Hello community,
here is the log from the commit of package cri-o for openSUSE:Factory checked in at 2019-11-12 11:54:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cri-o (Old)
and /work/SRC/openSUSE:Factory/.cri-o.new.2990 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "cri-o"
Tue Nov 12 11:54:58 2019 rev:38 rq:747383 version:1.15.2
Changes:
--------
--- /work/SRC/openSUSE:Factory/cri-o/cri-o.changes 2019-10-11 17:14:32.197648471 +0200
+++ /work/SRC/openSUSE:Factory/.cri-o.new.2990/cri-o.changes 2019-11-12 11:54:59.831316158 +0100
@@ -1,0 +2,15 @@
+Mon Nov 11 15:04:57 UTC 2019 - Richard Brown
+
+- Switch to `systemd` cgroup driver in kubelet config also
+
+-------------------------------------------------------------------
+Thu Oct 24 10:58:21 UTC 2019 - Sascha Grunert
+
+- Switch to `systemd` cgroup manager in replacement for `cgroupfs`
+
+-------------------------------------------------------------------
+Thu Oct 17 16:24:19 UTC 2019 - Richard Brown
+
+- Remove obsolete Groups tag (fate#326485)
+
+-------------------------------------------------------------------
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ cri-o.spec ++++++
--- /var/tmp/diff_new_pack.X6QVel/_old 2019-11-12 11:55:01.743318195 +0100
+++ /var/tmp/diff_new_pack.X6QVel/_new 2019-11-12 11:55:01.767318220 +0100
@@ -31,7 +31,6 @@
Release: 0
Summary: OCI-based implementation of Kubernetes Container Runtime Interface
License: Apache-2.0
-Group: System/Management
Url: https://github.com/cri-o/cri-o
ExcludeArch: i586
Source0: %{name}-%{version}.tar.xz
@@ -76,7 +75,6 @@
%package kubeadm-criconfig
Summary: CRI-O container runtime configuration for kubeadm
-Group: System/Management
Requires: kubernetes-kubeadm
Requires(post): %fillup_prereq
Supplements: cri-o
++++++ crio.conf ++++++
--- /var/tmp/diff_new_pack.X6QVel/_old 2019-11-12 11:55:02.715319231 +0100
+++ /var/tmp/diff_new_pack.X6QVel/_new 2019-11-12 11:55:02.751319269 +0100
@@ -118,7 +118,7 @@
apparmor_profile = "crio-default-1.15.2"
# Cgroup management implementation used for the runtime.
-cgroup_manager = "cgroupfs"
+cgroup_manager = "systemd"
# List of default capabilities for containers. If it is empty or commented out,
# only the capabilities defined in the containers json file by the user/kube
@@ -231,22 +231,22 @@
# runtime_path = "/path/to/the/runtime/handler/executable"
# runtime_type = "oci"
# runtime_root = "/path/to/the/runtime/root"
-#
+#
# Where:
# - runtime-handler: name used to identify the runtime
-# - runtime_path (optional, string): absolute path to the runtime executable in
+# - runtime_path (optional, string): absolute path to the runtime executable in
# the host filesystem. If omitted, the runtime-handler identifier should match
-# the runtime executable name, and the runtime executable should be placed
+# the runtime executable name, and the runtime executable should be placed
# in $PATH.
-# - runtime_type (optional, string): type of runtime, one of: "oci", "vm". If
+# - runtime_type (optional, string): type of runtime, one of: "oci", "vm". If
# omitted, an "oci" runtime is assumed.
-# - runtime_root (optional, string): root directory for storage of containers
+# - runtime_root (optional, string): root directory for storage of containers
# state.
[crio.runtime.runtimes.runc]
-# Kata Containers is an OCI runtime, where containers are run inside lightweight
-# VMs. Kata provides additional isolation towards the host, minimizing the host attack
+# Kata Containers is an OCI runtime, where containers are run inside lightweight
+# VMs. Kata provides additional isolation towards the host, minimizing the host attack
# surface and mitigating the consequences of containers breakout.
# Kata Containers with the default configured VMM
++++++ kubelet.env ++++++
--- /var/tmp/diff_new_pack.X6QVel/_old 2019-11-12 11:55:03.035319572 +0100
+++ /var/tmp/diff_new_pack.X6QVel/_new 2019-11-12 11:55:03.063319601 +0100
@@ -1 +1 @@
-KUBELET_EXTRA_ARGS="--container-runtime=remote --container-runtime-endpoint=unix:///var/run/crio/crio.sock --runtime-request-timeout=15m"
+KUBELET_EXTRA_ARGS="--container-runtime=remote --container-runtime-endpoint=unix:///var/run/crio/crio.sock --runtime-request-timeout=15m --cgroup-driver=systemd"