Commit Graph

6 Commits

Author SHA1 Message Date
Alberto Faria 7aa4b1728c Don't add selinux=0 karg to disk images generated from bootc containers
Signed-off-by: Alberto Faria <afaria@redhat.com>
2024-10-04 14:37:34 +01:00
Alberto Faria 9e862dda38 Ensure krun container has KVM device
Signed-off-by: Alberto Faria <afaria@redhat.com>
2024-10-04 07:47:34 +01:00
Alberto Faria 132cc4c52a Add --bootc-disk-size option
It allows settings the disk size of the VM image that is generated from
a bootc container image.

Also improve the default disk size by basing it on the container image
size.

Signed-off-by: Alberto Faria <afaria@redhat.com>
2024-07-11 15:31:21 +01:00
Alberto Faria c0888c6ffb Extend bootc container support to Docker
Signed-off-by: Alberto Faria <afaria@redhat.com>
2024-07-11 15:31:20 +01:00
Alberto Faria ad26d7fe95 Cache VM images generated from bootc container images
Store them as untagged containerdisks in the user's container storage.
They appear in the output of `podman images`, making users aware of
their existence and size on disk, and cleanup commands like `podman
image prune` remove them.

Signed-off-by: Alberto Faria <afaria@redhat.com>
2024-07-11 15:31:12 +01:00
Alberto Faria a9118ee63c Add support for running bootc bootable containers
We attempt to detect if a container image is bootable. We can't easily
retrieve the image's labels, so we check if /usr/lib/bootc/install
exists and is a directory. If so, it is a bootable container. If it is a
bootable container but we're not running under Podman, we fail with an
error.

Once our container's entrypoint starts running, a background process on
the host (outside the container) queries Podman for the image's name and
ID, which the OCI runtime does not get but bootc-install needs. It then
saves the container image as an OCI archive.

It then runs the original container to generate the VM image. We do this
using krun [1] so that elevated privileges aren't necessary. Our
entrypoint blocks until this is done, and all subsequent logic remains
the same.

We could potentially avoid the OCI archive creation step by mounting the
host's container storage into the container running under krun. This
isn't trivial to achieve due to SELinux label and context mismatches
between the host and the krun environment, so we leave this optimization
for a future date.

Closes #26.

[1] https://github.com/containers/crun/blob/main/krun.1.md

Signed-off-by: Alberto Faria <afaria@redhat.com>
2024-07-11 15:31:11 +01:00