Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump github.com/opencontainers/runc from 1.1.5 to 1.1.6 #435

Merged
merged 1 commit into from
Apr 17, 2023

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Apr 17, 2023

Bumps github.com/opencontainers/runc from 1.1.5 to 1.1.6.

Changelog

Sourced from github.com/opencontainers/runc's changelog.

[1.1.6] - 2023-04-11

In this world nothing is certain but death and taxes.

Compatibility

  • This release can no longer be built from sources using Go 1.16. Using a latest maintained Go 1.20.x or Go 1.19.x release is recommended. Go 1.17 can still be used.

Fixed

  • systemd cgroup v1 and v2 drivers were deliberately ignoring UnitExist error from systemd while trying to create a systemd unit, which in some scenarios may result in a container not being added to the proper systemd unit and cgroup. (#3780, #3806)
  • systemd cgroup v2 driver was incorrectly translating cpuset range from spec's resources.cpu.cpus to systemd unit property (AllowedCPUs) in case of more than 8 CPUs, resulting in the wrong AllowedCPUs setting. (#3808)
  • systemd cgroup v1 driver was prefixing container's cgroup path with the path of PID 1 cgroup, resulting in inability to place PID 1 in a non-root cgroup. (#3811)
  • runc run/start may return "permission denied" error when starting a rootless container when the file to be executed does not have executable bit set for the user, not taking the CAP_DAC_OVERRIDE capability into account. This is a regression in runc 1.1.4, as well as in Go 1.20 and 1.20.1 (#3715, #3817)
  • cgroup v1 drivers are now aware of misc controller. (#3823)
  • Various CI fixes and improvements, mostly to ensure Go 1.19.x and Go 1.20.x compatibility.
Commits
  • 0f48801 VERSION: release 1.1.6
  • 0690c4e merge #3823 into release-1.1
  • e4ce94e libct/cg: add misc controller to v1 drivers
  • 53333a5 Merge pull request #3811 from haircommander/root-cgroup-no-init-1.1
  • 10cfd81 libctr/cgroups: don't take init's cgroup into account
  • 9c1c844 Merge pull request #3817 from kolyshkin/1.1-user-exec
  • d30d240 tests/int: test for CAP_DAC_OVERRIDE
  • 840b953 Fix runc run "permission denied" when rootless
  • c7a72ab Merge pull request #3808 from kolyshkin/1.1-cpuset-byte-order
  • 165d232 tests/int: add a "update cpuset cpus range via v2 unified map" test
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/opencontainers/runc](https://github.com/opencontainers/runc) from 1.1.5 to 1.1.6.
- [Release notes](https://github.com/opencontainers/runc/releases)
- [Changelog](https://github.com/opencontainers/runc/blob/v1.1.6/CHANGELOG.md)
- [Commits](opencontainers/runc@v1.1.5...v1.1.6)

---
updated-dependencies:
- dependency-name: github.com/opencontainers/runc
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Apr 17, 2023
@codecov
Copy link

codecov bot commented Apr 17, 2023

Codecov Report

Merging #435 (15a58dd) into v3 (0d54053) will not change coverage.
The diff coverage is n/a.

❗ Current head 15a58dd differs from pull request most recent head da0bc2a. Consider uploading reports for the commit da0bc2a to get more accurate results

@@           Coverage Diff           @@
##               v3     #435   +/-   ##
=======================================
  Coverage   53.95%   53.95%           
=======================================
  Files           1        1           
  Lines         341      341           
=======================================
  Hits          184      184           
  Misses        121      121           
  Partials       36       36           

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

@alnr alnr merged commit acbc3f6 into v3 Apr 17, 2023
@alnr alnr deleted the dependabot/go_modules/github.com/opencontainers/runc-1.1.6 branch April 17, 2023 15:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant