Package iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8.i686
Name | iscsi-initiator-utils |
---|---|
Epoch | 0 |
Version | 6.2.1.4 |
Release | 8.git095f59c.el8 |
Architecture | i686 |
Website/URL | http://www.open-iscsi.org |
License | GPLv2+ |
Build Time | 2023-12-12 18:00:52 |
Build Host | builder-x86-10.inferitos.ru |
Summary | iSCSI daemon and utility programs |
Repositories | BaseOS |
Description | The iscsi package provides the server daemon for the iSCSI protocol, as well as the utility programs used to manage it. iSCSI is a protocol for distributed disk access using SCSI commands sent over Internet Protocol networks. |
Errata | — |
Size | 396 KiB |
Source Project | iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8 |
SHA-256 checksum | 687ec8e519bef1182cb5025e2b0315dcd758dc41801d6a932938018e8598991b |
×
* Wed Jul 26 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 6.2.1.4-8.git095f59c - Rebuilt for MSVSphere 8.8 * Thu Jun 15 2023 Chris Leech <cleech@redhat.com> - 6.2.1.4-8.git095f59c - fix gating test * Thu Jun 15 2023 Chris Leech <cleech@redhat.com> - 6.2.1.4-7.git095f59c - move tests to tmt framework * Tue Jun 13 2023 Chris Leech <cleech@redhat.com> - 6.2.1.4-6.git095f59c - restore missing gating tests * Wed Jun 07 2023 Chris Leech <cleech@redhat.com> - 6.2.1.4-5.git095f59c - 2131090 fix idbm patch to not overwrite upstream changes in file mode * Mon Aug 09 2021 Chris Leech <cleech@redhat.com> - 6.2.1.4-4.git095f59c - 1755907 set proper attr in rpm db for lockfiles, fixes rpm verificiation warning * Wed Jun 16 2021 Chris Leech <cleech@redhat.com> - 6.2.1.4-3.git095f59c - coverity found a use-after-free regression in iscsistart * Mon Jun 14 2021 Chris Leech <cleech@redhat.com> - 6.2.1.4-2.git095f59c - 1924768 fix unit files for el8, not using iscsi-init * Fri Mar 12 2021 Chris Leech <cleech@redhat.com> - 6.2.1.2-1.gita8fcb37 - 1924768 iscsiadm -m sessions fails when racing against session login/logout * Thu Aug 20 2020 Chris Leech - 6.2.0.878-5.gitd791ce0 - 1849931, 1869438 go back to MD5 CHAP only by default new CHAP modes can cause issue with some targets, so SHA1/SHA256/SHA3-256 modes must be configured to enable now