[packages/docker-ce] up to 28.0.1

atler atler at pld-linux.org
Wed Feb 26 20:05:03 CET 2025


commit eb7661d9b4d42b534962e0219c27a859d8ba0098
Author: Jan Palus <atler at pld-linux.org>
Date:   Wed Feb 26 19:48:13 2025 +0100

    up to 28.0.1

 docker-ce.spec       |   8 ++--
 setsockopt-x86.patch | 102 ---------------------------------------------------
 2 files changed, 3 insertions(+), 107 deletions(-)
---
diff --git a/docker-ce.spec b/docker-ce.spec
index c097467..6a64365 100644
--- a/docker-ce.spec
+++ b/docker-ce.spec
@@ -1,17 +1,16 @@
 Summary:	Docker CE: the open-source application container engine
 Name:		docker-ce
-Version:	28.0.0
-Release:	2
+Version:	28.0.1
+Release:	1
 License:	Apache v2.0
 Group:		Applications/System
 # https://github.com/moby/moby/releases
 Source0:	https://github.com/moby/moby/archive/v%{version}/%{name}-%{version}.tar.gz
-# Source0-md5:	15697ab63191af73ade7bc8e4a5e9808
+# Source0-md5:	57f86595d3dddc6541ca24acaf7c519c
 Source1:	dockerd.sh
 Source2:	docker.init
 Source3:	docker.sysconfig
 Patch0:		systemd.patch
-Patch1:		setsockopt-x86.patch
 URL:		https://www.docker.com/
 BuildRequires:	golang >= 1.21
 BuildRequires:	linux-libc-headers >= 7:4.12
@@ -70,7 +69,6 @@ databases.
 %prep
 %setup -q -n moby-%{version}
 %patch -P0 -p1
-%patch -P1 -p1
 
 %build
 export VERSION=%{version}
diff --git a/setsockopt-x86.patch b/setsockopt-x86.patch
deleted file mode 100644
index 23240d7..0000000
--- a/setsockopt-x86.patch
+++ /dev/null
@@ -1,102 +0,0 @@
-From 73f2a5336d8af70e6676d2bea2b321ea62fbfe26 Mon Sep 17 00:00:00 2001
-From: Albin Kerouanton <albinker at gmail.com>
-Date: Sun, 23 Feb 2025 11:24:50 +0100
-Subject: [PATCH] libnet/d/bridge: fix compilation on i386
-
-On i386, Linux doesn't provide direct socket syscall but instead
-multiplexes them through the socketcall syscall (see `man 2 socketcall`).
-This commit fixes compilation for i386 by wrapping the offending syscall
-in a new function that uses the socketcall syscall on i386, and
-the `setsockopt` syscall on other archs.
-
-Signed-off-by: Albin Kerouanton <albinker at gmail.com>
----
- .../drivers/bridge/port_mapping_linux.go      | 10 +--------
- .../drivers/bridge/port_mapping_linux_386.go  | 21 +++++++++++++++++++
- .../bridge/port_mapping_linux_others.go       | 21 +++++++++++++++++++
- 3 files changed, 43 insertions(+), 9 deletions(-)
- create mode 100644 libnetwork/drivers/bridge/port_mapping_linux_386.go
- create mode 100644 libnetwork/drivers/bridge/port_mapping_linux_others.go
-
-diff --git a/libnetwork/drivers/bridge/port_mapping_linux.go b/libnetwork/drivers/bridge/port_mapping_linux.go
-index d4c5e46056c69..285d2a3b00563 100644
---- a/libnetwork/drivers/bridge/port_mapping_linux.go
-+++ b/libnetwork/drivers/bridge/port_mapping_linux.go
-@@ -13,7 +13,6 @@ import (
- 	"slices"
- 	"strconv"
- 	"syscall"
--	"unsafe"
- 
- 	"github.com/containerd/log"
- 	"github.com/docker/docker/libnetwork/iptables"
-@@ -675,14 +674,7 @@ func bindSCTP(cfg portBindingReq, port int) (_ portBinding, retErr error) {
- 		syscall.SetsockoptInt(sd, syscall.IPPROTO_IPV6, syscall.IPV6_V6ONLY, 1)
- 	}
- 
--	options := sctp.InitMsg{NumOstreams: sctp.SCTP_MAX_STREAM}
--	if _, _, errno := syscall.Syscall6(syscall.SYS_SETSOCKOPT,
--		uintptr(sd),
--		sctp.SOL_SCTP,
--		sctp.SCTP_INITMSG,
--		uintptr(unsafe.Pointer(&options)), // #nosec G103 -- Ignore "G103: Use of unsafe calls should be audited"
--		unsafe.Sizeof(options),
--		0); errno != 0 {
-+	if errno := setSCTPInitMsg(sd, sctp.InitMsg{NumOstreams: sctp.SCTP_MAX_STREAM}); errno != 0 {
- 		return portBinding{}, errno
- 	}
- 
-diff --git a/libnetwork/drivers/bridge/port_mapping_linux_386.go b/libnetwork/drivers/bridge/port_mapping_linux_386.go
-new file mode 100644
-index 0000000000000..4c7ece4030d1a
---- /dev/null
-+++ b/libnetwork/drivers/bridge/port_mapping_linux_386.go
-@@ -0,0 +1,21 @@
-+package bridge
-+
-+import (
-+	"syscall"
-+	"unsafe"
-+
-+	"github.com/ishidawataru/sctp"
-+)
-+
-+const sysSetsockopt = 14 // See https://elixir.bootlin.com/linux/v6.13.3/source/include/uapi/linux/net.h#L40
-+
-+func setSCTPInitMsg(sd int, options sctp.InitMsg) syscall.Errno {
-+	_, _, errno := syscall.Syscall6(syscall.SYS_SOCKETCALL, // See `man 2 socketcall`
-+		sysSetsockopt,
-+		uintptr(sd),
-+		sctp.SOL_SCTP,
-+		sctp.SCTP_INITMSG,
-+		uintptr(unsafe.Pointer(&options)), // #nosec G103 -- Ignore "G103: Use of unsafe calls should be audited"
-+		unsafe.Sizeof(options))
-+	return errno
-+}
-diff --git a/libnetwork/drivers/bridge/port_mapping_linux_others.go b/libnetwork/drivers/bridge/port_mapping_linux_others.go
-new file mode 100644
-index 0000000000000..d94ad0e54ad17
---- /dev/null
-+++ b/libnetwork/drivers/bridge/port_mapping_linux_others.go
-@@ -0,0 +1,21 @@
-+//go:build linux && !386
-+
-+package bridge
-+
-+import (
-+	"syscall"
-+	"unsafe"
-+
-+	"github.com/ishidawataru/sctp"
-+)
-+
-+func setSCTPInitMsg(sd int, options sctp.InitMsg) syscall.Errno {
-+	_, _, errno := syscall.Syscall6(syscall.SYS_SETSOCKOPT,
-+		uintptr(sd),
-+		sctp.SOL_SCTP,
-+		sctp.SCTP_INITMSG,
-+		uintptr(unsafe.Pointer(&options)), // #nosec G103 -- Ignore "G103: Use of unsafe calls should be audited"
-+		unsafe.Sizeof(options),
-+		0)
-+	return errno
-+}
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/docker-ce.git/commitdiff/eb7661d9b4d42b534962e0219c27a859d8ba0098



More information about the pld-cvs-commit mailing list