Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: update go packages #38

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open

chore: update go packages #38

wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Aug 19, 2024

Update Request | Renovate Bot

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/ProtonMail/go-crypto v1.1.0-alpha.5.0.20240827111422-b5837fa4476e -> v1.1.2 age adoption passing confidence
github.com/ProtonMail/gopenpgp/v2 v2.7.5 -> v2.8.0 age adoption passing confidence
github.com/adrg/xdg v0.5.0 -> v0.5.3 age adoption passing confidence
github.com/grpc-ecosystem/grpc-gateway/v2 v2.22.0 -> v2.23.0 age adoption passing confidence
google.golang.org/grpc v1.66.0 -> v1.68.0 age adoption passing confidence
google.golang.org/protobuf v1.34.2 -> v1.35.2 age adoption passing confidence

Release Notes

ProtonMail/go-crypto (github.com/ProtonMail/go-crypto)

v1.1.2

Compare Source

What's Changed

Full Changelog: ProtonMail/go-crypto@v1.1.1...v1.1.2

v1.1.1

Compare Source

What's Changed

Full Changelog: ProtonMail/go-crypto@v1.1.0...v1.1.1

v1.1.0

Compare Source

What's Changed

This release adds full support for the new version of the OpenPGP standard, RFC 9580. In addition, the release introduces an improved non-backwards compatible v2 API. The API in the openpgp package remains fully backwards compatible while the new v2 API is located in a separate v2 package in openpgp.

For the full changes since v1.0.0, see the previous release notes. For the full changelog, see ProtonMail/go-crypto@v1.0.0...v1.1.0.

Changes since v1.1.0-beta.0:

  • Replace expiring curve448 integration test vector by @​lubux
  • Validate input key size in SEIPDv2 decryption by @​lubux

Changelog since v1.1.0-beta.0: ProtonMail/go-crypto@v1.1.0-beta.0...v1.1.0.

v1.1.0-proton

Compare Source

What's Changed

This release is v1.1.0 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-beta.0-proton

Compare Source

This pre-release is v1.1.0-beta.0 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-beta.0

Compare Source

What's Changed

Full Changelog: ProtonMail/go-crypto@v1.1.0-alpha.5...v1.1.0-beta.0

v1.1.0-alpha.5-proton

Compare Source

This pre-release is v1.1.0-alpha.5 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-alpha.4-proton

Compare Source

This pre-release is v1.1.0-alpha.4 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-alpha.3-proton

Compare Source

This pre-release is v1.1.0-alpha.3 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

v1.1.0-alpha.2-proton

Compare Source

v1.1.0-alpha.1-proton

Compare Source

This pre-release is v1.1.0-alpha.1 with support for symmetric keys and automatic forwarding, both of which are not standardized yet.

ProtonMail/gopenpgp (github.com/ProtonMail/gopenpgp/v2)

v2.8.0

Compare Source

What's Changed

Support for RFC 9580

Adds support for reading and writing messages with RFC 9580 by updating the underlying go-crypto fork library to the latest version. Note that GopenPGP v2 currently does not support:

  • RFC 9580 intended recipients
  • RFC 9580 key generation

For full RFC 9580 support, we recommend upgrading to GopenPGP v3.

Full Changelog: ProtonMail/gopenpgp@v2.7.5...v2.8.0

adrg/xdg (github.com/adrg/xdg)

v0.5.3

Compare Source

Changelog
  • Updated xdg.SearchRuntimeFile to also look in the operating system's temporary directory for runtime files.
    This covers unlikely cases in which runtime files cannot be written relative to the base runtime directory either because it does not exist or it is not accessible, so xdg.RuntimeFile suggests the operating system's temporary directory as a suitable fallback location.
Internal
  • Improved package testing.

v0.5.2

Compare Source

Changelog
  • Updated logic of xdg.RuntimeFile: due to the special nature of the runtime directory, the function no longer attempts to create it if it does not exist. If that's the case, the function uses the operating system's temporary directory as a fallback. The function still creates subdirectories relative to the base runtime directory or its fallback.

    Justification: the creation of the runtime directory is not in the scope of this package as it has special requirements defined by the XDG Base Directory Specification. Relevant excerpt:

    The lifetime of the directory MUST be bound to the user being logged in. It MUST be created when the user first logs in and if the user fully logs out the directory MUST be removed. If the user logs in more than once they should get pointed to the same directory, and it is mandatory that the directory continues to exist from their first login to their last logout on the system, and not removed in between. Files in the directory MUST not survive reboot or a full logout/login cycle.

    Also, on Linux, the parent directories of the default user runtime directory are owned by the root user so they cannot be created by a regular user. pam_systemd is usually responsible for creating the runtime directory (/run/user/$UID).

v0.5.1

Compare Source

Changelog
  • Added support for the non-standard XDG_BIN_HOME base directory.
    See XDG base directories README section for more details.
  • Added more config and data search locations on macOS.
    • Added ~/.config at the end of the list of default locations for XDG_CONFIG_DIRS.
    • Added ~/.local/share at the end of the list of default locations for XDG_DATA_DIRS.
  • Added more application search locations on Windows:
    • %ProgramFiles%
    • %ProgramFiles%\Common Files
    • %LOCALAPPDATA%\Programs
    • %LOCALAPPDATA%\Programs\Common
Internal
  • Updated golang.org/x/sys dependency to the latest version.
  • Improved package testing.
grpc-ecosystem/grpc-gateway (github.com/grpc-ecosystem/grpc-gateway/v2)

v2.23.0

Compare Source

What's Changed

New Contributors

Full Changelog: grpc-ecosystem/grpc-gateway@v2.22.0...v2.23.0

grpc/grpc-go (google.golang.org/grpc)

v1.68.0: Release 1.68.0

Compare Source

Behavior Changes

  • stats/opentelemetry/csm: Get mesh_id local label from "CSM_MESH_ID" environment variable, rather than parsing from bootstrap file (#​7740)
  • orca (experimental): if using an ORCA listener, it must now be registered only on a READY SubConn, and the listener will automatically be stopped when the connection is lost. (#​7663)
  • client: ClientConn.Close() now closes transports simultaneously and waits for transports to be closed before returning. (#​7666)
  • credentials: TLS credentials created via NewTLS that use tls.Config.GetConfigForClient will now have CipherSuites, supported TLS versions and ALPN configured automatically. These were previously only set for configs not using the GetConfigForClient option. (#​7709)

Bug Fixes

  • transport: prevent deadlock in client transport shutdown when writing the GOAWAY frame hangs. (#​7662)
  • mem: reuse buffers more accurately by using slice capacity instead of length (#​7702)
  • status: Fix regression caused by #​6919 in status.Details() causing it to return a wrapped type when getting proto messages generated with protoc-gen-go < v1. (#​7724)

Dependencies

  • Bump minimum supported Go version to go1.22.7. (#​7624)

v1.67.1: Release 1.67.1

Compare Source

Bug Fixes

  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.67.0: Release 1.67.0

Compare Source

Bug Fixes

  • ringhash: when used with multiple EDS priorities, fix bug that could prevent a higher priority from recovering from transient failure. (#​7364)

Behavior Changes

  • In accordance with RFC 7540, clients and servers will now reject TLS connections that don't support ALPN. This can be disabled by setting the environment variable GRPC_ENFORCE_ALPN_ENABLED to false (case insensitive). Please file a bug if you encounter any issues with this behavior. The environment variable to revert this behavior will be removed in an upcoming release. (#​7535)

v1.66.3: Release 1.66.3

Compare Source

Bug Fixes

  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.66.2: Release 1.66.2

Compare Source

Dependencies

  • Remove unintentional dependency on the testing package (#​7579)
  • Remove unintentional dependency on the flate package (#​7595)

Bug Fixes

  • client: fix a bug that prevented memory reuse after handling unary RPCs (#​7571)

v1.66.1

Compare Source

protocolbuffers/protobuf-go (google.golang.org/protobuf)

v1.35.2

Compare Source

Full Changelog: protocolbuffers/protobuf-go@v1.35.1...v1.35.2

Maintenance:

CL/623115: proto: refactor equal_test from explicit table to use makeMessages()
CL/623116: encoding/prototext: use testmessages_test.go approach, too
CL/623117: internal/testprotos/test: add nested message field with [lazy=true]
CL/624415: proto: switch messageset_test to use makeMessages() injection point
CL/624416: internal/impl: fix TestMarshalMessageSetLazyRace (was a no-op!)

User-visible changes:

CL/618395: encoding/protojson: allow missing value for Any of type Empty
CL/618979: all: implement strip_enum_prefix editions feature
CL/622575: testing/protocmp: document behavior when combining Ignore and Sort

v1.35.1

Compare Source

Full Changelog: protocolbuffers/protobuf-go@v1.34.2...v1.35.1

Maintenance:

  • CL/606755: all: remove unused purego support
  • CL/608316: all: set Go language version to Go 1.21

User-visible changes:

  • CL/587536: protojson: include field name in error messages
  • CL/597055: compiler/protogen: always report editions support level of the plugin
  • CL/596539: all: plumb the lazy option into filedesc.Field and .Extension
  • CL/601775: types/known/structpb: add support for more types and json.Number
  • CL/607995: proto: extend documentation of GetExtension, SetExtension
  • CL/609035: proto: implement proto.Equal fast-path

Bug fixes:

  • CL/595337: reflect/protodesc: fix handling of delimited extensions in editions
  • CL/602055: internal/cmd/generate-protos: fix pkg check for editions features
  • CL/603015: internal: generate extension numbers, fix editions parsing

v1.35.0

Compare Source


Configuration

📅 Schedule: Branch creation - "before 4am on Monday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/go-packages branch 2 times, most recently from b0be26c to 89ac43a Compare August 29, 2024 10:12
@renovate renovate bot changed the title chore: update go packages chore: update module github.com/protonmail/go-crypto to v1.1.0-alpha.5-proton Aug 29, 2024
@renovate renovate bot changed the title chore: update module github.com/protonmail/go-crypto to v1.1.0-alpha.5-proton chore: update go packages Sep 12, 2024
@renovate renovate bot force-pushed the renovate/go-packages branch 2 times, most recently from dcddf67 to 4d38d54 Compare October 8, 2024 02:39
Copy link
Author

renovate bot commented Oct 29, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 6 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22.0 -> 1.23.3
golang.org/x/crypto v0.26.0 -> v0.27.0
golang.org/x/net v0.28.0 -> v0.29.0
golang.org/x/sys v0.24.0 -> v0.26.0
golang.org/x/text v0.17.0 -> v0.19.0
google.golang.org/genproto/googleapis/api v0.0.0-20240827150818-7e3bb234dfed -> v0.0.0-20241021214115-324edc3d5d38
google.golang.org/genproto/googleapis/rpc v0.0.0-20240827150818-7e3bb234dfed -> v0.0.0-20241021214115-324edc3d5d38

@renovate renovate bot force-pushed the renovate/go-packages branch 3 times, most recently from 490d797 to 91afd99 Compare November 7, 2024 20:14
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants