-
Notifications
You must be signed in to change notification settings - Fork 83
🌱 Update Update Golang Dependencies group (minor) #1567
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
syself-bot
wants to merge
1
commit into
main
Choose a base branch
from
renovate/golang-deps
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
24fa13a
to
ddb3840
Compare
cabf92d
to
282c214
Compare
41e1bc3
to
dd2d0ed
Compare
6a98167
to
71d8a0c
Compare
01d9313
to
b052831
Compare
b052831
to
fbbe196
Compare
eb7bc55
to
e36b464
Compare
d8737ab
to
344148c
Compare
a411dfb
to
aa3a083
Compare
e77c6a4
to
f291995
Compare
cbebab9
to
ce7314c
Compare
5239877
to
3fd8622
Compare
028d94a
to
e76766c
Compare
| datasource | package | from | to | | ---------- | ------------------------------------ | ---------------------------------- | ---------------------------------- | | go | github.com/hetznercloud/hcloud-go/v2 | v2.19.1 | v2.22.0 | | go | github.com/onsi/ginkgo/v2 | v2.23.0 | v2.25.2 | | go | github.com/onsi/gomega | v1.36.2 | v1.38.2 | | go | github.com/prometheus/common | v0.63.0 | v0.65.0 | | go | github.com/stretchr/testify | v1.10.0 | v1.11.1 | | go | golang.org/x/crypto | v0.36.0 | v0.41.0 | | go | golang.org/x/exp | v0.0.0-20250305212735-054e65f0b394 | v0.0.0-20250819193227-8b4c13bb791b | | go | golang.org/x/mod | v0.24.0 | v0.27.0 | | go | k8s.io/utils | v0.0.0-20241210054802-24370beab758 | v0.0.0-20250820121507-0af2bda4dd1d | | go | sigs.k8s.io/kind | v0.27.0 | v0.30.0 |
e76766c
to
34a6d4e
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v2.19.1
->v2.22.0
v2.23.0
->v2.25.2
v1.36.2
->v1.38.2
v0.63.0
->v0.65.0
v1.10.0
->v1.11.1
v0.36.0
->v0.41.0
054e65f
->8b4c13b
v0.24.0
->v0.27.0
24370be
->0af2bda
v0.27.0
->v0.30.0
Release Notes
hetznercloud/hcloud-go (github.com/hetznercloud/hcloud-go/v2)
v2.22.0
Compare Source
Features
applied_to_resources
property (#667)v2.21.1
Compare Source
Bug Fixes
v2.21.0
Compare Source
Features
Bug Fixes
v2.20.1
Compare Source
Bug Fixes
v2.20.0
Compare Source
In this release, the
api_endpoint
metric labels changed for all our API requests. Please make sure to update your setup if you were relying on them. The new labels are now easier to understand, see the example below:/volumes/64314930
now has the label/volumes/-
instead of/volumes/
/volumes/64314930/actions/resize
now has the label/volumes/-/actions/resize
instead of/volumes/actions/resize
Features
api_endpoint
metric labels (#626)Bug Fixes
onsi/ginkgo (github.com/onsi/ginkgo/v2)
v2.25.2
Compare Source
2.25.2
Fixes
Add github output group for progress report content
Maintenance
Bump Gomega
v2.25.1
Compare Source
2.25.1
Fixes
10866d3
]2e42cff
]v2.25.0
Compare Source
2.25.0
AroundNode
This release introduces a new decorator to support more complex spec setup usecases.
AroundNode
registers a function that runs before each individual node. This is considered a more advanced decorator.Please read the docs for more information and some examples.
Allowed signatures:
AroundNode(func())
-func
will be called before the node is run.AroundNode(func(ctx context.Context) context.Context)
-func
can wrap the passed in context and return a new one which will be passed on to the node.AroundNode(func(ctx context.Context, body func(ctx context.Context)))
-ctx
is the context for the node andbody
is a function that must be called to run the node. This gives you complete control over what runs before and after the node.Multiple
AroundNode
decorators can be applied to a single node and they will run in the order they are applied.Unlike setup nodes like
BeforeEach
andDeferCleanup
,AroundNode
is guaranteed to run in the same goroutine as the decorated node. This is necessary when working with lower-level libraries that must run on a single thread (you can callruntime.LockOSThread()
in theAroundNode
to ensure that the node runs on a single thread).Since
AroundNode
allows you to modify the context you can also useAroundNode
to implement shared setup that attaches values to the context.If applied to a container,
AroundNode
will run before every node in the container. Including setup nodes likeBeforeEach
andDeferCleanup
.AroundNode
can also be applied toRunSpecs
to run before every node in the suite. This opens up new mechanisms for instrumenting individual nodes across an entire suite.v2.24.0
Compare Source
2.24.0
Features
Specs can now be decorated with (e.g.)
SemVerConstraint("2.1.0")
andginkgo --sem-ver-filter="2.1.1"
will only run constrained specs that match the requested version. Learn more in the docs here! Thanks to @Icarus9913 for the PR.Fixes
3f5d379
]. fixes #1582Maintenance
Numerous dependency bumps and documentation fixes
v2.23.4
Compare Source
2.23.4
Prior to this release Ginkgo would compute the incorrect number of available CPUs when running with
-p
in a linux container. Thanks to @emirot for the fix!Features
2b9c428
]Fixes
1f59d07
]Maintenance
2d134d5
]v2.23.3
Compare Source
2.23.3
Fixes
-
as a standalone argument [cfcc1a5
]feaf292
]88e2282
]v2.23.2
Compare Source
2.23.2
🎉🎉🎉
At long last, some long-standing performance gaps between
ginkgo
andgo test
have been resolved!Ginkgo operates by running
go test -c
to generate test binaries, and then running those binaries. It turns out that the compilation step ofgo test -c
is slower thango test
's compilation step becausego test
strips out debug symbols (ldflags=-w
) whereasgo test -c
does not.Ginkgo now passes the appropriate
ldflags
togo test -c
when running specs to strip out symbols. This is only done when it is safe to do so and symbols are preferred when profiling is enabled and whenginkgo build
is called explicitly.This, coupled, with the instructions for disabling XProtect on MacOS yields a much better performance experience with Ginkgo.
v2.23.1
Compare Source
2.23.1
🚨 For users on MacOS 🚨
A long-standing Ginkgo performance issue on MacOS seems to be due to mac's antimalware XProtect. You can follow the instructions here to disable it in your terminal. Doing so sped up Ginkgo's own test suite from 1m8s to 47s.
Fixes
Ginkgo's CLI is now a bit clearer if you pass flags in incorrectly:
a0e52ff
]b799d8d
]This might cause existing CI builds to fail. If so then it's likely that your CI build was misconfigured and should be corrected. Open an issue if you need help.
onsi/gomega (github.com/onsi/gomega)
v1.38.2
Compare Source
1.38.2
c404969
]v1.38.1
Compare Source
1.38.1
Fixes
Numerous minor fixes and dependency bumps
v1.38.0
Compare Source
1.38.0
Features
4ee7ed0
]Fixes
36bbf72
]Maintenance
529d408
]acd1f55
]bae65a0
]8dda91f
]212d812
]59bd7f9
]328c729
]9a798a1
]04a72c6
]v1.37.0
Compare Source
1.37.0
Features
5666f98
]v1.36.3
Compare Source
1.36.3
Maintenance
adb8b49
]interface{}
withany
[7613216
]9fe5259
]a0e85b9
]604a8b1
]36fbc84
]ced70d7
]c8b4a07
]06431b9
]b55a92d
]a1d518b
]prometheus/common (github.com/prometheus/common)
v0.65.0
Compare Source
What's Changed
New Contributors
Full Changelog: prometheus/common@v0.64.0...v0.65.0
v0.64.0
Compare Source
What's Changed
NewNopLogger()
wrapper aroundNew()
by @tjhop in https://github.com/prometheus/common/pull/783New Contributors
Full Changelog: prometheus/common@v0.63.0...v0.64.0
stretchr/testify (github.com/stretchr/testify)
v1.11.1
Compare Source
This release fixes #1785 introduced in v1.11.0 where expected argument values implementing the stringer interface (
String() string
) with a method which mutates their value, when passed to mock.Mock.On (m.On("Method", <expected>).Return()
) or actual argument values passed to mock.Mock.Called may no longer match one another where they previously did match. The behaviour prior to v1.11.0 where the stringer is always called is restored. Future testify releases may not call the stringer method at all in this case.What's Changed
Full Changelog: stretchr/testify@v1.11.0...v1.11.1
v1.11.0
Compare Source
What's Changed
Functional Changes
v1.11.0 Includes a number of performance improvements.
Fixes
Documentation, Build & CI
New Contributors
Full Changelog: stretchr/testify@v1.10.0...v1.11.0
kubernetes-sigs/kind (sigs.k8s.io/kind)
v0.30.0
Compare Source
This is small release containing patched dependencies and Kubernetes 1.34, as well as a bugfix for Kubernetes v1.33.0+ cluster reboots.
Breaking Changes
The default node image is now
kindest/node:v1.34.0@​sha256:7416a61b42b1662ca6ca89f02028ac133a309a2a30ba309614e8ec94d976dc5a
New Features
Images pre-built for this release:
kindest/node:v1.34.0@​sha256:7416a61b42b1662ca6ca89f02028ac133a309a2a30ba309614e8ec94d976dc5a
kindest/node:v1.33.4@​sha256:25a6018e48dfcaee478f4a59af81157a437f15e6e140bf103f85a2e7cd0cbbf2
kindest/node:v1.32.8@​sha256:abd489f042d2b644e2d033f5c2d900bc707798d075e8186cb65e3f1367a9d5a1
kindest/node:v1.31.12@​sha256:0f5cc49c5e73c0c2bb6e2df56e7df189240d83cf94edfa30946482eb08ec57d2
NOTE: You must use the
@sha256
digest to guarantee an image built for this release, until such a time as we switch to a different tagging scheme. Even then we will highly encourage digest pinning for security and reproducibility reasons.See also:
NOTE: These node images support amd64 and arm64, both of our supported platforms. You must use the same platform as your host, for more context see https://github.com/kubernetes-sigs/kind/issues/2718
Fixes
Contributors
Committers for this release:
v0.29.0
Compare Source
This is a quick security release to pickup the containerd 2.1.1 CVE-2025-47290 fix.
See v0.28.0 (release days ago!) for full release notes with recent changes:
https://github.com/kubernetes-sigs/kind/releases/tag/v0.28.0
Breaking Changes
The default node image is now
kindest/node:v1.33.1@​sha256:050072256b9a903bd914c0b2866828150cb229cea0efe5892e2b644d5dd3b34f
New Features
Images pre-built for this release:
kindest/node:v1.33.1@​sha256:050072256b9a903bd914c0b2866828150cb229cea0efe5892e2b644d5dd3b34f
kindest/node:v1.32.5@​sha256:e3b2327e3a5ab8c76f5ece68936e4cafaa82edf58486b769727ab0b3b97a5b0d
kindest/node:v1.31.9@​sha256:b94a3a6c06198d17f59cca8c6f486236fa05e2fb359cbd75dabbfc348a10b211
kindest/node:v1.30.13@​sha256:397209b3d947d154f6641f2d0ce8d473732bd91c87d9575ade99049aa33cd648
NOTE: You must use the
@sha256
digest to guarantee an image built for this release, until such a time as we switch to a different tagging scheme. Even then we will highly encourage digest pinning for security and reproducibility reasons.See also:
NOTE: These node images support amd64 and arm64, both of our supported platforms. You must use the same platform as your host, for more context see https://github.com/kubernetes-sigs/kind/issues/2718
Fixes
Contributors
Committers for this release:
(Please see v0.28.0 https://github.com/kubernetes-sigs/kind/releases/tag/v0.28.0#Contributors)
v0.28.0
Compare Source
This release moves to Kubernetes to 1.33.1 by default.
Breaking Changes
The default node image is now
kindest/node:v1.33.1@​sha256:8d866994839cd096b3590681c55a6fa4a071fdaf33be7b9660e5697d2ed13002
New Features
Images pre-built for this release:
kindest/node:v1.33.1@​sha256:8d866994839cd096b3590681c55a6fa4a071fdaf33be7b9660e5697d2ed13002
kindest/node:v1.32.5@​sha256:36187f6c542fa9b78d2d499de4c857249c5a0ac8cc2241bef2ccd92729a7a259
kindest/node:v1.31.9@​sha256:156da58ab617d0cb4f56bbdb4b493f4dc89725505347a4babde9e9544888bb92
kindest/node:v1.30.13@​sha256:8673291894dc400e0fb4f57243f5fdc6e355ceaa765505e0e73941aa1b6e0b80
NOTE: You must use the
@sha256
digest to guarantee an image built for this release, until such a time as we switch to a different tagging scheme. Even then we will highly encourage digest pinning for security and reproducibility reasons.See also:
NOTE: These node images support amd64 and arm64, both of our supported platforms. You must use the same platform as your host, for more context see https://github.com/kubernetes-sigs/kind/issues/2718
Fixes
net.ipv4.conf.all.arp_ignore
to 0 to address some container networking failuresContributors
Thank you to everyone who contributed to this kind over the years!
Committers for this release:
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.