Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var ContainerdConfig = template.Must(template.New("config.toml").Parse( dedent.Dedent(`version = 2 {{- if .DataRoot }} root = {{ .DataRoot }} {{ else }} root = "/var/lib/containerd" {{- end }} state = "/run/containerd" [grpc] address = "/run/containerd/containerd.sock" uid = 0 gid = 0 max_recv_message_size = 16777216 max_send_message_size = 16777216 [ttrpc] address = "" uid = 0 gid = 0 [debug] address = "" uid = 0 gid = 0 level = "" [metrics] address = "" grpc_histogram = false [cgroup] path = "" [timeouts] "io.containerd.timeout.shim.cleanup" = "5s" "io.containerd.timeout.shim.load" = "5s" "io.containerd.timeout.shim.shutdown" = "3s" "io.containerd.timeout.task.state" = "2s" [plugins] [plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc] runtime_type = "io.containerd.runc.v2" [plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc.options] SystemdCgroup = true [plugins."io.containerd.grpc.v1.cri"] sandbox_image = "{{ .SandBoxImage }}" [plugins."io.containerd.grpc.v1.cri".cni] bin_dir = "/opt/cni/bin" conf_dir = "/etc/cni/net.d" max_conf_num = 1 conf_template = "" [plugins."io.containerd.grpc.v1.cri".registry] [plugins."io.containerd.grpc.v1.cri".registry.mirrors] {{- if .Mirrors }} [plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"] endpoint = [{{ .Mirrors }}, "https://registry-1.docker.io"] {{ else }} [plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"] endpoint = ["https://registry-1.docker.io"] {{- end}} {{- range $value := .InsecureRegistries }} [plugins."io.containerd.grpc.v1.cri".registry.mirrors."{{$value}}"] endpoint = ["http://{{$value}}"] {{- end}} {{- if .Auths }} [plugins."io.containerd.grpc.v1.cri".registry.configs] {{- range $repo, $entry := .Auths }} [plugins."io.containerd.grpc.v1.cri".registry.configs."{{$repo}}".auth] username = "{{$entry.Username}}" password = "{{$entry.Password}}" [plugins."io.containerd.grpc.v1.cri".registry.configs."{{$repo}}".tls] ca_file = "{{$entry.CAFile}}" cert_file = "{{$entry.CertFile}}" key_file = "{{$entry.KeyFile}}" insecure_skip_verify = {{$entry.SkipTLSVerify}} {{- end}} {{- end}} `)))
View Source
var ContainerdService = template.Must(template.New("containerd.service").Parse( dedent.Dedent(`[Unit] Description=containerd container runtime Documentation=https://containerd.io After=network.target local-fs.target [Service] ExecStartPre=-/sbin/modprobe overlay ExecStart=/usr/bin/containerd Type=notify Delegate=yes KillMode=process Restart=always RestartSec=5 # Having non-zero Limit*s causes performance problems due to accounting overhead # in the kernel. We recommend using cgroups to do container-local accounting. LimitNPROC=infinity LimitCORE=infinity LimitNOFILE=1048576 # Comment TasksMax if your systemd version does not supports it. # Only systemd 226 and above support this version. TasksMax=infinity OOMScoreAdjust=-999 [Install] WantedBy=multi-user.target `)))
View Source
var CrictlConfig = template.Must(template.New("crictl.yaml").Parse( dedent.Dedent(`runtime-endpoint: {{ .Endpoint }} image-endpoint: {{ .Endpoint }} timeout: 5 debug: false pull-image-on-create: false `)))
View Source
var DockerConfig = template.Must(template.New("daemon.json").Parse( dedent.Dedent(`{ "log-opts": { "max-size": "5m", "max-file":"3" }, {{- if .DataRoot }} "data-root": {{ .DataRoot }}, {{- end}} {{- if .Mirrors }} "registry-mirrors": [{{ .Mirrors }}], {{- end}} {{- if .InsecureRegistries }} "insecure-registries": [{{ .InsecureRegistries }}], {{- end}} {{- if .BridgeIP }} "bip": {{ .BridgeIP }}, {{- end}} "exec-opts": ["native.cgroupdriver=systemd"] } `)))
View Source
var DockerService = template.Must(template.New("docker.service").Parse( dedent.Dedent(`[Unit] Description=Docker Application Container Engine Documentation=https://docs.docker.com # After=network-online.target firewalld.service containerd.service # Wants=network-online.target # Requires=docker.socket containerd.service [Service] Type=notify # the default is not to use systemd for cgroups because the delegate issues still # exists and systemd currently does not support the cgroup feature set required # for containers run by docker ExecStart=/usr/bin/dockerd --containerd=/run/containerd/containerd.sock ExecReload=/bin/kill -s HUP $MAINPID TimeoutSec=0 RestartSec=2 Restart=always # Note that StartLimit* options were moved from "Service" to "Unit" in systemd 229. # Both the old, and new location are accepted by systemd 229 and up, so using the old location # to make them work for either version of systemd. StartLimitBurst=3 # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230. # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make # this option work for either version of systemd. StartLimitInterval=60s # Having non-zero Limit*s causes performance problems due to accounting overhead # in the kernel. We recommend using cgroups to do container-local accounting. LimitNOFILE=infinity LimitNPROC=infinity LimitCORE=infinity # Comment TasksMax if your systemd version does not support it. # Only systemd 226 and above support this option. TasksMax=infinity # set delegate yes so that systemd does not reset the cgroups of docker containers Delegate=yes # kill only the docker process, not all processes in the cgroup KillMode=process OOMScoreAdjust=-500 [Install] WantedBy=multi-user.target `)))
Functions ¶
func InsecureRegistries ¶
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.