hcunit
hcunit copied to clipboard
Bump github.com/open-policy-agent/opa from 0.14.2 to 0.43.1
Bumps github.com/open-policy-agent/opa from 0.14.2 to 0.43.1.
Release notes
Sourced from github.com/open-policy-agent/opa's releases.
v0.43.1
This is a security release fixing the following vulnerabilities:
CVE-2022-36085: Respect unsafeBuiltinMap for 'with' replacements in the compiler
See https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr for all details.
CVE-2022-27664 and CVE-2022-32190.
Fixed by updating the Go version used in our builds to 1.18.6, see https://groups.google.com/g/golang-announce/c/x49AQzIVX-s. Note that CVE-2022-32190 is most likely not relevant for OPA's usage of net/url. But since these CVEs tend to come up in security assessment tooling regardless, it's better to get it out of the way.
v0.43.0
This release contains a number of fixes, enhancements, and performance improvements.
Object Insertion Optimization
Rego Object insertion operations did not scale linearly (#4625) in the past, and experienced noticeable reallocation/memory movement overheads once the Object grew past 120k-150k keys in size.
This release introduces different handling of Object internals during insert operations to avoid pathological reallocation behavior, and allows linear performance scaling up into the 500k key range and beyond.
Tooling, SDK, and Runtime
- Add lines covered/not covered counts to test coverage report (authored by
@FarisR99
)- Plugins: Status and logs plugins now accept any HTTP 2xx status code (authored by
@lvisterin
)- Runtime: Generalize OS check for MacOS to other Unix-likes (authored by
@iamleot
)Bundles Fixes
The Bundles system received several bugfixes and performance improvements in this release:
- Bundle:
opa bundle
command now supports.yml
files (#4859) authored by@Joffref
reported by@rdrgmnzsakt
- Plugins/Bundle: Use unique temporary files for persisting activated bundles to disk (#4782) authored by
@FredrikAppelros
reported by@FredrikAppelros
- Server: Old policy path is now checked for bundle ownership before update (#4846)
- Storage+Bundle: Old bundle data is now cleaned before new bundle activation (#4940)
- Bundle: Paths are now normalized before bundle root check occurs to ensure checks are os-independent
Storage Fixes
The Storage system received mostly bugfixes, with a notable performance improvement for large bundles in this release:
- storage/inmem: Speed up bundle activation by avoiding unnecessary read operations (#4898)
- storage/inmem: Paths are now created during truncate operations if they did not exist before
- storage/disk: Symlinks work with relative paths now (#4869)
Rego and Topdown
... (truncated)
Changelog
Sourced from github.com/open-policy-agent/opa's changelog.
0.43.1
This is a security release fixing the following vulnerabilities:
CVE-2022-36085: Respect unsafeBuiltinMap for 'with' replacements in the compiler
See https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr for all details.
CVE-2022-27664 and CVE-2022-32190.
Fixed by updating the Go version used in our builds to 1.18.6, see https://groups.google.com/g/golang-announce/c/x49AQzIVX-s. Note that CVE-2022-32190 is most likely not relevant for OPA's usage of net/url. But since these CVEs tend to come up in security assessment tooling regardless, it's better to get it out of the way.
0.43.0
This release contains a number of fixes, enhancements, and performance improvements.
Object Insertion Optimization
Rego Object insertion operations did not scale linearly (#4625) in the past, and experienced noticeable reallocation/memory movement overheads once the Object grew past 120k-150k keys in size.
This release introduces different handling of Object internals during insert operations to avoid pathological reallocation behavior, and allows linear performance scaling up into the 500k key range and beyond.
Tooling, SDK, and Runtime
- Add lines covered/not covered counts to test coverage report (authored by
@FarisR99
)- Plugins: Status and logs plugins now accept any HTTP 2xx status code (authored by
@lvisterin
)- Runtime: Generalize OS check for MacOS to other Unix-likes (authored by
@iamleot
)Bundles Fixes
The Bundles system received several bugfixes and performance improvements in this release:
- Bundle:
opa bundle
command now supports.yml
files (#4859) authored by@Joffref
reported by@rdrgmnzsakt
- Plugins/Bundle: Use unique temporary files for persisting activated bundles to disk (#4782) authored by
@FredrikAppelros
reported by@FredrikAppelros
- Server: Old policy path is now checked for bundle ownership before update (#4846)
- Storage+Bundle: Old bundle data is now cleaned before new bundle activation (#4940)
- Bundle: Paths are now normalized before bundle root check occurs to ensure checks are os-independent
Storage Fixes
The Storage system received mostly bugfixes, with a notable performance improvement for large bundles in this release:
- storage/inmem: Speed up bundle activation by avoiding unnecessary read operations (#4898)
... (truncated)
Commits
196c92d
Release v0.43.13e8c754
ast/compile: respect unsafeBuiltinMap for 'with' replacementsb78756f
build: bump golang: 1.18 -> 1.18.6d75bbdd
Prepare v0.43.0 release (#4949)a99e5a9
docs: add warning about importing 'future.keywords' (#4947)8f63046
storage+bundle: Clean old bundle data before new activation (#4944)462d518
docs: Add note about counter_server_query_cache_hit metric (#4946)eff91f7
build(deps): bump aquasecurity/trivy-action from 0.6.0 to 0.6.1 (#4941)1c1957c
topdown/copypropagation: keep refs into livevars (#4936)7f78653
build: run 'make generate' in release container (#4934)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -
@dependabot use these labels
will set the current labels as the default for future PRs for this repo and language -
@dependabot use these reviewers
will set the current reviewers as the default for future PRs for this repo and language -
@dependabot use these assignees
will set the current assignees as the default for future PRs for this repo and language -
@dependabot use this milestone
will set the current milestone as the default for future PRs for this repo and language
You can disable automated security fix PRs for this repo from the Security Alerts page.