bevel-operator-fabric
bevel-operator-fabric copied to clipboard
Bump the go_modules group across 2 directories with 10 updates
Bumps the go_modules group with 5 updates in the / directory:
| Package | From | To |
|---|---|---|
| github.com/prometheus/client_golang | 1.18.0 |
1.20.2 |
| helm.sh/helm/v3 | 3.14.0 |
3.14.3 |
| github.com/consensys/gnark-crypto | 0.6.0 |
0.12.1 |
| github.com/docker/docker | 24.0.7+incompatible |
25.0.6+incompatible |
| google.golang.org/grpc | 1.58.3 |
1.66.0 |
Bumps the go_modules group with 4 updates in the /examples/client/go directory: github.com/prometheus/client_golang, golang.org/x/text, google.golang.org/grpc and google.golang.org/protobuf.
Updates github.com/prometheus/client_golang from 1.18.0 to 1.20.2
Release notes
Sourced from github.com/prometheus/client_golang's releases.
v1.20.2
- [BUGFIX] promhttp: Unset Content-Encoding header when data is uncompressed. #1596
v1.20.1
This release contains the critical fix for the issue. Thanks to
@geberl,@CubicrootXYZ,@zetaaband@timofurrerfor helping us with the investigation!
- [BUGFIX] process-collector: Fixed unregistered descriptor error when using process collector with PedanticRegistry on Linux machines. #1587
v1.20.0
Thanks everyone for contributions!
:warning: In this release we remove one (broken anyway, given Go runtime changes) metric and add three new (representing GOGC, GOMEMLIMIT and GOMAXPROCS flags) to the default
collectors.NewGoCollector()collector. Given its popular usage, expect your binary to expose two additional metric.Changes
- [CHANGE] :warning: go-collector: Remove
go_memstat_lookups_totalmetric which was always 0; Go runtime stopped sharing pointer lookup statistics. #1577- [FEATURE] :warning: go-collector: Add 3 default metrics:
go_gc_gogc_percent,go_gc_gomemlimit_bytesandgo_sched_gomaxprocs_threadsas those are recommended by the Go team. #1559- [FEATURE] go-collector: Add more information to all metrics' HELP e.g. the exact
runtime/metricssourcing each metric (if relevant). #1568 #1578- [FEATURE] testutil: Add CollectAndFormat method. #1503
- [FEATURE] histograms: Add support for exemplars in native histograms. #1471
- [FEATURE] promhttp: Add experimental support for
zstdon scrape, controlled by the requestAccept-Encodingheader. #1496- [FEATURE] api/v1: Add
WithLimitparameter to all API methods that supports it. #1544- [FEATURE] prometheus: Add support for created timestamps in constant histograms and constant summaries. #1537
- [FEATURE] process-collectors: Add network usage metrics:
process_network_receive_bytes_totalandprocess_network_transmit_bytes_total. #1555- [FEATURE] promlint: Add duplicated metric lint rule. #1472
- [BUGFIX] promlint: Relax metric type in name linter rule. #1455
- [BUGFIX] promhttp: Make sure server instrumentation wrapping supports new and future extra responseWriter methods. #1480
- [BUGFIX] testutil: Functions using compareMetricFamilies are now failing if filtered metricNames are not in the input. #1424
- feat(prometheus/testutil/promlint/validations): refine lintMetricType… by
@foehammer127in prometheus/client_golang#1455- Bump github.com/prometheus/client_golang from 1.18.0 to 1.19.0 in /examples/middleware by
@dependabotin prometheus/client_golang#1457- Bump github.com/prometheus/client_model from 0.5.0 to 0.6.0 by
@dependabotin prometheus/client_golang#1458- Bump golang.org/x/sys from 0.16.0 to 0.17.0 by
@dependabotin prometheus/client_golang#1459- Bump github.com/prometheus/client_golang from 1.18.0 to 1.19.0 in /tutorial/whatsup by
@dependabotin prometheus/client_golang#1461- Merge Release 1.19 back to main by
@ArthurSensin prometheus/client_golang#1462- Bump the github-actions group with 2 updates by
@dependabotin prometheus/client_golang#1456- Bump google.golang.org/protobuf from 1.32.0 to 1.33.0 by
@dependabotin prometheus/client_golang#1466- Bump google.golang.org/protobuf from 1.32.0 to 1.33.0 in /examples/middleware by
@dependabotin prometheus/client_golang#1467- Bump google.golang.org/protobuf from 1.32.0 to 1.33.0 in /tutorial/whatsup by
@dependabotin prometheus/client_golang#1469- Add LintDuplicateMetric to promlint by
@bborehamin prometheus/client_golang#1472- Auto-update Go Collector Metrics for new Go versions by
@SachinSahu431in prometheus/client_golang#1476- Implement Unwrap() for responseWriterDelegator by
@igor-drozdovin prometheus/client_golang#1480- Bump golang.org/x/sys from 0.17.0 to 0.18.0 by
@dependabotin prometheus/client_golang#1485- Bump github.com/prometheus/procfs from 0.12.0 to 0.13.0 by
@dependabotin prometheus/client_golang#1486- ci: Remove hardcoded supported Go versions from go.yml by
@SachinSahu431in prometheus/client_golang#1489- feat: metrics generation workflow by
@SachinSahu431in prometheus/client_golang#1481
... (truncated)
Changelog
Sourced from github.com/prometheus/client_golang's changelog.
1.20.2 / 2024-08-23
- [BUGFIX] promhttp: Unset Content-Encoding header when data is uncompressed. #1596
1.20.1 / 2024-08-20
- [BUGFIX] process-collector: Fixed unregistered descriptor error when using process collector with
PedanticRegistryon linux machines. #15871.20.0 / 2024-08-14
- [CHANGE] :warning: go-collector: Remove
go_memstat_lookups_totalmetric which was always 0; Go runtime stopped sharing pointer lookup statistics. #1577- [FEATURE] :warning: go-collector: Add 3 default metrics:
go_gc_gogc_percent,go_gc_gomemlimit_bytesandgo_sched_gomaxprocs_threadsas those are recommended by the Go team. #1559- [FEATURE] go-collector: Add more information to all metrics' HELP e.g. the exact
runtime/metricssourcing each metric (if relevant). #1568 #1578- [FEATURE] testutil: Add CollectAndFormat method. #1503
- [FEATURE] histograms: Add support for exemplars in native histograms. #1471
- [FEATURE] promhttp: Add experimental support for
zstdon scrape, controlled by the requestAccept-Encodingheader. #1496- [FEATURE] api/v1: Add
WithLimitparameter to all API methods that supports it. #1544- [FEATURE] prometheus: Add support for created timestamps in constant histograms and constant summaries. #1537
- [FEATURE] process-collector: Add network usage metrics:
process_network_receive_bytes_totalandprocess_network_transmit_bytes_total. #1555- [FEATURE] promlint: Add duplicated metric lint rule. #1472
- [BUGFIX] promlint: Relax metric type in name linter rule. #1455
- [BUGFIX] promhttp: Make sure server instrumentation wrapping supports new and future extra responseWriter methods. #1480
- [BUGFIX] testutil: Functions using compareMetricFamilies are now failing if filtered metricNames are not in the input. #1424
1.19.0 / 2024-02-27
The module
prometheus/common v0.48.0introduced an incompatibility when used together with client_golang (See prometheus/client_golang#1448 for more details). If your project uses client_golang and you want to useprometheus/common v0.48.0or higher, please update client_golang to v1.19.0.
Commits
67121dcMerge pull request #1596 from mrueg/fix-uncompressed-content-header187acd4Cut 1.20.2f7f8f3afix: Unset Content-Encoding header when uncompressed2254d6cMerge pull request #1587 from prometheus/fix-processcollector4a15d05Cut 1.20.1f2dd7b3Use pedantic registry in other places too, to double check.261fe84bugfix: Pass network metrics to processCollector's Describe() function5bf3341Use NewPedanticRegistry in Process' Collector tests73b811cCut 1.20.0 release. (#1580)7ce5089gocollector: Attach original runtime/metrics metric name to help. (#1578)- Additional commits viewable in compare view
Updates golang.org/x/crypto from 0.17.0 to 0.24.0
Commits
332fd65go.mod: update golang.org/x dependencies0b431c7x509roots/fallback: update bundle349231fssh: implement CryptoPublicKey on sk keys44c9b0fssh: allow server auth callbacks to send additional banners67b1361sha3: reenable s390x assembly477a5b4sha3: make APIs usable with zero allocations59b5a86sha3: disable s390x assembly10f366esha3: simplify XOR functions905d78ago.mod: update golang.org/x dependenciesebb717dssh: validate key type in SSH_MSG_USERAUTH_PK_OK response- Additional commits viewable in compare view
Updates helm.sh/helm/v3 from 3.14.0 to 3.14.3
Release notes
Sourced from helm.sh/helm/v3's releases.
Helm v3.14.3 is a patch release. Users are encouraged to upgrade for the best experience. Users are encouraged to upgrade for the best experience.
The community keeps growing, and we'd love to see you there!
- Join the discussion in Kubernetes Slack:
- for questions and just to hang out
- for discussing PRs, code, and bugs
- Hang out at the Public Developer Call: Thursday, 9:30 Pacific via Zoom
- Test, debug, and contribute charts: ArtifactHub/packages
Installation and Upgrading
Download Helm v3.14.3. The common platform binaries are here:
- MacOS amd64 (checksum / 4d5d01a94c7d6b07e71690dc1988bf3229680284c87f4242d28c6f1cc99653be)
- MacOS arm64 (checksum / dff794152b62b7c1a9ff615d510f8657bcd7a3727c668e0d9d4955f70d5f7573)
- Linux amd64 (checksum / 3c90f24e180f8c207b8a18e5ec82cb0fa49858a7a0a86e4ed52a98398681e00b)
- Linux arm (checksum / d4ff88f02d6731ec5dbde86a67bf391e673d0d9e87901727fbf62372aff106ec)
- Linux arm64 (checksum / 85e1573e76fa60af14ba7e9ec75db2129b6884203be866893fa0b3f7e41ccd5e)
- Linux i386 (checksum / af89e5df5cd21efe4dcaa478b19aaf17d22820716f93c1f098b00f1b7cfe1905)
- Linux ppc64le (checksum / aab121ca470e2a502cda849a9b3e92eeb9a32e213b0f0a79a95a04e375d26ce7)
- Linux s390x (checksum / d64fa8aced3244b549377741dc4e2db8109e5270c0723c11b547a9da5f99ad43)
- Linux riscv64 (checksum / f9f4e68bf43632f5df29e6c9fa760813d7e3537ed91d838cfdc2f103f8442b33)
- Windows amd64 (checksum / 369c6db1c114ef2a00793e9a587db6d7b2c72a23e37fd905c8deb78e9a8f7af6)
This release was signed with
672C 657B E06B 4B30 969C 4A57 4614 49C2 5E36 B98Eand can be found at@mattfarinakeybase account. Please use the attached signatures for verifying this release usinggpg.The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with
bash.What's Next
- 3.14.4 will contain only bug fixes and be released on April 10, 2024.
- 3.15.0 is the next feature release and will be on May 08, 2024.
Changelog
- Add a note about --dry-run displaying secrets f03cc04caaa8f6d7c3e67cf918929150cf6f3f12 (Matt Farina)
- add error messages 1a7330fe3802beeb3f897a1c701d8a4b9c1316c5 (George Jenkins)
- Fix: Ignore alias validation error for index load d6acc0027dca47dec40ccdd66febd0c8bcf4813f (George Jenkins)
- chore(deps): bump github.com/containerd/containerd from 1.7.11 to 1.7.12 b2738fb782d149ffa4748cb0ee78d674986d04b0 (dependabot[bot])
- chore(deps): bump github.com/DATA-DOG/go-sqlmock from 1.5.0 to 1.5.2 5b0847e0e763e98bcbf8a12e8f9c5f7c11d123a1 (dependabot[bot])
- Update architecture detection method 7e18c39f0753c73e4660f3796f01f5b33f2552b5 (weidongkl)
Helm v3.14.2 is a security (patch) release. Users are strongly recommended to update to this release.
A Helm contributor discovered uninitialized variable vulnerability when Helm parses index and plugin yaml files missing expected content.
Jakub Ciolek with AlphaSense discovered the vulnerability.
Installation and Upgrading
... (truncated)
Commits
f03cc04Add a note about --dry-run displaying secrets1a7330fadd error messagesd6acc00Fix: Ignore alias validation error for index loadb2738fbchore(deps): bump github.com/containerd/containerd from 1.7.11 to 1.7.125b0847echore(deps): bump github.com/DATA-DOG/go-sqlmock from 1.5.0 to 1.5.27e18c39Update architecture detection methodc309b6fSome fixese8858f8validation fix- See full diff in compare view
Updates github.com/consensys/gnark-crypto from 0.6.0 to 0.12.1
Release notes
Sourced from github.com/consensys/gnark-crypto's releases.
v0.12.1
What's Changed
- fix: GLV exponentiation in GT with large exponents by
@ThomasPiellardin Consensys/gnark-crypto#451 Security Advisory- feat: kzg extended transcript by
@ThomasPiellardin Consensys/gnark-crypto#452- perf(fft): introduce cache efficient bit reverse shuffling by
@gbotrelin Consensys/gnark-crypto#446- perf: Improve performance of point equality checks by
@jsignin Consensys/gnark-crypto#450Full Changelog: https://github.com/Consensys/gnark-crypto/compare/v0.12.0...v0.12.1
v0.12.0
What's Changed
fix malleability sig by
@ThomasPiellardin Consensys/gnark-crypto#449 https://nvd.nist.gov/vuln/detail/CVE-2023-44273perf: multiexp, avoid direct coordinate access to check for zero points by
@jsignin Consensys/gnark-crypto#414perf: edwards, improve the performance of Add, MixedAdd and IsOnCurve by
@jsignin Consensys/gnark-crypto#441perf: edwards, avoid inversions in Add in extended points by
@jsignin Consensys/gnark-crypto#442ci: update ci workflows by
@gbotrelin Consensys/gnark-crypto#447Full Changelog: https://github.com/Consensys/gnark-crypto/compare/v0.11.2...v0.12.0
v0.11.2
What's Changed
- Fix some typos by
@jtragliain Consensys/gnark-crypto#394- Adding testing for deserialization of G1 and G2 points by
@asansoin Consensys/gnark-crypto#393- Fix some implicit memory aliasing in for loops by
@jtragliain Consensys/gnark-crypto#395- Do not XOR with zero by
@jtragliain Consensys/gnark-crypto#398- Disable check shadowing in govet linter by
@jtragliain Consensys/gnark-crypto#397- Add a bunch of "nosec G404" comments in test code by
@jtragliain Consensys/gnark-crypto#399- Enable misspell linter & fix findings by
@jtragliain Consensys/gnark-crypto#401- Fix
RSis.CopyWithFreshBufferby@AlexandreBellingin Consensys/gnark-crypto#402- feat: Marshal [][]fr.Element by
@Tabaiein Consensys/gnark-crypto#400- Run golangci-lint on generated files by
@jtragliain Consensys/gnark-crypto#396- docs: ConsenSys -> Consensys by
@Tabaiein Consensys/gnark-crypto#406- msm: semaphore to limit CPUs + better split strategy (up to 25% perf boost on 96cores) by
@gbotrelin Consensys/gnark-crypto#403- Feat/fold pedersen by
@Tabaiein Consensys/gnark-crypto#407- fix: do not read empty slices as nil by
@Tabaiein Consensys/gnark-crypto#410- fix: incorrect semaphore init could cause msm deadlock by
@gbotrelin Consensys/gnark-crypto#411- edwards: optimize point negation by
@jsignin Consensys/gnark-crypto#413- Feat/gkr custom gates by
@Tabaiein Consensys/gnark-crypto#419- perf: fast path for SIS with logTwoBound: 8, logTwoDegree: 6 by
@gbotrelin Consensys/gnark-crypto#416- feat: add WriteRawTo, UnsafeReadFrom to kzg.ProvingKey by
@gbotrelin Consensys/gnark-crypto#422- Fix/gkr eq bug by
@Tabaiein Consensys/gnark-crypto#421- feat: add AsyncReadFrom to fr.Vector and fft.Domain by
@gbotrelin Consensys/gnark-crypto#424- fix: ECDSA HashToInt bytes-bits mismatch by
@ivokubin Consensys/gnark-crypto#428- Small optimization over the memory usage of MiMC by
@AlexandreBellingin Consensys/gnark-crypto#435
... (truncated)
Changelog
Sourced from github.com/consensys/gnark-crypto's changelog.
[v0.11.1] - 2023-07-11
Fix
- ECDSA HashToInt bytes-bits mismatch (#428)
[v0.11.0] - 2023-05-02
Build
- go generate
- generify bn254 changes
- generify bn254 kzg changes
- generify marshal changes
- generify bn254 kzg changes
- bump go1.20
- update ci github action dependencies
Chore
- PR feedback
Docs
- make comments more godoc friendly
- remove comment
- remove DO NOT EDIT from non-autogenerated files
Feat
- fix v computation in ECDSA signature (#385)
- make
mapToCurvepublic to allow for custom cofactor clearing (#372)- add Double in affine coordinates
- kzg.Vk.WriteRawTo
- bn254 encoder to support uint64 slices
- pairing: return 1 after easy part if result is 1
Fix
- handle all bitmask in point deserialization
- littleEndian -> bigEndian
- import utils
- don't ignore multiexp error
- minor errors
- generation mistake
- bn254 incorporate evals into kzg batch challenge
- kzg: nb of digests in BatchVerifyMultiPoints should be nonzeo
- linter: ineffassign in Fpk marshal
Perf
- kzg: remove G2 scalar mul in single verification
Refactor
- break pedersen key into proving (committing) and verifying
... (truncated)
Commits
da0317fclean: remove useless snippet in mulWindowed (#453)65cdb1dFeat/kzg extended transcript (#452)95e674bperf(fft): introduce cache efficient bit reverse shuffling (#446)ec6be1aMerge pull request #451 from Consensys/fix/glvaef1eeffix: add GT ExpGLV fix to BLS24 + BW6feaf161fix: merge and fix tests for expGLVced3076fix: use max(size(s1), size(s2)) for ExpGLV4096ad9feat: discared useless filesace5318Merge pull request #450 from jsign/jsign-eq-improvdc4e2d4feat: added test for [-s]G=-[s]G- Additional commits viewable in compare view
Updates github.com/docker/docker from 24.0.7+incompatible to 25.0.6+incompatible
Release notes
Sourced from github.com/docker/docker's releases.
v25.0.6
25.0.6
For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:
- docker/cli, 25.0.6 milestone
- moby/moby, 25.0.6 milestone
- Deprecated and removed features, see Deprecated Features.
- Changes to the Engine API, see API version history.
Security
This release contains a fix for CVE-2024-41110 / GHSA-v23v-6jw2-98fq that impacted setups using authorization plugins (AuthZ) for access control.
Bug fixes and enhancements
- [25.0] remove erroneous
platformfrom imageconfigOCI descriptor indocker saveoutput. moby/moby#47695- [25.0 backport] Fix a nil dereference when getting image history for images having layers without the
Createdvalue set. moby/moby#47759- [25.0 backport] apparmor: Allow confined runc to kill containers. moby/moby#47830
- [25.0 backport] Fix an issue where rapidly promoting a Swarm node after another node was demoted could cause the promoted node to fail its promotion. moby/moby#47869
- [25.0 backport] don't depend on containerd platform.Parse to return a typed error. moby/moby#47890
- [25.0 backport] builder/mobyexporter: Add missing nil check moby/moby#47987
Packaging updates
- Update AWS SDK Go v2 to v1.24.1 for AWS CloudWatch logging driver. moby/moby#47724
- Update Go runtime to 1.21.12, which contains security fixes for CVE-2024-24791 moby/moby#48146
- Update Containerd (static binaries only) to v1.7.20. moby/moby#48199
Full Changelog: https://github.com/moby/moby/compare/v25.0.5...v25.0.6
v25.0.5
25.0.5
For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:
- docker/cli, 25.0.5 milestone
- moby/moby, 25.0.5 milestone
- Deprecated and removed features, see Deprecated Features.
- Changes to the Engine API, see API version history.
Security
This release contains a security fix for CVE-2024-29018, a potential data exfiltration from 'internal' networks via authoritative DNS servers.
Bug fixes and enhancements
CVE-2024-29018: Do not forward requests to external DNS servers for a container that is only connected to an 'internal' network. Previously, requests were forwarded if the host's DNS server was running on a loopback address, like systemd's 127.0.0.53. moby/moby#47589
plugin: fix mounting /etc/hosts when running in UserNS. moby/moby#47588
rootless: fix
open /etc/docker/plugins: permission denied. moby/moby#47587Fix multiple parallel
docker buildruns leaking disk space. moby/moby#47527
... (truncated)
Commits
b08a51fMerge pull request #48231 from austinvazquez/backport-vendor-otel-v0.46.1-to-...d151b0fvendor: OTEL v0.46.1 / v1.21.0c6ba9a5Merge pull request #48225 from austinvazquez/backport-workflow-artifact-reten...4673a3cMerge pull request #48227 from austinvazquez/backport-backport-branch-check-t...30f8908github/ci: Check if backport is opened against the expected branch7454d6aci: update workflow artifacts retention65cc597Merge commit from forkb722836Merge pull request #48199 from austinvazquez/update-containerd-binary-to-1.7.20e8ecb9cupdate containerd binary to v1.7.20e6cae1fupdate containerd binary to v1.7.19- Additional commits viewable in compare view
Updates golang.org/x/net from 0.19.0 to 0.26.0
Commits
66e838cgo.mod: update golang.org/x dependencies6249541http2: avoid race in server handler SetReadDeadine/SetWriteDeadline603e3e6quic: disable X25519Kyber768Draft00 in tests67e8d0chttp2: report an error if goroutines outlive serverTester tests5608279http2: avoid corruption in priority write scheduler0d515a5http2: factor out frame read/write test functions9f5b79bhttp2: drop unused retry function03c24c2http2: use synthetic time in server tests022530chttp2: add a more full-featured test net.Conn410d19ehttp2: avoid racy access to clientStream.requestedGzip- Additional commits viewable in compare view
Updates golang.org/x/sys from 0.16.0 to 0.22.0
Commits
faed7ecunix: add PthreadChdir and PthreadFchdir on darwinc892bb7unix: fix MmapPtr test failing on OpenBSDa0ef40aunix: fix MremapPtr test failing on NetBSDdaa2394unix: add unsafe mmap, munmap, mremap7670087windows: add GetAce Windows API348425awindows/svc: do not pass theService to windows.RegisterServiceCtrlHandlerEx673e0f9unix: skip ethtool driver test for busy interface6943ab6unix/linux: update glibc to 2.3992f3ad6unix: update to Linux kernel 6.9f34bb9fwindows: add net user enum- Additional commits viewable in compare view
Updates golang.org/x/text from 0.14.0 to 0.16.0
Commits
434eadclanguage: reject excessively large Accept-Language strings23407e7go.mod: ignore cyclic dependency for taggingb18d3ddsecure/precis: replace bytes.Compare with bytes.Equal795e854all: replace io/ioutil with io and os packageb0ca10finternal/language: bump script types to uint16 and update registryba9b0e1go.mod: update x/tools to HEADd03b418A+C: delete AUTHORS and CONTRIBUTORSb4bca84language/display: fix Tag method commentea49e3ego.mod: update x/tools to HEAD78819d0go.mod: update to golang.org/x/text v0.1.10- Additional commits viewable in compare view
Updates google.golang.org/grpc from 1.58.3 to 1.66.0
Release notes
Sourced from google.golang.org/grpc's releases.
Release 1.66.0
New Features
- metadata: stabilize
ValueFromIncomingContext(#7368)
- Special Thanks:
@KarthikReddyPuli- client: stabilize the
WaitForStateChangeandGetStatemethods, which were previously experimental. (#7425)- xds: Implement ADS flow control mechanism (#7458)
- See grpc/grpc#34099 for context.
- balancer/rls: Add metrics for data cache and picker internals (#7484, #7495)
- xds: LRS load reports now include the
total_issued_requestsfield. (#7544)Bug Fixes
- grpc: Clients now return status code INTERNAL instead of UNIMPLEMENTED when the server uses an unsupported compressor. This is consistent with the gRPC compression spec. (#7461)
- Special Thanks:
@Gayathri625- transport: Fix a bug which could result in writes busy looping when the underlying
conn.Writereturns errors (#7394)
- Special Thanks:
@veshij- client: fix race that could lead to orphaned connections and associated resources. (#7390)
- xds: use locality from the connected address for load reporting with pick_first (#7378)
- without this fix, if a priority contains multiple localities with pick_first, load was reported for the wrong locality
- client: prevent hanging during ClientConn.Close() when the network is unreachable (#7540)
Performance Improvements
- transport: double buffering is avoided when using an http connect proxy and the target server waits for client to send the first message. (#7424)
- codec: Implement a new
Codecwhich uses buffer recycling for encoded message (#7356)
- introduce a
mempackage to facilitate buffer reuse (#7432)- Special Thanks:
@PapaCharlieRelease 1.65.0
Dependencies
- Change support policy to cover only the latest TWO releases of Go, matching the policy for Go itself. See #7249 for more information. (#7250)
- Update x/net/http2 to address CVE-2023-45288 (#7282)
Behavior Changes
- credentials/tls: clients and servers will now reject connections that don't support ALPN when environment variable
GRPC_ENFORCE_ALPN_ENABLEDis set to "true" (case insensitive). (#7184)
- NOTE: this behavior will become the default in a future release.
- metadata: remove String method from MD to make printing more consistent (#7373)
New Features
- grpc: add
WithMaxCallAttemptsto configure gRPC's retry behavior per-channel. (#7229)
- Special Thanks:
@imoore76Bug Fixes
... (truncated)
Commits
00d3ec8Change version to 1.66.0 (#7518)973e3dcxdsclient: Populate total_issued_requests count in LRS load reports (#7544) (...8e3596ccherry-pick #7557 to v1.66.x branch (#7564)62baa5fcherry-pick #7356 to v1.66.x branch (#7546)f857020cherry-pick #7523 to v1.66.x branch (#7547)35e915echerry-pick: transport: add timeout for writing GOAWAY on http2Client.Close()...63853fdrls: update picker synchronously on configuration update (#7412)86135c3csds: unskip e2e test (#7502)5d07b63transport: change*http2Clientto interfaceClientTransport(#7512)c98235bgrpclog: refactor to move implementation to grpclog/internal (#7465)- Additional commits viewable in compare view
Updates google.golang.org/protobuf from 1.31.0 to 1.34.2
Updates github.com/prometheus/client_golang from 1.1.0 to 1.11.1
Release notes
Sourced from github.com/prometheus/client_golang's releases.
v1.20.2
- [BUGFIX] promhttp: Unset Content-Encoding header when data is uncompressed. #1596
v1.20.1
This release contains the critical fix for the issue. Thanks to
@geberl,@CubicrootXYZ,@zetaaband@timofurrerfor helping us with the investigation!
- [BUGFIX] process-collector: Fixed unregistered descriptor error when using process collector with PedanticRegistry on Linux machines. #1587
v1.20.0
Thanks everyone for contributions!
:warning: In this release we remove one (broken anyway, given Go runtime changes) metric and add three new (representing GOGC, GOMEMLIMIT and GOMAXPROCS flags) to the default
collectors.NewGoCollector()collector. Given its popular usage, expect your binary to expose two additional metric.Changes
- [CHANGE] :warning: go-collector: Remove
go_memstat_lookups_totalmetric which was always 0; Go runtime stopped sharing pointer lookup statistics. #1577- [FEATURE] :warning: go-collector: Add 3 default metrics:
go_gc_gogc_percent,go_gc_gomemlimit_bytesandgo_sched_gomaxprocs_threadsas those are recommended by the Go team. #1559- [FEATURE] go-collector: Add more information to all metrics' HELP e.g. the exact
runtime/metricssourcing each metric (if relevant). #1568 #1578- [FEATURE] testutil: Add CollectAndFormat method. #1503
- [FEATURE] histograms: Add support for exemplars in native histograms. #1471
- [FEATURE] promhttp: Add experimental support for
zstdon scrape, controlled by the requestAccept-Encodingheader. #1496- [FEATURE] api/v1: Add
WithLimitparameter to all API methods that supports it. #1544- [FEATURE] prometheus: Add support for created timestamps in constant histograms and constant summaries. #1537
- [FEATURE] process-collectors: Add network usage metrics:
process_network_receive_bytes_totalandprocess_network_transmit_bytes_total. #1555- [FEATURE] promlint: Add duplicated metric lint rule. #1472
- [BUGFIX] promlint: Relax metric type in name linter rule. #1455
- [BUGFIX] promhttp: Make sure server instrumentation wrapping supports new and future extra responseWriter methods. #1480
- [BUGFIX] testutil: Functions using compareMetricFamilies are now failing if filtered metricNames are not in the input. #1424
- feat(prometheus/testutil/promlint/validations): refine lintMetricType… by
@foehammer127in prometheus/client_golang#1455- Bump github.com/prometheus/client_golang from 1.18.0 to 1.19.0 in /examples/middleware by
@dependabotin prometheus/client_golang#1457- Bump github.com/prometheus/client_model from 0.5.0 to 0.6.0 by
@dependabotin prometheus/client_golang#1458- Bump golang.org/x/sys from 0.16.0 to 0.17.0 by
@dependabotin prometheus/client_golang#1459- Bump github.com/prometheus/client_golang from 1.18.0 to 1.19.0 in /tutorial/whatsup by
@dependabotin Description%20has%20been%20truncated%0A" rel="nofollow" target="_blank" >