Skip to content

deps(deps): update all non-major dependencies#381

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/all-minor-patch
Open

deps(deps): update all non-major dependencies#381
renovate[bot] wants to merge 1 commit intomainfrom
renovate/all-minor-patch

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Mar 5, 2025

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Confidence
github.com/awslabs/amazon-ecr-credential-helper/ecr-login v0.9.1v0.11.0 age confidence
github.com/go-logr/logr v1.4.2v1.4.3 age confidence
github.com/google/go-containerregistry v0.20.3v0.21.1 age confidence
github.com/onsi/ginkgo/v2 v2.22.2v2.28.1 age confidence
github.com/onsi/gomega v1.36.2v1.39.1 age confidence
github.com/sigstore/cosign/v2 v2.4.3v2.6.2 age confidence
github.com/sigstore/sigstore v1.8.15v1.10.4 age confidence
github.com/stretchr/testify v1.10.0v1.11.1 age confidence
k8s.io/api v0.32.2v0.35.1 age confidence
k8s.io/apimachinery v0.32.2v0.35.1 age confidence
k8s.io/client-go v0.32.2v0.35.1 age confidence
sigs.k8s.io/cluster-api v1.9.5v1.12.3 age confidence
sigs.k8s.io/controller-runtime v0.20.2v0.23.1 age confidence

Release Notes

awslabs/amazon-ecr-credential-helper (github.com/awslabs/amazon-ecr-credential-helper/ecr-login)

v0.11.0: Amazon ECR Credential Helper - Release v0.11.0

Compare Source

  • Add support for AWS EUSC partition (#​1034).
  • Upgrade dependencies.

Assets

v0.10.1: Amazon ECR Credential Helper - Release v0.10.1

Compare Source

  • Drop golang 1.22 support.
  • Upgrade dependencies.

Assets

v0.10.0: Amazon ECR Credential Helper - Release v0.10.0

Compare Source

  • Enhancement - Updated ECR pattern for ECR dual-stack endpoints for IPv6 support. (#​967)

Assets

go-logr/logr (github.com/go-logr/logr)

v1.4.3

Compare Source

Minor release.

What's Changed

New Contributors

Full Changelog: go-logr/logr@v1.4.2...v1.4.3

google/go-containerregistry (github.com/google/go-containerregistry)

v0.21.1

Compare Source

v0.21.0

Compare Source

This release updates the minimum Go version to 1.25.6.

What's Changed

New Contributors

Full Changelog: google/go-containerregistry@v0.20.7...v0.21.0

v0.20.8

Compare Source

v0.20.7

Compare Source

What's Changed
New Contributors

Full Changelog: google/go-containerregistry@v0.20.6...v0.20.7

v0.20.6

Compare Source

What's Changed

New Contributors

Full Changelog: google/go-containerregistry@v0.20.4...v0.20.6

v0.20.5

Compare Source

What's Changed

New Contributors

Full Changelog: google/go-containerregistry@v0.20.3...v0.20.5

v0.20.4: - Not usable as a go module

Compare Source

🚨 This release was published to the Go module proxy and then re-tagged with a different commit. This means it's not usable as a Go module (#​2107) -- please us v0.20.5 instead.

What's Changed

New Contributors

Full Changelog: google/go-containerregistry@v0.20.3...v0.20.4

onsi/ginkgo (github.com/onsi/ginkgo/v2)

v2.28.1

Compare Source

2.28.1

Update all dependencies. This auto-updated the required version of Go to 1.24, consistent with the fact that Go 1.23 has been out of support for almost six months.

v2.28.0

Compare Source

2.28.0

Ginkgo's SemVer filter now supports filtering multiple components by SemVer version:

It("should work in a specific version range (1.0.0, 2.0.0) and third-party dependency redis in [8.0.0, ~)", SemVerConstraint(">= 3.2.0"), ComponentSemVerConstraint("redis", ">= 8.0.0") func() {
    // This test will only run when version is between 1.0.0 (exclusive) and 2.0.0 (exclusive) and redis version is >= 8.0.0
})

can be filtered in or out with an invocation like:

ginkgo --sem-ver-filter="2.1.1, redis=8.2.0"

Huge thanks to @​Icarus9913 for working on this!

v2.27.5

Compare Source

2.27.5

Fixes

Don't make a new formatter for each GinkgoT(); that's just silly and uses precious memory

v2.27.4

Compare Source

2.27.4

Fixes
  • CurrentTreeConstructionNodeReport: fix for nested container nodes [59bc751]

v2.27.3

Compare Source

2.27.3

Fixes

report exit result in case of failure [1c9f356]
fix data race [ece19c8]

v2.27.2

Compare Source

2.27.2

Fixes
  • inline automaxprocs to simplify dependencies; this will be removed when Go 1.26 comes out [a69113a]
Maintenance
  • Fix syntax errors and typo [a99c6e0]
  • Fix paragraph position error [f993df5]

v2.27.1

Compare Source

2.27.1

Fixes
  • Fix Ginkgo Reporter slice-bounds panic [606c1cb]
  • Bug Fix: Add GinkoTBWrapper.Attr() and GinkoTBWrapper.Output() [a6463b3]

v2.27.0

Compare Source

2.27.0

Features
Transforming Nodes during Tree Construction

This release adds support for NodeArgsTransformers that can be registered with AddTreeConstructionNodeArgsTransformer.

These are called during the tree construction phase as nodes are constructed and can modify the node strings and decorators. This enables frameworks built on top of Ginkgo to modify Ginkgo nodes and enforce conventions.

Learn more here.

Spec Prioritization

A new SpecPriority(int) decorator has been added. Ginkgo will honor priority when ordering specs, ensuring that higher priority specs start running before lower priority specs

Learn more here.

Maintenance

v2.26.0

Compare Source

2.26.0

Features

Ginkgo can now generate json-formatted reports that are compatible with the go test json format. Use ginkgo --gojson-report=report.go.json. This is not intended to be a replacement for Ginkgo's native json format which is more information rich and better models Ginkgo's test structure semantics.

v2.25.3

Compare Source

2.25.3

Fixes
  • emit --github-output group only for progress report itself [f01aed1]

v2.25.2

Compare Source

2.25.2

Fixes

Add github output group for progress report content

Maintenance

Bump Gomega

v2.25.1

Compare Source

2.25.1

Fixes
  • fix(types): ignore nameless nodes on FullText() [10866d3]
  • chore: fix some CodeQL warnings [2e42cff]

v2.25.0

Compare Source

2.25.0

AroundNode

This release introduces a new decorator to support more complex spec setup usecases.

AroundNode registers a function that runs before each individual node. This is considered a more advanced decorator.

Please read the docs for more information and some examples.

Allowed signatures:

  • AroundNode(func()) - func will be called before the node is run.
  • AroundNode(func(ctx context.Context) context.Context) - func can wrap the passed in context and return a new one which will be passed on to the node.
  • AroundNode(func(ctx context.Context, body func(ctx context.Context))) - ctx is the context for the node and body is a function that must be called to run the node. This gives you complete control over what runs before and after the node.

Multiple AroundNode decorators can be applied to a single node and they will run in the order they are applied.

Unlike setup nodes like BeforeEach and DeferCleanup, AroundNode is guaranteed to run in the same goroutine as the decorated node. This is necessary when working with lower-level libraries that must run on a single thread (you can call runtime.LockOSThread() in the AroundNode to ensure that the node runs on a single thread).

Since AroundNode allows you to modify the context you can also use AroundNode to implement shared setup that attaches values to the context.

If applied to a container, AroundNode will run before every node in the container. Including setup nodes like BeforeEach and DeferCleanup.

AroundNode can also be applied to RunSpecs to run before every node in the suite. This opens up new mechanisms for instrumenting individual nodes across an entire suite.

v2.24.0

Compare Source

2.24.0

Features

Specs can now be decorated with (e.g.) SemVerConstraint("2.1.0") and ginkgo --sem-ver-filter="2.1.1" will only run constrained specs that match the requested version. Learn more in the docs here! Thanks to @​Icarus9913 for the PR.

Fixes
Maintenance

Numerous dependency bumps and documentation fixes

v2.23.4

Compare Source

2.23.4

Prior to this release Ginkgo would compute the incorrect number of available CPUs when running with -p in a linux container. Thanks to @​emirot for the fix!

Features
  • Add automaxprocs for using CPUQuota [2b9c428]
Fixes
  • clarify gotchas about -vet flag [1f59d07]
Maintenance

v2.23.3

Compare Source

2.23.3

Fixes
  • allow - as a standalone argument [cfcc1a5]
  • Bug Fix: Add GinkoTBWrapper.Chdir() and GinkoTBWrapper.Context() [feaf292]
  • ignore exit code for symbol test on linux [88e2282]

v2.23.2

Compare Source

2.23.2

🎉🎉🎉

At long last, some long-standing performance gaps between ginkgo and go test have been resolved!

Ginkgo operates by running go test -c to generate test binaries, and then running those binaries. It turns out that the compilation step of go test -c is slower than go test's compilation step because go test strips out debug symbols (ldflags=-w) whereas go test -c does not.

Ginkgo now passes the appropriate ldflags to go test -c when running specs to strip out symbols. This is only done when it is safe to do so and symbols are preferred when profiling is enabled and when ginkgo build is called explicitly.

This, coupled, with the instructions for disabling XProtect on MacOS yields a much better performance experience with Ginkgo.

v2.23.1

Compare Source

2.23.1

🚨 For users on MacOS 🚨

A long-standing Ginkgo performance issue on MacOS seems to be due to mac's antimalware XProtect. You can follow the instructions here to disable it in your terminal. Doing so sped up Ginkgo's own test suite from 1m8s to 47s.

Fixes

Ginkgo's CLI is now a bit clearer if you pass flags in incorrectly:

  • make it clearer that you need to pass a filename to the various profile flags, not an absolute directory [a0e52ff]
  • emit an error and exit if the ginkgo invocation includes flags after positional arguments [b799d8d]

This might cause existing CI builds to fail. If so then it's likely that your CI build was misconfigured and should be corrected. Open an issue if you need help.

v2.23.0

Compare Source

2.23.0

Ginkgo 2.23.0 adds a handful of methods to GinkgoT() to make it compatible with the testing.TB interface in Go 1.24. GinkgoT().Context(), in particular, is a useful shorthand for generating a new context that will clean itself up in a DeferCleanup(). This has subtle behavior differences from the golang implementation but should make sense in a Ginkgo... um... context.

Features
  • bump to go 1.24.0 - support new testing.TB methods and add a test to cover testing.TB regressions [37a511b]
Fixes
  • fix edge case where build -o is pointing at an explicit file, not a directory [7556a86]
  • Fix binary paths when precompiling multiple suites. [4df06c6]
Maintenance
onsi/gomega (github.com/onsi/gomega)

v1.39.1

Compare Source

1.39.1

Update all dependencies. This auto-updated the required version of Go to 1.24, consistent with the fact that Go 1.23 has been out of support for almost six months.

v1.39.0

Compare Source

1.39.0

Features

Add MatchErrorStrictly which only passes if errors.Is(actual, expected) returns true. MatchError, by contrast, will fallback to string comparison.

v1.38.3

Compare Source

1.38.3

Fixes

make string formatitng more consistent for users who use format.Object directly

v1.38.2

Compare Source

1.38.2

v1.38.1

Compare Source

1.38.1

Fixes

Numerous minor fixes and dependency bumps

v1.38.0

Compare Source

1.38.0

Features
  • gstruct handles extra unexported fields [4ee7ed0]
Fixes
  • support [] in IgnoringTopFunction function signatures (#​851) [36bbf72]
Maintenance

v1.37.0

Compare Source

1.37.0

Features
  • add To/ToNot/NotTo aliases for AsyncAssertion [5666f98]

v1.36.3

Compare Source

1.36.3

Maintenance
sigstore/cosign (github.com/sigstore/cosign/v2)

v2.6.2

Compare Source

v2.6.2 resolves GHSA-whqx-f9j3-ch6m.

Changes

v2.6.1

Compare Source

Bug Fixes

  • Partially populate the output of cosign verify when working with new bundles (#​4416)
  • Bump sigstore-go, move conformance back to tagged release (#​4426)

v2.6.0

Compare Source

v2.6.0 introduces a number of new features, including:

  • Signing an in-toto statement rather than Cosign constructing one from a predicate, along with verifying a statement's subject using a digest and digest algorithm rather than providing a file reference (#​4306)
  • Uploading a signature and its verification material (a "bundle") as an OCI Image 1.1 referring artifact, completing #​3927 (#​4316)
  • Providing service URLs for signing and attesting using a SigningConfig. Note that this is required when using a Rekor v2 instance (#​4319)

Example generation and verification of a signed in-toto statement:

cosign attest-blob --new-bundle-format=true --bundle="digest-key-test.sigstore.json" --key="cosign.key" --statement="../sigstore-go/examples/sigstore-go-signing/intoto.txt"
cosign verify-blob-attestation --bundle="digest-key-test.sigstore.json" --key=cosign.pub --type=unused --digest="b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9" --digestAlg="sha256"

Example container signing and verification using the new bundle format and referring artifacts:

cosign sign --new-bundle-format=true ghcr.io/user/alpine@sha256:a19367999603840546b8612572e338ec076c6d1f2fec61760a9e11410f546733
cosign verify --new-bundle-format=true ghcr.io/user/alpine@sha256:a19367999603840546b8612572e338ec076c6d1f2fec61760a9e11410f546733

Example usage of a signing config provided by the public good instance's TUF repository:

cosign sign-blob --use-signing-config --bundle sigstore.json README.md
cosign verify-blob --new-bundle-format --bundle sigstore.json --certificate-identity $EMAIL --certificate-oidc-issuer $ISSUER --use-signed-timestamps README.md

v2.6.0 leverages sigstore-go's signing and verification APIs gated behind these new flags. In an upcoming major release, we will be
updating Cosign to default to producing and consuming bundles to align with all other Sigstore SDKs.

Features

  • Add to attest-blob the ability to supply a complete in-toto statement, and add to verify-blob-attestation the ability to verify with just a digest (#​4306)
  • Have cosign sign support bundle format (#​4316)
  • Add support for SigningConfig for sign-blob/attest-blob, support Rekor v2 (#​4319)
  • Add support for SigningConfig in sign/attest (#​4371)
  • Support self-managed keys when signing with sigstore-go (#​4368)
  • Don't require timestamps when verifying with a key (#​4337)
  • Don't load content from TUF if trusted root path is specified (#​4347)
  • Add a terminal spinner while signing with sigstore-go (#​4402)
  • Require exclusively a SigningConfig or service URLs when signing (#​4403)
  • Remove SHA256 assumption in sign-blob/verify-blob (#​4050)
  • Bump sigstore-go, support alternative hash algorithms with keys (#​4386)

Breaking API Changes

  • sign.SignerFromKeyOpts no longer generates a key. Instead, it returns whether or not the client needs to generate a key, and if so, clients
    should call sign.KeylessSigner. This allows clients to more easily manage key generation.

Bug Fixes

  • Verify subject with bundle only when checking claims (#​4320)
  • Fixes to cosign sign / verify for the new bundle format (#​4346)

v2.5.3

Compare Source

Features

  • Add signing-config create command (#​4280)
  • Allow multiple services to be specified for trusted-root create (#​4285)
  • feat: Add OCI 1.1+ experimental support to tree (#​4205)
  • Add validity period end for trusted-root create (#​4271)

Bug Fixes

  • Fix cert verification logic for trusted-root/SCTs (#​4294)
  • force when copying the latest image to overwrite (#​4298)
  • avoid double-loading trustedroot from file (#​4264)

v2.5.2

Compare Source

Bug Fixes

  • Do not load trusted root when CT env key is set

Documentation

  • docs: improve doc for --no-upload option (#​4206)

v2.5.1

Compare Source

Features

  • Add Rekor v2 support for trusted-root create (#​4242)
  • Add baseUrl and Uri to trusted-root create command
  • Upgrade to TUF v2 client with trusted root
  • Don't verify SCT for a private PKI cert (#​4225)
  • Bump TSA library to relax EKU chain validation rules (#​4219)

Bug Fixes

  • Bump sigstore-go to pick up log index=0 fix (#​4162)
  • remove unused recursive flag on attest command (#​4187)

Docs

  • Fix indentation in verify-blob cmd examples (#​4160)

Releases

  • ensure we copy the latest tags on each release (#​4157)

Contributors

  • arthurus-rex
  • Babak K. Shandiz
  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Colleen Murphy
  • Dmitry Savintsev
  • Emmanuel Ferdman
  • Hayden B
  • Ville Skyttä

v2.5.0

Compare Source

v2.5.0 includes an implementation of the new bundle specification,
attesting and verifying OCI image attestations uploaded as OCI artifacts.
This feature is currently gated behind the --new-bundle-format flag
when running cosign attest.

Features

  • Add support for new bundle specification for attesting/verifying OCI image attestations (#​3889)
  • Feat/non filename completions (#​4115)
  • Add TSA certificate related flags and fields for cosign attest (#​4079)

Fixes

  • cmd/cosign/cli: fix typo in ignoreTLogMessage (#​4111)
  • Fix replace with compliant image mediatype (#​4077)

Contributors

  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Cody Soyland
  • Dmitry Savintsev
  • Hayden B
  • Ramon Petgrave
  • Riccardo Schirone
  • Stef Graces
  • Ville Skyttä
sigstore/sigstore (github.com/sigstore/sigstore)

v1.10.4

[Compare Source](https://redirect.github.com/si


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner March 5, 2025 10:36
@renovate renovate bot requested a review from arturshadnik March 5, 2025 10:36
@renovate
Copy link
Contributor Author

renovate bot commented Mar 5, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 55 additional dependencies were updated

Details:

Package Change
cel.dev/expr v0.19.0 -> v0.19.1
github.com/aws/aws-sdk-go-v2 v1.36.1 -> v1.36.3
github.com/aws/aws-sdk-go-v2/config v1.29.6 -> v1.29.10
github.com/aws/aws-sdk-go-v2/credentials v1.17.59 -> v1.17.63
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.28 -> v1.16.30
github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.32 -> v1.3.34
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.32 -> v2.6.34
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.2 -> v1.8.3
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.12.2 -> v1.12.3
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.12.13 -> v1.12.15
github.com/aws/aws-sdk-go-v2/service/sso v1.24.15 -> v1.25.1
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.28.14 -> v1.29.2
github.com/aws/aws-sdk-go-v2/service/sts v1.33.14 -> v1.33.17
github.com/emicklei/go-restful/v3 v3.12.1 -> v3.12.2
github.com/go-jose/go-jose/v4 v4.0.4 -> v4.0.5
github.com/go-openapi/errors v0.22.0 -> v0.22.1
github.com/go-openapi/swag v0.23.0 -> v0.23.1
github.com/golang-jwt/jwt/v4 v4.5.1 -> v4.5.2
github.com/google/go-cmp v0.6.0 -> v0.7.0
github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad -> v0.0.0-20250403155104-27863c87afa6
github.com/in-toto/attestation v1.1.0 -> v1.1.1
github.com/mailru/easyjson v0.7.7 -> v0.9.0
github.com/prometheus/client_golang v1.20.5 -> v1.21.1
github.com/sagikazarmark/locafero v0.4.0 -> v0.7.0
github.com/sigstore/protobuf-specs v0.4.0 -> v0.4.1
github.com/sigstore/sigstore-go v0.7.0 -> v0.7.1
github.com/sigstore/timestamp-authority v1.2.4 -> v1.2.5
github.com/spf13/afero v1.11.0 -> v1.12.0
github.com/spf13/cast v1.7.0 -> v1.7.1
github.com/spf13/viper v1.19.0 -> v1.20.1
gitlab.com/gitlab-org/api/client-go v0.123.0 -> v0.127.0
go.opentelemetry.io/otel v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/metric v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/sdk v1.34.0 -> v1.35.0
go.opentelemetry.io/otel/trace v1.34.0 -> v1.35.0
golang.org/x/crypto v0.33.0 -> v0.37.0
golang.org/x/mod v0.22.0 -> v0.24.0
golang.org/x/net v0.35.0 -> v0.38.0
golang.org/x/oauth2 v0.26.0 -> v0.29.0
golang.org/x/sync v0.11.0 -> v0.13.0
golang.org/x/sys v0.30.0 -> v0.32.0
golang.org/x/term v0.29.0 -> v0.31.0
golang.org/x/text v0.22.0 -> v0.24.0
golang.org/x/time v0.10.0 -> v0.11.0
golang.org/x/tools v0.29.0 -> v0.31.0
gomodules.xyz/jsonpatch/v2 v2.4.0 -> v2.5.0
google.golang.org/genproto/googleapis/api v0.0.0-20250115164207-1a7da9e5054f -> v0.0.0-20250303144028-a0af3efb3deb
google.golang.org/genproto/googleapis/rpc v0.0.0-20250207221924-e9438ea467c6 -> v0.0.0-20250313205543-e70fdf4c4cb4
google.golang.org/grpc v1.70.0 -> v1.71.0
google.golang.org/protobuf v1.36.5 -> v1.36.6
k8s.io/apiextensions-apiserver v0.32.1 -> v0.32.3
k8s.io/apiserver v0.32.1 -> v0.32.3
k8s.io/component-base v0.32.1 -> v0.32.3
k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 -> v0.0.0-20241210054802-24370beab758
sigs.k8s.io/release-utils v0.11.0 -> v0.11.1

@dosubot dosubot bot added the size:S This PR changes 10-29 lines, ignoring generated files. label Mar 5, 2025
renovate-approve[bot]
renovate-approve bot previously approved these changes Mar 5, 2025
@renovate renovate bot changed the title deps(deps): update module github.com/sigstore/sigstore to v1.9.0 deps(deps): update all non-major dependencies Mar 6, 2025
@renovate renovate bot force-pushed the renovate/all-minor-patch branch from 7653d9b to 740ac02 Compare March 6, 2025 02:35
renovate-approve[bot]
renovate-approve bot previously approved these changes Mar 6, 2025
renovate-approve[bot]
renovate-approve bot previously approved these changes Mar 8, 2025
renovate-approve[bot]
renovate-approve bot previously approved these changes Mar 10, 2025
renovate-approve[bot]
renovate-approve bot previously approved these changes Mar 12, 2025
renovate-approve[bot]
renovate-approve bot previously approved these changes Mar 18, 2025
renovate-approve[bot]
renovate-approve bot previously approved these changes Mar 19, 2025
renovate-approve[bot]
renovate-approve bot previously approved these changes Mar 20, 2025
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 6 times, most recently from 9547bb0 to 21827af Compare December 18, 2025 18:52
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 3 times, most recently from 08d2d6b to 00f36d3 Compare January 12, 2026 22:25
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 3 times, most recently from 1edb5f7 to bc2fb44 Compare January 22, 2026 20:52
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 2 times, most recently from 442e63a to 39e1817 Compare January 30, 2026 04:37
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 6 times, most recently from d6be7d3 to e1b3994 Compare February 10, 2026 14:50
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 5 times, most recently from 0a124ac to 340267e Compare February 17, 2026 19:02
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 3 times, most recently from d7a7587 to b727f3f Compare February 20, 2026 21:01
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate bot force-pushed the renovate/all-minor-patch branch from b727f3f to 423988f Compare February 24, 2026 19:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies go size:S This PR changes 10-29 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants