docker-test-19.03.15_ce-lp152.2.9.1<>,#`./=„/PЄ 5}Q[~yFϢG@S7<ɨ`&לduz{P /MUbKD:JU|1ϖq-I#z9gbʫOqf=]b&BIMwKĦMc1{6h4( (> zzpƲ>)Av.((TѶoR.=Y*m¦„]eG>:cy( 'EmwF؞I>>?d & >  33 F3  3 x3 Fk3 H3M`3S_3Y^Y3^T^t^`{(`8`9dX:wFƭG3H˔3I`3XєYќ\3]֘3^SbcDdeflu3vw3x 3yuzXhlrCdocker-test19.03.15_celp152.2.9.1Test package for dockerTest package for docker. It contains the source code and the tests.`.obs-power8-01 HopenSUSE Leap 15.2openSUSEApache-2.0http://bugs.opensuse.orgSystem/Managementhttp://www.docker.iolinuxppc64le -i(JE H D"-%(3Bt q\S<n w(N o"_"eBB5\5/QW UݍBXdUHR$ 1sE :WYq} I0]^~&pZG*3232 kxpkpfygP'DP &=' `\h 1 e+bPgg dP ,1`Hy0A큤A큤A큤A큤A큤A큤A큤큤A큤큤A큤AA큤A큤A큤A큤A큤A큤큤A큤AA큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AAA큤큤A큤큤큤AA큤큤AAA큤AA큤A큤A큤AAA큤AA큤A큤A큤AA큤AA큤AAA큤A큤A큤A큤A큤AAAAAAAAA큤A큤AAA큤AAAAAA큤AAA큤AA큤`.`.`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`.`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`.`.`~,`~,`~,`.`.`.`.`.`~,`.`.`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`~,`.`~,`~,`.`.`.`.`.`.`.`.`~,`~,`~,`~,`~,`.`.`~,`.`~,`.`.`.`.`.`.`.`.`~,`~,`~,`~,`~,`~,`~,`.`.`~,`.`~,`.`.`~,`~,`~,`~,`~,`~,`~,`.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../../../integration/testdata/https/ca.pem../../../integration/testdata/https/client-cert.pem../../../integration/testdata/https/client-key.pem../../../integration/testdata/https/server-cert.pem../../../integration/testdata/https/server-key.pemrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootdocker-19.03.15_ce-lp152.2.9.1.src.rpmdocker-testdocker-test(ppc-64)@@@@@@@@@@@     /bin/bash/bin/sh/usr/bin/envcurlgoiputilsjqlibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libdevmapper.so.1.03()(64bit)libdevmapper.so.1.03(Base)(64bit)libdevmapper.so.1.03(DM_1_02_97)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)libseccomp.so.2()(64bit)net-tools-deprecatedrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1`)``_1@_@_S_#_d@_'@^)@^^?@]f@]+]@]҇]]z@]?]b@]@1@]:@]5@]/ ]@]\Q\!\-@\@\@\u*@\^\Z@\Yz\8@\2\@\[[F[s[s[@[}P@[{[{[ug@[a[`O@[^[6@[{@[{@[{@[ @Z@ZJ@Z̧@Za@Zľ@Z2@Z%Z@ZZ|;Zp^@Zo Zk@ZaZaZ7Z7Z&@Z%8ZZ@Z Z@Z@Y+@Y@YdY*@Y˒YY@YYYoIYoIYdY_wY^&@YGY-^Y, @Y;@YR@YY Y#@XXh@XXXX@X@X@XX@XO@XO@XO@XXX6@XXx@Xv@XY@XY@XWXEVX=mX6@X@Ww@W@W@W;WҤ@W@WίWiWiWu@W#W/@W/@W/@W/@WW@W:W:W:W@W@W@W-@W{@W{@Wm WXW>@W=WAleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Robert Munteanu Michał Rostecki Aleksa Sarai Callum Farmer Dominique Leuenberger Aleksa Sarai Aleksa Sarai Dominique Leuenberger Aleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Chris Coutinho Aleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Aleksa Sarai Sascha Grunert Aleksa Sarai Michal Jura Aleksa Sarai Michal Jura Aleksa Sarai Sascha Grunert clee@suse.comAleksa Sarai Aleksa Sarai Aleksa Sarai Valentin Rothberg rbrown@suse.comrbrown@suse.comasarai@suse.comasarai@suse.comasarai@suse.comrbrown@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comdcassany@suse.comasarai@suse.comasarai@suse.comjmassaguerpla@suse.comfcastelli@suse.commmeister@suse.comasarai@suse.comvrothberg@suse.comasarai@suse.comvrothberg@suse.comasarai@suse.comrbrown@suse.comrbrown@suse.comvrothberg@suse.comvrothberg@suse.comvrothberg@suse.comasarai@suse.comvrothberg@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comrbrown@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comvrothberg@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comasarai@suse.comasarai@suse.comasarai@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comthipp@suse.dethipp@suse.dejmassaguerpla@suse.comjmassaguerpla@suse.comasarai@suse.comasarai@suse.comtchvatal@suse.comasarai@suse.comjmassaguerpla@suse.comfcastelli@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comasarai@suse.comasarai@suse.commmeister@suse.comjmassaguerpla@suse.comasarai@suse.comasarai@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comasarai@suse.comjmassaguerpla@suse.combg@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comnormand@linux.vnet.ibm.comasarai@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjimmy@boombatower.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comasarai@suse.comjmassaguerpla@suse.comasarai@suse.comthipp@suse.dethipp@suse.dethipp@suse.dethipp@suse.deasarai@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comcbrauner@suse.deasarai@suse.comjmassaguerpla@suse.comasarai@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comcbrauner@suse.comtboerger@suse.comasarai@suse.comsflees@suse.dejmassaguerpla@suse.comcbrauner@suse.dejmassaguerpla@suse.comasarai@suse.comdmueller@suse.comasarai@suse.dejmassaguerpla@suse.comtchvatal@suse.comasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.dejmassaguerpla@suse.comasarai@suse.dempluskal@suse.comjmassaguerpla@suse.comasarai@suse.dejmassaguerpla@suse.comdmueller@suse.comasarai@suse.defcastelli@suse.comasarai@suse.deasarai@suse.deasarai@suse.dejmassaguerpla@suse.comasarai@suse.deasarai@suse.denormand@linux.vnet.ibm.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comasarai@suse.comasarai@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comasarai@suse.comasarai@suse.comasarai@suse.comfcastelli@suse.com jmassaguerpla@suse.comfcastelli@suse.commsabate@suse.commsabate@suse.comjmassaguerpla@suse.commsabate@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comfcastelli@suse.comjmassaguerpla@suse.comnormand@linux.vnet.ibm.comnormand@linux.vnet.ibm.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comdmueller@suse.comfcastelli@suse.comfcastelli@suse.comjmassaguerpla@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.comdmacvicar@suse.dedmacvicar@suse.defcastelli@suse.comfcastelli@suse.comdevelop7@develop7.infofcastelli@suse.comdmueller@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.comfcastelli@suse.com[NOTE: This update was only ever released in SLES and Leap.] - It turns out the boo#1178801 libnetwork patch is also broken on Leap, so drop the patch entirely. bsc#1180401 bsc#1182168 - boo1178801-0001-Add-docker-interfaces-to-firewalld-docker-zone.patch[NOTE: This update was only ever released in SLES and Leap.] - Update Docker to 19.03.15-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. This update includes fixes for bsc#1181732 (CVE-2021-21284) and bsc#1181730 (CVE-2021-21285). - Rebase patches: * bsc1073877-0001-apparmor-clobber-docker-default-profile-on-start.patch - Only apply the boo#1178801 libnetwork patch to handle firewalld on openSUSE. It appears that SLES doesn't like the patch. bsc#1180401- Re-apply secrets fix for bsc#1065609 which appears to have been lost after it was fixed. * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Add Conflicts and Provides for kubic flavour of docker-fish-completion.- Update to Docker 19.03.14-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. CVE-2020-15257 bsc#1180243 https://github.com/docker/docker-ce/releases/tag/v19.03.14- Enable fish-completion- Add a patch which makes Docker compatible with firewalld with nftables backend. Backport of https://github.com/moby/libnetwork/pull/2548 (boo#1178801, SLE-16460) * boo1178801-0001-Add-docker-interfaces-to-firewalld-docker-zone.patch- Update to Docker 19.03.13-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1176708- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)- Emergency fix: %requires_eq does not work with provide symbols, only effective package names. Convert back to regular Requires.- Update to Docker 19.03.12-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. - Use Go 1.13 instead of Go 1.14 because Go 1.14 can cause all sorts of spurrious errors due to Go returning -EINTR from I/O syscalls much more often (due to Go 1.14's pre-emptive goroutine support). - bsc1172377-0001-unexport-testcase.Cleanup-to-fix-Go-1.14.patch - Add BuildRequires for all -git dependencies so that we catch missing dependencies much more quickly.- Update to Docker 19.03.11-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1172377 CVE-2020-13401 - Backport https://github.com/gotestyourself/gotest.tools/pull/169 so that we can build Docker with Go 1.14 (upstream uses Go 1.13). + bsc1172377-0001-unexport-testcase.Cleanup-to-fix-Go-1.14.patch- BuildRequire pkgconfig(libsystemd) instead of systemd-devel: Allow OBS to shortcut through the -mini flavors.- Add backport of https://github.com/docker/docker/pull/39121. bsc#1122469 + bsc1122469-0001-apparmor-allow-readby-and-tracedby.patch- Support older SLE systems which don't have "usermod -w -v".- Update to Docker 19.03.5-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1158590 bsc#1157330- Update to Docker 19.03.4-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md.- Drop containerd.service workaround (we've released enough versions without containerd.service -- there's no need to support package upgrades that old). - Update to Docker 19.03.3-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1153367- Update to Docker 19.03.2-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1150397- Fix zsh-completion (docker -> _docker)- Fix default installation such that --userns-remap=default works properly (this appears to be an upstream regression, where --userns-remap=default doesn't auto-create the group and results in an error on-start). boo#1143349- Update to Docker 19.03.1-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. CVE-2019-14271- Update to Docker 19.03.0-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1142413 - Remove upstreamed patches: - bsc1001161-0001-oci-include-the-domainname-in-kernel.domainname.patch - bsc1001161-0002-cli-add-a-separate-domainname-flag.patch - bsc1047218-0001-man-obey-SOURCE_DATE_EPOCH-when-generating-man-pages.patch - bsc1128746-0001-integration-cli-don-t-build-test-images-if-they-alre.patch - Rebase pacthes: * bsc1073877-0001-apparmor-clobber-docker-default-profile-on-start.patch * packaging-0001-revert-Remove-docker-prefix-for-containerd-and-runc-.patch * private-registry-0001-Add-private-registry-mirror-support.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Move bash-completion to correct location. - Update to Docker 18.09.8-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. * Includes fixes for CVE-2019-13509 bsc#1142160.- Update to Docker 18.09.7-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1139649 - Remove upstreamed patches: - CVE-2018-15664.patch- Use %config(noreplace) for /etc/docker/daemon.json. bsc#1138920- Add patch for CVE-2018-15664. bsc#1096726 + CVE-2018-15664.patch- Update to Docker 18.09.6-ce see upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. - Rebase patches: * bsc1128746-0001-integration-cli-don-t-build-test-images-if-they-alre.patch- Update to Docker 18.09.5-ce see upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1128376 boo#1134068 - Rebase patches: * bsc1001161-0001-oci-include-the-domainname-in-kernel.domainname.patch * bsc1001161-0002-cli-add-a-separate-domainname-flag.patch * bsc1047218-0001-man-obey-SOURCE_DATE_EPOCH-when-generating-man-pages.patch * bsc1128746-0001-integration-cli-don-t-build-test-images-if-they-alre.patch * packaging-0001-revert-Remove-docker-prefix-for-containerd-and-runc-.patch * private-registry-0001-Add-private-registry-mirror-support.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch - Updated patch name: + bsc1073877-0001-apparmor-clobber-docker-default-profile-on-start.patch - bsc1073877-0002-apparmor-clobber-docker-default-profile-on-start.patch- Update to Docker 18.09.3-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md.- docker-test: improvements to test packaging (we don't need to ship around the entire source tree, and we also need to build the born-again integration/ tests which contain a suite-per-directory). We also need a new patch which fixes the handling of *-test images. bsc#1128746 + bsc1128746-0001-integration-cli-don-t-build-test-images-if-they-alre.patch- Move daemon.json file to /etc/docker directory, bsc#1114832- Update shell completion to use Group: System/Shells.- Add daemon.json file with rotation logs cofiguration, bsc#1114832- Update to Docker 18.09.1-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1124308 * Includes fix for CVE-2018-10892 bsc#1100331. * Includes fix for CVE-2018-20699 bsc#1121768. - Remove upstreamed patches. - bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch- Disable leap based builds for kubic flavor. bsc#1121412- Update go requirements to >= go1.10.6 to fix * bsc#1118897 CVE-2018-16873 go#29230 cmd/go: remote command execution during "go get -u" * bsc#1118898 CVE-2018-16874 go#29231 cmd/go: directory traversal in "go get" via curly braces in import paths * bsc#1118899 CVE-2018-16875 go#29233 crypto/x509: CPU denial of service- Handle build breakage due to missing 'export GOPATH' (caused by resolution of boo#1119634). I believe Docker is one of the only packages with this problem.- Add backports of https://github.com/docker/docker/pull/37302 and https://github.com/docker/cli/pull/1130, which allow for users to explicitly specify the NIS domainname of a container. bsc#1001161 + bsc1001161-0001-oci-include-the-domainname-in-kernel.domainname.patch + bsc1001161-0002-cli-add-a-separate-domainname-flag.patch- Update docker.service to match upstream and avoid rlimit problems. bsc#1112980 - Upgrade to Docker 18.09.0-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. boo#1115464 bsc#1118990 - Add revert of an upstream patch to fix docker-* handling. + packaging-0001-revert-Remove-docker-prefix-for-containerd-and-runc-.patch - Rebase patches: * bsc1047218-0001-man-obey-SOURCE_DATE_EPOCH-when-generating-man-pages.patch * bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch * bsc1073877-0002-apparmor-clobber-docker-default-profile-on-start.patch * private-registry-0001-Add-private-registry-mirror-support.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch - Remove upstreamed patches: - bsc1100727-0001-build-add-buildmode-pie.patch- Reduce the disk footprint by recommending git-core instead of hard requiring it. bsc#1108038- ExcludeArch i586 for entire docker-kubic flavour- ExcludeArch i586 for docker-kubic-kubeadm-criconfig subpackage- Add patch to make package reproducible, which is a backport of https://github.com/docker/cli/pull/1306. boo#1047218 + bsc1047218-0001-man-obey-SOURCE_DATE_EPOCH-when-generating-man-pages.patch- Upgrade to docker-ce v18.06.1-ce. bsc#1102522 bsc#1113313 Upstream changelog: https://github.com/docker/docker-ce/releases/tag/v18.06.1-ce - Remove patches that were merged upstream: - bsc1102522-0001-18.06-disable-containerd-CRI-plugin.patch- Add a backport of https://github.com/docker/engine/pull/29 for the 18.06.0-ce upgrade. This is a potential security issue (the CRI plugin was enabled by default, which listens on a TCP port bound to 0.0.0.0) that will be fixed upstream in the 18.06.1-ce upgrade. bsc#1102522 + bsc1102522-0001-18.06-disable-containerd-CRI-plugin.patch- Kubic: Make crio default, docker as alternative runtime (boo#1104821) - Provide kubernetes CRI config with docker-kubic-kubeadm-criconfig subpackage- Merge -kubic packages back into the main Virtualization:containers packages. This is done using _multibuild to add a "kubic" flavour, which is then used to conditionally compile patches and other kubic-specific features. bsc#1105000 - Rework docker-rpmlintrc with the new _multibuild setup.- Enable seccomp support on SLE12, since libseccomp is now a new enough vintage to work with Docker and containerd. fate#325877- Upgrade to docker-ce v18.06.0-ce. bsc#1102522 - Remove systemd-service dependency on containerd, which is now being started by dockerd to align with upstream defaults. - Removed the following patches as they are merged upstream: - bsc1021227-0001-pkg-devmapper-dynamically-load-dm_task_deferred_remo.patch - bsc1055676-0001-daemon-oci-obey-CL_UNPRIVILEGED-for-user-namespaced-.patch - Rebased the following patches: * bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch * bsc1073877-0002-apparmor-clobber-docker-default-profile-on-start.patch * bsc1100727-0001-build-add-buildmode-pie.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Build the client binary with -buildmode=pie to fix issues on POWER. bsc#1100727 + bsc1100727-0001-build-add-buildmode-pie.patch- Update the AppArmor patchset again to fix a separate issue where changed AppArmor profiles don't actually get applied on Docker daemon reboot. bsc#1099277 * bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch + bsc1073877-0002-apparmor-clobber-docker-default-profile-on-start.patch- Update to AppArmor patch so that signal mediation also works for signals between in-container processes. bsc#1073877 * bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch- Make use of %license macro- Remove 'go test' from %check section, as it has only ever caused us problems and hasn't (as far as I remember) ever caught a release-blocking issue. Smoke testing has been far more useful. boo#1095817- Update secrets patch to not log incorrect warnings when attempting to inject non-existent host files. bsc#1065609 * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Review Obsoletes to fix bsc#1080978- Put docker under the podruntime slice. This the recommended deployment to allow fine resource control on Kubernetes. bsc#1086185- Add patch to handle AppArmor changes that make 'docker kill' stop working. bsc#1073877 boo#1089732 + bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch- Fix manpage generation breaking ppc64le builds due to a missing - buildemode=pie.- Compile and install all manpages. bsc#1085117- Add requirement for catatonit, which provides a docker-init implementation. fate#324652 bsc#1085380- Fix private-registry-0001-Add-private-registry-mirror-support.patch to deal corretly with TLS configs of 3rd party registries. fix bsc#1084533- Update patches to be sourced from https://github.com/suse/docker-ce (which are based on the upstream docker/docker-ce repo). The reason for this change (though it is functionally identical to the old patches) is so that public patch maintenance is much simpler. * bsc1021227-0001-pkg-devmapper-dynamically-load-dm_task_deferred_remo.patch * bsc1055676-0001-daemon-oci-obey-CL_UNPRIVILEGED-for-user-namespaced-.patch * private-registry-0001-Add-private-registry-mirror-support.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Add ${version} to equivalent non-kubic package provides- Add Provides for equivalent non-kubic packages- Disable all tests for docker/client and docker/pkg/discovery. The unit tests of those packages broke reproducibly the builds in IBS.- Disable flaky tests github.com/docker/docker/pkg/discovery/kv.- Add patch to support mirroring of private/non-upstream registries. As soon as the upstream PR (https://github.com/moby/moby/pull/34319) is merged, this patch will be replaced by the backported one from upstream. + private-registry-0001-Add-private-registry-mirror-support.patch fix bsc#1074971- Add Obsoletes: docker-image-migrator, as the tool is no longer needed and we've pretty much removed it from everywhere except the containers module. bsc#1069758- Remove requirement on bridge-utils, which has been replaced by libnetwork in Docker. bsc#1072798- Update to Docker v17.09.1_ce (bsc#1069758). Upstream changelog: https://github.com/docker/docker-ce/releases/tag/v17.09.1-ce - Removed patches (merged upstream): - bsc1045628-0001-devicemapper-remove-container-rootfs-mountPath-after.patch - bsc1066210-0001-vendor-update-to-github.com-vbatts-tar-split-v0.10.2.patch - bsc1066801-0001-oci-add-proc-scsi-to-masked-paths.patch- Update to Docker v17.09.0_ce. Upstream changelog: https://github.com/docker/docker-ce/releases/tag/v17.09.0-ce - Rebased patches: * bsc1021227-0001-pkg-devmapper-dynamically-load-dm_task_deferred_remo.patch * bsc1045628-0001-devicemapper-remove-container-rootfs-mountPath-after.patch * bsc1055676-0001-daemon-oci-obey-CL_UNPRIVILEGED-for-user-namespaced-.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch - Removed patches (merged upstream): - bsc1064781-0001-Allow-to-override-build-date.patch- Add a patch to dynamically probe whether libdevmapper supports dm_task_deferred_remove. This is necessary because we build the containers module on a SLE12 base, but later SLE versions have libdevmapper support. This should not affect openSUSE, as all openSUSE versions have a new enough libdevmapper. Backport of https://github.com/moby/moby/pull/35518. bsc#1021227 bsc#1029320 bsc#1058173 + bsc1021227-0001-pkg-devmapper-dynamically-load-dm_task_deferred_remo.patch- Fix up the ordering of tests in docker.spec. This is to keep things easier to backport into the SLE package.- Include secrets fix to handle "old" containers that have orphaned secret data. It's not clear why Docker caches these secrets, but fix the problem by trashing the references manually. bsc#1057743 * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Remove migration code for the v1.9.x -> v1.10.x migration. This has been around for a while, and we no longer support migrating from such an old version "nicely". Docker still has migration code that will run on first-boot, we are merely removing all of the "nice" warnings which tell users how to avoid issues during an upgrade that ocurred more than a year ago. - Drop un-needed files: - docker-plugin-message.txt - docker-update-message.txt- Add a backport of https://github.com/moby/moby/pull/35424, which fixes a security issue where a maliciously crafted image could be used to crash a Docker daemon. bsc#1066210 CVE-2017-14992 + bsc1066210-0001-vendor-update-to-github.com-vbatts-tar-split-v0.10.2.patch- Add a backport of https://github.com/moby/moby/pull/35399, which fixes a security issue where a Docker container (with a disabled AppArmor profile) could write to /proc/scsi/... and subsequently DoS the host. bsc#1066801 CVE-2017-16539 + bsc1066801-0001-oci-add-proc-scsi-to-masked-paths.patch- Correctly set `docker version` information, including the version, git commit, and SOURCE_DATE_EPOCH (requires a backport). This should * effectively* make Docker builds reproducible, with minimal cost. boo#1064781 + bsc1064781-0001-Allow-to-override-build-date.patch- Add backport of https://github.com/moby/moby/pull/35205. This used to be fixed in docker-runc, but we're moving it here after upstream discussion. bsc#1055676 + bsc1055676-0001-daemon-oci-obey-CL_UNPRIVILEGED-for-user-namespaced-.patch- Update to Docker v17.07.0_ce. Upstream changelog: https://github.com/docker/docker-ce/releases/tag/v17.06.0-ce https://github.com/docker/docker-ce/releases/tag/v17.07.0-ce - Removed no-longer needed patches. - bsc1037436-0001-client-check-tty-before-creating-exec-job.patch - bsc1037607-0001-apparmor-make-pkg-aaparser-work-on-read-only-root.patch - integration-cli-fix-TestInfoEnsureSucceeds.patch - Added backport of https://github.com/moby/moby/pull/34573. bsc#1045628 + bsc1045628-0001-devicemapper-remove-container-rootfs-mountPath-after.patch - Rewrite secrets patches to correctly handle directories in a way that doesn't cause errors when starting new containers. * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Fix bsc#1059011 The systemd service helper script used a timeout of 60 seconds to start the daemon, which is insufficient in cases where the daemon takes longer to start. Instead, set the service type from 'simple' to 'notify' and remove the now superfluous helper script.- fix bsc#1057743: Add a Requires: fix_bsc_1057743 which is provided by the newer version of docker-libnetwork. This is necessary because of a versioning bug we found in bsc#1057743.- fix /var/adm/update-message/docker file name to be /var/adm/update-message/docker-%{version}-%{release}- devicemapper: add patch to make the dm storage driver remove a container's rootfs mountpoint before attempting to do libdm operations on it. This helps avoid complications when live mounts will leak into containers. Backport of https://github.com/moby/moby/pull/34573. bsc#1045628 + bsc1045628-0001-devicemapper-remove-container-rootfs-mountPath-after.patch- Fix a regression in our SUSE secrets patches, which caused the copied files to not carry the correct {uid,gid} mapping when using user namespaces. This would not cause any bugs (SUSEConnect does the right thing anyway) but it's possible some programs would not treat the files correctly. This is tangentially related to bsc#1055676. * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Use -buildmode=pie for tests and binary build. bsc#1048046 bsc#1051429- enable deferred removal for sle12sp2 and newer (and openSUSE equivalent. fix bsc#1021227- enable libseccomp on sle12sp2 and newer, 42.2 and newer fix bsc#1028638 - docker: conditional filtering not supported on libseccomp for sle12- add SuSEfirewall2.service to the After clause in docker.service in order to fix bsc#1046024- fix path to docker-runc in systemd service file- change dependency to docker-runc- Fix bsc#1029630: docker does not wait for lvm on system startup I added "lvm2-monitor.service" as an "After dependency" of the docker systemd unit.- Fix bsc#1032287: missing docker systemd configuration- Update SUSE secrets patch to correctly handle restarting of containers. + secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch + secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Fix bsc#1037607 which was causing read-only issues on Kubic, this is a backport of https://github.com/moby/moby/pull/33250. + bsc1037607-0001-apparmor-make-pkg-aaparser-work-on-read-only-root.patch- Fix bsc#1038476 warning about non-executable docker * Simply verify we have binary prior using it, might happen if someone had docker installed and then did remove it and install from scratch again- Add a partial fix for boo#1038493. - Fixed bsc#1037436 where execids were being leaked due to bad error handling. This is a backport of https://github.com/docker/cli/pull/52. + bsc1037436-0001-client-check-tty-before-creating-exec-job.patch- Fix golang requirements in the subpackages- Update golang build requirements to use golang(API) symbol: this is needed to solve a conflict between multiple versions of Go being available- Fix secrets-0002-SUSE-implement-SUSE-container-secrets.patch: substitute docker/distribution/digest by opencontainers/digest- Update to version 17.04.0-ce (fix bsc#1034053 ) - Patches removed because have been merged into this version: * pr31549-cmd-docker-fix-TestDaemonCommand.patch * pr31773-daemon-also-ensureDefaultApparmorProfile-in-exec-pat.patch - Patches rebased: * integration-cli-fix-TestInfoEnsureSucceeds.patch - Build man pages for all archs (bsc#953182) - Containers cannot resolve DNS if docker host uses 127.0.0.1 as resolver (bsc#1034063) see /usr/share/doc/packages/docker/CHANGELOG.md- Make sure this is being built with go 1.7- remove the go_arches macro because we are using go1.7 which is available in all archs - remove gcc specific patches * gcc-go-patches.patch * netlink_netns_powerpc.patch * boltdb_bolt_add_brokenUnaligned.patch- Enable Delegate=yes, since systemd will safely ignore lvalues it doesn't understand.- Update SUSE secrets patch to handle boo#1030702. * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Fix (bsc#1032644) Change lvm2 from Requires to Recommends Docker usually uses a default storage driver, when it's not configured explicitly. This default driver then depends on the underlying system and gets chosen during installation.- Disable libseccomp for leap 42.1, sle12sp1 and sle12, because docker needs a higher version. Otherwise, we get the error "conditional filtering requires libseccomp version >= 2.2.1 (bsc#1028639 and bsc#1028638)- Add a backport of fix to AppArmor lazy loading docker-exec case. https://github.com/docker/docker/pull/31773 + pr31773-daemon-also-ensureDefaultApparmorProfile-in-exec-pat.patch- Clean up docker-mount-secrets.patch to use the new swarm secrets internals of Docker 1.13.0, which removes the need to implement any secret handling ourselves. This resulted in a split up of the patch. - docker-mount-secrets.patch + secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch + secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Remove old plugins.json to prevent docker-1.13 to fail to start- Fix bsc#1026827: systemd TasksMax default throttles docker- Fix post section by adding shadow as a package requirement Otherwise the groupadd instruction fails- Add patch to fix TestDaemonCommand failure in %check. This is an upstream bug, and has an upstream PR to fix it https://github.com/docker/docker/pull/31549. + pr31549-cmd-docker-fix-TestDaemonCommand.patch- update docker to 1.13.0 see details in https://github.com/docker/docker/releases/tag/v1.13.0 - use the same buildflags for building docker and for building the tests. - enable pkcs11: https://github.com/docker/docker/commit/37fa75b3447007bb8ea311f02610bb383b0db77f- enable architecture s390x for openSUSE- provide the oci runtime so that containers which were using an old runtime option, when started on the new docker version, the runtime is changed to the new one. fix bsc#1020806 bsc#1016992- fix CVE-2016-9962 bsc#1012568 . Fix it by updating to 1.12.6 plus an extra commit to fix liverestore: https://github.com/docker/docker/commit/97cd32a6a9076306baa637a29bba84c3f1f3d218- add "a wait" when starting docker service to fix bsc#1019251- remove netlink_gcc_go.patch after integration of PR https://github.com/golang/go/issues/11707 - new boltdb_bolt_add_brokenUnaligned.patch for ppc64 waiting for https://github.com/boltdb/bolt/pull/635- Remove old flags from dockerd's command-line, to be more inline with upstream (now that docker-runc is provided by the runc package). -H is dropped because upstream dropped it due to concerns with socket activation. - Remove socket activation entirely.- update docker to 1.12.5 (bsc#1016307). This fixes bsc#1015661- fix bash-completion- Add packageand(docker:bash) to bash-completion to match zsh-completion.- fix runc and containerd revisions fix bsc#1009961- update docker to 1.12.3 - fix bsc#1007249 - CVE-2016-8867: Fix ambient capability usage in containers - other fixes: https://github.com/docker/docker/releases/tag/v1.12.3- update docker to 1.12.2 (bsc#1004490). See changelog https://github.com/docker/docker/blob/v1.12.2/CHANGELOG.md - update docker-mount-secrets.patch to 1.12.2 code- docker-mount-secrets.patch: change the internal mountpoint name to not use ":" as that character can be considered a special character by other tools. bsc#999582- fix go_arches definition: use global instead of define, otherwise it fails to build- Add dockerd(8) man page.- add missing patch to changelog- fix integration test case - add integration-cli-fix-TestInfoEnsureSucceeds.patch- update rpmlintrc- make test timeout configurable- Remove noarch from docker-test, which was causing lots of fun issues when trying to run them.- Fix build for ppc64le: use static libgo for dockerd and docker-proxy as in docker build.- Update docker to 1.12.1 (bsc#996015) see changelog in https://github.com/docker/docker/releases/tag/v1.12.1- Add asaurin@suse.com's test.sh test script. - Add integration test binary in docker.spec file. This is work done by asaurin@suse.com.- Package docker-proxy (which was split out of the docker binary in 1.12). boo#995620- fix bsc#995102 - Docker "migrator" prevents installing "docker", if docker 1.9 was installed before but there were no images- Update docker.service file with several changes. * Reapply fix for bsc#983015 (Limit*=infinity). * Specify an "OCI" runtime for our runc package explicitly. bsc#978260- remove disable-pprof-trace.patch: We can remove this patch because we use go 1.6, either gcc6-go or gc-go. This patch was for gcc5-go- add go_arches in project configuration: this way, we can use the same spec file but decide in the project configuration if to use gc-go or gcc-go for some archs.- use gcc6-go instead of gcc5-go (bsc#988408) - build ppc64le with gc-go because this version builds with gc-go 1.6 - remove bnc964673-boltdb-metadata-recovery.patch because it has already been merged- update to v1.12.0 (bsc#995058) see detailed changelog at https://github.com/docker/docker/releases/tag/v1.12.0 - disable test that fail in obs build context - only run unit tests on architectures that provide the go list and go test tools - disable dockerd, parser, integration test, and devicemapper related tests on versions below SLE12 and openSUSE_13.2 - bump test timeout to 10m (for aarch64) - run unit tests during the build - Adapt docker.service file. - adapt install sections for gccgo builds: gccgo build are not built in separate folders for client and daemon. They both reside in dyngccgo. - gcc-go-patch: link against systemd when compiling the daemon. - Add disable-pprof-trace.patch pprof.Trace() is not available in go version <= 1.4 which we use to build SLES packages. This patch comments out the pprof.Trace() section. - update gcc-go-patch and docker-mount-secrets.patch- Fixed binary split, install both required binaries correctly* Explicitly state the version dependencies for runC and containerd, to avoid potential issues with incompatible component versions. These must be updated *each time we do a release*. bsc#993847- Don't exit mid install, add the ability to not restart the docker service during certain updates with long migration phases bsc#980555- remove kernel dependency (bsc#987198)- remove sysconfig.docker.ppc64le patch setting iptables option on ppc64le works now (bsc#988707)- fix bsc#984942: audit.rules in docker-1.9.1-58.1.x86_64.rpm has a syntax error* Update docker.service to include changes from upstream, including the soon-to-be-merged patch https://github.com/docker/docker/pull/24307, which fixes bnc#983015.- readd dropped declaration for patch200* Removed patches: - cve-2016-3697-numeric-uid.patch (merged upstream in gh@docker/docker#22998). * Update Docker to 1.11.2. (bsc#989566) Changelog from upstream: * Networking * Fix a stale endpoint issue on overlay networks during ungraceful restart (#23015) * Fix an issue where the wrong port could be reported by docker inspect/ps/port (#22997) * Runtime * Fix a potential panic when running docker build (#23032) * Fix interpretation of --user parameter (#22998) * Fix a bug preventing container statistics to be correctly reported (#22955) * Fix an issue preventing container to be restarted after daemon restart (#22947) * Fix issues when running 32 bit binaries on Ubuntu 16.04 (#22922) * Fix a possible deadlock on image deletion and container attach (#22918) * Fix an issue where containers fail to start after a daemon restart if they depend on a containerized cluster store (#22561) * Fix an issue causing docker ps to hang on CentOS when using devicemapper (#22168, #23067) * Fix a bug preventing to docker exec into a container when using devicemapper (#22168, #23067)- Fix udev files ownership- Pass over with spec-cleaner, no factual changes* Make sure we *always* build unstripped Go binaries.* Add a patch to fix database soft corruption issues if the Docker dameon dies in a bad state. There is a PR upstream to vendor Docker to have this fix as well, but it probably won't get in until 1.11.2. bnc#964673 (https://github.com/docker/docker/pull/22765) + bnc964673-boltdb-metadata-recovery.patch* Remove conditional Patch directive for SUSE secrets, since conditionally including patches results in incompatible .src.rpms. The patch is still applied conditionally.* Update to Docker 1.11.1. Changelog from upstream: * Distribution - Fix schema2 manifest media type to be of type `application/vnd.docker.container.image.v1+json` ([#21949](https://github.com/docker/docker/pull/21949)) * Documentation + Add missing API documentation for changes introduced with 1.11.0 ([#22048](https://github.com/docker/docker/pull/22048)) * Builder * Append label passed to `docker build` as arguments as an implicit `LABEL` command at the end of the processed `Dockerfile` ([#22184](https://github.com/docker/docker/pull/22184)) * Networking - Fix a panic that would occur when forwarding DNS query ([#22261](https://github.com/docker/docker/pull/22261)) - Fix an issue where OS threads could end up within an incorrect network namespace when using user defined networks ([#22261](https://github.com/docker/docker/pull/22261)) * Runtime - Fix a bug preventing labels configuration to be reloaded via the config file ([#22299](https://github.com/docker/docker/pull/22299)) - Fix a regression where container mounting `/var/run` would prevent other containers from being removed ([#22256](https://github.com/docker/docker/pull/22256)) - Fix an issue where it would be impossible to update both `memory-swap` and `memory` value together ([#22255](https://github.com/docker/docker/pull/22255)) - Fix a regression from 1.11.0 where the `/auth` endpoint would not initialize `serveraddress` if it is not provided ([#22254](https://github.com/docker/docker/pull/22254)) - Add missing cleanup of container temporary files when cancelling a schedule restart ([#22237](https://github.com/docker/docker/pull/22237)) - Removed scary error message when no restart policy is specified ([#21993](https://github.com/docker/docker/pull/21993)) - Fix a panic that would occur when the plugins were activated via the json spec ([#22191](https://github.com/docker/docker/pull/22191)) - Fix restart backoff logic to correctly reset delay if container ran for at least 10secs ([#22125](https://github.com/docker/docker/pull/22125)) - Remove error message when a container restart get cancelled ([#22123](https://github.com/docker/docker/pull/22123)) - Fix an issue where `docker` would not correcly clean up after `docker exec` ([#22121](https://github.com/docker/docker/pull/22121)) - Fix a panic that could occur when servicing concurrent `docker stats` commands ([#22120](https://github.com/docker/docker/pull/22120))` - Revert deprecation of non-existing host directories auto-creation ([#22065](https://github.com/docker/docker/pull/22065)) - Hide misleading rpc error on daemon shutdown ([#22058](https://github.com/docker/docker/pull/22058))- Fix go version to 1.5 (bsc#977394)- Add patch to fix vulnerability in Docker <= 1.11.0. This patch is upstream, but was merged after the 1.11.0 merge window. CVE-2016-3697. bsc#976777. + cve-2016-3697-numeric-uid.patch The upstream PR is here[1] and was vendored into Docker here[2]. [1]: https://github.com/opencontainers/runc/pull/708 [2]: https://github.com/docker/docker/pull/21665- Supplemnent zsh from zsh-completion * zsh-completion will be automatically installed if zsh and docker are installed- Remove gcc5_socker_workaround.patch: This patch is not needed anymore since gcc5 has been updated in all platforms* Removed patches that have been fixed upstream and in gcc-go: - boltdb_bolt_powerpc.patch - fix-apparmor.patch - fix-btrfs-ioctl-structure.patch - fix-docker-init.patch - libnetwork_drivers_bridge_powerpc.patch - ignore-dockerinit-checksum.patch * Require containerd, as it is the only currently supported Docker execdriver. * Update docker.socket to require containerd.socket and use --containerd in docker.service so that the services are self-contained. * Update to Docker 1.11.0. Changelog from upstream: * Builder - Fix a bug where Docker would not used the correct uid/gid when processing the `WORKDIR` command ([#21033](https://github.com/docker/docker/pull/21033)) - Fix a bug where copy operations with userns would not use the proper uid/gid ([#20782](https://github.com/docker/docker/pull/20782), [#21162](https://github.com/docker/docker/pull/21162)) * Client * Usage of the `:` separator for security option has been deprecated. `=` should be used instead ([#21232](https://github.com/docker/docker/pull/21232)) + The client user agent is now passed to the registry on `pull`, `build`, `push`, `login` and `search` operations ([#21306](https://github.com/docker/docker/pull/21306), [#21373](https://github.com/docker/docker/pull/21373)) * Allow setting the Domainname and Hostname separately through the API ([#20200](https://github.com/docker/docker/pull/20200)) * Docker info will now warn users if it can not detect the kernel version or the operating system ([#21128](https://github.com/docker/docker/pull/21128)) - Fix an issue where `docker stats --no-stream` output could be all 0s ([#20803](https://github.com/docker/docker/pull/20803)) - Fix a bug where some newly started container would not appear in a running `docker stats` command ([#20792](https://github.com/docker/docker/pull/20792)) * Post processing is no longer enabled for linux-cgo terminals ([#20587](https://github.com/docker/docker/pull/20587)) - Values to `--hostname` are now refused if they do not comply with [RFC1123](https://tools.ietf.org/html/rfc1123) ([#20566](https://github.com/docker/docker/pull/20566)) + Docker learned how to use a SOCKS proxy ([#20366](https://github.com/docker/docker/pull/20366), [#18373](https://github.com/docker/docker/pull/18373)) + Docker now supports external credential stores ([#20107](https://github.com/docker/docker/pull/20107)) * `docker ps` now supports displaying the list of volumes mounted inside a container ([#20017](https://github.com/docker/docker/pull/20017)) * `docker info` now also report Docker's root directory location ([#19986](https://github.com/docker/docker/pull/19986)) - Docker now prohibits login in with an empty username (spaces are trimmed) ([#19806](https://github.com/docker/docker/pull/19806)) * Docker events attributes are now sorted by key ([#19761](https://github.com/docker/docker/pull/19761)) * `docker ps` no longer show exported port for stopped containers ([#19483](https://github.com/docker/docker/pull/19483)) - Docker now cleans after itself if a save/export command fails ([#17849](https://github.com/docker/docker/pull/17849)) * Docker load learned how to display a progress bar ([#17329](https://github.com/docker/docker/pull/17329), [#120078](https://github.com/docker/docker/pull/20078)) * Distribution - Fix a panic that occurred when pulling an images with 0 layers ([#21222](https://github.com/docker/docker/pull/21222)) - Fix a panic that could occur on error while pushing to a registry with a misconfigured token service ([#21212](https://github.com/docker/docker/pull/21212)) + All first-level delegation roles are now signed when doing a trusted push ([#21046](https://github.com/docker/docker/pull/21046)) + OAuth support for registries was added ([#20970](https://github.com/docker/docker/pull/20970)) * `docker login` now handles token using the implementation found in [docker/distribution](https://github.com/docker/distribution) ([#20832](https://github.com/docker/docker/pull/20832)) * `docker login` will no longer prompt for an email ([#20565](https://github.com/docker/docker/pull/20565)) * Docker will now fallback to registry V1 if no basic auth credentials are available ([#20241](https://github.com/docker/docker/pull/20241)) * Docker will now try to resume layer download where it left off after a network error/timeout ([#19840](https://github.com/docker/docker/pull/19840)) - Fix generated manifest mediaType when pushing cross-repository ([#19509](https://github.com/docker/docker/pull/19509)) - Fix docker requesting additional push credentials when pulling an image if Content Trust is enabled ([#20382](https://github.com/docker/docker/pull/20382)) * Logging - Fix a race in the journald log driver ([#21311](https://github.com/docker/docker/pull/21311)) * Docker syslog driver now uses the RFC-5424 format when emitting logs ([#20121](https://github.com/docker/docker/pull/20121)) * Docker GELF log driver now allows to specify the compression algorithm and level via the `gelf-compression-type` and `gelf-compression-level` options ([#19831](https://github.com/docker/docker/pull/19831)) * Docker daemon learned to output uncolorized logs via the `--raw-logs` options ([#19794](https://github.com/docker/docker/pull/19794)) + Docker, on Windows platform, now includes an ETW (Event Tracing in Windows) logging driver named `etwlogs` ([#19689](https://github.com/docker/docker/pull/19689)) * Journald log driver learned how to handle tags ([#19564](https://github.com/docker/docker/pull/19564)) + The fluentd log driver learned the following options: `fluentd-address`, `fluentd-buffer-limit`, `fluentd-retry-wait`, `fluentd-max-retries` and `fluentd-async-connect` ([#19439](https://github.com/docker/docker/pull/19439)) + Docker learned to send log to Google Cloud via the new `gcplogs` logging driver. ([#18766](https://github.com/docker/docker/pull/18766)) * Misc + When saving linked images together with `docker save` a subsequent `docker load` will correctly restore their parent/child relationship ([#21385](https://github.com/docker/docker/pull/c)) + Support for building the Docker cli for OpenBSD was added ([#21325](https://github.com/docker/docker/pull/21325)) + Labels can now be applied at network, volume and image creation ([#21270](https://github.com/docker/docker/pull/21270)) * The `dockremap` is now created as a system user ([#21266](https://github.com/docker/docker/pull/21266)) - Fix a few response body leaks ([#21258](https://github.com/docker/docker/pull/21258)) - Docker, when run as a service with systemd, will now properly manage its processes cgroups ([#20633](https://github.com/docker/docker/pull/20633)) * Docker info now reports the value of cgroup KernelMemory or emits a warning if it is not supported ([#20863](https://github.com/docker/docker/pull/20863)) * Docker info now also reports the cgroup driver in use ([#20388](https://github.com/docker/docker/pull/20388)) * Docker completion is now available on PowerShell ([#19894](https://github.com/docker/docker/pull/19894)) * `dockerinit` is no more ([#19490](https://github.com/docker/docker/pull/19490),[#19851](https://github.com/docker/docker/pull/19851)) + Support for building Docker on arm64 was added ([#19013](https://github.com/docker/docker/pull/19013)) + Experimental support for building docker.exe in a native Windows Docker installation ([#18348](https://github.com/docker/docker/pull/18348)) * Networking - Fix panic if a node is forcibly removed from the cluster ([#21671](https://github.com/docker/docker/pull/21671)) - Fix "error creating vxlan interface" when starting a container in a Swarm cluster ([#21671](https://github.com/docker/docker/pull/21671)) * `docker network inspect` will now report all endpoints whether they have an active container or not ([#21160](https://github.com/docker/docker/pull/21160)) + Experimental support for the MacVlan and IPVlan network drivers have been added ([#21122](https://github.com/docker/docker/pull/21122)) * Output of `docker network ls` is now sorted by network name ([#20383](https://github.com/docker/docker/pull/20383)) - Fix a bug where Docker would allow a network to be created with the reserved `default` name ([#19431](https://github.com/docker/docker/pull/19431)) * `docker network inspect` returns whether a network is internal or not ([#19357](https://github.com/docker/docker/pull/19357)) + Control IPv6 via explicit option when creating a network (`docker network create --ipv6`). This shows up as a new `EnableIPv6` field in `docker network inspect` ([#17513](https://github.com/docker/docker/pull/17513)) * Support for AAAA Records (aka IPv6 Service Discovery) in embedded DNS Server ([#21396](https://github.com/docker/docker/pull/21396)) - Fix to not forward docker domain IPv6 queries to external servers ([#21396](https://github.com/docker/docker/pull/21396)) * Multiple A/AAAA records from embedded DNS Server for DNS Round robin ([#21019](https://github.com/docker/docker/pull/21019)) - Fix endpoint count inconsistency after an ungraceful dameon restart ([#21261](https://github.com/docker/docker/pull/21261)) - Move the ownership of exposed ports and port-mapping options from Endpoint to Sandbox ([#21019](https://github.com/docker/docker/pull/21019)) - Fixed a bug which prevents docker reload when host is configured with ipv6.disable=1 ([#21019](https://github.com/docker/docker/pull/21019)) - Added inbuilt nil IPAM driver ([#21019](https://github.com/docker/docker/pull/21019)) - Fixed bug in iptables.Exists() logic [#21019](https://github.com/docker/docker/pull/21019) - Fixed a Veth interface leak when using overlay network ([#21019](https://github.com/docker/docker/pull/21019)) - Fixed a bug which prevents docker reload after a network delete during shutdown ([#20214](https://github.com/docker/docker/pull/20214)) - Make sure iptables chains are recreated on firewalld reload ([#20419](https://github.com/docker/docker/pull/20419)) - Allow to pass global datastore during config reload ([#20419](https://github.com/docker/docker/pull/20419)) - For anonymous containers use the alias name for IP to name mapping, ie:DNS PTR record ([#21019](https://github.com/docker/docker/pull/21019)) - Fix a panic when deleting an entry from /etc/hosts file ([#21019](https://github.com/docker/docker/pull/21019)) - Source the forwarded DNS queries from the container net namespace ([#21019](https://github.com/docker/docker/pull/21019)) - Fix to retain the network internal mode config for bridge networks on daemon reload ([#21780] (https://github.com/docker/docker/pull/21780)) - Fix to retain IPAM driver option configs on daemon reload ([#21914] (https://github.com/docker/docker/pull/21914)) * Plugins - Fix a file descriptor leak that would occur every time plugins were enumerated ([#20686](https://github.com/docker/docker/pull/20686)) - Fix an issue where Authz plugin would corrupt the payload body when faced with a large amount of data ([#20602](https://github.com/docker/docker/pull/20602)) * Runtime - Fix a panic that could occur when cleanup after a container started with invalid parameters ([#21716](https://github.com/docker/docker/pull/21716)) - Fix a race with event timers stopping early ([#21692](https://github.com/docker/docker/pull/21692)) - Fix race conditions in the layer store, potentially corrupting the map and crashing the process ([#21677](https://github.com/docker/docker/pull/21677)) - Un-deprecate auto-creation of host directories for mounts. This feature was marked deprecated in ([#21666](https://github.com/docker/docker/pull/21666)) Docker 1.9, but was decided to be too much of an backward-incompatible change, so it was decided to keep the feature. + It is now possible for containers to share the NET and IPC namespaces when `userns` is enabled ([#21383](https://github.com/docker/docker/pull/21383)) + `docker inspect ` will now expose the rootfs layers ([#21370](https://github.com/docker/docker/pull/21370)) + Docker Windows gained a minimal `top` implementation ([#21354](https://github.com/docker/docker/pull/21354)) * Docker learned to report the faulty exe when a container cannot be started due to its condition ([#21345](https://github.com/docker/docker/pull/21345)) * Docker with device mapper will now refuse to run if `udev sync` is not available ([#21097](https://github.com/docker/docker/pull/21097)) - Fix a bug where Docker would not validate the config file upon configuration reload ([#21089](https://github.com/docker/docker/pull/21089)) - Fix a hang that would happen on attach if initial start was to fail ([#21048](https://github.com/docker/docker/pull/21048)) - Fix an issue where registry service options in the daemon configuration file were not properly taken into account ([#21045](https://github.com/docker/docker/pull/21045)) - Fix a race between the exec and resize operations ([#21022](https://github.com/docker/docker/pull/21022)) - Fix an issue where nanoseconds were not correctly taken in account when filtering Docker events ([#21013](https://github.com/docker/docker/pull/21013)) - Fix the handling of Docker command when passed a 64 bytes id ([#21002](https://github.com/docker/docker/pull/21002)) * Docker will now return a `204` (i.e http.StatusNoContent) code when it successfully deleted a network ([#20977](https://github.com/docker/docker/pull/20977)) - Fix a bug where the daemon would wait indefinitely in case the process it was about to killed had already exited on its own ([#20967](https://github.com/docker/docker/pull/20967) * The devmapper driver learned the `dm.min_free_space` option. If the mapped device free space reaches the passed value, new device creation will be prohibited. ([#20786](https://github.com/docker/docker/pull/20786)) + Docker can now prevent processes in container to gain new privileges via the `--security-opt=no-new-privileges` flag ([#20727](https://github.com/docker/docker/pull/20727)) - Starting a container with the `--device` option will now correctly resolves symlinks ([#20684](https://github.com/docker/docker/pull/20684)) + Docker now relies on [`containerd`](https://github.com/docker/containerd) and [`runc`](https://github.com/opencontainers/runc) to spawn containers. ([#20662](https://github.com/docker/docker/pull/20662)) - Fix docker configuration reloading to only alter value present in the given config file ([#20604](https://github.com/docker/docker/pull/20604)) + Docker now allows setting a container hostname via the `--hostname` flag when `--net=host` ([#20177](https://github.com/docker/docker/pull/20177)) + Docker now allows executing privileged container while running with `--userns-remap` if both `--privileged` and the new `--userns=host` flag are specified ([#20111](https://github.com/docker/docker/pull/20111)) - Fix Docker not cleaning up correctly old containers upon restarting after a crash ([#19679](https://github.com/docker/docker/pull/19679)) * Docker will now error out if it doesn't recognize a configuration key within the config file ([#19517](https://github.com/docker/docker/pull/19517)) - Fix container loading, on daemon startup, when they depends on a plugin running within a container ([#19500](https://github.com/docker/docker/pull/19500)) * `docker update` learned how to change a container restart policy ([#19116](https://github.com/docker/docker/pull/19116)) * `docker inspect` now also returns a new `State` field containing the container state in a human readable way (i.e. one of `created`, `restarting`, `running`, `paused`, `exited` or `dead`)([#18966](https://github.com/docker/docker/pull/18966)) + Docker learned to limit the number of active pids (i.e. processes) within the container via the `pids-limit` flags. NOTE: This requires `CGROUP_PIDS=y` to be in the kernel configuration. ([#18697](https://github.com/docker/docker/pull/18697)) - `docker load` now has a `--quiet` option to suppress the load output ([#20078](https://github.com/docker/docker/pull/20078)) - Fix a bug in neighbor discovery for IPv6 peers ([#20842](https://github.com/docker/docker/pull/20842)) - Fix a panic during cleanup if a container was started with invalid options ([#21802](https://github.com/docker/docker/pull/21802)) - Fix a situation where a container cannot be stopped if the terminal is closed ([#21840](https://github.com/docker/docker/pull/21840)) * Security * Object with the `pcp_pmcd_t` selinux type were given management access to `/var/lib/docker(/.*)?` ([#21370](https://github.com/docker/docker/pull/21370)) * `restart_syscall`, `copy_file_range`, `mlock2` joined the list of allowed calls in the default seccomp profile ([#21117](https://github.com/docker/docker/pull/21117), [#21262](https://github.com/docker/docker/pull/21262)) * `send`, `recv` and `x32` were added to the list of allowed syscalls and arch in the default seccomp profile ([#19432](https://github.com/docker/docker/pull/19432)) * Docker Content Trust now requests the server to perform snapshot signing ([#21046](https://github.com/docker/docker/pull/21046)) * Support for using YubiKeys for Content Trust signing has been moved out of experimental ([#21591](https://github.com/docker/docker/pull/21591)) * Volumes * Output of `docker volume ls` is now sorted by volume name ([#20389](https://github.com/docker/docker/pull/20389)) * Local volumes can now accepts options similar to the unix `mount` tool ([#20262](https://github.com/docker/docker/pull/20262)) - Fix an issue where one letter directory name could not be used as source for volumes ([#21106](https://github.com/docker/docker/pull/21106)) + `docker run -v` now accepts a new flag `nocopy`. This tell the runtime not to copy the container path content into the volume (which is the default behavior) ([#21223](https://github.com/docker/docker/pull/21223))- docker.spec: apply gcc5 socket patch also for sle12 and leap because gcc5 has been updated there as well. - docker.spec: add a "is_opensuse" check for the mount-secrets patch. This way we can use this same package for opensuse.- use go-lang for aarch64: - drop fix_platform_type_arm.patch (works around a gcc-go bug, so unnecessary)- Add patch from upstream (https://github.com/docker/docker/pull/21723) to fix compilation on Factory and Tumbleweed (which have btrfsprogs >= 4.5). + fix-btrfs-ioctl-structure.patch bnc#974208- Changed systemd unit file and default sysconfig file to include network options, this is needed to get SDN like flannel to work- docker.spec: update warning to mention that /etc/sysconfig/docker is sourced by the migration script.- docker.spec: only Reccomends: the docker-image-migrator package as it is no longer required for our ugly systemctl hacks. - docker.spec: fix up documentation to refer to the script you need to run in the migrator package. - docker.spec: print a warning if you force the DOCKER_FORCE_INSTALL option.- spec: switch to new done file name from docker-image-migrator- update to docker 1.10.3 (bnc#970637) Runtime Fix Docker client exiting with an "Unrecognized input header" error #20706 Fix Docker exiting if Exec is started with both AttachStdin and Detach #20647 Distribution Fix a crash when pushing multiple images sharing the same layers to the same repository in parallel #20831 Fix a panic when pushing images to a registry which uses a misconfigured token service #21030 Plugin system Fix issue preventing volume plugins to start when SELinux is enabled #20834 Prevent Docker from exiting if a volume plugin returns a null response for Get requests #20682 Fix plugin system leaking file descriptors if a plugin has an error #20680 Security Fix linux32 emulation to fail during docker build #20672 It was due to the personality syscall being blocked by the default seccomp profile. Fix Oracle XE 10g failing to start in a container #20981 It was due to the ipc syscall being blocked by the default seccomp profile. Fix user namespaces not working on Linux From Scratch #20685 Fix issue preventing daemon to start if userns is enabled and the subuid or subgid files contain comments #20725 More at https://github.com/docker/docker/releases/tag/v1.10.3- spec: improve file-based migration checks to make sure that it doesn't cause errors if running on a /var/lib/docker without /var/lib/docker/graph.- spec: implement file-based migration checks. The migrator will be updated to match the warning message's instructions. This looks like it works with my testing.- more patches to build on ppc64 architecture update netlink_gcc_go.patch new netlink_netns_powerpc.patch new boltdb_bolt_powerpc.patch new libnetwork_drivers_bridge_powerpc.patch to replace deleted fix-ppc64le.patch- fix bsc#968972 - let docker manage the cgroups of the processes that it launches without systemd- Require docker-image-migrator (bnc#968933)Update to version 1.10.2 (bnc#968933) - Runtime Prevent systemd from deleting containers' cgroups when its configuration is reloaded #20518 Fix SELinux issues by disregarding --read-only when mounting /dev/mqueue #20333 Fix chown permissions used during docker cp when userns is used #20446 Fix configuration loading issue with all booleans defaulting to true #20471 Fix occasional panic with docker logs -f #20522 - Distribution Keep layer reference if deletion failed to avoid a badly inconsistent state #20513 Handle gracefully a corner case when canceling migration #20372 Fix docker import on compressed data #20367 Fix tar-split files corruption during migration that later cause docker push and docker save to fail #20458 - Networking Fix daemon crash if embedded DNS is sent garbage #20510 - Volumes Fix issue with multiple volume references with same name #20381 - Security Fix potential cache corruption and delegation conflict issues #20523 link to changelog: https://github.com/docker/docker/blob/v1.10.2/CHANGELOG.md- fix-apparmor.patch: switch to a backported version of docker/docker#20305, which also fixes several potential issues if the major version of apparmor changes.- Remove 1.10.0 tarball.- Update to docker 1.10.1 It includes some fixes to 1.10.0, see detailed changelog in https://github.com/docker/docker/blob/v1.10.1/CHANGELOG.md- Update docker to 1.10.0 (bnc#965918) Add usernamespace support Add support for custom seccomp profiles Improvements in network and volume management detailed changelog in https://github.com/docker/docker/blob/590d5108bbdaabb05af590f76c9757daceb6d02e/CHANGELOG.md - removed patches, because code has been merged in 1.10.0 release: libcontainer-apparmor-fixes.patch: see: https://github.com/docker/docker/blob/release/v1.10/contrib/apparmor/template.go fix_bnc_958255.patch: see https://github.com/docker/docker/commit/2b4f64e59018c21aacbf311d5c774dd5521b5352 use_fs_cgroups_by_default.patch fix_cgroup.parent_path_sanitisation.patch add_bolt_ppc64.patch add_bolt_arm64.patch add_bolt_s390x.patch - remove gcc-go-build-static-libgo.patch: This has been replace by gcc-go-patches.patch - removed patches, because arm and ppc are not build using the dynbinary target, but the dyngccgo one: docker_remove_journald_to_fix_dynbinary_build_on_arm.patch docker_remove_journald_to_fix_dynbinary_build_on_powerpc.patch docker_remove_journald_to_fix_dynbinary_build_on_arm64.patch - added patches: fix_platform_type_arm.patch: fix build for arm64 and aarch64: set utsname as uint8 for arm64 and aarch64 gcc5_socket_workaround.patch: gcc5-go in Tumbleweed includes this commit https://github.com/golang/gofrontend/commit/a850225433a66a58613c22185c3b09626f5545eb Which "fixes" the data type for RawSockaddr.Data However, docker now expects the "wrong" data type, since docker had a workaround for that issue. Thus, we need to workaround the workaround in tumbleweed netlink_gcc_go.patch: add constants for syscalls TUNSETIFF and TUNSETPERSIST to fix a gcc issue. This is a workaround for bnc#964468: gcc-go can no longer compile Docker. fix-apparmor.patch: fix https://github.com/docker/docker/issues/20269 . It affects SLE12 which has apparmor version 2.8 and not openSUSE which has version 2.9. fix-ppc64le.patch: Build netlink driver using int8 and not uint8 for the data structure - reviewed patches: ignore-dockerinit-checksum.patch: review context in patch fix-docker-init.patch: review patch because build method has been changed in spec file for gcc-go gcc-go-patches.patch: review context in patch - Build requires go >= 1.5: For version 1.9, we could use Go 1.4.3 see GO_VERSION https://github.com/docker/docker/blob/release/v1.9/Dockerfile However, for version 1.10, we need go 1.5.3 see GO_VERSION https://github.com/docker/docker/blob/release/v1.10/Dockerfile - fix bnc#965600 - SLES12 SP1 - Static shared memory limit in container- docker-mount-secrets.patch: fix up this patch to work on Docker 1.10- docker-mount-secrets.patch: properly register /run/secrets as a mountpoint, so that it is unmounted properly when the container is removed and thus container removal works. (bnc#963142) - docker-mount-secrets.patch: in addition, add some extra debugging information to the secrets patch.- fix_json_econnreset_bug.patch: fix JSON bug that causes containers to not start in weird circumstances. https://github.com/docker/docker/issues/14203- fix_bnc_958255.patch: fix Docker creates strange apparmor profile (bnc#958255) - use_fs_cgroups_by_default.patch: Use fs cgroups by default: https://github.com/docker/docker/commit/419fd7449fe1a984f582731fcd4d9455000846b0 - fix_cgroup.parent_path_sanitisation.patch: fix cgroup.Parent path sanitisation: https://github.com/opencontainers/runc/commit/bf899fef451956be4abd63de6d6141d9f9096a02 - Add rules for auditd. This is required to fix bnc#959405 - Remove 7 patches, add 6 and modify 1, after 1.9.1 upgrade * Removed: - docker_missing_ppc64le_netlink_linux_files.patch: the code that this bug refers to has benn removed upstream - docker_rename_jump_amd64_as_jump_linux.patch: the code that this bug refers to has been removed upstream - Remove fix_15279.patch: code has been merged upstream - Remove add_missing_syscall_for_s390x.patch: code has been merged upstream - Remove fix_incompatible_assignment_error_bnc_950931.patch: code has been merged upstream - Remove fix_libsecomp_error_bnc_950931.patch: the code that this bug refers to has been removed upstream - Remove gcc5_socket_workaround.patch: Code has been fixed. Building with this patch is giving the error we were trying to fix, implying that the code has been fixed somewhere else. * Added: - add_bolt_ppc64.patch - add_bolt_arm64.patch - docker_remove_journald_to_fix_dynbinary_build_on_arm.patch - docker_remove_journald_to_fix_dynbinary_build_on_powerpc.patch - docker_remove_journald_to_fix_dynbinary_build_on_arm64.patch - gcc-go-build-static-libgo.patch: enable static linking of libgo in ggc-go In order to do this, we had to work-around an issue from gcc-go: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69357 * Modify: - Upgrade to 1.9.1(bnc#956434) * Runtime: - Do not prevent daemon from booting if images could not be restored (#17695) - Force IPC mount to unmount on daemon shutdown/init (#17539) - Turn IPC unmount errors into warnings (#17554) - Fix `docker stats` performance regression (#17638) - Clarify cryptic error message upon `docker logs` if `--log-driver=none` (#17767) - Fix seldom panics (#17639, #17634, #17703) - Fix opq whiteouts problems for files with dot prefix (#17819) - devicemapper: try defaulting to xfs instead of ext4 for performance reasons (#17903, #17918) - devicemapper: fix displayed fs in docker info (#17974) - selinux: only relabel if user requested so with the `z` option (#17450, #17834) - Do not make network calls when normalizing names (#18014) * Client: - Fix `docker login` on windows (#17738) - Fix bug with `docker inspect` output when not connected to daemon (#17715) - Fix `docker inspect -f {{.HostConfig.Dns}} somecontainer` (#17680) * Builder: - Fix regression with symlink behavior in ADD/COPY (#17710) * Networking: - Allow passing a network ID as an argument for `--net` (#17558) - Fix connect to host and prevent disconnect from host for `host` network (#17476) - Fix `--fixed-cidr` issue when gateway ip falls in ip-range and ip-range is not the first block in the network (#17853) - Restore deterministic `IPv6` generation from `MAC` address on default `bridge` network (#17890) - Allow port-mapping only for endpoints created on docker run (#17858) - Fixed an endpoint delete issue with a possible stale sbox (#18102) * Distribution: - Correct parent chain in v2 push when v1Compatibility files on the disk are inconsistent (#18047) - Update to version 1.9.0 (bnc#954812): * Runtime: - `docker stats` now returns block IO metrics (#15005) - `docker stats` now details network stats per interface (#15786) - Add `ancestor=` filter to `docker ps --filter` flag to filter containers based on their ancestor images (#14570) - Add `label=` filter to `docker ps --filter` to filter containers based on label (#16530) - Add `--kernel-memory` flag to `docker run` (#14006) - Add `--message` flag to `docker import` allowing to specify an optional message (#15711) - Add `--privileged` flag to `docker exec` (#14113) - Add `--stop-signal` flag to `docker run` allowing to replace the container process stopping signal (#15307) - Add a new `unless-stopped` restart policy (#15348) - Inspecting an image now returns tags (#13185) - Add container size information to `docker inspect` (#15796) - Add `RepoTags` and `RepoDigests` field to `/images/{name:.*}/json` (#17275) - Remove the deprecated `/container/ps` endpoint from the API (#15972) - Send and document correct HTTP codes for `/exec//start` (#16250) - Share shm and mqueue between containers sharing IPC namespace (#15862) - Event stream now shows OOM status when `--oom-kill-disable` is set (#16235) - Ensure special network files (/etc/hosts etc.) are read-only if bind-mounted with `ro` option (#14965) - Improve `rmi` performance (#16890) - Do not update /etc/hosts for the default bridge network, except for links (#17325) - Fix conflict with duplicate container names (#17389) - Fix an issue with incorrect template execution in `docker inspect` (#17284) - DEPRECATE `-c` short flag variant for `--cpu-shares` in docker run (#16271) * Client: - Allow `docker import` to import from local files (#11907) * Builder: - Add a `STOPSIGNAL` Dockerfile instruction allowing to set a different stop-signal for the container process (#15307) - Add an `ARG` Dockerfile instruction and a `--build-arg` flag to `docker build` that allows to add build-time environment variables (#15182) - Improve cache miss performance (#16890) * Storage: - devicemapper: Implement deferred deletion capability (#16381) * Networking: - `docker network` exits experimental and is part of standard release (#16645) - New network top-level concept, with associated subcommands and API (#16645) WARNING: the API is different from the experimental API - Support for multiple isolated/micro-segmented networks (#16645) - Built-in multihost networking using VXLAN based overlay driver (#14071) - Support for third-party network plugins (#13424) - Ability to dynamically connect containers to multiple networks (#16645) - Support for user-defined IP address management via pluggable IPAM drivers (#16910) - Add daemon flags `--cluster-store` and `--cluster-advertise` for built-in nodes discovery (#16229) - Add `--cluster-store-opt` for setting up TLS settings (#16644) - Add `--dns-opt` to the daemon (#16031) - DEPRECATE following container `NetworkSettings` fields in API v1.21: `EndpointID`, `Gateway`, `GlobalIPv6Address`, `GlobalIPv6PrefixLen`, `IPAddress`, `IPPrefixLen`, `IPv6Gateway` and `MacAddress`. Those are now specific to the `bridge` network. Use `NetworkSettings.Networks` to inspect the networking settings of a container per network. * Volumes: - New top-level `volume` subcommand and API (#14242) - Move API volume driver settings to host-specific config (#15798) - Print an error message if volume name is not unique (#16009) - Ensure volumes created from Dockerfiles always use the local volume driver (#15507) - DEPRECATE auto-creating missing host paths for bind mounts (#16349) * Logging: - Add `awslogs` logging driver for Amazon CloudWatch (#15495) - Add generic `tag` log option to allow customizing container/image information passed to driver (e.g. show container names) (#15384) - Implement the `docker logs` endpoint for the journald driver (#13707) - DEPRECATE driver-specific log tags (e.g. `syslog-tag`, etc.) (#15384) * Distribution: - `docker search` now works with partial names (#16509) - Push optimization: avoid buffering to file (#15493) - The daemon will display progress for images that were already being pulled by another client (#15489) - Only permissions required for the current action being performed are requested (#) - Renaming trust keys (and respective environment variables) from `offline` to `root` and `tagging` to `repository` (#16894) - DEPRECATE trust key environment variables `DOCKER_CONTENT_TRUST_OFFLINE_PASSPHRASE` and `DOCKER_CONTENT_TRUST_TAGGING_PASSPHRASE` (#16894) * Security: - Add SELinux profiles to the rpm package (#15832) - Fix various issues with AppArmor profiles provided in the deb package (#14609) - Add AppArmor policy that prevents writing to /proc (#15571) - Change systemd unit file to no longer use the deprecated "-d" option (bnc#954737)- Changed docker-mount-secrets.patch: allow removal of containers even when the entry point failed. bnc#954797- Fixed the format of the fix_libsecomp_error_bnc_950931 patch.- Merged the fix_libsecomp_error_bnc_950931.patch and the fix_x86_build_removing_empty_file_jump_amd_64.patch patches.- Fix build for x86_64. Patch fix_libsecomp_error_bnc_950931.patch had created and empty file jump_amd64.go instead of removing it. This broke the build for x86_64. This commit fixes it by removing that empty file. fix_x86_build_removing_empty_file_jump_amd_64.patch: patch that removes empty file jump_amd64.go- Added patch that fixes a known gcc-go for ppc64xe in the syscall.RawSockAddr type. gcc5_socket_workaround.patch- Add patches for fixing ppc64le build (bnc#950931) fix_libsecomp_error_bnc_950931.patch fix_incompatible_assignment_error_bnc_950931.patch docker_missing_ppc64le_netlink_linux_files.patch - Remove docker_rename_jump_amd64_as_jump_linux.patch because it clashes with the previous patches.- Exclude libgo as a requirement. The auto requires script was adding libgo as a requirement when building with gcc-go which was wrong.- Add patch for missing systemcall for s390x. See https://github.com/docker/docker/commit/eecf6cd48cf7c48f00aa8261cf431c87084161ae add_missing_syscall_for_s390x.patch: contains the patch - Exclude s390x for sle12 because it hangs when running go. It works for sle12sp1 thus we don't want to exclude sle12sp1 but only sle12.- Update docker to 1.8.3 version: * Fix layer IDs lead to local graph poisoning (CVE-2014-8178) (bnc#949660) * Fix manifest validation and parsing logic errors allow pull-by-digest validation bypass (CVE-2014-8179) * Add `--disable-legacy-registry` to prevent a daemon from using a v1 registry- Update docker to 1.8.2 version see detailed changelog in https://github.com/docker/docker/releases/tag/v1.8.2 fix bsc#946653 update do docker 1.8.2 - devicemapper: fix zero-sized field access Fix issue #15279: does not build with Go 1.5 tip Due to golang/go@7904946 the devices field is dropped. This solution works on go1.4 and go1.5 See more in https://github.com/docker/docker/pull/15404 This fix was not included in v1.8.2. See previous link on why. fix_15279.patch: contains the patch for issue#15279- new patch as per upstream issue https://github.com/docker/docker/issues/14056#issuecomment-113680944 docker_rename_jump_amd64_as_jump_linux.patch- ignore-dockerinit-checksum.patch need -p1 in spec- Update to docker 1.8.1(bsc#942369 and bsc#942370): - Fix a bug where pushing multiple tags would result in invalid images - Update to docker 1.8.0: see detailed changelog in https://github.com/docker/docker/releases/tag/v1.8.0 - remove docker-netns-aarch64.patch: This patch was adding vendor/src/github.com/vishvananda/netns/netns_linux_arm64.go which is now included upstream, so we don't need this patch anymore- Remove 0002-Stripped-dockerinit-binary.patch because we do not use it anymore (we got rid of that when updating to 1.7.1)- Exclude archs where docker does not build. Otherwise it gets into and infinite loop when building. We'll fix that later if we want to release for those archs.- Update to 1.7.1 (2015-07-14) (bnc#938156) * Runtime - Fix default user spawning exec process with docker exec - Make --bridge=none not to configure the network bridge - Publish networking stats properly - Fix implicit devicemapper selection with static binaries - Fix socket connections that hung intermittently - Fix bridge interface creation on CentOS/RHEL 6.6 - Fix local dns lookups added to resolv.conf - Fix copy command mounting volumes - Fix read/write privileges in volumes mounted with --volumes-from * Remote API - Fix unmarshalling of Command and Entrypoint - Set limit for minimum client version supported - Validate port specification - Return proper errors when attach/reattach fail * Distribution - Fix pulling private images - Fix fallback between registry V2 and V1- Exclude init scripts other than systemd from the test-package- Exclude intel 32 bits arch. Docker does not built on that. Let's make it explicit.- rediff ignore-dockerinit-checksum.patch, gcc-go-build-static-libgo.patch to make them apply again. - introduce go_arches for architectures that use the go compiler instead of gcc-go - add docker-netns-aarch64.patch: Add support for AArch64 - enable build for aarch64- Build man pages only on platforms where gc compiler is available.- Updated to 1.7.0 (2015-06-16) - bnc#935570 * Runtime - Experimental feature: support for out-of-process volume plugins - The userland proxy can be disabled in favor of hairpin NAT using the daemon’s `--userland-proxy=false` flag - The `exec` command supports the `-u|--user` flag to specify the new process owner - Default gateway for containers can be specified daemon-wide using the `--default-gateway` and `--default-gateway-v6` flags - The CPU CFS (Completely Fair Scheduler) quota can be set in `docker run` using `--cpu-quota` - Container block IO can be controlled in `docker run` using`--blkio-weight` - ZFS support - The `docker logs` command supports a `--since` argument - UTS namespace can be shared with the host with `docker run --uts=host` * Quality - Networking stack was entirely rewritten as part of the libnetwork effort - Engine internals refactoring - Volumes code was entirely rewritten to support the plugins effort - Sending SIGUSR1 to a daemon will dump all goroutines stacks without exiting * Build - Support ${variable:-value} and ${variable:+value} syntax for environment variables - Support resource management flags `--cgroup-parent`, `--cpu-period`, `--cpu-quota`, `--cpuset-cpus`, `--cpuset-mems` - git context changes with branches and directories - The .dockerignore file support exclusion rules * Distribution - Client support for v2 mirroring support for the official registry * Bugfixes - Firewalld is now supported and will automatically be used when available - mounting --device recursively - Patch 0002-Stripped-dockerinit-binary.patch renamed to fix-docker-init.patch and fixed to build with latest version of docker- Add test subpackage and fix line numbers in patches- Fixed ppc64le name inside of spec file- Build docker on PPC and S390x using gcc-go provided by gcc5 * added sysconfig.docker.ppc64le: make docker daemon start on ppc64le despite some iptables issues. To be removed soon * ignore-dockerinit-checksum.patch: applied only when building with gcc-go. Required to workaround a limitation of gcc-go * gcc-go-build-static-libgo.patch: used only when building with gcc-go, link libgo statically into docker itself.- Remove set-SCC_URL-env-variable.patch, the SCC_URL is now read from SUSEConnect by the container service- Automatically set SCC_URL environment variable inside of the containers by parsing the /etc/SUSEConnect.example file * Add set-SCC_URL-env-variable.patch- Place SCC machine credentials inside of /run/secrets/credentials.d * Edit docker-mount-scc-credentials.patch¬- pass the SCC machine credentials to the container * Add docker-mount-scc-credentials.patch- build and install man pages- Update to version 1.6.2 (2015-05-13) [bnc#931301] * Revert change prohibiting mounting into /sysUpdated to version 1.6.1 (2015-05-07) [bnc#930235] * Security - Fix read/write /proc paths (CVE-2015-3630) - Prohibit VOLUME /proc and VOLUME / (CVE-2015-3631) - Fix opening of file-descriptor 1 (CVE-2015-3627) - Fix symlink traversal on container respawn allowing local privilege escalation (CVE-2015-3629) - Prohibit mount of /sys * Runtime - Update Apparmor policy to not allow mounts - Updated libcontainer-apparmor-fixes.patch: adapt patch to reflect changes introduced by docker 1.6.1- Get rid of SocketUser and SocketGroup workarounds for docker.socket- Updated to version 1.6.0 (2015-04-07) [bnc#908033] * Builder: + Building images from an image ID + build containers with resource constraints, ie `docker build --cpu-shares=100 --memory=1024m...` + `commit --change` to apply specified Dockerfile instructions while committing the image + `import --change` to apply specified Dockerfile instructions while importing the image + basic build cancellation * Client: + Windows Support * Runtime: + Container and image Labels + `--cgroup-parent` for specifying a parent cgroup to place container cgroup within + Logging drivers, `json-file`, `syslog`, or `none` + Pulling images by ID + `--ulimit` to set the ulimit on a container + `--default-ulimit` option on the daemon which applies to all created containers (and overwritten by `--ulimit` on run) - Updated '0002-Stripped-dockerinit-binary.patch' to reflect changes inside of the latest version of Docker. - bnc#908033: support of Docker Registry API v2.- enable build for armv7l- Updated docker.spec to fixed building with the latest version of our Go pacakge. - Updated 0002-Stripped-dockerinit-binary.patch to fix check made by the docker daemon against the dockerinit binary.- Updated systemd service and socket units to fix socket activation and to align with best practices recommended by upstram. Moreover socket activation fixes bnc#920645.- Updated to 1.5.0 (2015-02-10): * Builder: - Dockerfile to use for a given `docker build` can be specified with the `-f` flag - Dockerfile and .dockerignore files can be themselves excluded as part of the .dockerignore file, thus preventing modifications to these files invalidating ADD or COPY instructions cache - ADD and COPY instructions accept relative paths - Dockerfile `FROM scratch` instruction is now interpreted as a no-base specifier - Improve performance when exposing a large number of ports * Hack: - Allow client-side only integration tests for Windows - Include docker-py integration tests against Docker daemon as part of our test suites * Packaging: - Support for the new version of the registry HTTP API - Speed up `docker push` for images with a majority of already existing layers - Fixed contacting a private registry through a proxy * Remote API: - A new endpoint will stream live container resource metrics and can be accessed with the `docker stats` command - Containers can be renamed using the new `rename` endpoint and the associated `docker rename` command - Container `inspect` endpoint show the ID of `exec` commands running in this container - Container `inspect` endpoint show the number of times Docker auto-restarted the container - New types of event can be streamed by the `events` endpoint: ‘OOM’ (container died with out of memory), ‘exec_create’, and ‘exec_start' - Fixed returned string fields which hold numeric characters incorrectly omitting surrounding double quotes * Runtime: - Docker daemon has full IPv6 support - The `docker run` command can take the `--pid=host` flag to use the host PID namespace, which makes it possible for example to debug host processes using containerized debugging tools - The `docker run` command can take the `--read-only` flag to make the container’s root filesystem mounted as readonly, which can be used in combination with volumes to force a container’s processes to only write to locations that will be persisted - Container total memory usage can be limited for `docker run` using the `—memory-swap` flag - Major stability improvements for devicemapper storage driver - Better integration with host system: containers will reflect changes to the host's `/etc/resolv.conf` file when restarted - Better integration with host system: per-container iptable rules are moved to the DOCKER chain - Fixed container exiting on out of memory to return an invalid exit code * Other: - The HTTP_PROXY, HTTPS_PROXY, and NO_PROXY environment variables are properly taken into account by the client when connecting to the Docker daemon- Updated to 1.4.1 (2014-12-15): * Runtime: - Fix issue with volumes-from and bind mounts not being honored after create (fixes bnc#913213)- Added e2fsprogs as runtime dependency, this is required when the devicemapper driver is used. (bnc#913211). - Fixed owner & group for docker.socket (thanks to Andrei Dziahel and https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752555#5)- Updated to 1.4.0 (2014-12-11): * Notable Features since 1.3.0: - Set key=value labels to the daemon (displayed in `docker info`), applied with new `-label` daemon flag - Add support for `ENV` in Dockerfile of the form: `ENV name=value name2=value2...` - New Overlayfs Storage Driver - `docker info` now returns an `ID` and `Name` field - Filter events by event name, container, or image - `docker cp` now supports copying from container volumes - Fixed `docker tag`, so it honors `--force` when overriding a tag for existing image. - Changes introduced by 1.3.3 (2014-12-11): * Security: - Fix path traversal vulnerability in processing of absolute symbolic links (CVE-2014-9356) - (bnc#909709) - Fix decompression of xz image archives, preventing privilege escalation (CVE-2014-9357) - (bnc#909710) - Validate image IDs (CVE-2014-9358) - (bnc#909712) * Runtime: - Fix an issue when image archives are being read slowly * Client: - Fix a regression related to stdin redirection - Fix a regression with `docker cp` when destination is the current directory- Updated to 1.3.2 (2014-11-20) - fixes bnc#907012 (CVE-2014-6407) and bnc#907014 (CVE-2014-6408) * Security: - Fix tar breakout vulnerability - Extractions are now sandboxed chroot - Security options are no longer committed to images * Runtime: - Fix deadlock in `docker ps -f exited=1` - Fix a bug when `--volumes-from` references a container that failed to start * Registry: - `--insecure-registry` now accepts CIDR notation such as 10.1.0.0/16 - Private registries whose IPs fall in the 127.0.0.0/8 range do no need the `--insecure-registry` flag - Skip the experimental registry v2 API when mirroring is enabled - Fixed minor packaging issues.- Updated to version 1.3.1 2014-10-28) * Security: - Prevent fallback to SSL protocols < TLS 1.0 for client, daemon and registry [CVE-2014-5277] - Secure HTTPS connection to registries with certificate verification and without HTTP fallback unless `--insecure-registry` is specified * Runtime: - Fix issue where volumes would not be shared * Client: - Fix issue with `--iptables=false` not automatically setting `--ip-masq=false` - Fix docker run output to non-TTY stdout * Builder: - Fix escaping `$` for environment variables - Fix issue with lowercase `onbuild` Dockerfile instruction - Restrict envrionment variable expansion to `ENV`, `ADD`, `COPY`, `WORKDIR`, `EXPOSE`, `VOLUME` and `USER`- Upgraded to version 1.3.0 (2014-10-14) * docker `exec` allows you to run additional processes inside existing containers * docker `create` gives you the ability to create a container via the cli without executing a process * `--security-opts` options to allow user to customize container labels and apparmor profiles * docker `ps` filters * wildcard support to copy/add * move production urls to get.docker.com from get.docker.io * allocate ip address on the bridge inside a valid cidr * use drone.io for pr and ci testing * ability to setup an official registry mirror * Ability to save multiple images with docker `save`obs-power8-01 1613661693  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./012319.03.15_ce-lp152.2.9.119.03.15_ce-lp152.2.9.1    !"""""""""""###########$$$$$$$$################%%&&&&&&&&&&&&&&&&'(')*)'++','-.-/-000000000-1'2'3'4566547484494:;;;;:<<<:===:>>4?????4@@@@ABCBD@@EFG4H4I4J4K4LMMMMM4NOPPOQQRQQQQdockerVERSIONcontribREADME.mdREVIEWERSapparmormain.gotemplate.gocheck-config.shdesktop-integrationREADME.mdchromiumDockerfilegpartedDockerfiledocker-device-toolREADME.mddevice_tool.godevice_tool_windows.godocker-machine-install-bundle.shdockerd-rootless.shdockerize-disk.shdownload-frozen-image-v1.shdownload-frozen-image-v2.sheditorconfiggitdmaliasesdomain-mapgenerate_aliases.shgitdm.confighttpserverDockerfileserver.goinitopenrcdocker.confddocker.initdsystemdREVIEWERSdocker.servicedocker.service.rpmdocker.socketsysvinit-debiandockerdocker.defaultsysvinit-redhatdockerdocker.sysconfigupstartREVIEWERSdocker.confmac-install-bundle.shmkimagemkimage-alpine.shmkimage-arch-pacman.confmkimage-arch.shmkimage-archarm-pacman.confmkimage-crux.shmkimage-pld.shmkimage-yum.shmkimage.sh.febootstrap-minimizebusybox-staticdebootstrapmageia-urpmirinsennp-testDockerfilennp-test.cnuke-graph-directory.shreport-issue.shsyntaxnanoDockerfile.nanorcREADME.mdtextmateDocker.tmbundlePreferencesDockerfile.tmPreferencesSyntaxesDockerfile.tmLanguageinfo.plistREADME.mdREVIEWERSvimLICENSEREADME.mddocdockerfile.txtftdetectdockerfile.vimsyntaxdockerfile.vimsyscall-testDockerfileacct.cexit32.sns.craw.csetgid.csetuid.csocket.cuserns.cudev80-docker.rulesvagrant-dockerREADME.mdhackREADME.mdciarmexperimentaljankymasterpowerpcwindows.ps1zdinddockerfileinstallcontainerd.installerdockercli.installergometalinter.installergotestsum.installerinstall.shproxy.installerrootlesskit.installerrunc.installertini.installertomlv.installervndr.installergenerate-authors.shgenerate-swagger-api.shmakemake.ps1make.sh.binary.binary-setup.detect-daemon-osarch.ensure-emptyfs.go-autogen.go-autogen.ps1.integration-daemon-setup.integration-daemon-start.integration-daemon-stop.integration-test-helpers.resources-windowscommon.rcdocker.exe.manifestdocker.icodocker.pngdocker.rcdockerd.rcevent_messages.mcresources.goREADME.mdbinarybinary-daemonbuild-integration-test-binarycontainerutilitycrosscross-platform-dependentdynbinarydynbinary-daemoninstall-binaryruntest-docker-pytest-integrationtest-integration-clitest-integration-flakytest-integration-shellteste2e-run.shunitvalidate.swagger-yamllint.validateallchangelog-date-descendingchangelog-well-formeddcodefaultdefault-seccompdeprecate-integration-cligometalintergometalinter.jsonpkg-importsswaggerswagger-gentomlvendorvendor.shintegrationintegration-clicheckerchecker.goclibuildbuild.gocli.godaemondaemon.godaemon_swarm.goenvironmentenvironment.gofixturesauthdocker-credential-shell-testcredentialspecsvalid.jsonhttpsca.pemclient-cert.pemclient-key.pemclient-rogue-cert.pemclient-rogue-key.pemserver-cert.pemserver-key.pemserver-rogue-cert.pemserver-rogue-key.pemregistrycert.pemrequirementrequirement.gotestdataemptyLayer.tartests.mainbuildtestdataDockerfile.TestBuildMultiStageCopyDockerfile.testBuildPreserveOwnershiptests.mainconfigtests.maincontainertests.maindoc.goimagetests.maininternalcontainercontainer.goexec.goops.gostates.gonetworknetwork.goops.gostates.gorequirementrequirement.gorequirement_linux.gorequirement_windows.goswarmservice.gostates.gonetworkhelpers.gohelpers_windows.goipvlanmacvlantests.mainpluginauthzcommongraphdriverloggingcmdclose_on_startmain.godummymain.gotests.mainvolumescmddummymain.gosecrettests.mainservicetests.mainsessiontests.mainsystemtests.maintestdatahttpsca.pemclient-cert.pemclient-key.pemserver-cert.pemserver-key.pemvolumetests.mainprofilesapparmorapparmor.gotemplate.goseccompdefault.jsonfixturesexample.jsongenerate.goseccomp.goseccomp_default.goseccomp_unsupported.gotests.sh/usr/src//usr/src/docker//usr/src/docker/contrib//usr/src/docker/contrib/apparmor//usr/src/docker/contrib/desktop-integration//usr/src/docker/contrib/desktop-integration/chromium//usr/src/docker/contrib/desktop-integration/gparted//usr/src/docker/contrib/docker-device-tool//usr/src/docker/contrib/gitdm//usr/src/docker/contrib/httpserver//usr/src/docker/contrib/init//usr/src/docker/contrib/init/openrc//usr/src/docker/contrib/init/systemd//usr/src/docker/contrib/init/sysvinit-debian//usr/src/docker/contrib/init/sysvinit-redhat//usr/src/docker/contrib/init/upstart//usr/src/docker/contrib/mkimage//usr/src/docker/contrib/nnp-test//usr/src/docker/contrib/syntax//usr/src/docker/contrib/syntax/nano//usr/src/docker/contrib/syntax/textmate//usr/src/docker/contrib/syntax/textmate/Docker.tmbundle//usr/src/docker/contrib/syntax/textmate/Docker.tmbundle/Preferences//usr/src/docker/contrib/syntax/textmate/Docker.tmbundle/Syntaxes//usr/src/docker/contrib/syntax/vim//usr/src/docker/contrib/syntax/vim/doc//usr/src/docker/contrib/syntax/vim/ftdetect//usr/src/docker/contrib/syntax/vim/syntax//usr/src/docker/contrib/syscall-test//usr/src/docker/contrib/udev//usr/src/docker/contrib/vagrant-docker//usr/src/docker/hack//usr/src/docker/hack/ci//usr/src/docker/hack/dockerfile//usr/src/docker/hack/dockerfile/install//usr/src/docker/hack/make//usr/src/docker/hack/make/.resources-windows//usr/src/docker/hack/test//usr/src/docker/hack/validate//usr/src/docker/integration-cli//usr/src/docker/integration-cli/checker//usr/src/docker/integration-cli/cli//usr/src/docker/integration-cli/cli/build//usr/src/docker/integration-cli/daemon//usr/src/docker/integration-cli/environment//usr/src/docker/integration-cli/fixtures//usr/src/docker/integration-cli/fixtures/auth//usr/src/docker/integration-cli/fixtures/credentialspecs//usr/src/docker/integration-cli/fixtures/https//usr/src/docker/integration-cli/fixtures/registry//usr/src/docker/integration-cli/requirement//usr/src/docker/integration-cli/testdata//usr/src/docker/integration//usr/src/docker/integration/build//usr/src/docker/integration/build/testdata//usr/src/docker/integration/config//usr/src/docker/integration/container//usr/src/docker/integration/image//usr/src/docker/integration/internal//usr/src/docker/integration/internal/container//usr/src/docker/integration/internal/network//usr/src/docker/integration/internal/requirement//usr/src/docker/integration/internal/swarm//usr/src/docker/integration/network//usr/src/docker/integration/plugin//usr/src/docker/integration/plugin/logging//usr/src/docker/integration/plugin/logging/cmd//usr/src/docker/integration/plugin/logging/cmd/close_on_start//usr/src/docker/integration/plugin/logging/cmd/dummy//usr/src/docker/integration/plugin/volumes//usr/src/docker/integration/plugin/volumes/cmd//usr/src/docker/integration/plugin/volumes/cmd/dummy//usr/src/docker/integration/secret//usr/src/docker/integration/service//usr/src/docker/integration/session//usr/src/docker/integration/system//usr/src/docker/integration/testdata//usr/src/docker/integration/testdata/https//usr/src/docker/integration/volume//usr/src/docker/profiles//usr/src/docker/profiles/apparmor//usr/src/docker/profiles/seccomp//usr/src/docker/profiles/seccomp/fixtures/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:15810/openSUSE_Leap_15.2_Update_ports/14d2057255711efff0993a4c13538146-docker.openSUSE_Leap_15.2_Updatedrpmxz5ppc64le-suse-linux         directoryASCII textC source, ASCII textBourne-Again shell script, ASCII text executablePOSIX shell script, ASCII text executableUTF-8 Unicode texta /sbin/openrc-run script, ASCII text executableXML 1.0 document, ASCII textassembler source, ASCII textASCII text, with very long linesAlgol 68 source, ASCII textBourne-Again shell script, ASCII text executable, with very long linesUTF-8 Unicode (with BOM) textPNG image data, 400 x 400, 8-bit/color RGBA, non-interlacedTcl script, ASCII textPOSIX tar archive (GNU)ELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=4ba1b38bfcce21a267ecc6f640de70efff103b13, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=f3f19dd82a7857aed21789d3a365214a45936e78, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=812c39ac071a28af80496f7c6d1996ba5a6e6669, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=f3d49b03a8759e061755ae7f3adbbcd62e9e95ef, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=02facaacc95367317b01fb98db2cbcf622c693b6, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=c029b1341295d978e702a1962a4c39e21559cd42, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=1b33cb7c1d98b5efda0128dbc648f1e6a9459473, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=185b1431c51dd485907ff069cffd77928d5f47b0, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=a1ee2362cbbfb3b0a2b1e91464e99bfbcd3eb09c, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=29340a9486b2dc4f0dddd21d18c8666cc9f78038, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=8f0129735a06dbff2851b3720df16e8517ddd373, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=864f68ebf5e087763a6bde6a5f3db230309f732f, for GNU/Linux 3.10.0, stripped  !"#$%&'()*+,-./0123456789:;<=>?@HLPTX\`dhlptRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR R R RR RR RR RR RR RR RR RR RR RR RR RR RRR R RR RR RR RR RR RR RR RR RR RR RRjK?C9 D 'iutf-8e26759f3c826aec97eb42dafa65bf33fe09671ef296b8af6bd6a6d9c65ba4a68? 7zXZ !t/!]"k%fSB4E4`w/ *xlu߉=p m;n8[9j1TNc`nL ]%${pp # z%֛/sC/89&f~ftVW8LH􉍫EKU ,k&s}ƩDtN@ɵkZ/X^%Z %ќ8M6Xg:ڕ&rn &{'2/5qRRҤ߇Cz5>$](Yv>Bkf}jз"$cVf(U.͢oP4mJ&poFp -6*)m%Ն4(`>C89E+ $pD@]Yg=ƀM?M3s.KCGR3D}IC<Z|3EOh];VG;^B#74Lf w+('x!*NYO8Q}S'#|jjc!+k; yfŶ5OvʀG09=}#h'SÒ!<@ut!W=º29Xt`Mk ";E8@+ȖpM= K\[kvJPҋ+?P\8<+xM p 3uo!Ѱ|qA9sوK6?j? a1ӭqs ֦XF,ElJLC+:54Ⱥ VfPJTH! %3`UC+rB xShO{I`:&gV \7df|*Wm=8G7ɃVShKb Ϥ`h%.܅-Pt$ˊw[)32$I? Zc(8ͼsbuɭT, H-Ft.k$ #:`='M [DȨ8a⢝%bGbjʯ0ĸ˨=ȻDZ%g3;l@~㉴gE0~P?j}ak&0hσٵ>p;3\KmW0XK ŞPћP 8)Im|4;XD\oZ>BYוkAt,>\f W5TcJ%IGMZF^`(Q6lB'7GfRWcoes[j/ 0>5Ɔ)E(\W=J€u jN%N\e\VD&Z~X#(DÒX]lcP85F`a_De-?GƢFU72bђT(Jsi,*KjY j^(|? |`NX xHs !a:!B.v*/T8J=z6% VOoZn`-$.Y3V@M^k>÷=yϽiv3 ߅wvljuZp:Q3)Wbe˲qA1![@w7yjL( 5x}6#h_{C' uݪ_E7߻$r8_) '>&\!enӶߝV?!!% |]X0|ѳ#W![X OrXE 0us+rHpjy(=[2lY?{ϫSA v">A({s%$gQp`LބP]6BDy69M}ۜ@=kFgSP)u[eϧA"q;+w- ,3;/g>R^N^ 1B[N+ # 3lar`INFZɤ-n=ߧݷf:pti9s=r[wA>&$!Dzo[(-:lD> _Δ~LSŌn d|Ș4"9"^w3`m?i'_ t_Ҩ8S֊|ZeIȻ3P鉕gJl}V2)l*l4z%5lu|at:0lE{Q<[wZkzP@֧Cի A1A msZیIzr-c; )l"3s2;[a]d cOw~ Z4W$i ô9 ^9 &6+{19q6:燚,Ƴ鼝=KBt=upFA5IJ'"o9 Ձ 5H0`3!\@CUbd~H}1 nY8^"g?Mz{YgΘ߁&c~?W҇7|gWT@8ZqqtT{>doLmjȈCc}tKJsLdv{>m}"Z|l`AVICP-?H-oر)huGHNp-9@5o2Ajw`h07* (*v_٭q<84,gg؇|J^7}Rh *0 X .8n{vD-Múa^)[C0A; ~61:H@@dPk1lⰻ1` MZaBb^nf6CLZcۯU!GrB͎SIuW = ؖ4o/z"MP.[A>߾߶i?({+_ ΄lëL6/}Y?ӘMxf|)jM__r߸;t_|1b&VJ%Y=);!ZL_%z E)Ѯtkl07:W5pn9nMzs+92bD]D<4cddG6BV.ۯy:H}UBo=3x3"rHqSQ6Z٢U8{[R~ # (r*?ZC8[͊ ͗n%iw)` ѻ.X(k A\_LBSSdc})_E\o.N%[1XZ3F̲R!v!ۙ bh