runc-1.0.0~rc6-lp150.2.7.1<>,AЉ\vq/=„"RLO+qm5I4}Y@SIf 3tum PQ|XGn~zH^?|*gNmIԤqDY@b0z@"j1OgRHTȔ9.U6F(Pə=%v&j/FtO@@ {e|${c-E:GUlbLjT/5cvݝ#\Kmy!- RF3y}H¨2>{>B8?8d  Jpt| d    3 X '    0 p ( :8 D-9 -:i->1?F1GG1\H1I2X2,Y24\2`]2^3b4c5(d5e5f5l5u5v60w7lx7y8$ z8L8\8`8e8h8l8r8Crunc1.0.0~rc6lp150.2.7.1Tool for spawning and running OCI containersrunc is a CLI tool for spawning and running containers according to the OCI specification. It is designed to be as minimal as possible, and is the workhorse of Docker. It was originally designed to be a replacement for LXC within Docker, and has grown to become a separate project entirely.\vqlamb19topenSUSE Leap 15.0openSUSEApache-2.0http://bugs.opensuse.orgSystem/Managementhttps://github.com/opencontainers/runclinuxx86_64 t#H%*5lCT:r/XYA큤A큤\vq\vq\vq[\vq[\vq\vq\vq\vq\vq\vq\vq\vq\vq\vq\vq\vq\vq\vq\vq\vq\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../sbin/runcrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrunc-1.0.0~rc6-lp150.2.7.1.src.rpmruncrunc(x86-64)@@@@@@@@@@     /bin/shlibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.4)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libpthread.so.0(GLIBC_2.3.2)(64bit)libseccomp.so.2()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rpmlib(TildeInVersions)3.0.4-14.6.0-14.0-15.2-14.10.0-14.14.1\Z@\2\I[[ٙ@[!@[{@ZH@Y@Y?@YJYY^&@Y YtY.Xh@XX@XۡX @Xx@XWXWXS@X6@Ww@Wv@W@W/@WWW@W@W@WQW#LWWW4VV@V@V@V@Aleksa Sarai clee@suse.comdorf@suse.comAleksa Sarai Valentin Rothberg dcassany@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comthipp@suse.dejmassaguerpla@suse.comjmassaguerpla@suse.comjengelh@inai.dejmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comasarai@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjengelh@inai.dejmassaguerpla@suse.comasarai@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comcbrauner@suse.decbrauner@suse.deasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.de- Add fix for CVE-2019-5736 (effectively copying /proc/self/exe during re-exec to avoid write attacks to the host runc binary). bsc#1121967 + CVE-2019-5736.patch- Update go requirements to >= go1.10 to fix * bsc#1118897 CVE-2018-16873 go#29230 cmd/go: remote command execution during "go get -u" * bsc#1118898 CVE-2018-16874 go#29231 cmd/go: directory traversal in "go get" via curly braces in import paths * bsc#1118899 CVE-2018-16875 go#29233 crypto/x509: CPU denial of service- Require golang = 1.10.- Upgrade to runc v1.0.0~rc6. Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc6- Create a symlink in /usr/bin/runc to enable rootless Podman and Buildah.- Make use of %license macro- Remove 'go test' from %check section, as it has only ever caused us problems and hasn't (as far as I remember) ever caught a release-blocking issue. Smoke testing has been far more useful. boo#1095817- Upgrade to runc v1.0.0~rc5. Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc5 - Remove patch now merged upstream. - bsc1053532-0001-makefile-drop-usage-of-install.patch- Use .tar.xz provided by upstream, as well as include the keyring to allow full provenance of the source.- Use the upstream Makefile, to ensure that we always include the version information in runc. This was confusing users (and Docker). bsc#1053532 - Add a backported patch to fix a Makefile bug. https://github.com/opencontainers/runc/pull/1555 + bsc1053532-0001-makefile-drop-usage-of-install.patch- Update to runc v1.0.0-rc4. Upstream changelog: + runc now supports v1.0.0 of the OCI runtime specification. #1527 + Rootless containers support has been released. The current state of this feature is that it only supports single-{uid,gid} mappings as an unprivileged user, and cgroups are completely unsupported. Work is being done to improve this. #774 + Rather than relying on CRIU version nnumbers, actually check if the system supports pre-dumping. #1371 + Allow the PIDs cgroup limit to be updated. #1423 + Add support for checkpoint/restore of containers with orphaned PTYs (which is effectively all containers with terminal=true). #1355 + Permit prestart hooks to modify the cgroup configuration of a container. #1239 + Add support for a wide variety of mount options. #1460 + Expose memory.use_hierarchy in MemoryStats. #1378 * Fix incorrect handling of systems without the freezer cgroup. #1387 * Many, many changes to switch away from Go's "syscall" stdlib to "golang.org/x/sys/unix". #1394 #1398 #1442 #1464 #1467 #1470 #1474 [#1478] #1491 #1482 #1504 #1519 #1530 * Set cgroup resources when restoring a container. #1399 * Switch back to using /sbin as the installation directory. #1406 * Remove the arbitrary container ID length restriction. #1435 * Make container force deletion ignore non-existent containers. #1451 * Improve handling of arbitrary cgroup mount locations when populating cpuset. #1372 * Make the SaneTerminal interface public. #1479 * Fix cases where runc would report a container to be in a "Running" state if the init was a zombie or dead. #1489 * Do not set supplementary groups for numeric users. #1450 * Fix various issues with the "owner" field in runc-list. #1516 * Many other miscellaneous fixes, some of which were made by first-time contributors. Thanks, and welcome to the project! #1406 #1400 #1365 [#1396] #1402 #1414 #1412 #1408 #1418 #1425 #1428 #1436 #1433 #1438 [#1410] #1447 #1388 #1484 #1481 #1496 #1245 #1524 #1534 #1526 #1533 - Remove any semblance of non-Linux support. #1502 - We no longer use shfmt for testing. #1510- Use -buildmode=pie for tests and binary build. bsc#1048046 bsc#1051429 - Cleanup seccomp builds similar to bsc#1028638 - Remove the usage of 'cp -r' to reduce noise in the build logs.- switch to opencontainers/runc master branch - remove CVE-2016-9962.patch - stop providing docker-runc- fix the golang requirement to 1.7 to the subpackages- fix golang requirement to 1.7- Substitute %__-type macro indirections- update version to the one required by docker-17.04.0-ce (bsc#1034053) remove ignore_cgroup2_mountpoint.patch . This is already included in the upstream source code.- Make sure this is being built with go 1.7- remove the go_arches macro because we are using go1.7 which is available in all archs- fix bsc#1028113 - runc: make sure to ignore cgroup v2 mountpoints This is a backport of https://github.com/opencontainers/runc/pull/1266 + ignore_cgroup2_mountpoint.patch- update to docker-1.13.0 requirement- fix CVE-2016-9962 bsc#1012568 and applying the patch CVE-2016-9962.patch, because 1.12.6 partially fixes it (it contains the first patch attached in bsc#1012568)- update runc to the version used in docker 1.12.5 (bsc#1016307). This fixes bsc#1015661- For the moment, we have to switch to using Docker's fork of runC. This *will* be solved properly by creating a new package purely for Docker's runC fork, because it's quite silly to tie OCI project releases to Docker's vendoring scheme. Once this is fixed, this package will be switch to being purely-OCI.- add the /usr/bin/docker-run symlink to partially fix bsc#1015661- fix version by adding a revision "counter" so that it will always increase fix bsc#1009961- update to 02f8fa7 because that is the needed version for docker 1.12.1 (bsc#1004490)- Run fdupes.- fix go_arches definition: use global instead of define, otherwise it fails to build- Remove docker-runc symlink because it's been fixed within the Docker package. bsc#978260- Create a symlink /usr/sbin/docker-runc -> /usr/sbin/docker Docker expects this symlink to exist bsc#978260- Remove GOPATH at the end of the GOPATH assignment cause GOPATH is empty and if we do that, we get the path "" appended, which causes gcc6-go to complain- add go_arches in project configuration: this way, we can use the same spec file but decide in the project configuration if to use gc-go or gcc-go for some archs.- use gcc6-go instead of gcc5-go (bsc#988408) - build ppc64le with gc-go because this version builds with gc-go 1.6- bump git commit id to the one required by docker v1.12.0 (bsc#995058) - run unit tests during package build - remove seccomp-use-pkg-config.patch The patch is now upstream. - remove GO_BUILD_FLAGS macro and substitute with BUILDFLAGS env variable to allow for easier string appending. - only run unit test on architectures that provide the go list and go test tools- Add runc-test package which contains the source code and the test. This package will be used to run the integration tests. - Simplify package build and check sections: Instead of symlinking we default to cp -avr. go list gets confused by symlinks hence, we need to copy the source code anyway if we want to run unit tests during package build at some point.* Update to runC 0.1.1. (bsc#989566 FATE#320763) Changelog from upstream: This release includes a bug fix for adding the selinux mount label in the specification.* Don't use gcc-go for aarch64, since gc has grown support for it and is more stable.* Disable seccomp entirely for aarch64 builds, since it is not provided on all SUSE platforms.* Update to runC 0.1.0. Changelog from upstream: This release updates runc to the OCI runtime specification v0.5.0 and includes various fixes and features. Features: + cgroups: pid limits and stats + cgroups: kmem stats + systemd cgroup support + libcontainer specconv package + no pivot root option + numeric ids are treated as uid/gid + hook improvements Bug Fixes: * log flushing * atomic pid file creation * init error recovery * seccomp logging removed * delete container on aborted start * /dev bind mount handling* Install to /usr/sbin. https://github.com/opencontainers/runc/pull/702* Added runC man pages. * Recommended criu, since it's required for the checkpoint and restore functionality.* Small updates to method of compilation to better match Makefile.* Make compilation work on gcc-go only systems (ppc and s390).* initial import of runC 0.0.9 * add patch seccomp-use-pkg-config.patch which allows us to build runC, since they assume that the seccomp.h file lives at /usr/include/seccomp.h./bin/shlamb19 1551266220 1.0.0~rc6-lp150.2.7.11.0.0~rc6-lp150.2.7.1runcruncruncREADME.mdruncLICENSErunc-checkpoint.8.gzrunc-create.8.gzrunc-delete.8.gzrunc-events.8.gzrunc-exec.8.gzrunc-kill.8.gzrunc-list.8.gzrunc-pause.8.gzrunc-ps.8.gzrunc-restore.8.gzrunc-resume.8.gzrunc-run.8.gzrunc-spec.8.gzrunc-start.8.gzrunc-state.8.gzrunc-update.8.gzrunc.8.gz/usr/bin//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/runc//usr/share/licenses//usr/share/licenses/runc//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9752/openSUSE_Leap_15.0_Update/3990076ef4a5974a3766232566f4ea06-runc.openSUSE_Leap_15.0_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=002a245336820d2ba115f0cb72fe4442d4f6930f, strippeddirectoryASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) RR RRRRRR RR֥]G5criuutf-88e8076416f7709528bd083ce4f4532564ed4b25ddd8ad75678cfeeca4b0244f5?7zXZ !t/~]"k%w'v[ cR8icmaLU*iCG+Tavi٬6 H/ #iFn,cY%)KOojW!MUYp5b!Y]hmK;R;Da2x--xOww iV޹6dq1qɢ.޷Y#ŏ9H2YGx''$4R.-d?R#:Z lvQOٽx)zx*TQ*?,3ጕp …BW??o}R,/T Kd5^f 1d= zy!KEA$q0J2*hcUrRr/ $Sj 9>y~xrg%2CY 7k ó8վz;5 ^9 XIM$mG^ܰ+Ipg 3&w /#v YZ