Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the go group across 1 directory with 8 updates #5704

Merged
merged 3 commits into from
Jun 7, 2024

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 6, 2024

Bumps the go group with 5 updates in the / directory:

Package From To
github.com/aws/aws-sdk-go-v2/config 1.27.16 1.27.17
github.com/aws/aws-sdk-go-v2/service/marketplacemetering 1.21.8 1.21.9
github.com/cert-manager/cert-manager 1.14.5 1.15.0
github.com/nginxinc/telemetry-exporter 0.0.0-20240429155028-5a630a5eb82a 0.1.0
github.com/prometheus/client_golang 1.18.0 1.19.1

Updates github.com/aws/aws-sdk-go-v2/config from 1.27.16 to 1.27.17

Commits

Updates github.com/aws/aws-sdk-go-v2/service/marketplacemetering from 1.21.8 to 1.21.9

Commits

Updates github.com/cert-manager/cert-manager from 1.14.5 to 1.15.0

Release notes

Sourced from github.com/cert-manager/cert-manager's releases.

v1.15.0

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

cert-manager 1.15 promotes several features to beta, including GatewayAPI support (ExperimentalGatewayAPISupport), the ability to provide a subject in the Certificate that will be used literally in the CertificateSigningRequest (LiteralCertificateSubject) and the outputting of additional certificate formats (AdditionalCertificateOutputFormats).

[!NOTE]

The cmctl binary have been moved to https://github.com/cert-manager/cmctl/releases. For the startupapicheck Job you should update references to point at quay.io/jetstack/cert-manager-startupapicheck

[!NOTE]

From this release, the Helm chart will no longer uninstall the CRDs when the chart is uninstalled. If you want the CRDs to be removed on uninstall use crds.keep=false when installing the Helm chart.

Community

Thanks again to all open-source contributors with commits in this release, including: @​Pionerd, @​SgtCoDFish, @​ThatsMrTalbot, @​andrey-dubnik, @​bwaldrep, @​eplightning, @​erikgb, @​findnature, @​gplessis, @​import-shiburin, @​inteon, @​jkroepke, @​lunarwhite, @​mangeshhambarde, @​pwhitehead-splunk & @​rodrigorfk, @​wallrj.

Thanks also to the following cert-manager maintainers for their contributions during this release: @​SgtCoDFish, @​SpectralHiss, @​ThatsMrTalbot, @​hawksight, @​inteon, @​maelvls & @​wallrj.

Equally thanks to everyone who provided feedback, helped users and raised issues on GitHub and Slack and joined our meetings!

Thanks also to the CNCF, which provides resources and support, and to the AWS open source team for being good community members and for their maintenance of the PrivateCA Issuer.

In addition, massive thanks to Venafi for contributing developer time and resources towards the continued maintenance of cert-manager projects.

Changes by Kind

Feature

  • GatewayAPI support has graduated to Beta. Add the --enable-gateway-api flag to enable the integration. (#6961, @​ThatsMrTalbot)
  • Add support to specify a custom key alias in a JKS Keystore (#6807, @​bwaldrep)
  • Add the ability to communicate with Vault via mTLS when strict client certificates is enabled at Vault server side (#6614, @​rodrigorfk)
  • Added option to provide additional audiences in the service account auth section for vault (#6718, @​andrey-dubnik)
  • Venafi Issuer now sends a cert-manager HTTP User-Agent header in all Venafi Rest API requests. For example: cert-manager-certificaterequests-issuer-venafi/v1.15.0+(linux/amd64)+cert-manager/ef068a59008f6ed919b98a7177921ddc9e297200. (#6865, @​wallrj)
  • Add hint to validation error message to help users of external issuers more easily fix the issue if they specify a Kind but forget the Group (#6913, @​SgtCoDFish)
  • Add support for numeric OID types in LiteralSubject. Eg. "1.2.3.4=String Value" (#6775, @​inteon)
  • Promote the LiteralCertificateSubject feature to Beta. (#7030, @​inteon)
  • Promoted the AdditionalCertificateOutputFormats feature gate to Beta (enabled by default). (#6970, @​erikgb)
  • The Helm chart now allows you to supply extraObjects; a list of yaml manifests which will helm will install and uninstall with the cert-manager manifests. (#6424, @​gplessis)
  • Update the Route53 provider to support fetching credentials using AssumeRoleWithWebIdentity (#6878, @​pwhitehead-splunk)
  • Helm can now add optional hostAliases to cert-manager Pod to allow the DNS self-check to pass in custom scenarios. (#6456, @​Pionerd)
  • Added a new Ingress annotation for copying specific Ingress annotations to Certificate's secretTemplate (#6839, @​mangeshhambarde)
  • Added option to define additional token audiences for the Vault Kubernetes auth (#6744, @​andrey-dubnik)
  • Allow cert-manager.io/allow-direct-injection in annotations (#6801, @​jkroepke)

Design

... (truncated)

Commits
  • 3403251 Merge pull request #7055 from cert-manager-bot/cherry-pick-7052-to-release-1.15
  • b1ac915 Merge pull request #7054 from cert-manager-bot/cherry-pick-7049-to-release-1.15
  • c392ea8 BUGFIX: correctly mount config files for components
  • dfce6b9 if list of controllers only contains disabled controllers, implicitly enable ...
  • dadd37d run 'make generate-helm-docs'
  • c92fb1c add Helm options to extend auto-approval or disable it
  • d3e8db7 Merge pull request #7050 from cert-manager/self-upgrade-release-1.15
  • 8f475f6 BOT: run 'make upgrade-klone' and 'make generate'
  • ebb5281 Merge pull request #7044 from inteon/fix_release_bug
  • 64676af Merge pull request #7034 from cert-manager/self-upgrade-master
  • Additional commits viewable in compare view

Updates github.com/nginxinc/telemetry-exporter from 0.0.0-20240429155028-5a630a5eb82a to 0.1.0

Release notes

Sourced from github.com/nginxinc/telemetry-exporter's releases.

v0.1.0

What's Changed

🚀 Features

🐛 Bug Fixes

🧪 Tests

🔨 Maintenance

📝 Documentation

⬆️ Dependencies

... (truncated)

Commits

Updates github.com/prometheus/client_golang from 1.18.0 to 1.19.1

Release notes

Sourced from github.com/prometheus/client_golang's releases.

v1.19.1

What's Changed

  • Security patches for golang.org/x/sys and google.golang.org/protobuf

New Contributors

Full Changelog: prometheus/client_golang@v1.19.0...v1.19.1

v1.19.0

What's Changed

The module prometheus/common v0.48.0 introduced an incompatibility when used together with client_golang (See prometheus/client_golang#1448 for more details). If your project uses client_golang and you want to use prometheus/common v0.48.0 or higher, please update client_golang to v1.19.0.

  • [CHANGE] Minimum required go version is now 1.20 (we also test client_golang against new 1.22 version). #1445 #1449
  • [FEATURE] collectors: Add version collector. #1422 #1427

New Contributors

Full Changelog: prometheus/client_golang@v1.18.0...v1.19.0

Changelog

Sourced from github.com/prometheus/client_golang's changelog.

Unreleased

1.19.0 / 2023-02-27

The module prometheus/common v0.48.0 introduced an incompatibility when used together with client_golang (See prometheus/client_golang#1448 for more details). If your project uses client_golang and you want to use prometheus/common v0.48.0 or higher, please update client_golang to v1.19.0.

  • [CHANGE] Minimum required go version is now 1.20 (we also test client_golang against new 1.22 version). #1445 #1449
  • [FEATURE] collectors: Add version collector. #1422 #1427
Commits

Updates github.com/prometheus/common from 0.47.0 to 0.48.0

Release notes

Sourced from github.com/prometheus/common's releases.

v0.48.0

This release will require changes of code that relies on direct access to content-type format strings. See the PR linked below for work-arounds. Please file an issue if your use case doesn't work anymore.

What's Changed

Full Changelog: prometheus/common@v0.47.0...v0.48.0

Commits

Updates golang.org/x/exp from 0.0.0-20231226003508-02704c960a9b to 0.0.0-20240506185415-9bf2ced13842

Commits

Updates k8s.io/utils from 0.0.0-20240102154912-e7106e64919e to 0.0.0-20240502163921-fe8a2dddb1d0

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the go group with 5 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/aws/aws-sdk-go-v2/config](https://github.com/aws/aws-sdk-go-v2) | `1.27.16` | `1.27.17` |
| [github.com/aws/aws-sdk-go-v2/service/marketplacemetering](https://github.com/aws/aws-sdk-go-v2) | `1.21.8` | `1.21.9` |
| [github.com/cert-manager/cert-manager](https://github.com/cert-manager/cert-manager) | `1.14.5` | `1.15.0` |
| [github.com/nginxinc/telemetry-exporter](https://github.com/nginxinc/telemetry-exporter) | `0.0.0-20240429155028-5a630a5eb82a` | `0.1.0` |
| [github.com/prometheus/client_golang](https://github.com/prometheus/client_golang) | `1.18.0` | `1.19.1` |



Updates `github.com/aws/aws-sdk-go-v2/config` from 1.27.16 to 1.27.17
- [Release notes](https://github.com/aws/aws-sdk-go-v2/releases)
- [Commits](aws/aws-sdk-go-v2@config/v1.27.16...config/v1.27.17)

Updates `github.com/aws/aws-sdk-go-v2/service/marketplacemetering` from 1.21.8 to 1.21.9
- [Release notes](https://github.com/aws/aws-sdk-go-v2/releases)
- [Commits](aws/aws-sdk-go-v2@service/efs/v1.21.8...service/eks/v1.21.9)

Updates `github.com/cert-manager/cert-manager` from 1.14.5 to 1.15.0
- [Release notes](https://github.com/cert-manager/cert-manager/releases)
- [Changelog](https://github.com/cert-manager/cert-manager/blob/master/RELEASE.md)
- [Commits](cert-manager/cert-manager@v1.14.5...v1.15.0)

Updates `github.com/nginxinc/telemetry-exporter` from 0.0.0-20240429155028-5a630a5eb82a to 0.1.0
- [Release notes](https://github.com/nginxinc/telemetry-exporter/releases)
- [Changelog](https://github.com/nginxinc/telemetry-exporter/blob/main/release-process.md)
- [Commits](https://github.com/nginxinc/telemetry-exporter/commits/v0.1.0)

Updates `github.com/prometheus/client_golang` from 1.18.0 to 1.19.1
- [Release notes](https://github.com/prometheus/client_golang/releases)
- [Changelog](https://github.com/prometheus/client_golang/blob/main/CHANGELOG.md)
- [Commits](prometheus/client_golang@v1.18.0...v1.19.1)

Updates `github.com/prometheus/common` from 0.47.0 to 0.48.0
- [Release notes](https://github.com/prometheus/common/releases)
- [Changelog](https://github.com/prometheus/common/blob/main/RELEASE.md)
- [Commits](prometheus/common@v0.47.0...v0.48.0)

Updates `golang.org/x/exp` from 0.0.0-20231226003508-02704c960a9b to 0.0.0-20240506185415-9bf2ced13842
- [Commits](https://github.com/golang/exp/commits)

Updates `k8s.io/utils` from 0.0.0-20240102154912-e7106e64919e to 0.0.0-20240502163921-fe8a2dddb1d0
- [Commits](https://github.com/kubernetes/utils/commits)

---
updated-dependencies:
- dependency-name: github.com/aws/aws-sdk-go-v2/config
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: go
- dependency-name: github.com/aws/aws-sdk-go-v2/service/marketplacemetering
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: go
- dependency-name: github.com/cert-manager/cert-manager
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: go
- dependency-name: github.com/nginxinc/telemetry-exporter
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: go
- dependency-name: github.com/prometheus/client_golang
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: go
- dependency-name: github.com/prometheus/common
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: go
- dependency-name: golang.org/x/exp
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: go
- dependency-name: k8s.io/utils
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: go
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot requested a review from a team as a code owner June 6, 2024 17:51
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jun 6, 2024
@AlexFenlon AlexFenlon force-pushed the dependabot/go_modules/go-2c98a3ff55 branch from 2a33edb to 3bc94b8 Compare June 7, 2024 15:06
Signed-off-by: AlexFenlon <a.fenlon@f5.com>
@AlexFenlon AlexFenlon force-pushed the dependabot/go_modules/go-2c98a3ff55 branch from f8ba2c7 to 8268f74 Compare June 7, 2024 15:11
@AlexFenlon AlexFenlon merged commit 0a71971 into main Jun 7, 2024
78 checks passed
@AlexFenlon AlexFenlon deleted the dependabot/go_modules/go-2c98a3ff55 branch June 7, 2024 15:45
ssrahul96 pushed a commit to ssrahul96/kubernetes-ingress that referenced this pull request Jun 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants