Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package libcontainers-common for 
openSUSE:Factory checked in at 2025-06-01 21:36:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/libcontainers-common (Old)
 and      /work/SRC/openSUSE:Factory/.libcontainers-common.new.16005 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "libcontainers-common"

Sun Jun  1 21:36:16 2025 rev:76 rq:1281182 version:20250409

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/libcontainers-common/libcontainers-common.changes    
    2025-04-10 21:57:32.248313641 +0200
+++ 
/work/SRC/openSUSE:Factory/.libcontainers-common.new.16005/libcontainers-common.changes
     2025-06-01 21:36:28.761103858 +0200
@@ -1,0 +2,8 @@
+Thu May 29 16:30:56 UTC 2025 - Danish Prakash <danish.prak...@suse.com>
+
+- Sync containers.conf & storage.conf with the current c/* versions
+- Rename storage-conf-prio-list.patch to 0002-storage-conf-prio-list.patch
+- Add patch to set SUSE defaults to containers.conf:
+  * 0003-containers-conf-suse-defaults.patch
+
+-------------------------------------------------------------------

Old:
----
  storage-conf-prio-list.patch

New:
----
  0002-storage-conf-prio-list.patch
  0003-containers-conf-suse-defaults.patch

BETA DEBUG BEGIN:
  Old:- Sync containers.conf & storage.conf with the current c/* versions
- Rename storage-conf-prio-list.patch to 0002-storage-conf-prio-list.patch
- Add patch to set SUSE defaults to containers.conf:
BETA DEBUG END:

BETA DEBUG BEGIN:
  New:- Sync containers.conf & storage.conf with the current c/* versions
- Rename storage-conf-prio-list.patch to 0002-storage-conf-prio-list.patch
- Add patch to set SUSE defaults to containers.conf:
  New:- Add patch to set SUSE defaults to containers.conf:
  * 0003-containers-conf-suse-defaults.patch
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ libcontainers-common.spec ++++++
--- /var/tmp/diff_new_pack.VJlZM8/_old  2025-06-01 21:36:29.689142298 +0200
+++ /var/tmp/diff_new_pack.VJlZM8/_new  2025-06-01 21:36:29.689142298 +0200
@@ -52,7 +52,8 @@
 Source12:       openSUSE-policy.json
 Patch100:       0001-containers.conf-SUSE-clear-cni-config-dir-for-ALP.patch
 # Downstream patch to add the commented out storage driver priority list
-Patch101:       storage-conf-prio-list.patch
+Patch101:       0002-storage-conf-prio-list.patch
+Patch102:       0003-containers-conf-suse-defaults.patch
 BuildRequires:  go-go-md2man
 Requires(post): %{_bindir}/sed
 # add SLE-specific mounts for only SLES systems
@@ -121,14 +122,14 @@
 
 %prep
 cp %{SOURCE9} .
-# Apply CNI config on streams other than ALP (bsc#1213556)
-# https://github.com/containers/podman/issues/19327
+# Apply CNI config to streams that support CNI networking backend for podman 
i.e SLE-15
+# bsc#1213556 (https://github.com/containers/podman/issues/19327)
 %if 0%{?suse_version} < 1600 && !0%{?is_opensuse}
 %patch -P100 -p3
 sed -e 's-@LIBEXECDIR@-%{_libexecdir}-g' -i %_builddir/containers.conf
 %endif
 cp %{SOURCE4} .
-%patch -P101
+%patch -P101 -P102
 
 %setup -q -Tcq -b0 -b1 -b8
 # copy the LICENSE file in the build root

++++++ 0002-storage-conf-prio-list.patch ++++++
Index: storage.conf
===================================================================
--- storage.conf        (revision 71490d8c0a9096277f3511c4adb298db)
+++ storage.conf        (working copy)
@@ -21,7 +21,7 @@
 
 # Priority list for the storage drivers that will be tested one
 # after the other to pick the storage driver if it is not defined.
-# driver_priority = ["overlay", "btrfs"]
+# driver_priority = ["btrfs", "overlay"]
 
 # Primary Read/Write location of container storage
 # When changing the graphroot location on an SELinux system, you must

++++++ 0003-containers-conf-suse-defaults.patch ++++++
Index: containers.conf
===================================================================
--- containers.conf     (revision 71490d8c0a9096277f3511c4adb298db)
+++ containers.conf     (working copy)
@@ -378,7 +378,7 @@
 # drivers are "iptables", "nftables", "none" (no firewall rules will be 
created) and "firewalld" (firewalld is
 # experimental at the moment and not recommend outside of testing).
 #
-#firewall_driver = ""
+firewall_driver = "nftables"
 
 
 # The network name of the default network to attach pods to.
@@ -715,7 +715,7 @@
 
 # Default OCI runtime
 #
-#runtime = "crun"
+runtime = "runc"
 
 # List of the OCI runtimes that support --format=json. When json is supported
 # engine will use it for reporting nicer errors.

++++++ containers.conf ++++++
--- /var/tmp/diff_new_pack.VJlZM8/_old  2025-06-01 21:36:29.793146605 +0200
+++ /var/tmp/diff_new_pack.VJlZM8/_new  2025-06-01 21:36:29.797146771 +0200
@@ -27,16 +27,19 @@
 #
 #apparmor_profile = "container-default"
 
-# The hosts entries from the base hosts file are added to the containers hosts
-# file. This must be either an absolute path or as special values "image" which
-# uses the hosts file from the container image or "none" which means
-# no base hosts file is used. The default is "" which will use /etc/hosts.
+# Base file to create the `/etc/hosts` file inside the container. This must 
either
+# be an absolute path to a file on the host system, or one of the following
+# special flags:
+# ""      Use the host's `/etc/hosts` file (the default)
+# `none`  Do not use a base file (i.e. start with an empty file)
+# `image` Use the container image's `/etc/hosts` file as base file
 #
 #base_hosts_file = ""
 
 # List of cgroup_conf entries specifying a list of cgroup files to write to and
 # their values. For example `memory.high=1073741824` sets the
 # memory.high limit to 1GB.
+#
 # cgroup_conf = []
 
 # Default way to to create a cgroup namespace for the container
@@ -55,6 +58,14 @@
 #
 #cgroups = "enabled"
 
+# When no hostname is set for a container, use the container's name, with
+# characters not valid for a hostname removed, as the hostname instead of
+# the first 12 characters of the container's ID. Containers not running
+# in a private UTS namespace will have their hostname set to the host's
+# hostname regardless of this setting.
+#
+#container_name_as_hostname = false
+
 # List of default capabilities for containers. If it is empty or commented out,
 # the default capabilities defined in the container engine will be added.
 #
@@ -126,13 +137,25 @@
 #
 #env_host = false
 
-# Set the ip for the host.containers.internal entry in the containers 
/etc/hosts
-# file. This can be set to "none" to disable adding this entry. By default it
-# will automatically choose the host ip.
-#
-# NOTE: When using podman machine this entry will never be added to the 
containers
-# hosts file instead the gvproxy dns resolver will resolve this hostname. 
Therefore
-# it is not possible to disable the entry in this case.
+# Set the IP address the container should expect to connect to the host. The IP
+# address is used by Podman to automatically add the `host.containers.internal`
+# and `host.docker.internal` hostnames to the container's `/etc/hosts` file. It
+# is also used for the *host-gateway* flag of Podman's `--add-host` CLI option.
+# If no IP address is configured (the default), Podman will try to determine it
+# automatically, but might fail to do so depending on the container's network
+# setup. Adding these internal hostnames to `/etc/hosts` is silently skipped 
then.
+# Set this config to `none` to never add the internal hostnames to 
`/etc/hosts`.
+#
+# Note: If Podman is running in a virtual machine using `podman machine` (this
+# includes Mac and Windows hosts), Podman will silently skip adding the 
internal
+# hostnames to `/etc/hosts`, unless an IP address was configured manually. The
+# internal hostnames are resolved by the gvproxy DNS resolver instead. This 
config
+# has no effect on gvproxy. However, since `/etc/hosts` bypasses the DNS 
resolver,
+# a manually configured IP address still takes precedence.
+#
+# Note: This config doesn't affect the actual network setup, it just tells 
Podman
+# the IP address it should expect. Configuring an IP address here doesn't 
ensure
+# that the container can actually reach the host using this IP address.
 #
 #host_containers_internal_ip = ""
 
@@ -221,8 +244,10 @@
 #
 #netns = "private"
 
-# Create /etc/hosts for the container.  By default, container engine manage
-# /etc/hosts, automatically adding  the container's  own  IP  address.
+# Do not modify the `/etc/hosts` file in the container. Podman assumes control
+# over the container's `/etc/hosts` file by default; refer to the `--add-host`
+# CLI option for details. To disable this, either set this config to `true`, or
+# use the functionally identical `--no-hosts` CLI option.
 #
 #no_hosts = false
 
@@ -353,7 +378,7 @@
 # drivers are "iptables", "nftables", "none" (no firewall rules will be 
created) and "firewalld" (firewalld is
 # experimental at the moment and not recommend outside of testing).
 #
-firewall_driver = "nftables"
+#firewall_driver = ""
 
 
 # The network name of the default network to attach pods to.
@@ -416,6 +441,8 @@
 #List of compression algorithms. If set makes sure that requested compression 
variant
 #for each platform is added to the manifest list keeping original instance 
intact in
 #the same manifest list on every `manifest push`. Supported values are 
(`gzip`, `zstd` and `zstd:chunked`).
+#`zstd:chunked` is incompatible with encrypting images, and will be treated as 
`zstd` with a warning
+#in that case.
 #
 #add_compression = ["gzip", "zstd", "zstd:chunked"]
 
@@ -438,6 +465,8 @@
 # This field is ignored when pushing images to the docker-daemon and
 # docker-archive formats. It is also ignored when the manifest format is set
 # to v2s2.
+# `zstd:chunked` is incompatible with encrypting images, and will be treated 
as `zstd` with a warning
+# in that case.
 #
 #compression_format = "gzip"
 
@@ -686,7 +715,7 @@
 
 # Default OCI runtime
 #
-runtime = "runc"
+#runtime = "crun"
 
 # List of the OCI runtimes that support --format=json. When json is supported
 # engine will use it for reporting nicer errors.
@@ -865,7 +894,15 @@
 
 # Virtualization provider used to run Podman machine.
 # If it is empty or commented out, the default provider will be used.
-#
+# Linux:
+#    qemu    - Open source machine emulator and virtualizer. (Default)
+# Windows: there are currently two options:
+#    wsl     - Windows Subsystem for Linux (Default) 
+#    hyperv  - Windows Server Virtualization
+# Mac: there are currently two options:
+#    applehv - Default Apple Hypervisor (Default)
+#    libkrun - Launch virtual machines using the libkrun platform, optimized
+#              for sharing GPU with the machine.
 #provider = ""
 
 # Rosetta supports running x86_64 Linux binaries on a Podman machine on Apple 
silicon.


++++++ storage.conf ++++++
--- /var/tmp/diff_new_pack.VJlZM8/_old  2025-06-01 21:36:29.901151079 +0200
+++ /var/tmp/diff_new_pack.VJlZM8/_new  2025-06-01 21:36:29.905151245 +0200
@@ -8,20 +8,24 @@
 #      /usr/containers/storage.conf
 #      /etc/containers/storage.conf
 #      $HOME/.config/containers/storage.conf
-#      $XDG_CONFIG_HOME/containers/storage.conf (If XDG_CONFIG_HOME is set)
+#      $XDG_CONFIG_HOME/containers/storage.conf (if XDG_CONFIG_HOME is set)
 # See man 5 containers-storage.conf for more information
-# The "container storage" table contains all of the server options.
+# The "storage" table contains all of the server options.
 [storage]
 
-# Default Storage Driver, Must be set for proper operation.
+# Default storage driver, must be set for proper operation.
 driver = "overlay"
 
 # Temporary storage location
 runroot = "/run/containers/storage"
 
+# Priority list for the storage drivers that will be tested one
+# after the other to pick the storage driver if it is not defined.
+# driver_priority = ["overlay", "btrfs"]
+
 # Primary Read/Write location of container storage
-# When changing the graphroot location on an SELINUX system, you must
-# ensure  the labeling matches the default locations labels with the
+# When changing the graphroot location on an SELinux system, you must
+# ensure the labeling matches the default location's labels with the
 # following commands:
 # semanage fcontext -a -e /var/lib/containers/storage /NEWSTORAGEPATH
 # restorecon -R -v /NEWSTORAGEPATH
@@ -50,54 +54,50 @@
 additionalimagestores = [
 ]
 
-# Allows specification of how storage is populated when pulling images. This
-# option can speed the pulling process of images compressed with format
-# zstd:chunked. Containers/storage looks for files within images that are being
-# pulled from a container registry that were previously pulled to the host.  It
-# can copy or create a hard link to the existing file when it finds them,
-# eliminating the need to pull them from the container registry. These options
-# can deduplicate pulling of content, disk storage of content and can allow the
-# kernel to use less memory when running containers.
-
-# containers/storage supports four keys
-#   * enable_partial_images="true" | "false"
-#     Tells containers/storage to look for files previously pulled in storage
-#     rather then always pulling them from the container registry.
-#   * use_hard_links = "false" | "true"
-#     Tells containers/storage to use hard links rather then create new files 
in
-#     the image, if an identical file already existed in storage.
-#   * ostree_repos = ""
-#     Tells containers/storage where an ostree repository exists that might 
have
-#     previously pulled content which can be used when attempting to avoid
-#     pulling content from the container registry
-#   * convert_images = "false" | "true"
-#     If set to true, containers/storage will convert images to a
-#     format compatible with partial pulls in order to take advantage
-#     of local deduplication and hard linking.  It is an expensive
-#     operation so it is not enabled by default.
-pull_options = {enable_partial_images = "true", use_hard_links = "false", 
ostree_repos=""}
-
-# Remap-UIDs/GIDs is the mapping from UIDs/GIDs as they should appear inside of
-# a container, to the UIDs/GIDs as they should appear outside of the container,
-# and the length of the range of UIDs/GIDs.  Additional mapped sets can be
-# listed and will be heeded by libraries, but there are limits to the number of
-# mappings which the kernel will allow when you later attempt to run a
-# container.
-#
-# remap-uids = "0:1668442479:65536"
-# remap-gids = "0:1668442479:65536"
-
-# Remap-User/Group is a user name which can be used to look up one or more 
UID/GID
-# ranges in the /etc/subuid or /etc/subgid file.  Mappings are set up starting
-# with an in-container ID of 0 and then a host-level ID taken from the lowest
-# range that matches the specified name, and using the length of that range.
-# Additional ranges are then assigned, using the ranges which specify the
-# lowest host-level IDs first, to the lowest not-yet-mapped in-container ID,
-# until all of the entries have been used for maps. This setting overrides the
-# Remap-UIDs/GIDs setting.
+# Options controlling how storage is populated when pulling images.
+[storage.options.pull_options]
+# Enable the "zstd:chunked" feature, which allows partial pulls, reusing
+# content that already exists on the system. This is disabled by default,
+# and must be explicitly enabled to be used. For more on zstd:chunked, see
+# 
https://github.com/containers/storage/blob/main/docs/containers-storage-zstd-chunked.md
+# This is a "string bool": "false" | "true" (cannot be native TOML boolean)
+# enable_partial_images = "false"
+
+# Tells containers/storage to use hard links rather then create new files in
+# the image, if an identical file already existed in storage.
+# This is a "string bool": "false" | "true" (cannot be native TOML boolean)
+# use_hard_links = "false"
+
+# Path to an ostree repository that might have
+# previously pulled content which can be used when attempting to avoid
+# pulling content from the container registry.
+# ostree_repos=""
+
+# If set to "true", containers/storage will convert images that are
+# not already in zstd:chunked format to that format before processing
+# in order to take advantage of local deduplication and hard linking.
+# It is an expensive operation so it is not enabled by default.
+# This is a "string bool": "false" | "true" (cannot be native TOML boolean)
+# convert_images = "false"
+
+# This should ALMOST NEVER be set.
+# It allows partial pulls of images without guaranteeing that "partial
+# pulls" and non-partial pulls both result in consistent image contents.
+# This allows pulling estargz images and early versions of zstd:chunked images;
+# otherwise, these layers always use the traditional non-partial pull path.
+#
+# This option should be enabled EXTREMELY rarely, only if ALL images that could
+# EVER be conceivably pulled on this system are GUARANTEED (e.g. using a 
signature policy)
+# to come from a build system trusted to never attack image integrity.
+#
+# If this consistency enforcement were disabled, malicious images could be 
built
+# in a way designed to evade other audit mechanisms, so presence of most other 
audit
+# mechanisms is not a replacement for the above-mentioned need for all images 
to come
+# from a trusted build system.
 #
-# remap-user = "containers"
-# remap-group = "containers"
+# As a side effect, enabling this option will also make image IDs unpredictable
+# (usually not equal to the traditional value matching the config digest).
+# insecure_allow_unpredictable_image_contents = "false"
 
 # Root-auto-userns-user is a user name which can be used to look up one or 
more UID/GID
 # ranges in the /etc/subuid and /etc/subgid file.  These ranges will be 
partitioned
@@ -120,6 +120,7 @@
 # squashed down to the default uid in the container.  These images will have no
 # separation between the users in the container. Only supported for the overlay
 # and vfs drivers.
+# This is a "string bool": "false" | "true" (cannot be native TOML boolean)
 #ignore_chown_errors = "false"
 
 # Inodes is used to set a maximum inodes of the container image.
@@ -133,9 +134,11 @@
 mountopt = "nodev"
 
 # Set to skip a PRIVATE bind mount on the storage home directory.
+# This is a "string bool": "false" | "true" (cannot be native TOML boolean)
 # skip_mount_home = "false"
 
 # Set to use composefs to mount data layers with overlay.
+# This is a "string bool": "false" | "true" (cannot be native TOML boolean)
 # use_composefs = "false"
 
 # Size is used to set a maximum size of the container image.

Reply via email to