Skip to content

[release-v1.16][gomod]: Bump the minor group across 1 directory with 14 updates #1229

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: release-v1.16
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Mar 31, 2025

Bumps the minor group with 11 updates in the / directory:

Package From To
github.com/cert-manager/cert-manager 1.13.3 1.17.1
github.com/cloudevents/conformance 0.2.0 0.4.1
github.com/cloudevents/sdk-go/sql/v2 2.0.0-20240712172937-3ce6b2f1f011 2.15.2
github.com/cloudevents/sdk-go/v2 2.15.2 2.16.0
github.com/coreos/go-oidc/v3 3.9.0 3.13.0
github.com/eclipse/paho.golang 0.12.0 0.22.0
github.com/google/go-cmp 0.6.0 0.7.0
github.com/pelletier/go-toml/v2 2.0.5 2.2.3
github.com/rickb777/date 1.13.0 1.21.1
go.opentelemetry.io/otel 1.34.0 1.35.0
go.uber.org/atomic 1.10.0 1.11.0

Updates github.com/cert-manager/cert-manager from 1.13.3 to 1.17.1

Release notes

Sourced from github.com/cert-manager/cert-manager's releases.

v1.17.1

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

This release is primarily intended to address a breaking change in Cloudflare's API which impacted ACME DNS-01 challenges using Cloudflare.

Many thanks to the community members who reported this issue!

Changes by Kind

Bug or Regression

v1.17.0

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

v1.17.0 is a feature release with several improvements, including:

  • A helpful compliance change to RSA signatures on certificates
  • An easier way to specify passwords for PKCS#12 and JKS keystores
  • A few feature flag promotions (and a deprecation)
  • Dependency bumps and other smaller improvements

Major Themes

RSA Certificate Compliance

The United States Department of Defense published a memo in 2022 which introduced some requirements on the kinds of cryptography they require to be supported in software they use.

In effect, the memo requires that software be able to support larger RSA keys (3072-bit and 4096-bit) and hashing algorithms (SHA-384 at a minimum).

cert-manager supported large RSA keys long before the memo was published, but a quirk in implementation meant that cert-manager always used SHA-256 when signing with RSA.

In v1.17.0, cert-manager will choose a hash algorithm based on the RSA key length: 3072-bit keys will use SHA-384, and 4096-bit keys will use SHA-512. This matches similar behavior already present for ECDSA signatures.

Our expectation is that this change will have minimal impact beyond a slight increase to security and better compliance; we're not aware of Kubernetes based environments which support RSA 2048 with SHA-256 but fail with RSA 4096 and SHA-512. However, if you're using larger RSA keys, you should be aware of the change.

Easier Keystore Passwords for PKCS#12 and JKS

Specifying passwords on PKCS#12 and JKS keystores is supported in cert-manager for compatibility reasons with software which expects or requires passwords to be set; however, these passwords are not relevant to security and never have been in cert-manager.

The initial implementation of the keystores feature required these "passwords" to be stored in a Kubernetes secret, which would then be read by cert-manager when creating the keystore after a certificate was issued. This is cumbersome, especially when many passwords are set to default values such as changeit or password.

In cert-manager v1.17, it's now possible to set a keystore password using a literal string value inside the Certificate resource itself, making this process much easier with no change to security.

For example:

</tr></table> 

... (truncated)

Commits
  • c658224 Merge pull request #7565 from cert-manager-bot/cherry-pick-7549-to-release-1.17
  • 47828f2 Add comment explaining change
  • 2121860 chore(issuer/cloudflare): ensure we set ZoneID
  • bec3f95 Merge pull request #7563 from SgtCoDFish/release-1.17-bumpgo
  • a79a663 [release-1.17] disable klone generation step (see #7431)
  • 69a514e [release-1.17] bump go to v1.23.6
  • 4562b9a Merge pull request #6657 from rquinio1A/feature/keystore-password-litteral
  • c6f3f0c Merge pull request #7527 from SgtCoDFish/upgrade-test-tweaks
  • 40cd2a0 Add support for setting literal keystore passwords in Certificates
  • 1747743 Merge pull request #7530 from SgtCoDFish/dns-test-integration
  • Additional commits viewable in compare view

Updates github.com/cloudevents/conformance from 0.2.0 to 0.4.1

Release notes

Sourced from github.com/cloudevents/conformance's releases.

