2018-08-09 17:53:11 +00:00
|
|
|
---
|
2020-04-11 06:51:47 +00:00
|
|
|
|
2020-08-01 07:33:48 +00:00
|
|
|
crio_cgroup_manager: "{{ kubelet_cgroup_driver | default('systemd') }}"
|
2020-04-24 08:18:07 +00:00
|
|
|
crio_conmon: "/usr/bin/conmon"
|
2020-08-01 07:33:48 +00:00
|
|
|
crio_enable_metrics: false
|
|
|
|
crio_log_level: "info"
|
|
|
|
crio_metrics_port: "9090"
|
|
|
|
crio_pause_image: "{{ pod_infra_image_repo }}:{{ pod_infra_version }}"
|
2020-08-27 16:09:53 +00:00
|
|
|
|
|
|
|
# Trusted registries to pull unqualified images (e.g. alpine:latest) from
|
|
|
|
# By default unqualified images are not allowed for security reasons
|
|
|
|
crio_registries: []
|
|
|
|
|
2020-11-28 16:38:47 +00:00
|
|
|
# Configure insecure registries.
|
|
|
|
crio_insecure_registries: []
|
|
|
|
|
2020-12-03 21:57:25 +00:00
|
|
|
# Define registiries mirror
|
|
|
|
|
|
|
|
crio_registries_mirrors: []
|
|
|
|
# - prefix: docker.io
|
|
|
|
# insecure: false
|
|
|
|
# blocked: false
|
|
|
|
# location: registry-1.docker.io
|
|
|
|
# mirrors:
|
|
|
|
# - location: 172.20.100.52:5000
|
|
|
|
# insecure: true
|
|
|
|
# - location: mirror.gcr.io
|
|
|
|
# insecure: false
|
|
|
|
|
2020-08-01 07:33:48 +00:00
|
|
|
crio_seccomp_profile: ""
|
|
|
|
crio_selinux: "{{ (preinstall_selinux_state == 'enforcing')|lower }}"
|
|
|
|
crio_signature_policy: "{% if ansible_os_family == 'ClearLinux' %}/usr/share/defaults/crio/policy.json{% endif %}"
|
2020-09-10 12:29:45 +00:00
|
|
|
|
|
|
|
# Override system default for storage driver
|
|
|
|
# crio_storage_driver: "overlay"
|
|
|
|
|
2020-08-01 07:33:48 +00:00
|
|
|
crio_stream_port: "10010"
|
2020-04-24 08:18:07 +00:00
|
|
|
|
|
|
|
crio_required_version: "{{ kube_version | regex_replace('^v(?P<major>\\d+).(?P<minor>\\d+).(?P<patch>\\d+)$', '\\g<major>.\\g<minor>') }}"
|
|
|
|
|
|
|
|
crio_kubernetes_version_matrix:
|
2020-10-13 09:08:26 +00:00
|
|
|
"1.19": "1.19"
|
2020-05-28 07:42:15 +00:00
|
|
|
"1.18": "1.18"
|
2020-04-24 08:18:07 +00:00
|
|
|
"1.17": "1.17"
|
|
|
|
|
2020-10-13 09:08:26 +00:00
|
|
|
crio_version: "{{ crio_kubernetes_version_matrix[crio_required_version] | default('1.19') }}"
|
2020-10-23 10:07:46 +00:00
|
|
|
|
|
|
|
# The crio_runtimes variable defines a list of OCI compatible runtimes.
|
|
|
|
crio_runtimes:
|
|
|
|
- name: runc
|
|
|
|
path: /usr/bin/runc
|
|
|
|
type: oci
|
|
|
|
root: /run/runc
|
|
|
|
|
|
|
|
# Kata Containers is an OCI runtime, where containers are run inside lightweight
|
|
|
|
# VMs. Kata provides additional isolation towards the host, minimizing the host attack
|
|
|
|
# surface and mitigating the consequences of containers breakout.
|
|
|
|
kata_runtimes:
|
|
|
|
# Kata Containers with the default configured VMM
|
|
|
|
- name: kata-runtime
|
|
|
|
path: /opt/kata/bin/kata-runtime
|
|
|
|
type: oci
|
|
|
|
root: /run/kata-containers
|
|
|
|
# Kata Containers with the QEMU VMM
|
|
|
|
- name: kata-qemu
|
|
|
|
path: /opt/kata/bin/kata-qemu
|
|
|
|
type: oci
|
|
|
|
root: /run/kata-containers
|
2020-11-28 16:38:47 +00:00
|
|
|
|
2020-12-01 19:00:50 +00:00
|
|
|
# crun is a fast and low-memory footprint OCI Container Runtime fully written in C.
|
|
|
|
crun_runtime:
|
|
|
|
name: crun
|
|
|
|
path: /usr/bin/crun
|
|
|
|
type: oci
|
|
|
|
root: /run/crun
|
|
|
|
|
2020-11-28 16:38:47 +00:00
|
|
|
# When this is true, CRI-O package repositories are added. Set this to false when using an
|
|
|
|
# environment with preconfigured CRI-O package repositories.
|
|
|
|
crio_add_repos: true
|