ui-server
ui-server copied to clipboard
Bump github.com/open-policy-agent/opa from 0.67.0 to 0.68.0
Bumps github.com/open-policy-agent/opa from 0.67.0 to 0.68.0.
Release notes
Sourced from github.com/open-policy-agent/opa's releases.
v0.68.0
This release contains a mix of features and bugfixes.
Breaking Changes
entrypointannotation impliesdocumentscope (#6798)The entrypoint annotation's scope requirement has changed from
ruletodocument(open-policy-agent/opa#6798). Furthermore, if noscopeannotation is declared for a METADATA block preceding a rule, the presence of anentrypointannotation with atruevalue will assign the block adocumentscope, where therulescope is otherwise the default.In practice, a rule entrypoint always point to the entire document and not a particular rule definition. The previous behavior was a bug, and one we've now addressed.
Authored by
@anderseknertTopdown and Rego
- ast: Fixing nil-pointer dereference in compiler for partial rule edge case (#6930) authored by
@johanfylling- ast+parser: Add hint to future-proof imports (6968) authored by
@srenatus- topdown: Adding unification scope to virtual-cache key. Fixing issue where false positive cache hits can occur when unification "restricts" the scope of ref-head rule evaluation (#6926) authored by
@johanfyllingreported by@anderseknert- topdown: Marshal JWT encode sign inputs as JSON (#6934) authored by
@charlieegan3Runtime, Tooling, SDK
- ast: Make type checker
copymethod copy all values (#6949) authored by@anderseknert- ast: Include term locations in rule heads when requested (#6860) authored by
@anderseknert- debug: Adding experimental debugger SDK (#6876) authored by
@johanfylling- distributedtracing: allow OpenTelemetry resource attributes to be configured under distributed_tracing config (#6942) authored and reported by
@brettmc- download: Fixing issue when saving OCI bundles on disk (#6939) authored and reported by
@Sergey-Kizimov- logging: Always include HTTP request context in incoming req context (#6951) authored by
@ashutosh-narkarreported by@alvarogomez93- plugins/bundle: Avoid race-condition during bundle reconfiguration and activation (#6849) authored by
@ashutosh-narkarreported by@Pushpalanka- plugins/bundle: Escape reserved chars used in persisted bundle directory name (#6915) authored by
@ashutosh-narkarreported by@alvarogomez93- plugins/rest: Support AWS_CONTAINER_CREDENTIALS_FULL_URI metadata endpoint (#6893) authored and reported by
@mbamber- util+server: Fix bug around chunked request handling. (#6904) authored by
@philipaconradreported by@David-Wobrockopa exec: This command never supported "pretty" formatting (--format=prettyor-f pretty), onlyjson. Passingprettyis now invalid. (#6923) authored by@srenatusNote that the flag is now unnecessary, but it's kept so existing calls likeopa exec -fjson ...remain valid.Security Fix: CVE-2024-8260 (#6933)
This release includes a fix where OPA would accept UNC locations on Windows. Reading those could leak NTLM hashes. The attack vector would include an adversary tricking the user in passing an UNC path to OPA, e.g.
opa eval -d $FILE. UNC paths are now forbidden. If this is an issue for you, please reach out on Slack or GitHub issues.Reported by Shelly Raban Authored by
@ashutosh-narkarDocs, Website, Ecosystem
- docs: Suggest using
opa-config.yamlas name for config file (#6966) (#6959) authored by@anderseknert- docs: Add documentation for OPA Spring Boot integration (#6898) authored by
@charlieegan3- docs: Update Istio tutorial (#6896) authored by
@Pindar- docs: Update contrib docs (#6974) authored by
@charlieegan3
... (truncated)
Changelog
Sourced from github.com/open-policy-agent/opa's changelog.
0.68.0
This release contains a mix of features and bugfixes.
Breaking Changes
entrypointannotation impliesdocumentscope (#6798)The entrypoint annotation's scope requirement has changed from
ruletodocument(open-policy-agent/opa#6798). Furthermore, if noscopeannotation is declared for a METADATA block preceding a rule, the presence of anentrypointannotation with atruevalue will assign the block adocumentscope, where therulescope is otherwise the default.In practice, a rule entrypoint always point to the entire document and not a particular rule definition. The previous behavior was a bug, and one we've now addressed.
Authored by
@anderseknertTopdown and Rego
- ast: Fixing nil-pointer dereference in compiler for partial rule edge case (#6930) authored by
@johanfylling- ast+parser: Add hint to future-proof imports (6968) authored by
@srenatus- topdown: Adding unification scope to virtual-cache key. Fixing issue where false positive cache hits can occur when unification "restricts" the scope of ref-head rule evaluation (#6926) authored by
@johanfyllingreported by@anderseknert- topdown: Marshal JWT encode sign inputs as JSON (#6934) authored by
@charlieegan3Runtime, Tooling, SDK
- ast: Make type checker
copymethod copy all values (#6949) authored by@anderseknert- ast: Include term locations in rule heads when requested (#6860) authored by
@anderseknert- debug: Adding experimental debugger SDK (#6876) authored by
@johanfylling- distributedtracing: allow OpenTelemetry resource attributes to be configured under distributed_tracing config (#6942) authored and reported by
@brettmc- download: Fixing issue when saving OCI bundles on disk (#6939) authored and reported by
@Sergey-Kizimov- logging: Always include HTTP request context in incoming req context (#6951) authored by
@ashutosh-narkarreported by@alvarogomez93- plugins/bundle: Avoid race-condition during bundle reconfiguration and activation (#6849) authored by
@ashutosh-narkarreported by@Pushpalanka- plugins/bundle: Escape reserved chars used in persisted bundle directory name (#6915) authored by
@ashutosh-narkarreported by@alvarogomez93- plugins/rest: Support AWS_CONTAINER_CREDENTIALS_FULL_URI metadata endpoint (#6893) authored and reported by
@mbamber- util+server: Fix bug around chunked request handling. (#6904) authored by
@philipaconradreported by@David-Wobrockopa exec: This command never supported "pretty" formatting (--format=prettyor-f pretty), onlyjson. Passingprettyis now invalid. (#6923) authored by@srenatusNote that the flag is now unnecessary, but it's kept so existing calls likeopa exec -fjson ...remain valid.Security Fix: CVE-2024-8260 (#6933)
This release includes a fix where OPA would accept UNC locations on Windows. Reading those could leak NTLM hashes. The attack vector would include an adversary tricking the user in passing an UNC path to OPA, e.g.
opa eval -d $FILE. UNC paths are now forbidden. If this is an issue for you, please reach out on Slack or GitHub issues.Reported by Shelly Raban Authored by
@ashutosh-narkarDocs, Website, Ecosystem
... (truncated)
Commits
db53d77Prepare v0.68.0 release (#6976)2d28934build(deps): bump github/codeql-action from 3.26.5 to 3.26.61bec88cdocs: Update contrib docs (#6974)3ac5104debug: Adding debugger SDK (#6877)b0f417fbuild(deps): bump github.com/prometheus/client_golang from 1.20.1 to 1.20.2d613fd1build(deps): bump google.golang.org/grpc from 1.65.0 to 1.66.0 (#6971)f10cc1fChange required scope ofentrypointfromruletodocument(#6963)5d08783topdown: Adding unification scope to virtual-cache key25d21f5ast/parser: add hint to future-proof imports (#6968)7b535a7Docs: suggest usingopa-config.yamlas name for config file (#6966)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.
Looks like github.com/open-policy-agent/opa is up-to-date now, so this is no longer needed.