Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: microsoft/hcsshim
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v0.11.8
Choose a base ref
...
head repository: microsoft/hcsshim
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v0.12.0
Choose a head ref

Commits on May 8, 2023

  1. Allow patch dependabot updates (#1756)

    Patch updates can be disabled for most dependencies, but ignoring
    all patch-fixes has caused errors (notably containerd).
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 8, 2023
    Copy the full SHA
    a452efa View commit details
  2. omnibus dependency updates (#1767)

    Update dependencies and vendor (and update `test/go.mod`, as
    appropriate) for:
    
     - 1758
     - 1759
     - 1760
     - 1761
     - 1762
     - 1763
     - 1764
     - 1765
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 8, 2023
    Copy the full SHA
    478b6da View commit details
  3. Checkout appropriate containerd ref (#1752)

    Use containerd version from go.mod when checking out and building
    upstream containerd for testing.
    
    containerd integration tests updated in 1.6.20 to work on windows.
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 8, 2023
    Copy the full SHA
    de0e116 View commit details

Commits on May 9, 2023

  1. gcs: Support routing container stdio to sidecar

    Signed-off-by: Ashish Sachdeva <asachdev@microsoft.com>
    asachdev17 committed May 9, 2023
    Copy the full SHA
    b1b0768 View commit details
  2. Merge pull request #1728 from ashishsachdeva/asachdev/logsredirection

    gcs: Support routing container stdio to sidecar
    kevpar authored May 9, 2023
    Copy the full SHA
    a1d874a View commit details

Commits on May 11, 2023

  1. Enable guest agent unit tests in the ci

    Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
    katiewasnothere committed May 11, 2023
    Copy the full SHA
    655649b View commit details
  2. Bump github.com/docker/distribution in /test (#1771)

    Bumps [github.com/docker/distribution](https://github.com/docker/distribution) from 2.8.1+incompatible to 2.8.2+incompatible.
    - [Release notes](https://github.com/docker/distribution/releases)
    - [Commits](distribution/distribution@v2.8.1...v2.8.2)
    
    ---
    updated-dependencies:
    - dependency-name: github.com/docker/distribution
      dependency-type: indirect
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored May 11, 2023
    Copy the full SHA
    154f877 View commit details
  3. Bump github.com/docker/distribution (#1772)

    Bumps [github.com/docker/distribution](https://github.com/docker/distribution) from 2.8.1+incompatible to 2.8.2+incompatible.
    - [Release notes](https://github.com/docker/distribution/releases)
    - [Commits](distribution/distribution@v2.8.1...v2.8.2)
    
    ---
    updated-dependencies:
    - dependency-name: github.com/docker/distribution
      dependency-type: indirect
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored May 11, 2023
    Copy the full SHA
    5d2fe12 View commit details

Commits on May 12, 2023

  1. Merge pull request #1773 from katiewasnothere/kabaldau/run_guest_unit…

    …_tests
    
    Enable guest agent unit tests in the CI
    katiewasnothere authored May 12, 2023
    Copy the full SHA
    889236e View commit details

Commits on May 15, 2023

  1. formalize ignored (test) dependency updates (#1769)

    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 15, 2023
    Copy the full SHA
    497a346 View commit details
  2. Rewrite SCSI support in new package

    The existing SCSI implementation in internal/uvm has evolved organically
    over time into what it is today. This creates unecessary difficulty when
    adding new features to the code, makes it harder to maintain, and has
    been a source of bugs.
    
    Additionally, there is a significant functional issue that the current
    scsi code tightly couples the idea of attaching a SCSI device to a VM,
    with the use/mounting of that device inside the VM. This creates
    difficulty when we want to re-use the same SCSI attachment multiple
    times, especially in the future when we will need to mount multiple
    partitions from a device.
    
    This is addressed here by largely rewriting the shim's SCSI code, and
    moving it to a new internal/uvm/scsi package. The new code features a
    main Manager type, which delegates to attachManager and mountManager for
    tracking of attachments to the VM, and mounting of devices inside the
    VM, respectively. attachManager and mountManager also rely on a set of
    interfaces for the actual backend implementation of interacting with a
    VM. This will also allow for easier testing of the scsi package in
    isolation in the future.
    
    One consequence of this change is it is no longer possible for the
    caller to request a specific UVM path for a SCSI mount. The support for
    this was already kind of a sham, because if the disk was already
    mounted, you would get back its existing mount path instead of the one
    you wanted, so the caller already had to handle that case. Additionally,
    I'm not aware of any reason why the specific location the disk is
    mounted is actually relevant. Because of these reasons, and to simplify
    the overall package interface, the mount path is determined by the scsi
    package, using a format string passed to the Manager at creation time.
    
    Signed-off-by: Kevin Parsons <kevpar@microsoft.com>
    kevpar committed May 15, 2023
    Copy the full SHA
    d98a2ef View commit details
  3. Merge pull request #1744 from kevpar/new-scsi

    Rewrite SCSI support in new package
    kevpar authored May 15, 2023
    Copy the full SHA
    5c5d85c View commit details
  4. Support more flexible LCOW layer parsing

    Previously, layer information for both Windows and Linux containers was
    passed throughout the shim through the OCI runtime spec's
    Windows.LayerFolders field. This was used to store the set of
    directories used for the layers, including the scratch. The exact
    semantics of what is expected in these directories differed between
    Windows and Linux. This approach worked okay, but had a few annoying
    limitations. For instance, there was no way to represent more complex
    layer data, such as a VHD path as well as a partition index on that VHD.
    
    This change removes the use of Windows.LayerFolders completely for Linux
    containers, and instead creates a new layers.LCOWLayers type that is
    used to represent Linux layer configuration. This new type is passed
    into hcsoci.CreateContainer, and from there is passed into
    layers.MountLCOWLayers where it is actually used to set up the
    filesystem for the container.
    
    The new layers.LCOWLayers type is currently quite simple, but having
    this as a proper Go type allows us a lot of flexibility in the future.
    We can add more fields on this struct, but we could also change out the
    nested LCOWLayer type for an interface, for instance, if we wanted to
    support new types of layers that have drastically different
    representation.
    
    This change does not aim to touch the way Windows container layers are
    handled, nor how the Windows UVM root filesystem is set up. These would
    be good things to improve in the future, but the Windows container
    layers are more complicated in how they are used, so this is left for
    future work.
    
    Signed-off-by: Kevin Parsons <kevpar@microsoft.com>
    kevpar committed May 15, 2023
    Copy the full SHA
    76b9454 View commit details
  5. Add lcow-partitioned-layer mount type

    Adds support for a new type of LCOW mount that can use individual disk
    partitions for each read-only layer. This change adds the work to parse
    the new layer type and pass it through the shim, as well as the support
    to the shim-side SCSI package to send the partition index in the guest
    request.
    
    This change does not add the GCS-side work to actually mount the
    specified partition. That will come in a future change.
    
    This change also does not handle formatting the scratch disk. It it
    desired to be able to format it on the fly when creating the container,
    but that will also come in a future change.
    
    Signed-off-by: Kevin Parsons <kevpar@microsoft.com>
    kevpar committed May 15, 2023
    Copy the full SHA
    776be9a View commit details
  6. Merge pull request #1745 from kevpar/lcow-layers

    Support flexible LCOW layer parsing and partitioned layers
    kevpar authored May 15, 2023
    Copy the full SHA
    22bf0b5 View commit details
  7. [deps] weekly update (#1779)

    PRs:
     - #1775
     - #1777
     - #1778
    
    (needed to update `test/go.mod` as well).
    
    Update dependabot.yml to avoid automated major/minor updates in
    containerd-related dependencies.
    
    Revert `github.com/containerd/ttrpc` in `test/` to `1.1.1`, since it is
    used to communicate with shim in `containerd-shim-runhcs-v1` tests, and
    the versions should match.
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 15, 2023
    Copy the full SHA
    94df0f3 View commit details
  8. Guest agent support for partitions on SCSI devices

    * Update `ControllerLunToName` to `GetDevicePath` and take in partition
    as an additional param
    * Wait for partition subdirectory to appear for the devices
    * Update device encryption and verity device names with partition index
    * Update device encryption and verity device tests
    * Add new unit tests for `GetDevicePath`
    
    Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
    katiewasnothere committed May 15, 2023
    Copy the full SHA
    1a2aca3 View commit details
  9. Merge pull request #1747 from katiewasnothere/kabaldau/scsi_partition…

    …_guest
    
    Guest agent support for partitions on SCSI devices
    katiewasnothere authored May 15, 2023
    Copy the full SHA
    e5af8fb View commit details
  10. Add feature to ensure scsi device is formatted with target filesystem

    * Add new `EnsureFilesystem` and `Filesystem` options on
    LCOWMappedVirtualDisk
    * Add matching `EnsureFilesystem` and `Filesystem` options on scsi
    MountConfig
    * Set `EnsureFilesystem` and `Filesystem` when attaching scratch devices
    * Add plumbing in guest scsi package to support `EnsureFilesystem` and
    `Filesystem`.
    * Create new `Config` type in guest scsi package for passing in
    setup/cleanup configuration settings
    * Add new call to get a device's filesystem by reading its superblock
    * Add new scsi unit tests for new features and update existing tests
    * New package for formatting using xfs
    * Move xfs formatting for encrypted devices out of crypt pkg into scsi
    
    Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
    katiewasnothere committed May 15, 2023
    Copy the full SHA
    af8c444 View commit details
  11. Merge pull request #1757 from katiewasnothere/kabaldau/scsi_ensure_fi…

    …lesystem
    
    SCSI ensure filesystem
    katiewasnothere authored May 15, 2023
    Copy the full SHA
    7769a64 View commit details

Commits on May 16, 2023

  1. Update containerd-shim-runhcs-v1 tests (#1783)

    Update shim tests to match current shim behavior.
    Run shim tests in GitHub CI.
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 16, 2023
    Copy the full SHA
    55f8c42 View commit details

Commits on May 23, 2023

  1. [deps] combine and tidy \test (#1790)

     - #1780
     - #1781
     - #1787
     - #1788
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 23, 2023
    Copy the full SHA
    c271b98 View commit details
  2. update tar2ext4 package (#1785)

    Add another `ReadExt4SuperBlockReadSeeker` implementation
    to work with `io.ReadSeeker` in addition to working with
    files directly. This way we'll be able to work with e.g.
    ext4 GPT partitions. The existing `ReadExt4SuperBlock` works
    the same, but has been updated to call `ReadExt4SuperBlockReadSeeker`.
    
    Add `ReadDMVerityInfoReader` that reads dmverity superblock
    from an `io.Reader` and update `ReadDMVerityInfo` accordingly.
    
    Additionally write verity superblock directly without `io.SeekEnd`,
    assumming that the writer is already set at correct offset.
    `ComputeAndWriteHashDevice` parameters have been updated
    accordingly.
    
    Add `Ext4FileSystemSize` function that reads ext4 superblock
    from a given `io.ReadSeeker` and returns the underlying
    ext4 filesystem size and its superblock.
    
    Signed-off-by: Maksim An <maksiman@microsoft.com>
    anmaxvl authored May 23, 2023
    Copy the full SHA
    36359c0 View commit details

Commits on May 30, 2023

  1. Bump github.com/containerd/ttrpc from 1.1.1 to 1.1.2 (#1791)

    * Bump github.com/containerd/ttrpc from 1.1.1 to 1.1.2
    
    Bumps [github.com/containerd/ttrpc](https://github.com/containerd/ttrpc) from 1.1.1 to 1.1.2.
    - [Release notes](https://github.com/containerd/ttrpc/releases)
    - [Commits](containerd/ttrpc@v1.1.1...v1.1.2)
    
    ---
    updated-dependencies:
    - dependency-name: github.com/containerd/ttrpc
      dependency-type: direct:production
      update-type: version-update:semver-patch
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    * tidy ./test
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    
    ---------
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    dependabot[bot] and helsaawy authored May 30, 2023
    Copy the full SHA
    933d9b1 View commit details
  2. Use gh cli to download releases (#1792)

    Use official github cli tool to download releases, instead of manually
    creating URLs.
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 30, 2023
    Copy the full SHA
    f1a2711 View commit details
  3. Add test for support of NFS mount (#1726)

    LCOW kernel needs to be built with certain config options(`CONFIG_NFS_FS=y`, `CONFIG_NFS_V4=y` &
    `CONFIG_NFS_V4_1=y`)_in order to be able to successfully run a NFS client and mount a NFS inside a
    container. This test attempts to mount a (fake) NFS server to ensure that the kernel has the capabilities of
    running a NFS client.
    
    We don't mount a real NFS server because creating a real NFS server that will work in all kinds of test
    environments is not simple. Instead, we look at the error returned by the NFS mount operation and decide if
    the failure is because the server wasn't available (i.e a `Connection refused` error) or because the kernel
    doesn't support NFS clients (`No Device` error).
    
    Limitations on different approaches of starting a real NFS server:
    1. Starting another LCOW container that runs a NFS server: By default on Linux the NFS server runs in the
    kernel and to enable that the kernel must be built with `NFSD_*` config options (note that the config options
    for running NFS server are different than the config options required for NFS client), which we don't
    currently do and it doesn't make sense to just enable these options for a test.
    2. Running a userspace NFS server: There are a few userspace NFS server projects but getting them to run
    inside the UtilityVM wasn't very easy. We didn't want to spend a lot of time on this test.
    3. Running NFS server on the windows host: Not all builds of windows support this so the test won't run in all
    environments.
    
    Signed-off-by: Amit Barve <ambarve@microsoft.com>
    ambarve authored May 30, 2023
    Copy the full SHA
    e322ac5 View commit details
  4. [gcs.test] update scratch space cleanup order (#1794)

    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 30, 2023
    Copy the full SHA
    9fd0e72 View commit details
  5. [func.test]update lcow layer processing (#1795)

    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored May 30, 2023
    Copy the full SHA
    566a34d View commit details

Commits on May 31, 2023

  1. tests: fix uvm resources update tests (#1796)

    inject fragment logic has been added and the uvm resource
    update tests are failing for a completely different reason.
    Update the tests to check for specific "invalid resource"
    message.
    
    Signed-off-by: Maksim An <maksiman@microsoft.com>
    anmaxvl authored May 31, 2023
    Copy the full SHA
    4f8d26f View commit details

Commits on Jun 2, 2023

  1. tests: add rego e2e tests for dump_stacks and get_properties (#1793)

    Signed-off-by: Maksim An <maksiman@microsoft.com>
    anmaxvl authored Jun 2, 2023
    Copy the full SHA
    8a094ae View commit details
  2. Minor fixes to SCSI mount operation (#1798)

    During a recent refactor SCSI mount operation code removed a retry logic that is needed when examining the
    filesystem type on a SCSI device. Retry is needed because sometimes attempting to open a SCSI devices
    immediately after attaching it results in ENXIO/ENOENT errors. This adds the retry logic back.
    
    Names of some images used in the tests had changed, this commit updates those names too.
    
    Signed-off-by: Amit Barve <ambarve@microsoft.com>
    ambarve authored Jun 2, 2023
    Copy the full SHA
    8d4a20c View commit details
  3. [ci] Enable caching for proto and integration jobs (#1755)

    Caching is enabled by default in `actions/setup-go@v4`
    (https://githut b.com/actions/setup-go#caching-dependency-files-and-build-outputs)
    so update the `go.sum` path when checking out hcsshim to a non-default
    path.
    
    Additionally, disable for linting, since that often causes errors.
    Without caching, wont need to explicitly delete the module cache.
    
    Relies on: #1752
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored Jun 2, 2023
    Copy the full SHA
    25b6855 View commit details

Commits on Jun 3, 2023

  1. fix integration test failure (#1799)

    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored Jun 3, 2023
    Copy the full SHA
    f5c5797 View commit details

Commits on Jun 5, 2023

  1. Bump github.com/sirupsen/logrus from 1.9.2 to 1.9.3 (#1800)

    * Bump github.com/sirupsen/logrus from 1.9.2 to 1.9.3
    
    Bumps [github.com/sirupsen/logrus](https://github.com/sirupsen/logrus) from 1.9.2 to 1.9.3.
    - [Release notes](https://github.com/sirupsen/logrus/releases)
    - [Changelog](https://github.com/sirupsen/logrus/blob/master/CHANGELOG.md)
    - [Commits](sirupsen/logrus@v1.9.2...v1.9.3)
    
    ---
    updated-dependencies:
    - dependency-name: github.com/sirupsen/logrus
      dependency-type: direct:production
      update-type: version-update:semver-patch
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    * tidy test
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    
    ---------
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    dependabot[bot] and helsaawy authored Jun 5, 2023
    Copy the full SHA
    7193878 View commit details
  2. Version control and vendor mockgen (#1802)

    Explicitly track `github.com/golang/mock/mockgen` as a go dependency.
    (There is no change in our go.mod or go.sum, since the package is
    already being used by the generated code and elsewhere).
    
    Add `//go:generate` directives to create the mocked files and ensure the
    results are always up to date.
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored Jun 5, 2023
    Copy the full SHA
    61e0112 View commit details

Commits on Jun 6, 2023

  1. Revert image name change in the ArgsEscaped test (#1804)

    In a previous commit, the image used in the ArgsEscaped test was changed incorrectly. This fixes that.
    
    Signed-off-by: Amit Barve <ambarve@microsoft.com>
    ambarve authored Jun 6, 2023
    Copy the full SHA
    b8cf9e7 View commit details

Commits on Jun 8, 2023

  1. Add support for NetworkConfigProxy v0 and v1 api

    * Add tests for NetworkConfigProxy v0 support
    
    Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
    katiewasnothere committed Jun 8, 2023
    Copy the full SHA
    cbb43e5 View commit details

Commits on Jun 9, 2023

  1. Add file wide deprecated option to ncproxygrpc v0 api

    Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
    katiewasnothere committed Jun 9, 2023
    Copy the full SHA
    37cd9df View commit details
  2. Merge pull request #1797 from katiewasnothere/kabaldau/ncproxy_v1_api

    Add support for NetworkConfigProxy v0 and v1 api
    katiewasnothere authored Jun 9, 2023
    Copy the full SHA
    cc9303b View commit details
  3. Create a v0 nodenetsvc api and plumb through ncproxy code

    Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
    katiewasnothere committed Jun 9, 2023
    Copy the full SHA
    10c29fc View commit details

Commits on Jun 10, 2023

  1. When fetch pid counts the contianer can be in an invalid state sometimes

    Signed-off-by: James Sturtevant <jstur@microsoft.com>
    jsturtevant committed Jun 10, 2023
    Copy the full SHA
    2095093 View commit details

Commits on Jun 12, 2023

  1. Merge pull request #1806 from katiewasnothere/kabaldau/ncproxy_nodene…

    …tsvc
    
    Support v0 and v1 nodenetsvc api for ncproxy
    katiewasnothere authored Jun 12, 2023
    Copy the full SHA
    4daa334 View commit details
  2. Add deprecated option to all types and fields for ncproxy v0 apis

    Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
    katiewasnothere committed Jun 12, 2023
    Copy the full SHA
    10a4309 View commit details
  3. Add new entries in golangci.yml to prevent linter errors from depreca…

    …ted ncproxy api use
    
    Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
    katiewasnothere committed Jun 12, 2023
    Copy the full SHA
    46d8160 View commit details
  4. Merge pull request #1809 from katiewasnothere/kabaldau/ncproxy_v0_dep…

    …recated_tag
    
    Add deprecated option to all types and fields for ncproxy v0 apis
    katiewasnothere authored Jun 12, 2023
    Copy the full SHA
    c197eb5 View commit details

Commits on Jun 15, 2023

  1. Merge pull request #1807 from jsturtevant/fix-pids-query

    When fetching the pid counts for the container the state can be invalid sometimes
    katiewasnothere authored Jun 15, 2023
    Copy the full SHA
    d8cf194 View commit details

Commits on Jun 19, 2023

  1. skip failing test, use gotestsum (#1820)

    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    helsaawy authored Jun 19, 2023
    Copy the full SHA
    4ede1fd View commit details
  2. Bump golang.org/x/sys from 0.8.0 to 0.9.0 (#1818)

    * Bump golang.org/x/sys from 0.8.0 to 0.9.0
    
    Bumps [golang.org/x/sys](https://github.com/golang/sys) from 0.8.0 to 0.9.0.
    - [Commits](golang/sys@v0.8.0...v0.9.0)
    
    ---
    updated-dependencies:
    - dependency-name: golang.org/x/sys
      dependency-type: direct:production
      update-type: version-update:semver-minor
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    * tidy test
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    
    ---------
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    dependabot[bot] and helsaawy authored Jun 19, 2023
    Copy the full SHA
    74521d4 View commit details
  3. Bump golang.org/x/sync from 0.2.0 to 0.3.0 (#1817)

    * Bump golang.org/x/sync from 0.2.0 to 0.3.0
    
    Bumps [golang.org/x/sync](https://github.com/golang/sync) from 0.2.0 to 0.3.0.
    - [Commits](golang/sync@v0.2.0...v0.3.0)
    
    ---
    updated-dependencies:
    - dependency-name: golang.org/x/sync
      dependency-type: direct:production
      update-type: version-update:semver-minor
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    * tidy test
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    
    ---------
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    dependabot[bot] and helsaawy authored Jun 19, 2023
    Copy the full SHA
    73986ca View commit details
  4. Bump github.com/lestrrat-go/jwx from 1.2.25 to 1.2.26 (#1812)

    * Bump github.com/lestrrat-go/jwx from 1.2.25 to 1.2.26
    
    Bumps [github.com/lestrrat-go/jwx](https://github.com/lestrrat-go/jwx) from 1.2.25 to 1.2.26.
    - [Release notes](https://github.com/lestrrat-go/jwx/releases)
    - [Changelog](https://github.com/lestrrat-go/jwx/blob/v1.2.26/Changes)
    - [Commits](lestrrat-go/jwx@v1.2.25...v1.2.26)
    
    ---
    updated-dependencies:
    - dependency-name: github.com/lestrrat-go/jwx
      dependency-type: direct:production
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    * tidy test
    
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    
    ---------
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
    dependabot[bot] and helsaawy authored Jun 19, 2023
    Copy the full SHA
    6eea50b View commit details
Showing 1,655 changed files with 137,158 additions and 107,791 deletions.
22 changes: 18 additions & 4 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
# there may be other dependencies manually ignored.
# search `"@dependabot ignore" in:comments` in the repo to see them.
#
# reference:
# https://docs.github.com/en/code-security/dependabot/dependabot-version-updates/configuration-options-for-the-dependabot.yml-file

version: 2
@@ -7,22 +11,32 @@ updates:
schedule:
interval: "weekly"
day: "sunday"
# ignore patch version increment updates (will not affect security updates)
ignore:
- dependency-name: "*"
update-types: ["version-update:semver-patch"]
# only do patch updates for containerd and co: don't bump anything else
- dependency-name: "github.com/containerd/*"
update-types: ["version-update:semver-major", "version-update:semver-minor"]
# allow more PRs to clear queue faster
open-pull-requests-limit: 10

- package-ecosystem: "gomod"
directory: "/test"
schedule:
interval: "weekly"
day: "sunday"
# ignore patch version increment updates (will not affect security updates)
labels:
- dependencies
- go
- tests
ignore:
# keep containerd and related dependencies in sync with the shim/the root repo
- dependency-name: "github.com/containerd/*"
# ignore patch version increment updates in test; they shouldn't be critical
- dependency-name: "*"
update-types: ["version-update:semver-patch"]
open-pull-requests-limit: 5

- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "daily"
open-pull-requests-limit: 5
Loading