Remove cni conf_template deprecation
As discussed in the issue https://github.com/containerd/containerd/issues/8596 It is a helpful feature at many places and no replacement readily available Signed-off-by: Aditi Sharma <adi.sky17@gmail.com>
This commit is contained in:
parent
4b7145cfd3
commit
3ca5b4437e
@ -387,7 +387,6 @@ The deprecated properties in [`config.toml`](./docs/cri/config.md) are shown in
|
|||||||
| Property Group | Property | Deprecation release | Target release for removal | Recommendation |
|
| Property Group | Property | Deprecation release | Target release for removal | Recommendation |
|
||||||
|----------------------------------------------------------------------|------------------------------|---------------------|----------------------------|-------------------------------------------------|
|
|----------------------------------------------------------------------|------------------------------|---------------------|----------------------------|-------------------------------------------------|
|
||||||
|`[plugins."io.containerd.grpc.v1.cri"]` | `systemd_cgroup` | containerd v1.3 | containerd v2.0 ✅ | Use `SystemdCgroup` in runc options (see below) |
|
|`[plugins."io.containerd.grpc.v1.cri"]` | `systemd_cgroup` | containerd v1.3 | containerd v2.0 ✅ | Use `SystemdCgroup` in runc options (see below) |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".cni]` | `conf_template` | containerd v1.? | containerd v2.0 | Create a CNI config in `/etc/cni/net.d` |
|
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `untrusted_workload_runtime` | containerd v1.2 | containerd v2.0 ✅ | Create `untrusted` runtime in `runtimes` |
|
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `untrusted_workload_runtime` | containerd v1.2 | containerd v2.0 ✅ | Create `untrusted` runtime in `runtimes` |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `default_runtime` | containerd v1.3 | containerd v2.0 ✅ | Use `default_runtime_name` |
|
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `default_runtime` | containerd v1.3 | containerd v2.0 ✅ | Use `default_runtime_name` |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.*]` | `runtime_engine` | containerd v1.3 | containerd v2.0 ✅ | Use runtime v2 |
|
|`[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.*]` | `runtime_engine` | containerd v1.3 | containerd v2.0 ✅ | Use runtime v2 |
|
||||||
@ -397,6 +396,11 @@ The deprecated properties in [`config.toml`](./docs/cri/config.md) are shown in
|
|||||||
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `configs` | containerd v1.5 | containerd v2.0 | Use [`config_path`](./docs/hosts.md) |
|
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `configs` | containerd v1.5 | containerd v2.0 | Use [`config_path`](./docs/hosts.md) |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `mirrors` | containerd v1.5 | containerd v2.0 | Use [`config_path`](./docs/hosts.md) |
|
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `mirrors` | containerd v1.5 | containerd v2.0 | Use [`config_path`](./docs/hosts.md) |
|
||||||
|
|
||||||
|
> **Note**
|
||||||
|
>
|
||||||
|
> CNI Config Template (`plugins."io.containerd.grpc.v1.cri".cni.conf_template`) was once deprecated in v1.7.0,
|
||||||
|
> but its deprecation was cancelled in v1.7.2.
|
||||||
|
|
||||||
<details><summary>Example: runc option <code>SystemdCgroup</code></summary><p>
|
<details><summary>Example: runc option <code>SystemdCgroup</code></summary><p>
|
||||||
|
|
||||||
```toml
|
```toml
|
||||||
|
@ -402,9 +402,6 @@ version = 2
|
|||||||
# If this is set, containerd will generate a cni config file from the
|
# If this is set, containerd will generate a cni config file from the
|
||||||
# template. Otherwise, containerd will wait for the system admin or cni
|
# template. Otherwise, containerd will wait for the system admin or cni
|
||||||
# daemon to drop the config file into the conf_dir.
|
# daemon to drop the config file into the conf_dir.
|
||||||
# This is a temporary backward-compatible solution for kubenet users
|
|
||||||
# who don't have a cni daemonset in production yet.
|
|
||||||
# This will be deprecated when kubenet is deprecated.
|
|
||||||
# See the "CNI Config Template" section for more details.
|
# See the "CNI Config Template" section for more details.
|
||||||
conf_template = ""
|
conf_template = ""
|
||||||
# ip_pref specifies the strategy to use when selecting the main IP address for a pod.
|
# ip_pref specifies the strategy to use when selecting the main IP address for a pod.
|
||||||
@ -503,11 +500,8 @@ runtime will be used. For example, see
|
|||||||
|
|
||||||
## CNI Config Template
|
## CNI Config Template
|
||||||
|
|
||||||
Ideally the cni config should be placed by system admin or cni daemon like calico,
|
Ideally the cni config should be placed by system admin or cni daemon like calico, weaveworks etc.
|
||||||
weaveworks etc. However, there are still users using [kubenet](https://kubernetes.io/docs/concepts/cluster-administration/network-plugins/#kubenet)
|
However, this is useful for the cases when there is no cni daemonset to place cni config.
|
||||||
today, who don't have a cni daemonset in production. The cni config template is
|
|
||||||
a temporary backward-compatible solution for them. This is expected to be
|
|
||||||
deprecated when kubenet is deprecated.
|
|
||||||
|
|
||||||
The cni config template uses the [golang
|
The cni config template uses the [golang
|
||||||
template](https://golang.org/pkg/text/template/) format. Currently supported
|
template](https://golang.org/pkg/text/template/) format. Currently supported
|
||||||
|
@ -135,17 +135,17 @@ type CniConfig struct {
|
|||||||
// device is created as the net namespace is created, it's safe to run
|
// device is created as the net namespace is created, it's safe to run
|
||||||
// in parallel mode as the default setting.
|
// in parallel mode as the default setting.
|
||||||
NetworkPluginSetupSerially bool `toml:"setup_serially" json:"setupSerially"`
|
NetworkPluginSetupSerially bool `toml:"setup_serially" json:"setupSerially"`
|
||||||
// NetworkPluginConfTemplate is the file path of golang template used to generate
|
// NetworkPluginConfTemplate is the file path of golang template used to generate cni config.
|
||||||
// cni config.
|
|
||||||
// When it is set, containerd will get cidr(s) from kubelet to replace {{.PodCIDR}},
|
// When it is set, containerd will get cidr(s) from kubelet to replace {{.PodCIDR}},
|
||||||
// {{.PodCIDRRanges}} or {{.Routes}} in the template, and write the config into
|
// {{.PodCIDRRanges}} or {{.Routes}} in the template, and write the config into
|
||||||
// NetworkPluginConfDir.
|
// NetworkPluginConfDir.
|
||||||
// Ideally the cni config should be placed by system admin or cni daemon like calico,
|
// Ideally the cni config should be placed by system admin or cni daemon like calico,
|
||||||
// weaveworks etc. However, there are still users using kubenet
|
// weaveworks etc. However, this is useful for the cases when there is no cni daemonset to place cni config.
|
||||||
// (https://kubernetes.io/docs/concepts/cluster-administration/network-plugins/#kubenet)
|
// This allowed for very simple generic networking using the Kubernetes built in node pod CIDR IPAM, avoiding the
|
||||||
// today, who don't have a cni daemonset in production. NetworkPluginConfTemplate is
|
// need to fetch the node object through some external process (which has scalability, auth, complexity issues).
|
||||||
// a temporary backward-compatible solution for them.
|
// It is currently heavily used in kubernetes-containerd CI testing
|
||||||
// DEPRECATED: use CNI configs
|
// NetworkPluginConfTemplate was once deprecated in containerd v1.7.0,
|
||||||
|
// but its deprecation was cancelled in v1.7.2.
|
||||||
NetworkPluginConfTemplate string `toml:"conf_template" json:"confTemplate"`
|
NetworkPluginConfTemplate string `toml:"conf_template" json:"confTemplate"`
|
||||||
// IPPreference specifies the strategy to use when selecting the main IP address for a pod.
|
// IPPreference specifies the strategy to use when selecting the main IP address for a pod.
|
||||||
//
|
//
|
||||||
|
Loading…
Reference in New Issue
Block a user