Hello community,

here is the log from the commit of package cri-o for openSUSE:Factory checked 
in at 2018-07-02 23:33:22
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cri-o (Old)
 and      /work/SRC/openSUSE:Factory/.cri-o.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cri-o"

Mon Jul  2 23:33:22 2018 rev:14 rq:620166 version:1.10.5

Changes:
--------
--- /work/SRC/openSUSE:Factory/cri-o/cri-o.changes      2018-06-29 
22:35:42.398037949 +0200
+++ /work/SRC/openSUSE:Factory/.cri-o.new/cri-o.changes 2018-07-02 
23:33:47.829223525 +0200
@@ -1,0 +2,7 @@
+Mon Jul  2 06:03:24 UTC 2018 - vrothb...@suse.com
+
+- Update cri-o to v1.10.5:
+  * Reduce amount of logs being printed by default
+  * Update to latest ocicni
+
+-------------------------------------------------------------------

Old:
----
  cri-o-1.10.4.tar.xz

New:
----
  cri-o-1.10.5.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cri-o.spec ++++++
--- /var/tmp/diff_new_pack.MwbZpu/_old  2018-07-02 23:33:48.509222683 +0200
+++ /var/tmp/diff_new_pack.MwbZpu/_new  2018-07-02 23:33:48.513222678 +0200
@@ -31,7 +31,7 @@
 %define        name_source2 sysconfig.crio
 %define        name_source3 crio.conf
 Name:           cri-o
-Version:        1.10.4
+Version:        1.10.5
 Release:        0
 Summary:        OCI-based implementation of Kubernetes Container Runtime 
Interface
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.MwbZpu/_old  2018-07-02 23:33:48.545222638 +0200
+++ /var/tmp/diff_new_pack.MwbZpu/_new  2018-07-02 23:33:48.545222638 +0200
@@ -2,8 +2,8 @@
 <service name="tar_scm" mode="disabled">
 <param name="url">https://github.com/kubernetes-incubator/cri-o</param>
 <param name="scm">git</param>
-<param name="versionformat">1.10.4</param>
-<param name="revision">v1.10.4</param>
+<param name="versionformat">1.10.5</param>
+<param name="revision">v1.10.5</param>
 </service>
 <service name="recompress" mode="disabled">
 <param name="file">cri-o-*.tar</param>

++++++ cri-o-1.10.4.tar.xz -> cri-o-1.10.5.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/cmd/crio/selinux_unsupported.go 
new/cri-o-1.10.5/cmd/crio/selinux_unsupported.go
--- old/cri-o-1.10.4/cmd/crio/selinux_unsupported.go    2018-06-26 
15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/cmd/crio/selinux_unsupported.go    2018-06-30 
01:36:59.000000000 +0200
@@ -5,5 +5,5 @@
 import "github.com/sirupsen/logrus"
 
 func disableSELinux() {
-       logrus.Infof("there is no selinux to disable")
+       logrus.Debugf("there is no selinux to disable")
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/conmon/conmon.c 
new/cri-o-1.10.5/conmon/conmon.c
--- old/cri-o-1.10.4/conmon/conmon.c    2018-06-26 15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/conmon/conmon.c    2018-06-30 01:36:59.000000000 +0200
@@ -997,7 +997,9 @@
 static void
 container_exit_cb (G_GNUC_UNUSED GPid pid, int status, G_GNUC_UNUSED gpointer 
user_data)
 {
-       ninfof("container %d exited with status %d", pid, status);
+       if (status != 0) {
+               ninfof("container %d exited with status %d", pid, status);
+       }
        container_status = status;
        container_pid = -1;
        g_main_loop_quit (main_loop);
@@ -1535,7 +1537,6 @@
        if (signal(SIGCHLD, on_sigchld) == SIG_ERR)
                pexit("Failed to set handler for SIGCHLD");
 
-       ninfof("about to waitpid: %d", create_pid);
        if (csname != NULL) {
                guint terminal_watch = g_unix_fd_add (console_socket_fd, 
G_IO_IN, terminal_accept_cb, csname);
                /* Process any SIGCHLD we may have missed before the signal 
handler was in place.  */
@@ -1620,13 +1621,13 @@
 
        g_main_loop_run (main_loop);
 
-       /* Drain stdout and stderr */
-       if (masterfd_stdout != -1) {
+       /* Drain stdout and stderr only if a timeout doesn't occur */
+       if (masterfd_stdout != -1 && !timed_out) {
                g_unix_set_fd_nonblocking(masterfd_stdout, TRUE, NULL);
                while (read_stdio(masterfd_stdout, STDOUT_PIPE, NULL))
                        ;
        }
-       if (masterfd_stderr != -1) {
+       if (masterfd_stderr != -1 && !timed_out) {
                g_unix_set_fd_nonblocking(masterfd_stderr, TRUE, NULL);
                while (read_stdio(masterfd_stderr, STDERR_PIPE, NULL))
                        ;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/oci/oci.go new/cri-o-1.10.5/oci/oci.go
--- old/cri-o-1.10.4/oci/oci.go 2018-06-26 15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/oci/oci.go 2018-06-30 01:36:59.000000000 +0200
@@ -229,7 +229,7 @@
 
        // Move conmon to specified cgroup
        if r.cgroupManager == SystemdCgroupsManager {
-               logrus.Infof("Running conmon under slice %s and unitName %s", 
cgroupParent, createUnitName("crio-conmon", c.id))
+               logrus.Debugf("Running conmon under slice %s and unitName %s", 
cgroupParent, createUnitName("crio-conmon", c.id))
                if err = utils.RunUnderSystemdScope(cmd.Process.Pid, 
cgroupParent, createUnitName("crio-conmon", c.id)); err != nil {
                        logrus.Warnf("Failed to add conmon to systemd sandbox 
cgroup: %v", err)
                }
@@ -509,7 +509,7 @@
                }
        }
 
-       logrus.Infof("Received container exit code: %v, message: %s", 
ec.ExitCode, ec.Message)
+       logrus.Debugf("Received container exit code: %v, message: %s", 
ec.ExitCode, ec.Message)
 
        if ec.ExitCode == -1 {
                return nil, ExecSyncError{
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/pkg/storage/runtime.go 
new/cri-o-1.10.5/pkg/storage/runtime.go
--- old/cri-o-1.10.4/pkg/storage/runtime.go     2018-06-26 15:06:11.000000000 
+0200
+++ new/cri-o-1.10.5/pkg/storage/runtime.go     2018-06-30 01:36:59.000000000 
+0200
@@ -268,13 +268,13 @@
                if err != nil {
                        if err2 := 
r.storageImageServer.GetStore().DeleteContainer(container.ID); err2 != nil {
                                if metadata.Pod {
-                                       logrus.Infof("%v deleting 
partially-created pod sandbox %q", err2, container.ID)
+                                       logrus.Debugf("%v deleting 
partially-created pod sandbox %q", err2, container.ID)
                                } else {
-                                       logrus.Infof("%v deleting 
partially-created container %q", err2, container.ID)
+                                       logrus.Debugf("%v deleting 
partially-created container %q", err2, container.ID)
                                }
                                return
                        }
-                       logrus.Infof("deleted partially-created container %q", 
container.ID)
+                       logrus.Debugf("deleted partially-created container %q", 
container.ID)
                }
        }()
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/server/container_attach.go 
new/cri-o-1.10.5/server/container_attach.go
--- old/cri-o-1.10.4/server/container_attach.go 2018-06-26 15:06:11.000000000 
+0200
+++ new/cri-o-1.10.5/server/container_attach.go 2018-06-30 01:36:59.000000000 
+0200
@@ -66,10 +66,10 @@
        defer controlFile.Close()
 
        kubecontainer.HandleResizing(resize, func(size 
remotecommand.TerminalSize) {
-               logrus.Infof("Got a resize event: %+v", size)
+               logrus.Debugf("Got a resize event: %+v", size)
                _, err := fmt.Fprintf(controlFile, "%d %d %d\n", 1, 
size.Height, size.Width)
                if err != nil {
-                       logrus.Infof("Failed to write to control file to resize 
terminal: %v", err)
+                       logrus.Debugf("Failed to write to control file to 
resize terminal: %v", err)
                }
        })
 
@@ -125,7 +125,7 @@
                        } else if buf[0] == AttachPipeStderr {
                                dst = errorStream
                        } else {
-                               logrus.Infof("Got unexpected attach type %+d", 
buf[0])
+                               logrus.Debugf("Got unexpected attach type %+d", 
buf[0])
                        }
 
                        if dst != nil {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/server/container_reopen_log.go 
new/cri-o-1.10.5/server/container_reopen_log.go
--- old/cri-o-1.10.4/server/container_reopen_log.go     2018-06-26 
15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/server/container_reopen_log.go     2018-06-30 
01:36:59.000000000 +0200
@@ -83,7 +83,7 @@
        }
 
        if _, err = fmt.Fprintf(controlFile, "%d %d %d\n", 2, 0, 0); err != nil 
{
-               logrus.Infof("Failed to write to control file to reopen log 
file: %v", err)
+               logrus.Debugf("Failed to write to control file to reopen log 
file: %v", err)
        }
 
        select {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/server/sandbox_network.go 
new/cri-o-1.10.5/server/sandbox_network.go
--- old/cri-o-1.10.4/server/sandbox_network.go  2018-06-26 15:06:11.000000000 
+0200
+++ new/cri-o-1.10.5/server/sandbox_network.go  2018-06-30 01:36:59.000000000 
+0200
@@ -25,11 +25,12 @@
        }()
 
        podNetwork := newPodNetwork(sb)
-       err = s.netPlugin.SetUpPod(podNetwork)
+       result, err := s.netPlugin.SetUpPod(podNetwork)
        if err != nil {
                err = fmt.Errorf("failed to create pod network sandbox %s(%s): 
%v", sb.Name(), sb.ID(), err)
                return
        }
+       logrus.Debugf("CNI setup result: %v", result)
 
        podIP, err = s.netPlugin.GetPodNetworkStatus(podNetwork)
        if err != nil {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/test/ctr.bats 
new/cri-o-1.10.5/test/ctr.bats
--- old/cri-o-1.10.4/test/ctr.bats      2018-06-26 15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/test/ctr.bats      2018-06-30 01:36:59.000000000 +0200
@@ -180,10 +180,7 @@
        run crictl start "$ctr_id"
        echo "$output"
        [ "$status" -eq 0 ]
-       run crictl stop "$ctr_id"
-       echo "$output"
-       # Ignore errors on stop.
-       run crictl inspect "$ctr_id"
+       run wait_until_exit "$ctr_id"
        [ "$status" -eq 0 ]
        run crictl rm "$ctr_id"
        echo "$output"
@@ -227,10 +224,7 @@
        run crictl start "$ctr_id"
        echo "$output"
        [ "$status" -eq 0 ]
-       run crictl stop "$ctr_id"
-       echo "$output"
-       # Ignore errors on stop.
-       run crictl inspect "$ctr_id"
+       run wait_until_exit "$ctr_id"
        [ "$status" -eq 0 ]
        run crictl rm "$ctr_id"
        echo "$output"
@@ -272,8 +266,7 @@
        run crictl start "$ctr_id"
        echo "$output"
        [ "$status" -eq 0 ]
-       sleep 6
-       run crictl inspect "$ctr_id"
+       run wait_until_exit "$ctr_id"
        [ "$status" -eq 0 ]
        run crictl rm "$ctr_id"
        echo "$output"
@@ -316,10 +309,7 @@
        run crictl start "$ctr_id"
        echo "$output"
        [ "$status" -eq 0 ]
-       run crictl stop "$ctr_id"
-       echo "$output"
-       # Ignore errors on stop.
-       run crictl inspect "$ctr_id"
+       run wait_until_exit "$ctr_id"
        [ "$status" -eq 0 ]
        run crictl rm "$ctr_id"
        echo "$output"
@@ -882,20 +872,8 @@
        run crictl start "$ctr_id"
        echo "$output"
        [ "$status" -eq 0 ]
-       # Wait for container to exit
-       attempt=0
-       while [ $attempt -le 100 ]; do
-               attempt=$((attempt+1))
-               run crictl inspect "$ctr_id" --output table
-               echo "$output"
-               [ "$status" -eq 0 ]
-               if [[ "$output" =~ "State: CONTAINER_EXITED" ]]; then
-                       [[ "$output" =~ "Exit Code: 0" ]]
-                       break
-               fi
-               sleep 1
-       done
-
+       run wait_until_exit "$ctr_id"
+       [ "$status" -eq 0 ]
        run crictl create "$pod_id" 
"$TESTDATA"/container_config_resolvconf_ro.json "$TESTDATA"/sandbox_config.json
        echo "$output"
        [ "$status" -eq 0 ]
@@ -903,19 +881,8 @@
        run crictl start "$ctr_id"
        echo "$output"
        [ "$status" -eq 0 ]
-       # Wait for container to exit
-       attempt=0
-       while [ $attempt -le 100 ]; do
-               attempt=$((attempt+1))
-               run crictl inspect "$ctr_id" --output table
-               echo "$output"
-               [ "$status" -eq 0 ]
-               if [[ "$output" =~ "State: CONTAINER_EXITED" ]]; then
-                       break
-               fi
-               sleep 1
-       done
-
+       run wait_until_exit "$ctr_id"
+       [ "$status" -eq 0 ]
        cleanup_ctrs
        cleanup_pods
        stop_crio
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/test/helpers.bash 
new/cri-o-1.10.5/test/helpers.bash
--- old/cri-o-1.10.4/test/helpers.bash  2018-06-26 15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/test/helpers.bash  2018-06-30 01:36:59.000000000 +0200
@@ -477,3 +477,21 @@
 function temp_sandbox_conf() {
        sed -e s/\"namespace\":.*/\"namespace\":\ \"$1\",/g 
"$TESTDATA"/sandbox_config.json > $TESTDIR/sandbox_config_$1.json
 }
+
+function wait_until_exit() {
+       ctr_id=$1
+       # Wait for container to exit
+       attempt=0
+       while [ $attempt -le 100 ]; do
+               attempt=$((attempt+1))
+               run crictl inspect "$ctr_id" --output table
+               echo "$output"
+               [ "$status" -eq 0 ]
+               if [[ "$output" =~ "State: CONTAINER_EXITED" ]]; then
+                       [[ "$output" =~ "Exit Code: 0" ]]
+                       return 0
+               fi
+               sleep 1
+       done
+       return 1
+}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/noop.go 
new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/noop.go
--- old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/noop.go  
2018-06-26 15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/noop.go  
1970-01-01 01:00:00.000000000 +0100
@@ -1,24 +0,0 @@
-package ocicni
-
-type cniNoOp struct {
-}
-
-func (noop *cniNoOp) Name() string {
-       return "CNINoOp"
-}
-
-func (noop *cniNoOp) SetUpPod(network PodNetwork) error {
-       return nil
-}
-
-func (noop *cniNoOp) TearDownPod(network PodNetwork) error {
-       return nil
-}
-
-func (noop *cniNoOp) GetPodNetworkStatus(network PodNetwork) (string, error) {
-       return "", nil
-}
-
-func (noop *cniNoOp) Status() error {
-       return nil
-}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/ocicni.go 
new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/ocicni.go
--- old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/ocicni.go        
2018-06-26 15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/ocicni.go        
2018-06-30 01:36:59.000000000 +0200
@@ -3,6 +3,7 @@
 import (
        "errors"
        "fmt"
+       "os"
        "os/exec"
        "sort"
        "strings"
@@ -106,6 +107,23 @@
        }
        defer watcher.Close()
 
+       if err = watcher.Add(plugin.pluginDir); err != nil {
+               logrus.Errorf("Failed to add watch on %q: %v", 
plugin.pluginDir, err)
+               return
+       }
+
+       // Now that `watcher` is running and watching the `pluginDir`
+       // gather the initial configuration, before starting the
+       // goroutine which will actually process events. It has to be
+       // done in this order to avoid missing any updates which might
+       // otherwise occur between gathering the initial configuration
+       // and starting the watcher.
+       if err := plugin.syncNetworkConfig(); err != nil {
+               logrus.Infof("Initial CNI setting failed, continue monitoring: 
%v", err)
+       } else {
+               logrus.Infof("Initial CNI setting succeeded")
+       }
+
        go func() {
                for {
                        select {
@@ -124,6 +142,9 @@
                                logrus.Errorf("CNI setting failed, continue 
monitoring: %v", err)
 
                        case err := <-watcher.Errors:
+                               if err == nil {
+                                       continue
+                               }
                                logrus.Errorf("CNI monitoring error %v", err)
                                close(plugin.monitorNetDirChan)
                                return
@@ -131,41 +152,14 @@
                }
        }()
 
-       if err = watcher.Add(plugin.pluginDir); err != nil {
-               logrus.Error(err)
-               return
-       }
-
        <-plugin.monitorNetDirChan
 }
 
-// InitCNI takes the plugin directory and cni directories where the cni files 
should be searched for
-// Returns a valid plugin object and any error
+// InitCNI takes the plugin directory and CNI directories where the CNI config
+// files should be searched for.  If no valid CNI configs exist, network 
requests
+// will fail until valid CNI config files are present in the config directory.
 func InitCNI(pluginDir string, cniDirs ...string) (CNIPlugin, error) {
-       plugin := probeNetworkPluginsWithVendorCNIDirPrefix(pluginDir, cniDirs, 
"")
-       var err error
-       plugin.nsenterPath, err = exec.LookPath("nsenter")
-       if err != nil {
-               return nil, err
-       }
-
-       // check if a default network exists, otherwise dump the CNI search and 
return a noop plugin
-       _, err = getDefaultCNINetwork(plugin.pluginDir, plugin.cniDirs, 
plugin.vendorCNIDirPrefix)
-       if err != nil {
-               if err != errMissingDefaultNetwork {
-                       logrus.Warningf("Error in finding usable CNI plugin - 
%v", err)
-                       // create a noop plugin instead
-                       return &cniNoOp{}, nil
-               }
-
-               // We do not have a default network, we start the monitoring 
thread.
-               go plugin.monitorNetDir()
-       }
-
-       return plugin, nil
-}
-
-func probeNetworkPluginsWithVendorCNIDirPrefix(pluginDir string, cniDirs 
[]string, vendorCNIDirPrefix string) *cniNetworkPlugin {
+       vendorCNIDirPrefix := ""
        plugin := &cniNetworkPlugin{
                defaultNetwork:     nil,
                loNetwork:          getLoNetwork(cniDirs, vendorCNIDirPrefix),
@@ -176,11 +170,21 @@
                pods:               make(map[string]*podLock),
        }
 
-       // sync NetworkConfig in best effort during probing.
-       if err := plugin.syncNetworkConfig(); err != nil {
-               logrus.Error(err)
+       var err error
+       plugin.nsenterPath, err = exec.LookPath("nsenter")
+       if err != nil {
+               return nil, err
+       }
+
+       // Ensure plugin directory exists, because the following monitoring 
logic
+       // relies on that.
+       if err := os.MkdirAll(pluginDir, 0755); err != nil {
+               return nil, err
        }
-       return plugin
+
+       go plugin.monitorNetDir()
+
+       return plugin, nil
 }
 
 func getDefaultCNINetwork(pluginDir string, cniDirs []string, 
vendorCNIDirPrefix string) (*cniNetwork, error) {
@@ -308,9 +312,9 @@
        return CNIPluginName
 }
 
-func (plugin *cniNetworkPlugin) SetUpPod(podNetwork PodNetwork) error {
+func (plugin *cniNetworkPlugin) SetUpPod(podNetwork PodNetwork) 
(cnitypes.Result, error) {
        if err := plugin.checkInitialized(); err != nil {
-               return err
+               return nil, err
        }
 
        plugin.podLock(podNetwork).Lock()
@@ -319,16 +323,16 @@
        _, err := plugin.loNetwork.addToNetwork(podNetwork)
        if err != nil {
                logrus.Errorf("Error while adding to cni lo network: %s", err)
-               return err
+               return nil, err
        }
 
-       _, err = plugin.getDefaultNetwork().addToNetwork(podNetwork)
+       result, err := plugin.getDefaultNetwork().addToNetwork(podNetwork)
        if err != nil {
                logrus.Errorf("Error while adding to cni network: %s", err)
-               return err
+               return nil, err
        }
 
-       return err
+       return result, err
 }
 
 func (plugin *cniNetworkPlugin) TearDownPod(podNetwork PodNetwork) error {
@@ -350,6 +354,9 @@
 
        ip, err := getContainerIP(plugin.nsenterPath, podNetwork.NetNS, 
DefaultInterfaceName, "-4")
        if err != nil {
+               ip, err = getContainerIP(plugin.nsenterPath, podNetwork.NetNS, 
DefaultInterfaceName, "-6")
+       }
+       if err != nil {
                return "", err
        }
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/types.go 
new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/types.go
--- old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/types.go 
2018-06-26 15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/types.go 
2018-06-30 01:36:59.000000000 +0200
@@ -1,16 +1,14 @@
 package ocicni
 
+import (
+       "github.com/containernetworking/cni/pkg/types"
+)
+
 const (
        // DefaultInterfaceName is the string to be used for the interface name 
inside the net namespace
        DefaultInterfaceName = "eth0"
        // CNIPluginName is the default name of the plugin
        CNIPluginName = "cni"
-       // DefaultNetDir is the place to look for CNI Network
-       DefaultNetDir = "/etc/cni/net.d"
-       // DefaultCNIDir is the place to look for cni config files
-       DefaultCNIDir = "/opt/cni/bin"
-       // VendorCNIDirTemplate is the template for looking up vendor specific 
cni config/executable files
-       VendorCNIDirTemplate = "%s/opt/%s/bin"
 )
 
 // PortMapping maps to the standard CNI portmapping Capability
@@ -49,7 +47,7 @@
        // SetUpPod is the method called after the sandbox container of
        // the pod has been created but before the other containers of the
        // pod are launched.
-       SetUpPod(network PodNetwork) error
+       SetUpPod(network PodNetwork) (types.Result, error)
 
        // TearDownPod is the method called before a pod's sandbox container 
will be deleted
        TearDownPod(network PodNetwork) error
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/types_unix.go 
new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/types_unix.go
--- old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/types_unix.go    
1970-01-01 01:00:00.000000000 +0100
+++ new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/types_unix.go    
2018-06-30 01:36:59.000000000 +0200
@@ -0,0 +1,12 @@
+// +build !windows
+
+package ocicni
+
+const (
+       // DefaultNetDir is the place to look for CNI Network
+       DefaultNetDir = "/etc/cni/net.d"
+       // DefaultCNIDir is the place to look for cni config files
+       DefaultCNIDir = "/opt/cni/bin"
+       // VendorCNIDirTemplate is the template for looking up vendor specific 
cni config/executable files
+       VendorCNIDirTemplate = "%s/opt/%s/bin"
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/types_windows.go 
new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/types_windows.go
--- old/cri-o-1.10.4/vendor/github.com/cri-o/ocicni/pkg/ocicni/types_windows.go 
1970-01-01 01:00:00.000000000 +0100
+++ new/cri-o-1.10.5/vendor/github.com/cri-o/ocicni/pkg/ocicni/types_windows.go 
2018-06-30 01:36:59.000000000 +0200
@@ -0,0 +1,12 @@
+// +build windows
+
+package ocicni
+
+const (
+       // DefaultNetDir is the place to look for CNI Network
+       DefaultNetDir = "C:\\cni\\etc\\net.d"
+       // DefaultCNIDir is the place to look for cni config files
+       DefaultCNIDir = "C:\\cni\\bin"
+       // VendorCNIDirTemplate is the template for looking up vendor specific 
cni config/executable files
+       VendorCNIDirTemplate = "C:\\cni\\%s\\opt\\%s\\bin" // XXX(vbatts) Not 
sure what to do here ...
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/vendor.conf new/cri-o-1.10.5/vendor.conf
--- old/cri-o-1.10.4/vendor.conf        2018-06-26 15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/vendor.conf        2018-06-30 01:36:59.000000000 +0200
@@ -120,3 +120,4 @@
 github.com/cyphar/filepath-securejoin v0.2.1
 gopkg.in/square/go-jose.v2 v2.1.3
 golang.org/x/time f51c12702a4d776e4c1fa9b0fabab841babae631
+github.com/cri-o/ocicni 7374120527ddb7edb1c946579413a6f8a3585407
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cri-o-1.10.4/version/version.go 
new/cri-o-1.10.5/version/version.go
--- old/cri-o-1.10.4/version/version.go 2018-06-26 15:06:11.000000000 +0200
+++ new/cri-o-1.10.5/version/version.go 2018-06-30 01:36:59.000000000 +0200
@@ -1,4 +1,4 @@
 package version
 
 // Version is the version of the build.
-const Version = "1.10.4"
+const Version = "1.10.5"


Reply via email to