-
Notifications
You must be signed in to change notification settings - Fork 3.9k
Comparing changes
Open a pull request
base repository: containerd/containerd
base: v1.6.22
head repository: containerd/containerd
compare: v1.6.23
- 13 commits
- 21 files changed
- 10 contributors
Commits on Jul 20, 2023
-
Signed-off-by: Kirtana Ashok <kiashok@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 43a02c0 - Browse repository at this point
Copy the full SHA 43a02c0View commit details -
Add support for stable ABI windows versions
Signed-off-by: Kirtana Ashok <kiashok@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for f51bf19 - Browse repository at this point
Copy the full SHA f51bf19View commit details
Commits on Jul 28, 2023
-
Fix ro mount option being passed
"ro" was not parsed out of the string, so it was passed as part of data to mount(). This would lead to mount() returning an invalid argument code. Separate out the "ro" option, much like "userxattr", which will allow the MS-RDONLY mountflag to get set. Signed-off-by: Ben Foster <bpfoster@gmail.com> (cherry picked from commit f3daf32)
Configuration menu - View commit details
-
Copy full SHA for 47d73b2 - Browse repository at this point
Copy the full SHA 47d73b2View commit details
Commits on Jul 30, 2023
-
Merge pull request #8888 from estesp/cp-8852-1.6
[release/1.6] backport: ro option for userxattr mount check + cherry-pick: Fix ro mount option being passed
Configuration menu - View commit details
-
Copy full SHA for 6e41bc7 - Browse repository at this point
Copy the full SHA 6e41bc7View commit details
Commits on Aug 1, 2023
-
Includes a fix for CVE-2023-29409 go1.19.12 (released 2023-08-01) includes a security fix to the crypto/tls package, as well as bug fixes to the assembler and the compiler. See the Go 1.19.12 milestone on our issue tracker for details. - https://github.com/golang/go/issues?q=milestone%3AGo1.19.12+label%3ACherryPickApproved - full diff: golang/go@go1.19.11...go1.19.12 From the mailing list announcement: [security] Go 1.20.7 and Go 1.19.12 are released Hello gophers, We have just released Go versions 1.20.7 and 1.19.12, minor point releases. These minor releases include 1 security fixes following the security policy: - crypto/tls: restrict RSA keys in certificates to <= 8192 bits Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. Limit this by restricting the size of RSA keys transmitted during handshakes to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable. Thanks to Mateusz Poliwczak for reporting this issue. View the release notes for more information: https://go.dev/doc/devel/release#go1.20.7 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 00d1092 - Browse repository at this point
Copy the full SHA 00d1092View commit details
Commits on Aug 2, 2023
-
Upgrade GitHub actions packages in release workflow
Resolve NodeJS 12 and command deprecation warnings by upgrading docker/setup-buildx-action and crazy-max/ghaction-github-runtime packages. Signed-off-by: Austin Vazquez <macedonv@amazon.com> (cherry picked from commit 14a38e1) Signed-off-by: Akhil Mohan <makhil@vmware.com>
Configuration menu - View commit details
-
Copy full SHA for 4238cff - Browse repository at this point
Copy the full SHA 4238cffView commit details -
Merge pull request #8905 from thaJeztah/1.6_update_go1.19.12
[release/1.6] update to go1.19.12
Configuration menu - View commit details
-
Copy full SHA for de5e262 - Browse repository at this point
Copy the full SHA de5e262View commit details -
Merge pull request #8908 from akhilerm/fix-deprecated-actions
[release/1.6 backport] Upgrade GitHub actions packages in release workflow
Configuration menu - View commit details
-
Copy full SHA for 4803c73 - Browse repository at this point
Copy the full SHA 4803c73View commit details
Commits on Aug 7, 2023
-
cri: Don't use rel path for image volumes
Runc 1.1 throws a warning when using rel destination paths, and runc 1.2 is planning to thow an error (i.e. won't start the container). Let's just make this an abs path in the only place it might not be: the mounts created due to `VOLUME` directives in the Dockerfile. Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com> (cherry picked from commit 2d64ab8)
Configuration menu - View commit details
-
Copy full SHA for cc5b0a2 - Browse repository at this point
Copy the full SHA cc5b0a2View commit details -
Merge pull request #8927 from kinvolk/rata/runc-abs-path-1.6
[release/1.6] cri: Don't use rel path for image volumes
Configuration menu - View commit details
-
Copy full SHA for 7251156 - Browse repository at this point
Copy the full SHA 7251156View commit details -
Merge pull request #8854 from kiashok/stableAbi-rel-1.6
[release/1.6] Add stable ABI support in windows platform matcher + update hcsshim tag
Configuration menu - View commit details
-
Copy full SHA for 8559256 - Browse repository at this point
Copy the full SHA 8559256View commit details
Commits on Aug 9, 2023
-
Signed-off-by: Kirtana Ashok <kiashok@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for e297a66 - Browse repository at this point
Copy the full SHA e297a66View commit details
Commits on Aug 14, 2023
-
Merge pull request #8939 from kiashok/newTag-1.6
[release/1.6] Add release notes for v1.6.23
Configuration menu - View commit details
-
Copy full SHA for b69f1ad - Browse repository at this point
Copy the full SHA b69f1adView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v1.6.22...v1.6.23