-
Notifications
You must be signed in to change notification settings - Fork 82
🌱 Update Update Golang Dependencies group (minor) #1567
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
syself-bot
wants to merge
1
commit into
main
Choose a base branch
from
renovate/golang-deps
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
24fa13a
to
ddb3840
Compare
cabf92d
to
282c214
Compare
41e1bc3
to
dd2d0ed
Compare
6a98167
to
71d8a0c
Compare
01d9313
to
b052831
Compare
b052831
to
fbbe196
Compare
eb7bc55
to
e36b464
Compare
d8737ab
to
344148c
Compare
a411dfb
to
aa3a083
Compare
e77c6a4
to
f291995
Compare
cbebab9
to
ce7314c
Compare
5239877
to
3fd8622
Compare
0a0af4d
to
6ed467a
Compare
| datasource | package | from | to | | ---------- | ------------------------------------ | ---------------------------------- | ---------------------------------- | | go | github.com/hetznercloud/hcloud-go/v2 | v2.19.1 | v2.22.0 | | go | github.com/onsi/ginkgo/v2 | v2.23.0 | v2.25.1 | | go | github.com/onsi/gomega | v1.36.2 | v1.38.1 | | go | github.com/prometheus/common | v0.63.0 | v0.65.0 | | go | github.com/stretchr/testify | v1.10.0 | v1.11.0 | | go | golang.org/x/crypto | v0.36.0 | v0.41.0 | | go | golang.org/x/exp | v0.0.0-20250305212735-054e65f0b394 | v0.0.0-20250819193227-8b4c13bb791b | | go | golang.org/x/mod | v0.24.0 | v0.27.0 | | go | k8s.io/utils | v0.0.0-20241210054802-24370beab758 | v0.0.0-20250820121507-0af2bda4dd1d | | go | sigs.k8s.io/kind | v0.27.0 | v0.29.0 |
6ed467a
to
c3d570f
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v2.19.1
->v2.22.0
v2.23.0
->v2.25.1
v1.36.2
->v1.38.1
v0.63.0
->v0.65.0
v1.10.0
->v1.11.0
v0.36.0
->v0.41.0
054e65f
->8b4c13b
v0.24.0
->v0.27.0
24370be
->0af2bda
v0.27.0
->v0.29.0
Release Notes
hetznercloud/hcloud-go (github.com/hetznercloud/hcloud-go/v2)
v2.22.0
Compare Source
Features
applied_to_resources
property (#667)v2.21.1
Compare Source
Bug Fixes
v2.21.0
Compare Source
Features
Bug Fixes
v2.20.1
Compare Source
Bug Fixes
v2.20.0
Compare Source
In this release, the
api_endpoint
metric labels changed for all our API requests. Please make sure to update your setup if you were relying on them. The new labels are now easier to understand, see the example below:/volumes/64314930
now has the label/volumes/-
instead of/volumes/
/volumes/64314930/actions/resize
now has the label/volumes/-/actions/resize
instead of/volumes/actions/resize
Features
api_endpoint
metric labels (#626)Bug Fixes
onsi/ginkgo (github.com/onsi/ginkgo/v2)
v2.25.1
Compare Source
2.25.1
Fixes
10866d3
]2e42cff
]v2.25.0
Compare Source
2.25.0
AroundNode
This release introduces a new decorator to support more complex spec setup usecases.
AroundNode
registers a function that runs before each individual node. This is considered a more advanced decorator.Please read the docs for more information and some examples.
Allowed signatures:
AroundNode(func())
-func
will be called before the node is run.AroundNode(func(ctx context.Context) context.Context)
-func
can wrap the passed in context and return a new one which will be passed on to the node.AroundNode(func(ctx context.Context, body func(ctx context.Context)))
-ctx
is the context for the node andbody
is a function that must be called to run the node. This gives you complete control over what runs before and after the node.Multiple
AroundNode
decorators can be applied to a single node and they will run in the order they are applied.Unlike setup nodes like
BeforeEach
andDeferCleanup
,AroundNode
is guaranteed to run in the same goroutine as the decorated node. This is necessary when working with lower-level libraries that must run on a single thread (you can callruntime.LockOSThread()
in theAroundNode
to ensure that the node runs on a single thread).Since
AroundNode
allows you to modify the context you can also useAroundNode
to implement shared setup that attaches values to the context.If applied to a container,
AroundNode
will run before every node in the container. Including setup nodes likeBeforeEach
andDeferCleanup
.AroundNode
can also be applied toRunSpecs
to run before every node in the suite. This opens up new mechanisms for instrumenting individual nodes across an entire suite.v2.24.0
Compare Source
2.24.0
Features
Specs can now be decorated with (e.g.)
SemVerConstraint("2.1.0")
andginkgo --sem-ver-filter="2.1.1"
will only run constrained specs that match the requested version. Learn more in the docs here! Thanks to @Icarus9913 for the PR.Fixes
3f5d379
]. fixes #1582Maintenance
Numerous dependency bumps and documentation fixes
v2.23.4
Compare Source
2.23.4
Prior to this release Ginkgo would compute the incorrect number of available CPUs when running with
-p
in a linux container. Thanks to @emirot for the fix!Features
2b9c428
]Fixes
1f59d07
]Maintenance
2d134d5
]v2.23.3
Compare Source
2.23.3
Fixes
-
as a standalone argument [cfcc1a5
]feaf292
]88e2282
]v2.23.2
Compare Source
2.23.2
🎉🎉🎉
At long last, some long-standing performance gaps between
ginkgo
andgo test
have been resolved!Ginkgo operates by running
go test -c
to generate test binaries, and then running those binaries. It turns out that the compilation step ofgo test -c
is slower thango test
's compilation step becausego test
strips out debug symbols (ldflags=-w
) whereasgo test -c
does not.Ginkgo now passes the appropriate
ldflags
togo test -c
when running specs to strip out symbols. This is only done when it is safe to do so and symbols are preferred when profiling is enabled and whenginkgo build
is called explicitly.This, coupled, with the instructions for disabling XProtect on MacOS yields a much better performance experience with Ginkgo.
v2.23.1
Compare Source
2.23.1
🚨 For users on MacOS 🚨
A long-standing Ginkgo performance issue on MacOS seems to be due to mac's antimalware XProtect. You can follow the instructions here to disable it in your terminal. Doing so sped up Ginkgo's own test suite from 1m8s to 47s.
Fixes
Ginkgo's CLI is now a bit clearer if you pass flags in incorrectly:
a0e52ff
]b799d8d
]This might cause existing CI builds to fail. If so then it's likely that your CI build was misconfigured and should be corrected. Open an issue if you need help.
onsi/gomega (github.com/onsi/gomega)
v1.38.1
Compare Source
1.38.1
Fixes
Numerous minor fixes and dependency bumps
v1.38.0
Compare Source
1.38.0
Features
4ee7ed0
]Fixes
36bbf72
]Maintenance
529d408
]acd1f55
]bae65a0
]8dda91f
]212d812
]59bd7f9
]328c729
]9a798a1
]04a72c6
]v1.37.0
Compare Source
1.37.0
Features
5666f98
]v1.36.3
Compare Source
1.36.3
Maintenance
adb8b49
]interface{}
withany
[7613216
]9fe5259
]a0e85b9
]604a8b1
]36fbc84
]ced70d7
]c8b4a07
]06431b9
]b55a92d
]a1d518b
]prometheus/common (github.com/prometheus/common)
v0.65.0
Compare Source
What's Changed
New Contributors
Full Changelog: prometheus/common@v0.64.0...v0.65.0
v0.64.0
Compare Source
What's Changed
NewNopLogger()
wrapper aroundNew()
by @tjhop in https://github.com/prometheus/common/pull/783New Contributors
Full Changelog: prometheus/common@v0.63.0...v0.64.0
stretchr/testify (github.com/stretchr/testify)
v1.11.0
Compare Source
What's Changed
Functional Changes
v1.11.0 Includes a number of performance improvements.
Fixes
Documentation, Build & CI
New Contributors
Full Changelog: stretchr/testify@v1.10.0...v1.11.0
kubernetes-sigs/kind (sigs.k8s.io/kind)
v0.29.0
Compare Source
This is a quick security release to pickup the containerd 2.1.1 CVE-2025-47290 fix.
See v0.28.0 (release days ago!) for full release notes with recent changes:
https://github.com/kubernetes-sigs/kind/releases/tag/v0.28.0
Breaking Changes
The default node image is now
kindest/node:v1.33.1@​sha256:050072256b9a903bd914c0b2866828150cb229cea0efe5892e2b644d5dd3b34f
New Features
Images pre-built for this release:
kindest/node:v1.33.1@​sha256:050072256b9a903bd914c0b2866828150cb229cea0efe5892e2b644d5dd3b34f
kindest/node:v1.32.5@​sha256:e3b2327e3a5ab8c76f5ece68936e4cafaa82edf58486b769727ab0b3b97a5b0d
kindest/node:v1.31.9@​sha256:b94a3a6c06198d17f59cca8c6f486236fa05e2fb359cbd75dabbfc348a10b211
kindest/node:v1.30.13@​sha256:397209b3d947d154f6641f2d0ce8d473732bd91c87d9575ade99049aa33cd648
NOTE: You must use the
@sha256
digest to guarantee an image built for this release, until such a time as we switch to a different tagging scheme. Even then we will highly encourage digest pinning for security and reproducibility reasons.See also:
NOTE: These node images support amd64 and arm64, both of our supported platforms. You must use the same platform as your host, for more context see https://github.com/kubernetes-sigs/kind/issues/2718
Fixes
Contributors
Committers for this release:
(Please see v0.28.0 https://github.com/kubernetes-sigs/kind/releases/tag/v0.28.0#Contributors)
v0.28.0
Compare Source
This release moves to Kubernetes to 1.33.1 by default.
Breaking Changes
The default node image is now
kindest/node:v1.33.1@​sha256:8d866994839cd096b3590681c55a6fa4a071fdaf33be7b9660e5697d2ed13002
New Features
Images pre-built for this release:
kindest/node:v1.33.1@​sha256:8d866994839cd096b3590681c55a6fa4a071fdaf33be7b9660e5697d2ed13002
kindest/node:v1.32.5@​sha256:36187f6c542fa9b78d2d499de4c857249c5a0ac8cc2241bef2ccd92729a7a259
kindest/node:v1.31.9@​sha256:156da58ab617d0cb4f56bbdb4b493f4dc89725505347a4babde9e9544888bb92
kindest/node:v1.30.13@​sha256:8673291894dc400e0fb4f57243f5fdc6e355ceaa765505e0e73941aa1b6e0b80
NOTE: You must use the
@sha256
digest to guarantee an image built for this release, until such a time as we switch to a different tagging scheme. Even then we will highly encourage digest pinning for security and reproducibility reasons.See also:
NOTE: These node images support amd64 and arm64, both of our supported platforms. You must use the same platform as your host, for more context see https://github.com/kubernetes-sigs/kind/issues/2718
Fixes
net.ipv4.conf.all.arp_ignore
to 0 to address some container networking failuresContributors
Thank you to everyone who contributed to this kind over the years!
Committers for this release:
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.