Skip to content

🌱 Update Update Golang Dependencies group (minor) #276

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 7 commits into
base: main
Choose a base branch
from

Conversation

cluster-stack-bot[bot]
Copy link
Contributor

@cluster-stack-bot cluster-stack-bot bot commented Feb 5, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence Type Update
github.com/google/cel-go v0.23.1 -> v0.24.1 age adoption passing confidence require minor
github.com/onsi/ginkgo/v2 v2.22.0 -> v2.23.3 age adoption passing confidence require minor
github.com/onsi/gomega v1.36.1 -> v1.37.0 age adoption passing confidence require minor
go (source) 1.23.4 -> 1.24.2 age adoption passing confidence toolchain minor
golang.org/x/mod v0.22.0 -> v0.24.0 age adoption passing confidence require minor
golang.org/x/oauth2 v0.25.0 -> v0.28.0 age adoption passing confidence require minor
sigs.k8s.io/kind v0.26.0 -> v0.27.0 age adoption passing confidence require minor

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

google/cel-go (github.com/google/cel-go)

v0.24.1

Compare Source

Fixes

  • Separate unnest optimization from composer to capture type info [#​1138]

Full Changelog: google/cel-go@v0.24.0...v0.24.1

v0.24.0

Compare Source

Support for subsetting CEL standard library and serialization of CEL environments to YAML.

CEL is an official Google product [#​1122]

Features

  • Helper methods for subsetting function overloads [#​1120]
  • Introduce cel package aliases for Activation [#​1123]
  • Canonical environment description and stdlib subsetting [#​1125]
  • Support for cel.Env conversion to YAML-serializable config [#​1128]
  • Option to configure CEL via env.Config object [#​1129]
  • Support for feature flags and validators in env.Config [#​1132]
  • Add k8s custom policy tag handler for test [#​1121]

Fixes

  • ContextEval support for Unknowns [#​1126]
  • Fix godoc formatting for Lists and OptionalTypes functions [#​1127]
  • Default enable DefaultUTCTimeZone [#​1130]
  • Support for splitting nested branching operators within policies [#​1136]

New Contributors

Full Changelog: google/cel-go@v0.23.2...v0.24.0

v0.23.2

Compare Source

Corrects one remaining issue for cost computations from the v0.23.0 releases

Fixes

Full Changelog: google/cel-go@v0.23.1...v0.23.2

onsi/ginkgo (github.com/onsi/ginkgo/v2)

v2.23.3

Compare Source

2.23.3

Fixes
  • allow - as a standalone argument [cfcc1a5]
  • Bug Fix: Add GinkoTBWrapper.Chdir() and GinkoTBWrapper.Context() [feaf292]
  • ignore exit code for symbol test on linux [88e2282]

v2.23.2

Compare Source

2.23.2

🎉🎉🎉

At long last, some long-standing performance gaps between ginkgo and go test have been resolved!

Ginkgo operates by running go test -c to generate test binaries, and then running those binaries. It turns out that the compilation step of go test -c is slower than go test's compilation step because go test strips out debug symbols (ldflags=-w) whereas go test -c does not.

Ginkgo now passes the appropriate ldflags to go test -c when running specs to strip out symbols. This is only done when it is safe to do so and symbols are preferred when profiling is enabled and when ginkgo build is called explicitly.

This, coupled, with the instructions for disabling XProtect on MacOS yields a much better performance experience with Ginkgo.

v2.23.1

Compare Source

2.23.1

🚨 For users on MacOS 🚨

A long-standing Ginkgo performance issue on MacOS seems to be due to mac's antimalware XProtect. You can follow the instructions here to disable it in your terminal. Doing so sped up Ginkgo's own test suite from 1m8s to 47s.

Fixes

Ginkgo's CLI is now a bit clearer if you pass flags in incorrectly:

  • make it clearer that you need to pass a filename to the various profile flags, not an absolute directory [a0e52ff]
  • emit an error and exit if the ginkgo invocation includes flags after positional arguments [b799d8d]

This might cause existing CI builds to fail. If so then it's likely that your CI build was misconfigured and should be corrected. Open an issue if you need help.

v2.23.0

Compare Source

2.23.0

Ginkgo 2.23.0 adds a handful of methods to GinkgoT() to make it compatible with the testing.TB interface in Go 1.24. GinkgoT().Context(), in particular, is a useful shorthand for generating a new context that will clean itself up in a DeferCleanup(). This has subtle behavior differences from the golang implementation but should make sense in a Ginkgo... um... context.

Features
  • bump to go 1.24.0 - support new testing.TB methods and add a test to cover testing.TB regressions [37a511b]
Fixes
  • fix edge case where build -o is pointing at an explicit file, not a directory [7556a86]
  • Fix binary paths when precompiling multiple suites. [4df06c6]
Maintenance

v2.22.2

Compare Source

What's Changed

Full Changelog: onsi/ginkgo@v2.22.1...v2.22.2

v2.22.1

Compare Source

2.22.1

Fixes

Fix CSV encoding

Maintenance
  • ensure *.test files are gitignored so we don't accidentally commit compiled tests again [c88c634]
  • remove golang.org/x/net/context in favour of stdlib context [4df44bf]
onsi/gomega (github.com/onsi/gomega)

v1.37.0

Compare Source

1.37.0

Features
  • add To/ToNot/NotTo aliases for AsyncAssertion [5666f98]

v1.36.3

Compare Source

1.36.3

Maintenance

v1.36.2

Compare Source

Maintenance

kubernetes-sigs/kind (sigs.k8s.io/kind)

v0.27.0

Compare Source

This release moves kind to containerd 2.x and contains fixes for nerdctl. It also moves Kubernetes to 1.32.2 by default.

Breaking Changes

WARNING: kind v0.27.0+ will be required to use kind load ... subcommands with these new containerd 2.0+ images (built by kind v0.27+). For other use cases, the new images should still work with recent kind releases, but are not guaranteed. As always we strongly recommend consuming images by their sha256 digest for security and reliability. https://github.com/kubernetes-sigs/kind/issues/3853

Older images from recent releases should continue to work with kind v0.27.0+.

NOTE: As previously warned containerd 2.x requires that you must be using config_path mode for containerd registry config. If you're using the local registry script at, or more recent than kubernetes-sigs/kind@791b3dc (kind v0.20.0 / May 22, 2023) then no changes should be necessary.

The default node image is now kindest/node:v1.32.2@​sha256:f226345927d7e348497136874b6d207e0b32cc52154ad8323129352923a3142f

New Features

  • Updated to containerd 2.x
  • Updated default node image to Kubernetes 1.32.2
  • Updated go to 1.23.6

Images pre-built for this release:

  • v1.32.2: kindest/node:v1.32.2@​sha256:f226345927d7e348497136874b6d207e0b32cc52154ad8323129352923a3142f
  • v1.31.6: kindest/node:v1.31.6@​sha256:28b7cbb993dfe093c76641a0c95807637213c9109b761f1d422c2400e22b8e87
  • v1.30.10: kindest/node:v1.30.10@​sha256:4de75d0e82481ea846c0ed1de86328d821c1e6a6a91ac37bf804e5313670e507
  • v1.29.14: kindest/node:v1.29.14@​sha256:8703bd94ee24e51b778d5556ae310c6c0fa67d761fae6379c8e0bb480e6fea29

NOTE: You must use the @sha256 digest to guarantee an image built for this release, until such a time as we switch to a different tagging scheme. Even then we will highly encourage digest pinning for security and reproducibility reasons.

See also:

NOTE: These node images support amd64 and arm64, both of our supported platforms. You must use the same platform as your host, for more context see https://github.com/kubernetes-sigs/kind/issues/2718

Fixes

  • Compatibility fixes for containerd 2.x
  • Fix kind get clusters with nerdctl
  • Statically link CNI binaries to match upstream
  • Fix no-arguments validation for multiple subcommands
  • Update shellescape dependency to current vanity import
  • When building node images: wait for containerd to be ready, and retry image pulls

Contributors

Thank you to everyone who contributed to this kind over the years!

Committers for this release:


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

@cluster-stack-bot cluster-stack-bot bot force-pushed the renovate/golang-deps branch 2 times, most recently from 22d136c to f2667be Compare February 15, 2025 11:19
@cluster-stack-bot cluster-stack-bot bot force-pushed the renovate/golang-deps branch 3 times, most recently from 2b9345c to d5f5eea Compare February 27, 2025 11:20
@cluster-stack-bot cluster-stack-bot bot force-pushed the renovate/golang-deps branch 2 times, most recently from b92af25 to 286e0f8 Compare March 6, 2025 11:20
@cluster-stack-bot
Copy link
Contributor Author

cluster-stack-bot bot commented Mar 6, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 10 additional dependencies were updated

Details:

Package Change
github.com/google/pprof v0.0.0-20241029153458-d1b30febd7db -> v0.0.0-20241210010833-40e02aabc2ad
golang.org/x/sync v0.8.0 -> v0.12.0
github.com/google/go-cmp v0.6.0 -> v0.7.0
golang.org/x/crypto v0.28.0 -> v0.36.0
golang.org/x/net v0.30.0 -> v0.37.0
golang.org/x/sys v0.26.0 -> v0.31.0
golang.org/x/term v0.25.0 -> v0.30.0
golang.org/x/text v0.19.0 -> v0.23.0
golang.org/x/tools v0.26.0 -> v0.30.0
google.golang.org/protobuf v1.35.1 -> v1.36.5

@cluster-stack-bot cluster-stack-bot bot force-pushed the renovate/golang-deps branch 3 times, most recently from f8a4bdd to 0d8b0ce Compare March 22, 2025 11:20
@cluster-stack-bot cluster-stack-bot bot force-pushed the renovate/golang-deps branch 2 times, most recently from 99de884 to b8298f3 Compare April 3, 2025 11:22
cluster-stack-bot bot and others added 3 commits April 3, 2025 21:54
| datasource     | package                   | from    | to      |
| -------------- | ------------------------- | ------- | ------- |
| go             | github.com/google/cel-go  | v0.23.1 | v0.24.1 |
| go             | github.com/onsi/ginkgo/v2 | v2.22.0 | v2.23.3 |
| go             | github.com/onsi/gomega    | v1.36.1 | v1.37.0 |
| golang-version | go                        | 1.23.4  | 1.24.2  |
| go             | golang.org/x/mod          | v0.22.0 | v0.24.0 |
| go             | golang.org/x/oauth2       | v0.25.0 | v0.28.0 |
| go             | sigs.k8s.io/kind          | v0.26.0 | v0.27.0 |
Signed-off-by: Jan Schoone <[email protected]>
Signed-off-by: Jan Schoone <[email protected]>
@jschoone jschoone force-pushed the renovate/golang-deps branch from 34a6ddf to ab890bd Compare April 3, 2025 19:56
@cluster-stack-bot
Copy link
Contributor Author

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants