aboutsummaryrefslogtreecommitdiff
path: root/package/docker-containerd
Commit message (Collapse)AuthorAgeFilesLines
* package/go: rename BR2_PACKAGE_HOST_GO_{ARCH_SUPPORTS,CGO_LINKING_SUPPORTS}Gravatar Angelo Compagnucci2019-03-171-4/+4
| | | | | | | | | | | | | | | | | | | | | The hidden Config.in option BR2_PACKAGE_HOST_GO_ARCH_SUPPORTS name is not very clear as to whether it says whether Go is available for the target architecture or the host architecture. Until now, this was fine since there was support for host Go packages. But as we are about to introduce support for building host Go packages, we need to clarify the meaning of BR2_PACKAGE_HOST_GO_ARCH_SUPPORTS. Since it says whether the target architecture has support for Go or not, we rename it to BR2_PACKAGE_HOST_GO_TARGET_ARCH_SUPPORTS. And since BR2_PACKAGE_HOST_GO_CGO_LINKING_SUPPORTS is tightly related, we rename it to BR2_PACKAGE_HOST_GO_TARGET_CGO_LINKING_SUPPORTS. Signed-off-by: Angelo Compagnucci <angelo@amarulasolutions.com> Tested-by: Adam Duskett <aduskett@gmail.com> [Thomas: entirely rewrite commit log] Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* package/runc: blacklist Codesourcery ARM toolchainGravatar Peter Korsgaard2019-03-041-0/+2
| | | | | | | | | Fixes: http://autobuild.buildroot.net/results/018e309caa0fc662aa2993e47b2037fb6c569011/ This toolchain uses glibc 2.18, which does not provide O_TMPFILE support. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* runc: depend on linux headers >= 3.11 for O_TMPFILEGravatar Christian Stewart2019-02-271-1/+3
| | | | | | | | | | | | | | | | Fixes: http://autobuild.buildroot.net/results/63e9d88ae5177541be463f1e2aafec59aa410479 Add dependency on headers >= 3.11 for O_TMPFILE, used by runc after the fix for CVE-2019-5736 and propagate to the reverse dependencies of runc. Notice that C library support for O_TMPFILE is also needed, which was added in glibc 2.19 and musl 0.9.15. Signed-off-by: Christian Stewart <christian@paral.in> [Peter: squash series, extend commit message, mention C library dependency, fix indentation] Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/docker-containerd: fix typo in uclibc dependencyGravatar Thomas Petazzoni2019-02-141-1/+1
| | | | | | | | | | | | | | | | Commit 6e3f7fbc072c88ab344f2ffa39e402464b566f19 ("package/runc: add upstream security fix for CVE-2019-5736") added a dependency of docker-containerd to uclibc (inherited from runc), but the depends on has a typo that makes it ineffective. Due to this, docker-containerd can still be selected in uClibc configurations, causing runc to be build, and failing to build due fexecve() being missing in uClibc. Fixes: http://autobuild.buildroot.net/results/64ecdb1e007106fdb05979b10b42b90591255504/ Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* docker-containerd: bump to v1.2.3Gravatar Christian Stewart2019-02-122-2/+2
| | | | | Signed-off-by: Christian Stewart <christian@paral.in> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/runc: add upstream security fix for CVE-2019-5736Gravatar Peter Korsgaard2019-02-121-2/+3
| | | | | | | | | | | | | | | | | | | | | | | The vulnerability allows a malicious container to (with minimal user interaction) overwrite the host runc binary and thus gain root-level code execution on the host. The level of user interaction is being able to run any command (it doesn't matter if the command is not attacker-controlled) as root within a container in either of these contexts: * Creating a new container using an attacker-controlled image. * Attaching (docker exec) into an existing container which the attacker had previous write access to. For more details, see the advisory: https://www.openwall.com/lists/oss-security/2019/02/11/2 The fix for this issue uses fexecve(3), which isn't available on uClibc, so add a dependency on !uclibc to runc and propagate to the reverse dependencies (containerd/docker-engine). Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/docker-containerd: add missing dependency on host-pkgconfGravatar Thomas Petazzoni2018-12-301-1/+1
| | | | | | | | | | | | | | When libsseccomp support is enabled, docker-containerd uses pkg-config to find libsseccomp, so we must depend on host-pkconf. Fixes the following build issue, detected with per-package directory support: pkg-config: exec: "pkg-config": executable file not found in $PATH Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com> Signed-off-by: Christian Stewart <christian@paral.in> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* package/docker-containerd: bump to version 1.2.1Gravatar Christian Stewart2018-12-302-2/+2
| | | | | | | | | This commit bumps docker-containerd to the latest tagged release, v1.2.1. This release is compatible with the current docker engine release (18.09). Signed-off-by: Christian Stewart <christian@paral.in> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* docker-containerd: bump to v1.1.3Gravatar Christian Stewart2018-09-163-5/+29
| | | | | | | | | | | | | | | | | This commit bumps docker-containerd to v1.1.3. This is a requisite bump for the upgrade of docker-engine to 2018.06. The license file was renamed from LICENSE.code to LICENSE, so we take this opportunity to add the hash for the license file. The only change between LICENSE.code and LICENSE is: - Copyright 2013-2016 Docker, Inc. + Copyright The containerd Authors Signed-off-by: Christian Stewart <christian@paral.in> [Thomas: fix legal info, add hash for license file.] Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* docker-containerd: add missing docker-containerd symlinkGravatar Sam Lancia2018-06-071-0/+1
| | | | | | | | | | | | | | | | Prior to commit 2dccb4f2fefd8a0dbda65dd0f7537f811e920b13 ("package/docker-containerd: convert to golang infrastructure"), the containerd binary was installed as docker-containerd. Following the conversion to the golang package infrastructure, the binary is now installed as "containerd", which breaks some use cases. Let's add a symlink link docker-containerd -> containerd to fix such use cases. Fixes: https://bugs.busybox.net/show_bug.cgi?id=11076 Signed-off-by: Sam Lancia <sam@gpsm.co.uk> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* package/docker-containerd: convert to golang infrastructureGravatar Angelo Compagnucci2018-03-311-25/+8
| | | | | | | Signed-off-by: Angelo Compagnucci <angelo@amarulasolutions.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com> Reviewed-by: "Yann E. MORIN" <yann.morin.1998@free.fr> Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
* docker-containerd: remove symlink to $(RUNC_SRCDIR)Gravatar Thomas Petazzoni2018-03-311-2/+0
| | | | | | | | | | | | | | | | | The DOCKER_CONTAINERD_CONFIGURE_CMDS creates a symlink to runc's source directory, but it does not build depend on runc, which means that the runc package may not have been extracted/built before docker-containerd. Therefore, when doing a build with "make docker-containerd", this symbolic link is broken, but it doesn't prevent docker-containerd from building. Therefore, this symlink is not necessary and can be dropped. Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com> Reviewed-by: "Yann E. MORIN" <yann.morin.1998@free.fr> Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
* Globally replace $(HOST_DIR)/usr/bin with $(HOST_DIR)/binGravatar Arnout Vandecappelle2017-07-051-1/+1
| | | | | | | | | | | Since things are no longer installed in $(HOST_DIR)/usr, the callers should also not refer to it. This is a mechanical change with git grep -l '$(HOST_DIR)/usr/bin' | xargs sed -i 's%$(HOST_DIR)/usr/bin%$(HOST_DIR)/bin%g' Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* docker-containerd: bump to version 9048e5e50717ea4497b757314bad98ea3763c145Gravatar Christian Stewart2017-06-112-2/+2
| | | | | | | This is a runtime dependency of docker-engine in version 17.05.0-ce Signed-off-by: Christian Stewart <christian@paral.in> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* docker-containerd: bump to version 422e31ce907fd9c3833a38d7b8fdd023e5a76e73Gravatar Fabrice Fontaine2017-04-062-2/+2
| | | | | | | This is a runtime dependency of docker-engine in version 17.04.0-ce Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* docker-containerd: bump to version 4ab9917febca54791c5f071a9d1f404867857fccGravatar Fabrice Fontaine2017-04-012-2/+2
| | | | | | | This is a runtime dependency of docker-engine in version 17.03.1-ce Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* docker-containerd: bump to version 977c511eda0925a723debdc94d09459af49d082aGravatar Fabrice Fontaine2017-03-032-2/+2
| | | | | | | This is a runtime dependency of docker-engine in version 17.03.0-ce Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* docker-containerd: bump to version aa8187dbd3b7ad67d8e5e3a15115d3eef43a7ed1Gravatar Fabrice Fontaine2017-02-262-2/+2
| | | | | | | Version bump as a dependency of docker-engine v1.13.1 Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* package: fix reverse dependencies of util-linuxGravatar Rahul Bedarkar2017-01-281-3/+2
| | | | | | | | | | | | | | | Commit 006a328ad6be ("util-linux: fix build with ncurses") removed dependency on BR2_USE_WCHAR, but failed to update the reverse dependencies of util-linux. This commit fixes all such reverse dependencies by removing dependency on BR2_USE_WCHAR as it is not required by package itself. Fixes: 006a328ad6be ("util-linux: fix build with ncurses") Signed-off-by: Rahul Bedarkar <rahul.bedarkar@imgtec.com> Cc: Thomas Petazzoni <thomas.petazzoni@free-electrons.com> Cc: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* docker-containerd: bump version to v0.2.5Gravatar Christian Stewart2016-12-232-2/+2
| | | | | | | Version bump as a dependency of Docker-Engine v1.12.5. Signed-off-by: Christian Stewart <christian@paral.in> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* docker-containerd: bump to v0.2.4Gravatar Christian Stewart2016-10-192-2/+2
| | | | | Signed-off-by: Christian Stewart <christian@paral.in> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* docker-containerd: pass -extldflags '-static' on when BR2_STATIC_LIBS=yGravatar Thomas Petazzoni2016-07-241-2/+5
| | | | | | | | | There is no reason to link Go binaries statically, unless when BR2_STATIC_LIBS=y. Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com> Tested-by: Christian Stewart <christian@paral.in> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* package/docker-containerd: bump to latestGravatar Christian Stewart2016-07-242-2/+2
| | | | | | | | Bump the pinned docker-containerd version to the latest in advance of the introduction of docker-engine v1.12.0-rc4. Signed-off-by: Christian Stewart <christian@paral.in> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* docker-containerd: needs CGO linkingGravatar Thomas Petazzoni2016-07-061-0/+2
| | | | | | | | Fixes: http://autobuild.buildroot.net/results/09a23c8926ce32408fbbfa1fb5b3ed7c4f8733e3/ Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* docker-containerd: new packageGravatar Christian Stewart2016-07-053-0/+67
docker-containerd is a daemon and API for controlling and managing runC containers. https://containerd.tools/ Signed-off-by: Christian Stewart <christian@paral.in> Reviewed-by: Romain Naour <romain.naour@gmail.com> [Thomas: - simplify a bit the comments about the runtime dependencies - add missing comment on wchar, and take into account the BR2_USE_MMU dependency in the comment - factorize the build step with a foreach loop.] Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>