-
Notifications
You must be signed in to change notification settings - Fork 3
🌱 Update Update Golang Dependencies group (minor) #276
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
22d136c
to
f2667be
Compare
2b9345c
to
d5f5eea
Compare
b92af25
to
286e0f8
Compare
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
f8a4bdd
to
0d8b0ce
Compare
99de884
to
b8298f3
Compare
| datasource | package | from | to | | -------------- | ------------------------- | ------- | ------- | | go | github.com/google/cel-go | v0.23.1 | v0.24.1 | | go | github.com/onsi/ginkgo/v2 | v2.22.0 | v2.23.3 | | go | github.com/onsi/gomega | v1.36.1 | v1.37.0 | | golang-version | go | 1.23.4 | 1.24.2 | | go | golang.org/x/mod | v0.22.0 | v0.24.0 | | go | golang.org/x/oauth2 | v0.25.0 | v0.28.0 | | go | sigs.k8s.io/kind | v0.26.0 | v0.27.0 |
Signed-off-by: Jan Schoone <[email protected]>
Signed-off-by: Jan Schoone <[email protected]>
34a6ddf
to
ab890bd
Compare
Signed-off-by: Jan Schoone <[email protected]>
Signed-off-by: Jan Schoone <[email protected]>
…oudStack/cluster-stack-operator into renovate/golang-deps
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
This PR contains the following updates:
v0.23.1
->v0.24.1
v2.22.0
->v2.23.3
v1.36.1
->v1.37.0
1.23.4
->1.24.2
v0.22.0
->v0.24.0
v0.25.0
->v0.28.0
v0.26.0
->v0.27.0
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
google/cel-go (github.com/google/cel-go)
v0.24.1
Compare Source
Fixes
Full Changelog: google/cel-go@v0.24.0...v0.24.1
v0.24.0
Compare Source
Support for subsetting CEL standard library and serialization of CEL environments to YAML.
CEL is an official Google product [#1122]
Features
Fixes
New Contributors
Full Changelog: google/cel-go@v0.23.2...v0.24.0
v0.23.2
Compare Source
Corrects one remaining issue for cost computations from the v0.23.0 releases
Fixes
Full Changelog: google/cel-go@v0.23.1...v0.23.2
onsi/ginkgo (github.com/onsi/ginkgo/v2)
v2.23.3
Compare Source
2.23.3
Fixes
-
as a standalone argument [cfcc1a5
]feaf292
]88e2282
]v2.23.2
Compare Source
2.23.2
🎉🎉🎉
At long last, some long-standing performance gaps between
ginkgo
andgo test
have been resolved!Ginkgo operates by running
go test -c
to generate test binaries, and then running those binaries. It turns out that the compilation step ofgo test -c
is slower thango test
's compilation step becausego test
strips out debug symbols (ldflags=-w
) whereasgo test -c
does not.Ginkgo now passes the appropriate
ldflags
togo test -c
when running specs to strip out symbols. This is only done when it is safe to do so and symbols are preferred when profiling is enabled and whenginkgo build
is called explicitly.This, coupled, with the instructions for disabling XProtect on MacOS yields a much better performance experience with Ginkgo.
v2.23.1
Compare Source
2.23.1
🚨 For users on MacOS 🚨
A long-standing Ginkgo performance issue on MacOS seems to be due to mac's antimalware XProtect. You can follow the instructions here to disable it in your terminal. Doing so sped up Ginkgo's own test suite from 1m8s to 47s.
Fixes
Ginkgo's CLI is now a bit clearer if you pass flags in incorrectly:
a0e52ff
]b799d8d
]This might cause existing CI builds to fail. If so then it's likely that your CI build was misconfigured and should be corrected. Open an issue if you need help.
v2.23.0
Compare Source
2.23.0
Ginkgo 2.23.0 adds a handful of methods to
GinkgoT()
to make it compatible with thetesting.TB
interface in Go 1.24.GinkgoT().Context()
, in particular, is a useful shorthand for generating a new context that will clean itself up in aDeferCleanup()
. This has subtle behavior differences from the golang implementation but should make sense in a Ginkgo... um... context.Features
37a511b
]Fixes
7556a86
]4df06c6
]Maintenance
cbcf39a
]9b261ff
]00f19c8
]e98a4df
]60cc4e2
]fea6f2d
]31d7813
]fc3bbd6
]aee0d56
]809a710
]v2.22.2
Compare Source
What's Changed
Full Changelog: onsi/ginkgo@v2.22.1...v2.22.2
v2.22.1
Compare Source
2.22.1
Fixes
Fix CSV encoding
aab3da6
]c09df39
]96a80fc
]43dad69
]Maintenance
c88c634
]4df44bf
]onsi/gomega (github.com/onsi/gomega)
v1.37.0
Compare Source
1.37.0
Features
5666f98
]v1.36.3
Compare Source
1.36.3
Maintenance
adb8b49
]interface{}
withany
[7613216
]9fe5259
]a0e85b9
]604a8b1
]36fbc84
]ced70d7
]c8b4a07
]06431b9
]b55a92d
]a1d518b
]v1.36.2
Compare Source
Maintenance
kubernetes-sigs/kind (sigs.k8s.io/kind)
v0.27.0
Compare Source
This release moves kind to containerd 2.x and contains fixes for nerdctl. It also moves Kubernetes to 1.32.2 by default.
Breaking Changes
WARNING: kind v0.27.0+ will be required to use
kind load ...
subcommands with these new containerd 2.0+ images (built by kind v0.27+). For other use cases, the new images should still work with recent kind releases, but are not guaranteed. As always we strongly recommend consuming images by theirsha256
digest for security and reliability. https://github.com/kubernetes-sigs/kind/issues/3853Older images from recent releases should continue to work with kind v0.27.0+.
NOTE: As previously warned containerd 2.x requires that you must be using
config_path
mode for containerd registry config. If you're using the local registry script at, or more recent than kubernetes-sigs/kind@791b3dc (kind v0.20.0 / May 22, 2023) then no changes should be necessary.The default node image is now
kindest/node:v1.32.2@​sha256:f226345927d7e348497136874b6d207e0b32cc52154ad8323129352923a3142f
New Features
Images pre-built for this release:
kindest/node:v1.32.2@​sha256:f226345927d7e348497136874b6d207e0b32cc52154ad8323129352923a3142f
kindest/node:v1.31.6@​sha256:28b7cbb993dfe093c76641a0c95807637213c9109b761f1d422c2400e22b8e87
kindest/node:v1.30.10@​sha256:4de75d0e82481ea846c0ed1de86328d821c1e6a6a91ac37bf804e5313670e507
kindest/node:v1.29.14@​sha256:8703bd94ee24e51b778d5556ae310c6c0fa67d761fae6379c8e0bb480e6fea29
NOTE: You must use the
@sha256
digest to guarantee an image built for this release, until such a time as we switch to a different tagging scheme. Even then we will highly encourage digest pinning for security and reproducibility reasons.See also:
NOTE: These node images support amd64 and arm64, both of our supported platforms. You must use the same platform as your host, for more context see https://github.com/kubernetes-sigs/kind/issues/2718
Fixes
kind get clusters
with nerdctlContributors
Thank you to everyone who contributed to this kind over the years!
Committers for this release:
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.