Hello community, here is the log from the commit of package cri-o for openSUSE:Factory checked in at 2019-11-12 11:54:58 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/cri-o (Old) and /work/SRC/openSUSE:Factory/.cri-o.new.2990 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "cri-o" Tue Nov 12 11:54:58 2019 rev:38 rq:747383 version:1.15.2 Changes: -------- --- /work/SRC/openSUSE:Factory/cri-o/cri-o.changes 2019-10-11 17:14:32.197648471 +0200 +++ /work/SRC/openSUSE:Factory/.cri-o.new.2990/cri-o.changes 2019-11-12 11:54:59.831316158 +0100 @@ -1,0 +2,15 @@ +Mon Nov 11 15:04:57 UTC 2019 - Richard Brown <rbr...@suse.com> + +- Switch to `systemd` cgroup driver in kubelet config also + +------------------------------------------------------------------- +Thu Oct 24 10:58:21 UTC 2019 - Sascha Grunert <sgrun...@suse.com> + +- Switch to `systemd` cgroup manager in replacement for `cgroupfs` + +------------------------------------------------------------------- +Thu Oct 17 16:24:19 UTC 2019 - Richard Brown <rbr...@suse.com> + +- Remove obsolete Groups tag (fate#326485) + +------------------------------------------------------------------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ cri-o.spec ++++++ --- /var/tmp/diff_new_pack.X6QVel/_old 2019-11-12 11:55:01.743318195 +0100 +++ /var/tmp/diff_new_pack.X6QVel/_new 2019-11-12 11:55:01.767318220 +0100 @@ -31,7 +31,6 @@ Release: 0 Summary: OCI-based implementation of Kubernetes Container Runtime Interface License: Apache-2.0 -Group: System/Management Url: https://github.com/cri-o/cri-o ExcludeArch: i586 Source0: %{name}-%{version}.tar.xz @@ -76,7 +75,6 @@ %package kubeadm-criconfig Summary: CRI-O container runtime configuration for kubeadm -Group: System/Management Requires: kubernetes-kubeadm Requires(post): %fillup_prereq Supplements: cri-o ++++++ crio.conf ++++++ --- /var/tmp/diff_new_pack.X6QVel/_old 2019-11-12 11:55:02.715319231 +0100 +++ /var/tmp/diff_new_pack.X6QVel/_new 2019-11-12 11:55:02.751319269 +0100 @@ -118,7 +118,7 @@ apparmor_profile = "crio-default-1.15.2" # Cgroup management implementation used for the runtime. -cgroup_manager = "cgroupfs" +cgroup_manager = "systemd" # List of default capabilities for containers. If it is empty or commented out, # only the capabilities defined in the containers json file by the user/kube @@ -231,22 +231,22 @@ # runtime_path = "/path/to/the/runtime/handler/executable" # runtime_type = "oci" # runtime_root = "/path/to/the/runtime/root" -# +# # Where: # - runtime-handler: name used to identify the runtime -# - runtime_path (optional, string): absolute path to the runtime executable in +# - runtime_path (optional, string): absolute path to the runtime executable in # the host filesystem. If omitted, the runtime-handler identifier should match -# the runtime executable name, and the runtime executable should be placed +# the runtime executable name, and the runtime executable should be placed # in $PATH. -# - runtime_type (optional, string): type of runtime, one of: "oci", "vm". If +# - runtime_type (optional, string): type of runtime, one of: "oci", "vm". If # omitted, an "oci" runtime is assumed. -# - runtime_root (optional, string): root directory for storage of containers +# - runtime_root (optional, string): root directory for storage of containers # state. [crio.runtime.runtimes.runc] -# Kata Containers is an OCI runtime, where containers are run inside lightweight -# VMs. Kata provides additional isolation towards the host, minimizing the host attack +# Kata Containers is an OCI runtime, where containers are run inside lightweight +# VMs. Kata provides additional isolation towards the host, minimizing the host attack # surface and mitigating the consequences of containers breakout. # Kata Containers with the default configured VMM ++++++ kubelet.env ++++++ --- /var/tmp/diff_new_pack.X6QVel/_old 2019-11-12 11:55:03.035319572 +0100 +++ /var/tmp/diff_new_pack.X6QVel/_new 2019-11-12 11:55:03.063319601 +0100 @@ -1 +1 @@ -KUBELET_EXTRA_ARGS="--container-runtime=remote --container-runtime-endpoint=unix:///var/run/crio/crio.sock --runtime-request-timeout=15m" +KUBELET_EXTRA_ARGS="--container-runtime=remote --container-runtime-endpoint=unix:///var/run/crio/crio.sock --runtime-request-timeout=15m --cgroup-driver=systemd"