-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Release 1.3.0-rc.1 #4657
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release 1.3.0-rc.1 #4657
Conversation
c8d2cc0 to
7926aca
Compare
|
I've put a date a few days in the future, but we can change it to sooner. Maintainers can edit the PR branch, in case someone wants to merge and release before ;) |
|
All tests are green :) |
|
Ask a question, which branch will be based on when creating the branch Or this time release only includes PRs in the milestone 1.3.0-rc.1? |
So any commits before this commit ID in the main branch will be in the release. |
|
I'm reworking the changelog already, and those will be included. We're already a few days behind on the rc1 deadline, no need to delay it further because of the changelog. |
7926aca to
bc83294
Compare
Signed-off-by: Rodrigo Campos <[email protected]> (cyphar: improve changelog) Signed-off-by: Aleksa Sarai <[email protected]>
Signed-off-by: Rodrigo Campos <[email protected]> Signed-off-by: Aleksa Sarai <[email protected]>
bc83294 to
5d6e7e1
Compare
|
FWIW, I'm not sure if we want to branch |
I suggest to create branch |
|
Yeah, I forgot that I even wrote that this is what we should do in
😅 |
[1.3.0-rc.1] - 2025-03-04
libcontainer API
configs.CommandHookstruct has changed, Command is now a pointer.Also,
configs.NewCommandHooknow accepts a*Command. (libct: speedup process.Env handling #4325)Processstruct hasUserstring field replaced with numericUIDandGIDfields, andAdditionalGroupschanged its type from[]stringto[]int. Essentially, resolution of user and groupnames to IDs is no longer performed by libcontainer, so if a libcontainer
user previously relied on this feature, now they have to convert names to
IDs before calling libcontainer; it is recommended to use Go package
github.com/moby/sys/user for that. (Remove /etc/passwd and /etc/group parsing on runc run/exec #3999)
Fixed
runc exec -pno longer ignores specifiedioPriorityandschedulersettings. Similarly, libcontainer's
Container.StartandContainer.Runmethods no longer ignore
Process.IOPriorityandProcess.Schedulersettings. (Fix process/config properties merging #4585)
F_SEAL_FUTURE_WRITEwhen sealing the runc binary, as itturns out this had some unfortunate bugs in older kernel versions and was
never necessary in the first place. (exeseal: do not use F_SEAL_FUTURE_WRITE #4641, runc gets stuck #4640)
matches the behaviour of
nsenter(8). This is mainly useful for users thatcreate a container with a runc-managed user namespace but want the container
to join some externally-managed namespace as well. (nsenter: implement a two-stage join for setns #4492)
runcnow properly handles joining time namespaces (such as withrunc exec). Previously we would attempt to set the time offsets when joining,which would fail. (Can't exec into a container with private time namespace #4635, libct: don't send config to nsexec when joining an existing timens #4636)
EINTRretries correctly for socket-related directgolang.org/x/sys/unixsystem calls. (Retry direct unix package calls if observing EINTR #4637)close_range(2)errors more gracefully. (utils: Handle close_range more gracefully #4596)O_CLOEXECwithCloseExecFromfailed (libcontainer: Prevent startup hang when CloseExecFrom errors #4599).gracefully. (capabilities: be more graceful in resetting ambient #4597)
Changed
around our release schedules and better define our support policy for old
release branches. See
RELEASES.mdfor more details. (RELEASES: add formal release policy for runc #4557)strings.Cutwhere appropriate.(Use strings.Cut and strings.CutPrefix where possible #4470)
Added
runc exec. (runc exec: implement CPU affinity #4327)runc_nocriu. (Addrunc_nocriubuild tag to opt out of c/r #4546)pidfd-socket.([feature request] *: introduce pidfd-socket flag #4045)
skip-in-flightandlink-remapoptions for CRIU. (Add skip-in-flight and link-remap criu options for checkpoint and restore #4627)noprefix. (support cgroup v1 mounted with noprefix #4513)