Merge branch 'master' into update-dashboard
commit
3146ec0948
|
@ -12,7 +12,7 @@ on:
|
|||
- "!deploy/iso/**"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -20,11 +20,10 @@ jobs:
|
|||
build_minikube:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Download Dependencies
|
||||
run: go mod download
|
||||
- name: Build Binaries
|
||||
|
@ -47,11 +46,10 @@ jobs:
|
|||
lint:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install libvirt
|
||||
run: |
|
||||
sudo apt-get update
|
||||
|
@ -66,11 +64,10 @@ jobs:
|
|||
unit_test:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install libvirt
|
||||
run: |
|
||||
sudo apt-get update
|
||||
|
|
|
@ -6,19 +6,19 @@ on:
|
|||
- master
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
jobs:
|
||||
generate-docs:
|
||||
if: github.repository == 'kubernetes/minikube'
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Generate Docs
|
||||
id: gendocs
|
||||
run: |
|
||||
|
@ -29,7 +29,7 @@ jobs:
|
|||
echo "::set-output name=changes::$c"
|
||||
- name: Create PR
|
||||
if: ${{ steps.gendocs.outputs.changes != '' }}
|
||||
uses: peter-evans/create-pull-request@f094b77505fb89581e68a1163fbd2fffece39da1
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: Update auto-generated docs and translations
|
||||
|
|
|
@ -22,7 +22,7 @@ on:
|
|||
- deleted
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
|
||||
permissions:
|
||||
contents: read
|
||||
|
@ -34,11 +34,10 @@ jobs:
|
|||
if: contains(github.event.pull_request.labels.*.name, 'ok-to-test')
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Download Dependencies
|
||||
run: go mod download
|
||||
- name: Build Binaries
|
||||
|
@ -87,7 +86,7 @@ jobs:
|
|||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/linux/arm64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/arm64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
|
||||
|
@ -115,22 +114,22 @@ jobs:
|
|||
echo "--------------------------"
|
||||
hostname || true
|
||||
echo "--------------------------"
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
|
||||
- name: Pre-cleanup
|
||||
continue-on-error: true
|
||||
run: |
|
||||
minikube_binaries/minikube-linux-arm64 delete --all --purge || true
|
||||
docker kill $(docker ps -aq) || true
|
||||
docker system prune --volumes --force || true
|
||||
docker system prune -a --volumes -f || true
|
||||
|
||||
- name: Run Integration Test
|
||||
continue-on-error: false
|
||||
|
@ -204,7 +203,7 @@ jobs:
|
|||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- name: download all extra reports
|
||||
uses: actions/download-artifact@9fde3de0b74bd6bc202952485c264b551a4f9405
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
- name: upload all extra reports
|
||||
shell: bash {0}
|
||||
continue-on-error: true
|
||||
|
|
|
@ -4,10 +4,9 @@ on:
|
|||
push:
|
||||
tags-ignore:
|
||||
- 'v*-beta.*'
|
||||
release:
|
||||
types: [published]
|
||||
env:
|
||||
GO_VERSION: '1.18.2'
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -15,11 +14,10 @@ jobs:
|
|||
update-leaderboard:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Update Leaderboard
|
||||
id: leaderboard
|
||||
run: |
|
||||
|
@ -32,7 +30,7 @@ jobs:
|
|||
GITHUB_TOKEN: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
- name: Create PR
|
||||
if: ${{ steps.leaderboard.outputs.changes != '' }}
|
||||
uses: peter-evans/create-pull-request@f094b77505fb89581e68a1163fbd2fffece39da1
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: Update leaderboard
|
||||
|
|
|
@ -14,7 +14,7 @@ on:
|
|||
- "!deploy/iso/**"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -24,11 +24,10 @@ jobs:
|
|||
build_minikube:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Download Dependencies
|
||||
run: go mod download
|
||||
- name: Build Binaries
|
||||
|
@ -51,11 +50,10 @@ jobs:
|
|||
lint:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install libvirt
|
||||
run: |
|
||||
sudo apt-get update
|
||||
|
@ -70,11 +68,10 @@ jobs:
|
|||
unit_test:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install libvirt
|
||||
run: |
|
||||
sudo apt-get update
|
||||
|
@ -102,7 +99,7 @@ jobs:
|
|||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/linux/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
- name: Docker Info
|
||||
|
@ -119,10 +116,9 @@ jobs:
|
|||
echo "--------------------------"
|
||||
docker ps || true
|
||||
echo "--------------------------"
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install gopogh
|
||||
|
||||
shell: bash
|
||||
|
@ -130,9 +126,10 @@ jobs:
|
|||
curl -LO https://github.com/medyagh/gopogh/releases/download/v0.13.0/gopogh-linux-amd64
|
||||
sudo install gopogh-linux-amd64 /usr/local/bin/gopogh
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: false
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -202,7 +199,7 @@ jobs:
|
|||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/linux/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
- name: Docker Info
|
||||
|
@ -219,10 +216,9 @@ jobs:
|
|||
echo "--------------------------"
|
||||
docker ps || true
|
||||
echo "--------------------------"
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install gopogh
|
||||
|
||||
shell: bash
|
||||
|
@ -230,9 +226,10 @@ jobs:
|
|||
curl -LO https://github.com/medyagh/gopogh/releases/download/v0.13.0/gopogh-linux-amd64
|
||||
sudo install gopogh-linux-amd64 /usr/local/bin/gopogh
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: false
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -303,7 +300,7 @@ jobs:
|
|||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/linux/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
|
||||
|
@ -323,19 +320,19 @@ jobs:
|
|||
echo "--------------------------"
|
||||
podman ps || true
|
||||
echo "--------------------------"
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install gopogh
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://github.com/medyagh/gopogh/releases/download/v0.13.0/gopogh-linux-amd64
|
||||
sudo install gopogh-linux-amd64 /usr/local/bin/gopogh
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: false
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -401,18 +398,17 @@ jobs:
|
|||
JOB_NAME: "functional_virtualbox_macos"
|
||||
GOPOGH_RESULT: ""
|
||||
SHELL: "/bin/bash" # To prevent https://github.com/kubernetes/minikube/issues/6643
|
||||
runs-on: macos-10.15
|
||||
runs-on: macos-12
|
||||
steps:
|
||||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/darwin/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/darwin/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install gopogh
|
||||
|
||||
shell: bash
|
||||
|
@ -435,9 +431,10 @@ jobs:
|
|||
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setglobalstate off
|
||||
sudo /usr/libexec/ApplicationFirewall/socketfilterfw -k
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: false
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -505,24 +502,30 @@ jobs:
|
|||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/linux/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
# conntrack is required for kubernetes 1.18 and higher
|
||||
# socat is required for kubectl port forward which is used in some tests such as validateHelmTillerAddon
|
||||
# cri-dockerd is required for Kubernetes 1.24 and higher for none driver
|
||||
- name: Install tools for none
|
||||
shell: bash
|
||||
run: |
|
||||
sudo apt-get update -qq
|
||||
sudo apt-get -qq -y install conntrack
|
||||
sudo apt-get -qq -y install socat
|
||||
VERSION="v1.17.0"
|
||||
curl -L https://github.com/kubernetes-sigs/cri-tools/releases/download/$VERSION/crictl-${VERSION}-linux-amd64.tar.gz --output crictl-${VERSION}-linux-amd64.tar.gz
|
||||
sudo tar zxvf crictl-$VERSION-linux-amd64.tar.gz -C /usr/local/bin
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
CRI_DOCKERD_VERSION="0737013d3c48992724283d151e8a2a767a1839e9"
|
||||
CRI_DOCKERD_BASE_URL="https://storage.googleapis.com/kicbase-artifacts/cri-dockerd/${CRI_DOCKERD_VERSION}"
|
||||
sudo curl -L "${CRI_DOCKERD_BASE_URL}/amd64/cri-dockerd" -o /usr/bin/cri-dockerd
|
||||
sudo curl -L "${CRI_DOCKERD_BASE_URL}/cri-docker.socket" -o /usr/lib/systemd/system/cri-docker.socket
|
||||
sudo curl -L "${CRI_DOCKERD_BASE_URL}/cri-docker.service" -o /usr/lib/systemd/system/cri-docker.service
|
||||
sudo chmod +x /usr/bin/cri-dockerd
|
||||
CRICTL_VERSION="v1.17.0"
|
||||
curl -L https://github.com/kubernetes-sigs/cri-tools/releases/download/$CRICTL_VERSION/crictl-${CRICTL_VERSION}-linux-amd64.tar.gz --output crictl-${CRICTL_VERSION}-linux-amd64.tar.gz
|
||||
sudo tar zxvf crictl-$CRICTL_VERSION-linux-amd64.tar.gz -C /usr/local/bin
|
||||
- name: Install gopogh
|
||||
|
||||
shell: bash
|
||||
|
@ -530,9 +533,10 @@ jobs:
|
|||
curl -LO https://github.com/medyagh/gopogh/releases/download/v0.13.0/gopogh-linux-amd64
|
||||
sudo install gopogh-linux-amd64 /usr/local/bin/gopogh
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: true
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -568,9 +572,9 @@ jobs:
|
|||
echo 'EOF' >> $GITHUB_ENV
|
||||
- uses: actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8
|
||||
with:
|
||||
name: none_ubuntu18_04
|
||||
name: functional_baremetal_ubuntu18_04
|
||||
path: minikube_binaries/report
|
||||
- name: The End Result - None on Ubuntu 18:04
|
||||
- name: The End Result functional_baremetal_ubuntu18_04
|
||||
shell: bash
|
||||
run: |
|
||||
echo ${GOPOGH_RESULT}
|
||||
|
@ -603,7 +607,7 @@ jobs:
|
|||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- name: download all reports
|
||||
uses: actions/download-artifact@9fde3de0b74bd6bc202952485c264b551a4f9405
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
- name: upload all reports
|
||||
shell: bash {0}
|
||||
continue-on-error: true
|
||||
|
|
|
@ -12,7 +12,7 @@ on:
|
|||
- "!deploy/iso/**"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -22,11 +22,10 @@ jobs:
|
|||
build_minikube:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Download Dependencies
|
||||
run: go mod download
|
||||
- name: Build Binaries
|
||||
|
@ -49,11 +48,10 @@ jobs:
|
|||
lint:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install libvirt
|
||||
run: |
|
||||
sudo apt-get update
|
||||
|
@ -68,11 +66,10 @@ jobs:
|
|||
unit_test:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install libvirt
|
||||
run: |
|
||||
sudo apt-get update
|
||||
|
@ -100,7 +97,7 @@ jobs:
|
|||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/linux/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
- name: Docker Info
|
||||
|
@ -117,19 +114,19 @@ jobs:
|
|||
echo "--------------------------"
|
||||
docker ps || true
|
||||
echo "--------------------------"
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install gopogh
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://github.com/medyagh/gopogh/releases/download/v0.13.0/gopogh-linux-amd64
|
||||
sudo install gopogh-linux-amd64 /usr/local/bin/gopogh
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: false
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -200,7 +197,7 @@ jobs:
|
|||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/linux/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
- name: Docker Info
|
||||
|
@ -217,10 +214,9 @@ jobs:
|
|||
echo "--------------------------"
|
||||
docker ps || true
|
||||
echo "--------------------------"
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install gopogh
|
||||
|
||||
shell: bash
|
||||
|
@ -228,9 +224,10 @@ jobs:
|
|||
curl -LO https://github.com/medyagh/gopogh/releases/download/v0.13.0/gopogh-linux-amd64
|
||||
sudo install gopogh-linux-amd64 /usr/local/bin/gopogh
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: false
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -302,7 +299,7 @@ jobs:
|
|||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/linux/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
|
||||
|
@ -322,19 +319,19 @@ jobs:
|
|||
echo "--------------------------"
|
||||
podman ps || true
|
||||
echo "--------------------------"
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install gopogh
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://github.com/medyagh/gopogh/releases/download/v0.13.0/gopogh-linux-amd64
|
||||
sudo install gopogh-linux-amd64 /usr/local/bin/gopogh
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: false
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -401,18 +398,17 @@ jobs:
|
|||
JOB_NAME: "functional_virtualbox_macos"
|
||||
GOPOGH_RESULT: ""
|
||||
SHELL: "/bin/bash" # To prevent https://github.com/kubernetes/minikube/issues/6643
|
||||
runs-on: macos-10.15
|
||||
runs-on: macos-12
|
||||
steps:
|
||||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/darwin/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/darwin/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install gopogh
|
||||
|
||||
shell: bash
|
||||
|
@ -435,9 +431,10 @@ jobs:
|
|||
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setglobalstate off
|
||||
sudo /usr/libexec/ApplicationFirewall/socketfilterfw -k
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: false
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -506,24 +503,30 @@ jobs:
|
|||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/linux/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/linux/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
# conntrack is required for kubernetes 1.18 and higher
|
||||
# socat is required for kubectl port forward which is used in some tests such as validateHelmTillerAddon
|
||||
# cri-dockerd is required for Kubernetes 1.24 and higher for none driver
|
||||
- name: Install tools for none
|
||||
shell: bash
|
||||
run: |
|
||||
sudo apt-get update -qq
|
||||
sudo apt-get -qq -y install conntrack
|
||||
sudo apt-get -qq -y install socat
|
||||
VERSION="v1.17.0"
|
||||
curl -L https://github.com/kubernetes-sigs/cri-tools/releases/download/$VERSION/crictl-${VERSION}-linux-amd64.tar.gz --output crictl-${VERSION}-linux-amd64.tar.gz
|
||||
sudo tar zxvf crictl-$VERSION-linux-amd64.tar.gz -C /usr/local/bin
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
CRI_DOCKERD_VERSION="0737013d3c48992724283d151e8a2a767a1839e9"
|
||||
CRI_DOCKERD_BASE_URL="https://storage.googleapis.com/kicbase-artifacts/cri-dockerd/${CRI_DOCKERD_VERSION}"
|
||||
sudo curl -L "${CRI_DOCKERD_BASE_URL}/amd64/cri-dockerd" -o /usr/bin/cri-dockerd
|
||||
sudo curl -L "${CRI_DOCKERD_BASE_URL}/cri-docker.socket" -o /usr/lib/systemd/system/cri-docker.socket
|
||||
sudo curl -L "${CRI_DOCKERD_BASE_URL}/cri-docker.service" -o /usr/lib/systemd/system/cri-docker.service
|
||||
sudo chmod +x /usr/bin/cri-dockerd
|
||||
CRICTL_VERSION="v1.17.0"
|
||||
curl -L https://github.com/kubernetes-sigs/cri-tools/releases/download/$CRICTL_VERSION/crictl-${CRICTL_VERSION}-linux-amd64.tar.gz --output crictl-${CRICTL_VERSION}-linux-amd64.tar.gz
|
||||
sudo tar zxvf crictl-$CRICTL_VERSION-linux-amd64.tar.gz -C /usr/local/bin
|
||||
- name: Install gopogh
|
||||
|
||||
shell: bash
|
||||
|
@ -531,9 +534,10 @@ jobs:
|
|||
curl -LO https://github.com/medyagh/gopogh/releases/download/v0.13.0/gopogh-linux-amd64
|
||||
sudo install gopogh-linux-amd64 /usr/local/bin/gopogh
|
||||
- name: Download Binaries
|
||||
uses: actions/download-artifact@fdafc3f9f2e2a522dc1d230e6a03de57a1e71c95
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
with:
|
||||
name: minikube_binaries
|
||||
path: minikube_binaries
|
||||
- name: Run Integration Test
|
||||
continue-on-error: true
|
||||
# bash {0} to allow test to continue to next step. in case of
|
||||
|
@ -570,9 +574,9 @@ jobs:
|
|||
echo 'EOF' >> $GITHUB_ENV
|
||||
- uses: actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8
|
||||
with:
|
||||
name: none_ubuntu18_04
|
||||
name: functional_baremetal_ubuntu18_04
|
||||
path: minikube_binaries/report
|
||||
- name: The End Result - None on Ubuntu 18:04
|
||||
- name: The End Result functional_baremetal_ubuntu18_04
|
||||
shell: bash
|
||||
run: |
|
||||
echo ${GOPOGH_RESULT}
|
||||
|
@ -605,7 +609,7 @@ jobs:
|
|||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- name: download all reports
|
||||
uses: actions/download-artifact@9fde3de0b74bd6bc202952485c264b551a4f9405
|
||||
uses: actions/download-artifact@fb598a63ae348fa914e94cd0ff38f362e927b741
|
||||
- name: upload all reports
|
||||
shell: bash {0}
|
||||
continue-on-error: true
|
||||
|
|
|
@ -1,11 +1,12 @@
|
|||
name: Sync docker images of minikube to Alibaba Cloud
|
||||
|
||||
on:
|
||||
workflow_dispatch:
|
||||
schedule:
|
||||
# every day at 7am & 7pm pacific
|
||||
- cron: "0 2,14 * * *"
|
||||
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -16,15 +17,15 @@ jobs:
|
|||
run:
|
||||
working-directory: ./image-syncer
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
with:
|
||||
repository: denverdino/image-syncer
|
||||
path: ./image-syncer
|
||||
|
||||
- name: Set up Go
|
||||
uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: 1.17
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
|
||||
- name: Build
|
||||
run: make
|
||||
|
|
|
@ -6,7 +6,7 @@ on:
|
|||
- cron: "0 2,14 * * *"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -19,11 +19,10 @@ jobs:
|
|||
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
|
||||
AWS_DEFAULT_REGION: 'us-west-1'
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Benchmark time-to-k8s for Docker driver with Docker runtime
|
||||
run: |
|
||||
./hack/benchmark/time-to-k8s/public-chart/public-chart.sh docker docker
|
||||
|
@ -32,23 +31,22 @@ jobs:
|
|||
./hack/benchmark/time-to-k8s/public-chart/public-chart.sh docker containerd
|
||||
time-to-k8s-public-chart-virtualbox:
|
||||
if: github.repository == 'kubernetes/minikube'
|
||||
runs-on: macos-10.15
|
||||
runs-on: macos-12
|
||||
env:
|
||||
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
|
||||
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
|
||||
AWS_DEFAULT_REGION: 'us-west-1'
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- name: Install kubectl
|
||||
shell: bash
|
||||
run: |
|
||||
curl -LO https://storage.googleapis.com/kubernetes-release/release/v1.18.0/bin/darwin/amd64/kubectl
|
||||
curl -LO "https://storage.googleapis.com/kubernetes-release/release/$(curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt)/bin/darwin/amd64/kubectl"
|
||||
sudo install kubectl /usr/local/bin/kubectl
|
||||
kubectl version --client=true
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Disable firewall
|
||||
run: |
|
||||
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setglobalstate off
|
||||
|
|
|
@ -5,7 +5,7 @@ on:
|
|||
types: [released]
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -13,20 +13,19 @@ jobs:
|
|||
benchmark:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- name: Checkout submodules
|
||||
run: git submodule update --init
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: time-to-k8s Benchmark
|
||||
id: timeToK8sBenchmark
|
||||
run: |
|
||||
./hack/benchmark/time-to-k8s/time-to-k8s.sh
|
||||
echo "::set-output name=version::$(minikube version --short)"
|
||||
- name: Create PR
|
||||
uses: peter-evans/create-pull-request@f094b77505fb89581e68a1163fbd2fffece39da1
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: add time-to-k8s benchmark for ${{ steps.timeToK8sBenchmark.outputs.version }}
|
||||
|
|
|
@ -6,7 +6,7 @@ on:
|
|||
- "translations/**"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -14,11 +14,10 @@ jobs:
|
|||
unit_test:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Install libvirt
|
||||
run: |
|
||||
sudo apt-get update
|
||||
|
|
|
@ -1,11 +1,10 @@
|
|||
name: "Tweet the release"
|
||||
on:
|
||||
workflow_dispatch:
|
||||
push:
|
||||
tags:
|
||||
- 'v*'
|
||||
release:
|
||||
types: [published]
|
||||
permissions:
|
||||
contents: read
|
||||
jobs:
|
||||
twitter-release:
|
||||
runs-on: ubuntu-20.04
|
||||
|
|
|
@ -6,7 +6,7 @@ on:
|
|||
- cron: "0 9 * * 1"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -14,11 +14,10 @@ jobs:
|
|||
bump-golang-version:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Bump Golang Versions
|
||||
id: bumpGolang
|
||||
run: |
|
||||
|
@ -26,7 +25,7 @@ jobs:
|
|||
echo "::set-output name=changes::$(git status --porcelain)"
|
||||
- name: Create PR
|
||||
if: ${{ steps.bumpGolang.outputs.changes != '' }}
|
||||
uses: peter-evans/create-pull-request@f094b77505fb89581e68a1163fbd2fffece39da1
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: bump golang versions
|
||||
|
|
|
@ -6,7 +6,7 @@ on:
|
|||
- cron: "0 10 * * 1"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -14,11 +14,10 @@ jobs:
|
|||
bump-golint-version:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Bump Golint Versions
|
||||
id: bumpGolint
|
||||
run: |
|
||||
|
@ -26,7 +25,7 @@ jobs:
|
|||
echo "::set-output name=changes::$(git status --porcelain)"
|
||||
- name: Create PR
|
||||
if: ${{ steps.bumpGolint.outputs.changes != '' }}
|
||||
uses: peter-evans/create-pull-request@f094b77505fb89581e68a1163fbd2fffece39da1
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: bump golint versions
|
||||
|
|
|
@ -6,7 +6,7 @@ on:
|
|||
- cron: "0 9 * * 1"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -14,11 +14,10 @@ jobs:
|
|||
bump-gopogh-version:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Bump gopogh Versions
|
||||
id: bumpGopogh
|
||||
run: |
|
||||
|
@ -26,7 +25,7 @@ jobs:
|
|||
echo "::set-output name=changes::$(git status --porcelain)"
|
||||
- name: Create PR
|
||||
if: ${{ steps.bumpGopogh.outputs.changes != '' }}
|
||||
uses: peter-evans/create-pull-request@f094b77505fb89581e68a1163fbd2fffece39da1
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: bump gopogh versions
|
||||
|
|
|
@ -6,7 +6,7 @@ on:
|
|||
- cron: "0 10 * * 1"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -14,11 +14,10 @@ jobs:
|
|||
bump-gotestsum-version:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Bump Gotestsum Versions
|
||||
id: bumpGotestsum
|
||||
run: |
|
||||
|
@ -26,7 +25,7 @@ jobs:
|
|||
echo "::set-output name=changes::$(git status --porcelain)"
|
||||
- name: Create PR
|
||||
if: ${{ steps.bumpGotestsum.outputs.changes != '' }}
|
||||
uses: peter-evans/create-pull-request@f094b77505fb89581e68a1163fbd2fffece39da1
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: bump gotestsum versions
|
||||
|
|
|
@ -6,7 +6,7 @@ on:
|
|||
- cron: "0 8 * * 1"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -14,8 +14,8 @@ jobs:
|
|||
bump-k8s-versions:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
- name: Bump Kubernetes Versions
|
||||
|
@ -30,7 +30,7 @@ jobs:
|
|||
echo "::set-output name=changes::$c"
|
||||
- name: Create PR
|
||||
if: ${{ steps.bumpk8s.outputs.changes != '' }}
|
||||
uses: peter-evans/create-pull-request@f094b77505fb89581e68a1163fbd2fffece39da1
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: bump default/newest kubernetes versions
|
||||
|
|
|
@ -6,7 +6,7 @@ on:
|
|||
- cron: "0 6 * * 1"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.18.2'
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
|
@ -14,11 +14,10 @@ jobs:
|
|||
bump-k8s-versions:
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- uses: actions/checkout@629c2de402a417ea7690ca6ce3f33229e27606a5
|
||||
- uses: actions/setup-go@b22fbbc2921299758641fab08929b4ac52b32923
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
stable: true
|
||||
- name: Bump Kubeadm Constants for Kubernetes Images
|
||||
id: bumpKubAdmConsts
|
||||
run: |
|
||||
|
@ -29,7 +28,7 @@ jobs:
|
|||
echo "::set-output name=changes::$c"
|
||||
- name: Create PR
|
||||
if: ${{ steps.bumpKubAdmConsts.outputs.changes != '' }}
|
||||
uses: peter-evans/create-pull-request@f094b77505fb89581e68a1163fbd2fffece39da1
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: update image constants for kubeadm images
|
||||
|
|
|
@ -0,0 +1,48 @@
|
|||
name: "update-yearly-leaderboard"
|
||||
on:
|
||||
workflow_dispatch:
|
||||
schedule:
|
||||
# The 2nd of every month
|
||||
- cron: "0 0 2 * *"
|
||||
env:
|
||||
GOPROXY: https://proxy.golang.org
|
||||
GO_VERSION: '1.19.1'
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
jobs:
|
||||
update-yearly-leaderboard:
|
||||
if: github.repository == 'kubernetes/minikube'
|
||||
runs-on: ubuntu-20.04
|
||||
env:
|
||||
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
|
||||
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
|
||||
AWS_DEFAULT_REGION: 'us-west-1'
|
||||
steps:
|
||||
- uses: actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b
|
||||
- uses: actions/setup-go@268d8c0ca0432bb2cf416faae41297df9d262d7f
|
||||
with:
|
||||
go-version: ${{env.GO_VERSION}}
|
||||
- name: Update Yearly Leaderboard
|
||||
id: yearlyLeaderboard
|
||||
run: |
|
||||
make update-yearly-leaderboard
|
||||
echo "::set-output name=changes::$(git status --porcelain)"
|
||||
env:
|
||||
GITHUB_TOKEN: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
- name: Create PR
|
||||
if: ${{ steps.yearlyLeaderboard.outputs.changes != '' }}
|
||||
uses: peter-evans/create-pull-request@18f90432bedd2afd6a825469ffd38aa24712a91d
|
||||
with:
|
||||
token: ${{ secrets.MINIKUBE_BOT_PAT }}
|
||||
commit-message: Update yearly leaderboard
|
||||
committer: minikube-bot <minikube-bot@google.com>
|
||||
author: minikube-bot <minikube-bot@google.com>
|
||||
branch: yearly-leaderboard
|
||||
push-to-fork: minikube-bot/minikube
|
||||
base: master
|
||||
delete-branch: true
|
||||
title: 'Update Yearly Leaderboard'
|
||||
body: |
|
||||
Committing changes resulting from `make update-yearly-leaderboard`.
|
||||
This PR is auto-generated by the [update-yearly-leaderboard](https://github.com/kubernetes/minikube/blob/master/.github/workflows/yearly-leaderboard.yml) CI workflow.
|
265
CHANGELOG.md
265
CHANGELOG.md
|
@ -1,5 +1,234 @@
|
|||
# Release Notes
|
||||
|
||||
## Version 1.27.0 - 2022-09-15
|
||||
|
||||
Kubernetes v1.25:
|
||||
* Bump default Kubernetes version to v1.25.0 and resolve `/etc/resolv.conf` regression [#14848](https://github.com/kubernetes/minikube/pull/14848)
|
||||
* Skip metallb PodSecurityPolicy object for kubernetes 1.25+ [#14903](https://github.com/kubernetes/minikube/pull/14903)
|
||||
* The DefaultKubernetesRepo changed for 1.25.0 [#14768](https://github.com/kubernetes/minikube/pull/14768)
|
||||
|
||||
Minor Improvements:
|
||||
* Add fscrypt kernel options [#14783](https://github.com/kubernetes/minikube/pull/14783)
|
||||
* Output kubeadm logs [#14697](https://github.com/kubernetes/minikube/pull/14697)
|
||||
|
||||
Bug fixes:
|
||||
* Fix QEMU delete errors [#14950](https://github.com/kubernetes/minikube/pull/14950)
|
||||
* Fix containerd configuration issue with insecure registries [#14482](https://github.com/kubernetes/minikube/pull/14482)
|
||||
* Fix registry when custom images provided [#14690](https://github.com/kubernetes/minikube/pull/14690)
|
||||
|
||||
Version Upgrades:
|
||||
* ISO: Update Docker from 20.10.17 to 20.10.18 [#14935](https://github.com/kubernetes/minikube/pull/14935)
|
||||
* Update kicbase base image to Ubuntu:focal-20220826 [#14904](https://github.com/kubernetes/minikube/pull/14904)
|
||||
* Update registry addon image from 2.7.1 to 2.8.1 [#14886](https://github.com/kubernetes/minikube/pull/14886)
|
||||
* Update gcp-auth-webhook addon from v0.0.10 to v0.0.11 [#14847](https://github.com/kubernetes/minikube/pull/14847)
|
||||
* Update Headlamp addon image from v0.9.0 to v0.11.1 [#14802](https://github.com/kubernetes/minikube/pull/14802)
|
||||
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
- Abirdcfly
|
||||
- Alex
|
||||
- Anders F Björklund
|
||||
- Andrew Hamilton
|
||||
- Jeff MAURY
|
||||
- Jānis Bebrītis
|
||||
- Marcel Lauhoff
|
||||
- Medya Ghazizadeh
|
||||
- Renato Costa
|
||||
- Santhosh Nagaraj S
|
||||
- Siddhant Khisty
|
||||
- Steven Powell
|
||||
- Yuiko Mouri
|
||||
- klaases
|
||||
- mtardy
|
||||
- shaunmayo
|
||||
- shixiuguo
|
||||
|
||||
Thank you to our PR reviewers for this release!
|
||||
|
||||
- spowelljr (23 comments)
|
||||
- medyagh (6 comments)
|
||||
- klaases (5 comments)
|
||||
- vbezhenar (2 comments)
|
||||
- nixpanic (1 comments)
|
||||
- reylejano (1 comments)
|
||||
- t-inu (1 comments)
|
||||
|
||||
Thank you to our triage members for this release!
|
||||
|
||||
- afbjorklund (76 comments)
|
||||
- klaases (58 comments)
|
||||
- RA489 (38 comments)
|
||||
- spowelljr (16 comments)
|
||||
- eiffel-fl (10 comments)
|
||||
|
||||
Check out our [contributions leaderboard](https://minikube.sigs.k8s.io/docs/contrib/leaderboard/v1.27.0/) for this release!
|
||||
|
||||
## Version 1.26.1 - 2022-08-02
|
||||
|
||||
Minor Improvements:
|
||||
* Check for cri-dockerd & dockerd runtimes when using none-driver on Kubernetes 1.24+ [#14555](https://github.com/kubernetes/minikube/pull/14555)
|
||||
* Add solution message for when `cri-docker` is missing [#14483](https://github.com/kubernetes/minikube/pull/14483)
|
||||
* Limit number of audit entries [#14695](https://github.com/kubernetes/minikube/pull/14695)
|
||||
* Optimize audit logging [#14596](https://github.com/kubernetes/minikube/pull/14596)
|
||||
* Show the container runtime when running without kubernetes #13432 [#14200](https://github.com/kubernetes/minikube/pull/14200)
|
||||
* Add warning when enabling thrid-party addons [#14499](https://github.com/kubernetes/minikube/pull/14499)
|
||||
|
||||
Bug fixes:
|
||||
* Fix url index out of range error in service [#14658](https://github.com/kubernetes/minikube/pull/14658)
|
||||
* Fix incorrect user and profile in audit logging [#14562](https://github.com/kubernetes/minikube/pull/14562)
|
||||
* Fix overwriting err for OCI "minikube start" [#14506](https://github.com/kubernetes/minikube/pull/14506)
|
||||
* Fix panic when environment variables are empty [#14415](https://github.com/kubernetes/minikube/pull/14415)
|
||||
|
||||
Version Upgrades:
|
||||
* Bump Kubernetes version default: v1.24.3 and latest: v1.24.3 [#14606](https://github.com/kubernetes/minikube/pull/14606)
|
||||
* ISO: Update Docker from 20.10.16 to 20.10.17 [#14534](https://github.com/kubernetes/minikube/pull/14534)
|
||||
* ISO/Kicbase: Update cri-o from v1.22.3 to v1.24.1 [#14420](https://github.com/kubernetes/minikube/pull/14420)
|
||||
* ISO: Update conmon from v2.0.24 to v2.1.2 [#14545](https://github.com/kubernetes/minikube/pull/14545)
|
||||
* Update gcp-auth-webhook from v0.0.9 to v0.0.10 [#14670](https://github.com/kubernetes/minikube/pull/14670)
|
||||
* ISO/Kicbase: Update base images [#14481](https://github.com/kubernetes/minikube/pull/14481)
|
||||
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
- Akihiro Suda
|
||||
- Akira Yoshiyama
|
||||
- Bradley S
|
||||
- Christoph "criztovyl" Schulz
|
||||
- Gimb0
|
||||
- HarshCasper
|
||||
- Jeff MAURY
|
||||
- Medya Ghazizadeh
|
||||
- Niels de Vos
|
||||
- Paul S. Schweigert
|
||||
- Santhosh Nagaraj S
|
||||
- Steven Powell
|
||||
- Tobias Pfandzelter
|
||||
- anoop142
|
||||
- inifares23lab
|
||||
- klaases
|
||||
- peizhouyu
|
||||
- zhouguowei
|
||||
- 吴梓铭
|
||||
- 李龙峰
|
||||
|
||||
Thank you to our PR reviewers for this release!
|
||||
|
||||
- spowelljr (50 comments)
|
||||
- medyagh (9 comments)
|
||||
- atoato88 (3 comments)
|
||||
- klaases (2 comments)
|
||||
- afbjorklund (1 comments)
|
||||
|
||||
Thank you to our triage members for this release!
|
||||
|
||||
- afbjorklund (75 comments)
|
||||
- RA489 (56 comments)
|
||||
- klaases (32 comments)
|
||||
- spowelljr (27 comments)
|
||||
- medyagh (13 comments)
|
||||
|
||||
Check out our [contributions leaderboard](https://minikube.sigs.k8s.io/docs/contrib/leaderboard/v1.26.0/) for this release!
|
||||
|
||||
## Version 1.26.0 - 2022-06-22
|
||||
|
||||
Features:
|
||||
* Add `headlamp` addon [#14315](https://github.com/kubernetes/minikube/pull/14315)
|
||||
* Add `InAccel FPGA Operator` addon [#12995](https://github.com/kubernetes/minikube/pull/12995)
|
||||
|
||||
QEMU:
|
||||
* Only set highmem=off for darwin if qemu version is below 7.0 or memory is below 3GB [#14291](https://github.com/kubernetes/minikube/pull/14291)
|
||||
* Define qemu as a qemu2 driver alias [#14284](https://github.com/kubernetes/minikube/pull/14284)
|
||||
* Allow users to supply custom QEMU firmware path [#14283](https://github.com/kubernetes/minikube/pull/14283)
|
||||
|
||||
Minor Improvements:
|
||||
* Add eBPF related kernel options [#14316](https://github.com/kubernetes/minikube/pull/14316)
|
||||
* Add bind address flag for `minikube tunnel` [#14245](https://github.com/kubernetes/minikube/pull/14245)
|
||||
* Add active column for `minikube profile list` [#14079](https://github.com/kubernetes/minikube/pull/14079)
|
||||
* Add documentation URL to the addon list table [#14123](https://github.com/kubernetes/minikube/pull/14123)
|
||||
* `minikube config defaults kubernetes-version` lists all currently supported Kubernetes versions [#13775](https://github.com/kubernetes/minikube/pull/13775)
|
||||
* Support starting minikube with the Podman driver on NixOS systems [#12739](https://github.com/kubernetes/minikube/pull/12739)
|
||||
|
||||
Bug Fixes:
|
||||
* Fix terminated commands not writing to audit log [#13307](https://github.com/kubernetes/minikube/pull/13307)
|
||||
* Fix Podman port mapping publish on macOS [#14290](https://github.com/kubernetes/minikube/pull/14290)
|
||||
* Fix `minikube delete` deleting networks from other profiles [#14279](https://github.com/kubernetes/minikube/pull/14279)
|
||||
|
||||
Version Upgrades:
|
||||
* Bump Kubernetes version default: v1.24.1 and latest: v1.24.1 [#14197](https://github.com/kubernetes/minikube/pull/14197)
|
||||
* ISO: Upgrade Docker from 20.10.14 to 20.10.16 [#14153](https://github.com/kubernetes/minikube/pull/14153)
|
||||
* ISO: Upgrade kernel from 4.19.235 to 5.10.57 [#12707](https://github.com/kubernetes/minikube/pull/12707)
|
||||
* Upgrade Dashboard addon from v2.5.1 to v2.6.0 & MetricsScraper from v1.0.7 to v1.0.8 [#14269](https://github.com/kubernetes/minikube/pull/14269)
|
||||
* Upgrade gcp-auth-webhook from v0.0.8 to v0.0.9 [#14372](https://github.com/kubernetes/minikube/pull/14372)
|
||||
* Upgrade nginx image from v1.2.0 to v1.2.1 [#14317](https://github.com/kubernetes/minikube/pull/14317)
|
||||
|
||||
**Important Changes in Pre-Release Versions**
|
||||
Features:
|
||||
* Add configure option to registry-aliases addon [#13912](https://github.com/kubernetes/minikube/pull/13912)
|
||||
* Add support for building aarch64 ISO [#13762](https://github.com/kubernetes/minikube/pull/13762)
|
||||
* Support rootless Podman driver (Usage: `minikube config set rootless true`) [#13829](https://github.com/kubernetes/minikube/pull/13829)
|
||||
|
||||
QEMU:
|
||||
* Add support for the QEMU driver [#13639](https://github.com/kubernetes/minikube/pull/13639)
|
||||
* Fix qemu firmware path locations [#14182](https://github.com/kubernetes/minikube/pull/14182)
|
||||
* Re-establish apiserver tunnel on restart [#14183](https://github.com/kubernetes/minikube/pull/14183)
|
||||
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
- Alex Andrews
|
||||
- Anders F Björklund
|
||||
- Elias Koromilas
|
||||
- Francis Laniel
|
||||
- Giildo
|
||||
- Harsh Vardhan
|
||||
- Jack Zhang
|
||||
- Jeff MAURY
|
||||
- Kevin Grigorenko
|
||||
- Kian-Meng Ang
|
||||
- Leonardo Grasso
|
||||
- Medya Ghazizadeh
|
||||
- Nikhil Sharma
|
||||
- Nils Fahldieck
|
||||
- Pablo Caderno
|
||||
- Peter Becich
|
||||
- Predrag Rogic
|
||||
- Santhosh Nagaraj S
|
||||
- Sharif Elgamal
|
||||
- Steven Powell
|
||||
- Toshiaki Inukai
|
||||
- klaases
|
||||
- lakshkeswani
|
||||
- layakdev
|
||||
- lilongfeng
|
||||
- simonren-tes
|
||||
- ziyi-xie
|
||||
- 李龙峰
|
||||
|
||||
Thank you to our PR reviewers for this release!
|
||||
|
||||
- spowelljr (76 comments)
|
||||
- sharifelgamal (11 comments)
|
||||
- medyagh (8 comments)
|
||||
- afbjorklund (6 comments)
|
||||
- kakkoyun (2 comments)
|
||||
- knrt10 (2 comments)
|
||||
- mprimeaux (2 comments)
|
||||
- shu-mutou (2 comments)
|
||||
- javierhonduco (1 comments)
|
||||
- nburlett (1 comments)
|
||||
|
||||
Thank you to our triage members for this release!
|
||||
|
||||
- spowelljr (39 comments)
|
||||
- RA489 (30 comments)
|
||||
- sharifelgamal (27 comments)
|
||||
- afbjorklund (14 comments)
|
||||
- klaases (14 comments)
|
||||
|
||||
## Version 1.26.0-beta.1 - 2022-05-17
|
||||
|
||||
QEMU driver enhancements:
|
||||
|
@ -9,7 +238,7 @@ QEMU driver enhancements:
|
|||
Features:
|
||||
* Add configure option to registry-aliases addon [#13912](https://github.com/kubernetes/minikube/pull/13912)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -75,7 +304,7 @@ Version Upgrades:
|
|||
* ISO: Upgrade Podman from 2.2.1 to 3.4.2 [#13126](https://github.com/kubernetes/minikube/pull/13126)
|
||||
* ISO: Add packaging for crun [#11679](https://github.com/kubernetes/minikube/pull/11679)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -161,7 +390,7 @@ Version Upgrades:
|
|||
* ISO: Add packaging for cri-dockerd [#13191](https://github.com/kubernetes/minikube/pull/13191)
|
||||
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -218,7 +447,7 @@ Check out our [contributions leaderboard](https://minikube.sigs.k8s.io/docs/cont
|
|||
|
||||
* Resolved regression breaking `minikube start` with hyperkit driver [#13418](https://github.com/kubernetes/minikube/pull/13418)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -265,7 +494,7 @@ Version Upgrades:
|
|||
Deprecation:
|
||||
* mount: Remove `--mode` flag [#13162](https://github.com/kubernetes/minikube/pull/13162)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -342,7 +571,7 @@ Bug fixes:
|
|||
* fix zsh completion [#12841](https://github.com/kubernetes/minikube/pull/12841)
|
||||
* Fix starting on Windows with VMware driver on non `C:` drive [#12819](https://github.com/kubernetes/minikube/pull/12819)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -404,7 +633,7 @@ Version Upgrades:
|
|||
* minikube-ingress-dns: Update image to 0.0.2 [#12730](https://github.com/kubernetes/minikube/pull/12730)
|
||||
* helm-tiller: Update image to v2.17.0 [#12641](https://github.com/kubernetes/minikube/pull/12641)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -463,7 +692,7 @@ Fix crio regression:
|
|||
* Roll back default crio cgroup to systemd [#12533](https://github.com/kubernetes/minikube/pull/12533)
|
||||
* Fix template typo [#12532](https://github.com/kubernetes/minikube/pull/12532)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -509,7 +738,7 @@ Version Upgrades:
|
|||
* Bump cri-o from v1.20.0 to 1.22.0 [#12425](https://github.com/kubernetes/minikube/pull/12425)
|
||||
* Bump dashboard from v2.1.0 to v2.3.1 and metrics-scraper from v1.0.4 to v1.0.7 [#12475](https://github.com/kubernetes/minikube/pull/12475)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -657,7 +886,7 @@ Bugs:
|
|||
Version Upgrades:
|
||||
* bump default kubernetes version to v1.21.2 & newest kubernetes version to v1.22.0-beta.0 [#11901](https://github.com/kubernetes/minikube/pull/11901)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -702,7 +931,7 @@ Bugs:
|
|||
* Fix embed-certs global config [#11576](https://github.com/kubernetes/minikube/pull/11576)
|
||||
* Fix a download link to use arm64 instead of amd64 [#11653](https://github.com/kubernetes/minikube/pull/11653)
|
||||
* fix downloading duplicate base image [#11690](https://github.com/kubernetes/minikube/pull/11690)
|
||||
* fix multi-node loosing track of nodes after second restart [#11731](https://github.com/kubernetes/minikube/pull/11731)
|
||||
* fix multi-node losing track of nodes after second restart [#11731](https://github.com/kubernetes/minikube/pull/11731)
|
||||
* gcp-auth: do not override existing environment variables in pods [#11665](https://github.com/kubernetes/minikube/pull/11665)
|
||||
|
||||
Minor improvements:
|
||||
|
@ -710,7 +939,7 @@ Minor improvements:
|
|||
* Allow running amd64 binary on M1 [#11674](https://github.com/kubernetes/minikube/pull/11674)
|
||||
* improve containerd experience on cgroup v2 [#11632](https://github.com/kubernetes/minikube/pull/11632)
|
||||
* Improve French locale [#11728](https://github.com/kubernetes/minikube/pull/11728)
|
||||
* Fix UI error for stoppping systemd service [#11667](https://github.com/kubernetes/minikube/pull/11667)
|
||||
* Fix UI error for stopping systemd service [#11667](https://github.com/kubernetes/minikube/pull/11667)
|
||||
* international languages: allow using LC_ALL env to set local language for windows [#11721](https://github.com/kubernetes/minikube/pull/11721)
|
||||
* Change registery_mirror to registery-mirror [#11678](https://github.com/kubernetes/minikube/pull/11678)
|
||||
|
||||
|
@ -719,7 +948,7 @@ Version Upgrades:
|
|||
* ISO: Upgrade podman to 3.1.2 [#11704](https://github.com/kubernetes/minikube/pull/11704)
|
||||
* Upgrade Buildroot to 2021.02 LTS with Linux 4.19 [#11688](https://github.com/kubernetes/minikube/pull/11688)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -756,7 +985,7 @@ Thank you to our triage members for this release!
|
|||
* add more polish translations [#11587](https://github.com/kubernetes/minikube/pull/11587)
|
||||
* Modify MetricsServer to use v1 api version (instead of v1beta1). [#11584](https://github.com/kubernetes/minikube/pull/11584)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -805,7 +1034,7 @@ Version Upgrades:
|
|||
* containerd: upgrade `io.containerd.runtime.v1.linux` to `io.containerd.runc.v2` (suppot cgroup v2) [#11325](https://github.com/kubernetes/minikube/pull/11325)
|
||||
* metallb-addon: Update metallb from 0.8.2 to 0.9.6 [#11410](https://github.com/kubernetes/minikube/pull/11410)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -869,7 +1098,7 @@ Version Upgrades:
|
|||
* Update olm addon to v0.17.0 [#10947](https://github.com/kubernetes/minikube/pull/10947)
|
||||
* Update newest supported Kubernetes version to v1.22.0-alpha.1 [#11287](https://github.com/kubernetes/minikube/pull/11287)
|
||||
|
||||
For a more detailed changelog, including changes occuring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
For a more detailed changelog, including changes occurring in pre-release versions, see [CHANGELOG.md](https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md).
|
||||
|
||||
Thank you to our contributors for this release!
|
||||
|
||||
|
@ -1237,7 +1466,7 @@ Minor Improvements:
|
|||
|
||||
Bug Fixes:
|
||||
|
||||
* Snap package manger: fix cert copy issue [#10042](https://github.com/kubernetes/minikube/pull/10042)
|
||||
* Snap package manager: fix cert copy issue [#10042](https://github.com/kubernetes/minikube/pull/10042)
|
||||
* Ignore non-socks5 ALL_PROXY env var when checking docker status [#10109](https://github.com/kubernetes/minikube/pull/10109)
|
||||
* Docker-env: avoid race condition in bootstrap certs for parallel runs [#10118](https://github.com/kubernetes/minikube/pull/10118)
|
||||
* Fix 'profile list' for multi-node clusters [#9955](https://github.com/kubernetes/minikube/pull/9955)
|
||||
|
@ -2106,7 +2335,7 @@ Improvements:
|
|||
* Behavior change: start with no arguments uses existing cluster config [#7449](https://github.com/kubernetes/minikube/pull/7449)
|
||||
* conformance: add --wait=all, reduce quirks [#7716](https://github.com/kubernetes/minikube/pull/7716)
|
||||
* Upgrade minimum supported k8s version to v1.12 [#7723](https://github.com/kubernetes/minikube/pull/7723)
|
||||
* Add default CNI network for running wth podman [#7754](https://github.com/kubernetes/minikube/pull/7754)
|
||||
* Add default CNI network for running with podman [#7754](https://github.com/kubernetes/minikube/pull/7754)
|
||||
* Behavior change: fallback to alternate drivers on failure [#7389](https://github.com/kubernetes/minikube/pull/7389)
|
||||
* Add registry addon feature for docker on mac/windows [#7603](https://github.com/kubernetes/minikube/pull/7603)
|
||||
* Check node pressure & new option "node_ready" for --wait flag [#7752](https://github.com/kubernetes/minikube/pull/7752)
|
||||
|
|
63
Makefile
63
Makefile
|
@ -14,8 +14,8 @@
|
|||
|
||||
# Bump these on release - and please check ISO_VERSION for correctness.
|
||||
VERSION_MAJOR ?= 1
|
||||
VERSION_MINOR ?= 26
|
||||
VERSION_BUILD ?= 0-beta.1
|
||||
VERSION_MINOR ?= 27
|
||||
VERSION_BUILD ?= 0
|
||||
RAW_VERSION=$(VERSION_MAJOR).$(VERSION_MINOR).$(VERSION_BUILD)
|
||||
VERSION ?= v$(RAW_VERSION)
|
||||
|
||||
|
@ -23,7 +23,7 @@ KUBERNETES_VERSION ?= $(shell egrep "DefaultKubernetesVersion =" pkg/minikube/co
|
|||
KIC_VERSION ?= $(shell egrep "Version =" pkg/drivers/kic/types.go | cut -d \" -f2)
|
||||
|
||||
# Default to .0 for higher cache hit rates, as build increments typically don't require new ISO versions
|
||||
ISO_VERSION ?= v1.26.0-1653677468-13807
|
||||
ISO_VERSION ?= v1.27.0
|
||||
# Dashes are valid in semver, but not Linux packaging. Use ~ to delimit alpha/beta
|
||||
DEB_VERSION ?= $(subst -,~,$(RAW_VERSION))
|
||||
DEB_REVISION ?= 0
|
||||
|
@ -33,7 +33,7 @@ RPM_REVISION ?= 0
|
|||
|
||||
# used by hack/jenkins/release_build_and_upload.sh and KVM_BUILD_IMAGE, see also BUILD_IMAGE below
|
||||
# update this only by running `make update-golang-version`
|
||||
GO_VERSION ?= 1.18.2
|
||||
GO_VERSION ?= 1.19.1
|
||||
# update this only by running `make update-golang-version`
|
||||
GO_K8S_VERSION_PREFIX ?= v1.25.0
|
||||
|
||||
|
@ -44,7 +44,7 @@ KVM_GO_VERSION ?= $(GO_VERSION:.0=)
|
|||
INSTALL_SIZE ?= $(shell du out/minikube-windows-amd64.exe | cut -f1)
|
||||
BUILDROOT_BRANCH ?= 2021.02.12
|
||||
# the go version on the line below is for the ISO and does not need to be updated often
|
||||
GOLANG_OPTIONS = GO_VERSION=1.17 GO_HASH_FILE=$(PWD)/deploy/iso/minikube-iso/go.hash
|
||||
GOLANG_OPTIONS = GO_VERSION=1.19.1 GO_HASH_FILE=$(PWD)/deploy/iso/minikube-iso/go.hash
|
||||
BUILDROOT_OPTIONS = BR2_EXTERNAL=../../deploy/iso/minikube-iso $(GOLANG_OPTIONS)
|
||||
REGISTRY ?= gcr.io/k8s-minikube
|
||||
|
||||
|
@ -73,10 +73,10 @@ MINIKUBE_BUCKET ?= minikube/releases
|
|||
MINIKUBE_UPLOAD_LOCATION := gs://${MINIKUBE_BUCKET}
|
||||
MINIKUBE_RELEASES_URL=https://github.com/kubernetes/minikube/releases/download
|
||||
|
||||
KERNEL_VERSION ?= 4.19.235
|
||||
KERNEL_VERSION ?= 5.10.57
|
||||
# latest from https://github.com/golangci/golangci-lint/releases
|
||||
# update this only by running `make update-golint-version`
|
||||
GOLINT_VERSION ?= v1.46.2
|
||||
GOLINT_VERSION ?= v1.49.0
|
||||
# Limit number of default jobs, to avoid the CI builds running out of memory
|
||||
GOLINT_JOBS ?= 4
|
||||
# see https://github.com/golangci/golangci-lint#memory-usage-of-golangci-lint
|
||||
|
@ -111,7 +111,7 @@ GVISOR_TAG ?= latest
|
|||
AUTOPAUSE_HOOK_TAG ?= v0.0.2
|
||||
|
||||
# prow-test tag to push changes to
|
||||
PROW_TEST_TAG ?= v0.0.2
|
||||
PROW_TEST_TAG ?= v0.0.3
|
||||
|
||||
# storage provisioner tag to push changes to
|
||||
# NOTE: you will need to bump the PreloadVersion if you change this
|
||||
|
@ -269,7 +269,7 @@ out/minikube-linux-armv6: $(SOURCE_FILES) $(ASSET_FILES)
|
|||
$(Q)GOOS=linux GOARCH=arm GOARM=6 \
|
||||
go build -tags "$(MINIKUBE_BUILD_TAGS)" -ldflags="$(MINIKUBE_LDFLAGS)" -a -o $@ k8s.io/minikube/cmd/minikube
|
||||
|
||||
.PHONY: e2e-linux-amd64 e2e-linux-arm64 e2e-darwin-amd64 e2e-windows-amd64.exe
|
||||
.PHONY: e2e-linux-amd64 e2e-linux-arm64 e2e-darwin-amd64 e2e-darwin-arm64 e2e-windows-amd64.exe
|
||||
e2e-linux-amd64: out/e2e-linux-amd64 ## build end2end binary for Linux x86 64bit
|
||||
e2e-linux-arm64: out/e2e-linux-arm64 ## build end2end binary for Linux ARM 64bit
|
||||
e2e-darwin-amd64: out/e2e-darwin-amd64 ## build end2end binary for Darwin x86 64bit
|
||||
|
@ -287,12 +287,16 @@ minikube-iso-arm64: minikube-iso-aarch64
|
|||
|
||||
minikube-iso-%: deploy/iso/minikube-iso/board/minikube/%/rootfs-overlay/usr/bin/auto-pause # build minikube iso
|
||||
echo $(ISO_VERSION) > deploy/iso/minikube-iso/board/minikube/$*/rootfs-overlay/etc/VERSION
|
||||
cp deploy/iso/minikube-iso/CHANGELOG deploy/iso/minikube-iso/board/minikube/$*/rootfs-overlay/etc/CHANGELOG
|
||||
cp deploy/iso/minikube-iso/arch/$*/Config.in.tmpl deploy/iso/minikube-iso/Config.in
|
||||
if [ ! -d $(BUILD_DIR)/buildroot ]; then \
|
||||
mkdir -p $(BUILD_DIR); \
|
||||
git clone --depth=1 --branch=$(BUILDROOT_BRANCH) https://github.com/buildroot/buildroot $(BUILD_DIR)/buildroot; \
|
||||
perl -pi -e 's@\s+source "package/sysdig/Config\.in"\n@@;' $(BUILD_DIR)/buildroot/package/Config.in; \
|
||||
rm -r $(BUILD_DIR)/buildroot/package/sysdig; \
|
||||
cp deploy/iso/minikube-iso/go.hash $(BUILD_DIR)/buildroot/package/go/go.hash; \
|
||||
git --git-dir=$(BUILD_DIR)/buildroot/.git config user.email "dev@random.com"; \
|
||||
git --git-dir=$(BUILD_DIR)/buildroot/.git config user.name "Random developer"; \
|
||||
git --git-dir=$(BUILD_DIR)/buildroot/.git --work-tree=$(BUILD_DIR)/buildroot am ../../deploy/iso/minikube-iso/0001-linux-add-BR2_LINUX_KERNEL_NEEDS_HOST_PAHOLE.patch; \
|
||||
fi;
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot $(BUILDROOT_OPTIONS) O=$(BUILD_DIR)/buildroot/output-$* minikube_$*_defconfig
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot $(BUILDROOT_OPTIONS) O=$(BUILD_DIR)/buildroot/output-$* host-python
|
||||
|
@ -306,15 +310,15 @@ minikube-iso-%: deploy/iso/minikube-iso/board/minikube/%/rootfs-overlay/usr/bin/
|
|||
|
||||
# Change buildroot configuration for the minikube ISO
|
||||
.PHONY: iso-menuconfig
|
||||
iso-menuconfig: ## Configure buildroot configuration
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot $(BUILDROOT_OPTIONS) menuconfig
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot $(BUILDROOT_OPTIONS) savedefconfig
|
||||
iso-menuconfig-%: ## Configure buildroot configuration
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot $(BUILDROOT_OPTIONS) O=$(BUILD_DIR)/buildroot/output-$* menuconfig
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot $(BUILDROOT_OPTIONS) O=$(BUILD_DIR)/buildroot/output-$* savedefconfig
|
||||
|
||||
# Change the kernel configuration for the minikube ISO
|
||||
linux-menuconfig-%: ## Configure Linux kernel configuration
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot/output/build/linux-$(KERNEL_VERSION)/ menuconfig
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot/output/build/linux-$(KERNEL_VERSION)/ savedefconfig
|
||||
cp $(BUILD_DIR)/buildroot/output/build/linux-$(KERNEL_VERSION)/defconfig deploy/iso/minikube-iso/board/minikube/$*/linux_$*_defconfig
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot/output-$*/build/linux-$(KERNEL_VERSION)/ menuconfig
|
||||
$(MAKE) -C $(BUILD_DIR)/buildroot/output-$*/build/linux-$(KERNEL_VERSION)/ savedefconfig
|
||||
cp $(BUILD_DIR)/buildroot/output-$*/build/linux-$(KERNEL_VERSION)/defconfig deploy/iso/minikube-iso/board/minikube/$*/linux_$*_defconfig
|
||||
|
||||
out/minikube-%.iso: $(shell find "deploy/iso/minikube-iso" -type f)
|
||||
ifeq ($(IN_DOCKER),1)
|
||||
|
@ -322,7 +326,7 @@ ifeq ($(IN_DOCKER),1)
|
|||
else
|
||||
docker run --rm --workdir /mnt --volume $(CURDIR):/mnt $(ISO_DOCKER_EXTRA_ARGS) \
|
||||
--user $(shell id -u):$(shell id -g) --env HOME=/tmp --env IN_DOCKER=1 \
|
||||
$(ISO_BUILD_IMAGE) /bin/bash -lc '/usr/bin/make out/minikube.iso'
|
||||
$(ISO_BUILD_IMAGE) /bin/bash -lc '/usr/bin/make minikube-iso-$*'
|
||||
endif
|
||||
|
||||
iso_in_docker:
|
||||
|
@ -405,7 +409,7 @@ out/unittest.json: $(SOURCE_FILES) $(GOTEST_FILES)
|
|||
-coverprofile=out/coverage.out -json > out/unittest.json
|
||||
out/coverage.out: out/unittest.json
|
||||
|
||||
# Generate go test report (from gotest) as a a HTML page
|
||||
# Generate go test report (from gotest) as a HTML page
|
||||
out/unittest.html: out/unittest.json
|
||||
$(if $(quiet),@echo " REPORT $@")
|
||||
$(Q)go-test-report < $< -o $@
|
||||
|
@ -438,7 +442,7 @@ darwin: minikube-darwin-amd64 ## Build minikube for Darwin 64bit
|
|||
linux: minikube-linux-amd64 ## Build minikube for Linux 64bit
|
||||
|
||||
.PHONY: e2e-cross
|
||||
e2e-cross: e2e-linux-amd64 e2e-linux-arm64 e2e-darwin-amd64 e2e-windows-amd64.exe ## End-to-end cross test
|
||||
e2e-cross: e2e-linux-amd64 e2e-linux-arm64 e2e-darwin-amd64 e2e-darwin-arm64 e2e-windows-amd64.exe ## End-to-end cross test
|
||||
|
||||
.PHONY: checksum
|
||||
checksum: ## Generate checksums
|
||||
|
@ -705,7 +709,8 @@ KICBASE_IMAGE_REGISTRIES ?= $(KICBASE_IMAGE_GCR) $(KICBASE_IMAGE_HUB)
|
|||
CRI_DOCKERD_VERSION ?= $(shell egrep "CRI_DOCKERD_VERSION=" deploy/kicbase/Dockerfile | cut -d \" -f2)
|
||||
.PHONY: update-cri-dockerd
|
||||
update-cri-dockerd:
|
||||
hack/update/cri_dockerd/update_cri_dockerd.sh $(CRI_DOCKERD_VERSION) $(KICBASE_ARCH)
|
||||
(cd hack/update/cri_dockerd && \
|
||||
go run update_cri_dockerd_version.go $(CRI_DOCKERD_VERSION) $(KICBASE_ARCH))
|
||||
|
||||
.PHONY: local-kicbase
|
||||
local-kicbase: ## Builds the kicbase image and tags it local/kicbase:latest and local/kicbase:$(KIC_VERSION)-$(COMMIT_SHORT)
|
||||
|
@ -738,7 +743,8 @@ endif
|
|||
ifndef CIBUILD
|
||||
$(call user_confirm, 'Are you sure you want to push $(KICBASE_IMAGE_REGISTRIES) ?')
|
||||
endif
|
||||
env $(X_BUILD_ENV) docker buildx build -f ./deploy/kicbase/Dockerfile --builder $(X_DOCKER_BUILDER) --platform $(KICBASE_ARCH) $(addprefix -t ,$(KICBASE_IMAGE_REGISTRIES)) --push --build-arg COMMIT_SHA=${VERSION}-$(COMMIT) .
|
||||
./deploy/kicbase/build_auto_pause.sh $(KICBASE_ARCH)
|
||||
env $(X_BUILD_ENV) docker buildx build -f ./deploy/kicbase/Dockerfile --builder $(X_DOCKER_BUILDER) --platform $(KICBASE_ARCH) $(addprefix -t ,$(KICBASE_IMAGE_REGISTRIES)) --push --build-arg COMMIT_SHA=${VERSION}-$(COMMIT) --build-arg PREBUILT_AUTO_PAUSE=true .
|
||||
|
||||
out/preload-tool:
|
||||
go build -ldflags="$(MINIKUBE_LDFLAGS)" -o $@ ./hack/preload-images/*.go
|
||||
|
@ -807,6 +813,10 @@ release-notes:
|
|||
update-leaderboard:
|
||||
hack/update_contributions.sh
|
||||
|
||||
.PHONY: update-yearly-leaderboard
|
||||
update-yearly-leaderboard:
|
||||
hack/yearly-leaderboard.sh
|
||||
|
||||
out/docker-machine-driver-kvm2: out/docker-machine-driver-kvm2-$(GOARCH)
|
||||
$(if $(quiet),@echo " CP $@")
|
||||
$(Q)cp $< $@
|
||||
|
@ -1007,17 +1017,6 @@ update-preload-version:
|
|||
(cd hack/update/preload_version && \
|
||||
go run update_preload_version.go)
|
||||
|
||||
.PHONY: update-kubernetes-version-pr
|
||||
update-kubernetes-version-pr:
|
||||
ifndef GITHUB_TOKEN
|
||||
@echo "⚠️ please set GITHUB_TOKEN environment variable with your GitHub token"
|
||||
@echo "you can use https://github.com/settings/tokens/new?scopes=repo,write:packages to create new one"
|
||||
else
|
||||
(cd hack/update/kubernetes_version && \
|
||||
export UPDATE_TARGET="all" && \
|
||||
go run update_kubernetes_version.go)
|
||||
endif
|
||||
|
||||
.PHONY: update-kubeadm-constants
|
||||
update-kubeadm-constants:
|
||||
(cd hack/update/kubeadm_constants && \
|
||||
|
|
|
@ -36,6 +36,7 @@ import (
|
|||
)
|
||||
|
||||
var addonListOutput string
|
||||
var addonPrintDocs bool
|
||||
|
||||
// AddonListTemplate represents the addon list template
|
||||
type AddonListTemplate struct {
|
||||
|
@ -58,7 +59,7 @@ var addonsListCmd = &cobra.Command{
|
|||
}
|
||||
switch strings.ToLower(addonListOutput) {
|
||||
case "list":
|
||||
printAddonsList(cc)
|
||||
printAddonsList(cc, addonPrintDocs)
|
||||
case "json":
|
||||
printAddonsJSON(cc)
|
||||
default:
|
||||
|
@ -68,13 +69,8 @@ var addonsListCmd = &cobra.Command{
|
|||
}
|
||||
|
||||
func init() {
|
||||
addonsListCmd.Flags().StringVarP(
|
||||
&addonListOutput,
|
||||
"output",
|
||||
"o",
|
||||
"list",
|
||||
`minikube addons list --output OUTPUT. json, list`)
|
||||
|
||||
addonsListCmd.Flags().StringVarP(&addonListOutput, "output", "o", "list", "minikube addons list --output OUTPUT. json, list")
|
||||
addonsListCmd.Flags().BoolVarP(&addonPrintDocs, "docs", "d", false, "If true, print web links to addons' documentation if using --output=list (default).")
|
||||
AddonsCmd.AddCommand(addonsListCmd)
|
||||
}
|
||||
|
||||
|
@ -92,39 +88,56 @@ var stringFromStatus = func(addonStatus bool) string {
|
|||
return "disabled"
|
||||
}
|
||||
|
||||
var printAddonsList = func(cc *config.ClusterConfig) {
|
||||
var printAddonsList = func(cc *config.ClusterConfig, printDocs bool) {
|
||||
addonNames := make([]string, 0, len(assets.Addons))
|
||||
for addonName := range assets.Addons {
|
||||
addonNames = append(addonNames, addonName)
|
||||
}
|
||||
sort.Strings(addonNames)
|
||||
|
||||
var tData [][]string
|
||||
table := tablewriter.NewWriter(os.Stdout)
|
||||
table.SetAutoFormatHeaders(true)
|
||||
table.SetBorders(tablewriter.Border{Left: true, Top: true, Right: true, Bottom: true})
|
||||
table.SetCenterSeparator("|")
|
||||
if cc == nil {
|
||||
table.SetHeader([]string{"Addon Name", "Maintainer"})
|
||||
} else {
|
||||
table.SetHeader([]string{"Addon Name", "Profile", "Status", "Maintainer"})
|
||||
}
|
||||
|
||||
// Create table header
|
||||
var tHeader []string
|
||||
if cc == nil {
|
||||
tHeader = []string{"Addon Name", "Maintainer"}
|
||||
} else {
|
||||
tHeader = []string{"Addon Name", "Profile", "Status", "Maintainer"}
|
||||
}
|
||||
if printDocs {
|
||||
tHeader = append(tHeader, "Docs")
|
||||
}
|
||||
table.SetHeader(tHeader)
|
||||
|
||||
// Create table data
|
||||
var tData [][]string
|
||||
var temp []string
|
||||
for _, addonName := range addonNames {
|
||||
addonBundle := assets.Addons[addonName]
|
||||
maintainer := addonBundle.Maintainer
|
||||
if maintainer == "" {
|
||||
maintainer = "unknown (third-party)"
|
||||
maintainer = "3rd party (unknown)"
|
||||
}
|
||||
docs := addonBundle.Docs
|
||||
if docs == "" {
|
||||
docs = "n/a"
|
||||
}
|
||||
if cc == nil {
|
||||
tData = append(tData, []string{addonName, maintainer})
|
||||
continue
|
||||
temp = []string{addonName, maintainer}
|
||||
} else {
|
||||
enabled := addonBundle.IsEnabled(cc)
|
||||
temp = []string{addonName, cc.Name, fmt.Sprintf("%s %s", stringFromStatus(enabled), iconFromStatus(enabled)), maintainer}
|
||||
}
|
||||
enabled := addonBundle.IsEnabled(cc)
|
||||
tData = append(tData, []string{addonName, cc.Name, fmt.Sprintf("%s %s", stringFromStatus(enabled), iconFromStatus(enabled)), maintainer})
|
||||
if printDocs {
|
||||
temp = append(temp, docs)
|
||||
}
|
||||
tData = append(tData, temp)
|
||||
}
|
||||
|
||||
table.AppendBulk(tData)
|
||||
|
||||
table.Render()
|
||||
|
||||
v, _, err := config.ListProfiles()
|
||||
|
|
|
@ -27,46 +27,57 @@ import (
|
|||
)
|
||||
|
||||
func TestAddonsList(t *testing.T) {
|
||||
t.Run("NonExistingClusterTable", func(t *testing.T) {
|
||||
r, w, err := os.Pipe()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to create pipe: %v", err)
|
||||
}
|
||||
old := os.Stdout
|
||||
defer func() { os.Stdout = old }()
|
||||
os.Stdout = w
|
||||
printAddonsList(nil)
|
||||
if err := w.Close(); err != nil {
|
||||
t.Fatalf("failed to close pipe: %v", err)
|
||||
}
|
||||
buf := bufio.NewScanner(r)
|
||||
pipeCount := 0
|
||||
got := ""
|
||||
// Pull the first 3 lines from stdout
|
||||
for i := 0; i < 3; i++ {
|
||||
if !buf.Scan() {
|
||||
t.Fatalf("failed to read stdout")
|
||||
tests := []struct {
|
||||
name string
|
||||
printDocs bool
|
||||
want int
|
||||
}{
|
||||
{"DisabledDocs", false, 9},
|
||||
{"EnabledDocs", true, 12},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run("NonExistingClusterTable"+tt.name, func(t *testing.T) {
|
||||
r, w, err := os.Pipe()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to create pipe: %v", err)
|
||||
}
|
||||
pipeCount += strings.Count(buf.Text(), "|")
|
||||
got += buf.Text()
|
||||
}
|
||||
// The lines we pull should look something like
|
||||
// |-----------------------------|-----------------------|
|
||||
// | ADDON NAME | MAINTAINER |
|
||||
// |-----------------------------|-----------------------|
|
||||
// which has 9 pipes
|
||||
expected := 9
|
||||
if pipeCount != expected {
|
||||
t.Errorf("Expected header to have %d pipes; got = %d: %q", expected, pipeCount, got)
|
||||
}
|
||||
})
|
||||
old := os.Stdout
|
||||
defer func() { os.Stdout = old }()
|
||||
os.Stdout = w
|
||||
printAddonsList(nil, tt.printDocs)
|
||||
if err := w.Close(); err != nil {
|
||||
t.Fatalf("failed to close pipe: %v", err)
|
||||
}
|
||||
buf := bufio.NewScanner(r)
|
||||
pipeCount := 0
|
||||
got := ""
|
||||
// Pull the first 3 lines from stdout
|
||||
for i := 0; i < 3; i++ {
|
||||
if !buf.Scan() {
|
||||
t.Fatalf("failed to read stdout")
|
||||
}
|
||||
pipeCount += strings.Count(buf.Text(), "|")
|
||||
got += buf.Text()
|
||||
}
|
||||
// The lines we pull should look something like
|
||||
// |------------|------------|(------|)
|
||||
// | ADDON NAME | MAINTAINER |( DOCS |)
|
||||
// |------------|------------|(------|)
|
||||
// which has 9 or 12 pipes
|
||||
expected := tt.want
|
||||
if pipeCount != expected {
|
||||
t.Errorf("Expected header to have %d pipes; got = %d: %q", expected, pipeCount, got)
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
t.Run("NonExistingClusterJSON", func(t *testing.T) {
|
||||
type addons struct {
|
||||
Ambassador *interface{} `json:"ambassador"`
|
||||
}
|
||||
|
||||
b := make([]byte, 544)
|
||||
b := make([]byte, 571)
|
||||
r, w, err := os.Pipe()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to create pipe: %v", err)
|
||||
|
|
|
@ -168,6 +168,10 @@ var settings = []Setting{
|
|||
name: config.Rootless,
|
||||
set: SetBool,
|
||||
},
|
||||
{
|
||||
name: config.MaxAuditEntries,
|
||||
set: SetInt,
|
||||
},
|
||||
}
|
||||
|
||||
// ConfigCmd represents the config command
|
||||
|
|
|
@ -20,15 +20,18 @@ import (
|
|||
"errors"
|
||||
"fmt"
|
||||
|
||||
"github.com/blang/semver/v4"
|
||||
"github.com/spf13/cobra"
|
||||
"github.com/spf13/viper"
|
||||
"k8s.io/minikube/pkg/addons"
|
||||
"k8s.io/minikube/pkg/minikube/assets"
|
||||
"k8s.io/minikube/pkg/minikube/config"
|
||||
"k8s.io/minikube/pkg/minikube/constants"
|
||||
"k8s.io/minikube/pkg/minikube/exit"
|
||||
"k8s.io/minikube/pkg/minikube/out"
|
||||
"k8s.io/minikube/pkg/minikube/reason"
|
||||
"k8s.io/minikube/pkg/minikube/style"
|
||||
"k8s.io/minikube/pkg/util"
|
||||
)
|
||||
|
||||
var addonsEnableCmd = &cobra.Command{
|
||||
|
@ -52,6 +55,22 @@ var addonsEnableCmd = &cobra.Command{
|
|||
if addon == "olm" {
|
||||
out.Styled(style.Warning, "The OLM addon has stopped working, for more details visit: https://github.com/operator-framework/operator-lifecycle-manager/issues/2534")
|
||||
}
|
||||
addonBundle, ok := assets.Addons[addon]
|
||||
if ok {
|
||||
maintainer := addonBundle.Maintainer
|
||||
if maintainer == "Google" || maintainer == "Kubernetes" {
|
||||
out.Styled(style.Tip, `{{.addon}} is an addon maintained by {{.maintainer}}. For any concerns contact minikube on GitHub.
|
||||
You can view the list of minikube maintainers at: https://github.com/kubernetes/minikube/blob/master/OWNERS`,
|
||||
out.V{"addon": addon, "maintainer": maintainer})
|
||||
} else {
|
||||
out.Styled(style.Warning, `{{.addon}} is a 3rd party addon and not maintained or verified by minikube maintainers, enable at your own risk.`,
|
||||
out.V{"addon": addon})
|
||||
if addonBundle.VerifiedMaintainer != "" {
|
||||
out.Styled(style.Tip, `{{.addon}} is maintained by {{.maintainer}} for any concerns contact {{.verifiedMaintainer}} on GitHub.`,
|
||||
out.V{"addon": addon, "maintainer": maintainer, "verifiedMaintainer": addonBundle.VerifiedMaintainer})
|
||||
}
|
||||
}
|
||||
}
|
||||
viper.Set(config.AddonImages, images)
|
||||
viper.Set(config.AddonRegistries, registries)
|
||||
err := addons.SetAndSave(ClusterFlagValue(), addon, "true")
|
||||
|
@ -67,6 +86,41 @@ var addonsEnableCmd = &cobra.Command{
|
|||
|
||||
minikube{{.profileArg}} addons enable metrics-server
|
||||
|
||||
`, out.V{"profileArg": tipProfileArg})
|
||||
|
||||
}
|
||||
if addon == "headlamp" {
|
||||
out.Styled(style.Tip, `To access Headlamp, use the following command:
|
||||
minikube service headlamp -n headlamp
|
||||
|
||||
`)
|
||||
tokenGenerationTip := "To authenticate in Headlamp, fetch the Authentication Token using the following command:"
|
||||
createSvcAccountToken := "kubectl create token headlamp --duration 24h -n headlamp"
|
||||
getSvcAccountToken := `export SECRET=$(kubectl get secrets --namespace headlamp -o custom-columns=":metadata.name" | grep "headlamp-token")
|
||||
kubectl get secret $SECRET --namespace headlamp --template=\{\{.data.token\}\} | base64 --decode`
|
||||
|
||||
clusterName := ClusterFlagValue()
|
||||
clusterVersion := ClusterKubernetesVersion(clusterName)
|
||||
parsedClusterVersion, err := util.ParseKubernetesVersion(clusterVersion)
|
||||
if err != nil {
|
||||
tokenGenerationTip = fmt.Sprintf("%s\nIf Kubernetes Version is <1.24:\n%s\n\nIf Kubernetes Version is >=1.24:\n%s\n", tokenGenerationTip, createSvcAccountToken, getSvcAccountToken)
|
||||
} else {
|
||||
if parsedClusterVersion.GTE(semver.Version{Major: 1, Minor: 24}) {
|
||||
tokenGenerationTip = fmt.Sprintf("%s\n%s", tokenGenerationTip, createSvcAccountToken)
|
||||
} else {
|
||||
tokenGenerationTip = fmt.Sprintf("%s\n%s", tokenGenerationTip, getSvcAccountToken)
|
||||
}
|
||||
}
|
||||
out.Styled(style.Tip, fmt.Sprintf("%s\n", tokenGenerationTip))
|
||||
|
||||
tipProfileArg := ""
|
||||
if clusterName != constants.DefaultClusterName {
|
||||
tipProfileArg = fmt.Sprintf(" -p %s", clusterName)
|
||||
}
|
||||
out.Styled(style.Tip, `Headlamp can display more detailed information when metrics-server is installed. To install it, run:
|
||||
|
||||
minikube{{.profileArg}} addons enable metrics-server
|
||||
|
||||
`, out.V{"profileArg": tipProfileArg})
|
||||
|
||||
}
|
||||
|
|
|
@ -19,9 +19,16 @@ package config
|
|||
import (
|
||||
"github.com/spf13/viper"
|
||||
"k8s.io/minikube/pkg/minikube/config"
|
||||
"k8s.io/minikube/pkg/minikube/mustload"
|
||||
)
|
||||
|
||||
// ClusterFlagValue returns the current cluster name based on flags
|
||||
func ClusterFlagValue() string {
|
||||
return viper.GetString(config.ProfileName)
|
||||
}
|
||||
|
||||
// ClusterKubernetesVersion returns the current Kubernetes version of the cluster
|
||||
func ClusterKubernetesVersion(clusterProfile string) string {
|
||||
_, cc := mustload.Partial(clusterProfile)
|
||||
return cc.KubernetesConfig.KubernetesVersion
|
||||
}
|
||||
|
|
|
@ -31,7 +31,7 @@ func TestGetNotFound(t *testing.T) {
|
|||
func TestGetOK(t *testing.T) {
|
||||
createTestConfig(t)
|
||||
name := "driver"
|
||||
err := Set(name, "virtualbox")
|
||||
err := Set(name, "ssh")
|
||||
if err != nil {
|
||||
t.Fatalf("Set returned error for property %s, %+v", name, err)
|
||||
}
|
||||
|
@ -39,7 +39,7 @@ func TestGetOK(t *testing.T) {
|
|||
if err != nil {
|
||||
t.Fatalf("Get returned error for property %s, %+v", name, err)
|
||||
}
|
||||
if val != "virtualbox" {
|
||||
t.Fatalf("Get returned %s, expected virtualbox", val)
|
||||
if val != "ssh" {
|
||||
t.Fatalf("Get returned %s, expected ssh", val)
|
||||
}
|
||||
}
|
||||
|
|
|
@ -38,14 +38,14 @@ func TestSetNotAllowed(t *testing.T) {
|
|||
t.Fatalf("Set did not return error for unallowed value: %+v", err)
|
||||
}
|
||||
err = Set("memory", "10a")
|
||||
if err == nil || err.Error() != "run validations for \"memory\" with value of \"10a\": [invalid memory size: invalid size: '10a']" {
|
||||
if err == nil || err.Error() != "run validations for \"memory\" with value of \"10a\": [invalid memory size: invalid suffix: 'a']" {
|
||||
t.Fatalf("Set did not return error for unallowed value: %+v", err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestSetOK(t *testing.T) {
|
||||
createTestConfig(t)
|
||||
err := Set("driver", "virtualbox")
|
||||
err := Set("driver", "ssh")
|
||||
defer func() {
|
||||
err = Unset("driver")
|
||||
if err != nil {
|
||||
|
@ -59,8 +59,8 @@ func TestSetOK(t *testing.T) {
|
|||
if err != nil {
|
||||
t.Fatalf("Get returned error for valid property: %+v", err)
|
||||
}
|
||||
if val != "virtualbox" {
|
||||
t.Fatalf("Get returned %s, expected \"virtualbox\"", val)
|
||||
if val != "ssh" {
|
||||
t.Fatalf("Get returned %s, expected \"ssh\"", val)
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -66,7 +66,7 @@ Example Command : "minikube cp a.txt /home/docker/b.txt" +
|
|||
if dst.node != "" {
|
||||
runner = remoteCommandRunner(&co, dst.node)
|
||||
} else if src.node == "" {
|
||||
// if node name not explicitly specfied in both of source and target,
|
||||
// if node name not explicitly specified in both of source and target,
|
||||
// consider target is controlpanel node for backward compatibility.
|
||||
runner = co.CP.Runner
|
||||
} else {
|
||||
|
@ -158,7 +158,7 @@ func validateArgs(src, dst *remotePath) {
|
|||
exit.Message(reason.Usage, "Target {{.path}} can not be empty", out.V{"path": dst.path})
|
||||
}
|
||||
|
||||
// if node name not explicitly specfied in both of source and target,
|
||||
// if node name not explicitly specified in both of source and target,
|
||||
// consider target node is controlpanel for backward compatibility.
|
||||
if src.node == "" && dst.node == "" && !strings.HasPrefix(dst.path, "/") {
|
||||
exit.Message(reason.Usage, `Target <remote file path> must be an absolute Path. Relative Path is not allowed (example: "minikube:/home/docker/copied.txt")`)
|
||||
|
|
|
@ -240,8 +240,13 @@ func waitForAPIServerProcess(cr command.Runner, start time.Time, timeout time.Du
|
|||
// dockerEnvCmd represents the docker-env command
|
||||
var dockerEnvCmd = &cobra.Command{
|
||||
Use: "docker-env",
|
||||
Short: "Configure environment to use minikube's Docker daemon",
|
||||
Long: `Sets up docker env variables; similar to '$(docker-machine env)'.`,
|
||||
Short: "Provides instructions to point your terminal's docker-cli to the Docker Engine inside minikube. (Useful for building docker images directly inside minikube)",
|
||||
Long: `Provides instructions to point your terminal's docker-cli to the Docker Engine inside minikube. (Useful for building docker images directly inside minikube)
|
||||
|
||||
For example, you can do all docker operations such as docker build, docker run, and docker ps directly on the docker inside minikube.
|
||||
|
||||
Note: You need the docker-cli to be installed on your machine.
|
||||
docker-cli install instructions: https://minikube.sigs.k8s.io/docs/tutorials/docker_desktop_replacement/#steps`,
|
||||
Run: func(cmd *cobra.Command, args []string) {
|
||||
var err error
|
||||
|
||||
|
|
|
@ -50,8 +50,13 @@ var nodeAddCmd = &cobra.Command{
|
|||
|
||||
name := node.Name(len(cc.Nodes) + 1)
|
||||
|
||||
out.Step(style.Happy, "Adding node {{.name}} to cluster {{.cluster}}", out.V{"name": name, "cluster": cc.Name})
|
||||
// for now control-plane feature is not supported
|
||||
if cp {
|
||||
out.Step(style.Unsupported, "Adding a control-plane node is not yet supported, setting control-plane flag to false")
|
||||
cp = false
|
||||
}
|
||||
|
||||
out.Step(style.Happy, "Adding node {{.name}} to cluster {{.cluster}}", out.V{"name": name, "cluster": cc.Name})
|
||||
// TODO: Deal with parameters better. Ideally we should be able to acceot any node-specific minikube start params here.
|
||||
n := config.Node{
|
||||
Name: name,
|
||||
|
@ -89,7 +94,7 @@ var nodeAddCmd = &cobra.Command{
|
|||
|
||||
func init() {
|
||||
// TODO(https://github.com/kubernetes/minikube/issues/7366): We should figure out which minikube start flags to actually import
|
||||
nodeAddCmd.Flags().BoolVar(&cp, "control-plane", false, "If true, the node added will also be a control plane in addition to a worker.")
|
||||
nodeAddCmd.Flags().BoolVar(&cp, "control-plane", false, "This flag is currently unsupported.")
|
||||
nodeAddCmd.Flags().BoolVar(&worker, "worker", true, "If true, the added node will be marked for work. Defaults to true.")
|
||||
nodeAddCmd.Flags().Bool(deleteOnFailure, false, "If set, delete the current cluster if start fails and try again. Defaults to false.")
|
||||
|
||||
|
|
|
@ -68,7 +68,7 @@ var nodeStartCmd = &cobra.Command{
|
|||
Host: h,
|
||||
Cfg: cc,
|
||||
Node: n,
|
||||
ExistingAddons: nil,
|
||||
ExistingAddons: cc.Addons,
|
||||
}
|
||||
|
||||
_, err = node.Start(s, n.ControlPlane)
|
||||
|
|
|
@ -23,7 +23,6 @@ import (
|
|||
"path/filepath"
|
||||
"runtime"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/spf13/cobra"
|
||||
"github.com/spf13/pflag"
|
||||
|
@ -45,16 +44,19 @@ import (
|
|||
"k8s.io/minikube/pkg/version"
|
||||
)
|
||||
|
||||
var dirs = [...]string{
|
||||
localpath.MiniPath(),
|
||||
localpath.MakeMiniPath("certs"),
|
||||
localpath.MakeMiniPath("machines"),
|
||||
localpath.MakeMiniPath("cache"),
|
||||
localpath.MakeMiniPath("config"),
|
||||
localpath.MakeMiniPath("addons"),
|
||||
localpath.MakeMiniPath("files"),
|
||||
localpath.MakeMiniPath("logs"),
|
||||
}
|
||||
var (
|
||||
dirs = [...]string{
|
||||
localpath.MiniPath(),
|
||||
localpath.MakeMiniPath("certs"),
|
||||
localpath.MakeMiniPath("machines"),
|
||||
localpath.MakeMiniPath("cache"),
|
||||
localpath.MakeMiniPath("config"),
|
||||
localpath.MakeMiniPath("addons"),
|
||||
localpath.MakeMiniPath("files"),
|
||||
localpath.MakeMiniPath("logs"),
|
||||
}
|
||||
auditID string
|
||||
)
|
||||
|
||||
// RootCmd represents the base command when called without any subcommands
|
||||
var RootCmd = &cobra.Command{
|
||||
|
@ -72,6 +74,11 @@ var RootCmd = &cobra.Command{
|
|||
out.WarningT("User name '{{.username}}' is not valid", out.V{"username": userName})
|
||||
exit.Message(reason.Usage, "User name must be 60 chars or less.")
|
||||
}
|
||||
var err error
|
||||
auditID, err = audit.LogCommandStart()
|
||||
if err != nil {
|
||||
klog.Errorf("failed to log command start to audit: %v", err)
|
||||
}
|
||||
// viper maps $MINIKUBE_ROOTLESS to "rootless" property automatically, but it does not do vice versa,
|
||||
// so we map "rootless" property to $MINIKUBE_ROOTLESS expliclity here.
|
||||
// $MINIKUBE_ROOTLESS is referred by KIC runner, which is decoupled from viper.
|
||||
|
@ -79,13 +86,16 @@ var RootCmd = &cobra.Command{
|
|||
os.Setenv(constants.MinikubeRootlessEnv, "true")
|
||||
}
|
||||
},
|
||||
PersistentPostRun: func(cmd *cobra.Command, args []string) {
|
||||
if err := audit.LogCommandEnd(auditID); err != nil {
|
||||
klog.Errorf("failed to log command end to audit: %v", err)
|
||||
}
|
||||
},
|
||||
}
|
||||
|
||||
// Execute adds all child commands to the root command sets flags appropriately.
|
||||
// This is called by main.main(). It only needs to happen once to the rootCmd.
|
||||
func Execute() {
|
||||
defer audit.Log(time.Now())
|
||||
|
||||
// Check whether this is a windows binary (.exe) running inisde WSL.
|
||||
if runtime.GOOS == "windows" && detect.IsMicrosoftWSL() {
|
||||
var found = false
|
||||
|
@ -315,6 +325,7 @@ func setupViper() {
|
|||
viper.SetDefault(config.ReminderWaitPeriodInHours, 24)
|
||||
viper.SetDefault(config.WantNoneDriverWarning, true)
|
||||
viper.SetDefault(config.WantVirtualBoxDriverWarning, true)
|
||||
viper.SetDefault(config.MaxAuditEntries, 1000)
|
||||
}
|
||||
|
||||
func addToPath(dir string) {
|
||||
|
|
|
@ -260,6 +260,12 @@ func mutateURLs(serviceName string, urls []string) ([]string, error) {
|
|||
|
||||
func openURLs(urls [][]string) {
|
||||
for _, u := range urls {
|
||||
|
||||
if len(u) < 4 {
|
||||
klog.Warning("No URL found")
|
||||
continue
|
||||
}
|
||||
|
||||
_, err := url.Parse(u[3])
|
||||
if err != nil {
|
||||
klog.Warningf("failed to parse url %q: %v (will not open)", u[3], err)
|
||||
|
|
|
@ -312,9 +312,8 @@ func provisionWithDriver(cmd *cobra.Command, ds registry.DriverState, existing *
|
|||
return node.Starter{}, errors.Wrap(err, "Failed to generate config")
|
||||
}
|
||||
|
||||
// Bail cleanly for qemu2 until implemented
|
||||
if driver.IsVM(cc.Driver) && runtime.GOARCH == "arm64" && cc.KubernetesConfig.ContainerRuntime != "docker" {
|
||||
exit.Message(reason.Unimplemented, "arm64 VM drivers do not currently support containerd or crio container runtimes. See https://github.com/kubernetes/minikube/issues/14146 for details.")
|
||||
if driver.IsVM(cc.Driver) && runtime.GOARCH == "arm64" && cc.KubernetesConfig.ContainerRuntime == "crio" {
|
||||
exit.Message(reason.Unimplemented, "arm64 VM drivers do not currently support the crio container runtime. See https://github.com/kubernetes/minikube/issues/14146 for details.")
|
||||
}
|
||||
|
||||
// This is about as far as we can go without overwriting config files
|
||||
|
@ -442,6 +441,9 @@ func displayVersion(version string) {
|
|||
func displayEnviron(env []string) {
|
||||
for _, kv := range env {
|
||||
bits := strings.SplitN(kv, "=", 2)
|
||||
if len(bits) < 2 {
|
||||
continue
|
||||
}
|
||||
k := bits[0]
|
||||
v := bits[1]
|
||||
if strings.HasPrefix(k, "MINIKUBE_") || k == constants.KubeconfigEnvVar {
|
||||
|
@ -770,8 +772,8 @@ func validateSpecifiedDriver(existing *config.ClusterConfig) {
|
|||
return
|
||||
}
|
||||
|
||||
out.WarningT("Deleting existing cluster {{.name}} with different driver {{.driver_name}} due to --delete-on-failure flag set by the user. ", out.V{"name": existing.Name, "driver_name": old})
|
||||
if viper.GetBool(deleteOnFailure) {
|
||||
out.WarningT("Deleting existing cluster {{.name}} with different driver {{.driver_name}} due to --delete-on-failure flag set by the user. ", out.V{"name": existing.Name, "driver_name": old})
|
||||
// Start failed, delete the cluster
|
||||
profile, err := config.LoadProfile(existing.Name)
|
||||
if err != nil {
|
||||
|
@ -1574,7 +1576,7 @@ func validateKubernetesVersion(old *config.ClusterConfig) {
|
|||
zeroVersion := semver.MustParse(strings.TrimPrefix(constants.NoKubernetesVersion, version.VersionPrefix))
|
||||
|
||||
if nvs.Equals(zeroVersion) {
|
||||
klog.Infof("No Kuberentes version set for minikube, setting Kubernetes version to %s", constants.NoKubernetesVersion)
|
||||
klog.Infof("No Kubernetes version set for minikube, setting Kubernetes version to %s", constants.NoKubernetesVersion)
|
||||
return
|
||||
}
|
||||
if nvs.Major > newestVersion.Major {
|
||||
|
|
|
@ -136,6 +136,9 @@ const (
|
|||
binaryMirror = "binary-mirror"
|
||||
disableOptimizations = "disable-optimizations"
|
||||
disableMetrics = "disable-metrics"
|
||||
qemuFirmwarePath = "qemu-firmware-path"
|
||||
socketVMnetClientPath = "socket-vmnet-client-path"
|
||||
socketVMnetPath = "socket-vmnet-path"
|
||||
)
|
||||
|
||||
var (
|
||||
|
@ -175,7 +178,7 @@ func initMinikubeFlags() {
|
|||
startCmd.Flags().String(mountUID, defaultMountUID, mountUIDDescription)
|
||||
startCmd.Flags().StringSlice(config.AddonListFlag, nil, "Enable addons. see `minikube addons list` for a list of valid addon names.")
|
||||
startCmd.Flags().String(criSocket, "", "The cri socket path to be used.")
|
||||
startCmd.Flags().String(networkPlugin, "", "Kubelet network plug-in to use (default: auto)")
|
||||
startCmd.Flags().String(networkPlugin, "", "DEPRECATED: Replaced by --cni")
|
||||
startCmd.Flags().Bool(enableDefaultCNI, false, "DEPRECATED: Replaced by --cni=bridge")
|
||||
startCmd.Flags().String(cniFlag, "", "CNI plug-in to use. Valid options: auto, bridge, calico, cilium, flannel, kindnet, or path to a CNI manifest (default: auto)")
|
||||
startCmd.Flags().StringSlice(waitComponents, kverify.DefaultWaitList, fmt.Sprintf("comma separated list of Kubernetes components to verify and wait for after starting a cluster. defaults to %q, available options: %q . other acceptable values are 'all' or 'none', 'true' and 'false'", strings.Join(kverify.DefaultWaitList, ","), strings.Join(kverify.AllComponentsList, ",")))
|
||||
|
@ -253,6 +256,9 @@ func initDriverFlags() {
|
|||
startCmd.Flags().String(listenAddress, "", "IP Address to use to expose ports (docker and podman driver only)")
|
||||
startCmd.Flags().StringSlice(ports, []string{}, "List of ports that should be exposed (docker and podman driver only)")
|
||||
startCmd.Flags().String(subnet, "", "Subnet to be used on kic cluster. If left empty, minikube will choose subnet address, beginning from 192.168.49.0. (docker and podman driver only)")
|
||||
|
||||
// qemu
|
||||
startCmd.Flags().String(qemuFirmwarePath, "", "Path to the qemu firmware file. Defaults: For Linux, the default firmware location. For macOS, the brew installation location. For Windows, C:\\Program Files\\qemu\\share")
|
||||
}
|
||||
|
||||
// initNetworkingFlags inits the commandline flags for connectivity related flags for start
|
||||
|
@ -270,6 +276,10 @@ func initNetworkingFlags() {
|
|||
startCmd.Flags().String(sshSSHUser, defaultSSHUser, "SSH user (ssh driver only)")
|
||||
startCmd.Flags().String(sshSSHKey, "", "SSH key (ssh driver only)")
|
||||
startCmd.Flags().Int(sshSSHPort, defaultSSHPort, "SSH port (ssh driver only)")
|
||||
|
||||
// socket vmnet
|
||||
startCmd.Flags().String(socketVMnetClientPath, "/opt/socket_vmnet/bin/socket_vmnet_client", "Path to the socket vmnet client binary")
|
||||
startCmd.Flags().String(socketVMnetPath, "/var/run/socket_vmnet", "Path to socket vmnet binary")
|
||||
}
|
||||
|
||||
// ClusterFlagValue returns the current cluster name based on flags
|
||||
|
@ -426,7 +436,7 @@ func getRepository(cmd *cobra.Command, k8sVersion string) string {
|
|||
repository = autoSelectedRepository
|
||||
}
|
||||
|
||||
if repository == "registry.cn-hangzhou.aliyuncs.com/google_containers" {
|
||||
if repository == constants.AliyunMirror {
|
||||
download.SetAliyunMirror()
|
||||
}
|
||||
|
||||
|
@ -457,8 +467,12 @@ func generateNewConfigFromFlags(cmd *cobra.Command, k8sVersion string, rtime str
|
|||
out.WarningT("With --network-plugin=cni, you will need to provide your own CNI. See --cni flag as a user-friendly alternative")
|
||||
}
|
||||
|
||||
if !(driver.IsKIC(drvName) || driver.IsKVM(drvName)) && viper.GetString(network) != "" {
|
||||
out.WarningT("--network flag is only valid with the docker/podman and KVM drivers, it will be ignored")
|
||||
if !(driver.IsKIC(drvName) || driver.IsKVM(drvName) || driver.IsQEMU(drvName)) && viper.GetString(network) != "" {
|
||||
out.WarningT("--network flag is only valid with the docker/podman, KVM and Qemu drivers, it will be ignored")
|
||||
}
|
||||
|
||||
if driver.IsQEMU(drvName) && viper.GetString(network) == "socket" {
|
||||
out.WarningT("Using qemu with --network=socket for 'socket_vmnet' is experimental")
|
||||
}
|
||||
|
||||
checkNumaCount(k8sVersion)
|
||||
|
@ -523,6 +537,9 @@ func generateNewConfigFromFlags(cmd *cobra.Command, k8sVersion string, rtime str
|
|||
BinaryMirror: viper.GetString(binaryMirror),
|
||||
DisableOptimizations: viper.GetBool(disableOptimizations),
|
||||
DisableMetrics: viper.GetBool(disableMetrics),
|
||||
CustomQemuFirmwarePath: viper.GetString(qemuFirmwarePath),
|
||||
SocketVMnetClientPath: viper.GetString(socketVMnetClientPath),
|
||||
SocketVMnetPath: viper.GetString(socketVMnetPath),
|
||||
KubernetesConfig: config.KubernetesConfig{
|
||||
KubernetesVersion: k8sVersion,
|
||||
ClusterName: ClusterFlagValue(),
|
||||
|
@ -570,7 +587,7 @@ func generateNewConfigFromFlags(cmd *cobra.Command, k8sVersion string, rtime str
|
|||
exit.Message(reason.Usage, "Using rootless driver was required, but the current driver does not seem rootless")
|
||||
}
|
||||
}
|
||||
out.Styled(style.Notice, "Using {{.driver_name}} driver with the root privilege", out.V{"driver_name": driver.FullName(drvName)})
|
||||
out.Styled(style.Notice, "Using {{.driver_name}} driver with root privileges", out.V{"driver_name": driver.FullName(drvName)})
|
||||
}
|
||||
if si.StorageDriver == "btrfs" {
|
||||
klog.Info("auto-setting LocalStorageCapacityIsolation to false because using btrfs storage driver")
|
||||
|
@ -741,6 +758,9 @@ func updateExistingConfigFromFlags(cmd *cobra.Command, existing *config.ClusterC
|
|||
updateStringFromFlag(cmd, &cc.MountUID, mountUID)
|
||||
updateStringFromFlag(cmd, &cc.BinaryMirror, binaryMirror)
|
||||
updateBoolFromFlag(cmd, &cc.DisableOptimizations, disableOptimizations)
|
||||
updateStringFromFlag(cmd, &cc.CustomQemuFirmwarePath, qemuFirmwarePath)
|
||||
updateStringFromFlag(cmd, &cc.SocketVMnetClientPath, socketVMnetClientPath)
|
||||
updateStringFromFlag(cmd, &cc.SocketVMnetPath, socketVMnetPath)
|
||||
|
||||
if cmd.Flags().Changed(kubernetesVersion) {
|
||||
cc.KubernetesConfig.KubernetesVersion = getKubernetesVersion(existing)
|
||||
|
|
|
@ -293,7 +293,7 @@ func writeStatusesAtInterval(duration time.Duration, api libmachine.API, cc *con
|
|||
}
|
||||
}
|
||||
|
||||
// exitCode calcluates the appropriate exit code given a set of status messages
|
||||
// exitCode calculates the appropriate exit code given a set of status messages
|
||||
func exitCode(statuses []*Status) int {
|
||||
c := 0
|
||||
for _, st := range statuses {
|
||||
|
|
|
@ -41,6 +41,7 @@ import (
|
|||
)
|
||||
|
||||
var cleanup bool
|
||||
var bindAddress string
|
||||
|
||||
// tunnelCmd represents the tunnel command
|
||||
var tunnelCmd = &cobra.Command{
|
||||
|
@ -93,7 +94,7 @@ var tunnelCmd = &cobra.Command{
|
|||
sshKey := filepath.Join(localpath.MiniPath(), "machines", cname, "id_rsa")
|
||||
|
||||
outputTunnelStarted()
|
||||
kicSSHTunnel := kic.NewSSHTunnel(ctx, sshPort, sshKey, clientset.CoreV1(), clientset.NetworkingV1())
|
||||
kicSSHTunnel := kic.NewSSHTunnel(ctx, sshPort, sshKey, bindAddress, clientset.CoreV1(), clientset.NetworkingV1())
|
||||
err = kicSSHTunnel.Start()
|
||||
if err != nil {
|
||||
exit.Error(reason.SvcTunnelStart, "error starting tunnel", err)
|
||||
|
@ -119,4 +120,5 @@ func outputTunnelStarted() {
|
|||
|
||||
func init() {
|
||||
tunnelCmd.Flags().BoolVarP(&cleanup, "cleanup", "c", true, "call with cleanup=true to remove old tunnels")
|
||||
tunnelCmd.Flags().StringVar(&bindAddress, "bind-address", "", "set tunnel bind address, empty or '*' indicates the tunnel should be available for all interfaces")
|
||||
}
|
||||
|
|
|
@ -180,7 +180,7 @@ func logFileName(dir string, logIdx int64) string {
|
|||
|
||||
// setFlags sets the flags
|
||||
func setFlags(parse bool) {
|
||||
// parse flags beyond subcommand - get aroung go flag 'limitations':
|
||||
// parse flags beyond subcommand - get around go flag 'limitations':
|
||||
// "Flag parsing stops just before the first non-flag argument" (ref: https://pkg.go.dev/flag#hdr-Command_line_flag_syntax)
|
||||
pflag.CommandLine.ParseErrorsWhitelist.UnknownFlags = true
|
||||
pflag.CommandLine.AddGoFlagSet(flag.CommandLine)
|
||||
|
|
|
@ -15,8 +15,8 @@ make out/mkcmp
|
|||
./out/mkcmp ./out/minikube pr://400
|
||||
```
|
||||
|
||||
mkcmp is primarily used for our prbot, which comments mkcmp output on valid PRs [example](https://github.com/kubernetes/minikube/pull/10430#issuecomment-776311409).
|
||||
To make changes to the prbot output, submitting a PR to change mkcmp code should be sufficient.
|
||||
mkcmp is primarily used for our pr-bot, which comments mkcmp output on valid PRs [example](https://github.com/kubernetes/minikube/pull/10430#issuecomment-776311409).
|
||||
To make changes to the pr-bot output, submitting a PR to change mkcmp code should be sufficient.
|
||||
|
||||
Note: STDOUT from mkcmp is *exactly* what is commented on github, so we want it to be in Markdown.
|
||||
|
||||
|
|
|
@ -37,9 +37,9 @@ func main() {
|
|||
}
|
||||
|
||||
// analyzePerformance is responsible for:
|
||||
// 1. collecting PRs to run performance analysis on
|
||||
// 2. running mkcmp against those PRs
|
||||
// 3. commenting results on those PRs
|
||||
// 1. collecting PRs to run performance analysis on
|
||||
// 2. running mkcmp against those PRs
|
||||
// 3. commenting results on those PRs
|
||||
func analyzePerformance(ctx context.Context) error {
|
||||
client := monitor.NewClient(ctx, monitor.GithubOwner, monitor.GithubRepo)
|
||||
prs, err := client.ListOpenPRsWithLabel(monitor.OkToTestLabel)
|
||||
|
|
|
@ -1,17 +1,17 @@
|
|||
{
|
||||
"kubernetesui/dashboard": "registry.cn-hangzhou.aliyuncs.com/google_containers/dashboard",
|
||||
"kubernetesui/metrics-scraper": "registry.cn-hangzhou.aliyuncs.com/google_containers/metrics-scraper",
|
||||
"docker.io/kubernetesui/dashboard": "registry.cn-hangzhou.aliyuncs.com/google_containers/dashboard",
|
||||
"docker.io/kubernetesui/metrics-scraper": "registry.cn-hangzhou.aliyuncs.com/google_containers/metrics-scraper",
|
||||
"gcr.io/k8s-minikube/auto-pause-hook": "registry.cn-hangzhou.aliyuncs.com/google_containers/auto-pause-hook",
|
||||
"quay.io/operator-framework/olm": "registry.cn-hangzhou.aliyuncs.com/google_containers/olm",
|
||||
"quay.io/operator-framework/upstream-community-operators": "registry.cn-hangzhou.aliyuncs.com/google_containers/upstream-community-operators",
|
||||
"k8s.gcr.io/kube-registry-proxy": "registry.cn-hangzhou.aliyuncs.com/google_containers/kube-registry-proxy",
|
||||
"upmcenterprises/registry-creds": "registry.cn-hangzhou.aliyuncs.com/google_containers/registry-creds",
|
||||
"docker.io/upmcenterprises/registry-creds": "registry.cn-hangzhou.aliyuncs.com/google_containers/registry-creds",
|
||||
"quay.io/rhdevelopers/core-dns-patcher": "registry.cn-hangzhou.aliyuncs.com/google_containers/core-dns-patcher",
|
||||
"nvidia/k8s-device-plugin": "registry.cn-hangzhou.aliyuncs.com/google_containers/k8s-device-plugin",
|
||||
"ivans3/minikube-log-viewer": "registry.cn-hangzhou.aliyuncs.com/google_containers/minikube-log-viewer",
|
||||
"cryptexlabs/minikube-ingress-dns": "registry.cn-hangzhou.aliyuncs.com/google_containers/minikube-ingress-dns",
|
||||
"docker.io/nvidia/k8s-device-plugin": "registry.cn-hangzhou.aliyuncs.com/google_containers/k8s-device-plugin",
|
||||
"docker.io/ivans3/minikube-log-viewer": "registry.cn-hangzhou.aliyuncs.com/google_containers/minikube-log-viewer",
|
||||
"docker.io/cryptexlabs/minikube-ingress-dns": "registry.cn-hangzhou.aliyuncs.com/google_containers/minikube-ingress-dns",
|
||||
"quay.io/datawire/ambassador-operator": "registry.cn-hangzhou.aliyuncs.com/google_containers/ambassador-operator",
|
||||
"jettech/kube-webhook-certgen": "registry.cn-hangzhou.aliyuncs.com/google_containers/kube-webhook-certgen",
|
||||
"docker.io/jettech/kube-webhook-certgen": "registry.cn-hangzhou.aliyuncs.com/google_containers/kube-webhook-certgen",
|
||||
"gcr.io/k8s-minikube/gcp-auth-webhook": "registry.cn-hangzhou.aliyuncs.com/google_containers/gcp-auth-webhook",
|
||||
"k8s.gcr.io/sig-storage/snapshot-controller": "registry.cn-hangzhou.aliyuncs.com/google_containers/snapshot-controller",
|
||||
"k8s.gcr.io/sig-storage/csi-attacher": "registry.cn-hangzhou.aliyuncs.com/google_containers/csi-attacher",
|
||||
|
@ -23,11 +23,11 @@
|
|||
"k8s.gcr.io/sig-storage/csi-resizer": "registry.cn-hangzhou.aliyuncs.com/google_containers/csi-resizer",
|
||||
"k8s.gcr.io/sig-storage/csi-snapshotter": "registry.cn-hangzhou.aliyuncs.com/google_containers/csi-snapshotter",
|
||||
"k8s.gcr.io/sig-storage/csi-provisioner": "registry.cn-hangzhou.aliyuncs.com/google_containers/csi-provisioner",
|
||||
"registry": "registry.cn-hangzhou.aliyuncs.com/google_containers/registry",
|
||||
"quay.io/nixpanic/glusterfs-server": "registry.cn-hangzhou.aliyuncs.com/google_containers/glusterfs-server",
|
||||
"heketi/heketi": "registry.cn-hangzhou.aliyuncs.com/google_containers/heketi",
|
||||
"coredns/coredns": "registry.cn-hangzhou.aliyuncs.com/google_containers/coredns",
|
||||
"kindest/kindnetd": "registry.cn-hangzhou.aliyuncs.com/google_containers/kindnetd",
|
||||
"docker.io/registry": "registry.cn-hangzhou.aliyuncs.com/google_containers/registry",
|
||||
"docker.io/gluster/gluster-centos": "registry.cn-hangzhou.aliyuncs.com/google_containers/glusterfs-server",
|
||||
"docker.io/heketi/heketi": "registry.cn-hangzhou.aliyuncs.com/google_containers/heketi",
|
||||
"docker.io/coredns/coredns": "registry.cn-hangzhou.aliyuncs.com/google_containers/coredns",
|
||||
"docker.io/kindest/kindnetd": "registry.cn-hangzhou.aliyuncs.com/google_containers/kindnetd",
|
||||
"k8s.gcr.io/ingress-nginx/controller": "registry.cn-hangzhou.aliyuncs.com/google_containers/nginx-ingress-controller",
|
||||
"gcr.io/cloud-builders/gcs-fetcher": "registry.cn-hangzhou.aliyuncs.com/cloud-builders/gcs-fetcher",
|
||||
"gcr.io/google-samples/freshpod": "registry.cn-hangzhou.aliyuncs.com/google_containers/freshpod",
|
||||
|
|
|
@ -91,7 +91,7 @@ spec:
|
|||
instead of [AES](https://www.getambassador.io/docs/latest/topics/install/).
|
||||
Default is false which means it installs AES by default. TODO: 1.
|
||||
AES/AOSS is not installed and the user installs using `installOSS:
|
||||
true`, then we straightaway install AOSS. 2. AOSS is installed via
|
||||
true`, then we straight away install AOSS. 2. AOSS is installed via
|
||||
operator and the user sets `installOSS: false`, then we perform the
|
||||
migration as detailed here - https://www.getambassador.io/docs/latest/topics/install/upgrade-to-edge-stack/
|
||||
3. AES is installed and the user sets `installOSS: true`, then we
|
||||
|
|
|
@ -143,4 +143,12 @@ var (
|
|||
// AliyunMirror assets for aliyun_mirror.json
|
||||
//go:embed aliyun_mirror.json
|
||||
AliyunMirror embed.FS
|
||||
|
||||
// InAccelAssets assets for inaccel addon
|
||||
//go:embed inaccel/fpga-operator.yaml.tmpl
|
||||
InAccelAssets embed.FS
|
||||
|
||||
// HeadlampAssets assets for headlamp addon
|
||||
//go:embed headlamp/*.yaml headlamp/*.tmpl
|
||||
HeadlampAssets embed.FS
|
||||
)
|
||||
|
|
|
@ -1,2 +1,2 @@
|
|||
FROM golang:1.8
|
||||
FROM golang:1.19
|
||||
ADD auto-pause-hook /auto-pause-hook
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
apiVersion: node.k8s.io/v1beta1
|
||||
apiVersion: node.k8s.io/v1{{if .LegacyRuntimeClass}}beta1{{end}}
|
||||
kind: RuntimeClass
|
||||
metadata:
|
||||
name: gvisor
|
||||
|
|
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
# ClusterRoleBinding
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: headlamp-admin
|
||||
namespace: headlamp
|
||||
labels:
|
||||
app.kubernetes.io/name: headlamp
|
||||
app.kubernetes.io/instance: headlamp
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: cluster-admin
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: headlamp
|
||||
namespace: headlamp
|
|
@ -0,0 +1,42 @@
|
|||
---
|
||||
# Deployment
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: headlamp
|
||||
namespace: headlamp
|
||||
labels:
|
||||
app.kubernetes.io/name: headlamp
|
||||
app.kubernetes.io/instance: headlamp
|
||||
spec:
|
||||
replicas: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
app.kubernetes.io/name: headlamp
|
||||
app.kubernetes.io/instance: headlamp
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app.kubernetes.io/name: headlamp
|
||||
app.kubernetes.io/instance: headlamp
|
||||
spec:
|
||||
serviceAccountName: headlamp
|
||||
containers:
|
||||
- name: headlamp
|
||||
image: {{.CustomRegistries.Headlamp | default .ImageRepository | default .Registries.Headlamp }}{{.Images.Headlamp}}
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- "-in-cluster"
|
||||
- "-plugins-dir=/headlamp/plugins"
|
||||
ports:
|
||||
- name: http
|
||||
containerPort: 4466
|
||||
protocol: TCP
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /
|
||||
port: http
|
||||
readinessProbe:
|
||||
httpGet:
|
||||
path: /
|
||||
port: http
|
|
@ -0,0 +1,6 @@
|
|||
---
|
||||
# Namespace
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: headlamp
|
|
@ -0,0 +1,21 @@
|
|||
---
|
||||
# Service
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: headlamp
|
||||
namespace: headlamp
|
||||
labels:
|
||||
app.kubernetes.io/name: headlamp
|
||||
app.kubernetes.io/instance: headlamp
|
||||
kubernetes.io/minikube-addons-endpoint: headlamp
|
||||
spec:
|
||||
type: NodePort
|
||||
ports:
|
||||
- port: 80
|
||||
targetPort: http
|
||||
protocol: TCP
|
||||
name: http
|
||||
selector:
|
||||
app.kubernetes.io/name: headlamp
|
||||
app.kubernetes.io/instance: headlamp
|
|
@ -0,0 +1,10 @@
|
|||
---
|
||||
# ServiceAccount
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: headlamp
|
||||
namespace: headlamp
|
||||
labels:
|
||||
app.kubernetes.io/name: headlamp
|
||||
app.kubernetes.io/instance: headlamp
|
|
@ -0,0 +1,7 @@
|
|||
### Documentation
|
||||
|
||||
For detailed usage instructions visit: [docs.inaccel.com](https://docs.inaccel.com)
|
||||
|
||||
### Support
|
||||
|
||||
For more product information contact: info@inaccel.com
|
|
@ -0,0 +1,56 @@
|
|||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
labels:
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
||||
kubernetes.io/minikube-addons: inaccel
|
||||
name: inaccel-addon
|
||||
namespace: kube-system
|
||||
data:
|
||||
disable.sh: |
|
||||
#!/bin/sh -e
|
||||
exec >/proc/1/fd/1
|
||||
echo "Disabling InAccel FPGA Operator"
|
||||
helm uninstall inaccel --namespace kube-system
|
||||
echo "InAccel is disabled"
|
||||
enable.sh: |
|
||||
#!/bin/sh -e
|
||||
exec >/proc/1/fd/1
|
||||
echo "Enabling InAccel FPGA Operator"
|
||||
helm install inaccel fpga-operator --namespace kube-system --repo https://setup.inaccel.com/helm
|
||||
echo "InAccel is enabled"
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
labels:
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
||||
kubernetes.io/minikube-addons: inaccel
|
||||
name: inaccel-addon
|
||||
namespace: kube-system
|
||||
spec:
|
||||
containers:
|
||||
- command:
|
||||
- sleep
|
||||
- infinity
|
||||
image: {{ .CustomRegistries.Helm3 | default .ImageRepository | default .Registries.Helm3 }}{{ .Images.Helm3 }}
|
||||
lifecycle:
|
||||
postStart:
|
||||
exec:
|
||||
command:
|
||||
- /inaccel/enable.sh
|
||||
preStop:
|
||||
exec:
|
||||
command:
|
||||
- /inaccel/disable.sh
|
||||
name: helm3
|
||||
volumeMounts:
|
||||
- mountPath: /inaccel
|
||||
name: inaccel-addon
|
||||
readOnly: true
|
||||
volumes:
|
||||
- configMap:
|
||||
defaultMode: 0777
|
||||
name: inaccel-addon
|
||||
name: inaccel-addon
|
|
@ -4,7 +4,7 @@ metadata:
|
|||
labels:
|
||||
app: metallb
|
||||
name: metallb-system
|
||||
---
|
||||
---{{ if .LegacyPodSecurityPolicy }}
|
||||
apiVersion: policy/v1beta1
|
||||
kind: PodSecurityPolicy
|
||||
metadata:
|
||||
|
@ -33,7 +33,7 @@ spec:
|
|||
rule: RunAsAny
|
||||
volumes:
|
||||
- '*'
|
||||
---
|
||||
---{{ end }}
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
|
|
|
@ -35,7 +35,7 @@ spec:
|
|||
- --secure-port=4443
|
||||
- --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname
|
||||
- --kubelet-use-node-status-port
|
||||
- --metric-resolution=15s
|
||||
- --metric-resolution=60s
|
||||
- --kubelet-insecure-tls
|
||||
resources:
|
||||
requests:
|
||||
|
@ -47,14 +47,14 @@ spec:
|
|||
protocol: TCP
|
||||
readinessProbe:
|
||||
httpGet:
|
||||
path: /readyz?exclude=livez
|
||||
path: /readyz
|
||||
port: https
|
||||
scheme: HTTPS
|
||||
periodSeconds: 10
|
||||
failureThreshold: 3
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /livez?exclude=readyz
|
||||
path: /livez
|
||||
port: https
|
||||
scheme: HTTPS
|
||||
periodSeconds: 10
|
||||
|
|
|
@ -3674,7 +3674,7 @@ spec:
|
|||
description: TopologyKey is the key of node labels. Nodes that have a label with this key and identical values are considered to be in the same topology. We consider each <key, value> as a "bucket", and try to put balanced number of pods into each bucket. It's a required field.
|
||||
type: string
|
||||
whenUnsatisfiable:
|
||||
description: 'WhenUnsatisfiable indicates how to deal with a pod if it doesn''t satisfy the spread constraint. - DoNotSchedule (default) tells the scheduler not to schedule it. - ScheduleAnyway tells the scheduler to schedule the pod in any location, but giving higher precedence to topologies that would help reduce the skew. A constraint is considered "Unsatisfiable" for an incoming pod if and only if every possible node assigment for that pod would violate "MaxSkew" on some topology. For example, in a 3-zone cluster, MaxSkew is set to 1, and pods with the same labelSelector spread as 3/1/1: | zone1 | zone2 | zone3 | | P P P | P | P | If WhenUnsatisfiable is set to DoNotSchedule, incoming pod can only be scheduled to zone2(zone3) to become 3/2/1(3/1/2) as ActualSkew(2-1) on zone2(zone3) satisfies MaxSkew(1). In other words, the cluster can still be imbalanced, but scheduler won''t make it *more* imbalanced. It''s a required field.'
|
||||
description: 'WhenUnsatisfiable indicates how to deal with a pod if it doesn''t satisfy the spread constraint. - DoNotSchedule (default) tells the scheduler not to schedule it. - ScheduleAnyway tells the scheduler to schedule the pod in any location, but giving higher precedence to topologies that would help reduce the skew. A constraint is considered "Unsatisfiable" for an incoming pod if and only if every possible node assignment for that pod would violate "MaxSkew" on some topology. For example, in a 3-zone cluster, MaxSkew is set to 1, and pods with the same labelSelector spread as 3/1/1: | zone1 | zone2 | zone3 | | P P P | P | P | If WhenUnsatisfiable is set to DoNotSchedule, incoming pod can only be scheduled to zone2(zone3) to become 3/2/1(3/1/2) as ActualSkew(2-1) on zone2(zone3) satisfies MaxSkew(1). In other words, the cluster can still be imbalanced, but scheduler won''t make it *more* imbalanced. It''s a required field.'
|
||||
type: string
|
||||
x-kubernetes-list-map-keys:
|
||||
- topologyKey
|
||||
|
@ -4678,7 +4678,7 @@ spec:
|
|||
nativeAPIs:
|
||||
type: array
|
||||
items:
|
||||
description: GroupVersionKind unambiguously identifies a kind. It doesn't anonymously include GroupVersion to avoid automatic coersion. It doesn't use a GroupVersion to avoid custom marshalling
|
||||
description: GroupVersionKind unambiguously identifies a kind. It doesn't anonymously include GroupVersion to avoid automatic coercion. It doesn't use a GroupVersion to avoid custom marshalling
|
||||
type: object
|
||||
required:
|
||||
- group
|
||||
|
|
|
@ -107,7 +107,7 @@ spec:
|
|||
format: date-time
|
||||
type: string
|
||||
error:
|
||||
description: error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurrs during the snapshot creation. Upon success, this error field will be cleared.
|
||||
description: error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.
|
||||
properties:
|
||||
message:
|
||||
description: 'message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.'
|
||||
|
@ -206,7 +206,7 @@ spec:
|
|||
format: date-time
|
||||
type: string
|
||||
error:
|
||||
description: error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurrs during the snapshot creation. Upon success, this error field will be cleared.
|
||||
description: error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.
|
||||
properties:
|
||||
message:
|
||||
description: 'message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.'
|
||||
|
|
|
@ -0,0 +1,72 @@
|
|||
From 2da2f359dba50aafef1202edda34374d99b77a14 Mon Sep 17 00:00:00 2001
|
||||
From: Francis Laniel <flaniel@linux.microsoft.com>
|
||||
Date: Wed, 22 Dec 2021 18:49:05 +0100
|
||||
Subject: [PATCH] linux: add BR2_LINUX_KERNEL_NEEDS_HOST_PAHOLE
|
||||
|
||||
CONFIG_DEBUG_BTF_INFO relies on pahole, so kernel DWARF are converted to BTF.
|
||||
If CONFIG_DEBUG_BTF_INFO is set and BR2_LINUX_KERNEL_NEEDS_HOST_PAHOLE not,
|
||||
an error message is shown and .config is not written.
|
||||
|
||||
Signed-off-by: Francis Laniel <flaniel@linux.microsoft.com>
|
||||
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
|
||||
---
|
||||
linux/Config.in | 12 ++++++++++++
|
||||
linux/linux.mk | 12 ++++++++++++
|
||||
2 files changed, 24 insertions(+)
|
||||
|
||||
diff --git a/linux/Config.in b/linux/Config.in
|
||||
index 891e2cdcb6..582f37ba7c 100644
|
||||
--- a/linux/Config.in
|
||||
+++ b/linux/Config.in
|
||||
@@ -470,6 +470,18 @@ config BR2_LINUX_KERNEL_NEEDS_HOST_LIBELF
|
||||
CONFIG_UNWINDER_ORC=y, please install libelf-dev,
|
||||
libelf-devel or elfutils-libelf-devel".
|
||||
|
||||
+config BR2_LINUX_KERNEL_NEEDS_HOST_PAHOLE
|
||||
+ bool "Needs host pahole"
|
||||
+ help
|
||||
+ Some Linux kernel configuration options (such as
|
||||
+ CONFIG_DEBUG_INFO_BTF) require building a host program
|
||||
+ called pahole. Enabling this option will ensure host-pahole
|
||||
+ gets built before the Linux kernel.
|
||||
+
|
||||
+ Enable this option if you get a Linux kernel build failure
|
||||
+ such as "BTF: .tmp_vmlinux.btf: pahole (pahole) is not
|
||||
+ available".
|
||||
+
|
||||
# Linux extensions
|
||||
source "linux/Config.ext.in"
|
||||
|
||||
diff --git a/linux/linux.mk b/linux/linux.mk
|
||||
index 61fdc0c76c..dd2eebd446 100644
|
||||
--- a/linux/linux.mk
|
||||
+++ b/linux/linux.mk
|
||||
@@ -114,6 +114,17 @@ ifeq ($(BR2_LINUX_KERNEL_NEEDS_HOST_LIBELF),y)
|
||||
LINUX_DEPENDENCIES += host-elfutils host-pkgconf
|
||||
endif
|
||||
|
||||
+ifeq ($(BR2_LINUX_KERNEL_NEEDS_HOST_PAHOLE),y)
|
||||
+LINUX_DEPENDENCIES += host-pahole
|
||||
+else
|
||||
+define LINUX_FIXUP_CONFIG_PAHOLE_CHECK
|
||||
+ if grep -q "^CONFIG_DEBUG_INFO_BTF=y" $(KCONFIG_DOT_CONFIG); then \
|
||||
+ echo "To use CONFIG_DEBUG_INFO_BTF, enable host-pahole (BR2_LINUX_KERNEL_NEEDS_HOST_PAHOLE)" 1>&2; \
|
||||
+ exit 1; \
|
||||
+ fi
|
||||
+endef
|
||||
+endif
|
||||
+
|
||||
# If host-uboot-tools is selected by the user, assume it is needed to
|
||||
# create a custom image
|
||||
ifeq ($(BR2_PACKAGE_HOST_UBOOT_TOOLS),y)
|
||||
@@ -324,6 +335,7 @@ define LINUX_KCONFIG_FIXUP_CMDS
|
||||
$(call KCONFIG_DISABLE_OPT,$(opt))
|
||||
)
|
||||
$(LINUX_FIXUP_CONFIG_ENDIANNESS)
|
||||
+ $(LINUX_FIXUP_CONFIG_PAHOLE_CHECK)
|
||||
$(if $(BR2_arm)$(BR2_armeb),
|
||||
$(call KCONFIG_ENABLE_OPT,CONFIG_AEABI))
|
||||
$(if $(BR2_powerpc)$(BR2_powerpc64)$(BR2_powerpc64le),
|
||||
--
|
||||
2.25.1
|
||||
|
|
@ -12,7 +12,7 @@
|
|||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
FROM ubuntu:18.04
|
||||
FROM ubuntu:20.04
|
||||
|
||||
RUN apt-get update \
|
||||
&& apt-get install -y apt dpkg apt-utils ca-certificates software-properties-common \
|
||||
|
|
|
@ -1,12 +1,8 @@
|
|||
menu "System tools aarch64"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/buildkit-bin-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/runc-master-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/crio-bin-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/cri-dockerd-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/crictl-bin-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/docker-bin-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/cri-dockerd-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/cni-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/cni-plugins-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/containerd-bin-aarch64/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/aarch64/package/podman-aarch64/Config.in"
|
||||
endmenu
|
||||
|
|
|
@ -1,5 +0,0 @@
|
|||
config BR2_PACKAGE_CNI_AARCH64
|
||||
bool "cni"
|
||||
default y
|
||||
depends on BR2_aarch64
|
||||
depends on BR2_PACKAGE_HOST_GO_TARGET_ARCH_SUPPORTS
|
|
@ -1,45 +0,0 @@
|
|||
################################################################################
|
||||
#
|
||||
# cni
|
||||
#
|
||||
################################################################################
|
||||
|
||||
CNI_AARCH64_VERSION = v0.7.1
|
||||
CNI_AARCH64_SITE = https://github.com/containernetworking/cni/archive
|
||||
CNI_AARCH64_SOURCE = $(CNI_AARCH64_VERSION).tar.gz
|
||||
CNI_AARCH64_LICENSE = Apache-2.0
|
||||
CNI_AARCH64_LICENSE_FILES = LICENSE
|
||||
|
||||
CNI_AARCH64_DEPENDENCIES = host-go
|
||||
|
||||
CNI_AARCH64_GOPATH = $(@D)/_output
|
||||
CNI_AARCH64_MAKE_ENV = \
|
||||
$(GO_TARGET_ENV) \
|
||||
CGO_ENABLED=0 \
|
||||
GO111MODULE=off \
|
||||
GOPATH="$(CNI_AARCH64_GOPATH)" \
|
||||
PATH=$(CNI_AARCH64_GOPATH)/bin:$(BR_PATH) \
|
||||
GOARCH=arm64
|
||||
|
||||
CNI_AARCH64_BUILDFLAGS = -a --ldflags '-extldflags \"-static\"'
|
||||
|
||||
define CNI_AARCH64_CONFIGURE_CMDS
|
||||
mkdir -p $(CNI_AARCH64_GOPATH)/src/github.com/containernetworking
|
||||
ln -sf $(@D) $(CNI_AARCH64_GOPATH)/src/github.com/containernetworking/cni
|
||||
endef
|
||||
|
||||
define CNI_AARCH64_BUILD_CMDS
|
||||
(cd $(@D); $(CNI_AARCH64_MAKE_ENV) go build -o bin/cnitool $(CNI_AARCH64_BUILDFLAGS) ./cnitool)
|
||||
endef
|
||||
|
||||
define CNI_AARCH64_INSTALL_TARGET_CMDS
|
||||
$(INSTALL) -D -m 0755 \
|
||||
$(@D)/bin/cnitool \
|
||||
$(TARGET_DIR)/opt/cni/bin/cnitool
|
||||
|
||||
ln -sf \
|
||||
../../opt/cni/bin/cnitool \
|
||||
$(TARGET_DIR)/usr/bin/cnitool
|
||||
endef
|
||||
|
||||
$(eval $(generic-package))
|
|
@ -57,9 +57,8 @@ oom_score = 0
|
|||
conf_dir = "/etc/cni/net.mk"
|
||||
conf_template = ""
|
||||
[plugins."io.containerd.grpc.v1.cri".registry]
|
||||
[plugins."io.containerd.grpc.v1.cri".registry.mirrors]
|
||||
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"]
|
||||
endpoint = ["https://registry-1.docker.io"]
|
||||
config_path = "/etc/containerd/certs.d"
|
||||
|
||||
[plugins."io.containerd.service.v1.diff-service"]
|
||||
default = ["walking"]
|
||||
[plugins."io.containerd.gc.v1.scheduler"]
|
||||
|
|
|
@ -100,9 +100,7 @@ oom_score = 0
|
|||
max_conf_num = 1
|
||||
conf_template = ""
|
||||
[plugins."io.containerd.grpc.v1.cri".registry]
|
||||
[plugins."io.containerd.grpc.v1.cri".registry.mirrors]
|
||||
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"]
|
||||
endpoint = ["https://registry-1.docker.io"]
|
||||
config_path = "/etc/containerd/certs.d"
|
||||
[plugins."io.containerd.grpc.v1.cri".image_decryption]
|
||||
key_model = ""
|
||||
[plugins."io.containerd.grpc.v1.cri".x509_key_pair_streaming]
|
||||
|
|
|
@ -15,3 +15,5 @@ sha256 85a531725f15e2d136131119d42af4507a5389e0947015152075c4c93816fb5c v1.4.12.
|
|||
sha256 7507913ba169c103ab67bc51bec31cd977d4348d7bc842da32b7eab5f930a14b v1.5.10.tar.gz
|
||||
sha256 02b79d5e2b07b5e64cd28f1fe84395ee11eef95fc49fd923a9ab93022b148be6 v1.5.11.tar.gz
|
||||
sha256 f422e21e35705d1e741c1f3280813e43f811eaff4dcc5cdafac8b8952b15f468 v1.6.4.tar.gz
|
||||
sha265 27afb673c20d53aa5c31aec07b38eb7e4dc911e7e1f0c76fac9513bbf070bd24 v1.6.6.tar.gz
|
||||
sha256 f5f938513c28377f64f85e84f2750d39f26b01262f3a062b7e8ce35b560ca407 v1.6.8.tar.gz
|
||||
|
|
|
@ -3,8 +3,8 @@
|
|||
# containerd
|
||||
#
|
||||
################################################################################
|
||||
CONTAINERD_BIN_AARCH64_VERSION = v1.6.4
|
||||
CONTAINERD_BIN_AARCH64_COMMIT = 212e8b6fa2f44b9c21b2798135fc6fb7c53efc16
|
||||
CONTAINERD_BIN_AARCH64_VERSION = v1.6.8
|
||||
CONTAINERD_BIN_AARCH64_COMMIT = 9cd3357b7fd7218e4aec3eae239db1f68a5a6ec6
|
||||
CONTAINERD_BIN_AARCH64_SITE = https://github.com/containerd/containerd/archive
|
||||
CONTAINERD_BIN_AARCH64_SOURCE = $(CONTAINERD_BIN_AARCH64_VERSION).tar.gz
|
||||
CONTAINERD_BIN_AARCH64_DEPENDENCIES = host-go libgpgme
|
||||
|
@ -53,6 +53,9 @@ define CONTAINERD_BIN_AARCH64_INSTALL_TARGET_CMDS
|
|||
$(INSTALL) -Dm644 \
|
||||
$(CONTAINERD_BIN_AARCH64_PKGDIR)/config.toml \
|
||||
$(TARGET_DIR)/etc/containerd/config.toml
|
||||
$(INSTALL) -Dm644 \
|
||||
$(CONTAINERD_BIN_AARCH64_PKGDIR)/containerd_docker_io_hosts.toml \
|
||||
$(TARGET_DIR)/etc/containerd/certs.d/docker.io/hosts.toml
|
||||
endef
|
||||
|
||||
define CONTAINERD_BIN_AARCH64_INSTALL_INIT_SYSTEMD
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
server = "https://registry-1.docker.io"
|
|
@ -1,3 +1,4 @@
|
|||
sha256 4acd7605a0cb95a6ad50314d1f2497b92ee0f07382062d0c18a5434c1a3b9513 542e27dee12db61d6e96d2a83a20359474a5efa2.tar.gz
|
||||
sha256 b2a082a8846ac74b8482ee6353d480cea0dec017bbec2b59b16e3f91efa2f5ca eb0c48ef49856f7d098ec005ddebcae197e08e49.tar.gz
|
||||
sha256 ceb99430633f75f354c0e9fea1f3cf0e5138ac5ee3c2691a1a70811fd2feeeef a4d1895a2659ea9974bd7528a706592ab8b74181.tar.gz
|
||||
sha256 cb90ff5fd4de69cc9cf2a63408d42b605f1d4e70b92012729c0a3bd9a4cfa197 0737013d3c48992724283d151e8a2a767a1839e9.tar.gz
|
||||
|
|
|
@ -4,15 +4,14 @@
|
|||
#
|
||||
################################################################################
|
||||
|
||||
# As of 2022-02-03
|
||||
CRI_DOCKERD_AARCH64_VER = 0.2.0
|
||||
CRI_DOCKERD_AARCH64_REV = a4d1895
|
||||
CRI_DOCKERD_AARCH64_VERSION = a4d1895a2659ea9974bd7528a706592ab8b74181
|
||||
# As of 2022-06-09
|
||||
CRI_DOCKERD_AARCH64_VER = 0.2.2
|
||||
CRI_DOCKERD_AARCH64_REV = 0737013
|
||||
CRI_DOCKERD_AARCH64_VERSION = 0737013d3c48992724283d151e8a2a767a1839e9
|
||||
CRI_DOCKERD_AARCH64_SITE = https://github.com/Mirantis/cri-dockerd/archive
|
||||
CRI_DOCKERD_AARCH64_SOURCE = $(CRI_DOCKERD_AARCH64_VERSION).tar.gz
|
||||
|
||||
CRI_DOCKERD_AARCH64_DEPENDENCIES = host-go
|
||||
|
||||
CRI_DOCKERD_AARCH64_GOPATH = $(@D)/_output
|
||||
CRI_DOCKERD_AARCH64_ENV = \
|
||||
$(GO_TARGET_ENV) \
|
||||
|
|
|
@ -1,20 +0,0 @@
|
|||
config BR2_PACKAGE_CRIO_BIN_AARCH64
|
||||
bool "crio-bin"
|
||||
default y
|
||||
depends on BR2_aarch64
|
||||
depends on BR2_PACKAGE_HOST_GO_TARGET_ARCH_SUPPORTS
|
||||
depends on BR2_PACKAGE_HOST_GO_TARGET_CGO_LINKING_SUPPORTS
|
||||
depends on BR2_TOOLCHAIN_HAS_THREADS
|
||||
depends on BR2_USE_MMU # lvm2
|
||||
depends on !BR2_STATIC_LIBS # lvm2
|
||||
depends on !BR2_TOOLCHAIN_USES_MUSL # lvm2
|
||||
select BR2_PACKAGE_RUNC_MASTER
|
||||
select BR2_PACKAGE_CRUN
|
||||
select BR2_PACKAGE_CONMON
|
||||
select BR2_PACKAGE_BTRFS_PROGS
|
||||
select BR2_PACKAGE_LIBSECCOMP
|
||||
select BR2_PACKAGE_LIBGPGME
|
||||
select BR2_PACKAGE_LVM2
|
||||
select BR2_PACKAGE_LVM2_APP_LIBRARY
|
||||
select BR2_PACKAGE_UTIL_LINUX_LIBMOUNT
|
||||
select BR2_PACKAGE_LIBGLIB2
|
|
@ -1,28 +0,0 @@
|
|||
sha256 d310d52706262009af886dbd3e8dcd09a339cdc3b57dc22a9121e6d6a87d2921 v1.8.4.tar.gz
|
||||
sha256 9f79cee99e272c9cfc561ae31235d84d4da59fd5c8b3d3ab6623bf9a92d90c5a v1.10.0.tar.gz
|
||||
sha256 09e53fd550f4f10108879131ee6b8ef1c367ce71a73dcf6350c4cc898751d8c1 v1.11.8.tar.gz
|
||||
sha256 92588998dbb79002c38f65f84602b5659f0d0ef1cd36b1a568a2e40269b66816 v1.13.0.tar.gz
|
||||
sha256 48e7cf64a757d62a3edf214e1b93b74d99f090ca924f956ede2494a260eab2db v1.13.1.tar.gz
|
||||
sha256 7435c4745017f06c260973b049440d924efe65b0df008d14175dfb8f5e23b599 v1.14.0.tar.gz
|
||||
sha256 1f6f72b1f89d4286b2d5b54a48f4d5ed4c0c01065d484635dcb343a706feb743 v1.14.1.tar.gz
|
||||
sha256 f7041a92e2d3a4c341be8df58f1076ba57ecb5daa02b6c65e652530c5f242739 v1.15.0.tar.gz
|
||||
sha256 6218a99877da9b9895e0088944731f5384803c15628d4b3c6b40ba1ddd39e052 v1.15.1.tar.gz
|
||||
sha256 70d4c746fe207422c78420dc4239768f485eea639a38c993c02872ec6305dd1d v1.15.2.tar.gz
|
||||
sha256 05f9614c4d5970b4662499b84c270b0ab953596ee863dcd09c9dc7a2d2f09789 v1.16.0.tar.gz
|
||||
sha256 57e1ee990ef2d5af8b32c33a21b4998682608e3556dcf1d3349666f55e7d95b9 v1.16.1.tar.gz
|
||||
sha256 23a797762e4544ee7c171ef138cfc1141a3f0acc2838d9965c2a58e53b16c3ae v1.17.0.tar.gz
|
||||
sha256 7967e9218fdfb59d6005a9e19c1668469bc5566c2a35927cffe7de8656bb22c7 v1.17.1.tar.gz
|
||||
sha256 336f5c275e260eaae8187e7250fb960441e8dc90615729354d3c04e699870982 v1.17.3.tar.gz
|
||||
sha256 865ded95aceb3a33a391b252522682de6b37b39498704c490b3a321dbefaafcb v1.18.0.tar.gz
|
||||
sha256 794ddc36c2a20fde91fc6cc2c6f02ebdaea85c69b51b67f3994090dbbdbc2a50 v1.18.1.tar.gz
|
||||
sha256 25dc558fbabc987bd58c7eab5230121b258a7b0eb34a49dc6595f1c6f3969116 v1.18.2.tar.gz
|
||||
sha256 d5c6442e3990938badc966cdd1eb9ebe2fc11345452c233aa0d87ca38fbeed81 v1.18.3.tar.gz
|
||||
sha256 74a4e916acddc6cf47ab5752bdebb6732ce2c028505ef57b7edc21d2da9039b6 v1.18.4.tar.gz
|
||||
sha256 fc8a8e61375e3ce30563eeb0fd6534c4f48fc20300a72e6ff51cc99cb2703516 v1.19.0.tar.gz
|
||||
sha256 6165c5b8212ea03be2a465403177318bfe25a54c3e8d66d720344643913a0223 v1.19.1.tar.gz
|
||||
sha256 76fd7543bc92d4364a11060f43a5131893a76c6e6e9d6de3a6bb6292c110b631 v1.20.0.tar.gz
|
||||
sha256 36d9f4cf4966342e2d4099e44d8156c55c6a10745c67ce4f856aa9f6dcc2d9ba v1.20.2.tar.gz
|
||||
sha256 bc53ea8977e252bd9812974c33ff654ee22076598e901464468c5c105a5ef773 v1.22.0.tar.gz
|
||||
sha256 6e1c0e393cd16af907fabb24e4cc068e27c606c5f1071060d46efdcd29cb5c0d v1.22.1.tar.gz
|
||||
sha256 34097a0f535aa79cf990aaee5d3ff6226663587b188cbee11089f120e7f869e4 v1.22.2.tar.gz
|
||||
sha256 52836549cfa27a688659576be9266f4837357a6fa162b1d0a05fa8da62c724b3 v1.22.3.tar.gz
|
|
@ -1,79 +0,0 @@
|
|||
################################################################################
|
||||
#
|
||||
# cri-o
|
||||
#
|
||||
################################################################################
|
||||
|
||||
CRIO_BIN_AARCH64_VERSION = v1.22.3
|
||||
CRIO_BIN_AARCH64_COMMIT = d93b2dfb8d0f2ad0f8b9061d941e3b216baa5814
|
||||
CRIO_BIN_AARCH64_SITE = https://github.com/cri-o/cri-o/archive
|
||||
CRIO_BIN_AARCH64_SOURCE = $(CRIO_BIN_AARCH64_VERSION).tar.gz
|
||||
CRIO_BIN_AARCH64_DEPENDENCIES = host-go libgpgme
|
||||
CRIO_BIN_AARCH64_GOPATH = $(@D)/_output
|
||||
CRIO_BIN_AARCH64_ENV = \
|
||||
$(GO_TARGET_ENV) \
|
||||
CGO_ENABLED=1 \
|
||||
GO111MODULE=off \
|
||||
GOPATH="$(CRIO_BIN_AARCH64_GOPATH)" \
|
||||
PATH=$(CRIO_BIN_AARCH64_GOPATH)/bin:$(BR_PATH) \
|
||||
GOARCH=arm64
|
||||
|
||||
|
||||
define CRIO_BIN_AARCH64_USERS
|
||||
- -1 crio-admin -1 - - - - -
|
||||
- -1 crio -1 - - - - -
|
||||
endef
|
||||
|
||||
define CRIO_BIN_AARCH64_CONFIGURE_CMDS
|
||||
mkdir -p $(CRIO_BIN_AARCH64_GOPATH)/src/github.com/cri-o
|
||||
ln -sf $(@D) $(CRIO_BIN_AARCH64_GOPATH)/src/github.com/cri-o/cri-o
|
||||
# disable the "automatic" go module detection
|
||||
sed -e 's/go help mod/false/' -i $(@D)/Makefile
|
||||
endef
|
||||
|
||||
define CRIO_BIN_AARCH64_BUILD_CMDS
|
||||
mkdir -p $(@D)/bin
|
||||
$(CRIO_BIN_AARCH64_ENV) $(MAKE) $(TARGET_CONFIGURE_OPTS) -C $(@D) COMMIT_NO=$(CRIO_BIN_AARCH64_COMMIT) PREFIX=/usr binaries
|
||||
endef
|
||||
|
||||
define CRIO_BIN_AARCH64_INSTALL_TARGET_CMDS
|
||||
mkdir -p $(TARGET_DIR)/usr/share/containers/oci/hooks.d
|
||||
mkdir -p $(TARGET_DIR)/etc/containers/oci/hooks.d
|
||||
mkdir -p $(TARGET_DIR)/etc/crio/crio.conf.d
|
||||
|
||||
$(INSTALL) -Dm755 \
|
||||
$(@D)/bin/crio \
|
||||
$(TARGET_DIR)/usr/bin/crio
|
||||
$(INSTALL) -Dm755 \
|
||||
$(@D)/bin/pinns \
|
||||
$(TARGET_DIR)/usr/bin/pinns
|
||||
$(INSTALL) -Dm644 \
|
||||
$(CRIO_BIN_AARCH64_PKGDIR)/crio.conf \
|
||||
$(TARGET_DIR)/etc/crio/crio.conf
|
||||
$(INSTALL) -Dm644 \
|
||||
$(CRIO_BIN_AARCH64_PKGDIR)/policy.json \
|
||||
$(TARGET_DIR)/etc/containers/policy.json
|
||||
$(INSTALL) -Dm644 \
|
||||
$(CRIO_BIN_AARCH64_PKGDIR)/registries.conf \
|
||||
$(TARGET_DIR)/etc/containers/registries.conf
|
||||
$(INSTALL) -Dm644 \
|
||||
$(CRIO_BIN_AARCH64_PKGDIR)/02-crio.conf \
|
||||
$(TARGET_DIR)/etc/crio/crio.conf.d/02-crio.conf
|
||||
|
||||
mkdir -p $(TARGET_DIR)/etc/sysconfig
|
||||
echo 'CRIO_OPTIONS="--log-level=debug"' > $(TARGET_DIR)/etc/sysconfig/crio
|
||||
endef
|
||||
|
||||
define CRIO_BIN_AARCH64_INSTALL_INIT_SYSTEMD
|
||||
$(MAKE) $(TARGET_CONFIGURE_OPTS) -C $(@D) install.systemd DESTDIR=$(TARGET_DIR) PREFIX=$(TARGET_DIR)/usr
|
||||
$(INSTALL) -Dm644 \
|
||||
$(CRIO_BIN_AARCH64_PKGDIR)/crio.service \
|
||||
$(TARGET_DIR)/usr/lib/systemd/system/crio.service
|
||||
$(INSTALL) -Dm644 \
|
||||
$(CRIO_BIN_AARCH64_PKGDIR)/crio-wipe.service \
|
||||
$(TARGET_DIR)/usr/lib/systemd/system/crio-wipe.service
|
||||
$(call link-service,crio.service)
|
||||
$(call link-service,crio-shutdown.service)
|
||||
endef
|
||||
|
||||
$(eval $(generic-package))
|
|
@ -1,3 +1,5 @@
|
|||
sha256 ea971edc1179088bfd25edd04a0c12848143d15cb8202ebb93a6a08973464fd0 docker-20.10.14.tgz
|
||||
sha256 46102273fab8d6b8a7cf248a928ebaa4bee43114001c593b0d07092a34a439e1 docker-20.10.15.tgz
|
||||
sha256 2f35d8d422b63a59279084c159c9092b63b6d974a7fcd868167aee4cc5f79f3b docker-20.10.16.tgz
|
||||
sha256 249244024b507a6599084522cc73e73993349d13264505b387593f2b2ed603e6 docker-20.10.17.tgz
|
||||
sha256 aa2b2da571fb9160df87fd5a831f203fb97655e35fb9c4e8d46e72078ae16acf docker-20.10.18.tgz
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
#
|
||||
################################################################################
|
||||
|
||||
DOCKER_BIN_AARCH64_VERSION = 20.10.16
|
||||
DOCKER_BIN_AARCH64_VERSION = 20.10.18
|
||||
DOCKER_BIN_AARCH64_SITE = https://download.docker.com/linux/static/stable/aarch64
|
||||
DOCKER_BIN_AARCH64_SOURCE = docker-$(DOCKER_BIN_AARCH64_VERSION).tgz
|
||||
|
||||
|
|
|
@ -1,12 +0,0 @@
|
|||
config BR2_PACKAGE_PODMAN_AARCH64
|
||||
bool "podman"
|
||||
default y
|
||||
depends on BR2_aarch64
|
||||
depends on BR2_PACKAGE_HOST_GO_TARGET_ARCH_SUPPORTS
|
||||
depends on BR2_PACKAGE_HOST_GO_TARGET_CGO_LINKING_SUPPORTS
|
||||
depends on BR2_TOOLCHAIN_HAS_THREADS
|
||||
select BR2_PACKAGE_RUNC_MASTER
|
||||
select BR2_PACKAGE_CRUN
|
||||
select BR2_PACKAGE_CONMON
|
||||
select BR2_PACKAGE_LIBSECCOMP
|
||||
select BR2_PACKAGE_LIBGPGME
|
|
@ -1,71 +0,0 @@
|
|||
PODMAN_AARCH64_VERSION = v3.4.2
|
||||
PODMAN_AARCH64_COMMIT = 2ad1fd3555de12de34e20898cc2ef901f08fe5ed
|
||||
PODMAN_AARCH64_SITE = https://github.com/containers/podman/archive
|
||||
PODMAN_AARCH64_SOURCE = $(PODMAN_AARCH64_VERSION).tar.gz
|
||||
PODMAN_AARCH64_LICENSE = Apache-2.0
|
||||
PODMAN_AARCH64_LICENSE_FILES = LICENSE
|
||||
|
||||
PODMAN_AARCH64_DEPENDENCIES = host-go
|
||||
ifeq ($(BR2_INIT_SYSTEMD),y)
|
||||
# need libsystemd for journal
|
||||
PODMAN_AARCH64_DEPENDENCIES += systemd
|
||||
endif
|
||||
|
||||
PODMAN_AARCH64_GOPATH = $(@D)/_output
|
||||
PODMAN_AARCH64_BIN_ENV = \
|
||||
$(GO_TARGET_ENV) \
|
||||
CGO_ENABLED=1 \
|
||||
GOPATH="$(PODMAN_AARCH64_GOPATH)" \
|
||||
PATH=$(PODMAN_AARCH64_GOPATH)/bin:$(BR_PATH) \
|
||||
GOARCH=arm64
|
||||
|
||||
|
||||
define PODMAN_AARCH64_USERS
|
||||
- -1 podman -1 - - - - -
|
||||
endef
|
||||
|
||||
define PODMAN_AARCH64_MOD_VENDOR_MAKEFILE
|
||||
# "build flag -mod=vendor only valid when using modules"
|
||||
sed -e 's|-mod=vendor ||' -i $(@D)/Makefile
|
||||
endef
|
||||
|
||||
PODMAN_AARCH64_POST_EXTRACT_HOOKS += PODMAN_AARCH64_MOD_VENDOR_MAKEFILE
|
||||
|
||||
define PODMAN_AARCH64_CONFIGURE_CMDS
|
||||
mkdir -p $(PODMAN_AARCH64_GOPATH) && mv $(@D)/vendor $(PODMAN_AARCH64_GOPATH)/src
|
||||
|
||||
mkdir -p $(PODMAN_AARCH64_GOPATH)/src/github.com/containers
|
||||
ln -sf $(@D) $(PODMAN_AARCH64_GOPATH)/src/github.com/containers/podman
|
||||
|
||||
ln -sf $(@D) $(PODMAN_AARCH64_GOPATH)/src/github.com/containers/podman/v2
|
||||
endef
|
||||
|
||||
define PODMAN_AARCH64_BUILD_CMDS
|
||||
mkdir -p $(@D)/bin
|
||||
$(PODMAN_AARCH64_BIN_ENV) CIRRUS_TAG=$(PODMAN_AARCH64_VERSION) $(MAKE) $(TARGET_CONFIGURE_OPTS) -C $(@D) GIT_COMMIT=$(PODMAN_AARCH64_COMMIT) PREFIX=/usr podman
|
||||
endef
|
||||
|
||||
define PODMAN_AARCH64_INSTALL_TARGET_CMDS
|
||||
$(INSTALL) -Dm755 $(@D)/bin/podman $(TARGET_DIR)/usr/bin/podman
|
||||
$(INSTALL) -d -m 755 $(TARGET_DIR)/etc/cni/net.d/
|
||||
$(INSTALL) -m 644 $(@D)/cni/87-podman-bridge.conflist $(TARGET_DIR)/etc/cni/net.d/87-podman-bridge.conflist
|
||||
endef
|
||||
|
||||
define PODMAN_AARCH64_INSTALL_INIT_SYSTEMD
|
||||
$(INSTALL) -D -m 644 \
|
||||
$(@D)/contrib/systemd/system/podman.service \
|
||||
$(TARGET_DIR)/usr/lib/systemd/system/podman.service
|
||||
$(INSTALL) -D -m 644 \
|
||||
$(@D)/contrib/systemd/system/podman.socket \
|
||||
$(TARGET_DIR)/usr/lib/systemd/system/podman.socket
|
||||
|
||||
# Allow running podman-remote as a user in the group "podman"
|
||||
$(INSTALL) -D -m 644 \
|
||||
$(PODMAN_AARCH64_PKGDIR)/override.conf \
|
||||
$(TARGET_DIR)/usr/lib/systemd/system/podman.socket.d/override.conf
|
||||
$(INSTALL) -D -m 644 \
|
||||
$(PODMAN_AARCH64_PKGDIR)/podman.conf \
|
||||
$(TARGET_DIR)/usr/lib/tmpfiles.d/podman.conf
|
||||
endef
|
||||
|
||||
$(eval $(generic-package))
|
|
@ -1,18 +0,0 @@
|
|||
config BR2_PACKAGE_RUNC_MASTER_AARCH64
|
||||
bool "runc-master"
|
||||
default y
|
||||
depends on BR2_PACKAGE_HOST_GO_TARGET_ARCH_SUPPORTS
|
||||
depends on BR2_PACKAGE_HOST_GO_TARGET_CGO_LINKING_SUPPORTS
|
||||
depends on BR2_TOOLCHAIN_HAS_THREADS
|
||||
help
|
||||
runC is a CLI tool for spawning and running containers
|
||||
according to the OCP specification.
|
||||
|
||||
This is just a newer build of runc than the buildroot version.
|
||||
|
||||
https://github.com/opencontainers/runc
|
||||
|
||||
comment "runc needs a toolchain w/ threads"
|
||||
depends on BR2_PACKAGE_HOST_GO_TARGET_ARCH_SUPPORTS && \
|
||||
BR2_PACKAGE_HOST_GO_TARGET_CGO_LINKING_SUPPORTS
|
||||
depends on !BR2_TOOLCHAIN_HAS_THREADS
|
|
@ -1,45 +0,0 @@
|
|||
################################################################################
|
||||
#
|
||||
# runc
|
||||
#
|
||||
################################################################################
|
||||
|
||||
# As of 2022-03-28, v1.1.1
|
||||
RUNC_MASTER_AARCH64_VERSION = 52de29d7e0f8c0899bd7efb8810dd07f0073fa87
|
||||
RUNC_MASTER_AARCH64_SITE = https://github.com/opencontainers/runc/archive
|
||||
RUNC_MASTER_AARCH64_SOURCE = $(RUNC_MASTER_AARCH64_VERSION).tar.gz
|
||||
RUNC_MASTER_AARCH64_LICENSE = Apache-2.0
|
||||
RUNC_MASTER_AARCH64_LICENSE_FILES = LICENSE
|
||||
|
||||
RUNC_MASTER_AARCH64_DEPENDENCIES = host-go
|
||||
|
||||
RUNC_MASTER_AARCH64_GOPATH = $(@D)/_output
|
||||
RUNC_MASTER_AARCH64_MAKE_ENV = \
|
||||
$(GO_TARGET_ENV) \
|
||||
CGO_ENABLED=1 \
|
||||
GO111MODULE=off \
|
||||
GOPATH="$(RUNC_MASTER_AARCH64_GOPATH)" \
|
||||
PATH=$(RUNC_MASTER_AARCH64_GOPATH)/bin:$(BR_PATH) \
|
||||
GOARCH=arm64
|
||||
|
||||
RUNC_MASTER_AARCH64_COMPILE_SRC = $(RUNC_MASTER_AARCH64_GOPATH)/src/github.com/opencontainers/runc
|
||||
|
||||
ifeq ($(BR2_PACKAGE_LIBSECCOMP),y)
|
||||
RUNC_MASTER_AARCH64_GOTAGS += seccomp
|
||||
RUNC_MASTER_AARCH64_DEPENDENCIES += libseccomp host-pkgconf
|
||||
endif
|
||||
|
||||
define RUNC_MASTER_AARCH64_CONFIGURE_CMDS
|
||||
mkdir -p $(RUNC_MASTER_AARCH64_GOPATH)/src/github.com/opencontainers
|
||||
ln -s $(@D) $(RUNC_MASTER_AARCH64_GOPATH)/src/github.com/opencontainers/runc
|
||||
endef
|
||||
|
||||
define RUNC_MASTER_AARCH64_BUILD_CMDS
|
||||
PWD=$(RUNC_MASTER_AARCH64_COMPILE_SRC) $(RUNC_MASTER_AARCH64_MAKE_ENV) $(MAKE) $(TARGET_CONFIGURE_OPTS) -C $(@D) BUILDTAGS="$(RUNC_MASTER_AARCH64_GOTAGS)" COMMIT_NO=$(RUNC_MASTER_AARCH64_VERSION) COMMIT=$(RUNC_MASTER_AARCH64_VERSION) PREFIX=/usr
|
||||
endef
|
||||
|
||||
define RUNC_MASTER_AARCH64_INSTALL_TARGET_CMDS
|
||||
$(INSTALL) -D -m 0755 $(@D)/runc $(TARGET_DIR)/usr/bin/runc
|
||||
endef
|
||||
|
||||
$(eval $(generic-package))
|
|
@ -1,15 +1,9 @@
|
|||
menu "System tools x86_64"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/conmon/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/buildkit-bin/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/runc-master/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/crio-bin/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/cri-dockerd/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/crictl-bin/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/docker-bin/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/cri-dockerd/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/cni/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/cni-plugins/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/containerd-bin/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/podman/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/vbox-guest/Config.in"
|
||||
source "$BR2_EXTERNAL_MINIKUBE_PATH/arch/x86_64/package/hyperv-daemons/Config.in"
|
||||
endmenu
|
||||
|
|
|
@ -1,6 +0,0 @@
|
|||
sha256 b1ae09833a238c51161918a8849031efdb46cf0068ea5b752e362d9836e2af7d cni-v0.3.0.tgz
|
||||
sha256 84c9a0a41b59211d560bef14bf3f53bb370156f9ac7762270b3848fed96e1be8 cni-v0.4.0.tgz
|
||||
sha256 a7f84a742c8f3a95843b3cc636444742554a4853835649ec371a07c841daebab cni-amd64-v0.6.0.tgz
|
||||
sha256 802f4a002b4eb774624a9dc1c859d3c9926eb2d862e66a673fc99cfc8bcd7494 v0.6.0.tar.gz
|
||||
sha256 78d57477d6b0ab9dc4d75ce9f275302d2f379206b5326503e57d9c08b76484c1 v0.7.0.tar.gz
|
||||
sha256 4517eabfd65aea2012dc48d057bf889a0a41ed9837387d95cd1e36c0dbddcfd4 v0.7.1.tar.gz
|
|
@ -57,9 +57,8 @@ oom_score = 0
|
|||
conf_dir = "/etc/cni/net.mk"
|
||||
conf_template = ""
|
||||
[plugins."io.containerd.grpc.v1.cri".registry]
|
||||
[plugins."io.containerd.grpc.v1.cri".registry.mirrors]
|
||||
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"]
|
||||
endpoint = ["https://registry-1.docker.io"]
|
||||
config_path = "/etc/containerd/certs.d"
|
||||
|
||||
[plugins."io.containerd.service.v1.diff-service"]
|
||||
default = ["walking"]
|
||||
[plugins."io.containerd.gc.v1.scheduler"]
|
||||
|
|
|
@ -100,9 +100,7 @@ oom_score = 0
|
|||
max_conf_num = 1
|
||||
conf_template = ""
|
||||
[plugins."io.containerd.grpc.v1.cri".registry]
|
||||
[plugins."io.containerd.grpc.v1.cri".registry.mirrors]
|
||||
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"]
|
||||
endpoint = ["https://registry-1.docker.io"]
|
||||
config_path = "/etc/containerd/certs.d"
|
||||
[plugins."io.containerd.grpc.v1.cri".image_decryption]
|
||||
key_model = ""
|
||||
[plugins."io.containerd.grpc.v1.cri".x509_key_pair_streaming]
|
||||
|
|
|
@ -15,3 +15,5 @@ sha256 85a531725f15e2d136131119d42af4507a5389e0947015152075c4c93816fb5c v1.4.12.
|
|||
sha256 7507913ba169c103ab67bc51bec31cd977d4348d7bc842da32b7eab5f930a14b v1.5.10.tar.gz
|
||||
sha256 02b79d5e2b07b5e64cd28f1fe84395ee11eef95fc49fd923a9ab93022b148be6 v1.5.11.tar.gz
|
||||
sha256 f422e21e35705d1e741c1f3280813e43f811eaff4dcc5cdafac8b8952b15f468 v1.6.4.tar.gz
|
||||
sha256 27afb673c20d53aa5c31aec07b38eb7e4dc911e7e1f0c76fac9513bbf070bd24 v1.6.6.tar.gz
|
||||
sha256 f5f938513c28377f64f85e84f2750d39f26b01262f3a062b7e8ce35b560ca407 v1.6.8.tar.gz
|
||||
|
|
|
@ -3,8 +3,8 @@
|
|||
# containerd
|
||||
#
|
||||
################################################################################
|
||||
CONTAINERD_BIN_VERSION = v1.6.4
|
||||
CONTAINERD_BIN_COMMIT = 212e8b6fa2f44b9c21b2798135fc6fb7c53efc16
|
||||
CONTAINERD_BIN_VERSION = v1.6.8
|
||||
CONTAINERD_BIN_COMMIT = 9cd3357b7fd7218e4aec3eae239db1f68a5a6ec6
|
||||
CONTAINERD_BIN_SITE = https://github.com/containerd/containerd/archive
|
||||
CONTAINERD_BIN_SOURCE = $(CONTAINERD_BIN_VERSION).tar.gz
|
||||
CONTAINERD_BIN_DEPENDENCIES = host-go libgpgme
|
||||
|
@ -54,6 +54,9 @@ define CONTAINERD_BIN_INSTALL_TARGET_CMDS
|
|||
$(INSTALL) -Dm644 \
|
||||
$(CONTAINERD_BIN_PKGDIR)/config.toml \
|
||||
$(TARGET_DIR)/etc/containerd/config.toml
|
||||
$(INSTALL) -Dm644 \
|
||||
$(CONTAINERD_BIN_PKGDIR)/containerd_docker_io_hosts.toml \
|
||||
$(TARGET_DIR)/etc/containerd/certs.d/docker.io/hosts.toml
|
||||
endef
|
||||
|
||||
define CONTAINERD_BIN_INSTALL_INIT_SYSTEMD
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
server = "https://registry-1.docker.io"
|
|
@ -1,3 +1,4 @@
|
|||
sha256 4acd7605a0cb95a6ad50314d1f2497b92ee0f07382062d0c18a5434c1a3b9513 542e27dee12db61d6e96d2a83a20359474a5efa2.tar.gz
|
||||
sha256 b2a082a8846ac74b8482ee6353d480cea0dec017bbec2b59b16e3f91efa2f5ca eb0c48ef49856f7d098ec005ddebcae197e08e49.tar.gz
|
||||
sha256 ceb99430633f75f354c0e9fea1f3cf0e5138ac5ee3c2691a1a70811fd2feeeef a4d1895a2659ea9974bd7528a706592ab8b74181.tar.gz
|
||||
sha256 cb90ff5fd4de69cc9cf2a63408d42b605f1d4e70b92012729c0a3bd9a4cfa197 0737013d3c48992724283d151e8a2a767a1839e9.tar.gz
|
||||
|
|
|
@ -4,22 +4,20 @@
|
|||
#
|
||||
################################################################################
|
||||
|
||||
# As of 2022-02-03
|
||||
CRI_DOCKERD_VER = 0.2.0
|
||||
CRI_DOCKERD_REV = a4d1895
|
||||
CRI_DOCKERD_VERSION = a4d1895a2659ea9974bd7528a706592ab8b74181
|
||||
# As of 2022-06-09
|
||||
CRI_DOCKERD_VER = 0.2.2
|
||||
CRI_DOCKERD_REV = 0737013
|
||||
CRI_DOCKERD_VERSION = 0737013d3c48992724283d151e8a2a767a1839e9
|
||||
CRI_DOCKERD_SITE = https://github.com/Mirantis/cri-dockerd/archive
|
||||
CRI_DOCKERD_SOURCE = $(CRI_DOCKERD_VERSION).tar.gz
|
||||
|
||||
CRI_DOCKERD_DEPENDENCIES = host-go
|
||||
|
||||
CRI_DOCKERD_GOPATH = $(@D)/_output
|
||||
CRI_DOCKERD_ENV = \
|
||||
$(GO_TARGET_ENV) \
|
||||
CGO_ENABLED=0 \
|
||||
GO111MODULE=on \
|
||||
GOPATH="$(CRI_DOCKERD_GOPATH)" \
|
||||
GOBIN="$(CRI_DOCKERD_GOPATH)/bin" \
|
||||
PATH=$(CRI_DOCKERD_GOPATH)/bin:$(BR_PATH) \
|
||||
GOARCH=amd64
|
||||
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
[crio.image]
|
||||
# pause_image = ""
|
||||
|
||||
[crio.network]
|
||||
# cni_default_network = ""
|
||||
|
||||
[crio.runtime]
|
||||
# cgroup_manager = ""
|
|
@ -1,9 +0,0 @@
|
|||
|
||||
#if !defined(CONFIG_H)
|
||||
#define CONFIG_H
|
||||
|
||||
#define BUF_SIZE 8192
|
||||
#define STDIO_BUF_SIZE 8192
|
||||
#define DEFAULT_SOCKET_PATH "/var/run/crio"
|
||||
|
||||
#endif // CONFIG_H
|
|
@ -1,20 +0,0 @@
|
|||
[Unit]
|
||||
Description=CRI-O Auto Update Script
|
||||
Before=crio.service
|
||||
After=minikube-automount.service
|
||||
Requires=minikube-automount.service
|
||||
RequiresMountsFor=/var/lib/containers
|
||||
|
||||
[Service]
|
||||
EnvironmentFile=-/etc/sysconfig/crio
|
||||
EnvironmentFile=-/etc/sysconfig/crio.minikube
|
||||
EnvironmentFile=/var/run/minikube/env
|
||||
ExecStart=/usr/bin/crio \
|
||||
$CRIO_OPTIONS \
|
||||
$CRIO_MINIKUBE_OPTIONS \
|
||||
wipe
|
||||
|
||||
Type=oneshot
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
|
@ -1,409 +0,0 @@
|
|||
# The CRI-O configuration file specifies all of the available configuration
|
||||
# options and command-line flags for the crio(8) OCI Kubernetes Container Runtime
|
||||
# daemon, but in a TOML format that can be more easily modified and versioned.
|
||||
#
|
||||
# Please refer to crio.conf(5) for details of all configuration options.
|
||||
|
||||
# CRI-O supports partial configuration reload during runtime, which can be
|
||||
# done by sending SIGHUP to the running process. Currently supported options
|
||||
# are explicitly mentioned with: 'This option supports live configuration
|
||||
# reload'.
|
||||
|
||||
# CRI-O reads its storage defaults from the containers-storage.conf(5) file
|
||||
# located at /etc/containers/storage.conf. Modify this storage configuration if
|
||||
# you want to change the system's defaults. If you want to modify storage just
|
||||
# for CRI-O, you can change the storage configuration options here.
|
||||
[crio]
|
||||
|
||||
# Path to the "root directory". CRI-O stores all of its data, including
|
||||
# containers images, in this directory.
|
||||
root = "/var/lib/containers/storage"
|
||||
|
||||
# Path to the "run directory". CRI-O stores all of its state in this directory.
|
||||
runroot = "/var/run/containers/storage"
|
||||
|
||||
# Storage driver used to manage the storage of images and containers. Please
|
||||
# refer to containers-storage.conf(5) to see all available storage drivers.
|
||||
storage_driver = "overlay"
|
||||
|
||||
# List to pass options to the storage driver. Please refer to
|
||||
# containers-storage.conf(5) to see all available storage options.
|
||||
#storage_option = [
|
||||
# "overlay.mountopt=nodev,metacopy=on",
|
||||
#]
|
||||
|
||||
# The default log directory where all logs will go unless directly specified by
|
||||
# the kubelet. The log directory specified must be an absolute directory.
|
||||
log_dir = "/var/log/crio/pods"
|
||||
|
||||
# Location for CRI-O to lay down the temporary version file.
|
||||
# It is used to check if crio wipe should wipe containers, which should
|
||||
# always happen on a node reboot
|
||||
version_file = "/var/run/crio/version"
|
||||
|
||||
# Location for CRI-O to lay down the persistent version file.
|
||||
# It is used to check if crio wipe should wipe images, which should
|
||||
# only happen when CRI-O has been upgraded
|
||||
version_file_persist = "/var/lib/crio/version"
|
||||
|
||||
# The crio.api table contains settings for the kubelet/gRPC interface.
|
||||
[crio.api]
|
||||
|
||||
# Path to AF_LOCAL socket on which CRI-O will listen.
|
||||
listen = "/var/run/crio/crio.sock"
|
||||
|
||||
# IP address on which the stream server will listen.
|
||||
stream_address = "127.0.0.1"
|
||||
|
||||
# The port on which the stream server will listen. If the port is set to "0", then
|
||||
# CRI-O will allocate a random free port number.
|
||||
stream_port = "0"
|
||||
|
||||
# Enable encrypted TLS transport of the stream server.
|
||||
stream_enable_tls = false
|
||||
|
||||
# Path to the x509 certificate file used to serve the encrypted stream. This
|
||||
# file can change, and CRI-O will automatically pick up the changes within 5
|
||||
# minutes.
|
||||
stream_tls_cert = ""
|
||||
|
||||
# Path to the key file used to serve the encrypted stream. This file can
|
||||
# change and CRI-O will automatically pick up the changes within 5 minutes.
|
||||
stream_tls_key = ""
|
||||
|
||||
# Path to the x509 CA(s) file used to verify and authenticate client
|
||||
# communication with the encrypted stream. This file can change and CRI-O will
|
||||
# automatically pick up the changes within 5 minutes.
|
||||
stream_tls_ca = ""
|
||||
|
||||
# Maximum grpc send message size in bytes. If not set or <=0, then CRI-O will default to 16 * 1024 * 1024.
|
||||
grpc_max_send_msg_size = 16777216
|
||||
|
||||
# Maximum grpc receive message size. If not set or <= 0, then CRI-O will default to 16 * 1024 * 1024.
|
||||
grpc_max_recv_msg_size = 16777216
|
||||
|
||||
# The crio.runtime table contains settings pertaining to the OCI runtime used
|
||||
# and options for how to set up and manage the OCI runtime.
|
||||
[crio.runtime]
|
||||
|
||||
# A list of ulimits to be set in containers by default, specified as
|
||||
# "<ulimit name>=<soft limit>:<hard limit>", for example:
|
||||
# "nofile=1024:2048"
|
||||
# If nothing is set here, settings will be inherited from the CRI-O daemon
|
||||
#default_ulimits = [
|
||||
#]
|
||||
|
||||
# If true, the runtime will not use pivot_root, but instead use MS_MOVE.
|
||||
no_pivot = false
|
||||
|
||||
# decryption_keys_path is the path where the keys required for
|
||||
# image decryption are stored. This option supports live configuration reload.
|
||||
decryption_keys_path = "/etc/crio/keys/"
|
||||
|
||||
# Path to the conmon binary, used for monitoring the OCI runtime.
|
||||
# Will be searched for using $PATH if empty.
|
||||
conmon = "/usr/libexec/crio/conmon"
|
||||
|
||||
# Cgroup setting for conmon
|
||||
conmon_cgroup = "system.slice"
|
||||
|
||||
# Environment variable list for the conmon process, used for passing necessary
|
||||
# environment variables to conmon or the runtime.
|
||||
conmon_env = [
|
||||
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
|
||||
]
|
||||
|
||||
# Additional environment variables to set for all the
|
||||
# containers. These are overridden if set in the
|
||||
# container image spec or in the container runtime configuration.
|
||||
default_env = [
|
||||
]
|
||||
|
||||
# If true, SELinux will be used for pod separation on the host.
|
||||
selinux = false
|
||||
|
||||
# Path to the seccomp.json profile which is used as the default seccomp profile
|
||||
# for the runtime. If not specified, then the internal default seccomp profile
|
||||
# will be used. This option supports live configuration reload.
|
||||
seccomp_profile = ""
|
||||
|
||||
# Changes the meaning of an empty seccomp profile. By default
|
||||
# (and according to CRI spec), an empty profile means unconfined.
|
||||
# This option tells CRI-O to treat an empty profile as the default profile,
|
||||
# which might increase security.
|
||||
seccomp_use_default_when_empty = false
|
||||
|
||||
# Used to change the name of the default AppArmor profile of CRI-O. The default
|
||||
# profile name is "crio-default". This profile only takes effect if the user
|
||||
# does not specify a profile via the Kubernetes Pod's metadata annotation. If
|
||||
# the profile is set to "unconfined", then this equals to disabling AppArmor.
|
||||
# This option supports live configuration reload.
|
||||
apparmor_profile = "crio-default"
|
||||
|
||||
# Cgroup management implementation used for the runtime.
|
||||
cgroup_manager = "systemd"
|
||||
|
||||
# Specify whether the image pull must be performed in a separate cgroup.
|
||||
separate_pull_cgroup = ""
|
||||
|
||||
# List of default capabilities for containers. If it is empty or commented out,
|
||||
# only the capabilities defined in the containers json file by the user/kube
|
||||
# will be added.
|
||||
default_capabilities = [
|
||||
"CHOWN",
|
||||
"DAC_OVERRIDE",
|
||||
"FSETID",
|
||||
"FOWNER",
|
||||
"SETGID",
|
||||
"SETUID",
|
||||
"SETPCAP",
|
||||
"NET_BIND_SERVICE",
|
||||
"KILL",
|
||||
]
|
||||
|
||||
# List of default sysctls. If it is empty or commented out, only the sysctls
|
||||
# defined in the container json file by the user/kube will be added.
|
||||
default_sysctls = [
|
||||
]
|
||||
|
||||
# List of additional devices. specified as
|
||||
# "<device-on-host>:<device-on-container>:<permissions>", for example: "--device=/dev/sdc:/dev/xvdc:rwm".
|
||||
#If it is empty or commented out, only the devices
|
||||
# defined in the container json file by the user/kube will be added.
|
||||
additional_devices = [
|
||||
]
|
||||
|
||||
# Path to OCI hooks directories for automatically executed hooks. If one of the
|
||||
# directories does not exist, then CRI-O will automatically skip them.
|
||||
hooks_dir = [
|
||||
"/usr/share/containers/oci/hooks.d",
|
||||
]
|
||||
|
||||
# Path to the file specifying the defaults mounts for each container. The
|
||||
# format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads
|
||||
# its default mounts from the following two files:
|
||||
#
|
||||
# 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the
|
||||
# override file, where users can either add in their own default mounts, or
|
||||
# override the default mounts shipped with the package.
|
||||
#
|
||||
# 2) /usr/share/containers/mounts.conf: This is the default file read for
|
||||
# mounts. If you want CRI-O to read from a different, specific mounts file,
|
||||
# you can change the default_mounts_file. Note, if this is done, CRI-O will
|
||||
# only add mounts it finds in this file.
|
||||
#
|
||||
#default_mounts_file = ""
|
||||
|
||||
# Maximum number of processes allowed in a container.
|
||||
pids_limit = 1024
|
||||
|
||||
# Maximum sized allowed for the container log file. Negative numbers indicate
|
||||
# that no size limit is imposed. If it is positive, it must be >= 8192 to
|
||||
# match/exceed conmon's read buffer. The file is truncated and re-opened so the
|
||||
# limit is never exceeded.
|
||||
log_size_max = -1
|
||||
|
||||
# Whether container output should be logged to journald in addition to the kuberentes log file
|
||||
log_to_journald = false
|
||||
|
||||
# Path to directory in which container exit files are written to by conmon.
|
||||
container_exits_dir = "/var/run/crio/exits"
|
||||
|
||||
# Path to directory for container attach sockets.
|
||||
container_attach_socket_dir = "/var/run/crio"
|
||||
|
||||
# The prefix to use for the source of the bind mounts.
|
||||
bind_mount_prefix = ""
|
||||
|
||||
# If set to true, all containers will run in read-only mode.
|
||||
read_only = false
|
||||
|
||||
# Changes the verbosity of the logs based on the level it is set to. Options
|
||||
# are fatal, panic, error, warn, info, debug and trace. This option supports
|
||||
# live configuration reload.
|
||||
log_level = "info"
|
||||
|
||||
# Filter the log messages by the provided regular expression.
|
||||
# This option supports live configuration reload.
|
||||
log_filter = ""
|
||||
|
||||
# The UID mappings for the user namespace of each container. A range is
|
||||
# specified in the form containerUID:HostUID:Size. Multiple ranges must be
|
||||
# separated by comma.
|
||||
uid_mappings = ""
|
||||
|
||||
# The GID mappings for the user namespace of each container. A range is
|
||||
# specified in the form containerGID:HostGID:Size. Multiple ranges must be
|
||||
# separated by comma.
|
||||
gid_mappings = ""
|
||||
|
||||
# The minimal amount of time in seconds to wait before issuing a timeout
|
||||
# regarding the proper termination of the container. The lowest possible
|
||||
# value is 30s, whereas lower values are not considered by CRI-O.
|
||||
ctr_stop_timeout = 30
|
||||
|
||||
# manage_ns_lifecycle determines whether we pin and remove namespaces
|
||||
# and manage their lifecycle.
|
||||
# This option is being deprecated, and will be unconditionally true in the future.
|
||||
manage_ns_lifecycle = true
|
||||
|
||||
# drop_infra_ctr determines whether CRI-O drops the infra container
|
||||
# when a pod does not have a private PID namespace, and does not use
|
||||
# a kernel separating runtime (like kata).
|
||||
# It requires manage_ns_lifecycle to be true.
|
||||
drop_infra_ctr = false
|
||||
|
||||
# The directory where the state of the managed namespaces gets tracked.
|
||||
# Only used when manage_ns_lifecycle is true.
|
||||
namespaces_dir = "/var/run"
|
||||
|
||||
# pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle
|
||||
pinns_path = "/usr/bin/pinns"
|
||||
|
||||
# default_runtime is the _name_ of the OCI runtime to be used as the default.
|
||||
# The name is matched against the runtimes map below. If this value is changed,
|
||||
# the corresponding existing entry from the runtimes map below will be ignored.
|
||||
default_runtime = "runc"
|
||||
|
||||
# The "crio.runtime.runtimes" table defines a list of OCI compatible runtimes.
|
||||
# The runtime to use is picked based on the runtime_handler provided by the CRI.
|
||||
# If no runtime_handler is provided, the runtime will be picked based on the level
|
||||
# of trust of the workload. Each entry in the table should follow the format:
|
||||
#
|
||||
#[crio.runtime.runtimes.runtime-handler]
|
||||
# runtime_path = "/path/to/the/executable"
|
||||
# runtime_type = "oci"
|
||||
# runtime_root = "/path/to/the/root"
|
||||
# privileged_without_host_devices = false
|
||||
# allowed_annotations = []
|
||||
# Where:
|
||||
# - runtime-handler: name used to identify the runtime
|
||||
# - runtime_path (optional, string): absolute path to the runtime executable in
|
||||
# the host filesystem. If omitted, the runtime-handler identifier should match
|
||||
# the runtime executable name, and the runtime executable should be placed
|
||||
# in $PATH.
|
||||
# - runtime_type (optional, string): type of runtime, one of: "oci", "vm". If
|
||||
# omitted, an "oci" runtime is assumed.
|
||||
# - runtime_root (optional, string): root directory for storage of containers
|
||||
# state.
|
||||
# - privileged_without_host_devices (optional, bool): an option for restricting
|
||||
# host devices from being passed to privileged containers.
|
||||
# - allowed_annotations (optional, array of strings): an option for specifying
|
||||
# a list of experimental annotations that this runtime handler is allowed to process.
|
||||
# The currently recognized values are:
|
||||
# "io.kubernetes.cri-o.userns-mode" for configuring a user namespace for the pod.
|
||||
# "io.kubernetes.cri-o.Devices" for configuring devices for the pod.
|
||||
# "io.kubernetes.cri-o.ShmSize" for configuring the size of /dev/shm.
|
||||
|
||||
|
||||
[crio.runtime.runtimes.runc]
|
||||
runtime_path = "/usr/bin/runc"
|
||||
runtime_type = "oci"
|
||||
runtime_root = "/run/runc"
|
||||
|
||||
|
||||
|
||||
|
||||
# crun is a fast and lightweight fully featured OCI runtime and C library for
|
||||
# running containers
|
||||
#[crio.runtime.runtimes.crun]
|
||||
|
||||
# Kata Containers is an OCI runtime, where containers are run inside lightweight
|
||||
# VMs. Kata provides additional isolation towards the host, minimizing the host attack
|
||||
# surface and mitigating the consequences of containers breakout.
|
||||
|
||||
# Kata Containers with the default configured VMM
|
||||
#[crio.runtime.runtimes.kata-runtime]
|
||||
|
||||
# Kata Containers with the QEMU VMM
|
||||
#[crio.runtime.runtimes.kata-qemu]
|
||||
|
||||
# Kata Containers with the Firecracker VMM
|
||||
#[crio.runtime.runtimes.kata-fc]
|
||||
|
||||
# The crio.image table contains settings pertaining to the management of OCI images.
|
||||
#
|
||||
# CRI-O reads its configured registries defaults from the system wide
|
||||
# containers-registries.conf(5) located in /etc/containers/registries.conf. If
|
||||
# you want to modify just CRI-O, you can change the registries configuration in
|
||||
# this file. Otherwise, leave insecure_registries and registries commented out to
|
||||
# use the system's defaults from /etc/containers/registries.conf.
|
||||
[crio.image]
|
||||
|
||||
# Default transport for pulling images from a remote container storage.
|
||||
default_transport = "docker://"
|
||||
|
||||
# The path to a file containing credentials necessary for pulling images from
|
||||
# secure registries. The file is similar to that of /var/lib/kubelet/config.json
|
||||
global_auth_file = ""
|
||||
|
||||
# The image used to instantiate infra containers.
|
||||
# This option supports live configuration reload.
|
||||
pause_image = "k8s.gcr.io/pause:3.2"
|
||||
|
||||
# The path to a file containing credentials specific for pulling the pause_image from
|
||||
# above. The file is similar to that of /var/lib/kubelet/config.json
|
||||
# This option supports live configuration reload.
|
||||
pause_image_auth_file = ""
|
||||
|
||||
# The command to run to have a container stay in the paused state.
|
||||
# When explicitly set to "", it will fallback to the entrypoint and command
|
||||
# specified in the pause image. When commented out, it will fallback to the
|
||||
# default: "/pause". This option supports live configuration reload.
|
||||
pause_command = "/pause"
|
||||
|
||||
# Path to the file which decides what sort of policy we use when deciding
|
||||
# whether or not to trust an image that we've pulled. It is not recommended that
|
||||
# this option be used, as the default behavior of using the system-wide default
|
||||
# policy (i.e., /etc/containers/policy.json) is most often preferred. Please
|
||||
# refer to containers-policy.json(5) for more details.
|
||||
signature_policy = ""
|
||||
|
||||
# List of registries to skip TLS verification for pulling images. Please
|
||||
# consider configuring the registries via /etc/containers/registries.conf before
|
||||
# changing them here.
|
||||
#insecure_registries = "[]"
|
||||
|
||||
# Controls how image volumes are handled. The valid values are mkdir, bind and
|
||||
# ignore; the latter will ignore volumes entirely.
|
||||
image_volumes = "mkdir"
|
||||
|
||||
# List of registries to be used when pulling an unqualified image (e.g.,
|
||||
# "alpine:latest"). By default, registries is set to "docker.io" for
|
||||
# compatibility reasons. Depending on your workload and usecase you may add more
|
||||
# registries (e.g., "quay.io", "registry.fedoraproject.org",
|
||||
# "registry.opensuse.org", etc.).
|
||||
registries = [
|
||||
"docker.io"
|
||||
]
|
||||
|
||||
# Temporary directory to use for storing big files
|
||||
big_files_temporary_dir = ""
|
||||
|
||||
# The crio.network table containers settings pertaining to the management of
|
||||
# CNI plugins.
|
||||
[crio.network]
|
||||
|
||||
# The default CNI network name to be selected. If not set or "", then
|
||||
# CRI-O will pick-up the first one found in network_dir.
|
||||
# cni_default_network = ""
|
||||
|
||||
# Path to the directory where CNI configuration files are located.
|
||||
network_dir = "/etc/cni/net.d/"
|
||||
|
||||
# Paths to directories where CNI plugin binaries are located.
|
||||
plugin_dirs = [
|
||||
"/opt/cni/bin/",
|
||||
]
|
||||
|
||||
# A necessary configuration for Prometheus based metrics retrieval
|
||||
[crio.metrics]
|
||||
|
||||
# Globally enable or disable metrics support.
|
||||
enable_metrics = true
|
||||
|
||||
# The port on which the metrics server will listen.
|
||||
metrics_port = 9090
|
||||
|
||||
# Local socket path to bind the metrics server to
|
||||
metrics_socket = ""
|
|
@ -1,408 +0,0 @@
|
|||
# The CRI-O configuration file specifies all of the available configuration
|
||||
# options and command-line flags for the crio(8) OCI Kubernetes Container Runtime
|
||||
# daemon, but in a TOML format that can be more easily modified and versioned.
|
||||
#
|
||||
# Please refer to crio.conf(5) for details of all configuration options.
|
||||
|
||||
# CRI-O supports partial configuration reload during runtime, which can be
|
||||
# done by sending SIGHUP to the running process. Currently supported options
|
||||
# are explicitly mentioned with: 'This option supports live configuration
|
||||
# reload'.
|
||||
|
||||
# CRI-O reads its storage defaults from the containers-storage.conf(5) file
|
||||
# located at /etc/containers/storage.conf. Modify this storage configuration if
|
||||
# you want to change the system's defaults. If you want to modify storage just
|
||||
# for CRI-O, you can change the storage configuration options here.
|
||||
[crio]
|
||||
|
||||
# Path to the "root directory". CRI-O stores all of its data, including
|
||||
# containers images, in this directory.
|
||||
#root = "/var/lib/containers/storage"
|
||||
|
||||
# Path to the "run directory". CRI-O stores all of its state in this directory.
|
||||
#runroot = "/var/run/containers/storage"
|
||||
|
||||
# Storage driver used to manage the storage of images and containers. Please
|
||||
# refer to containers-storage.conf(5) to see all available storage drivers.
|
||||
#storage_driver = ""
|
||||
|
||||
# List to pass options to the storage driver. Please refer to
|
||||
# containers-storage.conf(5) to see all available storage options.
|
||||
#storage_option = [
|
||||
# "overlay.mountopt=nodev,metacopy=on",
|
||||
#]
|
||||
|
||||
# The default log directory where all logs will go unless directly specified by
|
||||
# the kubelet. The log directory specified must be an absolute directory.
|
||||
log_dir = "/var/log/crio/pods"
|
||||
|
||||
# Location for CRI-O to lay down the temporary version file.
|
||||
# It is used to check if crio wipe should wipe containers, which should
|
||||
# always happen on a node reboot
|
||||
version_file = "/var/run/crio/version"
|
||||
|
||||
# Location for CRI-O to lay down the persistent version file.
|
||||
# It is used to check if crio wipe should wipe images, which should
|
||||
# only happen when CRI-O has been upgraded
|
||||
version_file_persist = "/var/lib/crio/version"
|
||||
|
||||
# The crio.api table contains settings for the kubelet/gRPC interface.
|
||||
[crio.api]
|
||||
|
||||
# Path to AF_LOCAL socket on which CRI-O will listen.
|
||||
listen = "/var/run/crio/crio.sock"
|
||||
|
||||
# IP address on which the stream server will listen.
|
||||
stream_address = "127.0.0.1"
|
||||
|
||||
# The port on which the stream server will listen. If the port is set to "0", then
|
||||
# CRI-O will allocate a random free port number.
|
||||
stream_port = "0"
|
||||
|
||||
# Enable encrypted TLS transport of the stream server.
|
||||
stream_enable_tls = false
|
||||
|
||||
# Path to the x509 certificate file used to serve the encrypted stream. This
|
||||
# file can change, and CRI-O will automatically pick up the changes within 5
|
||||
# minutes.
|
||||
stream_tls_cert = ""
|
||||
|
||||
# Path to the key file used to serve the encrypted stream. This file can
|
||||
# change and CRI-O will automatically pick up the changes within 5 minutes.
|
||||
stream_tls_key = ""
|
||||
|
||||
# Path to the x509 CA(s) file used to verify and authenticate client
|
||||
# communication with the encrypted stream. This file can change and CRI-O will
|
||||
# automatically pick up the changes within 5 minutes.
|
||||
stream_tls_ca = ""
|
||||
|
||||
# Maximum grpc send message size in bytes. If not set or <=0, then CRI-O will default to 16 * 1024 * 1024.
|
||||
grpc_max_send_msg_size = 16777216
|
||||
|
||||
# Maximum grpc receive message size. If not set or <= 0, then CRI-O will default to 16 * 1024 * 1024.
|
||||
grpc_max_recv_msg_size = 16777216
|
||||
|
||||
# The crio.runtime table contains settings pertaining to the OCI runtime used
|
||||
# and options for how to set up and manage the OCI runtime.
|
||||
[crio.runtime]
|
||||
|
||||
# A list of ulimits to be set in containers by default, specified as
|
||||
# "<ulimit name>=<soft limit>:<hard limit>", for example:
|
||||
# "nofile=1024:2048"
|
||||
# If nothing is set here, settings will be inherited from the CRI-O daemon
|
||||
#default_ulimits = [
|
||||
#]
|
||||
|
||||
# If true, the runtime will not use pivot_root, but instead use MS_MOVE.
|
||||
no_pivot = false
|
||||
|
||||
# decryption_keys_path is the path where the keys required for
|
||||
# image decryption are stored. This option supports live configuration reload.
|
||||
decryption_keys_path = "/etc/crio/keys/"
|
||||
|
||||
# Path to the conmon binary, used for monitoring the OCI runtime.
|
||||
# Will be searched for using $PATH if empty.
|
||||
conmon = ""
|
||||
|
||||
# Cgroup setting for conmon
|
||||
conmon_cgroup = "system.slice"
|
||||
|
||||
# Environment variable list for the conmon process, used for passing necessary
|
||||
# environment variables to conmon or the runtime.
|
||||
conmon_env = [
|
||||
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
|
||||
]
|
||||
|
||||
# Additional environment variables to set for all the
|
||||
# containers. These are overridden if set in the
|
||||
# container image spec or in the container runtime configuration.
|
||||
default_env = [
|
||||
]
|
||||
|
||||
# If true, SELinux will be used for pod separation on the host.
|
||||
selinux = false
|
||||
|
||||
# Path to the seccomp.json profile which is used as the default seccomp profile
|
||||
# for the runtime. If not specified, then the internal default seccomp profile
|
||||
# will be used. This option supports live configuration reload.
|
||||
seccomp_profile = ""
|
||||
|
||||
# Changes the meaning of an empty seccomp profile. By default
|
||||
# (and according to CRI spec), an empty profile means unconfined.
|
||||
# This option tells CRI-O to treat an empty profile as the default profile,
|
||||
# which might increase security.
|
||||
seccomp_use_default_when_empty = false
|
||||
|
||||
# Used to change the name of the default AppArmor profile of CRI-O. The default
|
||||
# profile name is "crio-default". This profile only takes effect if the user
|
||||
# does not specify a profile via the Kubernetes Pod's metadata annotation. If
|
||||
# the profile is set to "unconfined", then this equals to disabling AppArmor.
|
||||
# This option supports live configuration reload.
|
||||
apparmor_profile = "crio-default"
|
||||
|
||||
# Cgroup management implementation used for the runtime.
|
||||
cgroup_manager = "systemd"
|
||||
|
||||
# Specify whether the image pull must be performed in a separate cgroup.
|
||||
separate_pull_cgroup = ""
|
||||
|
||||
# List of default capabilities for containers. If it is empty or commented out,
|
||||
# only the capabilities defined in the containers json file by the user/kube
|
||||
# will be added.
|
||||
default_capabilities = [
|
||||
"CHOWN",
|
||||
"DAC_OVERRIDE",
|
||||
"FSETID",
|
||||
"FOWNER",
|
||||
"SETGID",
|
||||
"SETUID",
|
||||
"SETPCAP",
|
||||
"NET_BIND_SERVICE",
|
||||
"KILL",
|
||||
]
|
||||
|
||||
# List of default sysctls. If it is empty or commented out, only the sysctls
|
||||
# defined in the container json file by the user/kube will be added.
|
||||
default_sysctls = [
|
||||
]
|
||||
|
||||
# List of additional devices. specified as
|
||||
# "<device-on-host>:<device-on-container>:<permissions>", for example: "--device=/dev/sdc:/dev/xvdc:rwm".
|
||||
#If it is empty or commented out, only the devices
|
||||
# defined in the container json file by the user/kube will be added.
|
||||
additional_devices = [
|
||||
]
|
||||
|
||||
# Path to OCI hooks directories for automatically executed hooks. If one of the
|
||||
# directories does not exist, then CRI-O will automatically skip them.
|
||||
hooks_dir = [
|
||||
"/usr/share/containers/oci/hooks.d",
|
||||
]
|
||||
|
||||
# Path to the file specifying the defaults mounts for each container. The
|
||||
# format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads
|
||||
# its default mounts from the following two files:
|
||||
#
|
||||
# 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the
|
||||
# override file, where users can either add in their own default mounts, or
|
||||
# override the default mounts shipped with the package.
|
||||
#
|
||||
# 2) /usr/share/containers/mounts.conf: This is the default file read for
|
||||
# mounts. If you want CRI-O to read from a different, specific mounts file,
|
||||
# you can change the default_mounts_file. Note, if this is done, CRI-O will
|
||||
# only add mounts it finds in this file.
|
||||
#
|
||||
#default_mounts_file = ""
|
||||
|
||||
# Maximum number of processes allowed in a container.
|
||||
pids_limit = 1024
|
||||
|
||||
# Maximum sized allowed for the container log file. Negative numbers indicate
|
||||
# that no size limit is imposed. If it is positive, it must be >= 8192 to
|
||||
# match/exceed conmon's read buffer. The file is truncated and re-opened so the
|
||||
# limit is never exceeded.
|
||||
log_size_max = -1
|
||||
|
||||
# Whether container output should be logged to journald in addition to the kuberentes log file
|
||||
log_to_journald = false
|
||||
|
||||
# Path to directory in which container exit files are written to by conmon.
|
||||
container_exits_dir = "/var/run/crio/exits"
|
||||
|
||||
# Path to directory for container attach sockets.
|
||||
container_attach_socket_dir = "/var/run/crio"
|
||||
|
||||
# The prefix to use for the source of the bind mounts.
|
||||
bind_mount_prefix = ""
|
||||
|
||||
# If set to true, all containers will run in read-only mode.
|
||||
read_only = false
|
||||
|
||||
# Changes the verbosity of the logs based on the level it is set to. Options
|
||||
# are fatal, panic, error, warn, info, debug and trace. This option supports
|
||||
# live configuration reload.
|
||||
log_level = "info"
|
||||
|
||||
# Filter the log messages by the provided regular expression.
|
||||
# This option supports live configuration reload.
|
||||
log_filter = ""
|
||||
|
||||
# The UID mappings for the user namespace of each container. A range is
|
||||
# specified in the form containerUID:HostUID:Size. Multiple ranges must be
|
||||
# separated by comma.
|
||||
uid_mappings = ""
|
||||
|
||||
# The GID mappings for the user namespace of each container. A range is
|
||||
# specified in the form containerGID:HostGID:Size. Multiple ranges must be
|
||||
# separated by comma.
|
||||
gid_mappings = ""
|
||||
|
||||
# The minimal amount of time in seconds to wait before issuing a timeout
|
||||
# regarding the proper termination of the container. The lowest possible
|
||||
# value is 30s, whereas lower values are not considered by CRI-O.
|
||||
ctr_stop_timeout = 30
|
||||
|
||||
# manage_ns_lifecycle determines whether we pin and remove namespaces
|
||||
# and manage their lifecycle.
|
||||
# This option is being deprecated, and will be unconditionally true in the future.
|
||||
manage_ns_lifecycle = true
|
||||
|
||||
# drop_infra_ctr determines whether CRI-O drops the infra container
|
||||
# when a pod does not have a private PID namespace, and does not use
|
||||
# a kernel separating runtime (like kata).
|
||||
# It requires manage_ns_lifecycle to be true.
|
||||
drop_infra_ctr = false
|
||||
|
||||
# The directory where the state of the managed namespaces gets tracked.
|
||||
# Only used when manage_ns_lifecycle is true.
|
||||
namespaces_dir = "/var/run"
|
||||
|
||||
# pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle
|
||||
pinns_path = ""
|
||||
|
||||
# default_runtime is the _name_ of the OCI runtime to be used as the default.
|
||||
# The name is matched against the runtimes map below. If this value is changed,
|
||||
# the corresponding existing entry from the runtimes map below will be ignored.
|
||||
default_runtime = "runc"
|
||||
|
||||
# The "crio.runtime.runtimes" table defines a list of OCI compatible runtimes.
|
||||
# The runtime to use is picked based on the runtime_handler provided by the CRI.
|
||||
# If no runtime_handler is provided, the runtime will be picked based on the level
|
||||
# of trust of the workload. Each entry in the table should follow the format:
|
||||
#
|
||||
#[crio.runtime.runtimes.runtime-handler]
|
||||
# runtime_path = "/path/to/the/executable"
|
||||
# runtime_type = "oci"
|
||||
# runtime_root = "/path/to/the/root"
|
||||
# privileged_without_host_devices = false
|
||||
# allowed_annotations = []
|
||||
# Where:
|
||||
# - runtime-handler: name used to identify the runtime
|
||||
# - runtime_path (optional, string): absolute path to the runtime executable in
|
||||
# the host filesystem. If omitted, the runtime-handler identifier should match
|
||||
# the runtime executable name, and the runtime executable should be placed
|
||||
# in $PATH.
|
||||
# - runtime_type (optional, string): type of runtime, one of: "oci", "vm". If
|
||||
# omitted, an "oci" runtime is assumed.
|
||||
# - runtime_root (optional, string): root directory for storage of containers
|
||||
# state.
|
||||
# - privileged_without_host_devices (optional, bool): an option for restricting
|
||||
# host devices from being passed to privileged containers.
|
||||
# - allowed_annotations (optional, array of strings): an option for specifying
|
||||
# a list of experimental annotations that this runtime handler is allowed to process.
|
||||
# The currently recognized values are:
|
||||
# "io.kubernetes.cri-o.userns-mode" for configuring a user namespace for the pod.
|
||||
# "io.kubernetes.cri-o.Devices" for configuring devices for the pod.
|
||||
# "io.kubernetes.cri-o.ShmSize" for configuring the size of /dev/shm.
|
||||
|
||||
|
||||
[crio.runtime.runtimes.runc]
|
||||
runtime_path = ""
|
||||
runtime_type = "oci"
|
||||
runtime_root = "/run/runc"
|
||||
|
||||
|
||||
|
||||
|
||||
# crun is a fast and lightweight fully featured OCI runtime and C library for
|
||||
# running containers
|
||||
#[crio.runtime.runtimes.crun]
|
||||
|
||||
# Kata Containers is an OCI runtime, where containers are run inside lightweight
|
||||
# VMs. Kata provides additional isolation towards the host, minimizing the host attack
|
||||
# surface and mitigating the consequences of containers breakout.
|
||||
|
||||
# Kata Containers with the default configured VMM
|
||||
#[crio.runtime.runtimes.kata-runtime]
|
||||
|
||||
# Kata Containers with the QEMU VMM
|
||||
#[crio.runtime.runtimes.kata-qemu]
|
||||
|
||||
# Kata Containers with the Firecracker VMM
|
||||
#[crio.runtime.runtimes.kata-fc]
|
||||
|
||||
# The crio.image table contains settings pertaining to the management of OCI images.
|
||||
#
|
||||
# CRI-O reads its configured registries defaults from the system wide
|
||||
# containers-registries.conf(5) located in /etc/containers/registries.conf. If
|
||||
# you want to modify just CRI-O, you can change the registries configuration in
|
||||
# this file. Otherwise, leave insecure_registries and registries commented out to
|
||||
# use the system's defaults from /etc/containers/registries.conf.
|
||||
[crio.image]
|
||||
|
||||
# Default transport for pulling images from a remote container storage.
|
||||
default_transport = "docker://"
|
||||
|
||||
# The path to a file containing credentials necessary for pulling images from
|
||||
# secure registries. The file is similar to that of /var/lib/kubelet/config.json
|
||||
global_auth_file = ""
|
||||
|
||||
# The image used to instantiate infra containers.
|
||||
# This option supports live configuration reload.
|
||||
pause_image = "k8s.gcr.io/pause:3.2"
|
||||
|
||||
# The path to a file containing credentials specific for pulling the pause_image from
|
||||
# above. The file is similar to that of /var/lib/kubelet/config.json
|
||||
# This option supports live configuration reload.
|
||||
pause_image_auth_file = ""
|
||||
|
||||
# The command to run to have a container stay in the paused state.
|
||||
# When explicitly set to "", it will fallback to the entrypoint and command
|
||||
# specified in the pause image. When commented out, it will fallback to the
|
||||
# default: "/pause". This option supports live configuration reload.
|
||||
pause_command = "/pause"
|
||||
|
||||
# Path to the file which decides what sort of policy we use when deciding
|
||||
# whether or not to trust an image that we've pulled. It is not recommended that
|
||||
# this option be used, as the default behavior of using the system-wide default
|
||||
# policy (i.e., /etc/containers/policy.json) is most often preferred. Please
|
||||
# refer to containers-policy.json(5) for more details.
|
||||
signature_policy = ""
|
||||
|
||||
# List of registries to skip TLS verification for pulling images. Please
|
||||
# consider configuring the registries via /etc/containers/registries.conf before
|
||||
# changing them here.
|
||||
#insecure_registries = "[]"
|
||||
|
||||
# Controls how image volumes are handled. The valid values are mkdir, bind and
|
||||
# ignore; the latter will ignore volumes entirely.
|
||||
image_volumes = "mkdir"
|
||||
|
||||
# List of registries to be used when pulling an unqualified image (e.g.,
|
||||
# "alpine:latest"). By default, registries is set to "docker.io" for
|
||||
# compatibility reasons. Depending on your workload and usecase you may add more
|
||||
# registries (e.g., "quay.io", "registry.fedoraproject.org",
|
||||
# "registry.opensuse.org", etc.).
|
||||
#registries = [
|
||||
# ]
|
||||
|
||||
# Temporary directory to use for storing big files
|
||||
big_files_temporary_dir = ""
|
||||
|
||||
# The crio.network table containers settings pertaining to the management of
|
||||
# CNI plugins.
|
||||
[crio.network]
|
||||
|
||||
# The default CNI network name to be selected. If not set or "", then
|
||||
# CRI-O will pick-up the first one found in network_dir.
|
||||
# cni_default_network = ""
|
||||
|
||||
# Path to the directory where CNI configuration files are located.
|
||||
network_dir = "/etc/cni/net.d/"
|
||||
|
||||
# Paths to directories where CNI plugin binaries are located.
|
||||
plugin_dirs = [
|
||||
"/opt/cni/bin/",
|
||||
]
|
||||
|
||||
# A necessary configuration for Prometheus based metrics retrieval
|
||||
[crio.metrics]
|
||||
|
||||
# Globally enable or disable metrics support.
|
||||
enable_metrics = false
|
||||
|
||||
# The port on which the metrics server will listen.
|
||||
metrics_port = 9090
|
||||
|
||||
# Local socket path to bind the metrics server to
|
||||
metrics_socket = ""
|
|
@ -1,29 +0,0 @@
|
|||
[Unit]
|
||||
Description=Container Runtime Interface for OCI (CRI-O)
|
||||
Documentation=https://github.com/cri-o/cri-o
|
||||
Wants=network-online.target
|
||||
After=network-online.target minikube-automount.service
|
||||
Requires=minikube-automount.service
|
||||
After=crio-wipe.service
|
||||
Requires=crio-wipe.service
|
||||
|
||||
[Service]
|
||||
Type=notify
|
||||
EnvironmentFile=-/etc/sysconfig/crio
|
||||
EnvironmentFile=-/etc/sysconfig/crio.minikube
|
||||
EnvironmentFile=/var/run/minikube/env
|
||||
Environment=GOTRACEBACK=crash
|
||||
ExecStart=/usr/bin/crio \
|
||||
$CRIO_OPTIONS \
|
||||
$CRIO_MINIKUBE_OPTIONS
|
||||
ExecReload=/bin/kill -s HUP $MAINPID
|
||||
TasksMax=8192
|
||||
LimitNOFILE=1048576
|
||||
LimitNPROC=1048576
|
||||
LimitCORE=infinity
|
||||
OOMScoreAdjust=-999
|
||||
TimeoutStartSec=0
|
||||
Restart=on-abnormal
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
|
@ -1,7 +0,0 @@
|
|||
{
|
||||
"default": [
|
||||
{
|
||||
"type": "insecureAcceptAnything"
|
||||
}
|
||||
]
|
||||
}
|
|
@ -1,5 +0,0 @@
|
|||
[registries.search]
|
||||
registries = ['docker.io']
|
||||
|
||||
[registries.insecure]
|
||||
registries = []
|
|
@ -37,3 +37,5 @@ sha256 39edf7c8d773939ff5e4d318ae565691a9c7e754ed768e172757e58898fb7079 docker-
|
|||
sha256 7ca4aeeed86619909ae584ce3405da3766d495f98904ffbd9d859add26b83af5 docker-20.10.14.tgz
|
||||
sha256 9ccfc39305ae1d8882d18c9c431544fca82913d6df717409ac2244ac58c4f070 docker-20.10.15.tgz
|
||||
sha256 b43ac6c4d2f0b64e445c6564860e4fccd6331f4a61815a60642c7748b53c59ff docker-20.10.16.tgz
|
||||
sha256 969210917b5548621a2b541caf00f86cc6963c6cf0fb13265b9731c3b98974d9 docker-20.10.17.tgz
|
||||
sha256 0629b063fa3aa5660f3fb96f67edb0e20e92d5050b82403f95faf1c142177401 docker-20.10.18.tgz
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
#
|
||||
################################################################################
|
||||
|
||||
DOCKER_BIN_VERSION = 20.10.16
|
||||
DOCKER_BIN_VERSION = 20.10.18
|
||||
DOCKER_BIN_SITE = https://download.docker.com/linux/static/stable/x86_64
|
||||
DOCKER_BIN_SOURCE = docker-$(DOCKER_BIN_VERSION).tgz
|
||||
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
################################################################################
|
||||
|
||||
HYPERV_DAEMONS_VERSION = $(call qstrip,$(BR2_LINUX_KERNEL_VERSION))
|
||||
HYPERV_DAEMONS_SITE = https://www.kernel.org/pub/linux/kernel/v4.x
|
||||
HYPERV_DAEMONS_SITE = https://www.kernel.org/pub/linux/kernel/v5.x
|
||||
HYPERV_DAEMONS_SOURCE = linux-$(HYPERV_DAEMONS_VERSION).tar.xz
|
||||
|
||||
define HYPERV_DAEMONS_BUILD_CMDS
|
||||
|
|
|
@ -1,4 +0,0 @@
|
|||
[Socket]
|
||||
SocketMode=0660
|
||||
SocketUser=root
|
||||
SocketGroup=podman
|
|
@ -1 +0,0 @@
|
|||
d /run/podman 0770 root podman
|
|
@ -1,6 +0,0 @@
|
|||
sha256 a16846fe076aaf2c9ea2e854c3baba9fb838d916be7fb4b5be332e6c92d907d4 v1.9.3.tar.gz
|
||||
sha256 5ebaa6e0dbd7fd1863f70d2bc71dc8a94e195c3339c17e3cac4560c9ec5747f8 v2.1.1.tar.gz
|
||||
sha256 ec5473e51fa28f29af323473fc484f742dc7df23d06d8ba9f217f13382893a71 v2.2.0.tar.gz
|
||||
sha256 3212bad60d945c1169b27da03959f36d92d1d8964645c701a5a82a89118e96d1 v2.2.1.tar.gz
|
||||
sha256 5a0d42e03d15e32c5c54a147da5ef1b8928ec00982ac9e3f1edc82c5e614b6d2 v3.1.2.tar.gz
|
||||
sha256 b0c4f9a11eb500b1d440d5e51a6c0c632aa4ac458e2dc0362f50f999eb7fbf31 v3.4.2.tar.gz
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue