![]() Bumping containerd to version v1.7.1-4-g835383b17, which comprises the following commits: 6a5e54c15 Get CDI devices from CRI Config.CDIDevices field 9e60300ea snapshots/testsuite: Rename: fix fuse-overlayfs incompatibility 7b288e2d7 Update ttrpc to v1.2.2 27a0d957b Prepare release notes for v1.7.1 0e0532eb2 bump typeurl to v2.1.1 35e86f96c [transfer] avoid setting limiters when max is 0 f7233811f Update transfer configuration 4510eac00 Fix image pulling with Transfer service aaa65e8c1 Update hcsshim tag to v0.10.0-rc.8 95ef67e19 Fix umarshal metrics for CRI server 3ef5b689a runtime/shim: fix the nil checkpoint options 021bba28b update go to go1.20.4, go1.19.9 6b3ae0129 Remove entry for container from container store on error c0e128624 skip TestContainerStartWithAbsRuntimePath if the runtime is v1 aa3c63c15 integration: add container start test using abs runtime path d2d9eedb1 WithRuntimePath uses the TaskInfo.RuntimePath field fae4b6223 update runc binary to v1.1.7 571715a9d cri: Vendor v0.27.1 a6d336c1f Fix argsEscaped tests 1bbf98e53 oci: partially restore comment on read-only mounts for uid/gid uses 8f6e86fec go.mod: add comment explaining go-fuzz-headers replace rule 1ece0cb50 go.mod: remove replace for github.com/opencontainers/runtime-tools e9f962187 go.mod: integration: use non-pre-release of containerd 84393b005 go.mod: integration: move indirect dependencies to the right group dec2595af update runc binary to v1.1.6 7de8629be cri: Throw an error if idmap mounts is requested 75ac7e0d8 cri: Vendor v0.27.0-beta.0 for mounts uid/gid mappings 54d12b872 oci: Use WithReadonlyTempMount when adding users/groups 624327651 update go to go1.20.3, go1.19.8 1d6641b7c export: add test for WithSkipDockerManifest 0e0d84f6b archive: consistently respect value of WithSkipDockerManifest 9b4935d86 Update sbserver to add noexec nodev and nosuid to /etc/resolv.conf mount bind. 5e953cfa6 Test to ensure nosuid,nodev,noexec are set on /etc/reolv.conf mount. 0aad93f08 Add noexec nodev and nosuid to sandbox /etc/resolv.conf mount bind. 1a64f1b43 ctr/tasks: fix unmarshal the task metrics for cgroups v1 17c52a26d Keep linux mounts for linux sandboxes on Windows/Darwin d81fc15af update runc binary to v1.1.5 755efbe64 go.mod: github.com/opencontainers/runc v1.1.5 Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> |
||
---|---|---|
classes | ||
conf | ||
docs | ||
dynamic-layers | ||
files | ||
lib/oeqa/runtime/cases | ||
recipes-containers | ||
recipes-core | ||
recipes-demo | ||
recipes-devtools | ||
recipes-extended | ||
recipes-graphics/xorg-xserver | ||
recipes-kernel | ||
recipes-networking | ||
scripts/lib/wic/plugins/source | ||
wic | ||
.gitignore | ||
COPYING.MIT | ||
MAINTAINERS | ||
meta-virt-roadmap.txt | ||
README |
meta-virtualization
This layer provides support for building Xen, KVM, Libvirt, and associated packages necessary for constructing OE-based virtualized solutions.
The bbappend files for some recipes (e.g. linux-yocto) in this layer need to have 'virtualization' in DISTRO_FEATURES to have effect. To enable them, add in configuration file the following line.
DISTRO_FEATURES:append = " virtualization"
If meta-virtualization is included, but virtualization is not enabled as a distro feature a warning is printed at parse time:
You have included the meta-virtualization layer, but
'virtualization' has not been enabled in your DISTRO_FEATURES. Some bbappend files
may not take effect. See the meta-virtualization README for details on enabling
virtualization support.
If you know what you are doing, this warning can be disabled by setting the following variable in your configuration:
SKIP_META_VIRT_SANITY_CHECK = 1
Depending on your use case, there are other distro features in meta-virtualization that may also be enabled:
- xen: enables xen functionality in various packages (kernel, libvirt, etc)
- kvm: enables KVM configurations in the kernel and autoloads modules
- k8s: enables kubernets configurations in the kernel, tools and configuration
- aufs: enables aufs support in docker and linux-yocto
- x11: enable xen and libvirt functionality related to x11
- selinux: enables functionality in libvirt and lxc
- systemd: enable systemd services and unit files (for recipes for support)
- sysvinit: enable sysvinit scripts (for recipes with support)
- seccomp: enable seccomp support for packages that have the capability.
Dependencies
This layer depends on:
URI: git://github.com/openembedded/openembedded-core.git branch: master revision: HEAD prio: default
URI: git://github.com/openembedded/meta-openembedded.git branch: master revision: HEAD layers: meta-oe meta-networking meta-filesystems meta-python
BBFILE_PRIORITY_openembedded-layer = "4"
Required for Xen XSM policy: URI: git://git.yoctoproject.org/meta-selinux branch: master revision: HEAD prio: default
Required for Ceph: URI: git://git.yoctoproject.org/meta-cloud-services branch: master revision: HEAD prio: default
Required for cri-o: URI: git://git.yoctoproject.org/meta-selinux branch: master revision: HEAD prio: default
Community / Colaboration
Repository: https://git.yoctoproject.org/cgit/cgit.cgi/meta-virtualization/ Mailing list: https://lists.yoctoproject.org/g/meta-virtualization IRC: libera.chat #meta-virt channel
Maintenance
Send pull requests, patches, comments or questions to meta-virtualization@lists.yoctoproject.org
Maintainer: Bruce Ashfield bruce.ashfield@gmail.com see MAINTAINERS for more specific information
When sending single patches, please using something like: $ git send-email -1 -M --to meta-virtualization@lists.yoctoproject.org --subject-prefix='meta-virtualization][PATCH'
License
All metadata is MIT licensed unless otherwise stated. Source code included in tree for individual recipes is under the LICENSE stated in each recipe (.bb file) unless otherwise stated.