Skip to content

fix(deps): update go modules #1480

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: release-1.8
Choose a base branch
from

Conversation

red-hat-konflux[bot]
Copy link
Contributor

This PR contains the following updates:

Package Type Update Change
cel.dev/expr indirect minor v0.19.0 -> v0.23.1
github.com/Knetic/govaluate indirect digest 9aa4983 -> 7625b7f
github.com/antlr4-go/antlr/v4 indirect patch v4.13.0 -> v4.13.1
github.com/bpfman/bpfman-operator require patch v0.5.5 -> v0.5.6
github.com/cenkalti/hub indirect patch v1.0.1 -> v1.0.2
github.com/cilium/ebpf indirect minor v0.16.0 -> v0.18.0
github.com/containernetworking/cni indirect minor v1.1.2 -> v1.3.0
github.com/containernetworking/plugins indirect minor v1.2.0 -> v1.7.1
github.com/coreos/go-iptables indirect minor v0.6.0 -> v0.8.0
github.com/cpuguy83/go-md2man/v2 indirect patch v2.0.4 -> v2.0.7
github.com/emicklei/go-restful/v3 indirect patch v3.12.1 -> v3.12.2
github.com/evanphx/json-patch indirect patch v5.9.0+incompatible -> v5.9.11+incompatible
github.com/fsnotify/fsnotify indirect minor v1.8.0 -> v1.9.0
github.com/fxamacker/cbor/v2 indirect minor v2.7.0 -> v2.8.0
github.com/go-logfmt/logfmt indirect minor v0.5.1 -> v0.6.0
github.com/go-openapi/jsonpointer indirect patch v0.21.0 -> v0.21.1
github.com/go-openapi/swag indirect patch v0.23.0 -> v0.23.1
github.com/google/cel-go indirect minor v0.22.0 -> v0.25.0
github.com/google/gnostic-models indirect patch v0.6.8 -> v0.6.9
github.com/google/go-cmp require minor v0.6.0 -> v0.7.0
github.com/google/pprof indirect digest a4b03ec -> c008609
github.com/grpc-ecosystem/grpc-gateway/v2 indirect patch v2.26.1 -> v2.26.3
github.com/klauspost/compress indirect minor v1.17.11 -> v1.18.0
github.com/klauspost/cpuid/v2 indirect patch v2.2.9 -> v2.2.10
github.com/libp2p/go-reuseport indirect minor v0.3.0 -> v0.4.0
github.com/mailru/easyjson indirect minor v0.7.7 -> v0.9.0
github.com/minio/minio-go/v7 indirect patch v7.0.88 -> v7.0.91
github.com/netobserv/flowlogs-pipeline require minor v1.8.2-community.0.20250331143604-8496cf5818d4 -> v1.9.0-crc1
github.com/netobserv/loki-client-go indirect digest f37122a -> 526b43e
github.com/netobserv/prometheus-common replace minor v0.59.1-netobserv -> v0.62.0
github.com/onsi/ginkgo/v2 require minor v2.22.2 -> v2.23.4
github.com/onsi/gomega require minor v1.36.2 -> v1.37.0
github.com/openshift/api require digest 8a7efbf -> 7152b1b
github.com/ovn-org/ovn-kubernetes/go-controller indirect digest 57a2590 -> 39e94d8
github.com/pierrec/lz4/v4 indirect patch v4.1.21 -> v4.1.22
github.com/pion/logging indirect patch v0.2.2 -> v0.2.3
github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring require minor v0.79.2 -> v0.82.0
github.com/prometheus/client_golang indirect minor v1.21.0 -> v1.22.0
github.com/prometheus/client_model indirect patch v0.6.1 -> v0.6.2
github.com/prometheus/common require minor v0.62.0 -> v0.63.0
github.com/prometheus/procfs indirect minor v0.15.1 -> v0.16.1
github.com/prometheus/prometheus indirect minor v1.8.2-0.20201028100903-3245b3267b24 -> v1.99.0
github.com/safchain/ethtool indirect minor v0.3.1-0.20231027162144-83e5e0097c91 -> v0.5.10
github.com/spf13/cobra indirect minor v1.8.1 -> v1.9.1
github.com/urfave/cli/v2 indirect patch v2.27.2 -> v2.27.6
github.com/vmware/go-ipfix indirect minor v0.12.0 -> v0.14.0
github.com/xrash/smetrics indirect digest 5f08fbb -> 686a1a2
go (source) toolchain minor 1.23.4 -> 1.24.2
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp indirect minor v0.53.0 -> v0.60.0
go.opentelemetry.io/otel indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc indirect minor v1.32.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp indirect minor v1.29.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc indirect minor v1.33.0 -> v1.35.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/metric indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/sdk indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/sdk/metric indirect minor v1.32.0 -> v1.35.0
go.opentelemetry.io/otel/trace indirect minor v1.34.0 -> v1.35.0
go.opentelemetry.io/proto/otlp indirect minor v1.5.0 -> v1.6.0
go.uber.org/atomic indirect minor v1.9.0 -> v1.11.0
golang.org/x/crypto indirect minor v0.36.0 -> v0.37.0
golang.org/x/exp indirect digest 054e65f -> 7e4ce0a
golang.org/x/net indirect minor v0.37.0 -> v0.39.0
golang.org/x/oauth2 indirect minor v0.26.0 -> v0.29.0
golang.org/x/sync indirect minor v0.12.0 -> v0.13.0
golang.org/x/sys indirect minor v0.31.0 -> v0.32.0
golang.org/x/term indirect minor v0.30.0 -> v0.31.0
golang.org/x/text indirect minor v0.23.0 -> v0.24.0
golang.org/x/time indirect minor v0.7.0 -> v0.11.0
golang.org/x/tools indirect minor v0.31.0 -> v0.32.0
gomodules.xyz/jsonpatch/v2 indirect minor v2.4.0 -> v2.5.0
google.golang.org/genproto/googleapis/api indirect digest e9438ea -> 10db94c
google.golang.org/genproto/googleapis/rpc indirect digest e9438ea -> 10db94c
google.golang.org/grpc indirect minor v1.70.0 -> v1.72.0
google.golang.org/protobuf indirect patch v1.36.5 -> v1.36.6
k8s.io/api require minor v0.32.3 -> v0.33.0
k8s.io/apiextensions-apiserver require minor v0.32.3 -> v0.33.0
k8s.io/apimachinery require minor v0.32.3 -> v0.33.0
k8s.io/apiserver indirect minor v0.32.3 -> v0.33.0
k8s.io/client-go require minor v0.32.3 -> v0.33.0
k8s.io/component-base indirect minor v0.32.3 -> v0.33.0
k8s.io/kube-aggregator require minor v0.32.3 -> v0.33.0
k8s.io/kube-openapi indirect digest 32ad38e -> c8a335a
k8s.io/utils require digest 24370be -> 0f33e8f
lukechampine.com/uint128 indirect minor v1.2.0 -> v1.3.0
sigs.k8s.io/apiserver-network-proxy/konnectivity-client indirect minor v0.31.0 -> v0.32.0
sigs.k8s.io/controller-runtime require patch v0.20.3 -> v0.20.4
sigs.k8s.io/structured-merge-diff/v4 indirect minor v4.5.0 -> v4.7.0

