summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Sebastiaan van Stijn [Wed, 14 Aug 2019 00:51:08 +0000 (02:51 +0200)]
Adjust tests for changes in Go 1.12.8 / 1.11.13
```
00:38:11 === Failed
00:38:11 === FAIL: opts TestParseDockerDaemonHost (0.00s)
00:38:11 hosts_test.go:87: tcp tcp:a.b.c.d address expected error "Invalid bind address format: tcp:a.b.c.d" return, got "parse tcp://tcp:a.b.c.d: invalid port \":a.b.c.d\" after host" and addr
00:38:11 hosts_test.go:87: tcp tcp:a.b.c.d/path address expected error "Invalid bind address format: tcp:a.b.c.d/path" return, got "parse tcp://tcp:a.b.c.d/path: invalid port \":a.b.c.d\" after host" and addr
00:38:11
00:38:11 === FAIL: opts TestParseTCP (0.00s)
00:38:11 hosts_test.go:129: tcp tcp:a.b.c.d address expected error Invalid bind address format: tcp:a.b.c.d return, got parse tcp://tcp:a.b.c.d: invalid port ":a.b.c.d" after host and addr
00:38:11 hosts_test.go:129: tcp tcp:a.b.c.d/path address expected error Invalid bind address format: tcp:a.b.c.d/path return, got parse tcp://tcp:a.b.c.d/path: invalid port ":a.b.c.d" after host and addr
```
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit
683766613a8c1dca8f95b19ddb7e083bb3aef266)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Gbp-Pq: Name test--engine-fix-golang11.patch
Sebastiaan van Stijn [Mon, 4 Mar 2019 17:44:07 +0000 (18:44 +0100)]
Fix test for Go 1.12.x
After switching to Go 1.12, the format-string causes an error;
```
=== Errors
cli/config/config_test.go:154:3: Fatalf format %q has arg config of wrong type *github.com/docker/cli/cli/config/configfile.ConfigFile
cli/config/config_test.go:217:3: Fatalf format %q has arg config of wrong type *github.com/docker/cli/cli/config/configfile.ConfigFile
cli/config/config_test.go:253:3: Fatalf format %q has arg config of wrong type *github.com/docker/cli/cli/config/configfile.ConfigFile
cli/config/config_test.go:288:3: Fatalf format %q has arg config of wrong type *github.com/docker/cli/cli/config/configfile.ConfigFile
cli/config/config_test.go:435:3: Fatalf format %q has arg config of wrong type *github.com/docker/cli/cli/config/configfile.ConfigFile
cli/config/config_test.go:448:3: Fatalf format %q has arg config of wrong type *github.com/docker/cli/cli/config/configfile.ConfigFile
DONE 1115 tests, 2 skipped, 6 errors in 215.984s
make: *** [Makefile:22: test-coverage] Error 2
Exited with code 2
```
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit
d4877fb2259feac2c76762ccd3001999cb7f0d58)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Gbp-Pq: Name test--cli-fix-golang12.patch
Sebastiaan van Stijn [Wed, 14 Aug 2019 08:04:43 +0000 (10:04 +0200)]
Adjust tests for changes in Go 1.12.8 / 1.11.13
For now, just verifying that an error is returned, but not checking the
error message itself, because those are not under our control, and may
change with different Go versions.
```
=== Failed
=== FAIL: opts TestParseDockerDaemonHost (0.00s)
hosts_test.go:87: tcp tcp:a.b.c.d address expected error "Invalid bind address format: tcp:a.b.c.d" return, got "parse tcp://tcp:a.b.c.d: invalid port \":a.b.c.d\" after host" and addr
hosts_test.go:87: tcp tcp:a.b.c.d/path address expected error "Invalid bind address format: tcp:a.b.c.d/path" return, got "parse tcp://tcp:a.b.c.d/path: invalid port \":a.b.c.d\" after host" and addr
=== FAIL: opts TestParseTCP (0.00s)
hosts_test.go:129: tcp tcp:a.b.c.d address expected error Invalid bind address format: tcp:a.b.c.d return, got parse tcp://tcp:a.b.c.d: invalid port ":a.b.c.d" after host and addr
hosts_test.go:129: tcp tcp:a.b.c.d/path address expected error Invalid bind address format: tcp:a.b.c.d/path return, got parse tcp://tcp:a.b.c.d/path: invalid port ":a.b.c.d" after host and addr
```
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Gbp-Pq: Name test--cli-fix-golang11.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
test--skip-privileged-unit-tests
Gbp-Pq: Name test--skip-privileged-unit-tests.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
test--skip-network-tests
Gbp-Pq: Name test--skip-network-tests.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
test--skip-TestStateRunStop
~~~~
state_test.go:102: ExitCode -1, expected 2, err "context deadline exceeded"
~~~~
Gbp-Pq: Name test--skip-TestStateRunStop.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
test--skip-TestGetRootUIDGID
~~~~
FAIL: TestGetRootUIDGID (0.00s)
idtools_unix_test.go:287:
Error Trace: idtools_unix_test.go:287
Error: Not equal:
expected: 1009
actual : 2952
Test: TestGetRootUIDGID
~~~~
Gbp-Pq: Name test--skip-TestGetRootUIDGID.patch
Arnaud Rebillout [Thu, 24 Jan 2019 08:22:58 +0000 (15:22 +0700)]
Skip TestClientWithRequestTimeout
This test seems to be flaky. Please follow-up upstream for more details:
<https://github.com/moby/moby/issues/38587>
Origin: vendor, Debian
Forwarded: not-needed, Debian-specific
Signed-off-by: Arnaud Rebillout <arnaud.rebillout@collabora.com>
Gbp-Pq: Name test--skip-TestClientWithRequestTimeout.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
test--skip-TestChangesWithChangesGH13590
Gbp-Pq: Name test--skip-TestChangesWithChangesGH13590.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
test--skip-TestAdapterReadLogs
~~~~
FAIL: TestAdapterReadLogs (0.00s)
panic: runtime error: invalid memory address or nil pointer dereference [recovered]
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x83273c5]
goroutine 7 [running]:
testing.tRunner.func1(0x1a686ab0)
/usr/lib/go-1.10/src/testing/testing.go:742 +0x24a
panic(0x8393cc0, 0x85d1e78)
/usr/lib/go-1.10/src/runtime/panic.go:502 +0x1dc
github.com/docker/docker/daemon/logger.testMessageEqual(0x1a686ab0, 0x1a65cc7c, 0x0)
/var/lib/gitlab-runner/builds/
736b76b0/1/docker-team/docker/.gopath/src/github.com/docker/docker/daemon/logger/adapter_test.go:178 +0x35
github.com/docker/docker/daemon/logger.TestAdapterReadLogs(0x1a686ab0)
/var/lib/gitlab-runner/builds/
736b76b0/1/docker-team/docker/.gopath/src/github.com/docker/docker/daemon/logger/adapter_test.go:131 +0x710
testing.tRunner(0x1a686ab0, 0x83fa01c)
/usr/lib/go-1.10/src/testing/testing.go:777 +0xaa
created by testing.(*T).Run
/usr/lib/go-1.10/src/testing/testing.go:824 +0x243
FAIL github.com/docker/docker/daemon/logger 0.012s
~~~~
Gbp-Pq: Name test--skip-TestAdapterReadLogs.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
test--fix-test-errors
Gbp-Pq: Name test--fix-test-errors.patch
Arnaud Rebillout [Fri, 18 Jan 2019 11:54:15 +0000 (18:54 +0700)]
Disable containerizedengine/update_test.go
This test FTBFS, see <https://github.com/docker/cli/pull/1561>.
Please re-enable this test when this MR is accepted.
Origin: vendor, Debian
Forwarded: not-needed, Debian-specific
Signed-off-by: Arnaud Rebillout <arnaud.rebillout@collabora.com>
Gbp-Pq: Name test--disable-containerizedengine-update-test.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
netlink_syscall
Gbp-Pq: Name netlink_syscall.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
mips-fix-devnumber
~~~~
github.com/docker/docker/pkg/system/stat_linux.go:13:7: cannot use s.Rdev (type uint32) as type uint64 in field value
~~~~
Gbp-Pq: Name mips-fix-devnumber.patch
poizan42 [Wed, 18 Jul 2018 12:31:16 +0000 (14:31 +0200)]
SIGSKTFLT does not exist on MIPS, instead SIGEMT does.
SIGRTMAX is also 127 on MIPS.
This patch is merged upstream on master, please drop it when necessary.
Signed-off-by: Kasper Fabæch Brandt <poizan@poizan.dk>
Origin: upstream, https://github.com/moby/moby/pull/37491
Gbp-Pq: Name mips-add-specific-signal-file.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
libnetwork_proto_no_unrecognized_all
Fix this by setting goproto_unrecognized_all=false which suppresses this field.
Upstream doesn't have the problem because they have pinned an older version
of gogo/protobuf: https://github.com/docker/libnetwork/pull/2242
Author: Felix Geyer <fgeyer@debian.org>
Gbp-Pq: Name libnetwork_proto_no_unrecognized_all.patch
Arko Dasgupta [Fri, 1 Mar 2019 19:43:02 +0000 (11:43 -0800)]
Revert "debian has iptables-legacy and iptables-nft now"
This reverts commit
7da66eea9f68e4abc83ed2892114ec565eddd66a.
Libnetwork should only use the iptables binary. Iptables v1.8 and above
uses the nftables backend. The translations for all the rules used by
libnetwork is supported by the new iptables binary.
Signed-off-by: Arko Dasgupta <arko.dasgupta@docker.com>
Origin: upstream, https://github.com/docker/libnetwork/pull/2343
Gbp-Pq: Name libnetwork-revert-iptables-legacy.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
libnetwork_proto
Gbp-Pq: Name libnetwork_proto.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
go-metrics_prometheus-fix_Observer
Gbp-Pq: Name go-metrics_prometheus-fix_Observer.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
engine-test-noinstall
~~~~
go test net: open /usr/lib/go-1.10/pkg/linux_amd64/net.a: permission denied
~~~~
Gbp-Pq: Name engine-test-noinstall.patch
Mattias Jernberg [Wed, 5 Dec 2018 18:35:17 +0000 (19:35 +0100)]
mkimage: Fix Debian security presence check
Add Location following since security redirects to security-cdn and caused the repository to be added on Debian unstable.
Signed-off-by: Mattias Jernberg <nostrad@gmail.com>
Origin: upstream, https://github.com/docker/engine/commit/
8db5403
Gbp-Pq: Name engine-contrib-debootstrap-curl-follow-location.patch
Justin Cormack [Thu, 25 Jul 2019 14:24:39 +0000 (15:24 +0100)]
Initialize nss libraries in Glibc so that the dynamic libraries are loaded in the host environment not in the chroot from untrusted files.
See also OpenVZ https://github.com/kolyshkin/vzctl/blob/
a3f732ef751998913fcf0a11b3e05236b51fd7e9/src/enter.c#L227-L234
Signed-off-by: Justin Cormack <justin.cormack@docker.com>
Signed-off-by: Tibor Vass <tibor@docker.com>
(cherry picked from commit
a316b10dab79d9298b02c7930958ed52e0ccf4e4)
Gbp-Pq: Name cve-2019-14271-Initialize-nss-libraries-in-Glibc.patch
Sebastiaan van Stijn [Wed, 3 Jul 2019 14:16:22 +0000 (16:16 +0200)]
DebugRequestMiddleware: Remove path handling
Path-specific rules were removed, so this is no longer used.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit
530e63c1a61b105a6f7fc143c5acb9b5cd87f958)
Signed-off-by: Tibor Vass <tibor@docker.com>
(cherry picked from commit
f8a0f26843bc5aff33cf9201b75bd4bdbb48a3ad)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Origin: upstream, https://github.com/docker/engine/pull/298
Gbp-Pq: Name cve-2019-13509-04-DebugRequestMiddleware-Remove-path-handling.patch
Sebastiaan van Stijn [Tue, 2 Jul 2019 12:21:03 +0000 (14:21 +0200)]
DebugRequestMiddleware: unconditionally scrub data field
Commit
77b8465d7e68ca102d7aae839c7b3fe0ecd28398 added a secret update
endpoint to allow updating labels on existing secrets. However, when
implementing the endpoint, the DebugRequestMiddleware was not updated
to scrub the Data field (as is being done when creating a secret).
When updating a secret (to set labels), the Data field should be either
`nil` (not set), or contain the same value as the existing secret. In
situations where the Data field is set, and the `dockerd` daemon is
running with debugging enabled / log-level debug, the base64-encoded
value of the secret is printed to the daemon logs.
The docker cli does not have a `docker secret update` command, but
when using `docker stack deploy`, the docker cli sends the secret
data both when _creating_ a stack, and when _updating_ a stack, thus
leaking the secret data if the daemon runs with debug enabled:
1. Start the daemon in debug-mode
dockerd --debug
2. Initialize swarm
docker swarm init
3. Create a file containing a secret
echo secret > my_secret.txt
4. Create a docker-compose file using that secret
cat > docker-compose.yml <<'EOF'
version: "3.3"
services:
web:
image: nginx:alpine
secrets:
- my_secret
secrets:
my_secret:
file: ./my_secret.txt
EOF
5. Deploy the stack
docker stack deploy -c docker-compose.yml test
6. Verify that the secret is scrubbed in the daemon logs
DEBU[2019-07-01T22:36:08.170617400Z] Calling POST /v1.30/secrets/create
DEBU[2019-07-01T22:36:08.171364900Z] form data: {"Data":"*****","Labels":{"com.docker.stack.namespace":"test"},"Name":"test_my_secret"}
7. Re-deploy the stack to trigger an "update"
docker stack deploy -c docker-compose.yml test
8. Notice that this time, the Data field is not scrubbed, and the base64-encoded secret is logged
DEBU[2019-07-01T22:37:35.828819400Z] Calling POST /v1.30/secrets/w3hgvwpzl8yooq5ctnyp71v52/update?version=34
DEBU[2019-07-01T22:37:35.829993700Z] form data: {"Data":"c2VjcmV0Cg==","Labels":{"com.docker.stack.namespace":"test"},"Name":"test_my_secret"}
This patch modifies `maskSecretKeys` to unconditionally scrub `Data` fields.
Currently, only the `secrets` and `configs` endpoints use a field with this
name, and no other POST API endpoints use a data field, so scrubbing this
field unconditionally will only scrub requests for those endpoints.
If a new endpoint is added in future where this field should not be scrubbed,
we can re-introduce more fine-grained (path-specific) handling.
This patch introduces some change in behavior:
- In addition to secrets, requests to create or update _configs_ will
now have their `Data` field scrubbed. Generally, the actual data should
not be interesting for debugging, so likely will not be problematic.
In addition, scrubbing this data for configs may actually be desirable,
because (even though they are not explicitely designed for this purpose)
configs may contain sensitive data (credentials inside a configuration
file, e.g.).
- Requests that send key/value pairs as a "map" and that contain a
key named "data", will see the value of that field scrubbed. This
means that (e.g.) setting a `label` named `data` on a config, will
scrub/mask the value of that label.
- Note that this is already the case for any label named `jointoken`,
`password`, `secret`, `signingcakey`, or `unlockkey`.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit
c7ce4be93ae8edd2da62a588e01c67313a4aba0c)
Signed-off-by: Tibor Vass <tibor@docker.com>
(cherry picked from commit
73db8c77bfb2d0cbdf71ce491f3d3e66c9dd5be6)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Origin: upstream, https://github.com/docker/engine/pull/298
Gbp-Pq: Name cve-2019-13509-03-DebugRequestMiddleware-unconditionally-scrub-data-field.patch
Sebastiaan van Stijn [Tue, 2 Jul 2019 11:29:24 +0000 (13:29 +0200)]
TestMaskSecretKeys: use subtests
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit
32d70c7e21631224674cd60021d3ec908c2d888c)
Signed-off-by: Tibor Vass <tibor@docker.com>
(cherry picked from commit
ebb542b3f88d7f5551f6b6e1d8d2774a2c166409)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Origin: https://github.com/docker/engine/pull/298
Gbp-Pq: Name cve-2019-13509-02-TestMaskSecretKeys-use-subtests.patch
Sebastiaan van Stijn [Tue, 2 Jul 2019 11:21:04 +0000 (13:21 +0200)]
TestMaskSecretKeys: add more test-cases
Add tests for
- case-insensitive matching of fields
- recursive masking
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit
db5f811216e70bcb4a10e477c1558d6c68f618c5)
Signed-off-by: Tibor Vass <tibor@docker.com>
(cherry picked from commit
18dac2cf32faeaada3bd4e8e2bffa576ad4329fe)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Origin: upstream, https://github.com/docker/engine/pull/298
Gbp-Pq: Name cve-2019-13509-01-TestMaskSecretKeys-add-more-test-cases.patch
Tonis Tiigi [Wed, 6 Feb 2019 19:58:40 +0000 (11:58 -0800)]
gitutils: add validation for ref
Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com>
(cherry picked from commit
723b107ca4fba14580a6cd971e63d8af2e7d2bbe)
Signed-off-by: Andrew Hsu <andrewhsu@docker.com>
Origin: upstream, https://github.com/moby/moby/pull/38944
Gbp-Pq: Name cve-2019-13139-01-gitutils-add-validation-for-ref.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
Disable privileged tests for cve-2018-15664
Gbp-Pq: Name cve-2018-15664-03-debian-skip-privileged-tests.patch
Brian Goff [Thu, 30 May 2019 21:55:52 +0000 (14:55 -0700)]
Add chroot for tar packing operations
Previously only unpack operations were supported with chroot.
This adds chroot support for packing operations.
This prevents potential breakouts when copying data from a container.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
Origin: upstream, https://github.com/moby/moby/pull/39292
Gbp-Pq: Name cve-2018-15664-02-add-chroot-for-tar-packing-operations.patch
Brian Goff [Thu, 30 May 2019 18:15:09 +0000 (11:15 -0700)]
Pass root to chroot to for chroot Untar
This is useful for preventing CVE-2018-15664 where a malicious container
process can take advantage of a race on symlink resolution/sanitization.
Before this change chrootarchive would chroot to the destination
directory which is attacker controlled. With this patch we always chroot
to the container's root which is not attacker controlled.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
Origin: upstream, https://github.com/moby/moby/pull/39292
Gbp-Pq: Name cve-2018-15664-01-pass-root-to-chroot-to-for-chroot-untar.patch
Kir Kolyshkin [Wed, 10 Oct 2018 06:36:04 +0000 (23:36 -0700)]
cli/registry: fix a Debugf statement
Fix this warning from go-1.11
> cli/registry/client/fetcher.go:234: Debugf format %s has arg
> repoEndpoint of wrong type client.repositoryEndpoint
Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
Origin: upstream, https://github.com/docker/cli/commit/
51848bf
Gbp-Pq: Name cli-fix-registry-debug-message-go-1.11.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
cli-fix-manpages-build-script
Gbp-Pq: Name cli-fix-manpages-build-script.patch
Arnaud Rebillout [Tue, 22 Jan 2019 05:22:52 +0000 (12:22 +0700)]
Build against google-grpc 1.11, where md.Get() does not exist.
This patch is based on the commit that introduced md.Get() in google-grpc:
<https://github.com/grpc/grpc-go/commit/
291de7f0>.
Please drop this patch as soon as we build docker against google-grpc >= 1.12.
Origin: vendor, Debian
Forwarded: not-needed, Debian-specific
Signed-off-by: Arnaud Rebillout <arnaud.rebillout@collabora.com>
Gbp-Pq: Name buildkit-build-against-google-grpc-1.11.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
debian-nuke-no-prompt
Gbp-Pq: Name debian-nuke-no-prompt.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
debian-cgroupfs-mount-convenience-copy
Gbp-Pq: Name debian-cgroupfs-mount-convenience-copy.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
debian-dockerd-binary-location
Gbp-Pq: Name debian-dockerd-binary-location.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
debian-containerd-name
Gbp-Pq: Name debian-containerd-name.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
debian-systemd-unit-environment-file
Gbp-Pq: Name debian-systemd-unit-environment-file.patch
pierre@meteor.com [Thu, 24 Mar 2016 23:14:30 +0000 (16:14 -0700)]
docker.service: don't limit tasks
Signed-off-by: Pierre Carrier <pierre@meteor.com>
Gbp-Pq: Name debian-systemd-unit-tasksmax.patch
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
docker.io (18.09.1+dfsg1-9) unstable; urgency=medium
[ Dmitry Smirnov ]
* rules: no longer disable Go cache to prevent FTBFS with Go 1.12.
[ Felix Geyer ]
* Cherry-pick upstream commits to fix test failures with golang >= 1.11.6-1+deb10u1
* Add upstream patch for CVE-2019-14271
* Fix build failure with gogo/protobuf >= 1.2
[dgit import unpatched docker.io 18.09.1+dfsg1-9]
Arnaud Rebillout [Wed, 4 Sep 2019 07:54:29 +0000 (08:54 +0100)]
Import docker.io_18.09.1+dfsg1-9.debian.tar.xz
[dgit import tarball docker.io 18.09.1+dfsg1-9 docker.io_18.09.1+dfsg1-9.debian.tar.xz]
Arnaud Rebillout [Tue, 22 Jan 2019 08:48:15 +0000 (08:48 +0000)]
Import docker.io_18.09.1+dfsg1.orig.tar.xz
[dgit import orig docker.io_18.09.1+dfsg1.orig.tar.xz]
Arnaud Rebillout [Tue, 22 Jan 2019 08:48:15 +0000 (08:48 +0000)]
Import docker.io_18.09.1+dfsg1.orig-containerd.tar.xz
[dgit import orig docker.io_18.09.1+dfsg1.orig-containerd.tar.xz]
Arnaud Rebillout [Tue, 22 Jan 2019 08:48:15 +0000 (08:48 +0000)]
Import docker.io_18.09.1+dfsg1.orig-distribution.tar.xz
[dgit import orig docker.io_18.09.1+dfsg1.orig-distribution.tar.xz]
Arnaud Rebillout [Tue, 22 Jan 2019 08:48:15 +0000 (08:48 +0000)]
Import docker.io_18.09.1+dfsg1.orig-go-events.tar.xz
[dgit import orig docker.io_18.09.1+dfsg1.orig-go-events.tar.xz]
Arnaud Rebillout [Tue, 22 Jan 2019 08:48:15 +0000 (08:48 +0000)]
Import docker.io_18.09.1+dfsg1.orig-go-metrics.tar.xz
[dgit import orig docker.io_18.09.1+dfsg1.orig-go-metrics.tar.xz]
Arnaud Rebillout [Tue, 22 Jan 2019 08:48:15 +0000 (08:48 +0000)]
Import docker.io_18.09.1+dfsg1.orig-libnetwork.tar.xz
[dgit import orig docker.io_18.09.1+dfsg1.orig-libnetwork.tar.xz]
Arnaud Rebillout [Tue, 22 Jan 2019 08:48:15 +0000 (08:48 +0000)]
Import docker.io_18.09.1+dfsg1.orig-swarmkit.tar.xz
[dgit import orig docker.io_18.09.1+dfsg1.orig-swarmkit.tar.xz]