Project

General

Profile

Idea #11724

Updated by Peter Amstutz over 5 years ago

Web-only users do not have access to Docker on the client (in addition, some shell users don't have access to Docker for security reasons, for example visitors to cloud.curoverse.com).    Ther should be a mechanism to submit a request to pull a Docker image for use in Arvados. 

 Possible solutions: 

 h2. Unprivileged pull inside a normal container request 

 There's at least one utility for pulling/manipulating images: 

 https://github.com/projectatomic/skopeo 

 However last I checked it doesn't support conversion to the "docker save" tarfile dump that we use.    Maybe we could add support. 

 h2. Special container request 

 Special format container request recognized by crunch-run which executes "docker pull" (instead of "docker run") and produces the image collection as output. 

 h2. Dedicated docker pull service 

 New microservice with API for "pull image".    This would avoid the overhead of starting up a dedicated VM to run a download process that usually only takes a few seconds. 

 Note: the Workflow Execution Service (WES) server sort of already does this; if workflow run is submitted that requires pulling Docker images, it will pull them and upload them.    This is existing arvados-cwl-runner behavior which normally requires Docker on the client, but in the case of WES, the WES gateway is the agent that runs arvados-cwl-runner and not the original client. 

 So there's also an option to migrate clients that submit workflows (a-c-r, workbench, composer) to use Arvados WES instead of directly creating container requests. 

 h2. Arvados Docker registry service 

 Deploy https://github.com/docker/distribution or implement the API https://docs.docker.com/registry/spec/api/ . Store layers in keep instead of whole image tarballs.    Regular "docker push" and "docker pull" works.    Unprivileged import is more tractable by avoiding format conversion. 

 Additional consideration: to access private registries, we need to provide credentials.    Secrets handling is available for container requests.

Back