Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- alias urldecode='python3 -c "import sys, urllib.parse; print(urllib.parse.unquote(sys.argv[1]))"'
- urldecode "data:,%23%20The%20%22crio%22%20table%20contains%20all%20of%20the%20server%20options.%0A%5Bcrio%5D%0A%0A%23%20CRI-O%20reads%20its%20storage%20defaults%20from%20the%20containers%2Fstorage%20configuration%0A%23%20file%2C%20%2Fetc%2Fcontainers%2Fstorage.conf.%20Modify%20storage.conf%20if%20you%20want%20to%0A%23%20change%20default%20storage%20for%20all%20tools%20that%20use%20containers%2Fstorage.%20%20If%20you%0A%23%20want%20to%20modify%20just%20crio%2C%20you%20can%20change%20the%20storage%20configuration%20in%20this%0A%23%20file.%0A%0A%23%20root%20is%20a%20path%20to%20the%20%22root%20directory%22.%20CRIO%20stores%20all%20of%20its%20data%2C%0A%23%20including%20container%20images%2C%20in%20this%20directory.%0A%23root%20%3D%20%22%2Fvar%2Flib%2Fcontainers%2Fstorage%22%0A%0A%23%20run%20is%20a%20path%20to%20the%20%22run%20directory%22.%20CRIO%20stores%20all%20of%20its%20state%0A%23%20in%20this%20directory.%0A%23runroot%20%3D%20%22%2Fvar%2Frun%2Fcontainers%2Fstorage%22%0A%0A%23%20storage_driver%20select%20which%20storage%20driver%20is%20used%20to%20manage%20storage%0A%23%20of%20images%20and%20containers.%0A%23storage_driver%20%3D%20%22%22%0A%0A%23%20storage_option%20is%20used%20to%20pass%20an%20option%20to%20the%20storage%20driver.%0A%23storage_option%20%3D%20%5B%0A%23%5D%0A%0A%23%20The%20%22crio.api%22%20table%20contains%20settings%20for%20the%20kubelet%2FgRPC%20interface.%0A%5Bcrio.api%5D%0A%0A%23%20listen%20is%20the%20path%20to%20the%20AF_LOCAL%20socket%20on%20which%20crio%20will%20listen.%0Alisten%20%3D%20%22%2Fvar%2Frun%2Fcrio%2Fcrio.sock%22%0A%0A%23%20stream_address%20is%20the%20IP%20address%20on%20which%20the%20stream%20server%20will%20listen%0Astream_address%20%3D%20%22%22%0A%0A%23%20stream_port%20is%20the%20port%20on%20which%20the%20stream%20server%20will%20listen%0Astream_port%20%3D%20%2210010%22%0A%0A%23%20stream_enable_tls%20enables%20encrypted%20tls%20transport%20of%20the%20stream%20server%0Astream_enable_tls%20%3D%20false%0A%0A%23%20stream_tls_cert%20is%20the%20x509%20certificate%20file%20path%20used%20to%20serve%20the%20encrypted%20stream.%0A%23%20This%20file%20can%20change%2C%20and%20CRIO%20will%20automatically%20pick%20up%20the%20changes%20within%205%20minutes.%0Astream_tls_cert%20%3D%20%22%22%0A%0A%23%20stream_tls_key%20is%20the%20key%20file%20path%20used%20to%20serve%20the%20encrypted%20stream.%0A%23%20This%20file%20can%20change%2C%20and%20CRIO%20will%20automatically%20pick%20up%20the%20changes%20within%205%20minutes.%0Astream_tls_key%20%3D%20%22%22%0A%0A%23%20stream_tls_ca%20is%20the%20x509%20CA(s)%20file%20used%20to%20verify%20and%20authenticate%20client%0A%23%20communication%20with%20the%20tls%20encrypted%20stream.%0A%23%20This%20file%20can%20change%2C%20and%20CRIO%20will%20automatically%20pick%20up%20the%20changes%20within%205%20minutes.%0Astream_tls_ca%20%3D%20%22%22%0A%0A%23%20file_locking%20is%20whether%20file-based%20locking%20will%20be%20used%20instead%20of%0A%23%20in-memory%20locking%0Afile_locking%20%3D%20false%0A%0A%23%20The%20%22crio.runtime%22%20table%20contains%20settings%20pertaining%20to%20the%20OCI%0A%23%20runtime%20used%20and%20options%20for%20how%20to%20set%20up%20and%20manage%20the%20OCI%20runtime.%0A%5Bcrio.runtime%5D%0A%0A%23%20runtime%20is%20the%20OCI%20compatible%20runtime%20used%20for%20trusted%20container%20workloads.%0A%23%20This%20is%20a%20mandatory%20setting%20as%20this%20runtime%20will%20be%20the%20default%20one%0A%23%20and%20will%20also%20be%20used%20for%20untrusted%20container%20workloads%20if%0A%23%20runtime_untrusted_workload%20is%20not%20set.%0Aruntime%20%3D%20%22%2Fusr%2Fbin%2Frunc%22%0A%0A%23%20runtime_untrusted_workload%20is%20the%20OCI%20compatible%20runtime%20used%20for%20untrusted%0A%23%20container%20workloads.%20This%20is%20an%20optional%20setting%2C%20except%20if%0A%23%20default_container_trust%20is%20set%20to%20%22untrusted%22.%0Aruntime_untrusted_workload%20%3D%20%22%22%0A%0A%23%20default_workload_trust%20is%20the%20default%20level%20of%20trust%20crio%20puts%20in%20container%0A%23%20workloads.%20It%20can%20either%20be%20%22trusted%22%20or%20%22untrusted%22%2C%20and%20the%20default%0A%23%20is%20%22trusted%22.%0A%23%20Containers%20can%20be%20run%20through%20different%20container%20runtimes%2C%20depending%20on%0A%23%20the%20trust%20hints%20we%20receive%20from%20kubelet%3A%0A%23%20-%20If%20kubelet%20tags%20a%20container%20workload%20as%20untrusted%2C%20crio%20will%20try%20first%20to%0A%23%20run%20it%20through%20the%20untrusted%20container%20workload%20runtime.%20If%20it%20is%20not%20set%2C%0A%23%20crio%20will%20use%20the%20trusted%20runtime.%0A%23%20-%20If%20kubelet%20does%20not%20provide%20any%20information%20about%20the%20container%20workload%20trust%0A%23%20level%2C%20the%20selected%20runtime%20will%20depend%20on%20the%20default_container_trust%20setting.%0A%23%20If%20it%20is%20set%20to%20%22untrusted%22%2C%20then%20all%20containers%20except%20for%20the%20host%20privileged%0A%23%20ones%2C%20will%20be%20run%20by%20the%20runtime_untrusted_workload%20runtime.%20Host%20privileged%0A%23%20containers%20are%20by%20definition%20trusted%20and%20will%20always%20use%20the%20trusted%20container%0A%23%20runtime.%20If%20default_container_trust%20is%20set%20to%20%22trusted%22%2C%20crio%20will%20use%20the%20trusted%0A%23%20container%20runtime%20for%20all%20containers.%0Adefault_workload_trust%20%3D%20%22trusted%22%0A%0A%23%20no_pivot%20instructs%20the%20runtime%20to%20not%20use%20pivot_root%2C%20but%20instead%20use%20MS_MOVE%0Ano_pivot%20%3D%20false%0A%0A%23%20conmon%20is%20the%20path%20to%20conmon%20binary%2C%20used%20for%20managing%20the%20runtime.%0Aconmon%20%3D%20%22%2Fusr%2Flibexec%2Fcrio%2Fconmon%22%0A%0A%23%20conmon_env%20is%20the%20environment%20variable%20list%20for%20conmon%20process%2C%0A%23%20used%20for%20passing%20necessary%20environment%20variable%20to%20conmon%20or%20runtime.