-
Notifications
You must be signed in to change notification settings - Fork 233
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove docker entirely #3008
Remove docker entirely #3008
Conversation
Skipping CI for Draft Pull Request. |
Signed-off-by: Artiom Diomin <artiom@kubermatic.com>
/test pull-kubeone-e2e-aws-default-install-containerd-external-v1.28.3 |
/test pull-kubeone-e2e-aws-default-install-containerd-v1.25.15 |
Signed-off-by: Artiom Diomin <artiom@kubermatic.com>
/test pull-kubeone-e2e-aws-default-install-containerd-external-v1.28.3 |
Signed-off-by: Artiom Diomin <artiom@kubermatic.com>
@@ -75,83 +75,6 @@ func TestFeatureGatesString(t *testing.T) { | |||
} | |||
} | |||
|
|||
func TestContainerRuntimeConfig_MachineControllerFlags(t *testing.T) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is also testing containerd, why are we removing this test?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"Collateral damage". Probably I got too excited to remove docker and took some extra 🤷
Reverted back to original.
func ValidateContainerRuntimeConfig(cr kubeoneapi.ContainerRuntimeConfig, versions kubeoneapi.VersionConfig, fldPath *field.Path) field.ErrorList { | ||
allErrs := field.ErrorList{} | ||
|
||
allCRs := []interface{}{ | ||
cr.Docker, | ||
cr.Containerd, | ||
} | ||
|
||
var found bool | ||
for _, x := range allCRs { | ||
if !reflect.ValueOf(x).IsNil() { | ||
if found { | ||
allErrs = append(allErrs, field.Invalid(fldPath, x, "only 1 container runtime can be activated")) | ||
} | ||
found = true | ||
} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm wondering if leaving such a function might be useful if we decide to add support for another CRI (e.g. CRI-O)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've returned it back, but it looks so weird with only 1 runtime :D
pkg/state/cluster.go
Outdated
@@ -282,7 +281,7 @@ func (h *Host) Initialized() bool { | |||
|
|||
// IsProvisioned checks are CRI and Kubelet provisioned on a host | |||
func (h *Host) IsProvisioned() bool { | |||
return (h.ContainerRuntimeDocker.IsProvisioned() || h.ContainerRuntimeContainerd.IsProvisioned()) && h.Kubelet.IsProvisioned() | |||
return (h.ContainerRuntimeContainerd.IsProvisioned()) && h.Kubelet.IsProvisioned() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Very tiny nit:
return (h.ContainerRuntimeContainerd.IsProvisioned()) && h.Kubelet.IsProvisioned() | |
return h.ContainerRuntimeContainerd.IsProvisioned() && h.Kubelet.IsProvisioned() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed 👍
Signed-off-by: Artiom Diomin <artiom@kubermatic.com>
Signed-off-by: Artiom Diomin <artiom@kubermatic.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
LGTM label has been added. Git tree hash: e32e7ed4b70f22e17875d5d8a45b3f8d36a9cdd1
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: xmudrii The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
1 similar comment
/retest |
What this PR does / why we need it:
Which issue(s) this PR fixes:
Fixes #2595
What type of PR is this?
/kind cleanup
Special notes for your reviewer:
Does this PR introduce a user-facing change? Then add your Release Note here:
Documentation: