Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the gomodupdates group across 1 directory with 11 updates #1228

Closed

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 12, 2025

Bumps the gomodupdates group with 5 updates in the / directory:

Package From To
github.com/cert-manager/cert-manager 1.14.5 1.17.0
github.com/golang-jwt/jwt/v4 4.5.0 4.5.1
github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring 0.74.0 0.80.0
go.mondoo.com/cnquery/v11 11.15.0 11.41.0
go.mondoo.com/cnspec/v11 11.15.0 11.41.0

Updates github.com/cert-manager/cert-manager from 1.14.5 to 1.17.0

Release notes

Sourced from github.com/cert-manager/cert-manager's releases.

v1.17.0

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

v1.17.0 is a feature release with several improvements, including:

  • A helpful compliance change to RSA signatures on certificates
  • An easier way to specify passwords for PKCS#12 and JKS keystores
  • A few feature flag promotions (and a deprecation)
  • Dependency bumps and other smaller improvements

Major Themes

RSA Certificate Compliance

The United States Department of Defense published a memo in 2022 which introduced some requirements on the kinds of cryptography they require to be supported in software they use.

In effect, the memo requires that software be able to support larger RSA keys (3072-bit and 4096-bit) and hashing algorithms (SHA-384 at a minimum).

cert-manager supported large RSA keys long before the memo was published, but a quirk in implementation meant that cert-manager always used SHA-256 when signing with RSA.

In v1.17.0, cert-manager will choose a hash algorithm based on the RSA key length: 3072-bit keys will use SHA-384, and 4096-bit keys will use SHA-512. This matches similar behavior already present for ECDSA signatures.

Our expectation is that this change will have minimal impact beyond a slight increase to security and better compliance; we're not aware of Kubernetes based environments which support RSA 2048 with SHA-256 but fail with RSA 4096 and SHA-512. However, if you're using larger RSA keys, you should be aware of the change.

Easier Keystore Passwords for PKCS#12 and JKS

Specifying passwords on PKCS#12 and JKS keystores is supported in cert-manager for compatibility reasons with software which expects or requires passwords to be set; however, these passwords are not relevant to security and never have been in cert-manager.

The initial implementation of the keystores feature required these "passwords" to be stored in a Kubernetes secret, which would then be read by cert-manager when creating the keystore after a certificate was issued. This is cumbersome, especially when many passwords are set to default values such as changeit or password.

In cert-manager v1.17, it's now possible to set a keystore password using a literal string value inside the Certificate resource itself, making this process much easier with no change to security.

For example:

apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
  name: my-cert-password
spec:
  secretName: my-cert-password
  issuerRef:
    name: my-issuer
    kind: ClusterIssuer
  keystores:
    jks:
      create: true
      password: "abc123"
    pkcs12:
</tr></table> 

... (truncated)

Commits
  • 4562b9a Merge pull request #6657 from rquinio1A/feature/keystore-password-litteral
  • c6f3f0c Merge pull request #7527 from SgtCoDFish/upgrade-test-tweaks
  • 40cd2a0 Add support for setting literal keystore passwords in Certificates
  • 1747743 Merge pull request #7530 from SgtCoDFish/dns-test-integration
  • 8233733 split tests using 'live' DNS into separate package
  • 5e5ad2f Merge pull request #7529 from SgtCoDFish/bump-base
  • a522470 Merge pull request #7428 from jsoref/shorten-skipping-controller-messages
  • 2154402 bump base images to latest
  • 637eab3 Simplify skipping controller messages
  • c003da2 Merge pull request #7428 from jsoref/shorten-skipping-controller-messages
  • Additional commits viewable in compare view

Updates github.com/golang-jwt/jwt/v4 from 4.5.0 to 4.5.1

Release notes

Sourced from github.com/golang-jwt/jwt/v4's releases.

v4.5.1

Security

Unclear documentation of the error behavior in ParseWithClaims in <= 4.5.0 could lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by ParseWithClaims return both error codes. If users only check for the jwt.ErrTokenExpired using error.Is, they will ignore the embedded jwt.ErrTokenSignatureInvalid and thus potentially accept invalid tokens.

This issue was documented in GHSA-29wx-vh33-7x7r and fixed in this release.

Note: v5 was not affected by this issue. So upgrading to this release version is also recommended.

What's Changed

  • Back-ported error-handling logic in ParseWithClaims from v5 branch. This fixes GHSA-29wx-vh33-7x7r.

Full Changelog: golang-jwt/jwt@v4.5.0...v4.5.1

Commits

Updates github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring from 0.74.0 to 0.80.0

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's releases.

0.80.0 / 2025-02-04

  • [CHANGE] Add more API validations to the ScrapeConfig CRD. #7231 #7220 #7215 #7238 #7244 #7255
  • [FEATURE] Add serviceName field to the Prometheus and PrometheusAgent CRDs. #6687
  • [FEATURE] Add keepIdentifyingResourceAttributes field in OTLPConfig for Prometheus and PrometheusAgent CRDs. #7240
  • [FEATURE] Add fallbackScrapeProtocol field to ScrapeClass for Prometheus and PrometheusAgent CRDs. #7288
  • [FEATURE] Support MSTeamsV2Config receiver in Alertmanager configuration Secret. #7296
  • [FEATURE] Support JiraConfig and RocketChat receivers in Alertmanager configuration secret. #7315
  • [FEATURE] Support global smtp_tls_config field in Alertmanager configuration secret. #7316
  • [FEATURE] Add timeout field in Webhook receiver in Alertmanager configuration Secret. #7312
  • [FEATURE] Add content, username and avatarUrl fields in Discord receiver in Alertmanager configuration secret. #7313
  • [FEATURE] Add scrapeFailureLogFile field to the Prometheus and PrometheusAgent CRDs. #7038 #7311
  • [BUGFIX] Validate respective api URL field in PagerDutyConfigs, DiscordConfigs, SlackConfigs and WebhookConfigs in AlertManagerConfig CRD. #6585

0.79.2 / 2024-12-18

  • [BUGFIX] Fix pod and service monitor selector validation. #7214

0.79.1 / 2024-12-17

  • [CHANGE] Rename the field scrapeFallbackProtocol to fallbackScrapeProtocol to match with naming as in Prometheus #7199
  • [BUGFIX] Remove the field scrapeFallbackProtocol from Prometheus/PrometheusAgent global config. #7197

0.79.0 / 2024-12-13

[!IMPORTANT] With this release, the operator will be deploying Prometheus v3.0.1 unless a specific version is specified. Users who want to stay with Prometheus v2 need to set the version field under Prometheus/PrometheusAgent Spec.

  • [CHANGE/FEATURE] Set Prometheus v3.0.1 as default version installed by operator. #7158
  • [CHANGE] Add more API validations to the ScrapeConfig CRD. #6738 #7006
  • [FEATURE] Set Alertmanager API version to v2 for Prometheus v3 and above. #7102
  • [FEATURE] Add enableOTLPReceiver field in the Prometheus/PrometheusAgent CRDs. #7105
  • [FEATURE] Add support for TranslationStrategy option for OTLP receiver. #7112
  • [FEATURE] Add nameValidationScheme field in Prometheus global configuration. #7116
  • [FEATURE] Add scrapeFallbackProtocol field in Prometheus, PrometheusAgent, ServiceMonitor, PodMonitor, Probe, ScrapeConfig and globally. #7131
  • [FEATURE] Add support for labels in PrometheusRule CRD at rules level. #7140
  • [FEATURE] Add support for ProxyConfig in Alertmanager Endpoints. #7191
  • [FEATURE] Add support for configuring Alertmanager STS persistentVolumeClaimRetentionPolicy. #7183
  • [FEATURE] Add enableHTTP2 to ScrapeConfig CRD. #7024
  • [FEATURE] Add filter field in ConsulSDConfig in ScrapeConfig CRD #7124
  • [FEATURE] Add messageThreadID field to TelegramConfig in AlertmanagerConfig CRD. #6999
  • [ENHANCEMENT] Allow users to control the sharding label(s). #7126
  • [ENHANCEMENT] Add support for role selector field selectorMechanism on ServiceMonitor. #7086
  • [ENHANCEMENT] Add support for role selector field selectorMechanism on PodMonitor. #7185
  • [ENHANCEMENT] Add support for the PrometheusText1.0.0 scrape protocol. #7085
  • [ENHANCEMENT] Allow users to toggle Prometheus controller's custom configuration deprecation behavior using the --deprecate-custom-configuration flag. #6955
  • [BUGFIX] Add goGC field to PrometheusAgent CRD. #6667
  • [BUGFIX] Validate SMTPSmarthost and SMTPFrom fields in EmailConfig in AlertManagerConfig CRD. #6004
  • [BUGFIX] Fix flaky discovery behavior caused by delayed endpoints publishing for Alertmanager. #7084

0.78.2 / 2024-11-21

  • [BUGFIX] Revert the removal of the proxyURL field in AlertmanagerConfig CRD. The field takes precedence over proxyUrl. #7114

... (truncated)

Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's changelog.

0.80.0 / 2025-02-03

  • [CHANGE] Add more API validations to the ScrapeConfig CRD. #7231 #7220 #7215 #7238 #7244 #7255
  • [FEATURE] Add serviceName field to the Prometheus and PrometheusAgent CRDs. #6687
  • [FEATURE] Add keepIdentifyingResourceAttributes field in OTLPConfig for Prometheus and PrometheusAgent CRDs. #7240
  • [FEATURE] Add fallbackScrapeProtocol field to ScrapeClass for Prometheus and PrometheusAgent CRDs. #7288
  • [FEATURE] Support MSTeamsV2Config receiver in Alertmanager configuration Secret. #7296
  • [FEATURE] Support JiraConfig and RocketChat receivers in Alertmanager configuration secret. #7315
  • [FEATURE] Support global smtp_tls_config field in Alertmanager configuration secret. #7316
  • [FEATURE] Add timeout field in Webhook receiver in Alertmanager configuration Secret. #7312
  • [FEATURE] Add content, username and avatarUrl fields in Discord receiver in Alertmanager configuration secret. #7313
  • [FEATURE] Add scrapeFailureLogFile field to the Prometheus and PrometheusAgent CRDs. #7038 #7311
  • [BUGFIX] Validate respective api URL field in PagerDutyConfigs, DiscordConfigs, SlackConfigs and WebhookConfigs in AlertManagerConfig CRD. #6585

0.79.2 / 2024-12-18

  • [BUGFIX] Fix pod and service monitor selector validation. #7214

0.79.1 / 2024-12-17

  • [CHANGE] Rename the field scrapeFallbackProtocol to fallbackScrapeProtocol to match with naming as in Prometheus #7199
  • [BUGFIX] Remove the field scrapeFallbackProtocol from Prometheus/PrometheusAgent global config. #7197

0.79.0 / 2024-12-13

[!IMPORTANT] With this release, the operator will be deploying Prometheus v3.0.1 unless a specific version is specified. Users who want to stay with Prometheus v2 need to set the version field under Prometheus/PrometheusAgent Spec.

  • [CHANGE/FEATURE] Set Prometheus v3.0.1 as default version installed by operator. #7158
  • [CHANGE] Add more API validations to the ScrapeConfig CRD. #6738 #7006
  • [FEATURE] Set Alertmanager API version to v2 for Prometheus v3 and above. #7102
  • [FEATURE] Add enableOTLPReceiver field in the Prometheus/PrometheusAgent CRDs. #7105
  • [FEATURE] Add support for TranslationStrategy option for OTLP receiver. #7112
  • [FEATURE] Add nameValidationScheme field in Prometheus global configuration. #7116
  • [FEATURE] Add scrapeFallbackProtocol field in Prometheus, PrometheusAgent, ServiceMonitor, PodMonitor, Probe, ScrapeConfig and globally. #7131
  • [FEATURE] Add support for labels in PrometheusRule CRD at rules level. #7140
  • [FEATURE] Add support for ProxyConfig in Alertmanager Endpoints. #7191
  • [FEATURE] Add support for configuring Alertmanager STS persistentVolumeClaimRetentionPolicy. #7183
  • [FEATURE] Add enableHTTP2 to ScrapeConfig CRD. #7024
  • [FEATURE] Add filter field in ConsulSDConfig in ScrapeConfig CRD #7124
  • [FEATURE] Add messageThreadID field to TelegramConfig in AlertmanagerConfig CRD. #6999
  • [ENHANCEMENT] Allow users to control the sharding label(s). #7126
  • [ENHANCEMENT] Add support for role selector field selectorMechanism on ServiceMonitor. #7086
  • [ENHANCEMENT] Add support for role selector field selectorMechanism on PodMonitor. #7185
  • [ENHANCEMENT] Add support for the PrometheusText1.0.0 scrape protocol. #7085
  • [ENHANCEMENT] Allow users to toggle Prometheus controller's custom configuration deprecation behavior using the --deprecate-custom-configuration flag. #6955
  • [BUGFIX] Add goGC field to PrometheusAgent CRD. #6667
  • [BUGFIX] Validate SMTPSmarthost and SMTPFrom fields in EmailConfig in AlertManagerConfig CRD. #6004

... (truncated)

Commits
  • 56cc9ee Merge pull request #7318 from slashpai/cut-release-0.80
  • fead04d chore: update changelog for v0.80.0 updates
  • 6f920d7 feat: Refactor IonosSDConfig (#7255)
  • 6f3c19a chore: Refactor OpenStackSDConfig (#7244)
  • 8c196e7 Merge pull request #7316 from slashpai/global-am-updates
  • 25e967e Merge pull request #7315 from slashpai/chores-0.80
  • eb25705 feat: support global smtp_tls_config in alertmanager config secret
  • 1cdc040 feat: Support Jira and RocketChat receivers in Alertmanager config secret
  • 9716e26 Merge pull request #7313 from slashpai/chore-0-80-discord
  • 50aad31 feat: add 'content', 'username' and 'avatarUrl' fields in discordConfig
  • Additional commits viewable in compare view

Updates github.com/stretchr/testify from 1.9.0 to 1.10.0

Release notes

Sourced from github.com/stretchr/testify's releases.

v1.10.0

What's Changed

Functional Changes

Fixes

Documantation, Build & CI

New Contributors

... (truncated)

Commits
  • 89cbdd9 Merge pull request #1626 from arjun-1/fix-functional-options-diff-indirect-calls
  • 07bac60 Merge pull request #1667 from sikehish/flaky
  • 716de8d Increase timeouts in Test_Mock_Called_blocks to reduce flakiness in CI
  • 118fb83 NotSame should fail if args are not pointers #1661 (#1664)
  • 7d99b2b attempt 2
  • 05f87c0 more similar
  • ea7129e better fmt
  • a1b9c9e Merge pull request #1663 from ybrustin/master
  • 8302de9 Merge branch 'master' into master
  • 89352f7 Merge pull request #1518 from hendrywiranto/adjust-readme-remove-v2
  • Additional commits viewable in compare view

Updates go.mondoo.com/cnquery/v11 from 11.15.0 to 11.41.0

Release notes

Sourced from go.mondoo.com/cnquery/v11's releases.

v11.41.0

What's Changed

Full Changelog: mondoohq/cnquery@v11.40.0...v11.41.0

v11.40.0

What's Changed

... (truncated)

Commits
  • b685f44 🐛 Do not stop sbom generation on the first encountered unmarshal error. (#5204)
  • e3c2a46 ✨ Do not error out on SBOM generation, use the sbom ErrorMessage instead (#5202)
  • 96c265f ⭐️ azure msdefender security settings (MCAS, WDATP, Sentinel) (#5203)
  • 228bb92 ✨ azure support for defender email notification sources (#5185)
  • 4fc37ac Bump golangci/golangci-lint-action from 6.2.0 to 6.3.1 (#5201)
  • 48deba6 🐛 Fix namespace for Red Hat PURLs (#5199)
  • 3830244 🐛 Add id to CVSS score (#5163)
  • ec225d2 🧹 Update deps for cnquery and providers 20250210 (#5200)
  • 002452a ✨ Simplify retrieval of devices via logical unit numbers. (#5141)
  • 84a8dde Cleanup fields in AWS yaml (#5191)
  • Additional commits viewable in compare view

Updates go.mondoo.com/cnspec/v11 from 11.15.0 to 11.41.0

Release notes

Sourced from go.mondoo.com/cnspec/v11's releases.

v11.41.0

What's Changed

Full Changelog: mondoohq/cnspec@v11.40.0...v11.41.0

v11.40.0

What's Changed

Full Changelog: mondoohq/cnspec@v11.39.0...v11.40.0

v11.39.0

What's Changed

Full Changelog: mondoohq/cnspec@v11.38.0...v11.39.0

v11.38.0

What's Changed

Full Changelog: mondoohq/cnspec@v11.37.1...v11.38.0

v11.37.1

... (truncated)

Commits

Updates go.mondoo.com/mondoo-go from 0.0.0-20240716062427-ec95d879cbe7 to 0.0.0-20250205000345-690a9b35d697

Commits

Updates github.com/google/go-containerregistry from 0.20.1 to 0.20.3

Release notes

Sourced from github.com/google/go-containerregistry's releases.

v0.20.3

What's Changed

Bumps the gomodupdates group with 5 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/cert-manager/cert-manager](https://github.com/cert-manager/cert-manager) | `1.14.5` | `1.17.0` |
| [github.com/golang-jwt/jwt/v4](https://github.com/golang-jwt/jwt) | `4.5.0` | `4.5.1` |
| [github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring](https://github.com/prometheus-operator/prometheus-operator) | `0.74.0` | `0.80.0` |
| [go.mondoo.com/cnquery/v11](https://github.com/mondoohq/cnquery) | `11.15.0` | `11.41.0` |
| [go.mondoo.com/cnspec/v11](https://github.com/mondoohq/cnspec) | `11.15.0` | `11.41.0` |



Updates `github.com/cert-manager/cert-manager` from 1.14.5 to 1.17.0
- [Release notes](https://github.com/cert-manager/cert-manager/releases)
- [Changelog](https://github.com/cert-manager/cert-manager/blob/master/RELEASE.md)
- [Commits](cert-manager/cert-manager@v1.14.5...v1.17.0)

Updates `github.com/golang-jwt/jwt/v4` from 4.5.0 to 4.5.1
- [Release notes](https://github.com/golang-jwt/jwt/releases)
- [Changelog](https://github.com/golang-jwt/jwt/blob/main/VERSION_HISTORY.md)
- [Commits](golang-jwt/jwt@v4.5.0...v4.5.1)

Updates `github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring` from 0.74.0 to 0.80.0
- [Release notes](https://github.com/prometheus-operator/prometheus-operator/releases)
- [Changelog](https://github.com/prometheus-operator/prometheus-operator/blob/main/CHANGELOG.md)
- [Commits](prometheus-operator/prometheus-operator@v0.74.0...v0.80.0)

Updates `github.com/stretchr/testify` from 1.9.0 to 1.10.0
- [Release notes](https://github.com/stretchr/testify/releases)
- [Commits](stretchr/testify@v1.9.0...v1.10.0)

Updates `go.mondoo.com/cnquery/v11` from 11.15.0 to 11.41.0
- [Release notes](https://github.com/mondoohq/cnquery/releases)
- [Changelog](https://github.com/mondoohq/cnquery/blob/main/.goreleaser.yml)
- [Commits](mondoohq/cnquery@v11.15.0...v11.41.0)

Updates `go.mondoo.com/cnspec/v11` from 11.15.0 to 11.41.0
- [Release notes](https://github.com/mondoohq/cnspec/releases)
- [Changelog](https://github.com/mondoohq/cnspec/blob/main/.goreleaser.yml)
- [Commits](mondoohq/cnspec@v11.15.0...v11.41.0)

Updates `go.mondoo.com/mondoo-go` from 0.0.0-20240716062427-ec95d879cbe7 to 0.0.0-20250205000345-690a9b35d697
- [Commits](https://github.com/mondoohq/mondoo-go/commits)

Updates `github.com/google/go-containerregistry` from 0.20.1 to 0.20.3
- [Release notes](https://github.com/google/go-containerregistry/releases)
- [Changelog](https://github.com/google/go-containerregistry/blob/main/.goreleaser.yml)
- [Commits](google/go-containerregistry@v0.20.1...v0.20.3)

Updates `github.com/prometheus/client_golang` from 1.19.1 to 1.20.5
- [Release notes](https://github.com/prometheus/client_golang/releases)
- [Changelog](https://github.com/prometheus/client_golang/blob/main/CHANGELOG.md)
- [Commits](prometheus/client_golang@v1.19.1...v1.20.5)

Updates `google.golang.org/protobuf` from 1.34.2 to 1.36.5

Updates `k8s.io/utils` from 0.0.0-20240711033017-18e509b52bc8 to 0.0.0-20241210054802-24370beab758
- [Commits](https://github.com/kubernetes/utils/commits)

---
updated-dependencies:
- dependency-name: github.com/cert-manager/cert-manager
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: github.com/golang-jwt/jwt/v4
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomodupdates
- dependency-name: github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: github.com/stretchr/testify
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: go.mondoo.com/cnquery/v11
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: go.mondoo.com/cnspec/v11
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: go.mondoo.com/mondoo-go
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomodupdates
- dependency-name: github.com/google/go-containerregistry
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomodupdates
- dependency-name: github.com/prometheus/client_golang
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: google.golang.org/protobuf
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: k8s.io/utils
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomodupdates
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Feb 12, 2025
Copy link

Test Results

0 files   -   5  0 suites   - 51   0s ⏱️ - 2h 26m 42s
0 tests  - 319  0 ✅  - 309  0 💤 ±0  0 ❌  - 10 
0 runs   - 388  0 ✅  - 348  0 💤 ±0  0 ❌  - 40 

Results for commit aaeee0f. ± Comparison against base commit 5eccaf4.

Copy link
Contributor Author

dependabot bot commented on behalf of github Feb 14, 2025

Superseded by #1229.

@dependabot dependabot bot closed this Feb 14, 2025
@dependabot dependabot bot deleted the dependabot/go_modules/gomodupdates-3cfff4c120 branch February 14, 2025 08:42
@github-actions github-actions bot locked and limited conversation to collaborators Feb 14, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants