Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[main] Upgrade to latest dependencies #1488

Merged

Conversation

knative-automation
Copy link
Contributor

Cron -knative-prow-robot

/cc knative/operations-wg-leads
/assign knative/operations-wg-leads

Produced by: knative-sandbox/knobots/actions/update-deps

@knative-prow knative-prow bot requested a review from a team July 7, 2023 02:02
@knative-prow knative-prow bot added the size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. label Jul 7, 2023
@codecov
Copy link

codecov bot commented Jul 7, 2023

Codecov Report

Patch and project coverage have no change.

Comparison is base (a25b890) 79.32% compared to head (805657d) 79.32%.

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #1488   +/-   ##
=======================================
  Coverage   79.32%   79.32%           
=======================================
  Files          40       40           
  Lines        1775     1775           
=======================================
  Hits         1408     1408           
  Misses        267      267           
  Partials      100      100           

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

@knative-automation knative-automation force-pushed the auto-updates/update-deps-main branch 4 times, most recently from 985956e to 805657d Compare July 11, 2023 01:50
bumping knative.dev/eventing eaf28a7...ed05a35:%0A  > ed05a35 Revert "Add loopclosure linter" (# 7083)%0A  > 838274e [main] Upgrade to latest dependencies (# 7078)%0A  > a4f0c10 [main] Update community files (# 7085)%0A  > afcf60b Move ingress & filter TLS secret names into constants (# 7081)%0A  > 1e96c78 feat!: Add tls support for ingress (# 6986)%0A  > 6a0495c Add loopclosure linter (# 7079)%0A  > 2fe1db6 Updated mtping TLS cert test to bind to free port (# 7036)%0A  > 516a915 Upgrade rekt to latest (# 7076)%0A  > 6a890e0 Fix flaky unit tests (# 7080)%0Abumping knative.dev/networking b9dd5c2...b2cce92:%0A  > b2cce92 Update community files (# 823)%0A  > 1431d70 Bump google.golang.org/grpc to the latest version (# 821)%0A  > 91821ae Update community files (# 819)%0A  > 3a75df5 upgrade to latest dependencies (# 817)%0Abumping golang.org/x/mod b710602...69aa7ac:%0A  > 69aa7ac sumdb/tlog: fuzz tests for parsers%0Abumping golang.org/x/oauth2 adbaf66...839de22:%0A  > 839de22 google: don't check for IsNotExist for well-known file%0A  > 0690208 go.mod: update golang.org/x dependencies%0A  > 451d5d6 internal: remove repeated definite articles%0A  > cfe200d oauth2: parse RFC 6749 error response%0A  > 3607514 go.mod: update golang.org/x dependencies%0A  > 4abfd87 google: add CredentialsParams.EarlyTokenRefresh%0A  > 1e7f329 oauth2: add ReuseTokenSourceWithExpiry%0A  > 86850e0 oauth2: fix typo%0A  > a6e37e7 google: Updating 3pi documentation%0A  > 54b70c8 google: update missing auth help URL%0A  > 2fc4ef5 README: encourage issues and proposals before changes%0A  > 62b4eed go.mod: update golang.org/x dependencies%0A  > 885f294 google: Add support for OAuth2 token exchange over mTLS%0A  > 6f9c1a1 google: use Credentials instead of deprecated DefaultCredentials%0A  > c82d0e1 google/internal/externalaccount: Removed URL validation for google URLs in ADC files%0Abumping golang.org/x/net dfa2b5d...c73c09c:%0A  > c73c09c go.mod: update golang.org/x dependencies%0A  > 4fc2eb9 http2: revert Transport change from CL 486156%0A  > 63727cc http2: validate Host header before sending%0A  > 1bb09e6 quic: pass the connection ID length into 1-RTT packet parsing%0A  > 952fc9c quic: move ack_delay_exponent handling out of frame parsing%0A  > 02fe9a5 quic: loss detection%0A  > c8a2c5a quic: remove stray debugging print%0A  > 5d50b40 quic: add packetFate enum%0A  > ee81e8c quic: correct rttvar updates%0A  > ab184e6 quic: rename side type to connSide%0A  > 508a573 quic: add congestion controller%0A  > 4050002 html: handle equals sign before attribute%0A  > f5464dd idna: update for Unicode 15.0.0%0A  > 6c96ca5 go.mod: update golang.org/x dependencies%0A  > 5541298 quic: add packet pacer%0A  > 88a50b6 all: update x/sys to HEAD%0A  > 7e6923f quic: add RTT estimator%0A  > 2796e09 bpf: check for little endian CPU for OS VM comparison%0A  > 10cf388 quic: add a data structure for tracking lists of sent packets%0A  > ccc217c quic: parameterize rangeset%0A  > f16447c quic: add go1.21 build constraint%0A  > f7250ea quic: add a type tracking sent values%0A  > 1b5a2d8 quic: packet encoding/decoding%0A  > a233290 quic: add a data structure for tracking sent packets%0A  > 61d852e quic: error codes and types%0A  > d40f154 quic: varint encoding and decoding%0A  > 10d9069 quic: add rangeset type%0A  > f71a821 quic: packet protection%0A  > 6488c8f quic: basic packet operations%0A  > d4a2c13 quic: packet number encoding/decoding%0A  > 0d6f3cb quic: add various useful common constants and types%0A  > ee6956f quic: add internal/quic package%0A  > 6826f5a http2: close request bodies before RoundTrip error return%0A  > ca96da6 dns/dnsmessage: reject names with dots inside label%0A  > 056145c net/http: deflake TestTransportRetryAfterGOAWAY%0A  > abee42a http2: deflake TestTransportReuseAfterError%0A  > 3b31286 ipv4,ipv6: remove unneeded deadlines added for flaky tests%0A  > 23ce3b8 http2: disable Content-Length when nilled%0A  > 120fc90 http2: change default frame scheduler to round robin%0A  > 2b0b97d dns/dnsmessage: reject packing of 255B rooted names, reject unpacking of 256B (dns encoded) names%0A  > d28c0b1 all: fix some comments%0A  > daac0ce go.mod: update golang.org/x dependencies%0A  > 82780d6 http2: don't reuse connections that are experiencing errors%0A  > 0bfab66 ipv4, ipv6: drop redundant skip checks based on GOOS%0A  > 938ff15 ipv4, ipv6, nettest: skip unsupported tests on wasip1%0A  > eb1572c html: another shot at security doc%0A  > 9001ca7 nettest: re-enable unixpacket tests on netbsd/386%0A  > 3d5a8ee internal/socks: permit authenticating with an empty password%0A  > 694cff8 go.mod: update golang.org/x dependencies%0A  > 6960703 http2: log the correct error when retrying in (*Transport).RoundTripOpt%0A  > 9f24bb4 http2: properly discard data received after request/response body is closed%0A  > 08dda57 html: fix package doc typo

Signed-off-by: Knative Automation <[email protected]>
Copy link
Contributor

@houshengbo houshengbo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@knative-prow knative-prow bot added the lgtm Indicates that a PR is ready to be merged. label Jul 11, 2023
@knative-prow
Copy link

knative-prow bot commented Jul 11, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: houshengbo, knative-automation

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@knative-prow knative-prow bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jul 11, 2023
@houshengbo
Copy link
Contributor

/test eventing-upgrade-tests

@knative-prow knative-prow bot merged commit 0eb39eb into knative:main Jul 11, 2023
16 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants