Skip to content

[main] Upgrade to latest dependencies#410

Merged
knative-prow[bot] merged 1 commit intoknative-extensions:mainfrom
knative-automation:auto-updates/update-deps-main
Mar 17, 2026
Merged

[main] Upgrade to latest dependencies#410
knative-prow[bot] merged 1 commit intoknative-extensions:mainfrom
knative-automation:auto-updates/update-deps-main

Conversation

@knative-automation
Copy link
Contributor

Cron -dprotaso

/cc knative/security-guard-approvers
/assign knative/security-guard-approvers

Produced by: knative-extensions/knobots/actions/update-deps

bumping golang.org/x/mod 27761a2...1ac721d:
  > 1ac721d go.mod: update golang.org/x dependencies
  > fb1fac8 all: upgrade go directive to at least 1.25.0 [generated]
bumping golang.org/x/sys fc646e4...eaaaaee:
  > eaaaaee windows/registry: correct KeyInfo.ModTime calculation
  > 942780b cpu: darwin/arm64 feature detection
  > acef388 unix/linux: Prefixmsg and PrefixCacheinfo structs
  > 3687fbd cpu: better defaults on darwin ARM64
  > 48062e9 plan9: change Note to alias syscall.Note
  > 4f23f80 windows: change Signal to alias syscall.Signal
  > 7548802 all: upgrade go directive to at least 1.25.0 [generated]
bumping knative.dev/serving f698e61...10d950c:
  > 10d950c Update net-contour nightly (# 16468)
  > 1387a58 Update net-istio nightly (# 16467)
  > d72e54b add an annotation to the kingress mapping tags to hostnames (# 16455)
  > ca22d12 Add endpointslices/restricted permission to ClusterRole (# 16465)
  > 4d0ed76 Update net-gateway-api nightly (# 16461)
  > 07c6cde Update net-kourier nightly (# 16466)
  > b3d77f2 Switch e2e testing assertions to use EndpointSlices (# 16454)
  > 2b4ef90 Migrate autoscaler stat forwarder to use EndpointSlices (# 16448)
  > 18c0474 upgrade to latest dependencies (# 16464)
bumping golang.org/x/tools 009367f...24a8e95:
  > 24a8e95 go.mod: update golang.org/x dependencies
  > 3dd57fb gopls/internal/mcp: refactor unified diff generation
  > fcc014d cmd/digraph: fix package doc
  > 39f0f5c cmd/stress: add -failfast flag
  > 063c264 gopls/test/integration/misc: add diagnostics to flaky test
  > deb6130 gopls/internal/golang: fix hover panic in raw strings with CRLF
  > 5f1186b gopls/internal/analysis/driverutil: remove unnecessary new imports
  > ff45494 go/analysis: expose GoMod etc. to Pass.Module
  > 62daff4 go/analysis/passes/inline: fix panic in inlineAlias with instantiated generic alias
  > fcb6088 x/tools: delete obsolete code
  > c3b48f5 gopls: update to go1.26
  > 30b6a4e internal/diff: unified diffs should use line diffs
  > 6cbcf5a go/analysis/passes/modernize: atomic: use new atomic types
  > 07ce8ce go/ssa: emit short-circuit control flow for boolean switch cases
  > e89f568 gopls/internal/lsprpc: increase test timeout 1s -> 10s
  > 49cd9d8 gopls/internal/protocol: add lazy enum form input type
  > b365b0a go/analysis/passes/modernize: rangeint: omit unneeded type conversion
  > 83aca55 go/analysis/passes/modernize: fmtappendf: remove whitespace
  > 6a2886b go/packages: explicitly disable collecting vcs information when not needed
  > f1f4626 go/analysis/passes/modernize: reflecttypefor: simplify .Elem()
  > 0c3890d go/analysis/passes: fix stringscut variable shadowing
  > a63d2a1 gopls/internal/analysis: add new Analyzer writestring
  > 3c6f94a go/analysis/passes: fmtappendf: skip if formatter could produce empty string
  > 64804da go/analysis/passes/modernize: slicescontains: omit fix with empty body
  > da12812 go/analysis/passes/modernize: fix stringscut false positive for unguarded afterSlice
  > 7e46809 go/analysis/passes/modernize: stringsbuilder: allow multiple rvalue uses
  > 55840e9 internal/astutil: missing test for CL 748480
  > aa7725f gopls/internal/server: send notification when go.work file changes
  > 01a0310 gopls/internal/server: limit checkGoModDeps during bulk operations
  > 13444bf gopls/integration/govim: deal with breaking change to gs CLI
  > dd752d6 gopls/internal/test/integration/completion: fix flaky TestUnimportedCompletion_VSCodeIssue3365
  > a5d96d4 gopls/internal/test/integration/completion: fix flaky TestUnimportedCompletion_VSCodeIssue3365
  > 981d752 internal/astutil: fix \r bug in PosInStringLiteral
  > 64da537 gopls/codeaction: support struct tag dialog
  > ca2bd77 analysisflags: quote analyzer name in enable usage
  > 31904d1 refactor/satisfy: fix panic on interface literals
  > c48686b go/analysis/passes/modernize: skip func literals with return values in waitgroup
  > 5c2a459 go/analysis/passes/modernize: don't consider selects for min/max pass
  > b9ba349 internal/mcp: partial revert of go.dev/cl/731503
  > e8d9b54 gopls/internal/test/marker: use openbsd/riscv64 in OS/ARCH suffix test
  > 20b0bd9 go/analysis/unitchecker: update go fix, go vet error message
  > 8151966 gopls/internal/server: add telemetry for vulncheck_prompt
  > 67b6d4f go/analysis/passes/modernize: fix invalid rewrite of reflect.TypeOf(nil)
  > 43ba126 gopls: fix typos
  > d332078 go/analysis/passes/modernize: leave out space in stringsbuilder edit
  > 001923f go/packages: aggregate chunked files in Load
  > d2fc364 internal/diff: remove myers' diff implementation
  > a8a17b7 gopls/test/imports_test: add logging for flaky test
  > 5cd825b gopls/bench: disable one DidChange benchmark
  > f644bf7 all: upgrade go directive to at least 1.25.0 [generated]
  > cab62c1 gopls/internal/debug: replace timeUnits with time.Duration
bumping golang.org/x/net 60b3f6f...316e20c:
  > 316e20c go.mod: update golang.org/x dependencies
  > 9767a42 internal/http3: add support for plugging into net/http
  > 4a81284 http2: update docs to disrecommend this package
  > dec6603 dns/dnsmessage: reject too large of names early during unpack
  > 8afa12f http2: deprecate write schedulers
  > 38019a2 http2: add missing copyright header to export_test.go
  > 039b87f internal/http3: return error when Write is used after status 304 is set
  > 6267c6c internal/http3: add HTTP 103 Early Hints support to ClientConn
  > 591bdf3 internal/http3: add HTTP 103 Early Hints support to Server
  > 1faa6d8 internal/http3: avoid potential race when aborting RoundTrip
  > 8d297f1 http2: Move most tests from the http2 package to the http2_test package.
  > 3eb9327 http2: do not retry RoundTrip after peer sends a stream protocol error
bumping knative.dev/pkg b3fe2e5...5d1c12d:
  > 5d1c12d Bump the golang-x group with 2 updates (# 3334)
  > 5834c5d Add TLS support to Prometheus metrics server (# 3322)
bumping golang.org/x/text 817fba9...7ca2c6d:
  > 7ca2c6d go.mod: update golang.org/x dependencies
  > 73d1ba9 all: upgrade go directive to at least 1.25.0 [generated]
bumping golang.org/x/term 3aff304...9d2dc07:
  > 9d2dc07 go.mod: update golang.org/x dependencies
  > d954e03 all: upgrade go directive to at least 1.25.0 [generated]

Signed-off-by: Knative Automation <automation@knative.team>
@knative-prow
Copy link

knative-prow bot commented Mar 17, 2026

@knative-automation: GitHub didn't allow me to request PR reviews from the following users: knative/security-guard-approvers.

Note that only knative-extensions members and repo collaborators can review this PR, and authors cannot review their own PRs.

Details

In response to this:

Cron -dprotaso

/cc knative/security-guard-approvers
/assign knative/security-guard-approvers

Produced by: knative-extensions/knobots/actions/update-deps

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@knative-prow knative-prow bot added the size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. label Mar 17, 2026
@knative-prow
Copy link

knative-prow bot commented Mar 17, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: knative-automation
Once this PR has been reviewed and has the lgtm label, please assign dprotaso for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@knative-prow knative-prow bot merged commit d7fd74c into knative-extensions:main Mar 17, 2026
23 checks passed
@codecov
Copy link

codecov bot commented Mar 17, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 74.94%. Comparing base (939fe44) to head (30b4092).
⚠️ Report is 1 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main     #410      +/-   ##
==========================================
- Coverage   75.00%   74.94%   -0.06%     
==========================================
  Files          46       46              
  Lines        3449     3449              
==========================================
- Hits         2587     2585       -2     
- Misses        729      730       +1     
- Partials      133      134       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. skip-review

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant