🌱 Update containerd/containerd to 2.0.1 #1504
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.7.24
->2.0.1
Release Notes
containerd/containerd (containerd/containerd)
v2.0.1
: containerd 2.0.1Compare Source
Welcome to the v2.0.1 release of containerd!
The first patch release for containerd 2.0 includes a number of bug fixes and improvements.
Highlights
Container Runtime Interface (CRI)
Image Distribution
Runtime
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
50 commits
b0ece5dc5
Prepare release notes for v2.0.1fe6957084
build(deps): bump actions/attest-build-provenance from 1.4.4 to 2.1.0eb2ce6882
update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+44cdca68b
ctr pull unpack for default platform using transfer service018d83650
internal/cri: should not apply IoOwner options5eb7995a9
feat: update go-cni version for CNI STATUSa2302ea89
Add integration test for custom configurationbe5eda069
complete cri grpc config migrationa53eff53d
update runc binary to v1.2.373f57acb0
Update differ to handle zstd media types290e8bc70
update to go1.23.4 / go1.22.1062b790bfa
CI: update Fedora to 413ba2df924
fix panic due to nil dereference cgroups v234a45cab2
Publish attestation as release artifact7dec6b460
move rocky 9.4 to almalinux/9 in CIcf07f28ee
*: should align pipe's owner with init process986088866
fix: set the credentials even if not provided30b929ece
fsverity_test.go: fix major/minor device number resolving10996a334
fsverity_test.go: fix nil pointer dereference, fix test fail9081e979f
update runc binary to 1.2.26399c936f
Revert "Disable vagrant strict dependency checking"a7f2b562f
fsverity_linux.go: Fix fsverity.IsEnabled() for big endian systems389e781ea
build(deps): bump github.com/containerd/typeurl/v2 from 2.2.2 to 2.2.35b879f30c
update to go1.23.3 / go1.22.9458215f6c
ci: enable marking 2.0 releases as lateste99c2b55c
Avoid arch info in the sed/replace when building cri-cni-containerd.tar.gzChanges from containerd/go-cni
7 commits
208eca9
support CNI status verb386f475
Fix ci.yml indenta9b0675
Another doc commit to trigger lint?14af454
Bump github actions dependency versions9e0d096
Trivial doc commit to trigger lintDependency Changes
Previous release can be found at v2.0.0
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.0.0
: containerd 2.0.0Compare Source
Welcome to the v2.0.0 release of containerd!
The first major release of containerd 2.x focuses on the continued stability of
containerd's core feature set with an easy upgrade from containerd 1.x. This
release includes the stabilization of new features added in the last 1.x release
as well as the removal of features which were deprecated in 1.x. The goal is to
support the vast community of containerd users well into the future along with
their ever increasing deployment footprints and variety of use cases.
See containerd 2.0 documentation for details on what is new and has changed in this release.
Highlights
LimitNOFILE
fromcontainerd.service
(#8924)aufs
snapshotter (#8263)Build and Release Toolchain
cri-containerd-*.tar.gz
release bundles (#9096)Container Runtime Interface (CRI)
Go client
Image Distribution
Runtime
io.containerd.runtime.v1.linux
andio.containerd.runc.v1
(#8262)Security Advisories
Breaking
disable_cgroup
from CRI config (#10594)LimitNOFILE
fromcontainerd.service
(#8924)io.containerd.runtime.v1.linux
andio.containerd.runc.v1
(#8262)aufs
snapshotter (#8263)Deprecations
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Dependency Changes
1f10f66
->e8a1dd7
5330a85
->2b5cbb2
ea5083f
newd8f796a
a7dc8b6
newcca7078
new3a7f492
-> v1.1.0946c877
->2e043c6
5d4384e
78d3cae
->7828495
2eb08e3
-> v0.0.4686a1a2
new432b235
-> v0.9.0aacd6d4
new90d013b
-> v0.3.05fefd90
new324edc3
newa5ecb01
->18e509b
f223a00
->bc3834c
Previous release can be found at v1.7.0
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.