google / knative-gcp

GCP event implementations to use with Knative Eventing.
https://github.com/knative/eventing
Apache License 2.0
160 stars 74 forks source link

[main] Upgrade to latest dependencies #2223

Closed knative-automation closed 3 years ago

knative-automation commented 3 years ago

Cron -knative-prow-robot

/cc @nlopezgi @zhongduo /assign @nlopezgi @zhongduo

Produced by: knative-sandbox/knobots/actions/update-deps

Details:

bumping golang.org/x/net e915ea6...abc4532:
  > abc4532 route: remove check for unparsed route message bytes
  > fe42d45 route: revert routing message alignment for FreeBSD 386 emulation
  > 37e1c6a html: ignore templates nested within foreign content
  > 4163338 route: add //go:build line to empty.s
  > 81045d8 http2: switch to ASCII equivalents of string functions
  > 16afe75 http2: remove TLSConfig.CipherSuites order check
  > 0714010 crypto/tls: don't use tls.Dialer on pre-Go1.15 systems
  > 0287a6f internal/socket: handle nil addr in sendMsgs
  > bbd867f http2: use (*tls.Dialer).DialContext in dialTLS
  > 7fd8e65 go.mod: upgrade to go 1.17
  > e590880 publicsuffix: update table to latest list from publicsuffix.org
  > f8dd838 internal/socket: reuse buffers in recv/sendMsgs
  > aec3718 idna: allow specifying CheckHyphens and CheckJoiners
  > 89ef3d9 http/httpguts: remove recursion in HeaderValuesContainsToken
  > 85d9c07 route: retry FetchRIB a few times in case data grows
  > 5f58ad6 ipv4: use type IPMreqn from x/sys/unix
  > e997de6 internal/socket: add ppc system call definitions, for use with gccgo
  > 4e50805 internal/socket: use larger buffers in race test
  > 2554d15 internal/socket: use SizeofSockaddrInet{4,6} constants from x/sys/unix
  > 798c215 ipv6: use all socket option consts from x/sys/unix
  > d25e304 ipv4: use all socket option consts from x/sys/unix
bumping google.golang.org/grpc daba805...0257c86:
  > 0257c86 Change version to 1.38.0 (# 4418)
  > ce3e5ec v1.38.x: backport (# 4453)
  > 5f95ad6 xds: workaround to deflake xds e2e tests (# 4413)
  > b1940e1 xds: register resources at the mgmt server before requesting them (# 4406)
  > 98c895f cleanup: use testutils.MarshalAny in more places (# 4404)
  > 12a377b xds: nack route configuration with regexes that don't compile (# 4388)
  > c15291b client: initialize safe config selector when creating ClientConn (# 4398)
  > 328b1d1 transport: allow InTapHandle to return status errors (# 4365)
  > aff517b xds: make e2e tests use a single management server instance (# 4399)
  > 0439465 xds_resolver: fix flaky Test/XDSResolverDelayedOnCommitted (# 4393)
  > 0ab423a test: fix flaky GoAwayThenClose (# 4394)
  > b6f206b grpc: improve docs on StreamDesc (# 4397)
  > c7ea734 dns: fix flaky TestRateLimitedResolve (# 4387)
  > cb39647 Revert "grpc: call balancer.Close() before returning from ccBalancerWrapper.close()" (# 4391)
  > d2d6bda server: add ForceServerCodec() to set a custom encoding.Codec on the server (# 4205)
  > d426aa5 test: extend the xDS interop tests timeout to 360 mins (# 4380)
  > 40b25c5 xds: set correct order of certificate providers in handshake info (# 4350)
  > 0fc0397 xds: actually close stuff in cds/eds `Close()` (# 4381)
  > 4f3aa7c xds: optimize fault injection filter with empty config (# 4367)
  > 79e55d6 xds: use SendContext() to fail in time when the channel is full (# 4386)
  > 11bd776 xds: work around xdsclient race in fault injection test (# 4377)
  > 75497df meshca: remove meshca certificate provider implementation (# 4385)
  > ebd6aba Revert "xds/cds: add separate fields for cluster name and eds service name" (# 4382)
  > b418de8 xds/eds: restart EDS watch after previous was canceled (# 4378)
  > 2807883 grpc: call balancer.Close() before returning from ccBalancerWrapper.close() (# 4364)
  > aa3ef8f internal: regenerate proto (# 4373)
  > c3b6601 xds/circuit_breaking: use cluster name as key, not EDS service name (# 4372)
  > 91d8f0c serviceconfig: support marshalling BalancerConfig to JSON (# 4368)
  > b602d17 metadata: reduce memory footprint in FromOutgoingContext (# 4360)
  > 24d03d9 xds/priority: add ignore reresolution boolean to config (# 4275)
  > 7c5e737 xds/cds: add separate fields for cluster name and eds service name (# 4352)
  > 145f12a reflection: accept interface instead of grpc.Server struct in Register() (# 4340)
  > 52a707c xds: serving mode changes outlined in gRFC A36 (# 4328)
  > 9572fd6 client: include details about GOAWAYs in status messages (# 4316)
  > e158e3e xds/lrs: server name is not required to be non-empty (# 4356)
  > 74fe6ea github: testing action workflow improvements and update to test Go1.16 (# 4358)
  > f02863c xds: specify "h2" as the alpn in xds creds (# 4361)
  > 7276af6 client: fix leaked addrConn struct when addresses are updated (# 4347)
  > f2783f2 Run emulated linux arm64 tests (# 4344)
  > 6f35bbb test: enable xDS CSDS test (# 4354)
  > 671707b internal: fix symbol undefined build failure (# 4353)
  > 970aa09 xds/balancers: export balancer names and config structs (# 4334)
  > 1c598a1 Move exponential backoff to DNS resolver from resolver.ClientConn (# 4270)
  > 41676e6 Fix goroutine leaks (# 4214)
  > 1a870ae xds/clusterimpl: trigger re-resolution on subconn transient_failure (# 4314)
  > 87eb5b7 credentials/google: remove unnecessary dependency on xds protos (# 4339)
  > 6fafb91 xds: support unspecified and wildcard filter chain prefixes (# 4333)
  > c229922 client: propagate connection error causes to RPC statuses (# 4311)
  > 7a6ab59 multiple: go mod tidy to make vet happy (# 4337)
  > 950ddd3 xds/google_default_creds: handshake based on cluster name in address attributes (# 4310)
  > fab5982 xds: server-side listener network filter validation (# 4312)
  > d6abfb4 cmd/protoc-gen-go-grpc: add protoc and protoc-gen-go-grpc versions to top comment (# 4313)
  > 1d1bbb5 weightedtarget: handle updating child policy name (# 4309)
  > 2df4370 examples: update xds examples for PSM security (# 4256)
  > 69f6f5a xds: add support for unsupported filter matchers (# 4315)
  > c7a203d xds/interop: move header/path matching to all (# 4325)
  > 1895da5 xds/resolver: fix panic when two LDS updates are receives without RDS in between (# 4327)
  > 493d388 xds/csds: update proto imports to separate grpc from non-grpc symbols (# 4326)
  > 004ef8a xds/clusterimpl: fix picker update race after balancer is closed (# 4318)
  > 9a10f35 balancergroup: fix leak child balancer not closed (# 4308)
  > 777b228 xds: fix service request counter flaky test (# 4324)
  > 8892a7b [xds_interop_client_admin] xds/interop: register admin services and reflection (# 4307)
  > 5730f8d Invoke Go Vet Check in Sub-modules (# 4302)
  > db81623 xds: Add fields to cluster update (# 4277)
  > f6bb397 xds: filter chain matching logic for server-side (# 4281)
  > c72e1c8 xds/resolver: support inline RDS resource from LDS response (# 4299)
  > 0028242 Change version to 1.38.0-dev (# 4306)
bumping knative.dev/eventing 200e54c...7678f90:
  > 7678f90 upgrade to latest dependencies (# 5437)
  > 91d6079 Fix ordering in EventTransformation test (# 5435)
  > 6776718 Experimental features process documentation (# 5404)
  > 295134c Experimental features configuration and validation (# 5214)
  > 0882e0c upgrade to latest dependencies (# 5434)
  > e48c80d Only upload pod logs logs on failure (# 5429)
  > 8fbacd0 mt broker dispatch error log (# 5426)
  > cca60b3 [QE] Allow to change SUT for upgrade tests (# 5321)
  > 40fa622 Fix cloudevent adapter panic (# 5424)
  > 18a70de Convert channel event transformation e2e to rekt (# 5423)
  > d74ca9d Update community files (# 5420)
  > 869220a Disable chaosduck on the webhook (# 5419)
  > 5af518d [QE] Extension point for transport used to send events in upgrade tests (# 4815)
  > cf5b0eb upgrade to latest dependencies (# 5417)
  > 23198cd SinkBindings track their sinks (# 5410)
  > 453e4c0 Subscription.Spec.Channel now uses KReference (# 5412)
  > 0653ac4 Add podAntiAffinity labels to remaining HA control plane pods (# 5409)
  > 62a75eb PingSource stored version is now v1 (# 5381)
  > 6addb58 Add knative-release-leads to OWNERS (# 5405)
bumping knative.dev/pkg 4564797...980a337:
  > 980a337 Fix revive related linting issues (# 2131)
  > ea766de Bump assorted dependencies (# 2130)
  > e2947db update the multiple label selector implemention to avoid clobber in filtered factory (# 2120)
  > e749d6a Update community files (# 2129)
  > 67897f4 Replace golint with revive (# 2126)
  > 1442287 Add knative-release-leads to OWNERS (# 2125)
  > 9b837a7 Update actions (# 2123)
  > 525c625 Update actions (# 2121)
  > 620e8d2 Allow disable via regex in chaosduck (# 2117)
  > 1f5a45b Update knative/community files (# 2119)
bumping knative.dev/serving 35efb31...8a9bb8e:
  > 8a9bb8e upgrade to latest dependencies (# 11418)
  > 5d1672d Update net-kourier nightly (# 11417)
  > 9bb6349 Test that readiness is not reported early in HTTP probe test (# 11402)
  > 61178b2 upgrade to latest dependencies (# 11412)
  > 8eb5b88 Update net-istio nightly (# 11397)
  > 01f1cb6 Remove myself following-up knative/community# 628 (# 11408)
  > 1cd1e71 Have our e2e tests use K8s 1.19 again (# 11384)
  > 71e501e upgrade to latest dependencies (# 11405)
  > f9356e3 Update schema generator as a bug has been fixed (# 11406)
  > fc8d0c8 Allow the autoscale upgrade test traffic to settle before upgrading (# 11403)
  > 77d32d8 Regenerate schemas to pick up capabilities addition (# 11400)
  > efbc518 Update net-contour nightly (# 11396)
  > 15e067e Update net-kourier nightly (# 11401)
  > 3afc6e4 Move activator count computation into KPA (# 11375)
  > 8cf7372 Add readiness test image (# 11398)
  > 0760219 Set spec.HTTPOption in Ingress created from DomainMapping (# 11399)
  > 9cd446e Update net-kourier nightly (# 11392)
  > fcaccd6 adding securityContext.capabilities.drop to schemas (# 11394)
  > 5a0ea08 Validate features configmap (# 11391)
  > 1b2b759 allow dropping securityContext capabilities (# 11344)
  > d9da69e Update net-kourier nightly (# 11381)
  > 8049aeb Update net-contour nightly (# 11371)
  > a59495b Use regex to disable chaos for all webhooks dynamically (# 11379)
  > 8f2988d Update net-certmanager nightly (# 11382)
  > 9e19628 Update net-istio nightly (# 11370)
  > 5b78128 Use NetworkingFlags to enable alpha feature in autotls (# 11377)
  > 376f419 Update community files (# 11378)
  > 9ac4acb upgrade to latest dependencies (# 11374)
  > 20c2c82 Add enable-alpha and enable-beta flag to autotls tests (# 11368)
  > 75bfefc Replace golint with revive (# 11366)
  > 63465e8 Update net-kourier nightly (# 11369)
  > ba643f0 Add knative-release-leads to OWNERS (# 11367)
bumping github.com/google/go-cmp 8fa37b4...d103655:
  > d103655 Print as text if mostly text (# 258)
  > 9181d1e Avoid diffing by lines if inefficient (# 260)
  > c5c3378 Cleanup edit groups after coalescing (# 259)
  > 1ee4af8 Fix typo in path.go (# 256)
bumping golang.org/x/oauth2 5e61552...f6687ab:
  > f6687ab endpoints: add Battlenet endpoints
  > 9963728 endpoints: Add Strava endpoint
  > 81ed05c google: Add support for CredentialsParams, Client ID json, and JWT Subject
knative-prow-robot commented 3 years ago

Hi @knative-automation. Thanks for your PR.

I'm waiting for a google member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.
zhongduo commented 3 years ago

/ok-to-test

zhongduo commented 3 years ago

/test pull-google-knative-gcp-unit-tests

zhongduo commented 3 years ago

/test pull-google-knative-gcp-go-coverage

zhongduo commented 3 years ago

/test pull-google-knative-gcp-go-coverage

knative-prow-robot commented 3 years ago

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: knative-automation To complete the pull request process, please ask for approval from nlopezgi after the PR has been reviewed.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files: - **[OWNERS](https://github.com/google/knative-gcp/blob/main/OWNERS)** Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment
knative-prow-robot commented 3 years ago

@knative-automation: The following tests failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
pull-google-knative-gcp-build-tests 5dd21c16117a7df80f4d714cebebd31ff11042e1 link /test pull-google-knative-gcp-build-tests
pull-google-knative-gcp-upgrade-tests 5dd21c16117a7df80f4d714cebebd31ff11042e1 link /test pull-google-knative-gcp-upgrade-tests

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository. I understand the commands that are listed [here](https://go.k8s.io/bot-commands).