Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update gomod updates (major) #13

Closed
wants to merge 1 commit into from

Conversation

joejstuart
Copy link
Owner

This PR contains the following updates:

Package Type Update Change
github.com/MakeNowJust/heredoc indirect major v1.0.0 -> v2.0.1
github.com/MakeNowJust/heredoc require major v1.0.0 -> v2.0.1
github.com/alibabacloud-go/cr-20160607 indirect major v1.0.1 -> v2.0.0
github.com/alibabacloud-go/cr-20181201 indirect major v1.0.10 -> v2.5.0
github.com/alibabacloud-go/darabonba-openapi indirect major v0.2.1 -> v2.1.4
github.com/alibabacloud-go/tea-utils indirect major v1.4.5 -> v2.0.7
github.com/apparentlymart/go-textseg/v15 indirect major v15.0.0 -> v16.0.0
github.com/ashanbrown/forbidigo indirect major v1.6.0 -> v2.1.0
github.com/ashanbrown/makezero indirect major v1.2.0 -> v2.0.1
github.com/bytecodealliance/wasmtime-go/v3 indirect major v3.0.2 -> v9.0.0
github.com/cenkalti/backoff/v3 indirect major v3.2.2 -> v5.0.2
github.com/cenkalti/backoff/v4 indirect major v4.3.0 -> v5.0.2
github.com/cespare/xxhash indirect major v1.1.0 -> v2.3.0
github.com/containerd/containerd indirect major v1.7.27 -> v2.0.4
github.com/containerd/errdefs indirect major v0.3.0 -> v1.0.0
github.com/cucumber/gherkin/go/v26 indirect major v26.2.0 -> v32.0.0
github.com/cucumber/messages/go/v21 indirect major v21.0.1 -> v27.2.0
github.com/dgraph-io/badger/v3 indirect major v3.2103.5 -> v4.6.0
github.com/dgraph-io/ristretto indirect major v0.1.1 -> v2.1.0
github.com/docker/cli indirect major v27.2.0+incompatible -> v28.0.2+incompatible
github.com/docker/cli indirect major v27.5.0+incompatible -> v28.0.2+incompatible
github.com/docker/docker indirect major v27.2.0+incompatible -> v28.0.2+incompatible
github.com/docker/docker require major v27.5.0+incompatible -> v28.0.2+incompatible
github.com/go-chi/chi indirect major v4.1.2+incompatible -> v5.2.1
github.com/go-git/gcfg indirect major v1.5.1-0.20230307220236-3a3c6141e376 -> v2.0.1
github.com/go-jose/go-jose/v3 indirect major v3.0.4 -> v4.0.5
github.com/golang-jwt/jwt/v4 indirect major v4.5.1 -> v5.2.1
github.com/golang/snappy indirect major v0.0.4 -> v1.0.0
github.com/google/flatbuffers indirect major v24.3.25+incompatible -> v25.2.10+incompatible
github.com/google/go-github/v55 indirect major v55.0.0 -> v70.0.0
github.com/hashicorp/go-getter indirect major v1.7.6 -> v2.2.3
github.com/hashicorp/go-immutable-radix indirect major v1.3.1 -> v2.1.0
github.com/hashicorp/golang-lru indirect major v1.0.2 -> v2.0.7
github.com/hashicorp/hcl indirect major v1.0.1-vault-5 -> v2.23.0
github.com/imdario/mergo indirect major v0.3.16 -> v1.0.1
github.com/jstemmer/go-junit-report indirect major v1.0.0 -> v2.1.0
github.com/matoous/godox indirect major v0.0.0-20240105082147-c5b5e0e7c0c0 -> v1.1.0
github.com/oklog/ulid indirect major v1.3.1 -> v2.1.0
github.com/open-policy-agent/opa indirect major v0.68.0 -> v1.2.0
github.com/open-policy-agent/opa require major v0.70.0 -> v1.2.0
github.com/pelletier/go-toml indirect major v1.9.5 -> v2.2.3
github.com/santhosh-tekuri/jsonschema/v5 require major v5.3.1 -> v6.0.1
github.com/shirou/gopsutil/v3 indirect major v3.23.12 -> v4.25.2
github.com/shirou/gopsutil/v3 indirect major v3.24.5 -> v4.25.2
github.com/theupdateframework/go-tuf indirect major v0.7.0 -> v2.0.2
github.com/tjfoc/gmsm indirect major v1.4.1 -> v2.0.0
github.com/zeebo/errs indirect major v1.3.0 -> v2.0.5
go.mongodb.org/mongo-driver indirect major v1.16.1 -> v2.1.0
gomodules.xyz/jsonpatch/v2 indirect major v2.4.0 -> v3.0.1
gopkg.in/evanphx/json-patch.v4 indirect major v4.12.0 -> v5.9.11
gopkg.in/go-jose/go-jose.v2 require major v2.6.3 -> v4.0.5
gopkg.in/yaml.v2 indirect major v2.4.0 -> v3.0.1
oras.land/oras-go indirect major v1.2.6 -> v2.5.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

MakeNowJust/heredoc (github.com/MakeNowJust/heredoc)

v2.0.1

Compare Source

Version 2.0.1

Fixes

  • Correct import path for Go modules

v2.0.0

Compare Source

Version 2.0.0

Breaking Changes

  • Treats only white space (U+0020) and horizontal tabs (U+000D) as space characters. (#​6)
alibabacloud-go/cr-20160607 (github.com/alibabacloud-go/cr-20160607)

v2.0.0

Compare Source

  • Generated 2016-06-07 for cr.
alibabacloud-go/cr-20181201 (github.com/alibabacloud-go/cr-20181201)

v2.5.0

Compare Source

  • Support API CreateArtifactLifecycleRule.
  • Support API DeleteArtifactLifecycleRule.
  • Support API GetArtifactLifecycleRule.
  • Support API ListArtifactLifecycleRule.
  • Support API UpdateArtifactLifecycleRule.

v2.4.0

Compare Source

  • Support API ListScanBaselineByTask.
  • Support API ListScanMaliciousFileByTask.
  • Update API GetArtifactBuildRule: update response param.
  • Update API ListRepository: update param RepoStatus.

v2.3.2

Compare Source

  • Generated 2018-12-01 for cr.

v2.3.1

Compare Source

  • Generated 2018-12-01 for cr.

v2.3.0

Compare Source

  • Generated 2018-12-01 for cr.

v2.2.2

Compare Source

  • Generated 2018-12-01 for cr.

v2.2.1

Compare Source

  • Generated 2018-12-01 for cr.

v2.2.0

Compare Source

  • Generated 2018-12-01 for cr.

v2.1.0

Compare Source

  • Generated 2018-12-01 for cr.

v2.0.1

Compare Source

  • Chain api.

v2.0.0

Compare Source

  • Generated 2018-12-01 for cr.
alibabacloud-go/darabonba-openapi (github.com/alibabacloud-go/darabonba-openapi)

v2.1.4

Compare Source

v2.1.3

Compare Source

  • Add ToArray in utils

v2.1.2

Compare Source

  • Solve the Token judge error

v2.1.1

Compare Source

  • add GetRules in utils

v2.1.0

Compare Source

  • Upgrade By Darabonba V2

v2.0.10

Compare Source

Full Changelog: alibabacloud-go/darabonba-openapi@v2.0.9...v2.0.10

v2.0.9

Compare Source

v2.0.8

Compare Source

Support bearer token credentials request.

v2.0.7

Compare Source

Support extends parameters.

v2.0.6

Compare Source

feat: support extends parameters

v2.0.5

Compare Source

v2.0.4: Release version v2.0.4

v2.0.2

Compare Source

Add gateway client setter.

v2.0.1

Compare Source

Return description and accessDeniedDetail in error info.

