Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dependencies Upgrade 2024-08 #428

Merged
merged 4 commits into from
Aug 16, 2024
Merged

Dependencies Upgrade 2024-08 #428

merged 4 commits into from
Aug 16, 2024

Conversation

stonedu1011
Copy link
Contributor

Description

Upgrade Go and Nodejs dependencies.

Notes:

  • Unable to upgrade to github.com/jackc/pgproto3/[email protected] since this version have breaking changes. This lib is only used by cockroachdb/copyist which is test only and should have no impact on any production code.

Upgraded Go Modules

Library From To
github.com/rs/cors v1.10.1 v1.11.0
github.com/hashicorp/vault/api v1.12.2 v1.14.0
github.com/hashicorp/vault/api/auth/kubernetes v0.6.0 v0.7.0
github.com/hashicorp/go-retryablehttp v0.6.6 v0.7.7
github.com/cockroachdb/copyist v1.6.0 v1.7.0
github.com/jackc/pgproto3/v2 v2.1.1 v2.3.2*
github.com/jackc/pgconn v1.10.0 v1.14.1*
------- ----- -----
github.com/IBM/sarama v1.43.0 v1.43.2
github.com/beevik/etree v1.3.0 v1.4.1
github.com/aws/aws-sdk-go-v2 v1.26.0 v1.30.3
github.com/aws/aws-sdk-go-v2/config v1.27.8 v1.27.27
github.com/aws/aws-sdk-go-v2/credentials v1.17.8 v1.17.27
github.com/aws/aws-sdk-go-v2/service/acm v1.25.3 v1.28.4
github.com/aws/aws-sdk-go-v2/service/sts v1.28.5 v1.30.3
github.com/getkin/kin-openapi v0.123.0 v0.127.0
github.com/gin-gonic/gin v1.9.1 v1.10.0
github.com/go-playground/validator/v10 v10.19.0 v10.22.0
github.com/go-git/go-git/v5 v5.11.0 v5.12.0
github.com/go-redsync/redsync/v4 v4.12.1 v4.13.0
github.com/gorilla/websocket v1.5.1 v1.5.3
github.com/hashicorp/consul/api v1.28.2 v1.29.2
github.com/jackc/pgx/v5 v5.5.5 v5.6.0
github.com/miekg/dns v1.1.58 v1.1.61
github.com/onsi/gomega v1.32.0 v1.34.1
github.com/open-policy-agent/opa v0.62.1 v0.67.1
github.com/shirou/gopsutil/v3 v3.24.2 v3.24.5
github.com/spf13/cobra v1.8.0 v1.8.1
github.com/spyzhov/ajson v0.9.1 v0.9.3
go.step.sm/crypto v0.43.1 v0.51.1
go.uber.org/fx v1.21.0 v1.22.2
golang.org/x/crypto v0.23.0 v0.25.0
golang.org/x/net v0.25.0 v0.27.0
golang.org/x/term v0.20.0 v0.22.0
golang.org/x/text v0.15.0 v0.16.0
gorm.io/driver/postgres v1.5.7 v1.5.9
gorm.io/gorm v1.25.8 v1.25.11

(*) Higher version available with potential breaking changes

Type of Change

  • Bug Fix
  • New Feature
  • Breaking Change
  • Refactor
  • Documentation
  • Other (please describe)

Checklist

  • I have read the contributing guidelines
  • Existing issues have been referenced (where applicable)
  • I have verified this change is not present in other open pull requests
  • Functionality is documented
  • All code style checks pass
  • New code contribution is covered by automated tests
  • All new and existing tests pass

@stonedu1011 stonedu1011 requested a review from TimShi August 8, 2024 22:01
Copy link

github-actions bot commented Aug 8, 2024

PR Coverage Summary
Changed Statements 33
Covered Statements 30
Test Coverage 90.9%

PR Verification Succeeded: Coverage >= 70%

@@ -48,7 +48,7 @@ func ExternalImportsFromFormat(element interface{}) (result []string) {

func MatchesFormat(element interface{}, specificType string) bool {
schema, err := ConvertToSchemaRef(element)
if err != nil && schema.Value.Type != openapi3.TypeString {
if err != nil || schema == nil || schema.Value.Type == nil || !schema.Value.Type.Is(openapi3.TypeString) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

good catch

@stonedu1011 stonedu1011 reopened this Aug 12, 2024
if isInvalidReplace(&v) {
ret = append(ret, &v)
ret = append(ret, &mod.Replace[i])
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the github action annotation is referring to the original code on line 154, right?

Copy link
Contributor Author

@stonedu1011 stonedu1011 Aug 16, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is just a bug fix that brought to my attention after I enabled linters on /cmd.

If you are asking about the github-action output format for tests, it's in .github/actions/verify/action.yml, and it's already in main

@@ -73,7 +73,7 @@ func generateNameFromRegex(regex string) string {
}
}

hashedString := strings.ToUpper(fmt.Sprintf("%x", md5.Sum([]byte(regex))))[0:5]
hashedString := strings.ToUpper(fmt.Sprintf("%x", sha256.Sum224([]byte(regex))))[0:5]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what prompted this change?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

linter, use of md5 result in lint issue

opts = append([]config.LoadOptionsFunc{WithBasicProperties(p)}, opts...)
cfg, e := LoadConfig(ctx, opts...)
if e != nil {
return nil, fmt.Errorf(`unable to prepare for STS credentials`)
}

overrides := []ConfigOverrideFunc{OverrideConfigWithProperties(p)}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this code block redundant? NewStsCredentialsProvider is called by WithCredentialsProperties, which is called by PropertiesBasedConfigLoader.Load. And PropertiesBasedConfigLoader.Load does this override as well.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

not redundant. NewStsCredentialsProvider uses different aws.Config instance, because STS config is required before global aws.Config can be loaded. Without this, the corresponding test fails.

@stonedu1011 stonedu1011 merged commit f1c4477 into main Aug 16, 2024
2 of 3 checks passed
@stonedu1011 stonedu1011 deleted the deps-202408 branch August 16, 2024 18:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants