Commit Graph

12660 Commits

Author SHA1 Message Date
Akihiro Suda
18eb99029b
Merge pull request #8498 from AkihiroSuda/image-spec-v1.1.0-rc.3
go.mod: github.com/opencontainers/image-spec v1.1.0-rc3
2023-05-10 20:44:00 +09:00
Derek McGowan
49029b75ba
Merge pull request #7316 from thaJeztah/plugin_less_restrictive
plugin: remove go < 1.8 stub, enable on windows and arm64
2023-05-09 22:29:44 -07:00
Fu Wei
bd185813ac
Merge pull request #8504 from dcantah/close-f-early
Simplify closing bundle dir fd
2023-05-10 10:09:01 +08:00
Derek McGowan
b0f587d65d
Merge pull request #8487 from samuelkarp/setup-go-v4-disable-cache
.github: disable cache for actions/setup-go@v4
2023-05-09 17:30:30 -07:00
Danny Canter
df65e321ee Simplify closing bundle dir fd
Follow-up to #8489. We don't need to call Close in the err and success
cases, we can just do it after Readdirnames returns.

Signed-off-by: Danny Canter <danny@dcantah.dev>
2023-05-09 17:22:04 -07:00
Derek McGowan
a28606ec1b
Merge pull request #8503 from fahedouch/improve-Task-comment
improve container Task comment
2023-05-09 16:49:55 -07:00
Phil Estes
25ae976de3
Merge pull request #8497 from dmcgowan/update-ttrpc-1.2.2 2023-05-09 16:44:57 -07:00
Derek McGowan
718250b6ba
Update ttrpc to v1.2.2
Signed-off-by: Derek McGowan <derek@mcg.dev>
2023-05-09 13:08:46 -07:00
Phil Estes
c6d7e45c14
Merge pull request #8496 from ktock/golangci-lint-1.52.2
Bump up golangci-lint to v1.52.2
2023-05-09 13:03:06 -07:00
fahed dorgaa
7e42dc34d4
improve container Task comment
Signed-off-by: fahed dorgaa <fahed.dorgaa@gmail.com>
2023-05-09 20:15:53 +02:00
Phil Estes
43bbffba37
Merge pull request #8500 from AkihiroSuda/runtime-spec-v1.1.0-rc.2
go.mod: github.com/opencontainers/runtime-spec v1.1.0-rc.2
2023-05-09 10:42:53 -07:00
Akihiro Suda
4347fc8bc2
go.mod: github.com/opencontainers/image-spec v1.1.0-rc3
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
2023-05-09 23:35:58 +09:00
Akihiro Suda
5e054ee631
go.mod: github.com/opencontainers/runtime-spec v1.1.0-rc.2
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
2023-05-09 22:26:37 +09:00
helen
bb61a6d4ba cache diffIDs
Signed-off-by: helen <haitao.zhang@daocloud.io>
2023-05-09 16:32:51 +08:00
Fu Wei
465c804d22
Merge pull request #8489 from dcantah/readdirnames-fun
Change to Readdirnames for some cases
2023-05-09 15:43:36 +08:00
Fu Wei
82a251f92b
Merge pull request #8494 from Iceber/bump_typeurl
bump typeurl to v2.1.1
2023-05-09 15:41:07 +08:00
Kohei Tokunaga
6e2c915a44
Bump up golangci-lint to v1.52.2
Signed-off-by: Kohei Tokunaga <ktokunaga.mail@gmail.com>
2023-05-09 15:07:55 +09:00
Iceber Gu
ecb693ec74 bump typeurl to v2.1.1
Signed-off-by: Iceber Gu <wei.cai-nat@daocloud.io>
2023-05-09 13:23:02 +08:00
Danny Canter
f5211ee3fc Change to Readdirnames for some cases
There was a couple uses of Readdir/ReadDir here where the only thing the return
value was used for was the Name of the entry. This is exactly what Readdirnames
returns, so we can avoid the overhead of making/returning a bunch of interfaces
and calling lstat everytime in the case of Readdir(-1).

https://cs.opensource.google/go/go/+/refs/tags/go1.20.4:src/os/dir_unix.go;l=114-137

Signed-off-by: Danny Canter <danny@dcantah.dev>
2023-05-08 00:41:13 -07:00
Samuel Karp
57c526b000
Merge pull request #8486 from samuelkarp/cri-rlimit-spec-opt-comment 2023-05-07 23:24:12 -07:00
Samuel Karp
e60a179255
.github: disable cache for actions/setup-go@v4
https://github.com/actions/setup-go/issues/368 and
https://github.com/opencontainers/runc/pull/3820#issuecomment-1501426479
discuss issues with the cache key for actions/setup-go@v4.  Rather than
reverting the upgrade to v4 (per discussion in
https://github.com/containerd/containerd/pull/8372), disable caching
explicitly.

Signed-off-by: Samuel Karp <samuelkarp@google.com>
2023-05-07 17:24:18 -07:00
Samuel Karp
52afa34f52
cri: update WithoutDefaultSecuritySettings comment
This pointer to an issue never got updated after the CRI plugin was
absorbed into the main containerd repo as an in-tree plugin.

Signed-off-by: Samuel Karp <samuelkarp@google.com>
2023-05-07 15:22:35 -07:00
Maksym Pavlenko
98f48d485d
Merge pull request #8481 from mxpv/logrus
Cleanup logrus imports
2023-05-05 18:21:55 -07:00
Maksym Pavlenko
6f34da5f80 Cleanup logrus imports
Signed-off-by: Maksym Pavlenko <pavlenko.maksym@gmail.com>
2023-05-05 11:54:14 -07:00
Sebastiaan van Stijn
717169bb88
plugin: remove go < 1.8 stub, enable on windows and arm64
- we don't support go < 1.8. this restriction as added because plugin support
  requires go 1.8 or up, but with such old versions being EOL, this check was
  rather redundant
- add back arm64 support; in 6bd0710831, non-amd64
  was disabled, pending golang/go#17138, which was tracking arm64 support, and
  is now resolved. It's unclear if architectures other than amd64 and arm64 are
  supported, so keeping it restricted to amd64 and arm64.
- enable plugin support on Windows; it was disabled in 0b44e24c07
  but the code looks to take windows into account.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-05-05 18:12:46 +02:00
Mike Brown
5dda3d8d55
Merge pull request #8389 from tukwila/support_k8_1.27
containerd support k8s v1.27
2023-05-05 10:16:12 -05:00
Phil Estes
6020903f2c
Merge pull request #8474 from mikebrow/cri-tools-1.27
move to CRI-TOOLS v1.27.0
2023-05-04 10:29:49 -04:00
Samuel Karp
f5b10fdea2
Merge pull request #8473 from brandond/fix-cri-stats_main
cri: Fix umarshal metrics
2023-05-04 00:32:24 -07:00
Mike Brown
28d749c9e2 move to CRI-TOOLS v1.27.0
Signed-off-by: Mike Brown <brownwm@us.ibm.com>
2023-05-03 18:14:01 -05:00
Mike Brown
747aafc786
Merge pull request #8470 from thaJeztah/update_go1.20.4
update go to go1.20.4, go1.19.9
2023-05-03 17:00:12 -05:00
Brad Davidson
27f56e607f
Fix umarshal metrics for CRI server
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
2023-05-03 20:50:04 +00:00
Phil Estes
b324a4b8e2
Merge pull request #8467 from alexellis/add-openfaas-adopters
Add faasd and actuated into the ADOPTERS file
2023-05-03 15:40:28 -04:00
Sebastiaan van Stijn
b947a6f528
update go to go1.20.4, go1.19.9
go1.20.4 (released 2023-05-02) includes three security fixes to the html/template
package, as well as bug fixes to the compiler, the runtime, and the crypto/subtle,
crypto/tls, net/http, and syscall packages. See the Go 1.20.4 milestone on our
issue tracker for details:

https://github.com/golang/go/issues?q=milestone%3AGo1.20.4+label%3ACherryPickApproved

release notes: https://go.dev/doc/devel/release#go1.20.4
full diff: https://github.com/golang/go/compare/go1.20.3...go1.20.4

from the announcement:

> These minor releases include 3 security fixes following the security policy:
>
> - html/template: improper sanitization of CSS values
>
>   Angle brackets (`<>`) were not considered dangerous characters when inserted
>   into CSS contexts. Templates containing multiple actions separated by a '/'
>   character could result in unexpectedly closing the CSS context and allowing
>   for injection of unexpected HMTL, if executed with untrusted input.
>
>   Thanks to Juho Nurminen of Mattermost for reporting this issue.
>
>   This is CVE-2023-24539 and Go issue https://go.dev/issue/59720.
>
> - html/template: improper handling of JavaScript whitespace
>
>   Not all valid JavaScript whitespace characters were considered to be
>   whitespace. Templates containing whitespace characters outside of the character
>   set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain
>   actions may not be properly sanitized during execution.
>
>   Thanks to Juho Nurminen of Mattermost for reporting this issue.
>
>   This is CVE-2023-24540 and Go issue https://go.dev/issue/59721.
>
> - html/template: improper handling of empty HTML attributes
>
>   Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}")
>   executed with empty input could result in output that would have unexpected
>   results when parsed due to HTML normalization rules. This may allow injection
>   of arbitrary attributes into tags.
>
>   Thanks to Juho Nurminen of Mattermost for reporting this issue.
>
>   This is CVE-2023-29400 and Go issue https://go.dev/issue/59722.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-05-03 20:38:00 +02:00
Phil Estes
bed2bef9ad
Merge pull request #8465 from aznashwan/windows-workflow-critest-path
Windows integration: fix critest binary path in Azure-based workflow.
2023-05-03 07:45:46 -07:00
Alex Ellis (OpenFaaS Ltd)
c54b706c0c Add faasd and actuated into the ADOPTERS file
* faasd is free and open source - and added in alphabetical order
* actuated is a hybrid SaaS service where customers run
containerd and Firecracker on their own hosts, and the control
plane and scheduler are managed - added later in the file
since it's a commercial adopter.

Signed-off-by: Alex Ellis (OpenFaaS Ltd) <alexellis2@gmail.com>
2023-05-03 15:28:19 +01:00
Phil Estes
be2ca3c860
Merge pull request #8466 from dmcgowan/fix-transfer-default-limiters
[transfer] avoid setting limiters when max is 0
2023-05-03 06:52:29 -07:00
Derek McGowan
d56466cf39
[transfer] avoid setting limiters when max is 0
Signed-off-by: Derek McGowan <derek@mcg.dev>
2023-05-02 18:17:34 -07:00
Derek McGowan
a7ceac8b63
Merge pull request #8337 from keloyang/imagePullThroughput
Register imagePullThroughput and count with MiB
2023-05-02 10:30:19 -07:00
Nashwan Azhari
2e53c0ec8d Windows integration: fix critest binary path in Azure-based workflow.
The critest binary build directory has changed following
kubernetes-sigs/cri-tools#1085 to also include the OS and architecture,
so the Azure-based Windows workflows needed to be updated to account for
the new path.

Signed-off-by: Nashwan Azhari <nazhari@cloudbasesolutions.com>
2023-05-02 19:15:56 +03:00
Phil Estes
069d6acbe1
Merge pull request #8461 from dmcgowan/update-cri-registry-docs
Update CRI registry configuration docs
2023-05-01 13:54:29 -07:00
Akihiro Suda
85734b0076
Merge pull request #8460 from dmcgowan/fix-diff-proxy
Fix panic when differ returns empty result
2023-05-01 20:09:35 +09:00
Derek McGowan
9e7f8fe30c
Update CRI registry configuration docs
Remove deprecated sections except for auth configuration.
Add note about auth configuration deprecation.

Signed-off-by: Derek McGowan <derek@mcg.dev>
2023-04-29 23:54:25 -07:00
Akihiro Suda
0a1e316887
Merge pull request #8452 from thaJeztah/vendor_runc_1.1.7
vendor: github.com/opencontainers/runc v1.1.7
2023-04-30 15:31:45 +09:00
Akihiro Suda
4f9b9d9f69
Merge pull request #8458 from mxpv/mg
Run CI when adding a PR to a merge queue
2023-04-30 15:30:40 +09:00
Derek McGowan
0d975230e1
Fix panic when remote differ returns empty result
Signed-off-by: Derek McGowan <derek@mcg.dev>
2023-04-29 22:55:21 -07:00
Maksym Pavlenko
c58a229e50 Run CI when adding to the merge queue
Signed-off-by: Maksym Pavlenko <pavlenko.maksym@gmail.com>
2023-04-28 12:35:38 -07:00
Derek McGowan
54732fa9fb
Merge pull request #8449 from thaJeztah/runc_binary_1.1.7
update runc binary to v1.1.7
2023-04-27 08:05:30 -07:00
Sebastiaan van Stijn
0ba0664742
vendor: github.com/opencontainers/runc v1.1.7
release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.7
full diff: https://github.com/opencontainers/runc/compare/v1.1.6...v1.1.7

This is the seventh patch release in the 1.1.z release of runc, and is
the last planned release of the 1.1.z series. It contains a fix for
cgroup device rules with systemd when handling device rules for devices
that don't exist (though for devices whose drivers don't correctly
register themselves in the kernel -- such as the NVIDIA devices -- the
full fix only works with systemd v240+).

- When used with systemd v240+, systemd cgroup drivers no longer skip
  DeviceAllow rules if the device does not exist (a regression introduced
  in runc 1.1.3). This fix also reverts the workaround added in runc 1.1.5,
  removing an extra warning emitted by runc run/start.
- The source code now has a new file, runc.keyring, which contains the keys
  used to sign runc releases.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-04-27 12:00:23 +02:00
Sebastiaan van Stijn
cbd10e41a6
vendor: github.com/opencontainers/runc v1.1.6
release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.6
full diff: opencontainers/runc@v1.1.5...v1.1.6

This is the sixth patch release in the 1.1.z series of runc, which fixes
a series of cgroup-related issues.

Note that this release can no longer be built from sources using Go
1.16. Using a latest maintained Go 1.20.x or Go 1.19.x release is
recommended. Go 1.17 can still be used.

- systemd cgroup v1 and v2 drivers were deliberately ignoring UnitExist error
  from systemd while trying to create a systemd unit, which in some scenarios
  may result in a container not being added to the proper systemd unit and
  cgroup.
- systemd cgroup v2 driver was incorrectly translating cpuset range from spec's
  resources.cpu.cpus to systemd unit property (AllowedCPUs) in case of more
  than 8 CPUs, resulting in the wrong AllowedCPUs setting.
- systemd cgroup v1 driver was prefixing container's cgroup path with the path
  of PID 1 cgroup, resulting in inability to place PID 1 in a non-root cgroup.
- runc run/start may return "permission denied" error when starting a rootless
  container when the file to be executed does not have executable bit set for
  the user, not taking the CAP_DAC_OVERRIDE capability into account. This is
  a regression in runc 1.1.4, as well as in Go 1.20 and 1.20.1
- cgroup v1 drivers are now aware of misc controller.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-04-27 11:59:14 +02:00
Sebastiaan van Stijn
27c0fe3ebe
update runc binary to v1.1.7
release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.7
full diff: https://github.com/opencontainers/runc/compare/v1.1.6...v1.1.7

This is the seventh patch release in the 1.1.z release of runc, and is
the last planned release of the 1.1.z series. It contains a fix for
cgroup device rules with systemd when handling device rules for devices
that don't exist (though for devices whose drivers don't correctly
register themselves in the kernel -- such as the NVIDIA devices -- the
full fix only works with systemd v240+).

- When used with systemd v240+, systemd cgroup drivers no longer skip
  DeviceAllow rules if the device does not exist (a regression introduced
  in runc 1.1.3). This fix also reverts the workaround added in runc 1.1.5,
  removing an extra warning emitted by runc run/start.
- The source code now has a new file, runc.keyring, which contains the keys
  used to sign runc releases.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-04-27 11:52:10 +02:00