kind-in-docker fixes (#77)
Reviewed-on: #77 Co-authored-by: David Boreham <david@bozemanpass.com> Co-committed-by: David Boreham <david@bozemanpass.com>
This commit is contained in:
parent
3e3503fdb4
commit
792ea0ad90
@ -39,6 +39,7 @@ RUN apt update && apt install -y iptables supervisor
|
||||
COPY modprobe start-docker.sh entrypoint.sh /usr/local/bin/
|
||||
COPY supervisor/ /etc/supervisor/conf.d/
|
||||
COPY logger.sh /opt/bash-utils/logger.sh
|
||||
COPY cgroup-helper.sh /opt/bash-utils/cgroup-helper.sh
|
||||
|
||||
RUN chmod +x /usr/local/bin/start-docker.sh \
|
||||
/usr/local/bin/entrypoint.sh \
|
||||
|
34
act-runner/cgroup-helper.sh
Executable file
34
act-runner/cgroup-helper.sh
Executable file
@ -0,0 +1,34 @@
|
||||
|
||||
# This file needs to be source'ed and the function join_cgroup called, by any script that goes on to run kind
|
||||
# This is required due to issues with properly virtualizing the cgroup hierarchy that exist at present in docker
|
||||
# See: https://github.com/earthly/earthly/blob/main/buildkitd/dockerd-wrapper.sh#L56
|
||||
function configure_cgroup() {
|
||||
if [ -f "/sys/fs/cgroup/cgroup.controllers" ]; then
|
||||
echo >&2 "INFO: detected cgroup v2, configuring nested docker group"
|
||||
|
||||
local cgroup_name="nested-dockerd" # NOTE: has to be the same as the function below (local var to prevent overriding in the caller)
|
||||
|
||||
# move script to separate cgroup, to prevent the root cgroup from becoming threaded (which will prevent systemd images (e.g. kind) from running)
|
||||
mkdir /sys/fs/cgroup/${cgroup_name}
|
||||
echo $$ > /sys/fs/cgroup/${cgroup_name}/cgroup.procs
|
||||
|
||||
# This script is run from inside entrypoint.sh
|
||||
# so we also need to move the parent pid into this new group, which is weird
|
||||
# TODO: we should unwrap this so $$ is all we need to move
|
||||
echo 1 > /sys/fs/cgroup/${cgroup_name}/cgroup.procs
|
||||
|
||||
if [ "$(wc -l < /sys/fs/cgroup/cgroup.procs)" != "0" ]; then
|
||||
echo >&2 "WARNING: processes exist in the root cgroup; this may cause errors during cgroup initialization"
|
||||
fi
|
||||
|
||||
root_cgroup_type="$(cat /sys/fs/cgroup/cgroup.type)"
|
||||
if [ "$root_cgroup_type" != "domain" ]; then
|
||||
echo >&2 "WARNING: expected cgroup type of \"domain\", but got \"$root_cgroup_type\" instead"
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
function join_cgroup() {
|
||||
local cgroup_name="nested-dockerd" # NOTE: has to be the same as the function above (local var to prevent overriding in the caller)
|
||||
echo $$ > /sys/fs/cgroup/${cgroup_name}/cgroup.procs
|
||||
}
|
@ -1,5 +1,6 @@
|
||||
#!/bin/bash
|
||||
source /opt/bash-utils/logger.sh
|
||||
source /opt/bash-utils/cgroup-helper.sh
|
||||
|
||||
function wait_for_process () {
|
||||
local max_time_wait=30
|
||||
@ -17,6 +18,9 @@ function wait_for_process () {
|
||||
return 0
|
||||
}
|
||||
|
||||
# Some payloads (e.g. kind) need systemd to run, which in turn requires forking the cgroup hierarchy
|
||||
configure_cgroup
|
||||
|
||||
INFO "Starting supervisor"
|
||||
/usr/bin/supervisord -n >> /dev/null 2>&1 &
|
||||
|
||||
@ -27,4 +31,4 @@ if [ $? -ne 0 ]; then
|
||||
exit 1
|
||||
else
|
||||
INFO "dockerd is running"
|
||||
fi
|
||||
fi
|
||||
|
Loading…
Reference in New Issue
Block a user