%0Aconmon_env%20%3D%20%5B%0A%20%20%22PATH%3D%2Fusr%2Flocal%2Fsbin%3A%2Fusr%2Flocal%2Fbin%3A%2Fusr%2Fsbin%3A%2Fusr%2Fbin%3A%2Fsbin%3A%2Fbin%22%2C%0A%5D%0A%0A%23%20selinux%20indicates%20whether%20or%20not%20SELinux%20will%20be%20used%20for%20pod%0A%23%20separation%20on%20the%20host.%20If%20you%20enable%20this%20flag%2C%20SELinux%20must%20be%20running%0A%23%20on%20the%20host.%0Aselinux%20%3D%20true%0A%0A%23%20seccomp_profile%20is%20the%20seccomp%20json%20profile%20path%20which%20is%20used%20as%20the%0A%23%20default%20for%20the%20runtime.%0Aseccomp_profile%20%3D%20%22%2Fetc%2Fcrio%2Fseccomp.json%22%0A%0A%23%20apparmor_profile%20is%20the%20apparmor%20profile%20name%20which%20is%20used%20as%20the%0A%23%20default%20for%20the%20runtime.%0Aapparmor_profile%20%3D%20%22crio-default%22%0A%0A%23%20cgroup_manager%20is%20the%20cgroup%20management%20implementation%20to%20be%20used%0A%23%20for%20the%20runtime.%0Acgroup_manager%20%3D%20%22systemd%22%0A%0A%23%20default_capabilities%20is%20the%20list%20of%20capabilities%20to%20add%20and%20can%20be%20modified%20here.%0A%23%20If%20capabilities%20below%20is%20commented%20out%2C%20the%20default%20list%20of%20capabilities%20defined%20in%20the%0A%23%20spec%20will%20be%20added.%0A%23%20If%20capabilities%20is%20empty%20below%2C%20only%20the%20capabilities%20defined%20in%20the%20container%20json%0A%23%20file%20by%20the%20user%2Fkube%20will%20be%20added.%0Adefault_capabilities%20%3D%20%5B%0A%20%20%22CHOWN%22%2C%20%0A%20%20%22DAC_OVERRIDE%22%2C%20%0A%20%20%22FSETID%22%2C%20%0A%20%20%22FOWNER%22%2C%20%0A%20%20%22NET_RAW%22%2C%20%0A%20%20%22SETGID%22%2C%20%0A%20%20%22SETUID%22%2C%20%0A%20%20%22SETPCAP%22%2C%20%0A%20%20%22NET_BIND_SERVICE%22%2C%20%0A%20%20%22SYS_CHROOT%22%2C%20%0A%20%20%22KILL%22%2C%20%0A%5D%0A%0A%23%20hooks_dir_path%20is%20the%20oci%20hooks%20directory%20for%20automatically%20executed%20hooks%0Ahooks_dir_path%20%3D%20%22%2Fusr%2Fshare%2Fcontainers%2Foci%2Fhooks.d%22%0A%0A%23%20default_mounts%20is%20the%20mounts%20list%20to%20be%20mounted%20for%20the%20container%20when%20created%0A%23%20deprecated%2C%20will%20be%20taken%20out%20in%20future%20versions%2C%20add%20default%20mounts%20to%20either%0A%23%20%2Fusr%2Fshare%2Fcontainers%2Fmounts.conf%20or%20%2Fetc%2Fcontainers%2Fmounts.conf%0Adefault_mounts%20%3D%20%5B%0A%20%20%22%2Fusr%2Fshare%2Frhel%2Fsecrets%3A%2Frun%2Fsecrets%22%2C%20%0A%5D%0A%0A%23%20Path%20to%20directory%20in%20which%20container%20exit%20files%20are%20written%20to%20by%20conmon.%0Acontainer_exits_dir%20%3D%20%22%2Fvar%2Frun%2Fcrio%2Fexits%22%0A%0A%23%20Path%20to%20directory%20for%20container%20attach%20sockets.%0Acontainer_attach_socket_dir%20%3D%20%22%2Fvar%2Frun%2Fcrio%22%0A%0A%23%20CRI-O%20reads%20its%20default%20mounts%20from%20the%20following%20two%20files%3A%0A%23%201)%20%2Fetc%2Fcontainers%2Fmounts.conf%20-%20this%20is%20the%20override%20file%2C%20where%20users%20can%0A%23%20either%20add%20in%20their%20own%20default%20mounts%2C%20or%20override%20the%20default%20mounts%20shipped%0A%23%20with%20the%20package.%0A%23%202)%20%2Fusr%2Fshare%2Fcontainers%2Fmounts.conf%20-%20this%20is%20the%20default%20file%20read%20for%20mounts.%0A%23%20If%20you%20want%20CRI-O%20to%20read%20from%20a%20different%2C%20specific%20mounts%20file%2C%20you%20can%20change%0A%23%20the%20default_mounts_file%20path%20right%20below.%20Note%2C%20if%20this%20is%20done%2C%20CRI-O%20will%20only%20add%0A%23%20mounts%20it%20finds%20in%20this%20file.%0A%0A%23%20default_mounts_file%20is%20the%20file%20path%20holding%20the%20default%20mounts%20to%20be%20mounted%20for%20the%0A%23%20container%20when%20created.%0A%23%20default_mounts_file%20%3D%20%22%22%0A%0A%23%20pids_limit%20is%20the%20number%20of%20processes%20allowed%20in%20a%20container%0Apids_limit%20%3D%201024%0A%0A%23%20log_size_max%20is%20the%20max%20limit%20for%20the%20container%20log%20size%20in%20bytes.%0A%23%20Negative%20values%20indicate%20that%20no%20limit%20is%20imposed.%0Alog_size_max%20%3D%20-1%0A%0A%23%20read-only%20indicates%20whether%20all%20containers%20will%20run%20in%20read-only%20mode%0Aread_only%20%3D%20false%0A%0A%23%20log_level%20changes%20the%20verbosity%20of%20the%20logs%20printed.%0A%23%20Options%20are%3A%20error%20(default)%2C%20fatal%2C%20panic%2C%20warn%2C%20info%2C%20and%20debug%0Alog_level%20%3D%20%22error%22%0A%0A%23%20The%20%22crio.image%22%20table%20contains%20settings%20pertaining%20to%20the%0A%23%20management%20of%20OCI%20images.%0A%0A%23%20uid_mappings%20specifies%20the%20UID%20mappings%20to%20have%20in%20the%20user%20namespace.%0A%23%20A%20range%20is%20specified%20in%20the%20form%20containerUID%3AHostUID%3ASize.%20%20Multiple%0A%23%20ranges%20are%20separed%20by%20comma.%0Auid_mappings%20%3D%20%22%22%0A%0A%23%20gid_mappings%20specifies%20the%20GID%20mappings%20to%20have%20in%20the%20user%20namespace.%0A%23%20A%20range%20is%20specified%20in%20the%20form%20containerGID%3AHostGID%3ASize.%20%20Multiple%0A%23%20ranges%20are%20separed%20by%20comma.%0Agid_mappings%20%3D%20%22%22%0A%0A%5Bcrio.image%5D%0A%0A%23%20default_transport%20is%20the%20prefix%20we%20try%20prepending%20to%20an%20image%20name%20if%20the%0A%23%20image%20name%20as%20we%20receive%20it%20can't%20be%20parsed%20as%20a%20valid%20source%20reference%0Adefault_transport%20%3D%20%22docker%3A%2F%2F%22%0A%0A%23%20pause_image%20is%20the%20image%20which%20we%20use%20to%20instantiate%20infra%20containers.%0Apause_image%20%3D%20%22quay.io%2Fopenshift-release-dev%2Focp-v4.0-art-dev%40sha256%3A0f4767e691bd6b984691dd48a13313c13fece8442d0bd43756f8e9d0145861d4%22%0A%0A%23%20If%20not%20empty%2C%20the%20path%20to%20a%20docker%2Fconfig.json-like%20file%20containing%20credentials%0A%23%20necessary%20for%20pulling%20the%20image%20specified%20by%20pause_image%C2%A0above.%0Apause_image_auth_file%20%3D%20%22%2Fvar%2Flib%2Fkubelet%2Fconfig.json%22%0A%0A%23%20pause_command%20is%20the%20command%20to%20run%20in%20a%20pause_image%20to%20have%20a%20container%20just%0A%23%20sit%20there.%20%20If%20the%20image%20contains%20the%20necessary%20information%2C%20this%20value%20need%0A%23%20not%20be%20specified.%0Apause_command%20%3D%20%22%2Fusr%2Fbin%2Fpod%22%0A%0A%23%20signature_policy%20is%20the%20name%20of%20the%20file%20which%20decides%20what%20sort%20of%20policy%20we%0A%23%20use%20when%20deciding%20whether%20or%20not%20to%20trust%20an%20image%20that%20we've%20pulled.%0A%23%20Outside%20of%20testing%20situations%2C%20it%20is%20strongly%20advised%20that%20this%20be%20left%0A%23%20unspecified%20so%20that%20the%20default%20system-wide%20policy%20will%20be%20used.%0Asignature_policy%20%3D%20%22%22%0A%0A%23%20image_volumes%20controls%20how%20image%20volumes%20are%20handled.%0A%23%20The%20valid%20values%20are%20mkdir%20and%20ignore.%0Aimage_volumes%20%3D%20%22mkdir%22%0A%0A%23%20CRI-O%20reads%20its%20configured%20registries%20defaults%20from%20the%20containers%2Fimage%20configuration%0A%23%20file%2C%20%2Fetc%2Fcontainers%2Fregistries.conf.%20Modify%20registries.conf%20if%20you%20want%20to%0A%23%20change%20default%20registries%20for%20all%20tools%20that%20use%20containers%2Fimage.%20%20If%20you%0A%23%20want%20to%20modify%20just%20crio%2C%20you%20can%20change%20the%20registies%20configuration%20in%20this%0A%23%20file.%0A%0A%23%20insecure_registries%20is%20used%20to%20skip%20TLS%20verification%20when%20pulling%20images.%0A%23%20insecure_registries%20%3D%20%5B%0A%23%20%5D%0A%0A%23%20registries%20is%20used%20to%20specify%20a%20comma%20separated%20list%20of%20registries%20to%20be%20used%0A%23%20when%20pulling%20an%20unqualified%20image%20(e.g.%20fedora%3Arawhide).%0A%23registries%20%3D%20%5B%0A%23%20%5D%0A%0A%23%20The%20%22crio.network%22%20table%20contains%20settings%20pertaining%20to%20the%0A%23%20management%20of%20CNI%20plugins.%0A%5Bcrio.network%5D%0A%0A%23%20network_dir%20is%20is%20where%20CNI%20network%20configuration%0A%23%20files%20are%20stored.%0Anetwork_dir%20%3D%20%22%2Fetc%2Fcni%2Fnet.d%2F%22%0A%0A%23%20plugin_dir%20is%20is%20where%20CNI%20plugin%20binaries%20are%20stored.%0Aplugin_dir%20%3D%20%22%2Fusr%2Flibexec%2Fcni%22%0A"
- data:,# The "crio" table contains all of the server options.
- [crio]
- # CRI-O reads its storage defaults from the containers/storage configuration
- # file, /etc/containers/storage.conf. Modify storage.conf if you want to
- # change default storage for all tools that use containers/storage. If you
- # want to modify just crio, you can change the storage configuration in this
- # file.
- # root is a path to the "root directory". CRIO stores all of its data,
- # including container images, in this directory.
- #root = "/var/lib/containers/storage"
- # run is a path to the "run directory". CRIO stores all of its state
- # in this directory.
- #runroot = "/var/run/containers/storage"
- # storage_driver select which storage driver is used to manage storage
- # of images and containers.
- #storage_driver = ""
- # storage_option is used to pass an option to the storage driver.
- #storage_option = [
- #]
- # The "crio.api" table contains settings for the kubelet/gRPC interface.
- [crio.api]
- # listen is the path to the AF_LOCAL socket on which crio will listen.
- listen = "/var/run/crio/crio.sock"
- # stream_address is the IP address on which the stream server will listen
- stream_address = ""
- # stream_port is the port on which the stream server will listen
- stream_port = "10010"
- # stream_enable_tls enables encrypted tls transport of the stream server
- stream_enable_tls = false
- # stream_tls_cert is the x509 certificate file path used to serve the encrypted stream.
- # This file can change, and CRIO will automatically pick up the changes within 5 minutes.
- stream_tls_cert = ""
- # stream_tls_key is the key file path used to serve the encrypted stream.
- # This file can change, and CRIO will automatically pick up the changes within 5 minutes.
- stream_tls_key = ""
- # stream_tls_ca is the x509 CA(s) file used to verify and authenticate client
- # communication with the tls encrypted stream.
- # This file can change, and CRIO will automatically pick up the changes within 5 minutes.
- stream_tls_ca = ""
- # file_locking is whether file-based locking will be used instead of
- # in-memory locking
- file_locking = false
- # The "crio.runtime" table contains settings pertaining to the OCI
- # runtime used and options for how to set up and manage the OCI runtime.
- [crio.runtime]
- # runtime is the OCI compatible runtime used for trusted container workloads.
- # This is a mandatory setting as this runtime will be the default one
- # and will also be used for untrusted container workloads if
- # runtime_untrusted_workload is not set.
- runtime = "/usr/bin/runc"
- # runtime_untrusted_workload is the OCI compatible runtime used for untrusted
- # container workloads. This is an optional setting, except if
- # default_container_trust is set to "untrusted".
- runtime_untrusted_workload = ""
- # default_workload_trust is the default level of trust crio puts in container
- # workloads. It can either be "trusted" or "untrusted", and the default
- # is "trusted".
- # Containers can be run through different container runtimes, depending on
- # the trust hints we receive from kubelet:
- # - If kubelet tags a container workload as untrusted, crio will try first to
- # run it through the untrusted container workload runtime. If it is not set,
- # crio will use the trusted runtime.
- # - If kubelet does not provide any information about the container workload trust
- # level, the selected runtime will depend on the default_container_trust setting.
- # If it is set to "untrusted", then all containers except for the host privileged
- # ones, will be run by the runtime_untrusted_workload runtime. Host privileged
- # containers are by definition trusted and will always use the trusted container
- # runtime. If default_container_trust is set to "trusted", crio will use the trusted
- # container runtime for all containers.
- default_workload_trust = "trusted"
- # no_pivot instructs the runtime to not use pivot_root, but instead use MS_MOVE
- no_pivot = false
- # conmon is the path to conmon binary, used for managing the runtime.
- conmon = "/usr/libexec/crio/conmon"
- # conmon_env is the environment variable list for conmon process,
- # used for passing necessary environment variable to conmon or runtime.
- conmon_env = [
- "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
- ]
- # selinux indicates whether or not SELinux will be used for pod
- # separation on the host. If you enable this flag, SELinux must be running
- # on the host.
- selinux = true
- # seccomp_profile is the seccomp json profile path which is used as the
- # default for the runtime.
- seccomp_profile = "/etc/crio/seccomp.json"
- # apparmor_profile is the apparmor profile name which is used as the
- # default for the runtime.
- apparmor_profile = "crio-default"
- # cgroup_manager is the cgroup management implementation to be used
- # for the runtime.
- cgroup_manager = "systemd"
- # default_capabilities is the list of capabilities to add and can be modified here.
- # If capabilities below is commented out, the default list of capabilities defined in the
- # spec will be added.
- # If capabilities is empty below, only the capabilities defined in the container json
- # file by the user/kube will be added.
- default_capabilities = [
- "CHOWN",
- "DAC_OVERRIDE",
- "FSETID",
- "FOWNER",
- "NET_RAW",
- "SETGID",
- "SETUID",
- "SETPCAP",
- "NET_BIND_SERVICE",
- "SYS_CHROOT",
- "KILL",
- ]
- # hooks_dir_path is the oci hooks directory for automatically executed hooks
- hooks_dir_path = "/usr/share/containers/oci/hooks.d"
- # default_mounts is the mounts list to be mounted for the container when created
- # deprecated, will be taken out in future versions, add default mounts to either
- # /usr/share/containers/mounts.conf or /etc/containers/mounts.conf
- default_mounts = [
- "/usr/share/rhel/secrets:/run/secrets",
- ]
- # Path to directory in which container exit files are written to by conmon.
- container_exits_dir = "/var/run/crio/exits"
- # Path to directory for container attach sockets.
- container_attach_socket_dir = "/var/run/crio"
- # CRI-O reads its default mounts from the following two files:
- # 1) /etc/containers/mounts.conf - this is the override file, where users can
- # either add in their own default mounts, or override the default mounts shipped
- # with the package.
- # 2) /usr/share/containers/mounts.conf - this is the default file read for mounts.
- # If you want CRI-O to read from a different, specific mounts file, you can change
- # the default_mounts_file path right below. Note, if this is done, CRI-O will only add
- # mounts it finds in this file.
- # default_mounts_file is the file path holding the default mounts to be mounted for the
- # container when created.
- # default_mounts_file = ""
- # pids_limit is the number of processes allowed in a container
- pids_limit = 1024
- # log_size_max is the max limit for the container log size in bytes.
- # Negative values indicate that no limit is imposed.
- log_size_max = -1
- # read-only indicates whether all containers will run in read-only mode
- read_only = false
- # log_level changes the verbosity of the logs printed.
- # Options are: error (default), fatal, panic, warn, info, and debug
- log_level = "error"
- # The "crio.image" table contains settings pertaining to the
- # management of OCI images.
- # uid_mappings specifies the UID mappings to have in the user namespace.
- # A range is specified in the form containerUID:HostUID:Size. Multiple
- # ranges are separed by comma.
- uid_mappings = ""
- # gid_mappings specifies the GID mappings to have in the user namespace.
- # A range is specified in the form containerGID:HostGID:Size. Multiple
- # ranges are separed by comma.
- gid_mappings = ""
- [crio.image]
- # default_transport is the prefix we try prepending to an image name if the
- # image name as we receive it can't be parsed as a valid source reference
- default_transport = "docker://"
- # pause_image is the image which we use to instantiate infra containers.
- pause_image = "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f4767e691bd6b984691dd48a13313c13fece8442d0bd43756f8e9d0145861d4"
- # If not empty, the path to a docker/config.json-like file containing credentials
- # necessary for pulling the image specified by pause_image above.
- pause_image_auth_file = "/var/lib/kubelet/config.json"
- # pause_command is the command to run in a pause_image to have a container just
- # sit there. If the image contains the necessary information, this value need
- # not be specified.
- pause_command = "/usr/bin/pod"
- # signature_policy is the name of the file which decides what sort of policy we
- # use when deciding whether or not to trust an image that we've pulled.
- # Outside of testing situations, it is strongly advised that this be left
- # unspecified so that the default system-wide policy will be used.
- signature_policy = ""
- # image_volumes controls how image volumes are handled.
- # The valid values are mkdir and ignore.
- image_volumes = "mkdir"
- # CRI-O reads its configured registries defaults from the containers/image configuration
- # file, /etc/containers/registries.conf. Modify registries.conf if you want to
- # change default registries for all tools that use containers/image. If you
- # want to modify just crio, you can change the registies configuration in this
- # file.
- # insecure_registries is used to skip TLS verification when pulling images.
- # insecure_registries = [
- # ]
- # registries is used to specify a comma separated list of registries to be used
- # when pulling an unqualified image (e.g. fedora:rawhide).
- #registries = [
- # ]
- # The "crio.network" table contains settings pertaining to the
- # management of CNI plugins.
- [crio.network]
- # network_dir is is where CNI network configuration
- # files are stored.
- network_dir = "/etc/cni/net.d/"
- # plugin_dir is is where CNI plugin binaries are stored.
- plugin_dir = "/usr/libexec/cni"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement