Skip to content

Commit 7e155c2

Browse files
committed
(chore) Docker and dockershim were removed from Kubernetes in version 1.24. This change removes all Docker-related installation, configuration, and runtime code from AgentBaker, as containerd is now the only supported container runtime.
**aks-node-controller/helpers/utils.go** - Removed conditional logic for dockerShim flag removal - Now unconditionally removes dockerShim flags since Docker is no longer supported - Flags removed: `--cni-bin-dir`, `--cni-cache-dir`, `--cni-conf-dir`, `--docker-endpoint`, `--image-pull-progress-deadline`, `--network-plugin`, `--network-plugin-mtu` **pkg/agent/baker.go** - Applied same unconditional dockerShim flag removal in `ValidateAndSetLinuxNodeBootstrappingConfiguration()` - Removed unused `profile` variable after eliminating containerd runtime check - Removed template functions: `IsDockerContainerRuntime` and `RequiresDocker` - Added comments explaining Docker removal in Kubernetes 1.24 **parts/linux/cloud-init/artifacts/cse_config.sh** - Removed `ensureDocker()` function (lines 414-432) - Function was responsible for starting Docker service and configuring daemon.json **parts/linux/cloud-init/artifacts/cse_main.sh** - Removed conditional Docker/containerd runtime selection - Now always calls `ensureContainerd` since it's the only supported runtime - Removed Docker login logic for private registry authentication - Private registry auth is now handled through containerd configuration **parts/linux/cloud-init/artifacts/cse_cmd.sh** - Removed `NEEDS_DOCKER_LOGIN` template variable - Variable was used to determine if Docker login was needed for private registries **parts/linux/cloud-init/artifacts/cse_install.sh** - Removed call to `installMoby()` in `installContainerRuntime()` - Added shellcheck directive for `cleanupImagesRun()` function (unrelated fix) **pkg/agent/datamodel/types.go** - `NeedsContainerd()` method already updated to always return `true` - `RequiresDocker()` method already deprecated and always returns `false` - Both methods kept for backwards compatibility with clear deprecation comments **pkg/agent/datamodel/types_test.go** - Updated `TestHasContainerd` to expect `true` for all runtime configurations - Updated test cases for Docker, empty string, and unexpected runtime values - Updated `TestKubernetesConfig_RequiresDocker` to expect `false` for all cases - Added explanatory comments about Kubernetes 1.24 Docker removal - Regenerated all snapshot test data via `make generate` - All Go tests pass successfully with new Docker-removed logic The following kubelet flags were part of dockershim and are no longer valid: - `--cni-bin-dir`: CNI binary directory - `--cni-cache-dir`: CNI cache directory - `--cni-conf-dir`: CNI configuration directory - `--docker-endpoint`: Docker endpoint socket - `--image-pull-progress-deadline`: Image pull progress deadline - `--network-plugin`: Network plugin type - `--network-plugin-mtu`: Network plugin MTU - **Before**: Conditional logic checked `ContainerRuntime` config to decide between Docker and containerd - **After**: Containerd is always used as the container runtime - **Private Registry Auth**: Moved from `docker login` to containerd registry configuration The following Docker/Moby-related code remains but is no longer called: - `installMoby()` function in `parts/linux/cloud-init/artifacts/ubuntu/cse_install_ubuntu.sh` - `removeMoby()` function in `parts/linux/cloud-init/artifacts/ubuntu/cse_install_ubuntu.sh` - `ensureRunc()` function still exists (used by containerd) These can be removed in a follow-up cleanup PR if desired. - ✅ All Go unit tests pass - ✅ Datamodel tests updated and passing - ✅ Test data regenerated successfully - ✅ Shellcheck validation passes (warnings are pre-existing style issues unrelated to this change) - Kubernetes 1.24 removed dockershim: https://kubernetes.io/blog/2022/05/03/dockershim-historical-context/ - Docker/containerd migration: https://kubernetes.io/docs/tasks/administer-cluster/migrating-from-dockershim/ This change: - Simplifies the codebase by removing Docker-specific logic - Aligns with Kubernetes 1.24+ which only supports containerd (and CRI-compatible runtimes) - Reduces maintenance burden by removing deprecated code paths - Has no functional impact on AKS nodes as Docker has not been supported since Kubernetes 1.24 --- **Breaking Change**: This removes support for Docker runtime configurations. All clusters must use containerd (which has been the default and only supported runtime since Kubernetes 1.24).
1 parent 68e1210 commit 7e155c2

225 files changed

Lines changed: 704 additions & 3254 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.pipelines/.vsts-Marketpalce-win.yaml

Lines changed: 1 addition & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -8,22 +8,6 @@ variables:
88
CONTAINER_IMAGE: 'mcr.microsoft.com/oss/azcu/go-dev:v1.34.7'
99

1010
stages:
11-
- stage: create_sku_and_publish_2019_image
12-
dependsOn: []
13-
condition: eq(variables.FOR_2019, 'True')
14-
jobs:
15-
- job: build
16-
timeoutInMinutes: 180
17-
steps:
18-
- bash: |
19-
echo '##vso[task.setvariable variable=PUBLISHER]microsoft-aks'
20-
echo '##vso[task.setvariable variable=OFFER]aks-windows'
21-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]docker'
22-
echo '##vso[task.setvariable variable=SKU_PREFIX]aks-2019-datacenter-core-smalldisk'
23-
displayName: Setup Build Variables
24-
- template: ./templates/.builder-Marketplace-win-template.yaml
25-
parameters:
26-
artifactName: 2019
2711
- stage: create_sku_and_publish_2019_containerd_image
2812
dependsOn: []
2913
condition: eq(variables.FOR_2019_CONTAINERD, 'True')
@@ -34,9 +18,8 @@ stages:
3418
- bash: |
3519
echo '##vso[task.setvariable variable=PUBLISHER]microsoft-aks'
3620
echo '##vso[task.setvariable variable=OFFER]aks-windows'
37-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]containerd'
3821
echo '##vso[task.setvariable variable=SKU_PREFIX]aks-2019-datacenter-core-ctrd'
3922
displayName: Setup Build Variables
4023
- template: ./templates/.builder-Marketplace-win-template.yaml
4124
parameters:
42-
artifactName: 2019-containerd
25+
artifactName: 2019-containerd

.pipelines/.vsts-vhd-builder-release.yaml

Lines changed: 43 additions & 46 deletions
Large diffs are not rendered by default.

.pipelines/.vsts-vhd-builder.yaml

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,6 @@ stages:
6262
echo '##vso[task.setvariable variable=HYPERV_GENERATION]V2'
6363
echo '##vso[task.setvariable variable=AZURE_VM_SIZE]Standard_D16ds_v5'
6464
echo '##vso[task.setvariable variable=FEATURE_FLAGS]None'
65-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]containerd'
6665
echo '##vso[task.setvariable variable=ARCHITECTURE]X86_64'
6766
echo '##vso[task.setvariable variable=ENABLE_FIPS]True'
6867
echo '##vso[task.setvariable variable=ENABLE_TRUSTED_LAUNCH]False'
@@ -83,7 +82,6 @@ stages:
8382
echo '##vso[task.setvariable variable=HYPERV_GENERATION]V2'
8483
echo '##vso[task.setvariable variable=AZURE_VM_SIZE]Standard_D16ds_v5'
8584
echo '##vso[task.setvariable variable=FEATURE_FLAGS]None'
86-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]containerd'
8785
echo '##vso[task.setvariable variable=ARCHITECTURE]X86_64'
8886
echo '##vso[task.setvariable variable=ENABLE_FIPS]False'
8987
echo '##vso[task.setvariable variable=ENABLE_TRUSTED_LAUNCH]False'
@@ -104,7 +102,6 @@ stages:
104102
echo '##vso[task.setvariable variable=HYPERV_GENERATION]V2'
105103
echo '##vso[task.setvariable variable=AZURE_VM_SIZE]Standard_D16ds_v5'
106104
echo '##vso[task.setvariable variable=FEATURE_FLAGS]None'
107-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]containerd'
108105
echo '##vso[task.setvariable variable=ARCHITECTURE]X86_64'
109106
echo '##vso[task.setvariable variable=ENABLE_FIPS]false'
110107
echo '##vso[task.setvariable variable=ENABLE_TRUSTED_LAUNCH]False'
@@ -125,7 +122,6 @@ stages:
125122
echo '##vso[task.setvariable variable=HYPERV_GENERATION]V2'
126123
echo '##vso[task.setvariable variable=AZURE_VM_SIZE]Standard_D16pds_v5'
127124
echo '##vso[task.setvariable variable=FEATURE_FLAGS]None'
128-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]containerd'
129125
echo '##vso[task.setvariable variable=ARCHITECTURE]ARM64'
130126
echo '##vso[task.setvariable variable=ENABLE_FIPS]False'
131127
echo '##vso[task.setvariable variable=ENABLE_TRUSTED_LAUNCH]False'
@@ -146,7 +142,6 @@ stages:
146142
echo '##vso[task.setvariable variable=HYPERV_GENERATION]V2'
147143
echo '##vso[task.setvariable variable=AZURE_VM_SIZE]Standard_D16ds_v5'
148144
echo '##vso[task.setvariable variable=FEATURE_FLAGS]None'
149-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]containerd'
150145
echo '##vso[task.setvariable variable=ARCHITECTURE]X86_64'
151146
echo '##vso[task.setvariable variable=ENABLE_FIPS]false'
152147
echo '##vso[task.setvariable variable=ENABLE_TRUSTED_LAUNCH]False'
@@ -168,7 +163,6 @@ stages:
168163
echo '##vso[task.setvariable variable=HYPERV_GENERATION]V2'
169164
echo '##vso[task.setvariable variable=AZURE_VM_SIZE]Standard_D16ds_v5'
170165
echo '##vso[task.setvariable variable=FEATURE_FLAGS]None'
171-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]containerd'
172166
echo '##vso[task.setvariable variable=ARCHITECTURE]X86_64'
173167
echo '##vso[task.setvariable variable=ENABLE_FIPS]false'
174168
echo '##vso[task.setvariable variable=ENABLE_TRUSTED_LAUNCH]False'
@@ -190,7 +184,6 @@ stages:
190184
echo '##vso[task.setvariable variable=HYPERV_GENERATION]V2'
191185
echo '##vso[task.setvariable variable=AZURE_VM_SIZE]Standard_D16pds_v5'
192186
echo '##vso[task.setvariable variable=FEATURE_FLAGS]None'
193-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]containerd'
194187
echo '##vso[task.setvariable variable=ARCHITECTURE]ARM64'
195188
echo '##vso[task.setvariable variable=ENABLE_FIPS]True'
196189
echo '##vso[task.setvariable variable=ENABLE_TRUSTED_LAUNCH]False'
@@ -211,7 +204,6 @@ stages:
211204
echo '##vso[task.setvariable variable=HYPERV_GENERATION]V2'
212205
echo '##vso[task.setvariable variable=AZURE_VM_SIZE]Standard_D16ds_v5'
213206
echo '##vso[task.setvariable variable=FEATURE_FLAGS]None'
214-
echo '##vso[task.setvariable variable=CONTAINER_RUNTIME]containerd'
215207
echo '##vso[task.setvariable variable=ARCHITECTURE]X86_64'
216208
echo '##vso[task.setvariable variable=ENABLE_FIPS]false'
217209
echo '##vso[task.setvariable variable=ENABLE_TRUSTED_LAUNCH]False'

.pipelines/templates/.builder-release-template.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ steps:
9393
if grep -q "cvm" <<< "$FEATURE_FLAGS"; then SKU_NAME="${SKU_NAME}CVM"; fi && \
9494
if [[ "${IMG_SKU}" == *"minimal"* ]]; then SKU_NAME="${SKU_NAME}minimal"; fi && \
9595
if [[ "${ENABLE_TRUSTED_LAUNCH}" == "True" ]]; then SKU_NAME="${SKU_NAME}TL"; fi && \
96-
if [[ ${OS_SKU} != "CBLMariner" && ${OS_SKU} != "AzureLinux" && ${OS_SKU} != "AzureLinuxOSGuard" && ${OS_SKU} != "Flatcar" && "${CONTAINER_RUNTIME}" == "containerd" ]]; then SKU_NAME="${SKU_NAME}containerd"; fi && \
96+
if [[ ${OS_SKU} != "CBLMariner" && ${OS_SKU} != "AzureLinux" && ${OS_SKU} != "AzureLinuxOSGuard" && ${OS_SKU} != "Flatcar" ]]; then SKU_NAME="${SKU_NAME}containerd"; fi && \
9797
SKU_NAME=$(echo ${SKU_NAME} | tr -d '.') && \
9898
echo "##vso[task.setvariable variable=SKU_NAME]$SKU_NAME"
9999
echo "Set SKU_NAME to $SKU_NAME"

aks-node-controller/helpers/utils.go

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -190,19 +190,19 @@ func ValidateAndSetLinuxKubeletFlags(kubeletFlags map[string]string, cs *datamod
190190
delete(kubeletFlags, "--dynamic-config-dir")
191191
delete(kubeletFlags, "--non-masquerade-cidr")
192192

193-
if profile != nil && profile.KubernetesConfig != nil && profile.KubernetesConfig.ContainerRuntime == "containerd" {
194-
dockerShimFlags := []string{
195-
"--cni-bin-dir",
196-
"--cni-cache-dir",
197-
"--cni-conf-dir",
198-
"--docker-endpoint",
199-
"--image-pull-progress-deadline",
200-
"--network-plugin",
201-
"--network-plugin-mtu",
202-
}
203-
for _, flag := range dockerShimFlags {
204-
delete(kubeletFlags, flag)
205-
}
193+
// Docker and dockershim were removed in Kubernetes 1.24
194+
// These flags are no longer supported and should be removed for all configurations
195+
dockerShimFlags := []string{
196+
"--cni-bin-dir",
197+
"--cni-cache-dir",
198+
"--cni-conf-dir",
199+
"--docker-endpoint",
200+
"--image-pull-progress-deadline",
201+
"--network-plugin",
202+
"--network-plugin-mtu",
203+
}
204+
for _, flag := range dockerShimFlags {
205+
delete(kubeletFlags, flag)
206206
}
207207

208208
if isKubeletServingCertificateRotationEnabled(kubeletFlags) {

aks-node-controller/parser/parser.go

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,8 @@ func getCSEEnv(config *aksnodeconfigv1.Configuration) map[string]string {
4545
"CLOUDPROVIDER_RATELIMIT_QPS_WRITE": "10",
4646
"CLOUDPROVIDER_RATELIMIT_BUCKET": "100",
4747
"CLOUDPROVIDER_RATELIMIT_BUCKET_WRITE": "100",
48-
"CONTAINER_RUNTIME": "containerd",
4948
"CLI_TOOL": "ctr",
5049
"NETWORK_MODE": "transparent",
51-
"NEEDS_CONTAINERD": "true",
52-
"NEEDS_DOCKER_LOGIN": "false",
5350
"ADMINUSER": getLinuxAdminUsername(config.GetLinuxAdminUsername()),
5451
"TENANT_ID": config.GetAuthConfig().GetTenantId(),
5552
"KUBERNETES_VERSION": config.GetKubernetesVersion(),

aks-node-controller/parser/parser_test.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -419,7 +419,6 @@ func TestAKSNodeConfigCompatibilityFromJsonToCSECommand(t *testing.T) {
419419
assert.Equal(t, "", vars["THP_DEFRAG"])
420420
assert.Equal(t, "false", vars["DISABLE_SSH"])
421421
assert.Equal(t, "true", vars["IS_VHD"])
422-
assert.Equal(t, "false", vars["NEEDS_DOCKER_LOGIN"])
423422
assert.Equal(t, "", vars["MOBY_VERSION"])
424423
assert.Equal(t, "", vars["LOAD_BALANCER_SKU"])
425424
assert.Equal(t, "", vars["NETWORK_POLICY"])

aks-node-controller/proto/README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
This readme is to describe the new public data contract `AKSNodeConfig` between a bootstrap requester (client) and a Linux node to be bootstrapped and join an AKS cluster. The contract is defined in a set of proto files with [protobuf](https://protobuf.dev/). And we convert/compile all the proto files into specific programming languages. Currently we only convert to .go files for Go. We can convert to other languages if needed in the future. A simple way to compile the files to Go is to run this command at `AgentBaker/aks-node-controller` directory.
22
```
33
make proto-generate
4-
```
4+
```
55
Note: This command uses Docker to compile the proto files so you need to have Docker running otherwise you will see corresponing error message.
66

77
# Public data contract `AKSNodeConfig`
@@ -53,7 +53,7 @@ This table is describing the all the `AKSNodeConfig` Fields converted to .go fil
5353

5454

5555
Removed old environment variables from cse_cmd.sh:
56-
`CSE_HELPERS_FILEPATH`, `CSE_DISTRO_HELPERS_FILEPATH`, `CSE_INSTALL_FILEPATH`, `CSE_DISTRO_INSTALL_FILEPATH`, `CSE_CONFIG_FILEPATH`, `DHCPV6_SERVICE_FILEPATH`, `DHCPV6_CONFIG_FILEPATH`, `NEEDS_DOCKER_LOGIN`, `NEEDS_CONTAINERD`, `CLI_TOOL`, `CONTAINER_RUNTIME`, `MOBY_VERSION`, `HYPERKUBE_URL`, `SGX_NODE`, `GPU_DRIVER_TYPE` and more.
56+
`CSE_HELPERS_FILEPATH`, `CSE_DISTRO_HELPERS_FILEPATH`, `CSE_INSTALL_FILEPATH`, `CSE_DISTRO_INSTALL_FILEPATH`, `CSE_CONFIG_FILEPATH`, `DHCPV6_SERVICE_FILEPATH`, `DHCPV6_CONFIG_FILEPATH`, `CLI_TOOL`, `MOBY_VERSION`, `HYPERKUBE_URL`, `SGX_NODE`, `GPU_DRIVER_TYPE` and more.
5757

5858
Many variables are changed to optional and we have a builder function as a helper to provide default values. For example, the builder function defaults `LinuxAdminUsername` to value `azureuser`, `OutboundCommand` to a default outbound command `curl -v --insecure --proxy-insecure https://mcr.microsoft.com/v2/`.
5959

@@ -89,7 +89,7 @@ The default value for an unset string variable is an empty string.
8989
If this variable’s value is unset, the consumer will get a nil value. With that, the feature owner can use this additional state (besides true and false for a bool) to add some logic to it.
9090

9191
Considering an evolution scenario where we should be adding a label `optional`. We will explain what the effect of adding this label is.
92-
There is a new feature AwesomeFeature, which will replace an old feature OldFeature gradually. It is still in a pre-production state and is not ready in the VHD provisioning process yet. A dev adds a new variable AwesomeFeature to the contract and set it as false. The label `optional` should be added to this variable.
92+
There is a new feature AwesomeFeature, which will replace an old feature OldFeature gradually. It is still in a pre-production state and is not ready in the VHD provisioning process yet. A dev adds a new variable AwesomeFeature to the contract and set it as false. The label `optional` should be added to this variable.
9393
An evolutional scenario will look like this,
9494
1. When AwesomeFeature is not yet available and the OldFeature is still running:
9595
AwesomeFeature = false, OldFeature=true
@@ -110,7 +110,7 @@ Nevertheless, it’s not a big harm to use `optional` even though it’s not nee
110110
1. Update corresponding .proto files to the data contract. Usually we start with `config.proto`.
111111
2. From the `AgentBaker/aks-node-controller` directory run `make proto-generate` to compile the .proto definitions into `Go`; this regenerates the public API (the `AKSNodeConfig` Go types).
112112
3. Tell how VHD should react to this new variable by updaing the bootscripts as you do before. Basically you will be modifying shell scripts like `install-dependencies.sh`, `cse_install.sh`, `cse_helpers.sh`, etc. You may also want to add some unit tests to spec files like `cse_install_spec.sh`, `cse_helpers.sh` to find bugs earlier.
113-
4. On the VHD side, we are still invoking the bootstrap scripts under the hood. To set the environment variables of the CSE trigger command, add the desired variable to `getCSEEnv()` in [parser.go](https://github.com/Azure/AgentBaker/blob/dev/aks-node-controller/parser/parser.go). If you need to add a corresponding file to the VHD, please generate the file in the bootstrap scripts rather than adding to [`nodecustomdata.yml`](https://github.com/Azure/AgentBaker/blob/dev/parts/linux/cloud-init/nodecustomdata.yml) as this file will eventually be deprecated. Here is an [example](https://github.com/Azure/AgentBaker/commit/81ce18fb7f53acab3c7fe8f3a70b635baf1f2f52) for generating the kube CA cert.
113+
4. On the VHD side, we are still invoking the bootstrap scripts under the hood. To set the environment variables of the CSE trigger command, add the desired variable to `getCSEEnv()` in [parser.go](https://github.com/Azure/AgentBaker/blob/dev/aks-node-controller/parser/parser.go). If you need to add a corresponding file to the VHD, please generate the file in the bootstrap scripts rather than adding to [`nodecustomdata.yml`](https://github.com/Azure/AgentBaker/blob/dev/parts/linux/cloud-init/nodecustomdata.yml) as this file will eventually be deprecated. Here is an [example](https://github.com/Azure/AgentBaker/commit/81ce18fb7f53acab3c7fe8f3a70b635baf1f2f52) for generating the kube CA cert.
114114

115115
Note: Node SIG is working on migrating all scripts to managable Go binary. Before it's done, the bootstrap scripts will still be used.
116116

@@ -145,17 +145,17 @@ Example: IMDSRestrictionConfig [Example PR](https://github.com/Azure/AgentBaker/
145145
```
146146
147147
**Default value behavior:**
148-
If the client (such as AKS-RP) doesn't specify a value for `EnableImdsRestriction`, it will default to `false`. You can see this defaulting logic in the generated `GetEnableImdsRestriction` method in `imdsrestrictionconfig.pb.go`.
148+
If the client (such as AKS-RP) doesn't specify a value for `EnableImdsRestriction`, it will default to `false`. You can see this defaulting logic in the generated `GetEnableImdsRestriction` method in `imdsrestrictionconfig.pb.go`.
149149
150150
This should fit most use cases. However, if you need to explicitly distinguish between a client setting `false` versus not setting the value at all (which defaults to `false`), you'll need to use the `optional` label for explicit presence. In that case, refer to the earlier section _When to use the label `optional` specifically in `proto3`?_
151151
152152
4. Add comprehensive tests to cover your changes.
153-
153+
154154
**Testing with AKSNodeConfig approach:**
155155
- Add test cases using the `AKSNodeConfig` approach, such as `Test_AzureLinuxV2_ARM64_Scriptless` in `e2e/scenario_test.go`
156156
- The key difference between the legacy and new approaches is the configuration interface:
157157
- **Legacy approach:** Uses `datamodel.NodeBootstrappingConfiguration`
158158
- **New approach:** Uses `AKSNodeConfig`
159159
- In e2e tests (`scenario_test.go`), this means:
160160
- **Legacy:** Use `BootstrapConfigMutator` to set configurations
161-
- **New:** Use `AKSNodeConfigMutator` to set configurations
161+
- **New:** Use `AKSNodeConfigMutator` to set configurations

e2e/node_config.go

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -513,10 +513,6 @@ func baseTemplateLinux(t testing.TB, location string, k8sVersion string, arch st
513513
},
514514
CloudSpecConfig: &datamodel.AzureEnvironmentSpecConfig{
515515
CloudName: "AzurePublicCloud",
516-
DockerSpecConfig: datamodel.DockerSpecConfig{
517-
DockerEngineRepo: "https://aptdocker.azureedge.net/repo",
518-
DockerComposeDownloadURL: "https://github.com/docker/compose/releases/download",
519-
},
520516
KubernetesSpecConfig: datamodel.KubernetesSpecConfig{
521517
AzureTelemetryPID: "",
522518
KubernetesImageBase: "k8s.gcr.io/",
@@ -831,10 +827,6 @@ DXRqvV7TWO2hndliQq3BW385ZkiephlrmpUVM= r2k1@arturs-mbp.lan`,
831827
},
832828
CloudSpecConfig: &datamodel.AzureEnvironmentSpecConfig{
833829
CloudName: "AzurePublicCloud",
834-
DockerSpecConfig: datamodel.DockerSpecConfig{
835-
DockerEngineRepo: "https://aptdocker.azureedge.net/repo",
836-
DockerComposeDownloadURL: "https://github.com/docker/compose/releases/download",
837-
},
838830
KubernetesSpecConfig: datamodel.KubernetesSpecConfig{
839831
ACIConnectorImageBase: "microsoft/",
840832
AlwaysPullWindowsPauseImage: false,

parts/linux/cloud-init/artifacts/cse_cmd.sh

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,6 @@ USE_INSTANCE_METADATA={{GetVariable "useInstanceMetadata"}}
5151
LOAD_BALANCER_SKU={{GetVariable "loadBalancerSku"}}
5252
EXCLUDE_MASTER_FROM_STANDARD_LB={{GetVariable "excludeMasterFromStandardLB"}}
5353
MAXIMUM_LOADBALANCER_RULE_COUNT={{GetVariable "maximumLoadBalancerRuleCount"}}
54-
CONTAINER_RUNTIME={{GetParameter "containerRuntime"}}
5554
CLI_TOOL={{GetParameter "cliTool"}}
5655
CONTAINERD_DOWNLOAD_URL_BASE={{GetParameter "containerdDownloadURLBase"}}
5756
NETWORK_MODE={{GetParameter "networkMode"}}
@@ -73,7 +72,6 @@ RUNC_PACKAGE_URL={{GetParameter "runcPackageURL"}}
7372
ENABLE_HOSTS_CONFIG_AGENT="{{EnableHostsConfigAgent}}"
7473
DISABLE_SSH="{{ShouldDisableSSH}}"
7574
DISABLE_PUBKEY_AUTH="{{ShouldTurnOffPubkeyAuthSSH}}"
76-
NEEDS_CONTAINERD="{{NeedsContainerd}}"
7775
TELEPORT_ENABLED="{{TeleportEnabled}}"
7876
SHOULD_CONFIGURE_HTTP_PROXY="{{ShouldConfigureHTTPProxy}}"
7977
SHOULD_CONFIGURE_HTTP_PROXY_CA="{{ShouldConfigureHTTPProxyCA}}"
@@ -84,12 +82,11 @@ CUSTOM_CA_TRUST_COUNT="{{len GetCustomCATrustConfigCerts}}"
8482
CUSTOM_CA_CERT_{{$i}}="{{$cert}}"
8583
{{end}}
8684
GPU_NEEDS_FABRIC_MANAGER="{{GPUNeedsFabricManager}}"
87-
NEEDS_DOCKER_LOGIN="{{and IsDockerContainerRuntime HasPrivateAzureRegistryServer}}"
8885
IPV6_DUAL_STACK_ENABLED="{{IsIPv6DualStackFeatureEnabled}}"
8986
OUTBOUND_COMMAND="{{GetOutboundCommand}}"
9087
BLOCK_OUTBOUND_NETWORK="{{BlockOutboundNetwork}}"
9188
ENABLE_UNATTENDED_UPGRADES="{{EnableUnattendedUpgrade}}"
92-
ENSURE_NO_DUPE_PROMISCUOUS_BRIDGE="{{ and NeedsContainerd IsKubenet (not HasCalicoNetworkPolicy) }}"
89+
ENSURE_NO_DUPE_PROMISCUOUS_BRIDGE="{{ and IsKubenet (not HasCalicoNetworkPolicy) }}"
9390
SHOULD_CONFIG_SWAP_FILE="{{ShouldConfigSwapFile}}"
9491
SHOULD_CONFIG_TRANSPARENT_HUGE_PAGE="{{ShouldConfigTransparentHugePage}}"
9592
SHOULD_CONFIG_CONTAINERD_ULIMITS="{{ShouldConfigContainerdUlimits}}"

0 commit comments

Comments
 (0)