Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update all go dependencies main (patch) #1804

Merged
merged 1 commit into from
Jul 7, 2023

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jul 7, 2023

Mend Renovate

This PR contains the following updates:

Package Type Update Change
github.com/cilium/cilium require patch v1.14.0-rc.0 -> v1.14.0-snapshot.5
google.golang.org/grpc require patch v1.56.1 -> v1.56.2

Release Notes

cilium/cilium (github.com/cilium/cilium)

v1.14.0-snapshot.5

Compare Source

v1.14.0-snapshot.4: 1.14.0-snapshot.4

Compare Source

Summary of Changes

Major Changes:

Minor Changes:

Bugfixes:

  • bpf: fix error handling for invoke_tailcall_if() (#​26118, @​julianwiedmann)
  • bpf: lxc: fix one missing drop notification in CT lookup tail calls (#​26115, @​julianwiedmann)
  • bpf: nodeport: don't reset aggregate ID when revDNAT is called by bpf_lxc (#​25929, @​julianwiedmann)
  • Envoy resource namespacing (#​26037, @​jrajahalme)
  • Fix a bug that would cause connectivity drops of type XfrmOutPolBlock on upgrade when IPsec is enabled. (#​25735, @​pchaigno)
  • Fix bug with toServices policy where service backend churn left stale CIDR identities (#​25687, @​christarazi)
  • Fix false error log message when IPsec is enabled with IPAM modes ENI or Azure and a remote node is deleted. (#​26093, @​pchaigno)
  • Fix for Identities that can be deleted before CESs are reconciled (#​25001, @​dlapcevic)
  • Fix issue where Cilium ServiceAPI would ignore backend changes to services with backends that were used in several services and updated at least once (#​24474, @​strudelPi)
  • Fix leak of IPsec XFRM FWD policies in IPAM modes cluster-pool, kubernetes, and crd when nodes are deleted.
    Fix incorrect catch-all default-drop XFRM OUT policy for IPsec IPv6 traffic that could lead to leaking plain-text IPv6 traffic if combined with some other bug. (#​25953, @​pchaigno)
  • Fix missed deletion events when reconnecting to/disconnecting from remote clusters (identities) (#​25677, @​giorio94)
  • Fix missed deletion events when reconnecting to/disconnecting from remote clusters (ipcache entries) (#​25675, @​giorio94)
  • Fix panic due to nil-map assignment in l2announcer (#​26315, @​dylandreimerink)
  • Fix three issues in the bug fix to attach IPsec BPF programs to ENI interfaces: do not fatal if loading unexpectedly fails (which may happen if the device is suddenly deleted), ignore veth device changes in order not to reinitialize when new endpoints appear and wait 1 second for further device state changes between reinitializations. (#​25936, @​joamaki)
  • Fixed Cilium agent crash when policy refers to a non-existing Envoy listener. (#​25969, @​jrajahalme)
  • Fixes an issue where SRv6 encapsulated packets are forwarded to the wrong layer 2 next hop. (#​26136, @​ldelossa)

CI Changes:

Misc Changes:

Docker Manifests

cilium

docker.io/cilium/cilium:v1.14.0-snapshot.4@​sha256:dd75919c7b81d06289ffa1dcc0e238f77294a45c57212a87634f277f28835e7d
quay.io/cilium/cilium:v1.14.0-snapshot.4@​sha256:dd75919c7b81d06289ffa1dcc0e238f77294a45c57212a87634f277f28835e7d

clustermesh-apiserver

docker.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.4@​sha256:2b844061901af8bd3da5bb99d893694c915e2ceee05e661131e2d684fb0de68c
quay.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.4@​sha256:2b844061901af8bd3da5bb99d893694c915e2ceee05e661131e2d684fb0de68c

docker-plugin

docker.io/cilium/docker-plugin:v1.14.0-snapshot.4@​sha256:0282b913a1fecd2088d64296e492a1a786a3f839551bf00679ae469a4558b620
quay.io/cilium/docker-plugin:v1.14.0-snapshot.4@​sha256:0282b913a1fecd2088d64296e492a1a786a3f839551bf00679ae469a4558b620

hubble-relay

docker.io/cilium/hubble-relay:v1.14.0-snapshot.4@​sha256:5a04cc8b09a00a254466b09f8ff77b9e4e56954aa5ac13f43c8a7c05a5725cd1
quay.io/cilium/hubble-relay:v1.14.0-snapshot.4@​sha256:5a04cc8b09a00a254466b09f8ff77b9e4e56954aa5ac13f43c8a7c05a5725cd1

kvstoremesh

docker.io/cilium/kvstoremesh:v1.14.0-snapshot.4@​sha256:a6c5a3f0f420fde69d4e60fdda82bd78c244fb2c12d09a6041a636840a02cc17
quay.io/cilium/kvstoremesh:v1.14.0-snapshot.4@​sha256:a6c5a3f0f420fde69d4e60fdda82bd78c244fb2c12d09a6041a636840a02cc17

operator-alibabacloud

docker.io/cilium/operator-alibabacloud:v1.14.0-snapshot.4@​sha256:86e40be4fac515ec3aae3f54bad8b7112ed0001a860c86092342dfd49fb5b97f
quay.io/cilium/operator-alibabacloud:v1.14.0-snapshot.4@​sha256:86e40be4fac515ec3aae3f54bad8b7112ed0001a860c86092342dfd49fb5b97f

operator-aws

docker.io/cilium/operator-aws:v1.14.0-snapshot.4@​sha256:449e30b7bf5492adfc605c50a1a0f5fc822af20ec6787fa93070a22fd5524731
quay.io/cilium/operator-aws:v1.14.0-snapshot.4@​sha256:449e30b7bf5492adfc605c50a1a0f5fc822af20ec6787fa93070a22fd5524731

operator-azure

docker.io/cilium/operator-azure:v1.14.0-snapshot.4@​sha256:72055583294266a78a2262d17fba2129f568946ba61708ee89e2bf74f7da693b
quay.io/cilium/operator-azure:v1.14.0-snapshot.4@​sha256:72055583294266a78a2262d17fba2129f568946ba61708ee89e2bf74f7da693b

operator-generic

docker.io/cilium/operator-generic:v1.14.0-snapshot.4@​sha256:1bfe879fff900180000265743afde223c809e3189c8dd704b1c10fb0ccedba6f
quay.io/cilium/operator-generic:v1.14.0-snapshot.4@​sha256:1bfe879fff900180000265743afde223c809e3189c8dd704b1c10fb0ccedba6f

operator

docker.io/cilium/operator:v1.14.0-snapshot.4@​sha256:2d47129ebb7bfca3b65e628c0eaaf02d1708ae4aedd29d70ea0f9dc282a7ebda
quay.io/cilium/operator:v1.14.0-snapshot.4@​sha256:2d47129ebb7bfca3b65e628c0eaaf02d1708ae4aedd29d70ea0f9dc282a7ebda

v1.14.0-snapshot.3: 1.14.0-snapshot.3

Compare Source

Summary of Changes

Major Changes:

  • Add TLSRoute support to GatewayAPI (#​25106, @​meyskens)
  • New high-scale ipcache mode to support clustermeshes with millions of pods. (#​25148, @​pchaigno)
  • Support for deploying Cilium L7 Proxy (Envoy) independently as a separate DaemonSet for availability, performance, and security benefits. (#​25081, @​mhofstetter)

Minor Changes:

Bugfixes:

  • Add drop notifications for various error paths in the datapath. (#​25183, @​julianwiedmann)
  • Added validation to ensure that enabling Ingress or Gateway API support while l7proxy is disabled will fail, as this is an incompatible configuration. (#​25215, @​youngnick)
  • Avoid dropping short packets (that don't have their L3 header in linear data) in the to-netdev and from-host paths. (#​25159, @​julianwiedmann)
  • bpf,datapath: read jiffies from /proc/schedstat (#​25795, @​ti-mo)
  • bpf/nat: fix current behavior that is silently ignoring errors in a revSNAT context (#​19753, @​sahid)
  • bpf: lb: deal with stale rev_nat_index after svc lookup in fallback path (#​24757, @​julianwiedmann)
  • Compare annotations before discarding CiliumNode updates. (#​25465, @​LynneD)
  • datapath: Fix double SNAT (#​25189, @​brb)
  • DNS proxy now always updates the proxy policy to avoid intermittent policy drops. (#​25147, @​jrajahalme)
  • Fix a bug due to which we would leak Linux XFRM policies, potentially leading to increased CPU consumption, when IPsec is enabled with Azure or ENI IPAM. (#​25784, @​pchaigno)
  • Fix a bug that would cause connectivity drops of type XfrmInNoStates on upgrade when IPsec is enabled with ENI or Azure IPAM mode. (#​25724, @​pchaigno)
  • Fix a possible deadlock when using WireGuard transparent encryption. (#​25419, @​bimmlerd)
  • Fix a regression in which link-local addresses were not treated with the "host" identity in some circumstances. (#​25298, @​asauber)
  • Fix broken IPv6 access to native node devices due to wrong source IPv6 of NA response. (#​25329, @​jschwinger233)
  • Fix bug affecting EKS installations with IPsec encryption enabled, where Cilium wouldn't attach its IPsec BPF program to new ENI interfaces, resulting in connectivity loss between pods on remote nodes. (#​25744, @​joamaki)
  • Fix data race affecting the preferred mark in backends, e.g. backends selected by service with affinity set to local. In very rare cases a backend might be missing its preferred status and a non-local backend might be selected. (#​25087, @​joamaki)
  • Fix incorrect hubble flow data when HTTP requests contain an x-forwarded-for header by adding an explicit use_remote_address: true config to Envoy HTTP configuration to always use the actual remote address of the incoming connection rather than the value of x-forwarded-for header, which may originate from an untrusted source. This change has no effect on Cilium policy enforcement where the source security identity is always resolved before HTTP headers are parsed. Previous Cilium behavior of not adding x-forwarded-for headers is retained via an explicit skip_xff_append: true config setting, except for Cilium Ingress where the source IP address is now appended to x-forwarded-for header. (#​25674, @​jrajahalme)
  • Fix missed deletion events when reconnecting to/disconnecting from remote clusters (nodes and services) (#​25499, @​giorio94)
  • Fix missing drop notifications on conntrack lookup failures when IPv4 and IPv6 are both enabled or socket-level load balancing is disabled. ([#​25426](https://togithub.com/cilium/cil

Configuration

📅 Schedule: Branch creation - "on friday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot requested a review from a team as a code owner July 7, 2023 00:28
@renovate renovate bot requested a review from rolinh July 7, 2023 00:28
@renovate renovate bot added kind/enhancement This would improve or streamline existing functionality. priority/release-blocker This issue will prevent the release of the next version of Cilium. renovate/stop-updating Tell Renovate to stop updating PR labels Jul 7, 2023
@renovate renovate bot temporarily deployed to ci July 7, 2023 00:28 Inactive
@@ -20,7 +20,7 @@ replace (
require (
github.com/blang/semver/v4 v4.0.0
github.com/cilium/charts v0.0.0-20230628232147-9992996cd311
github.com/cilium/cilium v1.14.0-rc.0
github.com/cilium/cilium v1.14.0-snapshot.5
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For those of you wondering, snapshot is semantically higher than rc. We'll switch to using pre in the Cilium v1.15 release cycles. To avoid problems, RCs are dual tagged with snapshot. In this specific instance, -snapshot.5 is the same as -rc.0.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for the explanation ❤️ TIL

@rolinh rolinh removed the renovate/stop-updating Tell Renovate to stop updating PR label Jul 7, 2023
Signed-off-by: renovate[bot] <bot@renovateapp.com>
@renovate renovate bot force-pushed the renovate/patch-all-go-deps-main branch from 8c6a372 to 2d470ff Compare July 7, 2023 09:09
@renovate renovate bot temporarily deployed to ci July 7, 2023 09:09 Inactive
@maintainer-s-little-helper maintainer-s-little-helper bot added the ready-to-merge This PR has passed all tests and received consensus from code owners to merge. label Jul 7, 2023
@tklauser tklauser merged commit 3b833ce into main Jul 7, 2023
19 checks passed
@tklauser tklauser deleted the renovate/patch-all-go-deps-main branch July 7, 2023 09:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/enhancement This would improve or streamline existing functionality. priority/release-blocker This issue will prevent the release of the next version of Cilium. ready-to-merge This PR has passed all tests and received consensus from code owners to merge.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants