Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

deps: Update Other dependency updates #634

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate-bot
Copy link
Contributor

@renovate-bot renovate-bot commented Nov 22, 2024

This PR contains the following updates:

Package Type Update Change Age Adoption Passing Confidence
actions/setup-go action minor v5.0.2 -> v5.1.0 age adoption passing confidence
actions/upload-artifact action minor v3.1.3 -> v3.2.1 age adoption passing confidence
cert-manager/cert-manager minor v1.15.0 -> v1.16.2 age adoption passing confidence
github.com/elastic/crd-ref-docs minor v0.0.12 -> v0.1.0 age adoption passing confidence
github.com/go-logr/logr require patch v1.4.1 -> v1.4.2 age adoption passing confidence
github.com/golangci/golangci-lint/cmd/golangci-lint minor v1.59.1 -> v1.62.2 age adoption passing confidence
github/codeql-action action minor v2.25.15 -> v2.27.5 age adoption passing confidence
google-github-actions/get-secretmanager-secrets action minor v2.1.3 -> v2.2.2 age adoption passing confidence
hashicorp/terraform minor v1.8.5 -> v1.10.0 age adoption passing confidence
k8s.io/api require minor v0.29.3 -> v0.31.3 age adoption passing confidence
k8s.io/apimachinery require minor v0.29.3 -> v0.31.3 age adoption passing confidence
k8s.io/client-go require minor v0.29.3 -> v0.31.3 age adoption passing confidence
kubernetes/kubernetes minor v1.29.3 -> v1.31.3 age adoption passing confidence
sigs.k8s.io/controller-runtime require minor v0.17.2 -> v0.19.2 age adoption passing confidence
sigs.k8s.io/controller-tools minor v0.14.0 -> v0.16.5 age adoption passing confidence

Release Notes

actions/setup-go (actions/setup-go)

v5.1.0

Compare Source

What's Changed

Bug Fixes

New Contributors

Full Changelog: actions/setup-go@v5...v5.1.0

actions/upload-artifact (actions/upload-artifact)

v3.2.1

Compare Source

What's Changed

This fixes the include-hidden-files input introduced in https://github.com/actions/upload-artifact/releases/tag/v3.2.0

Full Changelog: actions/upload-artifact@v3.2.0...v3.2.1

v3.2.0

Compare Source

Notice: Breaking Changes ⚠️

We will no longer include hidden files and folders by default in the upload-artifact action of this version. This reduces the risk that credentials are accidentally uploaded into artifacts. Customers who need to continue to upload these files can use a new option, include-hidden-files, to continue to do so.

See "Notice of upcoming deprecations and breaking changes in GitHub Actions runners" changelog and this issue for more details.

What's Changed

Full Changelog: actions/upload-artifact@v3.1.3...v3.2.0

cert-manager/cert-manager (cert-manager/cert-manager)

v1.16.2

Compare Source

v1.16.1

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

The cert-manager 1.16 release includes: new Helm chart features, more Prometheus metrics, memory optimizations, and various improvements and bug fixes for the ACME issuer and Venafi Issuer.

📖 Read the complete 1.16 release notes before upgrading.

📜Changes since v1.16.0

Bug or Regression
  • BUGFIX: Helm schema validation: the new schema validation was too strict for the "global" section. Since the global section is shared across all charts and sub-charts, we must also allow unknown fields. (#​7348, @inteon)
  • BUGFIX: Helm will now accept percentages for the podDisruptionBudget.minAvailable and podDisruptionBudget.maxAvailable values. (#​7345, @inteon)
  • Helm: allow enabled to be set as a value to toggle cert-manager as a dependency. (#​7356, @inteon)
  • BUGFIX: A change in v1.16.0 caused cert-manager's ACME ClusterIssuer to look in the wrong namespace for resources required for the issuance (e.g. credential Secrets). This is now fixed in v1.16.1. (#​7342, @inteon)

v1.16.0

Compare Source

v1.15.4

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

This patch release of cert-manager 1.15 makes several changes to how PEM input is validated, adding maximum sizes appropriate to the type of PEM data which is being parsed.

This is to prevent an unacceptable slow-down in parsing specially crafted PEM data. The issue was found by Google's OSS-Fuzz project.

The issue is low severity; to exploit the PEM issue would require privileged access which would likely allow Denial-of-Service through other methods.

Note also that since most PEM data parsed by cert-manager comes from ConfigMap or Secret resources which have a max size limit of approximately 1MB, it's difficult to force cert-manager to parse large amounts of PEM data.

Further information is available in GHSA-r4pg-vg54-wxx4

In addition, the version of Go used to build cert-manager 1.15 was updated along with the base images, and a Route53 bug fix was backported.

Changes by Kind

Bug or Regression
  • Bugfix: Prevent aggressive Route53 retries caused by STS authentication failures by removing the Amazon Request ID from STS errors. (#​7261, @​cert-manager-bot)
  • Set a maximum size for PEM inputs which cert-manager will accept to remove possibility of taking a long time to process an input (#​7402, @​SgtCoDFish)
Other (Cleanup or Flake)

v1.15.3

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

🔗 See v1.15.0 for more information about cert-manager 1.15 and read-before-upgrade info.

📜 Changes since v1.15.2
Bug or Regression
  • BUGFIX: the dynamic certificate source used by the webhook TLS server failed to detect a root CA approaching expiration, due to a calculation error. This will cause the webhook TLS server to fail renewing its CA certificate. Please upgrade before the expiration of this CA certificate is reached. (#​7232, @​cert-manager-bot)

v1.15.2

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

🔗 See v1.15.0 for more information about cert-manager 1.15 and read-before-upgrade info.

📜 Changes since v1.15.1
Bug or Regression

v1.15.1

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

🔗 See v1.15.0 for more information about cert-manager 1.15 and read-before-upgrade info.

📜 Changes since v1.15.0

Bug or Regression
  • BUGFIX: fix issue that caused Vault issuer to not retry signing when an error was encountered. (#​7111, @​inteon)
Other (Cleanup or Flake)
elastic/crd-ref-docs (github.com/elastic/crd-ref-docs)

v0.1.0

Changelog

go-logr/logr (github.com/go-logr/logr)

v1.4.2

Compare Source

What's Changed

Dependencies:

Full Changelog: go-logr/logr@v1.4.1...v1.4.2

golangci/golangci-lint (github.com/golangci/golangci-lint/cmd/golangci-lint)

v1.62.2

Compare Source

v1.62.1

Compare Source

v1.62.0

Compare Source

  1. New linters
  2. Updated linters
    • ⚠️ execinquery: deprecation step 2
    • ⚠️ gomnd: deprecation step 2 (replaced by mnd)
    • bidichk: from 0.2.7 to 0.3.2 (important performance improvement)
    • canonicalheader: from 1.1.1 to 1.1.2
    • cyclop: from 1.2.1 to 1.2.3
    • dupword: from 0.1.1 to 0.1.3
    • errcheck: from 1.7.0 to 1.8.0
    • errchkjson: from 0.3.6 to 0.4.0
    • errname: from 0.1.13 to 1.0.0
    • ginkgolinter: from 0.17.0 to 0.18.0 (new option: force-succeed)
    • go-check-sumtype: from 0.1.4 to 0.2.0 (new option: default-signifies-exhaustive)
    • go-critic: from 0.11.4 to 0.11.5
    • go-printf-func-name: from 7558a9e to v0.1.0
    • godot: from 1.4.17 to 1.4.18
    • gosec: from 2.21.2 to 2.21.4
    • intrange: from 0.2.0 to 0.2.1
    • loggercheck: from 0.9.4 to 0.10.1 (log/slog support)
    • musttag: from 0.12.2 to 0.13.0
    • nakedret: from 2.0.4 to 2.0.5
    • nilnil: from 0.1.9 to 1.0.0 (new option: detect-opposite)
    • noctx: from 0.0.2 to 0.1.0
    • protogetter: from 0.3.6 to 0.3.8
    • revive: from 1.3.9 to 1.5.0 (new rules: filename-format, and file-length-limit)
    • tenv: from 1.10.0 to 1.12.1 (handle dot import)
    • testifylint: from 1.4.3 to 1.5.0 (new checkers: contains, encoded-compare, regexp)
  3. Misc.
    • Type sizing when cross-compiling (32-bit).
    • code-climate: add check_name field
    • Improve Go version detection
    • Fix Go version propagation
  4. Documentation
    • Adds a section about exclude-dirs-use-default
    • Improve 'install from sources' section
    • Improve FAQ about Go versions
    • Improve linter/rule/check docs
    • Improve new linter section
    • Improve forbidigo pattern examples for built-in functions

