Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the golang group across 1 directory with 22 updates #890

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 4, 2025

Bumps the golang group with 13 updates in the / directory:

Package From To
github.com/cert-manager/cert-manager 1.16.2 1.17.0
github.com/vmware-tanzu/velero 1.15.1 1.15.2
golang.org/x/mod 0.22.0 0.23.0
k8s.io/api 0.32.0 0.32.1
k8s.io/apiextensions-apiserver 0.32.0 0.32.1
sigs.k8s.io/controller-runtime 0.19.4 0.20.1
github.com/evanphx/json-patch/v5 5.9.0 5.9.11
github.com/prometheus/common 0.61.0 0.62.0
github.com/spf13/pflag 1.0.5 1.0.6
golang.org/x/oauth2 0.24.0 0.26.0
golang.org/x/sys 0.29.0 0.30.0
golang.org/x/term 0.28.0 0.29.0
golang.org/x/text 0.21.0 0.22.0

Updates github.com/cert-manager/cert-manager from 1.16.2 to 1.17.0

Release notes

Sourced from github.com/cert-manager/cert-manager's releases.

v1.17.0

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

v1.17.0 is a feature release with several improvements, including:

  • A helpful compliance change to RSA signatures on certificates
  • An easier way to specify passwords for PKCS#12 and JKS keystores
  • A few feature flag promotions (and a deprecation)
  • Dependency bumps and other smaller improvements

Major Themes

RSA Certificate Compliance

The United States Department of Defense published a memo in 2022 which introduced some requirements on the kinds of cryptography they require to be supported in software they use.

In effect, the memo requires that software be able to support larger RSA keys (3072-bit and 4096-bit) and hashing algorithms (SHA-384 at a minimum).

cert-manager supported large RSA keys long before the memo was published, but a quirk in implementation meant that cert-manager always used SHA-256 when signing with RSA.

In v1.17.0, cert-manager will choose a hash algorithm based on the RSA key length: 3072-bit keys will use SHA-384, and 4096-bit keys will use SHA-512. This matches similar behavior already present for ECDSA signatures.

Our expectation is that this change will have minimal impact beyond a slight increase to security and better compliance; we're not aware of Kubernetes based environments which support RSA 2048 with SHA-256 but fail with RSA 4096 and SHA-512. However, if you're using larger RSA keys, you should be aware of the change.

Easier Keystore Passwords for PKCS#12 and JKS

Specifying passwords on PKCS#12 and JKS keystores is supported in cert-manager for compatibility reasons with software which expects or requires passwords to be set; however, these passwords are not relevant to security and never have been in cert-manager.

The initial implementation of the keystores feature required these "passwords" to be stored in a Kubernetes secret, which would then be read by cert-manager when creating the keystore after a certificate was issued. This is cumbersome, especially when many passwords are set to default values such as changeit or password.

In cert-manager v1.17, it's now possible to set a keystore password using a literal string value inside the Certificate resource itself, making this process much easier with no change to security.

For example:

apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
  name: my-cert-password
spec:
  secretName: my-cert-password
  issuerRef:
    name: my-issuer
    kind: ClusterIssuer
  keystores:
    jks:
      create: true
      password: "abc123"
    pkcs12:
</tr></table> 

... (truncated)

Commits
  • 4562b9a Merge pull request #6657 from rquinio1A/feature/keystore-password-litteral
  • c6f3f0c Merge pull request #7527 from SgtCoDFish/upgrade-test-tweaks
  • 40cd2a0 Add support for setting literal keystore passwords in Certificates
  • 1747743 Merge pull request #7530 from SgtCoDFish/dns-test-integration
  • 8233733 split tests using 'live' DNS into separate package
  • 5e5ad2f Merge pull request #7529 from SgtCoDFish/bump-base
  • a522470 Merge pull request #7428 from jsoref/shorten-skipping-controller-messages
  • 2154402 bump base images to latest
  • 637eab3 Simplify skipping controller messages
  • c003da2 Merge pull request #7428 from jsoref/shorten-skipping-controller-messages
  • Additional commits viewable in compare view

Updates github.com/vmware-tanzu/velero from 1.15.1 to 1.15.2

Release notes

Sourced from github.com/vmware-tanzu/velero's releases.

v1.15.2

Download

https://github.com/vmware-tanzu/velero/releases/tag/v1.15.2

Container Image

velero/velero:v1.15.2

Documentation

https://velero.io/docs/v1.15/

Upgrading

https://velero.io/docs/v1.15/upgrade-to-1.15/

All Changes

  • fix(pkg/repository/maintenance): don't panic when there's no container statuses (#8568, @​mcluseau)
  • Don't include excluded items in ItemBlocks (#8585, @​kaovilai)
  • Check the PVB status via podvolume Backupper rather than calling API server to avoid API server issue (#8596, @​ywk253100)

v1.15.2-rc.1

v1.15.2

Download

https://github.com/vmware-tanzu/velero/releases/tag/v1.15.2-rc.1

Container Image

velero/velero:v1.15.2-rc.1

Documentation

https://velero.io/docs/v1.15/

Upgrading

https://velero.io/docs/v1.15/upgrade-to-1.15/

All Changes

  • fix(pkg/repository/maintenance): don't panic when there's no container statuses (#8568, @​mcluseau)
  • Don't include excluded items in ItemBlocks (#8585, @​kaovilai)
  • Check the PVB status via podvolume Backupper rather than calling API server to avoid API server issue (#8596, @​ywk253100)
Commits
  • 804d73c Merge pull request #8601 from Lyndon-Li/release-1.15
  • 3d3de7f 1.15.2 change-log
  • d2f6c18 Merge pull request #8596 from ywk253100/20250109_pvb
  • 25b5c44 Check the PVB status via podvolume Backupper rather than calling API server t...
  • 7db8761 Merge pull request #8586 from Lyndon-Li/release-1.15
  • b88b543 1.15.2 change-log
  • 9068c90 Merge pull request #8585 from kaovilai/expvsFromBackupr1.15
  • d5ef00a Don't include excluded items in ItemBlocks
  • 674e397 Merge pull request #8570 from Lyndon-Li/release-1.15
  • 1a36d22 1.15.2 changelog
  • Additional commits viewable in compare view

Updates golang.org/x/mod from 0.22.0 to 0.23.0

Commits

Updates k8s.io/api from 0.32.0 to 0.32.1

Commits
  • bc0564c Update dependencies to v0.32.1 tag
  • 25d8df3 Merge pull request #129544pohly/automated-cherry-pick-of-#129543
  • 5b9e013 DRA API: bump maximum size of ReservedFor to 256
  • See full diff in compare view

Updates k8s.io/apiextensions-apiserver from 0.32.0 to 0.32.1

Commits

Updates k8s.io/apimachinery from 0.32.0 to 0.32.1

Commits

Updates k8s.io/client-go from 0.32.0 to 0.32.1

Commits

Updates sigs.k8s.io/controller-runtime from 0.19.4 to 0.20.1

Release notes

Sourced from sigs.k8s.io/controller-runtime's releases.

v0.20.1

What's Changed

Full Changelog: kubernetes-sigs/controller-runtime@v0.20.0...v0.20.1

v0.20.0

Highlights

  • Based on k8s.io/* v1.32 libraries and minimum Go version is now v1.23
  • New experimental priority queue feature
    • More details in #3013 and #2374
    • Can be enabled via manager.Options.Controller.UsePriorityQueue
    • Please give it a try and provide feedback in #2374
  • AggregatedDiscovery is automatically used when available (#2901)
  • As usual, many improvements to the fake client

Changes since v0.19.0

⚠️ Breaking Changes

  • Bump to k8s.io/* v1.32 libraries (#2971 #2990 #3001 #3007 #3029 #3043)
  • logging: Stop deduplicating API warnings by default (#2953)
  • webhook: Stop deleting unknown fields in CustomDefaulter (#2982 #3056)
  • webhook: Remove deprecated Defaulter and Validator (#2877 #2945)
  • cluster: Remove deprecated SyncPeriod option (#2970)

✨ New Features

  • cache: Add EnableWatchBookmarks option (defaults to true) (#3017)
  • cache: Export NewInformer option (#3061)
  • cert-watcher: Add polling (#3020 #3050)
  • controller: Add experimental priority queue (off per default) (#3013 #3014 #3060 #3066)
  • fake client: Allow adding indexes at runtime (#3021)
  • fake client: Add support for ServiceAccountToken subresource (#2969)
  • restmapper: Use AggregatedDiscovery if available (#2901)
  • util: Add HasOwnerReference func (#2882)
  • webhook: Add custom path option (#2998)

🐛 Bug Fixes

  • controller: Error when source.Start() never returns (#2997 #3006 #3008)
  • fake client: Don't return items on invalid selector (#3022)
  • fake client: Fix TOCTOU races (#2980)
  • fake client: Preserve TypeMeta during Get call with PartialObjectMeta (#2949)

... (truncated)

Commits
  • 626b2f3 Merge pull request #3089 from k8s-infra-cherrypick-robot/cherry-pick-3085-to-...
  • 64cb665 bug: Priorityqueue: Yet another queue_depth metric fix
  • 791b6c9 Merge pull request #3088 from k8s-infra-cherrypick-robot/cherry-pick-3075-to-...
  • 99a4044 🌱 Add debug logging for the state of the priority queue
  • f33705e [release-0.20] 🐛fix(controller): support WaitForSync in custom TypedSyncingSo...
  • 571c31a Merge pull request #3079 from k8s-infra-cherrypick-robot/cherry-pick-3078-to-...
  • 8d66e89 cache: clone maps to prevent data race when concurrently creating caches usin...
  • aa3f342 [release-0.20] 🐛 Check to see if custom source implements fmt.Stringer when l...
  • 8f7e114 Merge pull request #3074 from sbueringer/pr-fix-fake-list
  • 3b23354 fake client: preserve TypeMeta during List call with UnstructuredList
  • Additional commits viewable in compare view

Updates github.com/evanphx/json-patch/v5 from 5.9.0 to 5.9.11

Release notes

Sourced from github.com/evanphx/json-patch/v5's releases.

v5.9.11

What's Changed

Full Changelog: evanphx/json-patch@v5.9.10...v5.9.11

v5.9.10

What's Changed

New Contributors

Full Changelog: evanphx/json-patch@v5.9.0...v5.9.10

Commits
  • 84a4bb1 Merge pull request #209 from skitt/export-errs-v5
  • 7a7a88a Export errBadJSONDoc and errBadJSONPatch errors
  • bd18525 Upgrade go-flags
  • 42f26cb Fix spacing
  • 0a3482b Merge pull request #206 from koba1t/remove_unmaintained_error_pkg
  • 106306d remove unmaintained errors pkg
  • e7cfbbb Merge pull request #203 from skitt/drop-gopkgin-v5
  • 61e1ad7 Drop the reference to gopkg.in for v5
  • See full diff in compare view

Updates github.com/klauspost/compress from 1.17.9 to 1.17.11

Release notes

Sourced from github.com/klauspost/compress's releases.

v1.17.11

What's Changed

New Contributors

Full Changelog: klauspost/compress@v1.17.10...v1.17.11

v1.17.10

What's Changed

New Contributors

Full Changelog: klauspost/compress@v1.17.9...v1.17.10

Commits

Updates github.com/prometheus/client_golang from 1.20.4 to 1.20.5

Release notes

Sourced from github.com/prometheus/client_golang's releases.

v1.20.5 / 2024-10-15

We decided to revert the testutil change that made our util functions less error-prone, but created a lot of work for our downstream users. Apologies for the pain! This revert should not cause any major breaking change, even if you already did the work--unless you depend on the exact error message.

Going forward, we plan to reinforce our release testing strategy [1],[2] and deliver an enhanced testutil package/module with more flexible and safer APIs.

Thanks to @​dashpole @​dgrisonnet @​kakkoyun @​ArthurSens @​vesari @​logicalhan @​krajorama @​bwplotka who helped in this patch release! 🤗

Changelog

[BUGFIX] testutil: Reverted #1424; functions using compareMetricFamilies are (again) only failing if filtered metricNames are in the expected input. #1645

Changelog

Sourced from github.com/prometheus/client_golang's changelog.

1.20.5 / 2024-10-15

  • [BUGFIX] testutil: Reverted #1424; functions using compareMetricFamilies are (again) only failing if filtered metricNames are in the expected input.
Commits

Updates github.com/prometheus/common from 0.61.0 to 0.62.0

Release notes

Sourced from github.com/prometheus/common's releases.

v0.62.0

⚠️ This releases switches internal global to UTF8Validation from LegacyValidation. This is a breaking change, relaxing the validation. We don't intend to add more schemas and we have to have a global for unmarshalling interfaces, thus the change was made ⚠️

What's Changed

New Contributors

Full Changelog: prometheus/common@v0.61.0...v0.62.0

Commits
  • 280b0e7 http_config: Allow customizing TLS config and settings. (#748)
  • aea8919 Update common Prometheus files (#747)
  • 8d916fa Bump golang.org/x/net from 0.32.0 to 0.33.0 (#743)
  • fe88605 Bump google.golang.org/protobuf from 1.35.2 to 1.36.1 (#744)
  • 5d9961d Update common Prometheus files (#742)
  • 0a89b98 Merge pull request #740 from dashpole/update_om_links
  • e3926e2 update links to openmetrics to reference the v1.0.0 release
  • d88ee1f Remove deprecated sigv4 module (#737)
  • c3fdb17 Remove deprecated promlog package (#738)
  • cf5f48f Change default validation scheme to UTF8Validation (#724)
  • See full diff in compare view

Updates github.com/spf13/pflag from 1.0.5 to 1.0.6

Release notes

Sourced from github.com/spf13/pflag's releases.

v1.0.6

What's Changed

New Contributors

Full Changelog: spf13/pflag@v1.0.5...v1.0.6

Commits

Updates golang.org/x/oauth2 from 0.24.0 to 0.26.0

Commits
  • b9c813b google: add warning about externally-provided credentials
  • 49a531d all: make method and struct comments match the names
  • See full diff in compare view

Updates golang.org/x/sys from 0.29.0 to 0.30.0

Commits
  • 863b3c4 unix: update glibc to 2.41
  • 4d4692e unix: add Auxv
  • b215a1c unix: update to Linux kernel 6.13
  • c756214 cpu: add support for AVX-VNNI and IFMA detection
  • 1c14dca unix: add GetPeerUcred and UcredGet for solaris
  • See full diff in compare view

Updates golang.org/x/term from 0.28.0 to 0.29.0

Commits

Updates golang.org/x/text from 0.21.0 to 0.22.0

Commits

Updates golang.org/x/time from 0.7.0 to 0.8.0

Commits

Updates google.golang.org/protobuf from 1.35.2 to 1.36.1

Updates k8s.io/kube-openapi from 0.0.0-20241105132330-32ad38e42d3f to 0.0.0-20241212222426-2c72e554b1e7

Commits

Updates k8s.io/utils from 0.0.0-20241104100929-3ea5e8cea738 to 0.0.0-20241210054802-24370beab758

Commits

Updates sigs.k8s.io/json from 0.0.0-20241010143419-9aa6b5e7a4b3 to 0.0.0-20241014173422-cfa47c3a1cc8

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the golang group with 13 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/cert-manager/cert-manager](https://github.com/cert-manager/cert-manager) | `1.16.2` | `1.17.0` |
| [github.com/vmware-tanzu/velero](https://github.com/vmware-tanzu/velero) | `1.15.1` | `1.15.2` |
| [golang.org/x/mod](https://github.com/golang/mod) | `0.22.0` | `0.23.0` |
| [k8s.io/api](https://github.com/kubernetes/api) | `0.32.0` | `0.32.1` |
| [k8s.io/apiextensions-apiserver](https://github.com/kubernetes/apiextensions-apiserver) | `0.32.0` | `0.32.1` |
| [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime) | `0.19.4` | `0.20.1` |
| [github.com/evanphx/json-patch/v5](https://github.com/evanphx/json-patch) | `5.9.0` | `5.9.11` |
| [github.com/prometheus/common](https://github.com/prometheus/common) | `0.61.0` | `0.62.0` |
| [github.com/spf13/pflag](https://github.com/spf13/pflag) | `1.0.5` | `1.0.6` |
| [golang.org/x/oauth2](https://github.com/golang/oauth2) | `0.24.0` | `0.26.0` |
| [golang.org/x/sys](https://github.com/golang/sys) | `0.29.0` | `0.30.0` |
| [golang.org/x/term](https://github.com/golang/term) | `0.28.0` | `0.29.0` |
| [golang.org/x/text](https://github.com/golang/text) | `0.21.0` | `0.22.0` |



Updates `github.com/cert-manager/cert-manager` from 1.16.2 to 1.17.0
- [Release notes](https://github.com/cert-manager/cert-manager/releases)
- [Changelog](https://github.com/cert-manager/cert-manager/blob/master/RELEASE.md)
- [Commits](cert-manager/cert-manager@v1.16.2...v1.17.0)

Updates `github.com/vmware-tanzu/velero` from 1.15.1 to 1.15.2
- [Release notes](https://github.com/vmware-tanzu/velero/releases)
- [Changelog](https://github.com/vmware-tanzu/velero/blob/main/CHANGELOG.md)
- [Commits](vmware-tanzu/velero@v1.15.1...v1.15.2)

Updates `golang.org/x/mod` from 0.22.0 to 0.23.0
- [Commits](golang/mod@v0.22.0...v0.23.0)

Updates `k8s.io/api` from 0.32.0 to 0.32.1
- [Commits](kubernetes/api@v0.32.0...v0.32.1)

Updates `k8s.io/apiextensions-apiserver` from 0.32.0 to 0.32.1
- [Release notes](https://github.com/kubernetes/apiextensions-apiserver/releases)
- [Commits](kubernetes/apiextensions-apiserver@v0.32.0...v0.32.1)

Updates `k8s.io/apimachinery` from 0.32.0 to 0.32.1
- [Commits](kubernetes/apimachinery@v0.32.0...v0.32.1)

Updates `k8s.io/client-go` from 0.32.0 to 0.32.1
- [Changelog](https://github.com/kubernetes/client-go/blob/master/CHANGELOG.md)
- [Commits](kubernetes/client-go@v0.32.0...v0.32.1)

Updates `sigs.k8s.io/controller-runtime` from 0.19.4 to 0.20.1
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](kubernetes-sigs/controller-runtime@v0.19.4...v0.20.1)

Updates `github.com/evanphx/json-patch/v5` from 5.9.0 to 5.9.11
- [Release notes](https://github.com/evanphx/json-patch/releases)
- [Commits](evanphx/json-patch@v5.9.0...v5.9.11)

Updates `github.com/klauspost/compress` from 1.17.9 to 1.17.11
- [Release notes](https://github.com/klauspost/compress/releases)
- [Changelog](https://github.com/klauspost/compress/blob/master/.goreleaser.yml)
- [Commits](klauspost/compress@v1.17.9...v1.17.11)

Updates `github.com/prometheus/client_golang` from 1.20.4 to 1.20.5
- [Release notes](https://github.com/prometheus/client_golang/releases)
- [Changelog](https://github.com/prometheus/client_golang/blob/main/CHANGELOG.md)
- [Commits](prometheus/client_golang@v1.20.4...v1.20.5)

Updates `github.com/prometheus/common` from 0.61.0 to 0.62.0
- [Release notes](https://github.com/prometheus/common/releases)
- [Changelog](https://github.com/prometheus/common/blob/main/RELEASE.md)
- [Commits](prometheus/common@v0.61.0...v0.62.0)

Updates `github.com/spf13/pflag` from 1.0.5 to 1.0.6
- [Release notes](https://github.com/spf13/pflag/releases)
- [Commits](spf13/pflag@v1.0.5...v1.0.6)

Updates `golang.org/x/oauth2` from 0.24.0 to 0.26.0
- [Commits](golang/oauth2@v0.24.0...v0.26.0)

Updates `golang.org/x/sys` from 0.29.0 to 0.30.0
- [Commits](golang/sys@v0.29.0...v0.30.0)

Updates `golang.org/x/term` from 0.28.0 to 0.29.0
- [Commits](golang/term@v0.28.0...v0.29.0)

Updates `golang.org/x/text` from 0.21.0 to 0.22.0
- [Release notes](https://github.com/golang/text/releases)
- [Commits](golang/text@v0.21.0...v0.22.0)

Updates `golang.org/x/time` from 0.7.0 to 0.8.0
- [Commits](golang/time@v0.7.0...v0.8.0)

Updates `google.golang.org/protobuf` from 1.35.2 to 1.36.1

Updates `k8s.io/kube-openapi` from 0.0.0-20241105132330-32ad38e42d3f to 0.0.0-20241212222426-2c72e554b1e7
- [Commits](https://github.com/kubernetes/kube-openapi/commits)

Updates `k8s.io/utils` from 0.0.0-20241104100929-3ea5e8cea738 to 0.0.0-20241210054802-24370beab758
- [Commits](https://github.com/kubernetes/utils/commits)

Updates `sigs.k8s.io/json` from 0.0.0-20241010143419-9aa6b5e7a4b3 to 0.0.0-20241014173422-cfa47c3a1cc8
- [Commits](https://github.com/kubernetes-sigs/json/commits)

---
updated-dependencies:
- dependency-name: github.com/cert-manager/cert-manager
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: github.com/vmware-tanzu/velero
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: golang.org/x/mod
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: k8s.io/api
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: k8s.io/apiextensions-apiserver
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: k8s.io/apimachinery
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: k8s.io/client-go
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: sigs.k8s.io/controller-runtime
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: github.com/evanphx/json-patch/v5
  dependency-type: indirect
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: github.com/klauspost/compress
  dependency-type: indirect
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: github.com/prometheus/client_golang
  dependency-type: indirect
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: github.com/prometheus/common
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: github.com/spf13/pflag
  dependency-type: indirect
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: golang.org/x/oauth2
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: golang.org/x/sys
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: golang.org/x/term
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: golang.org/x/text
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: golang.org/x/time
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: google.golang.org/protobuf
  dependency-type: indirect
  update-type: version-update:semver-minor
  dependency-group: golang
- dependency-name: k8s.io/kube-openapi
  dependency-type: indirect
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: k8s.io/utils
  dependency-type: indirect
  update-type: version-update:semver-patch
  dependency-group: golang
- dependency-name: sigs.k8s.io/json
  dependency-type: indirect
  update-type: version-update:semver-patch
  dependency-group: golang
...

Signed-off-by: dependabot[bot] <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants