mirror of
https://github.com/rancher/rke.git
synced 2025-09-16 15:10:12 +00:00
Add support for enabling cri-dockerd
This commit is contained in:
@@ -57,6 +57,8 @@ const (
|
||||
MaxEtcdNoStrictTLSVersion = "v3.4.14-rancher99"
|
||||
|
||||
EncryptionProviderConfigArgument = "encryption-provider-config"
|
||||
|
||||
KubeletCRIDockerdNameEnv = "RKE_KUBELET_CRIDOCKERD"
|
||||
)
|
||||
|
||||
var admissionControlOptionNames = []string{"enable-admission-plugins", "admission-control"}
|
||||
@@ -436,6 +438,10 @@ func (c *Cluster) BuildKubeletProcess(host *hosts.Host, serviceOptions v3.Kubern
|
||||
CommandArgs["tls-cert-file"] = pki.GetCertPath(pki.GetCrtNameForHost(host, pki.KubeletCertName))
|
||||
CommandArgs["tls-private-key-file"] = pki.GetCertPath(fmt.Sprintf("%s-key", pki.GetCrtNameForHost(host, pki.KubeletCertName)))
|
||||
}
|
||||
if c.IsCRIDockerdEnabled() {
|
||||
CommandArgs["container-runtime"] = "remote"
|
||||
CommandArgs["container-runtime-endpoint"] = "/var/run/dockershim.sock"
|
||||
}
|
||||
|
||||
if serviceOptions.Kubelet != nil {
|
||||
for k, v := range serviceOptions.Kubelet {
|
||||
@@ -508,6 +514,12 @@ func (c *Cluster) BuildKubeletProcess(host *hosts.Host, serviceOptions v3.Kubern
|
||||
|
||||
Env := host.GetExtraEnv(kubelet.BaseService)
|
||||
|
||||
if c.IsCRIDockerdEnabled() {
|
||||
Env = append(Env,
|
||||
// Enable running cri-dockerd
|
||||
fmt.Sprintf("%s=%s", KubeletCRIDockerdNameEnv, "true"))
|
||||
}
|
||||
|
||||
if len(c.CloudProvider.Name) > 0 {
|
||||
Env = append(Env,
|
||||
fmt.Sprintf("%s=%s", CloudConfigSumEnv, getStringChecksum(c.CloudConfigFile)))
|
||||
@@ -1096,3 +1108,13 @@ func appendArgs(command []string, args map[string]string) []string {
|
||||
}
|
||||
return command
|
||||
}
|
||||
|
||||
func (c *Cluster) IsCRIDockerdEnabled() bool {
|
||||
if c == nil {
|
||||
return false
|
||||
}
|
||||
if c.EnableCRIDockerd != nil && *c.EnableCRIDockerd {
|
||||
return true
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
Reference in New Issue
Block a user