dependabot[bot]
f89ed3c628
build(deps): bump golang.org/x/sys in the golang-x group
...
Bumps the golang-x group with 1 update: [golang.org/x/sys](https://github.com/golang/sys ).
Updates `golang.org/x/sys` from 0.25.0 to 0.26.0
- [Commits](https://github.com/golang/sys/compare/v0.25.0...v0.26.0 )
---
updated-dependencies:
- dependency-name: golang.org/x/sys
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: golang-x
...
Signed-off-by: dependabot[bot] <support@github.com >
2024-10-09 03:54:23 +00:00
dependabot[bot]
63b55e6dfb
build(deps): bump the golang-x group with 2 updates
...
Bumps the golang-x group with 2 updates: [golang.org/x/mod](https://github.com/golang/mod ) and [golang.org/x/sys](https://github.com/golang/sys ).
Updates `golang.org/x/mod` from 0.18.0 to 0.19.0
- [Commits](https://github.com/golang/mod/compare/v0.18.0...v0.19.0 )
Updates `golang.org/x/sys` from 0.21.0 to 0.22.0
- [Commits](https://github.com/golang/sys/compare/v0.21.0...v0.22.0 )
---
updated-dependencies:
- dependency-name: golang.org/x/mod
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: golang-x
- dependency-name: golang.org/x/sys
dependency-type: direct:production
update-type: version-update:semver-minor
dependency-group: golang-x
...
Signed-off-by: dependabot[bot] <support@github.com >
2024-07-08 23:55:10 +00:00
Kohei Tokunaga
9937909693
go.mod: Bump up github.com/containernetworking/plugins to v1.4.0
...
Signed-off-by: Kohei Tokunaga <ktokunaga.mail@gmail.com >
2023-12-06 10:29:44 +09:00
Sebastiaan van Stijn
ff602c2133
vendor: golang.org/x/sys v0.13.0
...
full diff: https://github.com/golang/sys/compare/v0.10.0...v0.13.0
Signed-off-by: Sebastiaan van Stijn <github@gone.nl >
2023-10-16 21:47:15 +02:00
Akihiro Suda
4bda0a69e2
go.mod: github.com/grpc-ecosystem/go-grpc-middleware v1.4.0
...
https://github.com/grpc-ecosystem/go-grpc-middleware/compare/v1.3.0...v1.4.0
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp >
2023-07-23 03:07:59 +09:00
Brian Goff
104b9ef9eb
Update x/sys to 0.8.0
...
Signed-off-by: Brian Goff <cpuguy83@gmail.com >
2023-06-03 16:14:38 +00:00
Akihiro Suda
52f82acb7b
btrfs: depend on kernel UAPI instead of libbtrfs
...
See containerd/btrfs PR 40 and moby/moby PR 44761. (Thanks to [@]neersighted.)
The containerd/btrfs library now requires headers from kernel 4.12 or newer:
- https://github.com/torvalds/linux/blob/master/include/uapi/linux/btrfs.h
- https://github.com/torvalds/linux/blob/master/include/uapi/linux/btrfs_tree.h
These files are licensed under the GPL-2.0 WITH Linux-syscall-note, so it should be compatible with the Apache License 2.0.
https://spdx.org/licenses/Linux-syscall-note.html
The dependency on the kernel headers only affects users building from source.
Users on older kernels may opt to not compile this library (`BUILDTAGS=no_btfs`),
or to provide headers from a newer kernel.
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp >
2023-02-10 10:07:34 +09:00
Akihiro Suda
c3fb7dfa7f
go.mod: github.com/moby/sys/mountinfo v0.6.2
...
https://github.com/moby/sys/compare/mountinfo/v0.6.0...mountinfo/v0.6.2
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp >
2022-06-08 13:25:08 +09:00
Kazuyoshi Kato
2fb739aa21
Upgrade OpenTelemetry dependencies
...
This commit upgrades the packages under go.opentelemetry.io/.
Signed-off-by: Kazuyoshi Kato <katokazu@amazon.com >
2021-12-16 22:35:57 +00:00
Sebastiaan van Stijn
fa12f4e696
go.mod: golang.org/x/sys v0.0.0-20211025201205-69cdffdb9359
...
full diff: ed5796bab1...69cdffdb93
Signed-off-by: Sebastiaan van Stijn <github@gone.nl >
2021-11-05 13:03:15 +01:00
Kazuyoshi Kato
1d3d08026d
Support SIGRTMIN+n signals
...
systemd uses SIGRTMIN+n signals, but containerd didn't support the signals
since Go's sys/unix doesn't support them.
This change introduces SIGRTMIN+n handling by utilizing moby/sys/signal.
Fixes #5402 .
https://www.freedesktop.org/software/systemd/man/systemd.html#Signals
Signed-off-by: Kazuyoshi Kato <katokazu@amazon.com >
2021-07-26 09:36:43 -07:00
Sebastiaan van Stijn
36bf3f0e8a
go.mod: github.com/Microsoft/hcsshim v0.8.16
...
full diff: https://github.com/microsoft/hcsshim/compare/v0.8.15...v0.8.16
also updating github.com/Microsoft/hcsshim/test to current master
Signed-off-by: Sebastiaan van Stijn <github@gone.nl >
2021-04-09 09:12:12 +02:00
Davanum Srinivas
c3eecf4f75
Update to newest imgcrypt, aufs and zfs
...
Older versions transitively dragged in k8s.io/kubernetes, the newer
versions do not.
Signed-off-by: Davanum Srinivas <davanum@gmail.com >
2021-03-01 12:23:03 -05:00
Derek McGowan
41da96d670
Update continuity
...
Pickup usage calculation fix
Signed-off-by: Derek McGowan <derek@mcg.dev >
2020-12-04 11:49:26 -08:00
Davanum Srinivas
4044ca9a57
trying docker v19.03.13
...
Signed-off-by: Davanum Srinivas <davanum@gmail.com >
2020-10-13 10:36:42 -04:00
Sebastiaan van Stijn
8b5cc2e1dc
vendor: containerd/console v1.0.1
...
full diff: https://github.com/containerd/consolve/compare/v1.0.0...v1.0.1
vendor golang.org/x/sys 2334cc1a136f0a5b4384f1a27e3634457be08553
full diff: ed371f2e16...2334cc1a13
- unix: add Darwin support for clonefile syscalls
- Adds openat2 for linux
openat2 is a new syscall added to Linux 5.6. It provides a superset of
openat(2) functionality, extending it with flags telling the kernel how
to resolve the paths.
For more info, see https://lwn.net/Articles/803237/
NOTE that this is a second attempt to add the call; the previous one
(https://golang.org/cl/227280 ) was reverted
(https://golang.org/cl/227846 ) due to the test case failure on ARM
(https://golang.org/issue/38357 ).
This CL has the test case reworked to be less assumptive to the testing
environment. In particular, it first tries if the most simplistic
openat2() call succeeds, and skips the test otherwise. It is done that
way because CI can be under under different kernels and in various
envrionments -- in particular, Docker+seccomp can result in EPERM from a
system call (which is not expected otherwise).
For previous discussions about the test case, see
https://golang.org/cl/227865 .
Signed-off-by: Sebastiaan van Stijn <github@gone.nl >
2020-09-24 23:34:18 +02:00
Sebastiaan van Stijn
4a0ac319ca
vendor: golang.org/x/sys v0.0.0-20200622214017-ed371f2e16b4
...
full diff: 9dae0f8f57...ed371f2e16
Signed-off-by: Sebastiaan van Stijn <github@gone.nl >
2020-08-11 09:57:43 +02:00
Sebastiaan van Stijn
b78dfbdfbe
vendor: golang.org/x/sys 52ab431487773bc9dd1b0766228b1cf3944126bf
...
full diff: c990c680b6...52ab431487
Signed-off-by: Sebastiaan van Stijn <github@gone.nl >
2020-03-07 14:35:36 +01:00
Kevin Parsons
64a0b2eb26
Revendor to remove unused dependencies
...
Signed-off-by: Kevin Parsons <kevpar@microsoft.com >
2019-08-19 11:23:34 -07:00
CarlosEDP
3ef26cd87c
bump x/sys to fix riscv64 epoll
...
Signed-off-by: CarlosEDP <me@carlosedp.com >
2019-08-12 11:43:53 -03:00
CarlosEDP
fb6b0ae4c6
Update x/sys, x/net and bbolt modules to support Risc-V
...
Signed-off-by: CarlosEDP <me@carlosedp.com >
2019-06-07 17:54:32 -03:00
Shengjing Zhu
1745951bad
Vendor golang.org/x/sys d455e41777fca6e8a5a79e34a14b8368bc11d9ba
...
Signed-off-by: Shengjing Zhu <zhsj@debian.org >
2019-03-03 21:35:46 +08:00
Sebastiaan van Stijn
14eaad0cd9
Update runc to 6635b4f0c6af3810594d2770f662f34ddc15b40d (CVE-2019-5736)
...
Includes 6635b4f0c6 ,
which fixes a vulnerability in runc that allows a container escape (CVE-2019-5736)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl >
2019-02-11 15:18:59 +01:00
John Howard
40d898a820
Windows: Allow running as a service
...
Signed-off-by: John Howard <jhoward@microsoft.com >
Allows containerd.exe to run as a Windows service. eg
Register: `.\containerd.exe --register-service`
Start: `net start containerd`
...
Stop: `net stop containerd`
Unregister: `.\containerd.exe --unregister-service`
When running as a service, logs will go to the Windows application
event log.
2018-11-27 17:28:04 -08:00
Derek McGowan
0c0c271b54
Update golang.org/x/sys
...
Signed-off-by: Derek McGowan <derek@mcgstyle.net >
2018-07-12 15:14:35 -07:00
Ian Campbell
623407a399
Re-vndr with newest vndr
...
This seems to pickup a bunch of *.c files and some other changes which follow
from having included some new packages because of that.
Signed-off-by: Ian Campbell <ian.campbell@docker.com >
2018-05-01 00:18:17 +01:00