Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the gomodupdates group across 1 directory with 11 updates #1213

Closed

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 11, 2024

Bumps the gomodupdates group with 6 updates in the / directory:

Package From To
github.com/cert-manager/cert-manager 1.14.5 1.16.2
github.com/golang-jwt/jwt/v4 4.5.0 4.5.1
github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring 0.74.0 0.78.2
github.com/stretchr/testify 1.9.0 1.10.0
go.mondoo.com/cnquery/v11 11.15.0 11.34.0
go.mondoo.com/cnspec/v11 11.15.0 11.34.0

Updates github.com/cert-manager/cert-manager from 1.14.5 to 1.16.2

Release notes

Sourced from github.com/cert-manager/cert-manager's releases.

v1.16.2

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

This patch release of cert-manager 1.16 makes several changes to how PEM input is validated, adding maximum sizes appropriate to the type of PEM data which is being parsed.

This is to prevent an unacceptable slow-down in parsing specially crafted PEM data. The issue was found by Google's OSS-Fuzz project.

The issue is low severity; to exploit the PEM issue would require privileged access which would likely allow Denial-of-Service through other methods.

Note also that since most PEM data parsed by cert-manager comes from ConfigMap or Secret resources which have a max size limit of approximately 1MB, it's difficult to force cert-manager to parse large amounts of PEM data.

Further information is available in GHSA-r4pg-vg54-wxx4

In addition, the version of Go used to build cert-manager 1.16 was updated along with the base images.

Changes by Kind

Bug or Regression

  • Set a maximum size for PEM inputs which cert-manager will accept to remove possibility of taking a long time to process an input (#7401, @​SgtCoDFish)

Other (Cleanup or Flake)

v1.16.1

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

The cert-manager 1.16 release includes: new Helm chart features, more Prometheus metrics, memory optimizations, and various improvements and bug fixes for the ACME issuer and Venafi Issuer.

📖 Read the complete 1.16 release notes before upgrading.

📜Changes since v1.16.0

Bug or Regression

  • BUGFIX: Helm schema validation: the new schema validation was too strict for the "global" section. Since the global section is shared across all charts and sub-charts, we must also allow unknown fields. (#7348, @inteon)
  • BUGFIX: Helm will now accept percentages for the podDisruptionBudget.minAvailable and podDisruptionBudget.maxAvailable values. (#7345, @inteon)
  • Helm: allow enabled to be set as a value to toggle cert-manager as a dependency. (#7356, @inteon)
  • BUGFIX: A change in v1.16.0 caused cert-manager's ACME ClusterIssuer to look in the wrong namespace for resources required for the issuance (e.g. credential Secrets). This is now fixed in v1.16.1. (#7342, @inteon)

v1.16.0

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

The cert-manager 1.16 release includes: new Helm chart features, more Prometheus metrics, memory optimizations, and various improvements and bug fixes for the ACME issuer and Venafi Issuer.

📖 Read the complete 1.16 release notes at cert-manager.io.

⚠️ Known issues

  1. Helm Chart: JSON schema prevents the chart being used as a sub-chart on Rancher RKE.

... (truncated)

Commits
  • 33df0f2 Merge pull request #7431 from SgtCoDFish/release-1.16-bumps
  • 03f9832 [release-1.16] bump go + base images
  • 5001e8b Merge pull request #7401 from SgtCoDFish/release-1.16-pem-inputs
  • 3ba1f2c [release-1.16] bump base images
  • d99dddb security: remove calls to pem.Decode in non-test code
  • 481b67b security: Add functions to limit max PEM sizes allowable
  • 24f59c3 Merge pull request #7370 from SgtCoDFish/release-1.16-ipv6-dns
  • a9785d4 [release-1.16] add IPv6 example for recursive DNS arg
  • ff50c06 Merge pull request #7356 from cert-manager-bot/cherry-pick-7350-to-release-1.16
  • 2298278 Helm: add enabled to json schema
  • Additional commits viewable in compare view

Updates github.com/golang-jwt/jwt/v4 from 4.5.0 to 4.5.1

Release notes

Sourced from github.com/golang-jwt/jwt/v4's releases.

v4.5.1

Security

Unclear documentation of the error behavior in ParseWithClaims in <= 4.5.0 could lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by ParseWithClaims return both error codes. If users only check for the jwt.ErrTokenExpired using error.Is, they will ignore the embedded jwt.ErrTokenSignatureInvalid and thus potentially accept invalid tokens.

This issue was documented in GHSA-29wx-vh33-7x7r and fixed in this release.

Note: v5 was not affected by this issue. So upgrading to this release version is also recommended.

What's Changed

  • Back-ported error-handling logic in ParseWithClaims from v5 branch. This fixes GHSA-29wx-vh33-7x7r.

Full Changelog: golang-jwt/jwt@v4.5.0...v4.5.1

Commits

Updates github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring from 0.74.0 to 0.78.2

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's releases.

0.78.2 / 2024-11-21

  • [BUGFIX] Revert the removal of the proxyURL field in AlertmanagerConfig CRD. The field takes precedence over proxyUrl. #7114

0.78.1 / 2024-10-30

  • [BUGFIX] Fix container images for architectures other than amd64. #7065 #7066 #7067

0.78.0 / 2024-10-30

  • [CHANGE] Allow overlapping compactions by default in Prometheus when the Thanos sidecar is configured with uploads. #6906
  • [CHANGE] Drop support (officially) for Alertmanager less than v0.15. #7057
  • [FEATURE] Add dnsConfig and dnsPolicy fields to Alertmanager, Prometheus, PrometheusAgent and ThanosRuler CRDs. #3889
  • [FEATURE] Add ruleQueryOffset field to Prometheus CRD and query_offset field to PrometheusRule CRD. #6957
  • [FEATURE] Add support for Remote Write v2.0 to Prometheus and PrometheusAgent CRDs. #7033
  • [ENHANCEMENT] Add goGC field to Prometheus and PrometheusAgent CRDs. #6667
  • [BUGFIX] Fix label name validation in ScrapeConfig CRD. #6892
  • [BUGFIX] Fix version checking for the promoteResourceAttributes field. #7017

0.77.2 / 2024-10-21

  • [BUGFIX] Correct HTTP port name for the Kubelet endpoint. #7027

0.77.1 / 2024-09-25

  • [BUGFIX] Fix Thanos Ruler reconciliations not triggered on StatefulSet updates. #6964
  • [BUGFIX] Fix error message for unsupported versions. #6965

0.77.0 / 2024-09-19

[!NOTE] Along with this release we also introduce a new command line tool poctl. It is designed specifically for managing Prometheus Operator Custom Resources. This project is currently under active development and fully experimental, so expect breaking changes and rough edges. We encourage you to try it out and provide the feedback.

[!WARNING] Another notable change is that we have switched the logging framework from go-kit/log to slog which may lead to some differences in the log output.

  • [CHANGE] Add more API validation and changes to the ScrapeConfig CRD. #6921 #6855 #6744
  • [CHANGE] Update the validating webhook to reject PrometheusRule objects that would generate configuration greater than the max ConfigMap size (512KiB). #6606
  • [FEATURE] Add experimental Prometheus 3 support. It allows to try the new Prometheus v3.0.0-beta.0. #6940
    • Feature requests in this version won't be supported until Prometheus 3 reaches a stable release. However, users are encouraged to try the beta version with the Operator and report any issues they encounter.
  • [FEATURE] Add support for PodMonitor to the PrometheusAgent CRD in DaemonSet mode. #6879
  • [FEATURE] Add -kubelet-endpointslice argument to support EndpointSlice for the kubelet controller. #6882
  • [FEATURE] Add outOfOrderTimeWindow field to the PrometheusAgent CRD. #6851
  • [FEATURE] Add matchFirstNetwork field to the ScrapeConfig CRD for the Docker Service Discovery. #6849 #6894
  • [FEATURE] Add the otlp field to the Prometheus and PrometheusAgent CRDs. #6780
  • [FEATURE] Add support for certificate, key and client CA file paths to the web TLS configuration. #6358
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for OAuth2 clients. #6922
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for HTTP clients. #6864
  • [FEATURE] Add Ionos Service Discovery support to ScrapeConfig CRD. (#6732)
  • [BUGFIX] Fix panic when processing an invalid AlertmanagerConfig object used for global configuration. #6931
  • [BUGFIX] Allow configuring proxy URL for all Prometheus versions. #6845

v0.76.2

  • [BUGFIX] Fix OAuth2 TLSConfig nil pointer. #6909

... (truncated)

Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's changelog.

0.78.2 / 2024-11-21

  • [BUGFIX] Revert the removal of the proxyURL field in AlertmanagerConfig CRD. The field takes precedence over proxyUrl. #7114

0.78.1 / 2024-10-30

  • [BUGFIX] Fix container images for architectures other than amd64. #7065 #7066 #7067

0.78.0 / 2024-10-30

  • [CHANGE] Allow overlapping compactions by default in Prometheus when the Thanos sidecar is configured with uploads. #6906
  • [CHANGE] Drop support (officially) for Alertmanager less than v0.15. #7057
  • [FEATURE] Add dnsConfig and dnsPolicy fields to Alertmanager, Prometheus, PrometheusAgent and ThanosRuler CRDs. #3889
  • [FEATURE] Add ruleQueryOffset field to Prometheus CRD and query_offset field to PrometheusRule CRD. #6957
  • [FEATURE] Add support for Remote Write v2.0 to Prometheus and PrometheusAgent CRDs. #7033
  • [ENHANCEMENT] Add goGC field to Prometheus and PrometheusAgent CRDs. #6667
  • [BUGFIX] Fix label name validation in ScrapeConfig CRD. #6892
  • [BUGFIX] Fix version checking for the promoteResourceAttributes field. #7017

0.77.2 / 2024-10-21

  • [BUGFIX] Correct HTTP port name for the Kubelet endpoint. #7027

0.77.1 / 2024-09-25

  • [BUGFIX] Fix Thanos Ruler reconciliations not triggered on StatefulSet updates. #6964
  • [BUGFIX] Fix error message for unsupported versions. #6965

0.77.0 / 2024-09-19

[!NOTE] Along with this release we also introduce a new command line tool poctl. It is designed specifically for managing Prometheus Operator Custom Resources. This project is currently under active development and fully experimental, so expect breaking changes and rough edges. We encourage you to try it out and provide the feedback.

[!WARNING] Another notable change is that we have switched the logging framework from go-kit/log to slog which may lead to some differences in the log output.

  • [CHANGE] Add more API validation and changes to the ScrapeConfig CRD. #6921 #6855 #6744
  • [CHANGE] Update the validating webhook to reject PrometheusRule objects that would generate configuration greater than the max ConfigMap size (512KiB). #6606
  • [FEATURE] Add experimental Prometheus 3 support. It allows to try the new Prometheus v3.0.0-beta.0. #6940
    • Feature requests in this version won't be supported until Prometheus 3 reaches a stable release. However, users are encouraged to try the beta version with the Operator and report any issues they encounter.
  • [FEATURE] Add support for PodMonitor to the PrometheusAgent CRD in DaemonSet mode. #6879
  • [FEATURE] Add -kubelet-endpointslice argument to support EndpointSlice for the kubelet controller. #6882
  • [FEATURE] Add outOfOrderTimeWindow field to the PrometheusAgent CRD. #6851
  • [FEATURE] Add matchFirstNetwork field to the ScrapeConfig CRD for the Docker Service Discovery. #6849 #6894
  • [FEATURE] Add the otlp field to the Prometheus and PrometheusAgent CRDs. #6780
  • [FEATURE] Add support for certificate, key and client CA file paths to the web TLS configuration. #6358
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for OAuth2 clients. #6922
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for HTTP clients. #6864
  • [FEATURE] Add Ionos Service Discovery support to ScrapeConfig CRD. (#6732)

... (truncated)

Commits
  • 9efea40 Merge pull request #7133 from simonpasquier/cut-0.78.2
  • d3c7eb9 chore: cut v0.78.2
  • 214f1bc Merge pull request #7130 from simonpasquier/fix-7114
  • d756de7 fix: revert removal of the proxyURL field
  • 40104e6 Merge pull request #7072 from simonpasquier/update-go-mod
  • c8d6634 chore: update version in go.mod files
  • e6a4e05 Merge pull request #7068 from simonpasquier/cut-0.78.1
  • 9c340b2 chore: cut v0.78.1
  • 951d701 chore: reclaim disk space in publish workflow
  • 87e27b8 Merge pull request #7067 from simonpasquier/fix-7061-3
  • Additional commits viewable in compare view

Updates github.com/stretchr/testify from 1.9.0 to 1.10.0

Release notes

Sourced from github.com/stretchr/testify's releases.

v1.10.0

What's Changed

Functional Changes

Fixes

Documantation, Build & CI

New Contributors

... (truncated)

Commits
  • 89cbdd9 Merge pull request #1626 from arjun-1/fix-functional-options-diff-indirect-calls
  • 07bac60 Merge pull request #1667 from sikehish/flaky
  • 716de8d Increase timeouts in Test_Mock_Called_blocks to reduce flakiness in CI
  • 118fb83 NotSame should fail if args are not pointers #1661 (#1664)
  • 7d99b2b attempt 2
  • 05f87c0 more similar
  • ea7129e better fmt
  • a1b9c9e Merge pull request #1663 from ybrustin/master
  • 8302de9 Merge branch 'master' into master
  • 89352f7 Merge pull request #1518 from hendrywiranto/adjust-readme-remove-v2
  • Additional commits viewable in compare view

Updates go.mondoo.com/cnquery/v11 from 11.15.0 to 11.34.0

Release notes

Sourced from go.mondoo.com/cnquery/v11's releases.

v11.34.0

What's Changed

Full Changelog: mondoohq/cnquery@v11.33.1...v11.34.0

v11.33.1

What's Changed

Full Changelog: mondoohq/cnquery@v11.33.0...v11.33.1

v11.33.0

What's Changed

Full Changelog: mondoohq/cnquery@v11.32.0...v11.33.0

v11.32.0

What's Changed

... (truncated)

Commits

Updates go.mondoo.com/cnspec/v11 from 11.15.0 to 11.34.0

Release notes

Sourced from go.mondoo.com/cnspec/v11's releases.

v11.34.0

What's Changed

Full Changelog: mondoohq/cnspec@v11.33.1...v11.34.0

v11.33.1

What's Changed

Full Changelog: mondoohq/cnspec@v11.33.0...v11.33.1

v11.33.0

What's Changed

New Contributors

Full Changelog: mondoohq/cnspec@v11.32.0...v11.33.0

v11.32.0

What's Changed

Full Changelog: mondoohq/cnspec@v11.31.1...v11.32.0

v11.31.1

What's Changed

... (truncated)

Commits

Updates go.mondoo.com/mondoo-go from 0.0.0-20240716062427-ec95d879cbe7 to 0.0.0-20241204230241-b8e4fdb12bda

Commits

Updates github.com/google/go-containerregistry from 0.20.1 to 0.20.2

Release notes

Sourced from github.com/google/go-containerregistry's releases.

v0.20.2

What's Changed

Full Changelog: google/go-containerregistry@v0.20.1...v0.20.2

Commits

Updates github.com/prometheus/client_golang from 1.19.1 to 1.20.4

Release notes

Sourced from github.com/prometheus/client_golang's releases.

v1.20.4

  • [BUGFIX] histograms: Fix a possible data race when appending exemplars vs metrics gather. #1623

v1.20.3

  • [BUGFIX] histograms: Fix possible data race when appending exemplars. #1608

v1.20.2

  • [BUGFIX] promhttp: Unset Content-Encoding header when data is uncompressed. #1596

v1.20.1

This release contains the critical fix for the issue. Thanks to @​geberl, @​CubicrootXYZ, @​zetaab and @​timofurrer for helping us with the investigation!

  • [BUGFIX] process-collector: Fixed unregistered descriptor error when using process collector with PedanticRegistry on Linux machines. #1587

v1.20.0

Thanks everyone for contributions!

⚠️ In this release we remove one (broken anyway, given Go runtime changes) metric and add three new (representing GOGC, GOMEMLIMIT and GOMAXPROCS flags) to the default collectors.NewGoCollector() collector. Given its popular usage, expect your binary to expose two additional metric.

Changes

  • [CHANGE] ⚠️ go-collector: Remove go_memstat_lookups_total metric which was always 0; Go runtime stopped sharing pointer lookup statistics. #1577
  • [FEATURE] ⚠️ go-collector: Add 3 default metrics: go_gc_gogc_percent, go_gc_gomemlimit_bytes and go_sched_gomaxprocs_threads as those are recommended by the Go team. #1559
  • [FEATURE] go-collector: Add more information to all metrics' HELP e.g. the exact runtime/metrics sourcing each metric (if relevant). #1568 #1578
  • [FEATURE] testutil: Add CollectAndFormat method. #1503
  • [FEATURE] histograms: Add support for exemplars in native histograms. #1471
  • [FEATURE] promhttp: Add experimental support for zstd on scrape, controlled by the request Accept-Encoding header. #1496
  • [FEATURE] api/v1: Add WithLimit parameter to all API methods that supports it. #1544
  • [FEATURE] prometheus: Add support for created timestamps in constant histograms and constant summaries. #1537
  • [FEATURE] process-collectors: Add network usage metrics: process_network_receive_bytes_total and process_network_transmit_bytes_total. #1555
  • [FEATURE] promlint: Add duplicated metric lint rule. #1472
  • [BUGFIX] promlint: Relax metric type in name linter rule. #1455
  • [BUGFIX] promhttp: Make sure server instrumentation wrapping supports new and future extra responseWriter methods. #1480
  • [BUGFIX] testutil: Functions using compareMetricFamilies are now failing if filtered metricNames are not in the input. #1424
  • feat(prometheus/testutil/promlint/validations): refine lintMetricType… by @​foehammer127 in

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Dec 11, 2024
Copy link

github-actions bot commented Dec 11, 2024

Test Results

0 tests  ±0   0 ✅ ±0   0s ⏱️ ±0s
0 suites ±0   0 💤 ±0 
0 files   ±0   0 ❌ ±0 

Results for commit 587d389. ± Comparison against base commit 5eccaf4.

♻️ This comment has been updated with latest results.

Bumps the gomodupdates group with 6 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/cert-manager/cert-manager](https://github.com/cert-manager/cert-manager) | `1.14.5` | `1.16.2` |
| [github.com/golang-jwt/jwt/v4](https://github.com/golang-jwt/jwt) | `4.5.0` | `4.5.1` |
| [github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring](https://github.com/prometheus-operator/prometheus-operator) | `0.74.0` | `0.78.2` |
| [github.com/stretchr/testify](https://github.com/stretchr/testify) | `1.9.0` | `1.10.0` |
| [go.mondoo.com/cnquery/v11](https://github.com/mondoohq/cnquery) | `11.15.0` | `11.34.0` |
| [go.mondoo.com/cnspec/v11](https://github.com/mondoohq/cnspec) | `11.15.0` | `11.34.0` |



Updates `github.com/cert-manager/cert-manager` from 1.14.5 to 1.16.2
- [Release notes](https://github.com/cert-manager/cert-manager/releases)
- [Changelog](https://github.com/cert-manager/cert-manager/blob/master/RELEASE.md)
- [Commits](cert-manager/cert-manager@v1.14.5...v1.16.2)

Updates `github.com/golang-jwt/jwt/v4` from 4.5.0 to 4.5.1
- [Release notes](https://github.com/golang-jwt/jwt/releases)
- [Changelog](https://github.com/golang-jwt/jwt/blob/main/VERSION_HISTORY.md)
- [Commits](golang-jwt/jwt@v4.5.0...v4.5.1)

Updates `github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring` from 0.74.0 to 0.78.2
- [Release notes](https://github.com/prometheus-operator/prometheus-operator/releases)
- [Changelog](https://github.com/prometheus-operator/prometheus-operator/blob/main/CHANGELOG.md)
- [Commits](prometheus-operator/prometheus-operator@v0.74.0...v0.78.2)

Updates `github.com/stretchr/testify` from 1.9.0 to 1.10.0
- [Release notes](https://github.com/stretchr/testify/releases)
- [Commits](stretchr/testify@v1.9.0...v1.10.0)

Updates `go.mondoo.com/cnquery/v11` from 11.15.0 to 11.34.0
- [Release notes](https://github.com/mondoohq/cnquery/releases)
- [Changelog](https://github.com/mondoohq/cnquery/blob/main/.goreleaser.yml)
- [Commits](mondoohq/cnquery@v11.15.0...v11.34.0)

Updates `go.mondoo.com/cnspec/v11` from 11.15.0 to 11.34.0
- [Release notes](https://github.com/mondoohq/cnspec/releases)
- [Changelog](https://github.com/mondoohq/cnspec/blob/main/.goreleaser.yml)
- [Commits](mondoohq/cnspec@v11.15.0...v11.34.0)

Updates `go.mondoo.com/mondoo-go` from 0.0.0-20240716062427-ec95d879cbe7 to 0.0.0-20241204230241-b8e4fdb12bda
- [Commits](https://github.com/mondoohq/mondoo-go/commits)

Updates `github.com/google/go-containerregistry` from 0.20.1 to 0.20.2
- [Release notes](https://github.com/google/go-containerregistry/releases)
- [Changelog](https://github.com/google/go-containerregistry/blob/main/.goreleaser.yml)
- [Commits](google/go-containerregistry@v0.20.1...v0.20.2)

Updates `github.com/prometheus/client_golang` from 1.19.1 to 1.20.4
- [Release notes](https://github.com/prometheus/client_golang/releases)
- [Changelog](https://github.com/prometheus/client_golang/blob/main/CHANGELOG.md)
- [Commits](prometheus/client_golang@v1.19.1...v1.20.4)

Updates `google.golang.org/protobuf` from 1.34.2 to 1.35.2

Updates `k8s.io/utils` from 0.0.0-20240711033017-18e509b52bc8 to 0.0.0-20241104163129-6fe5fd82f078
- [Commits](https://github.com/kubernetes/utils/commits)

---
updated-dependencies:
- dependency-name: github.com/cert-manager/cert-manager
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: github.com/golang-jwt/jwt/v4
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomodupdates
- dependency-name: github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: github.com/stretchr/testify
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: go.mondoo.com/cnquery/v11
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: go.mondoo.com/cnspec/v11
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: go.mondoo.com/mondoo-go
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomodupdates
- dependency-name: github.com/google/go-containerregistry
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomodupdates
- dependency-name: github.com/prometheus/client_golang
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: google.golang.org/protobuf
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomodupdates
- dependency-name: k8s.io/utils
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomodupdates
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot force-pushed the dependabot/go_modules/gomodupdates-ebef98e954 branch from cdc817b to 587d389 Compare December 12, 2024 08:36
Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 16, 2024

Superseded by #1214.

@dependabot dependabot bot closed this Dec 16, 2024
@dependabot dependabot bot deleted the dependabot/go_modules/gomodupdates-ebef98e954 branch December 16, 2024 08:41
@github-actions github-actions bot locked and limited conversation to collaborators Dec 16, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants