generated from SAP/repository-template
-
Notifications
You must be signed in to change notification settings - Fork 6
fix(go.mod/go.sum): update minor dependencies (golang) #146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
main
Choose a base branch
from
renovate/minor-deps-golang
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
c717ee9
to
c0a0d77
Compare
c0a0d77
to
1eb93b4
Compare
1eb93b4
to
b8220c1
Compare
b8220c1
to
eb79ed8
Compare
eb79ed8
to
92cffd1
Compare
92cffd1
to
7611832
Compare
7611832
to
66b0c5f
Compare
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
66b0c5f
to
b01368b
Compare
b01368b
to
06bb3c8
Compare
06bb3c8
to
2665526
Compare
2665526
to
4e0599d
Compare
4e0599d
to
72c074e
Compare
72c074e
to
92bc77c
Compare
92bc77c
to
cfa0fb0
Compare
cfa0fb0
to
0b85153
Compare
0b85153
to
166d710
Compare
166d710
to
abd0a0e
Compare
9ca814c
to
d62ce8d
Compare
d62ce8d
to
07b8243
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.17.2
->v1.18.2
v2.23.4
->v2.24.0
v1.37.0
->v1.38.0
v0.83.0
->v0.84.1
v9.9.0
->v9.12.1
1.24.3
->1.25.0
v0.24.0
->v0.27.0
v1.4.0
->v1.6.0
Release Notes
cert-manager/cert-manager (github.com/cert-manager/cert-manager)
v1.18.2
Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
We fixed a bug in the CSR's name constraints construction (only applies if you have enabled the
NameConstraints
feature gate).We dropped the new
global.rbac.disableHTTPChallengesRole
Helm option due to a bug we found, this feature will be released inv1.19
instead.Changes since
v1.18.1
:Bug or Regression
global.rbac.disableHTTPChallengesRole
Helm option. (#7837, @cert-manager-bot)v1.18.1
Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
We have added a new feature gate
ACMEHTTP01IngressPathTypeExact
, to allowingress-nginx
users to turn off the new default IngressPathType: Exact
behavior, in ACME HTTP01 Ingress challenge solvers.This change fixes the following issue: #7791
We have increased the ACME challenge authorization timeout to two minutes, which we hope will fix a timeout error (
error waiting for authorization
), which has been reported by multiple users, since the release of cert-managerv1.16.0
.This change should fix the following issues: #7337, #7444, and #7685.
Changes since
v1.18.0
:Feature
ACMEHTTP01IngressPathTypeExact
, to allowingress-nginx
users to turn off the new default IngressPathType: Exact
behavior, in ACME HTTP01 Ingress challenge solvers. (#7810
, @sspreitzer)Bug or Regression
error waiting for authorization
. (#7801
, @hjoshi123)Other (Cleanup or Flake)
#7807
, @wallrj)v1.18.0
Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
cert-manager 1.18 introduces several new features and breaking changes. Highlights include support for ACME certificate profiles, a new default for
Certificate.Spec.PrivateKey.RotationPolicy
now set toAlways
(breaking change), and the defaultCertificate.Spec.RevisionHistoryLimit
now set to1
(potentially breaking).Known Issues
Changes since
v1.17.2
:Feature
app.kubernetes.io/managed-by: cert-manager
label to the created Let's Encrypt account keys (#7577, @terinjokes)certmanager_certificate_not_before_timestamp_seconds
,certmanager_certificate_not_after_timestamp_seconds
). (#7612, @solidDoWant)--extra-certificate-annotations
, which sets a list of annotation keys to be copied from Ingress-like to resulting Certificate object (#7083, @k0da)iss
short name for the cert-managerIssuer
resource. (#7373, @SgtCoDFish)ciss
short name for the cert-managerClusterIssuer
resource (#7373, @SgtCoDFish)global.rbac.disableHTTPChallengesRole
helm value to disable HTTP-01 ACME challenges. This allows cert-manager to drop its permission to create pods, improving security when HTTP-01 challenges are not required. (#7666, @ali-hamza-noor)FindZoneByFqdn
(#7596, @ThatsIvan)UseDomainQualifiedFinalizer
feature to GA. (#7735, @jsoref)Certificate.Spec.PrivateKey.RotationPolicy
changed fromNever
toAlways
. (#7723, @wallrj)Documentation
Bug or Regression
go-jose
dependency to addressCVE-2025-27144
. (#7606, @SgtCoDFish)golang.org/x/oauth2
to patchCVE-2025-22868
. (#7638, @NicholasBlaskey)golang.org/x/crypto
to patchGHSA-hcg3-q754-cr77
. (#7638, @NicholasBlaskey)github.com/golang-jwt/jwt
to patchGHSA-mh63-6h87-95cp
. (#7638, @NicholasBlaskey)ImplementationSpecific
toExact
for a reliable handling of ingress controllers and enhanced security. (#7767, @sspreitzer)--namespace=<namespace>
: limit the scope of cert-manager to a single namespace and disable cluster-scoped controllers. (#7678, @tsaarni)commonName
field; IP addresses are no longer added to the DNSsubjectAlternativeName
list and are instead added to theipAddresses
field as expected. (#7081, @johnjcool)certmanager_certificate_renewal_timestamp_seconds
metric help text indicating that the metric is relative to expiration time, rather than Unix epoch time. (#7609, @solidDoWant)Passthrough
mode. (#6986, @vehagn)golang.org/x/net
fixingCVE-2025-22870
. (#7619, @dependabot[bot])Other (Cleanup or Flake)
third_party/forked/acme
package with support for the ACME profiles extension. (#7776, @wallrj)AdditionalCertificateOutputFormats
feature to GA, making additional formats always enabled. (#7744, @erikgb)ValidateCAA
. Setting this feature gate is now a no-op which does nothing but print a warning log line (#7553, @SgtCoDFish)v1.24.4
(#7785, @wallrj)v1.17.4
Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
We fixed a bug in the CSR's name constraints construction (only applies if you have enabled the
NameConstraints
feature gate).Changes since
v1.17.3
:Bug or Regression
v1.17.3
Compare Source
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
This patch release addresses several vulnerabilities reported by the Trivy security scanner. It is built with the latest version of Go 1.23.
We have increased the ACME challenge authorization timeout to two minutes, which we hope will fix a timeout error (
error waiting for authorization
), which has been reported by multiple users, in: #7337, #7444, and #7685.Changes since
v1.17.2
:Bug or Regression
waiting for authorization
(#7798, @hjoshi123)Other (Cleanup or Flake)
onsi/ginkgo (github.com/onsi/ginkgo/v2)
v2.24.0
Compare Source
2.24.0
Features
Specs can now be decorated with (e.g.)
SemVerConstraint("2.1.0")
andginkgo --sem-ver-filter="2.1.1"
will only run constrained specs that match the requested version. Learn more in the docs here! Thanks to @Icarus9913 for the PR.Fixes
3f5d379
]. fixes #1582Maintenance
Numerous dependency bumps and documentation fixes
onsi/gomega (github.com/onsi/gomega)
v1.38.0
Compare Source
1.38.0
Features
4ee7ed0
]Fixes
36bbf72
]Maintenance
529d408
]acd1f55
]bae65a0
]8dda91f
]212d812
]59bd7f9
]328c729
]9a798a1
]04a72c6
]prometheus-operator/prometheus-operator (github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring)
v0.84.1
: 0.84.1 / 2025-08-06Compare Source
v0.84.0
: 0.84.0 / 2025-07-14Compare Source
redis/go-redis (github.com/redis/go-redis/v9)
v9.12.1
: 9.12.1Compare Source
🚀 Highlights
In the last version (9.12.0) the client introduced bigger write and read buffer sizes. The default value was 512KiB.
However, users reported that this is too big for most use cases and can lead to high memory usage.
In this version the default value is changed to 256KiB. The
README.md
was updated to reflect thecorrect default value and include a note that the default value can be changed.
🐛 Bug Fixes
🧰 Maintenance
Contributors
We'd like to thank all the contributors who worked on this release!
@ndyakov and @vmihailenco
v9.12.0
: 9.12.0Compare Source
🚀 Highlights
FTSearch
,FTAggregate
and other search commands.EPSILON
option inFT.VSIM
.Changes
errors.Join
requires Go 1.20 or later (#3442)🚀 New Features
EPSILON
option (#3454)🐛 Bug Fixes
🧰 Maintenance
Contributors
We'd like to thank all the contributors who worked on this release!
@andy-stark-redis, @cxljs, @elena-kolevska, @htemelski-redis, @jouir, @monkey92t, @ndyakov, @ofekshenawa, @rokn, @smnvdev, @strobil and @wzy9607
New Contributors
v9.11.0
: 9.11.0Compare Source
🚀 Highlights
Fixes
TxPipeline
to work correctly in cluster scenarios, allowing execution of commandsonly in the same slot for a given transaction.
Changes
🚀 New Features
scan
commands, rather than random (#2623)🐛 Bug Fixes
🧰 Maintenance
Ring
,Client
andClusterClient
(#3401)Contributors
We'd like to thank all the contributors who worked on this release!
@andy-stark-redis, @boekkooi-impossiblecloud, @cxljs, @dcherubini, @iamamirsalehi, @ndyakov, @pete-woods, @twz915
v9.10.0
: 9.10.0Compare Source
Experimental support for vector sets!
🚀 Highlights
go-redis
now supports vector sets. This data type is marked as "in preview" in Redis and its support ingo-redis
is marked as experimental. You can find examples in the documentation and in thedoctests
folder.Changes
🚀 New Features
🧰 Maintenance
Contributors
We'd like to thank all the contributors who worked on this release!
@AndBobsYourUncle, @andy-stark-redis, @fukua95 and @ndyakov
golang/go (go)
v1.25.0
v1.24.6
v1.24.5
v1.24.4
kubernetes-sigs/yaml (sigs.k8s.io/yaml)
v1.6.0
Compare Source
What's Changed
v1.5.0
Compare Source
Full Changelog: kubernetes-sigs/yaml@v1.4.0...v1.5.0
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.