tektoncd / chains

Supply Chain Security in Tekton Pipelines
Apache License 2.0
240 stars 125 forks source link

Bump the all group with 10 updates #1095

Closed dependabot[bot] closed 3 months ago

dependabot[bot] commented 3 months ago

Bumps the all group with 10 updates:

Package From To
cloud.google.com/go/storage 1.39.1 1.40.0
github.com/golangci/golangci-lint 1.57.1 1.57.2
github.com/sigstore/rekor 1.3.5 1.3.6
github.com/sigstore/sigstore 1.8.2 1.8.3
github.com/sigstore/sigstore/pkg/signature/kms/aws 1.8.2 1.8.3
github.com/sigstore/sigstore/pkg/signature/kms/azure 1.8.2 1.8.3
github.com/sigstore/sigstore/pkg/signature/kms/gcp 1.8.2 1.8.3
github.com/sigstore/sigstore/pkg/signature/kms/hashivault 1.8.2 1.8.3
github.com/spiffe/go-spiffe/v2 2.1.7 2.2.0
google.golang.org/grpc 1.62.1 1.63.0

Updates cloud.google.com/go/storage from 1.39.1 to 1.40.0

Release notes

Sourced from cloud.google.com/go/storage's releases.

storage: v1.40.0

1.40.0 (2024-03-29)

Features

Bug Fixes

  • storage: Retry errors from last recv on uploads (#9616) (b6574aa)
  • storage: Update protobuf dep to v1.33.0 (30b038d)

Performance Improvements

  • storage: Remove protobuf's copy of data on unmarshalling (#9526) (81281c0)
Commits
  • 438afcf chore(main): release spanner 1.40.0 (#6988)
  • bd85442 feat(spanner): configurable logger (#6958)
  • d5e2e0f chore: update individual config to be separate prs (#6981)
  • 1ce0f7d feat(spanner/spansql): add support for interval arg of some date/timestamp fu...
  • 5b14658 feat(spanner): PG JSONB support (#6874)
  • 3c4b2b3 chore: bulk rewrite signatures for GA clients (#6951)
  • d82ef41 chore(bigtable): more text proxy tune-up (#6977)
  • e7ab70b test(storage): add gRPC error code to retry to fix flaky PAP test (#6974)
  • f7c7f41 feat(storage): add Autoclass support (#6828)
  • 5d2dc01 chore(bigtable): add timeouts to proxy methods (#6973)
  • Additional commits viewable in compare view


Updates github.com/golangci/golangci-lint from 1.57.1 to 1.57.2

Release notes

Sourced from github.com/golangci/golangci-lint's releases.

v1.57.2

For key updates, see the changelog.

golangci-lint is a free and open-source project built by volunteers.

If you value it, consider supporting us, the maintainers and linter authors.

We appreciate it! :heart:

Changelog

  • 94a01793 build(deps): bump github.com/ckaznocha/intrange from 0.1.0 to 0.1.1 (#4570)
  • 9558299e build(deps): bump github.com/jgautheron/goconst from 1.7.0 to 1.7.1 (#4555)
  • b78225bd build(deps): bump github.com/karamaru-alpha/copyloopvar from 1.0.8 to 1.0.9 (#4565)
  • 5a668425 build(deps): bump github.com/karamaru-alpha/copyloopvar from 1.0.9 to 1.0.10 (#4584)
  • afd670b9 build(deps): bump github.com/kkHAIKE/contextcheck from 1.1.4 to 1.1.5 (#4564)
  • 03acb644 build(deps): bump github.com/ldez/gomoddirectives from 0.2.3 to 0.2.4 (#4580)
  • 4d2fa7b3 build(deps): bump github.com/nunnatsa/ginkgolinter from 0.16.1 to 0.16.2 (#4569)
  • 66ec75e7 fix: display warnings on deprecated linter options (#4568)
  • 77a8601a fix: hide useless warning (#4587)
  • 3cff8687 fix: missing output format (#4574)
  • 5ae78cd2 fix: the TeamCity inspectionType service message (#4573)
Changelog

Sourced from github.com/golangci/golangci-lint's changelog.

v1.57.2

  1. Updated linters
    • contextcheck: from 1.1.4 to 1.1.5
    • copyloopvar: from 1.0.8 to 1.0.10
    • ginkgolinter: from 0.16.1 to 0.16.2
    • goconst: from 1.7.0 to 1.7.1
    • gomoddirectives: from 0.2.3 to 0.2.4
    • intrange: from 0.1.0 to 0.1.1
  2. Misc.
    • fix: display warnings on deprecated linter options
    • fix: missing colored-tab output format
    • fix: TeamCity inspectionType service message
  3. Documentation
    • Remove invalid example about mixing files and directory
    • Improve linters page
Commits
  • 77a8601 fix: hide useless warning (#4587)
  • 5a66842 build(deps): bump github.com/karamaru-alpha/copyloopvar from 1.0.9 to 1.0.10 ...
  • c037920 build(deps): bump express from 4.18.2 to 4.19.2 in /docs (#4581)
  • 03acb64 build(deps): bump github.com/ldez/gomoddirectives from 0.2.3 to 0.2.4 (#4580)
  • 87a35e6 dev: organize golinters package (#4578)
  • 085ac85 dev: minor clean up (#4577)
  • 840ef62 dev: remove unused markdownlint config file (#4576)
  • 3cff868 fix: missing output format (#4574)
  • 5ae78cd fix: the TeamCity inspectionType service message (#4573)
  • 66ec75e fix: display warnings on deprecated linter options (#4568)
  • Additional commits viewable in compare view


Updates github.com/sigstore/rekor from 1.3.5 to 1.3.6

Release notes

Sourced from github.com/sigstore/rekor's releases.

v1.3.6

New Features

  • Add support for IEEE P1363 encoded ECDSA signatures
  • Add index performance script (#2042)
  • Add support for ed25519ph user keys in hashedrekord (#1945)
  • Add metrics for index insertion (#2015)
  • Add TLS support for Redis Client implementation (#1998)

Bug Fixes

  • fix typo in remoteIp and set full name for trace field

Full Changelog: https://github.com/sigstore/rekor/compare/v1.3.5...v1.3.6

Changelog

Sourced from github.com/sigstore/rekor's changelog.

v1.3.6

New Features

  • Add support for IEEE P1363 encoded ECDSA signatures
  • Add index performance script (#2042)
  • Add support for ed25519ph user keys in hashedrekord (#1945)
  • Add metrics for index insertion (#2015)
  • Add TLS support for Redis Client implementation (#1998)

Bug Fixes

  • fix typo in remoteIp and set full name for trace field

Contributors

  • Bob Callaway
  • Colleen Murphy
  • cpanato
  • Hayden B
  • Mihkel Pärna
  • Riccardo Schirone
Commits
  • a678856 Add 1.3.6 changelog, test IEEE P1363 sigs in DSSE (#2063)
  • c0668d1 build(deps): Bump google/cloud-sdk from 469.0.0 to 470.0.0
  • 6e94a72 build(deps): Bump google.golang.org/api from 0.171.0 to 0.172.0
  • 55bd48a build(deps): Bump the all group with 7 updates
  • 52e87d5 build(deps): Bump google.golang.org/api from 0.170.0 to 0.171.0
  • a613ad3 build(deps): Bump golang.org/x/mod from 0.15.0 to 0.16.0
  • e767e92 build(deps): Bump go.step.sm/crypto from 0.43.1 to 0.44.1
  • 1571edc build(deps): Bump gocloud.dev from 0.36.0 to 0.37.0
  • 64546c8 build(deps): Bump cloud.google.com/go/pubsub from 1.36.2 to 1.37.0
  • 3ba13dd build(deps): Bump google/cloud-sdk from 468.0.0 to 469.0.0 (#2061)
  • Additional commits viewable in compare view


Updates github.com/sigstore/sigstore from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore's releases.

v1.8.3

What's Changed

Full Changelog: https://github.com/sigstore/sigstore/compare/v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view


Updates github.com/sigstore/sigstore/pkg/signature/kms/aws from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore/pkg/signature/kms/aws's releases.

v1.8.3

What's Changed

Full Changelog: https://github.com/sigstore/sigstore/compare/v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view


Updates github.com/sigstore/sigstore/pkg/signature/kms/azure from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore/pkg/signature/kms/azure's releases.

v1.8.3

What's Changed

Full Changelog: https://github.com/sigstore/sigstore/compare/v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view


Updates github.com/sigstore/sigstore/pkg/signature/kms/gcp from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore/pkg/signature/kms/gcp's releases.

v1.8.3

What's Changed

Full Changelog: https://github.com/sigstore/sigstore/compare/v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view


Updates github.com/sigstore/sigstore/pkg/signature/kms/hashivault from 1.8.2 to 1.8.3

Release notes

Sourced from github.com/sigstore/sigstore/pkg/signature/kms/hashivault's releases.

v1.8.3

What's Changed

Full Changelog: https://github.com/sigstore/sigstore/compare/v1.8.2...v1.8.3

Commits
  • 1b41d79 add support for verifying IEEE P1363 encoded ECDSA sigs (#1686)
  • 65a36c4 Update tuf root.json to version 9 from root-signing repo (#1649)
  • 656a152 build(deps): Bump the all group in /pkg/signature/kms/gcp with 1 update
  • 06016c2 build(deps): Bump the all group in /pkg/signature/kms/aws with 4 updates
  • 4440161 build(deps): Bump the all group with 2 updates
  • 97c04d0 build(deps): Bump the all group in /test/e2e with 1 update
  • 25dd9f3 build(deps): Bump the all group with 1 update
  • d78dca2 build(deps): Bump the all group in /pkg/signature/kms/aws with 1 update
  • 405c5c4 build(deps): Bump the all group
  • b7f6993 build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates
  • Additional commits viewable in compare view


Updates github.com/spiffe/go-spiffe/v2 from 2.1.7 to 2.2.0

Release notes

Sourced from github.com/spiffe/go-spiffe/v2's releases.

v2.2.0

Changed

  • Upgraded to go-jose v4 which has a stronger security posture than v3. Go-spiffe was not impacted by the security weaknesses of v3 due to stringing algorithm checking that is now handled by go-jose v4 (#276)

Fixed

  • Makefile invocation for Apple Silicon-based Macs (#275)

Added

  • Support Ed25519 keys for Workload SVIDs (#248)
Changelog

Sourced from github.com/spiffe/go-spiffe/v2's changelog.

[2.2.0] - 2024-04-01

Changed

  • Upgraded to go-jose v4 which has a stronger security posture than v3. Go-spiffe was not impacted by the security weaknesses of v3 due to stringing algorithm checking that is now handled by go-jose v4 (#276)

Fixed

  • Makefile invocation for Apple Silicon-based Macs (#275)

Added

  • Support Ed25519 keys for Workload SVIDs (#248)
Commits


Updates google.golang.org/grpc from 1.62.1 to 1.63.0

Release notes

Sourced from google.golang.org/grpc's releases.

Release 1.63.0

Behavior Changes

  • grpc: Return canonical target string from resolver.Address.String() (experimental) (#6923)
  • client & server: when using write buffer pooling, use input value for buffer size instead of size*2 (#6983)

New Features

  • grpc: add ClientConn.CanonicalTarget() to return the canonical target string. (#7006)
  • xds: implement LRS named metrics support (gRFC A64) (#7027)
  • grpc: introduce grpc.NewClient to allow users to create new clients in idle mode and with "dns" as the default resolver (#7010)

API Changes

  • grpc: stabilize experimental method ClientConn.Target() (#7006)

Bug Fixes

  • xds: fix an issue that would cause the client to send an empty list of resources for LDS/CDS upon reconnecting with the management server (#7026)
  • server: Fix some errors returned by a server when using a grpc.Server as an http.Handler with the Go stdlib HTTP server (#6989)
  • resolver/dns: add SetResolvingTimeout to allow configuring the DNS resolver's global timeout (#6917)
  • Set the security level of Windows named pipes to NoSecurity (#6956)

Release 1.62.2

Dependencies

Commits
  • c68f456 Change version to 1.63.0 (#7050)
  • 6369167 *: update http2 dependency (#7082)
  • 8854761 cherry-pick: channelz: fix race accessing channelMap without lock (#7079) (#7...
  • e62770d channelz: add LocalAddr to listen sockets and test (#7062) (#7063)
  • 4ffccf1 googlec2p: use xdstp style template for client LDS resource name (#7048)
  • faf9964 gracefulswitch: add ParseConfig and make UpdateClientConnState call SwitchTo ...
  • 800a8e0 channelz: re-add state for subchannels (#7046)
  • dadbbfa channelz: re-add target and state (#7042)
  • 55cd7a6 channelz: major cleanup / reorganization (#6969)
  • a1033b1 xds: add LRS named metrics support (#7027)
  • Additional commits viewable in compare view


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
dependabot[bot] commented 3 months ago

Looks like these dependencies are updatable in another way, so this is no longer needed.