Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: moby/moby
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v20.10.7
Choose a base ref
...
head repository: moby/moby
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v20.10.8
Choose a head ref

Commits on Jun 7, 2021

  1. Fix setting swaplimit=true without checking

    Signed-off-by: Jakub Guzik <jakubmguzik@gmail.com>
    (cherry picked from commit 7ef6ece)
    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    jmguzik authored and AkihiroSuda committed Jun 7, 2021
    Copy the full SHA
    a57fc0e View commit details

Commits on Jun 10, 2021

  1. Jenkinsfile: skip ppc64le and s390x by default on pull requests

    This changes CI to skip these platforms by default. The ppc64le and s390x
    machines are "pet machines", configuration may be outdated, and these
    machines are known to be flaky.
    
    Building and verifying packages for these platforms is being handed
    over to the IBM team.
    
    We can still run these platforms for specific pull requests by selecting
    the checkboxes.
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 82c7e90)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jun 10, 2021
    Copy the full SHA
    523f8b3 View commit details
  2. Merge pull request #42507 from thaJeztah/20.10_backport_disable_power_z

    [20.10 backport] Jenkinsfile: skip ppc64le and s390x by default on pull requests
    tianon authored Jun 10, 2021
    Copy the full SHA
    4d29d58 View commit details

Commits on Jun 18, 2021

  1. Fix possible overlapping IPs

    A node is no longer using its load balancer IP address when it no longer
    has tasks that use the network that requires that load balancer. When
    this occurs, the swarmkit manager will free that IP in IPAM, and may
    reaassign it.
    
    When a task shuts down cleanly, it attempts removal of the networks it
    uses, and if it is the last task using those networks, this removal
    succeeds, and the load balancer IP is freed.
    
    However, this behavior is absent if the container fails. Removal of the
    networks is never attempted.
    
    To address this issue, I amend the executor. Whenever a node load
    balancer IP is removed or changed, that information is passedd to the
    executor by way of the Configure method. By keeping track of the set of
    node NetworkAttachments from the previous call to Configure, we can
    determine which, if any, have been removed or changed.
    
    At first, this seems to create a race, by which a task can be attempting
    to start and the network is removed right out from under it. However,
    this is already addressed in the controller. The controller will attempt
    to recreate missing networks before starting a task.
    
    Signed-off-by: Drew Erny <derny@mirantis.com>
    (cherry picked from commit 0d9b0ed)
    Signed-off-by: Ameya Gawde <agawde@mirantis.com>
    dperny authored and ameyag committed Jun 18, 2021
    Copy the full SHA
    89edb68 View commit details

Commits on Jun 19, 2021

  1. Merge pull request #42538 from ameyag/20.10-overlap-ip

    [20.10 backport] Fix possible overlapping IPs
    AkihiroSuda authored Jun 19, 2021
    Copy the full SHA
    87e28a6 View commit details

Commits on Jun 23, 2021

  1. vendor: swarmkit to fix deadlock in log broker

    Signed-off-by: Ameya Gawde <agawde@mirantis.com>
    ameyag committed Jun 23, 2021
    Copy the full SHA
    4d42e18 View commit details

Commits on Jun 24, 2021

  1. Merge pull request #42561 from ameyag/20.10-logbroker

    [20.10] vendor: swarmkit to fix deadlock in log broker (bump_20.10)
    thaJeztah authored Jun 24, 2021
    Copy the full SHA
    46a7ebc View commit details
  2. update runc binary to v1.0.0 GA

    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    (cherry picked from commit 64badfc)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    AkihiroSuda authored and thaJeztah committed Jun 24, 2021
    Copy the full SHA
    872cb16 View commit details

Commits on Jul 2, 2021

  1. Run s390x tests on Ubuntu 20.04

    Signed-off-by: Stefan Scherer <stefan.scherer@docker.com>
    (cherry picked from commit 7a6cac2)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    StefanScherer authored and thaJeztah committed Jul 2, 2021
    Copy the full SHA
    618f6a7 View commit details

Commits on Jul 3, 2021

  1. Dockerfile: update go-swagger to fix validation on Go1.16

    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 42d2048)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 3, 2021
    Copy the full SHA
    78bb0f4 View commit details

Commits on Jul 6, 2021

  1. dockerd-rootless.sh: avoid /run/xtables.lock EACCES on SELinux hosts

    Previously, running dockerd-rootless.sh on SELinux-enabled hosts
    was failing with "can't open lock file /run/xtables.lock: Permission denied" error.
    (issue 41230).
    
    This commit avoids hitting the error by relabeling /run in the RootlessKit child.
    The actual /run on the parent is unaffected.
    
    https://github.com/containers/podman/blob/e6fc34b71aa9d876b1218efe90e14f8b912b0603/libpod/networking_linux.go#L396-L401
    
    Tested on Fedora 34
    
    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    (cherry picked from commit cdaf82b)
    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    AkihiroSuda committed Jul 6, 2021
    Copy the full SHA
    44f95c7 View commit details
  2. rootless: disable overlay2 if running with SELinux

    Kernel 5.11 introduced support for rootless overlayfs, but incompatible with SELinux.
    
    On the other hand, fuse-overlayfs is compatible.
    
    Close issue 42333
    
    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    (cherry picked from commit 4300a52)
    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    AkihiroSuda committed Jul 6, 2021
    Copy the full SHA
    869b50e View commit details
  3. rootless: fix "x509: certificate signed by unknown authority" on open…

    …SUSE Tumbleweed
    
    openSUSE Tumbleweed was facing "x509: certificate signed by unknown authority" error,
    as `/etc/ssl/ca-bundle.pem` is provided as a symlink to `../../var/lib/ca-certificates/ca-bundle.pem`,
    which was not supported by `rootlesskit --copy-up=/etc` .
    
    See rootless-containers/rootlesskit issues 225
    
    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    (cherry picked from commit 8610d8c)
    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    AkihiroSuda committed Jul 6, 2021
    Copy the full SHA
    b9cf7b7 View commit details

Commits on Jul 7, 2021

  1. Update v1.41.yaml

    fix containers/create 404 response description
    
    Signed-off-by: Matt Morrison <3241034+Emdot@users.noreply.github.com>
    (cherry picked from commit ff1d9a3)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    Matt Morrison authored and thaJeztah committed Jul 7, 2021
    Copy the full SHA
    025e3a7 View commit details
  2. API: fix 404 status description on container create

    This updates the current swagger file, and all docs versions
    with the same fix as ff1d9a3
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 68b095d)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 7, 2021
    Copy the full SHA
    50c392c View commit details

Commits on Jul 9, 2021

  1. [20.10] vendor github.com/Microsoft/hcsshim 64a2b71405dacf76c95600f4c…

    …756a991ad09cf7c (moby branch)
    
    Brings in microsoft/hcsshim#1065, which fixes #42610.
    
    full diff: microsoft/hcsshim@89a9a3b...64a2b71
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 9, 2021
    Copy the full SHA
    72b66d5 View commit details

Commits on Jul 13, 2021

  1. docker pull: warn when pulled single-arch image does not match --plat…

    …form
    
    This takes the same approach as was implemented on `docker build`, where a warning
    is printed if `FROM --platform=...` is used (added in 3996953)
    
    Before:
    
        docker rmi armhf/busybox
        docker pull --platform=linux/s390x armhf/busybox
    
        Using default tag: latest
        latest: Pulling from armhf/busybox
        d34a655120f5: Pull complete
        Digest: sha256:8e51389cdda2158935f2b231cd158790c33ae13288c3106909324b061d24d6d1
        Status: Downloaded newer image for armhf/busybox:latest
        docker.io/armhf/busybox:latest
    
    With this change:
    
        docker rmi armhf/busybox
        docker pull --platform=linux/s390x armhf/busybox
    
        Using default tag: latest
        latest: Pulling from armhf/busybox
        d34a655120f5: Pull complete
        Digest: sha256:8e51389cdda2158935f2b231cd158790c33ae13288c3106909324b061d24d6d1
        Status: Downloaded newer image for armhf/busybox:latest
        WARNING: image with reference armhf/busybox was found but does not match the specified platform: wanted linux/s390x, actual: linux/arm64
        docker.io/armhf/busybox:latest
    
    And daemon logs print:
    
       WARN[2021-04-26T11:19:37.153572667Z] ignoring platform mismatch on single-arch image  error="image with reference armhf/busybox was found but does not match the specified platform: wanted linux/s390x, actual: linux/arm64" image=armhf/busybox
    
    When pulling without specifying `--platform, no warning is currently printed (but we can add a warning in future);
    
        docker rmi armhf/busybox
        docker pull armhf/busybox
    
        Using default tag: latest
        latest: Pulling from armhf/busybox
        d34a655120f5: Pull complete
        Digest: sha256:8e51389cdda2158935f2b231cd158790c33ae13288c3106909324b061d24d6d1
        Status: Downloaded newer image for armhf/busybox:latest
        docker.io/armhf/busybox:latest
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 424c0eb)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 13, 2021
    Copy the full SHA
    7429792 View commit details
  2. [20.10] update containerd binary to v1.4.7

    full diff: containerd/containerd@v1.4.6...v1.4.7
    
    Welcome to the v1.4.7 release of containerd!
    
    The seventh patch release for containerd 1.4 updates runc to 1.0.0 and contains
    various other fixes.
    
    Notable Updates
    
    - Update runc binary to 1.0.0
    - Fix invalid validation error checking
    - Fix error on image pull resume
    - Fix symlink resolution for disk mounts on Windows
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 13, 2021
    Copy the full SHA
    793340a View commit details

Commits on Jul 14, 2021

  1. Merge pull request #42595 from thaJeztah/20.10_backport_update_swagge…

    …r_fork
    
    [20.10 backport] Dockerfile: update go-swagger to fix validation on Go1.16
    thaJeztah authored Jul 14, 2021
    Copy the full SHA
    4b407e4 View commit details

Commits on Jul 15, 2021

  1. Merge pull request #42637 from thaJeztah/20.10_update_containerd

    [20.10] update containerd binary to v1.4.7
    cpuguy83 authored Jul 15, 2021
    Copy the full SHA
    555bf58 View commit details
  2. Merge pull request #42568 from thaJeztah/20.10_backport_runc_v1.0.0

    [20.10 backport] update runc binary to v1.0.0 GA
    cpuguy83 authored Jul 15, 2021
    Copy the full SHA
    a1a73d1 View commit details
  3. Merge pull request #42602 from thaJeztah/20.10_backport_swagger_404

    [20.10 backport] API: fix 404 status description on container create
    cpuguy83 authored Jul 15, 2021
    Copy the full SHA
    883cc36 View commit details
  4. Merge pull request #42613 from thaJeztah/20.10_update_hcsshim

    [20.10] vendor github.com/Microsoft/hcsshim 64a2b71405dacf76c95600f4c756a991ad09cf7c (moby branch)
    thaJeztah authored Jul 15, 2021
    Copy the full SHA
    c37c7b5 View commit details
  5. Merge pull request #42591 from thaJeztah/20.10_backport_update_s390x_…

    …ubuntu_2004
    
    [20.10 backport] Run s390x tests on Ubuntu 20.04
    thaJeztah authored Jul 15, 2021
    Copy the full SHA
    8a2af96 View commit details
  6. Merge pull request #42479 from AkihiroSuda/cherrypick-42071

    [20.10 backport] Fix setting swaplimit=true without checking
    thaJeztah authored Jul 15, 2021
    Copy the full SHA
    a504476 View commit details
  7. Merge pull request #42462 from AkihiroSuda/cherrypick-rootless-selinu…

    …x-42334
    
    [20.10 backport] rootless:  avoid /run/xtables.lock EACCES on SELinux hosts  ; disable overlay2 if running with SELinux ; fix "x509: certificate signed by unknown authority" on openSUSE Tumbleweed
    thaJeztah authored Jul 15, 2021
    Copy the full SHA
    8b224ca View commit details
  8. Merge pull request #42633 from thaJeztah/20.10_backport_warn_on_non_m…

    …atching_platform
    
    [20.10 backport] docker pull: warn when pulled single-arch image does not match --platform
    thaJeztah authored Jul 15, 2021
    Copy the full SHA
    cc5a381 View commit details
  9. hack/vendor: add check for vendored archive/tar

    Also allow re-vendoring using `./hack/vendor.sh archive/tar`
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 31b2c3b)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    moby authored and thaJeztah committed Jul 15, 2021
    Copy the full SHA
    feaca98 View commit details
  10. hack: add script to regenerate certificates

    Certificates were originally added in c000cb6,
    but did not include a script to generate them. Current versions of Go expect
    certificates to use SAN instead of Common Name fields, so updating the script
    to include those;
    
        x509: certificate relies on legacy Common Name field, use SANs or temporarily
        enable Common Name matching with GODEBUG=x509ignoreCN=0
    
    Some fields were updated to be a bit more descriptive (instead of "replaceme"),
    and the `-text` option was used to include a human-readable variant of the
    content.
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 2fea30f)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 15, 2021
    Copy the full SHA
    1d4a06e View commit details
  11. Update test certificates

    Updates the certificates to account for current versions of Go expecting
    SANs to be used instead of the Common Name field:
    
        FAIL: s390x.integration.plugin.authz TestAuthZPluginTLS (0.53s)
        [2020-07-26T09:36:58.638Z]     authz_plugin_test.go:132: assertion failed:
            error is not nil: error during connect: Get "https://localhost:4271/v1.41/version":
            x509: certificate relies on legacy Common Name field, use SANs or temporarily enable Common Name matching with GODEBUG=x509ignoreCN=0
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit fe54215)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 15, 2021
    Copy the full SHA
    ab9a92f View commit details
  12. pkg/fileutils: TestMatches: remove cases no longer valid for go1.16

    These tests were no longer valid on Go 1.16; related to https://tip.golang.org/doc/go1.16#path/filepath
    
    > The Match and Glob functions now return an error if the unmatched part of
    > the pattern has a syntax error. Previously, the functions returned early on
    > a failed match, and thus did not report any later syntax error in the pattern.
    
    Causing the test to fail:
    
        === RUN   TestMatches
            fileutils_test.go:388: assertion failed: error is not nil: syntax error in pattern: pattern="a\\" text="a"
        --- FAIL: TestMatches (0.00s)
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 2842639)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 15, 2021
    Copy the full SHA
    6793ff2 View commit details
  13. hack/ci/windows.ps1: disable go modules

        INFO: Running integration tests at 05/17/2021 12:54:50...
        INFO: DOCKER_HOST at tcp://127.0.0.1:2357
        INFO: Integration API tests being run from the host:
        INFO: make.ps1 starting at 05/17/2021 12:54:50
        powershell.exe : go: cannot find main module, but found vendor.conf in D:\gopath\src\github.com\docker\docker
        At D:\gopath\src\github.com\docker\docker@tmp\durable-1ed00396\powershellWrapper.ps1:3 char:1
        + & powershell -NoProfile -NonInteractive -ExecutionPolicy Bypass -Comm ...
        + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
            + CategoryInfo          : NotSpecified: (go: cannot find...m\docker\docker:String) [], RemoteException
            + FullyQualifiedErrorId : NativeCommandError
    
        	to create a module there, run:
        	go mod init
        INFO: make.ps1 ended at 05/17/2021 12:54:51
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 8bae227)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 15, 2021
    Copy the full SHA
    09a7efb View commit details
  14. integration: ensurePlugin: disable go modules when building plugin

        === RUN   TestServicePlugin
            plugin_test.go:42: assertion failed: error is not nil: error building basic plugin bin: no required module provides package github.com/docker/docker/testutil/fixtures/plugin/basic: go.mod file not found in current directory or any parent directory; see 'go help modules'
                : exit status 1
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 7070df3)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 15, 2021
    Copy the full SHA
    8b09139 View commit details

Commits on Jul 16, 2021

  1. Merge pull request #42642 from thaJeztah/20.10_backport_test_changes_…

    …for_go116
    
    [20.10 backport] various test-changes for Go 1.16
    tianon authored Jul 16, 2021
    Copy the full SHA
    0fbb0f8 View commit details
  2. Bump go 1.16.5

    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit ae5ddd2)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 16, 2021
    Copy the full SHA
    55c363e View commit details
  3. update archive/tar patch for go 1.16

    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit f400e84)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 16, 2021
    Copy the full SHA
    7c6645b View commit details
  4. updated vendored archive/tar to go1.16.5

    result of: `hack/vendor.sh archive/tar`
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 3ed804a)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 16, 2021
    Copy the full SHA
    abe8c4e View commit details
  5. Bump go 1.16.6 (addresses CVE-2021-34558)

    This addresses CVE-2021-34558: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558
    
    go1.16.6 (released 2021-07-12) includes a security fix to the crypto/tls package,
    as well as bug fixes to the compiler, and the net and net/http packages. See the
    Go 1.16.6 milestone on the issue tracker for details:
    
    https://github.com/golang/go/issues?q=milestone%3AGo1.16.6+label%3ACherryPickApproved
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit fe6f1a4)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 16, 2021
    Copy the full SHA
    b0da207 View commit details

Commits on Jul 18, 2021

  1. Copy the full SHA
    e7bf992 View commit details

Commits on Jul 19, 2021

  1. [20.10] update containerd binary v1.4.8

    Update to containerd 1.4.8 to address [CVE-2021-32760][1].
    
    [1]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32760
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 19, 2021
    Copy the full SHA
    067918a View commit details
  2. Copy the full SHA
    013d665 View commit details

Commits on Jul 20, 2021

  1. update runc binary to v1.0.1

    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    (cherry picked from commit f50c764)
    Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
    AkihiroSuda committed Jul 20, 2021
    Copy the full SHA
    4cfeb27 View commit details

Commits on Jul 29, 2021

  1. [20.10] update containerd binary to v1.4.9

    Welcome to the v1.4.9 release of containerd!
    
    The ninth patch release for containerd 1.4 updates runc to 1.0.1 and contains
    other minor updates.
    
    Notable Updates
    
    - Update runc binary to 1.0.1
    - Update pull authorization logic on redirect
    - Fix user agent used for fetching registry authentication tokens
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jul 29, 2021
    Copy the full SHA
    e8fb8f7 View commit details
  2. Merge pull request #42659 from AkihiroSuda/runc-v1.0.1-2010

    [20.10 backport] update runc binary to v1.0.1
    cpuguy83 authored Jul 29, 2021
    Copy the full SHA
    af8e58f View commit details

Commits on Jul 30, 2021

  1. Merge pull request #42695 from thaJeztah/20.10_update_containerd_1.4.9

    [20.10] update containerd binary to v1.4.9
    thaJeztah authored Jul 30, 2021
    Copy the full SHA
    75249d8 View commit details
Loading