🌱 Update containerd/containerd to 2.1.3 #1504
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.7.26
->2.1.3
Release Notes
containerd/containerd (containerd/containerd)
v2.1.3
: containerd 2.1.3Compare Source
Welcome to the v2.1.3 release of containerd!
The third patch release for containerd 2.1 contains various fixes and updates
to address pull issues with some registries.
Highlights
Image Distribution
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
15 commits
627729341
Prepare release notes for v2.1.37636bd5eb
fix when multipart fetching and the server does not return content length3c5ede878
Update transfer supported platforms logicfb752bc8e
fix import for local transfer servicef6d926314
Register remote errors for clients to access registry errors7c1813345
Decode grpc errors in the transfer client proxybabacebad
Fix fetch always adding range to requestsf30be44ad
Update fetcher errors to include full registry errorDependency Changes
This release has no dependency changes
Previous release can be found at v2.1.2
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.1.2
: containerd 2.1.2Compare Source
Welcome to the v2.1.2 release of containerd!
The second patch release for containerd 2.1 contains various fixes and updates.
Highlights
Go client
Image Distribution
Runtime
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
28 commits
63b9eae62
Prepare release notes for v2.1.2cff1feb28
*: properly shutdown non-groupable shims to prevent resource leaks2ce169aae
ci: bump golang [1.23.10,1.24.4] in build and release70bcb9b55
Enable CIs to run on WS2022 and WS202540575a15f
cri:use debug level when receive exec process exited eventsc71f77170
build(deps): bump google.golang.org/grpc from 1.72.0 to 1.72.24bcea74de
Update differ selection in transfer service to prefer default0c3cd8a99
Add debug log when transfer returns not implemented820e56765
Add more error details when unpack fails to extract9b6c1949a
Fetch image with default platform only in TestExportAndImportMultiLayer480126f50
erofs-snapshotter: fix to work with wrapped errorsd82921ff5
Enable DuplicationSuppressor in transfer service0bb25c3d6
ci: bump golang [1.23.9, 1.24.3] in build and releaseac8e84efc
client:improve mount error messagedd2ce49d0
Add symlink breakout test for overriden pathDependency Changes
Previous release can be found at v2.1.1
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.1.1
: containerd 2.1.1Compare Source
Welcome to the v2.1.1 release of containerd!
The first patch release for containerd 2.1 fixes a critical vulnernability (CVE-2025-47290)
which was first introduced in 2.1.0. See the Github Advisory
for more details. This release also contains a few smaller updates and bux fixes.
Highlights
Image Storage
Runtime
Deprecations
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
17 commits
cb1076646
Merge commit from fork216667ba0
Prepare release notes for 2.1.1ac00b8e61
Revert "perf(applyNaive): avoid walking the tree for each file in the same directory"444ca17cd
update runhcs version to v0.13.00684f1c44
build(deps): bump github.com/Microsoft/hcsshime1817a401
docs/snapshotters/erofs.md: a tip for improved performance2168cb92c
erofs-differ: fix EROFS native image support7fcbc3c46
core/runtime/v2: cleanup shim-cleanup logs37d6c4236
Update removal version for deprecated registry config fieldse7be076d4
ctr:make sure containerd socket exist before create clientc90524d5f
.github: mark 2.1 releases as latestDependency Changes
Previous release can be found at v2.1.0
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.1.0
: containerd 2.1.0Compare Source
Welcome to the v2.1.0 release of containerd!
The first minor release of containerd 2.x focuses on continued stability alongside
new features and improvements. This is the first time-based released for containerd.
Most the feature set and core functionality has long been stable and harderened in production
environments, so now we transition to a balance of timely delivery of new functionality
with the same high confidence in stability and performance.
Highlights
Container Runtime Interface (CRI)
Image Distribution
Node Resource Interface (NRI)
Runtime
Breaking
Deprecations
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Dependency Changes
ea5083f
-> v0.1.0d8f796a
-> v1.1.14fcff4a
new5d4384e
-> v1.0.00e7078e
aacd6d4
->2d47ceb
5fefd90
->56aae31
324edc3
->56aae31
18e509b
->3ea5e8c
bc3834c
->9aa6b5e
Previous release can be found at v2.0.0
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.0.5
: containerd 2.0.5Compare Source
Welcome to the v2.0.5 release of containerd!
The fifth patch release for containerd 2.0 includes various bug fixes and updates.
Highlights
Build and Release Toolchain
Container Runtime Interface (CRI)
Image Distribution
Runtime
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
33 commits
5bcf0a95e
use go1.23.8 as the default go version4838f33f7
update to go 1.24.2, 1.23.8a8082cd60
Prepare release notes for v2.0.558b715ad8
Disable arm64 criu testing in GH Actionsb4a53e826
disable portmap test in ubuntu-22 to make CI happy4bcf472de
add option to skip tests in critest8a638b71a
Prevent panic in Docker pusher.84d9658c3
Set default differ for the default unpack config of transfer serviceb184a97d3
ci: update GitHub Actions release runner to ubuntu-24.04e04543db0
use shimCtx for fifo copy9f46e7a44
integration/client: add tests for TaskOptions is not empty8a16a6a04
prefer task options for PluginInfo requesta183b2d23
update taskOptions based on runtimeOptions when creating a task091143135
*: CRIImageService should delete image synchronouslyc2372c072
Update runc binary to v1.2.6e8506511b
go.{mod,sum}: bump CDI deps to stable v1.0.0.4cfb89430
go.mod: github.com/go-jose/go-jose/v42b9e6a29d
go.mod: golang.org/x/oauth2 v0.28.06df1ea0d9
go.mod: golang.org/x/net v0.37.016f20abdf
Fix CI lint errorDependency Changes
Previous release can be found at v2.0.4
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.0.4
: containerd 2.0.4Compare Source
Welcome to the v2.0.4 release of containerd!
The fourth patch release for containerd 2.0 includes various bug fixes and updates.
Highlights
client.WithTimeout
option on connect (#11536)Node Resource Interface (NRI)
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
19 commits
1a43cb6a1
Merge commit from fork07a0b5419
(cherry picked from commitde1341c
)06a886a8e
Prepare release notes for v2.0.4client.WithTimeout
option on connect (#11536)6b5efba83
client: Respectclient.WithTimeout
option916d48722
core/remotes: Handle attestations in MakeRefKeydf4d905a6
core/images: Ignore attestations when traversing children4f037050c
add name in package versione5ad0d0a0
update build to go1.23.7, test go1.24.1a39f1146b
docs: include note about unprivileged sysctls81b3384a0
e2e: use the shim bundled with containerd artifact7215a7d2c
build(deps): bump containerd/project-checks from 1.1.0 to 1.2.1Dependency Changes
This release has no dependency changes
Previous release can be found at v2.0.3
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.0.3
: containerd 2.0.3Compare Source
Welcome to the v2.0.3 release of containerd!
The third patch release for containerd 2.0 includes various bug fixes and updates.
Highlights
Container Runtime Interface (CRI)
Node Resource Interface (NRI)
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
42 commits
b8dde9189
Prepare release notes for v2.0.3eaa7ca80d
proxy: break up writes from the remote writer to avoid grpc limitsc7f64196f
Fix privileged container sysfs can't be rw because pod is ro by default92ae2951f
Update CDI dependency to v0.8.1.569af34cb
Prefer runtime options for PluginInfo request0ce93e16a
prevent oom watcher depend on shim pkg.f3284aa68
CI: arm64-8core-32gb -> ubuntu-24.04-armb5313993c
Revert "Add timestamp to PodSandboxStatusResponse for kubernetes Evented PLEG"f95a426b8
move the device after the options when using mkfs.ext44d19a6adf
update build to go1.23.6, test go1.24.0c738c3aab
build(deps): bump actions/cache from 4.1.2 to 4.2.0fcf64305c
Update vendor files to fix build failured3437eb29
Upgrade x/net to 0.33.00785bd8cc
Update install-imgcrypt to allow change install repo697c59c63
Update runc binary to v1.2.506891f899
fix go-cni race condition79cdbf61b
cri,nri: block NRI plugin sync. during event processing.9d5cfce83
Update github.com/containerd/imgcrypt to v2.0.0f58939c33
Remove deprecated WithCDIDevices in oci spec opts3d53430fe
Move CDI device spec out of the OCI package1f4e5688e
update to go1.23.5 / go1.22.113a6ab80d0
build(deps): bump google.golang.org/protobuf from 1.35.1 to 1.35.2Changes from containerd/go-cni
2 commits
75a2440
fix: recursive RLock() mutex acquisionDependency Changes
4fcff4a
newPrevious release can be found at v2.0.2
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.
v2.0.2
: containerd 2.0.2Compare Source
Welcome to the v2.0.2 release of containerd!
The second patch release for containerd 2.0 includes a number of bug fixes and improvements.
Highlights
Container Runtime Interface (CRI)
Runtime
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
23 commits
cdaf4dfb4
Prepare release notes for v2.0.2eb125e1dd
Update platforms to latest rc468079c5c
Remove confusing warning in cri runtime config migrationa2d9d4fd5
Fix runtime platform loading in cri image plugin init184ffad01
Add integ test to check tty leak17181ed33
fix master tty leak due to leaking init container object8666e7422
Bump up otelttrpc to 0.1.0ctr images import --all-platforms
: fix unpack (#11236)c4270430d
ctr:ctr images import --all-platforms
: fix unpack7373ddd70
update runc binary to v1.2.4f34147772
downgrade go-difflib and go-spew to tagged releasesplugin
import ([#&#Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.