Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the go_modules group across 1 directory with 6 updates #543

Closed
wants to merge 1 commit into from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Apr 25, 2024

Bumps the go_modules group with 6 updates in the / directory:

Package From To
github.com/containerd/containerd 1.7.11 1.7.16
github.com/docker/distribution 2.8.2+incompatible 2.8.3+incompatible
github.com/docker/docker 24.0.9+incompatible 26.1.0+incompatible
github.com/quic-go/quic-go 0.38.1 0.42.0
golang.org/x/image 0.10.0 0.15.0
google.golang.org/grpc 1.59.0 1.63.2

Updates github.com/containerd/containerd from 1.7.11 to 1.7.16

Release notes

Sourced from github.com/containerd/containerd's releases.

containerd 1.7.16

Welcome to the v1.7.16 release of containerd!

The sixteenth patch release for containerd 1.7 contains various fixes and updates.

Highlights

  • Update AppArmor template to allow confined runc to kill containers (#10129)
  • Fix config import relative path glob (#9834)
  • Update AppArmor template to better support rootlesskit (#10116)
  • Update HTTP fallback to better account for TLS timeout and previous attempts (#10112)
  • Add support for HPC port forwarding (#10008)
  • Prevent GC from schedule itself with 0 period. (#10102)
  • Fix issue with using invalid token to retry fetching layer (#10065)
  • Automatically decompress archives for transfer service import (#9989)
  • Fix HTTPFallback fails when pushing manifest (#10044)
  • Add support for configuring otel from env and config deprecation notice (#9992)
  • Fix deadlock during NRI plugin registration (containerd/nri#79)

Build and Release Toolchain

  • Update Go to 1.21.9 and 1.22.2 with net/http security fix (#10115)

Container Runtime Interface (CRI)

  • Fix CRI snapshotter root path when not under containerd root (#10096)
  • Fix network creation failure from CreatedAt time as 269 years ago (#10122)
  • Include userns info in PodSandboxStatus (#9865)
  • Fix default working directory Windows HostProcess containers (#10071)
  • Fix ListPodSandboxStats to skip sandboxes with missing tasks (#10042)

Deprecations

  • Add support for configuring otel from env and config deprecation notice (#9992)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors

  • Derek McGowan
  • Samuel Karp
  • Wei Fu
  • Danny Canter
  • Kazuyoshi Kato
  • Kirtana Ashok
  • Maksym Pavlenko
  • Phil Estes
  • Sebastiaan van Stijn
  • Brian Goff

... (truncated)

Commits
  • 8303183 Merge pull request #10124 from kiashok/new-1.7.16-tag
  • fb2d43a Merge pull request #10129 from k8s-infra-cherrypick-robot/cherry-pick-10123-t...
  • 1c62308 Add release notes for v1.7.16
  • 18a2c36 apparmor: Allow confined runc to kill containers
  • ae97657 Merge pull request #9834 from neoaggelos/fix/config-relative
  • c4a8642 Merge pull request #10096 from Kern--/cri-remote-snapshotter-stats
  • 733d456 Merge pull request #10122 from AkihiroSuda/cherrypick-9673-1.7
  • 293f515 pod: CreatedAt time will be 269 years ago while creating cri network failed.
  • e412ca7 Merge pull request #10116 from AkihiroSuda/cherrypick-10111-1.7
  • d8acdaf Merge pull request #10115 from thaJeztah/1.7_backport_go1.21.9
  • Additional commits viewable in compare view

Updates github.com/docker/distribution from 2.8.2+incompatible to 2.8.3+incompatible

Release notes

Sourced from github.com/docker/distribution's releases.

v2.8.3

What's Changed

New Contributors

Full Changelog: distribution/distribution@v2.8.2...v2.8.3

Commits
  • 4772604 Merge pull request #4088 from distribution/2.8.3-release-notes
  • a4fa699 Add v2.8.3 release notes
  • 1eb2c30 Merge pull request #4068 from milosgajdos/2_8-dont-close-request-body
  • 5e6b1b5 Do not close HTTP request body in HTTP handler
  • 2b76378 Merge pull request #4064 from thaJeztah/2.8_backport_nodigestset
  • 29b00e8 digestset: deprecate package in favor of go-digest/digestset
  • d1ab243 [release/2.8] vendor: github.com/opencontainers/go-digest v1.0.0
  • 11eb419 Merge pull request #4063 from thaJeztah/2.8_backport_switch_reference
  • 3dda067 deprecate reference package, migrate to github.com/distribution/reference
  • da05539 Merge pull request #4053 from thaJeztah/2.8_backport_set-content-type-client-...
  • Additional commits viewable in compare view

Updates github.com/docker/docker from 24.0.9+incompatible to 26.1.0+incompatible

Release notes

Sourced from github.com/docker/docker's releases.

v26.1.0

26.1.0

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:

New

Bug fixes and enhancements

  • Native Windows containers are configured with an internal DNS server for container name resolution, and external DNS servers for other lookups. Not all resolvers, including nslookup, fall back to the external resolvers when they get a SERVFAIL answer from the internal server. So, the internal DNS server can now be configured to forward requests to the external resolvers, by setting "features": {"windows-dns-proxy": true } in the daemon.json file. moby/moby#47584

[!NOTE] This will be the new default behavior in Docker Engine 27.0.

[!WARNING] The windows-dns-proxy feature flag will be removed in a future release.

  • Swarm: Fix Subpath not being passed to the container config. moby/moby#47711
  • Classic builder: Fix cache miss on WORKDIR <directory>/ build step (directory with a trailing slash). moby/moby#47723
  • containerd image store: Fix docker images failing when any image in the store has unexpected target. moby/moby#47738

v26.0.2

26.0.2

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:

Security

This release contains a security fix for CVE-2024-32473, an unexpected configuration of IPv6 on IPv4-only interfaces.

Bug fixes and enhancements

v26.0.1

... (truncated)

Commits
  • c8af8eb Merge pull request #47738 from vvoland/c8d-walk-image-badimagetarget
  • 7d95fe8 c8d/list: Ignore unexpected image target
  • 801fd16 Merge pull request #47735 from cpuguy83/better_walk_error
  • 6667e96 Include more details in errnotManifestOrIndex
  • ee8b788 Merge pull request #47734 from krissetto/image-history-timestamp-dereference
  • 96c9353 Merge pull request #47723 from vvoland/builder-fix-workdir-slash
  • ab570ab nil dereference fix on image history Created value
  • 7532420 container/SetupWorkingDirectory: Don't mutate config
  • a4d5b6b builder/normalizeWorkdir: Always return cleaned path
  • e829cca Merge pull request #47584 from robmry/upstream_dns_windows
  • Additional commits viewable in compare view

Updates github.com/quic-go/quic-go from 0.38.1 to 0.42.0

Release notes

Sourced from github.com/quic-go/quic-go's releases.

v0.42.0

New Features

  • added a qlog tracer for events that happen before / outside of established connection: #4305

Notable Changes

  • added a ClientHelloInfo.AddrVerified field: #4360
  • move callback controlling address verification (VerifySourceAddress) to the Transport: #4253 and #4362
  • connections that are closed before being accepted are not removed from the server's accept queue: #4245
  • http3: added a RoundTripOpt.CheckSettings callback to check the server's SETTINGS: #4355
  • http3: send the HTTP/3 settings value for Extended CONNECT (RFC 9220): #4341
  • http3: don't modify the user's quic.Config to enable QUIC datagram support: #4340

Fixes

  • mitigate a memory exhaustion attack against QUIC's connection ID mechanism: #4369
  • don't delay acknowledgments for packets during the handshake: #4279
  • fix deadlock when closing both Listener and Transport: #4332
  • fix handling of IPv4-mapped IPv6 addresses: #4309
  • fix duplicate logging of the key_discarded event for Handshake packets: #4274
  • send CONNECTION_REFUSED when refusing connections: #4250
  • http3: tighten validation logic for the :protocol pseudo header: #4261

What's Changed

... (truncated)

Commits
  • 4a99b81 close connection when an abnormally large number of frames are queued (#4369)
  • 9971fed use Transport.VerifySourceAddress to control the Retry Mechanism (#4362)
  • 497d3f5 http3: add a RoundTripOpt to check the server's SETTINGS frame (#4355)
  • ca787d6 add an AddrVerified field to the ClientHelloInfo (#4360)
  • f147639 update gomock to v0.4.0 (#4361)
  • 06b4214 remove unused ReceiveStream.CloseRemote method (#4357)
  • 5fd5d77 Merge pull request #4305 from quic-go/qlog-tracer
  • 30e01b9 use the transport tracer in integration tests
  • 55c05ac qlog: log sent packets outside of a QUIC connection
  • aff90a6 qlog: log sent Version Negotiation packets
  • Additional commits viewable in compare view

Updates golang.org/x/image from 0.10.0 to 0.15.0

Commits
  • 9e190ae webp: disallow multiple VP8X chunks
  • 445ab0e go.mod: update golang.org/x dependencies
  • 240a51a font/sfnt: support early version 0 OS/2 tables
  • c20bbc3 draw: simplify some calls to fmt.Fprintf
  • 491771c draw: merge draw_go117.go into draw.go
  • 4aa0222 go.mod: update go directive to 1.18
  • 3aac9c6 draw: add fast paths for RGBA64Image
  • fa10be5 go.mod: update golang.org/x dependencies
  • 2b687b5 go.mod: update golang.org/x dependencies
  • See full diff in compare view

Updates google.golang.org/grpc from 1.59.0 to 1.63.2

Release notes

Sourced from google.golang.org/grpc's releases.

Release 1.63.2

Bugs

  • Fix the user agent string

Release 1.63.1

Bugs

  • grpc: fixed subchannel log messages to properly reference the parent channel (#7101)

API Changes

  • grpc: remove Deprecated tag from Dial and DialContext; these will be deprecated in v1.64 instead (#7103)

Release 1.63.0

Behavior Changes

  • grpc: Return canonical target string from resolver.Address.String() (experimental) (#6923)
  • client & server: when using write buffer pooling, use input value for buffer size instead of size*2 (#6983)

New Features

  • grpc: add ClientConn.CanonicalTarget() to return the canonical target string. (#7006)
  • xds: implement LRS named metrics support (gRFC A64) (#7027)
  • grpc: introduce grpc.NewClient to allow users to create new clients in idle mode and with "dns" as the default resolver (#7010)

API Changes

  • grpc: stabilize experimental method ClientConn.Target() (#7006)

Bug Fixes

  • xds: fix an issue that would cause the client to send an empty list of resources for LDS/CDS upon reconnecting with the management server (#7026)
  • server: Fix some errors returned by a server when using a grpc.Server as an http.Handler with the Go stdlib HTTP server (#6989)
  • resolver/dns: add SetResolvingTimeout to allow configuring the DNS resolver's global timeout (#6917)
  • Set the security level of Windows named pipes to NoSecurity (#6956)

Release 1.62.2

Dependencies

Release 1.62.1

Bug Fixes

  • xds: fix a bug that results in no matching virtual host found RPC errors due to a difference between the target and LDS resource names (#6997)
  • server: fixed stats handler data InPayload.Length for unary RPC calls (#6766)

... (truncated)

Commits
  • d32e66c Change version to 1.63.2 (#7104)
  • 92f6dd0 channelz: pass parent pointer instead of parent ID to RegisterSubChannel (#7101)
  • 0f6ef0f grpc: un-deprecate Dial and DialContext
  • 58dc749 Change version to 1.63.1-dev (#7051)
  • c68f456 Change version to 1.63.0 (#7050)
  • 6369167 *: update http2 dependency (#7082)
  • 8854761 cherry-pick: channelz: fix race accessing channelMap without lock (#7079) (#7...
  • e62770d channelz: add LocalAddr to listen sockets and test (#7062) (#7063)
  • 4ffccf1 googlec2p: use xdstp style template for client LDS resource name (#7048)
  • faf9964 gracefulswitch: add ParseConfig and make UpdateClientConnState call SwitchTo ...
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the go_modules group with 6 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/containerd/containerd](https://github.com/containerd/containerd) | `1.7.11` | `1.7.16` |
| [github.com/docker/distribution](https://github.com/docker/distribution) | `2.8.2+incompatible` | `2.8.3+incompatible` |
| [github.com/docker/docker](https://github.com/docker/docker) | `24.0.9+incompatible` | `26.1.0+incompatible` |
| [github.com/quic-go/quic-go](https://github.com/quic-go/quic-go) | `0.38.1` | `0.42.0` |
| [golang.org/x/image](https://github.com/golang/image) | `0.10.0` | `0.15.0` |
| [google.golang.org/grpc](https://github.com/grpc/grpc-go) | `1.59.0` | `1.63.2` |



Updates `github.com/containerd/containerd` from 1.7.11 to 1.7.16
- [Release notes](https://github.com/containerd/containerd/releases)
- [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
- [Commits](containerd/containerd@v1.7.11...v1.7.16)

Updates `github.com/docker/distribution` from 2.8.2+incompatible to 2.8.3+incompatible
- [Release notes](https://github.com/docker/distribution/releases)
- [Commits](distribution/distribution@v2.8.2...v2.8.3)

Updates `github.com/docker/docker` from 24.0.9+incompatible to 26.1.0+incompatible
- [Release notes](https://github.com/docker/docker/releases)
- [Commits](moby/moby@v24.0.9...v26.1.0)

Updates `github.com/quic-go/quic-go` from 0.38.1 to 0.42.0
- [Release notes](https://github.com/quic-go/quic-go/releases)
- [Changelog](https://github.com/quic-go/quic-go/blob/master/Changelog.md)
- [Commits](quic-go/quic-go@v0.38.1...v0.42.0)

Updates `golang.org/x/image` from 0.10.0 to 0.15.0
- [Commits](golang/image@v0.10.0...v0.15.0)

Updates `google.golang.org/grpc` from 1.59.0 to 1.63.2
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.59.0...v1.63.2)

---
updated-dependencies:
- dependency-name: github.com/containerd/containerd
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/docker/distribution
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/docker/docker
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/quic-go/quic-go
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/image
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: google.golang.org/grpc
  dependency-type: indirect
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Apr 25, 2024
@github-actions github-actions bot enabled auto-merge (squash) April 25, 2024 14:58
Copy link
Contributor Author

dependabot bot commented on behalf of github May 1, 2024

Superseded by #551.

@dependabot dependabot bot closed this May 1, 2024
auto-merge was automatically disabled May 1, 2024 10:49

Pull request was closed

@dependabot dependabot bot deleted the dependabot/go_modules/go_modules-703b22a740 branch May 1, 2024 10:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants