@@ -6,6 +6,10 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
6
6
7
7
## [ Unreleased]
8
8
9
+ ## [ 1.3.0-rc.1] - 2025-03-04
10
+
11
+ > No tengo miedo al invierno, con tu recuerdo lleno de sol.
12
+
9
13
### libcontainer API
10
14
* ` configs.CommandHook ` struct has changed, Command is now a pointer.
11
15
Also, ` configs.NewCommandHook ` now accepts a ` *Command ` . (#4325 )
@@ -16,15 +20,48 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
16
20
user previously relied on this feature, now they have to convert names to
17
21
IDs before calling libcontainer; it is recommended to use Go package
18
22
github.com/moby/sys/user for that. (#3999 )
23
+ * Move libcontainer/cgroups to a separate repository. (#4618 )
19
24
20
25
### Fixed
21
26
* ` runc exec -p ` no longer ignores specified ` ioPriority ` and ` scheduler `
22
27
settings. Similarly, libcontainer's ` Container.Start ` and ` Container.Run `
23
28
methods no longer ignore ` Process.IOPriority ` and ` Process.Scheduler `
24
29
settings. (#4585 )
30
+ * We no longer use ` F_SEAL_FUTURE_WRITE ` when sealing the runc binary, as it
31
+ turns out this had some unfortunate bugs in older kernel versions and was
32
+ never necessary in the first place. (#4641 , #4640 )
33
+ * runc now uses a more flexible method of joining namespaces, which better
34
+ matches the behaviour of ` nsenter(8) ` . This is mainly useful for users that
35
+ create a container with a runc-managed user namespace but want the container
36
+ to join some externally-managed namespace as well. (#4492 )
37
+ * ` runc ` now properly handles joining time namespaces (such as with `runc
38
+ exec`). Previously we would attempt to set the time offsets when joining,
39
+ which would fail. (#4635 , #4636 )
40
+ * Handle ` EINTR ` retries correctly for socket-related direct
41
+ ` golang.org/x/sys/unix ` system calls. (#4637 )
42
+ * Handle ` close_range(2) ` errors more gracefully. (#4596 )
43
+ * Fix a stall issue that would happen if setting ` O_CLOEXEC ` with
44
+ ` CloseExecFrom ` failed (#4599 ).
45
+ * Handle errors on older kernels when resetting ambient capabilities more
46
+ gracefully. (#4597 )
47
+
48
+ ### Changed
49
+ * runc now has an official release policy to help provide more consistency
50
+ around our release schedules and better define our support policy for old
51
+ release branches. See ` RELEASES.md ` for more details. (#4557 )
52
+ * Improved performance by switching to ` strings.Cut ` where appropriate.
53
+ (#4470 )
54
+ * The minimum Go version of runc is now Go 1.23. (#4598 )
55
+ * Updated builds to libseccomp v2.5.6. (#4625 )
25
56
26
57
### Added
58
+ * runc has been updated to support OCI runtime-spec 1.2.1. (#4653 )
27
59
* CPU affinity support for ` runc exec ` . (#4327 )
60
+ * CRIU support can be disabled using the build tag ` runc_nocriu ` . (#4546 )
61
+ * Support to get the pidfd of the container via CLI flag ` pidfd-socket ` .
62
+ (#4045 )
63
+ * Support ` skip-in-flight ` and ` link-remap ` options for CRIU. (#4627 )
64
+ * Support cgroup v1 mounted with ` noprefix ` . (#4513 )
28
65
29
66
## [ 1.2.5] - 2025-02-13
30
67
@@ -74,7 +111,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
74
111
would result in spurious EEXIST errors. In particular, this regression
75
112
caused issues with BuildKit. (#4543 , #4550 )
76
113
* Fixed a regression in eBPF support for pre-5.6 kernels after upgrading
77
- Cilium's eBPF library version to 0.16 in runc. (#3008 , #4551 )
114
+ Cilium's eBPF library version to 0.16 in runc. (#3008 , #4548 , # 4551 )
78
115
79
116
## [ 1.2.2] - 2024-11-15
80
117
@@ -978,7 +1015,7 @@ implementation (libcontainer) is *not* covered by this policy.
978
1015
cgroups at all during ` runc update ` ). (#2994 )
979
1016
980
1017
<!-- minor releases -->
981
- [ Unreleased ] : https://github.com/opencontainers/runc/compare/v1.2.0 ...HEAD
1018
+ [ Unreleased ] : https://github.com/opencontainers/runc/compare/v1.3.0-rc.1 ...HEAD
982
1019
[ 1.2.0 ] : https://github.com/opencontainers/runc/compare/v1.2.0-rc.1...v1.2.0
983
1020
[ 1.1.0 ] : https://github.com/opencontainers/runc/compare/v1.1.0-rc.1...v1.1.0
984
1021
[ 1.0.0 ] : https://github.com/opencontainers/runc/releases/tag/v1.0.0
@@ -1018,3 +1055,6 @@ implementation (libcontainer) is *not* covered by this policy.
1018
1055
[ 1.2.0-rc.3 ] : https://github.com/opencontainers/runc/compare/v1.2.0-rc.2...v1.2.0-rc.3
1019
1056
[ 1.2.0-rc.2 ] : https://github.com/opencontainers/runc/compare/v1.2.0-rc.1...v1.2.0-rc.2
1020
1057
[ 1.2.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.1.0...v1.2.0-rc.1
1058
+
1059
+ <!-- 1.3.z patch releases -->
1060
+ [ 1.3.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.2.0...v1.3.0-rc.1
0 commit comments