Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MAINT: bump the golang-deps group across 1 directory with 3 updates #99

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 9, 2024

Bumps the golang-deps group with 3 updates in the / directory: github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets, google.golang.org/grpc and google.golang.org/protobuf.

Updates github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets from 1.2.0 to 1.3.0

Release notes

Sourced from github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets's releases.

sdk/resourcemanager/eventhub/armeventhub/v1.3.0

1.3.0 (2024-07-24)

Features Added

  • New value PublicNetworkAccessFlagSecuredByPerimeter added to enum type PublicNetworkAccessFlag
  • New enum type ApplicationGroupPolicyType with values ApplicationGroupPolicyTypeThrottlingPolicy
  • New enum type CaptureIdentityType with values CaptureIdentityTypeSystemAssigned, CaptureIdentityTypeUserAssigned
  • New enum type CleanupPolicyRetentionDescription with values CleanupPolicyRetentionDescriptionCompact, CleanupPolicyRetentionDescriptionDelete
  • New enum type MetricID with values MetricIDIncomingBytes, MetricIDIncomingMessages, MetricIDOutgoingBytes, MetricIDOutgoingMessages
  • New enum type NetworkSecurityPerimeterConfigurationProvisioningState with values NetworkSecurityPerimeterConfigurationProvisioningStateAccepted, NetworkSecurityPerimeterConfigurationProvisioningStateCanceled, NetworkSecurityPerimeterConfigurationProvisioningStateCreating, NetworkSecurityPerimeterConfigurationProvisioningStateDeleted, NetworkSecurityPerimeterConfigurationProvisioningStateDeleting, NetworkSecurityPerimeterConfigurationProvisioningStateFailed, NetworkSecurityPerimeterConfigurationProvisioningStateInvalidResponse, NetworkSecurityPerimeterConfigurationProvisioningStateSucceeded, NetworkSecurityPerimeterConfigurationProvisioningStateSucceededWithIssues, NetworkSecurityPerimeterConfigurationProvisioningStateUnknown, NetworkSecurityPerimeterConfigurationProvisioningStateUpdating
  • New enum type NspAccessRuleDirection with values NspAccessRuleDirectionInbound, NspAccessRuleDirectionOutbound
  • New enum type ProvisioningState with values ProvisioningStateActive, ProvisioningStateCanceled, ProvisioningStateCreating, ProvisioningStateDeleting, ProvisioningStateFailed, ProvisioningStateScaling, ProvisioningStateSucceeded, ProvisioningStateUnknown
  • New enum type PublicNetworkAccess with values PublicNetworkAccessDisabled, PublicNetworkAccessEnabled, PublicNetworkAccessSecuredByPerimeter
  • New enum type ResourceAssociationAccessMode with values ResourceAssociationAccessModeAuditMode, ResourceAssociationAccessModeEnforcedMode, ResourceAssociationAccessModeLearningMode, ResourceAssociationAccessModeNoAssociationMode, ResourceAssociationAccessModeUnspecifiedMode
  • New enum type TLSVersion with values TLSVersionOne0, TLSVersionOne1, TLSVersionOne2
  • New function NewApplicationGroupClient(string, azcore.TokenCredential, *arm.ClientOptions) (*ApplicationGroupClient, error)
  • New function *ApplicationGroupClient.CreateOrUpdateApplicationGroup(context.Context, string, string, string, ApplicationGroup, *ApplicationGroupClientCreateOrUpdateApplicationGroupOptions) (ApplicationGroupClientCreateOrUpdateApplicationGroupResponse, error)
  • New function *ApplicationGroupClient.Delete(context.Context, string, string, string, *ApplicationGroupClientDeleteOptions) (ApplicationGroupClientDeleteResponse, error)
  • New function *ApplicationGroupClient.Get(context.Context, string, string, string, *ApplicationGroupClientGetOptions) (ApplicationGroupClientGetResponse, error)
  • New function *ApplicationGroupClient.NewListByNamespacePager(string, string, *ApplicationGroupClientListByNamespaceOptions) *runtime.Pager[ApplicationGroupClientListByNamespaceResponse]
  • New function *ApplicationGroupPolicy.GetApplicationGroupPolicy() *ApplicationGroupPolicy
  • New function *ClientFactory.NewApplicationGroupClient() *ApplicationGroupClient
  • New function *ClientFactory.NewNetworkSecurityPerimeterConfigurationClient() *NetworkSecurityPerimeterConfigurationClient
  • New function *ClientFactory.NewNetworkSecurityPerimeterConfigurationsClient() *NetworkSecurityPerimeterConfigurationsClient
  • New function *ThrottlingPolicy.GetApplicationGroupPolicy() *ApplicationGroupPolicy
  • New function NewNetworkSecurityPerimeterConfigurationClient(string, azcore.TokenCredential, *arm.ClientOptions) (*NetworkSecurityPerimeterConfigurationClient, error)
  • New function *NetworkSecurityPerimeterConfigurationClient.List(context.Context, string, string, *NetworkSecurityPerimeterConfigurationClientListOptions) (NetworkSecurityPerimeterConfigurationClientListResponse, error)
  • New function NewNetworkSecurityPerimeterConfigurationsClient(string, azcore.TokenCredential, *arm.ClientOptions) (*NetworkSecurityPerimeterConfigurationsClient, error)
  • New function *NetworkSecurityPerimeterConfigurationsClient.BeginCreateOrUpdate(context.Context, string, string, string, *NetworkSecurityPerimeterConfigurationsClientBeginCreateOrUpdateOptions) (*runtime.Poller[NetworkSecurityPerimeterConfigurationsClientCreateOrUpdateResponse], error)
  • New struct ApplicationGroup
  • New struct ApplicationGroupListResult
  • New struct ApplicationGroupProperties
  • New struct CaptureIdentity
  • New struct NetworkSecurityPerimeter
  • New struct NetworkSecurityPerimeterConfiguration
  • New struct NetworkSecurityPerimeterConfigurationList
  • New struct NetworkSecurityPerimeterConfigurationProperties
  • New struct NetworkSecurityPerimeterConfigurationPropertiesProfile
  • New struct NetworkSecurityPerimeterConfigurationPropertiesResourceAssociation
  • New struct NspAccessRule
  • New struct NspAccessRuleProperties
  • New struct NspAccessRulePropertiesSubscriptionsItem
  • New struct ProvisioningIssue
  • New struct ProvisioningIssueProperties
  • New struct RetentionDescription
  • New struct ThrottlingPolicy
  • New field ProvisioningState, SupportsScaling in struct ClusterProperties
  • New field Identity in struct Destination
  • New field MinimumTLSVersion, PublicNetworkAccess in struct EHNamespaceProperties
  • New field RetentionDescription, UserMetadata in struct Properties

... (truncated)

Commits
  • 3a7a4f3 Prepare azcore v1.3.0 for release (#19759)
  • 6a1b839 Request.SetBody() allows overwriting with an empty body (#19754)
  • 5210814 AzureCLICredential reports token expiration time in UTC (#19761)
  • 2679c6b Adding tests for FilterBlobs and fixing encoding issue (#19742)
  • 00a8837 [azeventhubs] Fixing issues with connection and link robustness for Event Hub...
  • 1e67666 Revert "Migrate eng/common (except job-matrix) to Ubuntu 22.04 (#5005)" for p...
  • ca6a318 Sync eng/common directory with azure-sdk-tools for PR 5027 (#19753)
  • 377d008 Updating changelogs for release next week (#19752)
  • 53c0f49 Updating codeowners (#19751)
  • 794c96c Migrate eng/common (except job-matrix) to Ubuntu 22.04 (#19746)
  • Additional commits viewable in compare view

Updates google.golang.org/grpc from 1.67.1 to 1.68.1

Release notes

Sourced from google.golang.org/grpc's releases.

Release 1.68.1

Bug Fixes

  • credentials/alts: avoid SRV and TXT lookups for handshaker service to work around hangs caused by buggy versions of systemd-resolved. (#7861)

Dependencies

  • Relax minimum Go version requirement from go1.22.7 to go1.22. (#7831)

Release 1.68.0

Known Issues

  • The recently added grpc.NewClient function is incompatible with forward proxies, because it resolves the target hostname on the client instead of passing the hostname to the proxy. This bug has been present since the introduction of NewClient. A fix is expected to be a part of grpc-go v1.70. (#7556)

Behavior Changes

  • stats/opentelemetry/csm: Get mesh_id local label from "CSM_MESH_ID" environment variable, rather than parsing from bootstrap file (#7740)
  • orca (experimental): if using an ORCA listener, it must now be registered only on a READY SubConn, and the listener will automatically be stopped when the connection is lost. (#7663)
  • client: ClientConn.Close() now closes transports simultaneously and waits for transports to be closed before returning. (#7666)
  • credentials: TLS credentials created via NewTLS that use tls.Config.GetConfigForClient will now have CipherSuites, supported TLS versions and ALPN configured automatically. These were previously only set for configs not using the GetConfigForClient option. (#7709)

Bug Fixes

  • transport: prevent deadlock in client transport shutdown when writing the GOAWAY frame hangs. (#7662)
  • mem: reuse buffers more accurately by using slice capacity instead of length (#7702)
  • status: Fix regression caused by #6919 in status.Details() causing it to return a wrapped type when getting proto messages generated with protoc-gen-go < v1. (#7724)

Dependencies

  • Bump minimum supported Go version to go1.22.7. (#7624)

Release 1.67.2

Bug Fixes

  • credentials/alts: avoid SRV and TXT lookups for handshaker service to work around hangs caused by buggy versions of systemd-resolved. (#7861)
Commits
  • d6a777f Change version to 1.68.1 (#7894)
  • 9c54bbb deps: Remove go patch version from go.mod (#7831) (#7877)
  • dc26fee credentials/alts: avoid SRV and TXT lookups for handshaker service (#7861) (#...
  • eff4b16 Change version to 1.68.1-dev (#7745)
  • acba4d3 Change version to 1.68.0 (#7743)
  • 5363dca credentials: Apply defaults to TLS configs provided through GetConfigForClien...
  • 056dc64 status: Fix status incompatibility introduced by #6919 and move non-regenerat...
  • b79fb61 mem: use slice capacity instead of length, to determine whether to pool buffe...
  • 54841ef stats/opentelemetry/csm: Get mesh_id local label from "CSM_MESH_ID" environme...
  • ad81c20 pickfirstleaf: minor simplification to reconcileSubConnsLocked method (#7731)
  • Additional commits viewable in compare view

Updates google.golang.org/protobuf from 1.35.1 to 1.35.2

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the golang-deps group with 3 updates in the / directory: [github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets](https://github.com/Azure/azure-sdk-for-go), [google.golang.org/grpc](https://github.com/grpc/grpc-go) and google.golang.org/protobuf.


Updates `github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets` from 1.2.0 to 1.3.0
- [Release notes](https://github.com/Azure/azure-sdk-for-go/releases)
- [Changelog](https://github.com/Azure/azure-sdk-for-go/blob/main/documentation/release.md)
- [Commits](Azure/azure-sdk-for-go@v1.2...sdk/azcore/v1.3.0)

Updates `google.golang.org/grpc` from 1.67.1 to 1.68.1
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.67.1...v1.68.1)

Updates `google.golang.org/protobuf` from 1.35.1 to 1.35.2

---
updated-dependencies:
- dependency-name: github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: golang-deps
- dependency-name: google.golang.org/grpc
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: golang-deps
- dependency-name: google.golang.org/protobuf
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: golang-deps
...

Signed-off-by: dependabot[bot] <[email protected]>
Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 9, 2024

The following labels could not be found: maintenance.

@dependabot dependabot bot requested a review from a team as a code owner December 9, 2024 06:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant