-
Notifications
You must be signed in to change notification settings - Fork 7
fix(go.mod/go.sum): update minor dependencies (golang) #146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
c717ee9 to
c0a0d77
Compare
c0a0d77 to
1eb93b4
Compare
1eb93b4 to
b8220c1
Compare
b8220c1 to
eb79ed8
Compare
eb79ed8 to
92cffd1
Compare
92cffd1 to
7611832
Compare
7611832 to
66b0c5f
Compare
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
66b0c5f to
b01368b
Compare
b01368b to
06bb3c8
Compare
be8db25 to
821dcd0
Compare
821dcd0 to
35ae6cf
Compare
35ae6cf to
d56f000
Compare
d56f000 to
1c49d76
Compare
1c49d76 to
17ec315
Compare
17ec315 to
0d3ae85
Compare
0d3ae85 to
d286c1a
Compare
d286c1a to
6d2056e
Compare
6d2056e to
0d8140c
Compare
ebfdb98
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
This PR contains the following updates:
v1.17.2->v1.18.2v2.23.4->v2.25.3v1.37.0->v1.38.2v0.83.0->v0.85.0v9.9.0->v9.14.01.24.3->1.25.1v0.24.0->v0.28.0v0.33.1->v0.34.1v0.33.1->v0.34.1v0.33.1->v0.34.1v0.33.1->v0.34.1v0.33.1->v0.34.1v0.33.1->v0.34.1v0.21.0->v0.22.1v0.18.0->v0.19.0v1.4.0->v1.6.0Release Notes
cert-manager/cert-manager (github.com/cert-manager/cert-manager)
v1.18.2Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
We fixed a bug in the CSR's name constraints construction (only applies if you have enabled the
NameConstraintsfeature gate).We dropped the new
global.rbac.disableHTTPChallengesRoleHelm option due to a bug we found, this feature will be released inv1.19instead.Changes since
v1.18.1:Bug or Regression
global.rbac.disableHTTPChallengesRoleHelm option. (#7837, @cert-manager-bot)v1.18.1Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
We have added a new feature gate
ACMEHTTP01IngressPathTypeExact, to allowingress-nginxusers to turn off the new default IngressPathType: Exactbehavior, in ACME HTTP01 Ingress challenge solvers.This change fixes the following issue: #7791
We have increased the ACME challenge authorization timeout to two minutes, which we hope will fix a timeout error (
error waiting for authorization), which has been reported by multiple users, since the release of cert-managerv1.16.0.This change should fix the following issues: #7337, #7444, and #7685.
Changes since
v1.18.0:Feature
ACMEHTTP01IngressPathTypeExact, to allowingress-nginxusers to turn off the new default IngressPathType: Exactbehavior, in ACME HTTP01 Ingress challenge solvers. (#7810, @sspreitzer)Bug or Regression
error waiting for authorization. (#7801, @hjoshi123)Other (Cleanup or Flake)
#7807, @wallrj)v1.18.0Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
cert-manager 1.18 introduces several new features and breaking changes. Highlights include support for ACME certificate profiles, a new default for
Certificate.Spec.PrivateKey.RotationPolicynow set toAlways(breaking change), and the defaultCertificate.Spec.RevisionHistoryLimitnow set to1(potentially breaking).Known Issues
Changes since
v1.17.2:Feature
app.kubernetes.io/managed-by: cert-managerlabel to the created Let's Encrypt account keys (#7577, @terinjokes)certmanager_certificate_not_before_timestamp_seconds,certmanager_certificate_not_after_timestamp_seconds). (#7612, @solidDoWant)--extra-certificate-annotations, which sets a list of annotation keys to be copied from Ingress-like to resulting Certificate object (#7083, @k0da)issshort name for the cert-managerIssuerresource. (#7373, @SgtCoDFish)cissshort name for the cert-managerClusterIssuerresource (#7373, @SgtCoDFish)global.rbac.disableHTTPChallengesRolehelm value to disable HTTP-01 ACME challenges. This allows cert-manager to drop its permission to create pods, improving security when HTTP-01 challenges are not required. (#7666, @ali-hamza-noor)FindZoneByFqdn(#7596, @ThatsIvan)UseDomainQualifiedFinalizerfeature to GA. (#7735, @jsoref)Certificate.Spec.PrivateKey.RotationPolicychanged fromNevertoAlways. (#7723, @wallrj)Documentation
Bug or Regression
go-josedependency to addressCVE-2025-27144. (#7606, @SgtCoDFish)golang.org/x/oauth2to patchCVE-2025-22868. (#7638, @NicholasBlaskey)golang.org/x/cryptoto patchGHSA-hcg3-q754-cr77. (#7638, @NicholasBlaskey)github.com/golang-jwt/jwtto patchGHSA-mh63-6h87-95cp. (#7638, @NicholasBlaskey)ImplementationSpecifictoExactfor a reliable handling of ingress controllers and enhanced security. (#7767, @sspreitzer)--namespace=<namespace>: limit the scope of cert-manager to a single namespace and disable cluster-scoped controllers. (#7678, @tsaarni)commonNamefield; IP addresses are no longer added to the DNSsubjectAlternativeNamelist and are instead added to theipAddressesfield as expected. (#7081, @johnjcool)certmanager_certificate_renewal_timestamp_secondsmetric help text indicating that the metric is relative to expiration time, rather than Unix epoch time. (#7609, @solidDoWant)Passthroughmode. (#6986, @vehagn)golang.org/x/netfixingCVE-2025-22870. (#7619, @dependabot[bot])Other (Cleanup or Flake)
third_party/forked/acmepackage with support for the ACME profiles extension. (#7776, @wallrj)AdditionalCertificateOutputFormatsfeature to GA, making additional formats always enabled. (#7744, @erikgb)ValidateCAA. Setting this feature gate is now a no-op which does nothing but print a warning log line (#7553, @SgtCoDFish)v1.24.4(#7785, @wallrj)v1.17.4Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
We fixed a bug in the CSR's name constraints construction (only applies if you have enabled the
NameConstraintsfeature gate).Changes since
v1.17.3:Bug or Regression
v1.17.3Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
This patch release addresses several vulnerabilities reported by the Trivy security scanner. It is built with the latest version of Go 1.23.
We have increased the ACME challenge authorization timeout to two minutes, which we hope will fix a timeout error (
error waiting for authorization), which has been reported by multiple users, in: #7337, #7444, and #7685.Changes since
v1.17.2:Bug or Regression
waiting for authorization(#7798, @hjoshi123)Other (Cleanup or Flake)
onsi/ginkgo (github.com/onsi/ginkgo/v2)
v2.25.3Compare Source
2.25.3
Fixes
f01aed1]v2.25.2Compare Source
2.25.2
Fixes
Add github output group for progress report content
Maintenance
Bump Gomega
v2.25.1Compare Source
2.25.1
Fixes
10866d3]2e42cff]v2.25.0Compare Source
2.25.0
AroundNodeThis release introduces a new decorator to support more complex spec setup usecases.
AroundNoderegisters a function that runs before each individual node. This is considered a more advanced decorator.Please read the docs for more information and some examples.
Allowed signatures:
AroundNode(func())-funcwill be called before the node is run.AroundNode(func(ctx context.Context) context.Context)-funccan wrap the passed in context and return a new one which will be passed on to the node.AroundNode(func(ctx context.Context, body func(ctx context.Context)))-ctxis the context for the node andbodyis a function that must be called to run the node. This gives you complete control over what runs before and after the node.Multiple
AroundNodedecorators can be applied to a single node and they will run in the order they are applied.Unlike setup nodes like
BeforeEachandDeferCleanup,AroundNodeis guaranteed to run in the same goroutine as the decorated node. This is necessary when working with lower-level libraries that must run on a single thread (you can callruntime.LockOSThread()in theAroundNodeto ensure that the node runs on a single thread).Since
AroundNodeallows you to modify the context you can also useAroundNodeto implement shared setup that attaches values to the context.If applied to a container,
AroundNodewill run before every node in the container. Including setup nodes likeBeforeEachandDeferCleanup.AroundNodecan also be applied toRunSpecsto run before every node in the suite. This opens up new mechanisms for instrumenting individual nodes across an entire suite.v2.24.0Compare Source
2.24.0
Features
Specs can now be decorated with (e.g.)
SemVerConstraint("2.1.0")andginkgo --sem-ver-filter="2.1.1"will only run constrained specs that match the requested version. Learn more in the docs here! Thanks to @Icarus9913 for the PR.Fixes
3f5d379]. fixes #1582Maintenance
Numerous dependency bumps and documentation fixes
onsi/gomega (github.com/onsi/gomega)
v1.38.2Compare Source
1.38.2
c404969]v1.38.1Compare Source
1.38.1
Fixes
Numerous minor fixes and dependency bumps
v1.38.0Compare Source
1.38.0
Features
4ee7ed0]Fixes
36bbf72]Maintenance
529d408]acd1f55]bae65a0]8dda91f]212d812]59bd7f9]328c729]9a798a1]04a72c6]prometheus-operator/prometheus-operator (github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring)
v0.85.0: 0.85.0 / 2025-08-21Compare Source
--watch-referenced-objects-in-all-namespacesCLI argument. When enabled, the operator watches for secrets and configmaps in both workload and configuration resources. It ensures that reconciliation happens when a referenced secret/configmap is updated. #7615resendDelayfield to the ThanosRuler CRD. #7753ruleGracePeriodfield to the ThanosRuler CRD. #7750enableFeaturesfield to the ThanosRuler CRD for enabling feature flags. #7754paramsfield to the Probe CRD. #7755hostUsersfield to the Prometheus, PrometheusAgent, Alertmanager and ThanosRuler CRDs. #7768 #7769 #7771promoteAllResourceAttributesandignoreResourceAttributesfields to Prometheus and PrometheusAgent CRDs. #7669-kubelet-sync-periodargument to customize the kubelet controller's synchronization interval. #7762send_resolvedfield for JIRA and RocketChat receivers in the Alertmanager configuration. #7772v0.84.1: 0.84.1 / 2025-08-06Compare Source
v0.84.0: 0.84.0 / 2025-07-14Compare Source
redis/go-redis (github.com/redis/go-redis/v9)
v9.14.0: 9.14.0Compare Source
Highlights
Changes
🚀 New Features
🐛 Bug Fixes
🧰 Maintenance
Contributors
We'd like to thank all the contributors who worked on this release!
@elena-kolevska, @htemelski-redis and @ndyakov
v9.13.0: 9.13.0Compare Source
Highlights
Changes
🚀 New Features
🐛 Bug Fixes
🧰 Maintenance
Contributors
We'd like to thank all the contributors who worked on this release!
@LINKIWI, @cxljs, @cybersmeashish, @elena-kolevska, @htemelski-redis, @mwhooker, @ndyakov, @ofekshenawa, @suever
v9.12.1: 9.12.1Compare Source
🚀 Highlights
In the last version (9.12.0) the client introduced bigger write and read buffer sizes. The default value was 512KiB.
However, users reported that this is too big for most use cases and can lead to high memory usage.
In this version the default value is changed to 256KiB. The
README.mdwas updated to reflect thecorrect default value and include a note that the default value can be changed.
🐛 Bug Fixes
🧰 Maintenance
Contributors
We'd like to thank all the contributors who worked on this release!
@ndyakov and @vmihailenco
v9.12.0: 9.12.0Compare Source
🚀 Highlights
FTSearch,FTAggregateand other search commands.EPSILONoption inFT.VSIM.Changes
errors.Joinrequires Go 1.20 or later (#3442)🚀 New Features
EPSILONoption (#3454)🐛 Bug Fixes
🧰 Maintenance
Contributors
We'd like to thank all the contributors who worked on this release!
@andy-stark-redis, @cxljs, @elena-kolevska, @htemelski-redis, @jouir, @monkey92t, @ndyakov, @ofekshenawa, @rokn, @smnvdev, @strobil and @wzy9607
New Contributors
v9.11.0: 9.11.0Compare Source
🚀 Highlights
Fixes
TxPipelineto work correctly in cluster scenarios, allowing execution of commandsonly in the same slot for a given transaction.
Changes
🚀 New Features
scancommands, rather than random (#2623)🐛 Bug Fixes
🧰 Maintenance
Ring,ClientandClusterClient(#3401)Contributors
We'd like to thank all the contributors who worked on this release!
@andy-stark-redis, @boekkooi-impossiblecloud, @cxljs, @dcherubini, @iamamirsalehi, @ndyakov, @pete-woods, @twz915
v9.10.0: 9.10.0Compare Source
Experimental support for vector sets!
🚀 Highlights
go-redisnow supports vector sets. This data type is marked as "in preview" in Redis and its support ingo-redisis marked as experimental. You can find examples in the documentation and in thedoctestsfolder.Changes
🚀 New Features
🧰 Maintenance
Contributors
We'd like to thank all the contributors who worked on this release!
@AndBobsYourUncle, @andy-stark-redis, @fukua95 and @ndyakov
golang/go (go)
v1.25.1v1.25.0v1.24.7v1.24.6v1.24.5v1.24.4kubernetes/api (k8s.io/api)
v0.34.1Compare Source
v0.34.0Compare Source
v0.33.5Compare Source
v0.33.4Compare Source
v0.33.3Compare Source
v0.33.2Compare Source
kubernetes/apiextensions-apiserver (k8s.io/apiextensions-apiserver)
v0.34.1Compare Source
v0.34.0Compare Source
v0.33.5Compare Source
v0.33.4Compare Source
v0.33.3Compare Source
v0.33.2Compare Source
kubernetes/apimachinery (k8s.io/apimachinery)
v0.34.1Compare Source
v0.34.0Compare Source
v0.33.5Compare Source
v0.33.4Compare Source
v0.33.3Compare Source
v0.33.2Compare Source
kubernetes/client-go (k8s.io/client-go)
v0.34.1Compare Source
v0.34.0Compare Source
v0.33.5Compare Source
v0.33.4[Compare Source](https://r
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.