Name: | docker |
---|---|
Version: | 1.3.3 |
Release: | 1.0.1.el7 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 19467942 |
License: | ASL 2.0 |
RPM: | docker-1.3.3-1.0.1.el7.x86_64.rpm |
Source RPM: | docker-1.3.3-1.0.1.el7.src.rpm |
Build Date: | Wed Dec 24 2014 |
Build Host: | ca-build56.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.docker.com |
Summary: | Automates deployment of containerized applications |
Description: | Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that will run virtually anywhere. Docker containers can encapsulate any payload, and will run consistently on and between virtually any server. The same container that a developer builds and tests on a laptop will run at scale, in production*, on VMs, bare-metal servers, OpenStack clusters, public instances, or combinations of the above. |
- Add symlink/LICENSE.BSD and symlink/LICENSE.APACHE under %files macro for docker-pkg-devel - Rename requirement of docker-io-pkg-devel in %package devel as docker-pkg-devel - Rename as docker - Restore SysV init scripts for Oracle Linux 6
- Update source to 1.3.3 from https://github.com/docker/docker/releases/tag/v1.3.3 Path traversal during processing of absolute symlinks (CVE-2014-9356) Escalation of privileges during decompression of LZMA (.xz) archives (CVE-2014-9357) Path traversal and spoofing opportunities presented through image identifiers (CVE-2014-9358)
- Update source to 1.3.2 from https://github.com/docker/docker/releases/tag/v1.3.2 Prevent host privilege escalation from an image extraction vulnerability (CVE-2014-6407). Prevent container escalation from malicious security options applied to images (CVE-2014-6408). The `--insecure-registry` flag of the `docker run` command has undergone several refinements and additions. You can now specify a sub-net in order to set a range of registries which the Docker daemon will consider insecure. By default, Docker now defines `localhost` as an insecure registry. Registries can now be referenced using the Classless Inter-Domain Routing (CIDR) format. When mirroring is enabled, the experimental registry v2 API is skipped.
- Remove pandoc from build reqs
- update to v1.3.1
- Resolves: rhbz#1153936 - update to v1.3.0 - don't install zsh files - iptables=false => ip-masq=false
- Resolves: rhbz#1149882 - systemd unit and socket file updates
- Resolves: rhbz#1139415 - correct path for bash completion /usr/share/bash-completion/completions - versioned provides for docker - golang versioned requirements for devel and pkg-devel - remove macros from changelog - don't own dirs owned by vim, systemd, bash
- Resolves: rhbz#1145660 - support /etc/sysconfig/docker-storage From: Colin Walters <walters@redhat.com> - patch to ignore selinux if it's disabled https://github.com/docker/docker/commit/9e2eb0f1cc3c4ef000e139f1d85a20f0e00971e6 From: Dan Walsh <dwalsh@redhat.com>
- Provides docker only for f21 and above