kurator
kurator copied to clipboard
Bump the go_modules group with 5 updates
Bumps the go_modules group with 5 updates:
Package | From | To |
---|---|---|
github.com/karmada-io/karmada | 1.8.0 |
1.9.1 |
helm.sh/helm/v3 | 3.12.3 |
3.14.3 |
github.com/Azure/azure-sdk-for-go/sdk/azidentity | 1.4.0 |
1.6.0 |
github.com/lestrrat-go/jwx | 1.2.26 |
1.2.29 |
golang.org/x/net | 0.19.0 |
0.26.0 |
Updates github.com/karmada-io/karmada
from 1.8.0 to 1.9.1
Release notes
Sourced from github.com/karmada-io/karmada's releases.
Karmada v1.9.1 release
See the CHANGELOG for details.
Karmada v1.9.0
See the CHANGELOG for details.
Thank you to everyone who contributed to this release!
v1.9.0-preview6
See the changelog for details.
v1.9.0-preview5
See the changelog for details.
In this pre-release, we introduced resourceQuotaEstimator (PR-4566) plugin for the accurate scheduler-estimator. It is an alpha feature, the user can enable it by passing the feature gate in the estimator command line --feature-gates=ResourceQuotaEstimate=true Once this feature is enabled, the accurate scheduler-estimator will estimate the number of workload replicas allowed by the resource quota. We only support compute resources (CPU/memory) and extended resources (like GPU) in this plugin support priorityClass in the quota scope User needs to explicitly specify the priorityClassName in the podTemplate of Deployment, Statefulset, Job, and custom-resource-interpreter.
v1.9.0-preview4
See the changelog for details.
v1.9.0-preview3
See the changelog for details.
This preview release is mainly for
Multi Cluster Service
feature.Karmada v1.9.0-preview2
See the changelog for details.
This preview release is mainly for
Multi Cluster Service
feature.Karmada v1.9.0-preview1
See the changelog for details.
This preview release is mainly for
Multi Cluster Service
feature.Karmada v1.9.0-alpha.0
No release notes provided.
Karmada v1.8.4 release
See the CHANGELOG for details.
Karmada v1.8.3 release
See the CHANGELOG for details.
Karmada v1.8.2 release
See the CHANGELOG for details.
... (truncated)
Commits
b57bff1
Merge pull request #4822 from XiShanYongYe-Chang/automated-cherry-pick-of-#48...c3c83b6
Fix the bug of mcs binding losing resourcebinding.karmada.io/permanent-id label15c9ddd
Merge pull request #4819 from XiShanYongYe-Chang/automated-cherry-pick-of-#47...2935d46
Use merge strategy to avoid work.karmada.io/permanent-id changes.be7a7ae
Merge pull request #4797whitewindmills/automated-cherry-pick-of-#4784
ac060ab
labels cannot be deleted via Karmada propagation4e34fdc
Merge pull request #4772 from XiShanYongYe-Chang/automated-cherry-pick-of-#47...6a45dfb
fix wrong annotation marks on resource5026994
Merge pull request #4745RainbowMango/automated-cherry-pick-of-#4733
#47...be5808f
chore: bump cosigin to v2.2.3.- Additional commits viewable in compare view
Updates helm.sh/helm/v3
from 3.12.3 to 3.14.3
Release notes
Sourced from helm.sh/helm/v3's releases.
Helm v3.14.3 is a patch release. Users are encouraged to upgrade for the best experience. Users are encouraged to upgrade for the best experience.
The community keeps growing, and we'd love to see you there!
- Join the discussion in Kubernetes Slack:
- for questions and just to hang out
- for discussing PRs, code, and bugs
- Hang out at the Public Developer Call: Thursday, 9:30 Pacific via Zoom
- Test, debug, and contribute charts: ArtifactHub/packages
Installation and Upgrading
Download Helm v3.14.3. The common platform binaries are here:
- MacOS amd64 (checksum / 4d5d01a94c7d6b07e71690dc1988bf3229680284c87f4242d28c6f1cc99653be)
- MacOS arm64 (checksum / dff794152b62b7c1a9ff615d510f8657bcd7a3727c668e0d9d4955f70d5f7573)
- Linux amd64 (checksum / 3c90f24e180f8c207b8a18e5ec82cb0fa49858a7a0a86e4ed52a98398681e00b)
- Linux arm (checksum / d4ff88f02d6731ec5dbde86a67bf391e673d0d9e87901727fbf62372aff106ec)
- Linux arm64 (checksum / 85e1573e76fa60af14ba7e9ec75db2129b6884203be866893fa0b3f7e41ccd5e)
- Linux i386 (checksum / af89e5df5cd21efe4dcaa478b19aaf17d22820716f93c1f098b00f1b7cfe1905)
- Linux ppc64le (checksum / aab121ca470e2a502cda849a9b3e92eeb9a32e213b0f0a79a95a04e375d26ce7)
- Linux s390x (checksum / d64fa8aced3244b549377741dc4e2db8109e5270c0723c11b547a9da5f99ad43)
- Linux riscv64 (checksum / f9f4e68bf43632f5df29e6c9fa760813d7e3537ed91d838cfdc2f103f8442b33)
- Windows amd64 (checksum / 369c6db1c114ef2a00793e9a587db6d7b2c72a23e37fd905c8deb78e9a8f7af6)
This release was signed with
672C 657B E06B 4B30 969C 4A57 4614 49C2 5E36 B98E
and can be found at@mattfarina
keybase account. Please use the attached signatures for verifying this release usinggpg
.The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with
bash
.What's Next
- 3.14.4 will contain only bug fixes and be released on April 10, 2024.
- 3.15.0 is the next feature release and will be on May 08, 2024.
Changelog
- Add a note about --dry-run displaying secrets f03cc04caaa8f6d7c3e67cf918929150cf6f3f12 (Matt Farina)
- add error messages 1a7330fe3802beeb3f897a1c701d8a4b9c1316c5 (George Jenkins)
- Fix: Ignore alias validation error for index load d6acc0027dca47dec40ccdd66febd0c8bcf4813f (George Jenkins)
- chore(deps): bump github.com/containerd/containerd from 1.7.11 to 1.7.12 b2738fb782d149ffa4748cb0ee78d674986d04b0 (dependabot[bot])
- chore(deps): bump github.com/DATA-DOG/go-sqlmock from 1.5.0 to 1.5.2 5b0847e0e763e98bcbf8a12e8f9c5f7c11d123a1 (dependabot[bot])
- Update architecture detection method 7e18c39f0753c73e4660f3796f01f5b33f2552b5 (weidongkl)
Helm v3.14.2 is a security (patch) release. Users are strongly recommended to update to this release.
A Helm contributor discovered uninitialized variable vulnerability when Helm parses index and plugin yaml files missing expected content.
Jakub Ciolek with AlphaSense discovered the vulnerability.
Installation and Upgrading
... (truncated)
Commits
f03cc04
Add a note about --dry-run displaying secrets1a7330f
add error messagesd6acc00
Fix: Ignore alias validation error for index loadb2738fb
chore(deps): bump github.com/containerd/containerd from 1.7.11 to 1.7.125b0847e
chore(deps): bump github.com/DATA-DOG/go-sqlmock from 1.5.0 to 1.5.27e18c39
Update architecture detection methodc309b6f
Some fixese8858f8
validation fix3fc9f4b
Improve release action69dcc92
bump version to- Additional commits viewable in compare view
Updates github.com/Azure/azure-sdk-for-go/sdk/azidentity
from 1.4.0 to 1.6.0
Release notes
Sourced from github.com/Azure/azure-sdk-for-go/sdk/azidentity's releases.
sdk/internal/v1.6.0
1.6.0 (2024-04-16)
Features Added
- Options types for
SetBodilessMatcher
andSetDefaultMatcher
now embedRecordingOptions
- Added a collection of default sanitizers for test recordings
sdk/azidentity/v1.6.0
1.6.0 (2024-06-10)
Features Added
NewOnBehalfOfCredentialWithClientAssertions
creates an on-behalf-of credential that authenticates with client assertions such as federated credentialsBreaking Changes
These changes affect only code written against a beta version such as v1.6.0-beta.4
- Removed
AzurePipelinesCredential
and the persistent token caching API. They will return in v1.7.0-beta.1Bugs Fixed
- Managed identity bug fixes
sdk/azidentity/v1.6.0-beta.4
1.6.0-beta.4 (2024-05-14)
Features Added
AzurePipelinesCredential
authenticates an Azure Pipeline service connection with workload identity federationsdk/azidentity/v1.6.0-beta.3
1.6.0-beta.3 (2024-04-09)
Breaking Changes
DefaultAzureCredential
now sends a probe request with no retries for IMDS managed identity environments to avoid excessive retry delays when the IMDS endpoint is not available. This should improve credential chain resolution for local development scenarios.Bugs Fixed
ManagedIdentityCredential
now specifies resource IDs correctly for Azure Container Instancessdk/azidentity/v1.5.2
1.5.2 (2024-04-09)
Bugs Fixed
ManagedIdentityCredential
now specifies resource IDs correctly for Azure Container InstancesOther Changes
- Restored v1.4.0 error behavior for empty tenant IDs
- Upgraded dependencies
Commits
36f766d
add sdk/resourcemanager/cosmos/armcosmos live test (#20705)c005ed6
sdk/resourcemanager/network/armnetwork live test (#20331)5fa7df4
add sdk/resourcemanager/compute/armcompute live test (#20048)0d22aed
add sdk/resourcemanager/eventhub/armeventhub live test (#20686)2a8d96d
add sdk/resourcemanager/postgresql/armpostgresql live test (#20685)b2cddab
[Release] sdk/resourcemanager/paloaltonetworksngfw/armpanngfw/0.1.0 (#20437)ed7f3c7
Fix azidentity troubleshooting guide link (#20736)6dfd0cb
[azeventhubs] Fixing checkpoint store race condition (#20727)745d967
pass along the artifact name so we can override it later (#20732)20b4dd8
Update changelog with latest features (#20730)- Additional commits viewable in compare view
Updates github.com/lestrrat-go/jwx
from 1.2.26 to 1.2.29
Release notes
Sourced from github.com/lestrrat-go/jwx's releases.
v1.2.29 07 Mar 2024
[Security]
[jwe] Added
jwe.Settings(jwe.WithMaxDecompressBufferSize(int64))
to specify the maximum size of a decompressed JWE payload. The default value is 10MB. If you are compressing payloads greater than this, you need to explicitly set it.Unlike in v2, there is no way to set this globally. Please use v2 if this is required.
v1.2.28
v1.2.28 09 Jan 2024 [Security Fixes] * [jws] JWS messages formated in full JSON format (i.e. not the compact format, which consists of three base64 strings concatenated with a '.') with missing "protected" headers could cause a panic, thereby introducing a possiblity of a DoS.
This has been fixed so that the `jws.Parse` function succeeds in parsing a JWS message lacking a protected header. Calling `jws.Verify` on this same JWS message will result in a failed verification attempt. Note that this behavior will differ slightly when parsing JWS messages in compact form, which result in an error.
v1.2.27
v1.2.27 - 03 Dec 2023 [Security] * [jwe] A large number in p2c parameter for PBKDF2 based encryptions could cause a DoS attack, similar to https://nvd.nist.gov/vuln/detail/CVE-2022-36083. All users should upgrade, as unlike v2, v1 attempts to decrypt JWEs on JWTs by default. [GHSA-7f9x-gw85-8grf]
[Bug Fixes]
- [jwk] jwk.Set(jwk.KeyOpsKey, <jwk.KeyOperation>) now works (previously, either Set(.., <string>) or Set(..., []jwk.KeyOperation{...}) worked, but not a single jwk.KeyOperation
Changelog
Sourced from github.com/lestrrat-go/jwx's changelog.
v1.2.29 07 Mar 2024
[jwe] Added
jwe.Settings(jwe.WithMaxDecompressBufferSize(int64))
to specify the maximum size of a decompressed JWE payload. The default value is 10MB. If you are compressing payloads greater than this, you need to explicitly set it.Unlike in v2, there is no way to set this globally. Please use v2 if this is required.
v1.2.28 09 Jan 2024 [Security Fixes]
[jws] JWS messages formated in full JSON format (i.e. not the compact format, which consists of three base64 strings concatenated with a '.') with missing "protected" headers could cause a panic, thereby introducing a possiblity of a DoS.
This has been fixed so that the
jws.Parse
function succeeds in parsing a JWS message lacking a protected header. Callingjws.Verify
on this same JWS message will result in a failed verification attempt. Note that this behavior will differ slightly when parsing JWS messages in compact form, which result in an error.v1.2.27 - 03 Dec 2023 [Security]
- [jwe] A large number in p2c parameter for PBKDF2 based encryptions could cause a DoS attack, similar to https://nvd.nist.gov/vuln/detail/CVE-2022-36083. All users should upgrade, as unlike v2, v1 attempts to decrypt JWEs on JWTs by default. [GHSA-7f9x-gw85-8grf]
[Bug Fixes]
- [jwk] jwk.Set(jwk.KeyOpsKey, ) now works (previously, either Set(.., ) or Set(..., []jwk.KeyOperation{...}) worked, but not a single jwk.KeyOperation
Commits
1025f8e
Merge pull request #1092 from lestrrat-go/develop/v14399ace
Merge branch 'v1' into develop/v1dc80fed
Update Changese4c1511
silence linterd01027d
Merge pull request from GHSA-hj3v-m684-v2593d6e0e0
Bump github.com/stretchr/testify from 1.8.4 to 1.9.0 (#1085)3af5916
Bump golang.org/x/crypto from 0.19.0 to 0.21.0 (#1087)7a05818
Bump golang.org/x/crypto from 0.18.0 to 0.19.0 (#1074)8e2aacd
Bump golangci/golangci-lint-action from 3 to 4 (#1076)4b1fd05
Bump kentaro-m/auto-assign-action from 1.2.6 to 2.0.0 (#1068)- Additional commits viewable in compare view
Updates golang.org/x/net
from 0.19.0 to 0.26.0
Commits
66e838c
go.mod: update golang.org/x dependencies6249541
http2: avoid race in server handler SetReadDeadine/SetWriteDeadline603e3e6
quic: disable X25519Kyber768Draft00 in tests67e8d0c
http2: report an error if goroutines outlive serverTester tests5608279
http2: avoid corruption in priority write scheduler0d515a5
http2: factor out frame read/write test functions9f5b79b
http2: drop unused retry function03c24c2
http2: use synthetic time in server tests022530c
http2: add a more full-featured test net.Conn410d19e
http2: avoid racy access to clientStream.requestedGzip- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency -
@dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) -
@dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) -
@dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) -
@dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency -
@dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.