Skip to content

fix(deps): update go modules #918

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed

Conversation

red-hat-konflux[bot]
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Apr 15, 2025

This PR contains the following updates:

Package Type Update Change
github.com/Knetic/govaluate require digest 9aa4983 -> 7625b7f
github.com/cenkalti/hub indirect patch v1.0.1 -> v1.0.2
github.com/cilium/ebpf indirect minor v0.16.0 -> v0.18.0
github.com/containernetworking/cni indirect minor v1.1.2 -> v1.3.0
github.com/containernetworking/plugins indirect minor v1.2.0 -> v1.6.2
github.com/coreos/go-iptables indirect minor v0.6.0 -> v0.8.0
github.com/cpuguy83/go-md2man/v2 indirect patch v2.0.4 -> v2.0.6
github.com/emicklei/go-restful/v3 indirect patch v3.12.1 -> v3.12.2
github.com/evanphx/json-patch/v5 indirect patch v5.9.0 -> v5.9.11
github.com/fsnotify/fsnotify indirect minor v1.8.0 -> v1.9.0
github.com/fxamacker/cbor/v2 indirect minor v2.7.0 -> v2.8.0
github.com/go-logfmt/logfmt indirect minor v0.5.1 -> v0.6.0
github.com/go-openapi/jsonpointer indirect patch v0.21.0 -> v0.21.1
github.com/go-openapi/swag indirect patch v0.23.0 -> v0.23.1
github.com/google/gnostic-models indirect patch v0.6.8 -> v0.6.9
github.com/google/go-cmp indirect minor v0.6.0 -> v0.7.0
github.com/gorilla/websocket indirect patch v1.5.0 -> v1.5.3
github.com/grpc-ecosystem/grpc-gateway/v2 indirect patch v2.26.1 -> v2.26.3
github.com/klauspost/compress indirect minor v1.17.11 -> v1.18.0
github.com/klauspost/cpuid/v2 indirect patch v2.2.9 -> v2.2.10
github.com/libp2p/go-reuseport indirect minor v0.3.0 -> v0.4.0
github.com/magiconair/properties indirect patch v1.8.7 -> v1.8.10
github.com/mailru/easyjson indirect minor v0.7.7 -> v0.9.0
github.com/mariomac/guara require digest 5fc2798 -> 1e4dbdf
github.com/minio/minio-go/v7 require patch v7.0.88 -> v7.0.91
github.com/netobserv/loki-client-go require digest f37122a -> 897c579
github.com/ovn-org/ovn-kubernetes/go-controller indirect digest 57a2590 -> e6eb957
github.com/pelletier/go-toml/v2 indirect patch v2.2.2 -> v2.2.4
github.com/pierrec/lz4/v4 indirect patch v4.1.21 -> v4.1.22
github.com/pion/logging indirect patch v0.2.2 -> v0.2.3
github.com/prometheus/client_golang require minor v1.21.0 -> v1.22.0
github.com/prometheus/client_model require patch v0.6.1 -> v0.6.2
github.com/prometheus/common require minor v0.62.0 -> v0.63.0
github.com/prometheus/procfs indirect minor v0.15.1 -> v0.16.1
github.com/prometheus/prometheus indirect minor v1.8.2-0.20201028100903-3245b3267b24 -> v1.99.0
github.com/safchain/ethtool indirect minor v0.3.1-0.20231027162144-83e5e0097c91 -> v0.5.10
github.com/sagikazarmark/locafero indirect minor v0.4.0 -> v0.9.0
github.com/spf13/afero indirect minor v1.11.0 -> v1.14.0
github.com/spf13/cast indirect minor v1.6.0 -> v1.7.1
github.com/spf13/cobra require minor v1.8.1 -> v1.9.1
github.com/spf13/viper require minor v1.19.0 -> v1.20.1
github.com/urfave/cli/v2 indirect patch v2.27.2 -> v2.27.6
github.com/vladimirvivien/gexe require minor v0.4.1 -> v0.5.0
github.com/vmware/go-ipfix require minor v0.12.0 -> v0.14.0
github.com/xrash/smetrics indirect digest 5f08fbb -> 686a1a2
go (source) toolchain minor 1.23.4 -> 1.24.2
go.opentelemetry.io/otel require minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc require minor v1.32.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp require minor v1.29.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace require minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc require minor v1.33.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp require minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/metric require minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/sdk require minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/sdk/metric require minor v1.32.0 -> v1.35.0
go.opentelemetry.io/otel/trace indirect minor v1.34.0 -> v1.35.0
go.uber.org/atomic indirect minor v1.9.0 -> v1.11.0
golang.org/x/crypto indirect minor v0.36.0 -> v0.37.0
golang.org/x/exp indirect digest 054e65f -> 7e4ce0a
golang.org/x/net require minor v0.37.0 -> v0.39.0
golang.org/x/oauth2 indirect minor v0.26.0 -> v0.29.0
golang.org/x/sys indirect minor v0.31.0 -> v0.32.0
golang.org/x/term indirect minor v0.30.0 -> v0.31.0
golang.org/x/text indirect minor v0.23.0 -> v0.24.0
golang.org/x/time indirect minor v0.7.0 -> v0.11.0
google.golang.org/genproto/googleapis/api indirect digest e9438ea -> 2d3770c
google.golang.org/genproto/googleapis/rpc indirect digest e9438ea -> 2d3770c
google.golang.org/grpc require minor v1.70.0 -> v1.72.0
google.golang.org/protobuf require patch v1.36.5 -> v1.36.6
k8s.io/component-base indirect patch v0.32.1 -> v0.32.3
k8s.io/kube-openapi indirect digest 32ad38e -> c8a335a
k8s.io/utils indirect digest 3ea5e8c -> 1f6e0b7
lukechampine.com/uint128 indirect minor v1.2.0 -> v1.3.0
sigs.k8s.io/controller-runtime indirect patch v0.20.0 -> v0.20.4
sigs.k8s.io/json indirect digest 9aa6b5e -> cfa47c3
sigs.k8s.io/structured-merge-diff/v4 indirect minor v4.4.2 -> v4.7.0

Release Notes

cenkalti/hub (github.com/cenkalti/hub)

v1.0.2

Compare Source

cilium/ebpf (github.com/cilium/ebpf)

v0.18.0

Compare Source

Initial Windows Support

This release adds support for eBPF on Windows through the eBPF for Windows runtime. Users must run a recent build of the main branch of eBPF for Windows, version 0.20.0 is not supported.

See the documentation and how to contribute to the Windows port.

Supported:

  • Basic map and program operations
  • Support for program loading, including native images (.sys files)
  • Pin operations use Windows-specific global object table instead of bpffs
  • Support for retrieving program/attach type from GUID

Not supported:

  • Feature tests
  • BTF
  • bpf2go
  • perf
  • ringbuf
  • rlimit
  • pin
  • Reading Windows ELFs

The Windows port is still very new and won't be as performant or stable as the Linux part of the code base. There is also no guarantee of stability at the moment.

Build System Improvements

  • Mounting GOCACHE and GOMODCACHE into containers for faster rebuilds with Podman
  • Added -verbose flag to bpf2go and gentypes tools
  • Verbosity defaults to Make's V= environment variable

Documentation

  • Added Windows user-facing documentation
  • Added instructions for working on the Windows port

Bugfixes

  • prog: Fixed program loading loop that would run forever if log size was over kernel maximum
  • prog: Added limits to program load retry attempts
  • collection: Fixed missing Map.Close in collectionLoader.loadMap
  • memory: Fixed off-by-one error in bounds check that prevented accessing the last byte of memory segments
  • map, program: Names passed to kernel are now automatically sanitized

Breaking Changes

ebpf:

  • Unexported SanitizeName function. Map and program names are now automatically sanitized.
  • The ELF reader now always allows dots in names but will strip them if necessary when making syscalls. This will break users with pinned objects that have dots in their names on kernels which don't support dots.

What's Changed

New Contributors

Full Changelog: cilium/ebpf@v0.17.3...v0.18.0

v0.17.3

Compare Source

Fixes for a data race in btf.Spec.Copy (thanks @​paulcacheux) and a buffer overflow when running 32-bit user space on a 64-bit kernel (thanks @​kolyshkin).

What's Changed

Full Changelog: cilium/ebpf@v0.17.2...v0.17.3

v0.17.2

Compare Source

Another minor release to ship some bug fixes, notably for attaching bpf programs to symbols in kernel modules, and for reusing data sections across multiple Collections.

All users are encouraged to upgrade!

Features

Bug Fixes

Other Changes

Thanks to all who contributed and reported issues!

Full Changelog: cilium/ebpf@v0.17.1...v0.17.2

v0.17.1: Hotfix: don't retry endlessly on verifier errors on kernels <6.4

Compare Source

During the prior removal of ProgramOptions.LogSize in v0.16, the tests weren't updated to exercise the retry logic. With the last-minute addition of ProgramOptions.LogSizeStart, a bug was introduced that would cause program loads to retry indefinitely without ever growing the buffer in case of a verifier error on kernels before 6.4. This is now fixed, and the tests were updated to exercise the retry logic.

v0.17.0: Global Variables, Decl Tags, and package pin

Compare Source

Note: the hotfix release 0.17.1 is out. Users are highly encouraged to upgrade.

As we close the door on the year 2024, we're also wrapping up the ebpf-go v0.17 development cycle. This release represents a large body of work and is our largest feature release since BTF.

Users are, as always, highly encouraged to upgrade, and we're looking forward to hearing your feedback on the new Global Variables API. We've been putting this interface trough its paces internally, along with a few eager community members, and we're ready to let the wider community make use of it.

This release also marks the end of our Go 1.21 support; Go 1.22 is required going forward.

Breaking Changes

Before we get to the fun stuff, we need to call out a few breaking changes:

  • Global variables with a static qualifier can no longer be rewritten using CollectionSpec.RewriteConstants()! See the section on global variables under major features below.

  • program: remove LogSize and VerifierError.Truncated by @​lmb in https://github.com/cilium/ebpf/pull/1526

  • prog: add ProgramOptions.LogSizeStart to obtain full log after verifier bug by @​ti-mo in https://github.com/cilium/ebpf/pull/1630

    The ProgramOptions.LogSize field was deprecated and a no-op since 0.16 and has now been removed completely. In its place, a new field was added to obtain full verifier logs when the verifier hits an internal bug. The ProgramOptions.LogSizeStart field controls the starting size of the log buffer. Use this if you have a good understanding of the log size you're expecting, or if you're trying to pull out the full log when the verifier hits an internal bug. The error string now also contains some hints about what happened and how to handle this situation.

  • map: remove MapSpec.Freeze field by @​ti-mo in https://github.com/cilium/ebpf/pull/1558

  • elf_reader: don't use BPF_F_RDONLY_PROG flag to trigger map freezing by @​ti-mo in https://github.com/cilium/ebpf/pull/1568

    The Freeze field was ambiguous from the start, and has been a source of subtle bugs over the years. Automatic map freezing is now done based solely on map name (.(ro)data prefix). If you were manually setting this flag, consider using a conventional map name instead.

  • info: expose ksym info and func info by ProgramInfo by @​Asphaltt in https://github.com/cilium/ebpf/pull/1576

  • info: expose more prog jited info by @​Asphaltt in https://github.com/cilium/ebpf/pull/1598

    Some ext_info types in package btf were redefined to enable pulling raw func and line infos out of Program.Info(). These were all types without methods and all unexported fields, but calling them out regardless in case someone's doing unintended advanced things with BTF.

  • kallsyms: change Modules caching strategy, cache address lookups by @​ti-mo in https://github.com/cilium/ebpf/pull/1590

    Users attaching bpf programs to kernel symbols should see a marked decrease in allocations made in the library during program creation in the general case. Only used entries are now cached, making kallsyms lookups on subsequent program loads free. In the pathological case (new kernel symbols on every load), scanning is repeated, resulting in more CPU time being used instead of holding on to all kallsyms symbols indefinitely. ProgramSpec.KernelModule() was unexported until further notice.

    Also, bpf2go users should now be able to generate Go bindings as unprivileged users once again. Oops!

Major Features

Easy global variables: introducing ebpf.VariableSpec and ebpf.Variable

This has been a frequent ask in the community for years, so we finally bit the bullet and committed to an API to interact with global bpf variables through CollectionSpec.Variables and CollectionSpec.Variables. We've published a small guide over on ebpf-go.dev/concepts/global-variables that details how to use them, so we're not going to reiterate here.

See the documentation on the use of the static qualifier! These are no longer considered global variables, and can't be modified at runtime.

bpf2go now also generates objects to be used with CollectionSpec.Assign and .LoadAndAssign(), and also emits Go type declarations for C types used as bpf C variables. Our test coverage was somewhat lacking for the latter, please drop something on the issue tracker if you're noticing surprising bpf2go output.

Note that it's currently not possible to manually create a VariableSpec and wire it up to a CollectionSpec, so if you were previously relying on e.g. manually assembling a CollectionSpec and using RewriteConstants() in tests, this will no longer work. This may land as the API crystallizes and we settle on a good mechanism to enable this. Please reach out on the Cilium Slack if you'd like to see this happen.

Tags!

As you'll notice, the btf.Struct, btf.Union, btf.Member, btf.Typedef, btf.Func and btf.Var have gained a new field: Tags! Set one or more tags on these objects from bpf C using __attribute__((btf_decl_tag("mytag"))) and
you'll find Tags being populated in Go.

There's also the btf.Func.ParamTags field that holds tags declared on individual function parameters. These are part of the Func since they appear only in the function prototype, not in the parameter type itself, since those can appear in many different types. (it does get confusing!)

Also, an honorable mention to btf.TypeTag, which has now been exported. This allows tagging pointers with an arbitrary string value and is mainly used by the Linux verifier to tag kernel pointers, see the __kptr and __kptr_ref macros in Linux' bpf_helpers.h.

Pins!

We've added a new root-level package pin, which currently features the Load() and WalkDir() functions. Since all LoadPinned* functions in the library now check for the underlying object's type, we've repurposed the machinery to allow loading an opaque pin and returning a Go object of the right type.WalkDir does what it says on the tin, it walks bpffs directories and invokes a callback that received the loaded object. Super convenient!

Minor Features

We've also added a handful of minor features during this release:

Other Changes

Last but not least, there's bugfixes, CI changes and some internal refactoring that happened to eventually make ebpf-go work with ebpf-for-windows. See individual PRs for more context. Stay tuned!

New Contributors

Full Changelog: cilium/ebpf@v0.16.0...v0.17.0

containernetworking/cni (github.com/containernetworking/cni)

v1.3.0

Compare Source

What's Changed

This adds a new config flag loadPluginsFromFolder - if present, for a given named network bar, plugin configuration objects will be loaded from <path-to-bar-network-config-file>/bar/xxx.conf. This may be useful for vendors providing chained plugins: you can add your plugin to a chain without needing to edit the file in-place.

New Contributors

Full Changelog: containernetworking/cni@v1.2.3...v1.3.0

v1.2.3: libcni v1.2.3

Compare Source

This is a minor release to correct a divergence between the specification and libcni. In this case, the specification was updated, as it concerns a new feature, GC, that is not yet deployed.

What's Changed

v1.2.2: libcni v1.2.2

Compare Source

What's Changed

Full Changelog: containernetworking/cni@v1.2.1...v1.2.2

v1.2.1: CNI Spec v1.1 / libcni v1.2.1

Compare Source

This is a minor release that fixes some small bugs:

Improvements
  • (#​1098). SPEC: add warning about preserving shared resources for GC
  • (#​1090). Spec, libcni: add disableGC flag This allows administrators to disable garbage collection in exceptional circumstances, such as multiple runtimes sharing a network configuration.
Bug fixes:
  • (#​1097). Fix faulty json.Marshal behavior for embeds types.NetConf Fix #​1096
  • (#​1095). libcni: always delete the cache on conflist for CNI DEL This aligns the call with DelNetwork, and allows CRIO tests to bump

v1.2.0: CNI spec v1.1 / libcni v1.2.0

Compare Source

This is libcni v1.2.0, which releases the new CNI spec version v1.1.0.

Major changes:

GC verb

The GC verb allows runtimes to specify the set of known-good attachments, allowing plugins to clean up stale and leaked resources such as IPAM reservations. Libcni will also synthesize a CNI DEL for any stale cached attachments, so all users will have a form of GC, even if their plugins do not support CNI v1.1

STATUS verb

The STATUS verb allows a plugin to report its readiness to accept ADD requests. Runtimes such as containerd and cri-o will no longer have to rely merely on the presence of a CNI configuration file to determine network readiness.

Version negotiation

CNI configurations may now contain multiple versions, so that an administrator can opportunistically update the protocol version without breaking older runtimes:

{
  "cniVersion": "1.0.0",
  "cniVersions": ["1.0.0", "1.1.0"]
}

New fields

A number of new fields have been added to the result type:

Other improvements

  • (#​911). libcni: add specific type for CHECK not supported
  • (#​1072). tolerate invalid cni caches for deletion
  • (#​1054). Add Version() to CNI interface
containernetworking/plugins (github.com/containernetworking/plugins)

v1.6.2

Compare Source

(administrative note: release v1.6.1 was somehow double-created in GitHub; v1.6.2 is identical but fixes the duplication.)

What's Changed

Full Changelog: containernetworking/plugins@v1.6.0...v1.6.2

v1.6.1

Compare Source

v1.6.0: CNI plugins v1.6.0

Compare Source

This is the v1.6.0 release of the CNI community plugins.

Changelog

Important

  • revert htb changes due to ongoing issues and missing maintainer by @​h0nIg in https://github.com/containernetworking/plugins/pull/1105. This reverts the (undocumented) feature added in v1.5 where traffic from a specific CIDR would be exempted from bandwidth shaping. Unfortunately the implementation was lacking. We hope to re-add this feature in the future.

New features

CNI v1.1 support

Other improvements

Fixes

Misc / CI

New Contributors


Configuration

📅 Schedule: Branch creation - "after 5am on wednesday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.

This PR has been generated by MintMaker (powered by Renovate Bot).

@red-hat-konflux red-hat-konflux bot added the dependencies Pull requests that update a dependency file label Apr 15, 2025
Copy link

openshift-ci bot commented Apr 15, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign jotak for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

openshift-ci bot commented Apr 15, 2025

Hi @red-hat-konflux[bot]. Thanks for your PR.

I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-1.8/go-modules branch 3 times, most recently from 7ba6ffb to 565e808 Compare April 23, 2025 06:02
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-1.8/go-modules branch 2 times, most recently from 02d020a to 9a6d644 Compare April 23, 2025 18:11
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-1.8/go-modules branch from 9a6d644 to cb22279 Compare April 23, 2025 21:44
@jotak jotak closed this Apr 24, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file needs-ok-to-test
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant