Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the all group with 12 updates #1102

Closed
wants to merge 1 commit into from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Apr 11, 2024

Bumps the all group with 12 updates:

Package From To
cloud.google.com/go/storage 1.39.1 1.40.0
github.com/golangci/golangci-lint 1.57.1 1.57.2
github.com/sigstore/cosign/v2 2.2.3 2.2.4
github.com/sigstore/rekor 1.3.5 1.3.6
github.com/sigstore/sigstore 1.8.2 1.8.3
github.com/sigstore/sigstore/pkg/signature/kms/aws 1.8.2 1.8.3
github.com/sigstore/sigstore/pkg/signature/kms/azure 1.8.2 1.8.3
github.com/sigstore/sigstore/pkg/signature/kms/gcp 1.8.2 1.8.3
github.com/sigstore/sigstore/pkg/signature/kms/hashivault 1.8.2 1.8.3
github.com/spiffe/go-spiffe/v2 2.1.7 2.2.0
golang.org/x/crypto 0.21.0 0.22.0
google.golang.org/grpc 1.62.1 1.63.2

Updates cloud.google.com/go/storage from 1.39.1 to 1.40.0

Release notes

Sourced from cloud.google.com/go/storage's releases.

storage: v1.40.0

1.40.0 (2024-03-29)

Features

Bug Fixes

  • storage: Retry errors from last recv on uploads (#9616) (b6574aa)
  • storage: Update protobuf dep to v1.33.0 (30b038d)

Performance Improvements

  • storage: Remove protobuf's copy of data on unmarshalling (#9526) (81281c0)
Commits
  • 438afcf chore(main): release spanner 1.40.0 (#6988)
  • bd85442 feat(spanner): configurable logger (#6958)
  • d5e2e0f chore: update individual config to be separate prs (#6981)
  • 1ce0f7d feat(spanner/spansql): add support for interval arg of some date/timestamp fu...
  • 5b14658 feat(spanner): PG JSONB support (#6874)
  • 3c4b2b3 chore: bulk rewrite signatures for GA clients (#6951)
  • d82ef41 chore(bigtable): more text proxy tune-up (#6977)
  • e7ab70b test(storage): add gRPC error code to retry to fix flaky PAP test (#6974)
  • f7c7f41 feat(storage): add Autoclass support (#6828)
  • 5d2dc01 chore(bigtable): add timeouts to proxy methods (#6973)
  • Additional commits viewable in compare view

Updates github.com/golangci/golangci-lint from 1.57.1 to 1.57.2

Release notes

Sourced from github.com/golangci/golangci-lint's releases.

v1.57.2

For key updates, see the changelog.

golangci-lint is a free and open-source project built by volunteers.

If you value it, consider supporting us, the maintainers and linter authors.

We appreciate it! ❤️

Changelog

  • 94a01793 build(deps): bump github.com/ckaznocha/intrange from 0.1.0 to 0.1.1 (#4570)
  • 9558299e build(deps): bump github.com/jgautheron/goconst from 1.7.0 to 1.7.1 (#4555)
  • b78225bd build(deps): bump github.com/karamaru-alpha/copyloopvar from 1.0.8 to 1.0.9 (#4565)
  • 5a668425 build(deps): bump github.com/karamaru-alpha/copyloopvar from 1.0.9 to 1.0.10 (#4584)
  • afd670b9 build(deps): bump github.com/kkHAIKE/contextcheck from 1.1.4 to 1.1.5 (#4564)
  • 03acb644 build(deps): bump github.com/ldez/gomoddirectives from 0.2.3 to 0.2.4 (#4580)
  • 4d2fa7b3 build(deps): bump github.com/nunnatsa/ginkgolinter from 0.16.1 to 0.16.2 (#4569)
  • 66ec75e7 fix: display warnings on deprecated linter options (#4568)
  • 77a8601a fix: hide useless warning (#4587)
  • 3cff8687 fix: missing output format (#4574)
  • 5ae78cd2 fix: the TeamCity inspectionType service message (#4573)
Changelog

Sourced from github.com/golangci/golangci-lint's changelog.

v1.57.2

  1. Updated linters
    • contextcheck: from 1.1.4 to 1.1.5
    • copyloopvar: from 1.0.8 to 1.0.10
    • ginkgolinter: from 0.16.1 to 0.16.2
    • goconst: from 1.7.0 to 1.7.1
    • gomoddirectives: from 0.2.3 to 0.2.4
    • intrange: from 0.1.0 to 0.1.1
  2. Misc.
    • fix: display warnings on deprecated linter options
    • fix: missing colored-tab output format
    • fix: TeamCity inspectionType service message
  3. Documentation
    • Remove invalid example about mixing files and directory
    • Improve linters page
Commits
  • 77a8601 fix: hide useless warning (#4587)
  • 5a66842 build(deps): bump github.com/karamaru-alpha/copyloopvar from 1.0.9 to 1.0.10 ...
  • c037920 build(deps): bump express from 4.18.2 to 4.19.2 in /docs (#4581)
  • 03acb64 build(deps): bump github.com/ldez/gomoddirectives from 0.2.3 to 0.2.4 (#4580)
  • 87a35e6 dev: organize golinters package (#4578)
  • 085ac85 dev: minor clean up (#4577)
  • 840ef62 dev: remove unused markdownlint config file (#4576)
  • 3cff868 fix: missing output format (#4574)
  • 5ae78cd fix: the TeamCity inspectionType service message (#4573)
  • 66ec75e fix: display warnings on deprecated linter options (#4568)
  • Additional commits viewable in compare view

Updates github.com/sigstore/cosign/v2 from 2.2.3 to 2.2.4

Release notes

Sourced from github.com/sigstore/cosign/v2's releases.

v2.2.4

Bug Fixes

Features

  • Adds Support for Fulcio Client Credentials Flow, and Argument to Set Flow Explicitly (#3578)

Documentation

  • add oci bundle spec (#3622)
  • Correct help text of triangulate cmd (#3551)
  • Correct help text of verify-attestation policy argument (#3527)
  • feat: add OVHcloud MPR registry tested with cosign (#3639)

Testing

  • Refactor e2e-tests.yml workflow (#3627)
  • Clean up and clarify e2e scripts (#3628)
  • Don't ignore transparency log in tests if possible (#3528)
  • Make E2E tests hermetic (#3499)
  • add e2e test for pkcs11 token signing (#3495)

Full Changelog: sigstore/cosign@v2.2.3...v2.2.4

Changelog

Sourced from github.com/sigstore/cosign/v2's changelog.

v2.2.4

Bug Fixes

Features

  • Adds Support for Fulcio Client Credentials Flow, and Argument to Set Flow Explicitly (#3578)

Documentation

  • add oci bundle spec (#3622)
  • Correct help text of triangulate cmd (#3551)
  • Correct help text of verify-attestation policy argument (#3527)
  • feat: add OVHcloud MPR registry tested with cosign (#3639)

Testing

  • Refactor e2e-tests.yml workflow (#3627)
  • Clean up and clarify e2e scripts (#3628)
  • Don't ignore transparency log in tests if possible (#3528)
  • Make E2E tests hermetic (#3499)
  • add e2e test for pkcs11 token signing (#3495)
Commits

Updates github.com/sigstore/rekor from 1.3.5 to 1.3.6

Release notes

Sourced from github.com/sigstore/rekor's releases.

v1.3.6

New Features

  • Add support for IEEE P1363 encoded ECDSA signatures
  • Add index performance script (#2042)
  • Add support for ed25519ph user keys in hashedrekord (#1945)
  • Add metrics for index insertion (#2015)
  • Add TLS support for Redis Client implementation (#1998)

Bug Fixes

  • fix typo in remoteIp and set full name for trace field

Full Changelog: sigstore/rekor@v1.3.5...v1.3.6

Changelog

Sourced from github.com/sigstore/rekor's changelog.

v1.3.6

New Features

  • Add support for IEEE P1363 encoded ECDSA signatures
  • Add index performance script (#2042)
  • Add support for ed25519ph user keys in hashedrekord (#1945)
  • Add metrics for index insertion (#2015)
  • Add TLS support for Redis Client implementation (#1998)

Bug Fixes

  • fix typo in remoteIp and set full name for trace field

Contributors

  • Bob Callaway
  • Colleen Murphy
  • cpanato
  • Hayden B
  • Mihkel Pärna
  • Riccardo Schirone
Commits
  • a678856 Add 1.3.6 changelog, test IEEE P1363 sigs in DSSE (#2063)
  • c0668d1 build(deps): Bump google/cloud-sdk from 469.0.0 to 470.0.0
  • 6e94a72 build(deps): Bump google.golang.org/api from 0.171.0 to 0.172.0
  • 55bd48a build(deps): Bump the all group with 7 updates
  • 52e87d5 build(deps): Bump google.golang.org/api from 0.170.0 to 0.171.0
  • a613ad3 build(deps): Bump golang.org/x/mod from 0.15.0 to 0.16.0
  • e767e92 build(deps): Bump go.step.sm/crypto from 0.43.1 to 0.44.1
  • 1571edc build(deps): Bump gocloud.dev from 0.36.0 to 0.37.0
  • 64546c8 build(deps): Bump cloud.google.com/go/pubsub from 1.36.2 to 1.37.0
  • 3ba13dd build(deps): Bump google/cloud-sdk from 468.0.0 to 469.0.0 (#2061)
  • Additional commits viewable in compare view

Updates github.com/sigstore/sigstore from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore's releases.

v1.8.3

What's Changed

Full Changelog: sigstore/sigstore@v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view

Updates github.com/sigstore/sigstore/pkg/signature/kms/aws from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore/pkg/signature/kms/aws's releases.

v1.8.3

What's Changed

Full Changelog: sigstore/sigstore@v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view

Updates github.com/sigstore/sigstore/pkg/signature/kms/azure from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore/pkg/signature/kms/azure's releases.

v1.8.3

What's Changed

Full Changelog: sigstore/sigstore@v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view

Updates github.com/sigstore/sigstore/pkg/signature/kms/gcp from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore/pkg/signature/kms/gcp's releases.

v1.8.3

What's Changed

Full Changelog: sigstore/sigstore@v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view

Updates github.com/sigstore/sigstore/pkg/signature/kms/hashivault from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore/pkg/signature/kms/hashivault's releases.

v1.8.3

What's Changed

Full Changelog: sigstore/sigstore@v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view

Updates github.com/spiffe/go-spiffe/v2 from 2.1.7 to 2.2.0

Release notes

Sourced from github.com/spiffe/go-spiffe/v2's releases.

v2.2.0

Changed

  • Upgraded to go-jose v4 which has a stronger security posture than v3. Go-spiffe was not impacted by the security weaknesses of v3 due to stringing algorithm checking that is now handled by go-jose v4 (#276)

Fixed

  • Makefile invocation for Apple Silicon-based Macs (#275)

Added

  • Support Ed25519 keys for Workload SVIDs (#248)
Changelog

Sourced from github.com/spiffe/go-spiffe/v2's changelog.

[2.2.0] - 2024-04-01

Changed

  • Upgraded to go-jose v4 which has a stronger security posture than v3. Go-spiffe was not impacted by the security weaknesses of v3 due to stringing algorithm checking that is now handled by go-jose v4 (#276)

Fixed

  • Makefile invocation for Apple Silicon-based Macs (#275)

Added

  • Support Ed25519 keys for Workload SVIDs (#248)
Commits

Updates golang.org/x/crypto from 0.21.0 to 0.22.0

Commits
  • d042a39 go.mod: update golang.org/x dependencies
  • b92bf94 ssh: respect MaxAuthTries also for "none" auth attempts
  • 6f79b5a ssh: add server side multi-step authentication
  • 8d0d405 x/crypto/chacha20: cleanup chacha_ppc64le.s
  • b91329d all: remove redundant words in comments and fix some typos
  • See full diff in compare view

Updates google.golang.org/grpc from 1.62.1 to 1.63.2

Release notes

Sourced from google.golang.org/grpc's releases.

Release 1.63.2

Bugs

  • Fix the user agent string

Release 1.63.1

Bugs

  • grpc: fixed subchannel log messages to properly reference the parent channel (#7101)

API Changes

  • grpc: remove Deprecated tag from Dial and DialContext; these will be deprecated in v1.64 instead (#7103)

Release 1.63.0

Behavior Changes

  • grpc: Return canonical target string from resolver.Address.String() (experimental) (#6923)
  • client & server: when using write buffer pooling, use input value for buffer size instead of size*2 (#6983)

New Features

  • grpc: add ClientConn.CanonicalTarget() to return the canonical target string. (#7006)
  • xds: implement LRS named metrics support (gRFC A64) (#7027)
  • grpc: introduce grpc.NewClient to allow users to create new clients in idle mode and with "dns" as the default resolver (#7010)

API Changes

  • grpc: stabilize experimental method ClientConn.Target() (#7006)

Bug Fixes

  • xds: fix an issue that would cause the client to send an empty list of resources for LDS/CDS upon reconnecting with the management server (#7026)
  • server: Fix some errors returned by a server when using a grpc.Server as an http.Handler with the Go stdlib HTTP server (#6989)
  • resolver/dns: add SetResolvingTimeout to allow configuring the DNS resolver's global timeout (#6917)
  • Set the security level of Windows named pipes to NoSecurity (#6956)

Release 1.62.2

Dependencies

Commits
  • d32e66c Change version to 1.63.2 (#7104)
  • 92f6dd0 channelz: pass parent pointer instead of parent ID to RegisterSubChannel (#7101)
  • 0f6ef0f grpc: un-deprecate Dial and DialContext
  • 58dc749 Change version to 1.63.1-dev (#7051)
  • c68f456 Change version to 1.63.0 (#7050)
  • 6369167 *: update http2 dependency (#7082)
  • 8854761 cherry-pick: channelz: fix race accessing channelMap without lock (#7079) (#7...
  • e62770d channelz: add LocalAddr to listen sockets and test (#7062) (#7063)
  • 4ffccf1 googlec2p: use xdstp style template for client LDS resource name (#7048)
  • faf9964 gracefulswitch: add ParseConfig and make UpdateClientConnState call SwitchTo ...
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the all group with 12 updates:

| Package | From | To |
| --- | --- | --- |
| [cloud.google.com/go/storage](https://github.com/googleapis/google-cloud-go) | `1.39.1` | `1.40.0` |
| [github.com/golangci/golangci-lint](https://github.com/golangci/golangci-lint) | `1.57.1` | `1.57.2` |
| [github.com/sigstore/cosign/v2](https://github.com/sigstore/cosign) | `2.2.3` | `2.2.4` |
| [github.com/sigstore/rekor](https://github.com/sigstore/rekor) | `1.3.5` | `1.3.6` |
| [github.com/sigstore/sigstore](https://github.com/sigstore/sigstore) | `1.8.2` | `1.8.3` |
| [github.com/sigstore/sigstore/pkg/signature/kms/aws](https://github.com/sigstore/sigstore) | `1.8.2` | `1.8.3` |
| [github.com/sigstore/sigstore/pkg/signature/kms/azure](https://github.com/sigstore/sigstore) | `1.8.2` | `1.8.3` |
| [github.com/sigstore/sigstore/pkg/signature/kms/gcp](https://github.com/sigstore/sigstore) | `1.8.2` | `1.8.3` |
| [github.com/sigstore/sigstore/pkg/signature/kms/hashivault](https://github.com/sigstore/sigstore) | `1.8.2` | `1.8.3` |
| [github.com/spiffe/go-spiffe/v2](https://github.com/spiffe/go-spiffe) | `2.1.7` | `2.2.0` |
| [golang.org/x/crypto](https://github.com/golang/crypto) | `0.21.0` | `0.22.0` |
| [google.golang.org/grpc](https://github.com/grpc/grpc-go) | `1.62.1` | `1.63.2` |


Updates `cloud.google.com/go/storage` from 1.39.1 to 1.40.0
- [Release notes](https://github.com/googleapis/google-cloud-go/releases)
- [Changelog](https://github.com/googleapis/google-cloud-go/blob/main/CHANGES.md)
- [Commits](googleapis/google-cloud-go@storage/v1.39.1...spanner/v1.40.0)

Updates `github.com/golangci/golangci-lint` from 1.57.1 to 1.57.2
- [Release notes](https://github.com/golangci/golangci-lint/releases)
- [Changelog](https://github.com/golangci/golangci-lint/blob/master/CHANGELOG.md)
- [Commits](golangci/golangci-lint@v1.57.1...v1.57.2)

Updates `github.com/sigstore/cosign/v2` from 2.2.3 to 2.2.4
- [Release notes](https://github.com/sigstore/cosign/releases)
- [Changelog](https://github.com/sigstore/cosign/blob/main/CHANGELOG.md)
- [Commits](sigstore/cosign@v2.2.3...v2.2.4)

Updates `github.com/sigstore/rekor` from 1.3.5 to 1.3.6
- [Release notes](https://github.com/sigstore/rekor/releases)
- [Changelog](https://github.com/sigstore/rekor/blob/main/CHANGELOG.md)
- [Commits](sigstore/rekor@v1.3.5...v1.3.6)

Updates `github.com/sigstore/sigstore` from 1.8.2 to 1.8.3
- [Release notes](https://github.com/sigstore/sigstore/releases)
- [Commits](sigstore/sigstore@v1.8.2...v1.8.3)

Updates `github.com/sigstore/sigstore/pkg/signature/kms/aws` from 1.8.2 to 1.8.3
- [Release notes](https://github.com/sigstore/sigstore/releases)
- [Commits](sigstore/sigstore@v1.8.2...v1.8.3)

Updates `github.com/sigstore/sigstore/pkg/signature/kms/azure` from 1.8.2 to 1.8.3
- [Release notes](https://github.com/sigstore/sigstore/releases)
- [Commits](sigstore/sigstore@v1.8.2...v1.8.3)

Updates `github.com/sigstore/sigstore/pkg/signature/kms/gcp` from 1.8.2 to 1.8.3
- [Release notes](https://github.com/sigstore/sigstore/releases)
- [Commits](sigstore/sigstore@v1.8.2...v1.8.3)

Updates `github.com/sigstore/sigstore/pkg/signature/kms/hashivault` from 1.8.2 to 1.8.3
- [Release notes](https://github.com/sigstore/sigstore/releases)
- [Commits](sigstore/sigstore@v1.8.2...v1.8.3)

Updates `github.com/spiffe/go-spiffe/v2` from 2.1.7 to 2.2.0
- [Release notes](https://github.com/spiffe/go-spiffe/releases)
- [Changelog](https://github.com/spiffe/go-spiffe/blob/main/CHANGELOG.md)
- [Commits](spiffe/go-spiffe@v2.1.7...v2.2.0)

Updates `golang.org/x/crypto` from 0.21.0 to 0.22.0
- [Commits](golang/crypto@v0.21.0...v0.22.0)

Updates `google.golang.org/grpc` from 1.62.1 to 1.63.2
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.62.1...v1.63.2)

---
updated-dependencies:
- dependency-name: cloud.google.com/go/storage
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: github.com/golangci/golangci-lint
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/sigstore/cosign/v2
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/sigstore/rekor
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/sigstore/sigstore
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/sigstore/sigstore/pkg/signature/kms/aws
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/sigstore/sigstore/pkg/signature/kms/azure
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/sigstore/sigstore/pkg/signature/kms/gcp
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/sigstore/sigstore/pkg/signature/kms/hashivault
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all
- dependency-name: github.com/spiffe/go-spiffe/v2
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: golang.org/x/crypto
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: google.golang.org/grpc
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the ok-to-test Indicates a non-member PR verified by an org member that is safe to test. label Apr 11, 2024
@tekton-robot
Copy link

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
To complete the pull request process, please assign chuangw6 after the PR has been reviewed.
You can assign the PR to them by writing /assign @chuangw6 in a comment when ready.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@tekton-robot
Copy link

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a tektoncd member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@tekton-robot tekton-robot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Apr 11, 2024
@tekton-robot
Copy link

@dependabot[bot]: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-tekton-chains-integration-tests 51638e6 link true /test pull-tekton-chains-integration-tests

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Copy link
Contributor Author

dependabot bot commented on behalf of github Apr 16, 2024

Looks like these dependencies are updatable in another way, so this is no longer needed.

@dependabot dependabot bot closed this Apr 16, 2024
@dependabot dependabot bot deleted the dependabot/go_modules/all-067f9440aa branch April 16, 2024 14:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant