Skip to content
This repository has been archived by the owner on Sep 24, 2021. It is now read-only.

Commit

Permalink
Merge pull request #345 from liyanyanli/v1.12.0
Browse files Browse the repository at this point in the history
Fix: Upgrade vendored to v1.12.0
  • Loading branch information
resouer authored Nov 9, 2018
2 parents 12db120 + a4d2702 commit a018587
Show file tree
Hide file tree
Showing 1,751 changed files with 275,347 additions and 65,871 deletions.
2 changes: 1 addition & 1 deletion .travis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ env:
- DOCKER_VERSION=17.03.2~ce-0~ubuntu-xenial

go:
- 1.9.x
- 1.10.x

go_import_path: k8s.io/frakti

Expand Down
2 changes: 1 addition & 1 deletion cmd/frakti/frakti.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ import (
)

const (
fraktiVersion = "1.11.0"
fraktiVersion = "1.12.0"

// use port 22522 for dockershim streaming
privilegedStreamingServerPort = "22522"
Expand Down
4 changes: 2 additions & 2 deletions docs/deploy.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,10 +84,10 @@ systemctl start docker

#### Install frakti

Please note frakti has the same release version of Kubernetes, i.e. frakti `v1.11.*` works with Kubernetes `v1.11.*`, the `*` part does not matter. This doc will always use latest stable release of Kubernetes.
Please note frakti has the same release version of Kubernetes, i.e. frakti `v1.12.*` works with Kubernetes `v1.12.*`, the `*` part does not matter. This doc will always use latest stable release of Kubernetes.

```sh
curl -sSL https://github.com/kubernetes/frakti/releases/download/v1.11.0/frakti -o /usr/bin/frakti
curl -sSL https://github.com/kubernetes/frakti/releases/download/v1.12.0/frakti -o /usr/bin/frakti
chmod +x /usr/bin/frakti
cgroup_driver=$(docker info | awk '/Cgroup Driver/{print $3}')
cat <<EOF > /lib/systemd/system/frakti.service
Expand Down
14 changes: 7 additions & 7 deletions pkg/docker/privilegedruntime.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,10 +24,9 @@ import (

"k8s.io/frakti/pkg/util/alternativeruntime"
"k8s.io/kubernetes/cmd/kubelet/app/options"
"k8s.io/kubernetes/pkg/kubelet/apis/kubeletconfig"
kubeletconfiginternal "k8s.io/kubernetes/pkg/kubelet/apis/kubeletconfig"
kubeletscheme "k8s.io/kubernetes/pkg/kubelet/apis/kubeletconfig/scheme"
kubeletconfigv1beta1 "k8s.io/kubernetes/pkg/kubelet/apis/kubeletconfig/v1beta1"
kubeletconfig "k8s.io/kubernetes/pkg/kubelet/apis/config"
kubeletconfiginternal "k8s.io/kubernetes/pkg/kubelet/apis/config"
kubeletscheme "k8s.io/kubernetes/pkg/kubelet/apis/config/scheme"
"k8s.io/kubernetes/pkg/kubelet/dockershim"
dockerremote "k8s.io/kubernetes/pkg/kubelet/dockershim/remote"
"k8s.io/kubernetes/pkg/kubelet/server/streaming"
Expand Down Expand Up @@ -58,7 +57,7 @@ func NewPrivilegedRuntimeService(privilegedRuntimeEndpoint string, streamingConf
return nil, err
}

external := &kubeletconfigv1beta1.KubeletConfiguration{}
external := &kubeletconfiginternal.KubeletConfiguration{}
kubeletScheme.Default(external)
kubeCfg := &kubeletconfig.KubeletConfiguration{}
if err := kubeletScheme.Convert(external, kubeCfg, nil); err != nil {
Expand All @@ -76,7 +75,8 @@ func NewPrivilegedRuntimeService(privilegedRuntimeEndpoint string, streamingConf
// NOTE(harry): pluginSettings should be arguments for dockershim, not part of kubelet.
// But standalone dockershim is not ready yet, so we use default values here.
pluginSettings := dockershim.NetworkPluginSettings{
HairpinMode: kubeletconfiginternal.HairpinMode(kubeCfg.HairpinMode),
//HairpinMode: kubeletconfiginternal.HairpinMode(kubeCfg.HairpinMode),
HairpinMode: kubeletconfiginternal.HairpinMode(kubeletconfig.HairpinNone),
NonMasqueradeCIDR: nonMasqueradeCIDR,
PluginName: networkPluginName,
PluginConfDir: cniNetDir,
Expand All @@ -98,7 +98,7 @@ func NewPrivilegedRuntimeService(privilegedRuntimeEndpoint string, streamingConf
// If dockershim detected this cgroupDriver is different with dockerd, it will fail.
cgroupDriver,
privilegedRuntimeRootDir,
true, false,
false,
)
if err != nil {
return nil, err
Expand Down
2 changes: 1 addition & 1 deletion pkg/docker/runtime_service.go
Original file line number Diff line number Diff line change
Expand Up @@ -213,7 +213,7 @@ func (p *PrivilegedRuntime) ReopenContainerLog(ContainerID string) error {
}

// RunPodSandbox creates and starts a pod-level sandbox.
func (p *PrivilegedRuntime) RunPodSandbox(config *kubeapi.PodSandboxConfig) (string, error) {
func (p *PrivilegedRuntime) RunPodSandbox(config *kubeapi.PodSandboxConfig, runtimeHandler string) (string, error) {
request := &kubeapi.RunPodSandboxRequest{Config: config}
logrus.Debugf("RunPodSandboxRequest: %v", request)
r, err := runtimeClient.RunPodSandbox(context.Background(), request)
Expand Down
2 changes: 1 addition & 1 deletion pkg/hyper/sandbox.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ import (
)

// RunPodSandbox creates and starts a pod-level sandbox.
func (h *Runtime) RunPodSandbox(config *kubeapi.PodSandboxConfig) (string, error) {
func (h *Runtime) RunPodSandbox(config *kubeapi.PodSandboxConfig, runtimeHandler string) (string, error) {
userpod, err := h.buildUserPod(config)
if err != nil {
glog.Errorf("Build UserPod for sandbox %q failed: %v", config.String(), err)
Expand Down
2 changes: 1 addition & 1 deletion pkg/manager/manager.go
Original file line number Diff line number Diff line change
Expand Up @@ -210,7 +210,7 @@ func (s *FraktiManager) RunPodSandbox(ctx context.Context, req *kubeapi.RunPodSa

runtimeService := s.getRuntimeServiceBySandboxConfig(req.GetConfig())
runtimeName := runtimeService.ServiceName()
podID, err := runtimeService.RunPodSandbox(req.Config)
podID, err := runtimeService.RunPodSandbox(req.Config, "frakti")
if err != nil {
glog.Errorf("RunPodSandbox from %s failed: %v", runtimeName, err)
return nil, err
Expand Down
2 changes: 1 addition & 1 deletion pkg/unikernel/service/sandbox.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ import (
)

// RunPodSandbox creates and starts a pod-level sandbox.
func (u *UnikernelRuntime) RunPodSandbox(config *kubeapi.PodSandboxConfig) (string, error) {
func (u *UnikernelRuntime) RunPodSandbox(config *kubeapi.PodSandboxConfig, runtimeHandler string) (string, error) {
var err error
// Genrate sandbox ID and name
podID := uuid.NewUUID()
Expand Down
29 changes: 29 additions & 0 deletions vendor/github.com/Rican7/retry/BUILD

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

19 changes: 19 additions & 0 deletions vendor/github.com/Rican7/retry/LICENSE

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

83 changes: 83 additions & 0 deletions vendor/github.com/Rican7/retry/Makefile

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

101 changes: 101 additions & 0 deletions vendor/github.com/Rican7/retry/README.md

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit a018587

Please sign in to comment.