8000 [main] Upgrade to latest dependencies by knative-automation · Pull Request #2830 · knative/func · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
8000

[main] Upgrade to latest dependencies #2830

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

knative-automation
Copy link
Contributor

Cron -knative-prow-robot

/cc knative/func-approvers
/assign knative/func-approvers

Produced by: knative-extensions/knobots/actions/update-deps

@knative-automation knative-automation force-pushed the auto-updates/update-deps-main branch from 1cea7ee to e7e52c0 Compare May 14, 2025 01:42
Copy link
knative-prow bot commented May 14, 2025

@knative-automation: GitHub didn't allow me to request PR reviews from the following users: knative/func-approvers.

Note that only knative members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

Cron -knative-prow-robot

/cc knative/func-approvers
/assign knative/func-approvers

Produced by: knative-extensions/knobots/actions/update-deps

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@knative-prow knative-prow bot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label May 14, 2025
Copy link
knative-prow bot commented May 14, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: knative-automation
Once this PR has been reviewed and has the lgtm label, please assign dprotaso for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
codecov bot commented May 14, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 63.00%. Comparing base (8a9583e) to head (3955e37).

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2830      +/-   ##
==========================================
+ Coverage   62.64%   63.00%   +0.35%     
==========================================
  Files         127      127              
  Lines       15533    15533              
==========================================
+ Hits         9731     9786      +55     
+ Misses       4891     4806      -85     
- Partials      911      941      +30     
Flag Coverage Δ
e2e-tests 35.41% <ø> (-6.72%) ⬇️
integration-tests 49.43% <ø> (+1.84%) ⬆️
unit-tests 49.49% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@knative-automation knative-automation force-pushed the auto-updates/update-deps-main branch 8 times, most recently from 489d019 to ebd4761 Compare May 21, 2025 01:43
bumping golang.org/x/crypto 959f8f3...aae6e61:
  > aae6e61 go.mod: update golang.org/x dependencies
  > 9c1aa6a ssh/test: reset the random source before capturing a recording
  > 8819902 ssh/test: enable Diffie-Hellman key exchange algorithms
  > 3f311e4 acme: return error from pre-authorization when unsupported
  > 1f7c62c ssh/test: skip unsupported tests on js/wasm
  > a5f8048 acme/autocert: use standard functions to pick the cache directory
  > 958cde8 Revert "chacha20: add loong64 SIMD implementation"
  > 51f005c Revert "salsa20: add loong64 SIMD implementation"
  > 7c35866 Revert "argon2: add loong64 SIMD implementation"
  > 0091fc8 Revert "blake2s: add loong64 SIMD implementation"
  > 388684e argon2: add loong64 SIMD implementation
  > 953e809 chacha20: add loong64 SIMD implementation
  > 18f7707 salsa20: add loong64 SIMD implementation
  > 2ebaafc blake2s: add loong64 SIMD implementation
  > 4bc0711 acme: use built-in max/min to simplify the code
  > c96bba2 ssh: add mlkem768x25519-sha256 Key Exchange algorithm
  > 6b13eef ssh: add integration tests against a reference implementation
bumping golang.org/x/text 4890c57...700cc20:
  > 700cc20 go.mod: update golang.org/x dependencies
bumping golang.org/x/term 5d2308b...2ec7864:
  > 2ec7864 go.mod: update golang.org/x dependencies
  > a809085 term: support pluggable history
bumping golang.org/x/net b8d8877...7d6e62a:
  > 7d6e62a go.mod: update golang.org/x dependencies
  > ea0c1d9 internal/timeseries: use built-in max/min to simplify the code
  > 3e7a445 quic: skip packet numbers for optimistic ack defense
  > 3f563d3 quic: use an enum for sentPacket state
  > a3b6e77 quic: don't re-lose packets when discarding keys
  > 22500a6 quic: decode packet numbers >255 in tests
  > dd0b200 quic: remove go1.21 build constraint
bumping knative.dev/networking 16635c6...eea9fd8:
  > eea9fd8 upgrade to latest dependencies (# 1064)
  > 6f71a25 upgrade to latest dependencies (# 1063)
  > a06da1d upgrade to latest dependencies (# 1062)
bumping knative.dev/serving a01a078...e56dd0e:
  > e56dd0e upgrade to latest dependencies (# 15894)
  > 8a39d5e upgrade to latest dependencies (# 15881)
  > 99655d2 Update net-gateway-api nightly (# 15885)
  > bbf34f6 Update net-contour nightly (# 15887)
  > 4e4420a Update net-kourier nightly (# 15886)
  > ebcedc8 Update net-istio nightly (# 15888)
  > 589b6ab bump cluster version (# 15879)
bumping knative.dev/pkg d5e74d2...44579e9:
  > 44579e9 Bump google.golang.org/grpc from 1.72.0 to 1.72.1 (# 3180)
  > 873230f upgrade to latest dependencies (# 3179)
  > 19a1383 group golang.org/x dependencies (# 3178)
  > 1c0e799 Bump golang.org/x/net from 0.39.0 to 0.40.0 (# 3177)
  > d09148e Bump golang.org/x/tools from 0.32.0 to 0.33.0 (# 3176)
  > cb6cfa2 Bump golang.org/x/sync from 0.13.0 to 0.14.0 (# 3175)
bumping golang.org/x/sync 396f3a0...506c70f:
  > 506c70f errgroup: propagate panic and Goexit through Wait
bumping knative.dev/eventing 06f8dc9...7a5486b:
  > 7a5486b [main] Upgrade to latest dependencies (# 8590)
  > 5eb1a5f Try to ensure ordering of referenced source CMs, by name (# 8589)
  > 3788fcc [main] Upgrade to latest dependencies (# 8587)
bumping knative.dev/hack c4037b0...f525e18:
  > f525e18 Bump min kube version to 1.32 (# 424)
bumping golang.org/x/sys 01aaa83...3d9a6b8:
  > 3d9a6b8 windows: add WSADuplicateSocket
  > c0a9559 cpu: add crypto extensions detection for riscv64
  > 8e9e046 windows: add virtual key codes and console input consts
  > 7138967 windows: fix slicing of NTUnicodeString values
  > 6a85559 windows: fix dangling pointers in (*SECURITY_DESCRIPTOR).ToAbsolute
bumping google.golang.org/grpc a43eba6...4cf3cf7:
  > 4cf3cf7 Change version to 1.72.1 (# 8319)
  > 537fe8d transport: Propagate status code on receiving RST_STREAM during message read (# 8289) (# 8317)
  > f32eab3 cherry-pick # 8302 and # 8304 to v1.72.x branch (# 8303)
  > 7fcfc87 internal/delegatingresolver: avoid proxy if networktype of target address is not tcp (# 8215) (# 8296)
  > ad1e120 Change version to 1.72.1-dev (# 8219)

Signed-off-by: Knative Automation <automation@knative.team>
@knative-automation knative-automation force-pushed the auto-updates/update-deps-main branch from ebd4761 to 3955e37 Compare May 21, 2025 13:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant
0