Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
docs:guide-user:virtualization:docker_openwrt_image [2019/11/07 20:00] aparcar1docs:guide-user:virtualization:docker_openwrt_image [2022/06/23 18:07] (current) – [OpenWrt in QEMU in Docker: Advanced Example] Simplify supplying custom config jwmullally
Line 1: Line 1:
-====== Docker OpenWrt Image ====== +====== OpenWrt as a Docker Image ======
- +
-<color #ed1c24>This documentation is highly outdated, please consider using https://github.com/openwrt/docker</color> +
  
 See also [[docs:guide-user:virtualization:obtain.firmware.docker|Docker OpenWrt Image Generation]]. See also [[docs:guide-user:virtualization:obtain.firmware.docker|Docker OpenWrt Image Generation]].
Line 8: Line 6:
  
 {{:media:homepage-docker-logo.png|}} {{:media:homepage-docker-logo.png|}}
 +
 +===== OpenWrt as a Native Docker Image =====
 +
 +{{page>meta:infobox:outdated&noheader&nofooter&noeditbtn}}
 +
 +<WRAP center round important 70%>
 +<color #ed1c24>This documentation is highly outdated, please consider using https://github.com/openwrt/docker</color>
 +</WRAP>
  
 Import the base image: Import the base image:
Line 265: Line 271:
 </code> </code>
  
-===== Todolist =====+==== Todolist ====
  
   * Fix /sbin/init to get the openwrt banner and shell at the end?   * Fix /sbin/init to get the openwrt banner and shell at the end?
Line 275: Line 281:
   * publish images with interesting profiles (lighttpd dirlist server, ftpd server, ircd server, tor server, etc...)   * publish images with interesting profiles (lighttpd dirlist server, ftpd server, ircd server, tor server, etc...)
  
-===== Links =====+==== Links ====
  
   * https://hub.docker.com/r/zoobab/openwrt-15.05.1-x86-64-rootfs/   * https://hub.docker.com/r/zoobab/openwrt-15.05.1-x86-64-rootfs/
  
-===== Example Dockerfile =====+==== Example Dockerfile ====
 Note the use of "exec format" for the CMD which properly makes /sbin/init proc 1 and boots all services (fixing many issues). Note the use of "exec format" for the CMD which properly makes /sbin/init proc 1 and boots all services (fixing many issues).
  
Line 299: Line 305:
 # using exec format so that /sbin/init is proc 1 (see procd docs) # using exec format so that /sbin/init is proc 1 (see procd docs)
 CMD ["/sbin/init"] CMD ["/sbin/init"]
 +</code>
 +
 +
 +===== OpenWrt in QEMU in Docker =====
 +
 +This section provides example Docker files to run OpenWrt inside QEMU inside a Docker container.
 +
 +This provides all the power and configurability of regular OpenWrt (firewall, kernel modules etc), with the only drawback being the slower emulation speed (unless KVM is enabled). This method allows OpenWrt to easily run in standard container clusters (e.g. Kubernetes) without any additional permissions and can provide various services through exposed ports (e.g. VoIP, VPN, etc).
 +
 +Example build and usage:
 +
 +<code bash>
 +docker build . -t openwrt_in_qemu
 +docker run --name my_openwrt -p 30022:30022 -p 30080:30080 openwrt_in_qemu
 +</code>
 +
 +<code bash>
 +docker exec -ti my_openwrt /bin/sh
 +socat -,raw,echo=0,icanon=0 unix-connect:/tmp/qemu-console.sock
 +</code>
 +
 +==== OpenWrt in QEMU in Docker: Simple Example ====
 +
 +<code>
 +# syntax=docker/dockerfile:1
 +#
 +# This Dockerfile creates a container image running OpenWrt in a QEMU VM.
 +# https://openwrt.org/docs/guide-user/virtualization/docker_openwrt_image
 +#
 +# To connect to the VM serial console, connect to the running container
 +# and execute this command:
 +#
 +#     socat -,raw,echo=0,icanon=0 unix-connect:/tmp/qemu-console.sock
 +#     socat -,echo=0,icanon=0 unix-connect:/tmp/qemu-monitor.sock
 +#
 +# To enable remote admin, set a password on the root account:
 +#
 +#     passwd
 +#
 +# and enable HTTP and SSH on the WAN interface exposed by QEMU to the
 +# container:
 +#
 +#     uci add firewall rule
 +#     uci set firewall.@rule[-1].name='Allow-Admin'
 +#     uci set firewall.@rule[-1].enabled='true'
 +#     uci set firewall.@rule[-1].src='wan'
 +#     uci set firewall.@rule[-1].proto='tcp'
 +#     uci set firewall.@rule[-1].dest_port='22 80'
 +#     uci set firewall.@rule[-1].target='ACCEPT'
 +#     service firewall restart
 +
 +FROM docker.io/library/alpine:3.15
 +
 +RUN apk add --no-cache \
 +        curl \
 +        qemu-system-x86_64 \
 +        qemu-img \
 +        socat \
 +        && \
 +    rm -f /usr/share/qemu/edk2-*
 +
 +ENV IMAGE_URL="https://downloads.openwrt.org/releases/21.02.3/targets/x86/64/openwrt-21.02.3-x86-64-generic-ext4-combined.img.gz"
 +ENV IMAGE_FILE="openwrt-21.02.3-x86-64-generic-ext4-combined.img.gz"
 +ENV IMAGE_SHA256="f5a0401048d6fb3f707581c4914086093fecea642c86507714caea967a4a6a32"
 +
 +WORKDIR /var/lib/qemu-image
 +RUN curl -L "${IMAGE_URL}" -o "${IMAGE_FILE}" && \
 +    sh -x -c '[ "$(sha256sum "${IMAGE_FILE}")" = "${IMAGE_SHA256}  ${IMAGE_FILE}" ]'
 +
 +RUN echo -e '#!/bin/sh\n\
 +set -ex \n\
 +if [ ! -f /var/lib/qemu/image.qcow2 ]; then \n\
 +    gunzip --stdout "/var/lib/qemu-image/${IMAGE_FILE}" > /var/lib/qemu/image.raw || true \n\
 +    qemu-img convert -f raw -O qcow2 /var/lib/qemu/image.raw /var/lib/qemu/image.qcow2 \n\
 +    rm /var/lib/qemu/image.raw \n\
 +    qemu-img resize /var/lib/qemu/image.qcow2 1G \n\
 +fi \n\
 +exec /usr/bin/qemu-system-x86_64 \\\n\
 +    -nodefaults \\\n\
 +    -display none \\\n\
 +    -m 256M \\\n\
 +    -smp 2 \\\n\
 +    -nic "user,model=virtio,restrict=on,ipv6=off,net=192.168.1.0/24,host=192.168.1.2" \\\n\
 +    -nic "user,model=virtio,net=172.16.0.0/24,hostfwd=tcp::30022-:22,hostfwd=tcp::30080-:80,hostfwd=tcp::30443-:443" \\\n\
 +    -chardev socket,id=chr0,path=/tmp/qemu-console.sock,mux=on,logfile=/dev/stdout,signal=off,server=on,wait=off \\\n\
 +    -serial chardev:chr0 \\\n\
 +    -monitor unix:/tmp/qemu-monitor.sock,server,nowait \\\n\
 +    -drive file=/var/lib/qemu/image.qcow2,if=virtio \\\n\
 +\n' > /usr/local/bin/entrypoint.sh && \
 +    chmod +x /usr/local/bin/entrypoint.sh
 +
 +EXPOSE 30022
 +EXPOSE 30080
 +EXPOSE 30443
 +VOLUME /var/lib/qemu
 +WORKDIR /tmp
 +USER 1001
 +CMD ["/usr/local/bin/entrypoint.sh"]
 +</code>
 +
 +
 +==== OpenWrt in QEMU in Docker: Advanced Example ====
 +
 +This Docker image is similar to the above, with a few more features:
 +
 +  * Support arbitrary container user IDs
 +  * Tunable QEMU configuration
 +  * A SPICE console + USB redirection
 +  * KVM acceleration support
 +  * Custom VM initialization scripts (e.g. from a Kubernetes ConfigMap)
 +  * Default admin firewall rules and disk resizing
 +  * Healthchecks
 +
 +<code>
 +# syntax=docker/dockerfile:1
 +#
 +# This Dockerfile creates a container image running OpenWRT in a QEMU VM.
 +# https://openwrt.org/docs/guide-user/virtualization/docker_openwrt_image
 +# This can be run on regular container clusters (e.g. Kubernetes,OpenShift)
 +# without any special permissions.
 +#
 +#   docker build . -t openwrt_in_qemu
 +#   docker run --name my_openwrt -p 30022:30022 -p 30080:30080 openwrt_in_qemu
 +#
 +# For VGA console access and USB redirection, connect with a SPICE client 
 +# (e.g. "remote-viewer") on port 5900.
 +#
 +# To connect to the VM serial console, connect to the running container
 +# and execute one of these commands:
 +#
 +#   socat -,raw,echo=0,icanon=0 unix-connect:/tmp/qemu-console.sock
 +#   socat -,echo=0,icanon=0 unix-connect:/tmp/qemu-monitor.sock
 +#
 +# To use KVM acceleration, add these to your docker/podman arguments:
 +#
 +#   docker --env QEMU_ARGS="-enable-kvm" --device=/dev/kvm --group-add "$(getent group kvm | cut -d: -f3)"
 +#
 +# Volumes:
 +#
 +#   /var/lib/qemu:
 +#     The VM disk image.
 +#     
 +#   /var/lib/vmconfig:
 +#     You can use a shared volume/ConfigMap/etc to provide custom initial
 +#     configuration. The $CWD of these files is the parent vmconfig dir,
 +#     which you can use to provide other files. For testing, start docker 
 +#     with "--volume /tmp/my_config:/var/lib/vmconfig:z"
 +#
 +#     container.d: Scripts run on the container before config is sent to the VM
 +#     vm.d: Scripts run on the VM
 +
 +FROM docker.io/library/alpine:3.16
 +
 +# Install QEMU, remove large unnecessary files
 +RUN apk add --no-cache \
 +        curl \
 +        make \
 +        qemu-chardev-spice \
 +        qemu-hw-display-virtio-vga \
 +        qemu-hw-usb-redirect \
 +        qemu-img \
 +        qemu-system-x86_64 \
 +        qemu-ui-spice-core \
 +        socat \
 +        && \
 +    rm -f /usr/share/qemu/edk2-*
 +
 +# Download OpenWRT image
 +ENV IMAGE_URL="https://downloads.openwrt.org/releases/21.02.3/targets/x86/64/openwrt-21.02.3-x86-64-generic-ext4-combined.img.gz"
 +ENV IMAGE_FILE="openwrt-21.02.3-x86-64-generic-ext4-combined.img.gz"
 +ENV IMAGE_SHA256="f5a0401048d6fb3f707581c4914086093fecea642c86507714caea967a4a6a32"
 +
 +WORKDIR /var/lib/qemu-image
 +
 +RUN curl -L "${IMAGE_URL}" -o "${IMAGE_FILE}" && \
 +    sh -x -c '[ "$(sha256sum "${IMAGE_FILE}")" = "${IMAGE_SHA256}  ${IMAGE_FILE}" ]'
 +
 +# Support Arbitrary User IDs in container
 +RUN echo -e '#!/bin/sh\n\
 +set -ex \n\
 +if ! whoami &> /dev/null; then \n\
 +  if [ -w /etc/passwd ]; then \n\
 +    echo "container:x:$(id -u):0:Container User:/tmp:/sbin/nologin" >> /etc/passwd \n\
 +    echo "container:x:$(id -u):$(id -u)" >> /etc/group \n\
 +  fi \n\
 +fi \n\
 +\n' > /usr/local/bin/create-container-user.sh && \
 +    chmod +x /usr/local/bin/create-container-user.sh && \
 +    chmod g=u /etc/passwd && \
 +    chmod g=u /etc/group
 +
 +# Provision VM disk image
 +RUN echo -e '#!/bin/sh\n\
 +set -ex \n\
 +if [ ! -f /var/lib/qemu/image.qcow2 ]; then \n\
 +    gunzip --stdout "/var/lib/qemu-image/${IMAGE_FILE}" > /var/lib/qemu/image.raw || true \n\
 +    qemu-img convert -f raw -O qcow2 /var/lib/qemu/image.raw /var/lib/qemu/image.qcow2 \n\
 +    rm /var/lib/qemu/image.raw \n\
 +fi \n\
 +if [ -n "${QEMU_STORAGE}" ]; then \n\
 +    qemu-img resize /var/lib/qemu/image.qcow2 "${QEMU_STORAGE}" \n\
 +fi \n\
 +\n' > /usr/local/bin/provision-image.sh && \
 +    chmod +x /usr/local/bin/provision-image.sh
 +
 +# Create default VM configuration scripts
 +RUN mkdir -p /usr/local/share/vmconfig/container.d /usr/local/share/vmconfig/vm.d
 +
 +RUN echo -e '#!/bin/sh\n\
 +set -e \n\
 +cat > vm.d/20-hostname.sh <<EOF\n\
 +#!/bin/sh \n\
 +set -e \n\
 +uci set system.@system[0].hostname="$QEMU_HOSTNAME" \n\
 +uci commit system \n\
 +EOF\n\
 +chmod +x vm.d/20-hostname.sh \n\
 +\n\' > /usr/local/share/vmconfig/container.d/20-hostname.sh && \
 +    chmod +x /usr/local/share/vmconfig/container.d/20-hostname.sh
 +
 +RUN echo -e '#!/bin/sh\n\
 +set -e \n\
 +cat > vm.d/20-password.sh <<EOF\n\
 +#!/bin/sh \n\
 +set -e \n\
 +echo -e "$QEMU_PASSWORD\\n$QEMU_PASSWORD" | passwd \n\
 +EOF\n\
 +chmod +x vm.d/20-password.sh \n\
 +\n\' > /usr/local/share/vmconfig/container.d/20-password.sh && \
 +    chmod +x /usr/local/share/vmconfig/container.d/20-password.sh
 +
 +RUN echo -e '#!/bin/sh\n\
 +set -ex \n\
 +uci add firewall rule \n\
 +uci set firewall.@rule[-1].name="Allow-Admin" \n\
 +uci set firewall.@rule[-1].enabled="true" \n\
 +uci set firewall.@rule[-1].src="wan" \n\
 +uci set firewall.@rule[-1].proto="tcp" \n\
 +uci set firewall.@rule[-1].dest_port="22 80 443" \n\
 +uci set firewall.@rule[-1].target="ACCEPT" \n\
 +uci commit firewall \n\
 +\n\' > /usr/local/share/vmconfig/vm.d/20-firewall.sh && \
 +    chmod +x /usr/local/share/vmconfig/vm.d/20-firewall.sh
 +
 +RUN echo -e '#!/bin/sh\n\
 +set -ex \n\
 +ubus wait_for network.interface.wan \n\
 +sleep 3 \n\
 +opkg update \n\
 +\n\' > /usr/local/share/vmconfig/vm.d/30-wait-for-network.sh && \
 +chmod +x /usr/local/share/vmconfig/vm.d/30-wait-for-network.sh
 +
 +RUN echo -e '#!/bin/sh\n\
 +set -ex \n\
 +opkg install partx-utils resize2fs sfdisk tune2fs \n\
 +echo "- +" | sfdisk --force -N 2 /dev/vda \n\
 +partx -u /dev/vda \n\
 +mount -o remount,ro / \n\
 +tune2fs -O^resize_inode /dev/vda2 \n\
 +e2fsck -y -f /dev/vda2 || true \n\
 +mount -o remount,rw / \n\
 +resize2fs /dev/vda2 \n\
 +\n\' > /usr/local/share/vmconfig/vm.d/40-resize-disk.sh && \
 +chmod +x /usr/local/share/vmconfig/vm.d/40-resize-disk.sh
 +
 +# Write VM configuration archive as serial console commands to STDOUT
 +RUN echo -e '#!/bin/sh\n\
 +set -e \n\
 +cat <<EOF\n\
 +\n\
 +echo "require \\"nixio\\"; io.stdin:setvbuf \\"no\\"; io.write(nixio.bin.b64decode(io.read()));" > /tmp/base64_decode.lua \n\
 +lua /tmp/base64_decode.lua > /tmp/vmconfig.tgz \n\
 +EOF\n\
 +tar -zcv -C "$1" . | base64 -w0 \n\
 +cat <<EOF\n\
 +\n\
 +mkdir /tmp/vmconfig \n\
 +tar -zxvf /tmp/vmconfig.tgz -C /tmp/vmconfig \n\
 +sleep 5 \n\
 +(cd /tmp/vmconfig && (for f in \$(ls vm.d); do echo "Executing ./vm.d/\$f"; "./vm.d/\$f" || exit 1; done)) && echo -e "\\nVM configuration result: successful." || echo -e "\\nVM configuration result: failed." \n\
 +poweroff \n\
 +EOF\n\
 +\n' > /usr/local/bin/serialize-vm-config.sh && \
 +    chmod +x /usr/local/bin/serialize-vm-config.sh
 +
 +# Send configuration archive to VM using serial console
 +RUN echo -e '#!/bin/sh\n\
 +set -ex \n\
 +echo "Discovered vmconfig:" \n\
 +find /var/lib/vmconfig \n\
 +sleep 5 \n\
 +rm -rf /tmp/vmconfig \n\
 +cp -rv /var/lib/vmconfig /tmp/vmconfig \n\
 +mkdir -p /tmp/vmconfig/container.d /tmp/vmconfig/vm.d \n\
 +if [ -z "$QEMU_CONFIG_NO_DEFAULTS" ]; then \n\
 +    cp /usr/local/share/vmconfig/container.d/* /tmp/vmconfig/container.d \n\
 +    cp /usr/local/share/vmconfig/vm.d/* /tmp/vmconfig/vm.d \n\
 +fi \n\
 +(cd /tmp/vmconfig && (for f in $(ls container.d); do "./container.d/$f"; done)) \n\
 +run-vm.sh & \n\
 +QEMU_PID="$!" \n\
 +sleep 5 \n\
 +socat STDOUT unix-connect:/tmp/qemu-console.sock | grep -q "Please press Enter to activate this console." \n\
 +serialize-vm-config.sh /tmp/vmconfig | socat STDIN unix-connect:/tmp/qemu-console.sock \n\
 +VM_CONFIG_RESULT="$(socat STDOUT unix-connect:/tmp/qemu-console.sock | grep -m1 "^VM configuration result:")" \n\
 +if test "${VM_CONFIG_RESULT#*failed}" != "$VM_CONFIG_RESULT"; then \n\
 +    exit 1 \n\
 +fi \n\
 +wait "$QEMU_PID" \n\
 +\n' > /usr/local/bin/send-config-to-vm.sh && \
 +    chmod +x /usr/local/bin/send-config-to-vm.sh
 +
 +# Start VM in QEMU
 +RUN echo -e '#!/bin/sh\n\
 +set -e \n\
 +printf "$QEMU_PASSWORD" > /tmp/qemu-password.txt \n\
 +set -x \n\
 +exec /usr/bin/qemu-system-x86_64 \\\n\
 +    -nodefaults \\\n\
 +    -smp ""${QEMU_SMP}"" \\\n\
 +    -m "${QEMU_MEMORY}" \\\n\
 +    -drive file=/var/lib/qemu/image.qcow2,if=virtio \\\n\
 +    -chardev socket,id=chr0,path=/tmp/qemu-console.sock,mux=on,logfile=/dev/stdout,signal=off,server=on,wait=off \\\n\
 +    -serial chardev:chr0 \\\n\
 +    -monitor unix:/tmp/qemu-monitor.sock,server,nowait \\\n\
 +    -nic "user,model=virtio,restrict=on,ipv6=off,net=192.168.1.0/24,host=192.168.1.2,${QEMU_LAN_OPTIONS}" \\\n\
 +    -nic "user,model=virtio,net=${QEMU_WAN_NETWORK},${QEMU_WAN_OPTIONS}" \\\n\
 +    -object secret,id=secvnc0,format=raw,file=/tmp/qemu-password.txt \\\n\
 +    -display none \\\n\
 +    -device virtio-vga \\\n\
 +    -spice port=5900,password-secret=secvnc0 \\\n\
 +    -device intel-hda \\\n\
 +    -device hda-duplex \\\n\
 +    -device ich9-usb-ehci1,id=usb \\\n\
 +    -device ich9-usb-uhci1,masterbus=usb.0,firstport=0,multifunction=on \\\n\
 +    -device ich9-usb-uhci2,masterbus=usb.0,firstport=2 \\\n\
 +    -chardev spicevmc,name=usbredir,id=usbredirchardev1 \\\n\
 +    -device usb-redir,chardev=usbredirchardev1,id=usbredirdev1 \\\n\
 +    -chardev spicevmc,name=usbredir,id=usbredirchardev2 \\\n\
 +    -device usb-redir,chardev=usbredirchardev2,id=usbredirdev2 \\\n\
 +    $QEMU_ARGS \\\n\
 +\n' > /usr/local/bin/run-vm.sh && \
 +    chmod +x /usr/local/bin/run-vm.sh
 +
 +# Healthcheck
 +RUN echo -e '#!/bin/sh\n\
 +set -ex \n\
 +[ -e /tmp/qemu-console.sock -a -f /var/lib/qemu/initialized ] \n\
 +curl -sSf -m 5 http://127.0.0.1:30080 > /dev/null \n\
 +\n' > /usr/local/bin/healthcheck-vm.sh && \
 +    chmod +x /usr/local/bin/healthcheck-vm.sh
 +
 +# Entrypoint
 +RUN echo -e '#!/bin/sh\n\
 +set -ex \n\
 +create-container-user.sh \n\
 +provision-image.sh \n\
 +if [ ! -f /var/lib/qemu/initialized ]; then \n\
 +    timeout -s SIGINT "$QEMU_CONFIG_TIMEOUT" send-config-to-vm.sh || (echo "VM config error or time out."; exit 1) \n\
 +    touch /var/lib/qemu/initialized \n\
 +    chmod g+rw /var/lib/qemu/* \n\
 +fi \n\
 +exec run-vm.sh \n\
 +\n' > /usr/local/bin/entrypoint.sh && \
 +    chmod +x /usr/local/bin/entrypoint.sh
 +
 +# Runtime configuration
 +ENV QEMU_MEMORY="256M"
 +ENV QEMU_STORAGE="1G"
 +ENV QEMU_SMP="2"
 +ENV QEMU_LAN_OPTIONS=""
 +ENV QEMU_WAN_NETWORK="172.16.0.0/24"
 +ENV QEMU_WAN_OPTIONS="hostfwd=tcp::30022-:22,hostfwd=tcp::30080-:80,hostfwd=tcp::30443-:443,hostfwd=udp::51820-:51820"
 +ENV QEMU_PASSWORD="pass1234"
 +ENV QEMU_CONFIG_TIMEOUT="300"
 +ENV QEMU_CONFIG_NO_DEFAULTS=""
 +ENV QEMU_HOSTNAME="OpenWrtVM"
 +ENV QEMU_ARGS=""
 +
 +EXPOSE 5900/tcp
 +EXPOSE 30022/tcp
 +EXPOSE 30080/tcp
 +EXPOSE 30443/tcp
 +EXPOSE 51820/udp
 +
 +HEALTHCHECK --interval=30s --timeout=30s --start-period=120s --retries=3 CMD [ "/usr/local/bin/healthcheck-vm.sh" ]
 +VOLUME /var/lib/vmconfig
 +VOLUME /var/lib/qemu
 +WORKDIR /tmp
 +USER 1001
 +CMD ["/usr/local/bin/entrypoint.sh"]
 </code> </code>
  • Last modified: 2019/11/07 20:00
  • by aparcar1