[main] Upgrade to latest dependencies#410
Conversation
bumping golang.org/x/mod 27761a2...1ac721d: > 1ac721d go.mod: update golang.org/x dependencies > fb1fac8 all: upgrade go directive to at least 1.25.0 [generated] bumping golang.org/x/sys fc646e4...eaaaaee: > eaaaaee windows/registry: correct KeyInfo.ModTime calculation > 942780b cpu: darwin/arm64 feature detection > acef388 unix/linux: Prefixmsg and PrefixCacheinfo structs > 3687fbd cpu: better defaults on darwin ARM64 > 48062e9 plan9: change Note to alias syscall.Note > 4f23f80 windows: change Signal to alias syscall.Signal > 7548802 all: upgrade go directive to at least 1.25.0 [generated] bumping knative.dev/serving f698e61...10d950c: > 10d950c Update net-contour nightly (# 16468) > 1387a58 Update net-istio nightly (# 16467) > d72e54b add an annotation to the kingress mapping tags to hostnames (# 16455) > ca22d12 Add endpointslices/restricted permission to ClusterRole (# 16465) > 4d0ed76 Update net-gateway-api nightly (# 16461) > 07c6cde Update net-kourier nightly (# 16466) > b3d77f2 Switch e2e testing assertions to use EndpointSlices (# 16454) > 2b4ef90 Migrate autoscaler stat forwarder to use EndpointSlices (# 16448) > 18c0474 upgrade to latest dependencies (# 16464) bumping golang.org/x/tools 009367f...24a8e95: > 24a8e95 go.mod: update golang.org/x dependencies > 3dd57fb gopls/internal/mcp: refactor unified diff generation > fcc014d cmd/digraph: fix package doc > 39f0f5c cmd/stress: add -failfast flag > 063c264 gopls/test/integration/misc: add diagnostics to flaky test > deb6130 gopls/internal/golang: fix hover panic in raw strings with CRLF > 5f1186b gopls/internal/analysis/driverutil: remove unnecessary new imports > ff45494 go/analysis: expose GoMod etc. to Pass.Module > 62daff4 go/analysis/passes/inline: fix panic in inlineAlias with instantiated generic alias > fcb6088 x/tools: delete obsolete code > c3b48f5 gopls: update to go1.26 > 30b6a4e internal/diff: unified diffs should use line diffs > 6cbcf5a go/analysis/passes/modernize: atomic: use new atomic types > 07ce8ce go/ssa: emit short-circuit control flow for boolean switch cases > e89f568 gopls/internal/lsprpc: increase test timeout 1s -> 10s > 49cd9d8 gopls/internal/protocol: add lazy enum form input type > b365b0a go/analysis/passes/modernize: rangeint: omit unneeded type conversion > 83aca55 go/analysis/passes/modernize: fmtappendf: remove whitespace > 6a2886b go/packages: explicitly disable collecting vcs information when not needed > f1f4626 go/analysis/passes/modernize: reflecttypefor: simplify .Elem() > 0c3890d go/analysis/passes: fix stringscut variable shadowing > a63d2a1 gopls/internal/analysis: add new Analyzer writestring > 3c6f94a go/analysis/passes: fmtappendf: skip if formatter could produce empty string > 64804da go/analysis/passes/modernize: slicescontains: omit fix with empty body > da12812 go/analysis/passes/modernize: fix stringscut false positive for unguarded afterSlice > 7e46809 go/analysis/passes/modernize: stringsbuilder: allow multiple rvalue uses > 55840e9 internal/astutil: missing test for CL 748480 > aa7725f gopls/internal/server: send notification when go.work file changes > 01a0310 gopls/internal/server: limit checkGoModDeps during bulk operations > 13444bf gopls/integration/govim: deal with breaking change to gs CLI > dd752d6 gopls/internal/test/integration/completion: fix flaky TestUnimportedCompletion_VSCodeIssue3365 > a5d96d4 gopls/internal/test/integration/completion: fix flaky TestUnimportedCompletion_VSCodeIssue3365 > 981d752 internal/astutil: fix \r bug in PosInStringLiteral > 64da537 gopls/codeaction: support struct tag dialog > ca2bd77 analysisflags: quote analyzer name in enable usage > 31904d1 refactor/satisfy: fix panic on interface literals > c48686b go/analysis/passes/modernize: skip func literals with return values in waitgroup > 5c2a459 go/analysis/passes/modernize: don't consider selects for min/max pass > b9ba349 internal/mcp: partial revert of go.dev/cl/731503 > e8d9b54 gopls/internal/test/marker: use openbsd/riscv64 in OS/ARCH suffix test > 20b0bd9 go/analysis/unitchecker: update go fix, go vet error message > 8151966 gopls/internal/server: add telemetry for vulncheck_prompt > 67b6d4f go/analysis/passes/modernize: fix invalid rewrite of reflect.TypeOf(nil) > 43ba126 gopls: fix typos > d332078 go/analysis/passes/modernize: leave out space in stringsbuilder edit > 001923f go/packages: aggregate chunked files in Load > d2fc364 internal/diff: remove myers' diff implementation > a8a17b7 gopls/test/imports_test: add logging for flaky test > 5cd825b gopls/bench: disable one DidChange benchmark > f644bf7 all: upgrade go directive to at least 1.25.0 [generated] > cab62c1 gopls/internal/debug: replace timeUnits with time.Duration bumping golang.org/x/net 60b3f6f...316e20c: > 316e20c go.mod: update golang.org/x dependencies > 9767a42 internal/http3: add support for plugging into net/http > 4a81284 http2: update docs to disrecommend this package > dec6603 dns/dnsmessage: reject too large of names early during unpack > 8afa12f http2: deprecate write schedulers > 38019a2 http2: add missing copyright header to export_test.go > 039b87f internal/http3: return error when Write is used after status 304 is set > 6267c6c internal/http3: add HTTP 103 Early Hints support to ClientConn > 591bdf3 internal/http3: add HTTP 103 Early Hints support to Server > 1faa6d8 internal/http3: avoid potential race when aborting RoundTrip > 8d297f1 http2: Move most tests from the http2 package to the http2_test package. > 3eb9327 http2: do not retry RoundTrip after peer sends a stream protocol error bumping knative.dev/pkg b3fe2e5...5d1c12d: > 5d1c12d Bump the golang-x group with 2 updates (# 3334) > 5834c5d Add TLS support to Prometheus metrics server (# 3322) bumping golang.org/x/text 817fba9...7ca2c6d: > 7ca2c6d go.mod: update golang.org/x dependencies > 73d1ba9 all: upgrade go directive to at least 1.25.0 [generated] bumping golang.org/x/term 3aff304...9d2dc07: > 9d2dc07 go.mod: update golang.org/x dependencies > d954e03 all: upgrade go directive to at least 1.25.0 [generated] Signed-off-by: Knative Automation <automation@knative.team>
7a1a9c1 to
30b4092
Compare
|
@knative-automation: GitHub didn't allow me to request PR reviews from the following users: knative/security-guard-approvers. Note that only knative-extensions members and repo collaborators can review this PR, and authors cannot review their own PRs. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: knative-automation The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #410 +/- ##
==========================================
- Coverage 75.00% 74.94% -0.06%
==========================================
Files 46 46
Lines 3449 3449
==========================================
- Hits 2587 2585 -2
- Misses 729 730 +1
- Partials 133 134 +1 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Cron -dprotaso
/cc knative/security-guard-approvers
/assign knative/security-guard-approvers
Produced by: knative-extensions/knobots/actions/update-deps