Remove cni conf_template deprecation
As discussed in the issue https://github.com/containerd/containerd/issues/8596 It is a helpful feature at many places and no replacement readily available Signed-off-by: Aditi Sharma <adi.sky17@gmail.com>
This commit is contained in:
parent
4b7145cfd3
commit
3ca5b4437e
@ -387,7 +387,6 @@ The deprecated properties in [`config.toml`](./docs/cri/config.md) are shown in
|
||||
| Property Group | Property | Deprecation release | Target release for removal | Recommendation |
|
||||
|----------------------------------------------------------------------|------------------------------|---------------------|----------------------------|-------------------------------------------------|
|
||||
|`[plugins."io.containerd.grpc.v1.cri"]` | `systemd_cgroup` | containerd v1.3 | containerd v2.0 ✅ | Use `SystemdCgroup` in runc options (see below) |
|
||||
|`[plugins."io.containerd.grpc.v1.cri".cni]` | `conf_template` | containerd v1.? | containerd v2.0 | Create a CNI config in `/etc/cni/net.d` |
|
||||
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `untrusted_workload_runtime` | containerd v1.2 | containerd v2.0 ✅ | Create `untrusted` runtime in `runtimes` |
|
||||
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `default_runtime` | containerd v1.3 | containerd v2.0 ✅ | Use `default_runtime_name` |
|
||||
|`[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.*]` | `runtime_engine` | containerd v1.3 | containerd v2.0 ✅ | Use runtime v2 |
|
||||
@ -397,6 +396,11 @@ The deprecated properties in [`config.toml`](./docs/cri/config.md) are shown in
|
||||
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `configs` | containerd v1.5 | containerd v2.0 | Use [`config_path`](./docs/hosts.md) |
|
||||
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `mirrors` | containerd v1.5 | containerd v2.0 | Use [`config_path`](./docs/hosts.md) |
|
||||
|
||||
> **Note**
|
||||
>
|
||||
> CNI Config Template (`plugins."io.containerd.grpc.v1.cri".cni.conf_template`) was once deprecated in v1.7.0,
|
||||
> but its deprecation was cancelled in v1.7.2.
|
||||
|
||||
<details><summary>Example: runc option <code>SystemdCgroup</code></summary><p>
|
||||
|
||||
```toml
|
||||
|
@ -402,9 +402,6 @@ version = 2
|
||||
# If this is set, containerd will generate a cni config file from the
|
||||
# template. Otherwise, containerd will wait for the system admin or cni
|
||||
# daemon to drop the config file into the conf_dir.
|
||||
# This is a temporary backward-compatible solution for kubenet users
|
||||
# who don't have a cni daemonset in production yet.
|
||||
# This will be deprecated when kubenet is deprecated.
|
||||
# See the "CNI Config Template" section for more details.
|
||||
conf_template = ""
|
||||
# ip_pref specifies the strategy to use when selecting the main IP address for a pod.
|
||||
@ -503,11 +500,8 @@ runtime will be used. For example, see
|
||||
|
||||
## CNI Config Template
|
||||
|
||||
Ideally the cni config should be placed by system admin or cni daemon like calico,
|
||||
weaveworks etc. However, there are still users using [kubenet](https://kubernetes.io/docs/concepts/cluster-administration/network-plugins/#kubenet)
|
||||
today, who don't have a cni daemonset in production. The cni config template is
|
||||
a temporary backward-compatible solution for them. This is expected to be
|
||||
deprecated when kubenet is deprecated.
|
||||
Ideally the cni config should be placed by system admin or cni daemon like calico, weaveworks etc.
|
||||
However, this is useful for the cases when there is no cni daemonset to place cni config.
|
||||
|
||||
The cni config template uses the [golang
|
||||
template](https://golang.org/pkg/text/template/) format. Currently supported
|
||||
|
@ -135,17 +135,17 @@ type CniConfig struct {
|
||||
// device is created as the net namespace is created, it's safe to run
|
||||
// in parallel mode as the default setting.
|
||||
NetworkPluginSetupSerially bool `toml:"setup_serially" json:"setupSerially"`
|
||||
// NetworkPluginConfTemplate is the file path of golang template used to generate
|
||||
// cni config.
|
||||
// NetworkPluginConfTemplate is the file path of golang template used to generate cni config.
|
||||
// When it is set, containerd will get cidr(s) from kubelet to replace {{.PodCIDR}},
|
||||
// {{.PodCIDRRanges}} or {{.Routes}} in the template, and write the config into
|
||||
// NetworkPluginConfDir.
|
||||
// Ideally the cni config should be placed by system admin or cni daemon like calico,
|
||||
// weaveworks etc. However, there are still users using kubenet
|
||||
// (https://kubernetes.io/docs/concepts/cluster-administration/network-plugins/#kubenet)
|
||||
// today, who don't have a cni daemonset in production. NetworkPluginConfTemplate is
|
||||
// a temporary backward-compatible solution for them.
|
||||
// DEPRECATED: use CNI configs
|
||||
// weaveworks etc. However, this is useful for the cases when there is no cni daemonset to place cni config.
|
||||
// This allowed for very simple generic networking using the Kubernetes built in node pod CIDR IPAM, avoiding the
|
||||
// need to fetch the node object through some external process (which has scalability, auth, complexity issues).
|
||||
// It is currently heavily used in kubernetes-containerd CI testing
|
||||
// NetworkPluginConfTemplate was once deprecated in containerd v1.7.0,
|
||||
// but its deprecation was cancelled in v1.7.2.
|
||||
NetworkPluginConfTemplate string `toml:"conf_template" json:"confTemplate"`
|
||||
// IPPreference specifies the strategy to use when selecting the main IP address for a pod.
|
||||
//
|
||||
|
Loading…
Reference in New Issue
Block a user