Hello community,

here is the log from the commit of package cri-o for openSUSE:Factory checked 
in at 2019-11-12 11:54:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cri-o (Old)
 and      /work/SRC/openSUSE:Factory/.cri-o.new.2990 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cri-o"

Tue Nov 12 11:54:58 2019 rev:38 rq:747383 version:1.15.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/cri-o/cri-o.changes      2019-10-11 
17:14:32.197648471 +0200
+++ /work/SRC/openSUSE:Factory/.cri-o.new.2990/cri-o.changes    2019-11-12 
11:54:59.831316158 +0100
@@ -1,0 +2,15 @@
+Mon Nov 11 15:04:57 UTC 2019 - Richard Brown <rbr...@suse.com>
+
+- Switch to `systemd` cgroup driver in kubelet config also 
+
+-------------------------------------------------------------------
+Thu Oct 24 10:58:21 UTC 2019 - Sascha Grunert <sgrun...@suse.com>
+
+- Switch to `systemd` cgroup manager in replacement for `cgroupfs`
+
+-------------------------------------------------------------------
+Thu Oct 17 16:24:19 UTC 2019 - Richard Brown <rbr...@suse.com>
+
+- Remove obsolete Groups tag (fate#326485)
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cri-o.spec ++++++
--- /var/tmp/diff_new_pack.X6QVel/_old  2019-11-12 11:55:01.743318195 +0100
+++ /var/tmp/diff_new_pack.X6QVel/_new  2019-11-12 11:55:01.767318220 +0100
@@ -31,7 +31,6 @@
 Release:        0
 Summary:        OCI-based implementation of Kubernetes Container Runtime 
Interface
 License:        Apache-2.0
-Group:          System/Management
 Url:            https://github.com/cri-o/cri-o
 ExcludeArch:    i586
 Source0:        %{name}-%{version}.tar.xz
@@ -76,7 +75,6 @@
 
 %package kubeadm-criconfig
 Summary:        CRI-O container runtime configuration for kubeadm
-Group:          System/Management
 Requires:       kubernetes-kubeadm
 Requires(post): %fillup_prereq
 Supplements:    cri-o

++++++ crio.conf ++++++
--- /var/tmp/diff_new_pack.X6QVel/_old  2019-11-12 11:55:02.715319231 +0100
+++ /var/tmp/diff_new_pack.X6QVel/_new  2019-11-12 11:55:02.751319269 +0100
@@ -118,7 +118,7 @@
 apparmor_profile = "crio-default-1.15.2"
 
 # Cgroup management implementation used for the runtime.
-cgroup_manager = "cgroupfs"
+cgroup_manager = "systemd"
 
 # List of default capabilities for containers. If it is empty or commented out,
 # only the capabilities defined in the containers json file by the user/kube
@@ -231,22 +231,22 @@
 #  runtime_path = "/path/to/the/runtime/handler/executable"
 #  runtime_type = "oci"
 #  runtime_root = "/path/to/the/runtime/root"
-# 
+#
 # Where:
 # - runtime-handler: name used to identify the runtime
-# - runtime_path (optional, string): absolute path to the runtime executable 
in 
+# - runtime_path (optional, string): absolute path to the runtime executable in
 #   the host filesystem. If omitted, the runtime-handler identifier should 
match
-#   the runtime executable name, and the runtime executable should be placed 
+#   the runtime executable name, and the runtime executable should be placed
 #   in $PATH.
-# - runtime_type (optional, string): type of runtime, one of: "oci", "vm". If 
+# - runtime_type (optional, string): type of runtime, one of: "oci", "vm". If
 #   omitted, an "oci" runtime is assumed.
-# - runtime_root (optional, string): root directory for storage of containers 
+# - runtime_root (optional, string): root directory for storage of containers
 #   state.
 
 [crio.runtime.runtimes.runc]
 
-# Kata Containers is an OCI runtime, where containers are run inside 
lightweight 
-# VMs. Kata provides additional isolation towards the host, minimizing the 
host attack 
+# Kata Containers is an OCI runtime, where containers are run inside 
lightweight
+# VMs. Kata provides additional isolation towards the host, minimizing the 
host attack
 # surface and mitigating the consequences of containers breakout.
 
 # Kata Containers with the default configured VMM

++++++ kubelet.env ++++++
--- /var/tmp/diff_new_pack.X6QVel/_old  2019-11-12 11:55:03.035319572 +0100
+++ /var/tmp/diff_new_pack.X6QVel/_new  2019-11-12 11:55:03.063319601 +0100
@@ -1 +1 @@
-KUBELET_EXTRA_ARGS="--container-runtime=remote 
--container-runtime-endpoint=unix:///var/run/crio/crio.sock 
--runtime-request-timeout=15m"
+KUBELET_EXTRA_ARGS="--container-runtime=remote 
--container-runtime-endpoint=unix:///var/run/crio/crio.sock 
--runtime-request-timeout=15m --cgroup-driver=systemd"


Reply via email to