Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update module github.com/open-policy-agent/opa to v0.70.0 #59

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Oct 31, 2023

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/open-policy-agent/opa v0.61.0 -> v0.70.0 age adoption passing confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

open-policy-agent/opa (github.com/open-policy-agent/opa)

v0.70.0

Compare Source

This release contains a mix of features, performance improvements, and bugfixes.

Optimized read mode for OPA's in-memory store (#​7125)

A new optimized read mode has been added to the default in-memory store, where data written to the store is eagerly converted
to AST values (the data format used during evaluation). This removes the time spent converting raw data values to AST
during policy evaluation, thereby improving performance.

The memory footprint of the store will increase, as processed AST values generally take up more space in memory than the
corresponding raw data values, but overall memory usage of OPA might remain more stable over time, as pre-converted data
is shared across evaluations and isn't recomputed for each evaluation, which can cause spikes in memory usage.

This mode can be enabled for opa run, opa eval, and opa bench by setting the --optimize-store-for-read-speed flag.

More information about this feature can be found here.

Co-authored by @​johanfylling and @​ashutosh-narkar.

Topdown and Rego
  • topdown: Use new Inter-Query Value Cache for json.match_schema built-in function (#​7011) authored by @​anderseknert reported by @​lcarva
  • ast: Fix location text attribute for multi-value rules with generated body (#​7128) authored by @​anderseknert
  • ast: Fix regression in opa check where a file that referenced non-provided schemas failed validation (#​7124) authored by @​tjons
  • test/cases/testdata: Fix bug in test by replacing unification by explicit equality check (#​7093) authored by @​matajoh
  • ast: Replace use of yaml.v2 library with yaml.v3. The earlier version would parse yes/no values as boolean. The usage of yaml.v2 in the parser was unintentional and now has been updated to yaml.v3 (#​7090) authored by @​anderseknert
Runtime, Tooling, SDK
  • cmd: Make opa check respect --ignore when --bundle flag is set (#​7136) authored by @​anderseknert
  • server/writer: Properly handle result encoding errors which earlier on failure would emit logs such as superfluous call to WriteHeader() while still returning 200 HTTP status code. Now, errors encoding the payload properly lead to 500 HTTP status code, without extra logs. Also use Header().Set() not Header().Add() to avoid duplicate content-type headers (#​7114) authored by @​srenatus
  • cmd: Support file:// format for TLS key material file flags in opa run (#​7094) authored by @​alexrohozneanu
  • plugins/rest/azure: Support managed identity for App Service / Container Apps (#​7085) reported and authored by @​apc-kamezaki
  • debug: Fix step-over behaviour when exiting partial rules (#​7096) authored by @​johanfylling
  • util+plugins: Fix potential memory leaks with explicit timer cancellation (#​7089) authored by @​philipaconrad
Docs, Website, Ecosystem
Miscellaneous
  • Dependency updates; notably:
    • build(deps): bump github.com/containerd/containerd from 1.7.22 to 1.7.23
    • build(deps): bump github.com/prometheus/client_golang from 1.20.4 to 1.20.5
    • build(deps): bump golang.org/x/net from 0.29.0 to 0.30.0
    • build(deps): bump golang.org/x/time from 0.6.0 to 0.7.0
    • build(deps): bump google.golang.org/grpc from 1.67.0 to 1.67.1

v0.69.0

Compare Source

This release contains a mix of features, bugfixes and necessary tooling and test changes required to support the upcoming OPA 1.0 release.

Inter-Query Value Cache (#​6908)

OPA now has a new inter-query value cache added to the SDK. It is intended to be used for values that are expensive to
compute and can be reused across multiple queries. The cache can be leveraged by built-in functions to store values
that otherwise aren't appropriate for the existing inter-query cache; for instance when the entry size isn't an
appropriate or primary limiting factor for cache eviction.

The default size of the inter-query value cache is unbounded, but can be configured via the
caching.inter_query_builtin_value_cache.max_num_entries configuration field. OPA will drop random items from the cache
if this limit is exceeded.

The cache is used by the regex and glob built-in functions, which previously had individual, non-configurable
caches with a max entry size of 100 each.

Currently, the cache is only exercised when running OPA in server mode (ie. opa run -s). Also this feature is unsupported
for WASM.

Authored by @​ashutosh-narkar, reported by @​amirsalarsafaei

Topdown and Rego
Runtime, Tooling, SDK
  • Future-proofing tests in the sdk, downlaod, server , cmd etc. packages to be 1.0 compatible (authored by @​johanfylling)
  • cmd: Add --v0-compatible flag to make OPA behave as v0.x post v1.0 release (#​7065) authored by @​johanfylling
  • util: Strip UTF-8 BOM from input JSON when found (#​6988) authored by @​anderseknert reported by @​adhilto
  • plugins/rest: Support reading AWS token from the filesystem for the AWS container credential provider (#​6997) authored by @​cmaddalozzo
  • debug: Add RegoOption launch option to debugger for setting custom Rego options (#​7045) authored by @​johanfylling
  • debug: Always include Input and Data variable scopes to ease discoverability of the scopes (#​7074) authored by @​johanfylling
  • wasm: Fix arithmetic comparison for large numbers, caused by an integer overflow (#​6991) authored by @​Ptroger
Docs, Website, Ecosystem
Miscellaneous
  • build: Bump github.com/golang/glob, remove replace directive (#​7024) authored by @​srenatus reported by @​mmannerm
  • Dependency updates; notably:
    • build(deps): bump github.com/containerd/containerd from 1.7.21 to 1.7.22
    • build(deps): bump github.com/prometheus/client_golang from 1.20.2 to 1.20.4
    • build(deps): bump go.uber.org/automaxprocs from 1.5.3 to 1.6.0
    • build(deps): bump golang.org/x/net from 0.28.0 to 0.29.0
    • build(deps): bump google.golang.org/grpc from 1.66.0 to 1.67.0
    • build(go): bump 1.22.5 to 1.23.1 (#​7006) authored by @​srenatus

v0.68.0

Compare Source

This release contains a mix of features and bugfixes.

Breaking Changes
entrypoint annotation implies document scope (#​6798)

The entrypoint annotation's scope requirement has changed from rule to document (https://github.com/open-policy-agent/opa/issues/6798). Furthermore, if no scope annotation is declared for a METADATA block preceding a rule, the presence of an entrypoint annotation with a true value will assign the block a document scope, where the rule scope is otherwise the default.

In practice, a rule entrypoint always point to the entire document and not a particular rule definition. The previous behavior was a bug, and one we've now addressed.

Authored by @​anderseknert

Topdown and Rego
  • ast: Fixing nil-pointer dereference in compiler for partial rule edge case (#​6930) authored by @​johanfylling
  • ast+parser: Add hint to future-proof imports (6968) authored by @​srenatus
  • topdown: Adding unification scope to virtual-cache key. Fixing issue where false positive cache hits can occur when unification "restricts" the scope of ref-head rule evaluation (#​6926) authored by @​johanfylling reported by @​anderseknert
  • topdown: Marshal JWT encode sign inputs as JSON (#​6934) authored by @​charlieegan3
Runtime, Tooling, SDK
Security Fix: CVE-2024-8260 (#​6933)

This release includes a fix where OPA would accept UNC locations on Windows. Reading those could leak NTLM hashes.
The attack vector would include an adversary tricking the user in passing an UNC path to OPA, e.g. opa eval -d $FILE.
UNC paths are now forbidden. If this is an issue for you, please reach out on Slack or GitHub issues.

Reported by Shelly Raban
Authored by @​ashutosh-narkar

Docs, Website, Ecosystem
Miscellaneous
  • build: Make it possible to build only wasm testcases (#​6920) authored by @​andreaTP
  • Dependency updates; notably:
    • build(deps): bump github.com/containerd/containerd from 1.7.20 to 1.7.21
    • build(deps): bump github.com/prometheus/client_golang from 1.19.1 to 1.20.2
    • build(deps): bump golang.org/x/net from 0.27.0 to 0.28.0
    • build(deps): bump golang.org/x/time from 0.5.0 to 0.6.0
    • build(deps): bump google.golang.org/grpc from 1.65.0 to 1.66.0

v0.67.1

Compare Source

This is a bug fix release addressing the following issue:

  • util+server: Fix bug around chunked request handling (#​6906) authored by @​philipaconrad, reported by @​David-Wobrock. A request handling bug was introduced in (#​6868), which caused OPA to treat all incoming chunked requests as if they had zero-length request bodies.

v0.67.0

Compare Source

This release contains a mix of features, a new builtin function (strings.count), performance improvements, and bugfixes.

Breaking Change
Request Body Size Limits

OPA now automatically rejects very large requests (#​6868) authored by @​philipaconrad.
Requests with a Content-Length larger than 128 MB uncompressed, and gzipped requests with payloads that decompress to
larger than 256 MB will be rejected, as part of hardening OPA against denial-of-service attacks. Previously, a large
enough request could cause an OPA instance to run out of memory in low-memory sidecar deployment scenarios, just from
attempting to read the request body into memory.

These changes allow improvements in memory usage for the OPA HTTP server, and help OPA deployments avoid some accidental out-of-memory situations.

For most users, no changes will be needed to continue using OPA. However, to control this behavior, two new configuration
keys are available: server.decoding.max_length and server.decoding.gzip.max_length. These control the max size in
bytes to allow for an incoming request payload, and the maximum size in bytes to allow for a decompressed gzip request payload, respectively.

Here's an example OPA configuration using the new keys:

### Set max request size to 64 MB and max gzip size (decompressed) to be 128 MB.
server:
  decoding:
    max_length: 67108864
    gzip:
      max_length: 134217728
Topdown and Rego
  • topdown: New strings.count builtin which returns the number of non-overlapping instances of a substring in a string (#​6827) authored by @​Manish-Giri
  • format: Produce error when --rego-v1 formatted module has rule name conflicting with keyword (#​6833) authored by @​johanfylling
  • topdown: Add cap to caches for regex and glob built-in functions (#​6828) authored by @​johanfylling. This fixes possible memory leaks where caches grow uncontrollably when large amounts of regexes or globs are generated or originate from the input document.
Runtime, Tooling, SDK
  • repl: Add support for correctly loading bundle modules (#​6872) authored by @​ashutosh-narkar
  • plugins/discovery: Allow un-registration of discovery listener (#​6851) authored by @​mjungsbluth. The discovery plugin allows OPA to register a bundle download status listener but previously did not offer a method to unregister that listener
  • plugins/logs: Reduce amount of work performed inside global lock in decision log plugin (#​6859) authored by @​johanfylling
  • plugins/rest: Add a new client credential attribute to support Azure Workload Identity. This would allow workloads deployed on an Azure Kubernetes Services (AKS) cluster to authenticate and access Azure cloud resources (#​6802) authored by @​ledbutter
  • cmd/inspect: Add ability for opa inspect to inspect a single file outside of any bundle (#​6873) authored by @​tjons
  • cmd+bundle: Add --follow-symlinks flag to the opa build command to allow users to build directories with symlinked files, and have the contents of those symlinked files included in the built bundle (#​6800) authored by @​tjons
  • server: Add missing handling in the server for the explain=fails query value (#​6886) authored by @​acamatcisco
Docs, Website, Ecosystem
  • docs: Update bundle section with an example of a manifest with rego_version and file_rego_versions attributes (#​6885) authored by @​ashutosh-narkar
  • docs: Better link language SDKs to make them more discoverable (#​6866) authored by @​charlieegan3
Miscellaneous
  • ci: Add the OpenSSF Scorecard Github Action to help evaluate the OPA project's security posture (#​6848) authored by @​harshitasao
  • Dependency updates; notably:
    • build(go): bump golang from 1.22.4 to 1.22.5
    • build(deps): bump github.com/containerd/containerd from 1.7.18 to 1.7.20
    • build(deps): bump golang.org/x/net from 0.26.0 to 0.27.0
    • build(deps): bump google.golang.org/grpc from 1.64.0 to 1.65.0
    • build(deps): bump go.opentelemetry.io modules (#​6847)

v0.66.0

Compare Source

v0.66.0

This release contains a mix of features, performance improvements, and bugfixes.

Improved Test Reports (2546)

The opa test command now includes a new --var-values flag that enriches reporting of failed tests with the values and locations for variables in the failing expression.
E.g.:

FAILURES
--------------------------------------------------------------------------------
data.test.test_my_policy: FAIL (0ms)

  test.rego:8:
    	x == y + z
    	|    |   |
    	|    |   3
    	|    y + z: 5
    	|    y: 2
    	1

SUMMARY
--------------------------------------------------------------------------------
test.rego:
data.test.test_foo: FAIL (0ms)
--------------------------------------------------------------------------------
FAIL: 1/1

Authored by @​johanfylling, reported by @​grosser.

Reading stdin in opa exec (#​6538)

The opa exec command now supports reading input documents from stdin with the --stdin-input (-I) flag.
E.g.:

$ echo '{"user": "alice"}' | opa exec --stdin-input --bundle my_bundle

Authored by @​colinjlacy, reported by @​humbertoc-silva.

Topdown and Rego
Runtime, Tooling, SDK
Docs, Website, Ecosystem
Miscellaneous
  • Dependency updates; notably:
    • build(go): bump golang from 1.22.3 to 1.22.4
    • build(deps): bump github.com/containerd/containerd from 1.7.17 to 1.7.18
    • build(deps): bump golang.org/x/net from 0.25.0 to 0.26.0

v0.65.0

Compare Source

This release contains a mix of features and bugfixes.

Runtime, Tooling, SDK
Topdown and Rego
Miscellaneous
  • docs: Add arrays to composite values section (#​6727) authored by @​anderseknert reported by @​SpecLad
  • docs: Add remainder operator to grammar (#​6767) authored by @​anderseknert
  • docs: Fix dynamic metadata object in docs (#​6709) authored by @​antonioberben
  • docs: Use best practice package name in test examples (#​6731) authored by @​asleire
  • docs: Update query API doc with details about overriding the def decision path (#​6745) authored by @​ashutosh-narkar
  • ci: pin GitHub Actions macos runner version and build for darwin/amd64 (#​6720) reported and authored by @​suzuki-shunsuke
  • Dependency updates; notably:
    • build(go): bump golang from 1.22.2 to 1.22.3
    • build(deps): bump github.com/containerd/containerd from 1.7.15 to 1.7.17
    • build(deps): bump github.com/prometheus/client_golang
    • build(deps): bump golang.org/x/net from 0.24.0 to 0.25.0
    • build(deps): bump google.golang.org/grpc from 1.63.2 to 1.64.0
Breaking changes

A new IsSetStmt statement has been added to the intermediate representation (IR).
This is a breaking change for custom IR evaluators, which must interpret this statement in IR plans generated by this OPA version and later.
No actions are required for Wasm users, as long as Wasm modules are built by this OPA version or later.

v0.64.1

Compare Source

This is a bug fix release addressing the following issues:

  • ci: Pin GitHub Actions macos runner version. The architecture of the GitHub Actions Runner macos-latest was changed from amd64 to arm64 and as a result darwin/amd64 binary wasn't released (#​6720) authored by @​suzuki-shunsuke
  • plugins/discovery: Update comparison logic used in the discovery plugin for handling overrides. This fixes a panic that resulted from the comparison of uncomparable types (#​6723) authored by @​ashutosh-narkar

v0.64.0

Compare Source

NOTES:

  • The minimum version of Go required to build the OPA module is 1.21

This release contains a mix of features, a new builtin function (json.marshal_with_options()), performance improvements, and bugfixes.

Breaking Change
Bootstrap configuration overrides Discovered configuration

Previously if Discovery was enabled, other features like bundle downloading and status reporting could not be configured manually.
The reason for this was to prevent OPAs being deployed that could not be controlled through discovery. It's possible that
the system serving the discovered config is unaware of all options locally available in OPA. Hence, we relax the configuration
check when discovery is enabled so that the bootstrap configuration can contain plugin configurations. In case of conflicts,
the bootstrap configuration for plugins wins. These local configuration overrides from the bootstrap configuration are included
in the Status API messages so that management systems can get visibility into the local overrides.

In general, the bootstrap configuration overrides the discovered configuration. Previously this was not the case for all
configuration fields. For example, if the discovered configuration changes the labels section, only labels that are
additional compared to the bootstrap configuration are used, all other changes are ignored. This implies labels in the
bootstrap configuration override those in the discovered configuration. But for fields such as default_decision, default_authorization_decision,
nd_builtin_cache, the discovered configuration would override the bootstrap configuration. Now the behavior is more consistent
for the entire configuration and helps to avoid accidental configuration errors. (#​5722) authored by @​ashutosh-narkar

Add rego_version attribute to the bundle manifest

A new global rego_version attribute is added to the bundle manifest, to inform the OPA runtime about what Rego version (v0/v1) to
use while parsing/compiling contained Rego files. There is also a new file_rego_versions attribute which allows individual
files to override the global Rego version specified by rego_version.

When the version of the contained Rego is advertised by the bundle through this attribute, it is not required to run OPA with the
--v1-compatible (or future --v0-compatible) flag in order to correctly parse, compile and evaluate the bundle's modules.

A bundle's rego_version attribute takes precedence over any applied --v1-compatible/--v0-compatible flag. (#​6578) authored by @​johanfylling

Runtime, Tooling, SDK
  • compile: Fix panic from CLI + metadata entrypoint overlaps. The panic occurs when opa build was provided an entrypoint from both a CLI flag, and via entrypoint metadata annotation. (#​6661) authored by @​philipaconrad
  • cmd/deps: Improve memory footprint and execution time of deps command for policies with high dependency connectivity (#​6685) authored by @​johanfylling
  • server: Keep default decision path in-sync with manager's config (#​6697) authored by @​ashutosh-narkar
  • server: Remove unnecessary AST-to-JSON conversions (#​6665) and (#​6669) authored by @​koponen-styra
  • sdk: Allow customizations of the plugin manager via SDK (#​6662) authored by @​xico42
  • sdk: Fix issue where active parser options aren't propagated to module reload during bundle activation resulting in errors while activating bundles with v1 syntax (#​6689) authored by @​xico42
  • plugins/rest: Close response body in OAuth2 client credentials flow (#​6708) authored by @​johanneslarsson
Topdown and Rego
Docs, Website, Ecosystem
Miscellaneous
  • go.{mod,sum}: Update the go stanza of OPA's go.mod to go 1.21. OPA, used as Go dependency, requires at least go 1.21, and thus works with all officially supported Go versions (1.21.x and 1.22.x) (#​6678) authored by @​srenatus
  • ci: Update Github Actions for Node 20. This change updates the upload-artifact and download-artifact Github actions to the latest version (v4) (#​6670) authored by @​philipaconrad
  • build: Update WASM Rego test generation docker command to address CVE-2022-24765 in Git (#​6703) authored by @​ashutosh-narkar
  • Dependency updates; notably:
    • build(go): bump 1.22.1 -> 1.22.2 (#​6672) authored by @​srenatus
    • build(deps): bump aquasecurity/trivy-action from 0.18.0 to 0.19.0
    • build(deps): bump github.com/containerd/containerd from 1.7.14 to 1.7.15
    • build(deps): bump github.com/prometheus/client_model from 0.5.0 to 0.6.1
    • build(deps): bump golang.org/x/net from 0.22.0 to 0.24.0
    • build(deps): bump google.golang.org/grpc from 1.62.1 to 1.63.2

v0.63.0

Compare Source

This release contains a mix of features, performance improvements, and bugfixes.

Runtime, Tooling, SDK
Topdown and Rego
Docs + Website + Ecosystem
Miscellaneous
  • chore: Remove repetitive words (#​6644) authored by @​occupyhabit
  • Dependency updates; notably:
    • build(deps): bump github.com/containerd/containerd from 1.7.13 to 1.7.14
    • build(deps): bump github.com/golang/protobuf from 1.5.3 to 1.5.4
    • build(deps): bump google.golang.org/grpc from 1.62.0 to 1.62.1

v0.62.1

Compare Source

This is a security fix release for the fixes published in Go 1.22.1.

OPA servers using --authentication=tls would be affected: crafted malicious client certificates could cause a panic in the server.

Also, crafted server certificates could panic OPA's HTTP clients, in bundle plugin, status and decision logs; and http.send calls that verify TLS.

This is CVE-2024-24783 (https://pkg.go.dev/vuln/GO-2024-2598).

Note that there are other security fixes in this Golang release, but whether or not OPA is affected is harder to assess. An update is advised.

Miscellaneous

v0.62.0

Compare Source

NOTES:

  • The minimum version of Go required to build the OPA module is 1.20

This release contains a mix of improvements and bugfixes.

Runtime, Tooling, SDK
  • cmd: Add environment variable backups for command-line flags (#​6508) authored by @​colinjlacy
  • download/oci: Add missing WithBundleParserOpts method to OCI downloader (#​6571) authored by @​slonka
  • logging: avoid %!F(MISSING) in logs by skipping calls to the {Debug,Info,Warn,Error}f functions when there are no arguments (#​6555) authored by @​srenatus
Topdown and Rego
Docs + Website + Ecosystem
Miscellaneous
  • Add Elastic to ADOPTERS.md (#​6568) authored by @​orouz
  • Dependency updates; notably:
    • bump golang 1.21.5 -> 1.22 (#​6595) authored by @​srenatus
    • bump google.golang.org/grpc from 1.61.0 to 1.62.0
    • bump golang.org/x/net from 0.19.0 to 0.21.0
    • bump github.com/containerd/containerd from 1.7.12 to 1.7.13
    • bump aquasecurity/trivy-action from 0.16.1 to 0.17.0
    • bump github.com/prometheus/client_golang from 1.18.0 to 1.19.0
    • bump github.com/opencontainers/image-spec from 1.1.0-rc5 to 1.1.0-rc6

Configuration

📅 Schedule: Branch creation - "on tuesday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.58.0 fix(deps): update module github.com/open-policy-agent/opa to v0.59.0 Nov 30, 2023
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 5ffb8fd to f198770 Compare November 30, 2023 17:34
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.59.0 fix(deps): update module github.com/open-policy-agent/opa to v0.60.0 Dec 21, 2023
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from f198770 to 72a2158 Compare December 21, 2023 01:38
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.60.0 fix(deps): update module github.com/open-policy-agent/opa to v0.61.0 Jan 25, 2024
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 72a2158 to 812d571 Compare January 25, 2024 16:08
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch 2 times, most recently from d065786 to 517a66d Compare February 22, 2024 01:04
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.61.0 fix(deps): update module github.com/open-policy-agent/opa to v0.61.0 - autoclosed Feb 25, 2024
@renovate renovate bot closed this Feb 25, 2024
@renovate renovate bot deleted the renovate/github.com-open-policy-agent-opa-0.x branch February 25, 2024 18:29
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.61.0 - autoclosed fix(deps): update module github.com/open-policy-agent/opa to v0.61.0 Feb 29, 2024
@renovate renovate bot reopened this Feb 29, 2024
@renovate renovate bot restored the renovate/github.com-open-policy-agent-opa-0.x branch February 29, 2024 20:32
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.61.0 fix(deps): update module github.com/open-policy-agent/opa to v0.62.0 Feb 29, 2024
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 517a66d to fb021cd Compare February 29, 2024 22:15
@qlonik qlonik force-pushed the main branch 11 times, most recently from 8a20b77 to 0251fce Compare March 6, 2024 06:37
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from fb021cd to 607623c Compare March 6, 2024 11:17
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.62.0 fix(deps): update module github.com/open-policy-agent/opa to v0.62.1 Mar 6, 2024
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from abca39e to 6818fd1 Compare May 9, 2024 09:46
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 6818fd1 to 55462ec Compare May 30, 2024 15:34
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.64.1 fix(deps): update module github.com/open-policy-agent/opa to v0.65.0 May 30, 2024
Copy link
Contributor Author

renovate bot commented Jun 4, 2024

ℹ Artifact update notice

File name: privacy-profile-composer/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 24 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.20 -> 1.23.4
github.com/cncf/xds/go v0.0.0-20231128003011-0fa0005c9caa -> v0.0.0-20240723142845-024c85f92f20
google.golang.org/grpc v1.61.0 -> v1.67.1
google.golang.org/protobuf v1.31.0 -> v1.34.2
github.com/Microsoft/hcsshim v0.11.4 -> v0.11.7
github.com/agnivade/levenshtein v1.1.1 -> v1.2.0
github.com/cespare/xxhash/v2 v2.2.0 -> v2.3.0
github.com/containerd/containerd v1.7.12 -> v1.7.23
github.com/envoyproxy/protoc-gen-validate v1.0.2 -> v1.1.0
github.com/go-logr/logr v1.4.1 -> v1.4.2
github.com/golang/protobuf v1.5.3 -> v1.5.4
github.com/klauspost/compress v1.16.6 -> v1.17.9
github.com/opencontainers/image-spec v1.1.0-rc5 -> v1.1.0
github.com/prometheus/client_golang v1.18.0 -> v1.20.5
github.com/prometheus/client_model v0.5.0 -> v0.6.1
github.com/prometheus/common v0.45.0 -> v0.55.0
github.com/prometheus/procfs v0.12.0 -> v0.15.1
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.46.1 -> v0.53.0
go.opentelemetry.io/otel/metric v1.21.0 -> v1.28.0
go.opentelemetry.io/otel/sdk v1.21.0 -> v1.28.0
golang.org/x/net v0.19.0 -> v0.30.0
golang.org/x/sync v0.5.0 -> v0.8.0
golang.org/x/sys v0.15.0 -> v0.26.0
golang.org/x/text v0.14.0 -> v0.19.0
golang.org/x/time v0.5.0 -> v0.7.0

@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 55462ec to ab1703b Compare June 17, 2024 13:46
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.65.0 fix(deps): update module github.com/open-policy-agent/opa to v0.66.0 Jun 27, 2024
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from ab1703b to 95d8601 Compare June 27, 2024 15:41
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.66.0 fix(deps): update module github.com/open-policy-agent/opa to v0.66.0 - autoclosed Jun 29, 2024
@renovate renovate bot closed this Jun 29, 2024
@renovate renovate bot deleted the renovate/github.com-open-policy-agent-opa-0.x branch June 29, 2024 22:30
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.66.0 - autoclosed fix(deps): update module github.com/open-policy-agent/opa to v0.66.0 Jun 30, 2024
@renovate renovate bot reopened this Jun 30, 2024
@renovate renovate bot restored the renovate/github.com-open-policy-agent-opa-0.x branch June 30, 2024 00:34
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 95d8601 to 560a846 Compare July 14, 2024 08:03
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 560a846 to dc92613 Compare July 26, 2024 02:14
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.66.0 fix(deps): update module github.com/open-policy-agent/opa to v0.67.0 Jul 26, 2024
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from dc92613 to 0b0f6ef Compare August 5, 2024 18:44
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.67.0 fix(deps): update module github.com/open-policy-agent/opa to v0.67.1 Aug 5, 2024
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 0b0f6ef to 312703a Compare August 29, 2024 19:25
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.67.1 fix(deps): update module github.com/open-policy-agent/opa to v0.68.0 Aug 29, 2024
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 312703a to fadba99 Compare September 11, 2024 14:50
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from fadba99 to 21c9c23 Compare September 30, 2024 15:36
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.68.0 fix(deps): update module github.com/open-policy-agent/opa to v0.69.0 Sep 30, 2024
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 21c9c23 to 0b275df Compare October 31, 2024 20:28
@renovate renovate bot changed the title fix(deps): update module github.com/open-policy-agent/opa to v0.69.0 fix(deps): update module github.com/open-policy-agent/opa to v0.70.0 Oct 31, 2024
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 0b275df to 3536a18 Compare November 17, 2024 15:28
@renovate renovate bot force-pushed the renovate/github.com-open-policy-agent-opa-0.x branch from 3536a18 to 09f39c0 Compare December 22, 2024 17:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants