fa61e0
# Bellow definitions are used to deliver config files from a particular branch
fa61e0
# of c/image, c/common, c/storage vendored in all podman, skopeo, buildah.
fa61e0
# These vendored components must have the same version. If it is not the case,
fa61e0
# pick the oldest version on c/image, c/common, c/storage vendored in
fa61e0
# podman/skopeo/podman.
fa61e0
%global skopeo_branch main
aa9d01
%global image_branch v5.19.1
aa9d01
%global common_branch v0.47.4
0106cf
%global storage_branch v1.38.2
fa61e0
%global shortnames_branch main
fa61e0
fa61e0
Epoch: 2
fa61e0
Name: containers-common
fa61e0
Version: 1
aa9d01
Release: 33%{?dist}
fa61e0
Summary: Common configuration and documentation for containers
fa61e0
License: ASL 2.0
aa9d01
BuildRequires: /usr/bin/go-md2man
fa61e0
Provides: skopeo-containers = %{epoch}:%{version}-%{release}
aa9d01
Conflicts: %{name} <= 2:1-22
aa9d01
Obsoletes: %{name} <= 2:1-22
fa61e0
Requires: (container-selinux >= 2:2.162.1 if selinux-policy)
fa61e0
Requires: oci-runtime
fa61e0
%if 0%{?rhel} >= 9 || 0%{?fedora}
fa61e0
Requires: crun >= 0.19
fa61e0
%else
fa61e0
Requires: runc
fa61e0
%endif
fa61e0
Requires: system-release
fa61e0
Suggests: subscription-manager
fa61e0
Recommends: fuse-overlayfs
fa61e0
Recommends: slirp4netns
fa61e0
Source1: https://raw.githubusercontent.com/containers/storage/%{storage_branch}/storage.conf
fa61e0
Source2: https://raw.githubusercontent.com/containers/storage/%{storage_branch}/docs/containers-storage.conf.5.md
fa61e0
Source3: mounts.conf
fa61e0
Source4: https://raw.githubusercontent.com/containers/image/%{image_branch}/docs/containers-registries.conf.5.md
fa61e0
#Source5: https://raw.githubusercontent.com/containers/image/%%{image_branch}/registries.conf
fa61e0
Source5: registries.conf
fa61e0
Source6: https://raw.githubusercontent.com/containers/image/%{image_branch}/docs/containers-policy.json.5.md
617262
Source7: https://raw.githubusercontent.com/containers/common/%{common_branch}/pkg/seccomp/seccomp.json
fa61e0
Source8: https://raw.githubusercontent.com/containers/common/%{common_branch}/docs/containers-mounts.conf.5.md
fa61e0
Source9: https://raw.githubusercontent.com/containers/image/%{image_branch}/docs/containers-signature.5.md
fa61e0
Source10: https://raw.githubusercontent.com/containers/image/%{image_branch}/docs/containers-transports.5.md
fa61e0
Source11: https://raw.githubusercontent.com/containers/image/%{image_branch}/docs/containers-certs.d.5.md
fa61e0
Source12: https://raw.githubusercontent.com/containers/image/%{image_branch}/docs/containers-registries.d.5.md
fa61e0
Source13: https://raw.githubusercontent.com/containers/common/%{common_branch}/pkg/config/containers.conf
fa61e0
Source14: https://raw.githubusercontent.com/containers/common/%{common_branch}/docs/containers.conf.5.md
fa61e0
Source15: https://raw.githubusercontent.com/containers/image/%{image_branch}/docs/containers-auth.json.5.md
fa61e0
Source16: https://raw.githubusercontent.com/containers/image/%{image_branch}/docs/containers-registries.conf.d.5.md
fa61e0
Source17: https://raw.githubusercontent.com/containers/shortnames/%{shortnames_branch}/shortnames.conf
fa61e0
Source19: 001-rhel-shortnames-pyxis.conf
fa61e0
Source20: 002-rhel-shortnames-overrides.conf
fa61e0
Source21: RPM-GPG-KEY-redhat-release
fa61e0
Source22: registry.access.redhat.com.yaml
fa61e0
Source23: registry.redhat.io.yaml
fa61e0
#Source24: https://raw.githubusercontent.com/containers/skopeo/%%{skopeo_branch}/default-policy.json
fa61e0
Source24: default-policy.json
fa61e0
Source25: https://raw.githubusercontent.com/containers/skopeo/%{skopeo_branch}/default.yaml
fa61e0
# scripts used for synchronization with upstream and shortname generation
fa61e0
Source100: update.sh
fa61e0
Source101: update-vendored.sh
fa61e0
Source102: pyxis.sh
fa61e0
aa9d01
%global aardvark_dns_version v1.0.1
aa9d01
%global aardvark_dns_branch v1.0.1-rhel
aa9d01
%global aardvark_dns_commit0 0a8eabf6f696f4f1ab14e5722578829362304e0b
aa9d01
%global aardvark_dns_shortcommit0 %(c=%{aardvark_dns_commit0}; echo ${c:0:7})
aa9d01
%if 0%{?aardvark_dns_branch:1}
aa9d01
Source200: https://github.com/containers/aardvark-dns/tarball/%{aardvark_dns_commit0}/%{aardvark_dns_branch}-%{aardvark_dns_shortcommit0}.tar.gz
aa9d01
%else
aa9d01
Source200: https://github.com/containers/aardvark-dns/archive/%{aardvark_dns_commit0}/aardvark-dns-%{aardvark_dns_version}-%{aardvark_dns_shortcommit0}.tar.gz
aa9d01
%endif
aa9d01
Source201: https://github.com/containers/aardvark-dns/releases/download/%{aardvark_dns_version}/aardvark-dns-%{aardvark_dns_version}-vendor.tar.gz
aa9d01
aa9d01
%global netavark_version v1.0.1
aa9d01
%global netavark_branch v1.0.1-rhel
aa9d01
%global netavark_commit0 93af39418a38c9cc901816240c3e7ccb715108c0
aa9d01
%global netavark_shortcommit0 %(c=%{netavark_commit0}; echo ${c:0:7})
aa9d01
%if 0%{?netavark_branch:1}
aa9d01
Source300: https://github.com/containers/netavark/tarball/%{netavark_commit0}/%{netavark_branch}-%{netavark_shortcommit0}.tar.gz
aa9d01
%else
aa9d01
Source300: https://github.com/containers/netavark/archive/%{netavark_commit0}/netavark-%{netavark_version}-%{netavark_shortcommit0}.tar.gz
aa9d01
%endif
aa9d01
Source301: https://github.com/containers/netavark/releases/download/%{netavark_version}/netavark-%{netavark_version}-vendor.tar.gz
aa9d01
fa61e0
%description
fa61e0
This package contains common configuration files and documentation for container
fa61e0
tools ecosystem, such as Podman, Buildah and Skopeo.
fa61e0
fa61e0
It is required because the most of configuration files and docs come from projects
fa61e0
which are vendored into Podman, Buildah, Skopeo, etc. but they are not packaged
fa61e0
separately.
fa61e0
aa9d01
%package -n aardvark-dns
aa9d01
Version: 1.0.1
aa9d01
Release: 33%{?dist}
aa9d01
URL: https://github.com/containers/aardvark-dns
aa9d01
Summary: Authoritative DNS server for A/AAAA container records
aa9d01
License: ASL 2.0 and BSD and MIT
aa9d01
BuildRequires: cargo
aa9d01
BuildRequires: git-core
aa9d01
BuildRequires: make
aa9d01
BuildRequires: rust-srpm-macros
aa9d01
BuildRequires: rust-toolset
aa9d01
#ExclusiveArch: %%{rust_arches}
aa9d01
ExclusiveArch: aarch64 ppc64le s390x x86_64
aa9d01
aa9d01
%description -n aardvark-dns
aa9d01
%{summary}
aa9d01
aa9d01
Forwards other request to configured resolvers.
aa9d01
Read more about configuration in `src/backend/mod.rs`.
aa9d01
aa9d01
%package -n netavark
aa9d01
Version: 1.0.1
aa9d01
Release: 33%{?dist}
aa9d01
URL: https://github.com/containers/netavark
aa9d01
Summary: OCI network stack
aa9d01
License: ASL 2.0 and BSD and MIT
aa9d01
BuildRequires: cargo
aa9d01
BuildRequires: make
aa9d01
BuildRequires: rust-srpm-macros
aa9d01
BuildRequires: git-core
aa9d01
BuildRequires: /usr/bin/go-md2man
aa9d01
Recommends: aardvark-dns
aa9d01
Provides: container-network-stack = 2
aa9d01
BuildRequires: rust-toolset
aa9d01
#ExclusiveArch: #%%{rust_arches}
aa9d01
ExclusiveArch: aarch64 ppc64le s390x x86_64
aa9d01
aa9d01
%description -n netavark
aa9d01
%{summary}
aa9d01
aa9d01
Netavark is a rust based network stack for containers. It is being
aa9d01
designed to work with Podman but is also applicable for other OCI
aa9d01
container management applications.
aa9d01
aa9d01
Netavark is a tool for configuring networking for Linux containers.
aa9d01
Its features include:
aa9d01
* Configuration of container networks via JSON configuration file
aa9d01
* Creation and management of required network interfaces,
aa9d01
    including MACVLAN networks
aa9d01
* All required firewall configuration to perform NAT and port
aa9d01
    forwarding as required for containers
aa9d01
* Support for iptables and firewalld at present, with support
aa9d01
    for nftables planned in a future release
aa9d01
* Support for rootless containers
aa9d01
* Support for IPv4 and IPv6
aa9d01
* Support for container DNS resolution via aardvark-dns.
aa9d01
fa61e0
%prep
aa9d01
tar fx %{SOURCE200}
aa9d01
%if 0%{?aardvark_dns_branch:1}
aa9d01
pushd containers-aardvark-dns-%{aardvark_dns_shortcommit0}
aa9d01
%else
aa9d01
pushd aardvark-dns-%{aardvark_dns_commit0}
aa9d01
%endif
aa9d01
tar fx %{SOURCE201}
aa9d01
mkdir -p .cargo
aa9d01
cat >.cargo/config << EOF
aa9d01
[source.crates-io]
aa9d01
replace-with = "vendored-sources"
aa9d01
aa9d01
[source.vendored-sources]
aa9d01
directory = "vendor"
aa9d01
EOF
aa9d01
popd
aa9d01
tar fx %{SOURCE300}
aa9d01
%if 0%{?netavark_branch:1}
aa9d01
pushd containers-netavark-%{netavark_shortcommit0}
aa9d01
%else
aa9d01
pushd netavark-%{netavark_commit0}
aa9d01
%endif
aa9d01
tar fx %{SOURCE301}
aa9d01
mkdir -p .cargo
aa9d01
cat >.cargo/config << EOF
aa9d01
[source.crates-io]
aa9d01
replace-with = "vendored-sources"
aa9d01
aa9d01
[source.vendored-sources]
aa9d01
directory = "vendor"
aa9d01
EOF
aa9d01
popd
fa61e0
fa61e0
%build
aa9d01
%if 0%{?build_rustflags:1}
aa9d01
export RUSTFLAGS="%{build_rustflags}"
aa9d01
%endif
aa9d01
aa9d01
%if 0%{?aardvark_dns_branch:1}
aa9d01
pushd containers-aardvark-dns-%{aardvark_dns_shortcommit0}
aa9d01
%else
aa9d01
pushd aardvark-dns-%{aardvark_dns_commit0}
aa9d01
%endif
aa9d01
%__scm_setup_git -q
aa9d01
%make_build build
aa9d01
popd
aa9d01
aa9d01
%if 0%{?netavark_branch:1}
aa9d01
pushd containers-netavark-%{netavark_shortcommit0}
aa9d01
%else
aa9d01
pushd netavark-%{netavark_commit0}
aa9d01
%endif
aa9d01
%__scm_setup_git -q
aa9d01
%make_build build
aa9d01
pushd docs
aa9d01
go-md2man -in netavark.1.md -out netavark.1
aa9d01
popd
aa9d01
%{__make} DESTDIR=%{buildroot} PREFIX=%{_prefix} install
aa9d01
popd
fa61e0
fa61e0
%install
aa9d01
%if 0%{?aardvark_dns_branch:1}
aa9d01
pushd containers-aardvark-dns-%{aardvark_dns_shortcommit0}
aa9d01
%else
aa9d01
pushd aardvark-dns-%{aardvark_dns_commit0}
aa9d01
%endif
aa9d01
%{__make} DESTDIR=%{buildroot} PREFIX=%{_prefix} install
aa9d01
popd
aa9d01
aa9d01
%if 0%{?netavark_branch:1}
aa9d01
pushd containers-netavark-%{netavark_shortcommit0}
aa9d01
%else
aa9d01
pushd netavark-%{netavark_commit0}
aa9d01
%endif
aa9d01
%{__make} DESTDIR=%{buildroot} PREFIX=%{_prefix} install
aa9d01
popd
aa9d01
fa61e0
install -dp %{buildroot}%{_sysconfdir}/containers/{certs.d,oci/hooks.d,registries.d,registries.conf.d}
fa61e0
install -m0644 %{SOURCE1} %{buildroot}%{_sysconfdir}/containers/storage.conf
fa61e0
install -m0644 %{SOURCE5} %{buildroot}%{_sysconfdir}/containers/registries.conf
fa61e0
install -m0644 %{SOURCE17} %{buildroot}%{_sysconfdir}/containers/registries.conf.d/000-shortnames.conf
fa61e0
install -m0644 %{SOURCE19} %{buildroot}%{_sysconfdir}/containers/registries.conf.d/001-rhel-shortnames.conf
fa61e0
install -m0644 %{SOURCE20} %{buildroot}%{_sysconfdir}/containers/registries.conf.d/002-rhel-shortnames-overrides.conf
fa61e0
fa61e0
# for signature verification
fa61e0
%if !0%{?rhel} || 0%{?centos}
fa61e0
install -dp %{buildroot}%{_sysconfdir}/pki/rpm-gpg
fa61e0
install -m0644 %{SOURCE21} %{buildroot}%{_sysconfdir}/pki/rpm-gpg
fa61e0
%endif
fa61e0
install -dp %{buildroot}%{_sysconfdir}/containers/registries.d
fa61e0
install -m0644 %{SOURCE22} %{buildroot}%{_sysconfdir}/containers/registries.d
fa61e0
install -m0644 %{SOURCE23} %{buildroot}%{_sysconfdir}/containers/registries.d
fa61e0
install -m0644 %{SOURCE24} %{buildroot}%{_sysconfdir}/containers/policy.json
fa61e0
install -dp %{buildroot}%{_sharedstatedir}/containers/sigstore
fa61e0
install -m0644 %{SOURCE25} %{buildroot}%{_sysconfdir}/containers/registries.d/default.yaml
fa61e0
fa61e0
# for containers-common
fa61e0
install -dp %{buildroot}%{_mandir}/man5
fa61e0
go-md2man -in %{SOURCE2} -out %{buildroot}%{_mandir}/man5/containers-storage.conf.5
fa61e0
go-md2man -in %{SOURCE4} -out %{buildroot}%{_mandir}/man5/containers-registries.conf.5
fa61e0
go-md2man -in %{SOURCE6} -out %{buildroot}%{_mandir}/man5/containers-policy.json.5
fa61e0
go-md2man -in %{SOURCE8} -out %{buildroot}%{_mandir}/man5/containers-mounts.conf.5
fa61e0
go-md2man -in %{SOURCE9} -out %{buildroot}%{_mandir}/man5/containers-signature.5
fa61e0
go-md2man -in %{SOURCE10} -out %{buildroot}%{_mandir}/man5/containers-transports.5
fa61e0
go-md2man -in %{SOURCE11} -out %{buildroot}%{_mandir}/man5/containers-certs.d.5
fa61e0
go-md2man -in %{SOURCE12} -out %{buildroot}%{_mandir}/man5/containers-registries.d.5
fa61e0
go-md2man -in %{SOURCE14} -out %{buildroot}%{_mandir}/man5/containers.conf.5
fa61e0
go-md2man -in %{SOURCE15} -out %{buildroot}%{_mandir}/man5/containers-auth.json.5
fa61e0
go-md2man -in %{SOURCE16} -out %{buildroot}%{_mandir}/man5/containers-registries.conf.d.5
fa61e0
fa61e0
install -dp %{buildroot}%{_datadir}/containers
fa61e0
install -m0644 %{SOURCE3} %{buildroot}%{_datadir}/containers/mounts.conf
fa61e0
install -m0644 %{SOURCE7} %{buildroot}%{_datadir}/containers/seccomp.json
fa61e0
install -m0644 %{SOURCE13} %{buildroot}%{_datadir}/containers/containers.conf
fa61e0
fa61e0
# install secrets patch directory
fa61e0
install -d -p -m 755 %{buildroot}/%{_datadir}/rhel/secrets
fa61e0
# rhbz#1110876 - update symlinks for subscription management
fa61e0
ln -s %{_sysconfdir}/pki/entitlement %{buildroot}%{_datadir}/rhel/secrets/etc-pki-entitlement
fa61e0
ln -s %{_sysconfdir}/rhsm %{buildroot}%{_datadir}/rhel/secrets/rhsm
fa61e0
ln -s %{_sysconfdir}/yum.repos.d/redhat.repo %{buildroot}%{_datadir}/rhel/secrets/redhat.repo
fa61e0
fa61e0
# ship preconfigured /etc/containers/registries.d/ files with containers-common - #1903813
fa61e0
cat <<EOF > %{buildroot}%{_sysconfdir}/containers/registries.d/registry.access.redhat.com.yaml
fa61e0
docker:
fa61e0
     registry.access.redhat.com:
fa61e0
         sigstore: https://access.redhat.com/webassets/docker/content/sigstore
fa61e0
EOF
fa61e0
fa61e0
cat <<EOF > %{buildroot}%{_sysconfdir}/containers/registries.d/registry.redhat.io.yaml
fa61e0
docker:
fa61e0
     registry.redhat.io:
fa61e0
         sigstore: https://registry.redhat.io/containers/sigstore
fa61e0
EOF
fa61e0
fa61e0
%files
fa61e0
%dir %{_sysconfdir}/containers
fa61e0
%dir %{_sysconfdir}/containers/certs.d
fa61e0
%dir %{_sysconfdir}/containers/registries.d
fa61e0
%{_sysconfdir}/containers/registries.d/registry.redhat.io.yaml
fa61e0
%{_sysconfdir}/containers/registries.d/registry.access.redhat.com.yaml
fa61e0
%dir %{_sysconfdir}/containers/oci
fa61e0
%dir %{_sysconfdir}/containers/oci/hooks.d
fa61e0
%dir %{_sysconfdir}/containers/registries.conf.d
fa61e0
%if !0%{?rhel} || 0%{?centos}
fa61e0
%{_sysconfdir}/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
fa61e0
%endif
fa61e0
%config(noreplace) %{_sysconfdir}/containers/policy.json
fa61e0
%config(noreplace) %{_sysconfdir}/containers/registries.d/default.yaml
fa61e0
%config(noreplace) %{_sysconfdir}/containers/storage.conf
fa61e0
%config(noreplace) %{_sysconfdir}/containers/registries.conf
fa61e0
%config(noreplace) %{_sysconfdir}/containers/registries.conf.d/*.conf
fa61e0
%config(noreplace) %{_sysconfdir}/containers/registries.d/*.yaml
fa61e0
%ghost %{_sysconfdir}/containers/containers.conf
fa61e0
%dir %{_sharedstatedir}/containers/sigstore
fa61e0
%{_mandir}/man5/*
fa61e0
%dir %{_datadir}/containers
fa61e0
%{_datadir}/containers/mounts.conf
fa61e0
%{_datadir}/containers/seccomp.json
fa61e0
%{_datadir}/containers/containers.conf
fa61e0
%dir %{_datadir}/rhel/secrets
fa61e0
%{_datadir}/rhel/secrets/*
fa61e0
aa9d01
%files -n aardvark-dns
aa9d01
%dir %{_libexecdir}/podman
aa9d01
%{_libexecdir}/podman/aardvark-dns
aa9d01
aa9d01
%files -n netavark
aa9d01
%dir %{_libexecdir}/podman
aa9d01
%{_libexecdir}/podman/netavark
aa9d01
%{_mandir}/man1/netavark.1*
aa9d01
fa61e0
%changelog
aa9d01
* Mon Mar 28 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-33
aa9d01
- Removal of invalid vendored project with unwanted license in aardvark-dns/netavark
aa9d01
- Resolves: #2065706
aa9d01
aa9d01
* Mon Feb 28 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-32
aa9d01
- build rust packages with RUSTFLAGS set to make ExecShield happy (Lokesh Mandvekar)
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Mon Feb 28 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-31
aa9d01
- update to netavark and aardvark-dns 1.0.1
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Wed Feb 23 2022 Lokesh Mandvekar <lsm5@redhat.com> - 2:1-30
aa9d01
- archful package should conflict with older noarch package
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Tue Feb 22 2022 Lokesh Mandvekar <lsm5@redhat.com> - 2:1-29
aa9d01
- consistent release tags for all packages
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Tue Feb 22 2022 Lokesh Mandvekar <lsm5@redhat.com> - 2:1-28
aa9d01
- main package should obsolete noarch versions upto 2:1-22
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Mon Feb 21 2022 Lokesh Mandvekar <lsm5@redhat.com> - 2:1-27
aa9d01
- do not specify infra_image in containers.conf
aa9d01
- needed to resolve gating test failures
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Sat Feb 19 2022 Lokesh Mandvekar <lsm5@redhat.com> - 2:1-26
aa9d01
- aardvark-dns built for same arches as netavark
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Sat Feb 19 2022 Lokesh Mandvekar <lsm5@redhat.com> - 2:1-25
aa9d01
- build netavark only for podman's arches
aa9d01
- i686 can't find go-md2man which causes the build to fail otherwise
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Fri Feb 18 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-24
aa9d01
- update to netavark-1.0.0 and aardvark-dns-1.0.0
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Thu Feb 17 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-23
aa9d01
- package aarvark-dns and netavark as part of the containers-common
aa9d01
- Related: #2000051
aa9d01
aa9d01
* Thu Feb 17 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-22
aa9d01
- update shortnames and vendored components
aa9d01
- Related: #2000051
aa9d01
0106cf
* Wed Feb 16 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-21
0106cf
- containers.conf should contain network_backend = "cni" in RHEL8.6
0106cf
- Related: #2000051
0106cf
0106cf
* Wed Feb 09 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-20
0106cf
- update shortname aliases from upstream
0106cf
- Related: #2000051
0106cf
0106cf
* Fri Feb 04 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-19
0106cf
- sync vendored components
0106cf
- Related: #2000051
0106cf
0106cf
* Fri Feb 04 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-18
0106cf
- sync vendored components
0106cf
- Related: #2000051
0106cf
0106cf
* Mon Jan 17 2022 Jindrich Novy <jnovy@redhat.com> - 2:1-17
0106cf
- sync shortname aliases via Pyxis
0106cf
- Related: #2000051
0106cf
0106cf
* Fri Dec 10 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-16
0106cf
- do not hardcode log_driver = "journald" and events_logger = "journald"
0106cf
  for RHEL9 and leave the rootful/rootless behaviour change based on
0106cf
  internal logic
0106cf
- Related: #2000051
0106cf
0106cf
* Thu Dec 09 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-15
0106cf
- do not allow broken content from Pyxis to land in shortnames.conf
0106cf
- Related: #2000051
0106cf
0106cf
* Wed Dec 08 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-14
0106cf
- update vendored component versions
0106cf
- sync shortname aliases via Pyxis
0106cf
- Related: #2000051
0106cf
617262
* Tue Nov 30 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-13
617262
- use log_driver = "journald" and events_logger = "journald" for RHEL9
617262
- Related: #2000051
617262
617262
* Tue Nov 16 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-12
617262
- consume seccomp.json from the oldest vendored version of c/common,
617262
  not main branch
617262
- Related: #2000051
617262
617262
* Fri Nov 12 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-11
617262
- use ubi8/pause as ubi9/pause is not available yet
617262
- Related: #2000051
617262
617262
* Wed Nov 10 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-10
617262
- update vendored components
617262
- Related: #2000051
617262
617262
* Tue Nov 02 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-9
617262
- make log_driver = "k8s-file" default in containers.conf
617262
- Related: #2000051
617262
fa61e0
* Fri Oct 01 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-8
fa61e0
- perform only sanity/installability tests for now
fa61e0
- Related: #2000051
fa61e0
fa61e0
* Wed Sep 29 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-7
fa61e0
- update to the new vendored components
fa61e0
- Related: #2000051
fa61e0
fa61e0
* Wed Sep 29 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-6
fa61e0
- add gating.yaml
fa61e0
- Related: #2000051
fa61e0
fa61e0
* Fri Sep 24 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-5
fa61e0
- update to the new vendored components
fa61e0
- Related: #2000051
fa61e0
fa61e0
* Fri Sep 10 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-4
fa61e0
- fix updating scripts
fa61e0
- Related: #2000051
fa61e0
fa61e0
* Thu Sep 09 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-3
fa61e0
- update to the new vendored components
fa61e0
- Related: #2000051
fa61e0
fa61e0
* Fri Aug 20 2021 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:1-2
fa61e0
- bump configs to latest versions
fa61e0
- replace ubi9 references with ubi8
fa61e0
- Related: #1970747
fa61e0
fa61e0
* Wed Aug 11 2021 Jindrich Novy <jnovy@redhat.com> - 2:1-1
fa61e0
- initial import
fa61e0
- Related: #1970747