Improved diff

Found a bug where I expected to be able to say --match foo,bar but cobra does not split on comma, adding the ability to split on comma for the match flag.

Improved matching and searching while diffing a to b events.

Adding Diff command

diff compares two yaml event files.

cloudevents diff ./want.yaml ./got.yaml

want.yaml could have fewer fields specified to allow for fuzzy matching.

Example, if you only wanted to compare on type and ignore additional fields:

$ cat ./want.yaml
ContextAttributes:
  type: com.example.someevent
$ cat ./got.yaml
Mode: structured
ContextAttributes:
  specversion: 1.0
  type: com.example.someevent
  time: 2018-04-05T03:56:24Z
  id: 4321-4321-4321-a
  source: /mycontext/subcontext
  Extensions:
    comexampleextension1 : "value"
    comexampleextension2 : |
      {"othervalue": 5}
TransportExtensions:
  user-agent: "foo"
Data: |
  {"world":"hello"}
$ cloudevents diff ./want.yaml ./got.yaml --match type --ignore-additions

This validates that at least one event of type com.example.someevent is present in the got.yaml file.

Adding history to listen command to cli.

New feature: return back the events that listen has collected via a GET on /history .

Start the listener:

$ cloudevents listen
</tr></table> 

... (truncated)

Commits
  • 7a8ee0a Merge pull request #27 from n3wscott/ce-diff
  • c4e318c better findby, split on comma, add find tracker
  • 3302931 Update README.md
  • 4e495fa Merge pull request #25 from n3wscott/ce-diff
  • 312bd2c add diff to readme
  • 981936c fix data race
  • 9ef4496 update actions to use go 1.16 and 1.17
  • cd561e9 add cloudevent diff command
  • 08d5cb1 Merge pull request #24 from n3wscott/history-2
  • fbd3e52 adding non-consuming buffer option, and a blocking wait call on history
  • Additional commits viewable in compare view

Updates github.com/cloudevents/sdk-go/sql/v2 from 2.0.0-20240712172937-3ce6b2f1f011 to 2.15.2

Release notes

Sourced from github.com/cloudevents/sdk-go/sql/v2's releases.

Release v2.15.2

What's Changed

  • Patch for a potential security issue. See CVE-2024-28110.
  • Note: this could be a breaking change for people if they purposely change golang's HTTP DefaultClient, or change the CloudEvents Client returned from NewClient, and expect those changes to be visible on other HTTP flows using those Clients. E.g. auth

Full Changelog: cloudevents/sdk-go@v2.15.1...v2.15.2

Release v2.15.1

What's Changed

New Contributors

Full Changelog: cloudevents/sdk-go@v2.15.0...v2.15.1

Release v2.15.0

Highlights 💫

This release includes various updates and improvements such as README enhancements, dependency bumps, bug fixes, race condition resolutions, and protocol-related adjustments. Notable changes involve upgrading dependencies like grpc and go.opentelemetry, addressing race conditions, fixing Kafka test issues, and introducing new features like binary content mode for NATS and JetStream protocols. Additionally, there are governance documentation updates, link corrections, and improvements in error handling and documentation across different modules.

Breaking 🚨

The Kafka Sarama protocol now uses the "github.com/IBM/sarama" Go module import path.

Commits 📄

896e1d0 Update README.md 75ec0f2 Bump actions/setup-go from 4 to 5 41e80f7 fixed couple issues

... (truncated)

Commits

Updates github.com/cloudevents/sdk-go/v2 from 2.15.2 to 2.16.0

Release notes

Sourced from github.com/cloudevents/sdk-go/v2's releases.

Release v2.16.0

✨ Features & Enhancements

  • Confluent Kafka binding #988 by @​yanmxa
    Added a new Confluent Kafka protocol binding for CloudEvents, supporting modern Kafka client features.

  • Producer report channel for Confluent Kafka #1031 by @​yanmxa
    Exposed a producer report channel via Events() to allow users to track delivery status of Kafka messages.

  • Support structured content type suffixes #1007 by @​dan-j
    Improved content type handling by recognizing structured syntax suffixes like +json, increasing compatibility with various encodings.

  • Default timeout via context #992 by @​nkreiger
    Introduced support for configuring protocol default timeouts using context.Context.

  • Benchmarks for CESQL #1050 by @​Cali0707
    Added benchmark tests to measure CESQL query performance.

  • Optimized CESQL LIKE matching #1049 by @​Cali0707
    Improved the performance of CESQL's LIKE pattern matching logic.

  • Expose AddFunction API for CESQL Parser [[release-v1.17] Update Konflux configurations #1047 / #1051] by @​dgeorgievski
    Enabled users to register custom functions in CESQL via the newly exposed AddFunction API.

  • Flexible subject matching for NATS JetStream #1084 by @​evankanderson
    Added support for flexible subject pattern matching in NATS JetStream subscriptions.

  • Add v3 version of NATS JetStream protocol #1095 by @​stephen-totty-hpe
    Introduced a new version of the NATS JetStream protocol (v3) with enhanced features and forward compatibility.

  • Expose WithHost option #1070 by @​jaxtonw
    Added a configurable WithHost option for improved protocol initialization flexibility.

  • Support dataref cloud event extension [[Dataref Extension #1018](https://redirect.github.com/Adding a simple dataref extension cloudevents/sdk-go#1018)] by @​matzew Implements the Dataref (Claim Check Pattern) as specified by the CloudEvent Extension Attributes spec.


🛠 Fixes

  • Handle multiple AMQP data fields correctly #1034 by @​embano1
    Fixed parsing of AMQP messages containing multiple data fields to conform with spec expectations.

  • Fix invalid ce- prefix in Confluent binding #1059 by @​embano1
    Corrected an issue where CloudEvents extensions were incorrectly prefixed in the Confluent Kafka binding.

  • Fix LIKE expression error handling #1046 by @​Cali0707
    Prevented panics on malformed LIKE expressions in CESQL; now returns a parse error instead.

  • Fix MQTT content-type issue #1063 by @​yanmxa

... (truncated)

Commits
  • 6de37de Merge pull request #1139 from duglin/upgradeLint
  • 25cdf94 upgrade-lint
  • 240eb02 Merge pull request #1137 from duglin/fix-automerge
  • 7b6701c fix automerge by giving better names
  • d3e82a7 Merge pull request #1136 from cloudevents/dependabot/github_actions/golangci/...
  • 00e3d7c chore(deps): Bump golangci/golangci-lint-action from 6.5.2 to 7.0.0
  • 69cfc2d Merge pull request #1018 from matzew/add_dataref_extension
  • 535da92 Adding a simple dataref extension, similar to the java sdk
  • 74ac76d Merge pull request #1134 from cloudevents/dependabot/go_modules/observability...
  • 6da042f chore: run go mod tidy
  • Additional commits viewable in compare view

Updates github.com/coreos/go-oidc/v3 from 3.9.0 to 3.13.0

Release notes

Sourced from github.com/coreos/go-oidc/v3's releases.

v3.13.0

What's Changed

Full Changelog: coreos/go-oidc@v3.12.0...v3.13.0

v3.12.0

What's Changed

Full Changelog: coreos/go-oidc@v3.11.0...v3.12.0

v3.11.0

What's Changed

New Contributors

Full Changelog: coreos/go-oidc@v3.10.0...v3.11.0

v3.10.0

What's Changed

New Contributors

Full Changelog: coreos/go-oidc@v3.9.0...v3.10.0

Commits
  • 60d436e *: bump dependency versions
  • 4b5f82d oidc: add JSON tags to ProviderConfig
  • 0fe9887 oidc: ignore cancellation of remote key set context
  • 308e778 chore(deps): bump dependencies to address security issues
  • 6b94bec oidc: verify support for algs from discovery
  • 22dfdca update go-jose to v4
  • 375c370 add staticcheck to github actions
  • 0963f39 updated github actions
  • 65ac180 fix minor typo
  • See full diff in compare view

Updates github.com/eclipse/paho.golang from 0.12.0 to 0.22.0

Release notes

Sourced from github.com/eclipse/paho.golang's releases.

0.22

The is a minor release that incorporates fixes/improvements made over the last 9 months.

There is one breaking change, autopaho.ConnectPacketBuilder may now return an error (this is useful when the packet cannot be built, for example when auth details are temporarily unavailable).

Thanks to those who have provided fixes/enhanceents included in this release!.

