Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump libseccomp from 0.2.3 to 0.3.0 #1240

Merged
merged 1 commit into from
Oct 3, 2022

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Oct 3, 2022

Bumps libseccomp from 0.2.3 to 0.3.0.

Release notes

Sourced from libseccomp's releases.

v0.3.0

Changelog

Added

  • impl From<ScmpSyscall> for i32
  • impl fmt::Display for ScmpSyscall
  • impl PartialEq<i32> for ScmpSyscall and impl PartialEq<ScmpSyscall> for i32
  • SeccompError::errno + SeccompErrno to query the errno returned by the libseccomp API.
  • ScmpNotifResp::new_val(), ScmpNotifResp::new_error() and ScmpNotifResp::new_continue()
  • ScmpNotifRespFlags
  • const fn ScmpSyscall::new (behind const-syscall feature)

Changed

  • Re-export notify module with private so that users can use the more convenient structure (Incompatible change).
  • add_arch/remove_arch return Ok(false) if the architecture was already present/not present in the filter and Ok(true) if the architecture was really added/removed (Incompatible change).
  • get_api returns u32 instead Result<u32> (Incompatible change).
  • ScmpArch::native() panics instead of returning an error (Incompatible change).
  • ScmpNotifData.syscall is now ScmpSyscall instead of i32 (Incompatible change).
  • Marked ScmpNotifData, ScmpNotifReq and ScmpNotifResp #[non_exhaustive] (Incompatible change).

Deprecated

  • NOTIF_FLAG_CONTINUE use ScmpNotifRespFlags::CONTINUE.bits() instead.

Removed

  • Syscall trait
  • get_native_arch()
  • enum error::ErrorKind
  • type error::Result

Fixed

  • scmp_cmp!: allow(unused_parens) in $mask
Changelog

Sourced from libseccomp's changelog.

0.3.0 - 2022-10-01

Added

  • impl From<ScmpSyscall> for i32
  • impl fmt::Display for ScmpSyscall
  • impl PartialEq<i32> for ScmpSyscall and impl PartialEq<ScmpSyscall> for i32
  • SeccompError::errno + SeccompErrno to query the errno returned by the libseccomp API.
  • ScmpNotifResp::new_val(), ScmpNotifResp::new_error() and ScmpNotifResp::new_continue()
  • ScmpNotifRespFlags
  • const fn ScmpSyscall::new (behind const-syscall feature)

Changed

  • Re-export notify module with private so that users can use the more convenient structure (Incompatible change).
  • add_arch/remove_arch return Ok(false) if the architecture was already present/not present in the filter and Ok(true) if the architecture was really added/removed (Incompatible change).
  • get_api returns u32 instead Result<u32> (Incompatible change).
  • ScmpArch::native() panics instead of returning an error (Incompatible change).
  • ScmpNotifData.syscall is now ScmpSyscall instead of i32 (Incompatible change).
  • Marked ScmpNotifData, ScmpNotifReq and ScmpNotifResp #[non_exhaustive] (Incompatible change).

Deprecated

  • NOTIF_FLAG_CONTINUE use ScmpNotifRespFlags::CONTINUE.bits() instead.

Removed

  • Syscall trait
  • get_native_arch()
  • enum error::ErrorKind
  • type error::Result

Fixed

  • scmp_cmp!: allow(unused_parens) in $mask
Commits
  • e4bcb2a Bump version to 0.3.0
  • 7ac4ea0 Fix regression from fe7bd6a/#143
  • e5d4fc8 Bump codecov/codecov-action from 1 to 3
  • c225e8a Bump actions/checkout from 2 to 3
  • dd46e25 Add SPDX license to syscall files
  • 92888a3 Dependabot: Add package-ecosystem github-actions
  • b3c5fc1 Add config for dependabot
  • 66a4ff8 Mark notify structs non_exhaustive
  • 28fc132 Document that the get_notify_fd is shared
  • 6a61664 const syscall name resolving
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [libseccomp](https://github.com/libseccomp-rs/libseccomp-rs) from 0.2.3 to 0.3.0.
- [Release notes](https://github.com/libseccomp-rs/libseccomp-rs/releases)
- [Changelog](https://github.com/libseccomp-rs/libseccomp-rs/blob/main/CHANGELOG.md)
- [Commits](libseccomp-rs/libseccomp-rs@v0.2.3...v0.3.0)

---
updated-dependencies:
- dependency-name: libseccomp
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Oct 3, 2022
@utam0k utam0k merged commit 583af14 into main Oct 3, 2022
@dependabot dependabot bot deleted the dependabot/cargo/libseccomp-0.3.0 branch October 3, 2022 12:36
@rumpl
Copy link
Contributor

rumpl commented Oct 18, 2022

I had to downgrade libseccomp to make youki compile, with 0.3.0 I get an error:

error[E0599]: no method named `get_notify_fd` found for struct `ScmpFilterContext` in the current scope

@utam0k
Copy link
Member

utam0k commented Oct 21, 2022

@rumpl What kernel version did you use?

@92hackers
Copy link

#1318 Issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants