netobserv-ebpf-agent
netobserv-ebpf-agent copied to clipboard
fix(deps): update go modules (major)
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| github.com/cenkalti/backoff/v4 | indirect | major | v4.3.0 -> v5.0.2 |
| github.com/cenkalti/rpc2 | indirect | major | v0.0.0-20210604223624-c1acbc6ec984 -> v1.0.4 |
| github.com/netsampler/goflow2 | indirect | major | v1.3.7 -> v2.2.2 |
| github.com/pion/dtls/v2 | indirect | major | v2.2.12 -> v3.0.6 |
| github.com/pion/transport/v2 | indirect | major | v2.2.10 -> v3.0.7 |
| github.com/urfave/cli/v2 | indirect | major | v2.27.6 -> v3.2.0 |
| gopkg.in/evanphx/json-patch.v4 | indirect | major | v4.12.0 -> v5.9.11 |
| gopkg.in/yaml.v2 | require | major | v2.4.0 -> v3.0.1 |
| sigs.k8s.io/structured-merge-diff/v4 | indirect | major | v4.7.0 -> v6.0.0 |
Release Notes
netsampler/goflow2 (github.com/netsampler/goflow2)
v2.2.2
v2.2.1
v2.2.0
v2.1.5
v2.1.4
v2.1.3
v2.1.2
v2.1.1
v2.1.0
v2.0.0
pion/dtls (github.com/pion/dtls/v2)
v3.0.6
What's Changed
- Revert rollback Go version bump by Renovate by @JoeTurki in https://github.com/pion/dtls/pull/700
Full Changelog: https://github.com/pion/dtls/compare/v3.0.5...v3.0.6
v3.0.5
Changelog
fbc7baeUpdate docker.io/library/golang Docker tag to v1.24 (#694)13b929bUpdate module golang.org/x/net to v0.37.0 (#697)3a0f50aUse crypto.Signer whenever possible (#681)16d6306Update module golang.org/x/net to v0.34.0 (#693)8eb9a91Upgrade golangci-lint, more linters1c0df61Update module github.com/pion/logging to v0.2.3 (#691)1e4ae60Update module golang.org/x/net to v0.33.0 [SECURITY]ceb8458Update module golang.org/x/crypto to v0.31.0 [SECURITY]4e34db5Update module golang.org/x/net to v0.31.002434c7Update module golang.org/x/crypto to v0.29.0
v3.0.4
Changelog
b3e02c4Update module golang.org/x/net to v0.30.03f61fd2Fix RSA signature verification issued796437Improve fuzzing
v3.0.3
Changelog
98a05d6Fix incorrect client retransmissionsd7f5feeUpdate module golang.org/x/net to v0.29.00be603aUpdate module golang.org/x/crypto to v0.27.00790369Update module golang.org/x/net to v0.28.0f13eec1Update module golang.org/x/crypto to v0.26.0e193dc2Update go.mod version to 1.20
v3.0.2
Changelog
1a02350Fix race between Conn.Close and Conn.Handshake032d60cUpdate CI configs to v0.11.15f6ecbc2Update docker.io/library/golang Docker tag to v1.23fd18984Fix pkg.go.dev link
v3.0.1
Changelog
e20b162Fix multiple calls to Handshakef3e8a9eFix segfault in State::serialize method5a72b12Update module github.com/pion/transport/v3 to v3.0.7c5ab822Update module golang.org/x/net to v0.27.023674bdUpdate module golang.org/x/crypto to v0.25.07ab74fbAdd support for MKI in use_srtp7139e0eFix time units in example2ed7caaUpdate module github.com/pion/transport/v3 to v3.0.6
v3.0.0
Pion DTLS v3.0.0 is now available. Pion DTLS is a Go implementation of DTLS. It allows for secure communication over UDP. It is commonly used for VPNs, WebRTC and other real-time protocols.
This release includes 115 commits from 17 authors. This release added Connection Identifiers, concurrent handshaking when Accepting inbound connections, Censorship Circumvention and better resilience against packet loss during handshaking.
A special thank you to kevmo314 and hasheddan for all their hard work on making this release happen.
This release contains breaking changes. Please read the following carefully, the breakage can't be caught at compile time. Each change will have a linked commit. Looking at examples/ in the linked commit should show what code you need to change in your application.
Breaking Changes
Before /v2 Pion DTLS would handshake on Server or Client creation. This design caused the Accept implementation to be blocking. A new connection couldn't be accept until the previous one had finished.
This design also doesn't match the crypto/tls implementation in stdlib. This mismatch would cause frustration/confusion for users.
Now the handshaking only occurs when Read,Write or Handshake is called. In most cases users shouldn't notice a difference.
If you do want a Handshake performed without a Read or Write this is the change needed.
Before
dtlsConn, err := dtls.Client(dtlsEndpoint, dtlsConfig)
if err != nil {
// handle error
}
// Perform logic from negotiated SRTP Profile
srtpProfile, ok := dtlsConn.SelectedSRTPProtectionProfile()
After
dtlsConn, err = dtls.Client(dtlsEndpoint, dtlsEndpoint.RemoteAddr(), dtlsConfig)
if err != nil {
// handle error
}
err = dtlsConn.Handshake()
if err != nil {
// Explicitly perform handshake
}
// Perform logic from negotiated SRTP Profile
srtpProfile, ok := dtlsConn.SelectedSRTPProtectionProfile()
This change was made in e4064683
New Features
Connection IDs
Connection IDs is a new feature added to the DTLS protocol itself. This change allows for clients to change IPs/Ports during a session. This allows for devices to roam (like phones) or for low power devices to shut down and reconnect without losing their DTLS session!
Connection ID generation is pluggable via the dtls.Config structure, and a random CID generator with a static size is provided for convenience. A new example has been added to demonstrate this functionality.
For those interested in digging deeper into the full set of changes, the majority of work was done in #570.
Censorship Circumvention
Software that is used to circumvent censorship like snowflake uses Pion. To block this (and other) software goverments have looked for patterns and differences in Pion DTLS and blocked it.
This new release contains hooks that allows users to randomize and circumvent these blocks. Users can modify ClientHello, ServerHello and CertificateRequest. Users can also smuggle information in a ServerHello/ClientHello RandomBytes.
You can see them all here here
Changelog
The complete log between v2.2.7 and v3.0.0:
0a8d838Prepare /v3b6fd38eUpdate module github.com/pion/transport/v3 to v3.0.5e406468Perform handshake on first read/write6178064Mark NULL and AES256CM SRTP ciphers as supportedbc3159aAdded DTLS-SRTP IDs for NULL and AES256CM ciphersd013d0cOn Read Retransmit send FSM to SENDINGec76652Retransmit last flight when in finished602dc71Make localConnectionID thread safe0a1b73aRespect disableRetransmitBackoffa6d9640Add OnConnectionAttempt to Config48d6748Implement retransmit backoff according to 4.2.4.145e16a0Update module golang.org/x/net to v0.26.0a5d1facFlight3: respect curves configuration61b3466Add ability to select cert based on ch rand byteseddca22Update module golang.org/x/crypto to v0.24.0edc7ad0Limit size of encrypted packet queuefbbdf66Update module golang.org/x/net to v0.25.0efd6737Add test for PSK and Identitycb62aacFix typo in test494c1a3Remove testify dependencyadec94aUpdate golang Docker tag to v1.228738ce1Add handshake hooking2c36d63Update module golang.org/x/net to v0.24.0d606c79Update module golang.org/x/crypto to v0.22.0f6f666eUpdate module golang.org/x/net to v0.23.0 [SECURITY]e008bc4Update CI configs to v0.11.123e667b0Update go.mod version to 1.19ae51db9Update CI configs to v0.11.78244c45Update CI configs to v0.11.40ad9cfdUpdate module github.com/pion/transport/v3 to v3.0.28a93e0eFix TestErrorsTemporary38e39e4Update module golang.org/x/net to v0.22.0a245727Update module golang.org/x/crypto to v0.21.05e95b5cUpdate module github.com/stretchr/testify to v1.9.035a00d3Fix linter errors96b8c29Fix linter errors2597464Update module golang.org/x/net to v0.20.042b6772Update module golang.org/x/crypto to v0.18.0bb54a30If not found in the cache return nil3427819Format code798b32aFix flight1parse processing exceptionba72fbaUpdate CI configs to v0.11.3520d84cUpdate CI configs to v0.11.0cfa868cRemove 'AUTHORS.txt' from README.mdb4a403cRemove 'Generate Authors' workflow9ffd96cDrop invalid record silently during handshake3e8a7d7Update module golang.org/x/crypto to v0.17.0 [SECURITY]dc751e3Update module golang.org/x/net to v0.19.03f3d833Update module golang.org/x/crypto to v0.16.0a8f7062Use atomic to avoid stale SRTP protection profile9cc3df9Respect Algorithm value in CertificateRequest7faf25fUpdate module golang.org/x/net to v0.17.0 [SECURITY]c864545Update module golang.org/x/net to v0.15.028431d9Export CipherSuiteID in connection State8401874Update module golang.org/x/crypto to v0.13.0744e27aUpdate actions/checkout action to v42b584afSpecifying underlying type of conn ID atomic.Value70caf30Use atomic.Value to maintain Go 1.13 compatibility60064c6Update module github.com/pion/transport/v3 to v3.0.1ef50d6bUpdate AUTHORS.txt7e5003aUpdate AUTHORS.txtdbc7fd9Update module github.com/pion/transport/v3 to v3.0.0a681f67Correctly identify client and server with PSK IDe85f106Update module github.com/pion/transport/v2 to v2.2.27bf18f8Update module golang.org/x/net to v0.14.0609e5beClear CIDs on potential session resumptione142ee1Serialize CIDs in state37fbc04Add CID send only client example6df50a6Add CID listener examplef5875c1Set UDP routing if CID is enablede663309Add CID routing unit tests9db84b5Add CID based datagram routinga8998afAdd UDP net.PacketListener unit tests71db42bIntroduce UDP net.PacketListener3afeb7dAdd PacketBuffer unit testseb305b1Introduce net PacketBuffer703da0cConsume net package in tests4f53ce1Introduce net packagef1d8b0aWrap Alerts when CID is negotiated3082313Convert nil CIDs to empty byte slice83b1254Fix name of cipher suite initialization function818feb8Set timeout to 10 minutes on e2e workflowd29c6f0Add basic connection ID generators2f2bc8dAdd e2e CID testsee04141Update tests to wrap net.Connf960a37Wrap net.Conn in DTLS listenerafb61f1Update DTLS Conn to use PacketConn and CIDd082911Add Conn to PacketConn utilitye5420deUpdate handshaker to handle CID extension8922879Update ciphersuites to support CIDs8ba47cbImplement AEAD additional data with CID27fd131Add local and remote CID to state9a37bfdImplement AddUint48 utility1ce6f27Add CID content type6af61b1Allow packets to specify CID wrappedb7b1e44Add support for CID related generators2005135Add support for parsing CID records9e4a4e7Add DTLS connection ID extensione9b3ce0Update pion/transport to latesta1d270fUpdate module golang.org/x/crypto to v0.12.0a6eca6cUpdate CI configs to v0.10.11eb34e7dUpdate module golang.org/x/net to v0.13.0c9eb5f2Update module golang.org/x/net to v0.12.0b033847Clean up unneccessary nested logic7307f62Fix return of nil alertErrorsb905606Add unmarshal unit tests for extensions0736d45Fix parsing supported EC point formats93704b3Add Daniel Mangum to AUTHORS.txtcabe5b8Enable Supported Signature Algorithms265bf11Enable Elliptic Curve Supported Point Formatsd7303d0Wait for OpenSSL server shutdown in e2e test159122fUpdate e2e Go image to 1.208a11cf2Remove extraneous error checks in handshaker4fc3d8fUpdate module golang.org/x/net to v0.11.04b76abfUpdate module golang.org/x/crypto to v0.10.0
pion/transport (github.com/pion/transport/v2)
v3.0.7
What's Changed
- Update module golang.org/x/net to v0.27.0 by @renovate in https://github.com/pion/transport/pull/309
Full Changelog: https://github.com/pion/transport/compare/v3.0.6...v3.0.7
v3.0.6
What's Changed
- Remove unused waiting field by @cnderrauber in https://github.com/pion/transport/pull/306
Full Changelog: https://github.com/pion/transport/compare/v3.0.5...v3.0.6
v3.0.5
What's Changed
- Remove buffer waiting condition by @edaniels in https://github.com/pion/transport/pull/305
Full Changelog: https://github.com/pion/transport/compare/v3.0.4...v3.0.5
v3.0.4
What's Changed
- Hold lock while writing to b.notify by @edaniels in https://github.com/pion/transport/pull/303
Full Changelog: https://github.com/pion/transport/compare/v3.0.3...v3.0.4
v3.0.3
What's Changed
- Update CI configs to v0.11.4 by @pionbot in https://github.com/pion/transport/pull/280
- Update CI configs to v0.11.7 by @pionbot in https://github.com/pion/transport/pull/283
- Update go.mod version to 1.19 by @Sean-Der in https://github.com/pion/transport/pull/284
- Update CI configs to v0.11.12 by @pionbot in https://github.com/pion/transport/pull/288
- Reuse timer in Deadline by @paulwe in https://github.com/pion/transport/pull/290
- Reuse notify channel when blocked on read by @paulwe in https://github.com/pion/transport/pull/291
- Update module golang.org/x/net to v0.23.0 [SECURITY] by @renovate in https://github.com/pion/transport/pull/289
- Update module golang.org/x/net to v0.24.0 by @renovate in https://github.com/pion/transport/pull/292
- Update module golang.org/x/sys to v0.20.0 by @renovate in https://github.com/pion/transport/pull/293
- Use crypto/subtle.XORBytes by @jech in https://github.com/pion/transport/pull/294
- Update module golang.org/x/net to v0.26.0 by @renovate in https://github.com/pion/transport/pull/296
- Update module golang.org/x/sys to v0.22.0 by @renovate in https://github.com/pion/transport/pull/297
- Add CheckRoutinesStrict by @edaniels in https://github.com/pion/transport/pull/300
- android 11 suppored by @suutaku in https://github.com/pion/transport/pull/272
- Update module github.com/wlynxg/anet to v0.0.3 by @renovate in https://github.com/pion/transport/pull/301
- Broadcast notify on Buffer.Close by @edaniels in https://github.com/pion/transport/pull/302
New Contributors
- @paulwe made their first contribution in https://github.com/pion/transport/pull/290
- @suutaku made their first contribution in https://github.com/pion/transport/pull/272
Full Changelog: https://github.com/pion/transport/compare/v3.0.2...v3.0.3
v3.0.2
What's Changed
- Start pion/transport@v3 by @Sean-Der in https://github.com/pion/transport/pull/266
- Update module golang.org/x/net to v0.15.0 by @renovate in https://github.com/pion/transport/pull/267
- Update module golang.org/x/sys to v0.13.0 by @renovate in https://github.com/pion/transport/pull/268
- Update module golang.org/x/net to v0.17.0 [SECURITY] by @renovate in https://github.com/pion/transport/pull/269
- Update module golang.org/x/net to v0.19.0 by @renovate in https://github.com/pion/transport/pull/270
- Update CI configs to v0.11.0 by @pionbot in https://github.com/pion/transport/pull/273
- Update CI configs to v0.11.3 by @pionbot in https://github.com/pion/transport/pull/275
- Update module golang.org/x/sys to v0.17.0 by @renovate in https://github.com/pion/transport/pull/277
- Update module github.com/stretchr/testify to v1.9.0 by @renovate in https://github.com/pion/transport/pull/279
- Update module golang.org/x/net to v0.22.0 by @renovate in https://github.com/pion/transport/pull/276
Full Changelog: https://github.com/pion/transport/compare/v2.2.4...v3.0.2
v3.0.1
Changelog
701ff64Use atomic Int32 instead of Bool
v3.0.0
Changelog
urfave/cli (github.com/urfave/cli/v2)
v3.2.0
Breaking change IntFlag now uses int type and not int64. Please change to using Int64Flag for int64 types. Similar behavior for UintFlag as well. See https://pkg.go.dev/github.com/urfave/cli/v3 for a full list of flag types. See #2094 for full patch for this
What's Changed
- chore: Bump golangci-lint to v2 by @mrueg in https://github.com/urfave/cli/pull/2083
- Fix docs for shell completions by @antimatter96 in https://github.com/urfave/cli/pull/2090
- docs: improve migration guides render by @ldez in https://github.com/urfave/cli/pull/2091
- docs: improve migration guide v3 by @ldez in https://github.com/urfave/cli/pull/2093
- feat!: add more integers and unsigned integers type flags by @somebadcode in https://github.com/urfave/cli/pull/2094
- PR-2094: Fix docs by @dearchap in https://github.com/urfave/cli/pull/2099
- Fix:(PR-2094) Update docs for new types by @dearchap in https://github.com/urfave/cli/pull/2100
- Fix:(issue_2056) Add cmd.XXXArgs() functions for retrieving args by @dearchap in https://github.com/urfave/cli/pull/2088
- Add docs for arg types by @dearchap in https://github.com/urfave/cli/pull/2101
New Contributors
- @antimatter96 made their first contribution in https://github.com/urfave/cli/pull/2090
- @ldez made their first contribution in https://github.com/urfave/cli/pull/2091
- @somebadcode made their first contribution in https://github.com/urfave/cli/pull/2094
Full Changelog: https://github.com/urfave/cli/compare/v3.1.1...v3.2.0
v3.1.1
v3.1.0
What's Changed
- go.mod: Require go1.22 by @mrueg in https://github.com/urfave/cli/pull/2026
- Fix:(issue_2030) Add support for trailing hypen for short options by @dearchap in https://github.com/urfave/cli/pull/2031
- Run Before actions after setting up subcommand by @fjl in https://github.com/urfave/cli/pull/2028
- The example have some problem in api by @jokemanfire in https://github.com/urfave/cli/pull/2039
- Rename "Bash Completions" to "Shell Completions" by @abitrolly in https://github.com/urfave/cli/pull/2044
- Support root level map keys in map sources by @lukasbindreiter in https://github.com/urfave/cli/pull/2047
- while print flag , the placeholder if need but not set. by @jokemanfire in https://github.com/urfave/cli/pull/2043
- Add dependabot by @mrueg in https://github.com/urfave/cli/pull/2025
- Bump github.com/stretchr/testify from 1.9.0 to 1.10.0 by @dependabot in https://github.com/urfave/cli/pull/2054
- Bump golangci/golangci-lint-action from 5 to 6 by @dependabot in https://github.com/urfave/cli/pull/2053
- Bump codecov/codecov-action from 4 to 5 by @dependabot in https://github.com/urfave/cli/pull/2052
- Fix:(issue_2032) Support for post parse config loading by @dearchap in https://github.com/urfave/cli/pull/2033
- Fix:(issue_2066) Remove dependency on golang flag library by @dearchap in https://github.com/urfave/cli/pull/2074
- Fix:(issue_1891) Roll out v3 docs by @dearchap in https://github.com/urfave/cli/pull/2080
- Fix:(issue_2077) Make sure onUsageError is invoked for command when a… by @dearchap in https://github.com/urfave/cli/pull/2081
New Contributors
- @mrueg made their first contribution in https://github.com/urfave/cli/pull/2026
- @jokemanfire made their first contribution in https://github.com/urfave/cli/pull/2039
- @lukasbindreiter made their first contribution in https://github.com/urfave/cli/pull/2047
- @dependabot made their first contribution in https://github.com/urfave/cli/pull/2054
Full Changelog: https://github.com/urfave/cli/compare/v3.0.0-beta1.01...v3.1.0
evanphx/json-patch (gopkg.in/evanphx/json-patch.v4)
v5.9.11
What's Changed
- Export errBadJSONDoc and errBadJSONPatch errors by @skitt in https://github.com/evanphx/json-patch/pull/209
Full Changelog: https://github.com/evanphx/json-patch/compare/v5.9.10...v5.9.11
v5.9.10
What's Changed
- Drop the reference to gopkg.in for v5 by @skitt in https://github.com/evanphx/json-patch/pull/203
- remove unmaintained errors pkg(github.com/pkg/errors) by @koba1t in https://github.com/evanphx/json-patch/pull/206
New Contributors
- @skitt made their first contribution in https://github.com/evanphx/json-patch/pull/203
- @koba1t made their first contribution in https://github.com/evanphx/json-patch/pull/206
Full Changelog: https://github.com/evanphx/json-patch/compare/v5.9.0...v5.9.10
v5.9.0
What's Changed
- Validate that the partialDoc is decoded correctly by @evanphx in https://github.com/evanphx/json-patch/pull/201
- Add option to control if the output is HTMLEscaped by @evanphx in https://github.com/evanphx/json-patch/pull/202
Full Changelog: https://github.com/evanphx/json-patch/compare/v5.8.1...v5.9.0
v5.8.1: Fix API breakage
This PR fixes Operation containing a reference to internal/json and breaking the ability to manually compose one. This restores that ability using a type alias.
Full Changelog: https://github.com/evanphx/json-patch/compare/v5.8.0...v5.8.1
v5.8.0: Blargh Phixs and Empathyprovements
This release fixes a few stray panics, addresses large number accuracy, and improves performance!
What's Changed
- Compare strings after decoding them to handle unicode correctly. Fixes #172 by @evanphx in https://github.com/evanphx/json-patch/pull/195
- Always use UseNumber() to avoid float64 lossyness by @evanphx in https://github.com/evanphx/json-patch/pull/194
- Handle null correctly when introduced by replace. Fixes #171 by @evanphx in https://github.com/evanphx/json-patch/pull/196
- Handle from="" more properly. Fixes #192 by @evanphx in https://github.com/evanphx/json-patch/pull/193
- Improve performance by @evanphx in https://github.com/evanphx/json-patch/pull/197
Full Changelog: https://github.com/evanphx/json-patch/compare/v5.7.0...v5.8.0
v5.7.0: The 2023 Release
What's Changed
- Fix invalid sprintf by @howardjohn in https://github.com/evanphx/json-patch/pull/152
- Add CIFuzz GitHub action by @DavidKorczynski in https://github.com/evanphx/json-patch/pull/167
- README: Remove Travis by @ohkinozomu in https://github.com/evanphx/json-patch/pull/164
- Updated min supported version to go 1.18 by @Neo2308 in https://github.com/evanphx/json-patch/pull/181
- Added dependabot by @Neo2308 in https://github.com/evanphx/json-patch/pull/182
- Pre-flight DecodePatch validation: Issue #177 by @radwaretaltr in https://github.com/evanphx/json-patch/pull/180
- Check if raw is a null pointer for findObject by @JosieLi-Google in https://github.com/evanphx/json-patch/pull/173
- Bump actions/checkout from 2 to 4 by @dependabot in https://github.com/evanphx/json-patch/pull/187
- Fix panic on test op by @erickertz in https://github.com/evanphx/json-patch/pull/158
New Contributors
- @howardjohn made their first contribution in https://github.com/evanphx/json-patch/pull/152
- @DavidKorczynski made their first contribution in https://github.com/evanphx/json-patch/pull/167
- @ohkinozomu made their first contribution in https://github.com/evanphx/json-patch/pull/164
- @Neo2308 made their first contribution in https://github.com/evanphx/json-patch/pull/181
- @radwaretaltr made their first contribution in https://github.com/evanphx/json-patch/pull/180
- @JosieLi-Google made their first contribution in https://github.com/evanphx/json-patch/pull/173
- @dependabot made their first contribution in https://github.com/evanphx/json-patch/pull/187
- @erickertz made their first contribution in https://github.com/evanphx/json-patch/pull/158
Full Changelog: https://github.com/evanphx/json-patch/compare/v5.6.0...v5.7.0
v5.6.0: Bug fixes
What's Changed
- Function ensurePathExists should handle appending correctly by @MarcelMue in https://github.com/evanphx/json-patch/pull/148
- Fix partial negative indice support in v4 by @zqzten in https://github.com/evanphx/json-patch/pull/146
New Contributors
- @MarcelMue made their first contribution in https://github.com/evanphx/json-patch/pull/148
- @zqzten made their first contribution in https://github.com/evanphx/json-patch/pull/146
Full Changelog: https://github.com/evanphx/json-patch/compare/v5.5.0...v5.6.0
v5.5.0: Better null handling
This incorporates a few fixes related to how nulls are handles in array's and objects.
v5.3.0: Fix zero sized document crash
This fixes a crash bug where submitted an empty slice as the document would panic.
v5.2.0
v5.1.0
v5.0.0: Proper Go modules release
This release has a proper /v5 directory, unlike the previous releases that did not have a /v4 dir. Thanks to @BenTheElder for getting this sorted out!
kubernetes-sigs/structured-merge-diff (sigs.k8s.io/structured-merge-diff/v4)
v6.0.0
Unexported value.ReadJSONIter and value.WriteJSONStream, which return json-iter types, to enable a migration away from json-iter, since it is unmaintained.
Configuration
📅 Schedule: Branch creation - "after 5am on sunday" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
- [ ] If you want to rebase/retry this PR, check this box
To execute skipped test pipelines write comment /ok-to-test.
This PR has been generated by MintMaker (powered by Renovate Bot).
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: Once this PR has been reviewed and has the lgtm label, please assign eranra for approval. For more information see the Code Review Process.
The full list of commands accepted by this bot can be found here.
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
Hi @red-hat-konflux[bot]. Thanks for your PR.
I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test label.
I understand the commands that are listed here.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.