profile
viewpoint
Michael Crosby crosbymichael @docker Indianapolis http://crosbymichael.com Building things for others who build things

containerd/cgroups 384

cgroups package for Go

ClusterHQ/powerstrip 304

Powerstrip: A tool for prototyping Docker extensions

crosbymichael/boss 255

Run containers like a ross

containerd/ttrpc 153

GRPC for low-memory environments

christopherhesse/rethinkgo 139

OBSOLETE Go language driver for RethinkDB

containerd/continuity 75

A transport-agnostic, filesystem metadata manifest system

containerd/go-cni 64

A generic CNI library to provide APIs for CNI plugin interactions

containerd/go-runc 58

runc bindings for Go

containerd/fifo 51

fifo pkg for Go

crosbymichael/.dotfiles 51

bootstrap for my dev setup

push eventstellarproject/orbit

Michael Crosby

commit sha f6f9af1de5660c4bad0329e78d6f0b933419989b

util file

view details

Michael Crosby

commit sha 39e7eb4d91c2fd0d2de75e9c5b174d41c05df446

add cage list

view details

push time in a month

create barnchstellarproject/orbit

branch : jails

created branch time in a month

push eventstellarproject/aports

Michael Crosby

commit sha 589c1fd30a1f63e9d168cc8940ec5baf39863f8d

update to 5.4.12

view details

push time in a month

push eventstellarproject/aports

Rasmus Thomsen

commit sha 0b6cd5c4ee48b8d8ce1f8c039afedddb834627da

testing/firefox: disable on armhf Sadly the wasm stuff still doesn't work on armhf, so keep it disabled for now.

view details

Francesco Colista

commit sha d0cf104cce12123f61ed8801c96e861995aafee9

community/gns3-server: fix #11028

view details

Leo

commit sha 661c78a105528241d881fb5ede26fd8b7cbc87f3

community/dia: fix CVE-2019-19451.patch see #11093

view details

Leo

commit sha ffe86edfe8e2950833ec15a8c4cb08acc903132e

community/firejail: upgrade to 0.9.62

view details

Leo

commit sha e741bd40e4425e0b348037a4fd6d51bdb6090f16

community/s-nail: upgrade to 14.9.16

view details

Leo

commit sha ae83d22df8a2e63e7eba06f17d3e61ba2ca50417

main/libarchive: upgrade to 3.4.1

view details

Michael John

commit sha 1d2aa57717d54e74db0787fa44d83685c88b7079

testing/azure-iot-sdk-c-static: new aport

view details

Oleg Titov

commit sha a47e956de4896ec3ee053ddbc144568444ac35a0

testing/bazel: new aport https://bazel.build A fast, scalable, multi-language and extensible build system

view details

Oleg Titov

commit sha 7ad732d6364b1b1c38575c6b55994762a7f05cce

community/aom: move from testing

view details

Oleg Titov

commit sha b1cb7063482eddce57992920a78e763bb3f8eea7

community/ffmpeg: add support for AV1 codec on all archies except armhf and armv7 - Modernize

view details

Kevin Daudt

commit sha c175b903ab9517cd9989dbe0db4a28ce63fd30c4

community/zabbix: upgrade to 4.4.4

view details

Kevin Daudt

commit sha 6912942cc8992f7f190b0dbc0b0d52f1e60f65b8

community/zabbix: disable agent2 on 32-bits arches Zabbix 4.4.4 agent2 breaks on 32-bits arches. Disable agent2 on these arches for now until it is fixed.

view details

Kevin Daudt

commit sha fab29c728853d4a2e9d040f8d2551c31d943a1c7

community/ipython: upgrade to 7.11.0

view details

Bob Green

commit sha 4351208ba0c64c7f4766cee5c4698cf1788febb3

testing/bazel: disable strip

view details

Leo

commit sha a1d92fcbab8708462bdbb964a5da056ed72fc785

main/py3-parsing: upgrade to 2.4.6

view details

Leo

commit sha 4edbc27a5bccac60b159791f6cc03b47aef9e0fd

main/smartmontools: upgrade to 7.1

view details

Leo

commit sha a68910598cf3ab6b8bb8805d8835020391193ce2

testing/glow: upgrade to 0.1.6

view details

Leo

commit sha e7c9637e4dbfb6c0c2594ed61dac794a4153b4e8

community/eyed3: rename from py3-eyed3

view details

Natamo

commit sha f12f2b778ee936808ce7577efd837e62d877c67a

main/mariadb: fix plugin directory When using MariaDB without services - in this case, in a Docker container - mariadb-install-db will fail, as it tries to load /usr/lib*/plugin and /usr/lib*/mysql/plugin. None of which exist, in a MariaDB installation. The correct path would be /usr/lib*/mariadb/plugin. Failure to load plugins, leads to inability to load PAM and inherently fails the installation.

view details

Leo

commit sha 959da4e8f5a243c9cd591e8ffc55668b7400191a

main/mariadb: simplify rocksdb logic

view details

push time in a month

pull request commentcontainerd/project

Add Boris Popovschi as reviewer

LGTM

Michael Crosby

On Jan 14, 2020, at 10:23 AM, Phil Estes notifications@github.com wrote:

@estesp approved this pull request.

LGTM

— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub, or unsubscribe.

dmcgowan

comment created time in a month

pull request commentcontainerd/containerd

Added IO metrics for cgroup v2

Don't merge yet. I added some comments about major/minor metrics

Zyqsempai

comment created time in a month

Pull request review commentcontainerd/containerd

Add unit test for func in filter.go

 func TestFilters(t *testing.T) { 		}) 	} }++func TestString(t *testing.T) {

I think this is useful to have as a test.

Can you please change the name to be more descriptive? Maybe TestOperatorStrings?

hs0210

comment created time in a month

issue closedcontainerd/containerd

Feature request: container log rotate and size limit

Feature request

We migrated our cluster from docker to containerd. We are running k8s + containerd + overlayfs now. We used to set the container log size limitation by following configuration of docker:

{
  "log-driver": "json-file",
  "log-opts": {
    "max-size": "10m",
    "max-file": "3" 
  }
}

ref: docker logging driver

Now running in this mode, kubelet is used to rotate the log. We met issues

  1. Kubelet works abnormal sometimes, and log rotate not work, but container is still running
  2. Container writes lots of logs and kubelet just rotate the log every 10s. We can saw many logs not rotated in some cases and disk full.

Is it better to make containerd support log rotate and size limit than put this feature in kubelet?

@Random-Liu @fuweid

closed time in a month

wenlxie

issue commentcontainerd/containerd

Feature request: container log rotate and size limit

I'm going to close this. There is zero code in containerd that handles logs at all. @Random-Liu said this is more of a kubelet issue so it would be better served to have an issue like this on the kube side.

wenlxie

comment created time in a month

Pull request review commentcontainerd/containerd

Added IO metrics for cgroup v2

+// +build linux++/*+   Copyright The containerd Authors.++   Licensed under the Apache License, Version 2.0 (the "License");+   you may not use this file except in compliance with the License.+   You may obtain a copy of the License at++       http://www.apache.org/licenses/LICENSE-2.0++   Unless required by applicable law or agreed to in writing, software+   distributed under the License is distributed on an "AS IS" BASIS,+   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.+   See the License for the specific language governing permissions and+   limitations under the License.+*/++package v2++import (+	v2 "github.com/containerd/containerd/metrics/types/v2"+	metrics "github.com/docker/go-metrics"+	"github.com/prometheus/client_golang/prometheus"+)++var ioMetrics = []*metric{+	{+		name: "io_major",

the io read/write are metrics labeled for a device with a major/minor, the major/minor are not metrics

Zyqsempai

comment created time in a month

Pull request review commentcontainerd/containerd

Added IO metrics for cgroup v2

+// +build linux++/*+   Copyright The containerd Authors.++   Licensed under the Apache License, Version 2.0 (the "License");+   you may not use this file except in compliance with the License.+   You may obtain a copy of the License at++       http://www.apache.org/licenses/LICENSE-2.0++   Unless required by applicable law or agreed to in writing, software+   distributed under the License is distributed on an "AS IS" BASIS,+   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.+   See the License for the specific language governing permissions and+   limitations under the License.+*/++package v2++import (+	v2 "github.com/containerd/containerd/metrics/types/v2"+	metrics "github.com/docker/go-metrics"+	"github.com/prometheus/client_golang/prometheus"+)++var ioMetrics = []*metric{+	{+		name: "io_major",

This does not make sense to me as a metric. I don't understand why this isn't a label

Zyqsempai

comment created time in a month

push eventcontainerd/containerd

Akihiro Suda

commit sha b553bc14a2cfa1994646d2f52a8e25c023de76bb

update docs/rootless.md * Updated an example config to v2 syntax * Updated for shim v2 (relates to #2767) Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>

view details

Michael Crosby

commit sha d3c1691ae105067a4636dfbe81c0ba2d8d980f52

Merge pull request #3933 from AkihiroSuda/update-rootless-md update docs/rootless.md

view details

push time in a month

PR merged containerd/containerd

update docs/rootless.md
  • Updated an example config to v2 syntax
  • Updated for shim v2 (relates to #2767)
+14 -8

6 comments

1 changed file

AkihiroSuda

pr closed time in a month

pull request commentcontainerd/containerd

update docs/rootless.md

LGTM

AkihiroSuda

comment created time in a month

push eventcontainerd/containerd

Shengjing Zhu

commit sha f3090ce80f05a88e588d9e9283bf5134367b198b

ci: set pipefail in zuul script Otherwise the exit code is always 0 Signed-off-by: Shengjing Zhu <zhsj@debian.org>

view details

Michael Crosby

commit sha 8b3ef5fb205730fc45614586b2aa95dfa2444f6f

Merge pull request #3944 from zhsj/fix-openlabci ci: set pipefail in zuul script

view details

push time in a month

PR merged containerd/containerd

ci: set pipefail in zuul script

Otherwise the exit code is always 0.

Fixes: #3943

+1 -0

3 comments

1 changed file

zhsj

pr closed time in a month

issue closedcontainerd/containerd

openlab ci is broken

In #3939, the openlab ci says "Build succeeded", https://github.com/containerd/containerd/pull/3939#issuecomment-571894318. But the test actually is failed.

https://logs.openlabtesting.org/logs/39/3939/e509f49fcb35d0c1e18e61493330c37a9af57a75/check/containerd-build-arm64/92867ca/logs/make_test.txt

--- FAIL: TestParseSelector (0.00s)
    --- FAIL: TestParseSelector/linux (0.00s)
        platforms_test.go:303: platform did not match expected: v1.Platform{Architecture:"arm64", OS:"linux", OSVersion:"", OSFeatures:[]string(nil), Variant:""} != v1.Platform{Architecture:"arm64", OS:"linux", OSVersion:"", OSFeatures:[]string(nil), Variant:"v8"}
    --- FAIL: TestParseSelector/macOS (0.00s)
        platforms_test.go:303: platform did not match expected: v1.Platform{Architecture:"arm64", OS:"darwin", OSVersion:"", OSFeatures:[]string(nil), Variant:""} != v1.Platform{Architecture:"arm64", OS:"darwin", OSVersion:"", OSFeatures:[]string(nil), Variant:"v8"}
FAIL

closed time in a month

zhsj

pull request commentcontainerd/containerd

ci: set pipefail in zuul script

LGTM

zhsj

comment created time in a month

push eventcontainerd/containerd

Shengjing Zhu

commit sha 90cd777a6c8c92c105625ba086e2e67a0c32d7ed

platforms: fill default arm variant when parse platform specifier arm has been supported, but something is missing, causes test failure --- FAIL: TestParseSelector/linux (0.00s) platforms_test.go:292: arm support not fully implemented: not implemented --- FAIL: TestParseSelector/macOS (0.00s) platforms_test.go:292: arm support not fully implemented: not implemented Signed-off-by: Shengjing Zhu <zhsj@debian.org>

view details

Michael Crosby

commit sha 41088e405fa46a8325eeea3217fd05b48779419e

Merge pull request #3939 from zhsj/fix-arm platforms: fill default arm variant when parse platform specifier

view details

push time in a month

PR merged containerd/containerd

platforms: fill default arm variant when parse platform specifier

arm has been supported, but something is missing, causes test failure

--- FAIL: TestParseSelector (0.00s)
    --- SKIP: TestParseSelector/* (0.00s)
        platforms_test.go:288: this case is not yet supported
    --- SKIP: TestParseSelector/linux/* (0.00s)
        platforms_test.go:288: this case is not yet supported
    --- SKIP: TestParseSelector/*/arm64 (0.00s)
        platforms_test.go:288: this case is not yet supported
    --- PASS: TestParseSelector/linux/arm64 (0.00s)
    --- PASS: TestParseSelector/linux/arm64/v8 (0.00s)
    --- PASS: TestParseSelector/linux/arm (0.00s)
    --- PASS: TestParseSelector/linux/arm/v6 (0.00s)
    --- PASS: TestParseSelector/linux/arm/v7 (0.00s)
    --- PASS: TestParseSelector/arm (0.00s)
    --- PASS: TestParseSelector/armel (0.00s)
    --- PASS: TestParseSelector/armhf (0.00s)
    --- PASS: TestParseSelector/Aarch64 (0.00s)
    --- PASS: TestParseSelector/x86_64 (0.00s)
    --- PASS: TestParseSelector/Linux/x86_64 (0.00s)
    --- PASS: TestParseSelector/i386 (0.00s)
    --- FAIL: TestParseSelector/linux (0.00s)
        platforms_test.go:292: arm support not fully implemented: not implemented
    --- PASS: TestParseSelector/s390x (0.00s)
    --- PASS: TestParseSelector/linux/s390x (0.00s)
    --- FAIL: TestParseSelector/macOS (0.00s)
        platforms_test.go:292: arm support not fully implemented: not implemented

The test like linux/arm/v6 and linux/arm/v7 have passed, so I don't think there's issue for arm actually.

+13 -7

10 comments

2 changed files

zhsj

pr closed time in a month

push eventcontainerd/cgroups

Boris Popovschi

commit sha 6794948df685beb61f4137092026064351f71613

Added pids controller tests Signed-off-by: Boris Popovschi <zyqsempai@mail.ru>

view details

Michael Crosby

commit sha 918ed86e29ccef2bf3f0c70d76405781afc3bdf5

Merge pull request #138 from Zyqsempai/add-tests-for-pids-controller Added pids controller tests

view details

push time in a month

PR merged containerd/cgroups

Added pids controller tests

Signed-off-by: Boris Popovschi zyqsempai@mail.ru

+55 -0

3 comments

1 changed file

Zyqsempai

pr closed time in a month

pull request commentcontainerd/cgroups

Added pids controller tests

LGTM

Zyqsempai

comment created time in a month

push eventcontainerd/cgroups

bpopovschi

commit sha 5efa14e3dbc5c34d93de6c706af24fea4a30de46

Added systemd manager Signed-off-by: bpopovschi <zyqsempai@mail.ru>

view details

bpopovschi

commit sha 3a32c65f78c12eb7934c4d4ceda4729f2970c147

Systemd refactoring Signed-off-by: bpopovschi <zyqsempai@mail.ru>

view details

bpopovschi

commit sha b0a15b1d1682d7555d4793bc2122c8f9b162fb4f

conflict fix Signed-off-by: bpopovschi <zyqsempai@mail.ru>

view details

bpopovschi

commit sha 7b4fbc7a0b3877704bdc4b82bc4ded8bc42f18e7

Toggle controllers fix Signed-off-by: bpopovschi <zyqsempai@mail.ru>

view details

Boris Popovschi

commit sha fe689749600616370376829ff953d126d2d9abba

tests for systemd controllers Signed-off-by: Boris Popovschi <zyqsempai@mail.ru>

view details

Boris Popovschi

commit sha 7d585c40f10b87650d114877dbcec2b72a852357

Resource rework + path fix Signed-off-by: Boris Popovschi <zyqsempai@mail.ru>

view details

Boris Popovschi

commit sha acbc8024b3f44e265c066ff60c0b5065b3b0205f

rebase on master Signed-off-by: Boris Popovschi <zyqsempai@mail.ru>

view details

Michael Crosby

commit sha d1b3bdc8f5403d73b1b3f5443b6a30eece9d2590

Merge pull request #125 from Zyqsempai/104-add-systemd Added systemd manager

view details

push time in 2 months

PR merged containerd/cgroups

Added systemd manager

Added NewSystemd and LoadSystemd. @AkihiroSuda @crosbymichael I am stuck a little bit here, please guide me in right direction;) Signed-off-by: bpopovschi zyqsempai@mail.ru

+261 -7

16 comments

7 changed files

Zyqsempai

pr closed time in 2 months

pull request commentcontainerd/cgroups

Added systemd manager

LGTM

Zyqsempai

comment created time in 2 months

push eventcontainerd/containerd

Akihiro Suda

commit sha a4b423b19b0b3f18bd4827afcd4a9c7ca4a6645a

overlay: test actual Opts AsynchronousRemove opt was untested while it is specified by default in the plugin init. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>

view details

Michael Crosby

commit sha 0d276ece0e280812297f20be5110800db6614c03

Merge pull request #3932 from AkihiroSuda/ovl-test-opts overlay: test actual Opts

view details

push time in 2 months

PR merged containerd/containerd

overlay: test actual Opts

AsynchronousRemove opt was untested while it is specified by default in the plugin init.

Signed-off-by: Akihiro Suda akihiro.suda.cz@hco.ntt.co.jp

+44 -13

4 comments

2 changed files

AkihiroSuda

pr closed time in 2 months

pull request commentcontainerd/containerd

overlay: test actual Opts

LGTM

AkihiroSuda

comment created time in 2 months

pull request commentcontainerd/go-cni

Add GoDoc to README

LGTM

alexellis

comment created time in 2 months

pull request commentopencontainers/runc

temporarily disable CRIU tests

LGTM

AkihiroSuda

comment created time in 2 months

push eventcontainerd/containerd

Hu Shuai

commit sha 52e477f947434989e93d0a9c22a7389d08b9b056

Fix outdated comments Signed-off-by: Hu Shuai <hus.fnst@cn.fujitsu.com>

view details

Michael Crosby

commit sha fda9cebc813b035be137d4d61f203e625623692c

Merge pull request #3936 from hs0210/work Fix outdated comments

view details

push time in 2 months

PR merged containerd/containerd

Fix outdated comments

Signed-off-by: Hu Shuai hus.fnst@cn.fujitsu.com

+1 -1

3 comments

1 changed file

hs0210

pr closed time in 2 months

pull request commentcontainerd/containerd

Fix outdated comments

LGTM

hs0210

comment created time in 2 months

pull request commentcontainerd/containerd

update docs/rootless.md

Needs a rebase

AkihiroSuda

comment created time in 2 months

pull request commentcontainerd/cgroups

Updated go-systemd to v22

LGTM

Zyqsempai

comment created time in 2 months

push eventstellarproject/flux

Michael Crosby

commit sha dd0926098030fb0615a8db42fbbe41e69ae7e012

use zfs prop for creation time

view details

push time in 2 months

push eventcrosbymichael/runc

Michael Crosby

commit sha e1326f03a33837587e1261bb570ed9c48feda951

Allow virtual box failures Signed-off-by: Michael Crosby <crosbymichael@gmail.com>

view details

push time in 2 months

PR opened opencontainers/runc

Allow virtual box failures

Signed-off-by: Michael Crosby crosbymichael@gmail.com

+1 -0

0 comment

1 changed file

pr created time in 2 months

create barnchcrosbymichael/runc

branch : vb-failure

created branch time in 2 months

pull request commentopencontainers/runc

Dockerfile: update criu (Dec 28, 2019 master)

now it's worse :)

AkihiroSuda

comment created time in 2 months

push eventopencontainers/runc

Julio Montes

commit sha cd7c59d04264b80df830782deb088d54f5d48252

libcontainer: export createCgroupConfig A `config.Cgroups` object is required to manipulate cgroups v1 and v2 using libcontainer. Export `createCgroupConfig` to allow API users to create `config.Cgroups` objects using directly libcontainer API. Signed-off-by: Julio Montes <julio.montes@intel.com>

view details

Julio Montes

commit sha 8ddd892072998896cb7fd6eff45f3f6afbad230b

libcontainer: add method to get cgroup config from cgroup Manager `configs.Cgroup` contains the configuration used to create cgroups. This configuration must be saved to disk, since it's required to restore the cgroup manager that was used to create the cgroups. Add method to get cgroup configuration from cgroup Manager to allow API users save it to disk and restore a cgroup manager later. fixes #2176 Signed-off-by: Julio Montes <julio.montes@intel.com>

view details

Michael Crosby

commit sha 2b52db75279ca687e18156de86d845876e9ef35d

Merge pull request #2177 from devimc/topic/libcontainer/kata-containers libcontainer: export and add new methods to allow cgroups manipulation

view details

push time in 2 months

PR merged opencontainers/runc

libcontainer: export and add new methods to allow cgroups manipulation

libcontainer: export createCgroupConfig

A config.Cgroups object is required to manipulate cgroups v1 and v2 using libcontainer. Export createCgroupConfig to allow API users to create config.Cgroups objects using directly libcontainer API.

libcontainer: add method to get cgroup config from cgroup Manager

configs.Cgroup contains the configuration used to create cgroups. This configuration must be saved to disk, since it's required to restore the cgroup manager that was used to create the cgroups. Add method to get cgroup configuration from cgroup Manager to allow API users save it to disk and restore a cgroup manager later.

fixes #2176

+34 -8

3 comments

8 changed files

devimc

pr closed time in 2 months

issue closedopencontainers/runc

libcontainer: export and add new methods to allow cgroups manipulation

In order to manipulate cgroups v1 and v2 from other packages and applications, we need next changes:

  • export createCgroupConfig to create cgroup configs
  • add new method in cgroup Manager to get and save cgroups configuration to disk

cc @mrunalp @egernst

closed time in 2 months

devimc

startedimsnif/bandwhich

started time in 2 months

pull request commentcontainerd/containerd

v2: Call shim.Delete at first when create is failed

LGTM

darfux

comment created time in 2 months

push eventopencontainers/runtime-spec

Renaud Gaubert

commit sha c1662686cff159595277b79322d0272f5182941b

Add create-container, create-runtime and start-container hooks Signed-off-by: Renaud Gaubert <rgaubert@nvidia.com>

view details

Michael Crosby

commit sha e09c7c488e298f2147734e657eba72fc9fa10ca9

Merge pull request #1008 from RenaudWasTaken/hooks Add create-host, create-container, start-container hooks

view details

push time in 2 months

PR merged opencontainers/runtime-spec

Add create-host, create-container, start-container hooks

Hello!

Since we discussed this during the last OCI weekly meeting, I wanted to continue the conversation on a more concrete change. Related:

  • https://groups.google.com/a/opencontainers.org/forum/#!topic/dev/WTHcf-b3wXA
  • https://groups.google.com/a/opencontainers.org/forum/#!topic/dev/_dmqMkvX_iE

I've used the same names as LXC for the hooks. I'm happy to change them if we feel there are more appropriate names. My reasoning while drafting this was to answer some of these questions:

  • Definition: How can we define the mount hook in a way that would clearly define the ability to mount "stuff" inside the container
  • Ordering: Is there an ordering that is required? Here it would be helpful to define the ordering such that the pre-start hook detects that it doesn't need to be executed in a setting where we specify both pre-start hook and mount hook for backwards compat reasons.

Questions still open:

  • Should we define "outside" and "inside" (in relation to the VM debate)

What do you think about this first draft?

Signed-off-by: Renaud Gaubert rgaubert@nvidia.com

+180 -29

69 comments

5 changed files

RenaudWasTaken

pr closed time in 2 months

push eventcontainerd/containerd

hs0210

commit sha 87e2a95951c3e00e8d672922a8bc07337c7a331c

Fix a typo in task.go Signed-off-by: Hu Shuai <hus.fnst@cn.fujitsu.com>

view details

Michael Crosby

commit sha 06b15f072db3b177af4ffa1d9f8d4a9a454990f7

Merge pull request #3920 from hs0210/work Fix a typo in task.go

view details

push time in 2 months

PR merged containerd/containerd

Fix a typo in task.go
+1 -1

5 comments

1 changed file

hs0210

pr closed time in 2 months

pull request commentcontainerd/containerd

Fix a typo in task.go

LGTM

hs0210

comment created time in 2 months

push eventcontainerd/containerd

Kohei Tokunaga

commit sha 4ccb7aa2213e09c21a4b320eec5b8b6d1ac32e48

Enable to propagate necessary information to snapshotter during unpack Though containerd gives ChainID to backend snapshotters during unpack for searching snapshots to be skipped downloading the contents, ChainID isn't enough for some snapshotters which require additional information of layers. Some examples are remote snapshotters which is based on stargz filesystem (requires image-related information to query the contents to docker registry) and those which is based on CernVM-FS (requires manifest digest, etc. for providing squashed rootfs). This commit solves this issue by enabling a handler to inject additional information of layers to snapshotters during unpack. Signed-off-by: Kohei Tokunaga <ktokunaga.mail@gmail.com>

view details

ktock

commit sha 493a36de9521c4a6a0e0cc2fd0495da1d5c08db7

Move label filter to snapshots package Signed-off-by: Kohei Tokunaga <ktokunaga.mail@gmail.com>

view details

Michael Crosby

commit sha 6b94b646b7712ecbf0d16ce19588dc1b083b829f

Merge pull request #3911 from ktock/passinfo Enable to propagate necessary information to snapshotter during unpack

view details

push time in 2 months

PR merged containerd/containerd

Enable to propagate necessary information to snapshotter during unpack

Though containerd gives ChainID to backend snapshotters during unpack for searching snapshots to be skipped downloading the contents, ChainID isn't enough for some snapshotters which require additional information of layers. Some examples are remote snapshotters which is based on stargz filesystem (requires image-related information to query the contents to docker registry) and those which is based on CernVM-FS (requires manifest digest, etc. for providing squashed rootfs).

This commit solves this issue by enabling a handler to inject additional information of layers to snapshotters during unpack.

Related discussion

  • Issue: https://github.com/containerd/containerd/issues/3731
  • Initial version of patch: https://github.com/containerd/containerd/pull/3846
  • Related patch: https://github.com/containerd/containerd/pull/3870

You can test it on this remote snapshotter branch and the reproduction steps are here.

We need to discuss reasonable way to integrate handlers to containerd but I'm keeping it separated PR/issue.

+38 -25

7 comments

5 changed files

ktock

pr closed time in 2 months

pull request commentcontainerd/containerd

Enable to propagate necessary information to snapshotter during unpack

LGTM

@ktock thanks for the PR!

ktock

comment created time in 2 months

PR merged opencontainers/runc

Fix race in tty integration test with slow container startup

This fixes a race condition in the tty runc run [terminal=false] integration test (found while testing https://github.com/opencontainers/runc/pull/2185).

https://github.com/opencontainers/runc/blob/7496a9682535c8ca143e981116f5b67463ad1d69/tests/integration/tty.bats#L203-L209

Currently, the test assumes that as soon as runc state returns information about the container, it is running and testcontainer test_busybox running should succeed.

When the container start is slow (because of load or synthetic delay), the runc state command can return a created state, allowing wait_for_container to succeed, but letting the testcontainer test_busybox running command fail.

This race can be demonstrated by synthetically slowing down the transition from created to running:

diff --git a/libcontainer/container_linux.go b/libcontainer/container_linux.go
index 61195572..9afe71b3 100644
--- a/libcontainer/container_linux.go
+++ b/libcontainer/container_linux.go
@@ -302,7 +302,7 @@ func awaitProcessExit(pid int, exit <-chan struct{}) <-chan struct{} {
                        select {
                        case <-exit:
                                return
-                       case <-time.After(time.Millisecond * 100):
+                       case <-time.After(time.Millisecond * 200):
                                stat, err := system.Stat(pid)
                                if err != nil || stat.State == system.Zombie {
                                        close(isDead)
@@ -318,6 +318,7 @@ func awaitFifoOpen(path string) <-chan openResult {
        fifoOpened := make(chan openResult)
        go func() {
                f, err := os.OpenFile(path, os.O_RDONLY, 0)
+               time.Sleep(100*time.Millisecond)
                if err != nil {
                        fifoOpened <- openResult{err: newSystemErrorWithCause(err, "open exec fifo for reading")}
                        return

Without this change:

$ make integration TESTPATH=/tty.bats
...
not ok 9 runc run [terminal=false]
# (from function `testcontainer' in file tests/integration/helpers.bash, line 258,
#  in test file tests/integration/tty.bats, line 209)
#   `testcontainer test_busybox running' failed
# runc list (status=0):
# ID          PID         STATUS      BUNDLE      CREATED     OWNER
# runc spec (status=0):
# 
# runc state test_busybox (status=0):
# {
#   "ociVersion": "1.0.1-dev",
#   "id": "test_busybox",
#   "pid": 5317,
#   "status": "created",
#   "bundle": "/tmp/busyboxtest",
#   "rootfs": "/tmp/busyboxtest/rootfs",
#   "created": "2019-12-18T16:57:42.087082814Z",
#   "owner": ""
# }
# runc state test_busybox (status=0):
# {
#   "ociVersion": "1.0.1-dev",
#   "id": "test_busybox",
#   "pid": 5317,
#   "status": "created",
#   "bundle": "/tmp/busyboxtest",
#   "rootfs": "/tmp/busyboxtest/rootfs",
#   "created": "2019-12-18T16:57:42.087082814Z",
#   "owner": ""
# }
# runc list (status=0):
# ID             PID         STATUS      BUNDLE             CREATED                          OWNER
# test_busybox   5317        created     /tmp/busyboxtest   2019-12-18T16:57:42.087082814Z   root
# runc kill test_busybox KILL (status=0):
# 
# Command "eval __runc state 'test_busybox' | grep -q 'stopped'" failed 10 times. Output: time="2019-12-18T16:57:51Z" level=error msg="container \"test_busybox\" does not exist"
# container "test_busybox" does not exist
# runc delete test_busybox (status=1):
# time="2019-12-18T16:57:52Z" level=error msg="container \"test_busybox\" does not exist"
# container "test_busybox" does not exist
...
Makefile:79: recipe for target 'localintegration' failed
make: *** [localintegration] Error 1
make: *** [Makefile:76: integration] Error 2

With this change:

$ make integration TESTPATH=/tty.bats
...
ok 1 runc run [tty ptsname]
ok 2 runc run [tty owner]
ok 3 runc run [tty owner] ({u,g}id != 0)
ok 4 runc exec [tty ptsname]
ok 5 runc exec [tty owner]
ok 6 runc exec [tty owner] ({u,g}id != 0)
ok 7 runc exec [tty consolesize]
ok 8 runc create [terminal=false]
ok 9 runc run [terminal=false]
ok 10 runc run -d [terminal=false]

This PR allows providing a desired status to wait_for_container and additionally waiting until runc state includes that status.

cc @mrunalp @random-liu

+11 -3

2 comments

2 changed files

liggitt

pr closed time in 2 months

push eventopencontainers/runc

Jordan Liggitt

commit sha 52951a7c1967c073496f8315c2b0a01eef573b9e

Fix race in tty integration test with slow startup Signed-off-by: Jordan Liggitt <liggitt@google.com>

view details

Jordan Liggitt

commit sha 8541d9cf3d8b6d46614cc41aaf38eaa2419549df

Fix race checking for process exit and waiting for exec fifo Signed-off-by: Jordan Liggitt <liggitt@google.com>

view details

Michael Crosby

commit sha a88592a63474e6976030b4fbded41dd445152236

Merge pull request #2185 from liggitt/exec-race Fix race checking for process exit and waiting for exec fifo

view details

push time in 2 months

PR merged opencontainers/runc

Fix race checking for process exit and waiting for exec fifo

Fixes #2183, a race condition in checking for a dead process while waiting for the exec fifo to open:

  • Moves the wait for the blocking fifo open (happy path) and the 100ms poll for a missing/zombie process into the same loop
  • When the missing/zombie process check fires, does a non-blocking open/read of the fifo to see if the process already completed, and only returns the "container process is already dead" error if that fails.

To test this, I inserted a synthetic 150ms delay in the awaitFifoOpen path after opening the fifo (simulating a slow send on the fifoOpened channel losing the race to the 100ms dead process detection timeout), and the integration suite passed (this PR includes https://github.com/opencontainers/runc/pull/2186 which fixes an existing race condition in one of the integration tests).

diff --git a/libcontainer/container_linux.go b/libcontainer/container_linux.go
index bec72def..a5a4d1ad 100644
--- a/libcontainer/container_linux.go
+++ b/libcontainer/container_linux.go
@@ -301,6 +301,8 @@ func awaitFifoOpen(path string) <-chan openResult {
        fifoOpened := make(chan openResult)
        go func() {
                result := fifoOpen(path, true)
+               // simulate a slow send on fifoOpened, racing with the 100ms dead process detection timeout
+               time.Sleep(150 * time.Millisecond)
                fifoOpened <- result
        }()
        return fifoOpened

When I insert the same simulated race in master, 14 integration tests fail with "container is already dead" errors.

Still working out a way to unit/integration test this without modifying non-test code like that.

cc @random-liu

+54 -43

6 comments

3 changed files

liggitt

pr closed time in 2 months

issue closedopencontainers/runc

Race condition in exec() exists waiting for fifo from container process

Container failures are seen downstream in Kubernetes e2e runs when very short-lived containers are quickly created/completed. https://github.com/kubernetes/kubernetes/issues/86312

The following error is returned from the container runtime:

Terminated:&ContainerStateTerminated{ExitCode:128,Signal:0,Reason:ContainerCannotRun,Message:OCI runtime start failed: container process is already dead: unknown

Even though the container actually ran successfully, based on log output.

@random-liu tracked this down to a race condition in the code that checks if a process is dead/zombie while waiting to open the fifo successfully. A sequence of events that could cause this is:

  1. process starts, opens fifo in write mode
  2. awaitFifoOpen opens fifo in read mode
  3. process completes
  4. 100ms timeout in awaitProcessExit fires, stats pid, gets error, closes isDead channel
  5. select block in exec() takes the awaitProcessExit branch and returns a "container process is already dead" error
  6. goroutine in awaitFifoOpen propagates the open fifo to the fifoOpened channel

We only see this under fairly heavy load, in which normal expectations around speed and sequence of goroutine execution can be challenged.

closed time in 2 months

liggitt

pull request commentcontainerd/containerd

Fix a typo in task.go

@hs0210 thanks for the PR. Can you please sign your commit and force push with the proper DCO?

hs0210

comment created time in 2 months

push eventcontainerd/containerd

Erik Sipsma

commit sha e7a6dda431b5ea810087fa26fb39a0e7f2bc371a

runtime v2: Close platform in runc shim's Shutdown method. Previously, the platform was closed as part of the Delete method when the process was an init for a task and there were no more tasks after its deletion. This can create problems if another task is created within the shim right after the delete runs, which results in the platform being closed but the shim continuing to run. This change moves closing the platform to the Shutdown method after the shim's context is canceled, which ensures the platform is only closed once the shim is sure its done servicing containers. Signed-off-by: Erik Sipsma <sipsma@amazon.com> Signed-off-by: Phil Estes <estesp@linux.vnet.ibm.com>

view details

Michael Crosby

commit sha bc43dc071b124840780e9a2b4f1466ca130c13e6

Merge pull request #3907 from estesp/cp-platform-close-fix [release/1.3] cherry-pick: runtime v2: Close platform in runc shim's Shutdown method.

view details

push time in 2 months

PR merged containerd/containerd

[release/1.3] cherry-pick: runtime v2: Close platform in runc shim's Shutdown method.

Previously, the platform was closed as part of the Delete method when the process was an init for a task and there were no more tasks after its deletion. This can create problems if another task is created within the shim right after the delete runs, which results in the platform being closed but the shim continuing to run.

This change moves closing the platform to the Shutdown method after the shim's context is canceled, which ensures the platform is only closed once the shim is sure its done servicing containers.

Signed-off-by: Erik Sipsma sipsma@amazon.com Signed-off-by: Phil Estes estesp@linux.vnet.ibm.com

+6 -5

6 comments

1 changed file

estesp

pr closed time in 2 months

pull request commentcontainerd/containerd

[release/1.2] backport: Disable criu tests in Travis CI

LGTM

estesp

comment created time in 2 months

pull request commentcontainerd/containerd

[release/1.3] cherry-pick: Disable criu tests in Travis CI

LGTM

estesp

comment created time in 2 months

pull request commentcontainerd/containerd

[WIP] create local version of introspection service

The code is looking good. Can you tell us the usecase for this?

katiewasnothere

comment created time in 2 months

pull request commentcontainerd/containerd

Update containerd/console vendor for fix

LGTM

estesp

comment created time in 2 months

pull request commentcontainerd/containerd

Add more adopters to ADOPTERS.md

LGTM

estesp

comment created time in 2 months

pull request commentcontainerd/cgroups

Added IO metrics

LGTM

Zyqsempai

comment created time in 2 months

pull request commentcontainerd/cgroups

Added IO metrics

@Zyqsempai shouldn't this be keyed off of major:minor that you get from reading the cgroup files?

Zyqsempai

comment created time in 2 months

pull request commentcontainerd/containerd

Replace ocispec.MediaTypeImageManifest with manifest.MediaType

@yeahdongcn can you please rebase this change on master to pick up the fixes for CI? Sorry about that.

yeahdongcn

comment created time in 2 months

pull request commentopencontainers/runc

Fix race checking for process exit and waiting for exec fifo

LGTM

liggitt

comment created time in 2 months

push eventcontainerd/containerd

Erik Sipsma

commit sha fbd46d70940b913adef07f54f3db1abcb0f08bb2

runtime v2: Close platform in runc shim's Shutdown method. Previously, the platform was closed as part of the Delete method when the process was an init for a task and there were no more tasks after its deletion. This can create problems if another task is created within the shim right after the delete runs, which results in the platform being closed but the shim continuing to run. This change moves closing the platform to the Shutdown method after the shim's context is canceled, which ensures the platform is only closed once the shim is sure its done servicing containers. Signed-off-by: Erik Sipsma <sipsma@amazon.com>

view details

Michael Crosby

commit sha 18092310031adca3ed7c29c8ac6c841e26467b46

Merge pull request #3896 from sipsma/close-platform-once runtime v2: Close platform in runc shim's Shutdown method.

view details

push time in 2 months

PR merged containerd/containerd

Reviewers
runtime v2: Close platform in runc shim's Shutdown method.

Previously, the platform was closed as part of the Delete method when the process was an init for a task and there were no more tasks after its deletion. This can create problems if another task is created within the shim right after the delete runs, which results in the platform being closed but the shim continuing to run.

This change moves closing the platform to the Shutdown method after the shim's context is canceled, which ensures the platform is only closed once the shim is sure its done servicing containers.

Signed-off-by: Erik Sipsma sipsma@amazon.com

Fixes #3895

+6 -5

10 comments

1 changed file

sipsma

pr closed time in 2 months

issue closedcontainerd/containerd

runtime: runc v2 shim closes platform prematurely and multiple times

This was found and debugged in firecracker-containerd, the issue there has more details+logs. We are currently using the 1.3 branch but it appears to be present in master and older versions that support the runc v2 multishim too.

The runc v2 shim seems to have an issue that makes it possible for platform.Close() to be called when the shim is not done servicing containers and to be called multiple times. It happens when:

  1. The shim starts and a single task is created+deleted, resulting in these lines that call platform.Close() to be executed.
  2. Another task is created before the shim receives a shutdown call, meaning Shutdown returns early and the shim continues to service containers.
  3. Any further tasks will no longer be able to use the platform functionality as it has been closed already.

This also creates problems when further containers are deleted because, due to the implementation of the platform console code on linux, calling platform.Close() multiple times results in the same already-closed FD value to be closed again. If that FD value was reused after the first close, platform.Close() will be closing a random FD in the process (which is what firecracker-containerd was rarely observing as EBADF errors from an unrelated call to os.RemoveAll happening elsewhere in the process). The fact that closing the console multiple times allows this is probably a separate bug that should also be addressed; I will open a separate issue in the console repo for it.

This problem was especially noticeable in firecracker-containerd because we wrap around the runc v2 shim and support a flag that tells the shim to run continuously even when there are no containers left (waiting instead for a separate custom StopVM call).

I have a fix to call platform.Close() only when the shim's context is canceled in Shutdown, just creating this issue to reference there.

closed time in 2 months

sipsma

pull request commentcontainerd/containerd

runtime v2: Close platform in runc shim's Shutdown method.

LGTM

sipsma

comment created time in 2 months

pull request commentcontainerd/console

Only close epoller FD at most once.

ping @estesp @dmcgowan

sipsma

comment created time in 2 months

pull request commentcontainerd/console

Only close epoller FD at most once.

LGTM

sipsma

comment created time in 2 months

issue commentcontainerd/containerd

oom_score default

I think this should be left to packagers and admins.

vitality411

comment created time in 2 months

push eventcontainerd/containerd

Akihiro Suda

commit sha 62adc516ddfae6e247dcd6a69bd00a7f7e7e96c1

sys: mkdirAs: do chown if dir already exists Fix `buildkitd --group GROUP` issue when `/run/buildkit` already exists and is owned by the root. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>

view details

Michael Crosby

commit sha f602b7b8834cbbd99ffd4416a09c09a8f841269e

Merge pull request #3899 from AkihiroSuda/fix-sys-mkdiras sys: mkdirAs: do chown if dir already exists

view details

push time in 2 months

PR merged containerd/containerd

sys: mkdirAs: do chown if dir already exists

Fix buildkitd --group GROUP issue when /run/buildkit already exists and is owned by the root.

Signed-off-by: Akihiro Suda akihiro.suda.cz@hco.ntt.co.jp

+2 -2

4 comments

1 changed file

AkihiroSuda

pr closed time in 2 months

pull request commentcontainerd/containerd

sys: mkdirAs: do chown if dir already exists

GLTM

AkihiroSuda

comment created time in 2 months

push eventstellarproject/aports

Francesco Colista

commit sha eb222927548e53b619c167114dbf4bb14de2e945

community/perl-business-isbn-data: upgrade to 20191107

view details

Francesco Colista

commit sha 3eb7f6214206042df141899b9b7d5a7e1492a65d

community/py3-multidict: upgrade to 4.7.1

view details

Natanael Copa

commit sha 68a1c6846b5b76d52c38ac0b1f357ca80e898783

main/linux-rpi: upgrade to 5.4.3

view details

Natanael Copa

commit sha 3ebebcc93ee013c473ae0e026265eef9a6157306

community/jool-modules-rpi: rebuild against kernel 5.4.3-r0

view details

Natanael Copa

commit sha 2e3a4461f42916a3a8024ff375c47426c48f701b

community/wireguard-rpi: rebuild against kernel 5.4.3-r0

view details

Natanael Copa

commit sha 23014eb0a4c6d3139aec28290a144a84a6f94e1c

comunity/py3-pygit2: skip test that fails on s390x

view details

Leo

commit sha 64c4b1afeea5192e0b0d147b8a6800d38ed3ccc9

main/libxpm: upgrade to 3.5.13

view details

Natanael Copa

commit sha 5995c79f09aa5fa3256c85f48e155b6fdf6c4911

scripts/mkimg.arm.sh: add rpi4 support ref #10789

view details

Jakub Jirutka

commit sha 0c4e0b98adab3a009b69b8265317585111364442

main/knot: upgrade to 2.9.2

view details

Natanael Copa

commit sha 2152ed4209c61cda5ceba46eed772fa7c6a71586

==== release 3.11.0_rc2 ====

view details

Leo

commit sha 7e579baf3252dd81708821956a5ea571ceb381f8

main/acpica: upgrade to 20191213

view details

Leo

commit sha e49c991b5eefde059233575cdd9f74457714f972

main/protobuf: upgrade to 3.11.2

view details

Leo

commit sha 1d583b3762246566a885cc103c61187f4012d233

main/py3-phonenumbers: upgrade to 8.11.1

view details

Leo

commit sha 0175b8facd532c0d473a17e41ca1d4c95b23a518

community/py3-pytest-mock: upgrade to 1.12.1

view details

Leo

commit sha 691ef8ea88a133b164e822f50f05b5803412d168

main/nsd: upgrade to 4.2.4

view details

Leo

commit sha 6f79280cd3fc67654ecba8f1305f5f147f5c0166

main/fribidi: upgrade to 1.0.8

view details

Leo

commit sha a356d9803a2c0a60b125e35bc133afa4d983702c

community/libhtp: upgrade to 0.5.32

view details

Jakub Jirutka

commit sha 4fec275fd9cc94dc07e9806f0be684c891936d74

community/kea: move each hook into separate subpackage

view details

Jakub Jirutka

commit sha 2a20da4f5f25e3f23c53674b5c90f0aa79f32d23

community/git-lfs: upgrade to 2.9.2

view details

Francesco Colista

commit sha c48476a4fd8794e1a790fba253bffd742145c9aa

main/perl-cpanel-json-xs: upgrade to 4.18

view details

push time in 2 months

Pull request review commentcontainerd/cgroups

Added period configuration for cpu.max

 package v2  type CPU struct { 	Weight *uint64-	Max    *uint64+	Max    string

same, these should be two separate fields

Zyqsempai

comment created time in 2 months

pull request commentopencontainers/runc

[RFR] Fixed broken links: runc security contact

LGTM

Yadnyawalkya

comment created time in 2 months

Pull request review commentcontainerd/cgroups

Added period configuration for cpu.max

 package v2  type CPU struct { 	Weight *uint64-	Max    *uint64+	Max    string

@AkihiroSuda do we want to handle "max" this way or something else? a bool value or two fields from max and period?

Zyqsempai

comment created time in 2 months

push eventcontainerd/containerd

Joakim Roubert

commit sha 499fbb0337c9138b5360117e0b25a7a1428f9667

Improve install scripts * Only use bash where needed (scripts with pipes that use -o pipefail) * Make string comparisons POSIX compatible * Handle whitespace(s) in GOPATH * Remove superfluous quotes in variable assignments Change-Id: If1ea55f06f402ded646b5085d4837c0996f90fab Signed-off-by: Joakim Roubert <joakimr@axis.com>

view details

Joakim Roubert

commit sha 9eef69e3ae145e0e442d9107cabcfa569029bbdd

Update after review comments Change-Id: Ic566e4857436409cdf1cdd7a635dfeee809b91a9 Signed-off-by: Joakim Roubert <joakimr@axis.com>

view details

Michael Crosby

commit sha 9b5581cc9c5bb4e9f4e47606ba883234167b1c23

Merge pull request #3887 from joakimr-axis/joakimr-axis_scripts Improve install scripts

view details

push time in 2 months

PR merged containerd/containerd

Improve install scripts
  • Make string comparisons POSIX compatible
  • Handle whitespace(s) in GOPATH
  • Remove superfluous quotes in variable assignments

Signed-off-by: Joakim Roubert joakimr@axis.com

+13 -13

4 comments

6 changed files

joakimr-axis

pr closed time in 2 months

pull request commentcontainerd/containerd

Improve install scripts

LGTM

joakimr-axis

comment created time in 2 months

pull request commentcontainerd/btrfs

Use go.mod to get vendored content

LGTM

estesp

comment created time in 2 months

Pull request review commentcontainerd/containerd

Added memory and cpu metrics for cgroupv2

+// +build linux++/*+   Copyright The containerd Authors.++   Licensed under the Apache License, Version 2.0 (the "License");+   you may not use this file except in compliance with the License.+   You may obtain a copy of the License at++       http://www.apache.org/licenses/LICENSE-2.0++   Unless required by applicable law or agreed to in writing, software+   distributed under the License is distributed on an "AS IS" BASIS,+   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.+   See the License for the specific language governing permissions and+   limitations under the License.+*/++package v2++import (+	v2 "github.com/containerd/containerd/metrics/types/v2"+	metrics "github.com/docker/go-metrics"+	"github.com/prometheus/client_golang/prometheus"+)++var memoryMetrics = []*metric{+	{+		name: "memory",

Shouldn't the name be memory_usage and the unit be bytes? I think you have this and cpu metrics mixed up. the unit should just be time, bytes, what type of data it is. the name should be the full cpu_throttled and then leave type to the units

Zyqsempai

comment created time in 2 months

issue commentcontainerd/cgroups

Set $PERIOD in cpu.max

Yes, we need to have period supported

Zyqsempai

comment created time in 2 months

pull request commentcontainerd/btrfs

Move repo to go modules

LGTM

chenrui333

comment created time in 2 months

push eventstellarproject/aports

Michael Crosby

commit sha e634ed82daa088ff649a20f5d3a8837f9cebf67c

update to kernel 5.4

view details

push time in 2 months

push eventstellarproject/aports

Leo

commit sha 3d949953ed023a00e502072af12541c64feb3494

main/ghostscript: add missing secfixes comment

view details

Francesco Colista

commit sha b72493a1d2b9abeddc3a756f78dd25e8028b2a00

testing/ossec-hids: upgrade to 3.5.0

view details

Natanael Copa

commit sha 198f9d832858c8755b026ee496754292b8ed5a61

community/chromium: upgrade to 78.0.3904.108

view details

ossdev07

commit sha 11c42c35632ded5b149aca0a598aa84646bac751

community/rethinkdb:add register settings for aarch64 register settings are added for aarch64 platform Signed-off-by: ossdev07 <ossdev@puresoftware.com>

view details

Leo

commit sha bce32815ec41b8144c99eb02cefd3fb05b2c74ee

community/clsync: upgrade to 0.4.3

view details

Leo

commit sha 91859c0ad3e4c5f77a5234e421fbb81d349d0145

main/fuse3: upgrade to 3.8.0

view details

Leo

commit sha 8da7e89bdc6e60a8dc916d2a1b00233f660fd780

testing/py3-passlib: upgrade to 1.7.2

view details

Leo

commit sha 0f1b0d0fb6bcd40bdd8baee387fb5c313a4c02ac

testing/py3-pep8-naming: upgrade to 0.9.1

view details

Rasmus Thomsen

commit sha e4daaeab39bf0293328590839d92114b3c11746a

community/networkmanager: upgrade to 1.20.8

view details

Leo

commit sha 793594f06b011c80e783641963da9bb8f7ba2394

testing/homebank: upgrade to 5.2.8

view details

Leo

commit sha 4c4845aedb00f9b1ba6ff9da6e65b49b20721044

community/inkscape: rebuild for libgsl.so.25

view details

Dave Johansen

commit sha 05e97e0cbd0ea6fe4930df7cf2718aa296a25e1c

community/gdal: move from testing

view details

Guilherme Felipe da Silva

commit sha 2b42e5b7ded29e2939c9cb7781ba9ea3ed2ea92a

testing/lua-net-url: new aport URL and Query string parser, builder, normalizer for Lua Signed-off-by: Guilherme Felipe da Silva <gfsilva.eng@gmail.com>

view details

Leo

commit sha d2e2c98befe7b29f74908bdbef58da38bc1d3617

community/mate-sensors-applet: disable on s390x

view details

Drew DeVault

commit sha a8c5bffc0e848bb42ce2e4f7bc575089d1445bba

community/doas: upgrade to 6.6

view details

Natanael Copa

commit sha 2090e143369de22c64e69780bc51c9e0a717d8d6

community/doas: enable persist. link dynamic

view details

Andy Postnikov

commit sha 1fdb36ec6e65d74f7b3ceea753e7fcf6e8b0dfc1

community/php7: bump for pcre on armhf

view details

Andy Postnikov

commit sha 4ad306e4442f8802e51d2e1fcf6687a12f21d173

community/php7-pecl-event: bump for libevent_core-2.1.so.7

view details

Leo

commit sha 0705a21c5dc4aa75b08765e71cff63984ad7842b

testing/widelands: fix location of binaries

view details

Leo

commit sha 59ba625be4e61a25b3bef9e1b0dc107c174e7540

community/py3-hypothesis: upgrade to 4.47.2

view details

push time in 2 months

pull request commentcontainerd/containerd

metrics: rename pids_v2 to pids

LGTM

AkihiroSuda

comment created time in 2 months

more