15 Dec 2014
I'm introducing my new tool Bowline.io -- a tool to tie your Docker images to a build process. It has a bunch of features that I'm rather proud of:
- It automatically builds images based on git hooks (or polling over HTTP)
- It logs the results of those builds, so you can see the history.
- It'll allow you to build unit tests into your Dockerfiles so you know if it's a passing build
- It's a front-end to a Docker registry, to give you a graphical view of it
- It's an authenticated Docker registry, which users can manage their creds online.
- It keeps some meta data about your "knot", like a
README.md and it syntax highlights your
- It's compatible with docker at the CLI, like
docker login and therefore
docker push and
And what it really boils down to is that it's kind of a Dockerhub clone that you can run on your own hardware. Sort of how you might use Dockerhub Enterprise, but, it's open source. You can just spin it up and use it to your heart's content. Check out the documentation on how to run it locally for yourself -- you won't be surprised to find out that it runs in Docker itself.
It's what happened to my "asterisk autobuilder for docker" I wrote about in a previous post. That tool was working out rather well for me, and when I went to extend what was previously an IRC bot to handle multiple builds -- I realized that I could extend it to a web app with some ease (It's a NodeJS application, and already was starting to expose an API).
I've got even more plans for it in the future, some of which are:
- Continuous deployment features (make an action after your build finishes)
- More explicit unit testing functionality
- The capability to test an "ecosystem" of Docker containers together (like a webapp, a db & a web server for example)
- Ability to create geard & fleet unit files for deployment
- A distributed build server architecture so you can run it on many boxen (it's been planned in the code, but, not yet implemented)
Feel free to give it a try @ Bowline.io -- I'm looking forward to having more guinea pigs check it out, use the hosted version @ Bowline.io, or running it on their own boxen -- or best yet! Contributing a PR or two against it.
18 Oct 2014
I've gone ahead and expanded upon my Asterisk Docker image, to make a system that automatically builds a new image for it when it finds a new tarball available.
Here's the key features I was looking for:
- Build the Asterisk docker image and make it available shortly after a release
- Monitor the progress of the build process
- Update the Asterisk-Docker git repo
To address the secondary bullet point, I made a REPL interface that's accessible via IRC -- and like any well behaved IRC netizen; it posts logs to a pastebin.
Speaking of such! In the process, I made an NPM modules for pasteall. If you don't know pasteall.org -- it's the best pastebin you'll ever use.
You can visit the bot in
##asterisk-autobuilder on freenode.net.
As for the last bullet point, when it finds a new tarball it dutifully updates the asterisk-docker github repo, and makes a pull request. Check out the first successful one here. You'll note that it keeps a link to the pasteall.org logs, so you can see the results of the build -- in all their gory detail, every step of the docker build.
I have bigger plans for this, but, some of the shorter-term ones are:
- Allow multiple branches / multiple builds of Asterisk (Hopefully before Asterisk 13!!)
02 Oct 2014
Let's get straight to the goods, then we'll examine my methodology.
You can clone or fork my docker-asterisk project on GitHub. And/or you can pull the image from dockerhub.
Which is as simple as running:
docker pull dougbtv/asterisk
Let's inspect the important files in the clone
In the root dir:
Dockerfile what makes the dockerhub image
extensions.conf a very simple dialplan
iax.conf a sample iax.conf which sets up an IAX2 client (for testing, really)
modules.conf currently unused, but an example for overriding the modules.conf from the sample files.
tools/ dir are some utilities I find myself using over and over:
asterisk-cli.sh runs the
nsenter command (note: image name must contain "asterisk" for it to detect it, easy enough to modify to fit your needs)
clean.sh kills all containers, and removes them.
run.sh a suggested way to run the Docker container.
That's about it, for now!
There's a couple key steps to getting Asterisk and Docker playing together nicely, and I have a few requirements:
- I need to access the Asterisk CLI
- I also need to allow wide ranges of UDP ports.
On the first bullet point, we'll get over this by using
nsenter, which requires root or sudo privileges, but, will let you connect to the CLI, which is what I'm after. I was inspired to use this solution from this article on the docker blog. And I got my method of running it from coderwall.
On the second point... Docker doesn't like UDP it seems (which is what the VoIP world runs on). At least in my tests trying to get some IAX2 VoIP over it, on port 4569. (It's an easier test to mock up than SIP!) (Correction: Actually, Docker is fine with UDP, you just have to let it know when you run a docker container, e.g.
docker run -p 4569:4569/udp -t user/tag)
So, I settled on opening up the network to Docker using the
--net host parameter on a
At first, I tried out bridged networking. And maybe not all is lost. Here's the basics on bridging here @ redhat I followed. Make sure you have bridge-utils package:
yum install -y bridge-utils. But, I didn't have mileage with it. Somehow I set it up, and it borked my docker images from even getting on the net. I should maybe read the Docker advanced networking docs in more detail. Aaaargh.
Some things I have yet to do are:
- Setup a secondary container for running FastAGI with xinetd.
I'm thinking I'll running xinetd in it's own container and connect the asterisk image with the xinetd image for running FastAGI.
30 Sep 2014
I've redone my blog! It's all markdown now. Thank goodness. If for whatever reason, you find content on this blog that's out of place, or wrong... let me know! I'd appreciate it.
As a back-up, I'm keeping a copy of my previous blog @ blog.dougbtv.com -- which you can feel free to reference in the short meanwhile.
06 Sep 2014
With the advent of Centos 7, I had to face it that
firewalld is a way of life. I guess it's probably part of the systemd controversy.
I tried to go back to vanilla iptables. But... I just felt dirty. I've been living with firewalld on my Fedora workstations for... a while now. But, I never wanted to manage it much. I basically just kept it locked down -- it's workstations anyways, and I was still using iptables on Centos 6. I tried to be lazy -- and run
firewall-config over an x11 forwarded connection, but... That seemed to be proving harder than actually learning firewall-cmd.
So, I stopped worrying. I might as well use it.
Hell, for about 8 zillion years I've been having to google stuff like "cyberciti iptables drop" to remember what the hell to do with iptables anyways. I just needed a recipe every time. And, then I used firewall-cmd.
Really, I needed to read the Centos 7 page on using firewalld in detail, before I got it.
Once I figured out that I could define what the zones meant by doing an
--add-source, it clicked for me. So, here's my cheatsheet of what I did to get my bearings, and I have to say, it's kind of a better world. (I'm still struggling with systemctl... I'm like blinded by oldschool sysv style init scripts). I was really trying to just open up for openVPN and then disable SSH was my first goal, so I used two zones "public" (for everything) and then a specific source for the LAN which I called "trusted". Here, I just really play around so I could test it out and proved that it worked according to my assumptions and newly learned tid-bits about firewalld / firewall-cmd
# Check out what it looks like...
firewall-cmd --zone=public --list-all
# Try a port:
firewall-cmd --zone=public --add-port=5060-5061/udp
firewall-cmd --zone=public --list-ports
# Let's setup the trusted zone:
firewall-cmd --permanent --zone=trusted --add-source=192.168.100.0/24
firewall-cmd --permanent --zone=trusted --list-sources
# I needed to reload before I saw the changes:
# Now let's configure that up:
firewall-cmd --zone=trusted --add-port=80/tcp --permanent
firewall-cmd --zone=trusted --add-port=443/tcp --permanent
firewall-cmd --zone=public --add-port=1194/udp --permanent
firewall-cmd --zone=public --add-port=1194/tcp --permanent
# Now list what you've got
firewall-cmd --zone=trusted --list-all
firewall-cmd --zone=public --list-all