Commit Graph

1627 Commits

Author SHA1 Message Date
dependabot[bot] a5bc34d2e4 build(deps): bump github.com/onsi/ginkgo/v2 from 2.6.1 to 2.7.0
Bumps [github.com/onsi/ginkgo/v2](https://github.com/onsi/ginkgo) from 2.6.1 to 2.7.0.
- [Release notes](https://github.com/onsi/ginkgo/releases)
- [Changelog](https://github.com/onsi/ginkgo/blob/master/CHANGELOG.md)
- [Commits](https://github.com/onsi/ginkgo/compare/v2.6.1...v2.7.0)

---
updated-dependencies:
- dependency-name: github.com/onsi/ginkgo/v2
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-01-10 04:02:52 +00:00
dependabot[bot] 443f22dfdc build(deps): bump github.com/containerd/containerd from 1.6.14 to 1.6.15
Bumps [github.com/containerd/containerd](https://github.com/containerd/containerd) from 1.6.14 to 1.6.15.
- [Release notes](https://github.com/containerd/containerd/releases)
- [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
- [Commits](https://github.com/containerd/containerd/compare/v1.6.14...v1.6.15)

---
updated-dependencies:
- dependency-name: github.com/containerd/containerd
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-01-06 04:03:34 +00:00
Paul Holzinger 2fae6d9fd6 libnetwork: change lock path to tmpfs for root
The default /etc/containers/networks location might not be writeable,
while this breaks podman network create it does not need to break all
podman commands since the lock is created on libpod initialization.

ref https://github.com/containers/common/pull/1270

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2023-01-05 16:46:42 +01:00
Daniel J Walsh 75bf2631d3 Allow users to filter by digest
Fixes: https://github.com/containers/podman/issues/16255

Signed-off-by: Peter Engelbert <pmengelbert@gmail.com>
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2023-01-05 06:36:32 -05:00
Daniel J Walsh 83a6b857c0 Bump version of containers/storage
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2023-01-05 06:36:27 -05:00
dependabot[bot] 5582f50980 build(deps): bump golang.org/x/crypto from 0.4.0 to 0.5.0
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.4.0 to 0.5.0.
- [Release notes](https://github.com/golang/crypto/releases)
- [Commits](https://github.com/golang/crypto/compare/v0.4.0...v0.5.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-01-05 10:53:47 +00:00
dependabot[bot] b002791fde build(deps): bump golang.org/x/term from 0.3.0 to 0.4.0
Bumps [golang.org/x/term](https://github.com/golang/term) from 0.3.0 to 0.4.0.
- [Release notes](https://github.com/golang/term/releases)
- [Commits](https://github.com/golang/term/compare/v0.3.0...v0.4.0)

---
updated-dependencies:
- dependency-name: golang.org/x/term
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-01-05 04:04:41 +00:00
dependabot[bot] d75090eb56 build(deps): bump github.com/containerd/containerd from 1.6.13 to 1.6.14
Bumps [github.com/containerd/containerd](https://github.com/containerd/containerd) from 1.6.13 to 1.6.14.
- [Release notes](https://github.com/containerd/containerd/releases)
- [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
- [Commits](https://github.com/containerd/containerd/compare/v1.6.13...v1.6.14)

---
updated-dependencies:
- dependency-name: github.com/containerd/containerd
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-20 04:04:49 +00:00
dependabot[bot] a0e6eea574 build(deps): bump github.com/docker/docker
Bumps [github.com/docker/docker](https://github.com/docker/docker) from 20.10.21+incompatible to 20.10.22+incompatible.
- [Release notes](https://github.com/docker/docker/releases)
- [Commits](https://github.com/docker/docker/compare/v20.10.21...v20.10.22)

---
updated-dependencies:
- dependency-name: github.com/docker/docker
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-19 04:05:06 +00:00
dependabot[bot] 1a0c510a98 build(deps): bump github.com/containerd/containerd from 1.6.12 to 1.6.13
Bumps [github.com/containerd/containerd](https://github.com/containerd/containerd) from 1.6.12 to 1.6.13.
- [Release notes](https://github.com/containerd/containerd/releases)
- [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
- [Commits](https://github.com/containerd/containerd/compare/v1.6.12...v1.6.13)

---
updated-dependencies:
- dependency-name: github.com/containerd/containerd
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-16 04:03:29 +00:00
dependabot[bot] 0037ec6d2e build(deps): bump github.com/onsi/gomega from 1.24.1 to 1.24.2
Bumps [github.com/onsi/gomega](https://github.com/onsi/gomega) from 1.24.1 to 1.24.2.
- [Release notes](https://github.com/onsi/gomega/releases)
- [Changelog](https://github.com/onsi/gomega/blob/master/CHANGELOG.md)
- [Commits](https://github.com/onsi/gomega/compare/v1.24.1...v1.24.2)

---
updated-dependencies:
- dependency-name: github.com/onsi/gomega
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-15 10:27:11 +00:00
dependabot[bot] 0a606c68e7 build(deps): bump github.com/onsi/ginkgo/v2 from 2.6.0 to 2.6.1
Bumps [github.com/onsi/ginkgo/v2](https://github.com/onsi/ginkgo) from 2.6.0 to 2.6.1.
- [Release notes](https://github.com/onsi/ginkgo/releases)
- [Changelog](https://github.com/onsi/ginkgo/blob/master/CHANGELOG.md)
- [Commits](https://github.com/onsi/ginkgo/compare/v2.6.0...v2.6.1)

---
updated-dependencies:
- dependency-name: github.com/onsi/ginkgo/v2
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-15 04:02:43 +00:00
dependabot[bot] 1585243248 build(deps): bump github.com/onsi/ginkgo/v2 from 2.5.1 to 2.6.0
Bumps [github.com/onsi/ginkgo/v2](https://github.com/onsi/ginkgo) from 2.5.1 to 2.6.0.
- [Release notes](https://github.com/onsi/ginkgo/releases)
- [Changelog](https://github.com/onsi/ginkgo/blob/master/CHANGELOG.md)
- [Commits](https://github.com/onsi/ginkgo/compare/v2.5.1...v2.6.0)

---
updated-dependencies:
- dependency-name: github.com/onsi/ginkgo/v2
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-12 08:27:34 +00:00
OpenShift Merge Robot eccc970e86 Merge pull request #1263 from rhatdan/VENDOR
Update vendor or containers/(image, storage)
2022-12-12 03:25:42 -05:00
OpenShift Merge Robot fa8a3090d3 Merge pull request #1265 from ashley-cui/machvol
Add to default machine volumes for MacOS
2022-12-12 03:20:30 -05:00
Ashley Cui c92b4705d1 Add to default machine volumes for MacOS
On MacOS, mount /Users, /private/, /var/folders by default for better docker compat. The homedir on MacOS is /Users/<username>, so that will be mounted automatically anyway with this change.

Docker also mounts /Volumes and /tmp, /Volumes fails with a Too many levels of symbolic links, as Volumes on Mac is just a symlink to / which seems like a bad idea to mount anyway.
/tmp fails because the Podman machine uses the tmp directory inside the machine and writes content to it on boot, causing the mount to fail. However, on Mac, /tmp is symlinked to /private/tmp anyway, so those files are accessible from there.

Signed-off-by: Ashley Cui <acui@redhat.com>
2022-12-09 15:36:20 -05:00
Daniel J Walsh 420a5bd93b Update vendor or containers/(image, storage)
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-12-09 11:13:25 -05:00
OpenShift Merge Robot df2212a903 Merge pull request #1258 from Luap99/netns
pkg/netns: UnmountNS() accept netns path as string
2022-12-09 03:56:36 -05:00
OpenShift Merge Robot a6d9913bc2 Merge pull request #1262 from containers/dependabot/go_modules/golang.org/x/crypto-0.4.0
build(deps): bump golang.org/x/crypto from 0.3.0 to 0.4.0
2022-12-09 03:54:00 -05:00
OpenShift Merge Robot 6a15b0489f Merge pull request #1260 from cblecker/godoc-headers
Add godoc headers for report package
2022-12-09 03:51:25 -05:00
dependabot[bot] b0befd4cec build(deps): bump golang.org/x/crypto from 0.3.0 to 0.4.0
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.3.0 to 0.4.0.
- [Release notes](https://github.com/golang/crypto/releases)
- [Commits](https://github.com/golang/crypto/compare/v0.3.0...v0.4.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-08 04:03:18 +00:00
dependabot[bot] fd058f410c build(deps): bump github.com/containerd/containerd from 1.6.10 to 1.6.12
Bumps [github.com/containerd/containerd](https://github.com/containerd/containerd) from 1.6.10 to 1.6.12.
- [Release notes](https://github.com/containerd/containerd/releases)
- [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
- [Commits](https://github.com/containerd/containerd/compare/v1.6.10...v1.6.12)

---
updated-dependencies:
- dependency-name: github.com/containerd/containerd
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-07 23:39:30 +00:00
Christoph Blecker 101e8f6f99 Add godoc headers for report package
Signed-off-by: Christoph Blecker <cblecker@redhat.com>
2022-12-07 13:21:17 -08:00
Paul Holzinger 70d14082ea pkg/netns: UnmountNS() accept netns path as string
I want to switch podman over to only using strings for the netns path.
So we no longer pass this interface around. Buildah doesn't use this so
we only need to fix it in Podman. I have a WIP PR[1] for that.

[1] https://github.com/containers/podman/pull/16756

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-12-07 14:53:47 +01:00
Aditya R a1673511b8 libnetwork: extend API to support NetworkUpdate
New features in netavark/aardvark allows users to update network dns
servers and all the containers attached to those networks uses updated
resolvers.

Following PR adds support in `libnetwork` to support

* Add support for higher level `NetworkUpdate` API
* Add support for `Update` exec call which can invoke netavark with a
  new update option added here: https://github.com/containers/netavark/pull/503

Signed-off-by: Aditya R <arajan@redhat.com>
2022-12-07 07:53:02 +05:30
OpenShift Merge Robot a4cd996652 Merge pull request #1252 from rhatdan/caps
Rework default list of capabilities to minimal
2022-12-06 09:17:16 -05:00
OpenShift Merge Robot b834776aa1 Merge pull request #1257 from containers/dependabot/go_modules/golang.org/x/term-0.3.0
build(deps): bump golang.org/x/term from 0.2.0 to 0.3.0
2022-12-06 07:49:53 -05:00
OpenShift Merge Robot fe43935658 Merge pull request #1250 from ygalblum/network_ignore
Libnetwork: Add IgnoreIfExists flag to network create method
2022-12-06 06:07:49 -05:00
OpenShift Merge Robot 6f6214464b Merge pull request #1256 from Luap99/cni-ipam-none
libnetwork/cni: fix panic with ipam driver none
2022-12-06 03:38:42 -05:00
dependabot[bot] e0883dd780 build(deps): bump golang.org/x/term from 0.2.0 to 0.3.0
Bumps [golang.org/x/term](https://github.com/golang/term) from 0.2.0 to 0.3.0.
- [Release notes](https://github.com/golang/term/releases)
- [Commits](https://github.com/golang/term/compare/v0.2.0...v0.3.0)

---
updated-dependencies:
- dependency-name: golang.org/x/term
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-06 04:04:12 +00:00
Paul Holzinger 81fd874f80 libnetwork/cni: fix panic with ipam driver none
When creating macvlan or ipvlan network configs with the none ipam
driver we would always cause a segfault because of a nil pointer
dereference.

Add a test for both to prevent a regression.

Fixes containers/podman#16620

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-12-05 17:55:03 +01:00
Daniel J Walsh ad04f58f7a Vendor in latest containers/(storage, image)
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-12-05 10:04:10 -05:00
Ygal Blum f7978269e7 Libnetwork: Add NetworkCreateOptions to the NetworkCreate method
For now, only add IgnoreIfExists flag.
Having this flag is very useful when using scripts or systemd unit files

Signed-off-by: Ygal Blum <ygal.blum@gmail.com>
2022-12-05 15:57:15 +02:00
OpenShift Merge Robot 2ecf4da04b Merge pull request #1251 from rhatdan/readonly
Add ReadOnly flag to run containers in readonly mode
2022-12-05 08:07:57 -05:00
OpenShift Merge Robot 63003fd896 Merge pull request #1254 from giuseppe/cgroup-no-autostartup
cgroups: use SessionBusPrivateNoAutoStartup
2022-12-05 07:05:23 -05:00
Daniel J Walsh e2fb8c5133 Add ReadOnly flag to run containers in readonly mode
This is needed for Automotive.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-12-05 06:05:56 -05:00
Giuseppe Scrivano 10d63bf089 cgroups: use SessionBusPrivateNoAutoStartup
do not start up a dbus daemon if it is not already running.

[NO NEW TESTS NEEDED] the fix is in a dependency.

Closes: https://github.com/containers/podman/issues/16718

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
2022-12-05 09:54:03 +01:00
dependabot[bot] c87a5cee76 build(deps): bump golang.org/x/sys from 0.2.0 to 0.3.0
Bumps [golang.org/x/sys](https://github.com/golang/sys) from 0.2.0 to 0.3.0.
- [Release notes](https://github.com/golang/sys/releases)
- [Commits](https://github.com/golang/sys/compare/v0.2.0...v0.3.0)

---
updated-dependencies:
- dependency-name: golang.org/x/sys
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2022-12-05 04:05:22 +00:00
Daniel J Walsh c552ab433d Revert "Revert "Rework default list of capabilities to minimal""
This reverts commit 91ba27095f.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-12-04 16:12:04 -05:00
OpenShift Merge Robot 23636dda9a Merge pull request #1243 from vrothberg/RUN-1702
containers.conf: add events_container_create_inspect_data
2022-11-28 07:44:29 -05:00
Valentin Rothberg 821a0657ca containers.conf: add events_container_create_inspect_data
Add an option to create a more verbose container-create event which
includes a JSON payload with detailed information about the container.

Jira: https://issues.redhat.com/browse/RUN-1702
Signed-off-by: Valentin Rothberg <vrothberg@redhat.com>
2022-11-28 13:01:46 +01:00
Aditya R 1e9863c4b0 docs,containerfile: RUN --mount mention rw option
Mention `readwrite, rw` option for `RUN --mount` instruction and mention
correct default for `ro, readonly`.

[NO NEW TESTS NEEDED]
[NO TESTS NEEDED]

Closes: https://github.com/containers/common/issues/1246

Signed-off-by: Aditya R <arajan@redhat.com>
2022-11-28 15:40:53 +05:30
Daniel J Walsh f8045ec731 Remove conmon probe
This is taking time on every podman call, and provide limited
protection. Versioning should be handled in the packaging system
and this is an unlikely to happen.

Every exec done by container tools hurts us as we try to get container
startup team to absolute minimal amounts.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-11-27 07:16:29 -05:00
Valentin Rothberg 91ba27095f Revert "Rework default list of capabilities to minimal"
This reverts commit 962dbc3281.
As shown in containers/podman/pull/16610 the changes require a number of
changes in Podman's CI.  While many issues have been fixed in that PR,
there are some potentially controversial changes such as dropping
NET_RAW.

Let's revert the commit to unblock ongoing work.  For the next
iteration, Podman CI must be green before merging.

Signed-off-by: Valentin Rothberg <vrothberg@redhat.com>
2022-11-25 09:37:41 +01:00
OpenShift Merge Robot 32d0d9fc59 Merge pull request #1239 from giuseppe/validate-cdi-devices
validate: ignore validation of CDI devices
2022-11-23 04:55:47 -05:00
OpenShift Merge Robot 5034979776 Merge pull request #1240 from rhatdan/caps
Rework default list of capabilities to minimal
2022-11-23 03:39:04 -05:00
OpenShift Merge Robot 60b781b90e Merge pull request #1238 from rhatdan/userns
Deprecate UserNSSize, since we don't use it
2022-11-22 12:57:55 -05:00
Daniel J Walsh 962dbc3281 Rework default list of capabilities to minimal
For a couple of years now we have been shipping containers.conf settings
to use only 10 capabities. Docker uses 14, with the difference being
CAP_AUDIT_ALLOW, CAP_NET_RAW, CAP_MKNOD, CAP_CHROOT.

This allows us to run with a tighter security then Docker.

This PR makes the change to default config, so that if no
containers.conf overrides are present, we will run with the tighter
security. Currently most distros that ship the containers.conf already
run with this setting, but this makes it formal, and changes the man
page to match the defaults.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-11-22 12:55:25 -05:00
Giuseppe Scrivano 76d4399a75 validate: ignore validation of CDI devices
Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
2022-11-21 22:40:48 +01:00
Giuseppe Scrivano 984240a8ee vendor: add github.com/container-orchestrated-devices
Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
2022-11-21 22:40:48 +01:00