Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update libs dependency #2749

Closed
wants to merge 1 commit into from
Closed

Update libs dependency #2749

wants to merge 1 commit into from

Conversation

vdaas-ci
Copy link
Collaborator

@vdaas-ci vdaas-ci commented Nov 16, 2024

Automated pull request to update Dependencies.

Summary by CodeRabbit

  • New Features

    • Updated versions for Rust, Kubernetes, and Helm across various templates to ensure compatibility with the latest releases.
  • Bug Fixes

    • Updated Codecov action version to enhance coverage reporting functionality.
  • Documentation

    • Revised bug report, security issue report, and pull request templates to reflect the latest version requirements.
  • Chores

    • Added newlines to several Dockerfiles for better formatting and compatibility.
  • Version Updates

    • Incremented various dependency versions, including Prometheus stack, Go modules, and several actions to their latest stable releases.

Copy link

cloudflare-workers-and-pages bot commented Nov 16, 2024

Deploying vald with  Cloudflare Pages  Cloudflare Pages

Latest commit: 5ab879d
Status: ✅  Deploy successful!
Preview URL: https://7268b502.vald.pages.dev
Branch Preview URL: https://create-pull-request-patch.vald.pages.dev

View logs

Copy link
Contributor

coderabbitai bot commented Nov 16, 2024

📝 Walkthrough

Walkthrough

This pull request includes updates to various templates and Dockerfiles. The Rust version has been incremented from v1.82.0 to v1.83.0, and the Kubernetes version has been updated from v1.31.2 to v1.31.3, along with the Helm version from v3.16.2 to v3.16.3 in several issue and pull request templates. The Codecov action version in a GitHub Actions workflow has been updated from 4.6.0 to 5.0.7. Multiple Dockerfiles have been modified primarily to add newlines at the end of the files or to remove specific comments, ensuring proper formatting. Additionally, several version files have been updated to reflect new dependency versions.

Changes

File Path Change Summary
.github/ISSUE_TEMPLATE/bug_report.md Rust Version updated from v1.82.0 to v1.83.0, Kubernetes Version updated from v1.31.2 to v1.31.3, Helm Version updated from v3.16.2 to v3.16.3.
.github/ISSUE_TEMPLATE/security_issue_report.md Rust Version updated from v1.82.0 to v1.83.0, Kubernetes Version updated from v1.31.2 to v1.31.3, Helm Version updated from v3.16.2 to v3.16.3.
.github/PULL_REQUEST_TEMPLATE.md Rust Version updated from v1.82.0 to v1.83.0, Kubernetes Version updated from v1.31.2 to v1.31.3, Helm Version updated from v3.16.2 to v3.16.3.
.github/workflows/coverage.yaml Codecov action version updated from 4 to 5.
dockers/.../Dockerfile Added newline at the end of various Dockerfiles; removed # check=error=true in some files.
example/client/go.mod Updated dependency versions for several packages.
go.mod Updated dependency versions for several packages.
versions/BUF_VERSION Version updated from v1.46.0 to v1.47.2.
versions/HELM_VERSION Version updated from v3.16.2 to v3.16.3.
versions/PROMETHEUS_STACK_VERSION Version updated from 66.1.1 to 66.3.0.
versions/actions/CODECOV_CODECOV_ACTION Version updated from 4.6.0 to 5.0.7.
k8s/index/job/deletion/configmap.yaml ConfigMap vald-index-deletion-config deleted.
k8s/index/job/deletion/cronjob.yaml CronJob vald-index-deletion deleted.

Possibly related PRs

Suggested labels

size/S

Suggested reviewers

  • vankichi
  • kpango

📜 Recent review details

Configuration used: CodeRabbit UI
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between be8979f and 5ab879d.

⛔ Files ignored due to path filters (22)
  • apis/grpc/v1/agent/core/agent.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/agent/sidecar/sidecar.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/agent/sidecar/sidecar_vtproto.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/discoverer/discoverer.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/filter/egress/egress_filter.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/filter/ingress/ingress_filter.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/meta/meta.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/mirror/mirror.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/payload/payload.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/rpc/errdetails/error_details.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/filter.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/flush.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/index.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/insert.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/object.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/remove.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/search.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/update.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/upsert.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • example/client/go.sum is excluded by !**/*.sum
  • go.sum is excluded by !**/*.sum
  • rust/Cargo.lock is excluded by !**/*.lock
📒 Files selected for processing (54)
  • .github/ISSUE_TEMPLATE/bug_report.md (1 hunks)
  • .github/ISSUE_TEMPLATE/security_issue_report.md (1 hunks)
  • .github/PULL_REQUEST_TEMPLATE.md (1 hunks)
  • .github/workflows/coverage.yaml (1 hunks)
  • dockers/agent/core/agent/Dockerfile (1 hunks)
  • dockers/agent/core/faiss/Dockerfile (1 hunks)
  • dockers/agent/core/ngt/Dockerfile (1 hunks)
  • dockers/agent/sidecar/Dockerfile (1 hunks)
  • dockers/binfmt/Dockerfile (1 hunks)
  • dockers/buildbase/Dockerfile (1 hunks)
  • dockers/buildkit/Dockerfile (1 hunks)
  • dockers/buildkit/syft/scanner/Dockerfile (1 hunks)
  • dockers/ci/base/Dockerfile (1 hunks)
  • dockers/dev/Dockerfile (1 hunks)
  • dockers/discoverer/k8s/Dockerfile (1 hunks)
  • dockers/example/client/Dockerfile (1 hunks)
  • dockers/gateway/filter/Dockerfile (1 hunks)
  • dockers/gateway/lb/Dockerfile (1 hunks)
  • dockers/gateway/mirror/Dockerfile (1 hunks)
  • dockers/index/job/correction/Dockerfile (1 hunks)
  • dockers/index/job/creation/Dockerfile (1 hunks)
  • dockers/index/job/deletion/Dockerfile (1 hunks)
  • dockers/index/job/readreplica/rotate/Dockerfile (1 hunks)
  • dockers/index/job/save/Dockerfile (1 hunks)
  • dockers/index/operator/Dockerfile (1 hunks)
  • dockers/manager/index/Dockerfile (1 hunks)
  • dockers/operator/helm/Dockerfile (1 hunks)
  • dockers/tools/benchmark/job/Dockerfile (1 hunks)
  • dockers/tools/benchmark/operator/Dockerfile (1 hunks)
  • dockers/tools/cli/loadtest/Dockerfile (1 hunks)
  • example/client/go.mod (2 hunks)
  • go.mod (19 hunks)
  • k8s/index/job/deletion/configmap.yaml (0 hunks)
  • k8s/index/job/deletion/cronjob.yaml (0 hunks)
  • rust/rust-toolchain (1 hunks)
  • versions/BUF_VERSION (1 hunks)
  • versions/CMAKE_VERSION (1 hunks)
  • versions/GOLANGCILINT_VERSION (1 hunks)
  • versions/HELM_VERSION (1 hunks)
  • versions/KUBECTL_VERSION (1 hunks)
  • versions/OPERATOR_SDK_VERSION (1 hunks)
  • versions/PROMETHEUS_STACK_VERSION (1 hunks)
  • versions/PROTOBUF_VERSION (1 hunks)
  • versions/RUST_VERSION (1 hunks)
  • versions/TELEPRESENCE_VERSION (1 hunks)
  • versions/USEARCH_VERSION (1 hunks)
  • versions/YQ_VERSION (1 hunks)
  • versions/actions/CODECOV_CODECOV_ACTION (1 hunks)
  • versions/actions/GITHUB_CODEQL_ACTION_ANALYZE (1 hunks)
  • versions/actions/GITHUB_CODEQL_ACTION_AUTOBUILD (1 hunks)
  • versions/actions/GITHUB_CODEQL_ACTION_INIT (1 hunks)
  • versions/actions/GITHUB_CODEQL_ACTION_UPLOAD_SARIF (1 hunks)
  • versions/actions/GITHUB_ISSUE_METRICS (1 hunks)
  • versions/actions/REVIEWDOG_ACTION_HADOLINT (1 hunks)
💤 Files with no reviewable changes (2)
  • k8s/index/job/deletion/configmap.yaml
  • k8s/index/job/deletion/cronjob.yaml
✅ Files skipped from review due to trivial changes (5)
  • versions/actions/GITHUB_CODEQL_ACTION_AUTOBUILD
  • versions/actions/REVIEWDOG_ACTION_HADOLINT
  • versions/actions/GITHUB_CODEQL_ACTION_ANALYZE
  • versions/actions/GITHUB_CODEQL_ACTION_INIT
  • versions/actions/GITHUB_CODEQL_ACTION_UPLOAD_SARIF
🚧 Files skipped from review as they are similar to previous changes (47)
  • versions/BUF_VERSION
  • versions/RUST_VERSION
  • versions/HELM_VERSION
  • versions/GOLANGCILINT_VERSION
  • versions/YQ_VERSION
  • versions/KUBECTL_VERSION
  • rust/rust-toolchain
  • dockers/tools/cli/loadtest/Dockerfile
  • dockers/buildkit/syft/scanner/Dockerfile
  • versions/actions/GITHUB_ISSUE_METRICS
  • dockers/example/client/Dockerfile
  • dockers/operator/helm/Dockerfile
  • versions/USEARCH_VERSION
  • dockers/index/job/correction/Dockerfile
  • dockers/gateway/lb/Dockerfile
  • dockers/buildkit/Dockerfile
  • dockers/index/job/readreplica/rotate/Dockerfile
  • versions/PROTOBUF_VERSION
  • versions/TELEPRESENCE_VERSION
  • dockers/manager/index/Dockerfile
  • dockers/index/job/creation/Dockerfile
  • dockers/agent/core/agent/Dockerfile
  • dockers/tools/benchmark/job/Dockerfile
  • versions/CMAKE_VERSION
  • dockers/binfmt/Dockerfile
  • versions/actions/CODECOV_CODECOV_ACTION
  • versions/PROMETHEUS_STACK_VERSION
  • dockers/gateway/mirror/Dockerfile
  • dockers/index/job/save/Dockerfile
  • versions/OPERATOR_SDK_VERSION
  • dockers/agent/core/ngt/Dockerfile
  • dockers/gateway/filter/Dockerfile
  • dockers/dev/Dockerfile
  • dockers/ci/base/Dockerfile
  • dockers/buildbase/Dockerfile
  • dockers/index/operator/Dockerfile
  • dockers/index/job/deletion/Dockerfile
  • dockers/discoverer/k8s/Dockerfile
  • dockers/agent/sidecar/Dockerfile
  • dockers/agent/core/faiss/Dockerfile
  • dockers/tools/benchmark/operator/Dockerfile
  • .github/PULL_REQUEST_TEMPLATE.md
  • .github/ISSUE_TEMPLATE/bug_report.md
  • .github/workflows/coverage.yaml
  • .github/ISSUE_TEMPLATE/security_issue_report.md
  • go.mod
  • example/client/go.mod

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

@vdaas-ci
Copy link
Collaborator Author

[CHATOPS:HELP] ChatOps commands.

  • 🙆‍♀️ /approve - approve
  • 🍱 /format - format codes and add licenses
  • /gen-test - generate test codes
  • 🏷️ /label - add labels
  • 🔚 2️⃣ 🔚 /label actions/e2e-deploy - run E2E deploy & integration test

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Outside diff range and nitpick comments (1)
go.mod (1)

Line range hint 1-546: Overall dependency update strategy looks solid

The dependency updates follow good practices:

  1. Coordinated updates across related packages (e.g., AWS SDK, Google Cloud)
  2. Consistent use of semantic versioning
  3. Minor version bumps that maintain backward compatibility
  4. Proper handling of direct and indirect dependencies

Consider automating these updates with tools like Dependabot or Renovate for more frequent, automated updates.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 246fb12 and 3592f3a.

⛔ Files ignored due to path filters (22)
  • apis/grpc/v1/agent/core/agent.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/agent/sidecar/sidecar.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/agent/sidecar/sidecar_vtproto.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/discoverer/discoverer.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/filter/egress/egress_filter.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/filter/ingress/ingress_filter.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/meta/meta.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/mirror/mirror.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/payload/payload.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/rpc/errdetails/error_details.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/filter.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/flush.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/index.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/insert.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/object.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/remove.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/search.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/update.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/upsert.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • example/client/go.sum is excluded by !**/*.sum
  • go.sum is excluded by !**/*.sum
  • rust/Cargo.lock is excluded by !**/*.lock
📒 Files selected for processing (38)
  • .github/ISSUE_TEMPLATE/bug_report.md (1 hunks)
  • .github/ISSUE_TEMPLATE/security_issue_report.md (1 hunks)
  • .github/PULL_REQUEST_TEMPLATE.md (1 hunks)
  • .github/workflows/coverage.yaml (1 hunks)
  • dockers/agent/core/agent/Dockerfile (1 hunks)
  • dockers/agent/core/faiss/Dockerfile (1 hunks)
  • dockers/agent/core/ngt/Dockerfile (1 hunks)
  • dockers/agent/sidecar/Dockerfile (1 hunks)
  • dockers/binfmt/Dockerfile (1 hunks)
  • dockers/buildbase/Dockerfile (1 hunks)
  • dockers/buildkit/Dockerfile (1 hunks)
  • dockers/buildkit/syft/scanner/Dockerfile (1 hunks)
  • dockers/ci/base/Dockerfile (1 hunks)
  • dockers/dev/Dockerfile (1 hunks)
  • dockers/discoverer/k8s/Dockerfile (1 hunks)
  • dockers/example/client/Dockerfile (1 hunks)
  • dockers/gateway/filter/Dockerfile (1 hunks)
  • dockers/gateway/lb/Dockerfile (1 hunks)
  • dockers/gateway/mirror/Dockerfile (1 hunks)
  • dockers/index/job/correction/Dockerfile (1 hunks)
  • dockers/index/job/creation/Dockerfile (1 hunks)
  • dockers/index/job/deletion/Dockerfile (1 hunks)
  • dockers/index/job/readreplica/rotate/Dockerfile (1 hunks)
  • dockers/index/job/save/Dockerfile (1 hunks)
  • dockers/index/operator/Dockerfile (1 hunks)
  • dockers/manager/index/Dockerfile (1 hunks)
  • dockers/operator/helm/Dockerfile (1 hunks)
  • dockers/tools/benchmark/job/Dockerfile (1 hunks)
  • dockers/tools/benchmark/operator/Dockerfile (1 hunks)
  • dockers/tools/cli/loadtest/Dockerfile (1 hunks)
  • example/client/go.mod (2 hunks)
  • go.mod (11 hunks)
  • k8s/index/job/deletion/configmap.yaml (0 hunks)
  • k8s/index/job/deletion/cronjob.yaml (0 hunks)
  • versions/BUF_VERSION (1 hunks)
  • versions/HELM_VERSION (1 hunks)
  • versions/PROMETHEUS_STACK_VERSION (1 hunks)
  • versions/actions/CODECOV_CODECOV_ACTION (1 hunks)
💤 Files with no reviewable changes (2)
  • k8s/index/job/deletion/configmap.yaml
  • k8s/index/job/deletion/cronjob.yaml
✅ Files skipped from review due to trivial changes (33)
  • .github/ISSUE_TEMPLATE/bug_report.md
  • .github/ISSUE_TEMPLATE/security_issue_report.md
  • .github/PULL_REQUEST_TEMPLATE.md
  • dockers/agent/core/agent/Dockerfile
  • dockers/agent/core/faiss/Dockerfile
  • dockers/agent/core/ngt/Dockerfile
  • dockers/agent/sidecar/Dockerfile
  • dockers/binfmt/Dockerfile
  • dockers/buildbase/Dockerfile
  • dockers/buildkit/Dockerfile
  • dockers/buildkit/syft/scanner/Dockerfile
  • dockers/ci/base/Dockerfile
  • dockers/dev/Dockerfile
  • dockers/discoverer/k8s/Dockerfile
  • dockers/example/client/Dockerfile
  • dockers/gateway/filter/Dockerfile
  • dockers/gateway/lb/Dockerfile
  • dockers/gateway/mirror/Dockerfile
  • dockers/index/job/correction/Dockerfile
  • dockers/index/job/creation/Dockerfile
  • dockers/index/job/deletion/Dockerfile
  • dockers/index/job/readreplica/rotate/Dockerfile
  • dockers/index/job/save/Dockerfile
  • dockers/index/operator/Dockerfile
  • dockers/manager/index/Dockerfile
  • dockers/operator/helm/Dockerfile
  • dockers/tools/benchmark/job/Dockerfile
  • dockers/tools/benchmark/operator/Dockerfile
  • dockers/tools/cli/loadtest/Dockerfile
  • versions/BUF_VERSION
  • versions/HELM_VERSION
  • versions/PROMETHEUS_STACK_VERSION
  • versions/actions/CODECOV_CODECOV_ACTION
🔇 Additional comments (5)
example/client/go.mod (2)

14-16: Verify compatibility of genproto package updates

The google.golang.org/genproto and related packages are being updated to a newer snapshot version. While these are automated updates, it's important to verify compatibility.

✅ Verification successful

The previous attempt failed because we tried to clone an external repository. Let's analyze the local codebase instead to understand the impact of these dependency updates and verify if there are any potential compatibility issues.


Based on the analysis of the shell script results, I can now provide a final response:

Genproto dependency update appears safe to proceed

The codebase scan reveals that google.golang.org/genproto is primarily used in generated protobuf files (*.pb.go) under the apis/grpc directory. The update aligns all genproto-related packages to the same version (v0.0.0-20241113202542-65e8d215514f), which maintains consistency. Since these are generated files and the changes are automated dependency updates, the risk is minimal.

  • The version mismatch in require section (v0.0.0-20241104194629-dd2ea8efbc28) will be overridden by the replace directives, so it's not a concern
  • All genproto usage is confined to generated protobuf code
  • The update follows the standard Go module versioning pattern for main branch snapshots
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Check for any major API changes or breaking changes in the genproto updates
git clone https://github.com/googleapis/go-genproto.git /tmp/genproto
cd /tmp/genproto
git log --oneline --no-merges v0.0.0-20241104194629-dd2ea8efbc28..v0.0.0-20241113202542-65e8d215514f -- googleapis/rpc googleapis/api

Length of output: 310


Script:

#!/bin/bash
# Let's try a different approach to verify the changes:

# 1. Check if there are any breaking changes in the codebase between these versions
rg -l "google.golang.org/genproto" --type go

# 2. Check the go.mod content to understand dependencies better
cat example/client/go.mod

# 3. Check for any API usage patterns that might be affected
ast-grep --pattern 'import "$_"' --lang go

Length of output: 10833


18-18: Verify protobuf patch version update

The update from v1.35.1 to v1.35.2 is a patch version bump which should only contain bug fixes.

✅ Verification successful

Since we couldn't fetch the changelog directly, let's try to verify the impact of this protobuf update within the codebase itself.


Let's check the current protobuf version in the codebase and look for any version-specific code.


Based on the analysis of the go.mod files, I can now provide a final response:

Protobuf update v1.35.1 to v1.35.2 is safe to proceed

The update is a patch version bump and the codebase explicitly requires protobuf v1.35.2 in its dependencies. The change is already aligned with the main module's requirements and other dependent modules are compatible with this version.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Check the changelog for any breaking changes in protobuf
curl -s https://raw.githubusercontent.com/protocolbuffers/protobuf-go/v1.35.2/CHANGES.md | grep -A 10 "v1.35.2"

Length of output: 310


Script:

#!/bin/bash
# Check for any protobuf-specific imports or usage
rg -l "google.golang.org/protobuf" --type go

# Check for any .proto files that might be affected
fd -e proto

# Look for any protobuf-related build or generation commands
rg -i "protoc|protobuf" -g "Makefile*" -g "*.sh"

Length of output: 2746


Script:

#!/bin/bash
# Check current protobuf version in versions file
cat versions/PROTOBUF_VERSION

# Look for any protobuf version-specific code or configurations
rg -i "protobuf.*1\.35\." --type go --type make

# Check go.mod in the root and other directories for protobuf dependencies
find . -name "go.mod" -exec sh -c 'echo "=== {}" && cat {}' \;

Length of output: 38364

.github/workflows/coverage.yaml (1)

57-57: Verify Codecov Action v5 compatibility

The upgrade from v4 to v5 of the Codecov action is part of the dependency updates. While this change is appropriate, being a major version bump, it's important to verify compatibility.

Let's check the Codecov action's requirements and breaking changes:

✅ Verification successful

Codecov Action v5 upgrade is compatible with current setup

The workflow is properly configured for v5:

  • Uses explicit token authentication which is recommended
  • Not affected by the known v5 issues as it's not using tokenless uploads
  • Running on Ubuntu runners (no Windows-specific issues)
  • Has proper file path configuration for coverage report
  • Contains appropriate error handling with continue-on-error

The upgrade from v4 to v5 is safe to proceed with the current configuration.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify Codecov action v5 compatibility and requirements

# Get the latest release information and changelog
gh api repos/codecov/codecov-action/releases/tags/v5.0.2 --jq '.body'

# Check if there are any open issues related to v5 migration
gh api search/issues -X GET -f q='repo:codecov/codecov-action is:issue label:bug v5' --jq '.items[].title'

Length of output: 567


Script:

#!/bin/bash
# Let's check the workflow file to understand the configuration and verify if we're using any deprecated features

# Check the workflow file content
cat .github/workflows/coverage.yaml

# Check if there are any recent issues specifically about token requirements
gh api search/issues -X GET -f q='repo:codecov/codecov-action is:issue token required' --jq '.items[].title'

# Get the latest release notes to check for breaking changes
gh api repos/codecov/codecov-action/releases/latest --jq '.body'

Length of output: 4156

go.mod (2)

428-428: LGTM: Indirect dependency updates are consistent

The updates to indirect dependencies, particularly in the Google Cloud ecosystem, are minor version bumps that maintain compatibility. The use of a specific commit hash for google.golang.org/genproto is a common practice for this package.

Also applies to: 482-482, 533-534


402-407: LGTM: Standard library and protobuf updates are coordinated

The updates to golang.org/x/* packages and google.golang.org/protobuf are coordinated and use stable versions. This is a good practice for maintaining consistency across related packages.

Let's verify the compatibility of these versions:

#!/bin/bash
# Description: Check for any known compatibility issues with the updated standard library packages

# Check for security advisories for golang.org/x packages
for pkg in "oauth2" "sync" "sys" "text" "time" "tools"; do
  echo "Checking golang.org/x/$pkg"
  gh api graphql -f query="
  {
    securityVulnerabilities(first: 5, ecosystem: GO, package: \"golang.org/x/$pkg\") {
      nodes {
        advisory {
          summary
          severity
          publishedAt
        }
        vulnerableVersionRange
        firstPatchedVersion {
          identifier
        }
      }
    }
  }"
done

# Check protobuf compatibility
gh api graphql -f query='
{
  securityVulnerabilities(first: 5, ecosystem: GO, package: "google.golang.org/protobuf") {
    nodes {
      advisory {
        summary
        severity
        publishedAt
      }
      vulnerableVersionRange
      firstPatchedVersion {
        identifier
      }
    }
  }
}'

Also applies to: 413-413

@@ -37,6 +37,6 @@ require (
golang.org/x/sys v0.27.0 // indirect
golang.org/x/text v0.20.0 // indirect
google.golang.org/genproto/googleapis/api v0.0.0-20240903143218-8af14fe29dc1 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20241021214115-324edc3d5d38 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20241104194629-dd2ea8efbc28 // indirect
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Version mismatch between replace and require directives

There's a version mismatch for google.golang.org/genproto/googleapis/rpc:

  • Replace directive: v0.0.0-20241113202542-65e8d215514f
  • Require directive: v0.0.0-20241104194629-dd2ea8efbc28

This could lead to version resolution conflicts.

Apply this diff to align the versions:

-	google.golang.org/genproto/googleapis/rpc v0.0.0-20241104194629-dd2ea8efbc28 // indirect
+	google.golang.org/genproto/googleapis/rpc v0.0.0-20241113202542-65e8d215514f // indirect
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
google.golang.org/genproto/googleapis/rpc v0.0.0-20241104194629-dd2ea8efbc28 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20241113202542-65e8d215514f // indirect

@@ -5,15 +5,15 @@ go 1.23.3
replace (
cloud.google.com/go => cloud.google.com/go v0.116.0
cloud.google.com/go/bigquery => cloud.google.com/go/bigquery v1.64.0
cloud.google.com/go/compute => cloud.google.com/go/compute v1.28.3
cloud.google.com/go/compute => cloud.google.com/go/compute v1.29.0
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codebase verification

⚠️ Security Advisory: Update requires attention

The dependency updates require careful consideration due to security implications:

  1. The project uses protojson.Unmarshal extensively in generated code, and google.golang.org/protobuf v1.35.2 has a known vulnerability:

    • Infinite loop vulnerability in protojson.Unmarshal (moderate severity, fixed in v1.33.0)
    • Multiple instances found in apis/grpc/v1/payload/payload.pb.json.go
  2. The cloud.google.com/go/compute v1.29.0 update appears safe, but should be tested thoroughly with the protobuf dependency update.

Recommendation:

  • Consider updating google.golang.org/protobuf to at least v1.33.0 to address the security vulnerability
  • Test the protobuf unmarshaling functionality extensively after the update
🔗 Analysis chain

LGTM: Cloud provider SDK updates look consistent

The updates to Google Cloud and AWS SDKs are minor version bumps that should maintain backward compatibility. The coordinated updates across related packages (especially AWS SDK components) is a good practice.

Let's verify the compatibility of these versions:

Also applies to: 16-16, 50-53, 162-162


Let me generate additional verification scripts to check the specific versions being used in the codebase:

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check for any known compatibility issues or security advisories for the updated SDKs

# Check AWS SDK compatibility
gh api graphql -f query='
{
  securityVulnerabilities(first: 5, ecosystem: GO, package: "github.com/aws/aws-sdk-go-v2") {
    nodes {
      advisory {
        summary
        severity
        publishedAt
      }
      vulnerableVersionRange
      firstPatchedVersion {
        identifier
      }
    }
  }
}'

# Check Google Cloud SDK compatibility
gh api graphql -f query='
{
  securityVulnerabilities(first: 5, ecosystem: GO, package: "cloud.google.com/go") {
    nodes {
      advisory {
        summary
        severity
        publishedAt
      }
      vulnerableVersionRange
      firstPatchedVersion {
        identifier
      }
    }
  }
}'

Length of output: 4823


Script:

#!/bin/bash
# Check the exact versions of cloud.google.com/go/compute and AWS SDK being used
grep -A 1 "require (" go.mod
grep "cloud.google.com/go/compute" go.mod
grep "aws-sdk-go-v2" go.mod
grep "google.golang.org/protobuf" go.mod

# Check for any direct usage of protobuf unmarshaling in the codebase
rg "protojson.Unmarshal" -A 2

Length of output: 23101

Copy link

codecov bot commented Nov 16, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 23.87%. Comparing base (630a835) to head (5ab879d).
Report is 5 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2749      +/-   ##
==========================================
- Coverage   23.87%   23.87%   -0.01%     
==========================================
  Files         547      547              
  Lines       54660    54660              
==========================================
- Hits        13051    13049       -2     
- Misses      40823    40824       +1     
- Partials      786      787       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@vdaas-ci vdaas-ci force-pushed the create-pull-request/patch branch 2 times, most recently from a953581 to 8313cd0 Compare November 19, 2024 01:51
USER root:root
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ [hadolint] <DL3002> reported by reviewdog 🐶
Last USER should not be root

@vdaas-ci vdaas-ci force-pushed the create-pull-request/patch branch 2 times, most recently from 9fafd03 to d73862d Compare November 21, 2024 01:50
@vdaas-ci vdaas-ci force-pushed the create-pull-request/patch branch 2 times, most recently from 6aa1927 to 292a2ac Compare November 23, 2024 01:47
@github-actions github-actions bot added size/XL and removed size/L labels Nov 23, 2024
@vdaas-ci vdaas-ci force-pushed the create-pull-request/patch branch 7 times, most recently from c073507 to 8abbb9f Compare November 30, 2024 01:50
@vdaas-ci vdaas-ci force-pushed the create-pull-request/patch branch from 8abbb9f to 869e55d Compare December 1, 2024 02:06
@vdaas-ci vdaas-ci force-pushed the create-pull-request/patch branch from 869e55d to be8979f Compare December 2, 2024 01:56
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 869e55d and be8979f.

⛔ Files ignored due to path filters (22)
  • apis/grpc/v1/agent/core/agent.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/agent/sidecar/sidecar.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/agent/sidecar/sidecar_vtproto.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/discoverer/discoverer.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/filter/egress/egress_filter.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/filter/ingress/ingress_filter.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/meta/meta.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/mirror/mirror.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/payload/payload.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/rpc/errdetails/error_details.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/filter.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/flush.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/index.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/insert.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/object.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/remove.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/search.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/update.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • apis/grpc/v1/vald/upsert.pb.go is excluded by !**/*.pb.go, !**/*.pb.go
  • example/client/go.sum is excluded by !**/*.sum
  • go.sum is excluded by !**/*.sum
  • rust/Cargo.lock is excluded by !**/*.lock
📒 Files selected for processing (49)
  • .github/ISSUE_TEMPLATE/bug_report.md (1 hunks)
  • .github/ISSUE_TEMPLATE/security_issue_report.md (1 hunks)
  • .github/PULL_REQUEST_TEMPLATE.md (1 hunks)
  • .github/workflows/coverage.yaml (1 hunks)
  • dockers/agent/core/agent/Dockerfile (1 hunks)
  • dockers/agent/core/faiss/Dockerfile (1 hunks)
  • dockers/agent/core/ngt/Dockerfile (1 hunks)
  • dockers/agent/sidecar/Dockerfile (1 hunks)
  • dockers/binfmt/Dockerfile (1 hunks)
  • dockers/buildbase/Dockerfile (1 hunks)
  • dockers/buildkit/Dockerfile (1 hunks)
  • dockers/buildkit/syft/scanner/Dockerfile (1 hunks)
  • dockers/ci/base/Dockerfile (1 hunks)
  • dockers/dev/Dockerfile (1 hunks)
  • dockers/discoverer/k8s/Dockerfile (1 hunks)
  • dockers/example/client/Dockerfile (1 hunks)
  • dockers/gateway/filter/Dockerfile (1 hunks)
  • dockers/gateway/lb/Dockerfile (1 hunks)
  • dockers/gateway/mirror/Dockerfile (1 hunks)
  • dockers/index/job/correction/Dockerfile (1 hunks)
  • dockers/index/job/creation/Dockerfile (1 hunks)
  • dockers/index/job/deletion/Dockerfile (1 hunks)
  • dockers/index/job/readreplica/rotate/Dockerfile (1 hunks)
  • dockers/index/job/save/Dockerfile (1 hunks)
  • dockers/index/operator/Dockerfile (1 hunks)
  • dockers/manager/index/Dockerfile (1 hunks)
  • dockers/operator/helm/Dockerfile (1 hunks)
  • dockers/tools/benchmark/job/Dockerfile (1 hunks)
  • dockers/tools/benchmark/operator/Dockerfile (1 hunks)
  • dockers/tools/cli/loadtest/Dockerfile (1 hunks)
  • example/client/go.mod (2 hunks)
  • go.mod (19 hunks)
  • k8s/index/job/deletion/configmap.yaml (0 hunks)
  • k8s/index/job/deletion/cronjob.yaml (0 hunks)
  • rust/rust-toolchain (1 hunks)
  • versions/BUF_VERSION (1 hunks)
  • versions/CMAKE_VERSION (1 hunks)
  • versions/GOLANGCILINT_VERSION (1 hunks)
  • versions/HELM_VERSION (1 hunks)
  • versions/KUBECTL_VERSION (1 hunks)
  • versions/OPERATOR_SDK_VERSION (1 hunks)
  • versions/PROMETHEUS_STACK_VERSION (1 hunks)
  • versions/PROTOBUF_VERSION (1 hunks)
  • versions/RUST_VERSION (1 hunks)
  • versions/TELEPRESENCE_VERSION (1 hunks)
  • versions/USEARCH_VERSION (1 hunks)
  • versions/YQ_VERSION (1 hunks)
  • versions/actions/CODECOV_CODECOV_ACTION (1 hunks)
  • versions/actions/GITHUB_ISSUE_METRICS (1 hunks)
💤 Files with no reviewable changes (2)
  • k8s/index/job/deletion/cronjob.yaml
  • k8s/index/job/deletion/configmap.yaml
✅ Files skipped from review due to trivial changes (1)
  • versions/actions/GITHUB_ISSUE_METRICS
🚧 Files skipped from review as they are similar to previous changes (45)
  • versions/BUF_VERSION
  • versions/USEARCH_VERSION
  • versions/PROTOBUF_VERSION
  • versions/GOLANGCILINT_VERSION
  • rust/rust-toolchain
  • versions/KUBECTL_VERSION
  • versions/HELM_VERSION
  • versions/actions/CODECOV_CODECOV_ACTION
  • versions/TELEPRESENCE_VERSION
  • versions/PROMETHEUS_STACK_VERSION
  • dockers/buildkit/Dockerfile
  • versions/OPERATOR_SDK_VERSION
  • versions/CMAKE_VERSION
  • versions/YQ_VERSION
  • dockers/index/job/save/Dockerfile
  • dockers/tools/benchmark/job/Dockerfile
  • dockers/gateway/lb/Dockerfile
  • dockers/binfmt/Dockerfile
  • dockers/index/job/correction/Dockerfile
  • dockers/index/operator/Dockerfile
  • dockers/tools/cli/loadtest/Dockerfile
  • dockers/example/client/Dockerfile
  • dockers/gateway/mirror/Dockerfile
  • dockers/index/job/creation/Dockerfile
  • dockers/operator/helm/Dockerfile
  • dockers/ci/base/Dockerfile
  • versions/RUST_VERSION
  • dockers/gateway/filter/Dockerfile
  • dockers/agent/core/ngt/Dockerfile
  • dockers/agent/core/faiss/Dockerfile
  • dockers/dev/Dockerfile
  • dockers/agent/sidecar/Dockerfile
  • dockers/buildkit/syft/scanner/Dockerfile
  • dockers/manager/index/Dockerfile
  • dockers/index/job/readreplica/rotate/Dockerfile
  • dockers/index/job/deletion/Dockerfile
  • dockers/agent/core/agent/Dockerfile
  • dockers/buildbase/Dockerfile
  • dockers/discoverer/k8s/Dockerfile
  • dockers/tools/benchmark/operator/Dockerfile
  • .github/workflows/coverage.yaml
  • .github/ISSUE_TEMPLATE/security_issue_report.md
  • .github/ISSUE_TEMPLATE/bug_report.md
  • .github/PULL_REQUEST_TEMPLATE.md
  • example/client/go.mod
🔇 Additional comments (3)
go.mod (3)

48-69: Coordinated dependency updates look consistent

The updates to major components are well-coordinated:

  • AWS SDK components are updated consistently with minor version bumps
  • Google Cloud components are updated to latest versions
  • Kubernetes components are aligned to v0.31.2

Also applies to: 317-321, 334-339


228-229: Testing framework updates require verification

Major updates to testing frameworks:

  • Ginkgo v2.22.0
  • Gomega v1.36.0
  • Testify v1.10.0

Also applies to: 268-268


Line range hint 387-394: Verify monitoring stack compatibility

Significant updates to monitoring components:

  • OpenTelemetry components updated to v1.32.0
  • Prometheus components updated to latest versions

Also applies to: 506-509

✅ Verification successful

Let me analyze the monitoring configuration further to ensure compatibility.

The previous results show the basic OpenTelemetry and Prometheus usage, but I want to verify:

  1. OTLP exporter configuration details
  2. Metric configuration specifics
  3. Any version-specific dependencies that might cause compatibility issues

OpenTelemetry and monitoring stack updates are compatible

The verification shows:

  1. OpenTelemetry components are correctly configured with consistent v1.32.0 usage
  2. OTLP exporters are properly set up for both metrics and traces
  3. The gRPC requirements (v1.32.0) align with the updated dependencies
  4. Prometheus metric scraping configurations remain unchanged and compatible
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify monitoring configuration compatibility

# Check OpenTelemetry configuration
echo "Checking OpenTelemetry usage..."
rg "otel\." -A 3

# Check Prometheus metrics
echo "Checking Prometheus metrics..."
rg "prometheus\." -A 3

Length of output: 5243


Script:

#!/bin/bash
# Check OpenTelemetry configuration details
echo "Checking OpenTelemetry configuration details..."
rg "otlp" internal/observability/exporter/otlp/ -A 5

# Check metric configuration
echo "Checking metric configuration..."
rg "metric\." internal/observability/ -A 3

# Check for any potential version-specific imports or configurations
echo "Checking version-specific configurations..."
fd -e go -e yaml | xargs rg "v1\.(27|32)"

Length of output: 12075

google.golang.org/grpc => google.golang.org/grpc v1.68.0
google.golang.org/grpc/cmd/protoc-gen-go-grpc => google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.5.1
google.golang.org/protobuf => google.golang.org/protobuf v1.35.1
google.golang.org/protobuf => google.golang.org/protobuf v1.35.2
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

⚠️ Critical: Protobuf version requires security update

The update to google.golang.org/protobuf v1.35.2 still contains a known vulnerability in protojson.Unmarshal. This version is below the recommended safe version.

Please update to at least v1.33.0 to address the infinite loop vulnerability in protojson.Unmarshal.

Signed-off-by: vdaas-ci <vald@vdaas.org>
@vdaas-ci vdaas-ci force-pushed the create-pull-request/patch branch from be8979f to 5ab879d Compare December 3, 2024 01:53
@github-actions github-actions bot added size/XXL and removed size/XL labels Dec 3, 2024
@vankichi vankichi closed this Dec 3, 2024
@vankichi vankichi deleted the create-pull-request/patch branch December 3, 2024 07:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment