-
Notifications
You must be signed in to change notification settings - Fork 82
🌱 Update containerd/containerd to 2.1.4 #1504
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
syself-bot
wants to merge
1
commit into
main
Choose a base branch
from
renovate/containerd-containerd-2.x
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
666d8dc
to
bf8daf5
Compare
bf8daf5
to
81e72a9
Compare
1c450c9
to
4b46ace
Compare
4b46ace
to
05c6be3
Compare
05c6be3
to
197249a
Compare
7f558d5
to
c4fb845
Compare
c4fb845
to
5008fbe
Compare
5008fbe
to
e72c524
Compare
e72c524
to
58d721e
Compare
58d721e
to
dd13a22
Compare
dd13a22
to
98b637d
Compare
98b637d
to
4c72398
Compare
| datasource | package | from | to | | ----------- | --------------------- | ------ | ----- | | github-tags | containerd/containerd | 1.7.26 | 2.1.4 |
4c72398
to
de68979
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
area/templates
Changes made in the templates directory
size/XS
Denotes a PR that changes 0-20 lines, ignoring generated files.
type/major
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.7.26
->2.1.4
Release Notes
containerd/containerd (containerd/containerd)
v2.1.4
: containerd 2.1.4Compare Source
Welcome to the v2.1.4 release of containerd!
The fourth patch release for containerd 2.1 contains various fixes and updates.
Highlights
Container Runtime Interface (CRI)
Go client
Image Distribution
Image Storage
Runtime
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
26 commits
112e41363
Add release notes for v2.1.4add2dcf86
Ensure fetcher always closes body and properly calls release34a1cb1dd
fix(dockerFetcher): resolve deadlock issue in dockerFetcher open82c4d6875
ci: bump Go 1.23.11, 1.24.56cc2a8d77
Fix intermittent test failures on Windows CIs6adc69312
Remove WS2025 from CIs due to regression8d194c19f
erofs-snapshotter: make IMMUTABLE_FL optional2df7175d7
client/New: Don't unlazy the gRPC connection implicitly4902adb92
update go-md2man binary to v2.0.702298e1a0
cri:fix containerd panic when can't find sandbox extension583133e71
erofs-differ: fix filesystem UUID for tar-converted layers57db13d50
Amend runtime handler test for stable orderd822c9048
CRI: Stable sort for RuntimeHandlersa2fd70639
Test showing RuntimeHandlers in Status() are unorderedb74268f86
bugfix:close container io when runtime create failedDependency Changes
This release has no dependency changes
Previous release can be found at v2.1.3
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.1.3
: containerd 2.1.3Compare Source
Welcome to the v2.1.3 release of containerd!
The third patch release for containerd 2.1 contains various fixes and updates
to address pull issues with some registries.
Highlights
Image Distribution
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
15 commits
627729341
Prepare release notes for v2.1.37636bd5eb
fix when multipart fetching and the server does not return content length3c5ede878
Update transfer supported platforms logicfb752bc8e
fix import for local transfer servicef6d926314
Register remote errors for clients to access registry errors7c1813345
Decode grpc errors in the transfer client proxybabacebad
Fix fetch always adding range to requestsf30be44ad
Update fetcher errors to include full registry errorDependency Changes
This release has no dependency changes
Previous release can be found at v2.1.2
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.1.2
: containerd 2.1.2Compare Source
Welcome to the v2.1.2 release of containerd!
The second patch release for containerd 2.1 contains various fixes and updates.
Highlights
Go client
Image Distribution
Runtime
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
28 commits
63b9eae62
Prepare release notes for v2.1.2cff1feb28
*: properly shutdown non-groupable shims to prevent resource leaks2ce169aae
ci: bump golang [1.23.10,1.24.4] in build and release70bcb9b55
Enable CIs to run on WS2022 and WS202540575a15f
cri:use debug level when receive exec process exited eventsc71f77170
build(deps): bump google.golang.org/grpc from 1.72.0 to 1.72.24bcea74de
Update differ selection in transfer service to prefer default0c3cd8a99
Add debug log when transfer returns not implemented820e56765
Add more error details when unpack fails to extract9b6c1949a
Fetch image with default platform only in TestExportAndImportMultiLayer480126f50
erofs-snapshotter: fix to work with wrapped errorsd82921ff5
Enable DuplicationSuppressor in transfer service0bb25c3d6
ci: bump golang [1.23.9, 1.24.3] in build and releaseac8e84efc
client:improve mount error messagedd2ce49d0
Add symlink breakout test for overriden pathDependency Changes
Previous release can be found at v2.1.1
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.1.1
: containerd 2.1.1Compare Source
Welcome to the v2.1.1 release of containerd!
The first patch release for containerd 2.1 fixes a critical vulnernability (CVE-2025-47290)
which was first introduced in 2.1.0. See the Github Advisory
for more details. This release also contains a few smaller updates and bux fixes.
Highlights
Image Storage
Runtime
Deprecations
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
17 commits
cb1076646
Merge commit from fork216667ba0
Prepare release notes for 2.1.1ac00b8e61
Revert "perf(applyNaive): avoid walking the tree for each file in the same directory"444ca17cd
update runhcs version to v0.13.00684f1c44
build(deps): bump github.com/Microsoft/hcsshime1817a401
docs/snapshotters/erofs.md: a tip for improved performance2168cb92c
erofs-differ: fix EROFS native image support7fcbc3c46
core/runtime/v2: cleanup shim-cleanup logs37d6c4236
Update removal version for deprecated registry config fieldse7be076d4
ctr:make sure containerd socket exist before create clientc90524d5f
.github: mark 2.1 releases as latestDependency Changes
Previous release can be found at v2.1.0
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.1.0
: containerd 2.1.0Compare Source
Welcome to the v2.1.0 release of containerd!
The first minor release of containerd 2.x focuses on continued stability alongside
new features and improvements. This is the first time-based released for containerd.
Most the feature set and core functionality has long been stable and harderened in production
environments, so now we transition to a balance of timely delivery of new functionality
with the same high confidence in stability and performance.
Highlights
Container Runtime Interface (CRI)
Image Distribution
Node Resource Interface (NRI)
Runtime
Breaking
Deprecations
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Dependency Changes
ea5083f
-> v0.1.0d8f796a
-> v1.1.14fcff4a
new5d4384e
-> v1.0.00e7078e
aacd6d4
->2d47ceb
5fefd90
->56aae31
324edc3
->56aae31
18e509b
->3ea5e8c
bc3834c
->9aa6b5e
Previous release can be found at v2.0.0
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.0.6
: containerd 2.0.6Compare Source
Welcome to the v2.0.6 release of containerd!
The sixth patch release for containerd 2.0 includes various bug fixes and updates.
Highlights
Container Runtime Interface (CRI)
Go client
Image Distribution
Runtime
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
49 commits
d94b0fee6
Prepare release notes for v2.0.6f901e3c81
ci: bump Go 1.23.11, 1.24.57e4ac4761
go.mod: golang.org/x/* latestbed6d1401
client/New: Don't unlazy the gRPC connection implicitly8094fa21a
cri:fix containerd panic when can't find sandbox extension552f717be
bugfix:close container io when runtime create failedc4394d05a
Fix the panic caused by the failure of RunPodSandbox54f923a30
ci: bump golang [1.23.10, 1.24.4] in build and release2de777dfe
ci: bump golang [1.23.9, 1.24.3] in build and release9724cd5ea
Enable CIs to run on WS2022 and WS20257fc3151fc
*: properly shutdown non-groupable shims to prevent resource leaks4396336a1
core/runtime: should invoke shim binary10bcc6929
Revert "not set sandbox id when use podsandbox type"f38eb62b6
integration: add testcase to recover ungroupable shim2358561d5
Update release upgrade tests to test 1.7 and 2.08931b1464
Fix upgrade test runtime configfc9235910
Fetch image with default platform only in TestExportAndImportMultiLayerf8679737e
store extension when create sandbox in storecbfa66223
fix(docker pusher): if authorizing a cross-repo mount fails, fall back7bf4d0a40
.github: do not mark 2.0 releases as latestfa5a08244
Update runc binary to v1.3.07cf3c604e
fix unbound SKIP_TEST variable error827be7c9d
Revert "disable portmap test in ubuntu-22 to make CI happy"626a57dd7
fix: update containerd config dump to reflect plugin config migrations.983dd336f
core/transfer/local: should not mark complete if it's not foundd2a30ea0c
Revert criserver metrics subsystem back to crie9804ee0e
not set sandbox id when use podsandbox type9ddeff7f7
Fix vagrant setupDependency Changes
aacd6d4
->6ae5c78
Previous release can be found at v2.0.5
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.0.5
: containerd 2.0.5Compare Source
Welcome to the v2.0.5 release of containerd!
The fifth patch release for containerd 2.0 includes various bug fixes and updates.
Highlights
Build and Release Toolchain
Container Runtime Interface (CRI)
Image Distribution
Runtime
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
33 commits
5bcf0a95e
use go1.23.8 as the default go version4838f33f7
update to go 1.24.2, 1.23.8a8082cd60
Prepare release notes for v2.0.558b715ad8
Disable arm64 criu testing in GH Actionsb4a53e826
disable portmap test in ubuntu-22 to make CI happy4bcf472de
add option to skip tests in critest8a638b71a
Prevent panic in Docker pusher.84d9658c3
Set default differ for the default unpack config of transfer serviceb184a97d3
ci: update GitHub Actions release runner to ubuntu-24.04e04543db0
use shimCtx for fifo copy9f46e7a44
integration/client: add tests for TaskOptions is not empty8a16a6a04
prefer task options for PluginInfo requesta183b2d23
update taskOptions based on runtimeOptions when creating a task091143135
*: CRIImageService should delete image synchronouslyc2372c072
Update runc binary to v1.2.6e8506511b
go.{mod,sum}: bump CDI deps to stable v1.0.0.4cfb89430
go.mod: github.com/go-jose/go-jose/v42b9e6a29d
go.mod: golang.org/x/oauth2 v0.28.06df1ea0d9
go.mod: golang.org/x/net v0.37.016f20abdf
Fix CI lint errorDependency Changes
Previous release can be found at v2.0.4
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.0.4
: containerd 2.0.4Compare Source
Welcome to the v2.0.4 release of containerd!
The fourth patch release for containerd 2.0 includes various bug fixes and updates.
Highlights
client.WithTimeout
option on connect (#11536)Node Resource Interface (NRI)
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
19 commits
1a43cb6a1
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.