missing files
parent
e2ce45c6f0
commit
ac0c1bad42
|
@ -100,7 +100,7 @@ jobs:
|
|||
chmod a+x e2e-*
|
||||
chmod a+x minikube-*
|
||||
START_TIME=$(date -u +%s)
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--vm-driver=docker -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--driver=docker -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
END_TIME=$(date -u +%s)
|
||||
TIME_ELAPSED=$(($END_TIME-$START_TIME))
|
||||
min=$((${TIME_ELAPSED}/60))
|
||||
|
@ -168,7 +168,7 @@ jobs:
|
|||
chmod a+x e2e-*
|
||||
chmod a+x minikube-*
|
||||
START_TIME=$(date -u +%s)
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--vm-driver=docker -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--driver=docker -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
END_TIME=$(date -u +%s)
|
||||
TIME_ELAPSED=$(($END_TIME-$START_TIME))
|
||||
min=$((${TIME_ELAPSED}/60))
|
||||
|
@ -230,7 +230,7 @@ jobs:
|
|||
chmod a+x e2e-*
|
||||
chmod a+x minikube-*
|
||||
START_TIME=$(date -u +%s)
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome sudo -E ./e2e-linux-amd64 -minikube-start-args=--vm-driver=none -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome sudo -E ./e2e-linux-amd64 -minikube-start-args=--driver=none -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
END_TIME=$(date -u +%s)
|
||||
TIME_ELAPSED=$(($END_TIME-$START_TIME))
|
||||
min=$((${TIME_ELAPSED}/60))
|
||||
|
@ -292,7 +292,7 @@ jobs:
|
|||
chmod a+x e2e-*
|
||||
chmod a+x minikube-*
|
||||
START_TIME=$(date -u +%s)
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome sudo -E ./e2e-linux-amd64 -minikube-start-args=--vm-driver=none -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome sudo -E ./e2e-linux-amd64 -minikube-start-args=--driver=none -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
END_TIME=$(date -u +%s)
|
||||
TIME_ELAPSED=$(($END_TIME-$START_TIME))
|
||||
min=$((${TIME_ELAPSED}/60))
|
||||
|
@ -365,7 +365,7 @@ jobs:
|
|||
chmod a+x e2e-*
|
||||
chmod a+x minikube-*
|
||||
START_TIME=$(date -u +%s)
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome sudo -E ./e2e-linux-amd64 -minikube-start-args=--vm-driver=podman -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome sudo -E ./e2e-linux-amd64 -minikube-start-args=--driver=podman -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
|
||||
END_TIME=$(date -u +%s)
|
||||
TIME_ELAPSED=$(($END_TIME-$START_TIME))
|
||||
min=$((${TIME_ELAPSED}/60))
|
||||
|
|
10
Makefile
10
Makefile
|
@ -262,7 +262,7 @@ integration: out/minikube ## Trigger minikube integration test
|
|||
|
||||
.PHONY: integration-none-driver
|
||||
integration-none-driver: e2e-linux-$(GOARCH) out/minikube-linux-$(GOARCH) ## Trigger minikube none driver test
|
||||
sudo -E out/e2e-linux-$(GOARCH) -testdata-dir "test/integration/testdata" -minikube-start-args="--vm-driver=none" -test.v -test.timeout=60m -binary=out/minikube-linux-amd64 $(TEST_ARGS)
|
||||
sudo -E out/e2e-linux-$(GOARCH) -testdata-dir "test/integration/testdata" -minikube-start-args="--driver=none" -test.v -test.timeout=60m -binary=out/minikube-linux-amd64 $(TEST_ARGS)
|
||||
|
||||
.PHONY: integration-versioned
|
||||
integration-versioned: out/minikube ## Trigger minikube integration testing
|
||||
|
@ -623,13 +623,13 @@ kvm_in_docker:
|
|||
rm -f out/docker-machine-driver-kvm2
|
||||
$(call DOCKER,$(KVM_BUILD_IMAGE),/usr/bin/make out/docker-machine-driver-kvm2 COMMIT=$(COMMIT))
|
||||
|
||||
.PHONY: install-kvm-driver
|
||||
install-kvm-driver: out/docker-machine-driver-kvm2 ## Install KVM Driver
|
||||
.PHONY: install-kdriver
|
||||
install-kdriver: out/docker-machine-driver-kvm2 ## Install KVM Driver
|
||||
mkdir -p $(GOBIN)
|
||||
cp out/docker-machine-driver-kvm2 $(GOBIN)/docker-machine-driver-kvm2
|
||||
|
||||
.PHONY: release-kvm-driver
|
||||
release-kvm-driver: install-kvm-driver checksum ## Release KVM Driver
|
||||
.PHONY: release-kdriver
|
||||
release-kdriver: install-kdriver checksum ## Release KVM Driver
|
||||
gsutil cp $(GOBIN)/docker-machine-driver-kvm2 gs://minikube/drivers/kvm/$(VERSION)/
|
||||
gsutil cp $(GOBIN)/docker-machine-driver-kvm2.sha256 gs://minikube/drivers/kvm/$(VERSION)/
|
||||
|
||||
|
|
|
@ -51,7 +51,7 @@ func TestDriver(t *testing.T) {
|
|||
},
|
||||
}
|
||||
|
||||
runValidations(t, tests, "vm-driver", IsValidDriver)
|
||||
runValidations(t, tests, "driver", IsValidDriver)
|
||||
|
||||
}
|
||||
|
||||
|
|
|
@ -190,7 +190,7 @@ func initKubernetesFlags() {
|
|||
// initDriverFlags inits the commandline flags for vm drivers
|
||||
func initDriverFlags() {
|
||||
startCmd.Flags().String("driver", "", fmt.Sprintf("Driver is one of: %v (defaults to auto-detect)", driver.DisplaySupportedDrivers()))
|
||||
startCmd.Flags().String("vm-driver", "", "DEPRECATED, use `driver` instead.")
|
||||
startCmd.Flags().String("driver", "", "DEPRECATED, use `driver` instead.")
|
||||
startCmd.Flags().Bool(disableDriverMounts, false, "Disables the filesystem mounts provided by the hypervisors")
|
||||
|
||||
// kvm2
|
||||
|
@ -451,9 +451,9 @@ func selectDriver(existing *config.ClusterConfig) registry.DriverState {
|
|||
return ds
|
||||
}
|
||||
|
||||
// Fallback to old vm-driver parameter
|
||||
if viper.GetString("vm-driver") != "" {
|
||||
ds := driver.Status(viper.GetString("vm-driver"))
|
||||
// Fallback to old driver parameter
|
||||
if viper.GetString("driver") != "" {
|
||||
ds := driver.Status(viper.GetString("driver"))
|
||||
out.T(out.Sparkle, `Using the {{.driver}} driver based on user configuration`, out.V{"driver": ds.String()})
|
||||
return ds
|
||||
}
|
||||
|
|
|
@ -21,7 +21,7 @@
|
|||
# conformance_tests.sh <path to minikube> <flags>
|
||||
#
|
||||
# Example:
|
||||
# conformance_tests.sh ./out/minikube --vm-driver=hyperkit
|
||||
# conformance_tests.sh ./out/minikube --driver=hyperkit
|
||||
set -ex -o pipefail
|
||||
|
||||
readonly PROFILE_NAME="k8sconformance"
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
|
||||
# The script expects the following env variables:
|
||||
# OS_ARCH: The operating system and the architecture separated by a hyphen '-' (e.g. darwin-amd64, linux-amd64, windows-amd64)
|
||||
# VM_DRIVER: the vm-driver to use for the test
|
||||
# VM_DRIVER: the driver to use for the test
|
||||
# EXTRA_START_ARGS: additional flags to pass into minikube start
|
||||
# EXTRA_ARGS: additional flags to pass into minikube
|
||||
# JOB_NAME: the name of the logfile and check name to update on github
|
||||
|
@ -285,7 +285,7 @@ if test -f "${TEST_OUT}"; then
|
|||
fi
|
||||
touch "${TEST_OUT}"
|
||||
${SUDO_PREFIX}${E2E_BIN} \
|
||||
-minikube-start-args="--vm-driver=${VM_DRIVER} ${EXTRA_START_ARGS}" \
|
||||
-minikube-start-args="--driver=${VM_DRIVER} ${EXTRA_START_ARGS}" \
|
||||
-expected-default-driver="${EXPECTED_DEFAULT_DRIVER}" \
|
||||
-test.timeout=70m -test.v \
|
||||
${EXTRA_TEST_ARGS} \
|
||||
|
|
|
@ -19,7 +19,7 @@ gsutil.cmd -m cp -r gs://minikube-builds/$env:MINIKUBE_LOCATION/testdata .
|
|||
|
||||
./out/minikube-windows-amd64.exe delete
|
||||
|
||||
out/e2e-windows-amd64.exe --expected-default-driver=hyperv -minikube-start-args="--vm-driver=hyperv --hyperv-virtual-switch=primary-virtual-switch" -binary=out/minikube-windows-amd64.exe -test.v -test.timeout=65m
|
||||
out/e2e-windows-amd64.exe --expected-default-driver=hyperv -minikube-start-args="--driver=hyperv --hyperv-virtual-switch=primary-virtual-switch" -binary=out/minikube-windows-amd64.exe -test.v -test.timeout=65m
|
||||
$env:result=$lastexitcode
|
||||
# If the last exit code was 0->success, x>0->error
|
||||
If($env:result -eq 0){$env:status="success"}
|
||||
|
|
|
@ -19,7 +19,7 @@ gsutil.cmd -m cp -r gs://minikube-builds/$env:MINIKUBE_LOCATION/testdata .
|
|||
|
||||
./out/minikube-windows-amd64.exe delete
|
||||
|
||||
out/e2e-windows-amd64.exe -minikube-start-args="--vm-driver=virtualbox" -expected-default-driver=hyperv -binary=out/minikube-windows-amd64.exe -test.v -test.timeout=30m
|
||||
out/e2e-windows-amd64.exe -minikube-start-args="--driver=virtualbox" -expected-default-driver=hyperv -binary=out/minikube-windows-amd64.exe -test.v -test.timeout=30m
|
||||
$env:result=$lastexitcode
|
||||
# If the last exit code was 0->success, x>0->error
|
||||
If($env:result -eq 0){$env:status="success"}
|
||||
|
|
|
@ -46,10 +46,10 @@ var configTestCases = []configTestCase{
|
|||
"log_dir": "/etc/hosts",
|
||||
"show-libmachine-logs": true,
|
||||
"v": 5,
|
||||
"vm-driver": "test-driver"
|
||||
"driver": "test-driver"
|
||||
}`,
|
||||
config: map[string]interface{}{
|
||||
"vm-driver": "test-driver",
|
||||
"driver": "test-driver",
|
||||
"cpus": 4,
|
||||
"disk-size": "20g",
|
||||
"v": 5,
|
||||
|
@ -130,7 +130,7 @@ func TestReadConfig(t *testing.T) {
|
|||
}
|
||||
|
||||
expectedConfig := map[string]interface{}{
|
||||
"vm-driver": "test-driver",
|
||||
"driver": "test-driver",
|
||||
"cpus": 4,
|
||||
"disk-size": "20g",
|
||||
"show-libmachine-logs": true,
|
||||
|
@ -149,7 +149,7 @@ func TestWriteConfig(t *testing.T) {
|
|||
}
|
||||
|
||||
cfg := map[string]interface{}{
|
||||
"vm-driver": "test-driver",
|
||||
"driver": "test-driver",
|
||||
"cpus": 4,
|
||||
"disk-size": "20g",
|
||||
"show-libmachine-logs": true,
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{
|
||||
"vm-driver": "kvm2",
|
||||
"driver": "kvm2",
|
||||
"cpus": 4,
|
||||
"disk-size": "20g",
|
||||
"show-libmachine-logs": true,
|
||||
|
|
|
@ -146,7 +146,7 @@ func trySSH(h *host.Host, ip string) {
|
|||
- Disable your local VPN or firewall software
|
||||
- Configure your local VPN or firewall to allow access to {{.ip}}
|
||||
- Restart or reinstall {{.hypervisor}}
|
||||
- Use an alternative --vm-driver
|
||||
- Use an alternative --driver
|
||||
- Use --force to override this connectivity check
|
||||
`, out.V{"error": err, "hypervisor": h.Driver.DriverName(), "ip": ip})
|
||||
}
|
||||
|
|
|
@ -66,19 +66,19 @@ var vmProblems = map[string]match{
|
|||
},
|
||||
"HYPERKIT_NOT_FOUND": {
|
||||
Regexp: re(`Driver "hyperkit" not found.`),
|
||||
Advice: "Please install the minikube hyperkit VM driver, or select an alternative --vm-driver",
|
||||
Advice: "Please install the minikube hyperkit VM driver, or select an alternative --driver",
|
||||
URL: "https://minikube.sigs.k8s.io/docs/reference/drivers/hyperkit/",
|
||||
GOOS: []string{"darwin"},
|
||||
},
|
||||
"HYPERKIT_VMNET_FRAMEWORK": {
|
||||
Regexp: re(`error from vmnet.framework: -1`),
|
||||
Advice: "Hyperkit networking is broken. Upgrade to the latest hyperkit version and/or Docker for Desktop. Alternatively, you may choose an alternate --vm-driver",
|
||||
Advice: "Hyperkit networking is broken. Upgrade to the latest hyperkit version and/or Docker for Desktop. Alternatively, you may choose an alternate --driver",
|
||||
Issues: []int{6028, 5594},
|
||||
GOOS: []string{"darwin"},
|
||||
},
|
||||
"HYPERKIT_CRASHED": {
|
||||
Regexp: re(`hyperkit crashed!`),
|
||||
Advice: "Hyperkit is broken. Upgrade to the latest hyperkit version and/or Docker for Desktop. Alternatively, you may choose an alternate --vm-driver",
|
||||
Advice: "Hyperkit is broken. Upgrade to the latest hyperkit version and/or Docker for Desktop. Alternatively, you may choose an alternate --driver",
|
||||
Issues: []int{6079, 5780},
|
||||
GOOS: []string{"darwin"},
|
||||
},
|
||||
|
@ -113,7 +113,7 @@ var vmProblems = map[string]match{
|
|||
// KVM
|
||||
"KVM2_NOT_FOUND": {
|
||||
Regexp: re(`Driver "kvm2" not found. Do you have the plugin binary .* accessible in your PATH`),
|
||||
Advice: "Please install the minikube kvm2 VM driver, or select an alternative --vm-driver",
|
||||
Advice: "Please install the minikube kvm2 VM driver, or select an alternative --driver",
|
||||
URL: "https://minikube.sigs.k8s.io/docs/reference/drivers/kvm2/",
|
||||
GOOS: []string{"linux"},
|
||||
},
|
||||
|
@ -125,7 +125,7 @@ var vmProblems = map[string]match{
|
|||
},
|
||||
"KVM_CREATE_CONFLICT": {
|
||||
Regexp: re(`KVM_CREATE_VM.* failed:.* Device or resource busy`),
|
||||
Advice: "Another hypervisor, such as VirtualBox, is conflicting with KVM. Please stop the other hypervisor, or use --vm-driver to switch to it.",
|
||||
Advice: "Another hypervisor, such as VirtualBox, is conflicting with KVM. Please stop the other hypervisor, or use --driver to switch to it.",
|
||||
Issues: []int{4913},
|
||||
GOOS: []string{"linux"},
|
||||
},
|
||||
|
@ -136,7 +136,7 @@ var vmProblems = map[string]match{
|
|||
},
|
||||
"KVM2_START_NO_IP": {
|
||||
Regexp: re(`Error in driver during machine creation: Machine didn't return an IP after 120 seconds`),
|
||||
Advice: "Check your firewall rules for interference, and run 'virt-host-validate' to check for KVM configuration issues. If you are running minikube within a VM, consider using --vm-driver=none",
|
||||
Advice: "Check your firewall rules for interference, and run 'virt-host-validate' to check for KVM configuration issues. If you are running minikube within a VM, consider using --driver=none",
|
||||
URL: "https://minikube.sigs.k8s.io/docs/reference/drivers/kvm2/",
|
||||
Issues: []int{4249, 3566},
|
||||
GOOS: []string{"linux"},
|
||||
|
@ -189,7 +189,7 @@ var vmProblems = map[string]match{
|
|||
},
|
||||
"NONE_DOCKER_EXIT_5": {
|
||||
Regexp: re(`sudo systemctl start docker: exit status 5`),
|
||||
Advice: "Ensure that Docker is installed and healthy: Run 'sudo systemctl start docker' and 'journalctl -u docker'. Alternatively, select another value for --vm-driver",
|
||||
Advice: "Ensure that Docker is installed and healthy: Run 'sudo systemctl start docker' and 'journalctl -u docker'. Alternatively, select another value for --driver",
|
||||
URL: "https://minikube.sigs.k8s.io/docs/reference/drivers/none",
|
||||
Issues: []int{5532},
|
||||
GOOS: []string{"linux"},
|
||||
|
@ -215,7 +215,7 @@ var vmProblems = map[string]match{
|
|||
},
|
||||
"NONE_DEFAULT_ROUTE": {
|
||||
Regexp: re(`(No|from) default routes`),
|
||||
Advice: "Configure a default route on this Linux host, or use another --vm-driver that does not require it",
|
||||
Advice: "Configure a default route on this Linux host, or use another --driver that does not require it",
|
||||
Issues: []int{6083, 5636},
|
||||
GOOS: []string{"linux"},
|
||||
},
|
||||
|
@ -264,17 +264,17 @@ var vmProblems = map[string]match{
|
|||
},
|
||||
"VBOX_HYPERV_64_BOOT": {
|
||||
Regexp: re(`VirtualBox won't boot a 64bits VM when Hyper-V is activated`),
|
||||
Advice: "VirtualBox and Hyper-V are having a conflict. Use '--vm-driver=hyperv' or disable Hyper-V using: 'bcdedit /set hypervisorlaunchtype off'",
|
||||
Advice: "VirtualBox and Hyper-V are having a conflict. Use '--driver=hyperv' or disable Hyper-V using: 'bcdedit /set hypervisorlaunchtype off'",
|
||||
Issues: []int{4051, 4783},
|
||||
},
|
||||
"VBOX_HYPERV_NEM_VM": {
|
||||
Regexp: re(`vrc=VERR_NEM_VM_CREATE_FAILED`),
|
||||
Advice: "VirtualBox and Hyper-V are having a conflict. Use '--vm-driver=hyperv' or disable Hyper-V using: 'bcdedit /set hypervisorlaunchtype off'",
|
||||
Advice: "VirtualBox and Hyper-V are having a conflict. Use '--driver=hyperv' or disable Hyper-V using: 'bcdedit /set hypervisorlaunchtype off'",
|
||||
Issues: []int{4587},
|
||||
},
|
||||
"VBOX_NOT_FOUND": {
|
||||
Regexp: re(`VBoxManage not found. Make sure VirtualBox is installed and VBoxManage is in the path`),
|
||||
Advice: "Install VirtualBox, or select an alternative value for --vm-driver",
|
||||
Advice: "Install VirtualBox, or select an alternative value for --driver",
|
||||
URL: "https://minikube.sigs.k8s.io/docs/start/",
|
||||
Issues: []int{3784},
|
||||
},
|
||||
|
@ -285,17 +285,17 @@ var vmProblems = map[string]match{
|
|||
},
|
||||
"VBOX_VTX_DISABLED": {
|
||||
Regexp: re(`This computer doesn't have VT-X/AMD-v enabled`),
|
||||
Advice: "Virtualization support is disabled on your computer. If you are running minikube within a VM, try '--vm-driver=none'. Otherwise, consult your systems BIOS manual for how to enable virtualization.",
|
||||
Advice: "Virtualization support is disabled on your computer. If you are running minikube within a VM, try '--driver=none'. Otherwise, consult your systems BIOS manual for how to enable virtualization.",
|
||||
Issues: []int{3900, 4730},
|
||||
},
|
||||
"VERR_VERR_VMX_DISABLED": {
|
||||
Regexp: re(`VT-x is disabled.*VERR_VMX_MSR_ALL_VMX_DISABLED`),
|
||||
Advice: "Virtualization support is disabled on your computer. If you are running minikube within a VM, try '--vm-driver=none'. Otherwise, consult your systems BIOS manual for how to enable virtualization.",
|
||||
Advice: "Virtualization support is disabled on your computer. If you are running minikube within a VM, try '--driver=none'. Otherwise, consult your systems BIOS manual for how to enable virtualization.",
|
||||
Issues: []int{5282, 5456},
|
||||
},
|
||||
"VBOX_VERR_VMX_NO_VMX": {
|
||||
Regexp: re(`VT-x is not available.*VERR_VMX_NO_VMX`),
|
||||
Advice: "Your host does not support virtualization. If you are running minikube within a VM, try '--vm-driver=none'. Otherwise, enable virtualization in your BIOS",
|
||||
Advice: "Your host does not support virtualization. If you are running minikube within a VM, try '--driver=none'. Otherwise, enable virtualization in your BIOS",
|
||||
Issues: []int{1994, 5326},
|
||||
},
|
||||
"VBOX_HOST_NETWORK": {
|
||||
|
|
|
@ -8,7 +8,7 @@ description: >
|
|||
|
||||
This document is written for contributors who are familiar with minikube, who would like to add support for a new VM driver.
|
||||
|
||||
minikube relies on docker-machine drivers to manage machines. This document discusses how to modify minikube, so that this driver may be used by `minikube start --vm-driver=<new_driver>`.
|
||||
minikube relies on docker-machine drivers to manage machines. This document discusses how to modify minikube, so that this driver may be used by `minikube start --driver=<new_driver>`.
|
||||
|
||||
## Creating a new driver
|
||||
|
||||
|
@ -46,7 +46,7 @@ struct to define a driver metadata. Essentially, you need to define 4 things at
|
|||
pretty simple once you understand your driver well:
|
||||
|
||||
- Name: unique name of the driver, it will be used as the unique ID in registry and as
|
||||
`--vm-driver` option in minikube command
|
||||
`--driver` option in minikube command
|
||||
|
||||
- Builtin: `true` if the driver should be builtin to minikube (preferred). `false` otherwise.
|
||||
|
||||
|
|
|
@ -26,7 +26,7 @@ make integration
|
|||
You may find it useful to set various options to test only a particular test against a non-default driver. For instance:
|
||||
|
||||
```shell
|
||||
env TEST_ARGS="-minikube-start-args=--vm-driver=hyperkit -test.run TestStartStop" make integration
|
||||
env TEST_ARGS="-minikube-start-args=--driver=hyperkit -test.run TestStartStop" make integration
|
||||
```
|
||||
|
||||
### Conformance Tests
|
||||
|
|
|
@ -9,11 +9,11 @@ description: >
|
|||
|
||||
### Overview
|
||||
|
||||
config modifies minikube config files using subcommands like "minikube config set vm-driver kvm"
|
||||
config modifies minikube config files using subcommands like "minikube config set driver kvm"
|
||||
|
||||
Configurable fields:
|
||||
|
||||
* vm-driver
|
||||
* driver
|
||||
* container-runtime
|
||||
* feature-gates
|
||||
* v
|
||||
|
|
|
@ -54,7 +54,7 @@ Example:
|
|||
```shell
|
||||
Configurable fields:
|
||||
|
||||
* vm-driver
|
||||
* driver
|
||||
* feature-gates
|
||||
* v
|
||||
* cpus
|
||||
|
@ -107,7 +107,7 @@ Example output:
|
|||
```shell
|
||||
- memory: 4096
|
||||
- registry: true
|
||||
- vm-driver: vmware
|
||||
- driver: vmware
|
||||
- dashboard: true
|
||||
- gvisor: true
|
||||
```
|
||||
|
|
|
@ -37,5 +37,5 @@ export KUBECONFIG=$HOME/.kube/config
|
|||
mkdir -p $HOME/.kube $HOME/.minikube
|
||||
touch $KUBECONFIG
|
||||
|
||||
sudo -E minikube start --vm-driver=none
|
||||
sudo -E minikube start --driver=none
|
||||
```
|
||||
|
|
|
@ -15,7 +15,7 @@ description: >
|
|||
|
||||
## Using the KVM2 driver
|
||||
|
||||
When using NVIDIA GPUs with the kvm2 vm-driver, we passthrough spare GPUs on the
|
||||
When using NVIDIA GPUs with the kvm2 driver, we passthrough spare GPUs on the
|
||||
host to the minikube VM. Doing so has a few prerequisites:
|
||||
|
||||
- You must install the [kvm2 driver](/docs/start/linux/#hypervisor-setup). If you already had
|
||||
|
@ -44,7 +44,7 @@ host to the minikube VM. Doing so has a few prerequisites:
|
|||
- Once you reboot the system after doing the above, you should be ready to use
|
||||
GPUs with kvm2. Run the following command to start minikube:
|
||||
```shell
|
||||
minikube start --vm-driver kvm2 --kvm-gpu
|
||||
minikube start --driver kvm2 --kvm-gpu
|
||||
```
|
||||
|
||||
This command will check if all the above conditions are satisfied and
|
||||
|
@ -78,7 +78,7 @@ are disruptive to the host, so we decided to not do them automatically.
|
|||
## Using the 'none' driver
|
||||
|
||||
NOTE: This approach used to expose GPUs here is different than the approach used
|
||||
to expose GPUs with `--vm-driver=kvm2`. Please don't mix these instructions.
|
||||
to expose GPUs with `--driver=kvm2`. Please don't mix these instructions.
|
||||
|
||||
- Install minikube.
|
||||
|
||||
|
@ -88,7 +88,7 @@ to expose GPUs with `--vm-driver=kvm2`. Please don't mix these instructions.
|
|||
|
||||
- Start minikube:
|
||||
```shell
|
||||
minikube start --vm-driver=none --apiserver-ips 127.0.0.1 --apiserver-name localhost
|
||||
minikube start --driver=none --apiserver-ips 127.0.0.1 --apiserver-name localhost
|
||||
```
|
||||
|
||||
- Install NVIDIA's device plugin:
|
||||
|
|
|
@ -79,7 +79,7 @@ func TestDownloadOnly(t *testing.T) {
|
|||
t.Errorf("kubeadm images: %v %+v", v, err)
|
||||
}
|
||||
|
||||
// skip verify for cache images if --vm-driver=none
|
||||
// skip verify for cache images if --driver=none
|
||||
if !NoneDriver() {
|
||||
for _, img := range imgs {
|
||||
img = strings.Replace(img, ":", "_", 1) // for example kube-scheduler:v1.15.2 --> kube-scheduler_v1.15.2
|
||||
|
@ -176,7 +176,7 @@ func TestDownloadOnlyDocker(t *testing.T) {
|
|||
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Minute)
|
||||
defer Cleanup(t, profile, cancel)
|
||||
|
||||
args := []string{"start", "--download-only", "-p", profile, "--force", "--alsologtostderr", "--vm-driver=docker"}
|
||||
args := []string{"start", "--download-only", "-p", profile, "--force", "--alsologtostderr", "--driver=docker"}
|
||||
rr, err := Run(t, exec.CommandContext(ctx, Target(), args...))
|
||||
if err != nil {
|
||||
t.Errorf("%s failed: %v:\n%s", args, err, rr.Output())
|
||||
|
@ -210,7 +210,7 @@ func TestDownloadOnlyDocker(t *testing.T) {
|
|||
|
||||
func runningDockerDriver(startArgs []string) bool {
|
||||
for _, s := range startArgs {
|
||||
if s == "--vm-driver=docker" {
|
||||
if s == "--driver=docker" {
|
||||
return true
|
||||
}
|
||||
}
|
||||
|
|
|
@ -61,12 +61,12 @@ func Target() string {
|
|||
|
||||
// NoneDriver returns whether or not this test is using the none driver
|
||||
func NoneDriver() bool {
|
||||
return strings.Contains(*startArgs, "--vm-driver=none")
|
||||
return strings.Contains(*startArgs, "--driver=none")
|
||||
}
|
||||
|
||||
// HyperVDriver returns whether or not this test is using the Hyper-V driver
|
||||
func HyperVDriver() bool {
|
||||
return strings.Contains(*startArgs, "--vm-driver=hyperv")
|
||||
return strings.Contains(*startArgs, "--driver=hyperv")
|
||||
}
|
||||
|
||||
// ExpectedDefaultDriver returns the expected default driver, if any
|
||||
|
|
Loading…
Reference in New Issue