v1.61.0

Compare Source

  1. Enhancements
    • Add junit-xml-extended format
    • Exclude Swagger Codegen files by default
  2. Updated linters
    • dupword: from 0.0.14 to 0.1.1
    • fatcontext: from 0.4.0 to 0.5.2
    • gci: from 0.13.4 to 0.13.5 (new option no-lex-order)
    • go-ruleguard: from 0.4.2 to 0fe6f58 (fix panic with custom linters)
    • godot: from 1.4.16 to 1.4.17
    • gomodguard: from 1.3.3 to 1.3.5
    • gosec: disable temporarily G407
    • gosec: from ab3f6c1 to 2.21.2 (partially fix G115)
    • intrange: from 0.1.2 to 0.2.0
    • nolintlint: remove the empty line in the directive replacement
  3. Misc.
    • Improve runtime version parsing
  4. Documentation
    • Add additional info about typecheck

v1.60.3

Compare Source

v1.60.2

Compare Source

v1.60.1

Compare Source

v1.60.0

Compare Source

github/codeql-action (github/codeql-action)

v2.27.5

Compare Source

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

2.27.5 - 19 Nov 2024

No user facing changes.

See the full CHANGELOG.md for more information.

v2.27.4

Compare Source

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

2.27.4 - 14 Nov 2024

No user facing changes.

See the full CHANGELOG.md for more information.

v2.27.3

Compare Source

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

2.27.3 - 12 Nov 2024

No user facing changes.

See the full CHANGELOG.md for more information.

v2.27.2

Compare Source

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

2.27.2 - 12 Nov 2024

  • Fixed an issue where setting up the CodeQL tools would sometimes fail with the message "Invalid value 'undefined' for header 'authorization'". #​2590

See the full CHANGELOG.md for more information.

v2.27.1

Compare Source

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

2.27.1 - 08 Nov 2024
  • The CodeQL Action now downloads bundles compressed using Zstandard on GitHub Enterprise Server when using Linux or macOS runners. This speeds up the installation of the CodeQL tools. This feature is already available to GitHub.com users. #​2573
  • Update default CodeQL bundle version to 2.19.3. #​2576

See the full CHANGELOG.md for more information.

v2.27.0

Compare Source

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

Note that the only difference between v2 and v3 of the CodeQL Action is the node version they support, with v3 running on node 20 while we continue to release v2 to support running on node 16. For example 3.22.11 was the first v3 release and is functionally identical to 2.22.11. This approach ensures an easy way to track exactly which features are included in different versions, indicated by the minor and patch version numbers.

2.27.0 - 22 Oct 2024

  • Bump the minimum CodeQL bundle version to 2.14.6. #​2549
  • Fix an issue where the upload-sarif Action would fail with "upload-sarif post-action step failed: Input required and not supplied: token" when called in a composite Action that had a different set of inputs to the ones expected by the upload-sarif Action. #​2557
  • Update default CodeQL bundle version to 2.19.2. #​2552

See the full CHANGELOG.md for more information.

v2.26.13

Compare Source

v2.26.12

Compare Source

v2.26.11

Compare Source

v2.26.10

Compare Source

v2.26.9

Compare Source

v2.26.8

Compare Source

v2.26.7

Compare Source

v2.26.6

Compare Source

v2.26.5

Compare Source

v2.26.4

Compare Source

v2.26.3

Compare Source

v2.26.2

Compare Source

v2.26.1

Compare Source

v2.26.0

Compare Source

google-github-actions/get-secretmanager-secrets (google-github-actions/get-secretmanager-secrets)

v2.2.2

Compare Source

What's Changed

Full Changelog: google-github-actions/get-secretmanager-secrets@v2.2.1...v2.2.2

v2.2.1

Compare Source

What's Changed

Full Changelog: google-github-actions/get-secretmanager-secrets@v2.2.0...v2.2.1

v2.2.0

Compare Source

What's Changed

Full Changelog: google-github-actions/get-secretmanager-secrets@v2.1.4...v2.2.0

v2.1.4

Compare Source

What's Changed

Full Changelog: google-github-actions/get-secretmanager-secrets@v2.1.3...v2.1.4

hashicorp/terraform (hashicorp/terraform)

v1.10.0

Compare Source

v1.9.8

Compare Source

1.9.8 (October 16, 2024)

BUG FIXES:

  • init: Highlight missing subdirectories of registry modules in error message (#​35848)
  • init: Prevent crash when loading provider_meta blocks with invalid names (#​35842)
  • config generation: Escape all invalid syntax in generate map keys with quotes (#​35837)
  • plan: also validate provider requirements from state (#​35864)

v1.9.7

Compare Source

1.9.7 (October 2, 2024)

BUG FIXES:

  • config generation: escape map keys with whitespaces (#​35754)

v1.9.6

Compare Source

1.9.6 (September 18, 2024)

BUG FIXES:

  • plan renderer: Render complete changes within unknown nested blocks. (#​35644)
  • plan renderer: Fix crash when attempting to render unknown nested blocks that contain attributes forcing resource replacement. (#​35644)
  • plan renderer: Fix crash when rendering a plan that contains null attributes being update to unknown values. (#​35709)

v1.9.5

Compare Source

1.9.5 (August 20, 2024)

ENHANCEMENTS:

  • cloud: The cloud block can now interact with workspaces that have HCP resource IDs. (#​35495)

BUG FIXES:

  • core: removed blocks with provisioners were not executed when the resource was in a nested module. (#​35611)

v1.9.4

Compare Source

1.9.4 (August 7, 2024)

BUG FIXES:

  • core: Unneeded variable validations were being executed during a destroy plan, which could cause plans starting with incomplete state to fail. (#​35511)
  • init: Don't crash when discovering invalid syntax in duplicate required_providers blocks. (#​35533)

v1.9.3

Compare Source

1.9.3 (July 24, 2024)

ENHANCEMENTS:

  • Terraform now returns a more specific error message in the awkward situation where an input variable validation rule is known to have failed (condition returned false) but the error message is derived from an unknown

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate-bot renovate-bot requested a review from a team as a code owner November 22, 2024 17:00
Copy link

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 20 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22 -> 1.23.3
github.com/cespare/xxhash/v2 v2.2.0 -> v2.3.0
github.com/davecgh/go-spew v1.1.1 -> v1.1.2-0.20180830191138-d8f796af33cc
github.com/evanphx/json-patch/v5 v5.8.0 -> v5.9.0
github.com/go-openapi/swag v0.22.3 -> v0.22.4
github.com/google/uuid v1.3.0 -> v1.6.0
github.com/prometheus/client_golang v1.18.0 -> v1.19.1
github.com/prometheus/client_model v0.5.0 -> v0.6.1
github.com/prometheus/common v0.45.0 -> v0.55.0
github.com/prometheus/procfs v0.12.0 -> v0.15.1
golang.org/x/exp v0.0.0-20220722155223-a9213eeb770e -> v0.0.0-20230515195305-f3d0a9c9a5cc
golang.org/x/net v0.23.0 -> v0.26.0
golang.org/x/oauth2 v0.12.0 -> v0.21.0
golang.org/x/sys v0.18.0 -> v0.21.0
golang.org/x/term v0.18.0 -> v0.21.0
golang.org/x/text v0.14.0 -> v0.16.0
google.golang.org/protobuf v1.33.0 -> v1.34.2
k8s.io/apiextensions-apiserver v0.29.0 -> v0.31.0
k8s.io/klog/v2 v2.110.1 -> v2.130.1
k8s.io/kube-openapi v0.0.0-20231010175941-2dd684a91f00 -> v0.0.0-20240228011516-70dd3763d340
k8s.io/utils v0.0.0-20230726121419-3b25d923346b -> v0.0.0-20240711033017-18e509b52bc8

@renovate-bot renovate-bot force-pushed the renovate/other-dependency-updates branch from 7991ef7 to 968171f Compare November 27, 2024 11:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants