Update Go modules (major)#1236
Conversation
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
|
|
Important Review skippedBot user detected. To trigger a single review, invoke the ⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Hi @red-hat-konflux[bot]. Thanks for your PR. I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with Regular contributors should join the org to skip this step. Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
This PR contains the following updates:
v4.3.0→v5.0.3v1.3.7→v2.2.6v2.2.12→v3.1.2v2.2.10→v4.0.1v2.4.3→v3.0.4v4.13.0→v5.9.11v2.4.0→v3.0.1Warning
Some dependencies could not be looked up. Check the warning logs for more information.
Release Notes
cenkalti/backoff (github.com/cenkalti/backoff/v4)
v5.0.3Compare Source
v5.0.2Compare Source
v5.0.1Compare Source
v5.0.0Compare Source
netsampler/goflow2 (github.com/netsampler/goflow2)
v2.2.6Compare Source
v2.2.5Compare Source
v2.2.4Compare Source
v2.2.3Compare Source
v2.2.2Compare Source
v2.2.1Compare Source
v2.2.0Compare Source
v2.1.5Compare Source
v2.1.4Compare Source
v2.1.3Compare Source
v2.1.2Compare Source
v2.1.1Compare Source
v2.1.0Compare Source
v2.0.0Compare Source
pion/dtls (github.com/pion/dtls/v2)
v3.1.2Compare Source
Changelog
a621789Retract v3.1.01beb12fFix OpenSSL Interop for RSA SignatureHashAlgos605dc7eUpdate module golang.org/x/crypto to v0.45.0 [SECURITY] (#756)2d6d27fUpdate CI configs to v0.11.39v3.1.1Compare Source
Changelog
fa21c26Retract v3.1.0dc45e23Fix OpenSSL Interop for RSA SignatureHashAlgosv3.1.0Compare Source
Options patterns, Security fix and performance improvements.
Changelog
61762deUse sequence number for nonce in GCM ciphers (#796)46ee7c3Refactor Common AEAD Code in Ciphersuite Package (#789)10bd10aPrefer server srtp protection profiles ordering93c2677Fix rare flaky testd46d2a7Fix Bug in signature_algorithms_cert Handling (#791)acad848DTLS 1.3 signature_algorithms_cert Extension (#788)0a5b311Introduce options patterns9495befDTLS 1.3 RSA-PSS Signature Scheme Support (#778)f1c63e9Refactor error types for 1.3 extensions (#787)bed33feAdd PreSharedKey extensions for DTLS 1.3 (#773)01f7ba5Update CI configs to v0.11.375b824b0CCM Encrypt Speed + Memory Mgmt Improvements (#784)100a3aaGCM Speed + Memory Mgmt Improvements (#783)199a753Add Ciphersuite Benchmark Tests (#781)6b2fbf1Fix Race Condition in TestListenerCustomConnIDs (#782)8ea3afcFix intermittent unit test failures (#780)c6db81bUpdate README44160f0DTLS 1.3 CertificateRequest + Certificate Messages (#774)9121462Add Cookie extension for DTLS 1.3 (#770)v3.0.11Compare Source
Backport security fix for GHSA-9f3f-wv7r-qc8r (CVE-2026-26014)
This is the only release with the security fix for Go v1.21.
v3.0.10Compare Source
Changelog
713910aUpgrade to pion/transport/v4e0d3160Add the key share extension (#749)7a57e26Update CI configs to v0.11.3608d8c3eFix gosec slice bounds warnings (#764)7b9612eHandshake fragments assembly refactoring (#762)v3.0.9Compare Source
Changelog
ab5f89bImplement TLS_EMPTY_RENEGOTIATION_INFO_SCSVd5761acPrevent negative intervalsv3.0.8Compare Source
Changelog
ffd97f5Backoff handshake retransmit7ab1bc9Update actions/checkout action to v6bdb5f23Update module github.com/pion/transport/v3 to v3.1.1 (#754)1d9b6b1Update module github.com/pion/transport/v3 to v3.1.0c06c3a7Lock while writing to encryptedPacketsca7d80eUpdate CI configs to v0.11.329cfb13fImprove the record layer fuzz testsdaa0fd4Add fuzz tests for gcm9ed5950Add fuzz tests for ccm7b68bd9Add fuzz tests for packet buffer7c62411Update CI configs to v0.11.313e12f76Add more tests for prfe7cbd62Migrate elliptic curves from elliptic to ecdh6ff535fUpdate module github.com/pion/transport/v3 to v3.0.8f6b0286Add the supported_versions extension120a895Handle ECONNREFUSED timeouted044c0Update CI configs to v0.11.295611b14Apply go modernize27c3405Update actions/checkout action to v58764fbdUpdate CI configs to v0.11.26465f544Update CI configs to v0.11.256e1e3c9Update module github.com/stretchr/testify to v1.11.1495a7b5Update CI configs to v0.11.240b11eabUpdate module github.com/stretchr/testify to v1.11.0b8c2ab4Fix lint issues with golangci-lint@v20bf1902Update CI configs to v0.11.22v3.0.7Compare Source
Changelog
e3cf6bcComply with RFC5746 and RFC5246f0c0987Update module github.com/pion/logging to v0.2.463bf30cUpdate CI configs to v0.11.2034fbe21Replace interface{} with any8bf2c71Fix packet buffer read index after buffer resize806ff2fRefactor cfg.onFlightState, avoid data racef5e908fUpdate CI configs to v0.11.1958d3b7eUpdate lint rules, force testify/asserte57dc04Update social media links, move to discordv3.0.6Compare Source
What's Changed
Full Changelog: pion/dtls@v3.0.5...v3.0.6
v3.0.5Compare Source
Changelog
fbc7baeUpdate docker.io/library/golang Docker tag to v1.24 (#694)13b929bUpdate module golang.org/x/net to v0.37.0 (#697)3a0f50aUse crypto.Signer whenever possible (#681)16d6306Update module golang.org/x/net to v0.34.0 (#693)8eb9a91Upgrade golangci-lint, more linters1c0df61Update module github.com/pion/logging to v0.2.3 (#691)1e4ae60Update module golang.org/x/net to v0.33.0 [SECURITY]ceb8458Update module golang.org/x/crypto to v0.31.0 [SECURITY]4e34db5Update module golang.org/x/net to v0.31.002434c7Update module golang.org/x/crypto to v0.29.0v3.0.4Compare Source
Changelog
b3e02c4Update module golang.org/x/net to v0.30.03f61fd2Fix RSA signature verification issued796437Improve fuzzingv3.0.3Compare Source
Changelog
98a05d6Fix incorrect client retransmissionsd7f5feeUpdate module golang.org/x/net to v0.29.00be603aUpdate module golang.org/x/crypto to v0.27.00790369Update module golang.org/x/net to v0.28.0f13eec1Update module golang.org/x/crypto to v0.26.0e193dc2Update go.mod version to 1.20v3.0.2Compare Source
Changelog
1a02350Fix race between Conn.Close and Conn.Handshake032d60cUpdate CI configs to v0.11.15f6ecbc2Update docker.io/library/golang Docker tag to v1.23fd18984Fix pkg.go.dev linkv3.0.1Compare Source
Changelog
e20b162Fix multiple calls to Handshakef3e8a9eFix segfault in State::serialize method5a72b12Update module github.com/pion/transport/v3 to v3.0.7c5ab822Update module golang.org/x/net to v0.27.023674bdUpdate module golang.org/x/crypto to v0.25.07ab74fbAdd support for MKI in use_srtp7139e0eFix time units in example2ed7caaUpdate module github.com/pion/transport/v3 to v3.0.6v3.0.0Compare Source
Pion DTLS v3.0.0 is now available. Pion DTLS is a Go implementation of DTLS. It allows for secure communication over UDP. It is commonly used for VPNs, WebRTC and other real-time protocols.
This release includes 115 commits from 17 authors. This release added Connection Identifiers, concurrent handshaking when Accepting inbound connections, Censorship Circumvention and better resilience against packet loss during handshaking.
A special thank you to kevmo314 and hasheddan for all their hard work on making this release happen.
This release contains breaking changes. Please read the following carefully, the breakage can't be caught at compile time. Each change will have a linked commit. Looking at
examples/in the linked commit should show what code you need to change in your application.Breaking Changes
Before
/v2Pion DTLS would handshake on Server or Client creation. This design caused theAcceptimplementation to be blocking. A new connection couldn't be accept until the previous one had finished.This design also doesn't match the
crypto/tlsimplementation in stdlib. This mismatch would cause frustration/confusion for users.Now the handshaking only occurs when
Read,WriteorHandshakeis called. In most cases users shouldn't notice a difference.If you do want a Handshake performed without a
ReadorWritethis is the change needed.Before
After
This change was made in e4064683
New Features
Connection IDs
Connection IDs is a new feature added to the DTLS protocol itself. This change allows for clients to change IPs/Ports during a session. This allows for devices to roam (like phones) or for low power devices to shut down and reconnect without losing their DTLS session!
Connection ID generation is pluggable via the dtls.Config structure, and a random CID generator with a static size is provided for convenience. A new example has been added to demonstrate this functionality.
For those interested in digging deeper into the full set of changes, the majority of work was done in #570.
Censorship Circumvention
Software that is used to circumvent censorship like snowflake uses Pion. To block this (and other) software goverments have looked for patterns and differences in Pion DTLS and blocked it.
This new release contains hooks that allows users to randomize and circumvent these blocks. Users can modify ClientHello, ServerHello and CertificateRequest. Users can also smuggle information in a ServerHello/ClientHello RandomBytes.
You can see them all here here
Changelog
The complete log between v2.2.7 and v3.0.0:
0a8d838Prepare /v3b6fd38eUpdate module github.com/pion/transport/v3 to v3.0.5e406468Perform handshake on first read/write6178064Mark NULL and AES256CM SRTP ciphers as supportedbc3159aAdded DTLS-SRTP IDs for NULL and AES256CM ciphersd013d0cOn Read Retransmit send FSM to SENDINGec76652Retransmit last flight when in finished602dc71Make localConnectionID thread safe0a1b73aRespect disableRetransmitBackoffa6d9640Add OnConnectionAttempt to Config48d6748Implement retransmit backoff according to 4.2.4.145e16a0Update module golang.org/x/net to v0.26.0a5d1facFlight3: respect curves configuration61b3466Add ability to select cert based on ch rand byteseddca22Update module golang.org/x/crypto to v0.24.0edc7ad0Limit size of encrypted packet queuefbbdf66Update module golang.org/x/net to v0.25.0efd6737Add test for PSK and Identitycb62aacFix typo in test494c1a3Remove testify dependencyadec94aUpdate golang Docker tag to v1.228738ce1Add handshake hooking2c36d63Update module golang.org/x/net to v0.24.0d606c79Update module golang.org/x/crypto to v0.22.0f6f666eUpdate module golang.org/x/net to v0.23.0 [SECURITY]e008bc4Update CI configs to v0.11.123e667b0Update go.mod version to 1.19ae51db9Update CI configs to v0.11.78244c45Update CI configs to v0.11.40ad9cfdUpdate module github.com/pion/transport/v3 to v3.0.28a93e0eFix TestErrorsTemporary38e39e4Update module golang.org/x/net to v0.22.0a245727Update module golang.org/x/crypto to v0.21.05e95b5cUpdate module github.com/stretchr/testify to v1.9.035a00d3Fix linter errors96b8c29Fix linter errors2597464Update module golang.org/x/net to v0.20.042b6772Update module golang.org/x/crypto to v0.18.0bb54a30If not found in the cache return nil3427819Format code798b32aFix flight1parse processing exceptionba72fbaUpdate CI configs to v0.11.3520d84cUpdate CI configs to v0.11.0cfa868cRemove 'AUTHORS.txt' from README.mdb4a403cRemove 'Generate Authors' workflow9ffd96cDrop invalid record silently during handshake3e8a7d7Update module golang.org/x/crypto to v0.17.0 [SECURITY]dc751e3Update module golang.org/x/net to v0.19.03f3d833Update module golang.org/x/crypto to v0.16.0a8f7062Use atomic to avoid stale SRTP protection profile9cc3df9Respect Algorithm value in CertificateRequest7faf25fUpdate module golang.org/x/net to v0.17.0 [SECURITY]c864545Update module golang.org/x/net to v0.15.028431d9Export CipherSuiteID in connection State8401874Update module golang.org/x/crypto to v0.13.0744e27aUpdate actions/checkout action to v42b584afSpecifying underlying type of conn ID atomic.Value70caf30Use atomic.Value to maintain Go 1.13 compatibility60064c6Update module github.com/pion/transport/v3 to v3.0.1ef50d6bUpdate AUTHORS.txt7e5003aUpdate AUTHORS.txtdbc7fd9Update module github.com/pion/transport/v3 to v3.0.0a681f67Correctly identify client and server with PSK IDe85f106Update module github.com/pion/transport/v2 to v2.2.27bf18f8Update module golang.org/x/net to v0.14.0609e5beClear CIDs on potential session resumptione142ee1Serialize CIDs in state37fbc04Add CID send only client example6df50a6Add CID listener examplef5875c1Set UDP routing if CID is enablede663309Add CID routing unit tests9db84b5Add CID based datagram routinga8998afAdd UDP net.PacketListener unit tests71db42bIntroduce UDP net.PacketListener3afeb7dAdd PacketBuffer unit testseb305b1Introduce net PacketBuffer703da0cConsume net package in tests4f53ce1Introduce net packagef1d8b0aWrap Alerts when CID is negotiated3082313Convert nil CIDs to empty byte slice83b1254Fix name of cipher suite initialization function818feb8Set timeout to 10 minutes on e2e workflowd29c6f0Add basic connection ID generators2f2bc8dAdd e2e CID testsee04141Update tests to wrap net.Connf960a37Wrap net.Conn in DTLS listenerafb61f1Update DTLS Conn to use PacketConn and CIDd082911Add Conn to PacketConn utilitye5420deUpdate handshaker to handle CID extension8922879Update ciphersuites to support CIDs8ba47cbImplement AEAD additional data with CID27fd131Add local and remote CID to state9a37bfdImplement AddUint48 utility1ce6f27Add CID content type6af61b1Allow packets to specify CID wrappedb7b1e44Add support for CID related generators2005135Add support for parsing CID records9e4a4e7Add DTLS connection ID extensione9b3ce0Update pion/transport to latesta1d270fUpdate module golang.org/x/crypto to v0.12.0a6eca6cUpdate CI configs to v0.10.11eb34e7dUpdate module golang.org/x/net to v0.13.0c9eb5f2Update module golang.org/x/net to v0.12.0b033847Clean up unneccessary nested logic7307f62Fix return of nil alertErrorsb905606Add unmarshal unit tests for extensions0736d45Fix parsing supported EC point formats93704b3Add Daniel Mangum to AUTHORS.txtcabe5b8Enable Supported Signature Algorithms265bf11Enable Elliptic Curve Supported Point Formatsd7303d0Wait for OpenSSL server shutdown in e2e test159122fUpdate e2e Go image to 1.208a11cf2Remove extraneous error checks in handshaker4fc3d8fUpdate module golang.org/x/net to v0.11.04b76abfUpdate module golang.org/x/crypto to v0.10.0pion/transport (github.com/pion/transport/v2)
v4.0.1Compare Source
Changelog
34f6010Upgrade all submoudles to v4099f50cUpgrade module to v41274e04Major release API cleanupdb239a8Add Net.CreateListenConfig37ee413Support dynamic IP registration4f3e204Add an OS-dependent reuse-port helper5ae6667Update CI configs to v0.11.368eb05fbFix gosec slice bounds warningsed40907Add new queue simulationv3.1.1Compare Source
Changelog
90bd2e1Use ping-pong buffer for batch connv3.1.0Compare Source
Changelog
030898dMake loss-filter deterministica96e806Test loss filter more82d9447Fix loss filter options418afcdAdd duplication filter45af67dFix flaky tests8115c1eFix flaky test6c2e335Simplify condition010f63aFix infinite loop when time equals deadlineae2dd64Account for drift on MacOSb506570Update CI configs to v0.11.32e146e84Update CI configs to v0.11.31v3.0.8Compare Source
Changelog
ecc075cUnblock tbf on close9774e41Enhance filters with API compatibility44c78d5Add loss and delay filter to vnetd458a44Add missing locke464f80Use Gosched instead of sleep5253aa9Update CI configs to v0.11.297a1ef19Update CI configs to v0.11.26a46d2e2Update CI configs to v0.11.25f7e8b38Update CI configs to v0.11.24ff8b26eUpdate module github.com/stretchr/testify to v1.11.1168cd17Update module github.com/stretchr/testify to v1.11.0c6ab4c7Fix lint issues with golangci-lint@v20f83320Update CI configs to v0.11.2216ea91aUpdate module github.com/pion/logging to v0.2.49589b4bHandle replay after wrapping in replaydetector0597a76Make packetio.TestBufferAlloc stable43c8901Update CI configs to v0.11.1919a9306Update social media links, move to discordb47f3b6Update lint rules, force testify/assert for tests68f413cUpdate CI configs to v0.11.183ede094Update module golang.org/x/net to v0.34.0 (#326)9e40329Update module github.com/pion/logging to v0.2.3 (#325)839bffcUpgrade golangci-lint, more linters527176eUpdate module golang.org/x/net to v0.33.0 [SECURITY]95a2949Update module golang.org/x/net to v0.31.044f8069Update module github.com/stretchr/testify to v1.10.01eb3a05Update module golang.org/x/net to v0.30.0538047eUpdate module github.com/wlynxg/anet to v0.0.5ba0d1f8Update module golang.org/x/sys to v0.26.0ea4fc43Update module golang.org/x/net to v0.29.0e8ac9aeUpdate module golang.org/x/sys to v0.24.0c5cdc15Update module golang.org/x/net to v0.28.08476d76Update go.mod version to 1.20b3a5c41Update CI configs to v0.11.157395bcfUpdate module github.com/wlynxg/anet to v0.0.4v3.0.7Compare Source
What's Changed
Full Changelog: pion/transport@v3.0.6...v3.0.7
v3.0.6Compare Source
What's Changed
Full Changelog: pion/transport@v3.0.5...v3.0.6
v3.0.5Compare Source
What's Changed
Full Changelog: pion/transport@v3.0.4...v3.0.5
v3.0.4Compare Source
What's Changed
Full Changelog: pion/transport@v3.0.3...v3.0.4
v3.0.3Compare Source
What's Changed
New Contributors
Full Changelog: pion/transport@v3.0.2...v3.0.3
v3.0.2Compare Source
What's Changed
Full Changelog: pion/transport@v2.2.4...v3.0.2
v3.0.1Compare Source
Changelog
701ff64Use atomic Int32 instead of Boolv3.0.0Compare Source
Changelog
a66d5b7Update AUTHORS.txt82ae7e5Update AUTHORS.txtb1019b7Remove named return values241097eUpdate replaydetector tests to include latest0d51df0Add latest seqnum notify toConfiguration
📅 Schedule: Branch creation - On day 7 of the month, every 3 months ( * * 7 */3 * ) (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.