summaryrefslogtreecommitdiff
path: root/hack/dockerfile
Commit message (Collapse)AuthorAgeFilesLines
* update containerd binary to v1.7.1Sebastiaan van Stijn2023-05-151-1/+1
| | | | | | full diff: https://github.com/containerd/containerd/compare/v1.7.0...v1.7.1 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update runc binary to v1.1.7Sebastiaan van Stijn2023-04-271-1/+1
| | | | | | | | | | | | | | | | | | | | | release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.7 full diff: https://github.com/opencontainers/runc/compare/v1.1.6...v1.1.7 This is the seventh patch release in the 1.1.z release of runc, and is the last planned release of the 1.1.z series. It contains a fix for cgroup device rules with systemd when handling device rules for devices that don't exist (though for devices whose drivers don't correctly register themselves in the kernel -- such as the NVIDIA devices -- the full fix only works with systemd v240+). - When used with systemd v240+, systemd cgroup drivers no longer skip DeviceAllow rules if the device does not exist (a regression introduced in runc 1.1.3). This fix also reverts the workaround added in runc 1.1.5, removing an extra warning emitted by runc run/start. - The source code now has a new file, runc.keyring, which contains the keys used to sign runc releases. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update runc binary to v1.1.6Sebastiaan van Stijn2023-04-131-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.6 full diff: https://github.com/opencontainers/runc/compare/v1.1.5...v1.1.6 This is the sixth patch release in the 1.1.z series of runc, which fixes a series of cgroup-related issues. Note that this release can no longer be built from sources using Go 1.16. Using a latest maintained Go 1.20.x or Go 1.19.x release is recommended. Go 1.17 can still be used. - systemd cgroup v1 and v2 drivers were deliberately ignoring UnitExist error from systemd while trying to create a systemd unit, which in some scenarios may result in a container not being added to the proper systemd unit and cgroup. - systemd cgroup v2 driver was incorrectly translating cpuset range from spec's resources.cpu.cpus to systemd unit property (AllowedCPUs) in case of more than 8 CPUs, resulting in the wrong AllowedCPUs setting. - systemd cgroup v1 driver was prefixing container's cgroup path with the path of PID 1 cgroup, resulting in inability to place PID 1 in a non-root cgroup. - runc run/start may return "permission denied" error when starting a rootless container when the file to be executed does not have executable bit set for the user, not taking the CAP_DAC_OVERRIDE capability into account. This is a regression in runc 1.1.4, as well as in Go 1.20 and 1.20.1 - cgroup v1 drivers are now aware of misc controller. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update runc binary to v1.1.5Sebastiaan van Stijn2023-03-301-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.5 diff: https://github.com/opencontainers/runc/compare/v1.1.4...v1.1.5 This is the fifth patch release in the 1.1.z series of runc, which fixes three CVEs found in runc. * CVE-2023-25809 is a vulnerability involving rootless containers where (under specific configurations), the container would have write access to the /sys/fs/cgroup/user.slice/... cgroup hierarchy. No other hierarchies on the host were affected. This vulnerability was discovered by Akihiro Suda. <https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc> * CVE-2023-27561 was a regression which effectively re-introduced CVE-2019-19921. This bug was present from v1.0.0-rc95 to v1.1.4. This regression was discovered by @Beuc. <https://github.com/advisories/GHSA-vpvm-3wq2-2wvm> * CVE-2023-28642 is a variant of CVE-2023-27561 and was fixed by the same patch. This variant of the above vulnerability was reported by Lei Wang. <https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c> In addition, the following other fixes are included in this release: * Fix the inability to use `/dev/null` when inside a container. * Fix changing the ownership of host's `/dev/null` caused by fd redirection (a regression in 1.1.1). * Fix rare runc exec/enter unshare error on older kernels, including CentOS < 7.7. * nsexec: Check for errors in `write_log()`. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.7.0Sebastiaan van Stijn2023-03-121-1/+1
| | | | | | | - release notes: https://github.com/containerd/containerd/releases/tag/v1.7.0 - full diff: https://github.com/containerd/containerd/compare/v1.7.0-beta.4...v1.7.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.7.0-beta.4Sebastiaan van Stijn2023-02-171-1/+1
| | | | | | | release notes: https://github.com/containerd/containerd/releases/tag/v1.7.0-beta.4 full diff: https://github.com/containerd/containerd/compare/v1.7.0-beta.3...v1.7.0-beta.4 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.7.0-beta.3Sebastiaan van Stijn2023-01-301-1/+1
| | | | | | full diff: https://github.com/containerd/containerd/compare/v1.7.0-beta.2...v1.7.0-beta.3 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.7.0-beta.1Sebastiaan van Stijn2022-12-151-1/+1
| | | | | | | | release notes: https://github.com/containerd/containerd/releases/tag/v1.7.0-beta.1 full diff: https://github.com/containerd/containerd/compare/v1.7.0-beta.0...v1.7.0-beta.1 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.7.0-beta.0Sebastiaan van Stijn2022-11-261-1/+1
| | | | | | release notes: https://github.com/containerd/containerd/releases/tag/v1.7.0-beta.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Merge pull request #44467 from AkihiroSuda/rootlesskit-1.1.0Sebastiaan van Stijn2022-11-161-3/+3
|\ | | | | update RootlessKit to v1.1.0
| * rootlesskit.installer: s/vendor.conf/vendor.mod/Akihiro Suda2022-11-161-1/+1
| | | | | | | | Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
| * update RootlessKit to v1.1.0Akihiro Suda2022-11-151-2/+2
| | | | | | | | Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
* | update containerd binary to v1.6.10Jintao Zhang2022-11-151-1/+1
|/ | | | Signed-off-by: Jintao Zhang <zhangjintao9020@gmail.com>
* update containerd binary to v1.6.9Sebastiaan van Stijn2022-10-241-1/+1
| | | | | | | | release notes: https://github.com/containerd/containerd/releases/tag/v1.6.9 full diff: containerd/containerd@v1.6.8...v1.6.9 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Merge pull request #44040 from thaJeztah/containerd_binary_1.6.8Sebastiaan van Stijn2022-08-261-1/+1
|\ | | | | update containerd binary to v1.6.8
| * update containerd binary to v1.6.8Sebastiaan van Stijn2022-08-261-1/+1
| | | | | | | | | | | | | | | | release notes: https://github.com/containerd/containerd/releases/tag/v1.6.8 full diff: https://github.com/containerd/containerd/compare/v1.6.7...v1.6.8 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* | update runc to v1.1.4Akihiro Suda2022-08-261-1/+1
|/ | | | | | | | | release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.4 full diff: https://github.com/opencontainers/runc/compare/v1.1.3...v1.1.4 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Merge pull request #43708 from thaJeztah/update_runc_binarySebastiaan van Stijn2022-08-081-1/+1
|\ | | | | update runc binary to v1.1.3
| * update runc binary to v1.1.3Sebastiaan van Stijn2022-06-091-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | full diff: https://github.com/opencontainers/runc/compare/v1.1.2...v1.1.3 This is the third release of the 1.1.z series of runc, and contains various minor improvements and bugfixes. - Our seccomp `-ENOSYS` stub now correctly handles multiplexed syscalls on s390 and s390x. This solves the issue where syscalls the host kernel did not support would return `-EPERM` despite the existence of the `-ENOSYS` stub code (this was due to how s390x does syscall multiplexing). - Retry on dbus disconnect logic in libcontainer/cgroups/systemd now works as intended; this fix does not affect runc binary itself but is important for libcontainer users such as Kubernetes. - Inability to compile with recent clang due to an issue with duplicate constants in libseccomp-golang. - When using systemd cgroup driver, skip adding device paths that don't exist, to stop systemd from emitting warnings about those paths. - Socket activation was failing when more than 3 sockets were used. - Various CI fixes. - Allow to bind mount `/proc/sys/kernel/ns_last_pid` to inside container. - runc static binaries are now linked against libseccomp v2.5.4. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* | update containerd binary to v1.6.7Sebastiaan van Stijn2022-08-051-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | full diff: https://github.com/containerd/containerd/v1.6.6...v1.6.7 Welcome to the v1.6.7 release of containerd! The seventh patch release for containerd 1.6 contains various fixes, includes a new version of runc and adds support for ppc64le and riscv64 (requires unreleased runc 1.2) builds. Notable Updates - Update runc to v1.1.3 - Seccomp: Allow clock_settime64 with CAP_SYS_TIME - Fix WWW-Authenticate parsing - Support RISC-V 64 and ppc64le builds - Windows: Update hcsshim to v0.9.4 to fix regression with HostProcess stats - Windows: Fix shim logs going to panic.log file - Allow ptrace(2) by default for kernels >= 4.8 See the changelog for complete list of changes Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* | Dockerfile: add crun to dev imageCory Snider2022-06-101-0/+7
|/ | | | Signed-off-by: Cory Snider <csnider@mirantis.com>
* Merge pull request #43695 from AkihiroSuda/remove-io.containerd.runtime.v1.linuxSebastiaan van Stijn2022-06-071-1/+0
|\ | | | | daemon: remove support for deprecated `io.containerd.runtime.v1.linux`
| * hack: stop installing containerd-shim (io.containerd.runtime.v1.linux)Akihiro Suda2022-06-051-1/+0
| | | | | | | | Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
* | update containerd binary to v1.6.6Sebastiaan van Stijn2022-06-061-1/+1
|/ | | | | | | | | | | | | | | Welcome to the v1.6.6 release of containerd! The sixth patch release for containerd 1.6 includes a fix for [CVE-2022-31030](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31030). Notable Updates - Fix ExecSync handler to cap console output size ([GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf)) full diff: https://github.com/containerd/containerd/compare/v1.6.5...v1.6.6 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.6.5Sebastiaan van Stijn2022-06-041-1/+1
| | | | | | | | | | | | | | Welcome to the v1.6.5 release of containerd! The fifth patch release for containerd 1.6 includes a few fixes and updated version of runc. Notable Updates - Fix for older CNI plugins not reporting version - Fix mount path handling for CRI plugin on Windows Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update runc binary to v1.1.2Sebastiaan van Stijn2022-05-121-1/+1
| | | | | | | | | | | | | | | | | This is the second patch release of the runc 1.1 release branch. It fixes CVE-2022-29162, a minor security issue (which appears to not be exploitable) related to process capabilities. This is a similar bug to the ones found and fixed in Docker and containerd recently (CVE-2022-24769). - A bug was found in runc where runc exec --cap executed processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment. For more information, see GHSA-f3fp-gc8g-vw66 and CVE-2022-29162. - runc spec no longer sets any inheritable capabilities in the created example OCI spec (config.json) file. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.6.4Sebastiaan van Stijn2022-05-041-1/+1
| | | | | | | | | | | Notable Updates - Update go-cni to fix teardown regression - Fix broken SELinux relabeling for Kubernetes volume mounts full diff: https://github.com/containerd/containerd/compare/v1.6.3...v1.6.4 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.6.3Sebastiaan van Stijn2022-04-271-1/+1
| | | | | | | | | | | | | | | | | | | | | Release notes: Welcome to the v1.6.3 release of containerd! The third patch release for containerd 1.6 includes various fixes and updates. Notable Updates - Fix panic when configuring tracing plugin - Improve image pull performance in CRI plugin - Check for duplicate nspath - Fix deadlock in cgroup metrics collector - Mount devmapper xfs file system with "nouuid" option - Make the temp mount as ready only in container WithVolumes - Fix deadlock from leaving transaction open in native snapshotter - Monitor OOMKill events to prevent missing container events Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update runc binary to v1.1.1Akihiro Suda2022-04-011-1/+1
| | | | Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
* update RootlessKit to v1.0.0Akihiro Suda2022-03-261-2/+2
| | | | | | | Only minor changes since v0.14.6, such as upgrading Go to 1.18: https://github.com/rootless-containers/rootlesskit/compare/v0.14.6...v1.0.0 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
* update containerd binary to v1.6.2Sebastiaan van Stijn2022-03-241-1/+1
| | | | | | | | | | | The second patch release for containerd 1.6 includes a fix for [CVE-2022-24769](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c). Notable Updates - **Fix the inheritable capability defaults** ([GHSA-c9cp-9c75-9v8c](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c)) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* version: add RootlessKit, slirp4netns, and VPNKit versionAkihiro Suda2022-03-151-1/+3
| | | | | | | | | | | | | | | | | | | | ```console $ docker --context=rootless version ... Server: ... rootlesskit: Version: 0.14.2 ApiVersion: 1.1.1 NetworkDriver: slirp4netns PortDriver: builtin StateDir: /tmp/rootlesskit245426514 slirp4netns: Version: 1.1.9 GitCommit: 4e37ea557562e0d7a64dc636eff156f64927335e ``` Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
* update containerd binary to v1.6.1Sebastiaan van Stijn2022-03-111-1/+1
| | | | Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.5.10Sebastiaan van Stijn2022-03-041-1/+1
| | | | | | | | | | | | | | | | | | | Welcome to the v1.5.10 release of containerd! The tenth patch release for containerd 1.5 includes a fix for [CVE-2022-23648][1] and other issues. Notable Updates - Use fs.RootPath when mounting volumes (GHSA-crp2-qrr5-8pq7) - Return init pid when clean dead shim in runc.v1/v2 shims - Handle sigint/sigterm in shimv2 - Use readonly mount to read user/group info [1]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23648 [2]: https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update runc binary to v1.1.0Akihiro Suda2022-02-061-1/+1
| | | | Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
* vendor: replace vndr with `go mod vendor`Ilya Dmitrichenko2022-01-182-2/+2
| | | | | | | | | | | - use `vendor.mod` instead of `go.mod` to avoid issues to do with use of CalVer, not SemVer - ensure most of the dependency versions do not change - only zookeeper client has to change (via docker/libkv#218) as previously used version is no longer maintained and has missing dependencies Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update containerd binary to v1.5.9Sebastiaan van Stijn2022-01-121-1/+1
| | | | Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update runc binary to v1.0.3Akihiro Suda2021-12-061-1/+1
| | | | Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
* update containerd binary to v1.5.8Sebastiaan van Stijn2021-11-171-1/+1
| | | | | | | | | | | | | | | | | | | The eighth patch release for containerd 1.5 contains a mitigation for CVE-2021-41190 as well as several fixes and updates. Notable Updates * Handle ambiguous OCI manifest parsing * Filter selinux xattr for image volumes in CRI plugin * Use DeactiveLayer to unlock layers that cannot be renamed in Windows snapshotter * Fix pull failure on unexpected EOF * Close task IO before waiting on delete * Log a warning for ignored invalid image labels rather than erroring * Update pull to handle of non-https urls in descriptors See the changelog for complete list of changes Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* bump up rootlesskit from v0.14.4 to v0.14.6Akihiro Suda2021-11-081-1/+1
| | | | | | | Minor fixes and refactoring. https://github.com/rootless-containers/rootlesskit/compare/v0.14.4...v0.14.6 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
* Update containerd binary to v1.5.7Sebastiaan van Stijn2021-10-151-1/+1
| | | | | | | | | | | The seventh patch release for containerd 1.5 is a security release to fix CVE-2021-41103. Notable Updates: - Fix insufficiently restricted permissions on container root and plugin directories GHSA-c2h3-6mxw-7mvq Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Update containerd binary to v1.5.6Sebastiaan van Stijn2021-10-151-1/+1
| | | | | | | | | | | - Install apparmor parser for arm64 and update seccomp to 2.5.1 - Update runc binary to 1.0.2 - Update hcsshim to v0.8.21 to fix layer issue on Windows Server 2019 - Add support for 'clone3' syscall to fix issue with certain images when seccomp is enabled - Add image config labels in CRI container creation - Fix panic in metadata content writer on copy error Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Dockerfile: move installers into DockerfileSebastiaan van Stijn2021-09-245-43/+0
| | | | | | | This moves installers that are only used during CI into the Dockerfile. Some installers are still used in the release-pipeline, so keeping thos for now. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Dockerfile: update gotestsum to v1.7.0Sebastiaan van Stijn2021-09-021-1/+1
| | | | Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Dockerfile: use "go install" to install utilitiesSebastiaan van Stijn2021-09-025-14/+7
| | | | Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Dockerfile: use version for some utilities instead of commit-shaSebastiaan van Stijn2021-09-028-31/+44
| | | | | | | | | | | | | | | | The golangci-lint, gotestsum, shfmt, and vndr utilities should generally be ok to be pinned by version instead of a specific sha. Also rename the corresponding env-vars / build-args accordingly: - GOLANGCI_LINT_COMMIT -> GOLANGCI_LINT_VERSION - GOTESTSUM_COMMIT -> GOTESTSUM_VERSION - SHFMT_COMMIT -> SHFMT_VERSION - VNDR_COMMIT -> VNDR_VERSION - CONTAINERD_COMMIT -> CONTAINERD_VERSION - RUNC_COMMIT -> RUNC_VERSION - ROOTLESS_COMMIT -> ROOTLESS_VERSION Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Dockerfile: remove GOPROXY override (was for go < 1.14)Sebastiaan van Stijn2021-09-021-5/+0
| | | | Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* remove deprecated "nokmem" build-tag for runcSebastiaan van Stijn2021-09-021-7/+2
| | | | | | | | | This build-tag was removed in https://github.com/opencontainers/runc/commit/52390d68040637dfc77f9fda6bbe70952423d380, which is part of runc v1.0.0-rc94 and up, so no longer relevant. the kmem options are now always disabled in runc. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* update runc binary to v1.0.2Akihiro Suda2021-08-231-1/+1
| | | | Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
* bump up rootlesskit to v0.14.4Akihiro Suda2021-08-041-2/+2
| | | | | | | | | | | Fixes `panic: tap2vif: read: read /dev/net/tun: not pollable` on early start up of RootlessKit with VPNKit. Changes: - https://github.com/rootless-containers/rootlesskit/releases/tag/v0.14.4 - https://github.com/rootless-containers/rootlesskit/releases/tag/v0.14.3 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>