-
Notifications
You must be signed in to change notification settings - Fork 89
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NO-ISSUE: Bump the go-security-dependencies group with 4 updates #932
base: master
Are you sure you want to change the base?
NO-ISSUE: Bump the go-security-dependencies group with 4 updates #932
Conversation
@dependabot[bot]: This pull request explicitly references no jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
2 similar comments
@dependabot[bot]: This pull request explicitly references no jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
1 similar comment
@dependabot[bot]: This pull request explicitly references no jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
e104448
to
6d77da3
Compare
New changes are detected. LGTM label has been removed. |
6d77da3
to
2d6ccb4
Compare
[APPROVALNOTIFIER] This PR is APPROVED Approval requirements bypassed by manually added approval. This pull-request has been approved by: dependabot[bot] The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Bumps the go-security-dependencies group with 4 updates: [github.com/containerd/containerd](https://github.com/containerd/containerd), [github.com/golang-jwt/jwt/v4](https://github.com/golang-jwt/jwt), [github.com/golang/glog](https://github.com/golang/glog) and [golang.org/x/net](https://github.com/golang/net). Updates `github.com/containerd/containerd` from 1.7.12 to 1.7.27 - [Release notes](https://github.com/containerd/containerd/releases) - [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md) - [Commits](containerd/containerd@v1.7.12...v1.7.27) Updates `github.com/golang-jwt/jwt/v4` from 4.5.0 to 4.5.1 - [Release notes](https://github.com/golang-jwt/jwt/releases) - [Changelog](https://github.com/golang-jwt/jwt/blob/main/VERSION_HISTORY.md) - [Commits](golang-jwt/jwt@v4.5.0...v4.5.1) Updates `github.com/golang/glog` from 1.2.0 to 1.2.4 - [Release notes](https://github.com/golang/glog/releases) - [Commits](golang/glog@v1.2.0...v1.2.4) Updates `golang.org/x/net` from 0.33.0 to 0.36.0 - [Commits](golang/net@v0.33.0...v0.36.0) --- updated-dependencies: - dependency-name: github.com/containerd/containerd dependency-type: indirect dependency-group: go-security-dependencies - dependency-name: github.com/golang-jwt/jwt/v4 dependency-type: indirect dependency-group: go-security-dependencies - dependency-name: github.com/golang/glog dependency-type: indirect dependency-group: go-security-dependencies - dependency-name: golang.org/x/net dependency-type: indirect dependency-group: go-security-dependencies ... Signed-off-by: dependabot[bot] <[email protected]>
2d6ccb4
to
fee6e8b
Compare
@dependabot[bot]: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Bumps the go-security-dependencies group with 4 updates: github.com/containerd/containerd, github.com/golang-jwt/jwt/v4, github.com/golang/glog and golang.org/x/net.
Updates
github.com/containerd/containerd
from 1.7.12 to 1.7.27Release notes
Sourced from github.com/containerd/containerd's releases.
... (truncated)
Commits
05044ec
Merge commit from fork0b7f2a5
Merge pull request #11540 from dmcgowan/prepare-1.7.27574a304
Merge pull request #11538 from dmcgowan/backport-113271be04be
Prepare release notes for v1.7.2782b5c43
core/remotes: Handle attestations in MakeRefKey2c670e7
core/images: Ignore attestations when traversing children11504c3
validate uid/gid576178b
Merge pull request #11515 from akhilerm/1.7-updatego1.24.1a39863c
update build to go1.23.7, test go1.24.18946aa0
Merge pull request #11499 from djdongjin/1-7-remove-hashi-multierrorUpdates
github.com/golang-jwt/jwt/v4
from 4.5.0 to 4.5.1Release notes
Sourced from github.com/golang-jwt/jwt/v4's releases.
Commits
7b1c1c0
Merge commit from forkUpdates
github.com/golang/glog
from 1.2.0 to 1.2.4Release notes
Sourced from github.com/golang/glog's releases.
Commits
a0e3c40
glog: have createInDir fail if the file already exists7139da2
glog: introduce createInDir function as in internal versiondd58629
glog: Don't try to create/rotate a given syncBuffer twice in the same second04dbec0
glog: fix typo (#73)459cf3b
glog: check that stderr is valid before using it by default (#72)9730314
glog: avoid calling user.Current() on windows (#69)861d094
glog: don't hold mutex when sync'ing (#68)Updates
golang.org/x/net
from 0.33.0 to 0.36.0Commits
85d1d54
go.mod: update golang.org/x dependenciescde1dda
proxy, http/httpproxy: do not mismatch IPv6 zone ids against hostsfe7f039
publicsuffix: spruce up code gen and speed up PublicSuffix459513d
internal/http3: move more common stream processing to genericConnaad0180
http2: fix flakiness from t.Log when GOOS=jsb73e574
http2: don't log expected errors from writing invalid trailers5f45c77
internal/http3: make read-data tests usable for server handlers43c2540
http2, internal/httpcommon: reject userinfo in :authority1d78a08
http2, internal/httpcommon: factor out server header logic for h2/h30d7dc54
quic: add Conn.ConnectionStateDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditionsYou can disable automated security fix PRs for this repo from the Security Alerts page.