Ansible role to install containerd. containerd is an industry-standard container runtime with an emphasis on simplicity, robustness and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, low-level storage and network attachments, etc.
Change history:
See full CHANGELOG
Recent changes:
-
Breaking
meta/main.yml: Changemin_ansible_versionto 2.15. Ansible 2.9 is end-of-life (EOL).
-
UPDATE
- update
containerdtov2.1.4 - update
.gitignore - update
.yamllint - fix
ansible-lintissues
- update
-
UPDATE
- update
containerdtov2.1.3
- update
-
MOLECULE
- Use
generic/archVagrant box instead ofarchlinux/archlinux(no longer available) - Install
opensslpackage for Archlinux - Removed Ubuntu 20.04 because reached end of life
- Use
Note: This a major release update to containerd version 2.0.2! Please read the changelog of containerd v2.0.2 accordingly! In general if you haven't used any "exotic" features so far this version of the Ansible role should cover everything already and upgrading should be smooth. Nevertheless you should test the changes before!
-
POTENTIALLY BREAKING
containerd_configvariable value was adjusted to to meetcontainerdconfiguration requirements of version3. Please see Full configuration for all possible values. If you haven't adjusted this variable then there should be no need to change anything and upgrading should be smooth.- update list of containerd binaries in
containerd_binariesvariable.containerd-shim-runc-v1andcontainerd-shimwere removed as no longer provided by upstream.
-
UPDATE
- update
containerdtov2.0.2 templates/etc/systemd/system/containerd.service.j2: adddbus.servicetoAfter=
- update
-
MOLECULE
- adjust expected output of
ctr pullcommand
- adjust expected output of
-
Directly download from Github (change into Ansible role directory before cloning):
git clone https://github.com/githubixx/ansible-role-containerd.git githubixx.containerd -
Via
ansible-galaxycommand and download directly from Ansible Galaxy:ansible-galaxy install role githubixx.containerd -
Create a
requirements.ymlfile with the following content (this will download the role from Github) and install withansible-galaxy role install -r requirements.yml:
---
roles:
- name: githubixx.containerd
src: https://github.com/githubixx/ansible-role-containerd.git
version: 0.16.0+2.1.4# Only value "base" is currently supported
containerd_flavor: "base"
# containerd version to install
containerd_version: "2.1.4"
# Directory where to store "containerd" binaries
containerd_binary_directory: "/usr/local/bin"
# Location of containerd configuration file
containerd_config_directory: "/etc/containerd"
# Directory to store the archive
containerd_tmp_directory: "{{ lookup('env', 'TMPDIR') | default('/tmp', true) }}"
# Owner/group of "containerd" binaries. If the variables are not set
# the resulting binary will be owned by the current user.
containerd_owner: "root"
containerd_group: "root"
# Specifies the permissions of the "containerd" binaries
containerd_binary_mode: "0755"
# Operating system
# Possible options: "linux", "windows"
containerd_os: "linux"
# Processor architecture "containerd" should run on.
# Other possible values: "arm64","arm"
containerd_arch: "amd64"
# Name of the archive file name
containerd_archive_base: "containerd-{{ containerd_version }}-{{ containerd_os }}-{{ containerd_arch }}.tar.gz"
# The containerd download URL (normally no need to change it)
containerd_url: "https://github.com/containerd/containerd/releases/download/v{{ containerd_version }}/{{ containerd_archive_base }}"
# containerd systemd service settings
containerd_service_settings:
"ExecStartPre": "{{ modprobe_location }} overlay"
"ExecStart": "{{ containerd_binary_directory }}/containerd"
"Restart": "always"
"RestartSec": "5"
"Type": "notify"
"Delegate": "yes"
"KillMode": "process"
"OOMScoreAdjust": "-999"
"LimitNOFILE": "1048576"
"LimitNPROC": "infinity"
"LimitCORE": "infinity"
# Content of configuration file of "containerd". The settings below are the
# settings that are either different to the default "containerd" settings or
# stated explicitly to make important settings more visible even if they're
# default. So these settings will override the default settings.
#
# The default "containerd" configuration can be generated with this command:
#
# containerd config default
#
# A full configuration example with all possible options is also available here:
# https://github.com/containerd/containerd/blob/main/docs/cri/config.md#full-configuration
#
# Also if you want to adjust settings please consult the CRI Plugin Config Guide:
# https://github.com/containerd/containerd/blob/main/docs/cri/config.md
#
# Difference to default configuration:
#
# - In 'plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc.options' the
# setting "SystemdCgroup" is set to "true" instead of "false". This is relevant for
# Kubernetes e.g. Also see:
# https://kubernetes.io/docs/setup/production-environment/container-runtimes/#containerd-systemd)
#
containerd_config: |
version = 3
[plugins]
[plugins.'io.containerd.cri.v1.runtime']
[plugins.'io.containerd.cri.v1.runtime'.containerd]
default_runtime_name = 'runc'
[plugins.'io.containerd.cri.v1.runtime'.containerd.runtimes]
[plugins.'io.containerd.cri.v1.runtime'.containerd.runtimes.runc]
runtime_type = 'io.containerd.runc.v2'
[plugins.'io.containerd.cri.v1.runtime'.containerd.runtimes.runc.options]
BinaryName = '/usr/local/sbin/runc'
SystemdCgroup = true
[plugins.'io.containerd.cri.v1.runtime'.cni]
bin_dir = '/opt/cni/bin'
conf_dir = '/etc/cni/net.d'Optional dependencies (e.g. needed for Kubernetes):
You can use every other runc and CNI role of course.
- hosts: your-host
roles:
- githubixx.containerdMore examples are available in the Molecule tests.
This role has a small test setup that is created using Molecule, libvirt (vagrant-libvirt) and QEMU/KVM. Please see my blog post Testing Ansible roles with Molecule, libvirt (vagrant-libvirt) and QEMU/KVM how to setup. The test configuration is here.
Afterwards molecule can be executed:
molecule convergeThis will setup a few virtual machines (VM) with different supported Linux operating systems and installs containerd, runc and the CNI plugins (which are needed by Kubernetes e.g.).
A small verification step is also included. It pulls a nginx container and runs it to make sure that containerd is setup correctly and is able to run container images:
molecule verifyTo clean up run
molecule destroyGNU GENERAL PUBLIC LICENSE Version 3