Closed ChengyuZhu6 closed 10 months ago
/cc @jiangliu @sctb512 @imeoer @adamqqqplay
@ChengyuZhu6 Thanks for your great work! It will take some time to review.
It seems to break some tests, let's take a look first.
Cloud we enhance the helm chart? We can provide the options to configure the snapshotter fs_driver
.
Cloud we enhance the helm chart? We can provide the options to configure the snapshotter
fs_driver
.
Yes, I plan to use helm for installing snapshotter, but it requires a different repo. So I have proposed an alternative method that does not rely on helm. Next, I will submit a PR to the helm repo.
It seems the CI still needs to be fixed: https://github.com/containerd/nydus-snapshotter/actions/runs/7269460179/job/19807116165?pr=570 :)
@ChengyuZhu6 I've finished my review and left a couple of comments. I didn't find any bug but I'm afraid I won't have time to give it a try. Thanks for working on this && amazing work!
@ChengyuZhu6, one thing that I'm missing from your patches is the ability to start the nydus as a systemd service.
While this may not be used by everyone, we should give the users the ability to do as this is way more reliable than just directly calling a binary.
I'd suggest to add an option for that, as that's most likely what we'll use on the Confidential Containers side.
@ChengyuZhu6, one thing that I'm missing from your patches is the ability to start the nydus as a systemd service.
While this may not be used by everyone, we should give the users the ability to do as this is way more reliable than just directly calling a binary.
I'd suggest to add an option for that, as that's most likely what we'll use on the Confidential Containers side.
Sure. I'll add it.
@ChengyuZhu6, one thing that I'm missing from your patches is the ability to start the nydus as a systemd service.
While this may not be used by everyone, we should give the users the ability to do as this is way more reliable than just directly calling a binary.
I'd suggest to add an option for that, as that's most likely what we'll use on the Confidential Containers side.
Done.
All modified and coverable lines are covered by tests :white_check_mark:
Comparison is base (
0397a1f
) 33.63% compared to head (e0ba512
) 33.52%. Report is 8 commits behind head on main.
Thanks for the work!
In k8s auth e2e tests, we run snapshotter as systemd service in cri auth test and run snapshotter as standalone process in kube auth test to ensure all two mode can run as expected.
@imeoer I have made the changes you requested. Please take another look and let me know if there is anything else I need to do. I appreciate your feedback and guidance.
@fidencio @wainersm @zvonkok @liudalibj I made some changes after your reviews that I decided to avoid using toml-cli to edit toml files, since it only works on the x86 architecture.
We'd better to standardize all the binary paths to /usr/local/bin/*
and all the configuration paths to /etc/nydus/*.json
, others LGTM, thanks! Let's provide a helm chart to further reduce the difficulty of the deploy steps.
Thanks @ChengyuZhu6 for the work and all reviewers @fidencio @wainersm @zvonkok @beraldoleal !
Confidential Containers leverage nydus snapshotter to pull images within the guest using
fs_driver=proxy
and share images on the host usingfs_driver=blockdev
to ensure data confidentiality. However, when running related tests for Kata CI with nydus snapshotter, we faced challenges installing and uninstalling nydus snapshotter on various architectures and configuring the containerd settings. We envisioned a smoother experience, where nydus snapshotter provides a daemonset, enabling users to seamlessly run and clean up nydus snapshotter and making it more easy.Fixes #565