Skip to content

Update go dependencies (major)#359

Open
red-hat-konflux[bot] wants to merge 1 commit into
mainfrom
konflux/mintmaker/main/major-go-deps
Open

Update go dependencies (major)#359
red-hat-konflux[bot] wants to merge 1 commit into
mainfrom
konflux/mintmaker/main/major-go-deps

Conversation

@red-hat-konflux
Copy link
Copy Markdown
Contributor

@red-hat-konflux red-hat-konflux Bot commented Apr 4, 2026

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Confidence
github.com/containerd/containerd v1.7.29v2.3.0 age confidence
github.com/containerd/errdefs v0.3.0v1.0.0 age confidence
github.com/docker/cli v25.0.1+incompatiblev29.4.3+incompatible age confidence
github.com/docker/docker v25.0.13+incompatiblev28.5.2+incompatible age confidence
github.com/gin-contrib/sse v0.1.0v1.1.1 age confidence
github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376v2.0.2 age confidence
github.com/hashicorp/hcl v1.0.0v2.24.0 age confidence
github.com/imdario/mergo v0.3.12v1.0.2 age confidence
github.com/imdario/mergo v0.3.13v1.0.2 age confidence
github.com/matttproud/golang_protobuf_extensions v1.0.4v2.0.0 age confidence
github.com/segmentio/backo-go v0.0.0-20200129164019-23eae7c10bd3v1.1.0 age confidence
gopkg.in/yaml.v2 v2.4.0v3.0.1 age confidence
k8s.io/klog v1.0.0v2.140.0 age confidence
oras.land/oras-go v1.2.5v2.6.0 age confidence
sigs.k8s.io/structured-merge-diff/v4 v4.2.3v6.4.0 age confidence
sigs.k8s.io/structured-merge-diff/v4 v4.4.1v6.4.0 age confidence

Warning

Some dependencies could not be looked up. Check the warning logs for more information.


Release Notes

containerd/containerd (github.com/containerd/containerd)

v2.3.0: containerd 2.3.0

Compare Source

Welcome to the v2.3.0 release of containerd!

The third minor release of containerd 2.x focuses on continued stability alongside
new features and improvements. This is the third time-based release for containerd.

Starting with containerd 2.3, the project has moved to release cadence aligned with
the Kubernetes release schedule, with new minor releases about every 4 months. The
containerd 2.3 release is also the first annual LTS (Long Term Stable) release under
this new schedule, with support planned for at least two years. Direct upgrades
between sequential LTS releases (e.g., 1.7 to 2.3) will be tested and supported.

Highlights
  • Add transfer types for container filesystem copy (#​13165)
  • Add option to inject trace ID to logs (#​13117)
  • Propagate OpenTelemetry traces in outgoing RPCs from plugin clients (#​13113)
  • Update plugin config migration to run on load (#​12608)
  • Update sandbox API to include spec field (#​12840)
Container Runtime Interface (CRI)
  • Allow containers to use user namespaces with host networking (#​12518)
  • Wire UpdatePodSandboxResources to Sandbox API (#​13118)
  • Unpack images with per-layer labels for specific runtime (#​12835)
  • Populate ImageId field in container status (#​12787)
  • Set annotations parameter in CreateSandbox request (#​12566)
  • Add background stats collector to calculate UsageNanoCores for containers and pod sandboxes (#​12629)
Image Distribution
  • Support zstd-wrapped EROFS layers (#​13185)
  • Add os.features support for EROFS native container images (#​13091)
  • Add EROFS layer media type (#​12567)
Image Storage
  • Add dmverity support to the erofs snapshotter (#​12502)
  • Use fsmount API to avoid PAGE_SIZE limit for erofs (#​12783)
Node Resource Interface (NRI)
Runtime
  • Add configured socket directory to shim bootstrap protocol (#​12785)
  • Introduce shim bootstrap protocol (#​12786)
  • Fix binary logging driver not blocking container start on failure (#​12595)
  • Use new filtered cgroups stats API (#​12901)
  • Update OOMKilled event handling (#​12714)
Snapshotters
  • Propagate parent chain ID and diff ID via labels during snapshot preparation (#​13071)
ctr development tool
  • Detect vendor in CDI specs to generate device IDs for --gpus in ctr (#​12839)
Breaking
  • Accumulate owners for OCI hook adjustments, disallowing commas in plugin names (containerd/nri#264)
Deprecations

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Maksym Pavlenko
  • Derek McGowan
  • Sebastiaan van Stijn
  • Krisztian Litkey
  • Samuel Karp
  • Wei Fu
  • Akihiro Suda
  • Phil Estes
  • Mike Brown
  • Markus Lehtonen
  • Hudson Zhu
  • Davanum Srinivas
  • Chris Henzie
  • Gao Xiang
  • Chengyu Zhu
  • Akhil Mohan
  • Kazuyoshi Kato
  • Sergey Kanzhelev
  • Austin Vazquez
  • ningmingxiao
  • Aadhar Agarwal
  • Andrew Halaney
  • Apurv Barve
  • Bing Hongtao
  • Brian Goff
  • Michael Zappa
  • Paweł Gronowski
  • Fabiano Fidêncio
  • Hasan Siddiqui
  • Jintao Zhang
  • Paulo Oliveira
  • Shiv Tyagi
  • Albin Kerouanton
  • Alex Lyn
  • Avinesh Singh
  • Danny Canter
  • Esteban Ginez
  • Henry Wang
  • Jin Dong
  • Jérôme Poulin
  • Laura Lorenz
  • Luke Hinds
  • Mark Dodgson
  • Sascha Grunert
  • Tianon Gravi
  • majianhan
  • qiuxue
  • Adrien Delorme
  • Alessio Biancalana
  • Alex Chernyakhovsky
  • Andrey Noskov
  • Andrey Smirnov
  • Annie Cherkaev
  • Antti Kervinen
  • Anuj Singh
  • Benjamin Elder
  • Bo Jiang
  • Cameron McDermott
  • Chris Adeniyi-Jones
  • Chris Chang
  • Chris Henderson
  • Cindy Li
  • CrazyMax
  • Eldon Stegall
  • Evan Lezar
  • Fletcher Woodruff
  • Gaurav Ghildiyal
  • Harsh Rawat
  • Hayato Kiwata
  • Joseph Zhang
  • Justin Chadwell
  • Kaleab Ayenew
  • Manuel de Brito Fontes
  • Mikhail Dmitrichenko
  • Mujib Ahasan
  • Neeraj Krishna Gopalakrishna
  • Pierluigi Lenoci
  • Ricardo Branco
  • Rob Murray
  • Rodrigo Campos
  • Sameer
  • Sameer Saeed
  • Sanil Khurana
  • Shachar Tal
  • Shaobao Feng
  • Shiming Zhang
  • Sreeram Venkitesh
  • Tariq Ibrahim
  • Tim Windelschmidt
  • Tõnis Tiigi
  • Wade Simmons
  • Weixie Cui
  • Will Jordan
  • William Myers
  • Yohei Yamamoto
  • You Binhao
  • Youfu Zhang
  • Yuanliang Zhang
  • delthas
  • guodong
  • jinda.ljd
  • jokemanfire
  • pandaWall
Dependency Changes
  • cyphar.com/go-pathrs v0.2.1 new
  • github.com/Microsoft/go-winio v0.6.2 -> ad3df93
  • github.com/Microsoft/hcsshim v0.14.0-rc.1 -> v0.15.0-rc.1
  • github.com/cenkalti/backoff/v5 v5.0.3 new
  • github.com/checkpoint-restore/checkpointctl v1.4.0 -> v1.5.0
  • github.com/containerd/cgroups/v3 v3.1.0 -> v3.1.3
  • github.com/containerd/containerd/api v1.10.0 -> v1.11.0
  • github.com/containerd/continuity v0.4.5 -> v0.5.0
  • github.com/containerd/go-dmverity v0.1.0 new
  • github.com/containerd/imgcrypt/v2 v2.0.1 -> v2.0.2
  • github.com/containerd/nri v0.10.0 -> v0.12.0
  • github.com/containerd/platforms v1.0.0-rc.2 -> v1.0.0-rc.4
  • github.com/containerd/plugin v1.0.0 -> v1.1.0
  • github.com/containerd/ttrpc v1.2.7 -> v1.2.8
  • github.com/containerd/zfs/v2 v2.0.0-rc.0 -> v2.0.0
  • github.com/containernetworking/plugins v1.8.0 -> v1.9.1
  • github.com/coreos/go-systemd/v22 v22.6.0 -> v22.7.0
  • github.com/cyphar/filepath-securejoin v0.6.0 new
  • github.com/davecgh/go-spew v1.1.1 -> d8f796a
  • github.com/erofs/go-erofs v0.3.0 new
  • github.com/go-jose/go-jose/v4 v4.1.2 -> v4.1.4
  • github.com/grpc-ecosystem/grpc-gateway/v2 v2.26.1 -> v2.28.0
  • github.com/intel/goresctrl v0.10.0 -> v0.12.0
  • github.com/klauspost/compress v1.18.1 -> v1.18.5
  • github.com/moby/spdystream v0.5.0 -> v0.5.1
  • github.com/opencontainers/runtime-spec v1.2.1 -> v1.3.0
  • github.com/opencontainers/runtime-tools 0ea5ed0 -> edf4cb3
  • github.com/opencontainers/selinux v1.12.0 -> v1.13.1
  • github.com/pelletier/go-toml/v2 v2.2.4 -> v2.3.0
  • github.com/pmezard/go-difflib v1.0.0 -> 5d4384e
  • github.com/prometheus/common v0.66.1 -> v0.67.5
  • github.com/prometheus/procfs v0.16.1 -> v0.19.2
  • github.com/sirupsen/logrus v1.9.3 -> v1.9.4
  • github.com/tetratelabs/wazero v1.9.0 -> v1.11.0
  • go.opentelemetry.io/auto/sdk v1.1.0 -> v1.2.1
  • go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.60.0 -> v0.68.0
  • go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.60.0 -> v0.68.0
  • go.opentelemetry.io/otel v1.37.0 -> v1.43.0
  • go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.35.0 -> v1.43.0
  • go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.35.0 -> v1.43.0
  • go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.35.0 -> v1.43.0
  • go.opentelemetry.io/otel/metric v1.37.0 -> v1.43.0
  • go.opentelemetry.io/otel/sdk v1.37.0 -> v1.43.0
  • go.opentelemetry.io/otel/trace v1.37.0 -> v1.43.0
  • go.opentelemetry.io/proto/otlp v1.5.0 -> v1.10.0
  • go.yaml.in/yaml/v2 v2.4.2 -> v2.4.3
  • golang.org/x/crypto v0.41.0 -> v0.49.0
  • golang.org/x/mod v0.29.0 -> v0.35.0
  • golang.org/x/net v0.43.0 -> v0.52.0
  • golang.org/x/oauth2 v0.30.0 -> v0.35.0
  • golang.org/x/sync v0.17.0 -> v0.20.0
  • golang.org/x/sys v0.37.0 -> v0.43.0
  • golang.org/x/term v0.34.0 -> v0.41.0
  • golang.org/x/text v0.28.0 -> v0.35.0
  • golang.org/x/time v0.14.0 -> v0.15.0
  • google.golang.org/genproto/googleapis/api a7a43d2 -> 9d38bb4
  • google.golang.org/genproto/googleapis/rpc a7a43d2 -> 6f92a3b
  • google.golang.org/grpc v1.76.0 -> v1.80.0
  • google.golang.org/protobuf v1.36.10 -> f2248ac
  • k8s.io/api v0.34.1 -> v0.36.0
  • k8s.io/apimachinery v0.34.1 -> v0.36.0
  • k8s.io/client-go v0.34.1 -> v0.36.0
  • k8s.io/component-base v0.36.0 new
  • k8s.io/cri-api v0.34.1 -> v0.36.0
  • k8s.io/cri-client v0.36.0 new
  • k8s.io/cri-streaming v0.36.0 new
  • k8s.io/klog/v2 v2.130.1 -> v2.140.0
  • k8s.io/kube-openapi 5883c5e new
  • k8s.io/streaming v0.36.0 new
  • k8s.io/utils 4c0f3b2 -> 28399d8
  • sigs.k8s.io/json cfa47c3 -> 2d32026
  • sigs.k8s.io/structured-merge-diff/v6 v6.3.0 -> v6.3.2
  • tags.cncf.io/container-device-interface v1.0.1 -> v1.1.0
  • tags.cncf.io/container-device-interface/specs-go v1.0.0 -> v1.1.0

Previous release can be found at v2.2.0

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.2.3: containerd 2.2.3

Compare Source

Welcome to the v2.2.3 release of containerd!

The third patch release for containerd 2.2 contains various fixes
and updates including a security patch.

Security Updates
Highlights
Container Runtime Interface (CRI)
  • Preserve cgroup mount options for privileged containers (#​13120)
  • Ensure UpdatePodSandbox returns Unimplemented instead of a generic error (#​13023)
Go client
  • Handle absolute symlinks in rootfs user lookup to fix regressions when using Go 1.24 (#​13015)
Image Distribution
  • Enable mount manager in diff walking to fix layer extraction errors with some snapshotters (e.g., EROFS) (#​13198)
  • Apply hardening to prevent TOCTOU race during tar extraction (#​12971)
Runtime
  • Restore support for client-mounted roots in Windows containers using process isolation (#​13195)
  • Update runc to v1.3.5 (#​13061)
  • Apply absolute symlink resolution to /etc/group in OCI spec to fix lookups on NixOS-style systems (#​13019)
  • Handle absolute symlinks in rootfs user lookup to fix regressions when using Go 1.24 (#​13015)
Snapshotters
  • Fix bug that caused whiteouts to be ignored when parallel unpack was used (#​13125)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Samuel Karp
  • Sebastiaan van Stijn
  • Maksym Pavlenko
  • Chris Henzie
  • Derek McGowan
  • Paulo Oliveira
  • Henry Wang
  • Phil Estes
  • Wei Fu
  • Akihiro Suda
  • Gao Xiang
  • Ricardo Branco
  • Shachar Tal
Changes
40 commits

  • Prepare release notes for v2.2.3 (#​13224)
  • update github.com/moby/spdystream v0.5.1 (#​13217)
    • 31bd34a06 update github.com/moby/spdystream v0.5.1
  • vendor: github.com/klauspost/compress v1.18.5 (#​13197)
    • 1336f6c45 vendor: github.com/klauspost/compress v1.18.5
  • diff/walking: enable mount manager (#​13198)
    • 409f75be8 diff/walking: enable mount manager
  • update runhcs to v0.14.1 (#​13195)
  • vendor: github.com/Microsoft/hcsshim v0.14.1 (#​13196)
    • 8bd1b74e5 vendor: github.com/Microsoft/hcsshim v0.14.1
    • c6b0be8e1 vendor: github.com/Microsoft/hcsshim v0.14.0
  • update to Go 1.25.9, 1.26.2 (#​13190)
  • Skip TestExportAndImportMultiLayer on s390x (#​13154)
    • be554f478 Skip TestExportAndImportMultiLayer on s390x
  • Tweak mount info for overlayfs in case of parallel unpack (#​13125)
    • 660de195b Tweak mount info for overlayfs in case of parallel unpack
    • bc9274a4b Add integration test for issue 13030
  • Preserve cgroup mount options for privileged containers (#​13120)
    • c387890b5 Add integration test for privileged container cgroup mounts
    • 047a335a6 Forward RUNC_FLAVOR env var down to integration tests
    • 9b2d72ee0 Preserve host cgroup mount options for privileged containers
    • 5b66cd6a0 Move cgroup namespace placement higher in spec builder
  • update runc binary to v1.3.5 (#​13061)
    • 584205c2f [release/2.2] update runc binary to v1.3.5
  • Fix vagrant on CI (#​13066)
  • Fix TOCTOU race bug in tar extraction (#​12971)
    • fbed68b8f Fix TOCTOU race bug in tar extraction
  • cri: UpdatePodSandbox should return Unimplemented (#​13023)
    • a83510103 cri: UpdatePodSandbox should return Unimplemented
  • fix(oci): apply absolute symlink resolution to /etc/group (#​13019)
    • ee4179e52 fix(oci): apply absolute symlink resolution to /etc/group
  • fix(oci): handle absolute symlinks in rootfs user lookup (#​13015)
    • fd061b848 test(oci): use fstest and mock fs for better symlink coverage
    • 5d44d2c22 fix(oci): handle absolute symlinks in rootfs user lookup
  • update to go1.25.8, test go1.26.1 (#​13011)
    • 00c776f07 update to go1.25.8, test go1.26.1

Dependency Changes
  • github.com/Microsoft/hcsshim v0.14.0-rc.1 -> v0.14.1
  • github.com/klauspost/compress v1.18.1 -> v1.18.5
  • github.com/moby/spdystream v0.5.0 -> v0.5.1

Previous release can be found at v2.2.2

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.2.2: containerd 2.2.2

Compare Source

Welcome to the v2.2.2 release of containerd!

The second patch release for containerd 2.2 contains various fixes and improvements.

Highlights
Container Runtime Interface (CRI)
  • Fix migrated CRI image config when using legacy registry mirrors (#​12987)
  • Unpack images with per-layer labels for runtime-specific snapshotters (#​12936)
  • Fix CNI issue where DEL is never executed after a restart (#​12926)
  • Harden error handling to strip potentially-sensitive registry parameters (#​12804)
  • Fix nil pointer dereference in container spec memory metrics when memory constraints are not fully configured (#​12731)
  • Use the specified runtime handler when pulling images (#​12721)
  • Reduce noisy CDI logs (#​12717)
  • Fix regression for pulling encrypted images (#​12712)
Runtime
  • Fix unintended dropping of mount flags for read-only bind-mounts in user namespaces (#​12944)
  • Fix AppArmor bug disallowing unix domain sockets on newer kernels (#​12897)
ctr development tool
  • Fix ctr image mount failing with "no such device" (#​12831)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Maksym Pavlenko
  • Akhil Mohan
  • Samuel Karp
  • Wei Fu
  • Michael Zappa
  • Phil Estes
  • Fabiano Fidêncio
  • Jérôme Poulin
  • Luke Hinds
  • Aadhar Agarwal
  • Akihiro Suda
  • Alex Chernyakhovsky
  • Chris Adeniyi-Jones
  • Kazuyoshi Kato
  • Rodrigo Campos
  • Sebastiaan van Stijn
  • You Binhao
  • ningmingxiao
  • qiuxue
Changes
48 commits

  • Prepare release notes for v2.2.2 (#​12998)
  • Fix migrated CRI image config when using legacy registry mirrors (#​12987)
    • a20dead7c set default config_path in plugin init
  • Unpack images with per-layer labels for runtime-specific snapshotters (#​12936)
    • a5f83d8c2 cri: unpack images with per-layer labels for runtime-specific snapshotters
  • ci: modprobe xt_comment on almalinux (#​12957)
    • 68855cb0b ci: modprobe xt_comment on almalinux
  • Fix unintended dropping of mount flags for read-only bind-mounts in user namespaces (#​12944)
    • ef7a8beb3 core/mount: add test for getUnprivilegedMountFlags
    • 07b2cc07e core/mount: fix getUnprivilegedMountFlags iterating over indices instead of values
  • Fix CNI issue where DEL is never executed after a restart (#​12926)
  • Fix AppArmor bug disallowing unix domain sockets on newer kernels (#​12897)
  • ci: add build/test go1.26.0, drop go1.24 (#​12917)
    • 5dbf1b915 update golangci-lint to v2.9.0 with go1.26 support
    • 8ec695ebe remove windows/arm from cross build
    • b9c22a6e3 ci: build/test go1.26.0
  • integration: Fix TestImageLoad() failure on CI (#​12906)
    • 09b876a81 integration: Fix TestImageLoad() failure on CI
  • cri: Fix image volumes with user namespaces (#​12885)
    • 172ba65b6 cri: Fix image volumes with user namespaces
  • update to go1.24.13, go1.25.7 (#​12871)
  • ci: set fetch-depth for containerd to 0 for version parsing (#​12875)
    • e46a7a286 set fetch-depth for containerd to 0 for version parsing
  • Fix ctr image mount failing with "no such device" (#​12831)
    • 1d7908273 core/mount/manager: fix bind mount missing rbind option
    • 3d509bcd3 core/mount/manager: add tests for WithTemporary option
  • Harden error handling to strip potentially-sensitive registry parameters (#​12804)
    • cb3ae2119 fix: sanitize error before gRPC return to prevent credential leak in pod events
  • bump google.golang.org/grpc from 1.76.0 to 1.78.0 (#​12739)
    • 533a2552e build(deps): bump google.golang.org/grpc from 1.77.0 to 1.78.0
    • b120237fb build(deps): bump google.golang.org/grpc from 1.76.0 to 1.77.0
  • Fix nil pointer dereference in container spec memory metrics when memory constraints are not fully configured (#​12731)
    • 4be4e5156 Fix nil pointer dereference in container spec memory metrics
  • cri: emit warning for concurrent CreateContainer (#​12735)
    • a76eb698a cri: emit warning for concurrent CreateContainer
  • Use the specified runtime handler when pulling images (#​12721)
    • 3d2e188b1 cri: Use the runtimeHandler parameter in PullImage
  • Reduce noisy CDI logs (#​12717)
    • 633057382 cri: move noisy CDI logs to debug level
  • Fix regression for pulling encrypted images (#​12712)

Dependency Changes
  • github.com/go-jose/go-jose/v4 v4.1.2 -> v4.1.3
  • go.opentelemetry.io/auto/sdk v1.1.0 -> v1.2.1
  • go.opentelemetry.io/otel v1.37.0 -> v1.38.0
  • go.opentelemetry.io/otel/metric v1.37.0 -> v1.38.0
  • go.opentelemetry.io/otel/sdk v1.37.0 -> v1.38.0
  • go.opentelemetry.io/otel/trace v1.37.0 -> v1.38.0
  • golang.org/x/oauth2 v0.30.0 -> v0.32.0
  • google.golang.org/genproto/googleapis/api a7a43d2 -> ab9386a
  • google.golang.org/genproto/googleapis/rpc a7a43d2 -> ab9386a
  • google.golang.org/grpc v1.76.0 -> v1.78.0

Previous release can be found at v2.2.1

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.2.1: containerd 2.2.1

Compare Source

Welcome to the v2.2.1 release of containerd!

The first patch release for containerd 2.2 contains various fixes and improvements.

Highlights
Container Runtime Interface (CRI)
  • Redact all query parameters in CRI error logs (#​12546)
Image Distribution
  • Fix image defaults on Darwin to usable configuration (#​12544)
  • Fix possible panic from WithMediaTypeKeyPrefix (#​12516)
Runtime

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Krisztian Litkey
  • Markus Lehtonen
  • Akihiro Suda
  • Mike Brown
  • Sebastiaan van Stijn
  • Derek McGowan
  • Heran Yang
  • Wei Fu
  • Phil Estes
  • Samuel Karp
  • Austin Vazquez
  • Sascha Grunert
  • Akhil Mohan
  • Andrey Noskov
  • Brian Goff
  • CrazyMax
  • Davanum Srinivas
  • Gaurav Ghildiyal
  • Neeraj Krishna Gopalakrishna
  • Paweł Gronowski
  • Tariq Ibrahim
  • TomerLev
  • Tõnis Tiigi
  • bo.jiang
  • ningmingxiao
Changes
53 commits

  • Prepare release notes for v2.2.1 (#​12677)
  • cri,nri: bump NRI dependencies to v0.11.0 (#​12701)
    • c22cf5d49 cri,nri: pass any linux security profile to plugins.
    • d7532de75 cri,nri: pass any linux RDT constraints to plugins.
    • ef36e6181 cri,nri: pass any linux net devices to plugins.
    • d56faf426 cri,nri: pass any linux scheduler attributes to plugins.
    • e1824d261 cri,nri: pass any linux I/O priority to plugins.
    • 01d5490ae go.{mod,sum}: bump NRI deps to v0.11.0, re-vendor.
  • pkg/tracing: HTTPStatusCodeAttributes: remove use of deprecated SemConv const (#​12697)
    • 58d23ab63 pkg/tracing: HTTPStatusCodeAttributes: remove use of deprecated SemConv const
  • cri/nri: short-circuit nil adjustment. (#​12672)
    • 05ccbb3a7 cri/nri: short-circuit nil adjustment.
  • go.{mod,sum}: bump CDI deps to v1.1.0. (#​12664)
    • c166a577d go.{mod,sum} bump CDI deps to v1.1.0.
  • go.mod: containerd/zfs v2.0.0; remove exclude rules (#​12654)
    • 73a08aa00 go.mod: remove exclude rules
    • cee08c8af build(deps): bump github.com/containerd/zfs/v2 from 2.0.0-rc.0 to 2.0.0
  • go.mod: github.com/containernetworking/plugins v1.9.0 (#​12658)
    • 8a5fc8641 go.mod: github.com/containernetworking/plugins v1.9.0
  • go.mod: golang.org/x/crypto v0.45.0 (#​12638)
    • 55c93d6fb go.mod: golang.org/x/crypto v0.45.0
  • ci :bump Go 1.24.11, 1.25.5 (#​12625)
  • core/runtime/v2: remove uses of otelgrpc.UnaryClientInterceptor (#​12622)
    • ed19c5420 core/runtime/v2: remove uses of otelgrpc.UnaryClientInterceptor
  • ci: update CIFuzz actions to support Ubuntu 24.04 (#​12632)
    • 952237d9b ci: update CIFuzz actions to support Ubuntu 24.04
  • Update runc binary to v1.3.4 (#​12593)
    • fb5b818a9 runc: Update runc binary to v1.3.4
  • : update containerd/cgroups from v3.1.0 to v3.1.2 (#​12598)
    • 51582ed27 bump containerd/cgroups to v3.1.2
    • 50d0e4fd4 build(deps): bump github.com/containerd/cgroups/v3 from 3.1.0 to 3.1.1
  • core/mount: should not call removeLoop when set autoclear (#​12587)
    • 41a69eb0d core/mount: should not call removeLoop when set autoclear
  • build(deps): bump github.com/opencontainers/selinux (#​12589)
    • e3bf2b80b build(deps): bump github.com/opencontainers/selinux
  • .github: skip 5 critest cases for window-2022 (#​12584)
    • da8e846f9 .github: skip 5 critest cases in window CI pipeline
  • Fix image defaults on Darwin to usable configuration (#​12544)
    • d154e234b Update the ctr pull defaults when using the transfer service
    • 09364216d Fix transfer unpack defaults on darwin
    • 2055d3c62 Update default differs on darwin
    • 9da97686d Use default writable size in erofs snapshotter for non-Linux hosts
    • eeb0f889a Update default erofs block size on macOS during erofs diff
  • Redact all query parameters in CRI error logs (#​12546)
    • c707f771a fix: redact all query parameters in CRI error logs
  • Revert "Implement io.ReaderAt on docker fetch reader" (#​12542)
    • 678f944dd Revert "Implement io.ReaderAt on docker fetch reader"
  • Fix possible panic from WithMediaTypeKeyPrefix (#​12516)
    • 8b73c2de3 remotes: fix possible panic from WithMediaTypeKeyPrefix

Changes from containerd/cgroups
13 commits


Configuration

📅 Schedule: Branch creation - Between 07:00 PM and 11:59 PM ( * 19-23 * * * ), Between 12:00 AM and 02:59 AM ( * 0-2 * * * ) in timezone America/Toronto, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@openshift-ci openshift-ci Bot requested review from elsony and thepetk April 4, 2026 01:18
@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Apr 4, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: red-hat-konflux[bot]
Once this PR has been reviewed and has the lgtm label, please assign thepetk for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@red-hat-konflux red-hat-konflux Bot force-pushed the konflux/mintmaker/main/major-go-deps branch from 9a7b18f to 7087e1a Compare April 8, 2026 05:24
@red-hat-konflux red-hat-konflux Bot force-pushed the konflux/mintmaker/main/major-go-deps branch from 7087e1a to a68ce65 Compare April 17, 2026 01:27
@red-hat-konflux red-hat-konflux Bot force-pushed the konflux/mintmaker/main/major-go-deps branch from a68ce65 to 7b94afb Compare April 24, 2026 01:46
@red-hat-konflux red-hat-konflux Bot force-pushed the konflux/mintmaker/main/major-go-deps branch from 7b94afb to 30ec608 Compare May 7, 2026 02:28
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux Bot force-pushed the konflux/mintmaker/main/major-go-deps branch from 30ec608 to e745f07 Compare May 15, 2026 01:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants