-
Notifications
You must be signed in to change notification settings - Fork 55
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: seccomp/libseccomp-golang
base: f33da4d
Could not load branches
Nothing to show
Could not load tags
Nothing to show
{{ refName }}
default
...
head repository: seccomp/libseccomp-golang
compare: v0.10.0
Could not load branches
Nothing to show
Could not load tags
Nothing to show
{{ refName }}
default
- 10 commits
- 8 files changed
- 2 contributors
Commits on May 2, 2022
-
github: bump the versions in the GH actions
According to the Go release policy[1], only the two most recent releases are supported: Each major Go release is supported until there are two newer major releases. For example, Go 1.5 was supported until the Go 1.7 release, and Go 1.6 was supported until the Go 1.8 release. We fix critical problems, including critical security problems, in supported releases as needed by issuing minor revisions (for example, Go 1.6.1, Go 1.6.2, and so on). ... and with Go v1.18 being the most recent major release, trim the Go versions to the two supported 1.18.x and 1.17.x, leaving 1.16.x as it remains part of the GH Ubuntu 20.04 environment even though it is officially unsupported. Go 1.15.x is dropped from the test matrix. We also update the core libseccomp library to the latest v2.5.x release, which is v2.5.4 as of April 21, 2022. The previous libseccomp versions are left untouched in the test matrix, even though they are no longer supported upstream. [1] https://go.dev/doc/devel/release#policy Acked-by: Tom Hromatka <[email protected]> Acked-by: Kir Kolyshkin <[email protected]> Signed-off-by: Paul Moore <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f57e1d5 - Browse repository at this point
Copy the full SHA f57e1d5View commit details
Commits on May 9, 2022
-
As per #87 Signed-off-by: Kir Kolyshkin <[email protected]> Signed-off-by: Paul Moore <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cfd293d - Browse repository at this point
Copy the full SHA cfd293dView commit details
Commits on May 10, 2022
-
github: bump versions of various actions
Bumps: * Update actions/checkout, actions/setup-go, golangci/golangci-lint-action from v2 to v3. * Bump golangci-lint to v1.45. Cleanups: * Remove "stable" parameter for setup-go (not needed since v3, see [1]). * Remove the obsoleted comment for golangci-lint (no longer true, see [2]). [1] https://github.com/actions/setup-go/releases/tag/v3.0.0 [2] golangci/golangci-lint-action#167 Signed-off-by: Kir Kolyshkin <[email protected]> Acked-by: Paul Moore <[email protected]> Signed-off-by: Tom Hromatka <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3159268 - Browse repository at this point
Copy the full SHA 3159268View commit details
Commits on May 13, 2022
-
doc: remove reference to the defunct mailing list
The mailing list has been deprecated and made read-only, remove references from the README.md file. Acked-by: Tom Hromatka <[email protected]> Signed-off-by: Paul Moore <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c767664 - Browse repository at this point
Copy the full SHA c767664View commit details -
docs: update RELEASE_PROCESS.md and README.md
Update our release process and README documentation based on our current plans. These docs can (and should!) be updated as needed to reflect changes in our processes. Acked-by: Tom Hromatka <[email protected]> Signed-off-by: Paul Moore <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 28514d8 - Browse repository at this point
Copy the full SHA 28514d8View commit details -
docs: update README.md with the first signed release version
Signed-off-by: Paul Moore <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for aa8bb55 - Browse repository at this point
Copy the full SHA aa8bb55View commit details
Commits on Jun 8, 2022
-
NewFilter,filter.Merge: wrap the original error
Whenever we do not return the error code from a libseccomp call directly, embed it into our error (via %w), so that a user can still check for it using something like errors.Is(err, syscall.EINVAL). Acked-by: Tom Hromatka <[email protected]> Signed-off-by: Kir Kolyshkin <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 413543e - Browse repository at this point
Copy the full SHA 413543eView commit details -
In case seccomp_api_set() failed, embed its return code into the error (rather than merely adding -N text into it), so that a user can check for a particular error using e.g. errors.Is(err, syscall.EINVAL). Do not embed EOPNOTSUPP since this is not what libseccomp returns (this is returned by own code in case it is compiled with old (< 2.4.0) libseccomp headers). Acked-by: Tom Hromatka <[email protected]> Signed-off-by: Kir Kolyshkin <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 444e638 - Browse repository at this point
Copy the full SHA 444e638View commit details -
all: use errors.New instead of fmt.Errorf where appropriate
If there are no %-style directives, using errors.New is preferable. Acked-by: Tom Hromatka <[email protected]> Signed-off-by: Kir Kolyshkin <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c0b6cd8 - Browse repository at this point
Copy the full SHA c0b6cd8View commit details
Commits on Jun 9, 2022
-
Acked-by: Paul Moore <[email protected]> Acked-by: Tom Hromatka <[email protected]> Signed-off-by: Kir Kolyshkin <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 879684a - Browse repository at this point
Copy the full SHA 879684aView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff f33da4d...v0.10.0