Skip to content

chore: bump github.com/open-policy-agent/opa from 0.41.0 to 0.44.0 #4024

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Sep 12, 2022

Bumps github.com/open-policy-agent/opa from 0.41.0 to 0.44.0.

Release notes

Sourced from github.com/open-policy-agent/opa's releases.

v0.44.0

This release contains a number of fixes, two new builtins, a few new features, and several performance improvements.

Security Fixes

This release includes the security fixes present in the recent v0.43.1 release, which mitigate CVE-2022-36085 in OPA itself, and CVE-2022-27664 and CVE-2022-32190 in our Go build tooling.

See the Release Notes for v0.43.1 for more details.

Set Element Addition Optimization

Rego Set element addition operations did not scale linearly (#4999) in the past, and like the Object type before v0.43.0, experienced noticeable reallocation/memory movement overheads once the Set grew past 120k-150k elements in size.

This release introduces different handling of Set internals during element addition operations to avoid pathological reallocation behavior, and allows linear performance scaling up into the 500k key range and beyond.

Set union Built-in Optimization

The Set union builtin allows applying the union operation to a set of sets.

However, as discovered in #4979, its implementation generated unnecessary intermediate copies, which resulted in poor performance; in many cases, worse than writing the equivalent operation in pure Rego.

This release improves the union builtin's implementation, such that only the final result set is ever modified, reducing memory allocations and GC pressure. The union builtin is now about 15-30% faster than the equivalent operation in pure Rego.

New Built-in Functions: strings.any_prefix_match and strings.any_suffix_match

This release introduces two new builtins, optimized for bulk matching of string prefixes and suffixes: strings.any_prefix_match, and strings.any_suffix_match. It works with sets and arrays of strings, allowing efficient matching of collections of prefixes or suffixes against a target string.

See the built-in functions docs for all the details

This implementation fixes #4994 and was authored by @​cube2222.

Tooling, SDK, and Runtime

  • Logger: Allow configuration of the timestamp format (#2413)
  • loader: Add support for fs.FS (authored by @​ear7h)

Bundles

This release includes several bugfixes and improvements around bundle building:

  • cmd: Add optimize flag to OPA eval command to allow building optimized bundles
  • cmd/build+compile: Allow opt-out of dependents gathering to allow compilation of more bundles into WASM (#5035)
  • opa build -t wasm|plan: Fail on unmatched entrypoints (#3957)
  • opa build: Fix bundle mode to work with ignore flag
  • bundle/status: Include bundle size in status information
  • bundle: Remove raw bytes check for lazy bundle loading mode

Storage Fixes

This release has performance improvements and bugfixes for the disk storage system:

... (truncated)

Changelog

Sourced from github.com/open-policy-agent/opa's changelog.

0.44.0

This release contains a number of fixes, two new builtins, a few new features, and several performance improvements.

Security Fixes

This release includes the security fixes present in the recent v0.43.1 release, which mitigate CVE-2022-36085 in OPA itself, and CVE-2022-27664 and CVE-2022-32190 in our Go build tooling.

See the Release Notes for v0.43.1 for more details.

Set Element Addition Optimization

Rego Set element addition operations did not scale linearly (#4999) in the past, and like the Object type before v0.43.0, experienced noticeable reallocation/memory movement overheads once the Set grew past 120k-150k elements in size.

This release introduces different handling of Set internals during element addition operations to avoid pathological reallocation behavior, and allows linear performance scaling up into the 500k key range and beyond.

Set union Built-in Optimization

The Set union builtin allows applying the union operation to a set of sets.

However, as discovered in #4979, its implementation generated unnecessary intermediate copies, which resulted in poor performance; in many cases, worse than writing the equivalent operation in pure Rego.

This release improves the union builtin's implementation, such that only the final result set is ever modified, reducing memory allocations and GC pressure. The union builtin is now about 15-30% faster than the equivalent operation in pure Rego.

New Built-in Functions: strings.any_prefix_match and strings.any_suffix_match

This release introduces two new builtins, optimized for bulk matching of string prefixes and suffixes: strings.any_prefix_match, and strings.any_suffix_match. It works with sets and arrays of strings, allowing efficient matching of collections of prefixes or suffixes against a target string.

See the built-in functions docs for all the details

This implementation fixes #4994 and was authored by @​cube2222.

... (truncated)

Commits
  • e8d488f Prepare v0.44.0 release (#5109)
  • b391076 Integrate patch release v0.43.1 (#5108)
  • 25a597b ast/compile: respect unsafeBuiltinMap for 'with' replacements (#5107)
  • 9adf9a8 build(deps): bump github.com/agnivade/levenshtein from 1.0.1 to 1.1.1 (#5085)
  • 3ed3643 builtins: update description of format_int to say it rounds down
  • b5cbbb5 opa build -t wasm|plan: fail on unmatched entrypoints
  • 15412b1 ecosystem: add some links to Rönd (#5102)
  • 1bcf82c build: bump golang: 1.19 -> 1.19.1 (#5099)
  • b7bdd61 rego/rego_test: test with test server, not httpbin.org (#5098)
  • 6a439c5 topdown: Fix key construction for NDBCache; rego: avoid NDBCache init (#5097)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/open-policy-agent/opa-0.44.0 branch from c1efd71 to 556d192 Compare September 12, 2022 17:46
@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/open-policy-agent/opa-0.44.0 branch from 556d192 to 534e337 Compare September 12, 2022 17:47
@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/open-policy-agent/opa-0.44.0 branch from 534e337 to 41f0933 Compare September 12, 2022 17:49
@kylecarbs kylecarbs closed this Sep 12, 2022
@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Sep 12, 2022

OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version. You can also ignore all major, minor, or patch releases for a dependency by adding an ignore condition with the desired update_types to your config file.

If you change your mind, just re-open this PR and I'll resolve any conflicts on it.

@kylecarbs kylecarbs deleted the dependabot/go_modules/github.com/open-policy-agent/opa-0.44.0 branch September 12, 2022 17:56
@coadler coadler restored the dependabot/go_modules/github.com/open-policy-agent/opa-0.44.0 branch September 16, 2022 18:01
@coadler coadler reopened this Sep 16, 2022
@coadler
Copy link
Contributor

coadler commented Sep 16, 2022

@dependabot recreate

Bumps [github.com/open-policy-agent/opa](https://github.com/open-policy-agent/opa) from 0.41.0 to 0.44.0.
- [Release notes](https://github.com/open-policy-agent/opa/releases)
- [Changelog](https://github.com/open-policy-agent/opa/blob/main/CHANGELOG.md)
- [Commits](open-policy-agent/opa@v0.41.0...v0.44.0)

---
updated-dependencies:
- dependency-name: github.com/open-policy-agent/opa
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/open-policy-agent/opa-0.44.0 branch from 41f0933 to 7992a0f Compare September 16, 2022 18:05
coadler added a commit that referenced this pull request Sep 16, 2022
Recreation of #4024 because it's
attempting to downgrade charm for some reason.
@coadler
Copy link
Contributor

coadler commented Sep 16, 2022

Superceded by #4094

@coadler coadler closed this Sep 16, 2022
@dependabot dependabot bot deleted the dependabot/go_modules/github.com/open-policy-agent/opa-0.44.0 branch September 16, 2022 18:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants