Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(go.mod/go.sum): update minor dependencies (golang) #73

Merged
merged 2 commits into from
Aug 28, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Apr 18, 2024

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence Type Update
github.com/cert-manager/cert-manager v1.14.4 -> v1.15.3 age adoption passing confidence require minor
github.com/onsi/ginkgo/v2 v2.19.0 -> v2.20.1 age adoption passing confidence require minor
github.com/onsi/gomega v1.33.1 -> v1.34.1 age adoption passing confidence require minor
github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring v0.73.0 -> v0.76.0 age adoption passing confidence require minor
github.com/redis/go-redis/v9 v9.5.1 -> v9.6.1 age adoption passing confidence require minor
go (source) 1.22.6 -> 1.23.0 age adoption passing confidence toolchain minor
go (source) 1.22.5 -> 1.23.0 age adoption passing confidence golang minor
golang.org/x/mod v0.17.0 -> v0.20.0 age adoption passing confidence require minor
k8s.io/api v0.30.2 -> v0.31.0 age adoption passing confidence require minor
k8s.io/apiextensions-apiserver v0.30.2 -> v0.31.0 age adoption passing confidence require minor
k8s.io/apimachinery v0.30.2 -> v0.31.0 age adoption passing confidence require minor
k8s.io/client-go v0.30.2 -> v0.31.0 age adoption passing confidence require minor
k8s.io/kube-aggregator v0.30.2 -> v0.31.0 age adoption passing confidence require minor
sigs.k8s.io/controller-runtime v0.18.4 -> v0.19.0 age adoption passing confidence require minor

Release Notes

cert-manager/cert-manager (github.com/cert-manager/cert-manager)

v1.15.3

Compare Source

v1.15.2

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

🔗 See v1.15.0 for more information about cert-manager 1.15 and read-before-upgrade info.

📜 Changes since v1.15.1

Bug or Regression

v1.15.1

Compare Source

v1.15.0

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

cert-manager 1.15 promotes several features to beta, including GatewayAPI support (ExperimentalGatewayAPISupport), the ability to provide a subject in the Certificate that will be used literally in the CertificateSigningRequest (LiteralCertificateSubject) and the outputting of additional certificate formats (AdditionalCertificateOutputFormats).

[!NOTE]

The cmctl binary have been moved to https://github.com/cert-manager/cmctl/releases.
For the startupapicheck Job you should update references to point at quay.io/jetstack/cert-manager-startupapicheck

[!NOTE]

From this release, the Helm chart will no longer uninstall the CRDs when the chart is uninstalled. If you want the CRDs to be removed on uninstall use crds.keep=false when installing the Helm chart.

Community

Thanks again to all open-source contributors with commits in this release, including: @​Pionerd, @​SgtCoDFish, @​ThatsMrTalbot, @​andrey-dubnik, @​bwaldrep, @​eplightning, @​erikgb, @​findnature, @​gplessis, @​import-shiburin, @​inteon, @​jkroepke, @​lunarwhite, @​mangeshhambarde, @​pwhitehead-splunk & @​rodrigorfk, @​wallrj.

Thanks also to the following cert-manager maintainers for their contributions during this release: @​SgtCoDFish, @​SpectralHiss, @​ThatsMrTalbot, @​hawksight, @​inteon, @​maelvls & @​wallrj.

Equally thanks to everyone who provided feedback, helped users and raised issues on GitHub and Slack and joined our meetings!

Thanks also to the CNCF, which provides resources and support, and to the AWS open source team for being good community members and for their maintenance of the PrivateCA Issuer.

In addition, massive thanks to Venafi for contributing developer time and resources towards the continued maintenance of cert-manager projects.

Changes by Kind
Feature
  • GatewayAPI support has graduated to Beta. Add the --enable-gateway-api flag to enable the integration. (#​6961, @​ThatsMrTalbot)
  • Add support to specify a custom key alias in a JKS Keystore (#​6807, @​bwaldrep)
  • Add the ability to communicate with Vault via mTLS when strict client certificates is enabled at Vault server side (#​6614, @​rodrigorfk)
  • Added option to provide additional audiences in the service account auth section for vault (#​6718, @​andrey-dubnik)
  • Venafi Issuer now sends a cert-manager HTTP User-Agent header in all Venafi Rest API requests.
    For example: cert-manager-certificaterequests-issuer-venafi/v1.15.0+(linux/amd64)+cert-manager/ef068a59008f6ed919b98a7177921ddc9e297200. (#​6865, @​wallrj)
  • Add hint to validation error message to help users of external issuers more easily fix the issue if they specify a Kind but forget the Group (#​6913, @​SgtCoDFish)
  • Add support for numeric OID types in LiteralSubject. Eg. "1.2.3.4=String Value" (#​6775, @​inteon)
  • Promote the LiteralCertificateSubject feature to Beta. (#​7030, @​inteon)
  • Promoted the AdditionalCertificateOutputFormats feature gate to Beta (enabled by default). (#​6970, @​erikgb)
  • The Helm chart now allows you to supply extraObjects; a list of yaml manifests which will helm will install and uninstall with the cert-manager manifests. (#​6424, @​gplessis)
  • Update the Route53 provider to support fetching credentials using AssumeRoleWithWebIdentity (#​6878, @​pwhitehead-splunk)
  • Helm can now add optional hostAliases to cert-manager Pod to allow the DNS self-check to pass in custom scenarios. (#​6456, @​Pionerd)
  • Added a new Ingress annotation for copying specific Ingress annotations to Certificate's secretTemplate (#​6839, @​mangeshhambarde)
  • Added option to define additional token audiences for the Vault Kubernetes auth (#​6744, @​andrey-dubnik)
  • Allow cert-manager.io/allow-direct-injection in annotations (#​6801, @​jkroepke)
Design
Bug or Regression
  • BUGFIX: Fixes issue with JSON-logging, where only a subset of the log messages were output as JSON. (#​6779, @​inteon)
  • BUGFIX: JKS and PKCS12 stores now contain the full set of CAs specified by an issuer (#​6806, @​bwaldrep)
  • BUGFIX: cainjector leaderelection flag/config option defaults are missing (#​6816, @​inteon)
  • BUGFIX: cert-manager issuers incorrectly copied the critical flag from the CSR instead of re-calculating that field themselves. (#​6724, @​inteon)
  • Breaking Change: Fixed unintended certificate chain is used if preferredChain is configured. (#​6755, @​import-shiburin)
  • Bugfix: LiteralSubjects with a #= value can result in memory issues due to faulty BER parser (github.com/go-asn1-ber/asn1-ber). (#​6770, @​inteon)
  • DigitalOcean: Ensure that only TXT records are considered for deletion when cleaning up after an ACME challenge (#​6875, @​SgtCoDFish)
  • Fix backwards incompatible removal of default prometheus Service resource. (#​6699, @​inteon)
  • Fix broken cainjector image value in Helm chart (#​6692, @​SgtCoDFish)
  • Helm: Fix a bug in the logic that differentiates between 0 and an empty value. (#​6713, @​inteon)
  • Make sure the Azure SDK error messages are stable. (#​6676, @​inteon)
  • When using the literalSubject on a Certificate, the webhook validation for the common name now also points to the literalSubject. (#​6767, @​lunarwhite)
  • Bump golang.org/x/net to fix CVE-2023-45288 (#​6929, @​SgtCoDFish)
  • Fix ACME issuer being stuck waiting for DNS propagation when using Azure DNS with multiple instances issuing for the same FQDN (#​6351, @​eplightning)
  • Fix cainjector ConfigMap not mounted in the cainjector deployment. (#​7055, @​inteon)
  • Added disableAutoApproval and approveSignerNames Helm chart options. (#​7054, @​inteon)
Other (Cleanup or Flake)

v1.14.7

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

📜 Changes since v1.14.6
Bugfixes
Other (Cleanup or Flake)

v1.14.6

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

📜 Changes since v1.14.5
Other (Cleanup or Flake)

v1.14.5

Compare Source

onsi/ginkgo (github.com/onsi/ginkgo/v2)

v2.20.1

Compare Source

2.20.1

Fixes
  • make BeSpecEvent duration matcher more forgiving [d6f9640]

v2.20.0

Compare Source

2.20.0

Features
Maintenance
  • Add update-deps to makefile [d303d14]
  • bump all dependencies [7a50221]

v2.19.1

Compare Source

2.19.1

Fixes
  • update supported platforms for race conditions [63c8c30]
  • [build] Allow custom name for binaries. [ff41e27]
Maintenance
onsi/gomega (github.com/onsi/gomega)

v1.34.1

Compare Source

1.34.1

Maintenance
  • Use slices from exp/slices to keep golang 1.20 compat [5e71dcd]

v1.34.0

Compare Source

1.34.0

Features
  • Add RoundTripper method to ghttp.Server [c549e0d]
Fixes
  • fix incorrect handling of nil slices in HaveExactElements (fixes #​771) [878940c]
  • issue_765 - fixed bug in Hopcroft-Karp algorithm [ebadb67]
Maintenance
prometheus-operator/prometheus-operator (github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring)

v0.76.0

Compare Source

0.76.0 / 2025-08-08

  • [CHANGE] Enhanced secret management in Prometheus and PrometheusAgent CRDs by switching the secrets field from atomic to listType: set, allowing independent handling of entries by different managers to prevent conflicts and improve deployment stability. #​6762
  • [CHANGE] Add API-level validations to Kubernetes SD in the ScrapeConfig CRD. #​6678
  • [FEATURE] Add TLS and Proxy settings to OAuth2 configuration for Prometheus and PrometheusAgent CRDs. #​6735
  • [FEATURE] Add support for OAuth2 in the ScrapeConfig CRD. #​6814
  • [FEATURE] Add scale subresource to the Alertmanger CRD. #​6728
  • [FEATURE] Add Scaleway service discovery to the ScrapeConfig CRD. #​6711
  • [FEATURE] Add serviceDiscoveryRole field to the Prometheus and PrometheusAgent CRDs to select between Endpoints (default) and EndpointSlice for discovering scrape and alerting targets. #​6672
  • [ENHANCEMENT] Make the namespace field optional in the Alertmanager endpoints configuration of the Prometheus CRD, if not defined it will use the default namespace. #​6338
  • [ENHANCEMENT] Add support to configure the TLS version for Prometheus, PrometheusAgent and Alertmanager CRDs. #​6736
  • [ENHANCEMENT] Add -secret-label-selector argument to the operator to filter the Secrets being watched. #​6731
  • [ENHANCEMENT] Add attachMetadata field to ScrapeClasses. #​6756
  • [BUGFIX] Add support for all proxy settings in the Alertmanager configuration. #​6818

v0.75.2: 0.75.2 / 2024-07-23

Compare Source

  • [BUGFIX] Avoid invalid alerting config with TLS. #​6765

v0.75.1: 0.75.1 / 2024-07-02

Compare Source

  • [BUGFIX] Fix OVHCloud service discovery configs key error. #​6723

v0.75.0: 0.75.0 / 2024-06-26

Compare Source

  • [CHANGE] Global limits over enforced limits when no user limits are set. #​6608
  • [CHANGE/BUGFIX] Use a separate port number (8081) for the init container. #​6635
  • [FEATURE] Add source field in pagerdutyConfigs in AlertManangerConfig CRD. #​6427
  • [FEATURE] Add DockerSwarm Service Discovery support in the ScrapeConfig CRD. #​6633
  • [FEATURE] Add Linode Service Discovery support in the ScrapeConfig CRD. #​6586
  • [FEATURE] Add PuppetDB Service Discovery support in the ScrapeConfig CRD. #​6651
  • [FEATURE] Add LightSail Service Discovery support in the ScrapeConfig CRD. #​6660
  • [FEATURE] Add OVHCloud Service Discovery support in the ScrapeConfig CRD. #​6689
  • [FEATURE] Add extra metric relabelings to scrape classes. #​6492
  • [FEATURE] Add jobName field to ScrapeConfig CRD. #​6618
  • [FEATURE] Add automatic memory limit handling using the flag -auto-gomemlimit-ratio. #​6591
  • [FEATURE] Add support for ProxyConfig in Prometheus RemoteWrite and RemoteRead specs. #​6512
  • [ENHANCEMENT] Add automatic GOMAXPROCS to admission webhook. #​6599
  • [ENHANCEMENT] Add prometheus_operator_feature_gate_info metric. #​6655
  • [BUGFIX] Fix reloading Alertmanager when notification templates change. #​6607
  • [BUGFIX] Fix PrometheusAgent reconciliation for the statefulset changes. #​6615
  • [BUGFIX] Fix readiness/liveness probes for config-reloader when listenLocal is set to true. #​6698

v0.74.0: 0.74.0 / 2024-05-17

Compare Source

  • [CHANGE/BUGFIX] Change the proxyConnectHeader field of the proxy configuration in the ScrapeConfig CRD from a map of strings to a map of string slices. #​6541
  • [CHANGE] Automatically set the GOMAXPROCS variable according to the CPU limits of the process cgroup. #​6576
  • [FEATURE] Add support for the Nomad Service Discovery to the ScrapeConfig CRD. #​6485
  • [FEATURE] Add relabelings field for Alertmanager's endpoints in the Prometheus CRD. #​6467
  • [FEATURE] Add alertRelabelings field for the Alertmanager's endpoints in the Prometheus CRD. #​6450
  • [FEATURE] Add support for the Azure SDK authentication to the Azure Service Discovery in the ScrapeConfig CRD. #​6595
  • [FEATURE] Add support for the Azure SDK authentication to the remote-write configuration in the Prometheus and PrometheusAgent CRDs. #​6596
  • [ENHANCEMENT] Add Go runtime scheduler metrics to the operator. #​6563
  • [ENHANCEMENT] Add go_sync_mutex_wait_total_seconds_total metric to the operator. #​6581
  • [BUGFIX] Allow templated strings for the responder's type in OpsGenie configuration. #​6378
  • [BUGFIX] Fix nil pointer panic in the AlertmanagerConfig Webex receiver. #​6582
  • [BUGFIX] Apply TLS scrape class settings to all PodMonitor, Probe and ScrapeConfig objects. #​6573

v0.73.2: 0.73.2 / 2024-04-18

Compare Source

  • [BUGFIX] Fix ScrapeClassTLSConfig nil pointer exception. #​6526
  • [BUGFIX] Fix missing prometheus_operator_kubernetes_client_http_requests_total metric. #​6525

v0.73.1: 0.73.1 / 2024-04-10

Compare Source

  • [BUGFIX] To minimize excessive logging, log the deprecated bearer token fields at the debug level. #​6495
redis/go-redis (github.com/redis/go-redis/v9)

v9.6.1: 9.6.1

Compare Source

Changes

9.6

This release contains all new features from version 9.6.

🚀 New Features
  • Support Hash-field expiration commands (#​2991)
  • Support Hash-field expiration commands in Pipeline & Fix HExpire HExpireWithArgs expiration (#​3038)
  • Support NOVALUES parameter for HSCAN (#​2925)
  • Added test case for CLIENT KILL with MAXAGE option (#​2971)
  • Add support for XREAD last entry (#​3005)
  • Reduce the type assertion of CheckConn (#​3066)

9.6.1

In addition minor changes were performed to retract version 9.5.3 and 9.5.4 that were released accidentally.

🧰 Maintenance
🎁 Package Distribution
  • Retract versions 9.5.3 and 9.5.4 (#​3069)

Contributors

We'd like to thank all the contributors who worked on this release!

@​LINKIWI, @​b1ron, @​gerzse, @​haines, @​immersedin, @​naiqianz, @​ofekshenawa, @​srikar-jilugu, @​tzongw, @​vladvildanov, @​vmihailenco and @​monkey92t

v9.6.0: 9.6.0

Compare Source

Changes

🚀 New Features

  • Support Hash-field expiration commands (#​2991)
  • Support Hash-field expiration commands in Pipeline & Fix HExpire HExpireWithArgs expiration (#​3038)
  • Support NOVALUES parameter for HSCAN (#​2925)
  • Added test case for CLIENT KILL with MAXAGE option (#​2971)
  • Add support for XREAD last entry (#​3005)
  • Reduce the type assertion of CheckConn (#​3066)

🛠️ Improvements

This release includes support for Redis Community Edition (CE) 7.4.0, ensuring compatibility with the latest features and improvements introduced in Redis CE 7.4.0.

🧰 Maintenance

  • chore(deps): bump golangci/golangci-lint-action from 4 to 6 (#​2993)
  • Avoid unnecessary retry delay in cluster client following MOVED and ASK redirection (#​3048)
  • add test for tls connCheck #​3025 (#​3047)
  • fix node routing in slotClosestNode (#​3043)
  • Update pubsub.go (#​3042)
  • Change monitor test to run manually (#​3041)
  • chore(deps): bump rojopolis/spellcheck-github-actions from 0.36.0 to 0.38.0 (#​3028)
  • Add (*StatusCmd).Bytes() method (#​3030)
  • chore(deps): bump golang.org/x/net from 0.20.0 to 0.23.0 in /example/otel (#​3000)

Contributors

We'd like to thank all the contributors who worked on this release!

@​LINKIWI, @​b1ron, @​dependabot, @​dependabot[bot], @​gerzse, @​haines, @​immersedin, @​naiqianz, @​ofekshenawa, @​srikar-jilugu, @​tzongw, @​vladvildanov and @​vmihailenco @​monkey92t

v9.5.4

Compare Source

v9.5.3

Compare Source

v9.5.2: 9.5.2

Compare Source

Changes

  • fix: fix #​2681 (#​2998)
  • Remove skipping span creation by checking parent spans (#​2980)
  • Handle IPv6 in isMovedError (#​2981)
  • Fix XGroup first pos key (#​2983)
  • Adding BitfieldRo in BitMapCmdable interface (#​2962)
  • Optimize docs useless imports and typo (#​2970)
  • chore: fix some comments (#​2967)
  • Fix for issues #​2959 and #​2960 (#​2961)
  • fix: #​2956 (#​2957)
  • fix misuses of a vs an (#​2936)
  • add server address and port span attributes to redis otel trace instrumentation (#​2826)
  • chore(deps): bump google.golang.org/protobuf from 1.32.0 to 1.33.0 in /example/otel (#​2944)
  • Remove secrets from Redis Enterprise CI (#​2938)
  • Fix monitor on go 1.19 (#​2908)
  • chore(deps): bump google.golang.org/protobuf from 1.28.1 to 1.33.0 in /extra/redisprometheus (#​2942)
  • Change RE image to public RE image (#​2935)

Contributors

We'd like to thank all the contributors who worked on this release!

@​XSAM, @​akash14darshan, @​daviddzxy, @​dependabot, @​dependabot[bot], @​esara, @​hakusai22, @​hishope, @​kindknow, @​monkey92t, @​ofekshenawa, @​singular-seal and deferdeter

golang/go (go)

v1.23.0

kubernetes/api (k8s.io/api)

v0.31.0

Compare Source

v0.30.4

Compare Source

v0.30.3

Compare Source

kubernetes/apiextensions-apiserver (k8s.io/apiextensions-apiserver)

v0.31.0

Compare Source

v0.30.4

Compare Source

v0.30.3

Compare Source

kubernetes/apimachinery (k8s.io/apimachinery)

v0.31.0

Compare Source

v0.30.4

Compare Source

v0.30.3

Compare Source

kubernetes/client-go (k8s.io/client-go)

v0.31.0

Compare Source

v0.30.4

Compare Source

v0.30.3

Compare Source

kubernetes/kube-aggregator (k8s.io/kube-aggregator)

v0.31.0

Compare Source

v0.30.4

Compare Source

v0.30.3

Compare Source

kubernetes-sigs/controller-runtime (sigs.k8s.io/controller-runtime)

v0.19.0

Compare Source

⚠️ Deprecation Warnings

Please note that admission.Defaulter/Validator have been deprecated in favor of admission.CustomDefaulter/CustomValidator since v0.17 and will be removed with v0.20.

⚠️ Breaking Changes

✨ New Features

  • client: Add WithFieldValidation client (#​2860 #​2913)
  • controller & webhook: Recover panics per default & add panic metrics (#​2905)
  • controllerutil: configure BlockOwnerDeletion when setting OwnerReference (#​2847)
  • fake client: Add scale subresource logic (#​2855)
  • predicate: Add missing generic version of ResourceVersionChangedPredicate (#​2812)
  • setup-envtest: Download binaries from controller-tools releases instead of GCS (#​2811)
  • setup-envtest: Publish setup-envtest binaries via release attachments (#​2911)
  • workqueue: Add controller label to workqueue metrics (#​2895)

🐛 Bug Fixes

  • apiutil.IsGVKNamespaced: Fix namespaced GVK check to use version (#​2875)
  • cache: Fix label defaulting of byObject when namespaces are configured (#​2805)
  • certwatcher: Recreate watcher if the file is unlinked and replaced (#​2893)
  • manager: Fix log in AddMetricsServerExtraHandler (#​2874)
  • manager: Quiet context.Canceled errors during shutdown (#​2745)
  • manager: Reintroduce AddMetricsServerExtraHandler (#​2813)
  • manager.Start: Prevent LeaderElector setup error from being swallowed (#​2876)
  • source.Kind: String() should return correct

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

renovate-approve[bot]
renovate-approve bot previously approved these changes Apr 18, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Apr 18, 2024
@renovate renovate bot force-pushed the renovate/minor-deps-golang branch from 55e3a44 to 3ed895d Compare April 18, 2024 18:30
@renovate renovate bot changed the title fix(go.mod/go.sum): update minor dependencies (golang) to v0.30.0 fix(go.mod/go.sum): update minor dependencies (golang) Apr 18, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Apr 18, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Apr 24, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Apr 30, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes May 2, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes May 6, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes May 15, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes May 21, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes May 24, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Aug 4, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Aug 7, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Aug 12, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Aug 13, 2024
@renovate renovate bot force-pushed the renovate/minor-deps-golang branch 2 times, most recently from 87193a0 to 586662b Compare August 14, 2024 17:52
@renovate renovate bot force-pushed the renovate/minor-deps-golang branch from 586662b to d3cc2f2 Compare August 15, 2024 11:23
renovate-approve[bot]
renovate-approve bot previously approved these changes Aug 15, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Aug 16, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Aug 21, 2024
renovate-approve[bot]
renovate-approve bot previously approved these changes Aug 27, 2024
Copy link
Contributor Author

renovate bot commented Aug 28, 2024

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

@cbarbian-sap cbarbian-sap merged commit 7b4a6b3 into main Aug 28, 2024
6 checks passed
@cbarbian-sap cbarbian-sap deleted the renovate/minor-deps-golang branch August 28, 2024 13:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant