-
Notifications
You must be signed in to change notification settings - Fork 13
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
openshift-virtualization-pipelines-tasks: Auto-update tekton tasks re…
…sources\n\nURL: https://github.com/openshift-cnv/openshift-virtualization-pipelines-tasks\nIgnoredVersions:
- Loading branch information
1 parent
2927602
commit 83343e9
Showing
21 changed files
with
2,122 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,164 @@ | ||
# Windows EFI Installer Pipeline | ||
|
||
This Pipeline installs Windows 11 or Server 2k22 into a new DataVolume. This DataVolume is suitable to be used as a default boot source | ||
or golden image for Windows 11 or Server 2k22 VirtualMachines. | ||
|
||
This example Pipeline is suitable only for Windows 11 or Server 2k22 (or other Windows versions which require EFI - not tested!). When using this example Pipeline always adjust Pipeline parameters for Windows version you are currently using (e.g. different name, different autoattend config map, different base image name, etc.). Each Windows version requires change in autounattendConfigMapName parameter (e.g. using `windows2k22-autounattend` config map will not work with Windows 11 and vice versa - e.g. due to different storage drivers path). | ||
|
||
The Pipeline implements this by modifying the supplied Windows ISO. It extracts all files from the ISO, replaces the prompt bootloader with the no-prompt bootloader and creates a new bootable ISO. | ||
This helps with automated installation of Windows in EFI boot mode. By default Windows in EFI boot mode uses a prompt bootloader, which will not continue with the boot process until a key is pressed. By replacing it with the no-prompt bootloader no key press is required to boot into the Windows installer. Then Task packs updated packages to new ISO, converts it with qemu-img and replaces original ISO file in PVC. | ||
|
||
After the ISO is modified it creates a new VirtualMachine which boots from the modified Windows installation image (ISO file). The installation of Windows is automatically executed and controlled by a Windows answer file. Then the Pipeline will wait for the installation to complete and will delete the created VirtualMachine while keeping the resulting DataVolume with the installed operating system. The Pipeline can be customized to support different installation requirements. | ||
|
||
## Prerequisites | ||
|
||
- KubeVirt `>=v1.0.0` | ||
- Tekton Pipelines `>=v0.43.0` | ||
- Apply ConfigMaps with Windows sysprep (or select one which you will need) - examples can be found here: https://github.com/kubevirt/kubevirt-tekton-tasks/tree/main/pipelines/windows-efi-installer/configmaps | ||
|
||
|
||
### Obtain Windows 11 ISO download URL | ||
|
||
1. Go to https://www.microsoft.com/en-us/software-download/windows11. | ||
2. Fill in the edition and `English` language (other languages need to be updated in `windows11-autounattend` ConfigMap) and go to the download page. | ||
3. Right-click on the 64-bit download button and copy the download link. The link should be valid for 24 hours. | ||
|
||
### Obtain Windows Server 2022 ISO download URL | ||
|
||
1. Go to https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2022. | ||
2. Right-click Download the ISO button. | ||
3. Fill in all required informations and click on Download now button. | ||
4. Select English (United States) (other languages need to be updated in `windows2k22-autounattend` ConfigMap) - 64-bit edition ISO download. | ||
|
||
### Prepare autounattend.xml ConfigMap | ||
|
||
1. Supply, generate or use the default autounattend.xml. | ||
For information on answer files see [Startup Scripts - KubeVirt User Guide](https://kubevirt.io/user-guide/virtual_machines/startup_scripts/#sysprep). | ||
2. Replace the default example autounattend.xml with your own in the definition of the `windows11-autounattend` ConfigMap in the Pipeline YAML. | ||
Different autounattend.xml can be also passed in a separate ConfigMap with the Pipeline parameter `autounattendConfigMapName` when creating a PipelineRun. | ||
|
||
## Pipeline Description | ||
|
||
``` | ||
import-win-iso --- modify-windows-iso-file --- create-vm --- wait-for-vmi-status --- create-base-dv --- cleanup-vm | ||
| | ||
create-vm-root-disk --- | ||
``` | ||
|
||
1. `create-vm-root-disk` creates empty DataVolume which is used for Windows installation. | ||
2. `import-win-iso` creates new DataVolume with Windows ISO file with name defined in `isoDVName` parameter. The DataVolume needs to be in the same namespace as the PipelineRun (because the PVC is mounted into the PipelineRun pod). | ||
3. `modify-windows-iso-file` extracts imported ISO file, replaces prompt bootloader (which is used as a default one when EFI is used) with no-prompt bootloader, pack the updated files back to new ISO, convert the ISO and replaces original ISO with updated one.Replacement of bootloader is needed to be able to automate installation of Windows versions which require EFI. | ||
4. `create-vm` Task creates a VirtualMachine. A DataVolume with the Windows source ISO will be attached as CD-ROM and a second empty DataVolume will be used as installation destination. A third DataVolume with the virtio-win ISO will also be attached (Pipeline parameter `virtioContainerDiskName`). The VirtualMachine has to be created in the same namespace as the DataVolume with the ISO file. In case you would like to run the VirtualMachine in a different namespace, both Datavolumes have to be copied to the same namespace as the VirtualMachine. | ||
5. `wait-for-vmi-status` Task waits until the VirtualMachine shuts down. | ||
6. `create-base-dv` Task creates an DataVolume with the specified name and namespace (Pipeline parameters `baseDvName` and `baseDvNamespace`). Then it clones the second DataVolume of the installation VirtualMachine into the new DataVolume. | ||
7. `cleanup-vm` deletes the installer VirtualMachine and all of its DataVolumes. | ||
8. The output artifact will be the `baseDvName`/`baseDvNamespace` DataVolume with the basic Windows installation. It will boot into the Windows OOBE and needs to be setup further before it can be used. | ||
|
||
## How to run | ||
|
||
Before you create PipelineRuns, you must create ConfigMaps with an autounattend.xml in the same namespace in which the VirtualMachine will be created. | ||
|
||
Pipeline runs with resolvers: | ||
```yaml | ||
export WIN_IMAGE_DOWNLOAD_URL=$(./getisourl.py) # see paragraph Obtaining a download URL in an automated way | ||
|
||
oc create -f - <<EOF | ||
apiVersion: tekton.dev/v1 | ||
kind: PipelineRun | ||
metadata: | ||
generateName: windows11-installer-run- | ||
spec: | ||
params: | ||
- name: winImageDownloadURL | ||
value: ${WIN_IMAGE_DOWNLOAD_URL} | ||
pipelineRef: | ||
params: | ||
- name: catalog | ||
value: kubevirt-tekton-pipelines | ||
- name: type | ||
value: artifact | ||
- name: kind | ||
value: pipeline | ||
- name: name | ||
value: windows-efi-installer | ||
- name: version | ||
value: 4.15.0 | ||
resolver: hub | ||
taskRunSpecs: | ||
- pipelineTaskName: modify-windows-iso-file | ||
podTemplate: | ||
securityContext: | ||
fsGroup: 1001 | ||
runAsGroup: 1001 | ||
runAsUser: 1001 | ||
EOF | ||
``` | ||
```yaml | ||
oc create -f - <<EOF | ||
apiVersion: tekton.dev/v1 | ||
kind: PipelineRun | ||
metadata: | ||
generateName: windows2k22-installer-run- | ||
spec: | ||
params: | ||
- name: winImageDownloadURL | ||
value: ${WIN_IMAGE_DOWNLOAD_URL} | ||
- name: preferenceName | ||
value: windows.2k22 | ||
- name: autounattendConfigMapName | ||
value: windows2k22-autounattend | ||
- name: baseDvName | ||
value: win2k22 | ||
- name: isoDVName | ||
value: win2k22 | ||
pipelineRef: | ||
params: | ||
- name: catalog | ||
value: kubevirt-tekton-pipelines | ||
- name: type | ||
value: artifact | ||
- name: kind | ||
value: pipeline | ||
- name: name | ||
value: windows-efi-installer | ||
- name: version | ||
value: 4.15.0 | ||
resolver: hub | ||
taskRunSpecs: | ||
- pipelineTaskName: modify-windows-iso-file | ||
podTemplate: | ||
securityContext: | ||
fsGroup: 1001 | ||
runAsGroup: 1001 | ||
runAsUser: 1001 | ||
timeout: 1h0m0s | ||
EOF | ||
``` | ||
|
||
### Usage in multiple namespaces | ||
|
||
When a user defines a different namespace in e.g. `baseDvNamespace`, then the serviceAccount under which the Pipeline is running will require additional permissions in that namespace. Required permissions to run Task in different namespace can be found in README of each Task. | ||
|
||
## Cancelling/Deleting PipelineRuns | ||
|
||
When running the example Pipelines, they create temporary objects (DataVolumes, VirtualMachines, etc.). Each Pipeline has its own clean up system which should keep the cluster clean from leftovers. In case user hard deletes or cancels running PipelineRun, the PipelineRun will not clean temporary objects and objects will stay in the cluster and then they have to be deleted manually. To prevent this behaviour, cancel the [PipelineRun gracefully](https://tekton.dev/docs/pipelines/pipelineruns/#gracefully-cancelling-a-pipelinerun). It triggers special Tasks, which remove temporary objects and keep only result DataVolume/PVC. | ||
|
||
windows-efi-installer Pipeline generates for each PipelineRun new source DataVolume which contains imported ISO file. This DataVolume has generated name and is deleted after Pipeline succeeds. However, the created PVC will stay in cluster, but it will have terminating state. It will wait, until pipelinRun is deleted. This behaviour is caused by a fact, that PVC is mounted into modify-windows-iso TaskRun pod and PVC can be deleted only when the pod does not | ||
exist. | ||
|
||
#### Obtaining a download URL in an automated way | ||
|
||
The script [`getisourl.py`](https://github.com/kubevirt/kubevirt-tekton-tasks/blob/main/release/pipelines/windows-efi-installer/getisourl.py) can be used to automatically obtain a Windows 11 ISO download URL. | ||
|
||
The prerequisites are: | ||
|
||
- python3-selenium | ||
- chromedriver | ||
- chromium | ||
|
||
Run it as follows to initialize a WIN_URL variable. | ||
|
||
```bash | ||
# Real URL can look differently | ||
WIN_IMAGE_DOWNLOAD_URL=$(./getisourl.py) | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,134 @@ | ||
# Cleanup VM Task | ||
|
||
This task can execute a script, or a command in a Virtual Machine and stop/delete | ||
the VM afterwards. Best used together with tekton pipelines finally construct. | ||
|
||
### Parameters | ||
|
||
- **vmName**: Name of a VM to execute the action in. | ||
- **vmNamespace**: Namespace of a VM to execute the action in. (defaults to active namespace) | ||
- **stop**: Stops the VM after executing the commands when set to true. | ||
- **delete**: Deletes the VM after executing the commands when set to true. | ||
- **timeout**: Timeout for the command/script (includes potential VM start). The VM will be stopped or deleted accordingly once the timout expires. Should be in a 3h2m1s format. | ||
- **secretName**: Secret to use when connecting to a VM. | ||
- **command**: Command to execute in a VM. | ||
- **args**: Arguments of a command. | ||
- **script**: Script to execute in a VM. | ||
|
||
### Secret format | ||
|
||
The secret is used for storing credentials and options used in VM authentication. | ||
|
||
##### Specifying a type | ||
|
||
The secret should be of one of the following types: | ||
|
||
- `kubernetes.io/ssh-auth` | ||
- `Opaque`: Secret data should include the following key. | ||
- **type**: One of: ssh. | ||
|
||
##### SSH section | ||
|
||
Following secret data keys are recognized for SSH connections: | ||
|
||
- **user**: User to log in as. | ||
- **ssh-privatekey**: Private key to use for authentication. | ||
- **host-public-key**: Public key of known host to connect to. | ||
- **disable-strict-host-key-checking**: host-public-key (authorized-key) does not have to be supplied when this value is set to true. | ||
- **additional-ssh-options**: Additional arguments to pass to the SSH command. | ||
|
||
Please see [secret](examples/secrets) examples. | ||
|
||
### Usage | ||
|
||
Task run using resolver: | ||
``` | ||
apiVersion: tekton.dev/v1 | ||
kind: TaskRun | ||
metadata: | ||
generateName: cleanup-vm-taskrun-resolver- | ||
spec: | ||
params: | ||
- name: vmName | ||
value: vm-example | ||
- name: secretName | ||
value: ssh-secret | ||
- name: stop | ||
value: 'true' | ||
- name: delete | ||
value: 'false' | ||
- name: timeout | ||
value: 10m | ||
- name: command | ||
value: | ||
- systemctl | ||
- name: args | ||
value: | ||
- stop | ||
- postgresql | ||
taskRef: | ||
params: | ||
- name: catalog | ||
value: kubevirt-tekton-tasks | ||
- name: type | ||
value: artifact | ||
- name: kind | ||
value: task | ||
- name: name | ||
value: cleanup-vm | ||
- name: version | ||
value: 4.15.0 | ||
resolver: hub | ||
``` | ||
|
||
### Usage in different namespaces | ||
|
||
You can use task to do actions in different namespace. To do that, tasks requires special permissions. Apply these RBAC objects and permissions and update accordingly task run object with correct serviceAccount: | ||
|
||
``` | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRole | ||
metadata: | ||
name: cleanup-vm-task | ||
rules: | ||
- apiGroups: | ||
- kubevirt.io | ||
resources: | ||
- virtualmachines | ||
- virtualmachineinstances | ||
verbs: | ||
- get | ||
- list | ||
- watch | ||
- delete | ||
- apiGroups: | ||
- subresources.kubevirt.io | ||
resources: | ||
- virtualmachines/start | ||
- virtualmachines/stop | ||
- virtualmachines/restart | ||
verbs: | ||
- update | ||
--- | ||
apiVersion: v1 | ||
kind: ServiceAccount | ||
metadata: | ||
name: cleanup-vm-task | ||
--- | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: RoleBinding | ||
metadata: | ||
name: cleanup-vm-task | ||
roleRef: | ||
apiGroup: rbac.authorization.k8s.io | ||
kind: ClusterRole | ||
name: cleanup-vm-task | ||
subjects: | ||
- kind: ServiceAccount | ||
name: cleanup-vm-task | ||
--- | ||
``` | ||
|
||
### Platforms | ||
|
||
The Task can be run on linux/amd64 platform. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,95 @@ | ||
--- | ||
apiVersion: tekton.dev/v1 | ||
kind: Task | ||
metadata: | ||
annotations: | ||
tekton.dev/pipelines.minVersion: "0.43.0" | ||
tekton.dev/categories: Automation | ||
tekton.dev/tags: kubevirt | ||
tekton.dev/displayName: "OpenShift Virtualization cleanup VM" | ||
tekton.dev/platforms: "linux/amd64" | ||
artifacthub.io/maintainers: | | ||
- name: KubeVirt Tekton tasks maintainers | ||
email: [email protected] | ||
artifacthub.io/provider: Red Hat | ||
artifacthub.io/recommendations: | | ||
- url: https://kubevirt.io/ | ||
artifacthub.io/category: integration-delivery | ||
labels: | ||
app.kubernetes.io/version: 4.15.0 | ||
name: cleanup-vm | ||
spec: | ||
description: >- | ||
Run commands in KubeVirt virtual machine. | ||
This task can stop and delete VMs | ||
params: | ||
- description: Name of a VM to execute the action in. | ||
name: vmName | ||
type: string | ||
- description: Namespace of a VM to execute the action in. (defaults to active namespace) | ||
name: vmNamespace | ||
type: string | ||
default: "" | ||
- description: Stops the VM after executing the commands when set to true. | ||
name: stop | ||
type: string | ||
default: "true" | ||
- description: Deletes the VM after executing the commands when set to true. | ||
name: delete | ||
type: string | ||
default: "false" | ||
- description: Timeout for the command/script (includes potential VM start). The VM will be stopped or deleted accordingly once the timout expires. Should be in a 3h2m1s format. | ||
name: timeout | ||
type: string | ||
default: "30m" | ||
- description: Secret to use when connecting to a VM. | ||
name: secretName | ||
type: string | ||
default: "__empty__" | ||
- description: Command to execute in a VM. | ||
name: command | ||
type: array | ||
default: [] | ||
- description: Arguments of a command. | ||
name: args | ||
type: array | ||
default: [] | ||
- description: Script to execute in a VM. | ||
name: script | ||
type: string | ||
default: "" | ||
steps: | ||
- name: execute-in-vm | ||
image: "registry.access.redhat.com/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9:4.15.0" | ||
command: | ||
- entrypoint | ||
args: | ||
- '--stop' | ||
- $(params.stop) | ||
- '--delete' | ||
- $(params.delete) | ||
- '--timeout' | ||
- $(params.timeout) | ||
- '--' | ||
- $(params.command) | ||
- $(params.args) | ||
env: | ||
- name: COMMAND | ||
value: execute-in-vm | ||
- name: VM_NAME | ||
value: $(params.vmName) | ||
- name: VM_NAMESPACE | ||
value: $(params.vmNamespace) | ||
- name: EXECUTE_SCRIPT | ||
value: $(params.script) | ||
- name: CONNECTION_SECRET_NAME | ||
value: $(params.secretName) | ||
volumeMounts: | ||
- mountPath: /data/connectionsecret/ | ||
name: connectionsecret | ||
readOnly: true | ||
volumes: | ||
- name: connectionsecret | ||
secret: | ||
secretName: $(params.secretName) | ||
optional: true |
Oops, something went wrong.