chore(deps): update module github.com/open-policy-agent/opa to v0.68.0 [security] (main) #6044
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v0.64.1->v0.68.0Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2024-8260
A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.
OPA for Windows has an SMB force-authentication vulnerability in github.com/open-policy-agent/opa
CVE-2024-8260 / GHSA-c77r-fh37-x2px / GO-2024-3141
More information
Details
OPA for Windows has an SMB force-authentication vulnerability. Due to improper input validation, it allows a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
OPA for Windows has an SMB force-authentication vulnerability
CVE-2024-8260 / GHSA-c77r-fh37-x2px / GO-2024-3141
More information
Details
A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.
Severity
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
open-policy-agent/opa (github.com/open-policy-agent/opa)
v0.68.0Compare Source
This release contains a mix of features and bugfixes.
Breaking Changes
entrypointannotation impliesdocumentscope (#6798)The entrypoint annotation's scope requirement has changed from
ruletodocument(https://github.com/open-policy-agent/opa/issues/6798). Furthermore, if noscopeannotation is declared for a METADATA block preceding a rule, the presence of anentrypointannotation with atruevalue will assign the block adocumentscope, where therulescope is otherwise the default.In practice, a rule entrypoint always point to the entire document and not a particular rule definition. The previous behavior was a bug, and one we've now addressed.
Authored by @anderseknert
Topdown and Rego
Runtime, Tooling, SDK
copymethod copy all values (#6949) authored by @anderseknertopa exec: This command never supported "pretty" formatting (--format=prettyor-f pretty), onlyjson. Passingprettyis now invalid. (#6923) authored by @srenatusNote that the flag is now unnecessary, but it's kept so existing calls like
opa exec -fjson ...remain valid.Security Fix: CVE-2024-8260 (#6933)
This release includes a fix where OPA would accept UNC locations on Windows. Reading those could leak NTLM hashes.
The attack vector would include an adversary tricking the user in passing an UNC path to OPA, e.g.
opa eval -d $FILE.UNC paths are now forbidden. If this is an issue for you, please reach out on Slack or GitHub issues.
Reported by Shelly Raban
Authored by @ashutosh-narkar
Docs, Website, Ecosystem
opa-config.yamlas name for config file (#6966) (#6959) authored by @anderseknerthttp.sendin inter-query cache config docs (#6953) authored by @anderseknertMiscellaneous
v0.67.1Compare Source
This is a bug fix release addressing the following issue:
v0.67.0Compare Source
This release contains a mix of features, a new builtin function (
strings.count), performance improvements, and bugfixes.Breaking Change
Request Body Size Limits
OPA now automatically rejects very large requests (#6868) authored by @philipaconrad.
Requests with a
Content-Lengthlarger than 128 MB uncompressed, and gzipped requests with payloads that decompress tolarger than 256 MB will be rejected, as part of hardening OPA against denial-of-service attacks. Previously, a large
enough request could cause an OPA instance to run out of memory in low-memory sidecar deployment scenarios, just from
attempting to read the request body into memory.
These changes allow improvements in memory usage for the OPA HTTP server, and help OPA deployments avoid some accidental out-of-memory situations.
For most users, no changes will be needed to continue using OPA. However, to control this behavior, two new configuration
keys are available:
server.decoding.max_lengthandserver.decoding.gzip.max_length. These control the max size inbytes to allow for an incoming request payload, and the maximum size in bytes to allow for a decompressed gzip request payload, respectively.
Here's an example OPA configuration using the new keys:
Topdown and Rego
strings.countbuiltin which returns the number of non-overlapping instances of a substring in a string (#6827) authored by @Manish-Giri--rego-v1formatted module has rule name conflicting with keyword (#6833) authored by @johanfyllingRuntime, Tooling, SDK
--follow-symlinksflag to theopa buildcommand to allow users to build directories with symlinked files, and have the contents of those symlinked files included in the built bundle (#6800) authored by @tjonsexplain=failsquery value (#6886) authored by @acamatciscoDocs, Website, Ecosystem
rego_versionandfile_rego_versionsattributes (#6885) authored by @ashutosh-narkarMiscellaneous
v0.66.0Compare Source
This release contains a mix of features, performance improvements, and bugfixes.
Improved Test Reports (#2546)
The
opa testcommand now includes a new--var-valuesflag that enriches reporting of failed tests with the values and locations for variables in the failing expression.E.g.:
Authored by @johanfylling, reported by @grosser.
Reading stdin in
opa exec(#6538)The
opa execcommand now supports readinginputdocuments from stdin with the--stdin-input(-I) flag.E.g.:
Authored by @colinjlacy, reported by @humbertoc-silva.
Topdown and Rego
everydomain (#6790) authored by @johanfylling reported by @anakrishRuntime, Tooling, SDK
Docs, Website, Ecosystem
go_memstats_gc_cpu_fraction(#6783) authored by @philipaconradan HTTP(#6786) authored by @jdbaldryMiscellaneous
v0.65.0Compare Source
This release contains a mix of features and bugfixes.
Runtime, Tooling, SDK
Topdown and Rego
everydomain is a collection type before evaluation (#6762) authored by @johanfylling reported by @anderseknertMiscellaneous
Breaking changes
A new IsSetStmt statement has been added to the intermediate representation (IR).
This is a breaking change for custom IR evaluators, which must interpret this statement in IR plans generated by this OPA version and later.
No actions are required for Wasm users, as long as Wasm modules are built by this OPA version or later.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.