Skip to content

Conversation

syself-bot[bot]
Copy link
Contributor

@syself-bot syself-bot bot commented Mar 20, 2025

This PR contains the following updates:

Package Update Change
containerd/containerd patch 1.7.26 -> 1.7.28

Release Notes

containerd/containerd (containerd/containerd)

v1.7.28: containerd 1.7.28

Compare Source

Welcome to the v1.7.28 release of containerd!

The twenty-eighth patch release for containerd 1.7 contains various fixes
and updates.

Highlights
Image Distribution
  • Refresh OAuth tokens when they expire during registry operations (#​11721)
  • Set default differ for the default unpack config of transfer service (#​11689)
Runtime
  • Update runc binary to v1.3.0 (#​11800)
  • Remove invalid error log when stopping container after containerd restart (#​11620)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Akhil Mohan
  • Akihiro Suda
  • Austin Vazquez
  • Maksym Pavlenko
  • Phil Estes
  • Derek McGowan
  • Kirtana Ashok
  • Henry Wang
  • Iain Macdonald
  • Jin Dong
  • Swagat Bora
  • Wei Fu
  • Yang Yang
  • madraceee
Changes
57 commits

  • Prepare release notes for v1.7.28 (#​12134)
    • b01b809f8 Prepare release notes for v1.7.28
  • ci: bump Go 1.23.11, 1.24.5 (#​12117)
  • Backport windows test fixes (#​12121)
    • 3c06bcc4d Fix intermittent test failures on Windows CIs
    • c6c0c6854 Remove WS2025 from CIs due to regression
  • ci: use fedora 39 archive (#​12123)
    • 6d7e021cf ci: use fedora/39-cloud-base image from archive
  • update runners to ubuntu 24.04 (#​11802)
    • c362e18cc CI: install OVMF for Vagrant
    • 1d99bec21 CI: fix "Unable to find a source package for vagrant" error
    • dafa3c48d add debian sources for ubuntu-24
    • b03301d85 partial: enable ubuntu 24 runners
    • 13fbc5f97 update release runners to ubuntu 24.04
  • go.mod: golang.org/x/* latest (#​12096)
  • Remove additional fuzzers from instrumentation repo (#​12099)
    • 5fef123ba Remove additional fuzzers from CI
  • backport windows runner and golang toolchain updates (#​11972)
    • a35978f5a ci: bump golang [1.23.10, 1.24.4] in build and release
    • df035aa3e ci: bump golang [1.23.9, 1.24.3] in build and release
    • 2a6d9fc71 use go1.23.8 as the default go version
    • 15d4d6eba update to go 1.24.2, 1.23.8
    • 1613a3b1a Enable CIs to run on WS2022 and WS2025
  • test: added runc v1 tests using vagrant (#​11896)
    • 60e73122c test: added runc v1 tests using vagrant
  • Revert "disable portmap test in ubuntu-22 to make CI happy" (#​11803)
    • 10e1b515e Revert "Disable port mapping tests in CRI-in-UserNS"
    • 7a680e884 fix unbound SKIP_TEST variable error
    • e5f8cc995 Revert "disable portmap test in ubuntu-22 to make CI happy"
  • Update runc binary to v1.3.0 (#​11800)
  • Refresh OAuth tokens when they expire during registry operations (#​11721)
    • a6421da84 remotes/docker/authorizer.go: invalidate auth tokens when they expire.
  • [CI] Fix vagrant (#​11739)
  • Fix CI (#​11722)
    • d3e7dd716 Skip criu on Arms
    • 7cf9ebe94 Disable port mapping tests in CRI-in-UserNS
    • 42657a4ed disable portmap test in ubuntu-22 to make CI happy
    • b300fd37b add option to skip tests in critest
    • 6f4ffad27 Address cgroup mountpoint does not exist
    • cef298331 Update Ubuntu to 24
    • 2dd9be16e ci: update GitHub Actions release runner to ubuntu-24.04
  • Set default differ for the default unpack config of transfer service (#​11689)
    • e40e59e4e Set default differ for the default unpack config of transfer service
  • silence govulncheck false positives (#​11679)
    • ff097d5a4 silence govulncheck false positives
  • vendor: github.com/go-jose/go-jose/v3 v3.0.4 (#​11619)
    • 52dd4dc51 vendor: github.com/go-jose/go-jose/v3 v3.0.4
  • Remove invalid error log when stopping container after containerd restart (#​11620)
  • Update runc binary to v1.2.6 (#​11584)
  • Use RWMutex in NSMap and reduce lock area (#​11556)
    • 9a8d1d44a Use RWMutex in NSMap and reduce lock area

Dependency Changes
  • github.com/go-jose/go-jose/v3 v3.0.3 -> v3.0.4
  • golang.org/x/crypto v0.31.0 -> v0.40.0
  • golang.org/x/mod v0.17.0 -> v0.26.0
  • golang.org/x/net v0.33.0 -> v0.42.0
  • golang.org/x/oauth2 v0.11.0 -> v0.30.0
  • golang.org/x/sync v0.10.0 -> v0.16.0
  • golang.org/x/sys v0.28.0 -> v0.34.0
  • golang.org/x/term v0.27.0 -> v0.33.0
  • golang.org/x/text v0.21.0 -> v0.27.0
  • golang.org/x/time 90d013b -> v0.12.0

Previous release can be found at v1.7.27

v1.7.27: containerd 1.7.27

Compare Source

Welcome to the v1.7.27 release of containerd!

The twenty-seventh patch release for containerd 1.7 contains various fixes
and updates.

Highlights
  • Fix integer overflow in User ID handling (GHSA-265r-hfxg-fhmg)
  • Update image type checks to avoid unnecessary logs for attestations (#​11538)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Jin Dong
  • Akhil Mohan
  • Derek McGowan
  • Maksym Pavlenko
  • Paweł Gronowski
  • Phil Estes
  • Akihiro Suda
  • Craig Ingram
  • Krisztian Litkey
  • Samuel Karp
Changes
20 commits

  • 05044ec0a Merge commit from fork
  • 11504c3fc validate uid/gid
  • Prepare release notes for v1.7.27 (#​11540)
    • 1be04be6c Prepare release notes for v1.7.27
  • Update image type checks to avoid unnecessary logs for attestations (#​11538)
    • 82b5c43fe core/remotes: Handle attestations in MakeRefKey
    • 2c670e79b core/images: Ignore attestations when traversing children
  • update build to go1.23.7, test go1.24.1 (#​11515)
    • a39863c9f update build to go1.23.7, test go1.24.1
  • Remove hashicorp/go-multierror dependency and fix CI (#​11499)
    • 49537b3a7 e2e: use the shim bundled with containerd artifact
    • fe490b76f Bump up github.com/intel/goresctrl to 0.5.0
    • 13fc9d313 update containerd/project-checks to 1.2.1
    • 585699c94 Remove unnecessary joinError unwrap
    • 4b9df59be Remove hashicorp/go-multierror
  • go.{mod,sum}: bump CDI deps to v0.8.1. (#​11422)
    • 5ba28f8dc go.{mod,sum}: bump CDI deps to v0.8.1, re-vendor.
  • CI: arm64-8core-32gb -> ubuntu-24.04-arm (#​11437)
    • 85f10bd92 CI: arm64-8core-32gb -> ubuntu-24.04-arm
    • 561ed520e increase xfs base image size to 300Mb

Dependency Changes
  • github.com/intel/goresctrl v0.3.0 -> v0.5.0
  • github.com/prometheus/client_golang v1.14.0 -> v1.16.0
  • github.com/prometheus/common v0.37.0 -> v0.42.0
  • github.com/prometheus/procfs v0.8.0 -> v0.10.1
  • k8s.io/apimachinery v0.26.2 -> v0.27.4
  • sigs.k8s.io/json f223a00 -> bc3834c
  • tags.cncf.io/container-device-interface v0.7.2 -> v0.8.1
  • tags.cncf.io/container-device-interface/specs-go v0.7.0 -> v0.8.0

Previous release can be found at v1.7.26


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

@syself-bot syself-bot bot added type/patch size/XS Denotes a PR that changes 0-20 lines, ignoring generated files. area/templates Changes made in the templates directory labels Mar 20, 2025
| datasource  | package               | from   | to     |
| ----------- | --------------------- | ------ | ------ |
| github-tags | containerd/containerd | 1.7.26 | 1.7.28 |
@syself-bot syself-bot bot force-pushed the renovate/containerd-containerd-1.7.x branch from e74e192 to 65680c7 Compare July 26, 2025 11:02
@syself-bot syself-bot bot changed the title 🌱 Update containerd/containerd to 1.7.27 🌱 Update containerd/containerd to 1.7.28 Jul 26, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/templates Changes made in the templates directory size/XS Denotes a PR that changes 0-20 lines, ignoring generated files. type/patch
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants