spinkube / runtime-class-manager

A Kubernetes operator to manage Runtime Classes
Apache License 2.0
36 stars 10 forks source link

chore(deps): bump the ginkgo group with 2 updates #254

Closed dependabot[bot] closed 1 month ago

dependabot[bot] commented 1 month ago

Bumps the ginkgo group with 2 updates: github.com/onsi/ginkgo/v2 and github.com/onsi/gomega.

Updates github.com/onsi/ginkgo/v2 from 2.20.2 to 2.21.0

Release notes

Sourced from github.com/onsi/ginkgo/v2's releases.

v2.21.0

2.21.0

Features

  • add support for GINKGO_TIME_FORMAT [a69eb39]
  • add GINKGO_NO_COLOR to disable colors via environment variables [bcab9c8]

Fixes

  • increase threshold in timeline matcher [e548367]
  • Fix the document by replacing SpecsThatWillBeRun with SpecsThatWillRun [c2c4d3c]

Maintenance

  • bump various dependencies [7e65a00]
Changelog

Sourced from github.com/onsi/ginkgo/v2's changelog.

2.21.0

Features

  • add support for GINKGO_TIME_FORMAT [a69eb39]
  • add GINKGO_NO_COLOR to disable colors via environment variables [bcab9c8]

Fixes

  • increase threshold in timeline matcher [e548367]
  • Fix the document by replacing SpecsThatWillBeRun with SpecsThatWillRun [c2c4d3c]

Maintenance

  • bump various dependencies [7e65a00]
Commits
  • ac8918e v2.21.0
  • a69eb39 add support for GINKGO_TIME_FORMAT
  • e548367 increase threshold in timeline matcher
  • bcab9c8 add GINKGO_NO_COLOR to disable colors via environment variables
  • 7e65a00 bump various dependencies
  • c2c4d3c Fix the document by replacing SpecsThatWillBeRun with SpecsThatWillRun
  • See full diff in compare view


Updates github.com/onsi/gomega from 1.34.2 to 1.35.0

Release notes

Sourced from github.com/onsi/gomega's releases.

v1.35.0

1.35.0

Features

  • You can now call EnforceDefaultTimeoutsWhenUsingContexts() to have Eventually honor the default timeout when passed a context. (prior to this you had to expclility add a timeout) [e4c4265]
  • You can call StopTrying(message).Successfully() to abort a Consistently early without failure [eeca931]

Fixes

  • Stop memoizing the result of HaveField to avoid unexpected errors when used with async assertions. [3bdbc4e]

Maintenance

  • Bump all dependencies [a05a416]
Changelog

Sourced from github.com/onsi/gomega's changelog.

1.35.0

Features

  • You can now call EnforceDefaultTimeoutsWhenUsingContexts() to have Eventually honor the default timeout when passed a context. (prior to this you had to expclility add a timeout) [e4c4265]
  • You can call StopTrying(message).Successfully() to abort a Consistently early without failure [eeca931]

Fixes

  • Stop memoizing the result of HaveField to avoid unexpected errors when used with async assertions. [3bdbc4e]

Maintenance

  • Bump all dependencies [a05a416]
Commits
  • d6331f9 v1.35.0
  • 5deaf23 fix tests, but like actually this time
  • eeca931 Add Successfully() to StopTrying() to signal that Consistently can end early ...
  • 3bdbc4e stop memoizing result of HaveField
  • e35358d sheepishly fix broken test. thanks CI
  • 1b717d7 grrr. go mod tidy
  • a05a416 bump all dependencies
  • e4c4265 Add EnforceDefaultTimeoutsWhenUsingContexts()
  • See full diff in compare view


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
github-actions[bot] commented 1 month ago

Dependency Review

The following issues were found:

See the Details below.

License Issues

go.mod

PackageVersionLicenseIssue Type
golang.org/x/net0.30.0NullUnknown License
golang.org/x/sys0.26.0NullUnknown License
golang.org/x/term0.25.0NullUnknown License
golang.org/x/text0.19.0NullUnknown License
golang.org/x/tools0.26.0NullUnknown License
google.golang.org/protobuf1.35.1NullUnknown License
Allowed Licenses: Apache-2.0, BSD-2-Clause, BSD-3-Clause, BSL-1.0, CC0-1.0, ISC, MIT, MPL-2.0, Unlicense

OpenSSF Scorecard

PackageVersionScoreDetails
gomod/github.com/google/pprof 0.0.0-20241029153458-d1b30febd7db :green_circle: 8.1
Details
CheckScoreReason
Maintained:green_circle: 1018 commit(s) and 7 issue activity found in the last 90 days -- score normalized to 10
Code-Review:green_circle: 10all changesets reviewed
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Packaging:warning: -1packaging workflow not detected
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Fuzzing:green_circle: 10project is fuzzed
Pinned-Dependencies:green_circle: 10all dependencies are pinned
Security-Policy:green_circle: 10security policy file detected
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
SAST:warning: 2SAST tool is not run on all commits -- score normalized to 2
gomod/github.com/onsi/ginkgo/v2 2.21.0 :green_circle: 5.3
Details
CheckScoreReason
Code-Review:warning: 2Found 6/22 approved changesets -- score normalized to 2
Maintained:green_circle: 108 commit(s) and 11 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Packaging:warning: -1packaging workflow not detected
Token-Permissions:green_circle: 10GitHub workflow tokens follow principle of least privilege
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Branch-Protection:warning: 0branch protection not enabled on development/release branches
Binary-Artifacts:green_circle: 10no binaries found in the repo
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy:warning: 0security policy file not detected
Fuzzing:warning: 0project is not fuzzed
SAST:green_circle: 9SAST tool detected but not run on all commits
Vulnerabilities:warning: 28 existing vulnerabilities detected
gomod/github.com/onsi/gomega 1.35.0 :green_circle: 4
Details
CheckScoreReason
Code-Review:warning: 2Found 5/18 approved changesets -- score normalized to 2
Maintained:green_circle: 65 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 6
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Packaging:warning: -1packaging workflow not detected
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Branch-Protection:warning: 0branch protection not enabled on development/release branches
Binary-Artifacts:green_circle: 10no binaries found in the repo
Pinned-Dependencies:warning: 0dependency not pinned by hash detected -- score normalized to 0
Security-Policy:warning: 0security policy file not detected
Fuzzing:warning: 0project is not fuzzed
SAST:green_circle: 9SAST tool detected but not run on all commits
Vulnerabilities:warning: 28 existing vulnerabilities detected
gomod/golang.org/x/net 0.30.0 UnknownUnknown
gomod/golang.org/x/sys 0.26.0 UnknownUnknown
gomod/golang.org/x/term 0.25.0 UnknownUnknown
gomod/golang.org/x/text 0.19.0 UnknownUnknown
gomod/golang.org/x/tools 0.26.0 UnknownUnknown
gomod/google.golang.org/protobuf 1.35.1 UnknownUnknown

Scanned Files