Skip to content

chore(deps): bump github.com/openfga/openfga from 1.11.1 to 1.11.3#624

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/github.com/openfga/openfga-1.11.3
Open

chore(deps): bump github.com/openfga/openfga from 1.11.1 to 1.11.3#624
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/github.com/openfga/openfga-1.11.3

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 5, 2026

Bumps github.com/openfga/openfga from 1.11.1 to 1.11.3.

Release notes

Sourced from github.com/openfga/openfga's releases.

v1.11.3

What's Changed

Added

  • Add configuration option to limit max type system cache size. 2744
  • Add OTEL_* env var support to existing otel env vars. #2825
  • Add configurable server-side validation for ReadChanges page size. The default max page size remains 100 to maintain backward compatibility, and can be configured via --readChanges-max-page-size CLI flag or OPENFGA_READ_CHANGES_MAX_PAGE_SIZE environment variable. #2887

Changed

  • Datastore throttling separated from dispatch throttling in BatchCheck, ListUsers metadata. Also, throttling_type label added to throttledRequestCounter metric to differentiate between dispatch/datastore throttling. #2839

Removed

  • Removed custom grpc_prometheus fork, replace with go-grpc-middleware's provider. Removes the custom grpc_code label on this metric. #2855

Fixed

  • ListUsers will now properly get datastore throttled if enabled. #2846
  • Cache controller now uses the logger provided to the server instead of always using a no-op logger. #2847
  • Typesystem invalidate model with empty intersection and union. #2865
  • Ordered iterator to iterate tuples correctly. #2898

New Contributors

Full Changelog: openfga/openfga@v1.11.2...v1.11.3

v1.11.2

What's Changed

Fixed

  • Fixed an issue with the InMemoryCacheController (the default cache controller when enabled) where cached Check responses were not invalidated after a write to the store. Previously, invalidation only occurred if multiple Checks were triggered in rapid succession after a write. #2811
  • Update toolchain go version to 1.25.5 to address CVE-2025-61729 in the go std lib.

New Contributors

Full Changelog: openfga/openfga@v1.11.1...v1.11.2

Changelog

Sourced from github.com/openfga/openfga's changelog.

[1.11.3] - 2026-01-28

Added

  • Add configuration option to limit max type system cache size. 2744
  • Add OTEL_* env var support to existing otel env vars. #2825
  • Add configurable server-side validation for ReadChanges page size. The default max page size remains 100 to maintain backward compatibility, and can be configured via --readChanges-max-page-size CLI flag or OPENFGA_READ_CHANGES_MAX_PAGE_SIZE environment variable. #2887

Changed

  • Datastore throttling separated from dispatch throttling in BatchCheck, ListUsers metadata. Also, throttling_type label added to throttledRequestCounter metric to differentiate between dispatch/datastore throttling. #2839

Removed

  • Removed custom grpc_prometheus fork, replace with go-grpc-middleware's provider. Removes the custom grpc_code label on this metric. #2855

Fixed

  • ListUsers will now properly get datastore throttled if enabled. #2846
  • Cache controller now uses the logger provided to the server instead of always using a no-op logger. #2847
  • Typesystem invalidate model with empty intersection and union. #2865
  • Ordered iterator to iterate tuples correctly. #2898

[1.11.2] - 2025-12-04

Fixed

  • Fixed an issue with the InMemoryCacheController (the default cache controller when enabled) where cached Check responses were not invalidated after a write to the store. Previously, invalidation only occurred if multiple Checks were triggered in rapid succession after a write. #2811
  • Update toolchain go version to 1.25.5 to address CVE-2025-61729 in the go std lib.
Commits
  • 6e22a3e release: update changelog for release v1.11.3 (#2899)
  • 1bb5edd fix: order iterator to advance tuples correctly (#2898)
  • 504b7cc Fix/mixed strategies (#2886)
  • 92df4ad fix: order of go mod commands in make deps (#2718)
  • 055aad1 feat: configurable max page size for ReadChanges (#2887)
  • a1e2d3f chore: bump grpc healthcheck probe in Docker goreleaser (#2885)
  • 63fdc9c chore(deps): bump grpc-ecosystem/grpc-health-probe from v0.4.43 to v0.4.44 in...
  • f98bafb chore(deps): bump the dependencies group with 3 updates (#2884)
  • dd477ea apply pipeline configurations to streaming list objects requests (#2878)
  • bc96155 Fix reproducible builds by using CommitDate instead of Date in GoReleaser con...
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/openfga/openfga](https://github.com/openfga/openfga) from 1.11.1 to 1.11.3.
- [Release notes](https://github.com/openfga/openfga/releases)
- [Changelog](https://github.com/openfga/openfga/blob/main/CHANGELOG.md)
- [Commits](openfga/openfga@v1.11.1...v1.11.3)

---
updated-dependencies:
- dependency-name: github.com/openfga/openfga
  dependency-version: 1.11.3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Feb 5, 2026
@dependabot dependabot bot requested a review from a team as a code owner February 5, 2026 21:48
@dosubot
Copy link

dosubot bot commented Feb 5, 2026

Related Documentation

Checked 6 published document(s) in 1 knowledge base(s). No updates required.

How did I do? Any feedback?  Join Discord

@socket-security
Copy link

@socket-security
Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Warn High
License policy violation: golang github.com/openfga/openfga under MPL-2.0

License: MPL-2.0 - the applicable license policy does not allow this license (4) (NOTICE)

License: MPL-2.0 - the applicable license policy does not allow this license (4) (NOTICE)

From: go.modgolang/github.com/openfga/openfga@v1.11.3

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/github.com/openfga/openfga@v1.11.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
License policy violation: golang gonum.org/v1/gonum under SunPro

License: SunPro - the applicable license policy does not allow this license (4) (THIRD_PARTY_LICENSES/Sun-LICENSE)

From: ?golang/github.com/openfga/api/proto@v0.0.0-20260122164422-25e22cb1875bgolang/github.com/openfga/openfga@v1.11.3golang/github.com/openfga/language/pkg/go@v0.2.0-beta.2.0.20251027165255-0f8f255e5f6cgolang/gonum.org/v1/gonum@v0.17.0

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore golang/gonum.org/v1/gonum@v0.17.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants