Skip to content

Hook is a Linux distribution built with LinuxKit. It is an operating system installation environment (osie) that netboots in a device and runs Tinkerbell workflows.

License

Notifications You must be signed in to change notification settings

tinkerbell-bac/hook

 
 

Repository files navigation

Hook

Hook is the Tinkerbell Installation Environment for bare-metal. It runs in-memory, installs operating system, and handles deprovisioning.

Motivation

One of the Tinkerbell components is the operating system installation environment. Currently, Tinkerbell uses OSIE. That implementation is open-sourced by Equinix Metal and it is serving the purpose of provisioning and de-provisioning hardware at a huge scale. But why we started this project?

  • Because we like to Hack the Kernel!
  • Tinkerbell architecture leaves an open door in terms of the operating system installation environment you can use, it serves one for simplicity ,but users can write their own. This is an implementation to validate that the model works (it does!! this is why we are here)
  • Looking at the CI/CD build time for OSIE is ~1h on average
  • The building process is not standardised, which is critical for an open-source project because it causes friction for contributors. This project, as highlighted later in this page, uses LinuxKit a tool provided by Docker, now part of the Linux Computing Foundation. It gives us:
    • Documentation about how the building phase works
    • A clear and defined CLI and specification mechanism (YAML)
    • A community that is built and supportive
    • LinuxKit cross-compiles in many architectures
    • Different output format: ISO, init ramkdisk, aws, docker, rpi3...
  • It is not easy to explain to the Tinkerbell community how OSIE works and the components it is made for, a lot of them are coming from specific Equinix Metal operational experience and they are not strictly needed in Tinkerbell. There is an ongoing conversation from the contributors about a replacement or a complete refactoring for OSIE.

Architecture

The hook project aims to provide an "in-place" swappable set of files (kernel/initramfs) that can be used to replace the OSIE environment that comes from Equinix Metal. The key aims of this new project:

  • Immutable output
  • Batteries included (but swappable if needed)
  • Ease of build (Subsequent builds of hook are ~47 seconds)
  • Lean / simple design
  • Clean base to build upon

The hook project predominantly uses linuxkit as the toolkit that will produce repeatable and straightforward build of the entire in-memory operating system. The linuxkit project combines a Linux kernel with a number of additional container images to produce a Linux Operating System with just the right amount of functionality (no less / no more). We have built upon the minimal set of components:

  • containerd (the engine to start/stop all other components in a LinuxKit OS)
  • dhcp (for network access)
  • ntp (network time)
  • rngd (random number gen for entropy)

To this minimal build, we've added our own set of containers that will provide the functionality needed for a tink-worker to run successfully:

tink-docker

The tink-docker container builds upon the upstream dind (docker-in-docker) container and adds the additional functionality to retrieve the certificates needed for the docker engine to communicate with the Tinkerbell repository before it starts the docker engine. The docker engine will be exposed through the /var/run/docker.sock that will use a bind mount so that the container bootkit can access it.

bootkit

The bootkit container will parse the /proc/cmdline and the metadata service in order to retrieve the specific configuration for tink-worker to be started for the current/correct machine. It will then speak with the tink-docker engine API through the shared /var/run/docker.sock, where it will ask the engine to run the tink-worker:latest container, which in turn will begin to execute the workflow/actions associated with that machine.

How to use hook with Sandbox

sandbox is a project that helps you to create and run the Tinkerbell stack locally with Vagrant, on Equinix Metal with Terraform and, acts as a guide to deploying Tinkerbell wherever you like. I will tell you how you can change the default operating system installer environment called OSIE with this project.

There are essentially two methods a manual one and a more automatic one. Have a look at the manual one even if you intend to use the automatic one to learn what what the automation does for you.

The manual way

When you start sandbox in vagrant, for example as part of the provisioning step for the provisioner machine the setup.sh script gets executed. The script does a bunch of things the one we care about here is the setup_osie function. In practice it creates the folder: sandbox/deploy/state/webroot/misc/osie/current. If you ran sandbox you already have that directory. current is the location that serves the operating system installation environment that runs inside a worker machine. You can even move or delete that directory because we have to replace it with the release package containing the new operating system. After you have removed the directory, it is time to re-create it:

# check out this repo
git clone https://github.com/tinkerbell/hook.git

# build it - this produces a hook-<commit SHA>.tar.gz
make dist

# copy the output to current (the filename will be different)
tar -xf hook-bc3e58a-dirty.tar.gz -C ../sandbox/deploy/state/webroot/misc/osie/current/

Now you are ready to boot the worker, it will pick up the new operating system installation environment.

The automation way

Sandbox has a file called current_versions.sh. If you change OSIE_DOWNLOAD_LINK with the hook link the setup.sh script will download the OS again and it will uncompress it in the right location (only if ./deploy/state/webroot/misc/osie/current does not exist)

Package a release

make dist

The dist make target will do a couple of things:

  1. Build the required docker images using docker buildx.
  2. It will use linuxkit build to prepare the init ramdisk and the kernel.
  3. It will convert the init ramkdisk in the right format that iPXE can boot
  4. It will create a tar.gz archive in the root of the project containing all the files in the proper format, ready to be served via Tinkerbell.

Build for local testing (only the local architecture)

make dev-dist

Next steps

  • Test passing pid:host to tink-docker, this should allow graceful reboots [done]
  • Re-write a bunch of actions that are un-manageable shell scripts (disk management being the first) [done]

Troubleshooting

Due to a very unexplainable issue, on rare occasions, the initramfs generated may not work, if that is the case, then the make convert command we re-build the initramfs in a different format. (sometimes this has occurred with changed one letter of a string inside some source code and rebuilding... not sure why yet)

It is also possible to build a debug version of hook, that will have an sshd server running with any public keys you have. This is achieved through the command `make debug-image'

Nix for CI/CD

This project uses Nix for a couple of reasons. We want to use it more intensively to see if it can help me quickly iterate over CI/CD. We think we like it, but are not convinced yet. Anyway, if you are not into Nix and don't like it, here are a few tips.

First you can use Docker:

$ docker run -it -v nix-build-cache:/nix/store -v $PWD:/opt -v /var/run/docker.sock:/var/run/docker.sock --workdir /opt nixos/nix sh

# now you are inside the container and you can use nix-shell to reproduce the
environment
$ nix-shell
# You can run the command GitHub action runs:
$ ./hack/build-and-deploy.sh

# or you can use make to build LinuxKit image
$ make image

Second: you can copy paste ./hack/build-and-deploy.sh elsewhere and change the shebang:

#!/usr/bin/env nix-shell
#!nix-shell -i bash ../shell.nix

With #!/bin/bash or something similar.

About

Hook is a Linux distribution built with LinuxKit. It is an operating system installation environment (osie) that netboots in a device and runs Tinkerbell workflows.

Resources

License

Code of conduct

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C 39.2%
  • Makefile 27.6%
  • Dockerfile 16.4%
  • Go 15.0%
  • Nix 1.5%
  • Shell 0.3%