What's Changed

New Contributors

Full Changelog: eclipse-paho/paho.golang@v0.21.0...v0.22.0

0.21

The is a minor release, it addresses an issue with DefaultPinger that could lead to the connection being dropped in error. It also sets the required minimum version of Go to 1.21.

What's Changed

Full Changelog: eclipse-paho/paho.golang@v0.20.0...v0.21.0

0.20

The is a major release which adds:

  • Full QOS1/2 support including persistent sessions (both memory and disk storage supported).
  • Significant changes (mostly backwards compatible for now) to the handling of inbound messages (see this issue).
  • A new pinger.
  • Major improvements to the test suite.

The largest changes were introduced into @​master in October (immediately after the release of v0.12) and we have delayed the release until now to allow for testing (the core code has been running on a number of production systems for over two months). However, due to the extent of the changes, we do recommend that you thoroughly test after upgrading.

Breaking changes include (but are not limited to):

  • paho
    • paho.Publish when publishing at QOS1/2 the packet identifier (if acquired) was released if the context expired regardless of whether the message had been sent (potentially leading to reuse of the ID and in breach of the spec). This has been changed such that once transmitted, the message will be acknowledged regardless of the publish context (but the Publish function will only block until the context expires). The Errors returned now better indicate what

... (truncated)

Commits
  • 7474a8a ConnectPacketBuilder - can noe return error (prevents connection attempt)
  • b7d62b9 TCP connection is established only if a CONN packet can be built
  • 88e86ee Allows the ConnectPacketBuilder to fail gracefully, in which case no connecti...
  • f1fe38b dynamic backoff (PR #258)
  • 29212b8 Allow delay / backoff before first connection attempt
  • ef148e4 Merge pull request #260 from ChIoT-Tech/master
  • 749c1ed Prevent RPC blocking when context cancelled
  • 2c54a6d Merge pull request #259 from ChIoT-Tech/master
  • e8411f0 Update dependencies
  • 8c0b228 Add example for exponential backoff
  • Additional commits viewable in compare view

Updates github.com/google/go-cmp from 0.6.0 to 0.7.0

Release notes

Sourced from github.com/google/go-cmp's releases.

v0.7.0

New API:

  • (#367) Support compare functions with SortSlices and SortMaps

Panic messaging:

  • (#370) Detect proto.Message types when failing to export a field
Commits

Updates github.com/pelletier/go-toml/v2 from 2.0.5 to 2.2.3

Release notes

Sourced from github.com/pelletier/go-toml/v2's releases.

v2.2.3

What's Changed

What's new

Performance

Fixed bugs

Documentation

Other changes

New Contributors

Full Changelog: pelletier/go-toml@v2.2.2...v2.2.3

v2.2.2

What's Changed

Fixed bugs

New Contributors

Full Changelog: pelletier/go-toml@v2.2.1...v2.2.2

v2.2.1

What's Changed

Fixed bugs

New Contributors

Full Changelog: pelletier/go-toml@v2.2.0...v2.2.1

v2.2.0

... (truncated)

Commits

Updates github.com/rickb777/date from 1.13.0 to 1.21.1

Release notes

Sourced from github.com/rickb777/date's releases.

v1 ParseISO tweaked

ParseISO now accepts date-time inputs, ignoring the time field.

period.AddTo revised to reduce the impact of subtle behaviours of time.AddDate

Minor bugfix

  • resolves issue #19
  • updates dependencies

v1.20.2 updated dependencies

No release notes provided.

v1.20.0

No release notes provided.

v1.19.1

No release notes provided.

Bufix: MarshalJSON

Date.MarshalJSON incorrectly wrote the zero value as a blank string, which might raise difficulties at the receiver.

Code that relied on this incorrect behaviour might see this as a breaking change.

v1.18

No release notes provided.

updated dependencies

No release notes provided.

Bug fixed: integer overflow on 32bit architecture

No release notes provided.

v1.14.1

No release notes provided.

Period revised

Improvements to Period, including new methods and improved tests.

Commits
  • b7388c8 Minor test correction
  • db08fef Date ParseISO & AutoParse now accept a date-time input (time is ignored)
  • 9a7458e updated dependencies
  • 02b87e1 another parse test case
  • ff580cf more tests added to period.Between
  • b6690e4 period.AddTo revised to reduce the impact of subtle behaviours of time.AddDate
  • ad3aa70 Dependencies updated
  • a792460 Bugfix: this resolves issue #19 fraction designator parsing bug
  • fba60ed bumped up some dependencies
  • 168141b Updated dependencies & re-fmt
  • Additional commits viewable in compare view

Updates go.opentelemetry.io/otel from 1.34.0 to 1.35.0

Changelog

Sourced from go.opentelemetry.io/otel's changelog.

[1.35.0/0.57.0/0.11.0] 2025-03-05

This release is the last to support [Go 1.22]. The next release will require at least [Go 1.23].

Added

  • Add ValueFromAttribute and KeyValueFromAttribute in go.opentelemetry.io/otel/log. (#6180)
  • Add EventName and SetEventName to Record in go.opentelemetry.io/otel/log. (#6187)
  • Add EventName to RecordFactory in go.opentelemetry.io/otel/log/logtest. (#6187)
  • AssertRecordEqual in go.opentelemetry.io/otel/log/logtest checks Record.EventName. (#6187)
  • Add EventName and SetEventName to Record in go.opentelemetry.io/otel/sdk/log. (#6193)
  • Add EventName to RecordFactory in go.opentelemetry.io/otel/sdk/log/logtest. (#6193)
  • Emit Record.EventName field in go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc. (#6211)
  • Emit Record.EventName field in go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp. (#6211)
  • Emit Record.EventName field in go.opentelemetry.io/otel/exporters/stdout/stdoutlog (#6210)
  • The go.opentelemetry.io/otel/semconv/v1.28.0 package. The package contains semantic conventions from the v1.28.0 version of the OpenTelemetry Semantic Conventions. See the migration documentation for information on how to upgrade from go.opentelemetry.io/otel/semconv/v1.27.0(#6236)
  • The go.opentelemetry.io/otel/semconv/v1.30.0 package. The package contains semantic conventions from the v1.30.0 version of the OpenTelemetry Semantic Conventions. See the migration documentation for information on how to upgrade from go.opentelemetry.io/otel/semconv/v1.28.0(#6240)
  • Document the pitfalls of using Resource as a comparable type. Resource.Equal and Resource.Equivalent should be used instead. (#6272)
  • Support [Go 1.24]. (#6304)
  • Add FilterProcessor and EnabledParameters in go.opentelemetry.io/otel/sdk/log. It replaces go.opentelemetry.io/otel/sdk/log/internal/x.FilterProcessor. Compared to previous version it additionally gives the possibility to filter by resource and instrumentation scope. (#6317)

Changed

  • Update github.com/prometheus/common to v0.62.0, which changes the NameValidationScheme to NoEscaping. This allows metrics names to keep original delimiters (e.g. .), rather than replacing with underscores. This is controlled by the Content-Type header, or can be reverted by setting NameValidationScheme to LegacyValidation in github.com/prometheus/common/model. (#6198)

Fixes

  • Eliminate goroutine leak for the processor returned by NewSimpleSpanProcessor in go.opentelemetry.io/otel/sdk/trace when Shutdown is called and the passed ctx is canceled and SpanExporter.Shutdown has not returned. (#6368)
  • Eliminate goroutine leak for the processor returned by NewBatchSpanProcessor in go.opentelemetry.io/otel/sdk/trace when ForceFlush is called and the passed ctx is canceled and SpanExporter.Export has not returned. (#6369)
Commits
  • 5ba5e7a Release v1.35.0/v0.57.0/v0.11.0 (#6407)
  • 3908b67 chore(deps): update module github.com/securego/gosec/v2 to v2.22.2 (#6412)
  • 50172b1 chore(deps): update module github.com/ryancurrah/gomodguard to v1.4.1 (#6411)
  • cea6d2b fix(deps): update module google.golang.org/grpc to v1.71.0 (#6409)
  • e2aee3a Move trace sdk tests from trace_test into trace package (#6400)
  • 38f4f39 fix(deps): update build-tools to v0.20.0 (#6403)
  • 2911449 Look at stale issues in ascending order (#6396)
  • 7cb322a chore(deps): update github.com/golangci/dupl digest to 44c6a0b (#6398)
  • 0c3651e fix(deps): update module github.com/golangci/golangci-lint to v1.64.6 (#6394)
  • f04e951 chore(deps): update mvdan.cc/unparam digest to 0df0534 (#6391)
  • Additional commits viewable in compare view

Updates go.opentelemetry.io/otel/trace from 1.34.0 to 1.35.0

Changelog

Sourced from go.opentelemetry.io/otel/trace's changelog.

[1.35.0/0.57.0/0.11.0] 2025-03-05

This release is the last to support [Go 1.22]. The next release will require at least [Go 1.23].

Added

  • Add ValueFromAttribute and KeyValueFromAttribute in go.opentelemetry.io/otel/log. (#6180)
  • Add EventName and SetEventName to Record in go.opentelemetry.io/otel/log. (#6187)
  • Add EventName to RecordFactory in go.opentelemetry.io/otel/log/logtest. (#6187)
  • AssertRecordEqual in go.opentelemetry.io/otel/log/logtest checks Record.EventName. (#6187)
  • Add EventName and SetEventName to Record in go.opentelemetry.io/otel/sdk/log. (#6193)
  • Add EventName to RecordFactory in go.opentelemetry.io/otel/sdk/log/logtest. (#6193)
  • Emit Record.EventName field in go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc. (#6211)
  • Emit Record.EventName field in go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp. (#6211)
  • Emit Record.EventName field in go.opentelemetry.io/otel/exporters/stdout/stdoutlog (#6210)
  • The go.opentelemetry.io/otel/semconv/v1.28.0 package. The package contains semantic conventions from the v1.28.0 version of the OpenTelemetry Semantic Conventions. See the migration documentation for information on how to upgrade from go.opentelemetry.io/otel/semconv/v1.27.0(#6236)
  • The go.opentelemetry.io/otel/semconv/v1.30.0 package. The package contains semantic conventions from the v1.30.0 version of the OpenTelemetry Semantic Conventions. See the migration documentation for information on how to upgrade from go.opentelemetry.io/otel/semconv/v1.28.0(#6240)
  • Document the pitfalls of using Resource as a comparable type. Resource.Equal and Resource.Equivalent should be used instead. (#6272)
  • Support [Go 1.24]. (#6304)
  • Add FilterProcessor and EnabledParameters in go.opentelemetry.io/otel/sdk/log. It replaces go.opentelemetry.io/otel/sdk/log/internal/x.FilterProcessor. Compared to previous version it additionally gives the possibility...

    Description has been truncated

…14 updates

Bumps the minor group with 11 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/cert-manager/cert-manager](https://github.com/cert-manager/cert-manager) | `1.13.3` | `1.17.1` |
| [github.com/cloudevents/conformance](https://github.com/cloudevents/conformance) | `0.2.0` | `0.4.1` |
| [github.com/cloudevents/sdk-go/sql/v2](https://github.com/cloudevents/sdk-go) | `2.0.0-20240712172937-3ce6b2f1f011` | `2.15.2` |
| [github.com/cloudevents/sdk-go/v2](https://github.com/cloudevents/sdk-go) | `2.15.2` | `2.16.0` |
| [github.com/coreos/go-oidc/v3](https://github.com/coreos/go-oidc) | `3.9.0` | `3.13.0` |
| [github.com/eclipse/paho.golang](https://github.com/eclipse/paho.golang) | `0.12.0` | `0.22.0` |
| [github.com/google/go-cmp](https://github.com/google/go-cmp) | `0.6.0` | `0.7.0` |
| [github.com/pelletier/go-toml/v2](https://github.com/pelletier/go-toml) | `2.0.5` | `2.2.3` |
| [github.com/rickb777/date](https://github.com/rickb777/date) | `1.13.0` | `1.21.1` |
| [go.opentelemetry.io/otel](https://github.com/open-telemetry/opentelemetry-go) | `1.34.0` | `1.35.0` |
| [go.uber.org/atomic](https://github.com/uber-go/atomic) | `1.10.0` | `1.11.0` |



Updates `github.com/cert-manager/cert-manager` from 1.13.3 to 1.17.1
- [Release notes](https://github.com/cert-manager/cert-manager/releases)
- [Changelog](https://github.com/cert-manager/cert-manager/blob/master/RELEASE.md)
- [Commits](cert-manager/cert-manager@v1.13.3...v1.17.1)

Updates `github.com/cloudevents/conformance` from 0.2.0 to 0.4.1
- [Release notes](https://github.com/cloudevents/conformance/releases)
- [Commits](cloudevents/conformance@v0.2.0...v0.4.1)

Updates `github.com/cloudevents/sdk-go/sql/v2` from 2.0.0-20240712172937-3ce6b2f1f011 to 2.15.2
- [Release notes](https://github.com/cloudevents/sdk-go/releases)
- [Commits](https://github.com/cloudevents/sdk-go/commits/v2.15.2)

Updates `github.com/cloudevents/sdk-go/v2` from 2.15.2 to 2.16.0
- [Release notes](https://github.com/cloudevents/sdk-go/releases)
- [Commits](cloudevents/sdk-go@v2.15.2...v2.16.0)

Updates `github.com/coreos/go-oidc/v3` from 3.9.0 to 3.13.0
- [Release notes](https://github.com/coreos/go-oidc/releases)
- [Commits](coreos/go-oidc@v3.9.0...v3.13.0)

Updates `github.com/eclipse/paho.golang` from 0.12.0 to 0.22.0
- [Release notes](https://github.com/eclipse/paho.golang/releases)
- [Commits](eclipse-paho/paho.golang@v0.12.0...v0.22.0)

Updates `github.com/google/go-cmp` from 0.6.0 to 0.7.0
- [Release notes](https://github.com/google/go-cmp/releases)
- [Commits](google/go-cmp@v0.6.0...v0.7.0)

Updates `github.com/pelletier/go-toml/v2` from 2.0.5 to 2.2.3
- [Release notes](https://github.com/pelletier/go-toml/releases)
- [Changelog](https://github.com/pelletier/go-toml/blob/v2/.goreleaser.yaml)
- [Commits](pelletier/go-toml@v2.0.5...v2.2.3)

Updates `github.com/rickb777/date` from 1.13.0 to 1.21.1
- [Release notes](https://github.com/rickb777/date/releases)
- [Commits](rickb777/date@v1.13.0...v1.21.1)

Updates `go.opentelemetry.io/otel` from 1.34.0 to 1.35.0
- [Release notes](https://github.com/open-telemetry/opentelemetry-go/releases)
- [Changelog](https://github.com/open-telemetry/opentelemetry-go/blob/main/CHANGELOG.md)
- [Commits](open-telemetry/opentelemetry-go@v1.34.0...v1.35.0)

Updates `go.opentelemetry.io/otel/trace` from 1.34.0 to 1.35.0
- [Release notes](https://github.com/open-telemetry/opentelemetry-go/releases)
- [Changelog](https://github.com/open-telemetry/opentelemetry-go/blob/main/CHANGELOG.md)
- [Commits](open-telemetry/opentelemetry-go@v1.34.0...v1.35.0)

Updates `go.uber.org/atomic` from 1.10.0 to 1.11.0
- [Release notes](https://github.com/uber-go/atomic/releases)
- [Changelog](https://github.com/uber-go/atomic/blob/master/CHANGELOG.md)
- [Commits](uber-go/atomic@v1.10.0...v1.11.0)

Updates `golang.org/x/net` from 0.35.0 to 0.37.0
- [Commits](golang/net@v0.35.0...v0.37.0)

Updates `golang.org/x/sync` from 0.11.0 to 0.12.0
- [Commits](golang/sync@v0.11.0...v0.12.0)

---
updated-dependencies:
- dependency-name: github.com/cert-manager/cert-manager
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: github.com/cloudevents/conformance
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: github.com/cloudevents/sdk-go/sql/v2
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: github.com/cloudevents/sdk-go/v2
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: github.com/coreos/go-oidc/v3
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: github.com/eclipse/paho.golang
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: github.com/google/go-cmp
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: github.com/pelletier/go-toml/v2
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: github.com/rickb777/date
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: go.opentelemetry.io/otel
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: go.opentelemetry.io/otel/trace
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: go.uber.org/atomic
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: golang.org/x/net
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
- dependency-name: golang.org/x/sync
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Mar 31, 2025
Copy link

openshift-ci bot commented Mar 31, 2025

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift-knative member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci openshift-ci bot requested review from creydr and matzew March 31, 2025 11:33
Copy link

openshift-ci bot commented Mar 31, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot]
Once this PR has been reviewed and has the lgtm label, please assign creydr for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update go code needs-ok-to-test
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants