kubernetes-oomkill-exporter icon indicating copy to clipboard operation
kubernetes-oomkill-exporter copied to clipboard

Renovate: Update module github.com/containerd/containerd to v2

Open renovate[bot] opened this issue 7 months ago • 1 comments

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/containerd/containerd v1.7.27 -> v2.0.5 age adoption passing confidence

Release Notes

containerd/containerd (github.com/containerd/containerd)

v2.0.5: containerd 2.0.5

Compare Source

Welcome to the v2.0.5 release of containerd!

The fifth patch release for containerd 2.0 includes various bug fixes and updates.

Highlights
Build and Release Toolchain
Container Runtime Interface (CRI)
  • Update ImageService to delete images synchronously (#​11599)
Image Distribution
  • Prevent panic on zero length push (#​11698)
  • Set default differ for the default unpack config of transfer service (#​11688)
Runtime
  • Remove invalid error log when stopping container after containerd restart (#​11621)
  • Update taskOptions based on runtimeOptions when creating a task (#​11618)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors
  • Akihiro Suda
  • Akhil Mohan
  • Derek McGowan
  • Phil Estes
  • Wei Fu
  • Iceber Gu
  • Austin Vazquez
  • Maksym Pavlenko
  • Cesar Talledo
  • Henry Wang
  • Jin Dong
  • Krisztian Litkey
  • Yang Yang
Changes
33 commits

  • Update go to 1.23.8 (#​11717)
  • Prepare release notes for v2.0.5 (#​11713)
  • Disable criu test on arm64 (#​11710)
    • 58b715ad8 Disable arm64 criu testing in GH Actions
    • b4a53e826 disable portmap test in ubuntu-22 to make CI happy
    • 4bcf472de add option to skip tests in critest
  • Prevent panic on zero length push (#​11698)
  • Set default differ for the default unpack config of transfer service (#​11688)
    • 84d9658c3 Set default differ for the default unpack config of transfer service
  • ci: update GitHub Actions release runner to ubuntu-24.04 (#​11703)
    • b184a97d3 ci: update GitHub Actions release runner to ubuntu-24.04
  • Remove invalid error log when stopping container after containerd restart (#​11621)
  • Update taskOptions based on runtimeOptions when creating a task (#​11618)
    • 9f46e7a44 integration/client: add tests for TaskOptions is not empty
    • 8a16a6a04 prefer task options for PluginInfo request
    • a183b2d23 update taskOptions based on runtimeOptions when creating a task
  • Update ImageService to delete images synchronously (#​11599)
    • 091143135 *: CRIImageService should delete image synchronously
  • Update runc binary to v1.2.6 (#​11583)
  • go.{mod,sum}: bump CDI deps to stable v1.0.0. (#​11566)
    • e8506511b go.{mod,sum}: bump CDI deps to stable v1.0.0.
  • silence govulncheck false positives (#​11571)
    • 4cfb89430 go.mod: github.com/go-jose/go-jose/v4
    • 2b9e6a29d go.mod: golang.org/x/oauth2 v0.28.0
    • 6df1ea0d9 go.mod: golang.org/x/net v0.37.0
  • Fix CI lint error (cherry-picked #​11555) (#​11567)
Dependency Changes
  • github.com/go-jose/go-jose/v4 v4.0.4 -> v4.0.5
  • golang.org/x/crypto v0.31.0 -> v0.36.0
  • golang.org/x/net v0.33.0 -> v0.37.0
  • golang.org/x/oauth2 v0.23.0 -> v0.28.0
  • golang.org/x/sync v0.10.0 -> v0.12.0
  • golang.org/x/sys v0.28.0 -> v0.31.0
  • golang.org/x/term v0.27.0 -> v0.30.0
  • golang.org/x/text v0.21.0 -> v0.23.0
  • tags.cncf.io/container-device-interface v0.8.1 -> v1.0.0
  • tags.cncf.io/container-device-interface/specs-go v0.8.0 -> v1.0.0

Previous release can be found at v2.0.4

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.4: containerd 2.0.4

Compare Source

Welcome to the v2.0.4 release of containerd!

The fourth patch release for containerd 2.0 includes various bug fixes and updates.

Highlights
  • Fix integer overflow in User ID handling (GHSA-265r-hfxg-fhmg)
  • Respect client.WithTimeout option on connect (#​11536)
  • Update image type checks to avoid unnecessary logs for attestations (#​11537)
Node Resource Interface (NRI)
  • Fix incorrect runtime name being passed to NRI (#​11529)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Akihiro Suda
  • Paweł Gronowski
  • Akhil Mohan
  • Phil Estes
  • Samuel Karp
  • Craig Ingram
  • ningmingxiao
Changes
19 commits

  • 1a43cb6a1 Merge commit from fork
  • 07a0b5419 (cherry picked from commit de1341c)
  • Prepare release notes for v2.0.4 (#​11541)
  • Respect client.WithTimeout option on connect (#​11536)
    • 6b5efba83 client: Respect client.WithTimeout option
  • Update image type checks to avoid unnecessary logs for attestations (#​11537)
    • 916d48722 core/remotes: Handle attestations in MakeRefKey
    • df4d905a6 core/images: Ignore attestations when traversing children
  • Fix incorrect runtime name being passed to NRI (#​11529)
  • update build to go1.23.7, test go1.24.1 (#​11514)
    • e5ad0d0a0 update build to go1.23.7, test go1.24.1
  • docs: include note about unprivileged sysctls (#​11506)
    • a39f1146b docs: include note about unprivileged sysctls
  • e2e: use the shim bundled with containerd artifact (#​11503)
    • 81b3384a0 e2e: use the shim bundled with containerd artifact
  • build(deps): bump containerd/project-checks from 1.1.0 to 1.2.1 (#​11497)
    • 7215a7d2c build(deps): bump containerd/project-checks from 1.1.0 to 1.2.1
Dependency Changes

This release has no dependency changes

Previous release can be found at v2.0.3

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.3: containerd 2.0.3

Compare Source

Welcome to the v2.0.3 release of containerd!

The third patch release for containerd 2.0 includes various bug fixes and updates.

Highlights
  • Update remote content to break up writes to avoid grpc message size limits (#​11457)
  • Update runc binary to v1.2.5 (#​11394)
Container Runtime Interface (CRI)
Node Resource Interface (NRI)
  • Fix initial sync race when registering NRI plugins (#​11329)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Akihiro Suda
  • Mike Brown
  • Phil Estes
  • Akhil Mohan
  • Chifeng Cai
  • Krisztian Litkey
  • Wei Fu
  • Andrey Smirnov
  • Austin Vazquez
  • Chris Henzie
  • Jing Xu
  • Jonathan A. Sternberg
  • Jose Fernandez
  • Kirtana Ashok
  • Lei Liu
  • Maksym Pavlenko
  • Michael Zappa
  • Samuel Karp
  • fengwei0328
  • zounengren
Changes
42 commits

  • Prepare release notes for v2.0.3 (#​11443)
  • Update remote content to break up writes to avoid grpc message size limits (#​11457)
    • eaa7ca80d proxy: break up writes from the remote writer to avoid grpc limits
  • Fix privileged container sysfs can't be rw because pod is ro by default (#​11456)
    • c7f64196f Fix privileged container sysfs can't be rw because pod is ro by default
  • go.{mod,sum}: bump CDI deps to v.0.8.1. (#​11430)
  • Prefer runtime options for PluginInfo request (#​11446)
    • 569af34cb Prefer runtime options for PluginInfo request
  • pkg: prevent oom watcher from depending on shim pkg (#​11439)
    • 0ce93e16a prevent oom watcher depend on shim pkg.
  • CI: arm64-8core-32gb -> ubuntu-24.04-arm (#​11436)
    • f3284aa68 CI: arm64-8core-32gb -> ubuntu-24.04-arm
  • Revert "Add timestamp to PodSandboxStatusResponse for kubernetes Evented PLEG" (#​11403)
    • b5313993c Revert "Add timestamp to PodSandboxStatusResponse for kubernetes Evented PLEG"
  • move the device after the options when using mkfs.ext4 (#​11411)
    • f95a426b8 move the device after the options when using mkfs.ext4
  • update build to go1.23.6, test go1.24.0 (#​11410)
    • 4d19a6adf update build to go1.23.6, test go1.24.0
  • build(deps): bump actions/cache from 4.1.2 to 4.2.0 (#​11405)
    • c738c3aab build(deps): bump actions/cache from 4.1.2 to 4.2.0
  • Upgrade x/net to 0.33.0 to fix vulnerability GHSA-w32m-9786-jp63 (#​11387)
  • Update install-imgcrypt to allow change install repo (#​11357)
    • 0785bd8cc Update install-imgcrypt to allow change install repo
  • Update runc binary to v1.2.5 (#​11394)
  • Update go-cni version to fix Race Condition issue (#​11269)
  • Fix initial sync race when registering NRI plugins (#​11329)
    • 79cdbf61b cri,nri: block NRI plugin sync. during event processing.
  • Update github.com/containerd/imgcrypt to v2.0.0 (#​11325)
    • 9d5cfce83 Update github.com/containerd/imgcrypt to v2.0.0
  • Move CDI device spec out of the OCI package (#​11265)
    • f58939c33 Remove deprecated WithCDIDevices in oci spec opts
    • 3d53430fe Move CDI device spec out of the OCI package
  • update to go1.23.5 / go1.22.11 (#​11297)
  • build(deps): bump google.golang.org/protobuf from 1.35.1 to 1.35.2 (#​11263)
    • 3a6ab80d0 build(deps): bump google.golang.org/protobuf from 1.35.1 to 1.35.2
Changes from containerd/go-cni
2 commits

Dependency Changes
  • github.com/containerd/go-cni v1.1.11 -> v1.1.12
  • github.com/containerd/imgcrypt/v2 v2.0.0-rc.1 -> v2.0.0
  • github.com/containers/ocicrypt v1.2.0 -> v1.2.1
  • github.com/petermattis/goid 4fcff4a new
  • github.com/sasha-s/go-deadlock v0.3.5 new
  • github.com/smallstep/pkcs7 v0.1.1 new
  • golang.org/x/crypto v0.28.0 -> v0.31.0
  • golang.org/x/net v0.30.0 -> v0.33.0
  • golang.org/x/oauth2 v0.22.0 -> v0.23.0
  • golang.org/x/sync v0.8.0 -> v0.10.0
  • golang.org/x/sys v0.26.0 -> v0.28.0
  • golang.org/x/term v0.25.0 -> v0.27.0
  • golang.org/x/text v0.19.0 -> v0.21.0
  • google.golang.org/grpc v1.67.1 -> v1.68.1
  • google.golang.org/protobuf v1.35.1 -> v1.35.2
  • tags.cncf.io/container-device-interface v0.8.0 -> v0.8.1

Previous release can be found at v2.0.2

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.2: containerd 2.0.2

Compare Source

Welcome to the v2.0.2 release of containerd!

The second patch release for containerd 2.0 includes a number of bug fixes and improvements.

Highlights
Container Runtime Interface (CRI)
  • Remove confusing warning in cri runtime config migration (#​11256)
  • Fix runtime platform loading in cri image plugin init (#​11248)
Runtime

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors
  • Jin Dong
  • Derek McGowan
  • Akihiro Suda
  • Kazuyoshi Kato
  • Henry Wang
  • Krisztian Litkey
  • Phil Estes
  • Samuel Karp
  • Sebastiaan van Stijn
  • Akhil Mohan
  • Brian Goff
  • Chongyi Zheng
  • Maksym Pavlenko
  • Mike Brown
  • Pierre Gimalac
  • Wei Fu
Changes
23 commits

  • Prepare release notes for v2.0.2 (#​11245)
  • Update platforms to latest rc (#​11259)
  • Remove confusing warning in cri runtime config migration (#​11256)
    • 468079c5c Remove confusing warning in cri runtime config migration
  • Fix runtime platform loading in cri image plugin init (#​11248)
    • a2d9d4fd5 Fix runtime platform loading in cri image plugin init
  • make sure console master tty is closed on task exit (#​11246)
    • 184ffad01 Add integ test to check tty leak
    • 17181ed33 fix master tty leak due to leaking init container object
  • Bump up otelttrpc to 0.1.0 (#​11242)
  • ctr: ctr images import --all-platforms: fix unpack (#​11236)
    • c4270430d ctr: ctr images import --all-platforms: fix unpack
  • Update runc binary to v1.2.4 (#​11239)
  • downgrade go-difflib and go-spew to tagged releases (#​11222)
    • f34147772 downgrade go-difflib and go-spew to tagged releases
  • Add a build tag to disable std plugin import (#​11213)
    • dca769485 chore: add a build tag to disable containerd plugin import
  • Update golangci to 1.60.3 (#​11187)
Changes from containerd/otelttrpc
6 commits

Changes from containerd/platforms
6 commits

Changes from containerd/ttrpc
5 commits

Dependency Changes
  • github.com/containerd/otelttrpc ea5083f -> v0.1.0
  • github.com/containerd/platforms v1.0.0-rc.0 -> v1.0.0-rc.1
  • github.com/containerd/ttrpc v1.2.6 -> v1.2.7
  • github.com/davecgh/go-spew d8f796a -> v1.1.1
  • github.com/pmezard/go-difflib 5d4384e -> v1.0.0
  • github.com/stretchr/testify v1.9.0 -> v1.10.0

Previous release can be found at v2.0.1

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.1: containerd 2.0.1

Compare Source

Welcome to the v2.0.1 release of containerd!

The first patch release for containerd 2.0 includes a number of bug fixes and improvements.

Highlights
Container Runtime Interface (CRI)
Image Distribution
  • Update differ to handle zstd media types (#​11068)
Runtime
  • Update runc binary to v1.2.3 (#​11142)
  • Fix panic due to nil dereference cgroups v2 (#​11098)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Wei Fu
  • Archit Kulkarni
  • Jin Dong
  • Phil Estes
  • Akhil Mohan
  • Akihiro Suda
  • Alexey Lunev
  • Austin Vazquez
  • Maksym Pavlenko
  • Mike Brown
  • Michael Zappa
  • Samuel Karp
  • Sebastiaan van Stijn
  • Andrey Smirnov
  • Davanum Srinivas
Changes
50 commits

  • Prepare release notes for v2.0.1 (#​11158)
  • build(deps): bump actions/attest-build-provenance from 1.4.4 to 2.1.0 (#​11154)
    • fe6957084 build(deps): bump actions/attest-build-provenance from 1.4.4 to 2.1.0
  • update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+ (#​11153)
    • eb2ce6882 update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+
  • ctr pull should unpack for default platform when transfer service is used (#​11139)
    • 44cdca68b ctr pull unpack for default platform using transfer service
  • Fix apply IoOwner options when not in user namespace (#​11151)
    • 018d83650 internal/cri: should not apply IoOwner options
  • Update go-cni for CNI STATUS (#​11146)
    • 5eb7995a9 feat: update go-cni version for CNI STATUS
  • Fix cri grpc plugin config migration (#​11140)
    • a2302ea89 Add integration test for custom configuration
    • be5eda069 complete cri grpc config migration
  • Update runc binary to v1.2.3 (#​11142)
  • Update differ to handle zstd media types (#​11068)
    • 73f57acb0 Update differ to handle zstd media types
  • update to go1.23.4 / go1.22.10 (#​11109)
  • CI: update Fedora to 41 (#​11110)
  • Fix panic due to nil dereference cgroups v2 (#​11098)
    • 3ba2df924 fix panic due to nil dereference cgroups v2
  • Publish attestation as release artifact (#​11067)
    • 34a45cab2 Publish attestation as release artifact
  • Move rockylinux 9.4 to almalinux/9 in CI (#​11053)
    • 7dec6b460 move rocky 9.4 to almalinux/9 in CI
  • *: should align pipe's owner with init process (#​11035)
    • cf07f28ee *: should align pipe's owner with init process
  • fix: set the credentials even if not provided (#​11031)
    • 986088866 fix: set the credentials even if not provided
  • fsverity_test.go: fix nil pointer derefence, fix test fail, fix minor/major device numbers resolving (#​10978)
    • 30b929ece fsverity_test.go: fix major/minor device number resolving
    • 10996a334 fsverity_test.go: fix nil pointer dereference, fix test fail
  • update runc binary to 1.2.2 (#​11023)
  • Revert "Disable vagrant strict dependency checking" (#​11009)
    • 6399c936f Revert "Disable vagrant strict dependency checking"
  • fsverity_linux.go: Fix fsverity.IsEnabled() for big endian systems (#​11005)
    • a7f2b562f fsverity_linux.go: Fix fsverity.IsEnabled() for big endian systems
  • bump github.com/containerd/typeurl/v2 from 2.2.2 to 2.2.3 (#​10997)
    • 389e781ea build(deps): bump github.com/containerd/typeurl/v2 from 2.2.2 to 2.2.3
  • update to go1.23.3 / go1.22.9 (#​10973)
  • ci: enable marking 2.0 releases as latest (#​10963)
    • 458215f6c ci: enable marking 2.0 releases as latest
  • Avoid arch info in the sed/replace when building cri-cni-containerd.tar.gz (#​10968)
    • e99c2b55c Avoid arch info in the sed/replace when building cri-cni-containerd.tar.gz
Changes from containerd/go-cni
7 commits

Dependency Changes
  • github.com/containerd/go-cni v1.1.10 -> v1.1.11
  • github.com/containerd/typeurl/v2 v2.2.2 -> v2.2.3

Previous release can be found at v2.0.0

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.0: containerd 2.0.0

Compare Source

Welcome to the v2.0.0 release of containerd!

The first major release of containerd 2.x focuses on the continued stability of containerd's core feature set with an easy upgrade from containerd 1.x. This release includes the stabilization of new features added in the last 1.x release as well as the removal of features which were deprecated in 1.x. The goal is to support the vast community of containerd users well into the future along with their ever increasing deployment footprints and variety of use cases.

See containerd 2.0 documentation for details on what is new and has changed in this release.

Highlights
  • Allow sections of Plugins to be merged, and not overwritten as entire sections. (#​9982)
  • Add Update API for sandbox controller (#​9903)
  • Configure otel from env instead of config.toml (#​8970)
  • Enable NRI by default (#​9744)
  • Add PluginInfo to introspection API (#​9442)
  • Remove overlayfs volatile option on temp mounts (#​9555)
  • Expose usage of deprecated features (#​9258)
  • Use Intel ISA-L's igzip if available (#​9200)
  • Introduce top level config migration (#​9223)
  • Add image delete target (#​8989)
  • Remove LimitNOFILE from containerd.service (#​8924)
  • Add support for image expiration during garbage collection (#​9022)
  • Reduce the contention between ref lock and boltdb lock in content store (#​8792)
  • Remove "containerd.io/restart.logpath" label (#​8264)
  • Remove aufs snapshotter (#​8263)
  • Fix deadlock during NRI plugin registration (containerd/nri#79)
  • Support arm64/v9 and minor variants (containerd/platforms#8)
  • Fix deadlock when writing to pipe blocks (containerd/ttrpc#168)
Build and Release Toolchain
  • Generate attestation for artifacts during release (#​10543)
  • Remove cri-containerd-*.tar.gz release bundles (#​9096)
Container Runtime Interface (CRI)
  • Use 'UserSpecifiedImage' from CRI to set the image-name annotation (#​10747)
  • Fine-grained SupplementalGroups control (#​9737)
  • Add support to set loopback to up (#​10238)
  • KEP-3857: Recursive Read-only (RRO) mounts (#​9787)
  • Add support for multiple subscribers to CRI container events (#​9661)
  • Enable CDI by default (#​9621)
  • Remove non-sandboxed CRI implementation (#​9228)
  • Add support for userns in stateless and stateful pods with idmap mounts (KEP-127, k8s >= 1.27) (#​8287)
  • Use sandboxed CRI by default (#​8994)
  • Implement RuntimeConfig CRI call (#​8722)
  • Add support for user namespaces (KEP-127) (#​8803)
  • Remove CRI v1alpha2 (#​8276)
Go client
  • Add api Go module and move all protos under api (#​10151)
  • Move packages based on contributing guide (#​9365)
  • Generalize plugin library (#​9214)
  • Use github.com/containerd/log (#​9086)
Image Distribution
  • Support to syncfs after pull by using diff plugin (#​10284)
  • Skip "unknown" in image platform listing (#​10257)
  • Update unpacker to fetch all provided content (#​10202)
  • Enable Transfer service API to support plain HTTP (#​10024)
  • Enable Transfer service to use registry configuration directory (#​9908)
  • Disable the support for Schema 1 images (#​9765)
  • Update Transfer service to add OCI descriptors to Progress structure (#​9630)
  • Update import and export to allow references to missing content (#​9554)
  • Add option to perform syncfs after pull (#​9401)
  • Add image verifier transfer service plugin system based on a binary directory (#​8493)
Runtime
  • Implement RuntimeStatus.features.supplemental_groups_policy from KEP-3619 (#​10410)
  • Add pprof to runc-shim (#​10242)
  • Provide runtime options in plugin info (#​10251)
  • Store bootstrap parameters in sandbox metadata (#​9736)
  • Update apparmor to allow confined runc to kill containers (#​10123)
  • Support vsock connection to task api (#​9738)
  • Update RuntimeDefault seccomp profile to disallow io_uring related syscalls (#​9320)
  • Switch runc shim to task service v3 and fix restore (#​9233)
  • Add sandboxer configuration and move sandbox controllers to plugins (#​8268)
  • Add annotations to CreateSandbox request (#​8960)
  • Add SandboxMetrics (#​8680)
  • Publish sandbox events (#​8602)
  • Remove the CriuPath field from runc's options (#​8279)
  • Remove io.containerd.runtime.v1.linux and io.containerd.runc.v1 (#​8262)
Security Advisories
Breaking
  • Remove disable_cgroup from CRI config (#​10594)
  • Disable the support for Schema 1 images (#​9765)
  • Update RuntimeDefault seccomp profile to disallow io_uring related syscalls (#​9320)
  • Move client to subpackage (#​9316)
  • Remove LimitNOFILE from containerd.service (#​8924)
  • Remove CRI v1alpha2 (#​8276)
  • Remove io.containerd.runtime.v1.linux and io.containerd.runc.v1 (#​8262)
  • Remove "containerd.io/restart.logpath" label (#​8264)
  • Remove aufs snapshotter (#​8263)
Deprecations
  • Update warnings for deprecated CRI config fields (#​10509)
  • Add type alias for event Envelope (#​10279)
  • Postpone removal of deprecated CRI config properties (#​9966)
  • Deprecate go-plugin configuration option (#​9238)
  • CNI conf_template in CRI is no longer deprecated (#​8637)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Akihiro Suda
  • Maksym Pavlenko
  • Wei Fu
  • Phil Estes
  • Sebastiaan van Stijn
  • Samuel Karp
  • Krisztian Litkey
  • Kazuyoshi Kato
  • Austin Vazquez
  • Rodrigo Campos
  • Danny Canter
  • Abel Feng
  • Mike Brown
  • Kirtana Ashok
  • Akhil Mohan
  • Iceber Gu
  • Gabriel Adrian Samfira
  • Jin Dong
  • Kohei Tokunaga
  • Bjorn Neergaard
  • Brian Goff
  • Justin Chadwell
  • rongfu.leng
  • James Sturtevant
  • Davanum Srinivas
  • Paul "TBBle" Hampson
  • Henry Wang
  • Enrico Weigelt
  • Laura Brehm
  • Marat Radchenko
  • Paweł Gronowski
  • Shingo Omura
  • Hsing-Yu (David) Chen
  • Ilya Hanov
  • Cardy.Tang
  • Swagat Bora
  • Aditi Sharma
  • Amit Barve
  • Bryant Biggs
  • Evan Lezar
  • James Jenkins
  • Jordan Liggitt
  • Kay Yan
  • Markus Lehtonen
  • Nashwan Azhari
  • Shuaiyi Zhang
  • Vinayak Goyal
  • helen
  • Alexandru Matei
  • Anthony Nandaa
  • Avi Deitcher
  • Charity Kathure
  • Cory Snider
  • Ed Bartosh
  • Etienne Champetier
  • Kevin Parsons
  • Michael Zappa
  • Milas Bowman
  • lengrongfu
  • ningmingxiao
  • yanggang
  • zounengren
  • Aditya Ramani
  • Adrian Reber
  • Amir M. Ghazanfari
  • Antonio Ojea
  • Artem Khramov
  • Brad Davidson
  • Chen Yiyang
  • Chongyi Zheng
  • Christian Muehlhaeuser
  • Djordje Lukic
  • Edgar Lee
  • Eric Lin
  • Ethan Lowman
  • Jiang Liu
  • June Rhodes
  • Kern Walster
  • Lei Jitang
  • Lucas Rattz
  • Mahamed Ali
  • Maksim An
  • Michael Crosby
  • Peteris Rudzusiks
  • Ray Burgemeestre
  • Sam Edwards
  • Samruddhi Khandale
  • Sascha Grunert
  • Steve Griffith
  • Tony Fang
  • Tõnis Tiigi
  • VERNOU Cédric
  • Vishal Reddy Gurrala
  • Xiaojin Zhang
  • Yang Yang
  • hang.jiang
  • harshitasao
  • jerryzhuang
  • roman-kiselenko
  • zhanluxianshen
  • Aaron Lehmann
  • AbdelrahmanElawady
  • Adrien Delorme
  • Alex Couture-Beil
  • Alex Ellis
  • Alex Rodriguez
  • Angelos Kolaitis
  • Antonio Huete Jimenez
  • Antti Kervinen
  • Arash Haghighat
  • Arkin Modi
  • Ben Foster
  • Benjamin Peterson
  • Bin Tang
  • Bin Xin
  • BinBin He
  • Brennan Kinney
  • Changqing Li
  • ChengenH
  • ChengyuZhu6
  • Christian Stewart
  • Colin O'Dell
  • Craig Ingram
  • Daisy Rong
  • David Porter
  • David Son
  • Derek Nola
  • Eng Zer Jun
  • Erikson Tung
  • Fabiano Fidêncio
  • Fahed Dorgaa
  • Gabriela Cervantes
  • Gary McDonald
  • Iain Macdonald
  • James Lakin
  • Jan Dubois
  • Jaroslav Jindrak
  • Javier Maestro
  • Jian Wang
  • Jiongchi Yu
  • Julien Balestra
  • Kir Kolyshkin
  • Kirill A. Korinsky
  • Konstantin Khlebnikov
  • Lei Liu
  • Matteo Pulcini
  • Mauri de Souza Meneguzzo
  • Mike Baynton
  • Niklas Gehlen
  • Pan Yibo
  • Paul Meyer
  • Qasim Sarfraz
  • Qiutong Song
  • Reinhard Tartler
  • Robbie Buxton
  • Robert-André Mauchin
  • Ruihua Wen
  • Saket Jajoo
  • Sameer
  • Shengjing Zhu
  • Shiming Zhang
  • Shukui Yang
  • StepSecurity Bot
  • Talon
  • Tariq Ibrahim
  • Tianon Gravi
  • Tim Hockin
  • TinaMor
  • Tobias Klauser
  • Tomáš Virtus
  • Wang Xinwen
  • William Chen
  • Xinyang Ge
  • Yibo Zhuang
  • Yuhang Wei
  • Yury Gargay
  • Zechun Chen
  • Zhang Tianyang
  • Zoe
  • baijia
  • bo.jiang
  • bzsuni
  • charles-chenzz
  • chschumacher1994
  • cormick
  • guangli.bao
  • guangwu
  • jinda.ljd
  • jin

Configuration

📅 Schedule: Branch creation - "before 8am on Friday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • [ ] If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

renovate[bot] avatar Apr 25 '25 01:04 renovate[bot]

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: go.sum
Command failed: mod upgrade --mod-name=github.com/containerd/containerd -t=2
could not load package: err: exit status 1: stderr: go: inconsistent vendoring in /tmp/renovate/repos/github/sapcc/kubernetes-oomkill-exporter:
	github.com/containerd/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/containerd/containerd/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/prometheus/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/stretchr/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	golang.org/x/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/Microsoft/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/containerd/cgroups/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/containerd/containerd/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/containerd/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/fxamacker/cbor/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/go-logr/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/klauspost/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/moby/sys/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/modern-go/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/opencontainers/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/opencontainers/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/opencontainers/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/prometheus/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/prometheus/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/prometheus/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/spf13/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	go.opentelemetry.io/auto/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	go.opentelemetry.io/contrib/instrumentation/net/http/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	go.opentelemetry.io/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	go.opentelemetry.io/otel/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	go.opentelemetry.io/otel/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	go.yaml.in/yaml/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	golang.org/x/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	golang.org/x/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	golang.org/x/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	google.golang.org/genproto/googleapis/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	google.golang.org/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	google.golang.org/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	k8s.io/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	k8s.io/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	k8s.io/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	sigs.k8s.io/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	sigs.k8s.io/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	sigs.k8s.io/structured-merge-diff/[email protected]: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/Microsoft/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/containerd/cgroups/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/containerd/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/containerd/containerd/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/containerd/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/fxamacker/cbor/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/go-logr/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/klauspost/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/moby/sys/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/modern-go/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/opencontainers/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/opencontainers/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/opencontainers/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/prometheus/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/prometheus/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/prometheus/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/prometheus/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/spf13/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/stretchr/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	go.opentelemetry.io/contrib/instrumentation/net/http/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	go.opentelemetry.io/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	go.opentelemetry.io/otel/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	go.opentelemetry.io/otel/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	golang.org/x/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	golang.org/x/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	golang.org/x/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	golang.org/x/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	google.golang.org/genproto/googleapis/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	google.golang.org/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	google.golang.org/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	k8s.io/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	k8s.io/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	k8s.io/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	sigs.k8s.io/[email protected]: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod

	To ignore the vendor directory, use -mod=readonly or -mod=mod.
	To sync the vendor directory, run:
		go mod vendor


renovate[bot] avatar Apr 25 '25 01:04 renovate[bot]