding with the deployment, testing, and debugging cycles on the local machine.
14
+
15
+
Using a local instance of OpenShift can save a considerable amount of time by eliminating the step of pushing large container images to a container registry. This allows you to create a container image locally and perform an OpenShift application deployment directly from that local image. However, this all-in-one version of OpenShift has limitations compared to a full-fledged OpenShift deployment across multiple nodes with dedicated hardware. For more details, see the [Red Hat CodeReady Containers documentation](https://docs.redhat.com/en/documentation/red_hat_codeready_containers/2.0/html/getting_started_guide/introducing-codeready-containers_gsg#differences-from-production-openshift-install_gsg).
16
+
17
+
If your application requires features that are not supported by the all-in-one version, this method may not work for those applications (or may not test all the features of the application). Nevertheless, it can be useful for an initial kickstart and a subset of features.
18
+
19
+
20
+
21
+
## How to install Red Hat OpenShift Local on your machine
22
+
With that said, follow the steps to deploy CRC locally as outlined in the [Red Hat OpenShift Local documentation](https://docs.redhat.com/en/documentation/red_hat_codeready_containers/2.0/html/getting_started_guide/index).
23
+
The process of installation is very well explained just go throught it.
24
+
25
+
26
+
## Download
27
+
A registration to [Red Hat Hybrid Cloud console](https://console.redhat.com/openshift) is required in order to download CRC.
28
+
Olthout there are several ways available I have choosen to authorize RedHat SSO with my github account
29
+
```
30
+
"Red Hat SSO by rh-sso wants to access your github_user account"
31
+
```
32
+
33
+
and after filling a short form with details required to create a RedHat account, I was able to download the latest version of the OpenShift Local along with `pull secret`.
34
+
35
+
36
+
## Configuration changes
37
+
38
+
During the installation I have changed the CRC VM to take 12 VCPUs and 32 Gb of RAM even though less beaffy VM might also suite
39
+
your application needs.
40
+
41
+
```
42
+
crc config set cpus 12
43
+
crc config set memory 32768
44
+
```
45
+
46
+
## Troubleshooting
47
+
If something goes wrong with CRC instance simply delete the CRC VM, run cleanup to remove ~/.crc/machines and start over:
48
+
```
49
+
crc delete
50
+
crc cleanup
51
+
crc setup
52
+
crc start
53
+
```
54
+
55
+
As mentioned at the begining Openshift containers have resringts. E.g. pods running on CoreOS
56
+
are running as `root` and no writing is allowed as `root`.
57
+
```
58
+
59
+
dev: could not create app data folder /.local/share/virtualenv due to PermissionError(13, 'Permission denied')
60
+
dev: find interpreter for spec PythonSpec(major=3, minor=12)
61
+
dev: proposed PythonInfo(spec=CPython3.12.0.final.0-64, exe=/usr/local/bin/python3.12, platform=linux, version='3.12.0 (main, Dec 9 2024, 01:35:29) [GCC 14.2.1 20240912 (Red Hat 14.2.1-3)]', encoding_fs_io=utf-8-utf-8)
"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/disk-pressure: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."
if it does not looks ok, restart CRC configuring more space
109
+
```
110
+
crc config set disk-size 100
111
+
```
112
+
113
+
## puch an image form
114
+
115
+
## Understanding Security Context Constraints (SCCs) in OpenShift
10
116
11
117
In OpenShift, Security Context Constraints (SCCs) play a crucial role in controlling the permissions of containers and maintaining the security of the cluster. To grasp the significance of SCCs, it’s essential to understand how containers interact with protected Linux functions.
12
118
@@ -17,7 +123,6 @@ When a container runs a process, it inherently restricts that process from acces
17
123
- Accessing shared file systems
18
124
- Running as a privileged container or as root
19
125
- Executing specific Linux commands, such as `kill`
20
-
21
126
These restrictions are in place to maintain container isolation. If processes within containers had unrestricted access, they could interfere with other processes and potentially compromise the isolation and security of the system.
22
127
23
128
However, there are situations where applications require access to some of these protected functions. This is where Security Contexts and Security Context Constraints come into play.
@@ -64,6 +169,28 @@ SCCs can either be predefined or custom-made by cluster administrators. Here’s
64
169
-**Restricted SCC**: This built-in SCC in OpenShift enforces strict limitations. It drops most capabilities and restricts user and group permissions, ensuring minimal access beyond default settings.
65
170
-**Custom SCC**: Administrators can create tailored SCCs that provide specific permissions, such as allowing a user ID range (e.g., 1000-2000) or granting additional capabilities.
66
171
172
+
173
+
```yaml
174
+
containers:
175
+
- resources: {}
176
+
terminationMessagePath: /dev/termination-log
177
+
name: demo
178
+
command:
179
+
- tox
180
+
- -v
181
+
- -e dev
182
+
securityContext:
183
+
capabilities:
184
+
drop:
185
+
- ALL
186
+
runAsUser: 1234
187
+
runAsGroup: 5678
188
+
runAsNonRoot: true
189
+
allowPrivilegeEscalation: false
190
+
```
191
+
192
+
Let me know if you need any additional formatting or edits!
193
+
67
194
## Conclusion
68
195
69
196
SCCs are essential for maintaining a secure and controlled environment in OpenShift. While containers by default limit access to protect system integrity, SCCs provide the flexibility needed when applications require elevated permissions. This balance ensures that cluster administrators can grant necessary permissions while maintaining overall security.
0 commit comments