Skip to content

fix(deps): update go modules #680

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Apr 28, 2025
Merged

fix(deps): update go modules #680

merged 2 commits into from
Apr 28, 2025

Conversation

red-hat-konflux[bot]
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Apr 27, 2025

Amended by @jotak

  • Keep go 1.23
  • Keep k8s deps (would need go 1.24)
  • Keep ovnk deps (breaks the build) and related

This PR contains the following updates:

Package Type Update Change
github.com/containernetworking/cni indirect minor v1.1.2 -> v1.3.0
github.com/containernetworking/plugins indirect minor v1.2.0 -> v1.7.1
github.com/coreos/go-iptables indirect minor v0.6.0 -> v0.8.0
github.com/cpuguy83/go-md2man/v2 indirect patch v2.0.6 -> v2.0.7
github.com/minio/minio-go/v7 indirect patch v7.0.90 -> v7.0.91
github.com/netobserv/flowlogs-pipeline require patch v1.9.0-crc0.0.20250425123404-cab7e8f74fae -> v1.9.0-crc1
github.com/ovn-org/ovn-kubernetes/go-controller require digest 57a2590 -> 14237a8
github.com/prometheus/procfs indirect patch v0.16.0 -> v0.16.1
github.com/vishvananda/netlink require digest 62fb240 -> 9d88d83
go (source) toolchain minor 1.23.5 -> 1.24.2
google.golang.org/genproto/googleapis/api indirect digest 61c742a -> 7b38467
google.golang.org/genproto/googleapis/rpc indirect digest 207652e -> 7b38467
k8s.io/api require minor v0.32.3 -> v0.33.0
k8s.io/apimachinery require minor v0.32.3 -> v0.33.0
k8s.io/client-go require minor v0.32.3 -> v0.33.0
k8s.io/component-base indirect minor v0.32.3 -> v0.33.0

Release Notes

containernetworking/cni (github.com/containernetworking/cni)

v1.3.0

Compare Source

What's Changed

This adds a new config flag loadPluginsFromFolder - if present, for a given named network bar, plugin configuration objects will be loaded from <path-to-bar-network-config-file>/bar/xxx.conf. This may be useful for vendors providing chained plugins: you can add your plugin to a chain without needing to edit the file in-place.

New Contributors

Full Changelog: containernetworking/cni@v1.2.3...v1.3.0

v1.2.3: libcni v1.2.3

Compare Source

This is a minor release to correct a divergence between the specification and libcni. In this case, the specification was updated, as it concerns a new feature, GC, that is not yet deployed.

What's Changed

v1.2.2: libcni v1.2.2

Compare Source

What's Changed

Full Changelog: containernetworking/cni@v1.2.1...v1.2.2

v1.2.1: CNI Spec v1.1 / libcni v1.2.1

Compare Source

This is a minor release that fixes some small bugs:

Improvements
  • (#​1098). SPEC: add warning about preserving shared resources for GC
  • (#​1090). Spec, libcni: add disableGC flag This allows administrators to disable garbage collection in exceptional circumstances, such as multiple runtimes sharing a network configuration.
Bug fixes:
  • (#​1097). Fix faulty json.Marshal behavior for embeds types.NetConf Fix #​1096
  • (#​1095). libcni: always delete the cache on conflist for CNI DEL This aligns the call with DelNetwork, and allows CRIO tests to bump

v1.2.0: CNI spec v1.1 / libcni v1.2.0

Compare Source

This is libcni v1.2.0, which releases the new CNI spec version v1.1.0.

Major changes:

GC verb

The GC verb allows runtimes to specify the set of known-good attachments, allowing plugins to clean up stale and leaked resources such as IPAM reservations. Libcni will also synthesize a CNI DEL for any stale cached attachments, so all users will have a form of GC, even if their plugins do not support CNI v1.1

STATUS verb

The STATUS verb allows a plugin to report its readiness to accept ADD requests. Runtimes such as containerd and cri-o will no longer have to rely merely on the presence of a CNI configuration file to determine network readiness.

Version negotiation

CNI configurations may now contain multiple versions, so that an administrator can opportunistically update the protocol version without breaking older runtimes:

{
  "cniVersion": "1.0.0",
  "cniVersions": ["1.0.0", "1.1.0"]
}

New fields

A number of new fields have been added to the result type:

Other improvements

  • (#​911). libcni: add specific type for CHECK not supported
  • (#​1072). tolerate invalid cni caches for deletion
  • (#​1054). Add Version() to CNI interface
containernetworking/plugins (github.com/containernetworking/plugins)

v1.7.1: CNI plugins v1.7.1

Compare Source

What's Changed

(Administrative note: the GitHub release v1.7.0 somehow got split in to two immutable releases. v1.7.1 is a re-release that corrects the issue. Apologies for the trouble).

New features / options
Other improvements
Bug fixes

New Contributors

Full Changelog: containernetworking/plugins@v1.6.2...v1.7.1

v1.7.0

Compare Source

v1.6.2

Compare Source

(administrative note: release v1.6.1 was somehow double-created in GitHub; v1.6.2 is identical but fixes the duplication.)

What's Changed

Full Changelog: containernetworking/plugins@v1.6.0...v1.6.2

v1.6.1

Compare Source

v1.6.0: CNI plugins v1.6.0

Compare Source

This is the v1.6.0 release of the CNI community plugins.

Changelog

Important

  • revert htb changes due to ongoing issues and missing maintainer by @​h0nIg in https://github.com/containernetworking/plugins/pull/1105. This reverts the (undocumented) feature added in v1.5 where traffic from a specific CIDR would be exempted from bandwidth shaping. Unfortunately the implementation was lacking. We hope to re-add this feature in the future.

New features

CNI v1.1 support

Other improvements

Fixes

Misc / CI

New Contributors

Full Changelog: containernetworking/plugins@v1.5.1...v1.6.0

v1.5.1

Compare Source

What's Changed

Full Changelog: containernetworking/plugins@v1.5.0...v1.5.1

v1.5.0: CNI Plugins v1.5.0

Compare Source

What's Changed

New Features:

Fixes:

New Contributors

Full Changelog: containernetworking/plugins@v1.4.1...v1.5.0

v1.4.1

Compare Source

v1.4.0: CNI Plugins v1.4.0

Compare Source

New features:
  • (#​832). tap: allow for a tap device to be created as a bridge port
  • (#​914). [tuning] add ability to set tx queue len
Improvements:
  • (#​969). Add CNI_NETNS_OVERRIDE
  • (#​979). Add ndisc_notify in ipvlan for ipv6 ndp
  • (#​974). macvlan: enable ipv6 ndisc_notify
  • (#​950). Create IPAM files with 0600 permissions
  • (#​924). More efficient iptables usage.
  • (#​902). spoofcheck: Make use of go-nft's ApplyConfigEcho(). This is much faster
  • (#​874). Add routes propagation for VRF plugin
Build:
  • (#​982). Bump to golang:1.21-alpine
  • (#​948). build: Use POSIX sh for shell scripts
Bug fixes:
  • (#​954). macvlan cmdDel: handle deletion when master has been deleted
  • (#​927). vrf: fix route filter to use output iface

v1.3.0: CNI Plugins v1.3.0

Compare Source

This release introduces a new plugin: tap. Thanks to @​mmirecki for contributing this

New features:

  • (#​784). tap: This PR adds a plugin to create tap devices.
  • (#​829). bridge: add vlan trunk support
  • (#​875). bridge: Add parameter to disable default vlan
  • (#​814). macvlan: Add support for in-container master
  • (#​813). ipvlan: Add support for in-container master
  • (#​781). vlan: Add support for in-container master

Improvements:

  • (#​880). bridge: read only required chain on cni del instead of the entire ruleset
  • (#​873). bridge, spoof check: remove drop rule index

Bug fixes:

  • (#​892). sbr: Ignore LinkNotFoundError during cmdDel null
  • (#​887). ptp: Fix ValidateExpectedRoute with non default routes and nil GW
  • (#​885). tuning: fix cmdCheck when using IFNAME
  • (#​831). Fix overwritten error var in getMTUByName
  • (#​821). Only check or del ipv6 when an IPv6 is configured
coreos/go-iptables (github.com/coreos/go-iptables)

v0.8.0

Compare Source

What's Changed

Full Changelog: coreos/go-iptables@v0.7.0...v0.8.0

v0.7.0

Compare Source

Bug fixes

  • (#​107). Add another pattern to IsNotExist
  • (#​105). Skip warning about rules in legacy iptables
  • (#​104). iptables_test: fix ListWithCounters mismatch on newer kernels

New features

  • (#​87). Added Replace method to replace rulespec (in specified pos)
  • (#​96). feat: add ListById function and test
  • (#​92). Introduce InsertUnique()
cpuguy83/go-md2man (github.com/cpuguy83/go-md2man/v2)

v2.0.7

Compare Source

What's Changed

Full Changelog: cpuguy83/go-md2man@v2.0.6...v2.0.7

minio/minio-go (github.com/minio/minio-go/v7)

v7.0.91: Bugfix Release

Compare Source

What's Changed

New Contributors

Full Changelog: minio/minio-go@v7.0.90...v7.0.91

netobserv/flowlogs-pipeline (github.com/netobserv/flowlogs-pipeline)

v1.9.0-crc1

Compare Source

prometheus/procfs (github.com/prometheus/procfs)

v0.16.1

Compare Source

What's Changed

New Contributors

Full Changelog: prometheus/procfs@v0.16.0...v0.16.1

kubernetes/api (k8s.io/api)

v0.33.0

Compare Source

v0.32.4

Compare Source

kubernetes/apimachinery (k8s.io/apimachinery)

v0.33.0

Compare Source

v0.32.4

Compare Source

kubernetes/client-go (k8s.io/client-go)

v0.33.0

Compare Source

v0.32.4

Compare Source

kubernetes/component-base (k8s.io/component-base)

v0.33.0

Compare Source

v0.32.4

Compare Source


Configuration

📅 Schedule: Branch creation - "after 5am on sunday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.

This PR has been generated by MintMaker (powered by Renovate Bot).

Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot added the dependencies Pull requests that update a dependency file label Apr 27, 2025
Copy link

openshift-ci bot commented Apr 27, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign jpinsonneau for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

openshift-ci bot commented Apr 27, 2025

Hi @red-hat-konflux[bot]. Thanks for your PR.

I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@jotak jotak merged commit 9a36a0d into main Apr 28, 2025
5 of 7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file needs-ok-to-test
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant