Skip to content

Latest commit

 

History

History
62 lines (45 loc) · 1.62 KB

containerd.md

File metadata and controls

62 lines (45 loc) · 1.62 KB

Containerd in Kuasar

Kuasar has make some changes on official containerd v1.7.0 based on commit:1f236dc57aff44eafd95b3def26683a235b97241.

Building and installing containerd

  • Please note that for compatibility with Containerd, it is recommended to use Go version 1.19 or later.

  • git clone the codes of containerd fork version from kuasar repository.

git clone https://github.com/kuasar-io/containerd.git
cd containerd
make
make install

Configure containerd

Refer to the following configuration to modify the configuration file, default path is /etc/containerd/config.toml.

Important!!!: AppArmor feature is not support now, you need update disable_apparmor = true in the config file.

  • For vmm:
[proxy_plugins.vmm]
  type = "sandbox"
  address = "/run/vmm-sandboxer.sock"
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.vmm]
  runtime_type = "io.containerd.kuasar.v1"
  sandboxer = "vmm"
  io_type = "hvsock"
  • For quark:
[proxy_plugins.quark]
  type = "sandbox"
  address = "/run/quark-sandboxer.sock"
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.quark]
  runtime_type = "io.containerd.quark.v1"
  sandboxer = "quark"
  • For wasm:
[proxy_plugins.wasm]
  type = "sandbox"
  address = "/run/wasm-sandboxer.sock"
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.wasm]
  runtime_type = "io.containerd.wasm.v1"
  sandboxer = "wasm"

Run containerd

To start containerd, run ENABLE_CRI_SANDBOXES=1 containerd

In order to use the containerd Sandbox API, the containerd daemon should be started with the environment variable ENABLE_CRI_SANDBOXES=1.