Name: | libvirt-daemon-driver-secret |
---|---|
Version: | 6.0.0 |
Release: | 28.0.1.module+el8.3.0+7860+a7792d29 |
Architecture: | i686 |
Module: | virt-devel:ol:8030020200909014558:9edba152 virt-devel:ol:8030020201123162111:229f0a1c virt-devel:ol:8030020210205201602:229f0a1c virt-devel:ol:8030020210210212009:229f0a1c |
Group: | Unspecified |
Size: | 557246 |
License: | LGPLv2+ |
RPM: | libvirt-daemon-driver-secret-6.0.0-28.0.1.module+el8.3.0+7860+a7792d29.i686.rpm |
Source RPM: | libvirt-6.0.0-28.0.1.module+el8.3.0+7860+a7792d29.src.rpm |
Build Date: | Fri Nov 06 2020 |
Build Host: | jenkins-172-17-0-2-512dcb31-1966-4e93-8480-b8d563f5645e.blddevtest1iad.osdevelopmeniad.oraclevcn.com |
Vendor: | Oracle America |
URL: | https://libvirt.org/ |
Summary: | Secret driver plugin for the libvirtd daemon |
Description: | The secret driver plugin for the libvirtd daemon, providing an implementation of the secret key APIs. |
- Add runtime deps for pkg librbd1 >= 1:10.2.5 (Keshav Sharma)
- virdevmapper: Don't cache device-mapper major (rhbz#1860421) - virdevmapper: Handle kernel without device-mapper support (rhbz#1860421) - virdevmapper: Ignore all errors when opening /dev/mapper/control (rhbz#1860421)
- src: assume sys/sysmacros.h always exists on Linux (rhbz#1860421) - virdevmapper.c: Join two WITH_DEVMAPPER sections together (rhbz#1860421) - virDevMapperGetTargetsImpl: Use VIR_AUTOSTRINGLIST (rhbz#1860421) - virdevmapper: Don't use libdevmapper to obtain dependencies (CVE-2020-14339, rhbz#1860421) - virDevMapperGetTargets: Don't ignore EBADF (rhbz#1860421)
- qemu: blockjob: Don't base bitmap handling of active-layer block commit on QEMU_CAPS_BLOCKDEV_REOPEN (rhbz#1857779) - qemu: blockjob: Actually delete temporary bitmap on failed active commit (rhbz#1857779) - qemu: block: Remove 'active-write' bitmap even if there are no bitmaps to merge (rhbz#1857779) - qemuDomainBlockPivot: Rename 'actions' to 'bitmapactions' (rhbz#1857779) - qemuDomainBlockPivot: Ignore failures of creating active layer bitmap (rhbz#1857779)
- Upgrade components in virt:rhel module:stream for RHEL-8.3 release (rhbz#1828317) - conf: Don't format http cookies unless VIR_DOMAIN_DEF_FORMAT_SECURE is used (CVE-2020-14301) - util: Introduce a parser for kernel cmdline arguments (rhbz#1848997) - qemu: Check if s390 secure guest support is enabled (rhbz#1848997) - qemu: Check if AMD secure guest support is enabled (rhbz#1848997) - tools: Secure guest check on s390 in virt-host-validate (rhbz#1848997) - tools: Secure guest check for AMD in virt-host-validate (rhbz#1848997) - docs: Update AMD launch secure description (rhbz#1848997) - docs: Describe protected virtualization guest setup (rhbz#1848997)
- Resolves: bz#1828317 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)
- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)
- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)
- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)
- RHEL: virscsi: Check device type before getting it's /dev node name (rhbz#1808388) - RHEL: virscsi: Support TAPEs in virSCSIDeviceGetDevName() (rhbz#1808388) - RHEL: virscsi: Introduce and use virSCSIDeviceGetUnprivSGIOSysfsPath() (rhbz#1808388) - RHEL: virutil: Accept non-block devices in virGetDeviceID() (rhbz#1808388) - RHEL: qemuSetUnprivSGIO: Actually use calculated @sysfs_path to set unpriv_sgio (rhbz#1808388) - RHEL: qemuCheckUnprivSGIO: use @sysfs_path to get unpriv_sgio (rhbz#1808399)