Skip to content

Update Go modules (major) #679

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

red-hat-konflux[bot]
Copy link
Contributor

This PR contains the following updates:

Package Type Update Change
github.com/caarlos0/env/v6 require major v6.10.1 -> v11.3.1
github.com/cenkalti/backoff/v4 indirect major v4.3.0 -> v5.0.2
github.com/cenkalti/rpc2 indirect major v0.0.0-20210604223624-c1acbc6ec984 -> v1.0.4
github.com/golang/snappy indirect major v0.0.4 -> v1.0.0
github.com/netsampler/goflow2 indirect major v1.3.7 -> v2.2.2
github.com/pion/dtls/v2 indirect major v2.2.12 -> v3.0.6
github.com/pion/transport/v2 indirect major v2.2.10 -> v3.0.7
github.com/prometheus/prometheus indirect major v1.8.2-0.20201028100903-3245b3267b24 -> v2.35.0-retract
github.com/urfave/cli/v2 indirect major v2.27.2 -> v3.2.0
gopkg.in/evanphx/json-patch.v4 indirect major v4.12.0 -> v5.9.11
gopkg.in/yaml.v2 require major v2.4.0 -> v3.0.1
sigs.k8s.io/structured-merge-diff/v4 indirect major v4.6.0 -> v6.0.0

Release Notes

caarlos0/env (github.com/caarlos0/env/v6)

v11.3.1

Compare Source

Changelog

Bug fixes
Other work

Released with GoReleaser Pro!

v11.3.0

Compare Source

Changelog

New Features
Bug fixes
Documentation updates
Other work

Released with GoReleaser Pro!

v11.2.2

Compare Source

Changelog

Documentation updates

Released with GoReleaser Pro!

v11.2.1

Compare Source

Changelog

Bug fixes
Documentation updates

Released with GoReleaser Pro!

v11.2.0

Compare Source

Changelog

New Features
Documentation updates

Released with GoReleaser Pro!

v11.1.0

Compare Source

Changelog

Bug fixes
Other work

Released with GoReleaser Pro!

v11.0.1

Compare Source

Changelog

Bug fixes
Documentation updates

Released with GoReleaser Pro!

v11.0.0

Compare Source

Changelog

Breaking changes
  • Updated module's Go version to 1.18
New Features
Bug fixes
Documentation updates
Other work

Released with GoReleaser Pro!

v10.0.0

Compare Source

Changelog

Breaking changes
New Features
Documentation updates
Other work

Released with GoReleaser Pro!

v9.0.0

Compare Source

Changelog

New Features
Bug fixes
Documentation updates

Migrating from v8

Replace envExpand:"true" with ,expand, e.g.:

type Foo struct {
    Foo string `env:"FOO,expand"`
}

Released with GoReleaser Pro!

v8.0.0

Compare Source

Changelog

Other work

Updating from v7

  • if you use env.Parse with no options, no change is required.
  • if you use env.Parse with one Options{}, call env.ParseWithOptions instead.
  • if you use env.Parse with options, and pass more than one Options{}, merge them into a single one, and use env.ParseWithOptions instead.
  • if you use env.ParseWithFuncs, use env.ParseWithOptions instead, and put your parsers into Options{ FuncMap: <here> }.

Released with GoReleaser Pro!

v7.1.0

Compare Source

Changelog

New Features
Bug fixes
Documentation updates

Released with GoReleaser Pro!

v7.0.0

Compare Source

Changelog

Breaking changes
Documentation updates
Other work

Released with GoReleaser Pro!

cenkalti/backoff (github.com/cenkalti/backoff/v4)

v5.0.2

Compare Source

v5.0.1

Compare Source

v5.0.0

Compare Source

cenkalti/rpc2 (github.com/cenkalti/rpc2)

v1.0.4

Compare Source

v1.0.3

Compare Source

v1.0.2

Compare Source

v1.0.1

Compare Source

golang/snappy (github.com/golang/snappy)

v1.0.0

Compare Source

Latest stable version, as of March 2025.

netsampler/goflow2 (github.com/netsampler/goflow2)

v2.2.2

Compare Source

v2.2.1

Compare Source

v2.2.0

Compare Source

v2.1.5

Compare Source

v2.1.4

Compare Source

v2.1.3

Compare Source

v2.1.2

Compare Source

v2.1.1

Compare Source

v2.1.0

Compare Source

v2.0.0

Compare Source

pion/dtls (github.com/pion/dtls/v2)

v3.0.6

Compare Source

What's Changed

Full Changelog: pion/dtls@v3.0.5...v3.0.6

v3.0.5

Compare Source

Changelog

  • fbc7bae Update docker.io/library/golang Docker tag to v1.24 (#​694)
  • 13b929b Update module golang.org/x/net to v0.37.0 (#​697)
  • 3a0f50a Use crypto.Signer whenever possible (#​681)
  • 16d6306 Update module golang.org/x/net to v0.34.0 (#​693)
  • 8eb9a91 Upgrade golangci-lint, more linters
  • 1c0df61 Update module github.com/pion/logging to v0.2.3 (#​691)
  • 1e4ae60 Update module golang.org/x/net to v0.33.0 [SECURITY]
  • ceb8458 Update module golang.org/x/crypto to v0.31.0 [SECURITY]
  • 4e34db5 Update module golang.org/x/net to v0.31.0
  • 02434c7 Update module golang.org/x/crypto to v0.29.0

v3.0.4

Compare Source

Changelog

  • b3e02c4 Update module golang.org/x/net to v0.30.0
  • 3f61fd2 Fix RSA signature verification issue
  • d796437 Improve fuzzing

v3.0.3

Compare Source

Changelog

  • 98a05d6 Fix incorrect client retransmissions
  • d7f5fee Update module golang.org/x/net to v0.29.0
  • 0be603a Update module golang.org/x/crypto to v0.27.0
  • 0790369 Update module golang.org/x/net to v0.28.0
  • f13eec1 Update module golang.org/x/crypto to v0.26.0
  • e193dc2 Update go.mod version to 1.20

v3.0.2

Compare Source

Changelog

  • 1a02350 Fix race between Conn.Close and Conn.Handshake
  • 032d60c Update CI configs to v0.11.15
  • f6ecbc2 Update docker.io/library/golang Docker tag to v1.23
  • fd18984 Fix pkg.go.dev link

v3.0.1

Compare Source

Changelog

  • e20b162 Fix multiple calls to Handshake
  • f3e8a9e Fix segfault in State::serialize method
  • 5a72b12 Update module github.com/pion/transport/v3 to v3.0.7
  • c5ab822 Update module golang.org/x/net to v0.27.0
  • 23674bd Update module golang.org/x/crypto to v0.25.0
  • 7ab74fb Add support for MKI in use_srtp
  • 7139e0e Fix time units in example
  • 2ed7caa Update module github.com/pion/transport/v3 to v3.0.6

v3.0.0

Compare Source

Pion DTLS v3.0.0 is now available. Pion DTLS is a Go implementation of DTLS. It allows for secure communication over UDP. It is commonly used for VPNs, WebRTC and other real-time protocols.

This release includes 115 commits from 17 authors. This release added Connection Identifiers, concurrent handshaking when Accepting inbound connections, Censorship Circumvention and better resilience against packet loss during handshaking.

A special thank you to kevmo314 and hasheddan for all their hard work on making this release happen.

This release contains breaking changes. Please read the following carefully, the breakage can't be caught at compile time. Each change will have a linked commit. Looking at examples/ in the linked commit should show what code you need to change in your application.

Breaking Changes

Before /v2 Pion DTLS would handshake on Server or Client creation. This design caused the Accept implementation to be blocking. A new connection couldn't be accept until the previous one had finished.
This design also doesn't match the crypto/tls implementation in stdlib. This mismatch would cause frustration/confusion for users.

Now the handshaking only occurs when Read,Write or Handshake is called. In most cases users shouldn't notice a difference.
If you do want a Handshake performed without a Read or Write this is the change needed.

Before
  dtlsConn, err := dtls.Client(dtlsEndpoint, dtlsConfig)
  if err != nil {
    // handle error
  }

  // Perform logic from negotiated SRTP Profile
  srtpProfile, ok := dtlsConn.SelectedSRTPProtectionProfile()
After
  dtlsConn, err = dtls.Client(dtlsEndpoint, dtlsEndpoint.RemoteAddr(), dtlsConfig)
  if err != nil {
    // handle error
  }

  err = dtlsConn.Handshake()
  if err != nil {
    // Explicitly perform handshake
  }

  // Perform logic from negotiated SRTP Profile
  srtpProfile, ok := dtlsConn.SelectedSRTPProtectionProfile()

This change was made in e4064683

New Features

Connection IDs

Connection IDs is a new feature added to the DTLS protocol itself. This change allows for clients to change IPs/Ports during a session. This allows for devices to roam (like phones) or for low power devices to shut down and reconnect without losing their DTLS session!

Connection ID generation is pluggable via the dtls.Config structure, and a random CID generator with a static size is provided for convenience. A new example has been added to demonstrate this functionality.

For those interested in digging deeper into the full set of changes, the majority of work was done in #​570.

Censorship Circumvention

Software that is used to circumvent censorship like snowflake uses Pion. To block this (and other) software goverments have looked for patterns and differences in Pion DTLS and blocked it.

This new release contains hooks that allows users to randomize and circumvent these blocks. Users can modify ClientHello, ServerHello and CertificateRequest. Users can also smuggle information in a ServerHello/ClientHello RandomBytes.

You can see them all here here

Changelog

The complete log between v2.2.7 and v3.0.0:

  • 0a8d838 Prepare /v3
  • b6fd38e Update module github.com/pion/transport/v3 to v3.0.5
  • e406468 Perform handshake on first read/write
  • 6178064 Mark NULL and AES256CM SRTP ciphers as supported
  • bc3159a Added DTLS-SRTP IDs for NULL and AES256CM ciphers
  • d013d0c On Read Retransmit send FSM to SENDING
  • ec76652 Retransmit last flight when in finished
  • 602dc71 Make localConnectionID thread safe
  • 0a1b73a Respect disableRetransmitBackoff
  • a6d9640 Add OnConnectionAttempt to Config
  • 48d6748 Implement retransmit backoff according to 4.2.4.1
  • 45e16a0 Update module golang.org/x/net to v0.26.0
  • a5d1fac Flight3: respect curves configuration
  • 61b3466 Add ability to select cert based on ch rand bytes
  • eddca22 Update module golang.org/x/crypto to v0.24.0
  • edc7ad0 Limit size of encrypted packet queue
  • fbbdf66 Update module golang.org/x/net to v0.25.0
  • efd6737 Add test for PSK and Identity
  • cb62aac Fix typo in test
  • 494c1a3 Remove testify dependency
  • adec94a Update golang Docker tag to v1.22
  • 8738ce1 Add handshake hooking
  • 2c36d63 Update module golang.org/x/net to v0.24.0
  • d606c79 Update module golang.org/x/crypto to v0.22.0
  • f6f666e Update module golang.org/x/net to v0.23.0 [SECURITY]
  • e008bc4 Update CI configs to v0.11.12
  • 3e667b0 Update go.mod version to 1.19
  • ae51db9 Update CI configs to v0.11.7
  • 8244c45 Update CI configs to v0.11.4
  • 0ad9cfd Update module github.com/pion/transport/v3 to v3.0.2
  • 8a93e0e Fix TestErrorsTemporary
  • 38e39e4 Update module golang.org/x/net to v0.22.0
  • a245727 Update module golang.org/x/crypto to v0.21.0
  • 5e95b5c Update module github.com/stretchr/testify to v1.9.0
  • 35a00d3 Fix linter errors
  • 96b8c29 Fix linter errors
  • 2597464 Update module golang.org/x/net to v0.20.0
  • 42b6772 Update module golang.org/x/crypto to v0.18.0
  • bb54a30 If not found in the cache return nil
  • 3427819 Format code
  • 798b32a Fix flight1parse processing exception
  • ba72fba Update CI configs to v0.11.3
  • 520d84c Update CI configs to v0.11.0
  • cfa868c Remove 'AUTHORS.txt' from README.md
  • b4a403c Remove 'Generate Authors' workflow
  • 9ffd96c Drop invalid record silently during handshake
  • 3e8a7d7 Update module golang.org/x/crypto to v0.17.0 [SECURITY]
  • dc751e3 Update module golang.org/x/net to v0.19.0
  • 3f3d833 Update module golang.org/x/crypto to v0.16.0
  • a8f7062 Use atomic to avoid stale SRTP protection profile
  • 9cc3df9 Respect Algorithm value in CertificateRequest
  • 7faf25f Update module golang.org/x/net to v0.17.0 [SECURITY]
  • c864545 Update module golang.org/x/net to v0.15.0
  • 28431d9 Export CipherSuiteID in connection State
  • 8401874 Update module golang.org/x/crypto to v0.13.0
  • 744e27a Update actions/checkout action to v4
  • 2b584af Specifying underlying type of conn ID atomic.Value
  • 70caf30 Use atomic.Value to maintain Go 1.13 compatibility
  • 60064c6 Update module github.com/pion/transport/v3 to v3.0.1
  • ef50d6b Update AUTHORS.txt
  • 7e5003a Update AUTHORS.txt
  • dbc7fd9 Update module github.com/pion/transport/v3 to v3.0.0
  • a681f67 Correctly identify client and server with PSK ID
  • e85f106 Update module github.com/pion/transport/v2 to v2.2.2
  • 7bf18f8 Update module golang.org/x/net to v0.14.0
  • 609e5be Clear CIDs on potential session resumption
  • e142ee1 Serialize CIDs in state
  • 37fbc04 Add CID send only client example
  • 6df50a6 Add CID listener example
  • f5875c1 Set UDP routing if CID is enabled
  • e663309 Add CID routing unit tests
  • 9db84b5 Add CID based datagram routing
  • a8998af Add UDP net.PacketListener unit tests
  • 71db42b Introduce UDP net.PacketListener
  • 3afeb7d Add PacketBuffer unit tests
  • eb305b1 Introduce net PacketBuffer
  • 703da0c Consume net package in tests
  • 4f53ce1 Introduce net package
  • f1d8b0a Wrap Alerts when CID is negotiated
  • 3082313 Convert nil CIDs to empty byte slice
  • 83b1254 Fix name of cipher suite initialization function
  • 818feb8 Set timeout to 10 minutes on e2e workflow
  • d29c6f0 Add basic connection ID generators
  • 2f2bc8d Add e2e CID tests
  • ee04141 Update tests to wrap net.Conn
  • f960a37 Wrap net.Conn in DTLS listener
  • afb61f1 Update DTLS Conn to use PacketConn and CID
  • d082911 Add Conn to PacketConn utility
  • e5420de Update handshaker to handle CID extension
  • 8922879 Update ciphersuites to support CIDs
  • 8ba47cb Implement AEAD additional data with CID
  • 27fd131 Add local and remote CID to state
  • 9a37bfd Implement AddUint48 utility
  • 1ce6f27 Add CID content type
  • 6af61b1 Allow packets to specify CID wrapped
  • b7b1e44 Add support for CID related generators
  • 2005135 Add support for parsing CID records
  • 9e4a4e7 Add DTLS connection ID extension
  • e9b3ce0 Update pion/transport to latest
  • a1d270f Update module golang.org/x/crypto to v0.12.0
  • a6eca6c Update CI configs to v0.10.11
  • eb34e7d Update module golang.org/x/net to v0.13.0
  • c9eb5f2 Update module golang.org/x/net to v0.12.0
  • b033847 Clean up unneccessary nested logic
  • 7307f62 Fix return of nil alertErrors
  • b905606 Add unmarshal unit tests for extensions
  • 0736d45 Fix parsing supported EC point formats
  • 93704b3 Add Daniel Mangum to AUTHORS.txt
  • cabe5b8 Enable Supported Signature Algorithms
  • 265bf11 Enable Elliptic Curve Supported Point Formats
  • d7303d0 Wait for OpenSSL server shutdown in e2e test
  • 159122f Update e2e Go image to 1.20
  • 8a11cf2 Remove extraneous error checks in handshaker
  • 4fc3d8f Update module golang.org/x/net to v0.11.0
  • 4b76abf Update module golang.org/x/crypto to v0.10.0
pion/transport (github.com/pion/transport/v2)

v3.0.7

Compare Source

What's Changed

Full Changelog: pion/transport@v3.0.6...v3.0.7

v3.0.6

Compare Source

What's Changed

Full Changelog: pion/transport@v3.0.5...v3.0.6

v3.0.5

Compare Source

What's Changed

Full Changelog: pion/transport@v3.0.4...v3.0.5

v3.0.4

Compare Source

What's Changed

Full Changelog: pion/transport@v3.0.3...v3.0.4

v3.0.3

Compare Source

What's Changed

New Contributors

Full Changelog: pion/transport@v3.0.2...v3.0.3

v3.0.2

Compare Source

What's Changed


Configuration

📅 Schedule: Branch creation - "after 5am on sunday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.

This PR has been generated by MintMaker (powered by Renovate Bot).

@red-hat-konflux red-hat-konflux bot added the dependencies Pull requests that update a dependency file label Apr 27, 2025
Copy link

openshift-ci bot commented Apr 27, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign eranra for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

openshift-ci bot commented Apr 27, 2025

Hi @red-hat-konflux[bot]. Thanks for your PR.

I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-1.8/major-go-modules branch from f6ddb8f to 0257d9e Compare April 27, 2025 21:34
@jotak jotak closed this Apr 28, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file needs-ok-to-test
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant