Skip to content
Success

Changes

Summary

  1. [PSEC-630] Add CODEOWNERS (details)
Commit 01d6d2d73d973bcfc655bbfc048b3d28eacda2d2 by twelsh-aw
[PSEC-630] Add CODEOWNERS
The file was added.github/CODEOWNERS

Summary

  1. chore: fix mismatched function names in godoc (details)
  2. Restore the SetKey prestart hook. (details)
  3. Restore the SetKey prestart hook. (details)
  4. ci: update workflow artifacts retention (details)
  5. CONTRIBUTING.md: update Slack link (details)
  6. api: normalize the default NetworkMode (details)
  7. daemon: don't call NetworkMode.IsDefault() (details)
  8. Fix cases where we are wrapping a nil error (details)
  9. save: Remove platform from config descriptor (details)
  10. Minor fix for illumos support (details)
  11. vendor: golang.org/x/net v0.22.0, golang.org/x/crypto v0.21.0 (details)
  12. vendor: golang.org/x/net v0.23.0 (details)
  13. update to go1.21.9 (details)
  14. Move dummy DNS server to integration/internal/network (details)
  15. github/ci: Check if backport is opened against the expected branch (details)
  16. ci/validate-pr: Use `::error::` command to print errors (details)
  17. update containerd binary to v1.7.15 (details)
  18. vendor: github.com/containerd/containerd v1.7.15 (details)
  19. Enable DNS proxying for ipvlan-l3 (details)
  20. Stop macvlan with no parent from using ext-dns (details)
  21. Run ipvlan tests even if 'modprobe ipvlan' fails (details)
  22. Disable IPv6 for endpoints in '--ipv6=false' networks. (details)
  23. Fix typo (details)
  24. vendor: github.com/moby/swarmkit/v2 master (f3ffc0881d0e) (details)
  25. daemon/cluster/executor: Add volume `Subpath` (details)
  26. Add netiputil.AddrPortFromNet() (details)
  27. daemon: add nolint-comments for deprecated kernel-memory options, hooks (details)
  28. vendor: github.com/opencontainers/runtime-spec v1.2.0 (details)
  29. Update tags.cncf.io/container-device-interface to v0.7.1 (details)
  30. Windows DNS resolver forwarding (details)
  31. builder/normalizeWorkdir: Always return cleaned path (details)
  32. container/SetupWorkingDirectory: Don't mutate config (details)
  33. nil dereference fix on image history Created value (details)
  34. Include more details in errnotManifestOrIndex (details)
  35. c8d/list: Ignore unexpected image target (details)
  36. vendor: github.com/cilium/ebpf v0.12.3 (details)
  37. Dockerfile: update docker CLI to v26.1.0 (details)
  38. vendor: golang.org/x/mod v0.17.0 (details)
  39. vendor: golang.org/x/tools v0.16.0 (details)
  40. vendor: github.com/Microsoft/go-winio v0.6.2 (details)
Commit 14a8fac0921dd8a6c36e378f6b5139a06e878f64 by mayangang
chore: fix mismatched function names in godoc

Signed-off-by: George Ma <mayangang@outlook.com>
The file was modified profiles/apparmor/apparmor.go (diff)
The file was modified libnetwork/drivers/remote/driver.go (diff)
Commit fde80fe2e731f04ce029dc93fcdadeccabe2921b by rob.murray
Restore the SetKey prestart hook.

Partially reverts 0046b16 "daemon: set libnetwork sandbox key w/o OCI hook"

Running SetKey to store the OCI Sandbox key after task creation, rather
than from the OCI prestart hook, meant it happened after sysctl settings
were applied by the runtime - which was the intention, we wanted to
complete Sandbox configuration after IPv6 had been disabled by a sysctl
if that was going to happen.

But, it meant '--sysctl' options for a specfic network interface caused
container task creation to fail, because the interface is only moved into
the network namespace during SetKey.

This change restores the SetKey prestart hook, and regenerates config
files that depend on the container's support for IPv6 after the task has
been created. It also adds a regression test that makes sure it's possible
to set an interface-specfic sysctl.

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified daemon/oci_linux.go (diff)
The file was modified daemon/start_linux.go (diff)
The file was modified integration/networking/bridge_test.go (diff)
The file was modified libnetwork/sandbox_linux.go (diff)
The file was modified libnetwork/osl/namespace_linux.go (diff)
Commit 1014f481de85ca2fccc0b51fc7a447173946b0e4 by rob.murray
Restore the SetKey prestart hook.

Partially reverts 0046b16 "daemon: set libnetwork sandbox key w/o OCI hook"

Running SetKey to store the OCI Sandbox key after task creation, rather
than from the OCI prestart hook, meant it happened after sysctl settings
were applied by the runtime - which was the intention, we wanted to
complete Sandbox configuration after IPv6 had been disabled by a sysctl
if that was going to happen.

But, it meant '--sysctl' options for a specfic network interface caused
container task creation to fail, because the interface is only moved into
the network namespace during SetKey.

This change restores the SetKey prestart hook, and regenerates config
files that depend on the container's support for IPv6 after the task has
been created. It also adds a regression test that makes sure it's possible
to set an interface-specfic sysctl.

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified daemon/start_linux.go (diff)
The file was modified integration/networking/bridge_test.go (diff)
The file was modified daemon/oci_linux.go (diff)
The file was modified libnetwork/osl/namespace_linux.go (diff)
The file was modified libnetwork/sandbox_linux.go (diff)
Commit aff003139c212397e38cc98a834ef9cd8a56e93a by github
ci: update workflow artifacts retention

Signed-off-by: CrazyMax <1951866+crazy-max@users.noreply.github.com>
The file was modified .github/workflows/.windows.yml (diff)
The file was modified .github/workflows/.test.yml (diff)
The file was modified .github/workflows/ci.yml (diff)
Commit c187f95fe10ecdb946aad00fb8c658e65376288f by Paweł Gronowski
CONTRIBUTING.md: update Slack link

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified CONTRIBUTING.md (diff)
Commit 4eed3dcdfeb147529339e06f2dceecf43caed45a by Albin Kerouanton
api: normalize the default NetworkMode

The NetworkMode "default" is now normalized into the value it
aliases ("bridge" on Linux and "nat" on Windows) by the
ContainerCreate endpoint, the legacy image builder, Swarm's
cluster executor and by the container restore codepath.

builder-next is left untouched as it already uses the normalized
value (ie. bridge).

Going forward, this will make maintenance easier as there's one
less NetworkMode to care about.

Signed-off-by: Albin Kerouanton <albinker@gmail.com>
The file was modified builder/dockerfile/internals.go (diff)
The file was modified daemon/cluster/executor/container/adapter.go (diff)
The file was modified daemon/daemon.go (diff)
The file was modified api/server/router/container/container_routes.go (diff)
Commit c4689034fdad6a7ffbf45e62131d9a412ed07f77 by Albin Kerouanton
daemon: don't call NetworkMode.IsDefault()

Previous commit made this unnecessary.

Signed-off-by: Albin Kerouanton <albinker@gmail.com>
The file was modified api/server/router/container/container_routes.go (diff)
The file was modified daemon/inspect.go (diff)
The file was modified daemon/container_operations.go (diff)
Commit 0a48d26fbcb33a84da7f767c2a62cae362df9505 by Brian Goff
Fix cases where we are wrapping a nil error

This was using `errors.Wrap` when there was no error to wrap, meanwhile
we are supposed to be creating a new error.

Found this while investigating some log corruption issues and
unexpectedly getting a nil reader and a nil error from `getTailReader`.

Signed-off-by: Brian Goff <cpuguy83@gmail.com>
The file was modified daemon/logger/local/read.go (diff)
Commit 9160b9fda6a75ee68e9e208b32fd7e4fd843a260 by Brian Goff
save: Remove platform from config descriptor

This was brought up by bmitch that its not expected to have a platform
object in the config descriptor.
Also checked with tianon who agreed, its not _wrong_ but is unexpected
and doesn't neccessarily make sense to have it there.

Also, while technically incorrect, ECR is throwing an error when it sees
this.

Signed-off-by: Brian Goff <cpuguy83@gmail.com>
The file was modified image/tarexport/save.go (diff)
Commit cf933115b667db61fa802d1c3b441664bf92aa60 by siepkes
Minor fix for illumos support

illumos is the opensource continuation of OpenSolaris after Oracle
closed to source it (again).

For example use see: https://github.com/openbao/openbao/pull/205.

Signed-off-by: Jasper Siepkes <siepkes@serviceplanet.nl>
The file was addedpkg/system/stat_illumos.go
Commit e1ca74361bc975ba85d998c040369c5839329d3b by Sebastiaan van Stijn
vendor: golang.org/x/net v0.22.0, golang.org/x/crypto v0.21.0

full diffs changes relevant to vendored code:

- https://github.com/golang/net/compare/v0.18.0...v0.22.0
    - websocket: add support for dialing with context
    - http2: remove suspicious uint32->v conversion in frame code
    - http2: send an error of FLOW_CONTROL_ERROR when exceed the maximum octets
- https://github.com/golang/crypto/compare/v0.17.0...v0.21.0
    - internal/poly1305: drop Go 1.12 compatibility
    - internal/poly1305: improve sum_ppc64le.s
    - ocsp: don't use iota for externally defined constants

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/golang.org/x/crypto/ocsp/ocsp.go (diff)
The file was removedvendor/golang.org/x/crypto/internal/poly1305/bits_compat.go
The file was modified vendor/golang.org/x/crypto/internal/poly1305/sum_generic.go (diff)
The file was modified vendor/golang.org/x/net/http2/frame.go (diff)
The file was modified vendor/golang.org/x/net/http2/transport.go (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor/golang.org/x/net/websocket/dial.go (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/golang.org/x/crypto/internal/poly1305/sum_ppc64le.s (diff)
The file was modified vendor/golang.org/x/net/websocket/client.go (diff)
The file was removedvendor/golang.org/x/crypto/internal/poly1305/bits_go1.13.go
The file was modified vendor.mod (diff)
Commit d66589496e5ab42d31f3fddaf8075fb37f1b77c6 by Sebastiaan van Stijn
vendor: golang.org/x/net v0.23.0

full diff: https://github.com/golang/net/compare/v0.22.0...v0.23.0

Includes a fix for CVE-2023-45288, which is also addressed in go1.22.2
and go1.21.9;

> http2: close connections when receiving too many headers
>
> Maintaining HPACK state requires that we parse and process
> all HEADERS and CONTINUATION frames on a connection.
> When a request's headers exceed MaxHeaderBytes, we don't
> allocate memory to store the excess headers but we do
> parse them. This permits an attacker to cause an HTTP/2
> endpoint to read arbitrary amounts of data, all associated
> with a request which is going to be rejected.
>
> Set a limit on the amount of excess header frames we
> will process before closing a connection.
>
> Thanks to Bartek Nowotarski for reporting this issue.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/modules.txt (diff)
The file was modified vendor.sum (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/golang.org/x/net/http2/pipe.go (diff)
The file was modified vendor/golang.org/x/net/http2/frame.go (diff)
The file was addedvendor/golang.org/x/net/http2/testsync.go
The file was modified vendor/golang.org/x/net/http2/transport.go (diff)
The file was modified vendor/golang.org/x/net/http2/server.go (diff)
Commit 329d403e209dd66691321430cf162d0daf6f9023 by Paweł Gronowski
update to go1.21.9

go1.21.9 (released 2024-04-03) includes a security fix to the net/http
package, as well as bug fixes to the linker, and the go/types and
net/http packages. See the [Go 1.21.9 milestone](https://github.com/golang/go/issues?q=milestone%3AGo1.21.9+label%3ACherryPickApproved)
for more details.

These minor releases include 1 security fixes following the security policy:

- http2: close connections when receiving too many headers

Maintaining HPACK state requires that we parse and process all HEADERS
and CONTINUATION frames on a connection. When a request's headers exceed
MaxHeaderBytes, we don't allocate memory to store the excess headers but
we do parse them. This permits an attacker to cause an HTTP/2 endpoint
to read arbitrary amounts of header data, all associated with a request
which is going to be rejected. These headers can include Huffman-encoded
data which is significantly more expensive for the receiver to decode
than for an attacker to send.

Set a limit on the amount of excess header frames we will process before
closing a connection.

Thanks to Bartek Nowotarski (https://nowotarski.info/) for reporting this issue.

This is CVE-2023-45288 and Go issue https://go.dev/issue/65051.

View the release notes for more information:
https://go.dev/doc/devel/release#go1.22.2

- https://github.com/golang/go/issues?q=milestone%3AGo1.21.9+label%3ACherryPickApproved
- full diff: https://github.com/golang/go/compare/go1.21.8...go1.21.9

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified Dockerfile.windows (diff)
The file was modified .github/workflows/.test.yml (diff)
The file was modified hack/dockerfiles/generate-files.Dockerfile (diff)
The file was modified .github/workflows/test.yml (diff)
The file was modified .github/workflows/buildkit.yml (diff)
The file was modified Dockerfile (diff)
The file was modified .github/workflows/.windows.yml (diff)
The file was modified Dockerfile.simple (diff)
Commit d8b768149b21db9c9e831f7b899d1018d0ad64b9 by rob.murray
Move dummy DNS server to integration/internal/network

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified integration/networking/resolvconf_test.go (diff)
The file was addedintegration/internal/network/dns.go
Commit 61269e718fbdbbad397b0089105ec910fc0e62ca by Paweł Gronowski
github/ci: Check if backport is opened against the expected branch

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified .github/workflows/validate-pr.yml (diff)
Commit fb92caf2aa6cf3664e11dc06ee10d114af300826 by Paweł Gronowski
ci/validate-pr: Use `::error::` command to print errors

This will make Github render the log line as an error.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified .github/workflows/validate-pr.yml (diff)
Commit 3485cfbb1e6252f0d73f6e69829539fa4bec1dd3 by Paweł Gronowski
update containerd binary to v1.7.15

Update the containerd binary that's used in CI

- full diff: https://github.com/containerd/containerd/compare/v1.7.13...v1.7.15
- release notes: https://github.com/containerd/containerd/releases/tag/v1.7.15

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified Dockerfile.windows (diff)
The file was modified hack/dockerfile/install/containerd.installer (diff)
The file was modified Dockerfile (diff)
Commit 5ae5969739518d80dfe889878bb4f835d4d77a01 by Paweł Gronowski
vendor: github.com/containerd/containerd v1.7.15

full diff: https://github.com/containerd/containerd/compare/v1.7.14...v1.7.15

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified vendor/github.com/containerd/containerd/version/version.go (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/github.com/containerd/containerd/images/archive/exporter.go (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/modules.txt (diff)
Commit 17b863154573d998394be336fe1487827071b019 by rob.murray
Enable DNS proxying for ipvlan-l3

The internal DNS resolver should only forward requests to external
resolvers if the libnetwork.Sandbox served by the resolver has external
network access (so, no forwarding for '--internal' networks).

The test for external network access was whether the Sandbox had an
Endpoint with a gateway configured.

However, an ipvlan-l3 networks with external network access does not
have a gateway, it has a default route bound to an interface.

Also, we document that an ipvlan network with no parent interface is
equivalent to a '--internal' network. But, in this case, an ipvlan-l2
network was configured with a gateway. So, DNS proxying would be enabled
in the internal resolver (and, if the host's resolver was on a localhost
address, requests to external resolvers from the host's network
namespace would succeed).

So, this change adjusts the test for enabling DNS proxying to include
a check for '--internal' (as a shortcut) and, for non-internal networks,
checks for a default route as well as a gateway. It also disables
configuration of a gateway or a default route for an ipvlan Endpoint if
no parent interface is specified.

(Note if a parent interface with no external network is supplied as
'-o parent=<dummy>', the gateway/default route will still be set up
and external DNS proxying will be enabled. The network must be
configured as '--internal' to prevent that from happening.)

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified libnetwork/sandbox.go (diff)
The file was modified libnetwork/drivers/ipvlan/ipvlan_joinleave.go (diff)
The file was modified libnetwork/endpoint_info.go (diff)
The file was modified integration/network/ipvlan/ipvlan_test.go (diff)
The file was modified libnetwork/sandbox_dns_unix.go (diff)
The file was modified libnetwork/endpoint.go (diff)
The file was modified libnetwork/drivers/ipvlan/ipvlan_network.go (diff)
Commit cd7240f6d94359b873fd8f7db02495a8322c0b2d by rob.murray
Stop macvlan with no parent from using ext-dns

We document that an macvlan network with no parent interface is
equivalent to a '--internal' network. But, in this case, an macvlan
network was still configured with a gateway. So, DNS proxying would
be enabled in the internal resolver (and, if the host's resolver
was on a localhost address, requests to external resolvers from the
host's network namespace would succeed).

This change disables configuration of a gateway for a macvlan Endpoint
if no parent interface is specified.

(Note if a parent interface with no external network is supplied as
'-o parent=<dummy>', the gateway will still be set up. Documentation
will need to be updated to note that '--internal' should be used to
prevent DNS request forwarding in this case.)

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified libnetwork/drivers/macvlan/macvlan_joinleave.go (diff)
The file was modified integration/network/macvlan/macvlan_test.go (diff)
The file was modified libnetwork/drivers/macvlan/macvlan_network.go (diff)
Commit 9954d7c6bd2023a85ca3e5daa9aafb4a6adbce93 by rob.murray
Run ipvlan tests even if 'modprobe ipvlan' fails

This reverts commit a77e147d322c153ae1c2ae0ee45c1835c109e231.

The ipvlan integration tests have been skipped in CI because of a check
intended to ensure the kernel has ipvlan support - which failed, but
seems to be unnecessary (probably because kernels have moved on).

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified integration/network/ipvlan/ipvlan_test.go (diff)
Commit 57dd56726a5bb581b09661929927aa443d530b69 by rob.murray
Disable IPv6 for endpoints in '--ipv6=false' networks.

No IPAM IPv6 address is given to an interface in a network with
'--ipv6=false', but the kernel would assign a link-local address and,
in a macvlan/ipvlan network, the interface may get a SLAAC-assigned
address.

So, disable IPv6 on the interface to avoid that.

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified integration/networking/bridge_test.go (diff)
The file was modified integration/network/macvlan/macvlan_test.go (diff)
The file was modified integration/network/ipvlan/ipvlan_test.go (diff)
The file was modified libnetwork/osl/interface_linux.go (diff)
Commit f51e18f58e09bfc6f6596461f6250504d8d19b42 by victor.toni
Fix typo

Signed-off-by: Victor Toni <victor.toni@gmail.com>
The file was modified libnetwork/drivers/overlay/joinleave.go (diff)
Commit 5368c3a04f8422e3da6b515838ddf33ee9620421 by Paweł Gronowski
vendor: github.com/moby/swarmkit/v2 master (f3ffc0881d0e)

full diff: https://github.com/moby/swarmkit/compare/911c97650f2e...f3ffc0881d0e

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified vendor/modules.txt (diff)
The file was modified vendor/github.com/moby/swarmkit/v2/api/types.pb.go (diff)
The file was modified vendor.sum (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/github.com/moby/swarmkit/v2/api/types.proto (diff)
The file was modified vendor/github.com/moby/swarmkit/v2/api/api.pb.txt (diff)
Commit d3c051318f1576ecadf04657b328792ef6513a5d by Paweł Gronowski
daemon/cluster/executor: Add volume `Subpath`

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified daemon/cluster/convert/service_test.go (diff)
The file was modified daemon/cluster/executor/container/container.go (diff)
The file was modified daemon/cluster/convert/container.go (diff)
Commit f07644e17e151307d4fe302ee3b292d866b56de9 by rob.murray
Add netiputil.AddrPortFromNet()

Co-authored-by: Cory Snider <csnider@mirantis.com>
Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified libnetwork/internal/netiputil/netiputil.go (diff)
Commit f5209d23a8a9df3db6287a1e2c60638be1bf920c by Sebastiaan van Stijn
daemon: add nolint-comments for deprecated kernel-memory options, hooks

This adds some nolint-comments for the deprecated kernel-memory options; we
deprecated these, but they could technically still be accepted by alternative
runtimes.

    daemon/daemon_unix.go:108:3: SA1019: memory.Kernel is deprecated: kernel-memory limits are not supported in cgroups v2, and were obsoleted in [kernel v5.4]. This field should no longer be used, as it may be ignored by runtimes. (staticcheck)
            memory.Kernel = &config.KernelMemory
            ^
    daemon/update_linux.go:63:3: SA1019: memory.Kernel is deprecated: kernel-memory limits are not supported in cgroups v2, and were obsoleted in [kernel v5.4]. This field should no longer be used, as it may be ignored by runtimes. (staticcheck)
            memory.Kernel = &resources.KernelMemory
            ^

Prestart hooks are deprecated, and more granular hooks should be used instead.
CreateRuntime are the closest equivalent, and executed in the same locations
as Prestart-hooks, but depending on what these hooks do, possibly one of the
other hooks could be used instead (such as CreateContainer or StartContainer).
As these hooks are still supported, this patch adds nolint comments, but adds
some TODOs to consider migrating to something else;

    daemon/nvidia_linux.go:86:2: SA1019: s.Hooks.Prestart is deprecated: use [Hooks.CreateRuntime], [Hooks.CreateContainer], and [Hooks.StartContainer] instead, which allow more granular hook control during the create and start phase. (staticcheck)
        s.Hooks.Prestart = append(s.Hooks.Prestart, specs.Hook{
        ^

    daemon/oci_linux.go:76:5: SA1019: s.Hooks.Prestart is deprecated: use [Hooks.CreateRuntime], [Hooks.CreateContainer], and [Hooks.StartContainer] instead, which allow more granular hook control during the create and start phase. (staticcheck)
                    s.Hooks.Prestart = append(s.Hooks.Prestart, specs.Hook{
                    ^

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified daemon/nvidia_linux.go (diff)
The file was modified daemon/daemon_unix.go (diff)
The file was modified daemon/update_linux.go (diff)
The file was modified daemon/oci_linux.go (diff)
Commit 0d6a1a212b00b67543e83e9cc4a45f098f4abb61 by Sebastiaan van Stijn
vendor: github.com/opencontainers/runtime-spec v1.2.0

- deprecate Prestart hook
- deprecate kernel memory limits

Additions

- config: add idmap and ridmap mount options
- config.md: allow empty mappings for [r]idmap
- features-linux: Expose idmap information
- mount: Allow relative mount destinations on Linux
- features: add potentiallyUnsafeConfigAnnotations
- config: add support for org.opencontainers.image annotations

Minor fixes:

- config: improve bind mount and propagation doc

full diff: https://github.com/opencontainers/runtime-spec/compare/v1.1.0...v1.2.0

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/github.com/opencontainers/runtime-spec/specs-go/version.go (diff)
The file was modified vendor/github.com/opencontainers/runtime-spec/specs-go/config.go (diff)
The file was modified vendor/github.com/opencontainers/runtime-spec/specs-go/features/features.go (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor.mod (diff)
Commit 745e2356ab01363a02cfec947c624a9f6220fe7f by elezar
Update tags.cncf.io/container-device-interface to v0.7.1

This also bumps the maximum supported CDI specification to v0.7.0.

Signed-off-by: Evan Lezar <elezar@nvidia.com>
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/container-edits.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/registry.go (diff)
The file was removedvendor/tags.cncf.io/container-device-interface/internal/multierror/multierror.go
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/spec.go (diff)
The file was addedvendor/tags.cncf.io/container-device-interface/pkg/cdi/default-cache.go
The file was modified vendor/modules.txt (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/cache.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/specs-go/config.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/specs-go/oci.go (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/doc.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/version.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/internal/validation/k8s/objectmeta.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/spec-dirs.go (diff)
The file was modified vendor.sum (diff)
Commit 6c68be24a2e6a4dea621b82ab4245e4ed363158e by rob.murray
Windows DNS resolver forwarding

Make the internal DNS resolver for Windows containers forward requests
to upsteam DNS servers when it cannot respond itself, rather than
returning SERVFAIL.

Windows containers are normally configured with the internal resolver
first for service discovery (container name lookup), then external
resolvers from '--dns' or the host's networking configuration.

When a tool like ping gets a SERVFAIL from the internal resolver, it
tries the other nameservers. But, nslookup does not, and with this
change it does not need to.

The internal resolver learns external server addresses from the
container's HNSEndpoint configuration, so it will use the same DNS
servers as processes in the container.

The internal resolver for Windows containers listens on the network's
gateway address, and each container may have a different set of external
DNS servers. So, the resolver uses the source address of the DNS request
to select external resolvers.

On Windows, daemon.json feature option 'windows-no-dns-proxy' can be used
to prevent the internal resolver from forwarding requests (restoring the
old behaviour).

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified libnetwork/endpoint.go (diff)
The file was modified daemon/config/config_linux.go (diff)
The file was modified daemon/container_operations_unix.go (diff)
The file was modified daemon/container_operations_windows.go (diff)
The file was addedlibnetwork/sandbox_options_windows.go
The file was modified integration/networking/resolvconf_test.go (diff)
The file was modified libnetwork/network_windows.go (diff)
The file was removedlibnetwork/sandbox_unsupported.go
The file was modified libnetwork/sandbox.go (diff)
The file was modified libnetwork/network.go (diff)
The file was modified libnetwork/sandbox_linux.go (diff)
The file was modified daemon/container_operations.go (diff)
The file was modified libnetwork/network_unix.go (diff)
The file was addedlibnetwork/network_windows_test.go
The file was addedlibnetwork/sandbox_windows.go
The file was modified libnetwork/resolver.go (diff)
The file was modified libnetwork/sandbox_dns_unix.go (diff)
Commit a4d5b6b4d081fadfe933e49bd4d71d8c91ffa06f by Paweł Gronowski
builder/normalizeWorkdir: Always return cleaned path

The `normalizeWorkdir` function has two branches, one that returns a
result of `filepath.Join` which always returns a cleaned path, and
another one where the input string is returned unmodified.

To make these two outputs consistent, also clean the path in the second
branch.

This also makes the cleaning of the container workdir explicit in the
`normalizeWorkdir` function instead of relying on the
`SetupWorkingDirectory` to mutate it.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified builder/dockerfile/dispatchers_unix.go (diff)
The file was modified integration-cli/docker_cli_build_test.go (diff)
Commit 7532420f3b4f7c62fb6c0de3c92b24ad91c380a4 by Paweł Gronowski
container/SetupWorkingDirectory: Don't mutate config

Don't mutate the container's `Config.WorkingDir` permanently with a
cleaned path when creating a working directory.

Move the `filepath.Clean` to the `translateWorkingDir` instead.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified container/container.go (diff)
The file was modified daemon/container.go (diff)
The file was modified integration/build/build_test.go (diff)
The file was modified integration/container/run_linux_test.go (diff)
Commit ab570ab3d62038b3d26f96a9bb585d0b6095b9b4 by 47751006+krissetto
nil dereference fix on image history Created value

Issue was caused by the changes here https://github.com/moby/moby/pull/45504
First released in v25.0.0-beta.1

Signed-off-by: Christopher Petito <47751006+krissetto@users.noreply.github.com>
The file was modified daemon/images/image_history.go (diff)
Commit 6667e96dad672cd489d8ff258e4edc28317cbd09 by Brian Goff
Include more details in errnotManifestOrIndex

This error is returned when attempting to walk a descriptor that
*should* be an index or a manifest.
Without this the error is not very helpful sicne there's no way to tell
what triggered it.

Signed-off-by: Brian Goff <cpuguy83@gmail.com>
The file was modified daemon/containerd/image_manifest.go (diff)
Commit 7d95fe8db59ab6bb7c18e3179c6e54d2326e8e61 by Paweł Gronowski
c8d/list: Ignore unexpected image target

Don't fail-fast when encountering an image that targets an unexpected
descriptor (neither a manifest nor index). Log a warning instead.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified daemon/containerd/image_list.go (diff)
The file was modified daemon/containerd/image_list_test.go (diff)
The file was modified internal/testutils/specialimage/multilayer.go (diff)
The file was addedinternal/testutils/specialimage/configtarget.go
Commit df831c943f5000b35ddfb12f5695902aaad55693 by Sebastiaan van Stijn
vendor: github.com/cilium/ebpf v0.12.3

full diff: https://github.com/cilium/ebpf/compare/v0.11.0...v0.12.3

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/github.com/cilium/ebpf/asm/load_store_string.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/vdso.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/ext_info.go (diff)
The file was modified vendor/github.com/cilium/ebpf/types.go (diff)
The file was addedvendor/github.com/cilium/ebpf/internal/sysenc/marshal.go
The file was modified vendor/github.com/cilium/ebpf/collection.go (diff)
The file was modified vendor/github.com/cilium/ebpf/elf_reader.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/format.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/func.go (diff)
The file was modified vendor/github.com/cilium/ebpf/linker.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/opcode.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/btf_types.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/unix/types_linux.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/load_store.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/strings.go (diff)
The file was modified vendor/github.com/cilium/ebpf/prog.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/jump.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/alu.go (diff)
The file was modified vendor/github.com/cilium/ebpf/.golangci.yaml (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/types.go (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/unix/types_other.go (diff)
The file was modified vendor/github.com/cilium/ebpf/link/syscalls.go (diff)
The file was modified vendor/github.com/cilium/ebpf/README.md (diff)
The file was addedvendor/github.com/cilium/ebpf/btf/feature.go
The file was modified vendor/github.com/cilium/ebpf/internal/tracefs/kprobe.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/kconfig/kconfig.go (diff)
The file was addedvendor/github.com/cilium/ebpf/internal/sysenc/layout.go
The file was modified vendor/github.com/cilium/ebpf/syscalls.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/sys/syscall.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/btf.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/core.go (diff)
The file was modified vendor/github.com/cilium/ebpf/info.go (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/github.com/cilium/ebpf/marshalers.go (diff)
The file was addedvendor/github.com/cilium/ebpf/internal/sysenc/buffer.go
The file was modified vendor/github.com/cilium/ebpf/types_string.go (diff)
The file was modified vendor/github.com/cilium/ebpf/Makefile (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/endian_le.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/sys/types.go (diff)
The file was modified vendor/github.com/cilium/ebpf/link/program.go (diff)
The file was modified vendor/github.com/cilium/ebpf/link/iter.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/instruction.go (diff)
The file was addedvendor/github.com/cilium/ebpf/internal/sysenc/doc.go
The file was modified vendor/github.com/cilium/ebpf/asm/alu_string.go (diff)
The file was modified vendor/github.com/cilium/ebpf/run-tests.sh (diff)
The file was modified vendor/github.com/cilium/ebpf/.clang-format (diff)
The file was modified vendor/github.com/cilium/ebpf/map.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/endian_be.go (diff)
The file was addedvendor/github.com/cilium/ebpf/netlify.toml
The file was modified vendor/github.com/cilium/ebpf/link/kprobe_multi.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/marshal.go (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor/github.com/cilium/ebpf/link/uprobe.go (diff)
Commit e314113ad7b799d705610eb7caae38d643fa5908 by Paweł Gronowski
Dockerfile: update docker CLI to v26.1.0

Update the CLI that's used in the dev-container

- full diff: https://github.com/docker/cli/compare/v26.0.0...v26.1.0

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified Dockerfile (diff)
Commit 85c990037767d9556af033715bba57843b4a2e57 by Sebastiaan van Stijn
vendor: golang.org/x/mod v0.17.0

no changes in vendored codee

full diff: https://github.com/golang/mod/compare/v0.13.0...v0.17.0

- modfile: do not collapse if there are unattached comments within blocks
- modfile: fix crash on AddGoStmt in empty File
- modfile: improve directory path detection and error text consistency
- modfile: use new go version string format in WorkFile.add error
- sumdb: replace globsMatchPath with module.MatchPrefixPatterns
- sumdb/tlog: make NewTiles only generate strictly necessary tiles

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor.mod (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor.sum (diff)
Commit 2140e7e0f5f47464445182cfa0fb2663ff63f6f8 by Sebastiaan van Stijn
vendor: golang.org/x/tools v0.16.0

It's not used in our code, but some dependencies have a "tools.go" to
force it; updating to a version that doesn't depend on golang.org/x/sys/execabs

full diff: https://github.com/golang/tools/compare/v0.14.0...v0.16.0

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor.mod (diff)
The file was removedvendor/golang.org/x/sys/execabs/execabs_go118.go
The file was modified vendor/golang.org/x/tools/go/packages/external.go (diff)
The file was addedvendor/golang.org/x/tools/internal/versions/types_go122.go
The file was modified vendor/golang.org/x/tools/go/internal/packagesdriver/sizes.go (diff)
The file was addedvendor/golang.org/x/tools/internal/versions/types.go
The file was modified vendor.sum (diff)
The file was modified vendor/golang.org/x/tools/go/types/objectpath/objectpath.go (diff)
The file was modified vendor/golang.org/x/tools/go/packages/golist.go (diff)
The file was addedvendor/golang.org/x/tools/internal/versions/versions_go121.go
The file was modified vendor/golang.org/x/tools/go/packages/packages.go (diff)
The file was addedvendor/golang.org/x/tools/internal/versions/versions_go122.go
The file was removedvendor/golang.org/x/tools/internal/typesinternal/objectpath.go
The file was addedvendor/golang.org/x/tools/internal/versions/gover.go
The file was modified vendor/modules.txt (diff)
The file was addedvendor/golang.org/x/tools/internal/versions/types_go121.go
The file was modified vendor/golang.org/x/tools/internal/gocommand/invoke.go (diff)
The file was removedvendor/golang.org/x/sys/execabs/execabs.go
The file was removedvendor/golang.org/x/sys/execabs/execabs_go119.go
The file was modified vendor/golang.org/x/tools/go/packages/golist_overlay.go (diff)
The file was modified vendor/golang.org/x/tools/internal/packagesinternal/packages.go (diff)
Commit e3c59640d5d15acc54616790bdae5bf0974c505a by Sebastiaan van Stijn
vendor: github.com/Microsoft/go-winio v0.6.2

- fileinfo: internally fix FileBasicInfo memory alignment (fixes compatibility
  with go1.22)

full diff: https://github.com/Microsoft/go-winio/compare/v0.6.1...v0.6.2

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/github.com/Microsoft/go-winio/privilege.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/.golangci.yml (diff)
The file was modified vendor/github.com/Microsoft/go-winio/internal/socket/zsyscall_windows.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/internal/socket/socket.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/etw/zsyscall_windows.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/internal/stringbuffer/wstring.go (diff)
The file was addedvendor/github.com/Microsoft/go-winio/pkg/etw/opcode_string.go
The file was modified vendor/github.com/Microsoft/go-winio/pkg/etw/fieldopt.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pipe.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/hvsock.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/file.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/fs/resolve.go (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/github.com/Microsoft/go-winio/internal/fs/fs.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/etw/eventdata.go (diff)
The file was removedvendor/github.com/Microsoft/go-winio/tools.go
The file was modified vendor/github.com/Microsoft/go-winio/sd.go (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/github.com/Microsoft/go-winio/backup.go (diff)
The file was removedvendor/golang.org/x/tools/cmd/stringer/stringer.go
The file was modified vendor/github.com/Microsoft/go-winio/pkg/etw/eventdescriptor.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/bindfilter/zsyscall_windows.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/fileinfo.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/internal/fs/zsyscall_windows.go (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor/github.com/Microsoft/go-winio/zsyscall_windows.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/backuptar/tar.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/bindfilter/bind_filter.go (diff)
The file was addedvendor/github.com/Microsoft/go-winio/pkg/etw/level_string.go
The file was modified vendor/github.com/Microsoft/go-winio/vhd/zvhd_windows.go (diff)

Summary

  1. chore: fix mismatched function names in godoc (details)
  2. Restore the SetKey prestart hook. (details)
  3. Restore the SetKey prestart hook. (details)
  4. ci: update workflow artifacts retention (details)
  5. CONTRIBUTING.md: update Slack link (details)
  6. api: normalize the default NetworkMode (details)
  7. daemon: don't call NetworkMode.IsDefault() (details)
  8. Fix cases where we are wrapping a nil error (details)
  9. save: Remove platform from config descriptor (details)
  10. Minor fix for illumos support (details)
  11. vendor: golang.org/x/net v0.22.0, golang.org/x/crypto v0.21.0 (details)
  12. vendor: golang.org/x/net v0.23.0 (details)
  13. update to go1.21.9 (details)
  14. Move dummy DNS server to integration/internal/network (details)
  15. github/ci: Check if backport is opened against the expected branch (details)
  16. ci/validate-pr: Use `::error::` command to print errors (details)
  17. update containerd binary to v1.7.15 (details)
  18. vendor: github.com/containerd/containerd v1.7.15 (details)
  19. Enable DNS proxying for ipvlan-l3 (details)
  20. Stop macvlan with no parent from using ext-dns (details)
  21. Run ipvlan tests even if 'modprobe ipvlan' fails (details)
  22. Disable IPv6 for endpoints in '--ipv6=false' networks. (details)
  23. Fix typo (details)
  24. vendor: github.com/moby/swarmkit/v2 master (f3ffc0881d0e) (details)
  25. daemon/cluster/executor: Add volume `Subpath` (details)
  26. Add netiputil.AddrPortFromNet() (details)
  27. daemon: add nolint-comments for deprecated kernel-memory options, hooks (details)
  28. vendor: github.com/opencontainers/runtime-spec v1.2.0 (details)
  29. Update tags.cncf.io/container-device-interface to v0.7.1 (details)
  30. Windows DNS resolver forwarding (details)
  31. builder/normalizeWorkdir: Always return cleaned path (details)
  32. container/SetupWorkingDirectory: Don't mutate config (details)
  33. nil dereference fix on image history Created value (details)
  34. Include more details in errnotManifestOrIndex (details)
  35. c8d/list: Ignore unexpected image target (details)
  36. vendor: github.com/cilium/ebpf v0.12.3 (details)
  37. Dockerfile: update docker CLI to v26.1.0 (details)
  38. vendor: golang.org/x/mod v0.17.0 (details)
  39. vendor: golang.org/x/tools v0.16.0 (details)
  40. vendor: github.com/Microsoft/go-winio v0.6.2 (details)
Commit 14a8fac0921dd8a6c36e378f6b5139a06e878f64 by mayangang
chore: fix mismatched function names in godoc

Signed-off-by: George Ma <mayangang@outlook.com>
The file was modified libnetwork/drivers/remote/driver.go (diff)
The file was modified profiles/apparmor/apparmor.go (diff)
Commit fde80fe2e731f04ce029dc93fcdadeccabe2921b by rob.murray
Restore the SetKey prestart hook.

Partially reverts 0046b16 "daemon: set libnetwork sandbox key w/o OCI hook"

Running SetKey to store the OCI Sandbox key after task creation, rather
than from the OCI prestart hook, meant it happened after sysctl settings
were applied by the runtime - which was the intention, we wanted to
complete Sandbox configuration after IPv6 had been disabled by a sysctl
if that was going to happen.

But, it meant '--sysctl' options for a specfic network interface caused
container task creation to fail, because the interface is only moved into
the network namespace during SetKey.

This change restores the SetKey prestart hook, and regenerates config
files that depend on the container's support for IPv6 after the task has
been created. It also adds a regression test that makes sure it's possible
to set an interface-specfic sysctl.

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified integration/networking/bridge_test.go (diff)
The file was modified libnetwork/sandbox_linux.go (diff)
The file was modified daemon/oci_linux.go (diff)
The file was modified libnetwork/osl/namespace_linux.go (diff)
The file was modified daemon/start_linux.go (diff)
Commit 1014f481de85ca2fccc0b51fc7a447173946b0e4 by rob.murray
Restore the SetKey prestart hook.

Partially reverts 0046b16 "daemon: set libnetwork sandbox key w/o OCI hook"

Running SetKey to store the OCI Sandbox key after task creation, rather
than from the OCI prestart hook, meant it happened after sysctl settings
were applied by the runtime - which was the intention, we wanted to
complete Sandbox configuration after IPv6 had been disabled by a sysctl
if that was going to happen.

But, it meant '--sysctl' options for a specfic network interface caused
container task creation to fail, because the interface is only moved into
the network namespace during SetKey.

This change restores the SetKey prestart hook, and regenerates config
files that depend on the container's support for IPv6 after the task has
been created. It also adds a regression test that makes sure it's possible
to set an interface-specfic sysctl.

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified libnetwork/osl/namespace_linux.go (diff)
The file was modified libnetwork/sandbox_linux.go (diff)
The file was modified integration/networking/bridge_test.go (diff)
The file was modified daemon/oci_linux.go (diff)
The file was modified daemon/start_linux.go (diff)
Commit aff003139c212397e38cc98a834ef9cd8a56e93a by github
ci: update workflow artifacts retention

Signed-off-by: CrazyMax <1951866+crazy-max@users.noreply.github.com>
The file was modified .github/workflows/.test.yml (diff)
The file was modified .github/workflows/.windows.yml (diff)
The file was modified .github/workflows/ci.yml (diff)
Commit c187f95fe10ecdb946aad00fb8c658e65376288f by Paweł Gronowski
CONTRIBUTING.md: update Slack link

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified CONTRIBUTING.md (diff)
Commit 4eed3dcdfeb147529339e06f2dceecf43caed45a by Albin Kerouanton
api: normalize the default NetworkMode

The NetworkMode "default" is now normalized into the value it
aliases ("bridge" on Linux and "nat" on Windows) by the
ContainerCreate endpoint, the legacy image builder, Swarm's
cluster executor and by the container restore codepath.

builder-next is left untouched as it already uses the normalized
value (ie. bridge).

Going forward, this will make maintenance easier as there's one
less NetworkMode to care about.

Signed-off-by: Albin Kerouanton <albinker@gmail.com>
The file was modified api/server/router/container/container_routes.go (diff)
The file was modified daemon/cluster/executor/container/adapter.go (diff)
The file was modified builder/dockerfile/internals.go (diff)
The file was modified daemon/daemon.go (diff)
Commit c4689034fdad6a7ffbf45e62131d9a412ed07f77 by Albin Kerouanton
daemon: don't call NetworkMode.IsDefault()

Previous commit made this unnecessary.

Signed-off-by: Albin Kerouanton <albinker@gmail.com>
The file was modified api/server/router/container/container_routes.go (diff)
The file was modified daemon/inspect.go (diff)
The file was modified daemon/container_operations.go (diff)
Commit 0a48d26fbcb33a84da7f767c2a62cae362df9505 by Brian Goff
Fix cases where we are wrapping a nil error

This was using `errors.Wrap` when there was no error to wrap, meanwhile
we are supposed to be creating a new error.

Found this while investigating some log corruption issues and
unexpectedly getting a nil reader and a nil error from `getTailReader`.

Signed-off-by: Brian Goff <cpuguy83@gmail.com>
The file was modified daemon/logger/local/read.go (diff)
Commit 9160b9fda6a75ee68e9e208b32fd7e4fd843a260 by Brian Goff
save: Remove platform from config descriptor

This was brought up by bmitch that its not expected to have a platform
object in the config descriptor.
Also checked with tianon who agreed, its not _wrong_ but is unexpected
and doesn't neccessarily make sense to have it there.

Also, while technically incorrect, ECR is throwing an error when it sees
this.

Signed-off-by: Brian Goff <cpuguy83@gmail.com>
The file was modified image/tarexport/save.go (diff)
Commit cf933115b667db61fa802d1c3b441664bf92aa60 by siepkes
Minor fix for illumos support

illumos is the opensource continuation of OpenSolaris after Oracle
closed to source it (again).

For example use see: https://github.com/openbao/openbao/pull/205.

Signed-off-by: Jasper Siepkes <siepkes@serviceplanet.nl>
The file was addedpkg/system/stat_illumos.go
Commit e1ca74361bc975ba85d998c040369c5839329d3b by Sebastiaan van Stijn
vendor: golang.org/x/net v0.22.0, golang.org/x/crypto v0.21.0

full diffs changes relevant to vendored code:

- https://github.com/golang/net/compare/v0.18.0...v0.22.0
    - websocket: add support for dialing with context
    - http2: remove suspicious uint32->v conversion in frame code
    - http2: send an error of FLOW_CONTROL_ERROR when exceed the maximum octets
- https://github.com/golang/crypto/compare/v0.17.0...v0.21.0
    - internal/poly1305: drop Go 1.12 compatibility
    - internal/poly1305: improve sum_ppc64le.s
    - ocsp: don't use iota for externally defined constants

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor.mod (diff)
The file was modified vendor/golang.org/x/net/websocket/client.go (diff)
The file was removedvendor/golang.org/x/crypto/internal/poly1305/bits_compat.go
The file was modified vendor.sum (diff)
The file was modified vendor/golang.org/x/crypto/ocsp/ocsp.go (diff)
The file was modified vendor/golang.org/x/net/http2/frame.go (diff)
The file was modified vendor/golang.org/x/net/http2/transport.go (diff)
The file was removedvendor/golang.org/x/crypto/internal/poly1305/bits_go1.13.go
The file was modified vendor/modules.txt (diff)
The file was modified vendor/golang.org/x/crypto/internal/poly1305/sum_ppc64le.s (diff)
The file was modified vendor/golang.org/x/net/websocket/dial.go (diff)
The file was modified vendor/golang.org/x/crypto/internal/poly1305/sum_generic.go (diff)
Commit d66589496e5ab42d31f3fddaf8075fb37f1b77c6 by Sebastiaan van Stijn
vendor: golang.org/x/net v0.23.0

full diff: https://github.com/golang/net/compare/v0.22.0...v0.23.0

Includes a fix for CVE-2023-45288, which is also addressed in go1.22.2
and go1.21.9;

> http2: close connections when receiving too many headers
>
> Maintaining HPACK state requires that we parse and process
> all HEADERS and CONTINUATION frames on a connection.
> When a request's headers exceed MaxHeaderBytes, we don't
> allocate memory to store the excess headers but we do
> parse them. This permits an attacker to cause an HTTP/2
> endpoint to read arbitrary amounts of data, all associated
> with a request which is going to be rejected.
>
> Set a limit on the amount of excess header frames we
> will process before closing a connection.
>
> Thanks to Bartek Nowotarski for reporting this issue.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/golang.org/x/net/http2/frame.go (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/golang.org/x/net/http2/pipe.go (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor/golang.org/x/net/http2/server.go (diff)
The file was addedvendor/golang.org/x/net/http2/testsync.go
The file was modified vendor.mod (diff)
The file was modified vendor/golang.org/x/net/http2/transport.go (diff)
Commit 329d403e209dd66691321430cf162d0daf6f9023 by Paweł Gronowski
update to go1.21.9

go1.21.9 (released 2024-04-03) includes a security fix to the net/http
package, as well as bug fixes to the linker, and the go/types and
net/http packages. See the [Go 1.21.9 milestone](https://github.com/golang/go/issues?q=milestone%3AGo1.21.9+label%3ACherryPickApproved)
for more details.

These minor releases include 1 security fixes following the security policy:

- http2: close connections when receiving too many headers

Maintaining HPACK state requires that we parse and process all HEADERS
and CONTINUATION frames on a connection. When a request's headers exceed
MaxHeaderBytes, we don't allocate memory to store the excess headers but
we do parse them. This permits an attacker to cause an HTTP/2 endpoint
to read arbitrary amounts of header data, all associated with a request
which is going to be rejected. These headers can include Huffman-encoded
data which is significantly more expensive for the receiver to decode
than for an attacker to send.

Set a limit on the amount of excess header frames we will process before
closing a connection.

Thanks to Bartek Nowotarski (https://nowotarski.info/) for reporting this issue.

This is CVE-2023-45288 and Go issue https://go.dev/issue/65051.

View the release notes for more information:
https://go.dev/doc/devel/release#go1.22.2

- https://github.com/golang/go/issues?q=milestone%3AGo1.21.9+label%3ACherryPickApproved
- full diff: https://github.com/golang/go/compare/go1.21.8...go1.21.9

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified Dockerfile.windows (diff)
The file was modified .github/workflows/.windows.yml (diff)
The file was modified Dockerfile (diff)
The file was modified hack/dockerfiles/generate-files.Dockerfile (diff)
The file was modified .github/workflows/test.yml (diff)
The file was modified Dockerfile.simple (diff)
The file was modified .github/workflows/.test.yml (diff)
The file was modified .github/workflows/buildkit.yml (diff)
Commit d8b768149b21db9c9e831f7b899d1018d0ad64b9 by rob.murray
Move dummy DNS server to integration/internal/network

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified integration/networking/resolvconf_test.go (diff)
The file was addedintegration/internal/network/dns.go
Commit 61269e718fbdbbad397b0089105ec910fc0e62ca by Paweł Gronowski
github/ci: Check if backport is opened against the expected branch

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified .github/workflows/validate-pr.yml (diff)
Commit fb92caf2aa6cf3664e11dc06ee10d114af300826 by Paweł Gronowski
ci/validate-pr: Use `::error::` command to print errors

This will make Github render the log line as an error.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified .github/workflows/validate-pr.yml (diff)
Commit 3485cfbb1e6252f0d73f6e69829539fa4bec1dd3 by Paweł Gronowski
update containerd binary to v1.7.15

Update the containerd binary that's used in CI

- full diff: https://github.com/containerd/containerd/compare/v1.7.13...v1.7.15
- release notes: https://github.com/containerd/containerd/releases/tag/v1.7.15

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified hack/dockerfile/install/containerd.installer (diff)
The file was modified Dockerfile.windows (diff)
The file was modified Dockerfile (diff)
Commit 5ae5969739518d80dfe889878bb4f835d4d77a01 by Paweł Gronowski
vendor: github.com/containerd/containerd v1.7.15

full diff: https://github.com/containerd/containerd/compare/v1.7.14...v1.7.15

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified vendor/github.com/containerd/containerd/images/archive/exporter.go (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/github.com/containerd/containerd/version/version.go (diff)
Commit 17b863154573d998394be336fe1487827071b019 by rob.murray
Enable DNS proxying for ipvlan-l3

The internal DNS resolver should only forward requests to external
resolvers if the libnetwork.Sandbox served by the resolver has external
network access (so, no forwarding for '--internal' networks).

The test for external network access was whether the Sandbox had an
Endpoint with a gateway configured.

However, an ipvlan-l3 networks with external network access does not
have a gateway, it has a default route bound to an interface.

Also, we document that an ipvlan network with no parent interface is
equivalent to a '--internal' network. But, in this case, an ipvlan-l2
network was configured with a gateway. So, DNS proxying would be enabled
in the internal resolver (and, if the host's resolver was on a localhost
address, requests to external resolvers from the host's network
namespace would succeed).

So, this change adjusts the test for enabling DNS proxying to include
a check for '--internal' (as a shortcut) and, for non-internal networks,
checks for a default route as well as a gateway. It also disables
configuration of a gateway or a default route for an ipvlan Endpoint if
no parent interface is specified.

(Note if a parent interface with no external network is supplied as
'-o parent=<dummy>', the gateway/default route will still be set up
and external DNS proxying will be enabled. The network must be
configured as '--internal' to prevent that from happening.)

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified libnetwork/drivers/ipvlan/ipvlan_joinleave.go (diff)
The file was modified libnetwork/endpoint_info.go (diff)
The file was modified libnetwork/endpoint.go (diff)
The file was modified integration/network/ipvlan/ipvlan_test.go (diff)
The file was modified libnetwork/sandbox.go (diff)
The file was modified libnetwork/sandbox_dns_unix.go (diff)
The file was modified libnetwork/drivers/ipvlan/ipvlan_network.go (diff)
Commit cd7240f6d94359b873fd8f7db02495a8322c0b2d by rob.murray
Stop macvlan with no parent from using ext-dns

We document that an macvlan network with no parent interface is
equivalent to a '--internal' network. But, in this case, an macvlan
network was still configured with a gateway. So, DNS proxying would
be enabled in the internal resolver (and, if the host's resolver
was on a localhost address, requests to external resolvers from the
host's network namespace would succeed).

This change disables configuration of a gateway for a macvlan Endpoint
if no parent interface is specified.

(Note if a parent interface with no external network is supplied as
'-o parent=<dummy>', the gateway will still be set up. Documentation
will need to be updated to note that '--internal' should be used to
prevent DNS request forwarding in this case.)

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified integration/network/macvlan/macvlan_test.go (diff)
The file was modified libnetwork/drivers/macvlan/macvlan_joinleave.go (diff)
The file was modified libnetwork/drivers/macvlan/macvlan_network.go (diff)
Commit 9954d7c6bd2023a85ca3e5daa9aafb4a6adbce93 by rob.murray
Run ipvlan tests even if 'modprobe ipvlan' fails

This reverts commit a77e147d322c153ae1c2ae0ee45c1835c109e231.

The ipvlan integration tests have been skipped in CI because of a check
intended to ensure the kernel has ipvlan support - which failed, but
seems to be unnecessary (probably because kernels have moved on).

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified integration/network/ipvlan/ipvlan_test.go (diff)
Commit 57dd56726a5bb581b09661929927aa443d530b69 by rob.murray
Disable IPv6 for endpoints in '--ipv6=false' networks.

No IPAM IPv6 address is given to an interface in a network with
'--ipv6=false', but the kernel would assign a link-local address and,
in a macvlan/ipvlan network, the interface may get a SLAAC-assigned
address.

So, disable IPv6 on the interface to avoid that.

