containerd 2.0.1
Welcome to the v2.0.1 release of containerd!
The first patch release for containerd 2.0 includes a number of bug fixes and improvements.
Highlights
Container Runtime Interface (CRI)
- Fix apply IoOwner options when not in user namespace (#11151)
- Fix cri grpc plugin config migration (#11140)
- Support CNI STATUS Verb (containerd/go-cni#123)
Image Distribution
- Update differ to handle zstd media types (#11068)
Runtime
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
- Derek McGowan
- Wei Fu
- Archit Kulkarni
- Jin Dong
- Phil Estes
- Akhil Mohan
- Akihiro Suda
- Alexey Lunev
- Austin Vazquez
- Maksym Pavlenko
- Mike Brown
- Michael Zappa
- Samuel Karp
- Sebastiaan van Stijn
- Andrey Smirnov
- Davanum Srinivas
Changes
50 commits
- Prepare release notes for v2.0.1 (#11158)
b0ece5dc5
Prepare release notes for v2.0.1
- build(deps): bump actions/attest-build-provenance from 1.4.4 to 2.1.0 (#11154)
fe6957084
build(deps): bump actions/attest-build-provenance from 1.4.4 to 2.1.0
- update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+ (#11153)
eb2ce6882
update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+
- ctr pull should unpack for default platform when transfer service is used (#11139)
44cdca68b
ctr pull unpack for default platform using transfer service
- Fix apply IoOwner options when not in user namespace (#11151)
018d83650
internal/cri: should not apply IoOwner options
- Update go-cni for CNI STATUS (#11146)
5eb7995a9
feat: update go-cni version for CNI STATUS
- Fix cri grpc plugin config migration (#11140)
- Update runc binary to v1.2.3 (#11142)
a53eff53d
update runc binary to v1.2.3
- Update differ to handle zstd media types (#11068)
73f57acb0
Update differ to handle zstd media types
- update to go1.23.4 / go1.22.10 (#11109)
290e8bc70
update to go1.23.4 / go1.22.10
- CI: update Fedora to 41 (#11110)
62b790bfa
CI: update Fedora to 41
- Fix panic due to nil dereference cgroups v2 (#11098)
3ba2df924
fix panic due to nil dereference cgroups v2
- Publish attestation as release artifact (#11067)
34a45cab2
Publish attestation as release artifact
- Move rockylinux 9.4 to almalinux/9 in CI (#11053)
7dec6b460
move rocky 9.4 to almalinux/9 in CI
- *: should align pipe's owner with init process (#11035)
cf07f28ee
*: should align pipe's owner with init process
- fix: set the credentials even if not provided (#11031)
986088866
fix: set the credentials even if not provided
- fsverity_test.go: fix nil pointer derefence, fix test fail, fix minor/major device numbers resolving (#10978)
- update runc binary to 1.2.2 (#11023)
9081e979f
update runc binary to 1.2.2
- Revert "Disable vagrant strict dependency checking" (#11009)
6399c936f
Revert "Disable vagrant strict dependency checking"
- fsverity_linux.go: Fix fsverity.IsEnabled() for big endian systems (#11005)
a7f2b562f
fsverity_linux.go: Fix fsverity.IsEnabled() for big endian systems
- bump github.com/containerd/typeurl/v2 from 2.2.2 to 2.2.3 (#10997)
389e781ea
build(deps): bump github.com/containerd/typeurl/v2 from 2.2.2 to 2.2.3
- update to go1.23.3 / go1.22.9 (#10973)
5b879f30c
update to go1.23.3 / go1.22.9
- ci: enable marking 2.0 releases as latest (#10963)
458215f6c
ci: enable marking 2.0 releases as latest
- Avoid arch info in the sed/replace when building cri-cni-containerd.tar.gz (#10968)
e99c2b55c
Avoid arch info in the sed/replace when building cri-cni-containerd.tar.gz
Changes from containerd/go-cni
7 commits
- Support CNI STATUS Verb (containerd/go-cni#123)
208eca9
support CNI status verb
- Bump github actions dependencies to match containerd CI repo and fix lint (containerd/go-cni#122)
Dependency Changes
- github.com/containerd/go-cni v1.1.10 -> v1.1.11
- github.com/containerd/typeurl/v2 v2.2.2 -> v2.2.3
Previous release can be found at v2.0.0
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz
: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz
: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.
In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.