Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the go_modules group across 1 directory with 7 updates #27

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Jun 21, 2024

Bumps the go_modules group with 6 updates in the / directory:

Package From To
github.com/Azure/azure-sdk-for-go/sdk/azidentity 1.5.1 1.6.0
github.com/jackc/pgx/v4 4.18.2 4.18.3
google.golang.org/protobuf 1.33.0 1.34.2
github.com/docker/docker 25.0.3+incompatible 25.0.5+incompatible
github.com/nats-io/nats-server/v2 2.9.23 2.10.16
github.com/opencontainers/runc 1.1.12 1.1.13

Updates github.com/Azure/azure-sdk-for-go/sdk/azidentity from 1.5.1 to 1.6.0

Release notes

Sourced from github.com/Azure/azure-sdk-for-go/sdk/azidentity's releases.

sdk/internal/v1.6.0

1.6.0 (2024-04-16)

Features Added

  • Options types for SetBodilessMatcher and SetDefaultMatcher now embed RecordingOptions
  • Added a collection of default sanitizers for test recordings

sdk/azidentity/v1.6.0

1.6.0 (2024-06-10)

Features Added

  • NewOnBehalfOfCredentialWithClientAssertions creates an on-behalf-of credential that authenticates with client assertions such as federated credentials

Breaking Changes

These changes affect only code written against a beta version such as v1.6.0-beta.4

  • Removed AzurePipelinesCredential and the persistent token caching API. They will return in v1.7.0-beta.1

Bugs Fixed

  • Managed identity bug fixes

sdk/azidentity/v1.6.0-beta.4

1.6.0-beta.4 (2024-05-14)

Features Added

  • AzurePipelinesCredential authenticates an Azure Pipeline service connection with workload identity federation

sdk/azidentity/v1.6.0-beta.3

1.6.0-beta.3 (2024-04-09)

Breaking Changes

  • DefaultAzureCredential now sends a probe request with no retries for IMDS managed identity environments to avoid excessive retry delays when the IMDS endpoint is not available. This should improve credential chain resolution for local development scenarios.

Bugs Fixed

  • ManagedIdentityCredential now specifies resource IDs correctly for Azure Container Instances

sdk/azidentity/v1.5.2

1.5.2 (2024-04-09)

Bugs Fixed

  • ManagedIdentityCredential now specifies resource IDs correctly for Azure Container Instances

Other Changes

  • Restored v1.4.0 error behavior for empty tenant IDs
  • Upgraded dependencies
Commits
  • 36f766d add sdk/resourcemanager/cosmos/armcosmos live test (#20705)
  • c005ed6 sdk/resourcemanager/network/armnetwork live test (#20331)
  • 5fa7df4 add sdk/resourcemanager/compute/armcompute live test (#20048)
  • 0d22aed add sdk/resourcemanager/eventhub/armeventhub live test (#20686)
  • 2a8d96d add sdk/resourcemanager/postgresql/armpostgresql live test (#20685)
  • b2cddab [Release] sdk/resourcemanager/paloaltonetworksngfw/armpanngfw/0.1.0 (#20437)
  • ed7f3c7 Fix azidentity troubleshooting guide link (#20736)
  • 6dfd0cb [azeventhubs] Fixing checkpoint store race condition (#20727)
  • 745d967 pass along the artifact name so we can override it later (#20732)
  • 20b4dd8 Update changelog with latest features (#20730)
  • Additional commits viewable in compare view

Updates github.com/jackc/pgx/v4 from 4.18.2 to 4.18.3

Changelog

Sourced from github.com/jackc/pgx/v4's changelog.

4.18.3 (March 9, 2024)

Use spaces instead of parentheses for SQL sanitization.

This still solves the problem of negative numbers creating a line comment, but this avoids breaking edge cases such as set foo to $1 where the substitution is taking place in a location where an arbitrary expression is not allowed.

Commits

Updates golang.org/x/net from 0.23.0 to 0.26.0

Commits
  • 66e838c go.mod: update golang.org/x dependencies
  • 6249541 http2: avoid race in server handler SetReadDeadine/SetWriteDeadline
  • 603e3e6 quic: disable X25519Kyber768Draft00 in tests
  • 67e8d0c http2: report an error if goroutines outlive serverTester tests
  • 5608279 http2: avoid corruption in priority write scheduler
  • 0d515a5 http2: factor out frame read/write test functions
  • 9f5b79b http2: drop unused retry function
  • 03c24c2 http2: use synthetic time in server tests
  • 022530c http2: add a more full-featured test net.Conn
  • 410d19e http2: avoid racy access to clientStream.requestedGzip
  • Additional commits viewable in compare view

Updates google.golang.org/protobuf from 1.33.0 to 1.34.2

Updates github.com/docker/docker from 25.0.3+incompatible to 25.0.5+incompatible

Release notes

Sourced from github.com/docker/docker's releases.

v25.0.5

25.0.5

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:

Security

This release contains a security fix for CVE-2024-29018, a potential data exfiltration from 'internal' networks via authoritative DNS servers.

Bug fixes and enhancements

  • CVE-2024-29018: Do not forward requests to external DNS servers for a container that is only connected to an 'internal' network. Previously, requests were forwarded if the host's DNS server was running on a loopback address, like systemd's 127.0.0.53. moby/moby#47589
  • plugin: fix mounting /etc/hosts when running in UserNS. moby/moby#47588
  • rootless: fix open /etc/docker/plugins: permission denied. moby/moby#47587
  • Fix multiple parallel docker build runs leaking disk space. moby/moby#47527

v25.0.4

25.0.4

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:

Bug fixes and enhancements

  • Restore DNS names for containers in the default "nat" network on Windows. moby/moby#47490
  • Fix docker start failing when used with --checkpoint moby/moby#47466
  • Don't enforce new validation rules for existing swarm networks moby/moby#47482
  • Restore IP connectivity between the host and containers on an internal bridge network. moby/moby#47481
  • Fix a regression introduced in v25.0 that prevented the classic builder from ADDing a tar archive with xattrs created on a non-Linux OS moby/moby#47483
  • containerd image store: Fix image pull not emitting Pulling fs layer status moby/moby#47484

API

  • To preserve backwards compatibility, make read-only mounts not recursive by default when using older clients (API version < v1.44). moby/moby#47393
  • GET /images/{id}/json omits the Created field (previously it was 0001-01-01T00:00:00Z) if the Created field is missing from the image config. moby/moby#47451
  • Populate a missing Created field in GET /images/{id}/json with 0001-01-01T00:00:00Z for API version <= 1.43. moby/moby#47387
  • Fix a regression that caused API socket connection failures to report an API version negotiation failure instead. moby/moby#47470
  • Preserve supplied endpoint configuration in a container-create API request, when a container-wide MAC address is specified, but NetworkMode name-or-id is not the same as the name-or-id used in NetworkSettings.Networks. moby/moby#47510

Packaging updates

... (truncated)

Commits
  • e63daec Merge pull request #47589 from vvoland/v25.0-47538
  • 817bccb Merge pull request #47588 from vvoland/v25.0-47558
  • 2a0601e Merge pull request #47587 from vvoland/v25.0-47559
  • 9df9ccc Merge pull request #47586 from vvoland/v25.0-47569
  • a987bc5 libnet: Don't forward to upstream resolvers on internal nw
  • 20c205f Environment variable to override resolv.conf path.
  • 4be9723 daemon: move getUnprivilegedMountFlags to internal package
  • 7ed7e6c plugin: fix mounting /etc/hosts when running in UserNS
  • 81ad706 rootless: fix open /etc/docker/plugins: permission denied
  • 02d4ee3 Makefile: generate-files: fix check for empty TMP_OUT
  • Additional commits viewable in compare view

Updates github.com/nats-io/nats-server/v2 from 2.9.23 to 2.10.16

Release notes

Sourced from github.com/nats-io/nats-server/v2's releases.

Release v2.10.16

Changelog

Refer to the 2.10 Upgrade Guide for backwards compatibility notes with 2.9.x.

[!WARNING] A possible regression may result in a server panic at startup when tav.idx files were incorrectly truncated down to zero bytes. You can work around this problem by deleting tav.idx files that are zero bytes in length before starting the server. Zero-byte files could exist as a result of a previous server crash before a successful file sync to disk occurred.

Go Version

Dependencies

  • github.com/nats-io/jwt/v2 v2.5.6 (#5328)
  • golang.org/x/sys v0.20.0 (#5388)
  • golang.org/x/crypto v0.23.0 (#5413)

Added

  • Added Left and Right subject mapping operations (#5337) Thanks to @​sspates for the contribution!
  • Add a /expvarz monitoring endpoint (#5374)

Improved

Accounts

  • Change AccountResolver() to use read lock to prevent contention (#5351)
  • Improve muxed routes with large subject space (#5399)

Gateway

  • Outbound may fail to detect stale connection (#5356) Thanks to @​wjordan for the report!

JetStream

  • Optimize stream subject matching implementation (#5316, #5324, #5329, #5342, #5353)
  • Improve filestore LoadNextMsg performance (#5401)
  • Prevent blocking writes on meta state filestore flush (#5333)
  • Add logging to measure writeFullState and enforceMsgPerSubjectLimit (#5340)
  • Do not hold filestore lock on msg block loads when looking up the first sequence for subject (#5363)
  • Improve various stream sourcing and mirror behaviors and performance (#5366, #5372, #5379, #5389)
  • Increase the compression threshold for Raft traffic (#5371)
  • Put a maximum idle flush time for the filestore (#5370)
  • Updated subject state expiration (#5377)
  • Simplify writing the full state to index.db (#5378)
  • Added in separate last subject timestamp to track access (#5380)
  • Check consumer leader status without locks (#5386)
  • Various Raft improvements with limited to no state (#5427)
  • Improved consumer with AckAll performance of first ack with large first stream sequence (#5446)
  • Various stream catchup improvements (#5454)

WebSocket

  • Improve generating INFO data to send to clients (#5405)

Fixed

... (truncated)

Commits
  • 80e2979 Release v2.10.16 (#5461)
  • b918807 Cherry-picks for 2.10.16 (#5462)
  • 6427a45 Skip trying to send system events just before shutdown
  • c9808f8 Add goroutine annotation for stream internal loop
  • 9273b3d Bump to 2.10.16-RC.3
  • 314f148 Cherry-picks for 2.10.16-RC.3 (#5456)
  • e59f96f [IMPROVED] Various stream catchup improvements (#5454)
  • 57e780f Make sure to not run away when acking from the middle of pending.
  • 571dbf9 Test for block with top level comment after value parse
  • 5286fda Bump to 2.10.16-RC.2
  • Additional commits viewable in compare view

Updates github.com/opencontainers/runc from 1.1.12 to 1.1.13

Changelog

Sourced from github.com/opencontainers/runc's changelog.

[1.1.13] - 2024-06-13

There is no certainty in the world. This is the only certainty I have.

Important Notes

  • If building with Go 1.22.x, make sure to use 1.22.4 or a later version. (see #4233 for more details)

Fixed

  • Support go 1.22.4+. (#4313)
  • runc list: fix race with runc delete. (#4231)
  • Fix set nofile rlimit error. (#4277, #4299)
  • libct/cg/fs: fix setting rt_period vs rt_runtime. (#4284)
  • Fix a debug msg for user ns in nsexec. (#4315)
  • script/*: fix gpg usage wrt keyboxd. (#4316)
  • CI fixes and misc backports. (#4241)
  • Fix codespell warnings. (#4300)

Changed

  • Silence security false positives from golang/net. (#4244)
  • libcontainer: allow containers to make apps think fips is enabled/disabled for testing. (#4257)
  • allow overriding VERSION value in Makefile. (#4270)
  • Vagrantfile.fedora: bump Fedora to 39. (#4261)
  • ci/cirrus: rm centos stream 8. (#4305, #4308)
Commits
  • 58aa920 VERSION: release 1.1.13
  • 2b3a247 Merge pull request #4316 from lifubang/backport-4189
  • 3507ada Merge pull request #4315 from lifubang/backport-4311
  • 0f7150a script/*: fix gpg usage wrt keyboxd
  • 80186fe fix a debug msg for user ns in nsexec
  • 8407d3c Merge pull request #4313 from kolyshkin/1.1-backport-4292
  • 7219e0a Dockerfile: bump Debian to 12, Go to 1.21
  • c9beabc ci: switch to go 1.22 as main version
  • 4578c6c libct/nsenter: stop blacklisting go 1.22+
  • c488d13 use go mod instead of go get in spec.bats
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the go_modules group with 6 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/Azure/azure-sdk-for-go/sdk/azidentity](https://github.com/Azure/azure-sdk-for-go) | `1.5.1` | `1.6.0` |
| [github.com/jackc/pgx/v4](https://github.com/jackc/pgx) | `4.18.2` | `4.18.3` |
| google.golang.org/protobuf | `1.33.0` | `1.34.2` |
| [github.com/docker/docker](https://github.com/docker/docker) | `25.0.3+incompatible` | `25.0.5+incompatible` |
| [github.com/nats-io/nats-server/v2](https://github.com/nats-io/nats-server) | `2.9.23` | `2.10.16` |
| [github.com/opencontainers/runc](https://github.com/opencontainers/runc) | `1.1.12` | `1.1.13` |



Updates `github.com/Azure/azure-sdk-for-go/sdk/azidentity` from 1.5.1 to 1.6.0
- [Release notes](https://github.com/Azure/azure-sdk-for-go/releases)
- [Changelog](https://github.com/Azure/azure-sdk-for-go/blob/main/documentation/release.md)
- [Commits](Azure/azure-sdk-for-go@sdk/internal/v1.5.1...sdk/azcore/v1.6.0)

Updates `github.com/jackc/pgx/v4` from 4.18.2 to 4.18.3
- [Changelog](https://github.com/jackc/pgx/blob/v4.18.3/CHANGELOG.md)
- [Commits](jackc/pgx@v4.18.2...v4.18.3)

Updates `golang.org/x/net` from 0.23.0 to 0.26.0
- [Commits](golang/net@v0.23.0...v0.26.0)

Updates `google.golang.org/protobuf` from 1.33.0 to 1.34.2

Updates `github.com/docker/docker` from 25.0.3+incompatible to 25.0.5+incompatible
- [Release notes](https://github.com/docker/docker/releases)
- [Commits](moby/moby@v25.0.3...v25.0.5)

Updates `github.com/nats-io/nats-server/v2` from 2.9.23 to 2.10.16
- [Release notes](https://github.com/nats-io/nats-server/releases)
- [Changelog](https://github.com/nats-io/nats-server/blob/main/.goreleaser.yml)
- [Commits](nats-io/nats-server@v2.9.23...v2.10.16)

Updates `github.com/opencontainers/runc` from 1.1.12 to 1.1.13
- [Release notes](https://github.com/opencontainers/runc/releases)
- [Changelog](https://github.com/opencontainers/runc/blob/main/CHANGELOG.md)
- [Commits](opencontainers/runc@v1.1.12...v1.1.13)

---
updated-dependencies:
- dependency-name: github.com/Azure/azure-sdk-for-go/sdk/azidentity
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/jackc/pgx/v4
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: golang.org/x/net
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: google.golang.org/protobuf
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/docker/docker
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/nats-io/nats-server/v2
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/opencontainers/runc
  dependency-type: indirect
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jun 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants