Hello community,

here is the log from the commit of package docker for openSUSE:Factory checked 
in at 2016-10-26 13:29:13
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/docker (Old)
 and      /work/SRC/openSUSE:Factory/.docker.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "docker"

Changes:
--------
--- /work/SRC/openSUSE:Factory/docker/docker.changes    2016-10-13 
11:31:39.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.docker.new/docker.changes       2016-10-26 
13:29:14.000000000 +0200
@@ -1,0 +2,9 @@
+Thu Oct 13 11:15:17 UTC 2016 - jmassaguer...@suse.com
+
+- update docker to 1.12.2 (bsc#1004490). See changelog
+
+https://github.com/docker/docker/blob/v1.12.2/CHANGELOG.md 
+
+- update docker-mount-secrets.patch to 1.12.2 code
+
+-------------------------------------------------------------------

Old:
----
  docker-1.12.1.tar.xz

New:
----
  docker-1.12.2.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ docker.spec ++++++
--- /var/tmp/diff_new_pack.RWvfU9/_old  2016-10-26 13:29:16.000000000 +0200
+++ /var/tmp/diff_new_pack.RWvfU9/_new  2016-10-26 13:29:16.000000000 +0200
@@ -36,7 +36,7 @@
 %global docker_migration_warnfile %{docker_store}/docker-update-message.txt
 %define docker_graph              %{docker_store}/graph
 %define git_version 8eab29e
-%define version_unconverted 1.12.1
+%define version_unconverted 1.12.2
 %define docker_version 1.12.1
 %define __arch_install_post export NO_BRP_STRIP_DEBUG=true
 # When upgrading to a new version requires the service not to be restarted
@@ -45,7 +45,7 @@
 # 1.10.1
 %global last_migration_version 1.10.1
 Name:           docker
-Version:        1.12.1
+Version:        1.12.2
 Release:        0
 Summary:        The Linux container runtime
 License:        Apache-2.0
@@ -87,8 +87,8 @@
 # execdrivers of Docker. NOTE: The version pinning here matches upstream's
 # Dockerfile to ensure that we don't use a slightly incompatible version of
 # runC or containerd (which would be bad).
-Requires:       containerd = 0.2.3
-Requires:       runc = 0.1.1+gitcc29e3d
+Requires:       containerd = 0.2.4+git0366d7e
+Requires:       runc = 0.1.1+git02f8fa7
 # Provides mkfs.ext4 - used by Docker when devicemapper storage driver is used
 Requires:       e2fsprogs
 Requires:       git-core >= 1.7

++++++ _service ++++++
--- /var/tmp/diff_new_pack.RWvfU9/_old  2016-10-26 13:29:16.000000000 +0200
+++ /var/tmp/diff_new_pack.RWvfU9/_new  2016-10-26 13:29:16.000000000 +0200
@@ -3,8 +3,8 @@
     <param name="url">https://github.com/docker/docker.git</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="versionformat">1.12.1</param>
-    <param name="revision">v1.12.1</param>
+    <param name="versionformat">1.12.2</param>
+    <param name="revision">v1.12.2</param>
   </service>
   <service name="recompress" mode="disabled">
     <param name="file">docker-*.tar</param>

++++++ docker-1.12.1.tar.xz -> docker-1.12.2.tar.xz ++++++
/work/SRC/openSUSE:Factory/docker/docker-1.12.1.tar.xz 
/work/SRC/openSUSE:Factory/.docker.new/docker-1.12.2.tar.xz differ: char 25, 
line 1

++++++ docker-mount-secrets.patch ++++++
--- /var/tmp/diff_new_pack.RWvfU9/_old  2016-10-26 13:29:16.000000000 +0200
+++ /var/tmp/diff_new_pack.RWvfU9/_new  2016-10-26 13:29:16.000000000 +0200
@@ -1,20 +1,28 @@
-commit 7726422774cf8dda6766cb268b4e9110e4f68945
-Author: Aleksa Sarai <asa...@suse.de>
-Date:   Mon Apr 11 22:54:35 2016 +1000
+From 17cd15ba4160f0e0830453529b9b01edc308d847 Mon Sep 17 00:00:00 2001
+From: Aleksa Sarai <asa...@suse.de>
+Date: Mon, 11 Apr 2016 22:54:35 +1000
+Subject: [PATCH] SUSE: implement SUSE container secrets
 
-    SUSE: implement SUSE container secrets
-    
-    This allows for us to pass in host credentials to a container, allowing
-    for SUSEConnect to work with containers.
-    
-    THIS PATCH IS NOT TO BE UPSTREAMED, DUE TO THE FACT THAT IT IS
-    SUSE-SPECIFIC, AND UPSTREAM DOES NOT APPROVE OF THIS CONCEPT BECAUSE IT
-    MAKES BUILDS NOT ENTIRELY REPRODUCIBLE.
-    
-    Signed-off-by: Aleksa Sarai <asa...@suse.de>
+This allows for us to pass in host credentials to a container, allowing
+for SUSEConnect to work with containers.
+
+THIS PATCH IS NOT TO BE UPSTREAMED, DUE TO THE FACT THAT IT IS
+SUSE-SPECIFIC, AND UPSTREAM DOES NOT APPROVE OF THIS CONCEPT BECAUSE IT
+MAKES BUILDS NOT ENTIRELY REPRODUCIBLE.
+
+Signed-off-by: Aleksa Sarai <asa...@suse.de>
+---
+ container/container_unix.go         |  63 ++++++++++++
+ daemon/container_operations_unix.go |  50 ++++++++++
+ daemon/daemon_unix.go               |   6 +-
+ daemon/oci_linux.go                 |   6 ++
+ daemon/start.go                     |   6 ++
+ daemon/suse_secrets.go              | 184 ++++++++++++++++++++++++++++++++++++
+ 6 files changed, 313 insertions(+), 2 deletions(-)
+ create mode 100644 daemon/suse_secrets.go
 
 diff --git a/container/container_unix.go b/container/container_unix.go
-index 2727b818f542..07a07102f031 100644
+index 2727b81..07a0710 100644
 --- a/container/container_unix.go
 +++ b/container/container_unix.go
 @@ -35,6 +35,8 @@ type Container struct {
@@ -95,7 +103,7 @@
  func (container *Container) UpdateContainer(hostConfig 
*containertypes.HostConfig) error {
        container.Lock()
 diff --git a/daemon/container_operations_unix.go 
b/daemon/container_operations_unix.go
-index 55bd3fc8392d..a3ab7fbd83d1 100644
+index 55bd3fc..a3ab7fb 100644
 --- a/daemon/container_operations_unix.go
 +++ b/daemon/container_operations_unix.go
 @@ -184,6 +184,56 @@ func (daemon *Daemon) getPidContainer(container 
*container.Container) (*containe
@@ -156,7 +164,7 @@
        var err error
  
 diff --git a/daemon/daemon_unix.go b/daemon/daemon_unix.go
-index f26691226f91..2ced1b869b81 100644
+index f266912..2ced1b8 100644
 --- a/daemon/daemon_unix.go
 +++ b/daemon/daemon_unix.go
 @@ -809,8 +809,10 @@ func initBridgeDriver(controller 
libnetwork.NetworkController, config *Config) e
@@ -173,7 +181,7 @@
                "/sys":             "dir",
                "/.dockerenv":      "file",
 diff --git a/daemon/oci_linux.go b/daemon/oci_linux.go
-index 4459d02fcad3..6af7d351ccc0 100644
+index 4459d02..6af7d35 100644
 --- a/daemon/oci_linux.go
 +++ b/daemon/oci_linux.go
 @@ -656,6 +656,10 @@ func (daemon *Daemon) createSpec(c *container.Container) 
(*libcontainerd.Spec, e
@@ -197,7 +205,7 @@
        if err := setMounts(daemon, &s, c, ms); err != nil {
                return nil, fmt.Errorf("linux mounts: %v", err)
 diff --git a/daemon/start.go b/daemon/start.go
-index 7a0bc2121c83..30b75ee2a616 100644
+index fcf24c5..57a8c33 100644
 --- a/daemon/start.go
 +++ b/daemon/start.go
 @@ -173,6 +173,12 @@ func (daemon *Daemon) Cleanup(container 
*container.Container) {
@@ -215,7 +223,7 @@
                // Ensure that all the mounts are gone
 diff --git a/daemon/suse_secrets.go b/daemon/suse_secrets.go
 new file mode 100644
-index 000000000000..417a1a9e5b61
+index 0000000..417a1a9
 --- /dev/null
 +++ b/daemon/suse_secrets.go
 @@ -0,0 +1,184 @@


Reply via email to