v2.0.0

Compare Source

Update with tea-utils.

alibabacloud-go/tea-utils (github.com/alibabacloud-go/tea-utils)

v2.0.7

Compare Source

v2.0.6

Compare Source

Support extends query parameters.

v2.0.5

Compare Source

feat: support extends parameters

v2.0.4

Compare Source

Refactor: improve design of nonce

v2.0.3

Compare Source

Support static method AssertAsInteger().

v2.0.2

Compare Source

Fix stringify map value.

v2.0.1

Compare Source

Support ca params for server and client.

v2.0.0

Compare Source

Remove function panic.

apparentlymart/go-textseg (github.com/apparentlymart/go-textseg/v15)

v16.0.0

Compare Source

ashanbrown/forbidigo (github.com/ashanbrown/forbidigo)

v2.1.0

Compare Source

What's Changed

Full Changelog: ashanbrown/forbidigo@v2.0.1...v2.1.0

v2.0.1: Drop golang < 1.18

Compare Source

v2.0.0: Upgrade x/tools

Compare Source

Upgrades x-tools to fix go 1.23, drops support for go < 1.18

ashanbrown/makezero (github.com/ashanbrown/makezero)

v2.0.1

Compare Source

Fix v2 release following https://go.dev/wiki/Modules#releasing-modules-v2-or-higher

v2.0.0: Bump minimum required go version to 1.18 and upgrade deps

Compare Source

What's Changed

New Contributors

Full Changelog: ashanbrown/makezero@v1.2.0...v2.0.0

bytecodealliance/wasmtime-go (github.com/bytecodealliance/wasmtime-go/v3)

v9.0.0

Compare Source

v8.0.0

Compare Source

v7.0.0

Compare Source

v6.0.0

Compare Source

v5.0.0

Compare Source

v4.0.0

Compare Source

cenkalti/backoff (github.com/cenkalti/backoff/v3)

v5.0.2

Compare Source

v5.0.1

Compare Source

v5.0.0

Compare Source

v4.3.0

Compare Source

v4.2.1

Compare Source

v4.2.0

Compare Source

v4.1.3

Compare Source

v4.1.2

Compare Source

v4.1.1

Compare Source

v4.1.0

Compare Source

v4.0.2

Compare Source

v4.0.1

Compare Source

v4.0.0

Compare Source

cespare/xxhash (github.com/cespare/xxhash)

v2.3.0

Compare Source

v2.2.0

Compare Source

v2.1.2

Compare Source

v2.1.1

Compare Source

v2.1.0

Compare Source

v2.0.0

Compare Source

containerd/containerd (github.com/containerd/containerd)

v2.0.4: containerd 2.0.4

Compare Source

Welcome to the v2.0.4 release of containerd!

The fourth patch release for containerd 2.0 includes various bug fixes and updates.

Highlights
  • Fix integer overflow in User ID handling (GHSA-265r-hfxg-fhmg)
  • Respect client.WithTimeout option on connect (#​11536)
  • Update image type checks to avoid unnecessary logs for attestations (#​11537)
Node Resource Interface (NRI)
  • Fix incorrect runtime name being passed to NRI (#​11529)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Akihiro Suda
  • Paweł Gronowski
  • Akhil Mohan
  • Phil Estes
  • Samuel Karp
  • Craig Ingram
  • ningmingxiao
Changes
19 commits

  • 1a43cb6a1 Merge commit from fork
  • 07a0b5419 (cherry picked from commit de1341c)
  • Prepare release notes for v2.0.4 (#​11541)
  • Respect client.WithTimeout option on connect (#​11536)
    • 6b5efba83 client: Respect client.WithTimeout option
  • Update image type checks to avoid unnecessary logs for attestations (#​11537)
    • 916d48722 core/remotes: Handle attestations in MakeRefKey
    • df4d905a6 core/images: Ignore attestations when traversing children
  • Fix incorrect runtime name being passed to NRI (#​11529)
  • update build to go1.23.7, test go1.24.1 (#​11514)
    • e5ad0d0a0 update build to go1.23.7, test go1.24.1
  • docs: include note about unprivileged sysctls (#​11506)
    • a39f1146b docs: include note about unprivileged sysctls
  • e2e: use the shim bundled with containerd artifact (#​11503)
    • 81b3384a0 e2e: use the shim bundled with containerd artifact
  • build(deps): bump containerd/project-checks from 1.1.0 to 1.2.1 (#​11497)
    • 7215a7d2c build(deps): bump containerd/project-checks from 1.1.0 to 1.2.1

Dependency Changes

This release has no dependency changes

Previous release can be found at v2.0.3

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.3: containerd 2.0.3

Compare Source

Welcome to the v2.0.3 release of containerd!

The third patch release for containerd 2.0 includes various bug fixes and updates.

Highlights
  • Update remote content to break up writes to avoid grpc message size limits (#​11457)
  • Update runc binary to v1.2.5 (#​11394)
Container Runtime Interface (CRI)
Node Resource Interface (NRI)
  • Fix initial sync race when registering NRI plugins (#​11329)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Akihiro Suda
  • Mike Brown
  • Phil Estes
  • Akhil Mohan
  • Chifeng Cai
  • Krisztian Litkey
  • Wei Fu
  • Andrey Smirnov
  • Austin Vazquez
  • Chris Henzie
  • Jing Xu
  • Jonathan A. Sternberg
  • Jose Fernandez
  • Kirtana Ashok
  • Lei Liu
  • Maksym Pavlenko
  • Michael Zappa
  • Samuel Karp
  • fengwei0328
  • zounengren
Changes
42 commits

  • Prepare release notes for v2.0.3 (#​11443)
  • Update remote content to break up writes to avoid grpc message size limits (#​11457)
    • eaa7ca80d proxy: break up writes from the remote writer to avoid grpc limits
  • Fix privileged container sysfs can't be rw because pod is ro by default (#​11456)
    • c7f64196f Fix privileged container sysfs can't be rw because pod is ro by default
  • go.{mod,sum}: bump CDI deps to v.0.8.1. (#​11430)
  • Prefer runtime options for PluginInfo request (#​11446)
    • 569af34cb Prefer runtime options for PluginInfo request
  • pkg: prevent oom watcher from depending on shim pkg (#​11439)
    • 0ce93e16a prevent oom watcher depend on shim pkg.
  • CI: arm64-8core-32gb -> ubuntu-24.04-arm (#​11436)
    • f3284aa68 CI: arm64-8core-32gb -> ubuntu-24.04-arm
  • Revert "Add timestamp to PodSandboxStatusResponse for kubernetes Evented PLEG" (#​11403)
    • b5313993c Revert "Add timestamp to PodSandboxStatusResponse for kubernetes Evented PLEG"
  • move the device after the options when using mkfs.ext4 (#​11411)
    • f95a426b8 move the device after the options when using mkfs.ext4
  • update build to go1.23.6, test go1.24.0 (#​11410)
    • 4d19a6adf update build to go1.23.6, test go1.24.0
  • build(deps): bump actions/cache from 4.1.2 to 4.2.0 (#​11405)
    • c738c3aab build(deps): bump actions/cache from 4.1.2 to 4.2.0
  • Upgrade x/net to 0.33.0 to fix vulnerability GHSA-w32m-9786-jp63 (#​11387)
  • Update install-imgcrypt to allow change install repo (#​11357)
    • 0785bd8cc Update install-imgcrypt to allow change install repo
  • Update runc binary to v1.2.5 (#​11394)
  • Update go-cni version to fix Race Condition issue (#​11269)
  • Fix initial sync race when registering NRI plugins (#​11329)
    • 79cdbf61b cri,nri: block NRI plugin sync. during event processing.
  • Update github.com/containerd/imgcrypt to v2.0.0 (#​11325)
    • 9d5cfce83 Update github.com/containerd/imgcrypt to v2.0.0
  • Move CDI device spec out of the OCI package (#​11265)
    • f58939c33 Remove deprecated WithCDIDevices in oci spec opts
    • 3d53430fe Move CDI device spec out of the OCI package
  • update to go1.23.5 / go1.22.11 (#​11297)
  • build(deps): bump google.golang.org/protobuf from 1.35.1 to 1.35.2 (#​11263)
    • 3a6ab80d0 build(deps): bump google.golang.org/protobuf from 1.35.1 to 1.35.2

Changes from containerd/go-cni
2 commits

Dependency Changes
  • github.com/containerd/go-cni v1.1.11 -> v1.1.12
  • github.com/containerd/imgcrypt/v2 v2.0.0-rc.1 -> v2.0.0
  • github.com/containers/ocicrypt v1.2.0 -> v1.2.1
  • github.com/petermattis/goid 4fcff4a new
  • github.com/sasha-s/go-deadlock v0.3.5 new
  • github.com/smallstep/pkcs7 v0.1.1 new
  • golang.org/x/crypto v0.28.0 -> v0.31.0
  • golang.org/x/net v0.30.0 -> v0.33.0
  • golang.org/x/oauth2 v0.22.0 -> v0.23.0
  • golang.org/x/sync v0.8.0 -> v0.10.0
  • golang.org/x/sys v0.26.0 -> v0.28.0
  • golang.org/x/term v0.25.0 -> v0.27.0
  • golang.org/x/text v0.19.0 -> v0.21.0
  • google.golang.org/grpc v1.67.1 -> v1.68.1
  • google.golang.org/protobuf v1.35.1 -> v1.35.2
  • tags.cncf.io/container-device-interface v0.8.0 -> v0.8.1

Previous release can be found at v2.0.2

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.2: containerd 2.0.2

Compare Source

Welcome to the v2.0.2 release of containerd!

The second patch release for containerd 2.0 includes a number of bug fixes and improvements.

Highlights
Container Runtime Interface (CRI)
  • Remove confusing warning in cri runtime config migration (#​11256)
  • Fix runtime platform loading in cri image plugin init (#​11248)
Runtime

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Jin Dong
  • Derek McGowan
  • Akihiro Suda
  • Kazuyoshi Kato
  • Henry Wang
  • Krisztian Litkey
  • Phil Estes
  • Samuel Karp
  • Sebastiaan van Stijn
  • Akhil Mohan
  • Brian Goff
  • Chongyi Zheng
  • Maksym Pavlenko
  • Mike Brown
  • Pierre Gimalac
  • Wei Fu
Changes
23 commits

  • Prepare release notes for v2.0.2 (#​11245)
  • Update platforms to latest rc (#​11259)
  • Remove confusing warning in cri runtime config migration (#​11256)
    • 468079c5c Remove confusing warning in cri runtime config migration
  • Fix runtime platform loading in cri image plugin init (#​11248)
    • a2d9d4fd5 Fix runtime platform loading in cri image plugin init
  • make sure console master tty is closed on task exit (#​11246)
    • 184ffad01 Add integ test to check tty leak
    • 17181ed33 fix master tty leak due to leaking init container object
  • Bump up otelttrpc to 0.1.0 (#​11242)
  • ctr: ctr images import --all-platforms: fix unpack (#​11236)
    • c4270430d ctr: ctr images import --all-platforms: fix unpack
  • Update runc binary to v1.2.4 (#​11239)
  • downgrade go-difflib and go-spew to tagged releases (#​11222)
    • f34147772 downgrade go-difflib and go-spew to tagged releases
  • Add a build tag to disable std plugin import (#​11213)
    • dca769485 chore: add a build tag to disable containerd plugin import
  • Update golangci to 1.60.3 (#​11187)

Changes from containerd/otelttrpc
6 commits

Changes from containerd/platforms
6 commits

Changes from containerd/ttrpc
5 commits

Dependency Changes
  • github.com/containerd/otelttrpc ea5083f -> v0.1.0
  • github.com/containerd/platforms v1.0.0-rc.0 -> v1.0.0-rc.1
  • github.com/containerd/ttrpc v1.2.6 -> v1.2.7
  • github.com/davecgh/go-spew d8f796a -> v1.1.1
  • github.com/pmezard/go-difflib 5d4384e -> v1.0.0
  • github.com/stretchr/testify v1.9.0 -> v1.10.0

Previous release can be found at v2.0.1

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.1: containerd 2.0.1

Compare Source

Welcome to the v2.0.1 release of containerd!

The first patch release for containerd 2.0 includes a number of bug fixes and improvements.

Highlights
Container Runtime Interface (CRI)
Image Distribution
  • Update differ to handle zstd media types (#​11068)
Runtime
  • Update runc binary to v1.2.3 (#​11142)
  • Fix panic due to nil dereference cgroups v2 (#​11098)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Wei Fu
  • Archit Kulkarni
  • Jin Dong
  • Phil Estes
  • Akhil Mohan
  • Akihiro Suda
  • Alexey Lunev
  • Austin Vazquez
  • Maksym Pavlenko
  • Mike Brown
  • Michael Zappa
  • Samuel Karp
  • Sebastiaan van Stijn
  • Andrey Smirnov
  • Davanum Srinivas
Changes
50 commits

  • Prepare release notes for v2.0.1 (#​11158)
  • build(deps): bump actions/attest-build-provenance from 1.4.4 to 2.1.0 (#​11154)
    • fe6957084 build(deps): bump actions/attest-build-provenance from 1.4.4 to 2.1.0
  • update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+ (#​11153)
    • eb2ce6882 update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+
  • ctr pull should unpack for default platform when transfer service is used (#​11139)
    • 44cdca68b ctr pull unpack for default platform using transfer service
  • Fix apply IoOwner options when not in user namespace (#​11151)
    • 018d83650 internal/cri: should not apply IoOwner options
  • Update go-cni for CNI STATUS (#​11146)
    • 5eb7995a9 feat: update go-cni version for CNI STATUS
  • Fix cri grpc plugin config migration (#​11140)
    • a2302ea89 Add integration test for custom configuration
    • be5eda069 complete cri grpc config migration
  • Update runc binary to v1.2.3 (#​11142)
  • Update differ to handle zstd media types (#​11068)
    • 73f57acb0 Update differ to handle zstd media types
  • update to go1.23.4 / go1.22.10 (#​11109)
  • CI: update Fedora to 41 (#​11110)
  • Fix panic due to nil dereference cgroups v2 (#​11098)
    • 3ba2df924 fix panic due to nil dereference cgroups v2
  • Publish attestation as release artifact (#​11067)
    • 34a45cab2 Publish attestation as release artifact
  • Move rockylinux 9.4 to almalinux/9 in CI (#​11053)
    • 7dec6b460 move rocky 9.4 to almalinux/9 in CI
  • *: should align pipe's owner with init process (#​11035)
    • cf07f28ee *: should align pipe's owner with init process
  • fix: set the credentials even if not provided (#​11031)
    • 986088866 fix: set the credentials even if not provided
  • fsverity_test.go: fix nil pointer derefence, fix test fail, fix minor/major device numbers resolving (#​10978)
    • 30b929ece fsverity_test.go: fix major/minor device number resolving
    • 10996a334 fsverity_test.go: fix nil pointer dereference, fix test fail
  • update runc binary to 1.2.2 (#​11023)
  • Revert "Disable vagrant strict dependency checking" (#​11009)
    • 6399c936f Revert "Disable vagrant strict dependency checking"
  • fsverity_linux.go: Fix fsverity.IsEnabled() for big endian systems (#​11005)
    • a7f2b562f fsverity_linux.go: Fix fsverity.IsEnabled() for big endian systems
  • bump github.com/containerd/typeurl/v2 from 2.2.2 to 2.2.3 (#​10997)
    • 389e781ea build(deps): bump github.com/containerd/typeurl/v2 from 2.2.2 to 2.2.3
  • update to go1.23.3 / go1.22.9 (#​10973)
  • ci: enable marking 2.0 releases as latest (#​10963)
    • 458215f6c ci: enable marking 2.0 releases as latest
  • Avoid arch info in the sed/replace when building cri-cni-containerd.tar.gz (#​10968)
    • e99c2b55c Avoid arch info in the sed/replace when building cri-cni-containerd.tar.gz

Changes from containerd/go-cni
7 commits

Dependency Changes
  • github.com/containerd/go-cni v1.1.10 -> v1.1.11
  • github.com/containerd/typeurl/v2 v2.2.2 -> v2.2.3

Previous release can be found at v2.0.0

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.0: containerd 2.0.0

Compare Source

Welcome to the v2.0.0 release of containerd!

The first major release of containerd 2.x focuses on the continued stability of
containerd's core feature set with an easy upgrade from containerd 1.x. This
release includes the stabilization of new features added in the last 1.x release
as well as the removal of features which were deprecated in 1.x. The goal is to
support the vast community of containerd users well into the future along with
their ever increasing deployment footprints and variety of use cases.

See containerd 2.0 documentation for details on what is new and has changed in this release.

Highlights
  • Allow sections of Plugins to be merged, and not overwritten as entire sections. (#​9982)
  • Add Update API for sandbox controller (#​9903)
  • Configure otel from env instead of config.toml (#​8970)
  • Enable NRI by default (#​9744)
  • Add PluginInfo to introspection API (#​9442)
  • Remove overlayfs volatile option on temp mounts (#​9555)
  • Expose usage of deprecated features (#​9258)
  • Use Intel ISA-L's igzip if available (#​9200)
  • Introduce top level config migration (#​9223)
  • Add image delete target (#​8989)
  • Remove LimitNOFILE from containerd.service (#​8924)
  • Add support for image expiration during garbage collection (#​9022)
  • Reduce the contention between ref lock and boltdb lock in content store (#​8792)
  • Remove "containerd.io/restart.logpath" label (#​8264)
  • Remove aufs snapshotter (#​8263)
  • Fix deadlock during NRI plugin registration (containerd/nri#79)
  • Support arm64/v9 and minor variants (containerd/platforms#8)
  • Fix deadlock when writing to pipe blocks (containerd/ttrpc#168)
Build and Release Toolchain

@joejstuart
Copy link
Owner Author

⚠️ Artifact update problem

Renovate failed to update artifacts related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: tools/kubectl/go.sum
Command failed: go get -d -t ./...
go: -d flag is deprecated. -d=true is a no-op
go: github.com/imdario/[email protected]: parsing go.mod:
	module declares its path as: dario.cat/mergo
	        but was required as: github.com/imdario/mergo

File name: tools/go.sum
Command failed: go get -d -t ./...
go: -d flag is deprecated. -d=true is a no-op
go: github.com/imdario/[email protected]: parsing go.mod:
	module declares its path as: dario.cat/mergo
	        but was required as: github.com/imdario/mergo

File name: go.sum
Command failed: go get -d -t ./...
go: -d flag is deprecated. -d=true is a no-op
go: github.com/imdario/[email protected]: parsing go.mod:
	module declares its path as: dario.cat/mergo
	        but was required as: github.com/imdario/mergo

File name: acceptance/go.sum
Command failed: go get -d -t ./...
go: -d flag is deprecated. -d=true is a no-op
go: github.com/imdario/[email protected]: parsing go.mod:
	module declares its path as: dario.cat/mergo
	        but was required as: github.com/imdario/mergo

@joejstuart
Copy link
Owner Author

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

@joejstuart joejstuart closed this Mar 21, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant