123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414 |
- .. _blog-lxcdev-202006:
- =======================================
- Developing in Linux containers [202006]
- =======================================
- .. _LXC: https://linuxcontainers.org/lxc/introduction/
- .. sidebar:: Audience
- This blog post is written for experienced admins and developers / readers
- should have a serious meaning about: *distributed*, *merge* and *linux
- container*.
- .. contents:: Contents
- :depth: 2
- :local:
- :backlinks: entry
- In PR :PR:`1803` we added a lot of scripts to Searx's boilerplate. In this blog
- post I will show you, how you can make use of them in *distributed and
- heterogeneous development cycles* (TL;DR; jump to the :ref:`blog-lxcdev-202006
- abstract`).
- Motivation
- ==========
- Normally in our development cycle, we edit the sources and run some test and/or
- builds by using ``make`` before we commit. This cycle is simple and perfect but
- might fail in some aspects we should not overlook.
- The environment in which we run all our development processes matters!
- The :ref:`makefile` and the :ref:`make install` encapsulate a lot for us, but they
- do not have access to all prerequisites. For example, there may have
- dependencies on packages that are installed on the developer's desktop, but
- usually are not preinstalled on a server or client system. Another examples
- are; settings have been made to the software on the developer's host that would
- never be set on a *production* system.
- *Linux Containers* (LXC_) are isolate environments and not to mix up on
- developer's all the prerequisites of all the projects he contribute to, is
- always a good choice.
- The scripts from PR :PR:`1803` can divide in those to install and maintain
- software:
- - :ref:`searx.sh`
- - :ref:`filtron.sh`
- - :ref:`morty.sh`
- and the script :ref:`lxc.sh`, with we can scale our installation, maintenance or
- even development tasks over a stack of containers, what we call: *Searx's lxc
- suite*.
- Gentlemen, start your engines!
- ==============================
- .. _LXD: https://linuxcontainers.org/lxd/introduction/
- .. _archlinux: https://www.archlinux.org/
- Before you can start with containers, you need to install and initiate LXD_
- once:
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ snap install lxd
- $ lxd init --auto
- And you need to clone from origin or if you have your own fork, clone from your
- fork:
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ cd ~/Downloads
- $ git clone https://github.com/searx/searx.git
- $ cd searx
- The :ref:`lxc-searx.env` consists of several images, see ``export
- LXC_SUITE=(...`` near by :origin:`utils/lxc-searx.env#L19`. For this blog post
- we exercise on a archlinux_ image. The container of this image is named
- ``searx-archlinux``. Lets build the container, but be sure that this container
- does not already exists, so first lets remove possible old one:
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ sudo -H ./utils/lxc.sh remove searx-archlinux
- $ sudo -H ./utils/lxc.sh build searx-archlinux
- .. sidebar:: The ``searx-archlinux`` container
- is the base of all our exercises here.
- In this container we install all services :ref:`including searx, morty & filtron
- <lxc.sh install suite>` in once:
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ sudo -H ./utils/lxc.sh install suite searx-archlinux
- To proxy HTTP from filtron and morty in the container to the outside of the
- container, install nginx into the container. Once for the bot blocker filtron:
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- ./utils/filtron.sh nginx install
- ...
- INFO: got 429 from http://10.174.184.156/searx
- and once for the content sanitizer (content proxy morty):
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- ./utils/morty.sh nginx install
- ...
- INFO: got 200 from http://10.174.184.156/morty/
- .. sidebar:: Fully functional searx suite
- From here on you have a fully functional searx suite running with bot blocker
- (filtron) and Web content sanitizer (content proxy morty) needed for a
- *privacy protecting* search engine.
- On your system, the IP of your ``searx-archlinux`` container differs from
- http://10.174.184.156/searx, just open the URL reported in your installation
- protocol in your WEB browser from the desktop to test the instance from outside
- of the container.
- In such a searx suite admins can maintain and access the debug log of the
- different services quite easy.
- .. _working in containers:
- In containers, work as usual
- ============================
- Usually you open a root-bash using ``sudo -H bash``. In case of LXC containers
- open the root-bash in the container using ``./utils/lxc.sh cmd
- searx-archlinux``:
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux bash
- INFO: [searx-archlinux] bash
- [root@searx-archlinux searx]# pwd
- /share/searx
- The prompt ``[root@searx-archlinux ...]`` signals, that you are the root user in
- the searx-container. To debug the running searx instance use:
- .. tabs::
- .. group-tab:: root@searx-archlinux
- .. code:: sh
- $ ./utils/searx.sh inspect service
- ...
- use [CTRL-C] to stop monitoring the log
- ...
- Back in the browser on your desktop open the service http://10.174.184.156/searx
- and run your application tests while the debug log is shown in the terminal from
- above. You can stop monitoring using ``CTRL-C``, this also disables the *"debug
- option"* in searx's settings file and restarts the searx uwsgi application. To
- debug services from filtron and morty analogous use:
- .. tabs::
- .. group-tab:: root@searx-archlinux
- .. code:: sh
- $ ./utils/filtron.sh inspect service
- $ ./utils/morty.sh inspect service
- Another point we have to notice is that each service (:ref:`searx <searx.sh>`,
- :ref:`filtron <filtron.sh>` and :ref:`morty <morty.sh>`) runs under dedicated
- system user account with the same name (compare :ref:`create searx user`). To
- get a shell from these accounts, simply call one of the scripts:
- .. tabs::
- .. group-tab:: root@searx-archlinux
- .. code:: sh
- $ ./utils/searx.sh shell
- $ ./utils/filtron.sh shell
- $ ./utils/morty.sh shell
- To get in touch, open a shell from the service user (searx@searx-archlinux):
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- ./utils/searx.sh shell
- // exit with [CTRL-D]
- (searx-pyenv) [searx@searx-archlinux ~]$ ...
