-
Notifications
You must be signed in to change notification settings - Fork 3.9k
Comparing changes
Open a pull request
base repository: containerd/containerd
base: c0efc63d3907
head repository: containerd/containerd
compare: v1.6.21
- 19 commits
- 27 files changed
- 9 contributors
Commits on Apr 13, 2023
-
release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.6 full diff: opencontainers/runc@v1.1.5...v1.1.6 This is the sixth patch release in the 1.1.z series of runc, which fixes a series of cgroup-related issues. Note that this release can no longer be built from sources using Go 1.16. Using a latest maintained Go 1.20.x or Go 1.19.x release is recommended. Go 1.17 can still be used. - systemd cgroup v1 and v2 drivers were deliberately ignoring UnitExist error from systemd while trying to create a systemd unit, which in some scenarios may result in a container not being added to the proper systemd unit and cgroup. - systemd cgroup v2 driver was incorrectly translating cpuset range from spec's resources.cpu.cpus to systemd unit property (AllowedCPUs) in case of more than 8 CPUs, resulting in the wrong AllowedCPUs setting. - systemd cgroup v1 driver was prefixing container's cgroup path with the path of PID 1 cgroup, resulting in inability to place PID 1 in a non-root cgroup. - runc run/start may return "permission denied" error when starting a rootless container when the file to be executed does not have executable bit set for the user, not taking the CAP_DAC_OVERRIDE capability into account. This is a regression in runc 1.1.4, as well as in Go 1.20 and 1.20.1 - cgroup v1 drivers are now aware of misc controller. Signed-off-by: Sebastiaan van Stijn <[email protected]> (cherry picked from commit 49111b1) Signed-off-by: Sebastiaan van Stijn <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 57d9534 - Browse repository at this point
Copy the full SHA 57d9534View commit details
Commits on Apr 17, 2023
-
oci: partially restore comment on read-only mounts for uid/gid uses
Commit cab0562 removed the tryReadonlyMounts utility, in favor of mounts.ReadOnlyMounts() that was added in commit daa3a76. That change made part of the comment redundant, because mounts.ReadOnlyMounts handles both overlayfs read-only mounts (by skipping the workdir mounts), and sets the "ro" option for other mount-types, but the reason why we're using a read-only mount is still relevant, so restoring that part of the comment. Signed-off-by: Sebastiaan van Stijn <[email protected]> (cherry picked from commit cb2c3ec) Signed-off-by: Sebastiaan van Stijn <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c33eb57 - Browse repository at this point
Copy the full SHA c33eb57View commit details -
Add ArgsEscaped support for CRI
This commit adds supports for the ArgsEscaped value for the image got from the dockerfile. It is used to evaluate and process the image entrypoint/cmd and container entrypoint/cmd options got from the podspec. Signed-off-by: Kirtana Ashok <[email protected]> (cherry picked from commit 8137e41) Signed-off-by: Kirtana Ashok <[email protected]>
Kirtana Ashok authored and Kirtana Ashok committedApr 17, 2023 Configuration menu - View commit details
-
Copy full SHA for 8b81d5a - Browse repository at this point
Copy the full SHA 8b81d5aView commit details -
- Rename test name - Add a tag to the container image used in the tests instead of the latest tag - Add a 5 second delay between container start and stop to ensure that the container is fully initialized Signed-off-by: Kirtana Ashok <[email protected]> (cherry picked from commit e0b817e) Signed-off-by: Kirtana Ashok <[email protected]>
Kirtana Ashok authored and Kirtana Ashok committedApr 17, 2023 Configuration menu - View commit details
-
Copy full SHA for bc2e013 - Browse repository at this point
Copy the full SHA bc2e013View commit details
Commits on Apr 18, 2023
-
Merge pull request #8385 from thaJeztah/1.6_backport_runc_binary_1.1.6
[release/1.6 backport] update runc binary to v1.1.6
Configuration menu - View commit details
-
Copy full SHA for ee0637a - Browse repository at this point
Copy the full SHA ee0637aView commit details
Commits on Apr 21, 2023
-
Merge pull request #8247 from kiashok/port-gracefulterminationFix
[release/1.6 ] Add ArgsEscaped support for CRI
Configuration menu - View commit details
-
Copy full SHA for 97243ae - Browse repository at this point
Copy the full SHA 97243aeView commit details -
Merge pull request #8403 from thaJeztah/1.6_backport_restore_readonly…
…_comments [release/1.6 backport] oci: partially restore comment on read-only mounts for uid/gid uses
Configuration menu - View commit details
-
Copy full SHA for 967a516 - Browse repository at this point
Copy the full SHA 967a516View commit details
Commits on Apr 27, 2023
-
release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.7 full diff: opencontainers/runc@v1.1.6...v1.1.7 This is the seventh patch release in the 1.1.z release of runc, and is the last planned release of the 1.1.z series. It contains a fix for cgroup device rules with systemd when handling device rules for devices that don't exist (though for devices whose drivers don't correctly register themselves in the kernel -- such as the NVIDIA devices -- the full fix only works with systemd v240+). - When used with systemd v240+, systemd cgroup drivers no longer skip DeviceAllow rules if the device does not exist (a regression introduced in runc 1.1.3). This fix also reverts the workaround added in runc 1.1.5, removing an extra warning emitted by runc run/start. - The source code now has a new file, runc.keyring, which contains the keys used to sign runc releases. Signed-off-by: Sebastiaan van Stijn <[email protected]> (cherry picked from commit 27c0fe3) Signed-off-by: Sebastiaan van Stijn <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ccb51ff - Browse repository at this point
Copy the full SHA ccb51ffView commit details -
WithRuntimePath uses the TaskInfo.RuntimePath field
Signed-off-by: Iceber Gu <[email protected]> (cherry picked from commit 97064b0)
Configuration menu - View commit details
-
Copy full SHA for f49254f - Browse repository at this point
Copy the full SHA f49254fView commit details -
integration: add container start test using abs runtime path
Signed-off-by: Iceber Gu <[email protected]> (cherry picked from commit c89438e)
Configuration menu - View commit details
-
Copy full SHA for 75ab094 - Browse repository at this point
Copy the full SHA 75ab094View commit details -
skip TestContainerStartWithAbsRuntimePath if the runtime is v1
Signed-off-by: Iceber Gu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e8840f6 - Browse repository at this point
Copy the full SHA e8840f6View commit details -
Remove entry for container from container store on error
If containerd does not see a container but criservice's container store does, then we should try to recover from this error state by removing the container from criservice's container store as well. Signed-off-by: Kirtana Ashok <[email protected]> (cherry picked from commit d9f3e38) Signed-off-by: Kirtana Ashok <[email protected]>
Kirtana Ashok authored and Kirtana Ashok committedApr 27, 2023 Configuration menu - View commit details
-
Copy full SHA for 95d3155 - Browse repository at this point
Copy the full SHA 95d3155View commit details
Commits on Apr 28, 2023
-
Merge pull request #8456 from kiashok/port_deleteCtr_1.6
[release/1.6] Remove entry for container from container store on error
Configuration menu - View commit details
-
Copy full SHA for 75e082c - Browse repository at this point
Copy the full SHA 75e082cView commit details
Commits on Apr 30, 2023
-
Merge pull request #8450 from thaJeztah/1.6_backport_runc_binary_1.1.7
[release/1.6 backport] update runc binary to v1.1.7
Configuration menu - View commit details
-
Copy full SHA for a467b25 - Browse repository at this point
Copy the full SHA a467b25View commit details
Commits on May 2, 2023
-
Merge pull request #8454 from Iceber/fix_runtime_path_1.6
[release/1.6] fix the task setting the runtime path
Configuration menu - View commit details
-
Copy full SHA for ae53d00 - Browse repository at this point
Copy the full SHA ae53d00View commit details
Commits on May 3, 2023
-
[release/1.6] update go to go1.19.9
go1.19.9 (released 2023-05-02) includes three security fixes to the html/template package, as well as bug fixes to the compiler, the runtime, and the crypto/tls and syscall packages. See the Go 1.19.9 milestone on our issue tracker for details. https://github.com/golang/go/issues?q=milestone%3AGo1.19.9+label%3ACherryPickApproved release notes: https://go.dev/doc/devel/release#go1.19.9 full diff: golang/go@go1.19.8...go1.19.9 from the announcement: > These minor releases include 3 security fixes following the security policy: > >- html/template: improper sanitization of CSS values > > Angle brackets (`<>`) were not considered dangerous characters when inserted > into CSS contexts. Templates containing multiple actions separated by a '/' > character could result in unexpectedly closing the CSS context and allowing > for injection of unexpected HMTL, if executed with untrusted input. > > Thanks to Juho Nurminen of Mattermost for reporting this issue. > > This is CVE-2023-24539 and Go issue https://go.dev/issue/59720. > > - html/template: improper handling of JavaScript whitespace > > Not all valid JavaScript whitespace characters were considered to be > whitespace. Templates containing whitespace characters outside of the character > set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain > actions may not be properly sanitized during execution. > > Thanks to Juho Nurminen of Mattermost for reporting this issue. > > This is CVE-2023-24540 and Go issue https://go.dev/issue/59721. > > - html/template: improper handling of empty HTML attributes > > Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") > executed with empty input could result in output that would have unexpected > results when parsed due to HTML normalization rules. This may allow injection > of arbitrary attributes into tags. > > Thanks to Juho Nurminen of Mattermost for reporting this issue. > > This is CVE-2023-29400 and Go issue https://go.dev/issue/59722. Signed-off-by: Sebastiaan van Stijn <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 39566aa - Browse repository at this point
Copy the full SHA 39566aaView commit details -
Merge pull request #8469 from thaJeztah/1.6_update_go1.19.9
[release/1.6] update go to go1.19.9
Configuration menu - View commit details
-
Copy full SHA for b24ff59 - Browse repository at this point
Copy the full SHA b24ff59View commit details
Commits on May 5, 2023
-
Signed-off-by: Kirtana Ashok <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9226c36 - Browse repository at this point
Copy the full SHA 9226c36View commit details -
Merge pull request #8463 from kiashok/addReleaseNotes-v.1.6.21
[release/1.6] Prepare release notes for v1.6.21
Configuration menu - View commit details
-
Copy full SHA for 3dce8eb - Browse repository at this point
Copy the full SHA 3dce8ebView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff c0efc63d3907...v1.6.21