Kuasar has make some changes on official containerd v1.7.0 based on commit:1f236dc57aff44eafd95b3def26683a235b97241
.
-
Please note that for compatibility with Containerd, it is recommended to use Go version 1.19 or later.
-
git
clone the codes of containerd fork version from kuasar repository.
git clone https://github.com/kuasar-io/containerd.git
cd containerd
make
make install
Refer to the following configuration to modify the configuration file, default path is /etc/containerd/config.toml
.
Important!!!: AppArmor feature is not support now, you need update disable_apparmor = true
in the config file.
- For vmm:
[proxy_plugins.vmm]
type = "sandbox"
address = "/run/vmm-sandboxer.sock"
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.vmm]
runtime_type = "io.containerd.kuasar.v1"
sandboxer = "vmm"
io_type = "hvsock"
- For quark:
[proxy_plugins.quark]
type = "sandbox"
address = "/run/quark-sandboxer.sock"
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.quark]
runtime_type = "io.containerd.quark.v1"
sandboxer = "quark"
- For wasm:
[proxy_plugins.wasm]
type = "sandbox"
address = "/run/wasm-sandboxer.sock"
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.wasm]
runtime_type = "io.containerd.wasm.v1"
sandboxer = "wasm"
To start containerd, run ENABLE_CRI_SANDBOXES=1 containerd
In order to use the containerd Sandbox API, the containerd daemon should be started with the environment variable ENABLE_CRI_SANDBOXES=1
.