v2.1.0
Pre-releaseNote
Binaries are missing in this release due to a bug in the CI pipeline (#4241).
The issue was fixed in v2.1.1.
Changes
-
Experimental support for gomodjail: jail for Go modules (#4012).
gomodjail imposes syscall restrictions on a specific set of Go modules, so as to mitigate their potential vulnerabilities and supply chain attack vectors (see caveats).
Use thenerdctl.gomodjail
binary included in thenerdctl-full
archive. -
Initial support for UserNS-remap mode (#3941, thanks to @Shubhranshu153).
UserNS-remap can be considered a middle between Rootless and Rootful.
In the case of UserNS-remap, the daemon is executed with root privileges, while the containers are executed as a non-root user, to balance security and performance.
To enable UserNS-remap mdoe, specifyuserns_remap = <USERNAME>
innerdctl.toml
, and runnerdctl
as root. -
nerdctl run
:- Support Container Device Interface (CDI) in
--device=example.com/device=foo
flag (#4170, thanks to @elezar and @djdongjin)
- Support Container Device Interface (CDI) in
-
nerdctl ps
:- Add
--status=created
flag (#4196, thanks to @Shubhranshu153)
- Add
-
nerdctl logs
:- Fix logs of restarted containers (#3896, thanks to @Shubhranshu153)
- Fix trailing newlines (#4226, thanks to @fahedouch)
-
Rootless:
- Fix
exec: \"iptables\": executable file not found in $PATH
error on Debian, etc. (#4208)
- Fix
-
Misc:
- Support loong64 architecture (#2533, #4238, thanks to @zhaixiaojuan and @apostasie)
- CI fixes (various PRs, thanks to @apostasie)
-
nerdctl-full:
- Update containerd (2.1.0), RootlessKit (2.3.5), fuse-overlayfs (1.15), containerd-fuse-overlayfs (2.1.5) (#4179, #4217, #4227, thanks to @Shubhranshu153)
Full changes: https://github.com/containerd/nerdctl/pulls?q=is%3Apr+milestone%3Av2.1.0+is%3Aclosed
Thanks to @Shubhranshu153 @apostasie @djdongjin @fahedouch @zhaixiaojuan