Update docs
Signed-off-by: Maksym Pavlenko <pavlenko.maksym@gmail.com>
This commit is contained in:
parent
fda5c84bc1
commit
c5f1086adf
14
RELEASES.md
14
RELEASES.md
@ -371,8 +371,8 @@ The deprecated features are shown in the following table:
|
|||||||
|
|
||||||
| Component | Deprecation release | Target release for removal | Recommendation |
|
| Component | Deprecation release | Target release for removal | Recommendation |
|
||||||
|----------------------------------------------------------------------------------|---------------------|----------------------------|------------------------------------------|
|
|----------------------------------------------------------------------------------|---------------------|----------------------------|------------------------------------------|
|
||||||
| Runtime V1 API and implementation (`io.containerd.runtime.v1.linux`) | containerd v1.4 | containerd v2.0 | Use `io.containerd.runc.v2` |
|
| Runtime V1 API and implementation (`io.containerd.runtime.v1.linux`) | containerd v1.4 | containerd v2.0 ✅ | Use `io.containerd.runc.v2` |
|
||||||
| Runc V1 implementation of Runtime V2 (`io.containerd.runc.v1`) | containerd v1.4 | containerd v2.0 | Use `io.containerd.runc.v2` |
|
| Runc V1 implementation of Runtime V2 (`io.containerd.runc.v1`) | containerd v1.4 | containerd v2.0 ✅ | Use `io.containerd.runc.v2` |
|
||||||
| config.toml `version = 1` | containerd v1.5 | containerd v2.0 | Use config.toml `version = 2` |
|
| config.toml `version = 1` | containerd v1.5 | containerd v2.0 | Use config.toml `version = 2` |
|
||||||
| Built-in `aufs` snapshotter | containerd v1.5 | containerd v2.0 ✅ | Use `overlayfs` snapshotter |
|
| Built-in `aufs` snapshotter | containerd v1.5 | containerd v2.0 ✅ | Use `overlayfs` snapshotter |
|
||||||
| Container label `containerd.io/restart.logpath` | containerd v1.5 | containerd v2.0 ✅ | Use `containerd.io/restart.loguri` label |
|
| Container label `containerd.io/restart.logpath` | containerd v1.5 | containerd v2.0 ✅ | Use `containerd.io/restart.loguri` label |
|
||||||
@ -385,12 +385,12 @@ The deprecated properties in [`config.toml`](./docs/cri/config.md) are shown in
|
|||||||
|
|
||||||
| Property Group | Property | Deprecation release | Target release for removal | Recommendation |
|
| Property Group | Property | Deprecation release | Target release for removal | Recommendation |
|
||||||
|----------------------------------------------------------------------|------------------------------|---------------------|----------------------------|-------------------------------------------------|
|
|----------------------------------------------------------------------|------------------------------|---------------------|----------------------------|-------------------------------------------------|
|
||||||
|`[plugins."io.containerd.grpc.v1.cri"]` | `systemd_cgroup` | containerd v1.3 | containerd v2.0 | Use `SystemdCgroup` in runc options (see below) |
|
|`[plugins."io.containerd.grpc.v1.cri"]` | `systemd_cgroup` | containerd v1.3 | containerd v2.0 ✅ | Use `SystemdCgroup` in runc options (see below) |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".cni]` | `conf_template` | containerd v1.? | containerd v2.0 | Create a CNI config in `/etc/cni/net.d` |
|
|`[plugins."io.containerd.grpc.v1.cri".cni]` | `conf_template` | containerd v1.? | containerd v2.0 | Create a CNI config in `/etc/cni/net.d` |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `untrusted_workload_runtime` | containerd v1.2 | containerd v2.0 | Create `untrusted` runtime in `runtimes` |
|
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `untrusted_workload_runtime` | containerd v1.2 | containerd v2.0 ✅ | Create `untrusted` runtime in `runtimes` |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `default_runtime` | containerd v1.3 | containerd v2.0 | Use `default_runtime_name` |
|
|`[plugins."io.containerd.grpc.v1.cri".containerd]` | `default_runtime` | containerd v1.3 | containerd v2.0 ✅ | Use `default_runtime_name` |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.*]` | `runtime_engine` | containerd v1.3 | containerd v2.0 | Use runtime v2 |
|
|`[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.*]` | `runtime_engine` | containerd v1.3 | containerd v2.0 ✅ | Use runtime v2 |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.*]` | `runtime_root` | containerd v1.3 | containerd v2.0 | Use `options.Root` |
|
|`[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.*]` | `runtime_root` | containerd v1.3 | containerd v2.0 ✅ | Use `options.Root` |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.*.options]` | `CriuPath` | containerd v1.7 | containerd v2.0 | Set `$PATH` to the `criu` binary |
|
|`[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.*.options]` | `CriuPath` | containerd v1.7 | containerd v2.0 | Set `$PATH` to the `criu` binary |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `auths` | containerd v1.3 | containerd v2.0 | Use [`ImagePullSecrets`](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/). See also [#8228](https://github.com/containerd/containerd/issues/8228). |
|
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `auths` | containerd v1.3 | containerd v2.0 | Use [`ImagePullSecrets`](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/). See also [#8228](https://github.com/containerd/containerd/issues/8228). |
|
||||||
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `configs` | containerd v1.5 | containerd v2.0 | Use [`config_path`](./docs/hosts.md) |
|
|`[plugins."io.containerd.grpc.v1.cri".registry]` | `configs` | containerd v1.5 | containerd v2.0 | Use [`config_path`](./docs/hosts.md) |
|
||||||
|
@ -45,6 +45,8 @@ usr/local/
|
|||||||
usr/local/bin/
|
usr/local/bin/
|
||||||
usr/local/bin/containerd-shim-runc-v2
|
usr/local/bin/containerd-shim-runc-v2
|
||||||
usr/local/bin/ctr
|
usr/local/bin/ctr
|
||||||
|
usr/local/bin/containerd-shim
|
||||||
|
usr/local/bin/containerd-shim-runc-v1
|
||||||
usr/local/bin/crictl
|
usr/local/bin/crictl
|
||||||
usr/local/bin/critest
|
usr/local/bin/critest
|
||||||
usr/local/bin/containerd
|
usr/local/bin/containerd
|
||||||
|
@ -18,7 +18,9 @@ verify its sha256sum, and extract it under `/usr/local`:
|
|||||||
$ tar Cxzvf /usr/local containerd-1.6.2-linux-amd64.tar.gz
|
$ tar Cxzvf /usr/local containerd-1.6.2-linux-amd64.tar.gz
|
||||||
bin/
|
bin/
|
||||||
bin/containerd-shim-runc-v2
|
bin/containerd-shim-runc-v2
|
||||||
|
bin/containerd-shim
|
||||||
bin/ctr
|
bin/ctr
|
||||||
|
bin/containerd-shim-runc-v1
|
||||||
bin/containerd
|
bin/containerd
|
||||||
bin/containerd-stress
|
bin/containerd-stress
|
||||||
```
|
```
|
||||||
|
@ -205,7 +205,6 @@ func TestLocalResolve(t *testing.T) {
|
|||||||
|
|
||||||
func TestGenerateRuntimeOptions(t *testing.T) {
|
func TestGenerateRuntimeOptions(t *testing.T) {
|
||||||
nilOpts := `
|
nilOpts := `
|
||||||
systemd_cgroup = true
|
|
||||||
[containerd]
|
[containerd]
|
||||||
no_pivot = true
|
no_pivot = true
|
||||||
default_runtime_name = "default"
|
default_runtime_name = "default"
|
||||||
@ -213,7 +212,6 @@ systemd_cgroup = true
|
|||||||
runtime_type = "` + plugin.RuntimeRuncV2 + `"
|
runtime_type = "` + plugin.RuntimeRuncV2 + `"
|
||||||
`
|
`
|
||||||
nonNilOpts := `
|
nonNilOpts := `
|
||||||
systemd_cgroup = true
|
|
||||||
[containerd]
|
[containerd]
|
||||||
no_pivot = true
|
no_pivot = true
|
||||||
default_runtime_name = "default"
|
default_runtime_name = "default"
|
||||||
|
Loading…
Reference in New Issue
Block a user