--- - name: Cri-o | load vars import_tasks: load_vars.yml - name: Cri-o | check if fedora coreos stat: path: /run/ostree-booted get_attributes: no get_checksum: no get_mime: no register: ostree - name: Cri-o | set is_ostree set_fact: is_ostree: "{{ ostree.stat.exists }}" - name: Cri-o | get ostree version shell: "set -o pipefail && rpm-ostree --version | awk -F\\' '/Version/{print $2}'" args: executable: /bin/bash register: ostree_version when: is_ostree - name: Cri-o | Download cri-o include_tasks: "../../../download/tasks/download_file.yml" vars: download: "{{ download_defaults | combine(downloads.crio) }}" - name: Cri-o | special handling for amazon linux import_tasks: "setup-amazon.yaml" when: ansible_distribution in ["Amazon"] - name: Cri-o | build a list of crio runtimes with Katacontainers runtimes set_fact: crio_runtimes: "{{ crio_runtimes + kata_runtimes }}" when: - kata_containers_enabled - name: Cri-o | build a list of crio runtimes with crun runtime set_fact: crio_runtimes: "{{ crio_runtimes + [crun_runtime] }}" when: - crun_enabled - name: Cri-o | build a list of crio runtimes with youki runtime set_fact: crio_runtimes: "{{ crio_runtimes + [youki_runtime] }}" when: - youki_enabled - name: Cri-o | make sure needed folders exist in the system with_items: - /etc/crio - /etc/containers - /etc/systemd/system/crio.service.d file: path: "{{ item }}" state: directory mode: 0755 - name: Cri-o | install cri-o config template: src: crio.conf.j2 dest: /etc/crio/crio.conf mode: 0644 register: config_install - name: Cri-o | install config.json template: src: config.json.j2 dest: /etc/crio/config.json mode: 0644 register: reg_auth_install - name: Cri-o | copy binaries copy: src: "{{ local_release_dir }}/cri-o/bin/{{ item }}" dest: "{{ bin_dir }}/{{ item }}" mode: 0755 remote_src: true with_items: - "{{ crio_bin_files }}" notify: Restart crio - name: Cri-o | copy service file copy: src: "{{ local_release_dir }}/cri-o/contrib/crio.service" dest: /etc/systemd/system/crio.service mode: 0755 remote_src: true notify: Restart crio - name: Cri-o | configure crio to use kube reserved cgroups ansible.builtin.copy: dest: /etc/systemd/system/crio.service.d/00-slice.conf owner: root group: root mode: '0644' content: | [Service] Slice={{ kube_reserved_cgroups_for_service_slice }} notify: Restart crio when: - kube_reserved is defined and kube_reserved is true - kube_reserved_cgroups_for_service_slice is defined - name: Cri-o | update the bin dir for crio.service file replace: dest: /etc/systemd/system/crio.service regexp: "/usr/local/bin/crio" replace: "{{ bin_dir }}/crio" notify: Restart crio - name: Cri-o | copy default policy copy: src: "{{ local_release_dir }}/cri-o/contrib/policy.json" dest: /etc/containers/policy.json mode: 0755 remote_src: true notify: Restart crio - name: Cri-o | copy mounts.conf copy: src: mounts.conf dest: /etc/containers/mounts.conf mode: 0644 when: - ansible_os_family == 'RedHat' notify: Restart crio - name: Cri-o | create directory for oci hooks file: path: /etc/containers/oci/hooks.d state: directory owner: root mode: 0755 - name: Cri-o | set overlay driver community.general.ini_file: dest: /etc/containers/storage.conf section: storage option: "{{ item.option }}" value: "{{ item.value }}" mode: 0644 with_items: - option: driver value: '"overlay"' - option: graphroot value: '"/var/lib/containers/storage"' - option: runroot value: '"/var/run/containers/storage"' # metacopy=on is available since 4.19 and was backported to RHEL 4.18 kernel - name: Cri-o | set metacopy mount options correctly community.general.ini_file: dest: /etc/containers/storage.conf section: storage.options.overlay option: mountopt value: '{{ ''"nodev"'' if ansible_kernel is version_compare(("4.18" if ansible_os_family == "RedHat" else "4.19"), "<") else ''"nodev,metacopy=on"'' }}' mode: 0644 - name: Cri-o | create directory registries configs file: path: /etc/containers/registries.conf.d state: directory owner: root mode: 0755 - name: Cri-o | write registries configs template: src: registry.conf.j2 dest: "/etc/containers/registries.conf.d/10-{{ item.prefix | default(item.location) | regex_replace(':', '_') }}.conf" mode: 0644 loop: "{{ crio_registries }}" notify: Restart crio - name: Cri-o | configure unqualified registry settings template: src: unqualified.conf.j2 dest: "/etc/containers/registries.conf.d/01-unqualified.conf" mode: 0644 notify: Restart crio - name: Cri-o | write cri-o proxy drop-in template: src: http-proxy.conf.j2 dest: /etc/systemd/system/crio.service.d/http-proxy.conf mode: 0644 notify: Restart crio when: http_proxy is defined or https_proxy is defined - name: Cri-o | configure the uid/gid space for user namespaces lineinfile: path: '{{ item.path }}' line: '{{ item.entry }}' regex: '^\s*{{ crio_remap_user }}:' state: '{{ "present" if crio_remap_enable | bool else "absent" }}' loop: - path: /etc/subuid entry: '{{ crio_remap_user }}:{{ crio_subuid_start }}:{{ crio_subuid_length }}' - path: /etc/subgid entry: '{{ crio_remap_user }}:{{ crio_subgid_start }}:{{ crio_subgid_length }}' loop_control: label: '{{ item.path }}' - name: Cri-o | ensure crio service is started and enabled service: name: crio daemon_reload: true enabled: true state: started register: service_start - name: Cri-o | trigger service restart only when needed service: name: crio state: restarted when: - config_install.changed or reg_auth_install.changed - not service_start.changed - name: Cri-o | verify that crio is running command: "{{ bin_dir }}/{{ crio_status_command }} info" register: get_crio_info until: get_crio_info is succeeded changed_when: false retries: 5 delay: "{{ retry_stagger | random + 3 }}"