- The prompt ``[searx@searx-archlinux]`` signals that you are logged in as system
- user ``searx`` in the ``searx-archlinux`` container and the python *virtualenv*
- ``(searx-pyenv)`` environment is activated.
- .. tabs::
- .. group-tab:: searx@searx-archlinux
- .. code:: sh
- (searx-pyenv) [searx@searx-archlinux ~]$ pwd
- /usr/local/searx
- Wrap production into developer suite
- ====================================
- In this section we will see how to change the *"Fully functional searx suite"*
- from a LXC container (which is quite ready for production) into a developer
- suite. For this, we have to keep an eye on the :ref:`installation basic`:
- - searx setup in: ``/etc/searx/settings.yml``
- - searx user's home: ``/usr/local/searx``
- - virtualenv in: ``/usr/local/searx/searx-pyenv``
- - searx software in: ``/usr/local/searx/searx-src``
- The searx software is a clone of the ``git_url`` (see :ref:`settings global`) and
- the working tree is checked out from the ``git_branch``. With the use of the
- :ref:`searx.sh` the searx service was installed as :ref:`uWSGI application
- <searx uwsgi>`. To maintain this service, we can use ``systemctl`` (compare
- :ref:`service architectures on distributions <uwsgi configuration>`).
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- systemctl stop uwsgi@searx
- With the command above, we stopped the searx uWSGI-App in the archlinux
- container.
- The uWSGI-App for the archlinux dsitros is configured in
- :origin:`utils/templates/etc/uwsgi/apps-archlinux/searx.ini`, from where at
- least you should attend the settings of ``uid``, ``chdir``, ``env`` and
- ``http``::
- env = SEARX_SETTINGS_PATH=/etc/searx/settings.yml
- http = 127.0.0.1:8888
- chdir = /usr/local/searx/searx-src/searx
- virtualenv = /usr/local/searx/searx-pyenv
- pythonpath = /usr/local/searx/searx-src
- If you have read the :ref:`"Good to know section" <lxc.sh>` you remember, that
- each container shares the root folder of the repository and the command
- ``utils/lxc.sh cmd`` handles relative path names **transparent**. To wrap the
- searx installation into a developer one, we simple have to create a smylink to
- the **transparent** reposetory from the desktop. Now lets replace the
- repository at ``searx-src`` in the container with the working tree from outside
- of the container:
- .. tabs::
- .. group-tab:: container becomes a developer suite
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- mv /usr/local/searx/searx-src /usr/local/searx/searx-src.old
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- ln -s /share/searx/ /usr/local/searx/searx-src
- Now we can develop as usual in the working tree of our desktop system. Every
- time the software was changed, you have to restart the searx service (in the
- container):
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- systemctl restart uwsgi@searx
- Remember: :ref:`working in containers` .. here are just some examples from my
- daily usage:
- .. tabs::
- .. group-tab:: desktop
- To *inspect* the searx instance (already described above):
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- ./utils/searx.sh inspect service
- Run :ref:`makefile`, e.g. to test inside the container:
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- make test
- To install all prerequisites needed for a :ref:`buildhosts`:
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- ./utils/searx.sh install buildhost
- To build the docs on a buildhost :ref:`buildhosts`:
- .. code:: sh
- $ sudo -H ./utils/lxc.sh cmd searx-archlinux \
- make docs.html
- .. _blog-lxcdev-202006 abstract:
- Abstract
- ========
- We build up a fully functional searx suite in a archlinux container:
- .. code:: sh
- $ sudo -H ./utils/lxc.sh install suite searx-archlinux
- To access HTTP from the desktop we installed nginx for the services inside the
- container:
- .. tabs::
- .. group-tab:: [root@searx-archlinux]
- .. code:: sh
- $ ./utils/filtron.sh nginx install
- $ ./utils/morty.sh nginx install
- To wrap the suite into a developer one, we created a symbolic link to the
- repository which is shared **transparent** from the desktop's file system into
- the container :
- .. tabs::
- .. group-tab:: [root@searx-archlinux]
- .. code:: sh
- $ mv /usr/local/searx/searx-src /usr/local/searx/searx-src.old
- $ ln -s /share/searx/ /usr/local/searx/searx-src
- $ systemctl restart uwsgi@searx
- To get remarks from the suite of the archlinux container we can use:
- .. tabs::
- .. group-tab:: desktop
- .. code:: sh
- $ sudo -H ./utils/lxc.sh show suite searx-archlinux
- ...
- [searx-archlinux] INFO: (eth0) filtron: http://10.174.184.156:4004/ http://10.174.184.156/searx
- [searx-archlinux] INFO: (eth0) morty: http://10.174.184.156:3000/
- [searx-archlinux] INFO: (eth0) docs.live: http://10.174.184.156:8080/
- [searx-archlinux] INFO: (eth0) IPv6: http://[fd42:573b:e0b3:e97e:216:3eff:fea5:9b65]
- ...
|