1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
|
---
title: 'Podman ansible role'
description: 'The ansible role I use to manage my podman containers'
date: '2024-11-08'
tags:
- ansible
- podman
---
## Introduction
Before succumbing to nixos, I had was running all my containers on k3s. This time I am migrating things to podman and trying to achieve a lighter setup. This article presents the ansible role I wrote to manage podman containers.
## The role
### Tasks
The main tasks file setups podman and the required network configurations with:
``` yaml
---
- name: 'Run OS specific tasks for the podman role'
include_tasks: '{{ ansible_distribution }}.yaml'
- name: 'Make podman scripts directory'
file:
path: '/etc/podman'
mode: '0700'
owner: 'root'
state: 'directory'
- name: 'Deploy podman configuration files'
copy:
src: 'cni-podman0'
dest: '/etc/network/interfaces.d/'
owner: 'root'
mode: '444'
```
My OS specific task file `Debian.yaml` looks like this:
``` yaml
---
- name: 'Install podman dependencies'
ansible.builtin.apt:
name:
- 'buildah'
- 'podman'
- 'rootlesskit'
- 'slirp4netns'
- name: 'Deploy podman configuration files'
copy:
src: 'podman-bridge.json'
dest: '/etc/cni/net.d/87-podman-bridge.conflist'
owner: 'root'
mode: '444'
```
The entrypoint tasks for this role is the `container.yaml` task file:
``` yaml
---
# Inputs:
# container:
# cmd: optional(list(string))
# env_vars: list(env_var)
# image: string
# name: string
# publishs: list(publish)
# volumes: list(volume)
# With:
# env_var:
# name: string
# value: string
# publish:
# container_port: string
# host_port: string
# ip: string
# volume:
# dest: string
# src: string
- name: 'Deploy podman systemd service for {{ container.name }}'
template:
src: 'container.service'
dest: '/etc/systemd/system/podman-{{ container.name }}.service'
owner: 'root'
mode: '0444'
notify: 'systemctl daemon-reload'
- name: 'Deploy podman scripts for {{ container.name }}'
template:
src: 'container-{{ item }}.sh'
dest: '/etc/podman/{{ container.name }}-{{ item }}.sh'
owner: 'root'
mode: '0500'
register: 'deploy_podman_scripts'
loop:
- 'start'
- 'stop'
- name: 'Restart podman container {{ container.name }}'
shell:
cmd: "systemctl restart podman-{{ container.name }}"
when: 'deploy_podman_scripts.changed'
- name: 'Start podman container {{ container.name }} and activate it on boot'
service:
name: 'podman-{{ container.name }}'
enabled: true
state: 'started'
```
### Handlers
There is a single `main.yaml` handler:
``` yaml
---
- name: 'systemctl daemon-reload'
shell:
cmd: 'systemctl daemon-reload'
```
### Files
Here is the `cni-podman0` I deploy on Debian hosts. It is required for the bridge to be up on boot so that other services can bind ports on it. Without this, the bridge would only come up when the first container starts which is too late in the boot process.
``` text
###############################################################################
# \_o< WARNING : This file is being managed by ansible! >o_/ #
# ~~~~ ~~~~ #
###############################################################################
auto cni-podman0
iface cni-podman0 inet static
address 10.88.0.1/16
pre-up brctl addbr cni-podman0
post-down brctl delbr cni-podman0
```
Here is the JSON cni bridge configuration file I use, customized to add IPv6 support:
``` json
{
"cniVersion": "0.4.0",
"name": "podman",
"plugins": [
{
"type": "bridge",
"bridge": "cni-podman0",
"isGateway": true,
"ipMasq": true,
"hairpinMode": true,
"ipam": {
"type": "host-local",
"routes": [
{
"dst": "0.0.0.0/0"
}, {
"dst": "::/0"
}
],
"ranges": [
[{
"subnet": "10.88.0.0/16",
"gateway": "10.88.0.1"
}], [{
"subnet": "fd42::/48",
"gateway": "fd42::1"
}]
]
}
}, {
"type": "portmap",
"capabilities": {
"portMappings": true
}
}, {
"type": "firewall"
}, {
"type": "tuning"
}
]
}
```
### Templates
Here is the jinja templated start bash script:
``` shell
#!/usr/bin/env bash
###############################################################################
# \_o< WARNING : This file is being managed by ansible! >o_/ #
# ~~~~ ~~~~ #
###############################################################################
set -euo pipefail
podman rm -f {{ container.name }} || true
rm -f /run/podman-{{ container.name }}.ctr-id
exec podman run \
--rm \
--name={{ container.name }} \
--log-driver=journald \
--cidfile=/run/podman-{{ container.name }}.ctr-id \
--cgroups=no-conmon \
--sdnotify=conmon \
-d \
{% for env_var in container.env_vars | default([]) %}
-e {{ env_var.name }}={{ env_var.value }} \
{% endfor %}
{% for publish in container.publishs | default([]) %}
-p {{ publish.ip }}:{{ publish.host_port }}:{{ publish.container_port }} \
{% endfor %}
{% for volume in container.volumes | default([]) %}
-v {{ volume.src }}:{{ volume.dest }} \
{% endfor %}
{{ container.image }} {% for cmd in container.cmd | default([]) %}{{ cmd }} {% endfor %}
```
Here is the jinja templated stop bash script:
``` shell
#!/usr/bin/env bash
###############################################################################
# \_o< WARNING : This file is being managed by ansible! >o_/ #
# ~~~~ ~~~~ #
###############################################################################
set -euo pipefail
if [[ ! "$SERVICE_RESULT" = success ]]; then
podman stop --ignore --cidfile=/run/podman-{{ container.name }}.ctr-id
fi
podman rm -f --ignore --cidfile=/run/podman-{{ container.name }}.ctr-id
```
Here is the jinja templated systemd unit service:
``` shell
###############################################################################
# \_o< WARNING : This file is being managed by ansible! >o_/ #
# ~~~~ ~~~~ #
###############################################################################
[Unit]
After=network-online.target
Description=Podman container {{ container.name }}
[Service]
ExecStart=/etc/podman/{{ container.name }}-start.sh
ExecStop=/etc/podman/{{ container.name }}-stop.sh
NotifyAccess=all
Restart=always
TimeoutStartSec=0
TimeoutStopSec=120
Type=notify
[Install]
WantedBy=multi-user.target
```
## Usage example
I do not call the role from a playbook, I prefer running the setup from an application’s role that relies on podman using a meta/main.yaml containing something like:
``` yaml
---
dependencies:
- role: 'borg'
- role: 'nginx'
- role: 'podman'
```
Then from a tasks file:
``` yaml
- include_role:
name: 'podman'
tasks_from: 'container'
vars:
container:
cmd: ['--config-path', '/srv/cfg/conf.php']
name: 'privatebin'
env_vars:
- name: 'PHP_TZ'
value: 'Europe/Paris'
- name: 'TZ'
value: 'Europe/Paris'
image: 'docker.io/privatebin/nginx-fpm-alpine:1.7.4'
publishs:
- container_port: '8080'
host_port: '8082'
ip: '127.0.0.1'
volumes:
- dest: '/srv/cfg/conf.php:ro'
src: '/etc/privatebin.conf.php'
- dest: '/srv/data'
src: '/srv/privatebin'
```
## Conclusion
I enjoy this design, it works really well. I am missing a task for deprovisioning a container but I have not needed it yet.
|