-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[main] Upgrade to latest dependencies #418
[main] Upgrade to latest dependencies #418
Conversation
bumping golang.org/x/oauth2 0708528...3c5dbf0: > 3c5dbf0 go.mod: update golang.org/x dependencies > 11625cc google: add authorized_user conditional to Credentials.UniverseDomain > 8d6d45b google: add Credentials.UniverseDomain to support TPC > 43b6a7b google: adding support for external account authorized user > 14b275c oauth2: workaround misspelling of verification_uri > 18352fc google/internal/externalaccount: adding BYOID Metrics > 9095a51 oauth2: clarify error if endpoint missing DeviceAuthURL > 2d9e4a2 oauth2/google: remove meta validations for aws external credentials > 55cd552 oauth2: support PKCE > e3fb0fb oauth2: support device flow bumping knative.dev/pkg bae23eb...ca8c009: > ca8c009 Add Reconciler for kube v1.Service (# 2858) > e2256bd Bump golang.org/x/oauth2 from 0.12.0 to 0.13.0 (# 2852) > cd747e2 Update community files (# 2857) bumping golang.org/x/net 2a0da8b...88194ad: > 88194ad go.mod: update golang.org/x dependencies > 2b60a61 quic: fix several bugs in flow control accounting > 73d82ef quic: handle DATA_BLOCKED frames > 5d5a036 quic: handle streams moving from the data queue to the meta queue > 350aad2 quic: correctly extend peer's flow control window after MAX_DATA > 21814e7 quic: validate connection id transport parameters > a600b35 quic: avoid redundant MAX_DATA updates > ea63359 http2: check stream body is present on read timeout > ddd8598 quic: version negotiation > 3b0ab98 quic: avoid deadlock on listener close > 732b4bc quic: report initial TLS errors > 8add2e1 quic: enforce AEAD integrity limit > 7c40cbd dns/dnsmessage: use map[string]uint16 instead of map[string]int > b3f1f23 quic: initiate key updates > 18f2095 quic: handle peer-initiated key updates > 008c0af quic: refactor keys for key updates > 6a4de22 quic: connection lifetime management > ea4a2ff quic: fix detection of reserved bits in 1-RTT packets > 47caaff quic: send and receive UDP datagrams > 02eb0f3 quic: avoid deadlock when updating inbound conn-level flow control > 57bce0e quic: move packetType.String out of test-only code > cae7dab quic: outbound connection-level flow control > 217377b quic: inbound connection-level flow control > 044c308 quic: check for packet overflow when writing MAX_STREAMS > 5401f76 quic: test lost bidi MAX_STREAMS frame handling > da5f9f7 quic: don't block Writes on stream-level flow control > c3c6260 quic: simplify gate operations > 717519d quic: limits on the number of open streams > 94087ad dns/dnsmessage: mention that Name in non-escaped bumping knative.dev/hack 1588988...fc76874: > fc76874 Update community files (# 333) bumping golang.org/x/crypto 0d375be...e3cc52e: > e3cc52e go.mod: update golang.org/x dependencies > 833695f ssh: add server side support for ping@openssh.com protocol extension > ec07f4e chacha20: drop Go 1.10 compatibility for arm64 > b665ba6 all: use crypto/ed25519 instead of golang.org/x/crypto/ed25519 > a1aeb9b ssh: add test cases for compatibility with old (buggy) clients > 28c53ff ssh: add MultiAlgorithmSigner > 3f0842a sha3: have ShakeHash extend hash.Hash > e90f1e1 cryptobyte: add uint48 methods > d359caa ssh: support for marshaling keys using the OpenSSH format > c5370d2 ssh: check the declared public key algo against decoded one bumping golang.org/x/term f413282...ea6303a: > ea6303a go.mod: update golang.org/x dependencies bumping golang.org/x/sys 5154691...2964e1e: > 2964e1e unix: remove unused readlen and writelen > 3186bae windows: remove the 8192-codepoint arg limit in FuzzComposeCommandLine > 807530f unix: remove lists of unimplemented syscalls > 01c413d windows: document the return type mismatch for CommandLineToArgv > e649453 windows: convert TestCommandLineRecomposition to a fuzz test and fix discrepancies > 8858c72 unix: update riscv_hwprobe constants > 71c9d87 windows: add console ConPTY API > aa9470e unix/linux: update to Linux kernel 6.5 > c7ff727 unix: fix double copy in (*SockaddrALG).sockaddr > c7cbcbb unix: add TestSockaddrALG > 8d9dcc4 unix: modernize test helpers > a26c6de unix: use errnoErr in generated wrappers on solaris > f3ef2d1 cpu: remove the use of ioutil > 5a17dda unix: remove the use of ioutil > 38ebf41 cpu: fix wrong cache line size of riscv64 > fdc7ef4 all: remove ioutil usage from tests > fc717d3 unix: remove usage of ioutil.TempFile in tests > cb4ecd9 unix: use filepath in tests where appropriate > 4848eb0 windows,windows\svc,windows\svc\mgr: use unsafe.Slice instead of unsafeheader.Slice > 0e97d69 all: use t.TempDir in tests > 0514fec unix: rm unused zos test helper functions > bfd1ebb unix: remove unused ptracePtr on darwin > 81cb935 unix, windows: use ^TestName$ regular pattern for invoking a single test bumping knative.dev/networking 53ba1f4...cf57a57: > cf57a57 Update community files (# 873) bumping knative.dev/eventing 9de5275...029b340: > 029b340 Remove unnecessary filter accumulation logic (# 7325) > fb494d1 [main] Update community files (# 7342) > ba02f4a [main] Upgrade to latest dependencies (# 7340) bumping knative.dev/serving 7bcf034...ea603c9: > ea603c9 Update community files (# 14497) > 6b44b87 upgrade to latest dependencies (# 14493) > 596d785 Update net-gateway-api nightly (# 14483) Signed-off-by: Knative Automation <automation@knative.team>
69a77e0
to
3bbb2e2
Compare
Codecov Report
@@ Coverage Diff @@
## main #418 +/- ##
=======================================
Coverage 40.02% 40.02%
=======================================
Files 17 17
Lines 742 742
=======================================
Hits 297 297
Misses 441 441
Partials 4 4 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: creydr, knative-automation The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Cron -knative-prow-robot
/cc knative-extensions/eventing-writers
/assign knative-extensions/eventing-writers
Produced by: knative-extensions/knobots/actions/update-deps