[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Package python3-iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8.x86_64 download

Name python3-iscsi-initiator-utils
Epoch 0
Version 6.2.1.4
Release 8.git095f59c.el8
Architecture x86_64
Website/URL http://www.open-iscsi.org
License GPLv2+
Build Time 2023-12-12 18:00:31
Build Host builder-x86-10.inferitos.ru
Summary Python 3.6 bindings to iscsi-initiator-utils
Repositories BaseOS
Description The iscsi-initiator-utils-python3 package contains Python 3.6 bindings to the libiscsi interface for interacting with iscsi-initiator-utils
Errata
Size 29 KiB
Source Project iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8
SHA-256 checksum d1682a5b469408e0a598b62cace118bacccf170cf51ca1194541d68a56d4a382
× Full screenshot
Changelog link
* Wed Jul 26 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 6.2.1.4-8.git095f59c
- Rebuilt for MSVSphere 8.8

* Thu Jun 15 2023 Chris Leech <cleech@redhat.com> - 6.2.1.4-8.git095f59c
- fix gating test

* Thu Jun 15 2023 Chris Leech <cleech@redhat.com> - 6.2.1.4-7.git095f59c
- move tests to tmt framework

* Tue Jun 13 2023 Chris Leech <cleech@redhat.com> - 6.2.1.4-6.git095f59c
- restore missing gating tests

* Wed Jun 07 2023 Chris Leech <cleech@redhat.com> - 6.2.1.4-5.git095f59c
- 2131090 fix idbm patch to not overwrite upstream changes in file mode

* Mon Aug 09 2021 Chris Leech <cleech@redhat.com> - 6.2.1.4-4.git095f59c
- 1755907 set proper attr in rpm db for lockfiles, fixes rpm verificiation warning

* Wed Jun 16 2021 Chris Leech <cleech@redhat.com> - 6.2.1.4-3.git095f59c
- coverity found a use-after-free regression in iscsistart

* Mon Jun 14 2021 Chris Leech <cleech@redhat.com> - 6.2.1.4-2.git095f59c
- 1924768 fix unit files for el8, not using iscsi-init

* Fri Mar 12 2021 Chris Leech <cleech@redhat.com> - 6.2.1.2-1.gita8fcb37
- 1924768 iscsiadm -m sessions fails when racing against session login/logout

* Thu Aug 20 2020 Chris Leech - 6.2.0.878-5.gitd791ce0
- 1849931, 1869438 go back to MD5 CHAP only by default
  new CHAP modes can cause issue with some targets,
  so SHA1/SHA256/SHA3-256 modes must be configured to enable now