[go: up one dir, main page]

Skip to content

Ansible role to install Docker CE on AlmaLinux/Rocky/CentOS Stream/Fedora/RHEL/Ubuntu/Debian/Mint/Raspbian

License

Notifications You must be signed in to change notification settings

haxorof/ansible-role-docker-ce

Repository files navigation

Ansible Role for Docker CE (Community Edition)

IMPORTANT! Even if this role does not list support for some distribution versions it might still work.

GitHub tag Ansible Role License: MIT Build Status

This Ansible role installs and configures Docker CE (Community Edition) on several different Linux distributions. The goal is to let the user of this role to just care about how Docker shall be installed and configured and hide the differences that exists in the different distributions.

ansible-galaxy role install haxorof.docker_ce

Features

  • One way to install and configure Docker CE across supported Linux distributions.
  • Support install of Docker SDK and Docker Compose.
  • Best effort support of installations of Docker plugins.
  • Best effort uninstall of Docker CE and related configuration
  • Do tweaks etc to avoid buggy or non-working configurations in some supported distributions.
  • Ease handling of setting up Docker according to Center of Internet Security (CIS) documentation.

Supported Distributions

Note! Some version(s) of distributions listed below only have Python 2.7 installed, these are only compatible with Ansible versions below 10.0.0 (or ansible-core versions below 2.17). This is because Python 2.7 support was dropped in Ansible 10.0.0 (ansible-core 2.17).

  • AlmaLinux1
  • Amazon Linux1
  • CentOS1
  • CentOS Stream
  • Debian
  • Fedora
  • Linux Mint1 (based on Ubuntu).
  • Raspbian (based on Debian)
  • RHEL
  • Rocky Linux1
  • Ubuntu

1 NB: Docker does not officially support completely or partly Docker CE on this distribution and some features might/will not work.

There might be other distributions that also works with this roles which are not in the list above by disabling the distribution check by setting variable docker_do_checks to no.

Changelog

See changelog here

Ansible Compatibility

  • ansible 9.0.0 or later (ansible-core 2.16 or later)

For this role to support multiple Ansible versions it is not possible to avoid all Ansible deprecation warnings. Read Ansible documentation if you want to disable deprecation warnings.

This role tries to support the latest and previous major release of Ansible version. For supported Ansible versions see here

Ansible Collection Requirements

If only ansible-core is installed these collections must also be installed for the role to work:

  • ansible.posix
  • community.general

Requirements

No additional requirements.

Role Variables

Variables related to this role are listed here

Dependencies

None.

Example Playbook

Following sub sections show different kind of examples to illustrate what this role supports.

Simplest

- hosts: docker
  roles:
    - role: haxorof.docker_ce

Configure Docker daemon to use proxy

- hosts: docker
  vars:
    docker_daemon_envs:
      HTTP_PROXY: http://localhost:3128/
      NO_PROXY: localhost,127.0.0.1,docker-registry.somecorporation.com
  roles:
    - haxorof.docker_ce

Ensure Ansible can use Docker modules after install

- hosts: test-host
  vars:
    docker_sdk: true
    docker_compose: true
  roles:
    - haxorof.docker_ce
  post_tasks:
    - name: Test hello container
      become: yes
      docker_container:
        name: hello
        image: hello-world

    - name: Test hello service
      become: yes
      docker_service:
        project_name: hello
        definition:
          version: '3'
          services:
            hello:
              image: "hello-world"

On the road to CIS security compliant Docker engine installation

This minimal example below show what kind of role configuration that is required to pass the Docker bench checks:

- hosts: docker
  vars:
    docker_plugins:
      - type: authz
        alias: opa-docker-authz
        name: openpolicyagent/opa-docker-authz-v2:0.9
        args: opa-args="-policy-file /opa/policies/authz.rego"
    docker_enable_audit: yes
    docker_daemon_config:
      icc: false
      log-driver: journald
      userns-remap: default
      live-restore: true
      userland-proxy: false
      no-new-privileges: true
  roles:
    - haxorof.docker_ce

Because the configuration above requires Linux user namespaces to be enabled then additional GRUB arguments might be needed. Example below show one example what changes that might be needed and reboot of the host is required for the changes to take full affect.

# https://success.docker.com/article/user-namespace-runtime-error

- hosts: docker
  roles:
    - role: jtyr.grub_cmdline
      vars:
        grub_cmdline_add_args:
          - namespace.unpriv_enable=1
          - user_namespace.enable=1
      become: yes
  tasks:
    - name: set user.max_user_namespaces
      sysctl:
        name: user.max_user_namespaces
        value: 15000
        sysctl_set: yes
        state: present
        reload: yes
      become: yes

For a more complete working example on CentOS 7 have a look here.

Automated test matrix

Here is the latest test results of the automated test which is located in the tests directory:

Note! All distributions listed in test matrix below does not provided the latest released Docker CE version.

Test Suites

Suite ID Comment
s-1 t_config
s-2 t_postinstall
s-3 t_auditd

Test Matrix

Symbol Definition
✔️ All tests passed
At least one test failed / Not supported
No test done / Not yet tested
# s-1 s-2 s-3 updated
AlmaLinux 8 ✔️ ✔️ ✔️ 2024-08-02
AlmaLinux 9 ✔️ ✔️ ✔️ 2024-08-02
Amazon Linux 2 ✔️ ✔️ 2024-08-02
Amazon Linux 2023 ✔️ ✔️ 2024-08-02
CentOS Stream 9 2024-08-02
Debian 11 ✔️ ✔️ ✔️ 2024-08-02
Debian 12 ✔️ ✔️ ✔️ 2024-08-02
Fedora 39 2024-08-02
Fedora 40 2024-08-02
Rocky Linux 8 ✔️ ✔️ ✔️ 2024-08-02
Rocky Linux 9 ✔️ ✔️ ✔️ 2024-08-02
Ubuntu 20.04 ✔️ ✔️ ✔️ 2024-08-02
Ubuntu 22.04 ✔️ ✔️ ✔️ 2024-08-02
Ubuntu 24.04 2024-08-02
RHEL 8 ✔️ ✔️ ✔️ 2024-08-12
RHEL 9 ✔️ ✔️ ✔️ 2024-08-12

License

This is an open source project under the MIT license.