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified libnetwork/osl/interface_linux.go (diff)
The file was modified integration/networking/bridge_test.go (diff)
The file was modified integration/network/ipvlan/ipvlan_test.go (diff)
The file was modified integration/network/macvlan/macvlan_test.go (diff)
Commit f51e18f58e09bfc6f6596461f6250504d8d19b42 by victor.toni
Fix typo

Signed-off-by: Victor Toni <victor.toni@gmail.com>
The file was modified libnetwork/drivers/overlay/joinleave.go (diff)
Commit 5368c3a04f8422e3da6b515838ddf33ee9620421 by Paweł Gronowski
vendor: github.com/moby/swarmkit/v2 master (f3ffc0881d0e)

full diff: https://github.com/moby/swarmkit/compare/911c97650f2e...f3ffc0881d0e

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified vendor/github.com/moby/swarmkit/v2/api/types.proto (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/github.com/moby/swarmkit/v2/api/api.pb.txt (diff)
The file was modified vendor/github.com/moby/swarmkit/v2/api/types.pb.go (diff)
Commit d3c051318f1576ecadf04657b328792ef6513a5d by Paweł Gronowski
daemon/cluster/executor: Add volume `Subpath`

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified daemon/cluster/convert/container.go (diff)
The file was modified daemon/cluster/convert/service_test.go (diff)
The file was modified daemon/cluster/executor/container/container.go (diff)
Commit f07644e17e151307d4fe302ee3b292d866b56de9 by rob.murray
Add netiputil.AddrPortFromNet()

Co-authored-by: Cory Snider <csnider@mirantis.com>
Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified libnetwork/internal/netiputil/netiputil.go (diff)
Commit f5209d23a8a9df3db6287a1e2c60638be1bf920c by Sebastiaan van Stijn
daemon: add nolint-comments for deprecated kernel-memory options, hooks

This adds some nolint-comments for the deprecated kernel-memory options; we
deprecated these, but they could technically still be accepted by alternative
runtimes.

    daemon/daemon_unix.go:108:3: SA1019: memory.Kernel is deprecated: kernel-memory limits are not supported in cgroups v2, and were obsoleted in [kernel v5.4]. This field should no longer be used, as it may be ignored by runtimes. (staticcheck)
            memory.Kernel = &config.KernelMemory
            ^
    daemon/update_linux.go:63:3: SA1019: memory.Kernel is deprecated: kernel-memory limits are not supported in cgroups v2, and were obsoleted in [kernel v5.4]. This field should no longer be used, as it may be ignored by runtimes. (staticcheck)
            memory.Kernel = &resources.KernelMemory
            ^

Prestart hooks are deprecated, and more granular hooks should be used instead.
CreateRuntime are the closest equivalent, and executed in the same locations
as Prestart-hooks, but depending on what these hooks do, possibly one of the
other hooks could be used instead (such as CreateContainer or StartContainer).
As these hooks are still supported, this patch adds nolint comments, but adds
some TODOs to consider migrating to something else;

    daemon/nvidia_linux.go:86:2: SA1019: s.Hooks.Prestart is deprecated: use [Hooks.CreateRuntime], [Hooks.CreateContainer], and [Hooks.StartContainer] instead, which allow more granular hook control during the create and start phase. (staticcheck)
        s.Hooks.Prestart = append(s.Hooks.Prestart, specs.Hook{
        ^

    daemon/oci_linux.go:76:5: SA1019: s.Hooks.Prestart is deprecated: use [Hooks.CreateRuntime], [Hooks.CreateContainer], and [Hooks.StartContainer] instead, which allow more granular hook control during the create and start phase. (staticcheck)
                    s.Hooks.Prestart = append(s.Hooks.Prestart, specs.Hook{
                    ^

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified daemon/update_linux.go (diff)
The file was modified daemon/daemon_unix.go (diff)
The file was modified daemon/oci_linux.go (diff)
The file was modified daemon/nvidia_linux.go (diff)
Commit 0d6a1a212b00b67543e83e9cc4a45f098f4abb61 by Sebastiaan van Stijn
vendor: github.com/opencontainers/runtime-spec v1.2.0

- deprecate Prestart hook
- deprecate kernel memory limits

Additions

- config: add idmap and ridmap mount options
- config.md: allow empty mappings for [r]idmap
- features-linux: Expose idmap information
- mount: Allow relative mount destinations on Linux
- features: add potentiallyUnsafeConfigAnnotations
- config: add support for org.opencontainers.image annotations

Minor fixes:

- config: improve bind mount and propagation doc

full diff: https://github.com/opencontainers/runtime-spec/compare/v1.1.0...v1.2.0

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/github.com/opencontainers/runtime-spec/specs-go/config.go (diff)
The file was modified vendor.mod (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/github.com/opencontainers/runtime-spec/specs-go/version.go (diff)
The file was modified vendor/github.com/opencontainers/runtime-spec/specs-go/features/features.go (diff)
The file was modified vendor/modules.txt (diff)
Commit 745e2356ab01363a02cfec947c624a9f6220fe7f by elezar
Update tags.cncf.io/container-device-interface to v0.7.1

This also bumps the maximum supported CDI specification to v0.7.0.

Signed-off-by: Evan Lezar <elezar@nvidia.com>
The file was modified vendor/tags.cncf.io/container-device-interface/specs-go/config.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/container-edits.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/cache.go (diff)
The file was addedvendor/tags.cncf.io/container-device-interface/pkg/cdi/default-cache.go
The file was modified vendor/tags.cncf.io/container-device-interface/internal/validation/k8s/objectmeta.go (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/doc.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/version.go (diff)
The file was removedvendor/tags.cncf.io/container-device-interface/internal/multierror/multierror.go
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/spec.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/specs-go/oci.go (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/spec-dirs.go (diff)
The file was modified vendor.sum (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/tags.cncf.io/container-device-interface/pkg/cdi/registry.go (diff)
Commit 6c68be24a2e6a4dea621b82ab4245e4ed363158e by rob.murray
Windows DNS resolver forwarding

Make the internal DNS resolver for Windows containers forward requests
to upsteam DNS servers when it cannot respond itself, rather than
returning SERVFAIL.

Windows containers are normally configured with the internal resolver
first for service discovery (container name lookup), then external
resolvers from '--dns' or the host's networking configuration.

When a tool like ping gets a SERVFAIL from the internal resolver, it
tries the other nameservers. But, nslookup does not, and with this
change it does not need to.

The internal resolver learns external server addresses from the
container's HNSEndpoint configuration, so it will use the same DNS
servers as processes in the container.

The internal resolver for Windows containers listens on the network's
gateway address, and each container may have a different set of external
DNS servers. So, the resolver uses the source address of the DNS request
to select external resolvers.

On Windows, daemon.json feature option 'windows-no-dns-proxy' can be used
to prevent the internal resolver from forwarding requests (restoring the
old behaviour).

Signed-off-by: Rob Murray <rob.murray@docker.com>
The file was modified libnetwork/network_windows.go (diff)
The file was modified libnetwork/endpoint.go (diff)
The file was modified libnetwork/network.go (diff)
The file was modified libnetwork/sandbox.go (diff)
The file was modified libnetwork/sandbox_linux.go (diff)
The file was addedlibnetwork/sandbox_options_windows.go
The file was removedlibnetwork/sandbox_unsupported.go
The file was modified libnetwork/sandbox_dns_unix.go (diff)
The file was addedlibnetwork/sandbox_windows.go
The file was modified integration/networking/resolvconf_test.go (diff)
The file was modified daemon/container_operations_windows.go (diff)
The file was modified daemon/config/config_linux.go (diff)
The file was modified daemon/container_operations.go (diff)
The file was modified libnetwork/resolver.go (diff)
The file was modified libnetwork/network_unix.go (diff)
The file was modified daemon/container_operations_unix.go (diff)
The file was addedlibnetwork/network_windows_test.go
Commit a4d5b6b4d081fadfe933e49bd4d71d8c91ffa06f by Paweł Gronowski
builder/normalizeWorkdir: Always return cleaned path

The `normalizeWorkdir` function has two branches, one that returns a
result of `filepath.Join` which always returns a cleaned path, and
another one where the input string is returned unmodified.

To make these two outputs consistent, also clean the path in the second
branch.

This also makes the cleaning of the container workdir explicit in the
`normalizeWorkdir` function instead of relying on the
`SetupWorkingDirectory` to mutate it.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified builder/dockerfile/dispatchers_unix.go (diff)
The file was modified integration-cli/docker_cli_build_test.go (diff)
Commit 7532420f3b4f7c62fb6c0de3c92b24ad91c380a4 by Paweł Gronowski
container/SetupWorkingDirectory: Don't mutate config

Don't mutate the container's `Config.WorkingDir` permanently with a
cleaned path when creating a working directory.

Move the `filepath.Clean` to the `translateWorkingDir` instead.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified integration/container/run_linux_test.go (diff)
The file was modified integration/build/build_test.go (diff)
The file was modified container/container.go (diff)
The file was modified daemon/container.go (diff)
Commit ab570ab3d62038b3d26f96a9bb585d0b6095b9b4 by 47751006+krissetto
nil dereference fix on image history Created value

Issue was caused by the changes here https://github.com/moby/moby/pull/45504
First released in v25.0.0-beta.1

Signed-off-by: Christopher Petito <47751006+krissetto@users.noreply.github.com>
The file was modified daemon/images/image_history.go (diff)
Commit 6667e96dad672cd489d8ff258e4edc28317cbd09 by Brian Goff
Include more details in errnotManifestOrIndex

This error is returned when attempting to walk a descriptor that
*should* be an index or a manifest.
Without this the error is not very helpful sicne there's no way to tell
what triggered it.

Signed-off-by: Brian Goff <cpuguy83@gmail.com>
The file was modified daemon/containerd/image_manifest.go (diff)
Commit 7d95fe8db59ab6bb7c18e3179c6e54d2326e8e61 by Paweł Gronowski
c8d/list: Ignore unexpected image target

Don't fail-fast when encountering an image that targets an unexpected
descriptor (neither a manifest nor index). Log a warning instead.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified daemon/containerd/image_list_test.go (diff)
The file was modified daemon/containerd/image_list.go (diff)
The file was modified internal/testutils/specialimage/multilayer.go (diff)
The file was addedinternal/testutils/specialimage/configtarget.go
Commit df831c943f5000b35ddfb12f5695902aaad55693 by Sebastiaan van Stijn
vendor: github.com/cilium/ebpf v0.12.3

full diff: https://github.com/cilium/ebpf/compare/v0.11.0...v0.12.3

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/github.com/cilium/ebpf/internal/sys/types.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/endian_be.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/alu_string.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/endian_le.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/tracefs/kprobe.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/opcode.go (diff)
The file was modified vendor/github.com/cilium/ebpf/elf_reader.go (diff)
The file was modified vendor/github.com/cilium/ebpf/link/uprobe.go (diff)
The file was modified vendor/github.com/cilium/ebpf/types.go (diff)
The file was modified vendor/github.com/cilium/ebpf/info.go (diff)
The file was modified vendor/github.com/cilium/ebpf/prog.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/ext_info.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/sys/syscall.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/marshal.go (diff)
The file was modified vendor/github.com/cilium/ebpf/collection.go (diff)
The file was modified vendor/github.com/cilium/ebpf/linker.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/kconfig/kconfig.go (diff)
The file was addedvendor/github.com/cilium/ebpf/internal/sysenc/doc.go
The file was modified vendor/github.com/cilium/ebpf/types_string.go (diff)
The file was modified vendor/github.com/cilium/ebpf/link/kprobe_multi.go (diff)
The file was addedvendor/github.com/cilium/ebpf/internal/sysenc/marshal.go
The file was modified vendor.sum (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/jump.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/btf.go (diff)
The file was modified vendor/github.com/cilium/ebpf/link/iter.go (diff)
The file was modified vendor/github.com/cilium/ebpf/link/program.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/alu.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/format.go (diff)
The file was modified vendor/github.com/cilium/ebpf/run-tests.sh (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/btf_types.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/load_store.go (diff)
The file was modified vendor/github.com/cilium/ebpf/README.md (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/unix/types_other.go (diff)
The file was modified vendor/github.com/cilium/ebpf/Makefile (diff)
The file was addedvendor/github.com/cilium/ebpf/btf/feature.go
The file was modified vendor/github.com/cilium/ebpf/map.go (diff)
The file was modified vendor/github.com/cilium/ebpf/marshalers.go (diff)
The file was modified vendor/github.com/cilium/ebpf/syscalls.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/instruction.go (diff)
The file was modified vendor/github.com/cilium/ebpf/link/syscalls.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/core.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/vdso.go (diff)
The file was modified vendor/github.com/cilium/ebpf/asm/load_store_string.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/strings.go (diff)
The file was modified vendor/github.com/cilium/ebpf/btf/types.go (diff)
The file was modified vendor/github.com/cilium/ebpf/internal/unix/types_linux.go (diff)
The file was addedvendor/github.com/cilium/ebpf/netlify.toml
The file was modified vendor/github.com/cilium/ebpf/asm/func.go (diff)
The file was addedvendor/github.com/cilium/ebpf/internal/sysenc/layout.go
The file was modified vendor/github.com/cilium/ebpf/.clang-format (diff)
The file was addedvendor/github.com/cilium/ebpf/internal/sysenc/buffer.go
The file was modified vendor/modules.txt (diff)
The file was modified vendor/github.com/cilium/ebpf/.golangci.yaml (diff)
The file was modified vendor.mod (diff)
Commit e314113ad7b799d705610eb7caae38d643fa5908 by Paweł Gronowski
Dockerfile: update docker CLI to v26.1.0

Update the CLI that's used in the dev-container

- full diff: https://github.com/docker/cli/compare/v26.0.0...v26.1.0

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
The file was modified Dockerfile (diff)
Commit 85c990037767d9556af033715bba57843b4a2e57 by Sebastiaan van Stijn
vendor: golang.org/x/mod v0.17.0

no changes in vendored codee

full diff: https://github.com/golang/mod/compare/v0.13.0...v0.17.0

- modfile: do not collapse if there are unattached comments within blocks
- modfile: fix crash on AddGoStmt in empty File
- modfile: improve directory path detection and error text consistency
- modfile: use new go version string format in WorkFile.add error
- sumdb: replace globsMatchPath with module.MatchPrefixPatterns
- sumdb/tlog: make NewTiles only generate strictly necessary tiles

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/modules.txt (diff)
The file was modified vendor.sum (diff)
The file was modified vendor.mod (diff)
Commit 2140e7e0f5f47464445182cfa0fb2663ff63f6f8 by Sebastiaan van Stijn
vendor: golang.org/x/tools v0.16.0

It's not used in our code, but some dependencies have a "tools.go" to
force it; updating to a version that doesn't depend on golang.org/x/sys/execabs

full diff: https://github.com/golang/tools/compare/v0.14.0...v0.16.0

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor.sum (diff)
The file was addedvendor/golang.org/x/tools/internal/versions/gover.go
The file was modified vendor/golang.org/x/tools/go/packages/packages.go (diff)
The file was modified vendor/golang.org/x/tools/go/packages/golist.go (diff)
The file was modified vendor/golang.org/x/tools/go/packages/external.go (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor/golang.org/x/tools/internal/packagesinternal/packages.go (diff)
The file was removedvendor/golang.org/x/sys/execabs/execabs.go
The file was removedvendor/golang.org/x/sys/execabs/execabs_go119.go
The file was modified vendor/golang.org/x/tools/go/types/objectpath/objectpath.go (diff)
The file was addedvendor/golang.org/x/tools/internal/versions/types.go
The file was removedvendor/golang.org/x/sys/execabs/execabs_go118.go
The file was modified vendor/golang.org/x/tools/go/packages/golist_overlay.go (diff)
The file was modified vendor/golang.org/x/tools/internal/gocommand/invoke.go (diff)
The file was addedvendor/golang.org/x/tools/internal/versions/versions_go121.go
The file was addedvendor/golang.org/x/tools/internal/versions/types_go121.go
The file was modified vendor.mod (diff)
The file was addedvendor/golang.org/x/tools/internal/versions/types_go122.go
The file was addedvendor/golang.org/x/tools/internal/versions/versions_go122.go
The file was modified vendor/golang.org/x/tools/go/internal/packagesdriver/sizes.go (diff)
The file was removedvendor/golang.org/x/tools/internal/typesinternal/objectpath.go
Commit e3c59640d5d15acc54616790bdae5bf0974c505a by Sebastiaan van Stijn
vendor: github.com/Microsoft/go-winio v0.6.2

- fileinfo: internally fix FileBasicInfo memory alignment (fixes compatibility
  with go1.22)

full diff: https://github.com/Microsoft/go-winio/compare/v0.6.1...v0.6.2

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified vendor/github.com/Microsoft/go-winio/.golangci.yml (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/etw/fieldopt.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/hvsock.go (diff)
The file was removedvendor/github.com/Microsoft/go-winio/tools.go
The file was modified vendor/github.com/Microsoft/go-winio/internal/fs/zsyscall_windows.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/etw/eventdescriptor.go (diff)
The file was removedvendor/golang.org/x/tools/cmd/stringer/stringer.go
The file was modified vendor/github.com/Microsoft/go-winio/backup.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/zsyscall_windows.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/privilege.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/backuptar/tar.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/fs/resolve.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/internal/socket/socket.go (diff)
The file was addedvendor/github.com/Microsoft/go-winio/pkg/etw/level_string.go
The file was modified vendor/github.com/Microsoft/go-winio/vhd/zvhd_windows.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/etw/eventdata.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/file.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/fileinfo.go (diff)
The file was modified vendor/modules.txt (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/bindfilter/bind_filter.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/etw/zsyscall_windows.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pkg/bindfilter/zsyscall_windows.go (diff)
The file was modified vendor.sum (diff)
The file was modified vendor/github.com/Microsoft/go-winio/pipe.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/internal/stringbuffer/wstring.go (diff)
The file was modified vendor.mod (diff)
The file was modified vendor/github.com/Microsoft/go-winio/internal/fs/fs.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/sd.go (diff)
The file was modified vendor/github.com/Microsoft/go-winio/internal/socket/zsyscall_windows.go (diff)
The file was addedvendor/github.com/Microsoft/go-winio/pkg/etw/opcode_string.go