1
0
mirror of https://github.com/opencontainers/runtime-spec.git synced 2026-02-05 18:45:18 +01:00

1627 Commits

Author SHA1 Message Date
Kirtana Ashok
524fc0e1b8 Release v1.2.1
Signed-off-by: Kirtana Ashok <kirtana.ashok@gmail.com>
v1.2.1
2025-02-25 14:46:15 -08:00
Akihiro Suda
2f2d37e821 Merge pull request #1277 from z63d/fix/seccomp-errnoret-descripton
Fix description of errnoRet in Seccomp
2025-02-07 15:54:05 +09:00
z63d
221c198895 Fix description of errnoRet in Seccomp
Signed-off-by: z63d <kaita.nakamura0830@gmail.com>
2025-02-07 13:04:48 +09:00
Kir Kolyshkin
a5b01166ad Merge pull request #1273 from kershawmehta/zos
zos updates
2025-01-29 19:50:13 -08:00
Sebastiaan van Stijn
c09dda1ba3 Merge pull request #1276 from AkihiroSuda/libseccomp-2.6.0
config-linux: update for libseccomp v2.6.0
2025-01-29 12:05:31 +01:00
Akihiro Suda
9de64c0aea config-linux: update for libseccomp v2.6.0
libseccomp v2.6.0 was released on Jan 23, 2025.
https://github.com/seccomp/libseccomp/releases/tag/v2.6.0

Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
2025-01-29 09:39:54 +09:00
Kershaw Mehta
1df9fa9f2b zos updates - add zos namespaces, remove zos devices
This PR proposes updates to the OCI runtime spec with
z/OS platform-specific details, including adding
namespaces, adding noNewPrivileges flag, and removing
devices. These changes are currently in use by the
IBM z/OS Container Platform (zOSCP) product - details
can be found here:
https://www.ibm.com/products/zos-container-platform.

Signed-off-by: Neil Johnson <najohnsn@us.ibm.com>
Signed-off-by: Kershaw Mehta <kershaw@us.ibm.com>
2025-01-16 14:27:04 -05:00
Lei Wang
131ae4c5f6 Correct prestart hook description in summary (#1275)
Correct `prestart` hook description in summary

It looks like the previous description was copied from the wrong line.  
Update the `prestart (Deprecated)` hook's timing from being called
"after the start operation is invoked but before the user-specified command executes" 
to "during the create operation, after the runtime environment is created and before pivot root or any equivalent operation."

Signed-off-by: Lei Wang <ssst0n3@gmail.com>
2025-01-16 20:26:50 +09:00
Akihiro Suda
d61dee6691 Merge pull request #1258 from kiashok/cpuAffinity-oci
Add support for windows CPU affinity
2025-01-07 03:05:19 +09:00
Kirtana Ashok
b9e8fdb005 Add support for windows CPU affinity
Signed-off-by: Kirtana Ashok <kiashok@microsoft.com>
2024-12-16 10:28:10 -08:00
Tianon Gravi
09fcb39bb7 Merge pull request #1257 from utam0k/ci-lint
ci: Add a github actions workflow for lint
2024-12-10 22:05:53 -08:00
utam0k
b37b687479 ci: Add a github actions workflow for lint
Signed-off-by: utam0k <k0ma@utam0k.jp>
2024-12-10 20:52:21 +09:00
Akihiro Suda
8cfc4074b2 specs-go: sync SCMP_ARCH_* constants with libseccomp main (#1229)
The following constants are defined in the main branch of libseccomp,
but not included in its latest release (v2.5) yet:

* SCMP_ARCH_LOONGARCH64  (seccomp/libseccomp@6966ec7)
* SCMP_ARCH_M68K         (seccomp/libseccomp@dd5c9c2)
* SCMP_ARCH_SH           (seccomp/libseccomp@c12945d)
* SCMP_ARCH_SHEB         (seccomp/libseccomp@c12945d)

These constant names are unlikely to change before v2.6 GA,
so we can safely refer to them in specs-go.

Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
2024-12-09 20:36:42 +09:00
Tianon Gravi
9505701eb3 Merge pull request #1269 from thaJeztah/tls_urls
update http links to https
2024-11-04 08:02:30 -08:00
Sebastiaan van Stijn
9ceba9f40b update http links to https
Most of these either redirect (so changing saves an extra redirect),
or have a TLS version available.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2024-11-04 12:28:14 +01:00
Sebastiaan van Stijn
a55ebd9527 Merge pull request #1268 from taro0513/fix/naming-a-volume-link
doc: fix expired link for "Naming a Volume" in config.md
2024-11-04 12:16:33 +01:00
Patrickuuuu
faf82be6fb doc: fix the invalid hyperlink naming-a-volume
The short link expired due to expiration.

Signed-off-by: Patrickuuuu <hank93513@gmail.com>
2024-10-29 13:51:57 +08:00
Tianon Gravi
8f3fbc8816 Merge pull request #1261 from kolyshkin/simplify-exec-aff
config: simplify final CPU affinity rule
2024-08-06 20:21:54 -07:00
Kir Kolyshkin
adaa5170f4 config: simplify final CPU affinity rule
Description of execCPUAffinity.final said that if it's not set or empty,
the final affinity is the one of container's cgroup. This was done
because we thought the kernel changes process' CPU affinity to one of
cgroup. It's not the case.

To keep the runtime simple, it makes sense to not do anything if the
final affinity is not explicitly set. This change does just that.

Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
2024-07-16 19:50:29 -07:00
Kir Kolyshkin
701738418b Merge pull request #1253 from kolyshkin/exec-aff
Add CPU affinity to executed processes
2024-06-25 12:00:33 -07:00
Kir Kolyshkin
119ae426a1 Add CPU affinity to executed processes
This allows to set initial and final CPU affinity for a process being
run in a container, which is needed to solve the issue described in [1].

[1] https://github.com/opencontainers/runc/issues/3922

Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
2024-06-11 16:47:33 -07:00
Kir Kolyshkin
2149fb504e config-linux: describe the format of cpus and mems
Also, s/in/on/g.

Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
2024-06-11 13:01:23 -07:00
Tianon Gravi
5d5d92197d Merge pull request #1256 from kd-collective/cifmt
ci: merge duplicate action
2024-06-11 11:22:26 -07:00
Kijima Daigo
c6af12432a ci: remove redundunt actions
Signed-off-by: Kijima Daigo <norimaking777@gmail.com>
2024-06-11 22:45:33 +09:00
Tianon Gravi
db6d962816 Merge pull request #1255 from kd-collective/fmt
chore: format JSON file
2024-06-10 14:27:44 -07:00
Kijima Daigo
d4aa6d8a2d chore: format JSON file make -C schema fmt
Signed-off-by: Kijima Daigo <norimaking777@gmail.com>
2024-06-10 22:13:53 +09:00
Vincent Batts
2d3f72ecad Merge pull request #1248 from opencontainers/emeritus-vbatts
MAINTAINERS: move vbatts to EMERITUS
2024-03-23 20:37:03 -04:00
Vincent Batts
b983fbf00e CODEOWNERS: remove vbatts
Signed-off-by: Vincent Batts <vbatts@hashbangbash.com>
2024-03-15 12:49:34 -04:00
Vincent Batts
bf698d0b63 MAINTAINERS: move vbatts to EMERITUS
Happy to still be brought into conversations, but do not want to slow
progress of the active maintainers.

🐐🧁🧡

Also, building out the EMERITUS from the past folks that have already
retired out of being maintainers.

Signed-off-by: Vincent Batts <vbatts@hashbangbash.com>
2024-03-14 13:54:48 -04:00
Tianon Gravi
cb7ae92f1f Merge pull request #1245 from austinvazquez/update-go-in-ci
Add Go v1.21 and v1.22 to GitHub Actions CI matrix
2024-02-15 08:27:53 -08:00
Toru Komatsu
88b8debb29 Merge pull request #1242 from utam0k/proposal-v1.1.1
Release v1.2.0
2024-02-13 21:41:16 +09:00
Akihiro Suda
0e1419d1ab Merge pull request #1244 from austinvazquez/update-github-actions-packages
Update GitHub Actions packages to resolve warnings in CI
2024-02-12 18:32:09 +09:00
Austin Vazquez
12b653d6ee Update golangci-lint to v1.56.1 in CI
This change updates golangci-lint version to v1.56.1 which has Go v1.22
support.

Signed-off-by: Austin Vazquez <macedonv@amazon.com>
2024-02-11 20:06:02 +00:00
Austin Vazquez
8547911370 Add Go v1.21 and v1.22 to GitHub Actions CI matrix
This change adds Go v1.21 and v1.22 to the CI matrix and drops Go v1.19
and v1.20 since they will no longer be getting updates.

Signed-off-by: Austin Vazquez <macedonv@amazon.com>
2024-02-11 20:03:02 +00:00
Austin Vazquez
1a729afa4d Update GitHub Actions packages to resolve warnings in CI
This change updates actions/checkout to v4, actions/setup-go to v5, and
golangci/golangci-lint-action to v4 to resolve NodeJS 16 deprecation
warnings in CI.

Signed-off-by: Austin Vazquez <macedonv@amazon.com>
2024-02-11 19:43:36 +00:00
utam0k
65cd1f8dc9 Back to +dev
Signed-off-by: utam0k <k0ma@utam0k.jp>
2024-01-26 21:55:46 +09:00
utam0k
36852b0d07 version: release v1.2.0
Signed-off-by: utam0k <k0ma@utam0k.jp>
v1.2.0
2024-01-26 21:55:39 +09:00
Akihiro Suda
68346ed538 Merge pull request #1197 from cyphar/image-spec-annotations
config: add support for org.opencontainers.image annotations
2023-12-03 10:37:04 +09:00
Akihiro Suda
99235413e0 Merge pull request #1224 from giuseppe/allow-empty-mapping-for-idmap
config.md: allow empty mappings for [r]idmap
2023-11-16 23:49:43 +09:00
Aleksa Sarai
cd10b85af8 merge #1205 into opencontainers/runtime-spec:main
Akihiro Suda (1):
  features: add potentiallyUnsafeConfigAnnotations

LGTMs: utam0k cyphar
2023-11-08 20:49:04 +11:00
Giuseppe Scrivano
021ba94151 config.md: allow empty mappings for [r]idmap
crun currently allows to specify an empty mapping for [r]idmap, and to
default to the mappings specified for the container user namespace.

Change the specifications to allow such behavior.

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
2023-10-24 10:59:12 +02:00
Akihiro Suda
5e98fec96d features: add potentiallyUnsafeConfigAnnotations
Fix issue 1202

Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
2023-10-22 22:43:23 +09:00
Qiang Huang
6331715093 Merge pull request #1233 from thaJeztah/go_kmem_deprecated
specs-go: mark LinuxMemory.Kernel as deprecated
2023-10-05 14:30:47 +08:00
Qiang Huang
ab2978519f Merge pull request #1232 from thaJeztah/go_prestarthook_deprecated
specs-go: add missing deprecation comment for Hooks.Prestart
2023-10-05 14:24:14 +08:00
Sebastiaan van Stijn
cabeea73c8 specs-go: mark LinuxMemory.Kernel as deprecated
Support for kernel-memory limits was deprecated in the kernel, and documented
as "NOT RECOMMENDED" (or "SHOULD NOT" use) in  v1.1.0-rc.1 through commit
f02cd4a427.

This patch marks the field as deprecated in the go implementation of the
spec, so that linters and editors produces a warning and consumers get
notified of its status.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-09-29 12:09:33 +02:00
Sebastiaan van Stijn
4005c81dd7 specs-go: add missing deprecation comment for Hooks.Prestart
Hooks.Prestart was deprecated in c1662686cf
(v1.0.2), but the field did not have a correctly formatted deprecation comment.

This patch updates the field's GoDoc to have a correctly formatted deprecation
comment, which will allow linters and IDEs to detect the deprecation status
of this feature.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-09-29 12:02:26 +02:00
Tianon Gravi
c0e90434df Merge pull request #1228 from kolyshkin/bind-mount
config: improve bind mount and propagation doc
2023-09-22 08:30:23 -07:00
Kir Kolyshkin
2f6b09003c config: improve bind mount and propagation doc
Current documentation talks about bind/rbind and various propagation
flags (shared, slave, private, unbindable etc.) as being filesystem-
specific options, and refers to mount(8) section describing
filesystem-specific options.

That is wrong, because bind mounts are a separate class of mounts,
not related to file systems.

Fix the confusion, and link to sharedsubtree.txt kernel document
as it happens to be the best source of information about the topic
(not counting the kernel sources).

Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
2023-09-21 15:02:14 -07:00
Tianon Gravi
989e5757e7 Merge pull request #1226 from amghazanfari/main
fix link to hooks in features
2023-09-14 08:23:31 -07:00
Andrew M. Ghazanfari
0ec4e6bbe7 fix link to hooks in features
Signed-off-by: Andrew M. Ghazanfari <a.m.ghazanfari76@gmail.com>
2023-09-14 18:14:45 +03:30