Skip to content

Commit 2f93d66

Browse files
committed
merge opencontainers#4657 into opencontainers/runc:main
Rodrigo Campos (2): VERSION: back to development VERSION: release v1.3.0-rc.1 LGTMs: AkihiroSuda lifubang cyphar
2 parents 0ebf331 + 5d6e7e1 commit 2f93d66

File tree

2 files changed

+43
-3
lines changed

2 files changed

+43
-3
lines changed

CHANGELOG.md

+42-2
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,10 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
66

77
## [Unreleased]
88

9+
## [1.3.0-rc.1] - 2025-03-04
10+
11+
> No tengo miedo al invierno, con tu recuerdo lleno de sol.
12+
913
### libcontainer API
1014
* `configs.CommandHook` struct has changed, Command is now a pointer.
1115
Also, `configs.NewCommandHook` now accepts a `*Command`. (#4325)
@@ -16,15 +20,48 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
1620
user previously relied on this feature, now they have to convert names to
1721
IDs before calling libcontainer; it is recommended to use Go package
1822
github.com/moby/sys/user for that. (#3999)
23+
* Move libcontainer/cgroups to a separate repository. (#4618)
1924

2025
### Fixed
2126
* `runc exec -p` no longer ignores specified `ioPriority` and `scheduler`
2227
settings. Similarly, libcontainer's `Container.Start` and `Container.Run`
2328
methods no longer ignore `Process.IOPriority` and `Process.Scheduler`
2429
settings. (#4585)
30+
* We no longer use `F_SEAL_FUTURE_WRITE` when sealing the runc binary, as it
31+
turns out this had some unfortunate bugs in older kernel versions and was
32+
never necessary in the first place. (#4641, #4640)
33+
* runc now uses a more flexible method of joining namespaces, which better
34+
matches the behaviour of `nsenter(8)`. This is mainly useful for users that
35+
create a container with a runc-managed user namespace but want the container
36+
to join some externally-managed namespace as well. (#4492)
37+
* `runc` now properly handles joining time namespaces (such as with `runc
38+
exec`). Previously we would attempt to set the time offsets when joining,
39+
which would fail. (#4635, #4636)
40+
* Handle `EINTR` retries correctly for socket-related direct
41+
`golang.org/x/sys/unix` system calls. (#4637)
42+
* Handle `close_range(2)` errors more gracefully. (#4596)
43+
* Fix a stall issue that would happen if setting `O_CLOEXEC` with
44+
`CloseExecFrom` failed (#4599).
45+
* Handle errors on older kernels when resetting ambient capabilities more
46+
gracefully. (#4597)
47+
48+
### Changed
49+
* runc now has an official release policy to help provide more consistency
50+
around our release schedules and better define our support policy for old
51+
release branches. See `RELEASES.md` for more details. (#4557)
52+
* Improved performance by switching to `strings.Cut` where appropriate.
53+
(#4470)
54+
* The minimum Go version of runc is now Go 1.23. (#4598)
55+
* Updated builds to libseccomp v2.5.6. (#4625)
2556

2657
### Added
58+
* runc has been updated to support OCI runtime-spec 1.2.1. (#4653)
2759
* CPU affinity support for `runc exec`. (#4327)
60+
* CRIU support can be disabled using the build tag `runc_nocriu`. (#4546)
61+
* Support to get the pidfd of the container via CLI flag `pidfd-socket`.
62+
(#4045)
63+
* Support `skip-in-flight` and `link-remap` options for CRIU. (#4627)
64+
* Support cgroup v1 mounted with `noprefix`. (#4513)
2865

2966
## [1.2.5] - 2025-02-13
3067

@@ -74,7 +111,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
74111
would result in spurious EEXIST errors. In particular, this regression
75112
caused issues with BuildKit. (#4543, #4550)
76113
* Fixed a regression in eBPF support for pre-5.6 kernels after upgrading
77-
Cilium's eBPF library version to 0.16 in runc. (#3008, #4551)
114+
Cilium's eBPF library version to 0.16 in runc. (#3008, #4548, #4551)
78115

79116
## [1.2.2] - 2024-11-15
80117

@@ -978,7 +1015,7 @@ implementation (libcontainer) is *not* covered by this policy.
9781015
cgroups at all during `runc update`). (#2994)
9791016

9801017
<!-- minor releases -->
981-
[Unreleased]: https://github.com/opencontainers/runc/compare/v1.2.0...HEAD
1018+
[Unreleased]: https://github.com/opencontainers/runc/compare/v1.3.0-rc.1...HEAD
9821019
[1.2.0]: https://github.com/opencontainers/runc/compare/v1.2.0-rc.1...v1.2.0
9831020
[1.1.0]: https://github.com/opencontainers/runc/compare/v1.1.0-rc.1...v1.1.0
9841021
[1.0.0]: https://github.com/opencontainers/runc/releases/tag/v1.0.0
@@ -1018,3 +1055,6 @@ implementation (libcontainer) is *not* covered by this policy.
10181055
[1.2.0-rc.3]: https://github.com/opencontainers/runc/compare/v1.2.0-rc.2...v1.2.0-rc.3
10191056
[1.2.0-rc.2]: https://github.com/opencontainers/runc/compare/v1.2.0-rc.1...v1.2.0-rc.2
10201057
[1.2.0-rc.1]: https://github.com/opencontainers/runc/compare/v1.1.0...v1.2.0-rc.1
1058+
1059+
<!-- 1.3.z patch releases -->
1060+
[1.3.0-rc.1]: https://github.com/opencontainers/runc/compare/v1.2.0...v1.3.0-rc.1

VERSION

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.2.0+dev
1+
1.3.0-rc.1+dev

0 commit comments

Comments
 (0)