Release Notes

google/cel-spec (cel.dev/expr)

v0.23.1

Compare Source

What's Changed

Full Changelog: google/cel-spec@v0.23.0...v0.23.1

v0.23.0

Compare Source

What's Changed

New Contributors

Full Changelog: google/cel-spec@v0.22.1...v0.23.0

v0.22.1

Compare Source

What's Changed

Full Changelog: google/cel-spec@v0.22.0...v0.22.1

v0.22.0

Compare Source

What's Changed

  • Add test_suite and test_config under conformance [#​441]

New Contributors

Full Changelog: google/cel-spec@v0.21.2...v0.22.0

v0.21.2

Compare Source

What's Changed

Full Changelog: google/cel-spec@v0.21.1...v0.21.2

v0.21.1

Compare Source

What's Changed

Full Changelog: google/cel-spec@v0.21.0...v0.21.1

v0.21.0

Compare Source

What's Changed

Full Changelog: google/cel-spec@v0.20.0...v0.21.0

v0.20.0

What's Changed

Full Changelog: google/cel-spec@v0.19.2...v0.20.0

v0.19.2

Compare Source

What's Changed

Full Changelog: google/cel-spec@v0.19.1...v0.19.2

v0.19.1

Compare Source

What's Changed

Full Changelog: google/cel-spec@v0.19.0...v0.19.1

antlr4-go/antlr (github.com/antlr4-go/antlr/v4)

v4.13.1: Release 4.13.1

Compare Source

The 4.13.1 release has:

  • Some minor performance improvements
  • An optional build tag -tags antlr.nomutex which allows a build without
    using mutexes, when the user knows they will not use it with multiple
    go routines. (Note, somewhat experimental)

Note that I did not remove the sort.Slices calls. They will not be experimental for long
and are implemented efficently. Please make a fork if you must use it without this
dependency. Maybe review whether you need to do so for the sake of one call.

bpfman/bpfman-operator (github.com/bpfman/bpfman-operator)

v0.5.6

Compare Source

The v0.5.6 release is a patch release. The primary reason for the release is to move the version of sigstore-rs because of a breaking change which caused all previous bpfman versions to no longer be able to verify images. The CSI driver container used by bpfman-operator was also updated to support multiple architectures.

What's Changed

Full Changelog: bpfman/bpfman-operator@v0.5.5...v0.5.6

New Contributors

cenkalti/hub (github.com/cenkalti/hub)

v1.0.2

Compare Source

cilium/ebpf (github.com/cilium/ebpf)

v0.18.0

Compare Source

Initial Windows Support

This release adds support for eBPF on Windows through the eBPF for Windows runtime. Users must run a recent build of the main branch of eBPF for Windows, version 0.20.0 is not supported.

See the documentation and how to contribute to the Windows port.

Supported:

  • Basic map and program operations
  • Support for program loading, including native images (.sys files)
  • Pin operations use Windows-specific global object table instead of bpffs
  • Support for retrieving program/attach type from GUID

Not supported:

  • Feature tests
  • BTF
  • bpf2go
  • perf
  • ringbuf
  • rlimit
  • pin
  • Reading Windows ELFs

The Windows port is still very new and won't be as performant or stable as the Linux part of the code base. There is also no guarantee of stability at the moment.

Build System Improvements

  • Mounting GOCACHE and GOMODCACHE into containers for faster rebuilds with Podman
  • Added -verbose flag to bpf2go and gentypes tools
  • Verbosity defaults to Make's V= environment variable

Documentation

  • Added Windows user-facing documentation
  • Added instructions for working on the Windows port

Bugfixes

  • prog: Fixed program loading loop that would run forever if log size was over kernel maximum
  • prog: Added limits to program load retry attempts
  • collection: Fixed missing Map.Close in collectionLoader.loadMap
  • memory: Fixed off-by-one error in bounds check that prevented accessing the last byte of memory segments
  • map, program: Names passed to kernel are now automatically sanitized

Breaking Changes

ebpf:

  • Unexported SanitizeName function. Map and program names are now automatically sanitized.
  • The ELF reader now always allows dots in names but will strip them if necessary when making syscalls. This will break users with pinned objects that have dots in their names on kernels which don't support dots.

What's Changed

New Contributors

Full Changelog: cilium/ebpf@v0.17.3...v0.18.0

v0.17.3

Compare Source

Fixes for a data race in btf.Spec.Copy (thanks @​paulcacheux) and a buffer overflow when running 32-bit user space on a 64-bit kernel (thanks @​kolyshkin).

What's Changed

Full Changelog: cilium/ebpf@v0.17.2...v0.17.3

v0.17.2

Compare Source

Another minor release to ship some bug fixes, notably for attaching bpf programs to symbols in kernel modules, and for reusing data sections across multiple Collections.

All users are encouraged to upgrade!

Features

Bug Fixes

Other Changes

Thanks to all who contributed and reported issues!

Full Changelog: cilium/ebpf@v0.17.1...v0.17.2

v0.17.1: Hotfix: don't retry endlessly on verifier errors on kernels <6.4

Compare Source

During the prior removal of ProgramOptions.LogSize in v0.16, the tests weren't updated to exercise the retry logic. With the last-minute addition of ProgramOptions.LogSizeStart, a bug was introduced that would cause program loads to retry indefinitely without ever growing the buffer in case of a verifier error on kernels before 6.4. This is now fixed, and the tests were updated to exercise the retry logic.

v0.17.0: Global Variables, Decl Tags, and package pin

Compare Source

Note: the hotfix release 0.17.1 is out. Users are highly encouraged to upgrade.

As we close the door on the year 2024, we're also wrapping up the ebpf-go v0.17 development cycle. This release represents a large body of work and is our largest feature release since BTF.

Users are, as always, highly encouraged to upgrade, and we're looking forward to hearing your feedback on the new Global Variables API. We've been putting this interface trough its paces internally, along with a few eager community members, and we're ready to let the wider community make use of it.

This release also marks the end of our Go 1.21 support; Go 1.22 is required going forward.

Breaking Changes

Before we get to the fun stuff, we need to call out a few breaking changes:

  • Global variables with a static qualifier can no longer be rewritten using CollectionSpec.RewriteConstants()! See the section on global variables under major features below.

  • program: remove LogSize and VerifierError.Truncated by @​lmb in https://github.com/cilium/ebpf/pull/1526

  • prog: add ProgramOptions.LogSizeStart to obtain full log after verifier bug by @​ti-mo in https://github.com/cilium/ebpf/pull/1630

    The ProgramOptions.LogSize field was deprecated and a no-op since 0.16 and has now been removed completely. In its place, a new field was added to obtain full verifier logs when the verifier hits an internal bug. The ProgramOptions.LogSizeStart field controls the starting size of the log buffer. Use this if you have a good understanding of the log size you're expecting, or if you're trying to pull out the full log when the verifier hits an internal bug. The error string now also contains some hints about what happened and how to handle this situation.

  • map: remove MapSpec.Freeze field by @​ti-mo in https://github.com/cilium/ebpf/pull/1558

  • elf_reader: don't use BPF_F_RDONLY_PROG flag to trigger map freezing by @​ti-mo in https://github.com/cilium/ebpf/pull/1568

    The Freeze field was ambiguous from the start, and has been a source of subtle bugs over the years. Automatic map freezing is now done based solely on map name (.(ro)data prefix). If you were manually setting this flag, consider using a conventional map name instead.

  • info: expose ksym info and func info by ProgramInfo by @​Asphaltt in https://github.com/cilium/ebpf/pull/1576

  • info: expose more prog jited info by @​Asphaltt in https://github.com/cilium/ebpf/pull/1598

    Some ext_info types in package btf were redefined to enable pulling raw func and line infos out of Program.Info(). These were all types without methods and all unexported fields, but calling them out regardless in case someone's doing unintended advanced things with BTF.

  • kallsyms: change Modules caching strategy, cache address lookups by @​ti-mo in https://github.com/cilium/ebpf/pull/1590

    Users attaching bpf programs to kernel symbols should see a marked decrease in allocations made in the library during program creation in the general case. Only used entries are now cached, making kallsyms lookups on subsequent program loads free. In the pathological case (new kernel symbols on every load), scanning is repeated, resulting in more CPU time being used instead of holding on to all kallsyms symbols indefinitely. ProgramSpec.KernelModule() was unexported until further notice.

    Also, bpf2go users should now be able to generate Go bindings as unprivileged users once again. Oops!

Major Features

Easy global variables: introducing ebpf.VariableSpec and ebpf.Variable

This has been a frequent ask in the community for years, so we finally bit the bullet and committed to an API to interact with global bpf variables through CollectionSpec.Variables and CollectionSpec.Variables. We've published a small guide over on ebpf-go.dev/concepts/global-variables that details how to use them, so we're not going to reiterate here.

See the documentation on the use of the static qualifier! These are no longer considered global variables, and can't be modified at runtime.

bpf2go now also generates objects to be used with CollectionSpec.Assign and .LoadAndAssign(), and also emits Go type declarations for C types used as bpf C variables. Our test coverage was somewhat lacking for the latter, please drop something on the issue tracker if you're noticing surprising bpf2go output.

Note that it's currently not possible to manually create a VariableSpec and wire it up to a CollectionSpec, so if you were previously relying on e.g. manually assembling a CollectionSpec and using RewriteConstants() in tests, this will no longer work. This may land as the API crystallizes and we settle on a good mechanism to enable this. Please reach out on the Cilium Slack if you'd like to see this happen.

Tags!

As you'll notice, the btf.Struct, btf.Union, btf.Member, btf.Typedef, btf.Func and btf.Var have gained a new field: Tags! Set one or more tags on these objects from bpf C using __attribute__((btf_decl_tag("mytag"))) and
you'll find Tags being populated in Go.

There's also the btf.Func.ParamTags field that holds tags declared on individual function parameters. These are part of the Func since they appear only in the function prototype, not in the parameter type itself, since those can appear in many different types. (it does get confusing!)

Also, an honorable mention to btf.TypeTag, which has now been exported. This allows tagging pointers with an arbitrary string value and is mainly used by the Linux verifier to tag kernel pointers, see the __kptr and __kptr_ref macros in Linux' bpf_helpers.h.

Pins!

We've added a new root-level package pin, which currently features the Load() and WalkDir() functions. Since all LoadPinned* functions in the library now check for the underlying object's type, we've repurposed the machinery to allow loading an opaque pin and returning a Go object of the right type.WalkDir does what it says on the tin, it walks bpffs directories and invokes a callback that received the loaded object. Super convenient!

Minor Features

We've also added a handful of minor features during this release:

Other Changes

Last but not least, there's bugfixes, CI changes and some internal refactoring that happened to eventually make ebpf-go work with ebpf-for-windows. See individual PRs for more context. Stay tuned!


Configuration

📅 Schedule: Branch creation - "after 5am on sunday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.

This PR has been generated by MintMaker (powered by Renovate Bot).

Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot added the dependencies Pull requests that update a dependency file label May 4, 2025
Copy link

openshift-ci bot commented May 4, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign msherif1234 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

openshift-ci bot commented May 4, 2025

Hi @red-hat-konflux[bot]. Thanks for your PR.

I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file needs-ok-to-test
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants