Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

vendor: github.com/containerd/containerd v1.6.22 #4470

Merged
merged 1 commit into from
Aug 1, 2023

Conversation

thaJeztah
Copy link
Member

@thaJeztah thaJeztah commented Jul 29, 2023



Notable Updates

  • RunC: Update runc binary to v1.1.8
  • CRI: Fix additionalGids: it should fallback to imageConfig.User
    when securityContext.RunAsUser, RunAsUsername are empty
  • CRI: Write generated CNI config atomically
  • Fix concurrent writes for UpdateContainerStats
  • Make checkContainerTimestamps less strict on Windows
  • Port-Forward: Correctly handle known errors
  • Resolve docker.NewResolver race condition
  • SecComp: Always allow name_to_handle_at
  • Adding support to run hcsshim from local clone
  • Pinned image support
  • Runtime/V2/RunC: Handle early exits w/o big locks
  • CRITool: Move up to CRI-TOOLS v1.27.0
  • Fix cpu architecture detection issue on emulated ARM platform
  • Task: Don't close() io before cancel()
  • Fix panic when remote differ returns empty result
  • Plugins: Notify readiness when registered plugins are ready
  • Unwrap io errors in server connection receive error handling

- Description for the changelog

- A picture of a cute animal (not mandatory but encouraged)

@thaJeztah thaJeztah added this to the 25.0.0 milestone Jul 29, 2023
@thaJeztah thaJeztah changed the title Bump containerd 1.6.22 vendor: github.com/containerd/containerd v1.6.22 Jul 29, 2023
@codecov-commenter
Copy link

codecov-commenter commented Jul 29, 2023

Codecov Report

Merging #4470 (373fa57) into master (a63f560) will not change coverage.
The diff coverage is n/a.

Additional details and impacted files
@@           Coverage Diff           @@
##           master    #4470   +/-   ##
=======================================
  Coverage   59.39%   59.39%           
=======================================
  Files         288      288           
  Lines       24782    24782           
=======================================
  Hits        14720    14720           
  Misses       9175     9175           
  Partials      887      887           

@thaJeztah thaJeztah marked this pull request as ready for review July 30, 2023 13:58
- full diff: containerd/containerd@v1.6.21...v1.6.22
- release notes: https://github.com/containerd/containerd/releases/tag/v1.6.22

---

Notable Updates

- RunC: Update runc binary to v1.1.8
- CRI: Fix `additionalGids`: it should fallback to `imageConfig.User`
  when `securityContext.RunAsUser`, `RunAsUsername` are empty
- CRI: Write generated CNI config atomically
- Fix concurrent writes for `UpdateContainerStats`
- Make `checkContainerTimestamps` less strict on Windows
- Port-Forward: Correctly handle known errors
- Resolve `docker.NewResolver` race condition
- SecComp: Always allow `name_to_handle_at`
- Adding support to run hcsshim from local clone
- Pinned image support
- Runtime/V2/RunC: Handle early exits w/o big locks
- CRITool: Move up to CRI-TOOLS v1.27.0
- Fix cpu architecture detection issue on emulated ARM platform
- Task: Don't `close()` io before `cancel()`
- Fix panic when remote differ returns empty result
- Plugins: Notify readiness when registered plugins are ready
- Unwrap io errors in server connection receive error handling

Signed-off-by: Sebastiaan van Stijn <[email protected]>
@thaJeztah thaJeztah merged commit bb0e232 into docker:master Aug 1, 2023
74 checks passed
@thaJeztah thaJeztah deleted the bump_containerd_1.6.22 branch August 1, 2023 14:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants