{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":359389563,"defaultBranch":"main","name":"pxapi.go","ownerLogin":"pixie-io","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2021-04-19T08:47:36.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/82631609?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1700607358.0","currentOid":""},"activityList":{"items":[{"before":"6fec9b30822823a15b38761297313ece6c1cef8a","after":"309ba24e0b40717c2a0ca1a24c55ec5ea9bbdae1","ref":"refs/heads/main","pushedAt":"2024-05-30T01:48:14.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"chore: Upgrade gazelle (#1925)\n\nSummary: I ran into an issue when upgrading an different go dep that\nforced be to upgrade gazelle, which in turn forced me to upgrade\nbuildtools.\n\nRelevant Issues: N/A\n\nType of change: /kind infra\n\nTest Plan: gazelle and other buildtools still work, build still works.\n\nSigned-off-by: Vihang Mehta \nGitOrigin-RevId: ced9a1940a7befa5af331c4ba144c711a64a3d91","shortMessageHtmlLink":"chore: Upgrade gazelle (#1925)"}},{"before":"424f739567f26fdffefa16d9a4037c497d12f5a6","after":"6fec9b30822823a15b38761297313ece6c1cef8a","ref":"refs/heads/main","pushedAt":"2023-11-25T04:49:52.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"Update pxapi go deps in line with latest pxapi repo changes (#1780)\n\nSummary: Update pxapi go deps in line with latest pxapi repo changes\n\nThis propagates the changes to the pxapi repo to upgrade its\ndependencies to address grpc vulnerabilities\n\nRelevant Issues: N/A\n\nType of change: /kind dependencies\n\nTest Plan: Verified that the pxapi go changes worked with the examples\nin the repo (see https://github.com/pixie-io/pxapi.go/pull/1 for more\ndetails)\n\nSigned-off-by: Dom Del Nano \nGitOrigin-RevId: dffdb3b681f35583cc3749ca2ecb56593c29f752","shortMessageHtmlLink":"Update pxapi go deps in line with latest pxapi repo changes (#1780)"}},{"before":"8f4ae85824df93afac89055b0968b14f78ed0943","after":"424f739567f26fdffefa16d9a4037c497d12f5a6","ref":"refs/heads/main","pushedAt":"2023-11-09T01:02:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"Add support for connecting standalone PEM in pxapi. (#1762)\n\nSummary: Add support for connecting standalone PEM in pxapi.\n\nType of change: /kind feature\n\nTest Plan: Added an example program to connect standalone PEM.\n\n---------\n\nSigned-off-by: RagalahariP \nSigned-off-by: Pete Stevenson \nCo-authored-by: RagalahariP \nGitOrigin-RevId: ff140e45d3102331300a1456e4272391a9c31503","shortMessageHtmlLink":"Add support for connecting standalone PEM in pxapi. (#1762)"}},{"before":"b0cd7aa4bd830bedff35dab9befe367828c601ea","after":"8f4ae85824df93afac89055b0968b14f78ed0943","ref":"refs/heads/main","pushedAt":"2023-11-02T20:36:37.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"Update pxapi Go client to enforce an opt in mechanism when TLS is disabled (#1746)\n\nSummary: Update pxapi Go client to enforce an opt in mechanism when TLS\nis disabled\n\nDisabling TLS is often useful for test environments, but is not expected\nto be relied on in any non test environments. The doc string of\nNewClient was updated, so that this new behavior will explained in the\npxapi's [Godoc\ndocumentation](https://pkg.go.dev/px.dev/pxapi#NewClient).\n\nRelevant Issues: N/A\n\nType of change: /kind bug\n\nTest Plan: The following scenarios were tested to ensure the opt in\nmechanism is functional\n1. Verified that the default behavior does not disable TLS\n\n
output\n\n```\n# Set cloud.cluster.local to the IP address of work.withpixie.ai\n$ grep cloud /etc/hosts\n34.102.151.106 cloud.cluster.local\n\n# Set cloud address to a cluster.local domain\n$ git diff\ndiff --git a/src/api/go/pxapi/examples/basic_example/example.go b/src/api/go/pxapi/examples/basic_example/example.go\nindex 16e71f9787..cea9fd9ee0 100644\n--- a/src/api/go/pxapi/examples/basic_example/example.go\n+++ b/src/api/go/pxapi/examples/basic_example/example.go\n@@ -74,7 +74,9 @@ func main() {\n }\n\n ctx := context.Background()\n- client, err := pxapi.NewClient(ctx, pxapi.WithAPIKey(apiKey))\n+ cloudAddr := \"cloud.cluster.local:443\"\n+ // client, err := pxapi.NewClient(ctx, pxapi.WithAPIKey(apiKey))\n+ client, err := pxapi.NewClient(ctx, pxapi.WithAPIKey(apiKey), pxapi.WithCloudAddr(cloudAddr))\n if err != nil {\n panic(err)\n }\n\n$ PX_CLUSTER_ID='' PX_API_KEY=$(cat .px-api-key) bazel run src/api/go/pxapi/examples/basic_example:basic_example\nINFO: Invocation ID: a7111f36-8a12-45a7-a8f4-b28eab9c841c\nINFO: Streaming build results to: https://bb.corp.pixielabs.ai/invocation/a7111f36-8a12-45a7-a8f4-b28eab9c841c\nINFO: Analyzed target //src/api/go/pxapi/examples/basic_example:basic_example (0 packages loaded, 0 targets configured).\nINFO: Found 1 target...\nTarget //src/api/go/pxapi/examples/basic_example:basic_example up-to-date:\n bazel-bin/src/api/go/pxapi/examples/basic_example/basic_example_/basic_example\nINFO: Elapsed time: 0.367s, Critical Path: 0.02s\nINFO: 1 process: 1 internal.\nINFO: Running command line: bazel-bin/src/api/go/pxapi/examples/basic_example/basic_example_/basic_example\nINFO: Streaming build results to: https://bb.corp.pixielabs.ai/invocation/a7111f36-8a12-45a7-a8f4-b28eab9c841c\nINFO: Build completed successfully, 1 total action\nRunning on Cluster: fbef7892-6302-4bd4-8b55-ae2a93d556fc\nRunning script\npanic: rpc error: code = Unavailable desc = connection error: desc = \"transport: authentication handshake failed: tls: failed to verify certificate: x509: certificate is valid for withpixie.ai, work.withpixie.ai, docs.withpixie.ai, segment.withpixie.ai, not cloud.cluster.local\"\n\ngoroutine 1 [running]:\nmain.main()\n src/api/go/pxapi/examples/basic_example/example.go:95 +0x498\n```\n\n
\n\n2. Verified that if the cloud hostname is overridden, that TLS will not\nbe disabled if `PX_DISABLE_TLS` is not set to `1`\n
output\n\n```\n# The following change was applied to main in order to test this and the next scenario\n$ git diff\ndiff --git a/src/api/go/pxapi/examples/basic_example/example.go b/src/api/go/pxapi/examples/basic_example/example.go\nindex 16e71f9787..766ea39de0 100644\n--- a/src/api/go/pxapi/examples/basic_example/example.go\n+++ b/src/api/go/pxapi/examples/basic_example/example.go\n@@ -74,7 +74,9 @@ func main() {\n }\n\n ctx := context.Background()\n- client, err := pxapi.NewClient(ctx, pxapi.WithAPIKey(apiKey))\n+ cloudAddr := \"cloud.cluster.local:443\"\n+ // client, err := pxapi.NewClient(ctx, pxapi.WithAPIKey(apiKey))\n+ client, err := pxapi.NewClient(ctx, pxapi.WithAPIKey(apiKey), pxapi.WithCloudAddr(cloudAddr), pxapi.WithDisableTLSVerification(cloudAddr))\n\n$ PX_CLUSTER_ID='' PX_API_KEY=$(cat .px-api-key) bazel run src/api/go/pxapi/examples/basic_example:basic_example\nINFO: Invocation ID: a7111f36-8a12-45a7-a8f4-b28eab9c841c\nINFO: Streaming build results to: https://bb.corp.pixielabs.ai/invocation/a7111f36-8a12-45a7-a8f4-b28eab9c841c\nINFO: Analyzed target //src/api/go/pxapi/examples/basic_example:basic_example (0 packages loaded, 0 targets configured).\nINFO: Found 1 target...\nTarget //src/api/go/pxapi/examples/basic_example:basic_example up-to-date:\n bazel-bin/src/api/go/pxapi/examples/basic_example/basic_example_/basic_example\nINFO: Elapsed time: 0.367s, Critical Path: 0.02s\nINFO: 1 process: 1 internal.\nINFO: Running command line: bazel-bin/src/api/go/pxapi/examples/basic_example/basic_example_/basic_example\nINFO: Streaming build results to: https://bb.corp.pixielabs.ai/invocation/a7111f36-8a12-45a7-a8f4-b28eab9c841c\nINFO: Build completed successfully, 1 total action\n2023/11/02 18:23:15 The `PX_DISABLE_TLS` environment variable must be set to \"1\" when making cloud connections that do not support TLS.\n```\n
\n\n3. Verified that if the cloud hostname is overridden and\n`PX_DISABLE_TLS=1` that TLS will be disabled.\n
output\n```\n$ PX_DISABLE_TLS=1 PX_CLUSTER_ID='' PX_API_KEY=$(cat .px-api-key) bazel run src/api/go/pxapi/examples/basic_example:basic_example\nINFO: Invocation ID: 18efc480-2caf-4598-886e-7a1a5ac15fd9\nINFO: Streaming build results to: https://bb.corp.pixielabs.ai/invocation/18efc480-2caf-4598-886e-7a1a5ac15fd9\nINFO: Analyzed target //src/api/go/pxapi/examples/basic_example:basic_example (0 packages loaded, 0 targets configured).\nINFO: Found 1 target...\nTarget //src/api/go/pxapi/examples/basic_example:basic_example up-to-date:\n bazel-bin/src/api/go/pxapi/examples/basic_example/basic_example_/basic_example\nINFO: Elapsed time: 0.287s, Critical Path: 0.02s\nINFO: 1 process: 1 internal.\nINFO: Running command line: bazel-bin/src/api/go/pxapi/examples/basic_example/basic_example_/basic_example\nINFO: Streaming build results to: https://bb.corp.pixielabs.ai/invocation/18efc480-2caf-4598-886e-7a1a5ac15fd9\nINFO: Build completed successfully, 1 total action\nRunning on Cluster: fbef7892-6302-4bd4-8b55-ae2a93d556fc\nRunning on Cluster: fbef7892-6302-4bd4-8b55-ae2a93d556fc\nRunning script\n000008bf-0000-0aa8-0000-000000000742 /healthz 169.254.169.254 GET\n000008bf-0000-0eff-0000-000000000a1b /readyz 10.68.192.129 GET\n000008bf-0000-0eff-0000-000000000a1b /healthz 10.68.192.129 GET\n000008bf-0000-0f06-0000-000000000a1b /healthz 10.68.192.129 GET\n000008bf-0000-0f06-0000-000000000a1b /readyz 10.68.192.129 GET\n000008bf-0000-0fb4-0000-000000000ae3 /readiness 10.68.192.129 GET\n000008bf-0000-1113-0000-000000000d0a /healthcheck/dnsmasq 10.68.192.129 GET\n000008bf-0000-1113-0000-000000000d0a /healthcheck/kubedns 10.68.192.129 GET\n000008bf-0000-1113-0000-000000000d0a /metrics 10.68.192.129 GET\n000008bf-0006-b357-0000-000003ab11bd /is-dynamic-lb-initialized 127.0.0.1 GET\nExecution Time: 940µs\nBytes received: 646\n```\n\n
\n\n---------\n\nSigned-off-by: Dom Del Nano \nGitOrigin-RevId: 18340f4e15da6052082b638f25d972db6e987785","shortMessageHtmlLink":"Update pxapi Go client to enforce an opt in mechanism when TLS is dis…"}},{"before":"5dd181b08272b8a0290b7a393e662d5deff606d6","after":"b0cd7aa4bd830bedff35dab9befe367828c601ea","ref":"refs/heads/main","pushedAt":"2023-08-16T21:19:29.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"Change VizierID type from string to uuidpb.UUID (#1677)\n\nSummary: This PR adjusts the cloud side to accept a type uuidpb.UUID for\nthe VizierID instead of a string.\n\nRelevant Issues: #1632\n\nType of change: /kind bug\n\nTest Plan: Skaffold the cloud changes on the testing cluster and then\nskaffold the operator changes on a dev cluster. Manually trigger an\nupdate on the operator side to send the VizierID to the config manager\nservice. Check the config manager service's logs to see that the new\nlogic is being executed as expected to handle the VizierID.\n\nSigned-off-by: Kartik Pattaswamy \nGitOrigin-RevId: e5d83b73a855b85f485dd47e30db437f74fc7dd2","shortMessageHtmlLink":"Change VizierID type from string to uuidpb.UUID (#1677)"}},{"before":"b33fff823dc7d30e42007f5a564e5f72e8fbdf9d","after":"5dd181b08272b8a0290b7a393e662d5deff606d6","ref":"refs/heads/main","pushedAt":"2023-08-15T01:44:23.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"Use VizierID to find the Vizier's Org (#1668)\n\nSummary: This PR allows the VizierID to be used when getting the\nVizier's org as opposed to only relying on the DeployKey when adding\nfeature flags. This PR also contains changes to prevent a segmentation\nfault that occurred previously.\n\nRelevant Issues: https://github.com/pixie-io/pixie/issues/1632\n\nType of change: /kind bug\n\nTest Plan: Skaffold the cloud changes on the testing cluster and then\nskaffold the operator changes on a dev cluster. Manually trigger an\nupdate on the operator side to send the VizierID to the config manager\nservice. Check the config manager service's logs to see that the new\nlogic is being executed as expected to handle the VizierID.\n\n---------\n\nSigned-off-by: Kartik Pattaswamy \nGitOrigin-RevId: 87180347a8b9bfca31b9b561712b64d29bd97807","shortMessageHtmlLink":"Use VizierID to find the Vizier's Org (#1668)"}},{"before":"cfb535f9af2bb8ada84bdee5621325029816f3a2","after":"b33fff823dc7d30e42007f5a564e5f72e8fbdf9d","ref":"refs/heads/main","pushedAt":"2023-08-11T18:42:29.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"Revert \" Allow VizierID to be used to find the Vizier's org\" (#1666)\n\nSummary: After testing the interaction between the operator and config\nmanager service, it seems that the config manager service segmentation\nfaults when it receives the VizierID from the operator as it's not able\nto properly convert it to type uuid, causing the service to restart.\nThis needs to be fixed and in the meantime these changes should be\nreverted.\n\nRelevant Issues: #1632\n\nType of change: /kind bug\n\nTest Plan: Make sure it still builds\n\nSigned-off-by: Kartik Pattaswamy \nGitOrigin-RevId: 69415c0bd8af3b3d3aa01e45edc9b76c5261e6f2","shortMessageHtmlLink":"Revert \" Allow VizierID to be used to find the Vizier's org\" (#1666)"}},{"before":"90172981e82dbdd99f797539c7787debf7e9b5bd","after":"cfb535f9af2bb8ada84bdee5621325029816f3a2","ref":"refs/heads/main","pushedAt":"2023-08-09T18:16:55.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":" Allow VizierID to be used to find the Vizier's org (#1650)\n\nSummary: This PR allows the VizierID to be used when getting the org as\nopposed to only relying on the DeployKey when adding feature flags.\n\nRelevant Issues: #1632\n\nType of change: /kind bug\n\nTest Plan: Another PR needs to come in on the operator side to\nretrieve/send the VizierID to the cloud. Getting this PR in on the cloud\nside will simplify the process of testing the integration between the\ntwo later.\n\n---------\n\nSigned-off-by: Kartik Pattaswamy \nGitOrigin-RevId: 1c328aa6394dc9115d565c0c1fb0edad4582493d","shortMessageHtmlLink":" Allow VizierID to be used to find the Vizier's org (#1650)"}},{"before":"1ffc2b75b8bcb09ec67f846d5d7ba213ec5d068c","after":"90172981e82dbdd99f797539c7787debf7e9b5bd","ref":"refs/heads/main","pushedAt":"2023-08-04T20:52:03.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"Add support for tolerations in operator (#1648)\n\nSummary: Adds support for tolerations to enable users to deploy PEMs to\nnodes that have taints through the CLI.\n\nRelevant Issues: #598\n\nType of change: /kind feature\n\nTest Plan: Used skaffold to deploy an unreleased version of the\noperator. Verified that tolerations parameter actually gets passed\nthrough to the pod spec.\n\nSigned-off-by: Benjamin Kilimnik \nGitOrigin-RevId: 6796db614df7006aec3d537565aca6eaccd98e76","shortMessageHtmlLink":"Add support for tolerations in operator (#1648)"}},{"before":"475968d0cc76a7efe16c831a232550fd0f1ba7ec","after":"1ffc2b75b8bcb09ec67f846d5d7ba213ec5d068c","ref":"refs/heads/main","pushedAt":"2023-06-15T21:09:28.432Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"[artifacts] Add artifact mirrors to Artifact proto definition. (#1499)\n\nSummary: Adds `AvailableArtifactMirrors` to the `Artifact` proto\ndefinition. This field will be used as a map from `ArtifactType` to a\nlist of URLs where that artifact type can be downloaded from. This is\nthe first step along the way to no longer hardcoding the artifact\ndownload link in the artifact tracker server. This PR also updates the\n`artifacts/manifest` package to handle the new field in the proto.\n\nType of change: /kind cleanup\n\nTest Plan: Added tests in `artifacts/manifest` that the\n`ArtifactManifest` type handles the new proto correctly. Other than\nthat, the new proto is still backwards compatible, so no other code\nchanges.\n\n---------\n\nSigned-off-by: James Bartlett \nGitOrigin-RevId: 099b36e00249bbf39a58c8b54fa7fcaa3f3515b8","shortMessageHtmlLink":"[artifacts] Add artifact mirrors to Artifact proto definition. (#1499)"}},{"before":"0d3f42509b4d97d89fada95854dc792068fbb175","after":"475968d0cc76a7efe16c831a232550fd0f1ba7ec","ref":"refs/heads/main","pushedAt":"2023-06-06T21:53:51.333Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"Add user deletion to API service (#1439)\n\nSummary: We are adding user deletion to the API. #1434 added user\ndeletion to the internal profile service. This PR adds it to the\nexternal-facing gRPC API. A followup diff will later add it to gql.\n\nRelevant Issues: #655\n\nType of change: /kind feature\n\nTest Plan: unit tests\n\n---------\n\nSigned-off-by: Michelle Nguyen \nGitOrigin-RevId: a9951df60c37456c2e8c8d67fb48f790aba29545","shortMessageHtmlLink":"Add user deletion to API service (#1439)"}},{"before":"995522ede9ff416a15b5eb639d18327bf2b1fcea","after":"0d3f42509b4d97d89fada95854dc792068fbb175","ref":"refs/heads/main","pushedAt":"2023-04-24T16:31:58.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"[pxapi] Allow streaming queries to reconnect if stream ends without trailers (#1227)\n\nSummary: The `perf-eval` github action was often failing because the\ndata loss streaming pxl script would fail with error \"server closed the\nstream without sending trailers\". It seems like this happens similarly\nto `RST_STREAM` when someone on the TCP chain decides to give up on the\nconnection. This diff allows the script to try to reconnect if this\nerror occurs. I tested the perf eval using these changes and it no\nlonger errors with the above error.\n\nType of change: /kind cleanup\n\nTest Plan: Tested a perf eval with a streaming query and saw that it\nsuccessfully completed without running into any \"server closed the\nstream ...\" errors.\n\nSigned-off-by: James Bartlett \nGitOrigin-RevId: a7f8a26e9fd5f12443fe819c52ef35c51d354ab1","shortMessageHtmlLink":"[pxapi] Allow streaming queries to reconnect if stream ends without t…"}},{"before":"55054e340e24a048240f406b48be71c559a8415c","after":"995522ede9ff416a15b5eb639d18327bf2b1fcea","ref":"refs/heads/main","pushedAt":"2023-04-14T20:21:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"[cli] Fix ContainsAny call (#1223)\n\nSummary: The CLI was checking for cluster local addresses using\n`strings.ContainsAny` but this is incorrect. This PR replaces it with\n`strings.Contains`.\n\nType of change: /kind cleanup\n\nTest Plan: Ran `px run` to make sure it can still connect to a vizier.\n\nSigned-off-by: James Bartlett \nGitOrigin-RevId: 549ba9e55c9beb151b334f019aa6e42e8bdc6f6b","shortMessageHtmlLink":"[cli] Fix ContainsAny call (#1223)"}},{"before":"1639da5d3f61390bbd83f1bb314707d6fd6216f5","after":"55054e340e24a048240f406b48be71c559a8415c","ref":"refs/heads/main","pushedAt":"2023-04-10T16:47:58.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"copybaranaut","name":"Pixie Copybara","path":"/copybaranaut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82863742?s=80&v=4"},"commit":{"message":"Upgrade deps for pxapi (#1191)\n\nSummary: This aligns the depedencies exported as part of the pxapi go\nmodule to line up with the dependencies used by the main pixie repo.\n\nRelevant Issues: N/A\n\nType of change: /kind cleanup\n\nTest Plan: Checked out a version of the pxapi package, upgraded the deps\nand tested a couple of simple example scripts that use pxapi.\n\nSigned-off-by: Vihang Mehta \nGitOrigin-RevId: f6d98b8327a1df4917d16e46127513fffcf3e8e2","shortMessageHtmlLink":"Upgrade deps for pxapi (#1191)"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEV4coLwA","startCursor":null,"endCursor":null}},"title":"Activity · pixie-io/pxapi.go"}