Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump the all group with 7 updates #1806

Closed
wants to merge 1 commit into from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jul 29, 2024

Bumps the all group with 7 updates:

Package From To
github.com/enterprise-contract/enterprise-contract-controller/api 0.1.49 0.1.50
github.com/gkampitakis/go-snaps 0.5.5 0.5.6
github.com/open-policy-agent/conftest 0.54.0 0.55.0
github.com/open-policy-agent/opa 0.66.0 0.67.0
github.com/sigstore/cosign/v2 2.2.4 2.3.0
github.com/sigstore/sigstore 1.8.4 1.8.7
golang.org/x/exp 0.0.0-20231214170342-aacd6d4b4611 0.0.0-20240112132812-db7319d0e0e3

Updates github.com/enterprise-contract/enterprise-contract-controller/api from 0.1.49 to 0.1.50

Release notes

Sourced from github.com/enterprise-contract/enterprise-contract-controller/api's releases.

API Release api/v0.1.50

What's Changed

Full Changelog: enterprise-contract/enterprise-contract-controller@api/v0.1.49...api/v0.1.50

Commits
  • c4e5c05 Merge pull request #369 from enterprise-contract/dependabot/github_actions/so...
  • a96b8d8 Merge pull request #368 from enterprise-contract/dependabot/github_actions/st...
  • c7f9eee Merge pull request #367 from enterprise-contract/dependabot/github_actions/gi...
  • 5ed0b88 Merge pull request #363 from enterprise-contract/dependabot/go_modules/api/k8...
  • 988f770 Bump k8s.io/apiextensions-apiserver from 0.29.6 to 0.29.7 in /api
  • aeff6c0 Bump softprops/action-gh-release from 2.0.6 to 2.0.8
  • c45b339 Bump step-security/harden-runner from 2.8.1 to 2.9.0
  • d9430ab Bump github/codeql-action from 3.25.12 to 3.25.13
  • 8a7c6e7 Merge pull request #362 from enterprise-contract/dependabot/github_actions/gi...
  • d89d6f5 Bump github/codeql-action from 3.25.11 to 3.25.12
  • See full diff in compare view

Updates github.com/gkampitakis/go-snaps from 0.5.5 to 0.5.6

Release notes

Sourced from github.com/gkampitakis/go-snaps's releases.

v0.5.6

What's Changed

Full Changelog: gkampitakis/go-snaps@v0.5.5...v0.5.6

Commits

Updates github.com/open-policy-agent/conftest from 0.54.0 to 0.55.0

Release notes

Sourced from github.com/open-policy-agent/conftest's releases.

v0.55.0

Changelog

Bug Fixes

  • 2f1385787771d330dcbe63917e392d257180152d: fix: update regex to excape the dot in it (#975) (@​wangshu3000)

OPA Changes

  • 2444462665f253d5f9ba520040ca0a9a49dfcf1e: build(deps): bump github.com/open-policy-agent/opa from 0.66.0 to 0.67.0 (#977) (@​dependabot[bot])

Other Changes

  • 99d588fa8d0864c727b9569e7b84126a9dd6b45b: build(deps): bump github.com/moby/buildkit from 0.14.1 to 0.15.1 (#976) (@​dependabot[bot])
  • 2275d3f6c02bd28146f5fda3c53338d0b3fcd454: build(deps): bump golang from 1.22.4-alpine to 1.22.5-alpine (#970) (@​dependabot[bot])
  • 3ca1e3a46c33b40b9aa31e63cbf30cdcb01b812a: ci: Bump Docker login to v3 (#968) (@​jalseth)
  • daab0c9b05a3452500f27fc0b56bc25eeff772c9: ci: Bump golang-ci action to v6 (#974) (@​jalseth)
  • 066d0f4dc07abace15d31164ad92fe4d0d072e88: ci: Pin goreleaser to v1 (#969) (@​jalseth)
Commits
  • 99d588f build(deps): bump github.com/moby/buildkit from 0.14.1 to 0.15.1 (#976)
  • 2444462 build(deps): bump github.com/open-policy-agent/opa from 0.66.0 to 0.67.0 (#977)
  • 2f13857 fix: update regex to excape the dot in it (#975)
  • daab0c9 ci: Bump golang-ci action to v6 (#974)
  • 2275d3f build(deps): bump golang from 1.22.4-alpine to 1.22.5-alpine (#970)
  • 066d0f4 ci: Pin goreleaser to v1 (#969)
  • 3ca1e3a ci: Bump Docker login to v3 (#968)
  • See full diff in compare view

Updates github.com/open-policy-agent/opa from 0.66.0 to 0.67.0

Release notes

Sourced from github.com/open-policy-agent/opa's releases.

v0.67.0

This release contains a mix of features, a new builtin function (strings.count), performance improvements, and bugfixes.

Breaking Change

Request Body Size Limits

OPA now automatically rejects very large requests (#6868) authored by @​philipaconrad. Requests with a Content-Length larger than 128 MB uncompressed, and gzipped requests with payloads that decompress to larger than 256 MB will be rejected, as part of hardening OPA against denial-of-service attacks. Previously, a large enough request could cause an OPA instance to run out of memory in low-memory sidecar deployment scenarios, just from attempting to read the request body into memory.

These changes allow improvements in memory usage for the OPA HTTP server, and help OPA deployments avoid some accidental out-of-memory situations.

For most users, no changes will be needed to continue using OPA. However, to control this behavior, two new configuration keys are available: server.decoding.max_length and server.decoding.gzip.max_length. These control the max size in bytes to allow for an incoming request payload, and the maximum size in bytes to allow for a decompressed gzip request payload, respectively.

Here's an example OPA configuration using the new keys:

# Set max request size to 64 MB and max gzip size (decompressed) to be 128 MB.
server:
  decoding:
    max_length: 67108864
    gzip:
      max_length: 134217728

Topdown and Rego

  • topdown: New strings.count builtin which returns the number of non-overlapping instances of a substring in a string (#6827) authored by @​Manish-Giri
  • format: Produce error when --rego-v1 formatted module has rule name conflicting with keyword (#6833) authored by @​johanfylling
  • topdown: Add cap to caches for regex and glob built-in functions (#6828) authored by @​johanfylling. This fixes possible memory leaks where caches grow uncontrollably when large amounts of regexes or globs are generated or originate from the input document.

Runtime, Tooling, SDK

  • repl: Add support for correctly loading bundle modules (#6872) authored by @​ashutosh-narkar
  • plugins/discovery: Allow un-registration of discovery listener (#6851) authored by @​mjungsbluth. The discovery plugin allows OPA to register a bundle download status listener but previously did not offer a method to unregister that listener
  • plugins/logs: Reduce amount of work performed inside global lock in decision log plugin (#6859) authored by @​johanfylling
  • plugins/rest: Add a new client credential attribute to support Azure Workload Identity. This would allow workloads deployed on an Azure Kubernetes Services (AKS) cluster to authenticate and access Azure cloud resources (#6802) authored by @​ledbutter
  • cmd/inspect: Add ability for opa inspect to inspect a single file outside of any bundle (#6873) authored by @​tjons
  • cmd+bundle: Add --follow-symlinks flag to the opa build command to allow users to build directories with symlinked files, and have the contents of those symlinked files included in the built bundle (#6800) authored by @​tjons
  • server: Add missing handling in the server for the explain=fails query value (#6886) authored by @​acamatcisco

Docs, Website, Ecosystem

  • docs: Update bundle section with an example of a manifest with rego_version and file_rego_versions attributes (#6885) authored by @​ashutosh-narkar
  • docs: Better link language SDKs to make them more discoverable (#6866) authored by @​charlieegan3

Miscellaneous

... (truncated)

Changelog

Sourced from github.com/open-policy-agent/opa's changelog.

0.67.0

This release contains a mix of features, a new builtin function (strings.count), performance improvements, and bugfixes.

Breaking Change

Request Body Size Limits

OPA now automatically rejects very large requests (#6868) authored by @​philipaconrad. Requests with a Content-Length larger than 128 MB uncompressed, and gzipped requests with payloads that decompress to larger than 256 MB will be rejected, as part of hardening OPA against denial-of-service attacks. Previously, a large enough request could cause an OPA instance to run out of memory in low-memory sidecar deployment scenarios, just from attempting to read the request body into memory.

These changes allow improvements in memory usage for the OPA HTTP server, and help OPA deployments avoid some accidental out-of-memory situations.

For most users, no changes will be needed to continue using OPA. However, to control this behavior, two new configuration keys are available: server.decoding.max_length and server.decoding.gzip.max_length. These control the max size in bytes to allow for an incoming request payload, and the maximum size in bytes to allow for a decompressed gzip request payload, respectively.

Here's an example OPA configuration using the new keys:

# Set max request size to 64 MB and max gzip size (decompressed) to be 128 MB.
server:
  decoding:
    max_length: 67108864
    gzip:
      max_length: 134217728

Topdown and Rego

  • topdown: New strings.count builtin which returns the number of non-overlapping instances of a substring in a string (#6827) authored by @​Manish-Giri
  • format: Produce error when --rego-v1 formatted module has rule name conflicting with keyword (#6833) authored by @​johanfylling
  • topdown: Add cap to caches for regex and glob built-in functions (#6828) authored by @​johanfylling. This fixes possible memory leaks where caches grow uncontrollably when large amounts of regexes or globs are generated or originate from the input document.

Runtime, Tooling, SDK

  • repl: Add support for correctly loading bundle modules (#6872) authored by @​ashutosh-narkar
  • plugins/discovery: Allow un-registration of discovery listener (#6851) authored by @​mjungsbluth. The discovery plugin allows OPA to register a bundle download status listener but previously did not offer a method to unregister that listener
  • plugins/logs: Reduce amount of work performed inside global lock in decision log plugin (#6859) authored by @​johanfylling
  • plugins/rest: Add a new client credential attribute to support Azure Workload Identity. This would allow workloads deployed on an Azure Kubernetes Services (AKS) cluster to authenticate and access Azure cloud resources (#6802) authored by @​ledbutter
  • cmd/inspect: Add ability for opa inspect to inspect a single file outside of any bundle (#6873) authored by @​tjons
  • cmd+bundle: Add --follow-symlinks flag to the opa build command to allow users to build directories with symlinked files, and have the contents of those symlinked files included in the built bundle (#6800) authored by @​tjons
  • server: Add missing handling in the server for the explain=fails query value (#6886) authored by @​acamatcisco

Docs, Website, Ecosystem

  • docs: Update bundle section with an example of a manifest with rego_version and file_rego_versions attributes (#6885) authored by @​ashutosh-narkar
  • docs: Better link language SDKs to make them more discoverable (#6866) authored by @​charlieegan3

... (truncated)

Commits
  • b62ae6b Prepare v0.67.0 release
  • bec8e1a build(deps): bump github/codeql-action from 3.25.13 to 3.25.14 (#6888)
  • d48fdd9 server: Add missing handling for explain=fails to the REST API.
  • 959f9e5 docs: Add an example of a manifest with attribute
  • a793f27 repl: Add support for correctly loading bundle modules
  • c5706ee server+util: Limit max request sizes, prealloc request buffers (#6868)
  • 0ca35e2 build(deps): bump docker/setup-buildx-action from 3.4.0 to 3.5.0 (#6880)
  • f9ccb66 build(deps): bump github/codeql-action from 3.25.12 to 3.25.13 (#6881)
  • 0db1f8f build(deps): bump docker/setup-qemu-action from 3.1.0 to 3.2.0 (#6882)
  • ac3ddf9 docs: Update generated CLI docs
  • Additional commits viewable in compare view

Updates github.com/sigstore/cosign/v2 from 2.2.4 to 2.3.0

Release notes

Sourced from github.com/sigstore/cosign/v2's releases.

v2.3.0

Features

  • Add PayloadProvider interface to decouple AttestationToPayloadJSON from oci.Signature interface (#3693)
  • add registry options to cosign save (#3645)
  • Add debug providers command. (#3728)
  • Make config layers in ociremote mountable (#3741)
  • upgrade to go1.22 (#3739)
  • adds tsa cert chain check for env var or tuf targets. (#3600)
  • add --ca-roots and --ca-intermediates flags to 'cosign verify' (#3464)
  • add handling of keyless verification for all verify commands (#3761)

Bug Fixes

  • fix: close attestationFile (#3679)
  • Set bundleVerified to true after Rekor verification (Resolves #3740) (#3745)

Documentation

  • Document ImportKeyPair and LoadPrivateKey functions in pkg/cosign (#3776)

Testing

  • Refactor KMS E2E tests (#3684)
  • Remove sign_blob_test.sh test (#3707)
  • Remove KMS E2E test script (#3702)
  • Refactor insecure registry E2E tests (#3701)

Contributors

  • Billy Lynch
  • bminahan73
  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Cody Soyland
  • Colleen Murphy
  • Dmitry Savintsev
  • guangwu
  • Hayden B
  • Hector Fernandez
  • ian hundere
  • Jason Power
  • Jon Johnson
  • Max Lambrecht
  • Meeki1l

Full Changelog: sigstore/cosign@v2.2.4...v2.3.0

Changelog

Sourced from github.com/sigstore/cosign/v2's changelog.

v2.3.0

Features

  • Add PayloadProvider interface to decouple AttestationToPayloadJSON from oci.Signature interface (#3693)
  • add registry options to cosign save (#3645)
  • Add debug providers command. (#3728)
  • Make config layers in ociremote mountable (#3741)
  • upgrade to go1.22 (#3739)
  • adds tsa cert chain check for env var or tuf targets. (#3600)
  • add --ca-roots and --ca-intermediates flags to 'cosign verify' (#3464)
  • add handling of keyless verification for all verify commands (#3761)

Bug Fixes

  • fix: close attestationFile (#3679)
  • Set bundleVerified to true after Rekor verification (Resolves #3740) (#3745)

Documentation

  • Document ImportKeyPair and LoadPrivateKey functions in pkg/cosign (#3776)

Testing

  • Refactor KMS E2E tests (#3684)
  • Remove sign_blob_test.sh test (#3707)
  • Remove KMS E2E test script (#3702)
  • Refactor insecure registry E2E tests (#3701)

Contributors

  • Billy Lynch
  • bminahan73
  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Cody Soyland
  • Colleen Murphy
  • Dmitry Savintsev
  • guangwu
  • Hayden B
  • Hector Fernandez
  • ian hundere
  • Jason Power
  • Jon Johnson
  • Max Lambrecht
  • Meeki1l
Commits
  • deed363 chore(deps): bump github.com/xanzy/go-gitlab from 0.106.0 to 0.107.0 (#3792)
  • c6f89f8 chore(deps): bump github.com/buildkite/agent/v3 from 3.74.1 to 3.75.1 (#3793)
  • aeba473 Add CHANGELOG for v2.3.0 (#3789)
  • 20d4724 chore(deps): bump github.com/google/go-containerregistry (#3790)
  • 4684fd6 chore(deps): bump the gomod group with 5 updates (#3780)
  • 3c6c5c9 chore(deps): bump github.com/sigstore/fulcio from 1.4.5 to 1.5.1 (#3784)
  • 05026ee chore(deps): bump github.com/google/go-containerregistry (#3783)
  • f9270c0 chore(deps): bump google.golang.org/api from 0.187.0 to 0.188.0 (#3782)
  • 4fd699c chore(deps): bump go.step.sm/crypto from 0.48.1 to 0.50.0 (#3781)
  • 13d3a56 chore(deps): bump the actions group across 1 directory with 2 updates (#3785)
  • Additional commits viewable in compare view

Updates github.com/sigstore/sigstore from 1.8.4 to 1.8.7

Release notes

Sourced from github.com/sigstore/sigstore's releases.

v1.8.7

Dependencies updates only

What's Changed

Full Changelog: sigstore/sigstore@v1.8.6...v1.8.7

v1.8.6

What's Changed

New Contributors

Full Changelog: sigstore/sigstore@v1.8.5...v1.8.6

v1.8.5

Major are dependencies updates

What's Changed

... (truncated)

Commits
  • cb8b4bb sync go mod
  • 2506e5d build(deps): Bump the all group across 1 directory with 4 updates
  • 9a70270 build(deps): Bump google.golang.org/grpc in /pkg/signature/kms/gcp
  • f6b4bb5 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • aebd23d build(deps): Bump actions/upload-artifact in the all group
  • ec4bc1a build(deps): Bump the all group across 1 directory with 2 updates
  • aeb9782 build(deps): Bump golang.org/x/crypto
  • 016e2e3 build(deps): Bump github.com/sigstore/sigstore
  • 8243831 build(deps): Bump hashicorp/vault in /test/e2e in the all group
  • 51d791e build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • Additional commits viewable in compare view

Updates golang.org/x/exp from 0.0.0-20231214170342-aacd6d4b4611 to 0.0.0-20240112132812-db7319d0e0e3

Commits

Most Recent Ignore Conditions Applied to This Pull Request
Dependency Name Ignore Conditions
github.com/open-policy-agent/conftest [< 0.40, > 0.39.1-0.20230309145322-347708d2fd13]
github.com/open-policy-agent/opa [>= 0.50.a, < 0.51]
github.com/enterprise-contract/enterprise-contract-controller/api [>= 0.1.33.a, < 0.1.34]
github.com/sigstore/sigstore [< 1.9, > 1.8.4]

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the all group with 7 updates:

| Package | From | To |
| --- | --- | --- |
| [github.com/enterprise-contract/enterprise-contract-controller/api](https://github.com/enterprise-contract/enterprise-contract-controller) | `0.1.49` | `0.1.50` |
| [github.com/gkampitakis/go-snaps](https://github.com/gkampitakis/go-snaps) | `0.5.5` | `0.5.6` |
| [github.com/open-policy-agent/conftest](https://github.com/open-policy-agent/conftest) | `0.54.0` | `0.55.0` |
| [github.com/open-policy-agent/opa](https://github.com/open-policy-agent/opa) | `0.66.0` | `0.67.0` |
| [github.com/sigstore/cosign/v2](https://github.com/sigstore/cosign) | `2.2.4` | `2.3.0` |
| [github.com/sigstore/sigstore](https://github.com/sigstore/sigstore) | `1.8.4` | `1.8.7` |
| [golang.org/x/exp](https://github.com/golang/exp) | `0.0.0-20231214170342-aacd6d4b4611` | `0.0.0-20240112132812-db7319d0e0e3` |


Updates `github.com/enterprise-contract/enterprise-contract-controller/api` from 0.1.49 to 0.1.50
- [Release notes](https://github.com/enterprise-contract/enterprise-contract-controller/releases)
- [Commits](enterprise-contract/enterprise-contract-controller@api/v0.1.49...api/v0.1.50)

Updates `github.com/gkampitakis/go-snaps` from 0.5.5 to 0.5.6
- [Release notes](https://github.com/gkampitakis/go-snaps/releases)
- [Commits](gkampitakis/go-snaps@v0.5.5...v0.5.6)

Updates `github.com/open-policy-agent/conftest` from 0.54.0 to 0.55.0
- [Release notes](https://github.com/open-policy-agent/conftest/releases)
- [Changelog](https://github.com/open-policy-agent/conftest/blob/master/.goreleaser.yml)
- [Commits](open-policy-agent/conftest@v0.54.0...v0.55.0)

Updates `github.com/open-policy-agent/opa` from 0.66.0 to 0.67.0
- [Release notes](https://github.com/open-policy-agent/opa/releases)
- [Changelog](https://github.com/open-policy-agent/opa/blob/main/CHANGELOG.md)
- [Commits](open-policy-agent/opa@v0.66.0...v0.67.0)

Updates `github.com/sigstore/cosign/v2` from 2.2.4 to 2.3.0
- [Release notes](https://github.com/sigstore/cosign/releases)
- [Changelog](https://github.com/sigstore/cosign/blob/main/CHANGELOG.md)
- [Commits](sigstore/cosign@v2.2.4...v2.3.0)

Updates `github.com/sigstore/sigstore` from 1.8.4 to 1.8.7
- [Release notes](https://github.com/sigstore/sigstore/releases)
- [Commits](sigstore/sigstore@v1.8.4...v1.8.7)

Updates `golang.org/x/exp` from 0.0.0-20231214170342-aacd6d4b4611 to 0.0.0-20240112132812-db7319d0e0e3
- [Commits](https://github.com/golang/exp/commits)

---
updated-dependencies:
- dependency-name: github.com/enterprise-contract/enterprise-contract-controller/api
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/gkampitakis/go-snaps
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/open-policy-agent/conftest
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: github.com/open-policy-agent/opa
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: github.com/sigstore/cosign/v2
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: github.com/sigstore/sigstore
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: golang.org/x/exp
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jul 29, 2024
@zregvart
Copy link
Member

zregvart commented Jul 30, 2024

@dependabot ignore github.com/sigstore/cosign/v2 major version

Copy link
Contributor Author

dependabot bot commented on behalf of github Jul 30, 2024

OK, I won't notify you about version 2.x.x of github.com/sigstore/cosign/v2 again, unless you unignore it.

@zregvart
Copy link
Member

github.com/sigstore/cosign/v2 is on golang 1.22 to which we can't upgrade right now.

Copy link
Contributor Author

dependabot bot commented on behalf of github Jul 30, 2024

Looks like these dependencies are updatable in another way, so this is no longer needed.

@dependabot dependabot bot closed this Jul 30, 2024
@dependabot dependabot bot deleted the dependabot/go_modules/all-3444882b70 branch July 30, 2024 08:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant