Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package docker for openSUSE:Factory checked 
in at 2022-12-08 16:49:57
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/docker (Old)
 and      /work/SRC/openSUSE:Factory/.docker.new.1835 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "docker"

Thu Dec  8 16:49:57 2022 rev:126 rq:1040675 version:20.10.21_ce

Changes:
--------
--- /work/SRC/openSUSE:Factory/docker/docker.changes    2022-10-25 
11:18:28.473932799 +0200
+++ /work/SRC/openSUSE:Factory/.docker.new.1835/docker.changes  2022-12-08 
16:50:04.923144264 +0100
@@ -1,0 +2,18 @@
+Tue Dec  6 11:49:32 UTC 2022 - Aleksa Sarai <asa...@suse.com>
+
+- Update to Docker 20.10.21-ce. See upstream changelog online at
+  <https://docs.docker.com/engine/release-notes/#201021>. bsc#1206065
+- Rebase patches:
+  * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch
+  * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch
+  * 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch
+  * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch
+  * 0005-bsc1183855-btrfs-Do-not-disable-quota-on-cleanup.patch
+  * 0006-bsc1193930-vendor-update-golang.org-x-crypto.patch
+  * 0007-bsc1200022-fifo.Close-prevent-possible-panic-if-fifo.patch
+- The PRIVATE-REGISTRY patch will now output a warning if it is being used (in
+  preparation for removing the feature). This feature was never meant to be
+  used by users directly (and is only available in the -kubic/CaaSP version of
+  the package anyway) and thus should not affect any users.
+
+-------------------------------------------------------------------

Old:
----
  docker-20.10.17_ce_a89b84221c85.tar.xz
  docker-cli-20.10.17_ce.tar.xz
  docker-libnetwork-f6ccccb1c082a432c2a5814aaedaca56af33d9ea.tar.xz

New:
----
  docker-20.10.21_ce_3056208812eb.tar.xz
  docker-cli-20.10.21_ce.tar.xz
  docker-libnetwork-0dde5c895075df6e3630e76f750a447cf63f4789.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ docker.spec ++++++
--- /var/tmp/diff_new_pack.Vwuf4n/_old  2022-12-08 16:50:05.879149155 +0100
+++ /var/tmp/diff_new_pack.Vwuf4n/_new  2022-12-08 16:50:05.883149175 +0100
@@ -42,24 +42,25 @@
 # helpfully injects into our build environment from the changelog). If you want
 # to generate a new git_commit_epoch, use this:
 #  $ date --date="$(git show --format=fuller --date=iso $COMMIT_ID | grep -oP 
'(?<=^CommitDate: ).*')" '+%s'
-%define git_version a89b84221c85
-%define git_commit_epoch 1654554758
+%define real_version 20.10.21
+%define git_version 3056208812eb
+%define git_commit_epoch 1666698255
 
 # We require a specific pin of libnetwork because it doesn't really do
 # versioning and minor version mismatches in libnetwork can break Docker
 # networking. All other key runtime dependencies (containerd, runc) are stable
 # enough that this isn't necessary.
-%define libnetwork_version f6ccccb1c082a432c2a5814aaedaca56af33d9ea
+%define libnetwork_version 0dde5c895075df6e3630e76f750a447cf63f4789
 
 %define dist_builddir  %{_builddir}/dist-suse
 %define cli_builddir   %{dist_builddir}/src/github.com/docker/cli
 %define proxy_builddir %{dist_builddir}/src/github.com/docker/libnetwork
 
 Name:           %{realname}%{name_suffix}
-Version:        20.10.17_ce
+Version:        %{real_version}_ce
 # This "nice version" is so that docker --version gives a result that can be
 # parsed by other people. boo#1182476
-%define nice_version 20.10.17-ce
+%define nice_version %{real_version}-ce
 Release:        0
 Summary:        The Moby-project Linux container runtime
 License:        Apache-2.0
@@ -117,8 +118,8 @@
 BuildRequires:  pkgconfig(libsystemd)
 BuildRequires:  sysuser-tools
 # Due to a limitation in openSUSE's Go packaging we cannot have a BuildRequires
-# for 'golang(API) >= 1.17' here, so just require 1.17 exactly. bsc#1172608
-BuildRequires:  go1.17
+# for 'golang(API) >= 1.18' here, so just require 1.18 exactly. bsc#1172608
+BuildRequires:  go1.18
 Requires:       (apparmor-parser or container-selinux)
 Requires:       ca-certificates-mozilla
 # The docker-proxy binary used to be in a separate package. We obsolete it,
@@ -128,7 +129,7 @@
 # Required to actually run containers. We require the minimum version that is
 # pinned by Docker, but in order to avoid headaches we allow for updates.
 Requires:       runc >= 1.1.2
-Requires:       containerd >= 1.6.6
+Requires:       containerd >= 1.6.9
 # Needed for --init support. We don't use "tini", we use our own implementation
 # which handles edge-cases better.
 Requires:       catatonit

++++++ 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch ++++++
--- /var/tmp/diff_new_pack.Vwuf4n/_old  2022-12-08 16:50:05.911149319 +0100
+++ /var/tmp/diff_new_pack.Vwuf4n/_new  2022-12-08 16:50:05.911149319 +0100
@@ -1,7 +1,7 @@
-From 37dfb97c0016300dd6453fc718805ccdf341bfd6 Mon Sep 17 00:00:00 2001
+From 823bedd07fac6778a3d94b6f949ac16e6bd12638 Mon Sep 17 00:00:00 2001
 From: Aleksa Sarai <asa...@suse.de>
 Date: Wed, 8 Mar 2017 12:41:54 +1100
-Subject: [PATCH 1/6] SECRETS: daemon: allow directory creation in /run/secrets
+Subject: [PATCH 1/7] SECRETS: daemon: allow directory creation in /run/secrets
 
 Since FileMode can have the directory bit set, allow a SecretStore
 implementation to return secrets that are actually directories. This is
@@ -70,6 +70,6 @@
                        return errors.Wrap(err, "error setting ownership for 
secret")
                }
 -- 
-2.36.1
+2.38.1
 
 

++++++ 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch ++++++
--- /var/tmp/diff_new_pack.Vwuf4n/_old  2022-12-08 16:50:05.923149380 +0100
+++ /var/tmp/diff_new_pack.Vwuf4n/_new  2022-12-08 16:50:05.927149401 +0100
@@ -1,7 +1,7 @@
-From 11ac23e5620ee53c9527334d2222b32ca5098876 Mon Sep 17 00:00:00 2001
+From fa24396cbecbb6cdc7c734559389486849c2268c Mon Sep 17 00:00:00 2001
 From: Aleksa Sarai <asa...@suse.de>
 Date: Wed, 8 Mar 2017 11:43:29 +1100
-Subject: [PATCH 2/6] SECRETS: SUSE: implement SUSE container secrets
+Subject: [PATCH 2/7] SECRETS: SUSE: implement SUSE container secrets
 
 This allows for us to pass in host credentials to a container, allowing
 for SUSEConnect to work with containers.
@@ -451,6 +451,6 @@
 +      return nil
 +}
 -- 
-2.36.1
+2.38.1
 
 

++++++ 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch ++++++
--- /var/tmp/diff_new_pack.Vwuf4n/_old  2022-12-08 16:50:05.939149462 +0100
+++ /var/tmp/diff_new_pack.Vwuf4n/_new  2022-12-08 16:50:05.939149462 +0100
@@ -1,7 +1,7 @@
-From cf3c6ccefda39c60dc656404674628ac48b55de9 Mon Sep 17 00:00:00 2001
+From 0fe6aba9612d2b483b29192c0605b1311b77a92b Mon Sep 17 00:00:00 2001
 From: Valentin Rothberg <vrothb...@suse.com>
 Date: Mon, 2 Jul 2018 13:37:34 +0200
-Subject: [PATCH 3/6] PRIVATE-REGISTRY: add private-registry mirror support
+Subject: [PATCH 3/7] PRIVATE-REGISTRY: add private-registry mirror support
 
 NOTE: This is a backport/downstream patch of the upstream pull-request
       for Moby, which is still subject to changes.  Please visit
@@ -72,12 +72,12 @@
  distribution/pull.go           |   2 +-
  distribution/pull_v2.go        |   2 +-
  distribution/push.go           |   2 +-
- registry/config.go             | 126 ++++++++++++++++++++++++++++-
+ registry/config.go             | 133 +++++++++++++++++++++++++++++-
  registry/config_test.go        | 142 ++++++++++++++++++++++++++++++++
  registry/registry_test.go      |  99 ++++++++++++++++++++---
  registry/service.go            |  43 +++++++---
- registry/service_v2.go         |  64 +++++++++++----
- 12 files changed, 710 insertions(+), 46 deletions(-)
+ registry/service_v2.go         |  63 +++++++++++----
+ 12 files changed, 716 insertions(+), 46 deletions(-)
 
 diff --git a/api/types/registry/registry.go b/api/types/registry/registry.go
 index 53e47084c8d5..b4bb9ef805d3 100644
@@ -444,10 +444,10 @@
                return err
        }
 diff --git a/distribution/pull_v2.go b/distribution/pull_v2.go
-index 123abf6b497a..097ead45d0fd 100644
+index 5abd18b6cf7c..0796e7ea1d52 100644
 --- a/distribution/pull_v2.go
 +++ b/distribution/pull_v2.go
-@@ -432,7 +432,7 @@ func (p *v2Puller) pullV2Tag(ctx context.Context, ref 
reference.Named, platform
+@@ -433,7 +433,7 @@ func (p *v2Puller) pullV2Tag(ctx context.Context, ref 
reference.Named, platform
        // the other side speaks the v2 protocol.
        p.confirmedV2 = true
  
@@ -470,7 +470,7 @@
                return err
        }
 diff --git a/registry/config.go b/registry/config.go
-index 54b83fa40aab..e1ba24b83bdd 100644
+index 54b83fa40aab..5adc913e4344 100644
 --- a/registry/config.go
 +++ b/registry/config.go
 @@ -14,11 +14,12 @@ import (
@@ -512,7 +512,7 @@
        config := &serviceConfig{
                ServiceConfig: registrytypes.ServiceConfig{
                        InsecureRegistryCIDRs: make([]*registrytypes.NetIPNet, 
0),
-@@ -78,10 +92,106 @@ func newServiceConfig(options ServiceOptions) 
(*serviceConfig, error) {
+@@ -78,10 +92,113 @@ func newServiceConfig(options ServiceOptions) 
(*serviceConfig, error) {
        if err := config.LoadInsecureRegistries(options.InsecureRegistries); 
err != nil {
                return nil, err
        }
@@ -531,6 +531,13 @@
 +func (config *serviceConfig) checkRegistries() error {
 +      inUse := make(map[string]string) // key: host, value: user
 +
++      if len(config.Registries) > 0 {
++              logrus.Errorf("[SUSE] You are currently using an unsupported 
and out-of-tree Docker feature intended for internal SUSE only.")
++              logrus.Errorf("[SUSE] If you see this warning (and you are not 
using CaaSP) please open a SUSE bug report to alert us of this.")
++              logrus.Errorf("[SUSE] This feature (registry mirrors) will be 
removed in a future Docker release on SUSE.")
++              logrus.Errorf("[SUSE] Please DO NOT submit an upstream bug 
report about this warning!")
++      }
++
 +      // make sure that each mirror serves only one registry
 +      for _, reg := range config.Registries {
 +              for _, mirror := range reg.Mirrors {
@@ -619,7 +626,7 @@
  // LoadAllowNondistributableArtifacts loads allow-nondistributable-artifacts 
registries into config.
  func (config *serviceConfig) LoadAllowNondistributableArtifacts(registries 
[]string) error {
        cidrs := map[string]*registrytypes.NetIPNet{}
-@@ -122,6 +232,10 @@ func (config *serviceConfig) 
LoadAllowNondistributableArtifacts(registries []str
+@@ -122,6 +239,10 @@ func (config *serviceConfig) 
LoadAllowNondistributableArtifacts(registries []str
  // LoadMirrors loads mirrors to config, after removing duplicates.
  // Returns an error if mirrors contains an invalid mirror.
  func (config *serviceConfig) LoadMirrors(mirrors []string) error {
@@ -630,7 +637,7 @@
        mMap := map[string]struct{}{}
        unique := []string{}
  
-@@ -151,6 +265,10 @@ func (config *serviceConfig) LoadMirrors(mirrors 
[]string) error {
+@@ -151,6 +272,10 @@ func (config *serviceConfig) LoadMirrors(mirrors 
[]string) error {
  
  // LoadInsecureRegistries loads insecure registries to config
  func (config *serviceConfig) LoadInsecureRegistries(registries []string) 
error {
@@ -1042,10 +1049,10 @@
                for _, endpoint := range allEndpoints {
                        if !endpoint.Mirror {
 diff --git a/registry/service_v2.go b/registry/service_v2.go
-index 3e3a5b41ffbd..451a6f874bc1 100644
+index 154ac7c93e80..06f7d20de8f9 100644
 --- a/registry/service_v2.go
 +++ b/registry/service_v2.go
-@@ -1,39 +1,71 @@
+@@ -1,42 +1,73 @@
  package registry // import "github.com/docker/docker/registry"
  
  import (
@@ -1060,17 +1067,7 @@
 -func (s *DefaultService) lookupV2Endpoints(hostname string) (endpoints 
[]APIEndpoint, err error) {
 +func (s *DefaultService) lookupV2Endpoints(reference string) (endpoints 
[]APIEndpoint, err error) {
        tlsConfig := tlsconfig.ServerDefault()
--      if hostname == DefaultNamespace || hostname == IndexHostname {
--              for _, mirror := range s.config.Mirrors {
--                      if !strings.HasPrefix(mirror, "http://";) && 
!strings.HasPrefix(mirror, "https://";) {
--                              mirror = "https://"; + mirror
--                      }
--                      mirrorURL, err := url.Parse(mirror)
--                      if err != nil {
--                              return nil, err
--                      }
--                      mirrorTLSConfig, err := s.tlsConfigForMirror(mirrorURL)
-+
+ 
 +      // extraxt the hostname from the reference
 +      refURL := reference
 +      if !strings.HasPrefix(refURL, "http://";) && !strings.HasPrefix(refURL, 
"https://";) {
@@ -1085,6 +1082,18 @@
 +              return nil, fmt.Errorf("SUSE PATCH [lookupV2Endpoints]: cannot 
determine hostname of reference %s", reference)
 +      }
 +
+       ana := allowNondistributableArtifacts(s.config, hostname)
+ 
+-      if hostname == DefaultNamespace || hostname == IndexHostname {
+-              for _, mirror := range s.config.Mirrors {
+-                      if !strings.HasPrefix(mirror, "http://";) && 
!strings.HasPrefix(mirror, "https://";) {
+-                              mirror = "https://"; + mirror
+-                      }
+-                      mirrorURL, err := url.Parse(mirror)
+-                      if err != nil {
+-                              return nil, err
+-                      }
+-                      mirrorTLSConfig, err := s.tlsConfigForMirror(mirrorURL)
 +      // create endpoints for official and configured registries
 +      official := false
 +      if hostname == "docker.io" {
@@ -1131,8 +1140,8 @@
 +                      Official:     official,
                        TrimHostname: true,
                        TLSConfig:    tlsConfig,
-               })
-@@ -45,7 +77,7 @@ func (s *DefaultService) lookupV2Endpoints(hostname string) 
(endpoints []APIEndp
+ 
+@@ -48,7 +79,7 @@ func (s *DefaultService) lookupV2Endpoints(hostname string) 
(endpoints []APIEndp
  
        tlsConfig, err = s.tlsConfig(hostname)
        if err != nil {
@@ -1142,6 +1151,6 @@
  
        endpoints = []APIEndpoint{
 -- 
-2.36.1
+2.38.1
 
 

++++++ 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch ++++++
--- /var/tmp/diff_new_pack.Vwuf4n/_old  2022-12-08 16:50:05.951149523 +0100
+++ /var/tmp/diff_new_pack.Vwuf4n/_new  2022-12-08 16:50:05.955149544 +0100
@@ -1,7 +1,7 @@
-From 5d2f7a37a37547663aae1538b2d3fd48dd7277c8 Mon Sep 17 00:00:00 2001
+From bc52d15141402d94eeaee618f1df0b540f527b98 Mon Sep 17 00:00:00 2001
 From: Aleksa Sarai <asa...@suse.de>
 Date: Fri, 29 Jun 2018 17:59:30 +1000
-Subject: [PATCH 4/6] bsc1073877: apparmor: clobber docker-default profile on
+Subject: [PATCH 4/7] bsc1073877: apparmor: clobber docker-default profile on
  start
 
 In the process of making docker-default reloading far less expensive,
@@ -69,10 +69,10 @@
        return nil
  }
 diff --git a/daemon/daemon.go b/daemon/daemon.go
-index 2a2fbbd52e19..0999ac3186b7 100644
+index f15a4b038498..2f0c23bc62c9 100644
 --- a/daemon/daemon.go
 +++ b/daemon/daemon.go
-@@ -855,8 +855,9 @@ func NewDaemon(ctx context.Context, config *config.Config, 
pluginStore *plugin.S
+@@ -857,8 +857,9 @@ func NewDaemon(ctx context.Context, config *config.Config, 
pluginStore *plugin.S
                logrus.Warnf("Failed to configure golang's threads limit: %v", 
err)
        }
  
@@ -85,6 +85,6 @@
        }
  
 -- 
-2.36.1
+2.38.1
 
 

++++++ 0005-bsc1183855-btrfs-Do-not-disable-quota-on-cleanup.patch ++++++
--- /var/tmp/diff_new_pack.Vwuf4n/_old  2022-12-08 16:50:05.967149605 +0100
+++ /var/tmp/diff_new_pack.Vwuf4n/_new  2022-12-08 16:50:05.971149626 +0100
@@ -1,7 +1,7 @@
-From b54c6c7addcb163ddcef5e37fc7ed1c0afd0dbfa Mon Sep 17 00:00:00 2001
+From 57673ad5455b1b27e41716e33b67c9cd8099b580 Mon Sep 17 00:00:00 2001
 From: Michal Rostecki <mroste...@opensuse.org>
 Date: Thu, 8 Apr 2021 14:42:02 +0100
-Subject: [PATCH 5/6] bsc1183855: btrfs: Do not disable quota on cleanup
+Subject: [PATCH 5/7] bsc1183855: btrfs: Do not disable quota on cleanup
 
 Before this change, cleanup of the btrfs driver (occuring on each daemon
 shutdown) resulted in disabling quotas. It was done with an assumption
@@ -140,6 +140,6 @@
                        }
                        if err := subvolLimitQgroup(dir, size); err != nil {
 -- 
-2.36.1
+2.38.1
 
 

++++++ 0006-bsc1193930-vendor-update-golang.org-x-crypto.patch ++++++
--- /var/tmp/diff_new_pack.Vwuf4n/_old  2022-12-08 16:50:05.995149748 +0100
+++ /var/tmp/diff_new_pack.Vwuf4n/_new  2022-12-08 16:50:06.019149871 +0100
@@ -1,7 +1,7 @@
-From bb67252dfccb18dacc9e0c3463e7c52f32fb2900 Mon Sep 17 00:00:00 2001
+From dd265ac6cbe070f80a0c607ba147af35858ae5e9 Mon Sep 17 00:00:00 2001
 From: Aleksa Sarai <asa...@suse.de>
 Date: Fri, 29 Apr 2022 12:44:21 +1000
-Subject: [PATCH 6/6] bsc1193930: vendor: update golang.org/x/crypto
+Subject: [PATCH 6/7] bsc1193930: vendor: update golang.org/x/crypto
 
 This is necessary to fix several security issues that Docker hasn't
 backported to their CE branch:
@@ -354,10 +354,10 @@
  create mode 100644 vendor/golang.org/x/crypto/xts/xts.go
 
 diff --git a/vendor.conf b/vendor.conf
-index 54e97e4562d8..9ff95d499ef8 100644
+index a41471b57b71..2965c71c3709 100644
 --- a/vendor.conf
 +++ b/vendor.conf
-@@ -150,7 +150,7 @@ github.com/golang/protobuf                          
84668698ea25b64748563aa20726
+@@ -152,7 +152,7 @@ github.com/golang/protobuf                          
84668698ea25b64748563aa20726
  github.com/cloudflare/cfssl                         
5d63dbd981b5c408effbb58c442d54761ff94fbd # 1.3.2
  github.com/fernet/fernet-go                         
9eac43b88a5efb8651d24de9b68e87567e029736
  github.com/google/certificate-transparency-go       
37a384cd035e722ea46e55029093e26687138edf # v1.0.20
@@ -41068,6 +41068,6 @@
 +      }
 +}
 -- 
-2.36.1
+2.38.1
 
 

++++++ 0007-bsc1200022-fifo.Close-prevent-possible-panic-if-fifo.patch ++++++
--- /var/tmp/diff_new_pack.Vwuf4n/_old  2022-12-08 16:50:06.043149994 +0100
+++ /var/tmp/diff_new_pack.Vwuf4n/_new  2022-12-08 16:50:06.047150015 +0100
@@ -1,4 +1,4 @@
-From 078fbd36b8fecab42ac7faad973a16aed10ab28c Mon Sep 17 00:00:00 2001
+From 6451aa1559ce5a135f599682ab33721e116925bd Mon Sep 17 00:00:00 2001
 From: Sebastiaan van Stijn <git...@gone.nl>
 Date: Fri, 29 Jan 2021 14:55:08 +0100
 Subject: [PATCH 7/7] bsc1200022: fifo.Close(): prevent possible panic if fifo
@@ -52,6 +52,6 @@
                case <-f.closed:
                        f.handle.Close()
 -- 
-2.36.1
+2.38.1
 
 

++++++ _service ++++++
--- /var/tmp/diff_new_pack.Vwuf4n/_old  2022-12-08 16:50:06.107150322 +0100
+++ /var/tmp/diff_new_pack.Vwuf4n/_new  2022-12-08 16:50:06.119150383 +0100
@@ -3,16 +3,16 @@
     <param name="url">https://github.com/moby/moby.git</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="versionformat">20.10.17_ce_%h</param>
-    <param name="revision">v20.10.17</param>
+    <param name="versionformat">20.10.21_ce_%h</param>
+    <param name="revision">v20.10.21</param>
     <param name="filename">docker</param>
   </service>
   <service name="tar_scm" mode="disabled">
     <param name="url">https://github.com/docker/cli.git</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="versionformat">20.10.17_ce</param>
-    <param name="revision">v20.10.17</param>
+    <param name="versionformat">20.10.21_ce</param>
+    <param name="revision">v20.10.21</param>
     <param name="filename">docker-cli</param>
   </service>
   <service name="tar_scm" mode="disabled">
@@ -20,7 +20,7 @@
     <param name="scm">git</param>
     <param name="exclude">.git</param>
     <param name="versionformat">%H</param>
-    <param name="revision">f6ccccb1c082a432c2a5814aaedaca56af33d9ea</param>
+    <param name="revision">0dde5c895075df6e3630e76f750a447cf63f4789</param>
     <param name="filename">docker-libnetwork</param>
   </service>
   <service name="recompress" mode="disabled">

++++++ docker-20.10.17_ce_a89b84221c85.tar.xz -> 
docker-20.10.21_ce_3056208812eb.tar.xz ++++++
/work/SRC/openSUSE:Factory/docker/docker-20.10.17_ce_a89b84221c85.tar.xz 
/work/SRC/openSUSE:Factory/.docker.new.1835/docker-20.10.21_ce_3056208812eb.tar.xz
 differ: char 15, line 1

++++++ docker-cli-20.10.17_ce.tar.xz -> docker-cli-20.10.21_ce.tar.xz ++++++
++++ 4136 lines of diff (skipped)

++++++ docker-libnetwork-f6ccccb1c082a432c2a5814aaedaca56af33d9ea.tar.xz -> 
docker-libnetwork-0dde5c895075df6e3630e76f750a447cf63f4789.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/docker-libnetwork-f6ccccb1c082a432c2a5814aaedaca56af33d9ea/iptables/iptables.go
 
new/docker-libnetwork-0dde5c895075df6e3630e76f750a447cf63f4789/iptables/iptables.go
--- 
old/docker-libnetwork-f6ccccb1c082a432c2a5814aaedaca56af33d9ea/iptables/iptables.go
 2022-06-01 20:45:24.000000000 +0200
+++ 
new/docker-libnetwork-0dde5c895075df6e3630e76f750a447cf63f4789/iptables/iptables.go
 2022-07-16 09:26:57.000000000 +0200
@@ -11,6 +11,7 @@
        "sync"
        "time"
 
+       "github.com/docker/docker/rootless"
        "github.com/sirupsen/logrus"
 )
 
@@ -102,6 +103,12 @@
 }
 
 func initFirewalld() {
+       // When running with RootlessKit, firewalld is running as the root 
outside our network namespace
+       // https://github.com/moby/moby/issues/43781
+       if rootless.RunningWithRootlessKit() {
+               logrus.Info("skipping firewalld management for rootless mode")
+               return
+       }
        if err := FirewalldInit(); err != nil {
                logrus.Debugf("Fail to initialize firewalld: %v, using raw 
iptables instead", err)
        }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/docker-libnetwork-f6ccccb1c082a432c2a5814aaedaca56af33d9ea/vendor/github.com/docker/docker/rootless/rootless.go
 
new/docker-libnetwork-0dde5c895075df6e3630e76f750a447cf63f4789/vendor/github.com/docker/docker/rootless/rootless.go
--- 
old/docker-libnetwork-f6ccccb1c082a432c2a5814aaedaca56af33d9ea/vendor/github.com/docker/docker/rootless/rootless.go
 1970-01-01 01:00:00.000000000 +0100
+++ 
new/docker-libnetwork-0dde5c895075df6e3630e76f750a447cf63f4789/vendor/github.com/docker/docker/rootless/rootless.go
 2022-07-16 09:26:57.000000000 +0200
@@ -0,0 +1,25 @@
+package rootless // import "github.com/docker/docker/rootless"
+
+import (
+       "os"
+       "sync"
+)
+
+const (
+       // RootlessKitDockerProxyBinary is the binary name of 
rootlesskit-docker-proxy
+       RootlessKitDockerProxyBinary = "rootlesskit-docker-proxy"
+)
+
+var (
+       runningWithRootlessKit     bool
+       runningWithRootlessKitOnce sync.Once
+)
+
+// RunningWithRootlessKit returns true if running under RootlessKit namespaces.
+func RunningWithRootlessKit() bool {
+       runningWithRootlessKitOnce.Do(func() {
+               u := os.Getenv("ROOTLESSKIT_STATE_DIR")
+               runningWithRootlessKit = u != ""
+       })
+       return runningWithRootlessKit
+}

Reply via email to