Skip to content

Update Go modules #678

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed

Conversation

red-hat-konflux[bot]
Copy link
Contributor

This PR contains the following updates:

Package Type Update Change
github.com/Knetic/govaluate indirect digest 9aa4983 -> 7625b7f
github.com/agoda-com/opentelemetry-logs-go indirect minor v0.5.0 -> v0.6.0
github.com/cenkalti/hub indirect patch v1.0.1 -> v1.0.2
github.com/cilium/ebpf require minor v0.16.0 -> v0.18.0
github.com/containernetworking/cni indirect minor v1.1.2 -> v1.3.0
github.com/containernetworking/plugins indirect minor v1.2.0 -> v1.7.1
github.com/coreos/go-iptables indirect minor v0.6.0 -> v0.8.0
github.com/cpuguy83/go-md2man/v2 indirect patch v2.0.4 -> v2.0.7
github.com/emicklei/go-restful/v3 indirect patch v3.12.1 -> v3.12.2
github.com/evanphx/json-patch/v5 indirect patch v5.9.0 -> v5.9.11
github.com/fsnotify/fsnotify require minor v1.8.0 -> v1.9.0
github.com/fxamacker/cbor/v2 indirect minor v2.7.0 -> v2.8.0
github.com/go-logfmt/logfmt indirect minor v0.5.1 -> v0.6.0
github.com/go-openapi/jsonpointer indirect patch v0.21.0 -> v0.21.1
github.com/go-openapi/swag indirect patch v0.23.0 -> v0.23.1
github.com/google/go-cmp indirect minor v0.6.0 -> v0.7.0
github.com/gorilla/websocket indirect patch v1.5.0 -> v1.5.3
github.com/grpc-ecosystem/grpc-gateway/v2 indirect minor v2.25.1 -> v2.26.3
github.com/klauspost/compress indirect minor v1.17.11 -> v1.18.0
github.com/klauspost/cpuid/v2 indirect patch v2.2.9 -> v2.2.10
github.com/libp2p/go-reuseport indirect minor v0.3.0 -> v0.4.0
github.com/mailru/easyjson indirect minor v0.7.7 -> v0.9.0
github.com/mariomac/guara require digest 5fc2798 -> 1e4dbdf
github.com/minio/minio-go/v7 indirect patch v7.0.87 -> v7.0.91
github.com/netobserv/loki-client-go indirect digest f37122a -> 526b43e
github.com/ovn-org/ovn-kubernetes/go-controller require digest 95b6ca5 -> 14237a8
github.com/pierrec/lz4/v4 indirect patch v4.1.21 -> v4.1.22
github.com/pion/logging indirect patch v0.2.2 -> v0.2.3
github.com/prometheus/client_golang require minor v1.21.1 -> v1.22.0
github.com/prometheus/client_model indirect patch v0.6.1 -> v0.6.2
github.com/prometheus/common indirect minor v0.62.0 -> v0.63.0
github.com/prometheus/procfs indirect minor v0.15.1 -> v0.16.1
github.com/prometheus/prometheus indirect minor v1.8.2-0.20201028100903-3245b3267b24 -> v1.99.0
github.com/safchain/ethtool indirect minor v0.3.1-0.20231027162144-83e5e0097c91 -> v0.5.10
github.com/spf13/cobra indirect minor v1.8.1 -> v1.9.1
github.com/urfave/cli/v2 indirect patch v2.27.2 -> v2.27.6
github.com/vladimirvivien/gexe require minor v0.4.1 -> v0.5.0
github.com/vmware/go-ipfix require minor v0.12.0 -> v0.14.0
github.com/xrash/smetrics indirect digest 5f08fbb -> 686a1a2
go (source) toolchain minor 1.23.5 -> 1.24.2
go.opentelemetry.io/otel indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc indirect minor v1.32.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp indirect minor v1.29.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc indirect minor v1.33.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/metric indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/sdk indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/sdk/metric indirect minor v1.32.0 -> v1.35.0
go.opentelemetry.io/otel/trace indirect minor v1.34.0 -> v1.35.0
go.uber.org/atomic indirect minor v1.9.0 -> v1.11.0
golang.org/x/crypto indirect minor v0.35.0 -> v0.37.0
golang.org/x/exp indirect digest 8a7402a -> 7e4ce0a
golang.org/x/net indirect minor v0.36.0 -> v0.39.0
golang.org/x/oauth2 indirect minor v0.24.0 -> v0.29.0
golang.org/x/sys require minor v0.30.0 -> v0.32.0
golang.org/x/term indirect minor v0.29.0 -> v0.31.0
golang.org/x/text indirect minor v0.22.0 -> v0.24.0
golang.org/x/time indirect minor v0.7.0 -> v0.11.0
google.golang.org/genproto/googleapis/api indirect digest 1a7da9e -> 7b38467
google.golang.org/genproto/googleapis/rpc indirect digest 1a7da9e -> 7b38467
google.golang.org/grpc require minor v1.70.0 -> v1.72.0
google.golang.org/protobuf require patch v1.36.5 -> v1.36.6
k8s.io/api require minor v0.32.3 -> v0.33.0
k8s.io/apimachinery require minor v0.32.3 -> v0.33.0
k8s.io/client-go require minor v0.32.3 -> v0.33.0
k8s.io/component-base indirect minor v0.32.1 -> v0.33.0
lukechampine.com/uint128 indirect minor v1.2.0 -> v1.3.0
sigs.k8s.io/controller-runtime indirect patch v0.20.0 -> v0.20.4
sigs.k8s.io/json indirect digest 9aa6b5e -> cfa47c3
sigs.k8s.io/structured-merge-diff/v4 indirect minor v4.6.0 -> v4.7.0

Release Notes

agoda-com/opentelemetry-logs-go (github.com/agoda-com/opentelemetry-logs-go)

v0.6.0

Compare Source

Changed
  • opentelemetry updated to 1.34.0

v0.5.1

Compare Source

cenkalti/hub (github.com/cenkalti/hub)

v1.0.2

Compare Source

cilium/ebpf (github.com/cilium/ebpf)

v0.18.0

Compare Source

Initial Windows Support

This release adds support for eBPF on Windows through the eBPF for Windows runtime. Users must run a recent build of the main branch of eBPF for Windows, version 0.20.0 is not supported.

See the documentation and how to contribute to the Windows port.

Supported:

  • Basic map and program operations
  • Support for program loading, including native images (.sys files)
  • Pin operations use Windows-specific global object table instead of bpffs
  • Support for retrieving program/attach type from GUID

Not supported:

  • Feature tests
  • BTF
  • bpf2go
  • perf
  • ringbuf
  • rlimit
  • pin
  • Reading Windows ELFs

The Windows port is still very new and won't be as performant or stable as the Linux part of the code base. There is also no guarantee of stability at the moment.

Build System Improvements

  • Mounting GOCACHE and GOMODCACHE into containers for faster rebuilds with Podman
  • Added -verbose flag to bpf2go and gentypes tools
  • Verbosity defaults to Make's V= environment variable

Documentation

  • Added Windows user-facing documentation
  • Added instructions for working on the Windows port

Bugfixes

  • prog: Fixed program loading loop that would run forever if log size was over kernel maximum
  • prog: Added limits to program load retry attempts
  • collection: Fixed missing Map.Close in collectionLoader.loadMap
  • memory: Fixed off-by-one error in bounds check that prevented accessing the last byte of memory segments
  • map, program: Names passed to kernel are now automatically sanitized

Breaking Changes

ebpf:

  • Unexported SanitizeName function. Map and program names are now automatically sanitized.
  • The ELF reader now always allows dots in names but will strip them if necessary when making syscalls. This will break users with pinned objects that have dots in their names on kernels which don't support dots.

What's Changed

New Contributors

Full Changelog: cilium/ebpf@v0.17.3...v0.18.0

v0.17.3

Compare Source

Fixes for a data race in btf.Spec.Copy (thanks @​paulcacheux) and a buffer overflow when running 32-bit user space on a 64-bit kernel (thanks @​kolyshkin).

What's Changed

Full Changelog: cilium/ebpf@v0.17.2...v0.17.3

v0.17.2

Compare Source

Another minor release to ship some bug fixes, notably for attaching bpf programs to symbols in kernel modules, and for reusing data sections across multiple Collections.

All users are encouraged to upgrade!

Features

Bug Fixes

Other Changes

Thanks to all who contributed and reported issues!

Full Changelog: cilium/ebpf@v0.17.1...v0.17.2

v0.17.1: Hotfix: don't retry endlessly on verifier errors on kernels <6.4

Compare Source

During the prior removal of ProgramOptions.LogSize in v0.16, the tests weren't updated to exercise the retry logic. With the last-minute addition of ProgramOptions.LogSizeStart, a bug was introduced that would cause program loads to retry indefinitely without ever growing the buffer in case of a verifier error on kernels before 6.4. This is now fixed, and the tests were updated to exercise the retry logic.

v0.17.0: Global Variables, Decl Tags, and package pin

Compare Source

Note: the hotfix release 0.17.1 is out. Users are highly encouraged to upgrade.

As we close the door on the year 2024, we're also wrapping up the ebpf-go v0.17 development cycle. This release represents a large body of work and is our largest feature release since BTF.

Users are, as always, highly encouraged to upgrade, and we're looking forward to hearing your feedback on the new Global Variables API. We've been putting this interface trough its paces internally, along with a few eager community members, and we're ready to let the wider community make use of it.

This release also marks the end of our Go 1.21 support; Go 1.22 is required going forward.

Breaking Changes

Before we get to the fun stuff, we need to call out a few breaking changes:

  • Global variables with a static qualifier can no longer be rewritten using CollectionSpec.RewriteConstants()! See the section on global variables under major features below.

  • program: remove LogSize and VerifierError.Truncated by @​lmb in https://github.com/cilium/ebpf/pull/1526

  • prog: add ProgramOptions.LogSizeStart to obtain full log after verifier bug by @​ti-mo in https://github.com/cilium/ebpf/pull/1630

    The ProgramOptions.LogSize field was deprecated and a no-op since 0.16 and has now been removed completely. In its place, a new field was added to obtain full verifier logs when the verifier hits an internal bug. The ProgramOptions.LogSizeStart field controls the starting size of the log buffer. Use this if you have a good understanding of the log size you're expecting, or if you're trying to pull out the full log when the verifier hits an internal bug. The error string now also contains some hints about what happened and how to handle this situation.

  • map: remove MapSpec.Freeze field by @​ti-mo in https://github.com/cilium/ebpf/pull/1558

  • elf_reader: don't use BPF_F_RDONLY_PROG flag to trigger map freezing by @​ti-mo in https://github.com/cilium/ebpf/pull/1568

    The Freeze field was ambiguous from the start, and has been a source of subtle bugs over the years. Automatic map freezing is now done based solely on map name (.(ro)data prefix). If you were manually setting this flag, consider using a conventional map name instead.

  • info: expose ksym info and func info by ProgramInfo by @​Asphaltt in https://github.com/cilium/ebpf/pull/1576

  • info: expose more prog jited info by @​Asphaltt in https://github.com/cilium/ebpf/pull/1598

    Some ext_info types in package btf were redefined to enable pulling raw func and line infos out of Program.Info(). These were all types without methods and all unexported fields, but calling them out regardless in case someone's doing unintended advanced things with BTF.

  • kallsyms: change Modules caching strategy, cache address lookups by @​ti-mo in https://github.com/cilium/ebpf/pull/1590

    Users attaching bpf programs to kernel symbols should see a marked decrease in allocations made in the library during program creation in the general case. Only used entries are now cached, making kallsyms lookups on subsequent program loads free. In the pathological case (new kernel symbols on every load), scanning is repeated, resulting in more CPU time being used instead of holding on to all kallsyms symbols indefinitely. ProgramSpec.KernelModule() was unexported until further notice.

    Also, bpf2go users should now be able to generate Go bindings as unprivileged users once again. Oops!

Major Features

Easy global variables: introducing ebpf.VariableSpec and ebpf.Variable

This has been a frequent ask in the community for years, so we finally bit the bullet and committed to an API to interact with global bpf variables through CollectionSpec.Variables and CollectionSpec.Variables. We've published a small guide over on ebpf-go.dev/concepts/global-variables that details how to use them, so we're not going to reiterate here.

See the documentation on the use of the static qualifier! These are no longer considered global variables, and can't be modified at runtime.

bpf2go now also generates objects to be used with CollectionSpec.Assign and .LoadAndAssign(), and also emits Go type declarations for C types used as bpf C variables. Our test coverage was somewhat lacking for the latter, please drop something on the issue tracker if you're noticing surprising bpf2go output.

Note that it's currently not possible to manually create a VariableSpec and wire it up to a CollectionSpec, so if you were previously relying on e.g. manually assembling a CollectionSpec and using RewriteConstants() in tests, this will no longer work. This may land as the API crystallizes and we settle on a good mechanism to enable this. Please reach out on the Cilium Slack if you'd like to see this happen.

Tags!

As you'll notice, the btf.Struct, btf.Union, btf.Member, btf.Typedef, btf.Func and btf.Var have gained a new field: Tags! Set one or more tags on these objects from bpf C using __attribute__((btf_decl_tag("mytag"))) and
you'll find Tags being populated in Go.

There's also the btf.Func.ParamTags field that holds tags declared on individual function parameters. These are part of the Func since they appear only in the function prototype, not in the parameter type itself, since those can appear in many different types. (it does get confusing!)

Also, an honorable mention to btf.TypeTag, which has now been exported. This allows tagging pointers with an arbitrary string value and is mainly used by the Linux verifier to tag kernel pointers, see the __kptr and __kptr_ref macros in Linux' bpf_helpers.h.

Pins!

We've added a new root-level package pin, which currently features the Load() and WalkDir() functions. Since all LoadPinned* functions in the library now check for the underlying object's type, we've repurposed the machinery to allow loading an opaque pin and returning a Go object of the right type.WalkDir does what it says on the tin, it walks bpffs directories and invokes a callback that received the loaded object. Super convenient!

Minor Features

We've also added a handful of minor features during this release:

Other Changes

Last but not least, there's bugfixes, CI changes and some internal refactoring that happened to eventually make ebpf-go work with ebpf-for-windows. See individual PRs for more context. Stay tuned!

New Contributors

Full Changelog: cilium/ebpf@v0.16.0...v0.17.0

containernetworking/cni (github.com/containernetworking/cni)

v1.3.0

Compare Source

What's Changed

This adds a new config flag loadPluginsFromFolder - if present, for a given named network bar, plugin configuration objects will be loaded from <path-to-bar-network-config-file>/bar/xxx.conf. This may be useful for vendors providing chained plugins: you can add your plugin to a chain without needing to edit the file in-place.

New Contributors

Full Changelog: containernetworking/cni@v1.2.3...v1.3.0

v1.2.3: libcni v1.2.3

Compare Source

This is a minor release to correct a divergence between the specification and libcni. In this case, the specification was updated, as it concerns a new feature, GC, that is not yet deployed.

What's Changed

v1.2.2: libcni v1.2.2

Compare Source

What's Changed

Full Changelog: containernetworking/cni@v1.2.1...v1.2.2

v1.2.1: CNI Spec v1.1 / libcni v1.2.1

Compare Source

This is a minor release that fixes some small bugs:

Improvements
  • (#​1098). SPEC: add warning about preserving shared resources for GC
  • (#​1090). Spec, libcni: add disableGC flag This allows administrators to disable garbage collection in exceptional circumstances, such as multiple runtimes sharing a network configuration.
Bug fixes:
  • (#​1097). Fix faulty json.Marshal behavior for embeds types.NetConf Fix #​1096
  • (#​1095). libcni: always delete the cache on conflist for CNI DEL This aligns the call with DelNetwork, and allows CRIO tests to bump

v1.2.0: CNI spec v1.1 / libcni v1.2.0

Compare Source

This is libcni v1.2.0, which releases the new CNI spec version v1.1.0.

Major changes:

GC verb

The GC verb allows runtimes to specify the set of known-good attachments, allowing plugins to clean up stale and leaked resources such as IPAM reservations. Libcni will also synthesize a CNI DEL for any stale cached attachments, so all users will have a form of GC, even if their plugins do not support CNI v1.1

STATUS verb

The STATUS verb allows a plugin to report its readiness to accept ADD requests. Runtimes such as containerd and cri-o will no longer have to rely merely on the presence of a CNI configuration file to determine network readiness.

Version negotiation

CNI configurations may now contain multiple versions, so that an administrator can opportunistically update the protocol version without breaking older runtimes:

{
  "cniVersion": "1.0.0",
  "cniVersions": ["1.0.0", "1.1.0"]
}

New fields

A number of new fields have been added to the result type:

Other improvements

  • (#​911). libcni: add specific type for CHECK not supported
  • (#​1072). tolerate invalid cni caches for deletion
  • (#​1054). Add Version() to CNI interface
containernetworking/plugins (github.com/containernetworking/plugins)

v1.7.1: CNI plugins v1.7.1

Compare Source

What's Changed

(Administrative note: the GitHub release v1.7.0 somehow got split in to two immutable releases. v1.7.1 is a re-release that corrects the issue. Apologies for the trouble).

New features / options
Other improvements
Bug fixes

New Contributors

Full Changelog: containernetworking/plugins@v1.6.2...v1.7.1

v1.7.0

Compare Source

v1.6.2

Compare Source

(administrative note: release v1.6.1 was somehow double-created in GitHub; v1.6.2 is identical but fixes the duplication.)

What's Changed

Full Changelog: containernetworking/plugins@v1.6.0...v1.6.2

v1.6.1

Compare Source

v1.6.0: CNI plugins v1.6.0

Compare Source

This is the v1.6.0 release of the CNI community plugins.

Changelog

Important

  • revert htb changes due to ongoing issues and missing maintainer by @​h0nIg in https://github.com/containernetworking/plugins/pull/1105. This reverts the (undocumented) feature added in v1.5 where traffic from a specific CIDR would be exempted from bandwidth shaping. Unfortunately the implementation was lacking. We hope to re-add this feature in the future.

New features


Configuration

📅 Schedule: Branch creation - "after 5am on sunday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.

This PR has been generated by MintMaker (powered by Renovate Bot).

Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot added the dependencies Pull requests that update a dependency file label Apr 27, 2025
Copy link

openshift-ci bot commented Apr 27, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign shach33 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

openshift-ci bot commented Apr 27, 2025

Hi @red-hat-konflux[bot]. Thanks for your PR.

I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@jotak jotak closed this Apr 28, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file needs-ok-to-test
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant