-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[main] Upgrade to latest dependencies #15104
[main] Upgrade to latest dependencies #15104
Conversation
bumping knative.dev/caching 6569b97...c660724: > c660724 upgrade to latest dependencies (# 854) bumping knative.dev/pkg 094f152...1ff9a77: > 1ff9a77 Bump x/net to 0.24 (# 3014) bumping golang.org/x/term c5eaf76...5b15d26: > 5b15d26 go.mod: update golang.org/x dependencies bumping golang.org/x/net 7ee34a0...7bbe320: > 7bbe320 go.mod: update golang.org/x dependencies > c48da13 http2: fix TestServerContinuationFlood flakes > 762b58d http2: fix tipos in comment > ba87210 http2: close connections when receiving too many headers > ebc8168 all: fix some typos > 3678185 http2: make TestCanonicalHeaderCacheGrowth faster > 448c44f http2: remove clientTester > c7877ac http2: convert the remaining clientTester tests to testClientConn > d8870b0 http2: use synthetic time in TestIdleConnTimeout > d73acff http2: only set up deadline when Server.IdleTimeout is positive > 89f602b http2: validate client/outgoing trailers > 6e2c99c http2: allow testing Transports with testSyncHooks > 9e0498d http2: use synthetic timers for ping timeouts in tests > 31d9683 http2: mark several testing functions as helpers > 12ddef7 http2: reject DATA frames after 1xx and before final headers > d600ae0 http2: add testClientConn for testing client RoundTrips > 57a6a7a http2: prevent uninitialized pipe from being written > ea095bc http2: only set up positive deadlines > 8c07e20 httpproxy: allow any scheme > ab271c3 http2: add IdleConnTimeout to http2.Transport bumping golang.org/x/crypto 7067223...d042a39: > d042a39 go.mod: update golang.org/x dependencies > b92bf94 ssh: respect MaxAuthTries also for "none" auth attempts > 6f79b5a ssh: add server side multi-step authentication > 8d0d405 x/crypto/chacha20: cleanup chacha_ppc64le.s > b91329d all: remove redundant words in comments and fix some typos bumping golang.org/x/sys 360f961...cabba82: > cabba82 windows: use uint32 for serial comm flags for consistency > 1a50d97 windows: add serial comm functions > 95f07ec x/sys/windows: add func windows.DisconnectNamedPipe(handle Handle) (err error) > 4be02d3 unix: expose mmap calls on z/OS bumping knative.dev/networking 97688e7...ca2ffb8: > ca2ffb8 upgrade to latest dependencies (# 961) Signed-off-by: Knative Automation <automation@knative.team>
1cd4144
to
a3624e4
Compare
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #15104 +/- ##
==========================================
+ Coverage 84.11% 84.97% +0.86%
==========================================
Files 213 213
Lines 16783 13102 -3681
==========================================
- Hits 14117 11134 -2983
+ Misses 2315 1616 -699
- Partials 351 352 +1 ☔ View full report in Codecov by Sentry. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dprotaso, knative-automation The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Cron -knative-prow-robot
/cc knative/serving-writers
/assign knative/serving-writers
Produced by: knative-extensions/knobots/actions/update-deps