mirror of https://github.com/docker/docs.git
engine: remove some EE references from CE release notes
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
This commit is contained in:
parent
e87106b2fd
commit
6c6ed0e6a5
|
@ -148,12 +148,12 @@ skip_read_time: true
|
|||
|
||||
2019-02-28
|
||||
|
||||
### Networking fixes for Docker Engine EE and CE
|
||||
### Networking fixes
|
||||
* Windows: now avoids regeneration of network IDs to prevent broken references to networks. [docker/engine#149](https://github.com/docker/engine/pull/149)
|
||||
* Windows: Fixed an issue to address `- restart always` flag on standalone containers not working when specifying a network. (docker/escalation#1037)
|
||||
* Fixed an issue to address the IPAM state from networkdb if the manager is not attached to the overlay network. (docker/escalation#1049)
|
||||
|
||||
### Runtime fixes and updates for Docker Engine EE and CE
|
||||
### Runtime fixes and updates
|
||||
|
||||
* Updated to Go version 1.10.8.
|
||||
* Modified names in the container name generator. [docker/engine#159](https://github.com/docker/engine/pull/159)
|
||||
|
@ -169,7 +169,7 @@ skip_read_time: true
|
|||
|
||||
2019-02-11
|
||||
|
||||
### Security fixes for Docker Engine - Enterprise and Docker Engine - Community
|
||||
### Security fixes
|
||||
* Update `runc` to address a critical vulnerability that allows specially-crafted containers to gain administrative privileges on the host. [CVE-2019-5736](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736)
|
||||
* Ubuntu 14.04 customers using a 3.13 kernel will need to upgrade to a supported Ubuntu 4.x kernel
|
||||
|
||||
|
@ -194,12 +194,12 @@ MountFlags=
|
|||
```
|
||||
Update your configuration if this command prints a non-empty value for `MountFlags`, and restart the docker service.
|
||||
|
||||
### Security fixes for Docker Engine EE and CE
|
||||
### Security fixes
|
||||
* Upgraded Go language to 1.10.6 to resolve [CVE-2018-16873](https://nvd.nist.gov/vuln/detail/CVE-2018-16873), [CVE-2018-16874](https://nvd.nist.gov/vuln/detail/CVE-2018-16874), and [CVE-2018-16875](https://nvd.nist.gov/vuln/detail/CVE-2018-16875).
|
||||
* Fixed authz plugin for 0-length content and path validation.
|
||||
* Added `/proc/asound` to masked paths [docker/engine#126](https://github.com/docker/engine/pull/126)
|
||||
|
||||
### Improvements for Docker Engine EE and CE
|
||||
### Improvements
|
||||
* Updated to BuildKit 0.3.3 [docker/engine#122](https://github.com/docker/engine/pull/122)
|
||||
* Updated to containerd 1.2.2 [docker/engine#144](https://github.com/docker/engine/pull/144)
|
||||
* Provided additional warnings for use of deprecated legacy overlay and devicemapper storage drivers [docker/engine#85](https://github.com/docker/engine/pull/85)
|
||||
|
@ -207,7 +207,7 @@ Update your configuration if this command prints a non-empty value for `MountFla
|
|||
* Added bash completion for experimental CLI commands (manifest) [docker/cli#1542](https://github.com/docker/cli/pull/1542)
|
||||
* Windows: allow process isolation on Windows 10 [docker/engine#81](https://github.com/docker/engine/pull/81)
|
||||
|
||||
### Fixes for Docker Engine EE and CE
|
||||
### Fixes
|
||||
* Disable kmem accounting in runc on RHEL/CentOS (docker/escalation#614, docker/escalation#692) [docker/engine#121](https://github.com/docker/engine/pull/121)
|
||||
* Fixed inefficient networking configuration [docker/engine#123](https://github.com/docker/engine/pull/123)
|
||||
* Fixed docker system prune doesn't accept until filter [docker/engine#122](https://github.com/docker/engine/pull/122)
|
||||
|
@ -252,12 +252,7 @@ MountFlags=
|
|||
Update your configuration if this command prints a non-empty value for `MountFlags`, and restart the docker service.
|
||||
|
||||
|
||||
### New features for Docker Engine EE
|
||||
|
||||
* [FIPS Compliance added for Windows Server 2016 and later](/install/windows/docker-ee)
|
||||
* [Docker Content Trust Enforcement](/engine/security/trust/content_trust) for the Enterprise Engine. This allows the Docker Engine - Enterprise to run containers not signed by a specific organization.
|
||||
|
||||
### New features for Docker Engine EE and CE
|
||||
### New features
|
||||
|
||||
* Updated API version to 1.39 [moby/moby#37640](https://github.com/moby/moby/pull/37640)
|
||||
* Added support for remote connections using SSH [docker/cli#1014](https://github.com/docker/cli/pull/1014)
|
||||
|
@ -285,7 +280,7 @@ Update your configuration if this command prints a non-empty value for `MountFla
|
|||
* Moved the `POST /session` endpoint out of experimental. [moby/moby#40028](https://github.com/moby/moby/pull/40028)
|
||||
|
||||
|
||||
### Improvements for Docker Engine EE and CE
|
||||
### Improvements
|
||||
|
||||
* Does not return "`<unknown>`" in /info response [moby/moby#37472](https://github.com/moby/moby/pull/37472)
|
||||
* BuildKit: Changes `--console=[auto,false,true]` to `--progress=[auto,plain,tty]` [docker/cli#1276](https://github.com/docker/cli/pull/1276)
|
||||
|
@ -305,9 +300,9 @@ Update your configuration if this command prints a non-empty value for `MountFla
|
|||
* Removes 'docker-' prefix for containerd and runc binaries [docker/engine#61](https://github.com/docker/engine/pull/61) / [moby/moby#37907](https://github.com/moby/moby/pull/37907), [docker-ce-packaging#241](https://github.com/docker/docker-ce-packaging/pull/241)
|
||||
* Splits "engine", "cli", and "containerd" to separate packages, and run containerd as a separate systemd service [docker-ce-packaging#131](https://github.com/docker/docker-ce-packaging/pull/131), [docker-ce-packaging#158](https://github.com/docker/docker-ce-packaging/pull/158)
|
||||
* Builds binaries with Go 1.10.4 [docker-ce-packaging#181](https://github.com/docker/docker-ce-packaging/pull/181)
|
||||
* Removes `-ce` / `-ee` suffix from version string [docker-ce-packaging#206](https://github.com/docker/docker-ce-packaging/pull/206)
|
||||
* Removes `-ce` suffix from version string [docker-ce-packaging#206](https://github.com/docker/docker-ce-packaging/pull/206)
|
||||
|
||||
### Fixes for Docker Engine EE and CE
|
||||
### Fixes
|
||||
|
||||
* BuildKit: Do not cancel buildkit status request. [moby/moby#37597](https://github.com/moby/moby/pull/37597)
|
||||
* Fixes no error is shown if build args are missing during docker build [moby/moby#37396](https://github.com/moby/moby/pull/37396)
|
||||
|
@ -363,15 +358,11 @@ Update your configuration if this command prints a non-empty value for `MountFla
|
|||
|
||||
### Deprecation Notices
|
||||
|
||||
- As of EE 2.1, Docker has deprecated support for Device Mapper as a storage driver. It will continue to be
|
||||
supported at this time, but support will be removed in a future release. Docker will continue to support
|
||||
Device Mapper for existing EE 2.0 and 2.1 customers. Please contact Sales for more information.
|
||||
- Docker has deprecated support for Device Mapper as a storage driver. It will continue to be
|
||||
supported at this time, but support will be removed in a future release.
|
||||
|
||||
Docker recommends that existing customers
|
||||
Docker recommends that existing users
|
||||
[migrate to using Overlay2 for the storage driver](https://success.docker.com/article/how-do-i-migrate-an-existing-ucp-cluster-to-the-overlay2-graph-driver). The [Overlay2 storage driver](https://docs.docker.com/storage/storagedriver/overlayfs-driver/) is now the default for Docker engine implementations.
|
||||
- As of EE 2.1, Docker has deprecated support for IBM Z (s390x). Refer to the
|
||||
[Docker Compatibility Matrix](https://success.docker.com/article/compatibility-matrix) for detailed
|
||||
compatibility information.
|
||||
|
||||
For more information on the list of deprecated flags and APIs, have a look at the [deprecation information](https://docs.docker.com/engine/deprecated/) where you can find the target removal dates.
|
||||
|
||||
|
|
|
@ -118,13 +118,6 @@ for Docker Engine - Community.
|
|||
- **Workaround:** restart all tasks via `docker service update --force`.
|
||||
* [CVE-2018-15664](https://nvd.nist.gov/vuln/detail/CVE-2018-15664) symlink-exchange attack with directory traversal. Workaround until proper fix is available in upcoming patch release: `docker pause` container before doing file operations. [moby/moby#39252](https://github.com/moby/moby/pull/39252)
|
||||
* `docker cp` regression due to CVE mitigation. An error is produced when the source of `docker cp` is set to `/`.
|
||||
* Install Docker Engine - Enterprise fails to install on RHEL on Azure. This affects any RHEL version that uses an Extended Update Support (EUS) image. At the time of this writing, known versions affected are RHEL 7.4, 7.5, and 7.6.
|
||||
|
||||
- **Workaround options:**
|
||||
- Use an older image and don't get updates. Examples of EUS images are here: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#rhel-images-with-eus.
|
||||
- Import your own RHEL images into Azure and do not rely on the Extended Update Support (EUS) RHEL images.
|
||||
- Use a RHEL image that does not contain a minor version in the SKU. These are not attached to EUS repositories. Some examples of those are the first three images (SKUs: 7-RAW, 7-LVM, 7-RAW-CI) listed here : https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#list-of-rhel-images-available.
|
||||
|
||||
|
||||
## 19.03.3
|
||||
2019-10-08
|
||||
|
@ -201,12 +194,6 @@ for Docker Engine - Community.
|
|||
- **Workaround:** restart all tasks via `docker service update --force`.
|
||||
* [CVE-2018-15664](https://nvd.nist.gov/vuln/detail/CVE-2018-15664) symlink-exchange attack with directory traversal. Workaround until proper fix is available in upcoming patch release: `docker pause` container before doing file operations. [moby/moby#39252](https://github.com/moby/moby/pull/39252)
|
||||
* `docker cp` regression due to CVE mitigation. An error is produced when the source of `docker cp` is set to `/`.
|
||||
* Install Docker Engine - Enterprise fails to install on RHEL on Azure. This affects any RHEL version that uses an Extended Update Support (EUS) image. At the time of this writing, known versions affected are RHEL 7.4, 7.5, and 7.6.
|
||||
|
||||
- **Workaround options:**
|
||||
- Use an older image and don't get updates. Examples of EUS images are here: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#rhel-images-with-eus.
|
||||
- Import your own RHEL images into Azure and do not rely on the Extended Update Support (EUS) RHEL images.
|
||||
- Use a RHEL image that does not contain a minor version in the SKU. These are not attached to EUS repositories. Some examples of those are the first three images (SKUs: 7-RAW, 7-LVM, 7-RAW-CI) listed here : https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#list-of-rhel-images-available.
|
||||
|
||||
## 19.03.2
|
||||
2019-09-03
|
||||
|
@ -269,15 +256,9 @@ for Docker Engine - Community.
|
|||
- Workaround: Add these rules back using a script and cron definitions. The script
|
||||
must contain '-C' commands to check for the presence of a rule and '-A' commands to add
|
||||
rules back. Run the script on a cron in regular intervals, for example, every <x> minutes.
|
||||
- Affected versions: 17.06.2-ee-16, 18.09.1, 19.03.0
|
||||
- Affected versions: 18.09.1, 19.03.0
|
||||
* [CVE-2018-15664](https://nvd.nist.gov/vuln/detail/CVE-2018-15664) symlink-exchange attack with directory traversal. Workaround until proper fix is available in upcoming patch release: `docker pause` container before doing file operations. [moby/moby#39252](https://github.com/moby/moby/pull/39252)
|
||||
* `docker cp` regression due to CVE mitigation. An error is produced when the source of `docker cp` is set to `/`.
|
||||
* Install Docker Engine - Enterprise fails to install on RHEL on Azure. This affects any RHEL version that uses an Extended Update Support (EUS) image. At the time of this writing, known versions affected are RHEL 7.4, 7.5, and 7.6.
|
||||
|
||||
- Workaround options:
|
||||
- Use an older image and don't get updates. Examples of EUS images are here: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#rhel-images-with-eus.
|
||||
- Import your own RHEL images into Azure and do not rely on the Extended Update Support (EUS) RHEL images.
|
||||
- Use a RHEL image that does not contain a minor version in the SKU. These are not attached to EUS repositories. Some examples of those are the first three images (SKUs: 7-RAW, 7-LVM, 7-RAW-CI) listed here : https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#list-of-rhel-images-available.
|
||||
|
||||
## 19.03.1
|
||||
2019-07-25
|
||||
|
@ -306,15 +287,9 @@ for Docker Engine - Community.
|
|||
- Workaround: Add these rules back using a script and cron definitions. The script
|
||||
must contain '-C' commands to check for the presence of a rule and '-A' commands to add
|
||||
rules back. Run the script on a cron in regular intervals, for example, every <x> minutes.
|
||||
- Affected versions: 17.06.2-ee-16, 18.09.1, 19.03.0
|
||||
- Affected versions: 18.09.1, 19.03.0
|
||||
* [CVE-2018-15664](https://nvd.nist.gov/vuln/detail/CVE-2018-15664) symlink-exchange attack with directory traversal. Workaround until proper fix is available in upcoming patch release: `docker pause` container before doing file operations. [moby/moby#39252](https://github.com/moby/moby/pull/39252)
|
||||
* `docker cp` regression due to CVE mitigation. An error is produced when the source of `docker cp` is set to `/`.
|
||||
* Install Docker Engine - Enterprise fails to install on RHEL on Azure. This affects any RHEL version that uses an Extended Update Support (EUS) image. At the time of this writing, known versions affected are RHEL 7.4, 7.5, and 7.6.
|
||||
|
||||
- Workaround options:
|
||||
- Use an older image and don't get updates. Examples of EUS images are here: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#rhel-images-with-eus.
|
||||
- Import your own RHEL images into Azure and do not rely on the Extended Update Support (EUS) RHEL images.
|
||||
- Use a RHEL image that does not contain a minor version in the SKU. These are not attached to EUS repositories. Some examples of those are the first three images (SKUs: 7-RAW, 7-LVM, 7-RAW-CI) listed here : https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#list-of-rhel-images-available.
|
||||
|
||||
## 19.03.0
|
||||
2019-07-22
|
||||
|
@ -473,11 +448,6 @@ support for v2 schema1 althogether. [moby/moby#39365](https://github.com/moby/mo
|
|||
* Now skipping deprecated storage-drivers in auto-selection. [moby/moby#38019](https://github.com/moby/moby/pull/38019)
|
||||
* Deprecated `aufs` storage driver and added warning. [moby/moby#38090](https://github.com/moby/moby/pull/38090)
|
||||
* Removed support for 17.09.
|
||||
* SLES12 is deprecated from Docker Enterprise 3.0, and EOL of SLES12 as an operating system will occur
|
||||
in Docker Enterprise 3.1. Upgrade to SLES15 for continued support on Docker Enterprise.
|
||||
* Windows 2016 is formally deprecated from Docker Enterprise 3.0. Only non-overlay networks are supported
|
||||
on Windows 2016 in Docker Enterprise 3.0. EOL of Windows Server 2016 support will occur in Docker
|
||||
Enterprise 3.1. Upgrade to Windows Server 2019 for continued support on Docker Enterprise.
|
||||
|
||||
For more information on deprecated flags and APIs, refer to
|
||||
https://docs.docker.com/engine/deprecated/ for target removal dates.
|
||||
|
@ -502,12 +472,6 @@ The missing rules are :
|
|||
- Workaround: Add these rules back using a script and cron definitions. The script
|
||||
must contain '-C' commands to check for the presence of a rule and '-A' commands to add
|
||||
rules back. Run the script on a cron in regular intervals, for example, every <x> minutes.
|
||||
- Affected versions: 17.06.2-ee-16, 18.09.1, 19.03.0
|
||||
- Affected versions: 18.09.1, 19.03.0
|
||||
* [CVE-2018-15664](https://nvd.nist.gov/vuln/detail/CVE-2018-15664) symlink-exchange attack with directory traversal. Workaround until proper fix is available in upcoming patch release: `docker pause` container before doing file operations. [moby/moby#39252](https://github.com/moby/moby/pull/39252)
|
||||
* `docker cp` regression due to CVE mitigation. An error is produced when the source of `docker cp` is set to `/`.
|
||||
* Install Docker Engine - Enterprise fails to install on RHEL on Azure. This affects any RHEL version that uses an Extended Update Support (EUS) image. At the time of this writing, known versions affected are RHEL 7.4, 7.5, and 7.6.
|
||||
|
||||
- Workaround options:
|
||||
- Use an older image and don't get updates. Examples of EUS images are here: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#rhel-images-with-eus.
|
||||
- Import your own RHEL images into Azure and do not rely on the Extended Update Support (EUS) RHEL images.
|
||||
- Use a RHEL image that does not contain a minor version in the SKU. These are not attached to EUS repositories. Some examples of those are the first three images (SKUs: 7-RAW, 7-LVM, 7-RAW-CI) listed here : https://docs.microsoft.com/en-us/azure/virtual-machines/linux/rhel-images#list-of-rhel-images-available.
|
||||
|
|
|
@ -10,10 +10,6 @@ redirect_from:
|
|||
- /cs-engine/1.13/release-notes/
|
||||
---
|
||||
|
||||
These release notes are for Docker Engine versions 1.13.1 and lower. For newer
|
||||
Docker releases, see [Docker CE](docker-ce.md) or
|
||||
[Docker EE](/ee/engine/release-notes.md).
|
||||
|
||||
## 1.13.1 (2017-02-08)
|
||||
|
||||
**Important**: On Linux distributions where `devicemapper` was the default storage driver,
|
||||
|
|
Loading…
Reference in New Issue