mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	upgrade runc to v1.1.4
This commit is contained in:
		
							
								
								
									
										2
									
								
								go.mod
									
									
									
									
									
								
							
							
						
						
									
										2
									
								
								go.mod
									
									
									
									
									
								
							@@ -53,7 +53,7 @@ require (
 | 
				
			|||||||
	github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822
 | 
						github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822
 | 
				
			||||||
	github.com/onsi/ginkgo/v2 v2.4.0
 | 
						github.com/onsi/ginkgo/v2 v2.4.0
 | 
				
			||||||
	github.com/onsi/gomega v1.23.0
 | 
						github.com/onsi/gomega v1.23.0
 | 
				
			||||||
	github.com/opencontainers/runc v1.1.3
 | 
						github.com/opencontainers/runc v1.1.4
 | 
				
			||||||
	github.com/opencontainers/selinux v1.10.0
 | 
						github.com/opencontainers/selinux v1.10.0
 | 
				
			||||||
	github.com/pkg/errors v0.9.1
 | 
						github.com/pkg/errors v0.9.1
 | 
				
			||||||
	github.com/pmezard/go-difflib v1.0.0
 | 
						github.com/pmezard/go-difflib v1.0.0
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										3
									
								
								go.sum
									
									
									
									
									
								
							
							
						
						
									
										3
									
								
								go.sum
									
									
									
									
									
								
							@@ -563,8 +563,9 @@ github.com/opencontainers/go-digest v1.0.0 h1:apOUWs51W5PlhuyGyz9FCeeBIOUDA/6nW8
 | 
				
			|||||||
github.com/opencontainers/go-digest v1.0.0/go.mod h1:0JzlMkj0TRzQZfJkVvzbP0HBR3IKzErnv2BNG4W4MAM=
 | 
					github.com/opencontainers/go-digest v1.0.0/go.mod h1:0JzlMkj0TRzQZfJkVvzbP0HBR3IKzErnv2BNG4W4MAM=
 | 
				
			||||||
github.com/opencontainers/image-spec v1.0.2 h1:9yCKha/T5XdGtO0q9Q9a6T5NUCsTn/DrBg0D7ufOcFM=
 | 
					github.com/opencontainers/image-spec v1.0.2 h1:9yCKha/T5XdGtO0q9Q9a6T5NUCsTn/DrBg0D7ufOcFM=
 | 
				
			||||||
github.com/opencontainers/image-spec v1.0.2/go.mod h1:BtxoFyWECRxE4U/7sNtV5W15zMzWCbyJoFRP3s7yZA0=
 | 
					github.com/opencontainers/image-spec v1.0.2/go.mod h1:BtxoFyWECRxE4U/7sNtV5W15zMzWCbyJoFRP3s7yZA0=
 | 
				
			||||||
github.com/opencontainers/runc v1.1.3 h1:vIXrkId+0/J2Ymu2m7VjGvbSlAId9XNRPhn2p4b+d8w=
 | 
					 | 
				
			||||||
github.com/opencontainers/runc v1.1.3/go.mod h1:1J5XiS+vdZ3wCyZybsuxXZWGrgSr8fFJHLXuG2PsnNg=
 | 
					github.com/opencontainers/runc v1.1.3/go.mod h1:1J5XiS+vdZ3wCyZybsuxXZWGrgSr8fFJHLXuG2PsnNg=
 | 
				
			||||||
 | 
					github.com/opencontainers/runc v1.1.4 h1:nRCz/8sKg6K6jgYAFLDlXzPeITBZJyX28DBVhWD+5dg=
 | 
				
			||||||
 | 
					github.com/opencontainers/runc v1.1.4/go.mod h1:1J5XiS+vdZ3wCyZybsuxXZWGrgSr8fFJHLXuG2PsnNg=
 | 
				
			||||||
github.com/opencontainers/runtime-spec v1.0.2/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
 | 
					github.com/opencontainers/runtime-spec v1.0.2/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
 | 
				
			||||||
github.com/opencontainers/runtime-spec v1.0.3-0.20200929063507-e6143ca7d51d/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
 | 
					github.com/opencontainers/runtime-spec v1.0.3-0.20200929063507-e6143ca7d51d/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
 | 
				
			||||||
github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417 h1:3snG66yBm59tKhhSPQrQ/0bCrv1LQbKt40LnUPiUxdc=
 | 
					github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417 h1:3snG66yBm59tKhhSPQrQ/0bCrv1LQbKt40LnUPiUxdc=
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										16
									
								
								vendor/github.com/opencontainers/runc/libcontainer/cgroups/systemd/common.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										16
									
								
								vendor/github.com/opencontainers/runc/libcontainer/cgroups/systemd/common.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -288,14 +288,16 @@ func generateDeviceProperties(r *configs.Resources) ([]systemdDbus.Property, err
 | 
				
			|||||||
			case devices.CharDevice:
 | 
								case devices.CharDevice:
 | 
				
			||||||
				entry.Path = fmt.Sprintf("/dev/char/%d:%d", rule.Major, rule.Minor)
 | 
									entry.Path = fmt.Sprintf("/dev/char/%d:%d", rule.Major, rule.Minor)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
								// systemd will issue a warning if the path we give here doesn't exist.
 | 
				
			||||||
 | 
								// Since all of this logic is best-effort anyway (we manually set these
 | 
				
			||||||
 | 
								// rules separately to systemd) we can safely skip entries that don't
 | 
				
			||||||
 | 
								// have a corresponding path.
 | 
				
			||||||
 | 
								if _, err := os.Stat(entry.Path); err != nil {
 | 
				
			||||||
 | 
									logrus.Debugf("skipping device %s for systemd: %s", entry.Path, err)
 | 
				
			||||||
 | 
									continue
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		// systemd will issue a warning if the path we give here doesn't exist.
 | 
							deviceAllowList = append(deviceAllowList, entry)
 | 
				
			||||||
		// Since all of this logic is best-effort anyway (we manually set these
 | 
					 | 
				
			||||||
		// rules separately to systemd) we can safely skip entries that don't
 | 
					 | 
				
			||||||
		// have a corresponding path.
 | 
					 | 
				
			||||||
		if _, err := os.Stat(entry.Path); err == nil {
 | 
					 | 
				
			||||||
			deviceAllowList = append(deviceAllowList, entry)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	properties = append(properties, newProp("DeviceAllow", deviceAllowList))
 | 
						properties = append(properties, newProp("DeviceAllow", deviceAllowList))
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										2
									
								
								vendor/github.com/opencontainers/runc/libcontainer/rootfs_linux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/github.com/opencontainers/runc/libcontainer/rootfs_linux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -80,6 +80,8 @@ func prepareRootfs(pipe io.ReadWriter, iConfig *initConfig, mountFds []int) (err
 | 
				
			|||||||
		// Therefore, we can access mountFds[i] without any concerns.
 | 
							// Therefore, we can access mountFds[i] without any concerns.
 | 
				
			||||||
		if mountFds != nil && mountFds[i] != -1 {
 | 
							if mountFds != nil && mountFds[i] != -1 {
 | 
				
			||||||
			mountConfig.fd = &mountFds[i]
 | 
								mountConfig.fd = &mountFds[i]
 | 
				
			||||||
 | 
							} else {
 | 
				
			||||||
 | 
								mountConfig.fd = nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if err := mountToRootfs(m, mountConfig); err != nil {
 | 
							if err := mountToRootfs(m, mountConfig); err != nil {
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										7
									
								
								vendor/github.com/opencontainers/runc/libcontainer/standard_init_linux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										7
									
								
								vendor/github.com/opencontainers/runc/libcontainer/standard_init_linux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -198,6 +198,13 @@ func (l *linuxStandardInit) Init() error {
 | 
				
			|||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
		return err
 | 
							return err
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
						// exec.LookPath might return no error for an executable residing on a
 | 
				
			||||||
 | 
						// file system mounted with noexec flag, so perform this extra check
 | 
				
			||||||
 | 
						// now while we can still return a proper error.
 | 
				
			||||||
 | 
						if err := system.Eaccess(name); err != nil {
 | 
				
			||||||
 | 
							return &os.PathError{Op: "exec", Path: name, Err: err}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Set seccomp as close to execve as possible, so as few syscalls take
 | 
						// Set seccomp as close to execve as possible, so as few syscalls take
 | 
				
			||||||
	// place afterward (reducing the amount of syscalls that users need to
 | 
						// place afterward (reducing the amount of syscalls that users need to
 | 
				
			||||||
	// enable in their seccomp profiles). However, this needs to be done
 | 
						// enable in their seccomp profiles). However, this needs to be done
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										19
									
								
								vendor/github.com/opencontainers/runc/libcontainer/system/linux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										19
									
								
								vendor/github.com/opencontainers/runc/libcontainer/system/linux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -31,6 +31,25 @@ func (p ParentDeathSignal) Set() error {
 | 
				
			|||||||
	return SetParentDeathSignal(uintptr(p))
 | 
						return SetParentDeathSignal(uintptr(p))
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// Eaccess is similar to unix.Access except for setuid/setgid binaries
 | 
				
			||||||
 | 
					// it checks against the effective (rather than real) uid and gid.
 | 
				
			||||||
 | 
					func Eaccess(path string) error {
 | 
				
			||||||
 | 
						err := unix.Faccessat2(unix.AT_FDCWD, path, unix.X_OK, unix.AT_EACCESS)
 | 
				
			||||||
 | 
						if err != unix.ENOSYS && err != unix.EPERM { //nolint:errorlint // unix errors are bare
 | 
				
			||||||
 | 
							return err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Faccessat2() not available; check if we are a set[ug]id binary.
 | 
				
			||||||
 | 
						if os.Getuid() == os.Geteuid() && os.Getgid() == os.Getegid() {
 | 
				
			||||||
 | 
							// For a non-set[ug]id binary, use access(2).
 | 
				
			||||||
 | 
							return unix.Access(path, unix.X_OK)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// For a setuid/setgid binary, there is no fallback way
 | 
				
			||||||
 | 
						// so assume we can execute the binary.
 | 
				
			||||||
 | 
						return nil
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func Execv(cmd string, args []string, env []string) error {
 | 
					func Execv(cmd string, args []string, env []string) error {
 | 
				
			||||||
	name, err := exec.LookPath(cmd)
 | 
						name, err := exec.LookPath(cmd)
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										2
									
								
								vendor/modules.txt
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/modules.txt
									
									
									
									
										vendored
									
									
								
							@@ -614,7 +614,7 @@ github.com/onsi/gomega/types
 | 
				
			|||||||
# github.com/opencontainers/go-digest v1.0.0
 | 
					# github.com/opencontainers/go-digest v1.0.0
 | 
				
			||||||
## explicit; go 1.13
 | 
					## explicit; go 1.13
 | 
				
			||||||
github.com/opencontainers/go-digest
 | 
					github.com/opencontainers/go-digest
 | 
				
			||||||
# github.com/opencontainers/runc v1.1.3
 | 
					# github.com/opencontainers/runc v1.1.4
 | 
				
			||||||
## explicit; go 1.16
 | 
					## explicit; go 1.16
 | 
				
			||||||
github.com/opencontainers/runc/libcontainer
 | 
					github.com/opencontainers/runc/libcontainer
 | 
				
			||||||
github.com/opencontainers/runc/libcontainer/apparmor
 | 
					github.com/opencontainers/runc/libcontainer/apparmor
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user