{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":51440731,"defaultBranch":"master","name":"docker","ownerLogin":"AkihiroSuda","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2016-02-10T12:50:20.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/9248427?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1714477656.0","currentOid":""},"activityList":{"items":[{"before":"9db3f21700e57ee18d7ec2c75d59dec0e65114b8","after":"ce1c094dac83ca969bb528d146b5df7fd68f2d0a","ref":"refs/heads/fix-47499","pushedAt":"2024-05-09T12:12:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"seccomp: allow specifying a custom profile with `--privileged`\n\n`--privileged --security-opt seccomp=` was ignoring\n``.\n\nFix issue 47499\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"seccomp: allow specifying a custom profile with --privileged"}},{"before":"135cc876410f7c06f2433859bc53f6dfd8cd8014","after":"9db3f21700e57ee18d7ec2c75d59dec0e65114b8","ref":"refs/heads/fix-47499","pushedAt":"2024-05-09T10:34:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"seccomp: allow specifying a custom profile with `--privileged`\n\n`--privileged --security-opt seccomp=` was ignoring\n``.\n\nFix issue 47499\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"seccomp: allow specifying a custom profile with --privileged"}},{"before":"c46ec5087091d3c9ebe33f79f2798a50efdb475d","after":"135cc876410f7c06f2433859bc53f6dfd8cd8014","ref":"refs/heads/fix-47499","pushedAt":"2024-05-09T10:11:16.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"seccomp: allow specifying a custom profile with `--privileged`\n\n`--privileged --security-opt seccomp=` was ignoring\n``.\n\nFix issue 47499\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"seccomp: allow specifying a custom profile with --privileged"}},{"before":"33c79526a5f0168b0b232115da3a7376e765fff2","after":"c46ec5087091d3c9ebe33f79f2798a50efdb475d","ref":"refs/heads/fix-47499","pushedAt":"2024-05-09T06:12:31.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"seccomp: allow specifying a custom profile with `--privileged`\n\n`--privileged --security-opt seccomp=` was ignoring\n``.\n\nFix issue 47499\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"seccomp: allow specifying a custom profile with --privileged"}},{"before":null,"after":"18e21f82a92e31e5cbddfa45ab74e14218a5dc0f","ref":"refs/heads/cherrypick-createmountpoint-23","pushedAt":"2024-04-30T11:47:36.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"mounts/validate: Don't check source exists with CreateMountpoint\n\nDon't error out when mount source doesn't exist and mounts has\n`CreateMountpoint` option enabled.\n\nSigned-off-by: Paweł Gronowski \n(cherry picked from commit 05b883bdc836a2fd621452f58a2a2c02d253718c)\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"mounts/validate: Don't check source exists with CreateMountpoint"}},{"before":null,"after":"02aa896934eefffb3f3567990b08cc63042a127a","ref":"refs/heads/cherrypick-createmountpoint-24","pushedAt":"2024-04-30T11:45:57.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"mounts/validate: Don't check source exists with CreateMountpoint\n\nDon't error out when mount source doesn't exist and mounts has\n`CreateMountpoint` option enabled.\n\nSigned-off-by: Paweł Gronowski \n(cherry picked from commit 05b883bdc836a2fd621452f58a2a2c02d253718c)\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"mounts/validate: Don't check source exists with CreateMountpoint"}},{"before":"fc7e9843af1245011ecada02ad09a25acdfb970b","after":"33c79526a5f0168b0b232115da3a7376e765fff2","ref":"refs/heads/fix-47499","pushedAt":"2024-04-25T00:30:31.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"seccomp: allow specifying a custom profile with `--privileged`\n\n`--privileged --security-opt seccomp=` was ignoring\n``.\n\nFix issue 47499\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"seccomp: allow specifying a custom profile with --privileged"}},{"before":"46119ea631fe737fe9b72a383aaa692d7fc42403","after":"fc7e9843af1245011ecada02ad09a25acdfb970b","ref":"refs/heads/fix-47499","pushedAt":"2024-04-24T14:04:21.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"seccomp: allow specifying a custom profile with `--privileged`\n\n`--privileged --security-opt seccomp=` was ignoring\n``.\n\nFix issue 47499\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"seccomp: allow specifying a custom profile with --privileged"}},{"before":"a2cd6ba82eb81a2f778739370fed3445fdefcbf6","after":"d742659877d9bf0bfe64b97e529bc28667974607","ref":"refs/heads/fix-47436","pushedAt":"2024-03-16T13:03:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"rootless: fix `open /etc/docker/plugins: permission denied`\n\nFix issue 47436\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"rootless: fix open /etc/docker/plugins: permission denied"}},{"before":"ca978c2f1027fa84608b9106c2ddd81499f9c293","after":"762ec4b60ce1b337e64bc103d0166ed9b6bf1e99","ref":"refs/heads/fix-47248","pushedAt":"2024-03-15T14:03:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"plugin: fix mounting /etc/hosts when running in UserNS\n\nFix `error mounting \"/etc/hosts\" to rootfs at \"/etc/hosts\": mount\n/etc/hosts:/etc/hosts (via /proc/self/fd/6), flags: 0x5021: operation\nnot permitted`.\n\nThis error was introduced in 7d08d84b039d2f4661a2242e765a141e65943920\n(`dockerd-rootless.sh: set rootlesskit --state-dir=DIR`) that changed\nthe filesystem of the state dir from /tmp to /run (in a typical setup).\n\nFix issue 47248\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"plugin: fix mounting /etc/hosts when running in UserNS"}},{"before":"d87820e8b1f6b0c837768cc2257a0a545c101dfa","after":"ca978c2f1027fa84608b9106c2ddd81499f9c293","ref":"refs/heads/fix-47248","pushedAt":"2024-03-15T10:59:22.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"plugin: fix mounting /etc/hosts when running in UserNS\n\nFix `error mounting \"/etc/hosts\" to rootfs at \"/etc/hosts\": mount\n/etc/hosts:/etc/hosts (via /proc/self/fd/6), flags: 0x5021: operation\nnot permitted`.\n\nThis error was introduced in 7d08d84b039d2f4661a2242e765a141e65943920\n(`dockerd-rootless.sh: set rootlesskit --state-dir=DIR`) that changed\nthe filesystem of the state dir from /tmp to /run (in a typical setup).\n\nFix issue 47248\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"plugin: fix mounting /etc/hosts when running in UserNS"}},{"before":"50776a804daebd88214846f80f1983045ec57aa9","after":"a2cd6ba82eb81a2f778739370fed3445fdefcbf6","ref":"refs/heads/fix-47436","pushedAt":"2024-03-15T07:05:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"rootless: fix `open /etc/docker/plugins: permission denied`\n\nFix issue 47436\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"rootless: fix open /etc/docker/plugins: permission denied"}},{"before":null,"after":"50776a804daebd88214846f80f1983045ec57aa9","ref":"refs/heads/fix-47436","pushedAt":"2024-03-14T05:35:25.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"rootless: fix `open /etc/docker/plugins: permission denied`\n\nFix issue 47436\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"rootless: fix open /etc/docker/plugins: permission denied"}},{"before":"a6061684a5c9e6ade8f8d95e5bdb1b66204f3020","after":"342923b01c387abc82329a0be31412dbd5734d90","ref":"refs/heads/master","pushedAt":"2024-03-14T05:29:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"Merge pull request #47555 from rumpl/feat-c8d-prom\n\nc8d: Prometheus metrics","shortMessageHtmlLink":"Merge pull request moby#47555 from rumpl/feat-c8d-prom"}},{"before":"a6061684a5c9e6ade8f8d95e5bdb1b66204f3020","after":"d87820e8b1f6b0c837768cc2257a0a545c101dfa","ref":"refs/heads/fix-47248","pushedAt":"2024-03-14T05:13:22.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"plugin: fix mounting /etc/hosts when running in UserNS\n\nFix `error mounting \"/etc/hosts\" to rootfs at \"/etc/hosts\": mount\n/etc/hosts:/etc/hosts (via /proc/self/fd/6), flags: 0x5021: operation\nnot permitted`.\n\nThis error was introduced in 7d08d84b039d2f4661a2242e765a141e65943920\n(`dockerd-rootless.sh: set rootlesskit --state-dir=DIR`) that changed\nthe filesystem of the state dir from /tmp to /run (in a typical setup).\n\nFix issue 47248\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"plugin: fix mounting /etc/hosts when running in UserNS"}},{"before":null,"after":"a6061684a5c9e6ade8f8d95e5bdb1b66204f3020","ref":"refs/heads/fix-47248","pushedAt":"2024-03-14T04:52:45.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"plugin: fix mounting /etc/hosts when running in UserNS\n\nFix `error mounting \"/etc/hosts\" to rootfs at \"/etc/hosts\": mount\n/etc/hosts:/etc/hosts (via /proc/self/fd/6), flags: 0x5021: operation\nnot permitted`.\n\nThis error was introduced in 7d08d84b039d2f4661a2242e765a141e65943920\n(`dockerd-rootless.sh: set rootlesskit --state-dir=DIR`) that changed\nthe filesystem of the state dir from /tmp to /run (in a typical setup).\n\nFix issue 47248\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"plugin: fix mounting /etc/hosts when running in UserNS"}},{"before":"b54af02b51b0dfe2e2863e8f1647aaa27936c274","after":"a6061684a5c9e6ade8f8d95e5bdb1b66204f3020","ref":"refs/heads/master","pushedAt":"2024-03-14T04:52:15.000Z","pushType":"push","commitsCount":3369,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"plugin: fix mounting /etc/hosts when running in UserNS\n\nFix `error mounting \"/etc/hosts\" to rootfs at \"/etc/hosts\": mount\n/etc/hosts:/etc/hosts (via /proc/self/fd/6), flags: 0x5021: operation\nnot permitted`.\n\nThis error was introduced in 7d08d84b039d2f4661a2242e765a141e65943920\n(`dockerd-rootless.sh: set rootlesskit --state-dir=DIR`) that changed\nthe filesystem of the state dir from /tmp to /run (in a typical setup).\n\nFix issue 47248\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"plugin: fix mounting /etc/hosts when running in UserNS"}},{"before":null,"after":"b32cfc3b3a9d791ed3924ab168f27962dceec949","ref":"refs/heads/rootlesskit-2.0.2","pushedAt":"2024-03-05T22:44:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"dockerd-rootless-setuptool.sh: check RootlessKit functionality\n\nRootlessKit will print hints if something is still unsatisfied.\n\ne.g., `kernel.apparmor_restrict_unprivileged_userns` constraint\nrootless-containers/rootlesskit@33c3e7ca6c3f76e74e8acd5b53668dcd3d8e58e0\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"dockerd-rootless-setuptool.sh: check RootlessKit functionality"}},{"before":"64eb5945489ff5d8ca91f3b0670b0bdf4b05eeb9","after":"46119ea631fe737fe9b72a383aaa692d7fc42403","ref":"refs/heads/fix-47499","pushedAt":"2024-03-05T15:47:09.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"seccomp: allow specifying a custom profile with `--privileged`\n\n`--privileged --security-opt seccomp=` was ignoring\n``.\n\nFix issue 47499\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"seccomp: allow specifying a custom profile with --privileged"}},{"before":"c34b37c554287009cbbfa09eb96069434c09f25c","after":"64eb5945489ff5d8ca91f3b0670b0bdf4b05eeb9","ref":"refs/heads/fix-47499","pushedAt":"2024-03-05T15:32:13.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"seccomp: allow specifying a custom profile with `--privileged`\n\n`--privileged --security-opt seccomp=` was ignoring\n``.\n\nFix issue 47499\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"seccomp: allow specifying a custom profile with --privileged"}},{"before":null,"after":"c34b37c554287009cbbfa09eb96069434c09f25c","ref":"refs/heads/fix-47499","pushedAt":"2024-03-05T15:06:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"seccomp: allow specifying a custom profile with `--privileged`\n\n`--privileged --security-opt seccomp=` was ignoring\n``.\n\nFix issue 47499\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"seccomp: allow specifying a custom profile with --privileged"}},{"before":null,"after":"7f1b700227f2808b39ee40826d916e6b79b0f762","ref":"refs/heads/rootlesskit-2.0.1","pushedAt":"2024-02-06T02:52:44.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"Dockerfile: update RootlessKit to v2.0.1\n\nhttps://github.com/rootless-containers/rootlesskit/releases/tag/v2.0.1\n\nFix issue 47327 (`rootless lxc-user-nic: /etc/resolv.conf missing ip`)\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"Dockerfile: update RootlessKit to v2.0.1"}},{"before":"625ffe396f002a36d768521cdfeec65d8dd5e8de","after":"91103152a3991ec462f885f6073b21c9d9c8ea69","ref":"refs/heads/detach-netns","pushedAt":"2024-01-18T13:31:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"rootless: support detach-netns mode\n\nNow `dockerd-rootless.sh` launches RootlessKit with `--detach-netns`\nso as to run the daemon in the host network namespace.\n\nThe libnetwork namespaces are allocated inside the \"detached\" netns\n(`$ROOTLESSKIT_STATE_DIR/netns`) that is associated with slirp4netns,\nvpnkit, pasta, etc., as the rootless daemon has no `CAP_NET_ADMIN` for\nthe host network namespace.\n\nThis will enable:\n- Accelerated (and deflaked) `docker pull`, `docker push`, `docker build`, etc\n- Proper support for `docker pull 127.0.0.1:.../...`\n- Proper support for `dockern run --net=host`\n\nSee also:\n- rootless-containers/rootlesskit PR 379\n- containerd/nerdctl PR 2723\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"rootless: support detach-netns mode"}},{"before":"315c041029327cfb9ed9eef157dd1e508b7208e6","after":"625ffe396f002a36d768521cdfeec65d8dd5e8de","ref":"refs/heads/detach-netns","pushedAt":"2024-01-18T12:56:39.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"rootless: support detach-netns mode\n\nNow `dockerd-rootless.sh` launches RootlessKit with `--detach-netns`\nso as to run the daemon in the host network namespace.\n\nThe libnetwork namespaces are allocated inside the \"detached\" netns\n(`$ROOTLESSKIT_STATE_DIR/netns`) that is associated with slirp4netns,\nvpnkit, pasta, etc., as the rootless daemon has no `CAP_NET_ADMIN` for\nthe host network namespace.\n\nThis will enable:\n- Accelerated (and deflaked) `docker pull`, `docker push`, `docker build`, etc\n- Proper support for `docker pull 127.0.0.1:.../...`\n- Proper support for `dockern run --net=host`\n\nSee also:\n- rootless-containers/rootlesskit PR 379\n- containerd/nerdctl PR 2723\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"rootless: support detach-netns mode"}},{"before":null,"after":"315c041029327cfb9ed9eef157dd1e508b7208e6","ref":"refs/heads/detach-netns","pushedAt":"2024-01-18T09:58:25.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"rootless: support detach-netns mode\n\nNow `dockerd-rootless.sh` launches RootlessKit with `--detach-netns`\nso as to run the daemon in the host network namespace.\n\nThe libnetwork namespaces are allocated inside the \"detached\" netns\n(`$ROOTLESSKIT_STATE_DIR/netns`) that is associated with slirp4netns,\nvpnkit, pasta, etc., as the rootless daemon has no `CAP_NET_ADMIN` for\nthe host network namespace.\n\nThis will enable:\n- Accelerated (and deflaked) `docker pull`, `docker push`, `docker build`, etc\n- Proper support for `docker pull 127.0.0.1:.../...`\n- Proper support for `dockern run --net=host`\n\nSee also:\n- rootless-containers/rootlesskit PR 379\n- containerd/nerdctl PR 2723\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"rootless: support detach-netns mode"}},{"before":"9a5c783c1a401ebd51135aaf6a58969574ca89be","after":"ed15f1d7179caa7b82b15bbeb55adb19546245d2","ref":"refs/heads/refactor-47100","pushedAt":"2024-01-18T09:10:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"net=host: remove /var/run/docker/netns/default from OCI config\n\nPrior to this commit, a container running with `--net=host` had\n`{\"type\":\"network\",\"path\":\"/var/run/docker/netns/default\"}` in\nthe ``.linux.namespaces` field of the OCI Runtime Config,\nbut this wasn't needed.\n\nClose issue 47100\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"net=host: remove /var/run/docker/netns/default from OCI config"}},{"before":null,"after":"9a5c783c1a401ebd51135aaf6a58969574ca89be","ref":"refs/heads/refactor-47100","pushedAt":"2024-01-18T09:07:27.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"net=host: remove /var/run/docker/netns/default from OCI config\n\nPrior to this commit, a container running with ``--net=host` had\n`{\"type\":\"network\",\"path\":\"/var/run/docker/netns/default\"}` in\nthe ``.linux.namespaces` field of the OCI Runtime Config,\nbut this wasn't needed.\n\nClose issue 47100\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"net=host: remove /var/run/docker/netns/default from OCI config"}},{"before":"4bf86fbf667d7df4ae0155df825f24dd6b534816","after":"84d2229ffeeb9ebaed5476c672dbf0431fdef1ce","ref":"refs/heads/dockerd-rootless-setuptool-nsenter","pushedAt":"2024-01-17T13:59:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"dockerd-rootless-setuptool.sh: add `nsenter` subcommand\n\nUsage: `dockerd-rootless-setuptool.sh nsenter -- ip a`\n\nExpected to be used for debugging.\n\nPorted from nerdctl's `containerd-rootless-setuptool.sh`\nhttps://github.com/containerd/nerdctl/blob/v1.7.2/extras/rootless/containerd-rootless-setuptool.sh#L142-L147\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"dockerd-rootless-setuptool.sh: add nsenter subcommand"}},{"before":"054ad0ac78a0645db2be602dd900733d67cc9e23","after":"4bf86fbf667d7df4ae0155df825f24dd6b534816","ref":"refs/heads/dockerd-rootless-setuptool-nsenter","pushedAt":"2024-01-17T13:47:00.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"dockerd-rootless-setuptool.sh: add `nsenter` subcommand\n\nUsage: `dockerd-rootless-setuptool.sh nsenter -- ip a`\n\nExpected to be used for debugging.\n\nPorted from nerdctl's `containerd-rootless-setuptool.sh`\nhttps://github.com/containerd/nerdctl/blob/v1.7.2/extras/rootless/containerd-rootless-setuptool.sh#L142-L147\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"dockerd-rootless-setuptool.sh: add nsenter subcommand"}},{"before":"327373191224456771e1afbd7bbfbaade29b6cc7","after":"054ad0ac78a0645db2be602dd900733d67cc9e23","ref":"refs/heads/dockerd-rootless-setuptool-nsenter","pushedAt":"2024-01-17T03:19:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"AkihiroSuda","name":"Akihiro Suda","path":"/AkihiroSuda","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9248427?s=80&v=4"},"commit":{"message":"dockerd-rootless-setuptool.sh: add `nsenter` subcommand\n\nUsage: `dockerd-rootless-setuptool.sh nsenter -- ip a`\n\nExpected to be used for debugging.\n\nPorted from nerdctl's `containerd-rootless-setuptool.sh`\nhttps://github.com/containerd/nerdctl/blob/v1.7.2/extras/rootless/containerd-rootless-setuptool.sh#L142-L147\n\nSigned-off-by: Akihiro Suda ","shortMessageHtmlLink":"dockerd-rootless-setuptool.sh: add nsenter subcommand"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAERZRZrgA","startCursor":null,"endCursor":null}},"title":"Activity · AkihiroSuda/docker"}