The Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
Find a file
Sebastiaan van Stijn 28e5a3c5a4
update runc binary to v1.0.0-rc93
full diff: https://github.com/opencontainers/runc/compare/v1.0.0-rc92...v1.0.0-rc93
release notes: https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc93

Release notes for runc v1.0.0-rc93
-------------------------------------------------

This is the last feature-rich RC release and we are in a feature-freeze until
1.0. 1.0.0~rc94 will be released in a few weeks with minimal bug fixes only,
and 1.0.0 will be released soon afterwards.

- runc's cgroupv2 support is no longer considered experimental. It is now
  believed to be fully ready for production deployments. In addition, runc's
  cgroup code has been improved:
    - The systemd cgroup driver has been improved to be more resilient and
      handle more systemd properties correctly.
    - We now make use of openat2(2) when possible to improve the security of
      cgroup operations (in future runc will be wholesale ported to libpathrs to
      get this protection in all codepaths).
- runc's mountinfo parsing code has been reworked significantly, making
  container startup times significantly faster and less wasteful in general.
- runc now has special handling for seccomp profiles to avoid making new
  syscalls unusable for glibc. This is done by installing a custom prefix to
  all seccomp filters which returns -ENOSYS for syscalls that are newer than
  any syscall in the profile (meaning they have a larger syscall number).

  This should not cause any regressions (because previously users would simply
  get -EPERM rather than -ENOSYS, and the rule applied above is the most
  conservative rule possible) but please report any regressions you find as a
  result of this change -- in particular, programs which have special fallback
  code that is only run in the case of -EPERM.
- runc now supports the following new runtime-spec features:
    - The umask of a container can now be specified.
    - The new Linux 5.9 capabilities (CAP_PERFMON, CAP_BPF, and
      CAP_CHECKPOINT_RESTORE) are now supported.
    - The "unified" cgroup configuration option, which allows users to explicitly
      specify the limits based on the cgroup file names rather than abstracting
      them through OCI configuration. This is currently limited in scope to
      cgroupv2.
- Various rootless containers improvements:
    - runc will no longer cause conflicts if a user specifies a custom device
      which conflicts with a user-configured device -- the user device takes
      precedence.
    - runc no longer panics if /sys/fs/cgroup is missing in rootless mode.
- runc --root is now always treated as local to the current working directory.
- The --no-pivot-root hardening was improved to handle nested mounts properly
  (please note that we still strongly recommend that users do not use
  --no-pivot-root -- it is still an insecure option).
- A large number of code cleanliness and other various cleanups, including
  fairly large changes to our tests and CI to make them all run more
  efficiently.

For packagers the following changes have been made which will have impact on
your packaging of runc:

- The "selinux" and "apparmor" buildtags have been removed, and now all runc
  builds will have SELinux and AppArmor support enabled. Note that "seccomp"
  is still optional (though we very highly recommend you enable it).
- make install DESTDIR= now functions correctly.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2021-02-11 21:46:33 +01:00
.github Remove refs to jhowardmsft from .go code 2019-09-25 10:51:18 -07:00
api swagger.yaml: Remove extra 'the' wrapped by newline 2021-01-23 02:19:25 -03:00
builder Merge pull request #41966 from thaJeztah/CVE-2021-21285_master 2021-02-02 09:16:18 -08:00
cli remove uses of deprecated pkg/term 2020-04-21 16:29:27 +02:00
client Update documentation to reflect deprecation of "NewEnvClient" 2020-10-03 15:12:30 +02:00
cmd/dockerd buildkit: Apply apparmor profile 2021-02-02 13:32:24 +01:00
container replace pkg/symlink with github.com/moby/sys/symlink 2020-11-03 11:17:12 +01:00
contrib rootless: set systemd KillMode to mixed 2021-01-28 15:19:43 +09:00
daemon Merge pull request #41842 from jchorl/master 2021-02-09 12:06:27 +01:00
distribution pull: Validate layer digest format 2021-02-02 13:37:24 +01:00
dockerversion Use -X ldflags to set dockerversion package vars 2019-12-02 10:21:41 -08:00
docs docs: fix double "the" in existing API versions 2021-01-27 12:24:47 +01:00
errdefs Implement Unwrap to errors 2020-11-21 16:36:35 +01:00
hack update runc binary to v1.0.0-rc93 2021-02-11 21:46:33 +01:00
image Merge pull request #41842 from jchorl/master 2021-02-09 12:06:27 +01:00
integration Merge pull request #41917 from AkihiroSuda/fix-cgroup2-tests 2021-01-28 11:54:28 -08:00
integration-cli Fix Error in daemon_unix.go and docker_cli_run_unit_test.go 2021-01-05 16:56:29 +05:30
internal/test/suite integration-cli: move each test suite to its own TestX testing function 2019-09-18 18:26:36 +00:00
layer replace pkg/locker with github.com/moby/locker 2020-09-10 22:15:40 +02:00
libcontainerd Added container ID to containerd task delete event messages 2020-10-30 20:58:57 -07:00
oci Fix daemon panic when starting container with invalid device cgroup rule 2021-01-22 16:02:19 +01:00
opts opts: unify host-options, and use consts 2020-10-31 16:44:21 +01:00
patches Remove blurb about fixed in go1.11 in patch file 2020-04-24 11:23:14 -07:00
pkg Ensure MkdirAllAndChown also sets perms 2021-02-02 13:01:20 +01:00
plugin plugin/manager_linux_test: Skip privileged tests when non-root 2020-12-15 09:48:06 +07:00
profiles profiles: seccomp: update to Linux 5.11 syscall list 2021-01-27 13:25:49 +11:00
project vendor: opencontainers/selinux v1.8.0, and remove selinux build-tag and stubs 2020-12-24 00:47:16 +01:00
quota quota: move test helper functions to extra file 2020-10-05 13:28:25 +00:00
reference fix goimports 2020-02-11 22:16:54 +09:00
registry registry.loginV2(): minor cleanup 2020-10-29 22:26:57 +01:00
reports Fix typos 2018-05-16 09:15:43 +08:00
restartmanager unconvert: remove unnescessary conversions 2019-09-18 12:57:33 +02:00
rootless rootless: support --exec-opt native.cgroupdriver=systemd 2020-02-14 15:32:31 +09:00
runconfig pkg/sysinfo: rm duplicates 2020-06-26 16:19:52 -07:00
testutil Merge pull request #41817 from simonferquel/desktop-startup-hang 2020-12-23 23:22:00 -08:00
vendor vendor buildkit 68bb095353c65bc3993fd534c26cf77fe05e61b1 2021-02-02 13:27:03 +01:00
volume Use real root with 0701 perms 2021-02-02 13:01:25 +01:00
.DEREK.yml Update .DEREK.yml 2019-05-06 13:27:04 -07:00
.dockerignore update .dockerignore to prevent '-unsupported' builds 2020-01-13 12:55:15 +01:00
.gitignore Use -X ldflags to set dockerversion package vars 2019-12-02 10:21:41 -08:00
.mailmap Update authors and mailmap 2020-08-06 01:57:12 +02:00
AUTHORS Update authors and mailmap 2020-08-06 01:57:12 +02:00
CHANGELOG.md Fix some typos 2018-09-07 13:13:47 +08:00
codecov.yml Add code coverage report and codecov config 2018-01-16 16:50:56 -05:00
CONTRIBUTING.md Update CONTRIBUTING.md to have an option to keep name anonymous if requested 2019-07-15 16:04:11 +02:00
Dockerfile vendor: opencontainers/selinux v1.8.0, and remove selinux build-tag and stubs 2020-12-24 00:47:16 +01:00
Dockerfile.buildx Dockerfile.buildx: update buildx to v0.5.1 2021-01-26 11:37:50 +01:00
Dockerfile.e2e Move use of debian:buster frozen image to debian:bullseye 2020-12-19 17:59:36 +01:00
Dockerfile.simple Dockerfile.simple: Fix compile docker binary error with btrfs 2021-02-03 23:16:15 +00:00
Dockerfile.windows Force Download-File function to use TLS 1.2 2020-09-20 23:18:16 +03:00
Jenkinsfile Jenkinsfile: remove e2e image stage 2020-11-10 18:42:13 +01:00
LICENSE Update LICENSE 2018-09-12 14:27:53 +01:00
MAINTAINERS Add myself as a curator 2020-01-09 15:03:38 -05:00
Makefile Makefile: remove empty targets, and slight refactor 2020-05-01 16:48:07 +02:00
NOTICE switch kr/pty to creack/pty v1.1.7 2019-07-29 16:59:08 -07:00
poule.yml Poule: remove random assign 2019-09-05 20:57:17 +02:00
README.md Add "Lego set" back in README.md 2017-10-10 14:10:39 +00:00
ROADMAP.md Fix some typos in ROADMAP.md 2019-01-25 14:27:13 +08:00
SECURITY.md Update SECURITY.md to have an option to keep name anonymous if requested. 2019-06-18 16:37:16 +00:00
TESTING.md TESTING.md: note that integration-cli is deprecated 2020-12-18 07:51:46 +01:00
vendor.conf vendor buildkit 68bb095353c65bc3993fd534c26cf77fe05e61b1 2021-02-02 13:27:03 +01:00
VENDORING.md fix the bare url and the Summary of http://semver.org 2017-01-17 16:20:11 +08:00

The Moby Project

Moby Project logo

Moby is an open-source project created by Docker to enable and accelerate software containerization.

It provides a "Lego set" of toolkit components, the framework for assembling them into custom container-based systems, and a place for all container enthusiasts and professionals to experiment and exchange ideas. Components include container build tools, a container registry, orchestration tools, a runtime and more, and these can be used as building blocks in conjunction with other tools and projects.

Principles

Moby is an open project guided by strong principles, aiming to be modular, flexible and without too strong an opinion on user experience. It is open to the community to help set its direction.

  • Modular: the project includes lots of components that have well-defined functions and APIs that work together.
  • Batteries included but swappable: Moby includes enough components to build fully featured container system, but its modular architecture ensures that most of the components can be swapped by different implementations.
  • Usable security: Moby provides secure defaults without compromising usability.
  • Developer focused: The APIs are intended to be functional and useful to build powerful tools. They are not necessarily intended as end user tools but as components aimed at developers. Documentation and UX is aimed at developers not end users.

Audience

The Moby Project is intended for engineers, integrators and enthusiasts looking to modify, hack, fix, experiment, invent and build systems based on containers. It is not for people looking for a commercially supported system, but for people who want to work and learn with open source code.

Relationship with Docker

The components and tools in the Moby Project are initially the open source components that Docker and the community have built for the Docker Project. New projects can be added if they fit with the community goals. Docker is committed to using Moby as the upstream for the Docker Product. However, other projects are also encouraged to use Moby as an upstream, and to reuse the components in diverse ways, and all these uses will be treated in the same way. External maintainers and contributors are welcomed.

The Moby project is not intended as a location for support or feature requests for Docker products, but as a place for contributors to work on open source code, fix bugs, and make the code more useful. The releases are supported by the maintainers, community and users, on a best efforts basis only, and are not intended for customers who want enterprise or commercial support; Docker EE is the appropriate product for these use cases.


Legal

Brought to you courtesy of our legal counsel. For more context, please see the NOTICE document in this repo.

Use and transfer of Moby may be subject to certain restrictions by the United States and other governments.

It is your responsibility to ensure that your use and/or transfer does not violate applicable laws.

For more information, please see https://www.bis.doc.gov

Licensing

Moby is licensed under the Apache License, Version 2.0. See LICENSE for the full license text.