mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-09-03 02:07:38 +00:00
Merge pull request #114017 from calvin0327/cleanup-containerruntime-options
cleanup container runtime options
This commit is contained in:
@@ -18,7 +18,6 @@ package options
|
||||
|
||||
import (
|
||||
"k8s.io/kubernetes/pkg/kubelet/config"
|
||||
kubetypes "k8s.io/kubernetes/pkg/kubelet/types"
|
||||
)
|
||||
|
||||
const (
|
||||
@@ -36,7 +35,6 @@ var (
|
||||
// default values.
|
||||
func NewContainerRuntimeOptions() *config.ContainerRuntimeOptions {
|
||||
return &config.ContainerRuntimeOptions{
|
||||
ContainerRuntime: kubetypes.RemoteContainerRuntime,
|
||||
PodSandboxImage: defaultPodSandboxImage,
|
||||
PodSandboxImage: defaultPodSandboxImage,
|
||||
}
|
||||
}
|
||||
|
@@ -37,7 +37,6 @@ import (
|
||||
kubeletscheme "k8s.io/kubernetes/pkg/kubelet/apis/config/scheme"
|
||||
kubeletconfigvalidation "k8s.io/kubernetes/pkg/kubelet/apis/config/validation"
|
||||
"k8s.io/kubernetes/pkg/kubelet/config"
|
||||
kubetypes "k8s.io/kubernetes/pkg/kubelet/types"
|
||||
utilflag "k8s.io/kubernetes/pkg/util/flag"
|
||||
)
|
||||
|
||||
@@ -178,11 +177,6 @@ func ValidateKubeletFlags(f *KubeletFlags) error {
|
||||
}
|
||||
return fmt.Errorf("invalid node labels: %s", strings.Join(labelErrs, "; "))
|
||||
}
|
||||
|
||||
if f.ContainerRuntime != kubetypes.RemoteContainerRuntime {
|
||||
return fmt.Errorf("unsupported CRI runtime: %q, only %q is currently supported", f.ContainerRuntime, kubetypes.RemoteContainerRuntime)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
@@ -477,8 +471,8 @@ func AddKubeletConfigFlags(mainfs *pflag.FlagSet, c *kubeletconfig.KubeletConfig
|
||||
fs.BoolVar(&c.MakeIPTablesUtilChains, "make-iptables-util-chains", c.MakeIPTablesUtilChains, "If true, kubelet will ensure iptables utility rules are present on host.")
|
||||
fs.Int32Var(&c.IPTablesMasqueradeBit, "iptables-masquerade-bit", c.IPTablesMasqueradeBit, "The bit of the fwmark space to mark packets for SNAT. Must be within the range [0, 31]. Please match this parameter with corresponding parameter in kube-proxy.")
|
||||
fs.Int32Var(&c.IPTablesDropBit, "iptables-drop-bit", c.IPTablesDropBit, "The bit of the fwmark space to mark packets for dropping. Must be within the range [0, 31].")
|
||||
fs.StringVar(&c.ContainerLogMaxSize, "container-log-max-size", c.ContainerLogMaxSize, "<Warning: Beta feature> Set the maximum size (e.g. 10Mi) of container log file before it is rotated. This flag can only be used with --container-runtime=remote.")
|
||||
fs.Int32Var(&c.ContainerLogMaxFiles, "container-log-max-files", c.ContainerLogMaxFiles, "<Warning: Beta feature> Set the maximum number of container log files that can be present for a container. The number must be >= 2. This flag can only be used with --container-runtime=remote.")
|
||||
fs.StringVar(&c.ContainerLogMaxSize, "container-log-max-size", c.ContainerLogMaxSize, "<Warning: Beta feature> Set the maximum size (e.g. 10Mi) of container log file before it is rotated.")
|
||||
fs.Int32Var(&c.ContainerLogMaxFiles, "container-log-max-files", c.ContainerLogMaxFiles, "<Warning: Beta feature> Set the maximum number of container log files that can be present for a container. The number must be >= 2.")
|
||||
fs.StringSliceVar(&c.AllowedUnsafeSysctls, "allowed-unsafe-sysctls", c.AllowedUnsafeSysctls, "Comma-separated whitelist of unsafe sysctls or unsafe sysctl patterns (ending in *). Use these at your own risk.")
|
||||
|
||||
fs.Int32Var(&c.NodeStatusMaxImages, "node-status-max-images", c.NodeStatusMaxImages, "The maximum number of images to report in Node.Status.Images. If -1 is specified, no cap will be applied.")
|
||||
|
@@ -26,7 +26,6 @@ import (
|
||||
"k8s.io/apimachinery/pkg/util/diff"
|
||||
cliflag "k8s.io/component-base/cli/flag"
|
||||
"k8s.io/kubernetes/pkg/kubelet/config"
|
||||
kubetypes "k8s.io/kubernetes/pkg/kubelet/types"
|
||||
)
|
||||
|
||||
func newKubeletServerOrDie() *KubeletServer {
|
||||
@@ -180,10 +179,8 @@ func TestValidateKubeletFlags(t *testing.T) {
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
err := ValidateKubeletFlags(&KubeletFlags{
|
||||
ContainerRuntimeOptions: config.ContainerRuntimeOptions{
|
||||
ContainerRuntime: kubetypes.RemoteContainerRuntime,
|
||||
},
|
||||
NodeLabels: tt.labels,
|
||||
ContainerRuntimeOptions: config.ContainerRuntimeOptions{},
|
||||
NodeLabels: tt.labels,
|
||||
})
|
||||
|
||||
if tt.error && err == nil {
|
||||
|
Reference in New Issue
Block a user