containers-common-0.63.0-1.el10
- update vendored components - Related: RHEL-80817 Signed-off-by: Jindrich Novy <jnovy@redhat.com>
This commit is contained in:
		
							parent
							
								
									42a8bbc876
								
							
						
					
					
						commit
						033521fec2
					
				| @ -7,17 +7,17 @@ | |||||||
| # Packit will automatically update the image and storage versions on Fedora and | # Packit will automatically update the image and storage versions on Fedora and | ||||||
| # CentOS Stream dist-git PRs. | # CentOS Stream dist-git PRs. | ||||||
| %global skopeo_branch main | %global skopeo_branch main | ||||||
| %global image_branch v5.34.0 | %global image_branch v5.35.0 | ||||||
| %global storage_branch v1.57.1 | %global storage_branch v1.58.0 | ||||||
| %global shortnames_branch main | %global shortnames_branch main | ||||||
| %global common_branch v0.62.0 | %global common_branch v0.63.0 | ||||||
| 
 | 
 | ||||||
| %global common_version %(v=%{common_branch}; echo ${v:1}) | %global common_version %(v=%{common_branch}; echo ${v:1}) | ||||||
| 
 | 
 | ||||||
| Name: containers-common | Name: containers-common | ||||||
| Epoch: 5 | Epoch: 5 | ||||||
| Version: %{common_version} | Version: %{common_version} | ||||||
| Release: 2%{?dist} | Release: 1%{?dist} | ||||||
| License: Apache-2.0 | License: Apache-2.0 | ||||||
| BuildArch: noarch | BuildArch: noarch | ||||||
| # for BuildRequires: go-md2man | # for BuildRequires: go-md2man | ||||||
| @ -203,6 +203,10 @@ ln -s ../../../..%{_sysconfdir}/yum.repos.d/redhat.repo %{buildroot}%{_datadir}/ | |||||||
| %files extra | %files extra | ||||||
| 
 | 
 | ||||||
| %changelog | %changelog | ||||||
|  | * Wed Jun 11 2025 Jindrich Novy <jnovy@redhat.com> - 5:0.63.0-1 | ||||||
|  | - update vendored components | ||||||
|  | - Related: RHEL-80817 | ||||||
|  | 
 | ||||||
| * Sun Jun 08 2025 Lokesh Mandvekar <lsm5@redhat.com> - 5:0.62.0-2 | * Sun Jun 08 2025 Lokesh Mandvekar <lsm5@redhat.com> - 5:0.62.0-2 | ||||||
| - fetch TMT podman revdep tests from podman dist-git | - fetch TMT podman revdep tests from podman dist-git | ||||||
| - needs at least podman 5.4.0-7.el10 | - needs at least podman 5.4.0-7.el10 | ||||||
|  | |||||||
| @ -329,6 +329,14 @@ This requirement requires an image to be signed using a sigstore signature with | |||||||
|         "oidcIssuer": "https://expected.OIDC.issuer/", |         "oidcIssuer": "https://expected.OIDC.issuer/", | ||||||
|         "subjectEmail", "expected-signing-user@example.com", |         "subjectEmail", "expected-signing-user@example.com", | ||||||
|     }, |     }, | ||||||
|  |     "pki": { | ||||||
|  |         "caRootsPath": "/path/to/local/CARoots/file", | ||||||
|  |         "caRootsData": "base64-encoded-CARoots-data", | ||||||
|  |         "caIntermediatesPath": "/path/to/local/CAIntermediates/file", | ||||||
|  |         "caIntermediatesData": "base64-encoded-CAIntermediates-data", | ||||||
|  |         "subjectHostname": "expected-signing-hostname.example.com", | ||||||
|  |         "subjectEmail": "expected-signing-user@example.com" | ||||||
|  |     }, | ||||||
|     "rekorPublicKeyPath": "/path/to/local/public/key/file", |     "rekorPublicKeyPath": "/path/to/local/public/key/file", | ||||||
|     "rekorPublicKeyPaths": ["/path/to/local/public/key/one","/path/to/local/public/key/two"], |     "rekorPublicKeyPaths": ["/path/to/local/public/key/one","/path/to/local/public/key/two"], | ||||||
|     "rekorPublicKeyData": "base64-encoded-public-key-data", |     "rekorPublicKeyData": "base64-encoded-public-key-data", | ||||||
| @ -336,7 +344,7 @@ This requirement requires an image to be signed using a sigstore signature with | |||||||
|     "signedIdentity": identity_requirement |     "signedIdentity": identity_requirement | ||||||
| } | } | ||||||
| ``` | ``` | ||||||
| Exactly one of `keyPath`, `keyPaths`, `keyData`, `keyDatas` and `fulcio` must be present. | Exactly one of `keyPath`, `keyPaths`, `keyData`, `keyDatas`, `fulcio` and `pki` must be present. | ||||||
| 
 | 
 | ||||||
| If `keyPath` or `keyData` is present, it contains a sigstore public key. | If `keyPath` or `keyData` is present, it contains a sigstore public key. | ||||||
| Only signatures made by this key are accepted. | Only signatures made by this key are accepted. | ||||||
| @ -350,6 +358,11 @@ Both `oidcIssuer` and `subjectEmail` are mandatory, | |||||||
| exactly specifying the expected identity provider, | exactly specifying the expected identity provider, | ||||||
| and the identity of the user obtaining the Fulcio certificate. | and the identity of the user obtaining the Fulcio certificate. | ||||||
| 
 | 
 | ||||||
|  | If `pki` is present, the signature must be based on a non-Fulcio X.509 certificate. | ||||||
|  | One of `caRootsPath` and `caRootsData` must be specified, containing certificates of the CAs. | ||||||
|  | Only one of `caIntermediatesPath` and `caIntermediatesData` can be present, containing certificates of the intermediate CAs. | ||||||
|  | One of `subjectEmail` and `subjectHostname` must be specified, exactly specifying the expected identity to which the certificate was issued. | ||||||
|  | 
 | ||||||
| At most one of `rekorPublicKeyPath`, `rekorPublicKeyPaths`, `rekorPublicKeyData` and `rekorPublicKeyDatas` can be present; | At most one of `rekorPublicKeyPath`, `rekorPublicKeyPaths`, `rekorPublicKeyData` and `rekorPublicKeyDatas` can be present; | ||||||
| it is mandatory if `fulcio` is specified. | it is mandatory if `fulcio` is specified. | ||||||
| If a Rekor public key is specified, | If a Rekor public key is specified, | ||||||
| @ -407,6 +420,18 @@ selectively allow individual transports and scopes as desired. | |||||||
|                     "rekorPublicKeyPath": "/path/to/rekor.pub", |                     "rekorPublicKeyPath": "/path/to/rekor.pub", | ||||||
|                 } |                 } | ||||||
|             ], |             ], | ||||||
|  |             /* A Sigstore-signed repository using a certificate generated by a custom public-key infrastructure.*/ | ||||||
|  |             "hostname:5000/myns/sigstore-signed-byopki": [ | ||||||
|  |                 { | ||||||
|  |                     "type": "sigstoreSigned", | ||||||
|  |                     "pki": { | ||||||
|  |                         "caRootsPath": "/path/to/pki_root_crts.pem", | ||||||
|  |                         "caIntermediatesPath": "/path/to/pki_intermediate_crts.pem", | ||||||
|  |                         "subjectHostname": "test-user.example.com" | ||||||
|  |                         "subjectEmail": "test-user@example.com" | ||||||
|  |                     } | ||||||
|  |                 } | ||||||
|  |             ], | ||||||
|             /* A sigstore-signed repository, accepts signatures by /usr/bin/cosign */ |             /* A sigstore-signed repository, accepts signatures by /usr/bin/cosign */ | ||||||
|             "hostname:5000/myns/sigstore-signed-allows-malicious-tag-substitution": [ |             "hostname:5000/myns/sigstore-signed-allows-malicious-tag-substitution": [ | ||||||
|                 { |                 { | ||||||
|  | |||||||
| @ -77,7 +77,6 @@ An image in a directory structure compliant with the "Open Container Image Layou | |||||||
| 
 | 
 | ||||||
| The _path_ value terminates at the first `:` character; any further `:` characters are not separators, but a part of _reference_. | The _path_ value terminates at the first `:` character; any further `:` characters are not separators, but a part of _reference_. | ||||||
| The _reference_ is used to set, or match, the `org.opencontainers.image.ref.name` annotation in the top-level index. | The _reference_ is used to set, or match, the `org.opencontainers.image.ref.name` annotation in the top-level index. | ||||||
| If _reference_ is not specified when reading an image, the directory must contain exactly one image. |  | ||||||
| For reading images, @_source-index_ is a zero-based index in manifest (to access untagged images). | For reading images, @_source-index_ is a zero-based index in manifest (to access untagged images). | ||||||
| If neither reference nor @_source_index is specified when reading an image, the path must contain exactly one image. | If neither reference nor @_source_index is specified when reading an image, the path must contain exactly one image. | ||||||
| 
 | 
 | ||||||
|  | |||||||
| @ -236,13 +236,12 @@ default_sysctls = [ | |||||||
| # | # | ||||||
| #mounts = [] | #mounts = [] | ||||||
| 
 | 
 | ||||||
| # Default way to to create a Network namespace for the container | # Default way to create a NET namespace for the container. | ||||||
| # Options are: | # The option is mapped to the **--network** argument for the podman commands, it accepts the same values as that option. | ||||||
| # `private` Create private Network Namespace for the container. | # For example it can be set to `bridge`, `host`, `none`, `pasta` and more, see the podman-create(1) | ||||||
| # `host`    Share host Network Namespace with the container. | # manual for all available options. | ||||||
| # `none`    Containers do not use the network |  | ||||||
| # | # | ||||||
| #netns = "private" | #netns = "" | ||||||
| 
 | 
 | ||||||
| # Do not modify the `/etc/hosts` file in the container. Podman assumes control | # Do not modify the `/etc/hosts` file in the container. Podman assumes control | ||||||
| # over the container's `/etc/hosts` file by default; refer to the `--add-host` | # over the container's `/etc/hosts` file by default; refer to the `--add-host` | ||||||
| @ -381,14 +380,17 @@ default_sysctls = [ | |||||||
| #firewall_driver = "" | #firewall_driver = "" | ||||||
| 
 | 
 | ||||||
| 
 | 
 | ||||||
| # The network name of the default network to attach pods to. | # The name of the default network as seen in `podman network ls`. This option only effects the network assignment when | ||||||
|  | # the bridge network mode is selected, i.e. `--network bridge`. It is the default for rootful containers but not as | ||||||
|  | # rootless. To change the default network mode use the **netns** option under the `[containers]` table. | ||||||
|  | # | ||||||
|  | # Note: This should not be changed while you have any containers using this network. | ||||||
| # | # | ||||||
| #default_network = "podman" | #default_network = "podman" | ||||||
| 
 | 
 | ||||||
| # The default subnet for the default network given in default_network. | # The default subnet for the default network given in default_network. | ||||||
| # If a network with that name does not exist, a new network using that name and | # | ||||||
| # this subnet will be created. | # Note: This should not be changed if any containers are currently running on the default network. | ||||||
| # Must be a valid IPv4 CIDR prefix. |  | ||||||
| # | # | ||||||
| #default_subnet = "10.88.0.0/16" | #default_subnet = "10.88.0.0/16" | ||||||
| 
 | 
 | ||||||
| @ -898,7 +900,7 @@ runtime = "crun" | |||||||
| # Linux: | # Linux: | ||||||
| #    qemu    - Open source machine emulator and virtualizer. (Default) | #    qemu    - Open source machine emulator and virtualizer. (Default) | ||||||
| # Windows: there are currently two options: | # Windows: there are currently two options: | ||||||
| #    wsl     - Windows Subsystem for Linux (Default)  | #    wsl     - Windows Subsystem for Linux (Default) | ||||||
| #    hyperv  - Windows Server Virtualization | #    hyperv  - Windows Server Virtualization | ||||||
| # Mac: there are currently two options: | # Mac: there are currently two options: | ||||||
| #    applehv - Default Apple Hypervisor (Default) | #    applehv - Default Apple Hypervisor (Default) | ||||||
|  | |||||||
| @ -199,7 +199,12 @@ container. The special value “none” can be specified to disable creation of | |||||||
| **env**=["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"] | **env**=["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"] | ||||||
| 
 | 
 | ||||||
| Environment variable list for the container process, used for passing | Environment variable list for the container process, used for passing | ||||||
| environment variables to the container. | environment variables to the container. If a variable is listed without a value, | ||||||
|  | the value is copied from the host environment. | ||||||
|  | 
 | ||||||
|  | Note that this is only used when a container is created, not with subsequent | ||||||
|  | commands like `podman exec`. This prevents variables in the config file from | ||||||
|  | overwriting values specified on the command line when the container was created. | ||||||
| 
 | 
 | ||||||
| **env_host**=false | **env_host**=false | ||||||
| 
 | 
 | ||||||
| @ -304,13 +309,12 @@ Specified as "type=TYPE,source=<directory-on-host>,destination=<directory-in-con | |||||||
| 
 | 
 | ||||||
| Example:  [ "type=bind,source=/var/lib/foobar,destination=/var/lib/foobar,ro", ] | Example:  [ "type=bind,source=/var/lib/foobar,destination=/var/lib/foobar,ro", ] | ||||||
| 
 | 
 | ||||||
| **netns**="private" | **netns**="" | ||||||
| 
 | 
 | ||||||
| Default way to create a NET namespace for the container. | Default way to create a NET namespace for the container. | ||||||
| Options are: | The option is mapped to the **--network** argument for the podman commands, it accepts the same values as that option. | ||||||
|   `private` Create private NET Namespace for the container. | For example it can be set to `bridge`, `host`, `none`, `pasta` and more, see the [podman-create(1)](https://docs.podman.io/en/latest/markdown/podman-create.1.html#network-mode-net) | ||||||
|   `host`    Share host NET Namespace with the container. | manual for all available options. | ||||||
|   `none`    Containers do not use the network. |  | ||||||
| 
 | 
 | ||||||
| **no_hosts**=false | **no_hosts**=false | ||||||
| 
 | 
 | ||||||
| @ -442,12 +446,17 @@ netavark_plugin_dirs = [ | |||||||
| 
 | 
 | ||||||
| **default_network**="podman" | **default_network**="podman" | ||||||
| 
 | 
 | ||||||
| The network name of the default network to attach pods to. | The name of the default network as seen in `podman network ls`. This option only effects the network assignment when | ||||||
|  | the bridge network mode is selected, i.e. `--network bridge`. It is the default for rootful containers but not as | ||||||
|  | rootless. To change the default network mode use the **netns** option under the `[containers]` table. | ||||||
|  | 
 | ||||||
|  | Note: This should not be changed while you have any containers using this network. | ||||||
| 
 | 
 | ||||||
| **default_subnet**="10.88.0.0/16" | **default_subnet**="10.88.0.0/16" | ||||||
| 
 | 
 | ||||||
| The subnet to use for the default network (named above in **default_network**). | The subnet to use for the default network (named above in **default_network**). | ||||||
| If the default network does not exist, it will be automatically created the first time a tool is run using this subnet. | 
 | ||||||
|  | Note: This should not be changed if any containers are currently running on the default network. | ||||||
| 
 | 
 | ||||||
| **default_subnet_pools**=[] | **default_subnet_pools**=[] | ||||||
| 
 | 
 | ||||||
|  | |||||||
| @ -152,6 +152,7 @@ | |||||||
| 				"fadvise64", | 				"fadvise64", | ||||||
| 				"fadvise64_64", | 				"fadvise64_64", | ||||||
| 				"fallocate", | 				"fallocate", | ||||||
|  | 				"fanotify_init", | ||||||
| 				"fanotify_mark", | 				"fanotify_mark", | ||||||
| 				"fchdir", | 				"fchdir", | ||||||
| 				"fchmod", | 				"fchmod", | ||||||
| @ -692,7 +693,6 @@ | |||||||
| 		{ | 		{ | ||||||
| 			"names": [ | 			"names": [ | ||||||
| 				"bpf", | 				"bpf", | ||||||
| 				"fanotify_init", |  | ||||||
| 				"lookup_dcookie", | 				"lookup_dcookie", | ||||||
| 				"quotactl", | 				"quotactl", | ||||||
| 				"quotactl_fd", | 				"quotactl_fd", | ||||||
| @ -712,7 +712,6 @@ | |||||||
| 		}, | 		}, | ||||||
| 		{ | 		{ | ||||||
| 			"names": [ | 			"names": [ | ||||||
| 				"fanotify_init", |  | ||||||
| 				"lookup_dcookie", | 				"lookup_dcookie", | ||||||
| 				"perf_event_open", | 				"perf_event_open", | ||||||
| 				"quotactl", | 				"quotactl", | ||||||
|  | |||||||
| @ -155,3 +155,5 @@ | |||||||
|   "grafana/oncall" = "docker.io/grafana/oncall" |   "grafana/oncall" = "docker.io/grafana/oncall" | ||||||
|   "grafana/pyroscope" = "docker.io/grafana/pyroscope" |   "grafana/pyroscope" = "docker.io/grafana/pyroscope" | ||||||
|   "grafana/tempo" = "docker.io/grafana/tempo" |   "grafana/tempo" = "docker.io/grafana/tempo" | ||||||
|  |   # curl | ||||||
|  |   "curl" = "quay.io/curl/curl" | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user