Tags give the ability to mark specific points in history as being important
-
-
v1.6.6
10c12954 · ·containerd 1.6.6 Welcome to the v1.6.6 release of containerd! The sixth patch release for containerd 1.6 includes a fix for [GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf). ### Notable Updates * **Fix ExecSync handler to cap console output size** ([GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Derek McGowan * Kazuyoshi Kato ### Changes <details><summary>4 commits</summary> <p> * Github Security Advisory [GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf) * [`61213742a`](https://github.com/containerd/containerd/commit/61213742a8e57458cd6432c46eee9dd35e0584c7) Prepare release notes for v1.6.6 * [`f92068350`](https://github.com/containerd/containerd/commit/f92068350f189040a3bc41f9aa65994c8aba796a) Implicitly discard the input to drain the reader * [`2eb67213b`](https://github.com/containerd/containerd/commit/2eb67213b8ec38f5d7233cf0098763d9364e2a17) [release/1.6] Limit the response size of ExecSync </p> </details> ### Dependency Changes This release has no dependency changes Previous release can be found at [v1.6.5](https://github.com/containerd/containerd/releases/tag/v1.6.5)
-
v1.5.13
a17ec496 · ·containerd 1.5.13 Welcome to the v1.5.13 release of containerd! The thirteenth patch release for containerd 1.5 includes a fix for [GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf). ### Notable Updates * **Fix ExecSync handler to cap console output size** ([GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Derek McGowan * Kazuyoshi Kato ### Changes <details><summary>4 commits</summary> <p> * Github Security Advisory [GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf) * [`1ab043141`](https://github.com/containerd/containerd/commit/1ab043141f77a733cbb2437b857d6385feda368c) Prepare release notes for v1.5.13 * [`b40a356cf`](https://github.com/containerd/containerd/commit/b40a356cfd9f0e5202da130f448f6c35b886ad04) Implicitly discard the input to drain the reader * [`943588b54`](https://github.com/containerd/containerd/commit/943588b54807f48ca545f7560a3def20501993de) [release/1.5] Limit the response size of ExecSync </p> </details> ### Dependency Changes This release has no dependency changes Previous release can be found at [v1.5.12](https://github.com/containerd/containerd/releases/tag/v1.5.12)
-
v1.6.5
96df0994 · ·containerd 1.6.5 Welcome to the v1.6.5 release of containerd! The fifth patch release for containerd 1.6 includes a few fixes and updated version of runc. ### Notable Updates * **Fix for older CNI plugins not reporting version** ([#7011](https://github.com/containerd/containerd/pull/7011)) * **Fix mount path handling for CRI plugin on Windows** ([#6929](https://github.com/containerd/containerd/pull/6929)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Mike Brown * Sebastiaan van Stijn * Kazuyoshi Kato * Phil Estes * Wei Fu * Akihiro Suda * Derek McGowan * Paul S. Schweigert * Amit Barve * Daniel Canter * Kevin Parsons * Marc Schwind ### Changes <details><summary>26 commits</summary> <p> * Prepare release notes for v1.6.5 ([#7021](https://github.com/containerd/containerd/pull/7021)) * [`185e87275`](https://github.com/containerd/containerd/commit/185e87275cce838776f91abaf34c4ad4af3bfa69) Prepare release notes for v1.6.5 * [release/1.6] update golang to 1.17.11 ([#7013](https://github.com/containerd/containerd/pull/7013)) * [`5c9c83d3e`](https://github.com/containerd/containerd/commit/5c9c83d3e0f03d86644c448d23dc67c7433a2410) [release/1.6] update golang to 1.17.11 * [release/1.6] update go-cni/for cni update fixing plugins that don't respond with version ([#7011](https://github.com/containerd/containerd/pull/7011)) * [`fdcdc27bc`](https://github.com/containerd/containerd/commit/fdcdc27bce9b6105b4afa70759498fed6efed97a) update go-cni/for cni update fixing plugins that don't respond with version * [release/1.6] archive: add human-readable hint to Lchown error ([#6985](https://github.com/containerd/containerd/pull/6985)) * [`e33b9e709`](https://github.com/containerd/containerd/commit/e33b9e7091792c8f4db042f4d196b130ac412ec1) archive: add human-readable hint to Lchown error * [release/1.6] go.mod: Bump hcsshim to 0.9.3 ([#6968](https://github.com/containerd/containerd/pull/6968)) * [`6eff5b6c0`](https://github.com/containerd/containerd/commit/6eff5b6c0e03bf792b232e3bf2603a2445e57bcf) [release/1.6] go.mod: Bump hcsshim to 0.9.3 * [release/1.6] config: improve config v1 deprecation message ([#6980](https://github.com/containerd/containerd/pull/6980)) * [`3bb5a9d19`](https://github.com/containerd/containerd/commit/3bb5a9d19f42b58bde83585a1cc7faa3e1d2e9b9) config: improve config v1 deprecation message * [release/1.6] update golang to 1.17.10, golang.org/x/sys v0.0.0-20220412211240-33da011f77ad ([#6927](https://github.com/containerd/containerd/pull/6927)) * [`f1d2d9260`](https://github.com/containerd/containerd/commit/f1d2d9260a5d5e8ac46b803757007cb138383206) [release/1.6] vendor: golang.org/x/sys v0.0.0-20220412211240-33da011f77ad * [`9f99be51b`](https://github.com/containerd/containerd/commit/9f99be51ba3282f4ac90c574c926e81494973225) [release/1.6] update golang to 1.17.10 * [release/1.6] Bug fix for mount path handling ([#6929](https://github.com/containerd/containerd/pull/6929)) * [`70839a344`](https://github.com/containerd/containerd/commit/70839a344033dbb86ae152b30a747f9258527c9e) Bug fix for mount path handling * [release/1.6] Reverts removal of parallel run from critest ([#6942](https://github.com/containerd/containerd/pull/6942)) * [`82a77be2d`](https://github.com/containerd/containerd/commit/82a77be2dd20790a14a1c96f21be41b8d597cc2e) reverts removal of parallel run from critest * [release/1.6 backport] update runc binary and vendor to v1.1.2 ([#6936](https://github.com/containerd/containerd/pull/6936)) * [`246a1b42e`](https://github.com/containerd/containerd/commit/246a1b42e64337656992335bf9e81738cbec89cb) vendor: github.com/opencontainers/runc v1.1.2 * [`43717e03a`](https://github.com/containerd/containerd/commit/43717e03aa5266702871b2ac3584bf949642443c) update runc binary to v1.1.2 * [release/1.6] Allow git commands in Vagrantfile ([#6941](https://github.com/containerd/containerd/pull/6941)) * [`06bdfeb67`](https://github.com/containerd/containerd/commit/06bdfeb675297ebd7406b7de94107b2dc74017ad) Allow git commands in Vagrantfile * [release/1.6] Update critools to v1.24 ([#6895](https://github.com/containerd/containerd/pull/6895)) * [`1520bae0f`](https://github.com/containerd/containerd/commit/1520bae0f44e1a47f68807bd61065135f1560256) update critools to v1.24 </p> </details> ### Changes from containerd/go-cni <details><summary>6 commits</summary> <p> * go.mod: update libcni to v1.1.1 ([#101](https://github.com/containerd/go-cni/pull/101)) * [`cb645ef`](https://github.com/containerd/go-cni/commit/cb645efd5a911122fa150704930c1205b31c2308) go.mod: update libcni to v1.1.1 * add in some serial setup tests; a little make cleanup ([#100](https://github.com/containerd/go-cni/pull/100)) * [`42cfe0f`](https://github.com/containerd/go-cni/commit/42cfe0f8dcae8919832c955502b1e9de32282f94) add in some serial setup tests; a little make cleanup * Re-introduce serial network setup ([#99](https://github.com/containerd/go-cni/pull/99)) * [`ee1a707`](https://github.com/containerd/go-cni/commit/ee1a707cb4d9c2a1a11e901fddd954ac7bc23494) Re-introduce serial network setup </p> </details> ### Dependency Changes * **github.com/Microsoft/hcsshim** v0.9.2 -> v0.9.3 * **github.com/containerd/go-cni** v1.1.5 -> v1.1.6 * **github.com/containernetworking/cni** v1.1.0 -> v1.1.1 * **github.com/opencontainers/runc** v1.1.1 -> v1.1.2 * **golang.org/x/sys** 1d35b9e2eb4e -> 33da011f77ad Previous release can be found at [v1.6.4](https://github.com/containerd/containerd/releases/tag/v1.6.4)
-
v1.5.12
a4014bc9 · ·containerd 1.5.12 Welcome to the v1.5.12 release of containerd! The twelfth patch release for containerd 1.5 includes various fixes and updates along with an updated version of runc. ### Notable Updates * **Fix inotify fd leak when cgroup is deleted** ([#6961](https://github.com/containerd/containerd/pull/6961)) * **Close fifos when container is deleted in CRI plugin** ([#6857](https://github.com/containerd/containerd/pull/6857)) * **Update unpack to to respect MaxConcurrentDownloads** ([#6774](https://github.com/containerd/containerd/pull/6774)) * **Monitor OOMKill instead of OOM in cgroupv2** ([#6735](https://github.com/containerd/containerd/pull/6735)) * **Make the temp mount as ready only in container WithVolumes** ([#6729](https://github.com/containerd/containerd/pull/6729)) * **Fix deadlock from abandoned transactions in native snapshotter** ([#6726](https://github.com/containerd/containerd/pull/6726)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Sebastiaan van Stijn * Phil Estes * Akihiro Suda * Derek McGowan * Wei Fu * Jeremi Piotrowski * Kazuyoshi Kato * Maksym Pavlenko * Miao Wang * Mike Brown * Alexey Ivanov * Brian Goff * Henry Wang * Michael Crosby * Qiutong Song * Samuel Ortiz * Tõnis Tiigi * chenxiaoyu * linrunlong * ningmingxiao * zounengren ### Changes <details><summary>34 commits</summary> <p> * Prepare release notes for v1.5.12 ([#7019](https://github.com/containerd/containerd/pull/7019)) * [`5a55f1efc`](https://github.com/containerd/containerd/commit/5a55f1efcfb3f8775399f960e7b6bb5921b5699a) Prepare release notes for v1.5.12 * [release/1.5] update golang to 1.17.11 ([#7014](https://github.com/containerd/containerd/pull/7014)) * [`3f61d5ed4`](https://github.com/containerd/containerd/commit/3f61d5ed4fe148e506db79aabad08106cf12290d) [release/1.5] update golang to 1.17.11 * [release/1.5] archive: add human-readable hint to Lchown error ([#6986](https://github.com/containerd/containerd/pull/6986)) * [`f67de000d`](https://github.com/containerd/containerd/commit/f67de000dc26f34ae088d8db7c5d936375c6ba61) archive: add human-readable hint to Lchown error * [release/1.5] config: improve config v1 deprecation message ([#6981](https://github.com/containerd/containerd/pull/6981)) * [`4c98768bd`](https://github.com/containerd/containerd/commit/4c98768bd4c6299c111eac04adf32597824a05f4) config: improve config v1 deprecation message * [release/1.5] upgrade containerd/cgroups to v1.0.3 ([#6961](https://github.com/containerd/containerd/pull/6961)) * [`f890c79fd`](https://github.com/containerd/containerd/commit/f890c79fd4b0826fec2ff92c40d6107ddc2311ff) [release/1.5] upgrade containerd/cgroups to v1.0.3 * [release/1.5] update golang to 1.17.10, golang.org/x/sys v0.0.0-20220412211240-33da011f77ad ([#6928](https://github.com/containerd/containerd/pull/6928)) * [`9f6e1864c`](https://github.com/containerd/containerd/commit/9f6e1864cd367b6ea50280943637da665772603f) [release/1.5] vendor: golang.org/x/sys v0.0.0-20220412211240-33da011f77ad * [`c00476595`](https://github.com/containerd/containerd/commit/c00476595fb5f5ec65f4c6e2e943aea9ea15fd74) [release/1.5] update golang to 1.17.10 * [release/1.5 backport] update runc binary to v1.1.2 ([#6935](https://github.com/containerd/containerd/pull/6935)) * [`c2f793349`](https://github.com/containerd/containerd/commit/c2f7933497a06ddc407b1cd189cfeac49388f332) update runc binary to v1.1.2 * [release/1.5] cherry-pick: Allow git commands in Vagrantfile ([#6943](https://github.com/containerd/containerd/pull/6943)) * [`1f9900830`](https://github.com/containerd/containerd/commit/1f9900830a7f886c73cb50db6a8bb941b1b0b949) Allow git commands in Vagrantfile * [release/1.5] cri: close fifos when container is deleted ([#6857](https://github.com/containerd/containerd/pull/6857)) * [`689b342c1`](https://github.com/containerd/containerd/commit/689b342c1d6a5388f149721a5afb55d03837b41d) cri: close fifos when container is deleted * [release/1.5] update golang to 1.17.9 ([#6824](https://github.com/containerd/containerd/pull/6824)) * [`65aad9d93`](https://github.com/containerd/containerd/commit/65aad9d9326882909bb7fe4a19f6ec9bc1e0a079) [release/1.5] update golang to 1.17.9 * [release/1.5] check for duplicate nspath possibilities ([#6814](https://github.com/containerd/containerd/pull/6814)) * [`283058cd6`](https://github.com/containerd/containerd/commit/283058cd6973a51e0acb48557e03312887d9ba72) check for duplicate nspath possibilities * [release/1.5] fix #6054 MaxConcurrentDownloads is not effect when Unpack is true ([#6774](https://github.com/containerd/containerd/pull/6774)) * [`4dbd0c851`](https://github.com/containerd/containerd/commit/4dbd0c851b9b0cb0d8b02c44d72c311a25a2512a) fix #6054 MaxConcurrentDownloads is not effect when Unpack is true * [release/1.5 backport] update runc binary to v1.1.1 ([#6770](https://github.com/containerd/containerd/pull/6770)) * [`ef56dcafc`](https://github.com/containerd/containerd/commit/ef56dcafc32d67e750b89fdb5ee24d0c7ffa9608) update runc binary to v1.1.1 * [`b8ab8dd3f`](https://github.com/containerd/containerd/commit/b8ab8dd3fbd5b7020fe29d6d26d8d6a987215f5a) update runc binary to v1.1.0 * [release/1.5 backport] Make the temp mount as ready only in container WithVolumes ([#6729](https://github.com/containerd/containerd/pull/6729)) * [`05b04a1a3`](https://github.com/containerd/containerd/commit/05b04a1a36da8c94bb6a7af639a3059d01bea5e4) Make the temp mount as ready only in container WithVolumes * [release/1.5 backport] native: fix deadlock from leaving transactions open ([#6726](https://github.com/containerd/containerd/pull/6726)) * [`603ef55e0`](https://github.com/containerd/containerd/commit/603ef55e0e696b382ad08d83168d608f54f1b6e2) native: fix deadlock from leaving transactions open * [release/1.5 backport] cgroup2: monitor OOMKill instead of OOM to prevent missing container events ([#6735](https://github.com/containerd/containerd/pull/6735)) * [`1c68f5037`](https://github.com/containerd/containerd/commit/1c68f50378b3562e7497d42973ba610945c4bc66) cgroup2: monitor OOMKill instead of OOM to prevent missing container OOM events </p> </details> ### Changes from containerd/cgroups <details><summary>33 commits</summary> <p> * v2: Fix inotify fd leak when cgroup is deleted ([#212](https://github.com/containerd/cgroups/pull/212)) * [`a7d6888`](https://github.com/containerd/cgroups/commit/a7d6888aa30218c8aff15d979eb3f6aec0b7979c) v2: add test case for Manager.EventChan() behavior * [`cf1f978`](https://github.com/containerd/cgroups/commit/cf1f978b93bf784118d3ab7dec6a47b8204918c2) v2: flip error handling for readKVStat("memory.events") to reduce indentation * [`6a46df2`](https://github.com/containerd/cgroups/commit/6a46df25065d551a8d998495c34263354c84f2c1) v2: manager: factor out memory.events parsing * [`35b5b55`](https://github.com/containerd/cgroups/commit/35b5b55c686080de64facf127d6d6a5ca9a0fe6b) v2: Fix inotify leak when cgroup is deleted * fix Implicit memory aliasing in for loop ([#214](https://github.com/containerd/cgroups/pull/214)) * [`182c3af`](https://github.com/containerd/cgroups/commit/182c3afa53b8cccce0611cca9dee46410c4f82f7) fix Implicit memory aliasing in for loop * Fix potential dirfd leak. ([#210](https://github.com/containerd/cgroups/pull/210)) * [`17fece8`](https://github.com/containerd/cgroups/commit/17fece81870ef8aa1a31f05210b8f425e37038a0) Fix potential dirfd leak. * cgroup: Optionally add process and task to a subsystems subset ([#203](https://github.com/containerd/cgroups/pull/203)) * [`80a7821`](https://github.com/containerd/cgroups/commit/80a7821536fc82757f390f8d65693074bd3ef8e4) cgroup: Optionally add process and task to a subsystems subset * replace pkg/errors from vendor ([#208](https://github.com/containerd/cgroups/pull/208)) * [`0072297`](https://github.com/containerd/cgroups/commit/0072297e4547d623094fc68b0df41eef364d1747) replace pkg/errors from vendor * cgroup.go: avoid panic on nil interface ([#207](https://github.com/containerd/cgroups/pull/207)) * [`d55de5d`](https://github.com/containerd/cgroups/commit/d55de5d2af9a3616eb758e393a2170a1421155c1) cgroup.go: avoid panic on nil interface * Improvements on cgroup v2 support ([#204](https://github.com/containerd/cgroups/pull/204)) * [`73a8516`](https://github.com/containerd/cgroups/commit/73a8516e7f0f45fe9931d02cc57ff6059202f553) cgroupv2: reset lastErr to nil when subtree control is successfully written * [`2ca92c5`](https://github.com/containerd/cgroups/commit/2ca92c515038c7a30c1998dbe29a87873b98a3b3) cgroupv2: enable controllers before setting resources in NewChild() * v2: remove unimplemented errors and ErrorHandler, IgnoreNotExist ([#201](https://github.com/containerd/cgroups/pull/201)) * [`db173a8`](https://github.com/containerd/cgroups/commit/db173a86bea843700360e7061c6f8d3869d13363) v2: remove ErrorHandler and IgnoreNotExist as they are not implemented * [`b19a60d`](https://github.com/containerd/cgroups/commit/b19a60d64d89b858b3c2bee4a04fb7f70642ffce) v2: remove errors that are never returned * v1: reduce duplicated code ([#202](https://github.com/containerd/cgroups/pull/202)) * [`4fe70f3`](https://github.com/containerd/cgroups/commit/4fe70f3edc256fc2345d5f8f8a54e2f4e96f271e) v1: reduce duplicated code * cgroup v1: implement AddProc() ([#200](https://github.com/containerd/cgroups/pull/200)) * [`6659093`](https://github.com/containerd/cgroups/commit/66590933215fb7b0c9f9ffd39e9946ab510d7679) cgroup v1: implement AddProc() * Rename branch from master to main ([#199](https://github.com/containerd/cgroups/pull/199)) * [`7254c12`](https://github.com/containerd/cgroups/commit/7254c1242cee46d1c37bf3da2151eed571879b5c) Rename branch from master to main * utils: export ParseCgroupFile() ([#197](https://github.com/containerd/cgroups/pull/197)) * [`23b5120`](https://github.com/containerd/cgroups/commit/23b51209bf7bd11941d5613119309b11029e8373) utils: export ParseCgroupFile() * go.mod: coreos/go-systemd/v22 v22.3.2 to prepare for deprecations ([#194](https://github.com/containerd/cgroups/pull/194)) * [`f8918cf`](https://github.com/containerd/cgroups/commit/f8918cf2d923b7003970ce99bb29545f2f34b531) go.mod: coreos/go-systemd/v22 v22.3.2 to prepare for deprecations * Use /proc/partitions to get device names ([#195](https://github.com/containerd/cgroups/pull/195)) * [`1a4509d`](https://github.com/containerd/cgroups/commit/1a4509dd06454dc765aed7f62cb26531416ffce3) Use /proc/partitions to get device names </p> </details> ### Dependency Changes * **github.com/containerd/cgroups** v1.0.1 -> v1.0.3 * **github.com/stretchr/testify** v1.6.1 -> v1.7.0 * **golang.org/x/net** e18ecbb05110 -> a5a99cb37ef4 * **golang.org/x/sync** 09787c993a3a -> 036812b2e83c * **golang.org/x/sys** d19ff857e887 -> 33da011f77ad Previous release can be found at [v1.5.11](https://github.com/containerd/containerd/releases/tag/v1.5.11) -
v1.6.4
212e8b6f · ·containerd 1.6.4 Welcome to the v1.6.4 release of containerd! The fourth patch release for containerd 1.6 includes two fixes for CNI and SELinux. ### Notable Updates * **Update go-cni to fix teardown regression** ([#6877](https://github.com/containerd/containerd/pull/6877)) * **Fix broken SELinux relabeling for Kubernetes volume mounts** ([#6878](https://github.com/containerd/containerd/pull/6878)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Mike Brown * Kazuyoshi Kato * Michael Zappa * Wang Bing * Wei Fu * Antonio Ojea * Derek McGowan * Henry Wang * Nabeel Rana * Phil Estes ### Changes <details><summary>8 commits</summary> <p> * Prepare release notes for 1.6.4 ([#6887](https://github.com/containerd/containerd/pull/6887)) * [`0d1d2953b`](https://github.com/containerd/containerd/commit/0d1d2953bfec64910f7e11b5cc0049e4fdafbb0c) Prepare release notes for 1.6.4 * [release/1.6 backport] Bump opencontainers/selinux from 1.10.0 to 1.10.1 ([#6878](https://github.com/containerd/containerd/pull/6878)) * [`42d691fe6`](https://github.com/containerd/containerd/commit/42d691fe6bb18f523b643e8e960f9fa3abb13bc6) Bump opencontainers/selinux from 1.10.0 to 1.10.1 * [release/1.6] Update go-cni to v1.1.5 backported due to conflict in go.mod ([#6877](https://github.com/containerd/containerd/pull/6877)) * [`e9f22e008`](https://github.com/containerd/containerd/commit/e9f22e008b18a383cb440d86c8fd3a93e364f3f4) Update go-cni to v1.1.5 * [release/1.6] cri: close fifos when container is deleted ([#6859](https://github.com/containerd/containerd/pull/6859)) * [`be4909e95`](https://github.com/containerd/containerd/commit/be4909e950da484ceb7bf11ebd858a8757677d8f) cri: close fifos when container is deleted </p> </details> ### Changes from containerd/go-cni <details><summary>8 commits</summary> <p> * bump github.com/containernetworking/cni v1.1.0 ([#98](https://github.com/containerd/go-cni/pull/98)) * [`e24193e`](https://github.com/containerd/go-cni/commit/e24193e4e5ade8070f9c0a73918f7e3fd782b0cc) bump github.com/containernetworking/cni v1.1.0 * Revert "Update loopback version to support check" ([#96](https://github.com/containerd/go-cni/pull/96)) * [`186662c`](https://github.com/containerd/go-cni/commit/186662cf27eee1f357c5f71b3a373d78c1e69988) Revert "Update loopback version to support check" * Use revive instead of golint ([#92](https://github.com/containerd/go-cni/pull/92)) * [`322e8bf`](https://github.com/containerd/go-cni/commit/322e8bfbe6917a4343bc355f5a7f0525e0007099) Use revive instead of golint * Bump go verion to 1.17 ([#91](https://github.com/containerd/go-cni/pull/91)) * [`9b78de4`](https://github.com/containerd/go-cni/commit/9b78de41083664e4ea005986ed39fa81cbb77cf5) Bump go verion to 1.17 </p> </details> ### Dependency Changes * **github.com/containerd/go-cni** v1.1.4 -> v1.1.5 * **github.com/containernetworking/cni** v1.0.1 -> v1.1.0 * **github.com/opencontainers/selinux** v1.10.0 -> v1.10.1 Previous release can be found at [v1.6.3](https://github.com/containerd/containerd/releases/tag/v1.6.3)
-
v1.6.3
f8308660 · ·containerd 1.6.3 Welcome to the v1.6.3 release of containerd! The third patch release for containerd 1.6 includes various fixes and updates. ### Notable Updates * **Fix panic when configuring tracing plugin** ([#6853](https://github.com/containerd/containerd/pull/6853)) * **Improve image pull performance in CRI plugin** ([#6816](https://github.com/containerd/containerd/pull/6816)) * **Check for duplicate nspath** ([#6813](https://github.com/containerd/containerd/pull/6813)) * **Fix deadlock in cgroup metrics collector** ([#6801](https://github.com/containerd/containerd/pull/6801)) * **Mount devmapper xfs file system with "nouuid" option** ([#6731](https://github.com/containerd/containerd/pull/6731)) * **Make the temp mount as ready only in container WithVolumes** ([#6730](https://github.com/containerd/containerd/pull/6730)) * **Fix deadlock from leaving transaction open in native snapshotter** ([#6727](https://github.com/containerd/containerd/pull/6727)) * **Monitor OOMKill events to prevent missing container events** ([#6734](https://github.com/containerd/containerd/pull/6734)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Stefan Berger * Wei Fu * Akihiro Suda * Derek McGowan * Phil Estes * Kazuyoshi Kato * Mike Brown * Sebastiaan van Stijn * Maksym Pavlenko * dependabot[bot] * Cory Snider * Henry Wang * Jeremi Piotrowski * Michael Zappa * Qiutong Song * Tõnis Tiigi * Ye Sijun ### Changes <details><summary>35 commits</summary> <p> * Prepare release notes for v1.6.3 ([#6844](https://github.com/containerd/containerd/pull/6844)) * [`baa386dc0`](https://github.com/containerd/containerd/commit/baa386dc04afe1c8475be8c7c22a0d632482ff41) Prepare release notes for v1.6.3 * [release/1.6] tracing: fix panic on startup when configured ([#6853](https://github.com/containerd/containerd/pull/6853)) * [`e8da82adc`](https://github.com/containerd/containerd/commit/e8da82adcdc667d8247bd27a8b2c835d0872066b) tracing: fix panic on startup when configured * [release/1.6] CRI: improve image pulling performance ([#6816](https://github.com/containerd/containerd/pull/6816)) * [`1764ea9a2`](https://github.com/containerd/containerd/commit/1764ea9a2815ddbd0cde777b557f97171b84cd02) CRI: improve image pulling performance * [release/1.6] update golang to 1.17.9 ([#6823](https://github.com/containerd/containerd/pull/6823)) * [`9cd76d465`](https://github.com/containerd/containerd/commit/9cd76d465576ec766fc6385f14e27ca3cf536bc5) [release/1.6] update golang to 1.17.9 * [release/1.6] check for duplicate nspath possibilities ([#6813](https://github.com/containerd/containerd/pull/6813)) * [`c09cc1242`](https://github.com/containerd/containerd/commit/c09cc12421b3317ac83aa4412e7a174c8174e916) check for duplicate nspath possibilities * [release/1.6] metrics/cgroups: fix deadlock issue in Add during Collect ([#6801](https://github.com/containerd/containerd/pull/6801)) * [`fe6ba62ce`](https://github.com/containerd/containerd/commit/fe6ba62ceae6c4b692d4a8feb5655f59351abd05) metrics/cgroups: fix deadlock issue in Add during Collect * [release/1.6] go.mod: update image-spec to merge-commit of v1 into main ([#6766](https://github.com/containerd/containerd/pull/6766)) * [`8b81a7843`](https://github.com/containerd/containerd/commit/8b81a78434e9431771fd2bc0e2b226facc3f32f9) [release/1.6] go.mod: update image-spec to merge-commit of v1 into main * [release/1.6 backport] update runc to 1.1.1 ([#6759](https://github.com/containerd/containerd/pull/6759)) * [`f2ba2041b`](https://github.com/containerd/containerd/commit/f2ba2041be70b2c61dfd3151e2d91c74a917c4bf) update runc binary to v1.1.1 * [`b736b4dab`](https://github.com/containerd/containerd/commit/b736b4dab097bb79d11cc72c2ab3a19615613060) go.mod: github.com/opencontainers/runc v1.1.1 * [release/1.6] CI: add Rocky Linux 8 ([#6752](https://github.com/containerd/containerd/pull/6752)) * [`72f1e58c7`](https://github.com/containerd/containerd/commit/72f1e58c703db70b10486635c56c31b6758de29e) CI: add Rocky Linux 8 * [release/1.6] vendor: github.com/containerd/imgcrypt v1.1.4 ([#6739](https://github.com/containerd/containerd/pull/6739)) * [`7ede40c5c`](https://github.com/containerd/containerd/commit/7ede40c5ca3c8d0565798fa653402357b8c088a0) [release/1.6] vendor: github.com/containerd/imgcrypt v1.1.4 * [release/1.6 backport] moving up to go-cni v1.1.4 ([#6728](https://github.com/containerd/containerd/pull/6728)) * [`82a12edf2`](https://github.com/containerd/containerd/commit/82a12edf250b8df03c1dcfc6f18928fba6610250) moving up to go-cni v1.1.4 * [release/1.6 backport] Update prometheus client vendor ([#6732](https://github.com/containerd/containerd/pull/6732)) * [`da35c19da`](https://github.com/containerd/containerd/commit/da35c19dad1a39ad49341635e098a258af0d9566) Test turning off golang CI lint cache * [`a0213573b`](https://github.com/containerd/containerd/commit/a0213573b2179224fa9c0c876bf14e26416de2da) Add nolint:staticcheck to platform-specific calls * [`ad0036ed6`](https://github.com/containerd/containerd/commit/ad0036ed62be304b72bddcf01f1cfa5acf5c0a17) Update prometheus client vendor * [release/1.6 backport] Mount devmapper xfs file system with "nouuid" option. ([#6731](https://github.com/containerd/containerd/pull/6731)) * [`c7bbf316f`](https://github.com/containerd/containerd/commit/c7bbf316f4f0f86355a87a82294d60119d7fe5e8) Mount devmapper xfs file system with "nouuid" option. * [release/1.6 backport] Make the temp mount as ready only in container WithVolumes ([#6730](https://github.com/containerd/containerd/pull/6730)) * [`a1de89c3e`](https://github.com/containerd/containerd/commit/a1de89c3e8ed4e6918875bda626f6b2932b4e95c) Make the temp mount as ready only in container WithVolumes * [release/1.6 backport] native: fix deadlock from leaving transactions open ([#6727](https://github.com/containerd/containerd/pull/6727)) * [`28b44826b`](https://github.com/containerd/containerd/commit/28b44826b004cb04a3d53820c1ba4f845d351963) native: fix deadlock from leaving transactions open * [release/1.6 backport] cgroup2: monitor OOMKill instead of OOM to prevent missing container events ([#6734](https://github.com/containerd/containerd/pull/6734)) * [`5538be6cf`](https://github.com/containerd/containerd/commit/5538be6cf2f52ee09a1e9c217dcc031669ecc7c4) cgroup2: monitor OOMKill instead of OOM to prevent missing container OOM events </p> </details> ### Changes from containerd/go-cni <details><summary>8 commits</summary> <p> * moving up to latest CNI plugin release ([#90](https://github.com/containerd/go-cni/pull/90)) * [`689fcd9`](https://github.com/containerd/go-cni/commit/689fcd968353e729ac9b5454087accf118472f57) moving up to latest CNI plugin release * Fix Loopback Version ([#88](https://github.com/containerd/go-cni/pull/88)) * [`9ebcec1`](https://github.com/containerd/go-cni/commit/9ebcec1f5aae75ddd28394898d310212bc87c478) Update loopback version to support check * Update comment for capabilities ([#89](https://github.com/containerd/go-cni/pull/89)) * [`a4d8d38`](https://github.com/containerd/go-cni/commit/a4d8d386ca3b4fd71850ab58769e5b5d4cc5ecdc) update comment for capabilities * Add integration test for linux and update go version from 1.16 to 1.17 ([#84](https://github.com/containerd/go-cni/pull/84)) * [`49aa5ab`](https://github.com/containerd/go-cni/commit/49aa5ab910ad9812d2688764ff67dfdd42f77351) Add integration test and update go version </p> </details> ### Changes from containerd/imgcrypt <details><summary>13 commits</summary> <p> * CHANGES: Updated CHANGES document for 1.1.4 release ([#74](https://github.com/containerd/imgcrypt/pull/74)) * [`f576654`](https://github.com/containerd/imgcrypt/commit/f5766549f0d7ff396aeef807f93701d5c5bd1954) CHANGES: Updated CHANGES document for 1.1.4 release * Bump github.com/containerd/containerd from 1.5.10 to 1.6.1 ([#73](https://github.com/containerd/imgcrypt/pull/73)) * [`2efa871`](https://github.com/containerd/imgcrypt/commit/2efa871163e1bae96d137356abf6cb4cb70b8a21) Bump github.com/containerd/containerd from 1.5.10 to 1.6.1 * images: prepare for typeurl.Any ([#72](https://github.com/containerd/imgcrypt/pull/72)) * [`f842da4`](https://github.com/containerd/imgcrypt/commit/f842da460337d2d54f7f48af3b7234bbc3cfaa4e) images: prepare for typeurl.Any * [`6fdd981`](https://github.com/containerd/imgcrypt/commit/6fdd9818a4d8142107b7ecd767d839c9707700d9) images: Add list of Platforms to CheckAuthorization() * [`f440058`](https://github.com/containerd/imgcrypt/commit/f4400580b658c1fcb3cacc52dfb6104ea3c3aa82) test: Test running of encrypted image only pulled for local platform * Bump ocicrypt to 1.1.3 ([#71](https://github.com/containerd/imgcrypt/pull/71)) * [`d4d4684`](https://github.com/containerd/imgcrypt/commit/d4d468487cecbd1ccf2f2eb1c05c8d3439471922) Bump ocicrypt to 1.1.3 * [`727850f`](https://github.com/containerd/imgcrypt/commit/727850ffb1438cf9dd6a46c7ad4ec162984f7bb2) Bump github.com/containerd/containerd from 1.5.9 to 1.5.10 * Bump github.com/containerd/containerd from 1.5.8 to 1.5.9 ([#67](https://github.com/containerd/imgcrypt/pull/67)) * [`3c7db10`](https://github.com/containerd/imgcrypt/commit/3c7db10f6482b7771f14b7503ae69164f3fe793d) Bump github.com/containerd/containerd from 1.5.8 to 1.5.9 </p> </details> ### Dependency Changes * **github.com/containerd/go-cni** v1.1.3 -> v1.1.4 * **github.com/containerd/imgcrypt** v1.1.3 -> v1.1.4 * **github.com/containernetworking/plugins** v1.0.1 -> v1.1.1 * **github.com/containers/ocicrypt** v1.1.2 -> v1.1.3 * **github.com/miekg/pkcs11** v1.0.3 -> v1.1.1 * **github.com/opencontainers/image-spec** 693428a734f5 -> c5a74bcca799 * **github.com/opencontainers/runc** v1.1.0 -> v1.1.1 * **github.com/prometheus/client_golang** v1.11.0 -> v1.11.1 Previous release can be found at [v1.6.2](https://github.com/containerd/containerd/releases/tag/v1.6.2)
-
-
-
v1.6.2
de8046a5 · ·containerd 1.6.2 Welcome to the v1.6.2 release of containerd! The second patch release for containerd 1.6 includes a fix for [CVE-2022-24769](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c). ### Notable Updates * **Fix the inheritable capability defaults** ([GHSA-c9cp-9c75-9v8c](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Derek McGowan * Kazuyoshi Kato * Sebastiaan van Stijn * Akihiro Suda * Andrew G. Morgan * Phil Estes * Shengjing Zhu * Wei Fu ### Changes <details><summary>17 commits</summary> <p> * Prepare release notes for v1.6.2 ([#6725](https://github.com/containerd/containerd/pull/6725)) * Prepare release notes for v1.6.2 * Add static checks to shim for Windows * [release/1.6] update go.mod go version ([#6724](https://github.com/containerd/containerd/pull/6724)) * Update go.mod go version * [release/1.6] remove empty go mod to allow building for go 1.18 ([#6717](https://github.com/containerd/containerd/pull/6717)) * [release/1.6] remove empty go mod to allow building for go 1.18 * Github Security Advisory [GHSA-c9cp-9c75-9v8c](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c) * Fix the Inheritable capability defaults. * [release/1.6] cherry-pick: Update TestNormalize to only test Windows ([#6673](https://github.com/containerd/containerd/pull/6673)) * Update TestNormalize to only test Windows * [release/1.6] cherry-pick: Upgrade golangci-lint and its GitHub Action ([#6675](https://github.com/containerd/containerd/pull/6675)) * Upgrade golangci-lint and its GitHub Action * [release/1.6] cri: relax test for system without hugetlb ([#6623](https://github.com/containerd/containerd/pull/6623)) * cri: relax test for system without hugetlb * [release/1.6] update to go 1.16.15, 1.17.8 to address CVE-2022-24921 ([#6620](https://github.com/containerd/containerd/pull/6620)) * update to go 1.16.15, 1.17.8 to address CVE-2022-24921 </p> </details> ### Dependency Changes This release has no dependency changes Previous release can be found at [v1.6.1](https://github.com/containerd/containerd/releases/tag/v1.6.1)
-
v1.5.11
3df54a85 · ·containerd 1.5.11 Welcome to the v1.5.11 release of containerd! The eleventh patch release for containerd 1.5 includes a fix for [CVE-2022-24769](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c). ### Notable Updates * **Fix the inheritable capability defaults** ([GHSA-c9cp-9c75-9v8c](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Derek McGowan * Sebastiaan van Stijn * Akihiro Suda * Andrew G. Morgan * Daniel Canter * Kazuyoshi Kato * Phil Estes ### Changes <details><summary>18 commits</summary> <p> * Prepare release notes for v1.5.11 ([#6723](https://github.com/containerd/containerd/pull/6723)) * Prepare release notes for v1.5.11 * [release/1.5] Upgrade Go to 1.17 and golangci-lint ([#6719](https://github.com/containerd/containerd/pull/6719)) * Update go version to 1.17 * Update linter errors * Run gofmt * Upgrade golangci-lint and its GitHub Action * [release/1.5] fix critools installation ([#6718](https://github.com/containerd/containerd/pull/6718)) * Update get to install for cri tools * [release/1.5] remove empty go mod to allow building for go 1.18 ([#6716](https://github.com/containerd/containerd/pull/6716)) * install-dev-tools: use go install, and pin by version * [release/1.5] remove empty go mod to allow building for go 1.18 * Github Security Advisory [GHSA-c9cp-9c75-9v8c](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c) * Fix the Inheritable capability defaults. * [release/1.5] update to go 1.16.15 to address CVE-2022-24921 ([#6621](https://github.com/containerd/containerd/pull/6621)) * [release/1.5] update to go 1.16.15 to address CVE-2022-24921 * [release/1.5] go.mod: Bump hcsshim to v0.8.24 ([#6588](https://github.com/containerd/containerd/pull/6588)) * go.mod: Bump hcsshim to v0.8.24 </p> </details> ### Dependency Changes * **github.com/Microsoft/hcsshim** v0.8.23 -> v0.8.24 Previous release can be found at [v1.5.10](https://github.com/containerd/containerd/releases/tag/v1.5.10)
-
-
-
-
v1.6.1
10f428da · ·containerd 1.6.1 Welcome to the v1.6.1 release of containerd! The first patch release for containerd 1.6 includes a fix for [CVE-2022-23648](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7) and other issues. ### Notable Updates * **Use fs.RootPath when mounting volumes** ([GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7)) * **Return init pid when clean dead shim in runc.v1/v2 shims** ([#6572](https://github.com/containerd/containerd/pull/6572)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Derek McGowan * Jeff Zvier * Maksym Pavlenko * Wei Fu * ruiwen-zhao ### Changes <details><summary>7 commits</summary> <p> * [release/1.6] Prepare release notes for v1.6.1 ([#6607](https://github.com/containerd/containerd/pull/6607)) * Prepare release notes for v1.6.1 * Github Security Advisory [GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7) * Use fs.RootPath when mounting volumes * [release/1.6] runc.v1/v2: return init pid when clean dead shim ([#6572](https://github.com/containerd/containerd/pull/6572)) * containerd-shim-runc-v1: return init pid when clean dead shim * containerd-shim-runc-v2: return init pid when clean dead shim </p> </details> ### Dependency Changes This release has no dependency changes Previous release can be found at [v1.6.0](https://github.com/containerd/containerd/releases/tag/v1.6.0)
-
v1.5.10
2a1d4dbd · ·containerd 1.5.10 Welcome to the v1.5.10 release of containerd! The tenth patch release for containerd 1.5 includes a fix for [CVE-2022-23648](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7) and other issues. ### Notable Updates * **Use fs.RootPath when mounting volumes** ([GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7)) * **Return init pid when clean dead shim in runc.v1/v2 shims** ([#6570](https://github.com/containerd/containerd/pull/6570)) * **Handle sigint/sigterm in shimv2** ([#6509](https://github.com/containerd/containerd/pull/6509)) * **Use readonly mount to read user/group info** ([#6503](https://github.com/containerd/containerd/pull/6503)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Derek McGowan * Wei Fu * Sebastiaan van Stijn * Phil Estes * Alexander Minbaev * Brian Goff * Daniel Canter * David Porter * Kazuyoshi Kato * Maksym Pavlenko * ruiwen-zhao ### Changes <details><summary>22 commits</summary> <p> * [release/1.5] Prepare release notes for v1.5.10 ([#6606](https://github.com/containerd/containerd/pull/6606)) * Prepare release notes for v1.5.10 * Github Security Advisory [GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7) * Use fs.RootPath when mounting volumes * [release/1.5] runc.v1/v2: return init pid when clean dead shim ([#6570](https://github.com/containerd/containerd/pull/6570)) * runc.v1/v2: return init pid when clean dead shim * [release/1.5] Update Go to 1.16.14 ([#6556](https://github.com/containerd/containerd/pull/6556)) * [release/1.5] Update Go to 1.16.14 * Wait for containerd installation in GCE scripts [1.5 backport] ([#6552](https://github.com/containerd/containerd/pull/6552)) * Wait for containerd installation in GCE scripts * [release/1.5] shimv2: handle sigint/sigterm ([#6509](https://github.com/containerd/containerd/pull/6509)) * shimv2: handle sigint/sigterm * [release/1.5] Update Go to 1.16.13 ([#6526](https://github.com/containerd/containerd/pull/6526)) * [release/1.5] Update Go to 1.16.13 * [release/1.5 backport] GHA fixes, update GolangCI-Lint v1.42.0, and go-mdman v2.0.1 ([#6511](https://github.com/containerd/containerd/pull/6511)) * script: update golangci-lint from v1.38.0 and v1.36.0 to v1.42.0 * Fix Linux CI Linter using go 1.15.14 * Update cpuguy83/go-md2man binary to v2.0.1 * [release/1.5] oci: use readonly mount to read user/group info ([#6503](https://github.com/containerd/containerd/pull/6503)) * oci: use readonly mount to read user/group info * [release/1.5] add-list-stat: return container list if filter is nil ([#6466](https://github.com/containerd/containerd/pull/6466)) * add-list-stat: return container list if filter is nil </p> </details> ### Dependency Changes This release has no dependency changes Previous release can be found at [v1.5.9](https://github.com/containerd/containerd/releases/tag/v1.5.9)
-
-
v1.4.13
9cc61520 · ·containerd 1.4.13 Welcome to the v1.4.13 release of containerd! The thirteenth patch release for containerd 1.4 is a security release to address [CVE-2022-23648](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7). ### Notable Updates * **Use fs.RootPath when mounting volumes** ([GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7)) See the changelog for complete list of changes Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. ### Contributors * Derek McGowan * Sebastiaan van Stijn * Phil Estes * Akihiro Suda * David Porter * Kazuyoshi Kato * Michael Crosby ### Changes <details><summary>17 commits</summary> <p> * Github Security Advisory [GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7) * Prepare release notes for v1.4.13 * Use fs.RootPath when mounting volumes * [release/1.4] backport: Wait for containerd installation in GCE scripts ([#6553](https://github.com/containerd/containerd/pull/6553)) * Wait for containerd installation in GCE scripts * [release/1.4] Update Go to 1.16.14 ([#6527](https://github.com/containerd/containerd/pull/6527)) * Do not use `go get` to install executables * [release/1.4] update Go to 1.16.14 * [release/1.4] Update Go to 1.16.13 * [release/1.4] vendor: github.com/opencontainers/image-spec v1.0.2 ([#6265](https://github.com/containerd/containerd/pull/6265)) * [release/1.4] vendor: github.com/opencontainers/image-spec v1.0.2 * [release/1.4] Update Go to 1.16.12 ([#6368](https://github.com/containerd/containerd/pull/6368)) * [release/1.4] Update Go to 1.16.12 * [release/1.4] update runc binary to v1.0.3 ([#6344](https://github.com/containerd/containerd/pull/6344)) * update runc binary to v1.0.3 * [release/1.4] Update Go to 1.16.11 ([#6335](https://github.com/containerd/containerd/pull/6335)) * [release/1.4] Update Go to 1.16.11 </p> </details> ### Changes from containerd/cri <details><summary>4 commits</summary> <p> * [release/1.4] Use fs.RootPath when mounting volumes ([#1655](https://github.com/containerd/cri/pull/1655)) * Use fs.RootPath when mounting volumes * [release/1.4] update Go 1.15.14 (to match containerd) ([#1645](https://github.com/containerd/cri/pull/1645)) * [release/1.4] update Go 1.15.14 (to match containerd) </p> </details> ### Dependency Changes * **github.com/containerd/cri** 3b02bec16031 -> 8f1a8a1fb9eb * **github.com/opencontainers/image-spec** v1.0.1 -> v1.0.2 Previous release can be found at [v1.4.12](https://github.com/containerd/containerd/releases/tag/v1.4.12)
-
-