This repository has been archived by the owner on Apr 29, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
containerd.log
2520 lines (2520 loc) · 328 KB
/
containerd.log
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
docs/Developer-Guide.md: * [Enabling full `containerd` debug](#enabling-full-containerd-debug)
docs/Developer-Guide.md: * [Enabling just `containerd shim` debug](#enabling-just-containerd-shim-debug)
docs/Developer-Guide.md:* [Run Kata Containers with Containerd](#run-kata-containers-with-containerd)
docs/Developer-Guide.md:- runtime binary: `/usr/local/bin/kata-runtime` and `/usr/local/bin/containerd-shim-kata-v2`
docs/Developer-Guide.md:If you are using `containerd` and the Kata `containerd-shimv2` to launch Kata Containers, and wish
docs/Developer-Guide.md:to enable Kata debug logging, there are two ways this can be enabled via the `containerd` configuration file,
docs/Developer-Guide.md:The Kata logs appear in the `containerd` log files, along with logs from `containerd` itself.
docs/Developer-Guide.md:For more information about `containerd` debug, please see the
docs/Developer-Guide.md:[`containerd` documentation](https://github.com/containerd/containerd/blob/master/docs/getting-started.md).
docs/Developer-Guide.md:#### Enabling full `containerd` debug
docs/Developer-Guide.md:Enabling full `containerd` debug also enables the shimv2 debug. Edit the `containerd` configuration file
docs/Developer-Guide.md:#### Enabling just `containerd shim` debug
docs/Developer-Guide.md:If you only wish to enable debug for the `containerd` shims themselves, just enable the debug
docs/Developer-Guide.md:option in the `plugins.linux` section of the `containerd` configuration file, such as:
docs/Developer-Guide.md:Refer to the [How to use Kata Containers and Containerd](how-to/containerd-kata.md) how-to guide.
docs/Developer-Guide.md:The kernel boot messages will appear in the `containerd` or `CRI-O` log appropriately,
docs/Developer-Guide.md:$ sudo journalctl -t containerd
docs/Upgrading.md:$ containerd-shim-kata-v2 --version
docs/Upgrading.md:with containerd.
docs/design/VSocks.md:with the containers is if the VM itself or the `containerd-shim-kata-v2` dies, if this happens
docs/design/architecture.md:[Containerd\*](https://github.com/containerd/containerd) implementation.
docs/design/architecture.md:The [`containerd-shim-kata-v2` (shown as `shimv2` from this point onwards)](../../src/runtime/containerd-shim-v2)
docs/design/architecture.md:implements the [Containerd Runtime V2 (Shim API)](https://github.com/containerd/containerd/tree/master/runtime/v2) for Kata.
docs/design/architecture.md:Before `shimv2` (as done in [Kata Containers 1.x releases](https://github.com/kata-containers/runtime/releases)), we need to create a `containerd-shim` and a [`kata-shim`](https://github.com/kata-containers/shim) for each container and the Pod sandbox itself, plus an optional [`kata-proxy`](https://github.com/kata-containers/proxy) when VSOCK is not available. With `shimv2`, Kubernetes can launch Pod and OCI compatible containers with one shim (the `shimv2`) per Pod instead of `2N+1` shims, and no standalone `kata-proxy` process even if no VSOCK is available.
docs/design/architecture.md:as a daemon inside the virtual machine. `kata-agent` runs a [`ttRPC`](https://github.com/containerd/ttrpc-rust) server in
docs/design/architecture.md:stderr, stdin) between the containers and the manage engines (e.g. CRI-O or containerd).
docs/design/architecture.md:`containerd-shim-kata-v2` is a [containerd runtime shimv2](https://github.com/containerd/containerd/blob/v1.4.1/runtime/v2/README.md) implementation and is responsible for handling the `runtime v2 shim APIs`, which is similar to [the OCI runtime specification](https://github.com/opencontainers/runtime-spec) but simplifies the architecture by loading the runtime once and making RPC calls to handle the various container lifecycle commands. This refinement is an improvement on the OCI specification which requires the container manager call the runtime binary multiple times, at least once for each lifecycle command.
docs/design/architecture.md:`containerd-shim-kata-v2` heavily utilizes the
docs/design/architecture.md:The [devicemapper `snapshotter`](https://github.com/containerd/containerd/tree/master/snapshots/devmapper) is a special case. The `snapshotter` uses dedicated block devices rather than formatted filesystems, and operates at the block level rather than the file level. This knowledge is used to directly use the underlying block device instead of the overlay file system for the container root file system. The block device maps to the top read-write layer for the overlay. This approach gives much better I/O performance compared to using `virtio-fs` to share the container file system.
docs/design/architecture.md:[CRI-O\*](https://github.com/kubernetes-incubator/cri-o) and [Containerd\*](https://github.com/containerd/containerd/) are CRI implementations that rely on [OCI](https://github.com/opencontainers/runtime-spec)
docs/design/architecture.md:- [How to use Kata Containers and Containerd](../how-to/containerd-kata.md)
docs/design/architecture.md:With `RuntimeClass`, users can define Kata Containers as a `RuntimeClass` and then explicitly specify that a pod being created as a Kata Containers pod. For details, please refer to [How to use Kata Containers and Containerd](../../docs/how-to/containerd-kata.md).
docs/design/data/metrics.yaml: title: Kata containerd shim v2 metrics
docs/design/data/metrics.yaml: desc: Metrics about Kata containerd shim v2 process.
docs/design/data/metrics.yaml: help: Kata containerd shim v2 open FDs.
docs/design/data/metrics.yaml: help: Kata containerd shim v2 process IO statistics.
docs/design/data/metrics.yaml: help: Kata containerd shim v2 network devices statistics.
docs/design/data/metrics.yaml: help: Kata containerd shim v2 process statistics.
docs/design/data/metrics.yaml: help: Kata containerd shim v2 process status.
docs/design/data/metrics.yaml: help: Kata containerd shim v2 process threads.
docs/design/kata-2-0-metrics.md: * [Kata containerd shim v2 metrics](#kata-containerd-shim-v2-metrics)
docs/design/kata-2-0-metrics.md:- containerd shim v2 (effectively `kata-runtime`)
docs/design/kata-2-0-metrics.md:> **Note**: In Kata 1.x, the main user-facing component was the runtime (`kata-runtime`). From 1.5, Kata then introduced the Kata containerd shim v2 (`containerd-shim-kata-v2`) which is essentially a modified runtime that is loaded by containerd to simplify and improve the way VM-based containers are created and managed.
docs/design/kata-2-0-metrics.md:> For Kata 2.0, the main component is the Kata containerd shim v2, although the deprecated `kata-runtime` binary will be maintained for a period of time.
docs/design/kata-2-0-metrics.md:> Any mention of the "Kata runtime" in this document should be taken to refer to the Kata containerd shim v2 unless explicitly noted otherwise (for example by referring to it explicitly as the `kata-runtime` binary).
docs/design/kata-2-0-metrics.md:The way `kata-monitor` get shim's metrics socket file(`monitor_address`) like that `containerd` get shim address. The socket is an abstract socket and saved as file `abstract` with the same directory of `address` for `containerd`.
docs/design/kata-2-0-metrics.md:* [Kata containerd shim v2 metrics](#kata-containerd-shim-v2-metrics)
docs/design/kata-2-0-metrics.md:### Kata containerd shim v2 metrics
docs/design/kata-2-0-metrics.md:Metrics about Kata containerd shim v2 process.
docs/design/kata-2-0-metrics.md:| `kata_shim_fds`: <br> Kata containerd shim v2 open FDs. | `GAUGE` | | <ul><li>`sandbox_id`</li></ul> | 2.0.0 |
docs/design/kata-2-0-metrics.md:| `kata_shim_io_stat`: <br> Kata containerd shim v2 process IO statistics. | `GAUGE` | | <ul><li>`item` (see `/proc/<pid>/io`)<ul><li>`cancelledwritebytes`</li><li>`rchar`</li><li>`readbytes`</li><li>`syscr`</li><li>`syscw`</li><li>`wchar`</li><li>`writebytes`</li></ul></li><li>`sandbox_id`</li></ul> | 2.0.0 |
docs/design/kata-2-0-metrics.md:| `kata_shim_netdev`: <br> Kata containerd shim v2 network devices statistics. | `GAUGE` | | <ul><li>`interface` (network device name)</li><li>`item` (see `/proc/net/dev`)<ul><li>`recv_bytes`</li><li>`recv_compressed`</li><li>`recv_drop`</li><li>`recv_errs`</li><li>`recv_fifo`</li><li>`recv_frame`</li><li>`recv_multicast`</li><li>`recv_packets`</li><li>`sent_bytes`</li><li>`sent_carrier`</li><li>`sent_colls`</li><li>`sent_compressed`</li><li>`sent_drop`</li><li>`sent_errs`</li><li>`sent_fifo`</li><li>`sent_packets`</li></ul></li><li>`sandbox_id`</li></ul> | 2.0.0 |
docs/design/kata-2-0-metrics.md:| `kata_shim_proc_stat`: <br> Kata containerd shim v2 process statistics. | `GAUGE` | | <ul><li>`item` (see `/proc/<pid>/stat`)<ul><li>`cstime`</li><li>`cutime`</li><li>`stime`</li><li>`utime`</li></ul></li><li>`sandbox_id`</li></ul> | 2.0.0 |
docs/design/kata-2-0-metrics.md:| `kata_shim_proc_status`: <br> Kata containerd shim v2 process status. | `GAUGE` | | <ul><li>`item` (see `/proc/<pid>/status`)<ul><li>`hugetlbpages`</li><li>`nonvoluntary_ctxt_switches`</li><li>`rssanon`</li><li>`rssfile`</li><li>`rssshmem`</li><li>`vmdata`</li><li>`vmexe`</li><li>`vmhwm`</li><li>`vmlck`</li><li>`vmlib`</li><li>`vmpeak`</li><li>`vmpin`</li><li>`vmpmd`</li><li>`vmpte`</li><li>`vmrss`</li><li>`vmsize`</li><li>`vmstk`</li><li>`vmswap`</li><li>`voluntary_ctxt_switches`</li></ul></li><li>`sandbox_id`</li></ul> | 2.0.0 |
docs/design/kata-2-0-metrics.md:| `kata_shim_threads`: <br> Kata containerd shim v2 process threads. | `GAUGE` | | <ul><li>`sandbox_id`</li></ul> | 2.0.0 |
docs/design/kata-design-requirements.md:This interface is used by implementations such as [`CRI-O`](http://cri-o.io) and [`cri-containerd`](https://github.com/containerd/cri-containerd), for example.
docs/design/virtualization.md:Kubelet will interact with a CRI implementor (such as containerd or CRI-O), which will in turn interface with Kata Containers (an OCI based runtime).
docs/how-to/README.md:- [How to use Kata Containers and Containerd](containerd-kata.md)
docs/how-to/README.md:- [How to use Kata Containers and CRI (containerd plugin) with Kubernetes](how-to-use-k8s-with-cri-containerd-and-kata.md)
docs/how-to/containerd-kata.md: - [Containerd Runtime V2 API: Shim V2 API](#containerd-runtime-v2-api-shim-v2-api)
docs/how-to/containerd-kata.md: - [Install containerd with CRI plugin](#install-containerd-with-cri-plugin)
docs/how-to/containerd-kata.md: - [Configure containerd to use Kata Containers](#configure-containerd-to-use-kata-containers)
docs/how-to/containerd-kata.md:This document covers the installation and configuration of [containerd](https://containerd.io/)
docs/how-to/containerd-kata.md:and [Kata Containers](https://katacontainers.io). The containerd provides not only the `ctr`
docs/how-to/containerd-kata.md:This document is primarily written for Kata Containers v1.5.0-rc2 or above, and containerd v1.2.0 or above.
docs/how-to/containerd-kata.md:use to run a pod’s containers. This feature is supported in `containerd` since [v1.2.0](https://github.com/containerd/containerd/releases/tag/v1.2.0).
docs/how-to/containerd-kata.md:- The containerd introduced an annotation for untrusted Pods since [v1.0](https://github.com/containerd/cri/blob/v1.0.0-rc.0/docs/config.md):
docs/how-to/containerd-kata.md:The [`containerd-shim-kata-v2` (short as `shimv2` in this documentation)](../../src/runtime/containerd-shim-v2)
docs/how-to/containerd-kata.md:implements the [Containerd Runtime V2 (Shim API)](https://github.com/containerd/containerd/tree/master/runtime/v2) for Kata.
docs/how-to/containerd-kata.md:shims (i.e. a `containerd-shim` and a `kata-shim` for each container and the Pod sandbox itself) and no standalone `kata-proxy`
docs/how-to/containerd-kata.md:The shim v2 is introduced in containerd [v1.2.0](https://github.com/containerd/containerd/releases/tag/v1.2.0) and Kata `shimv2`
docs/how-to/containerd-kata.md:### Install containerd with CRI plugin
docs/how-to/containerd-kata.md:> **Note:** `cri` is a native plugin of containerd 1.1 and above. It is built into containerd and enabled by default.
docs/how-to/containerd-kata.md:> You do not need to install `cri` if you have containerd 1.1 or above. Just remove the `cri` plugin from the list of
docs/how-to/containerd-kata.md:> `disabled_plugins` in the containerd configuration file (`/etc/containerd/config.toml`).
docs/how-to/containerd-kata.md:Follow the instructions from the [CRI installation guide](http://github.com/containerd/cri/blob/master/docs/installation.md).
docs/how-to/containerd-kata.md:Then, check if `containerd` is now available:
docs/how-to/containerd-kata.md:$ command -v containerd
docs/how-to/containerd-kata.md:> **Note:** You do not need to install CNI plugins if you do not want to use containerd with Kubernetes.
docs/how-to/containerd-kata.md:> to use containerd with Kubernetes can skip the `cri-tools`.
docs/how-to/containerd-kata.md:### Configure containerd to use Kata Containers
docs/how-to/containerd-kata.md:By default, the configuration of containerd is located at `/etc/containerd/config.toml`, and the
docs/how-to/containerd-kata.md: [plugins.cri.containerd]
docs/how-to/containerd-kata.md: [plugins.cri.containerd.default_runtime]
docs/how-to/containerd-kata.md: #runtime_type = "io.containerd.runtime.v1.linux"
docs/how-to/containerd-kata.md:- `plugins.cri.containerd.runtimes.runc`: the runc, and it is the default runtime.
docs/how-to/containerd-kata.md:- `plugins.cri.containerd.runtimes.kata`: The function in containerd (reference [the document here](https://github.com/containerd/containerd/tree/master/runtime/v2#binary-naming))
docs/how-to/containerd-kata.md: where the dot-connected string `io.containerd.kata.v2` is translated to `containerd-shim-kata-v2` (i.e. the
docs/how-to/containerd-kata.md: binary name of the Kata implementation of [Containerd Runtime V2 (Shim API)](https://github.com/containerd/containerd/tree/master/runtime/v2)).
docs/how-to/containerd-kata.md:- `plugins.cri.containerd.runtimes.katacli`: the `containerd-shim-runc-v1` calls `kata-runtime`, which is the legacy process.
docs/how-to/containerd-kata.md: [plugins.cri.containerd]
docs/how-to/containerd-kata.md: [plugins.cri.containerd.runtimes]
docs/how-to/containerd-kata.md: [plugins.cri.containerd.runtimes.runc]
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.runc.v1"
docs/how-to/containerd-kata.md: [plugins.cri.containerd.runtimes.runc.options]
docs/how-to/containerd-kata.md: [plugins.cri.containerd.runtimes.kata]
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.kata.v2"
docs/how-to/containerd-kata.md: [plugins.cri.containerd.runtimes.katacli]
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.runc.v1"
docs/how-to/containerd-kata.md: [plugins.cri.containerd.runtimes.katacli.options]
docs/how-to/containerd-kata.md: [plugins.cri.containerd.runtimes.kata]
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.kata.v2"
docs/how-to/containerd-kata.md: [plugins.cri.containerd.runtimes.kata.options]
docs/how-to/containerd-kata.md:`privileged_without_host_devices` tells containerd that a privileged Kata container should not have direct access to all host devices. If unset, containerd will pass all host devices to Kata container, which may cause security issues.
docs/how-to/containerd-kata.md:KATA_CONF_FILE=/etc/kata-containers/firecracker.toml containerd-shim-kata-v2 $@
docs/how-to/containerd-kata.md:Name it as `/usr/local/bin/containerd-shim-katafc-v2` and reference it in the configuration of containerd:
docs/how-to/containerd-kata.md: [plugins.cri.containerd.runtimes.kata-firecracker]
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.katafc.v2"
docs/how-to/containerd-kata.md: [plugins.cri.containerd]
docs/how-to/containerd-kata.md: # "plugins.cri.containerd.default_runtime" is the runtime to use in containerd.
docs/how-to/containerd-kata.md: [plugins.cri.containerd.default_runtime]
docs/how-to/containerd-kata.md: # runtime_type is the runtime type to use in containerd e.g. io.containerd.runtime.v1.linux
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.runtime.v1.linux"
docs/how-to/containerd-kata.md: # "plugins.cri.containerd.untrusted_workload_runtime" is a runtime to run untrusted workloads on it.
docs/how-to/containerd-kata.md: [plugins.cri.containerd.untrusted_workload_runtime]
docs/how-to/containerd-kata.md: # runtime_type is the runtime type to use in containerd e.g. io.containerd.runtime.v1.linux
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.kata.v2"
docs/how-to/containerd-kata.md:For the earlier versions of Kata Containers and containerd that do not support Runtime V2 (Shim API), you can use the following alternative configuration:
docs/how-to/containerd-kata.md: [plugins.cri.containerd]
docs/how-to/containerd-kata.md: # "plugins.cri.containerd.default_runtime" is the runtime to use in containerd.
docs/how-to/containerd-kata.md: [plugins.cri.containerd.default_runtime]
docs/how-to/containerd-kata.md: # runtime_type is the runtime type to use in containerd e.g. io.containerd.runtime.v1.linux
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.runtime.v1.linux"
docs/how-to/containerd-kata.md: # "plugins.cri.containerd.untrusted_workload_runtime" is a runtime to run untrusted workloads on it.
docs/how-to/containerd-kata.md: [plugins.cri.containerd.untrusted_workload_runtime]
docs/how-to/containerd-kata.md: # runtime_type is the runtime type to use in containerd e.g. io.containerd.runtime.v1.linux
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.runtime.v1.linux"
docs/how-to/containerd-kata.md: # runtime_engine is the name of the runtime engine used by containerd.
docs/how-to/containerd-kata.md:You can find more information on the [Containerd config documentation](https://github.com/containerd/cri/blob/master/docs/config.md)
docs/how-to/containerd-kata.md: [plugins.cri.containerd]
docs/how-to/containerd-kata.md: [plugins.cri.containerd.default_runtime]
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.kata.v2"
docs/how-to/containerd-kata.md:Alternatively, for the earlier versions of Kata Containers and containerd that do not support Runtime V2 (Shim API), you can use the following alternative configuration:
docs/how-to/containerd-kata.md: [plugins.cri.containerd]
docs/how-to/containerd-kata.md: [plugins.cri.containerd.default_runtime]
docs/how-to/containerd-kata.md: runtime_type = "io.containerd.runtime.v1.linux"
docs/how-to/containerd-kata.md:First, add the CNI configuration in the containerd configuration.
docs/how-to/containerd-kata.md:Next, reference the configuration directory through containerd `config.toml`:
docs/how-to/containerd-kata.md:runtime-endpoint: unix:///var/run/containerd/containerd.sock
docs/how-to/containerd-kata.md:image-endpoint: unix:///var/run/containerd/containerd.sock
docs/how-to/containerd-kata.md:To run a container with Kata Containers through the containerd command line, you can run the following:
docs/how-to/containerd-kata.md:$ sudo ctr run --runtime io.containerd.run.kata.v2 -t --rm docker.io/library/busybox:latest hello sh
docs/how-to/data/kata-monitor-daemonset.yml: - name: containerdtask
docs/how-to/data/kata-monitor-daemonset.yml: mountPath: /run/containerd/io.containerd.runtime.v2.task/
docs/how-to/data/kata-monitor-daemonset.yml: - name: containerdsocket
docs/how-to/data/kata-monitor-daemonset.yml: mountPath: /run/containerd/containerd.sock
docs/how-to/data/kata-monitor-daemonset.yml: - name: containerdtask
docs/how-to/data/kata-monitor-daemonset.yml: path: /run/containerd/io.containerd.runtime.v2.task/
docs/how-to/data/kata-monitor-daemonset.yml: - name: containerdsocket
docs/how-to/data/kata-monitor-daemonset.yml: path: /run/containerd/containerd.sock
docs/how-to/how-to-import-kata-logs-with-fluentd.md:When using the Kata `shimv2` runtime with `containerd`, as described in this
docs/how-to/how-to-import-kata-logs-with-fluentd.md:[how-to guide](containerd-kata.md#containerd-runtime-v2-api-shim-v2-api), the Kata logs are routed
docs/how-to/how-to-import-kata-logs-with-fluentd.md:- The Kata logs are directed via `containerd`, and will be captured along with the `containerd` logs,
docs/how-to/how-to-import-kata-logs-with-fluentd.md: such as on the containerd stdout or in the system journal.
docs/how-to/how-to-import-kata-logs-with-fluentd.md:the `containerd` and Kata logs from the system journal by filtering on the Kata `SYSLOG_IDENTIFIER` field,
docs/how-to/how-to-import-kata-logs-with-fluentd.md: # capture the containerd logs
docs/how-to/how-to-import-kata-logs-with-fluentd.md: filters [{ "_SYSTEMD_UNIT": "containerd.service" }]
docs/how-to/how-to-import-kata-logs-with-fluentd.md: pos_file /tmp/systemd-containerd.pos
docs/how-to/how-to-import-kata-logs-with-fluentd.md: tag containerd_tmp_tag
docs/how-to/how-to-import-kata-logs-with-fluentd.md: # filter out and split between kata entries and containerd entries
docs/how-to/how-to-import-kata-logs-with-fluentd.md: <match containerd_tmp_tag>
docs/how-to/how-to-import-kata-logs-with-fluentd.md: # Anything that was not matched so far, tag as containerd
docs/how-to/how-to-import-kata-logs-with-fluentd.md: tag containerd_tag
docs/how-to/how-to-set-prometheus-in-k8s.md:> - [How to use Kata Containers and Containerd](containerd-kata.md)
docs/how-to/how-to-set-prometheus-in-k8s.md:> - [How to use Kata Containers and CRI (containerd plugin) with Kubernetes](how-to-use-k8s-with-cri-containerd-and-kata.md)
docs/how-to/how-to-set-sandbox-config-kata.md:For containerd, annotations specified in the pod spec are passed down to Kata
docs/how-to/how-to-set-sandbox-config-kata.md:starting with version `1.3.0` of containerd. Additionally, extra configuration is
docs/how-to/how-to-set-sandbox-config-kata.md:needed for containerd, by providing a `pod_annotations` field in the containerd config
docs/how-to/how-to-set-sandbox-config-kata.md:for passing annotations to Kata from containerd:
docs/how-to/how-to-set-sandbox-config-kata.md:$ cat /etc/containerd/config
docs/how-to/how-to-set-sandbox-config-kata.md:[plugins.cri.containerd.runtimes.kata]
docs/how-to/how-to-set-sandbox-config-kata.md: runtime_type = "io.containerd.runc.v1"
docs/how-to/how-to-set-sandbox-config-kata.md: [plugins.cri.containerd.runtimes.kata.options]
docs/how-to/how-to-set-sandbox-config-kata.md:[containerd docs](https://github.com/containerd/cri/blob/8d5a8355d07783ba2f8f451209f6bdcc7c412346/docs/config.md).
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:# How to use Kata Containers and CRI (containerd plugin) with Kubernetes
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:* [Install and configure containerd](#install-and-configure-containerd)
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md: * [Configure Kubelet to use containerd](#configure-kubelet-to-use-containerd)
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:[CRI containerd plugin](https://github.com/containerd/cri) and
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:For Kata Containers 1.5.0-rc2 and above, we will use `containerd-shim-kata-v2` (short as `shimv2` in this documentation)
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:- containerd with `cri` plug-in
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:## Install and configure containerd
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:First, follow the [How to use Kata Containers and Containerd](containerd-kata.md) to install and configure containerd.
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:Then, make sure the containerd works with the [examples in it](containerd-kata.md#run).
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:### Configure Kubelet to use containerd
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:In order to allow Kubelet to use containerd (using the CRI interface), configure the service to point to the `containerd` socket.
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:- Configure Kubernetes to use `containerd`
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md: $ cat << EOF | sudo tee /etc/systemd/system/kubelet.service.d/0-containerd.conf
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md: Environment="KUBELET_EXTRA_ARGS=--container-runtime=remote --runtime-request-timeout=15m --container-runtime-endpoint=unix:///run/containerd/containerd.sock"
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:If you are behind a proxy, use the following script to configure your proxy for docker, Kubelet, and containerd:
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:containerd
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:- Make sure `containerd` is up and running
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md: $ sudo systemctl restart containerd
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md: $ sudo systemctl status containerd
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md: $ sudo kubeadm init --cri-socket /run/containerd/containerd.sock --pod-network-cidr=10.244.0.0/16
docs/how-to/how-to-use-k8s-with-cri-containerd-and-kata.md:By default, all pods are created with the default runtime configured in CRI containerd plugin.
docs/how-to/privileged.md: * [Containerd and CRI](#containerd-and-cri)
docs/how-to/privileged.md:Support for configuring privileged host devices behaviour was added in containerd `1.3.0` version.
docs/how-to/privileged.md: [plugins.cri.containerd]
docs/how-to/privileged.md: [plugins.cri.containerd.runtimes.runc]
docs/how-to/privileged.md: runtime_type = "io.containerd.runc.v1"
docs/how-to/privileged.md: [plugins.cri.containerd.runtimes.kata]
docs/how-to/privileged.md: runtime_type = "io.containerd.kata.v2"
docs/how-to/privileged.md: [plugins.cri.containerd.runtimes.kata.options]
docs/how-to/privileged.md: - [Kata Containers with Containerd and CRI documentation](how-to-use-k8s-with-cri-containerd-and-kata.md)
docs/how-to/privileged.md: - [Containerd CRI config documentation](https://github.com/containerd/cri/blob/master/docs/config.md)
docs/how-to/privileged.md:Similar to containerd, CRI-O allows configuring the privileged host devices
docs/how-to/privileged.md: runtime_path = "/usr/local/bin/containerd-shim-kata-v2"
docs/how-to/run-kata-with-crictl.md:> **Note:** For how to install and configure `cri-tools` with CRI runtimes like `containerd` or CRI-O, please also refer to other [howtos](./README.md).
docs/how-to/run-kata-with-k8s.md: * [containerd with CRI plugin](#containerd-with-cri-plugin)
docs/how-to/run-kata-with-k8s.md: * [Configure for containerd](#configure-for-containerd)
docs/how-to/run-kata-with-k8s.md:[CRI-containerd](https://github.com/containerd/cri) CRI implementations.
docs/how-to/run-kata-with-k8s.md:Kata Containers 1.5 introduced the `shimv2` for containerd 1.2.0, reducing the components
docs/how-to/run-kata-with-k8s.md:required to spawn pods and containers, and this is the preferred way to run Kata Containers with Kubernetes ([as documented here](../how-to/how-to-use-k8s-with-cri-containerd-and-kata.md#configure-containerd-to-use-kata-containers)).
docs/how-to/run-kata-with-k8s.md:### containerd with CRI plugin
docs/how-to/run-kata-with-k8s.md:If you select containerd with `cri` plugin, follow the "Getting Started for Developers"
docs/how-to/run-kata-with-k8s.md:instructions [here](https://github.com/containerd/cri#getting-started-for-developers)
docs/how-to/run-kata-with-k8s.md:To customize containerd to select Kata Containers runtime, follow our
docs/how-to/run-kata-with-k8s.md:"Configure containerd to use Kata Containers" internal documentation
docs/how-to/run-kata-with-k8s.md:[here](../how-to/how-to-use-k8s-with-cri-containerd-and-kata.md#configure-containerd-to-use-kata-containers).
docs/how-to/run-kata-with-k8s.md:### Configure for containerd
docs/how-to/run-kata-with-k8s.md:`/etc/systemd/system/kubelet.service.d/0-cri-containerd.conf`
docs/how-to/run-kata-with-k8s.md:Environment="KUBELET_EXTRA_ARGS=--container-runtime=remote --runtime-request-timeout=15m --container-runtime-endpoint=unix:///run/containerd/containerd.sock"
docs/how-to/run-kata-with-k8s.md:For more information about containerd see the "Configure Kubelet to use containerd"
docs/how-to/run-kata-with-k8s.md:documentation [here](../how-to/how-to-use-k8s-with-cri-containerd-and-kata.md#configure-kubelet-to-use-containerd).
docs/how-to/run-kata-with-k8s.md:# If using CRI-containerd
docs/how-to/run-kata-with-k8s.md:$ sudo kubeadm init --skip-preflight-checks --cri-socket /run/containerd/containerd.sock --pod-network-cidr=10.244.0.0/16
docs/how-to/service-mesh.md:You can choose between CRI-O and CRI-containerd, both are supported
docs/how-to/service-mesh.md:For both CRI-O and CRI-containerd, you have to add an annotation indicating
docs/how-to/service-mesh.md:__CRI-containerd:__
docs/how-to/service-mesh.md:Add the following annotation for CRI-containerd
docs/how-to/what-is-vm-templating-and-how-do-I-use-it.md:In another example, we created ten Kata Containers with containerd shimv2
docs/install/README.md:Follow the [containerd installation guide](container-manager/containerd/containerd-install.md).
docs/install/container-manager/containerd/containerd-install.md:# Install Kata Containers with containerd
docs/install/container-manager/containerd/containerd-install.md:> - If Kata Containers and / or containerd are packaged by your distribution,
docs/install/container-manager/containerd/containerd-install.md:> containerd from binary release packages. These versions may not have been
docs/install/container-manager/containerd/containerd-install.md: for containerd will not need to be modified to allow the daemon to find this
docs/install/container-manager/containerd/containerd-install.md: binary (see the [section on installing containerd](#install-containerd) below).
docs/install/container-manager/containerd/containerd-install.md: | `/opt/kata/bin/containerd-shim-kata-v2` | The main Kata 2.x binary |
docs/install/container-manager/containerd/containerd-install.md:## Install containerd
docs/install/container-manager/containerd/containerd-install.md:> If your distribution packages containerd, we recommend you install that
docs/install/container-manager/containerd/containerd-install.md: - https://github.com/containerd/containerd/releases
docs/install/container-manager/containerd/containerd-install.md:- Configure containerd
docs/install/container-manager/containerd/containerd-install.md: - https://raw.githubusercontent.com/containerd/containerd/master/containerd.service
docs/install/container-manager/containerd/containerd-install.md: > `/opt/kata/bin/containerd-shim-kata-v2`, you will need to modify this
docs/install/container-manager/containerd/containerd-install.md: > file to ensure the containerd daemon's `PATH` contains `/opt/kata/`.
docs/install/container-manager/containerd/containerd-install.md: - Add the Kata Containers configuration to the containerd configuration file:
docs/install/container-manager/containerd/containerd-install.md: [plugins.cri.containerd]
docs/install/container-manager/containerd/containerd-install.md: [plugins.cri.containerd.runtimes.kata]
docs/install/container-manager/containerd/containerd-install.md: runtime_type = "io.containerd.kata.v2"
docs/install/container-manager/containerd/containerd-install.md: > The containerd daemon needs to be able to find the
docs/install/container-manager/containerd/containerd-install.md: > `containerd-shim-kata-v2` binary to allow Kata Containers to be created.
docs/install/container-manager/containerd/containerd-install.md: - Start the containerd service.
docs/install/container-manager/containerd/containerd-install.md:$ sudo ctr run --runtime "io.containerd.kata.v2" --rm -t "$image" test-kata uname -r
docs/install/minikube-installation-guide.md:Minikube can be set up to use either CRI-O or containerd.
docs/install/minikube-installation-guide.md:To use containerd, modify the `--container-runtime` argument:
docs/install/minikube-installation-guide.md:| `--container-runtime=containerd` | Using containerd for Kata |
snap/snapcraft.yaml: command: usr/bin/containerd-shim-kata-v2
src/agent/Cargo.lock:source = "git+https://github.com/containerd/ttrpc-rust.git?branch=0.3.0#ba1efe3bbb8f8af4895b7623ed1d11561e70e566"
src/agent/Cargo.toml:ttrpc = { git = "https://github.com/containerd/ttrpc-rust.git", branch="0.3.0" }
src/agent/README.md:$sudo -E PATH=$PATH -E GOPATH=$GOPATH integration/containerd/shimv2/shimv2-tests.sh
src/agent/protocols/Cargo.toml:ttrpc = { git = "https://github.com/containerd/ttrpc-rust.git", branch="0.3.0" }
src/agent/protocols/hack/update-generated-proto.sh:[ $? -eq 0 ] || die "Please install ttrpc_rust_plugin from https://github.com/containerd/ttrpc-rust"
src/agent/protocols/hack/update-generated-proto.sh:[ $? -eq 0 ] || die "Please install protoc-gen-gogottrpc from https://github.com/containerd/ttrpc"
src/runtime/.gitignore:/cli/containerd-shim-kata-v2/config-generated.go
src/runtime/.gitignore:/containerd-shim-kata-v2
src/runtime/.gitignore:/containerd-shim-v2/monitor_address
src/runtime/Makefile:SHIMV2 = containerd-shim-kata-v2
src/runtime/Makefile:all: runtime containerd-shim-v2 netmon monitor
src/runtime/Makefile:containerd-shim-v2: $(SHIMV2_OUTPUT)
src/runtime/Makefile:install: default install-runtime install-containerd-shim-v2 install-monitor install-netmon
src/runtime/Makefile:install-containerd-shim-v2: $(SHIMV2)
src/runtime/Makefile: @printf "\tcontainerd-shim-v2 : only build containerd shim v2.\n"
src/runtime/Makefile: @printf "\tinstall-containerd-shim-v2 : only install containerd shim v2 files.\n"
src/runtime/README.md: * [Kata containerd shimv2](#kata-containerd-shimv2)
src/runtime/README.md:[Containerd](https://github.com/containerd/containerd)-compatible,
src/runtime/README.md:For runtime logs, see the following sections for the CRI-O and containerd shimv2 based runtimes.
src/runtime/README.md:### Kata containerd shimv2
src/runtime/README.md:The Kata containerd shimv2 runtime logs through `containerd`, and its logs will be sent
src/runtime/README.md:to wherever the `containerd` logs are directed. However, the
src/runtime/cli/containerd-shim-kata-v2/main.go: "github.com/containerd/containerd/runtime/v2/shim"
src/runtime/cli/containerd-shim-kata-v2/main.go: containerdshim "github.com/kata-containers/kata-containers/src/runtime/containerd-shim-v2"
src/runtime/cli/containerd-shim-kata-v2/main.go: fmt.Printf("%s containerd shim: id: %q, version: %s, commit: %v\n", project, types.DefaultKataRuntimeName, version, commit)
src/runtime/cli/containerd-shim-kata-v2/main.go: shim.Run(types.DefaultKataRuntimeName, containerdshim.New, shimConfig)
src/runtime/cli/kata-exec.go: "github.com/containerd/console"
src/runtime/cli/kata-monitor/main.go:var containerdAddr = flag.String("containerd-address", "/run/containerd/containerd.sock", "Containerd address to accept client requests.")
src/runtime/cli/kata-monitor/main.go:var containerdConfig = flag.String("containerd-conf", "/etc/containerd/config.toml", "Containerd config file.")
src/runtime/cli/kata-monitor/main.go: km, err := kataMonitor.NewKataMonitor(*containerdAddr, *containerdConfig)
src/runtime/containerd-shim-v2/container.go:package containerdshim
src/runtime/containerd-shim-v2/container.go: "github.com/containerd/containerd/api/types/task"
src/runtime/containerd-shim-v2/container.go: "github.com/containerd/containerd/errdefs"
src/runtime/containerd-shim-v2/container.go: taskAPI "github.com/containerd/containerd/runtime/v2/task"
src/runtime/containerd-shim-v2/container_test.go:package containerdshim
src/runtime/containerd-shim-v2/container_test.go: taskAPI "github.com/containerd/containerd/runtime/v2/task"
src/runtime/containerd-shim-v2/create.go:package containerdshim
src/runtime/containerd-shim-v2/create.go: containerd_types "github.com/containerd/containerd/api/types"
src/runtime/containerd-shim-v2/create.go: "github.com/containerd/containerd/mount"
src/runtime/containerd-shim-v2/create.go: taskAPI "github.com/containerd/containerd/runtime/v2/task"
src/runtime/containerd-shim-v2/create.go: "github.com/containerd/typeurl"
src/runtime/containerd-shim-v2/create.go: _ "github.com/containerd/containerd/runtime/linux/runctypes"
src/runtime/containerd-shim-v2/create.go: crioption "github.com/containerd/cri-containerd/pkg/api/runtimeoptions/v1"
src/runtime/containerd-shim-v2/create.go:func doMount(mounts []*containerd_types.Mount, rootfs string) error {
src/runtime/containerd-shim-v2/create_test.go:package containerdshim
src/runtime/containerd-shim-v2/create_test.go: "github.com/containerd/containerd/namespaces"
src/runtime/containerd-shim-v2/create_test.go: taskAPI "github.com/containerd/containerd/runtime/v2/task"
src/runtime/containerd-shim-v2/create_test.go: crioption "github.com/containerd/cri-containerd/pkg/api/runtimeoptions/v1"
src/runtime/containerd-shim-v2/create_test.go: "github.com/containerd/typeurl"
src/runtime/containerd-shim-v2/delete.go:package containerdshim
src/runtime/containerd-shim-v2/delete.go: "github.com/containerd/containerd/api/types/task"
src/runtime/containerd-shim-v2/delete.go: "github.com/containerd/containerd/mount"
src/runtime/containerd-shim-v2/delete_test.go:package containerdshim
src/runtime/containerd-shim-v2/delete_test.go: taskAPI "github.com/containerd/containerd/runtime/v2/task"
src/runtime/containerd-shim-v2/errors.go:package containerdshim
src/runtime/containerd-shim-v2/errors_test.go:package containerdshim
src/runtime/containerd-shim-v2/exec.go:package containerdshim
src/runtime/containerd-shim-v2/exec.go: "github.com/containerd/containerd/api/types/task"
src/runtime/containerd-shim-v2/exec.go: "github.com/containerd/containerd/errdefs"
src/runtime/containerd-shim-v2/exec.go: "github.com/containerd/typeurl"
src/runtime/containerd-shim-v2/exec_test.go:package containerdshim
src/runtime/containerd-shim-v2/exec_test.go: "github.com/containerd/containerd/namespaces"
src/runtime/containerd-shim-v2/exec_test.go: taskAPI "github.com/containerd/containerd/runtime/v2/task"
src/runtime/containerd-shim-v2/metrics.go:package containerdshim
src/runtime/containerd-shim-v2/metrics.go: "github.com/containerd/cgroups"
src/runtime/containerd-shim-v2/metrics.go: "github.com/containerd/typeurl"
src/runtime/containerd-shim-v2/metrics_test.go:package containerdshim
src/runtime/containerd-shim-v2/metrics_test.go: "github.com/containerd/cgroups"
src/runtime/containerd-shim-v2/pause_test.go:package containerdshim
src/runtime/containerd-shim-v2/pause_test.go: "github.com/containerd/containerd/namespaces"
src/runtime/containerd-shim-v2/pause_test.go: taskAPI "github.com/containerd/containerd/runtime/v2/task"
src/runtime/containerd-shim-v2/service.go:package containerdshim
src/runtime/containerd-shim-v2/service.go: eventstypes "github.com/containerd/containerd/api/events"
src/runtime/containerd-shim-v2/service.go: "github.com/containerd/containerd/api/types/task"
src/runtime/containerd-shim-v2/service.go: "github.com/containerd/containerd/errdefs"
src/runtime/containerd-shim-v2/service.go: "github.com/containerd/containerd/events"
src/runtime/containerd-shim-v2/service.go: "github.com/containerd/containerd/namespaces"
src/runtime/containerd-shim-v2/service.go: cdruntime "github.com/containerd/containerd/runtime"
src/runtime/containerd-shim-v2/service.go: cdshim "github.com/containerd/containerd/runtime/v2/shim"
src/runtime/containerd-shim-v2/service.go: taskAPI "github.com/containerd/containerd/runtime/v2/task"
src/runtime/containerd-shim-v2/service.go: "github.com/containerd/typeurl"
src/runtime/containerd-shim-v2/service.go: // it to containerd as the containerd event format.
src/runtime/containerd-shim-v2/service.go: // A time span used to wait for publish a containerd event,
src/runtime/containerd-shim-v2/service.go:var shimLog = logrus.WithField("source", "containerd-kata-shim-v2")
src/runtime/containerd-shim-v2/service.go: // it will output into stdio, from which containerd would like
src/runtime/containerd-shim-v2/service.go:func newCommand(ctx context.Context, containerdBinary, id, containerdAddress string) (*sysexec.Cmd, error) {
src/runtime/containerd-shim-v2/service.go: "-address", containerdAddress,
src/runtime/containerd-shim-v2/service.go: "-publish-binary", containerdBinary,
src/runtime/containerd-shim-v2/service.go:func (s *service) StartShim(ctx context.Context, id, containerdBinary, containerdAddress string) (string, error) {
src/runtime/containerd-shim-v2/service.go: cmd, err := newCommand(ctx, containerdBinary, id, containerdAddress)
src/runtime/containerd-shim-v2/service.go: //containerd, thus we must make sure there is no any outputs in stdout except
src/runtime/containerd-shim-v2/shim_management.go:package containerdshim
src/runtime/containerd-shim-v2/shim_management.go: "github.com/containerd/containerd/namespaces"
src/runtime/containerd-shim-v2/shim_management.go: cdshim "github.com/containerd/containerd/runtime/v2/shim"
src/runtime/containerd-shim-v2/shim_management.go: return filepath.Join(string(filepath.Separator), "containerd-shim", ns, id, "shim-monitor.sock"), nil
src/runtime/containerd-shim-v2/shim_management_test.go:package containerdshim
src/runtime/containerd-shim-v2/shim_metrics.go:package containerdshim
src/runtime/containerd-shim-v2/shim_metrics.go: Help: "Kata containerd shim v2 process threads.",
src/runtime/containerd-shim-v2/shim_metrics.go: Help: "Kata containerd shim v2 process status.",
src/runtime/containerd-shim-v2/shim_metrics.go: Help: "Kata containerd shim v2 process statistics.",
src/runtime/containerd-shim-v2/shim_metrics.go: Help: "Kata containerd shim v2 network devices statistics.",
src/runtime/containerd-shim-v2/shim_metrics.go: Help: "Kata containerd shim v2 process IO statistics.",
src/runtime/containerd-shim-v2/shim_metrics.go: Help: "Kata containerd shim v2 open FDs.",
src/runtime/containerd-shim-v2/shim_metrics_test.go:package containerdshim
src/runtime/containerd-shim-v2/start.go:package containerdshim
src/runtime/containerd-shim-v2/start.go: "github.com/containerd/containerd/api/types/task"
src/runtime/containerd-shim-v2/start_test.go:package containerdshim
src/runtime/containerd-shim-v2/start_test.go: "github.com/containerd/containerd/namespaces"
src/runtime/containerd-shim-v2/start_test.go: taskAPI "github.com/containerd/containerd/runtime/v2/task"
src/runtime/containerd-shim-v2/stream.go:package containerdshim
src/runtime/containerd-shim-v2/stream.go: "github.com/containerd/fifo"
src/runtime/containerd-shim-v2/stream_test.go:package containerdshim
src/runtime/containerd-shim-v2/stream_test.go: "github.com/containerd/fifo"
src/runtime/containerd-shim-v2/utils.go:package containerdshim
src/runtime/containerd-shim-v2/utils.go: "github.com/containerd/containerd/mount"
src/runtime/containerd-shim-v2/utils.go: cdshim "github.com/containerd/containerd/runtime/v2/shim"
src/runtime/containerd-shim-v2/utils_test.go:package containerdshim
src/runtime/containerd-shim-v2/wait.go:package containerdshim
src/runtime/containerd-shim-v2/wait.go: "github.com/containerd/containerd/api/events"
src/runtime/containerd-shim-v2/wait.go: "github.com/containerd/containerd/api/types/task"
src/runtime/containerd-shim-v2/wait.go: "github.com/containerd/containerd/mount"
src/runtime/containerd-shim-v2/wait.go: // publish event for containerd
src/runtime/data/kata-collect-data.sh.in:typeset -r containerd_shim_v2_name="containerd-shim-kata-v2"
src/runtime/data/kata-collect-data.sh.in:typeset -r containerd_shim_v2=$(command -v "$containerd_shim_v2_name" 2>/dev/null)
src/runtime/data/kata-collect-data.sh.in:show_containerd_shimv2_log_details()
src/runtime/data/kata-collect-data.sh.in: show_containerd_shimv2_log_details
src/runtime/data/kata-collect-data.sh.in: if have_cmd "containerd" >/dev/null; then
src/runtime/data/kata-collect-data.sh.in: title="containerd"
src/runtime/data/kata-collect-data.sh.in: run_cmd_and_show_quoted_output "" "containerd --version"
src/runtime/data/kata-collect-data.sh.in: local cmd="systemctl show containerd"
src/runtime/data/kata-collect-data.sh.in: local file="/etc/containerd/config.toml"
src/runtime/data/kata-collect-data.sh.in:show_containerd_shimv2()
src/runtime/data/kata-collect-data.sh.in: local cmd="${containerd_shim_v2_name} --version"
src/runtime/data/kata-collect-data.sh.in: msg "Containerd shim v2 is \`$containerd_shim_v2\`."
src/runtime/data/kata-collect-data.sh.in: show_containerd_shimv2
src/runtime/data/kata-collect-data.sh:typeset -r containerd_shim_v2_name="containerd-shim-kata-v2"
src/runtime/data/kata-collect-data.sh:typeset -r containerd_shim_v2=$(command -v "$containerd_shim_v2_name" 2>/dev/null)
src/runtime/data/kata-collect-data.sh:show_containerd_shimv2_log_details()
src/runtime/data/kata-collect-data.sh: show_containerd_shimv2_log_details
src/runtime/data/kata-collect-data.sh: if have_cmd "containerd" >/dev/null; then
src/runtime/data/kata-collect-data.sh: title="containerd"
src/runtime/data/kata-collect-data.sh: run_cmd_and_show_quoted_output "" "containerd --version"
src/runtime/data/kata-collect-data.sh: local cmd="systemctl show containerd"
src/runtime/data/kata-collect-data.sh: local file="/etc/containerd/config.toml"
src/runtime/data/kata-collect-data.sh:show_containerd_shimv2()
src/runtime/data/kata-collect-data.sh: local cmd="${containerd_shim_v2_name} --version"
src/runtime/data/kata-collect-data.sh: msg "Containerd shim v2 is \`$containerd_shim_v2\`."
src/runtime/data/kata-collect-data.sh: show_containerd_shimv2
src/runtime/go.mod: github.com/containerd/cgroups v0.0.0-20190717030353-c4b9ac5c7601
src/runtime/go.mod: github.com/containerd/console v0.0.0-20191206165004-02ecf6a7291e
src/runtime/go.mod: github.com/containerd/containerd v1.2.1-0.20181210191522-f05672357f56
src/runtime/go.mod: github.com/containerd/continuity v0.0.0-20200413184840-d3ef23f19fbb // indirect
src/runtime/go.mod: github.com/containerd/cri v1.11.1 // indirect
src/runtime/go.mod: github.com/containerd/cri-containerd v1.11.1-0.20190125013620-4dd6735020f5
src/runtime/go.mod: github.com/containerd/fifo v0.0.0-20190226154929-a9fb20d87448
src/runtime/go.mod: github.com/containerd/go-runc v0.0.0-20200220073739-7016d3ce2328 // indirect
src/runtime/go.mod: github.com/containerd/ttrpc v1.0.0
src/runtime/go.mod: github.com/containerd/typeurl v1.0.1-0.20190228175220-2a93cfde8c20
src/runtime/go.sum:github.com/containerd/cgroups v0.0.0-20190717030353-c4b9ac5c7601 h1:6xW3ogNpFIly0umJGEKzFfGDNUk5rXFE1lJ3/gBmz3U=
src/runtime/go.sum:github.com/containerd/cgroups v0.0.0-20190717030353-c4b9ac5c7601/go.mod h1:X9rLEHIqSf/wfK8NsPqxJmeZgW4pcfzdXITDrUSJ6uI=
src/runtime/go.sum:github.com/containerd/console v0.0.0-20191206165004-02ecf6a7291e h1:GdiIYd8ZDOrT++e1NjhSD4rGt9zaJukHm4rt5F4mRQc=
src/runtime/go.sum:github.com/containerd/console v0.0.0-20191206165004-02ecf6a7291e/go.mod h1:8Pf4gM6VEbTNRIT26AyyU7hxdQU3MvAvxVI0sc00XBE=
src/runtime/go.sum:github.com/containerd/containerd v1.2.1-0.20181210191522-f05672357f56 h1:KBZ3QBVr3gBySdyLzDs5Yom/oBH2hzhS03h6lxgkv7U=
src/runtime/go.sum:github.com/containerd/containerd v1.2.1-0.20181210191522-f05672357f56/go.mod h1:bC6axHOhabU15QhwfG7w5PipXdVtMXFTttgp+kVtyUA=
src/runtime/go.sum:github.com/containerd/continuity v0.0.0-20200413184840-d3ef23f19fbb h1:nXPkFq8X1a9ycY3GYQpFNxHh3j2JgY7zDZfq2EXMIzk=
src/runtime/go.sum:github.com/containerd/continuity v0.0.0-20200413184840-d3ef23f19fbb/go.mod h1:Dq467ZllaHgAtVp4p1xUQWBrFXR9s/wyoTpG8zOJGkY=
src/runtime/go.sum:github.com/containerd/cri v1.11.1 h1:mR8+eNW4zEcbWGTGEpmDd7GzMmK7IMxMSVAZ2aIDKA4=
src/runtime/go.sum:github.com/containerd/cri v1.11.1/go.mod h1:DavH5Qa8+6jOmeOMO3dhWoqksucZDe06LfuhBz/xPZs=
src/runtime/go.sum:github.com/containerd/cri-containerd v1.11.1-0.20190125013620-4dd6735020f5 h1:/srF029I+oDfm/qeltxCGJyJ8urmlqWGOQmQ7HvwrRc=
src/runtime/go.sum:github.com/containerd/cri-containerd v1.11.1-0.20190125013620-4dd6735020f5/go.mod h1:wxbGdReWGCalzGOEpifoHeYCK4xAgnj4o/4bVB+9voU=
src/runtime/go.sum:github.com/containerd/fifo v0.0.0-20190226154929-a9fb20d87448 h1:PUD50EuOMkXVcpBIA/R95d56duJR9VxhwncsFbNnxW4=
src/runtime/go.sum:github.com/containerd/fifo v0.0.0-20190226154929-a9fb20d87448/go.mod h1:ODA38xgv3Kuk8dQz2ZQXpnv/UZZUHUCL7pnLehbXgQI=
src/runtime/go.sum:github.com/containerd/go-runc v0.0.0-20200220073739-7016d3ce2328 h1:PRTagVMbJcCezLcHXe8UJvR1oBzp2lG3CEumeFOLOds=
src/runtime/go.sum:github.com/containerd/go-runc v0.0.0-20200220073739-7016d3ce2328/go.mod h1:PpyHrqVs8FTi9vpyHwPwiNEGaACDxT/N/pLcvMSRA9g=
src/runtime/go.sum:github.com/containerd/ttrpc v1.0.0 h1:NY8Zk2i7TpkLxrkOASo+KTFq9iNCEmMH2/ZG9OuOw6k=
src/runtime/go.sum:github.com/containerd/ttrpc v1.0.0/go.mod h1:PvCDdDGpgqzQIzDW1TphrGLssLDZp2GuS+X5DkEJB8o=
src/runtime/go.sum:github.com/containerd/typeurl v1.0.1-0.20190228175220-2a93cfde8c20 h1:ZPfpTtR1qYoir10vhnnnQYGpnf1ZGiTGG+YGfPieydk=
src/runtime/go.sum:github.com/containerd/typeurl v1.0.1-0.20190228175220-2a93cfde8c20/go.mod h1:Cm3kwCdlkCfMSHURc+r6fwoGH6/F1hH3S4sg0rLFWPc=
src/runtime/pkg/kata-monitor/containerd.go: "github.com/containerd/containerd"
src/runtime/pkg/kata-monitor/containerd.go: "github.com/containerd/containerd/containers"
src/runtime/pkg/kata-monitor/containerd.go: "github.com/containerd/containerd/namespaces"
src/runtime/pkg/kata-monitor/containerd.go: "github.com/containerd/typeurl"
src/runtime/pkg/kata-monitor/containerd.go:// getSandboxes get kata sandbox from containerd.
src/runtime/pkg/kata-monitor/containerd.go: client, err := containerd.New(ka.containerdAddr)
src/runtime/pkg/kata-monitor/containerd.go: "runtime.name~="+types.KataRuntimeNameRegexp+`,labels."io.cri-containerd.kind"==sandbox`)
src/runtime/pkg/kata-monitor/containerd_test.go: criContainerdAnnotations "github.com/containerd/cri-containerd/pkg/annotations"
src/runtime/pkg/kata-monitor/containerd_test.go: "github.com/containerd/typeurl"
src/runtime/pkg/kata-monitor/containerd_test.go: "github.com/containerd/containerd/containers"
src/runtime/pkg/kata-monitor/metrics.go: path := filepath.Join(km.containerdStatePath, types.ContainerdRuntimeTaskPath, namespace, sandboxID, "monitor_address")
src/runtime/pkg/kata-monitor/monitor.go: "github.com/containerd/containerd/defaults"
src/runtime/pkg/kata-monitor/monitor.go: srvconfig "github.com/containerd/containerd/services/server/config"
src/runtime/pkg/kata-monitor/monitor.go: _ "github.com/containerd/containerd/api/events"
src/runtime/pkg/kata-monitor/monitor.go: containerdAddr string
src/runtime/pkg/kata-monitor/monitor.go: containerdConfigFile string
src/runtime/pkg/kata-monitor/monitor.go: containerdStatePath string
src/runtime/pkg/kata-monitor/monitor.go:func NewKataMonitor(containerdAddr, containerdConfigFile string) (*KataMonitor, error) {
src/runtime/pkg/kata-monitor/monitor.go: if containerdAddr == "" {
src/runtime/pkg/kata-monitor/monitor.go: containerdConf := &srvconfig.Config{
src/runtime/pkg/kata-monitor/monitor.go: if err := srvconfig.LoadConfig(containerdConfigFile, containerdConf); err != nil && !os.IsNotExist(err) {
src/runtime/pkg/kata-monitor/monitor.go: containerdAddr: containerdAddr,
src/runtime/pkg/kata-monitor/monitor.go: containerdConfigFile: containerdConfigFile,
src/runtime/pkg/kata-monitor/monitor.go: containerdStatePath: containerdConf.State,
src/runtime/pkg/kata-monitor/monitor.go: go km.sandboxCache.startEventsListener(km.containerdAddr)
src/runtime/pkg/kata-monitor/pprof_test.go: statePath := filepath.Join(path, "io.containerd.runtime.v2.task")
src/runtime/pkg/kata-monitor/pprof_test.go: containerdStatePath: path,
src/runtime/pkg/kata-monitor/sandbox_cache.go: "github.com/containerd/containerd"
src/runtime/pkg/kata-monitor/sandbox_cache.go: eventstypes "github.com/containerd/containerd/api/events"
src/runtime/pkg/kata-monitor/sandbox_cache.go: "github.com/containerd/containerd/events"
src/runtime/pkg/kata-monitor/sandbox_cache.go: "github.com/containerd/typeurl"
src/runtime/pkg/kata-monitor/sandbox_cache.go: _ "github.com/containerd/containerd/api/events"
src/runtime/pkg/kata-monitor/sandbox_cache.go: client, err := containerd.New(addr)
src/runtime/pkg/kata-monitor/sandbox_cache.go: // "runtime":{"name":"io.containerd.kata.v2"}
src/runtime/pkg/types/types.go: DefaultKataRuntimeName = "io.containerd.kata.v2"
src/runtime/pkg/types/types.go: KataRuntimeNameRegexp = `io\.containerd\.kata.*\.v2`
src/runtime/pkg/types/types.go: ContainerdRuntimeTaskPath = "io.containerd.runtime.v2.task"
src/runtime/pkg/types/types_test.go: assert.Equal(true, runtimeNameRegexp.MatchString("io.containerd.kata.v2"))
src/runtime/pkg/types/types_test.go: assert.Equal(true, runtimeNameRegexp.MatchString("io.containerd.kataclh.v2"))
src/runtime/pkg/types/types_test.go: assert.Equal(true, runtimeNameRegexp.MatchString("io.containerd.kata-clh.v2"))
src/runtime/pkg/types/types_test.go: assert.Equal(true, runtimeNameRegexp.MatchString("io.containerd.kata.1.2.3-clh.4.v2"))
src/runtime/pkg/types/types_test.go: assert.Equal(false, runtimeNameRegexp.MatchString("io2containerd.kata.v2"))
src/runtime/pkg/types/types_test.go: assert.Equal(false, runtimeNameRegexp.MatchString("io.containerd.runc.v1"))
src/runtime/vendor/github.com/Microsoft/hcsshim/vendor.conf:github.com/containerd/console c12b1e7919c14469339a5d38f2f8ed9b64a9de23
src/runtime/vendor/github.com/Microsoft/hcsshim/vendor.conf:github.com/containerd/go-runc 5a6d9f37cfa36b15efba46dc7ea349fa9b7143c3
src/runtime/vendor/github.com/containerd/cgroups/.travis.yml:go_import_path: github.com/containerd/cgroups
src/runtime/vendor/github.com/containerd/cgroups/.travis.yml: - cd $GOPATH/src/github.com/containerd/cgroups
src/runtime/vendor/github.com/containerd/cgroups/.travis.yml: - pushd ..; git clone https://github.com/containerd/project; popd
src/runtime/vendor/github.com/containerd/cgroups/Makefile:# Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/Protobuild.toml:prefix = "github.com/containerd/cgroups"
src/runtime/vendor/github.com/containerd/cgroups/README.md:[![Build Status](https://travis-ci.org/containerd/cgroups.svg?branch=master)](https://travis-ci.org/containerd/cgroups)
src/runtime/vendor/github.com/containerd/cgroups/README.md:[![codecov](https://codecov.io/gh/containerd/cgroups/branch/master/graph/badge.svg)](https://codecov.io/gh/containerd/cgroups)
src/runtime/vendor/github.com/containerd/cgroups/README.md:[![GoDoc](https://godoc.org/github.com/containerd/cgroups?status.svg)](https://godoc.org/github.com/containerd/cgroups)
src/runtime/vendor/github.com/containerd/cgroups/README.md:[![Go Report Card](https://goreportcard.com/badge/github.com/containerd/cgroups)](https://goreportcard.com/report/github.com/containerd/cgroups)
src/runtime/vendor/github.com/containerd/cgroups/README.md:Cgroups is a containerd sub-project, licensed under the [Apache 2.0 license](./LICENSE).
src/runtime/vendor/github.com/containerd/cgroups/README.md:As a containerd sub-project, you will find the:
src/runtime/vendor/github.com/containerd/cgroups/README.md: * [Project governance](https://github.com/containerd/project/blob/master/GOVERNANCE.md),
src/runtime/vendor/github.com/containerd/cgroups/README.md: * [Maintainers](https://github.com/containerd/project/blob/master/MAINTAINERS),
src/runtime/vendor/github.com/containerd/cgroups/README.md: * and [Contributing guidelines](https://github.com/containerd/project/blob/master/CONTRIBUTING.md)
src/runtime/vendor/github.com/containerd/cgroups/README.md:information in our [`containerd/project`](https://github.com/containerd/project) repository.
src/runtime/vendor/github.com/containerd/cgroups/blkio.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/cgroup.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/control.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/cpu.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/cpuacct.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/cpuset.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/devices.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/errors.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/freezer.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/hierarchy.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/hugetlb.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/memory.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go:// source: github.com/containerd/cgroups/metrics.proto
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: github.com/containerd/cgroups/metrics.proto
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*Metrics)(nil), "io.containerd.cgroups.v1.Metrics")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*HugetlbStat)(nil), "io.containerd.cgroups.v1.HugetlbStat")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*PidsStat)(nil), "io.containerd.cgroups.v1.PidsStat")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*CPUStat)(nil), "io.containerd.cgroups.v1.CPUStat")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*CPUUsage)(nil), "io.containerd.cgroups.v1.CPUUsage")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*Throttle)(nil), "io.containerd.cgroups.v1.Throttle")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*MemoryStat)(nil), "io.containerd.cgroups.v1.MemoryStat")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*MemoryEntry)(nil), "io.containerd.cgroups.v1.MemoryEntry")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*BlkIOStat)(nil), "io.containerd.cgroups.v1.BlkIOStat")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*BlkIOEntry)(nil), "io.containerd.cgroups.v1.BlkIOEntry")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*RdmaStat)(nil), "io.containerd.cgroups.v1.RdmaStat")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*RdmaEntry)(nil), "io.containerd.cgroups.v1.RdmaEntry")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go: proto.RegisterType((*NetworkStat)(nil), "io.containerd.cgroups.v1.NetworkStat")
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.go:func init() { proto.RegisterFile("github.com/containerd/cgroups/metrics.proto", fileDescriptorMetrics) }
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: name: "github.com/containerd/cgroups/metrics.proto"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: package: "io.containerd.cgroups.v1"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.HugetlbStat"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.PidsStat"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.CPUStat"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.MemoryStat"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.BlkIOStat"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.RdmaStat"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.NetworkStat"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.CPUUsage"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.Throttle"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.MemoryEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.MemoryEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.MemoryEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.MemoryEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.BlkIOEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.BlkIOEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.BlkIOEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.BlkIOEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.BlkIOEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.BlkIOEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.BlkIOEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.BlkIOEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.RdmaEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.pb.txt: type_name: ".io.containerd.cgroups.v1.RdmaEntry"
src/runtime/vendor/github.com/containerd/cgroups/metrics.proto:package io.containerd.cgroups.v1;
src/runtime/vendor/github.com/containerd/cgroups/named.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/net_cls.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/net_prio.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/opts.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/paths.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/perf_event.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/pids.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/rdma.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/state.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/subsystem.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/systemd.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/ticks.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/ticks.go: // See https://github.com/containerd/cgroups/pull/12 for
src/runtime/vendor/github.com/containerd/cgroups/utils.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/cgroups/v1.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/.travis.yml:go_import_path: github.com/containerd/console
src/runtime/vendor/github.com/containerd/console/.travis.yml: - pushd ..; git clone https://github.com/containerd/project; popd
src/runtime/vendor/github.com/containerd/console/LICENSE: Copyright The containerd Authors
src/runtime/vendor/github.com/containerd/console/README.md:[![Build Status](https://travis-ci.org/containerd/console.svg?branch=master)](https://travis-ci.org/containerd/console)
src/runtime/vendor/github.com/containerd/console/README.md:console is a containerd sub-project, licensed under the [Apache 2.0 license](./LICENSE).
src/runtime/vendor/github.com/containerd/console/README.md:As a containerd sub-project, you will find the:
src/runtime/vendor/github.com/containerd/console/README.md: * [Project governance](https://github.com/containerd/project/blob/master/GOVERNANCE.md),
src/runtime/vendor/github.com/containerd/console/README.md: * [Maintainers](https://github.com/containerd/project/blob/master/MAINTAINERS),
src/runtime/vendor/github.com/containerd/console/README.md: * and [Contributing guidelines](https://github.com/containerd/project/blob/master/CONTRIBUTING.md)
src/runtime/vendor/github.com/containerd/console/README.md:information in our [`containerd/project`](https://github.com/containerd/project) repository.
src/runtime/vendor/github.com/containerd/console/console.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/console_linux.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/console_unix.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/console_windows.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/go.mod:module github.com/containerd/console
src/runtime/vendor/github.com/containerd/console/tc_darwin.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/tc_freebsd.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/tc_linux.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/tc_openbsd_cgo.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/tc_openbsd_nocgo.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/tc_solaris_cgo.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/tc_solaris_nocgo.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/console/tc_unix.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/containerd/.appveyor.yml:clone_folder: c:\gopath\src\github.com\containerd\containerd
src/runtime/vendor/github.com/containerd/containerd/.appveyor.yml: # Print host version. TODO: Remove this when containerd has a way to get host version
src/runtime/vendor/github.com/containerd/containerd/.appveyor.yml: - bash.exe -lc "export PATH=/c/tools/mingw64/bin:/c/gopath/src/github.com/containerd/containerd/bin:$PATH ; mingw32-make.exe coverage root-coverage"
src/runtime/vendor/github.com/containerd/containerd/.appveyor.yml: - bash.exe -elc "export PATH=/c/tools/mingw64/bin:/c/gopath/src/github.com/containerd/containerd/bin:$PATH ; mingw32-make.exe integration"
src/runtime/vendor/github.com/containerd/containerd/.appveyor.yml: # Run the integration suite a second time. See discussion in github.com/containerd/containerd/pull/1759
src/runtime/vendor/github.com/containerd/containerd/.appveyor.yml: - bash.exe -elc "export PATH=/c/tools/mingw64/bin:/c/gopath/src/github.com/containerd/containerd/bin:$PATH; TESTFLAGS_PARALLEL=1 mingw32-make.exe integration"
src/runtime/vendor/github.com/containerd/containerd/.gitignore:containerd.test
src/runtime/vendor/github.com/containerd/containerd/.travis.yml:go_import_path: github.com/containerd/containerd
src/runtime/vendor/github.com/containerd/containerd/.travis.yml: - TRAVIS_GOOS=linux TEST_RUNTIME=io.containerd.runc.v1 TRAVIS_CGO_ENABLED=1
src/runtime/vendor/github.com/containerd/containerd/.travis.yml: - TRAVIS_GOOS=linux TEST_RUNTIME=io.containerd.runtime.v1.linux TRAVIS_CGO_ENABLED=1
src/runtime/vendor/github.com/containerd/containerd/.travis.yml: - pushd ..; git clone https://github.com/containerd/project; popd
src/runtime/vendor/github.com/containerd/containerd/.travis.yml: # Run the integration suite a second time. See discussion in github.com/containerd/containerd/pull/1759
src/runtime/vendor/github.com/containerd/containerd/.travis.yml: sudo PATH=$PATH containerd -log-level debug &> /tmp/containerd-cri.log &
src/runtime/vendor/github.com/containerd/containerd/.travis.yml: sudo PATH=$PATH GOPATH=$GOPATH critest --runtime-endpoint=/var/run/containerd/containerd.sock --parallel=8 ;
src/runtime/vendor/github.com/containerd/containerd/.travis.yml: test $TEST_RC -ne 0 && cat /tmp/containerd-cri.log ;
src/runtime/vendor/github.com/containerd/containerd/.travis.yml: sudo pkill containerd ;
src/runtime/vendor/github.com/containerd/containerd/.travis.yml: repo: containerd/containerd
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:## containerd Adopters
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:A non-exhaustive list of containerd adopters is provided below.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:runtime manager for `runc` processes below the Docker engine. Continuing today, containerd
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_[IBM Cloud Kubernetes Service (IKS)](https://www.ibm.com/cloud/container-service)_** - offers containerd as the CRI runtime for v1.11 and higher versions.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_[IBM Cloud Private (ICP)](https://www.ibm.com/cloud/private)_** - IBM's on-premises cloud offering has containerd as a "tech preview" CRI runtime for the Kubernetes offered within this product for the past two releases, and plans to fully migrate to containerd in a future release.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_[Google Cloud Kubernetes Engine (GKE)](https://cloud.google.com/kubernetes-engine/)_** - offers containerd as the CRI runtime in **beta** for recent versions of Kubernetes.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_Cloud Foundry_** - The [Guardian container manager](https://github.com/cloudfoundry/guardian) for CF has been using OCI runC directly with additional code from CF managing the container image and filesystem interactions, but have recently migrated to use containerd as a replacement for the extra code they had written around runC.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_Alibaba's PouchContainer_** - The Alibaba [PouchContainer](https://github.com/alibaba/pouch) project uses containerd as its runtime for a cloud native offering that has unique isolation and image distribution capabilities.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_Rancher's Rio project_** - Rancher Labs [Rio](https://github.com/rancher/rio) project uses containerd as the runtime for a combined Kubernetes, Istio, and container "Cloud Native Container Distribution" platform.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_Eliot_** - The [Eliot](https://github.com/ernoaapa/eliot) container project for IoT device container management uses containerd as the runtime.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_Balena_** - Resin's [Balena](https://github.com/resin-os/balena) container engine, based on moby/moby but for edge, embedded, and IoT use cases, uses the containerd and runc stack in the same way that the Docker engine uses containerd.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_LinuxKit_** - the Moby project's [LinuxKit](https://github.com/linuxkit/linuxkit) for building secure, minimal Linux OS images in a container-native model uses containerd as the core runtime for system and service containers.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_BuildKit_** - The Moby project's [BuildKit](https://github.com/moby/buildkit) can use either runC or containerd as build execution backends for building container images. BuildKit support has also been built into the Docker engine in recent releases, making BuildKit provide the backend to the `docker build` command.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_Azure acs-engine_** - Microsoft Azure's [acs-engine](https://github.com/Azure/acs-engine) open source project has customizable deployment of Kubernetes clusters, where containerd is a selectable container runtime. At some point in the future Azure's AKS service will default to use containerd as the CRI runtime for deployed Kubernetes clusters.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_Amazon Firecracker_** - The AWS [Firecracker VMM project](http://firecracker-microvm.io/) has extended containerd with a new snapshotter and v2 shim to allow containerd to drive virtualized container processes via their VMM implementation. More details on their containerd integration are available in [their GitHub project](https://github.com/firecracker-microvm/firecracker-containerd).
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_Kata Containers_** - The [Kata containers](https://katacontainers.io/) lightweight-virtualized container runtime project integrates with containerd via a custom v2 shim implementation that drives the Kata container runtime.
src/runtime/vendor/github.com/containerd/containerd/ADOPTERS.md:**_Other Projects_** - While the above list provides a cross-section of well known uses of containerd, the simplicity and clear API layer for containerd has inspired many smaller projects around providing simple container management platforms. Several examples of building higher layer functionality on top of the containerd base have come from various containerd community participants:
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:# Build containerd from source
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:This guide is useful if you intend to contribute on containerd. Thanks for your
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:* [Build containerd](#build-containerd)
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:* [Testing](#testing-containerd)
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:To build the `containerd` daemon, and the `ctr` simple test client, the following build system dependencies are required:
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:At this point you can use `go` to checkout `containerd` in your `GOPATH`:
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:go get github.com/containerd/containerd
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:`containerd` uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) it means that you
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:At this point you are ready to build `containerd` yourself!
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:`runc` is the default container runtime used by `containerd` and is required to
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:run containerd. While it is okay to download a runc binary and install that on
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:## Build containerd
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:`containerd` uses `make` to create a repeatable build flow. It means that you
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:> * `no_cri`: A build tag disables building Kubernetes [CRI](http://blog.kubernetes.io/2016/12/container-runtime-interface-cri-in-kubernetes.html) support into containerd.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:> See [here](https://github.com/containerd/cri-containerd#build-tags) for build tags of CRI plugin.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:> Makefile target will disable the btrfs driver within the containerd Go build.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:Please refer to [RUNC.md](/RUNC.md) for the currently supported version of `runc` that is used by containerd.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:> - static containerd binary does not support loading plugins
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:## Build containerd
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:You can build `containerd` via a Linux-based Docker container.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:Let's suppose that you built an image called `containerd/build`. From the
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:containerd source root directory you can run the following command:
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md: -v ${PWD}:/go/src/github.com/containerd/containerd \
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md: -w /go/src/github.com/containerd/containerd containerd/build sh
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:This mounts `containerd` repository
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:You are now ready to [build](#build-containerd):
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:## Build containerd and runc
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:To have complete core container runtime, you will both `containerd` and `runc`. It is possible to build both of these via Docker container.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:In our Docker container we will use a specific `runc` build which includes [seccomp](https://en.wikipedia.org/wiki/seccomp) and [apparmor](https://en.wikipedia.org/wiki/AppArmor) support. Hence why our Dockerfile includes `libseccomp-dev` as a dependency (apparmor support doesn't require external libraries). Please refer to [RUNC.md](/RUNC.md) for the currently supported version of `runc` that is used by containerd.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:Let's suppose you build an image called `containerd/build` from the above Dockerfile. You can run the following command:
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md: -v /var/lib/containerd \
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md: -v ${GOPATH}/src/github.com/containerd/containerd:/go/src/github.com/containerd/containerd \
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md: -w /go/src/github.com/containerd/containerd containerd/build sh
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:This mounts both `runc` and `containerd` repositories in our Docker container.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:From within our Docker container let's build `containerd`:
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:cd /go/src/github.com/containerd/containerd
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:containerd --config config.toml
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:# Testing containerd
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:INFO[0000] running tests against containerd revision=f2ae8a020a985a8d9862c9eb5ab66902c2888361 version=v1.0.0-beta.2-49-gf2ae8a0
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:ok github.com/containerd/containerd 4.778s
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:### containerd-stress
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:In addition to `go test`-based testing executed via the `Makefile` targets, the `containerd-stress` tool is available and built with the `all` or `binaries` targets and installed during `make install`.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:With this tool you can stress a running containerd daemon for a specified period of time, selecting a concurrency level to generate stress against the daemon. The following command is an example of having five workers running for two hours against a default containerd gRPC socket address:
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:containerd-stress -c 5 -t 120
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:For more information on this tool's options please run `containerd-stress --help`.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:[Bucketbench](https://github.com/estesp/bucketbench) is an external tool which can be used to drive load against a container runtime, specifying a particular set of lifecycle operations to run with a specified amount of concurrency. Bucketbench is more focused on generating performance details than simply inducing load against containerd.
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md:Bucketbench differs from the `containerd-stress` tool in a few ways:
src/runtime/vendor/github.com/containerd/containerd/BUILDING.md: - Bucketbench has support for testing the Docker engine, the `runc` binary, and containerd 0.2.x (via `ctr`) and 1.0 (via the client library) branches.
src/runtime/vendor/github.com/containerd/containerd/LICENSE: Copyright The containerd Authors
src/runtime/vendor/github.com/containerd/containerd/Makefile:# Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/containerd/Makefile:RELEASE=containerd-$(VERSION:v%=%).${GOOS}-${GOARCH}
src/runtime/vendor/github.com/containerd/containerd/Makefile:PKG=github.com/containerd/containerd
src/runtime/vendor/github.com/containerd/containerd/Makefile:COMMANDS=ctr containerd containerd-stress
src/runtime/vendor/github.com/containerd/containerd/Makefile:MANPAGES=ctr.1 containerd.1 containerd-config.1 containerd-config.toml.5
src/runtime/vendor/github.com/containerd/containerd/Makefile:bin/containerd-shim: cmd/containerd-shim FORCE # set !cgo and omit pie for a static shim build: https://github.com/golang/go/issues/17789#issuecomment-258542220
src/runtime/vendor/github.com/containerd/containerd/Makefile: @echo "$(WHALE) bin/containerd-shim"
src/runtime/vendor/github.com/containerd/containerd/Makefile: @CGO_ENABLED=0 go build ${GO_BUILD_FLAGS} -o bin/containerd-shim ${SHIM_GO_LDFLAGS} ${GO_TAGS} ./cmd/containerd-shim
src/runtime/vendor/github.com/containerd/containerd/Makefile:bin/containerd-shim-runc-v1: cmd/containerd-shim-runc-v1 FORCE # set !cgo and omit pie for a static shim build: https://github.com/golang/go/issues/17789#issuecomment-258542220
src/runtime/vendor/github.com/containerd/containerd/Makefile: @echo "$(WHALE) bin/containerd-shim-runc-v1"
src/runtime/vendor/github.com/containerd/containerd/Makefile: @CGO_ENABLED=0 go build ${GO_BUILD_FLAGS} -o bin/containerd-shim-runc-v1 ${SHIM_GO_LDFLAGS} ${GO_TAGS} ./cmd/containerd-shim-runc-v1
src/runtime/vendor/github.com/containerd/containerd/Makefile:bin/containerd-shim-runhcs-v1: cmd/containerd-shim-runhcs-v1 FORCE # set !cgo and omit pie for a static shim build: https://github.com/golang/go/issues/17789#issuecomment-258542220
src/runtime/vendor/github.com/containerd/containerd/Makefile: @echo "$(WHALE) bin/containerd-shim-runhcs-v1${BINARY_SUFFIX}"
src/runtime/vendor/github.com/containerd/containerd/Makefile: @CGO_ENABLED=0 go build ${GO_BUILD_FLAGS} -o bin/containerd-shim-runhcs-v1${BINARY_SUFFIX} ${SHIM_GO_LDFLAGS} ${GO_TAGS} ./cmd/containerd-shim-runhcs-v1
src/runtime/vendor/github.com/containerd/containerd/Makefile.darwin:# Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/containerd/Makefile.darwin:COMMANDS += containerd-shim
src/runtime/vendor/github.com/containerd/containerd/Makefile.freebsd:# Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/containerd/Makefile.freebsd:COMMANDS += containerd-shim
src/runtime/vendor/github.com/containerd/containerd/Makefile.linux:# Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/containerd/Makefile.linux:COMMANDS += containerd-shim containerd-shim-runc-v1
src/runtime/vendor/github.com/containerd/containerd/Makefile.windows:# Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/containerd/Makefile.windows:COMMANDS += containerd-shim-runhcs-v1
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:# containerd Plugins
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:containerd supports extending its functionality using most of its defined
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:containerd has a smart client architecture, meaning any functionality which is
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:with an image registry, or loading an image from tar. containerd's Go client
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:See [containerd's Go documentation](https://godoc.org/github.com/containerd/containerd)
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:External plugins allow extending containerd's functionality using an officially
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:released version of containerd without needing to recompile the daemon to add a
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:containerd allows extensions through two method:
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: - via a binary available in containerd's PATH
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: - by configuring containerd to proxy to another gRPC service
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:These binaries are used to start the shim process for containerd and allows
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:containerd to manage those containers using the runtime shim api returned by
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:A proxy plugin is configured using containerd's config file and will be loaded
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:alongside the internal plugins when containerd is started. These plugins are
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:connected to containerd using a local socket serving one of containerd's gRPC
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:Update the containerd config file, which by default is at
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:`/etc/containerd/config.toml`. Add a `[proxy_plugins]` section along with a
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:refer to a local socket file which the containerd process has access to. The
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:[content store service](https://godoc.org/github.com/containerd/containerd/api/services/content/v1#ContentServer)
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:and [snapshotter service](https://godoc.org/github.com/containerd/containerd/api/services/snapshots/v1#SnapshotsServer).
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:[containerd's Snapshotter interface](https://godoc.org/github.com/containerd/containerd/snapshots#Snapshotter)
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: snapshotsapi "github.com/containerd/containerd/api/services/snapshots/v1"
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: "github.com/containerd/containerd/contrib/snapshotservice"
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: "github.com/containerd/containerd/snapshots/native"
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: // https://godoc.org/github.com/containerd/containerd/snapshots#Snapshotter
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: // example in github.com/containerd/containerd/contrib/snapshotservice
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:containerd uses plugins internally to ensure that internal implementations are
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:plugins containerd has, use `ctr plugins ls`
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.content.v1 content - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.snapshotter.v1 btrfs linux/amd64 ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.snapshotter.v1 aufs linux/amd64 error
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.snapshotter.v1 native linux/amd64 ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.snapshotter.v1 overlayfs linux/amd64 ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.snapshotter.v1 zfs linux/amd64 error
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.metadata.v1 bolt - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.differ.v1 walking linux/amd64 ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.gc.v1 scheduler - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.service.v1 containers-service - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.service.v1 content-service - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.service.v1 diff-service - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.service.v1 images-service - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.service.v1 leases-service - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.service.v1 namespaces-service - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.service.v1 snapshots-service - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.runtime.v1 linux linux/amd64 ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.runtime.v2 task linux/amd64 ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.monitor.v1 cgroups linux/amd64 ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.service.v1 tasks-service - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.internal.v1 restart - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 containers - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 content - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 diff - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 events - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 healthcheck - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 images - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 leases - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 namespaces - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 snapshots - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 tasks - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 version - ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:io.containerd.grpc.v1 cri linux/amd64 ok
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:Type: io.containerd.snapshotter.v1
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: root /var/lib/containerd/io.containerd.snapshotter.v1.aufs
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:Type: io.containerd.snapshotter.v1
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: root /var/lib/containerd/io.containerd.snapshotter.v1.zfs
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: Message: path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md:Plugins are configured using the `[plugins]` section of containerd's config.
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: [plugins.cri.containerd]
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: [plugins.cri.containerd.default_runtime]
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: runtime_type = "io.containerd.runtime.v1.linux"
src/runtime/vendor/github.com/containerd/containerd/PLUGINS.md: [plugins.cri.containerd.untrusted_workload_runtime]
src/runtime/vendor/github.com/containerd/containerd/Protobuild.toml:prefixes = ["github.com/containerd/containerd/api/events"]
src/runtime/vendor/github.com/containerd/containerd/Protobuild.toml:prefixes = ["github.com/containerd/containerd/runtime/v1/shim/v1", "github.com/containerd/containerd/runtime/v2/task"]
src/runtime/vendor/github.com/containerd/containerd/Protobuild.toml:prefix = "github.com/containerd/containerd/api"
src/runtime/vendor/github.com/containerd/containerd/Protobuild.toml:prefix = "github.com/containerd/containerd/runtime/linux/runctypes"
src/runtime/vendor/github.com/containerd/containerd/Protobuild.toml:prefix = "github.com/containerd/containerd/runtime/v2/runc/options"
src/runtime/vendor/github.com/containerd/containerd/Protobuild.toml:prefix = "github.com/containerd/containerd/runtime/v2/runhcs/options"
src/runtime/vendor/github.com/containerd/containerd/Protobuild.toml:prefix = "github.com/containerd/containerd/windows/hcsshimtypes"
src/runtime/vendor/github.com/containerd/containerd/README.md:![containerd banner](https://raw.githubusercontent.com/cncf/artwork/master/containerd/horizontal/color/containerd-horizontal-color.png)
src/runtime/vendor/github.com/containerd/containerd/README.md:[![GoDoc](https://godoc.org/github.com/containerd/containerd?status.svg)](https://godoc.org/github.com/containerd/containerd)
src/runtime/vendor/github.com/containerd/containerd/README.md:[![Build Status](https://travis-ci.org/containerd/containerd.svg?branch=master)](https://travis-ci.org/containerd/containerd)
src/runtime/vendor/github.com/containerd/containerd/README.md:[![Windows Build Status](https://ci.appveyor.com/api/projects/status/github/containerd/containerd?branch=master&svg=true)](https://ci.appveyor.com/project/mlaventure/containerd-3g73f?branch=master)
src/runtime/vendor/github.com/containerd/containerd/README.md:[![FOSSA Status](https://app.fossa.io/api/projects/git%2Bhttps%3A%2F%2Fgithub.com%2Fcontainerd%2Fcontainerd.svg?type=shield)](https://app.fossa.io/projects/git%2Bhttps%3A%2F%2Fgithub.com%2Fcontainerd%2Fcontainerd?ref=badge_shield)
src/runtime/vendor/github.com/containerd/containerd/README.md:[![Go Report Card](https://goreportcard.com/badge/github.com/containerd/containerd)](https://goreportcard.com/report/github.com/containerd/containerd)
src/runtime/vendor/github.com/containerd/containerd/README.md:containerd is an industry-standard container runtime with an emphasis on simplicity, robustness and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, low-level storage and network attachments, etc.
src/runtime/vendor/github.com/containerd/containerd/README.md:containerd is designed to be embedded into a larger system, rather than being used directly by developers or end-users.
src/runtime/vendor/github.com/containerd/containerd/README.md:See our documentation on [containerd.io](https://containerd.io):
src/runtime/vendor/github.com/containerd/containerd/README.md:See how to build containerd from source at [BUILDING](BUILDING.md).
src/runtime/vendor/github.com/containerd/containerd/README.md:If you are interested in trying out containerd see our example at [Getting Started](docs/getting-started.md).
src/runtime/vendor/github.com/containerd/containerd/README.md:Runtime requirements for containerd are very minimal. Most interactions with
src/runtime/vendor/github.com/containerd/containerd/README.md:used by containerd core code and snapshotters that will require a minimum kernel
src/runtime/vendor/github.com/containerd/containerd/README.md:containerd offers a full client package to help you integrate containerd into your platform.
src/runtime/vendor/github.com/containerd/containerd/README.md: "github.com/containerd/containerd"
src/runtime/vendor/github.com/containerd/containerd/README.md: "github.com/containerd/containerd/cio"
src/runtime/vendor/github.com/containerd/containerd/README.md: client, err := containerd.New("/run/containerd/containerd.sock")
src/runtime/vendor/github.com/containerd/containerd/README.md:Namespaces allow multiple consumers to use the same containerd without conflicting with each other. It has the benefit of sharing content but still having separation with containers and images.
src/runtime/vendor/github.com/containerd/containerd/README.md:containerd, err := client.NewContainer(docker, "id")
src/runtime/vendor/github.com/containerd/containerd/README.md:client, err := containerd.New(address, containerd.WithDefaultNamespace("docker"))
src/runtime/vendor/github.com/containerd/containerd/README.md:In containerd, a container is a metadata object. Resources such as an OCI runtime specification, image, root filesystem, and other metadata can be attached to a container.
src/runtime/vendor/github.com/containerd/containerd/README.md:containerd fully supports the OCI runtime specification for running containers. We have built in functions to help you generate runtime specifications based on images as well as custom parameters.
src/runtime/vendor/github.com/containerd/containerd/README.md:redis, err := client.NewContainer(context, "redis-master", containerd.WithNewSpec(oci.WithImageConfig(image)))
src/runtime/vendor/github.com/containerd/containerd/README.md:containerd allows you to use overlay or snapshot filesystems with your containers. It comes with builtin support for overlayfs and btrfs.
src/runtime/vendor/github.com/containerd/containerd/README.md:image, err := client.Pull(context, "docker.io/library/redis:latest", containerd.WithPullUnpack)
src/runtime/vendor/github.com/containerd/containerd/README.md: containerd.WithNewSnapshot("redis-rootfs", image),
src/runtime/vendor/github.com/containerd/containerd/README.md: containerd.WithNewSpec(oci.WithImageConfig(image)),
src/runtime/vendor/github.com/containerd/containerd/README.md: containerd.WithNewSnapshotView(id, image),
src/runtime/vendor/github.com/containerd/containerd/README.md: containerd.WithNewSpec(oci.WithImageConfig(image)),
src/runtime/vendor/github.com/containerd/containerd/README.md:Taking a container object and turning it into a runnable process on a system is done by creating a new `Task` from the container. A task represents the runnable object within containerd.
src/runtime/vendor/github.com/containerd/containerd/README.md:// or other runtime settings outside of containerd
src/runtime/vendor/github.com/containerd/containerd/README.md:redis, err = client.NewContainer(context, "redis-master", containerd.WithCheckpoint(checkpoint, "redis-rootfs"))
src/runtime/vendor/github.com/containerd/containerd/README.md:task, err = redis.NewTask(context, cio.Stdio, containerd.WithTaskCheckpoint(checkpoint))
src/runtime/vendor/github.com/containerd/containerd/README.md:In addition to the built-in Snapshot plugins in containerd, additional external
src/runtime/vendor/github.com/containerd/containerd/README.md:To add an external snapshot plugin, add the plugin to containerd's config file
src/runtime/vendor/github.com/containerd/containerd/README.md:(by default at `/etc/containerd/config.toml`). The string following
src/runtime/vendor/github.com/containerd/containerd/README.md:should refer to a socket with a GRPC listener serving containerd's Snapshot
src/runtime/vendor/github.com/containerd/containerd/README.md:GRPC API. Remember to restart containerd for any configuration changes to take
src/runtime/vendor/github.com/containerd/containerd/README.md:of containerd components.
src/runtime/vendor/github.com/containerd/containerd/README.md:https://github.com/containerd/containerd/tree/master/reports
src/runtime/vendor/github.com/containerd/containerd/README.md:For sync communication we have a community slack with a #containerd channel that everyone is welcome to join and chat about development.
src/runtime/vendor/github.com/containerd/containerd/README.md:**Slack:** Catch us in the #containerd and #containerd-dev channels on dockercommunity.slack.com.
src/runtime/vendor/github.com/containerd/containerd/README.md:__If you are reporting a security issue, please reach out discreetly at [email protected]__.
src/runtime/vendor/github.com/containerd/containerd/README.md:The containerd codebase is released under the [Apache 2.0 license](LICENSE.code).
src/runtime/vendor/github.com/containerd/containerd/README.md:**containerd** is the primary open source project within the broader containerd GitHub repository.
src/runtime/vendor/github.com/containerd/containerd/README.md:guidelines which are stored in a `project` repository commonly for all containerd projects.
src/runtime/vendor/github.com/containerd/containerd/README.md: * [Project governance](https://github.com/containerd/project/blob/master/GOVERNANCE.md),
src/runtime/vendor/github.com/containerd/containerd/README.md: * [Maintainers](https://github.com/containerd/project/blob/master/MAINTAINERS),
src/runtime/vendor/github.com/containerd/containerd/README.md: * and [Contributing guidelines](https://github.com/containerd/project/blob/master/CONTRIBUTING.md)
src/runtime/vendor/github.com/containerd/containerd/README.md:information in our [`containerd/project`](https://github.com/containerd/project) repository.
src/runtime/vendor/github.com/containerd/containerd/README.md:Interested to see who is using containerd? Are you using containerd in a project?
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:This document details the versioning and release plan for containerd. Stability
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:If you rely on containerd, it would be good to spend time understanding the
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:reach out by [filing an issue](https://github.com/containerd/containerd/issues).
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:Releases of containerd will be versioned using dotted triples, similar to
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:Major and minor releases of containerd will be made from master. Releases of
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:containerd will be marked with GPG signed tags and announced at
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:https://github.com/containerd/containerd/releases. The tag will be of the
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:The upgrade path for containerd is such that the 0.0.x patch releases are
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:[milestones](https://github.com/containerd/containerd/milestones). If your
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:| [0.0](https://github.com/containerd/containerd/releases/tag/0.0.5) | End of Life | Dec 4, 2015 | - |
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:| [0.1](https://github.com/containerd/containerd/releases/tag/v0.1.0) | End of Life | Mar 21, 2016 | - |
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:| [0.2](https://github.com/containerd/containerd/tree/v0.2.x) | End of Life | Apr 21, 2016 | December 5, 2017 |
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:| [1.0](https://github.com/containerd/containerd/releases/tag/v1.0.0) | Active | December 5, 2017 | December 5, 2018 |
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:| [1.1](https://github.com/containerd/containerd/releases/tag/v1.1.0) | Active | April 23, 2018 | max(April 23, 2019, release of 1.2.0, Kubernetes 1.10 EOL) |
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:| [1.2](https://github.com/containerd/containerd/releases/tag/v1.2.0) | Active | October 24, 2018 | max(October 24, 2019, release of 1.3.0) |
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:| [1.3](https://github.com/containerd/containerd/milestone/20) | Next | TBD | max(TBD+1 year, release of 1.4.0) |
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:Backports in containerd are community driven. As maintainers, we'll try to
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:__If you are reporting a security issue, please reach out discreetly at [email protected]__.
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:containerd versions:
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:| Go client API | Unstable | _future_ | [godoc](https://godoc.org/github.com/containerd/containerd) |
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:The primary product of containerd is the GRPC API. As of the 1.0.0 release, the
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:a single file. At each _minor_ release of containerd, we will move the current
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:containerd is based on a modular design where plugins are implemented to provide the core functionality.
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:Plugins implemented in tree are supported by the containerd community unless explicitly specified as non-stable.
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:Out of tree plugins are not supported by the containerd maintainers.
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:[godoc](https://godoc.org/github.com/containerd/containerd), is currently
src/runtime/vendor/github.com/containerd/containerd/RELEASES.md:The `ctr` tool provides the ability to introspect and understand the containerd
src/runtime/vendor/github.com/containerd/containerd/ROADMAP.md:# containerd roadmap
src/runtime/vendor/github.com/containerd/containerd/ROADMAP.md:containerd uses the issues and milestones to define its roadmap.
src/runtime/vendor/github.com/containerd/containerd/ROADMAP.md:They are tasks and/or features that the containerd community wants completed.
src/runtime/vendor/github.com/containerd/containerd/ROADMAP.md:To find the roadmap items currently planned for containerd you can filter on the `roadmap` label.
src/runtime/vendor/github.com/containerd/containerd/ROADMAP.md:[Search Roadmap Items](https://github.com/containerd/containerd/issues?q=is%3Aopen+is%3Aissue+label%3Aroadmap)
src/runtime/vendor/github.com/containerd/containerd/ROADMAP.md:[View Milestones](https://github.com/containerd/containerd/milestones)
src/runtime/vendor/github.com/containerd/containerd/RUNC.md:containerd is built with OCI support and with support for advanced features provided by [runc](https://github.com/opencontainers/runc).
src/runtime/vendor/github.com/containerd/containerd/RUNC.md:After an official runc release we will start pinning containerd support to a specific version but various development and testing features may require a newer runc version than the latest release. If you encounter any runtime errors, please make sure your runc is in sync with the commit/tag provided in this document.
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:containerd should expose primitives to solve problems instead of building high level abstractions in the API.
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:Instead of having a build API in containerd we should expose the lower level primitives that allow things required in build to work.
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:For the various components in containerd there should be defined extension points where implementations can be swapped for alternatives.
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:The best example of this is that containerd will use `runc` from OCI as the default runtime in the execution layer but other runtimes conforming to the OCI Runtime specification can be easily added to containerd.
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:containerd will come with a default implementation for the various components.
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:Additional implementations will not be accepted into the core repository and should be developed in a separate repository not maintained by the containerd maintainers.
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:The following table specifies the various components of containerd and general features of container runtimes.
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:| distribution | Having the ability to push and pull images as well as operations on images as a first class API object | in | containerd will fully support the management and retrieval of images |
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:| networking | creation and management of network interfaces | out | Networking will be handled and provided to containerd via higher level systems. |
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:| build | Building images as a first class API | out | Build is a higher level tooling feature and can be implemented in many different ways on top of containerd |
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:| volumes | Volume management for external data | out | The API supports mounts, binds, etc where all volumes type systems can be built on top of containerd. |
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:| logging | Persisting container logs | out | Logging can be build on top of containerd because the container’s STDIO will be provided to the clients and they can persist any way they see fit. There is no io copying of container STDIO in containerd. |
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:containerd is scoped to a single host and makes assumptions based on that fact.
src/runtime/vendor/github.com/containerd/containerd/SCOPE.md:containerd is designed to be embedded into a larger system, hence it only includes a barebone CLI (`ctr`) specifically for development and debugging purpose, with no mandate to be human-friendly, and no guarantee of interface stability over time.
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go:// source: github.com/containerd/containerd/api/events/container.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: github.com/containerd/containerd/api/events/container.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: github.com/containerd/containerd/api/events/content.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: github.com/containerd/containerd/api/events/image.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: github.com/containerd/containerd/api/events/namespace.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: github.com/containerd/containerd/api/events/snapshot.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: github.com/containerd/containerd/api/events/task.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go:// skipping weak import containerd_plugin "github.com/containerd/containerd/protobuf/plugin"
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go:import typeurl "github.com/containerd/typeurl"
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: proto.RegisterType((*ContainerCreate)(nil), "containerd.events.ContainerCreate")
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: proto.RegisterType((*ContainerCreate_Runtime)(nil), "containerd.events.ContainerCreate.Runtime")
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: proto.RegisterType((*ContainerUpdate)(nil), "containerd.events.ContainerUpdate")
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: proto.RegisterType((*ContainerDelete)(nil), "containerd.events.ContainerDelete")
src/runtime/vendor/github.com/containerd/containerd/api/events/container.pb.go: proto.RegisterFile("github.com/containerd/containerd/api/events/container.proto", fileDescriptorContainer)
src/runtime/vendor/github.com/containerd/containerd/api/events/container.proto:package containerd.events;
src/runtime/vendor/github.com/containerd/containerd/api/events/container.proto:import weak "github.com/containerd/containerd/protobuf/plugin/fieldpath.proto";
src/runtime/vendor/github.com/containerd/containerd/api/events/container.proto:option go_package = "github.com/containerd/containerd/api/events;events";
src/runtime/vendor/github.com/containerd/containerd/api/events/container.proto:option (containerd.plugin.fieldpath_all) = true;
src/runtime/vendor/github.com/containerd/containerd/api/events/content.pb.go:// source: github.com/containerd/containerd/api/events/content.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/content.pb.go:// skipping weak import containerd_plugin "github.com/containerd/containerd/protobuf/plugin"
src/runtime/vendor/github.com/containerd/containerd/api/events/content.pb.go: proto.RegisterType((*ContentDelete)(nil), "containerd.events.ContentDelete")
src/runtime/vendor/github.com/containerd/containerd/api/events/content.pb.go: proto.RegisterFile("github.com/containerd/containerd/api/events/content.proto", fileDescriptorContent)
src/runtime/vendor/github.com/containerd/containerd/api/events/content.proto:package containerd.events;
src/runtime/vendor/github.com/containerd/containerd/api/events/content.proto:import weak "github.com/containerd/containerd/protobuf/plugin/fieldpath.proto";
src/runtime/vendor/github.com/containerd/containerd/api/events/content.proto:option go_package = "github.com/containerd/containerd/api/events;events";
src/runtime/vendor/github.com/containerd/containerd/api/events/content.proto:option (containerd.plugin.fieldpath_all) = true;
src/runtime/vendor/github.com/containerd/containerd/api/events/doc.go: Copyright The containerd Authors.
src/runtime/vendor/github.com/containerd/containerd/api/events/doc.go:// containerd.
src/runtime/vendor/github.com/containerd/containerd/api/events/image.pb.go:// source: github.com/containerd/containerd/api/events/image.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/image.pb.go:// skipping weak import containerd_plugin "github.com/containerd/containerd/protobuf/plugin"
src/runtime/vendor/github.com/containerd/containerd/api/events/image.pb.go: proto.RegisterType((*ImageCreate)(nil), "containerd.services.images.v1.ImageCreate")
src/runtime/vendor/github.com/containerd/containerd/api/events/image.pb.go: proto.RegisterType((*ImageUpdate)(nil), "containerd.services.images.v1.ImageUpdate")
src/runtime/vendor/github.com/containerd/containerd/api/events/image.pb.go: proto.RegisterType((*ImageDelete)(nil), "containerd.services.images.v1.ImageDelete")
src/runtime/vendor/github.com/containerd/containerd/api/events/image.pb.go: proto.RegisterFile("github.com/containerd/containerd/api/events/image.proto", fileDescriptorImage)
src/runtime/vendor/github.com/containerd/containerd/api/events/image.proto:package containerd.services.images.v1;
src/runtime/vendor/github.com/containerd/containerd/api/events/image.proto:import weak "github.com/containerd/containerd/protobuf/plugin/fieldpath.proto";
src/runtime/vendor/github.com/containerd/containerd/api/events/image.proto:option go_package = "github.com/containerd/containerd/api/events;events";
src/runtime/vendor/github.com/containerd/containerd/api/events/image.proto:option (containerd.plugin.fieldpath_all) = true;
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.pb.go:// source: github.com/containerd/containerd/api/events/namespace.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.pb.go:// skipping weak import containerd_plugin "github.com/containerd/containerd/protobuf/plugin"
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.pb.go: proto.RegisterType((*NamespaceCreate)(nil), "containerd.events.NamespaceCreate")
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.pb.go: proto.RegisterType((*NamespaceUpdate)(nil), "containerd.events.NamespaceUpdate")
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.pb.go: proto.RegisterType((*NamespaceDelete)(nil), "containerd.events.NamespaceDelete")
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.pb.go: proto.RegisterFile("github.com/containerd/containerd/api/events/namespace.proto", fileDescriptorNamespace)
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.proto:package containerd.events;
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.proto:import weak "github.com/containerd/containerd/protobuf/plugin/fieldpath.proto";
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.proto:option go_package = "github.com/containerd/containerd/api/events;events";
src/runtime/vendor/github.com/containerd/containerd/api/events/namespace.proto:option (containerd.plugin.fieldpath_all) = true;
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.pb.go:// source: github.com/containerd/containerd/api/events/snapshot.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.pb.go:// skipping weak import containerd_plugin "github.com/containerd/containerd/protobuf/plugin"
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.pb.go: proto.RegisterType((*SnapshotPrepare)(nil), "containerd.events.SnapshotPrepare")
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.pb.go: proto.RegisterType((*SnapshotCommit)(nil), "containerd.events.SnapshotCommit")
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.pb.go: proto.RegisterType((*SnapshotRemove)(nil), "containerd.events.SnapshotRemove")
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.pb.go: proto.RegisterFile("github.com/containerd/containerd/api/events/snapshot.proto", fileDescriptorSnapshot)
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.proto:package containerd.events;
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.proto:import weak "github.com/containerd/containerd/protobuf/plugin/fieldpath.proto";
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.proto:option go_package = "github.com/containerd/containerd/api/events;events";
src/runtime/vendor/github.com/containerd/containerd/api/events/snapshot.proto:option (containerd.plugin.fieldpath_all) = true;
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go:// source: github.com/containerd/containerd/api/events/task.proto
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go:import containerd_types "github.com/containerd/containerd/api/types"
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go:// skipping weak import containerd_plugin "github.com/containerd/containerd/protobuf/plugin"
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: Rootfs []*containerd_types.Mount `protobuf:"bytes,3,rep,name=rootfs" json:"rootfs,omitempty"`
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskCreate)(nil), "containerd.events.TaskCreate")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskStart)(nil), "containerd.events.TaskStart")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskDelete)(nil), "containerd.events.TaskDelete")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskIO)(nil), "containerd.events.TaskIO")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskExit)(nil), "containerd.events.TaskExit")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskOOM)(nil), "containerd.events.TaskOOM")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskExecAdded)(nil), "containerd.events.TaskExecAdded")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskExecStarted)(nil), "containerd.events.TaskExecStarted")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskPaused)(nil), "containerd.events.TaskPaused")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskResumed)(nil), "containerd.events.TaskResumed")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterType((*TaskCheckpointed)(nil), "containerd.events.TaskCheckpointed")
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: `Rootfs:` + strings.Replace(fmt.Sprintf("%v", this.Rootfs), "Mount", "containerd_types.Mount", 1) + `,`,
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: m.Rootfs = append(m.Rootfs, &containerd_types.Mount{})
src/runtime/vendor/github.com/containerd/containerd/api/events/task.pb.go: proto.RegisterFile("github.com/containerd/containerd/api/events/task.proto", fileDescriptorTask)
src/runtime/vendor/github.com/containerd/containerd/api/events/task.proto:package containerd.events;
src/runtime/vendor/github.com/containerd/containerd/api/events/task.proto:import "github.com/containerd/containerd/api/types/mount.proto";
src/runtime/vendor/github.com/containerd/containerd/api/events/task.proto:import weak "github.com/containerd/containerd/protobuf/plugin/fieldpath.proto";
src/runtime/vendor/github.com/containerd/containerd/api/events/task.proto:option go_package = "github.com/containerd/containerd/api/events;events";
src/runtime/vendor/github.com/containerd/containerd/api/events/task.proto:option (containerd.plugin.fieldpath_all) = true;
src/runtime/vendor/github.com/containerd/containerd/api/events/task.proto: repeated containerd.types.Mount rootfs = 3;
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go:// source: github.com/containerd/containerd/api/services/containers/v1/containers.proto
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: github.com/containerd/containerd/api/services/containers/v1/containers.proto
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: // containerd filter package.
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*Container)(nil), "containerd.services.containers.v1.Container")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*Container_Runtime)(nil), "containerd.services.containers.v1.Container.Runtime")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*GetContainerRequest)(nil), "containerd.services.containers.v1.GetContainerRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*GetContainerResponse)(nil), "containerd.services.containers.v1.GetContainerResponse")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*ListContainersRequest)(nil), "containerd.services.containers.v1.ListContainersRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*ListContainersResponse)(nil), "containerd.services.containers.v1.ListContainersResponse")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*CreateContainerRequest)(nil), "containerd.services.containers.v1.CreateContainerRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*CreateContainerResponse)(nil), "containerd.services.containers.v1.CreateContainerResponse")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*UpdateContainerRequest)(nil), "containerd.services.containers.v1.UpdateContainerRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*UpdateContainerResponse)(nil), "containerd.services.containers.v1.UpdateContainerResponse")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*DeleteContainerRequest)(nil), "containerd.services.containers.v1.DeleteContainerRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterType((*ListContainerMessage)(nil), "containerd.services.containers.v1.ListContainerMessage")
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: err := grpc.Invoke(ctx, "/containerd.services.containers.v1.Containers/Get", in, out, c.cc, opts...)
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: err := grpc.Invoke(ctx, "/containerd.services.containers.v1.Containers/List", in, out, c.cc, opts...)
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: stream, err := grpc.NewClientStream(ctx, &_Containers_serviceDesc.Streams[0], c.cc, "/containerd.services.containers.v1.Containers/ListStream", opts...)
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: err := grpc.Invoke(ctx, "/containerd.services.containers.v1.Containers/Create", in, out, c.cc, opts...)
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: err := grpc.Invoke(ctx, "/containerd.services.containers.v1.Containers/Update", in, out, c.cc, opts...)
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: err := grpc.Invoke(ctx, "/containerd.services.containers.v1.Containers/Delete", in, out, c.cc, opts...)
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: FullMethod: "/containerd.services.containers.v1.Containers/Get",
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: FullMethod: "/containerd.services.containers.v1.Containers/List",
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: FullMethod: "/containerd.services.containers.v1.Containers/Create",
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: FullMethod: "/containerd.services.containers.v1.Containers/Update",
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: FullMethod: "/containerd.services.containers.v1.Containers/Delete",
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: ServiceName: "containerd.services.containers.v1.Containers",
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: Metadata: "github.com/containerd/containerd/api/services/containers/v1/containers.proto",
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.pb.go: proto.RegisterFile("github.com/containerd/containerd/api/services/containers/v1/containers.proto", fileDescriptorContainers)
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.proto:package containerd.services.containers.v1;
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.proto:option go_package = "github.com/containerd/containerd/api/services/containers/v1;containers";
src/runtime/vendor/github.com/containerd/containerd/api/services/containers/v1/containers.proto: // containerd filter package.
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go:// source: github.com/containerd/containerd/api/services/content/v1/content.proto
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: github.com/containerd/containerd/api/services/content/v1/content.proto
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: // containerd filter package.
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: Action WriteAction `protobuf:"varint,1,opt,name=action,proto3,enum=containerd.services.content.v1.WriteAction" json:"action,omitempty"`
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: Action WriteAction `protobuf:"varint,1,opt,name=action,proto3,enum=containerd.services.content.v1.WriteAction" json:"action,omitempty"`
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*Info)(nil), "containerd.services.content.v1.Info")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*InfoRequest)(nil), "containerd.services.content.v1.InfoRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*InfoResponse)(nil), "containerd.services.content.v1.InfoResponse")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*UpdateRequest)(nil), "containerd.services.content.v1.UpdateRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*UpdateResponse)(nil), "containerd.services.content.v1.UpdateResponse")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*ListContentRequest)(nil), "containerd.services.content.v1.ListContentRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*ListContentResponse)(nil), "containerd.services.content.v1.ListContentResponse")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*DeleteContentRequest)(nil), "containerd.services.content.v1.DeleteContentRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*ReadContentRequest)(nil), "containerd.services.content.v1.ReadContentRequest")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*ReadContentResponse)(nil), "containerd.services.content.v1.ReadContentResponse")
src/runtime/vendor/github.com/containerd/containerd/api/services/content/v1/content.pb.go: proto.RegisterType((*Status)(nil), "containerd.services.content.v1.Status")