KOTS provides the framework, tools and integrations that enable the delivery and management of 3rd-party Kubernetes applications, a.k.a. Kubernetes Off-The-Shelf (KOTS) Software.
The entrypoint annotation's scope requirement has changed from rule to document (open-policy-agent/opa#6798). Furthermore, if no scope annotation is declared for a METADATA block preceding a rule, the presence of an entrypoint annotation with a true value will assign the block a document scope, where the rule scope is otherwise the default.
In practice, a rule entrypoint always point to the entire document and not a particular rule definition. The previous behavior was a bug, and one we've now addressed.
ast: Fixing nil-pointer dereference in compiler for partial rule edge case (#6930) authored by @johanfylling
ast+parser: Add hint to future-proof imports (6968) authored by @srenatus
topdown: Adding unification scope to virtual-cache key. Fixing issue where false positive cache hits can occur when unification "restricts" the scope of ref-head rule evaluation (#6926) authored by @johanfylling reported by @anderseknert
topdown: Marshal JWT encode sign inputs as JSON (#6934) authored by @charlieegan3
Runtime, Tooling, SDK
ast: Make type checker copy method copy all values (#6949) authored by @anderseknert
ast: Include term locations in rule heads when requested (#6860) authored by @anderseknert
distributedtracing: allow OpenTelemetry resource attributes to be configured under distributed_tracing config (#6942) authored and reported by @brettmc
download: Fixing issue when saving OCI bundles on disk (#6939) authored and reported by @Sergey-Kizimov
opa exec: This command never supported "pretty" formatting (--format=pretty or -f pretty), only json. Passing pretty is now invalid. (#6923) authored by @srenatus
Note that the flag is now unnecessary, but it's kept so existing calls like opa exec -fjson ... remain valid.
This release includes a fix where OPA would accept UNC locations on Windows. Reading those could leak NTLM hashes.
The attack vector would include an adversary tricking the user in passing an UNC path to OPA, e.g. opa eval -d $FILE.
UNC paths are now forbidden. If this is an issue for you, please reach out on Slack or GitHub issues.
The entrypoint annotation's scope requirement
has changed from rule to document (open-policy-agent/opa#6798).
Furthermore, if no scope annotation is declared for a METADATA block preceding a rule, the presence of an entrypoint
annotation with a true value will assign the block a document scope, where the rule scope is otherwise the default.
In practice, a rule entrypoint always point to the entire document and not a particular rule definition. The previous behavior was a bug, and one we've now addressed.
ast: Fixing nil-pointer dereference in compiler for partial rule edge case (#6930) authored by @johanfylling
ast+parser: Add hint to future-proof imports (6968) authored by @srenatus
topdown: Adding unification scope to virtual-cache key. Fixing issue where false positive cache hits can occur when unification "restricts" the scope of ref-head rule evaluation (#6926) authored by @johanfylling reported by @anderseknert
topdown: Marshal JWT encode sign inputs as JSON (#6934) authored by @charlieegan3
Runtime, Tooling, SDK
ast: Make type checker copy method copy all values (#6949) authored by @anderseknert
ast: Include term locations in rule heads when requested (#6860) authored by @anderseknert
distributedtracing: allow OpenTelemetry resource attributes to be configured under distributed_tracing config (#6942) authored and reported by @brettmc
download: Fixing issue when saving OCI bundles on disk (#6939) authored and reported by @Sergey-Kizimov
opa exec: This command never supported "pretty" formatting (--format=pretty or -f pretty), only json. Passing pretty is now invalid. (#6923) authored by @srenatus
Note that the flag is now unnecessary, but it's kept so existing calls like opa exec -fjson ... remain valid.
This release includes a fix where OPA would accept UNC locations on Windows. Reading those could leak NTLM hashes.
The attack vector would include an adversary tricking the user in passing an UNC path to OPA, e.g. opa eval -d $FILE.
UNC paths are now forbidden. If this is an issue for you, please reach out on Slack or GitHub issues.
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
- `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency
- `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
- `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
- `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
- `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency
- `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/replicatedhq/kots/network/alerts).
Bumps the go_modules group with 1 update: github.com/open-policy-agent/opa.
Updates
github.com/open-policy-agent/opa
from 0.67.1 to 0.68.0Release notes
Sourced from github.com/open-policy-agent/opa's releases.
... (truncated)
Changelog
Sourced from github.com/open-policy-agent/opa's changelog.
... (truncated)
Commits
db53d77
Prepare v0.68.0 release (#6976)2d28934
build(deps): bump github/codeql-action from 3.26.5 to 3.26.61bec88c
docs: Update contrib docs (#6974)3ac5104
debug: Adding debugger SDK (#6877)b0f417f
build(deps): bump github.com/prometheus/client_golang from 1.20.1 to 1.20.2d613fd1
build(deps): bump google.golang.org/grpc from 1.65.0 to 1.66.0 (#6971)f10cc1f
Change required scope ofentrypoint
fromrule
todocument
(#6963)5d08783
topdown: Adding unification scope to virtual-cache key25d21f5
ast/parser: add hint to future-proof imports (#6968)7b535a7
Docs: suggest usingopa-config.yaml
as name for config file (#6966)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show