Conversation
c8d2cc0 to
7926aca
Compare
|
I've put a date a few days in the future, but we can change it to sooner. Maintainers can edit the PR branch, in case someone wants to merge and release before ;) |
|
All tests are green :) |
|
Ask a question, which branch will be based on when creating the branch Or this time release only includes PRs in the milestone 1.3.0-rc.1? |
So any commits before this commit ID in the main branch will be in the release. |
|
I'm reworking the changelog already, and those will be included. We're already a few days behind on the rc1 deadline, no need to delay it further because of the changelog. |
7926aca to
bc83294
Compare
Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com> (cyphar: improve changelog) Signed-off-by: Aleksa Sarai <cyphar@cyphar.com>
Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com> Signed-off-by: Aleksa Sarai <cyphar@cyphar.com>
bc83294 to
5d6e7e1
Compare
|
FWIW, I'm not sure if we want to branch |
I suggest to create branch |
|
Yeah, I forgot that I even wrote that this is what we should do in
😅 |
[1.3.0-rc.1] - 2025-03-04
libcontainer API
configs.CommandHookstruct has changed, Command is now a pointer.Also,
configs.NewCommandHooknow accepts a*Command. (libct: speedup process.Env handling #4325)Processstruct hasUserstring field replaced with numericUIDandGIDfields, andAdditionalGroupschanged its type from[]stringto[]int. Essentially, resolution of user and groupnames to IDs is no longer performed by libcontainer, so if a libcontainer
user previously relied on this feature, now they have to convert names to
IDs before calling libcontainer; it is recommended to use Go package
github.com/moby/sys/user for that. (Remove /etc/passwd and /etc/group parsing on runc run/exec #3999)
Fixed
runc exec -pno longer ignores specifiedioPriorityandschedulersettings. Similarly, libcontainer's
Container.StartandContainer.Runmethods no longer ignore
Process.IOPriorityandProcess.Schedulersettings. (Fix process/config properties merging #4585)
F_SEAL_FUTURE_WRITEwhen sealing the runc binary, as itturns out this had some unfortunate bugs in older kernel versions and was
never necessary in the first place. (exeseal: do not use F_SEAL_FUTURE_WRITE #4641, runc gets stuck #4640)
matches the behaviour of
nsenter(8). This is mainly useful for users thatcreate a container with a runc-managed user namespace but want the container
to join some externally-managed namespace as well. (nsenter: implement a two-stage join for setns #4492)
runcnow properly handles joining time namespaces (such as withrunc exec). Previously we would attempt to set the time offsets when joining,which would fail. (Can't exec into a container with private time namespace #4635, libct: don't send config to nsexec when joining an existing timens #4636)
EINTRretries correctly for socket-related directgolang.org/x/sys/unixsystem calls. (Retry direct unix package calls if observing EINTR #4637)close_range(2)errors more gracefully. (utils: Handle close_range more gracefully #4596)O_CLOEXECwithCloseExecFromfailed (libcontainer: Prevent startup hang when CloseExecFrom errors #4599).gracefully. (capabilities: be more graceful in resetting ambient #4597)
Changed
around our release schedules and better define our support policy for old
release branches. See
RELEASES.mdfor more details. (RELEASES: add formal release policy for runc #4557)strings.Cutwhere appropriate.(Use strings.Cut and strings.CutPrefix where possible #4470)
Added
runc exec. (runc exec: implement CPU affinity #4327)runc_nocriu. (Addrunc_nocriubuild tag to opt out of c/r #4546)pidfd-socket.([feature request] *: introduce pidfd-socket flag #4045)
skip-in-flightandlink-remapoptions for CRIU. (Add skip-in-flight and link-remap criu options for checkpoint and restore #4627)noprefix. (support cgroup v1 mounted with noprefix #4513)