-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release 1.3.0-rc.1 #4657
Release 1.3.0-rc.1 #4657
Conversation
c8d2cc0
to
7926aca
Compare
I've put a date a few days in the future, but we can change it to sooner. Maintainers can edit the PR branch, in case someone wants to merge and release before ;) |
All tests are green :) |
Ask a question, which branch will be based on when creating the branch Or this time release only includes PRs in the milestone 1.3.0-rc.1? |
So any commits before this commit ID in the main branch will be in the release. |
I'm reworking the changelog already, and those will be included. We're already a few days behind on the rc1 deadline, no need to delay it further because of the changelog. |
7926aca
to
bc83294
Compare
Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com> (cyphar: improve changelog) Signed-off-by: Aleksa Sarai <cyphar@cyphar.com>
Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com> Signed-off-by: Aleksa Sarai <cyphar@cyphar.com>
bc83294
to
5d6e7e1
Compare
FWIW, I'm not sure if we want to branch |
I suggest to create branch |
Yeah, I forgot that I even wrote that this is what we should do in
😅 |
[1.3.0-rc.1] - 2025-03-04
libcontainer API
configs.CommandHook
struct has changed, Command is now a pointer.Also,
configs.NewCommandHook
now accepts a*Command
. (libct: speedup process.Env handling #4325)Process
struct hasUser
string field replaced with numericUID
andGID
fields, andAdditionalGroups
changed its type from[]string
to[]int
. Essentially, resolution of user and groupnames to IDs is no longer performed by libcontainer, so if a libcontainer
user previously relied on this feature, now they have to convert names to
IDs before calling libcontainer; it is recommended to use Go package
github.com/moby/sys/user for that. (Remove /etc/passwd and /etc/group parsing on runc run/exec #3999)
Fixed
runc exec -p
no longer ignores specifiedioPriority
andscheduler
settings. Similarly, libcontainer's
Container.Start
andContainer.Run
methods no longer ignore
Process.IOPriority
andProcess.Scheduler
settings. (Fix process/config properties merging #4585)
F_SEAL_FUTURE_WRITE
when sealing the runc binary, as itturns out this had some unfortunate bugs in older kernel versions and was
never necessary in the first place. (exeseal: do not use F_SEAL_FUTURE_WRITE #4641, runc gets stuck #4640)
matches the behaviour of
nsenter(8)
. This is mainly useful for users thatcreate a container with a runc-managed user namespace but want the container
to join some externally-managed namespace as well. (nsenter: implement a two-stage join for setns #4492)
runc
now properly handles joining time namespaces (such as withrunc exec
). Previously we would attempt to set the time offsets when joining,which would fail. (Can't exec into a container with private time namespace #4635, libct: don't send config to nsexec when joining an existing timens #4636)
EINTR
retries correctly for socket-related directgolang.org/x/sys/unix
system calls. (Retry direct unix package calls if observing EINTR #4637)close_range(2)
errors more gracefully. (utils: Handle close_range more gracefully #4596)O_CLOEXEC
withCloseExecFrom
failed (libcontainer: Prevent startup hang when CloseExecFrom errors #4599).gracefully. (capabilities: be more graceful in resetting ambient #4597)
Changed
around our release schedules and better define our support policy for old
release branches. See
RELEASES.md
for more details. (RELEASES: add formal release policy for runc #4557)strings.Cut
where appropriate.(Use strings.Cut and strings.CutPrefix where possible #4470)
Added
runc exec
. (runc exec: implement CPU affinity #4327)runc_nocriu
. (Addrunc_nocriu
build tag to opt out of c/r #4546)pidfd-socket
.([feature request] *: introduce pidfd-socket flag #4045)
skip-in-flight
andlink-remap
options for CRIU. (Add skip-in-flight and link-remap criu options for checkpoint and restore #4627)noprefix
. (support cgroup v1 mounted with noprefix #4513)