csi-driver-spiffe
csi-driver-spiffe copied to clipboard
Bump the all group across 1 directory with 8 updates
Bumps the all group with 5 updates in the / directory:
| Package | From | To |
|---|---|---|
| github.com/cert-manager/cert-manager | 1.15.1 |
1.15.2 |
| github.com/onsi/ginkgo/v2 | 2.19.0 |
2.19.1 |
| k8s.io/api | 0.30.2 |
0.30.3 |
| k8s.io/cli-runtime | 0.30.2 |
0.30.3 |
| k8s.io/component-base | 0.30.2 |
0.30.3 |
Updates github.com/cert-manager/cert-manager from 1.15.1 to 1.15.2
Release notes
Sourced from github.com/cert-manager/cert-manager's releases.
v1.15.2
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
🔗 See v1.15.0 for more information about cert-manager 1.15 and read-before-upgrade info.
📜 Changes since
v1.15.1Bug or Regression
- BUGFIX
route53: explicitly set theaws-globalSTS region which is now required by thegithub.com/aws/aws-sdk-go-v2library. (#7189,@cert-manager-bot)- Bump
grpc-goto fixGHSA-xr7q-jx4m-x55m(#7167,@SgtCoDFish)- Fix Azure DNS causing panics whenever authentication error happens (#7188,
@cert-manager-bot)- Fix incorrect value and indentation of
endpointAdditionalPropertiesin thePodMonitortemplate of the Helm chart (#7191,@inteon)- Fixes ACME HTTP01 challenge behavior when using Gateway API to prevent unbounded creation of
HTTPRouteresources (#7186,@cert-manager-bot)- Upgrade
golangfrom1.22.3to1.22.5(#7165,@github-actions)v1.15.2-alpha.1
cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.
🔗 See v1.15.0 for more information about cert-manager 1.15 and read-before-upgrade info.
📜 Changes since
v1.15.1Bug or Regression
- BUGFIX
route53: explicitly set theaws-globalSTS region which is now required by thegithub.com/aws/aws-sdk-go-v2library. (#7189,@cert-manager-bot)- Bump
grpc-goto fixGHSA-xr7q-jx4m-x55m(#7167,@SgtCoDFish)- Fix Azure DNS causing panics whenever authentication error happens (#7188,
@cert-manager-bot)- Fix incorrect value and indentation of
endpointAdditionalPropertiesin thePodMonitortemplate of the Helm chart (#7191,@inteon)- Fixes ACME HTTP01 challenge behavior when using Gateway API to prevent unbounded creation of
HTTPRouteresources (#7186,@cert-manager-bot)- Upgrade
golangfrom1.22.3to1.22.5(#7165,@github-actions)
Commits
48216fbMerge pull request #7200 from cert-manager-bot/cherry-pick-7199-to-release-1.15a94ad68Update the Google CloudBuild job image5604417Merge pull request #7197 from ThatsMrTalbot/fix/e2e-feature-flags-disabled-te...243cd78fix: e2e feature flags disabled test failinga4338afMerge pull request #7191 from inteon/release-1.15_podmonitor_templateae55ea1Fix incorrect value and indentation of the PodMonitor endpointAdditionalPrope...35e27b7Merge pull request #7189 from cert-manager-bot/cherry-pick-7108-to-release-1.15bf03ee5improve aws GetSession comments that explain when and why regions have to be setff2a82averify that the "aws-global" is used for sts in testb47c58bset global region when calling sts- Additional commits viewable in compare view
Updates github.com/onsi/ginkgo/v2 from 2.19.0 to 2.19.1
Release notes
Sourced from github.com/onsi/ginkgo/v2's releases.
v2.19.1
2.19.1
Fixes
- update supported platforms for race conditions [63c8c30]
- [build] Allow custom name for binaries. [ff41e27]
Maintenance
Changelog
Sourced from github.com/onsi/ginkgo/v2's changelog.
2.19.1
Fixes
- update supported platforms for race conditions [63c8c30]
- [build] Allow custom name for binaries. [ff41e27]
Maintenance
Commits
224be5bv2.19.176f4e0cbump gomega63c8c30update supported platforms for race conditionsb69c00dBump rexml from 3.2.6 to 3.2.8 in /docs (#1417)2e7a930--- (#1418)f097741Bump golang.org/x/sys from 0.20.0 to 0.21.0 (#1425)628dbb9fix: issue-1427ff41e27[build] Allow custom name for binaries.- See full diff in compare view
Updates github.com/onsi/gomega from 1.33.1 to 1.34.0
Release notes
Sourced from github.com/onsi/gomega's releases.
v1.34.0
1.34.0
Features
- Add RoundTripper method to ghttp.Server [c549e0d]
Fixes
- fix incorrect handling of nil slices in HaveExactElements (fixes #771) [878940c]
- issue_765 - fixed bug in Hopcroft-Karp algorithm [ebadb67]
Maintenance
- bump ginkgo [8af2ece]
- Fix typo in docs [123a071]
- Bump github.com/onsi/ginkgo/v2 from 2.17.2 to 2.17.3 (#756) [0e69083]
- Bump google.golang.org/protobuf from 1.33.0 to 1.34.1 (#755) [2675796]
- Bump golang.org/x/net from 0.24.0 to 0.25.0 (#754) [4160c0f]
- Bump github-pages from 230 to 231 in /docs (#748) [892c303]
Changelog
Sourced from github.com/onsi/gomega's changelog.
1.34.0
Features
- Add RoundTripper method to ghttp.Server [c549e0d]
Fixes
- fix incorrect handling of nil slices in HaveExactElements (fixes #771) [878940c]
- issue_765 - fixed bug in Hopcroft-Karp algorithm [ebadb67]
Maintenance
- bump ginkgo [8af2ece]
- Fix typo in docs [123a071]
- Bump github.com/onsi/ginkgo/v2 from 2.17.2 to 2.17.3 (#756) [0e69083]
- Bump google.golang.org/protobuf from 1.33.0 to 1.34.1 (#755) [2675796]
- Bump golang.org/x/net from 0.24.0 to 0.25.0 (#754) [4160c0f]
- Bump github-pages from 230 to 231 in /docs (#748) [892c303]
Commits
32e5498v1.34.0cb3fa6arun go mod tidy and wonder why go get doesnt just run it for me in the first ...8af2ecebump ginkgo878940cfix incorrect handling of nil slices in HaveExactElements (fixes #771)f5bec80clean up bipartitegraph testsebadb67issue_765 - fixed bug in Hopcroft-Karp algorithm123a071Fix typo in docsc549e0dAdd RoundTripper method to ghttp.Server0e69083Bump github.com/onsi/ginkgo/v2 from 2.17.2 to 2.17.3 (#756)2675796Bump google.golang.org/protobuf from 1.33.0 to 1.34.1 (#755)- Additional commits viewable in compare view
Updates k8s.io/api from 0.30.2 to 0.30.3
Commits
83bdab1Update dependencies to v0.30.3 tag- See full diff in compare view
Updates k8s.io/apimachinery from 0.30.2 to 0.30.3
Commits
- See full diff in compare view
Updates k8s.io/cli-runtime from 0.30.2 to 0.30.3
Commits
dd30b60Update dependencies to v0.30.3 tag- See full diff in compare view
Updates k8s.io/client-go from 0.30.2 to 0.30.3
Commits
ece8c00Update dependencies to v0.30.3 tag- See full diff in compare view
Updates k8s.io/component-base from 0.30.2 to 0.30.3
Commits
de3cf26Update dependencies to v0.30.3 tag- See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions
Hi @dependabot[bot]. Thanks for your PR.
I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test label.
I understand the commands that are listed here.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: wallrj
The full list of commands accepted by this bot can be found here.
The pull request process is described here
- ~~OWNERS~~ [wallrj]
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment