Skip to content

fix(deps): update go modules #920

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

red-hat-konflux[bot]
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Apr 16, 2025

This PR contains the following updates:

Package Type Update Change
github.com/containernetworking/cni indirect minor v1.1.2 -> v1.3.0
github.com/containernetworking/plugins indirect minor v1.2.0 -> v1.6.2
github.com/coreos/go-iptables indirect minor v0.6.0 -> v0.8.0
github.com/minio/minio-go/v7 require patch v7.0.90 -> v7.0.91
github.com/ovn-org/ovn-kubernetes/go-controller indirect digest 57a2590 -> e6eb957
github.com/prometheus/procfs indirect patch v0.16.0 -> v0.16.1
github.com/prometheus/prometheus indirect minor v1.8.2-0.20201028100903-3245b3267b24 -> v1.99.0
github.com/vishvananda/netlink indirect digest 62fb240 -> d85a66b
go (source) toolchain minor 1.23.4 -> 1.24.2
google.golang.org/genproto/googleapis/api indirect digest 61c742a -> 2d3770c
google.golang.org/genproto/googleapis/rpc indirect digest 207652e -> 2d3770c
google.golang.org/grpc require minor v1.71.1 -> v1.72.0

Release Notes

containernetworking/cni (github.com/containernetworking/cni)

v1.3.0

Compare Source

What's Changed

This adds a new config flag loadPluginsFromFolder - if present, for a given named network bar, plugin configuration objects will be loaded from <path-to-bar-network-config-file>/bar/xxx.conf. This may be useful for vendors providing chained plugins: you can add your plugin to a chain without needing to edit the file in-place.

New Contributors

Full Changelog: containernetworking/cni@v1.2.3...v1.3.0

v1.2.3: libcni v1.2.3

Compare Source

This is a minor release to correct a divergence between the specification and libcni. In this case, the specification was updated, as it concerns a new feature, GC, that is not yet deployed.

What's Changed

v1.2.2: libcni v1.2.2

Compare Source

What's Changed

Full Changelog: containernetworking/cni@v1.2.1...v1.2.2

v1.2.1: CNI Spec v1.1 / libcni v1.2.1

Compare Source

This is a minor release that fixes some small bugs:

Improvements
  • (#​1098). SPEC: add warning about preserving shared resources for GC
  • (#​1090). Spec, libcni: add disableGC flag This allows administrators to disable garbage collection in exceptional circumstances, such as multiple runtimes sharing a network configuration.
Bug fixes:
  • (#​1097). Fix faulty json.Marshal behavior for embeds types.NetConf Fix #​1096
  • (#​1095). libcni: always delete the cache on conflist for CNI DEL This aligns the call with DelNetwork, and allows CRIO tests to bump

v1.2.0: CNI spec v1.1 / libcni v1.2.0

Compare Source

This is libcni v1.2.0, which releases the new CNI spec version v1.1.0.

Major changes:

GC verb

The GC verb allows runtimes to specify the set of known-good attachments, allowing plugins to clean up stale and leaked resources such as IPAM reservations. Libcni will also synthesize a CNI DEL for any stale cached attachments, so all users will have a form of GC, even if their plugins do not support CNI v1.1

STATUS verb

The STATUS verb allows a plugin to report its readiness to accept ADD requests. Runtimes such as containerd and cri-o will no longer have to rely merely on the presence of a CNI configuration file to determine network readiness.

Version negotiation

CNI configurations may now contain multiple versions, so that an administrator can opportunistically update the protocol version without breaking older runtimes:

{
  "cniVersion": "1.0.0",
  "cniVersions": ["1.0.0", "1.1.0"]
}

New fields

A number of new fields have been added to the result type:

Other improvements

  • (#​911). libcni: add specific type for CHECK not supported
  • (#​1072). tolerate invalid cni caches for deletion
  • (#​1054). Add Version() to CNI interface
containernetworking/plugins (github.com/containernetworking/plugins)

v1.6.2

Compare Source

(administrative note: release v1.6.1 was somehow double-created in GitHub; v1.6.2 is identical but fixes the duplication.)

What's Changed

Full Changelog: containernetworking/plugins@v1.6.0...v1.6.2

v1.6.1

Compare Source

v1.6.0: CNI plugins v1.6.0

Compare Source

This is the v1.6.0 release of the CNI community plugins.

Changelog

Important

  • revert htb changes due to ongoing issues and missing maintainer by @​h0nIg in https://github.com/containernetworking/plugins/pull/1105. This reverts the (undocumented) feature added in v1.5 where traffic from a specific CIDR would be exempted from bandwidth shaping. Unfortunately the implementation was lacking. We hope to re-add this feature in the future.

New features

CNI v1.1 support

Other improvements

Fixes

Misc / CI

New Contributors

Full Changelog: containernetworking/plugins@v1.5.1...v1.6.0

v1.5.1

Compare Source

What's Changed

Full Changelog: containernetworking/plugins@v1.5.0...v1.5.1

v1.5.0: CNI Plugins v1.5.0

Compare Source

What's Changed

New Features:

Fixes:

New Contributors

Full Changelog: containernetworking/plugins@v1.4.1...v1.5.0

v1.4.1

Compare Source

v1.4.0: CNI Plugins v1.4.0

Compare Source

New features:
  • (#​832). tap: allow for a tap device to be created as a bridge port
  • (#​914). [tuning] add ability to set tx queue len
Improvements:
  • (#​969). Add CNI_NETNS_OVERRIDE
  • (#​979). Add ndisc_notify in ipvlan for ipv6 ndp
  • (#​974). macvlan: enable ipv6 ndisc_notify
  • (#​950). Create IPAM files with 0600 permissions
  • (#​924). More efficient iptables usage.
  • (#​902). spoofcheck: Make use of go-nft's ApplyConfigEcho(). This is much faster
  • (#​874). Add routes propagation for VRF plugin
Build:
  • (#​982). Bump to golang:1.21-alpine
  • (#​948). build: Use POSIX sh for shell scripts
Bug fixes:
  • (#​954). macvlan cmdDel: handle deletion when master has been deleted
  • (#​927). vrf: fix route filter to use output iface

v1.3.0: CNI Plugins v1.3.0

Compare Source

This release introduces a new plugin: tap. Thanks to @​mmirecki for contributing this

New features:

  • (#​784). tap: This PR adds a plugin to create tap devices.
  • (#​829). bridge: add vlan trunk support
  • (#​875). bridge: Add parameter to disable default vlan
  • (#​814). macvlan: Add support for in-container master
  • (#​813). ipvlan: Add support for in-container master
  • (#​781). vlan: Add support for in-container master

Improvements:

  • (#​880). bridge: read only required chain on cni del instead of the entire ruleset
  • (#​873). bridge, spoof check: remove drop rule index

Bug fixes:

  • (#​892). sbr: Ignore LinkNotFoundError during cmdDel null
  • (#​887). ptp: Fix ValidateExpectedRoute with non default routes and nil GW
  • (#​885). tuning: fix cmdCheck when using IFNAME
  • (#​831). Fix overwritten error var in getMTUByName
  • (#​821). Only check or del ipv6 when an IPv6 is configured
coreos/go-iptables (github.com/coreos/go-iptables)

v0.8.0

Compare Source

What's Changed

Full Changelog: coreos/go-iptables@v0.7.0...v0.8.0

v0.7.0

Compare Source

Bug fixes

  • (#​107). Add another pattern to IsNotExist
  • (#​105). Skip warning about rules in legacy iptables
  • (#​104). iptables_test: fix ListWithCounters mismatch on newer kernels

New features

  • (#​87). Added Replace method to replace rulespec (in specified pos)
  • (#​96). feat: add ListById function and test
  • (#​92). Introduce InsertUnique()
minio/minio-go (github.com/minio/minio-go/v7)

v7.0.91

Compare Source

prometheus/procfs (github.com/prometheus/procfs)

v0.16.1

Compare Source

What's Changed

New Contributors

Full Changelog: prometheus/procfs@v0.16.0...v0.16.1

prometheus/prometheus (github.com/prometheus/prometheus)

v1.99.0

Compare Source

v1.99.0-retract

Compare Source

grpc/grpc-go (google.golang.org/grpc)

v1.72.0: Release 1.72.0

Compare Source

Dependencies

  • Minimum supported Go version is now 1.23 (#​8108)

API Changes

  • resolver: add experimental AddressMapV2 with generics to ultimately replace AddressMap. Deprecate AddressMap for deletion (#​8187)
  • resolver: convert EndpointMap in place to use generics (#​8189)

New Features

  • xds: add grpc.xds_client.server_failure counter metric on xDS client to record connectivity errors (#​8203)
  • balancer/rls: allow maxAge to exceed 5 minutes if staleAge is set in the LB policy configuration (#​8137)
  • ringhash: implement gRFC A76 improvements. (#​8159)

Bug Fixes

  • xds: fix support for circuit breakers and load reporting in LOGICAL_DNS clusters (#​8169, #​8170)
  • xds/cds: improve RPC error messages when resources are not found (#​8122)
  • balancer/priority: fix race that could leak balancers and goroutines during shutdown (#​8095)
  • stats/opentelemetry: fix trace attributes message sequence numbers to start from 0 (#​8237)
  • balancer/pickfirstleaf: fix panic if deprecated Address.Metadata field is set to a non-comparable value by ignoring the field (#​8227)

Behavior Changes

  • transport: make servers send an HTTP/2 RST_STREAM frame to cancel a stream when the deadline expires (#​8071)

Documentation


Configuration

📅 Schedule: Branch creation - "after 5am on wednesday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.

This PR has been generated by MintMaker (powered by Renovate Bot).

@red-hat-konflux red-hat-konflux bot added the dependencies Pull requests that update a dependency file label Apr 16, 2025
Copy link

openshift-ci bot commented Apr 16, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign jpinsonneau for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

openshift-ci bot commented Apr 16, 2025

Hi @red-hat-konflux[bot]. Thanks for your PR.

I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/main/go-modules branch 4 times, most recently from f0e198a to f2d325d Compare April 23, 2025 18:38
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/main/go-modules branch from f2d325d to 9fcca6b Compare April 23, 2025 22:34
@jotak
Copy link
Member

jotak commented Apr 24, 2025

/hold
the k8s bump would require go 1.24 which isn't yet available in downstream builds

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file do-not-merge/hold needs-ok-to-test
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant