storage: Add new package transfermanager. This package is intended for parallel uploads and downloads, and is in preview. It is not stable, and is likely to change. (#10045) (cde5cbb)
storage/control: Make Managed Folders operations public (264a6dc)
storage: Support for soft delete policies and restore (#9520) (985deb2)
Bug Fixes
storage/control: An existing resource pattern value projects/{project}/buckets/{bucket}/managedFolders/{managedFolder=**} to resource definition storage.googleapis.com/ManagedFolder is removed (3e25053)
The v1.1.0 minor release generalizes the semantics of the DigestSet field type to support any type of immutable identifier. This change is backwards compatible because cryptographic digests are strongly recommended to achieve immutability, so any implementations that only support cryptographic DigestSet still meet the modified semantics. The _type of a Statement is still https://in-toto.io/Statement/v1
Tekton Pipelines follows the Tekton community [release policy][release-policy]
as follows:
Versions are numbered according to semantic versioning: vX.Y.Z
A new release is produced on a monthly basis
Four releases a year are chosen for long term support (LTS).
All remaining releases are supported for approximately 1 month (until the next
release is produced)
LTS releases take place in January, April, July and October every year
The first Tekton Pipelines LTS release will be v0.41.0 in October 2022
Releases happen towards the middle of the month, between the 13th and the
20th, depending on week-ends and readiness
Tekton Pipelines produces nightly builds, publicly available on
gcr.io/tekton-nightly.
Transition Process
Before release v0.41 Tekton Pipelines has worked on the basis of an undocumented
support period of four months, which will be maintained for the releases between
v0.37 and v0.40.
Release Process
Tekton Pipeline releases are made of YAML manifests and container images.
Manifests are published to cloud object-storage as well as
[GitHub][tekton-pipeline-releases]. Container images are signed by
[Sigstore][sigstore] via [Tekton Chains][tekton-chains]; signatures can be
verified through the [public key][chains-public-key] hosted by the Tekton Chains
project.
Further documentation available:
The Tekton Pipeline [release process][tekton-releases-docs]
[Installing Tekton][tekton-installation]
Standard for [release notes][release-notes-standards]
stats: Deprecate InPayload.Data and OutPayload.Data; they were experimental and will be deleted in the next release (#7121)
Behavior Changes
codec: Remove handling of environment variable GRPC_GO_ADVERTISE_COMPRESSORS to suppress setting supported compressors in grpc-accept-encoding header. Compressors will always be advertised, as they have been by default for some time (#7203)
New Features
resolver/dns: Add SetMinResolutionInterval to set the minimum interval at which DNS re-resolutions may occur (#6962)
This pull-request has been approved by:
To complete the pull request process, please assign wlynch after the PR has been reviewed.
You can assign the PR to them by writing /assign @wlynch in a comment when ready.
The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
- **[OWNERS](https://github.com/tektoncd/chains/blob/main/OWNERS)**
Approvers can indicate their approval by writing `/approve` in a comment
Approvers can cancel approval by writing `/approve cancel` in a comment
I'm waiting for a tektoncd member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test label.
Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.
Bumps the all group with 11 updates in the / directory:
1.40.0
1.42.0
1.57.2
1.59.1
0.19.1
0.19.2
1.0.1
1.1.0
1.8.3
1.8.4
1.8.3
1.8.4
1.8.3
1.8.4
1.8.3
1.8.4
1.8.3
1.8.4
2.2.0
2.3.0
0.58.0
0.60.2
Updates
cloud.google.com/go/storage
from 1.40.0 to 1.42.0Release notes
Sourced from cloud.google.com/go/storage's releases.
Commits
22e90d9
chore(main): release spanner 1.42.0 (#7130)2552e09
fix(spanner): fallback to check grpc error message if ResourceType is nil for...6bb95ef
feat(spanner): add database roles (#5701)f2b1f1b
chore(bigquery/storage/managedwriter): internal refactor (flow controller, id...bcc9fcd
test(bigtable): expand integration tests for read stats (#7143)ab332ce
fix(internal/gapicgen): disable rest for non-rest APIs (#7157)dc89409
chore(main): release pubsublite 1.6.0 (#7129)5fa8555
feat(pubsublite): create/update export subscriptions (#6885)176f533
feat(pubsublite): unload idle partition publishers (#7105)28f3572
feat(all): enable REGAPIC and REST numeric enums (#6999)Updates
github.com/golangci/golangci-lint
from 1.57.2 to 1.59.1Release notes
Sourced from github.com/golangci/golangci-lint's releases.
... (truncated)
Changelog
Sourced from github.com/golangci/golangci-lint's changelog.
... (truncated)
Commits
1a55854
build(deps): bump github.com/golangci/misspell from 0.5.1 to 0.6.0 (#4804)aaff918
build(deps): bump github.com/sashamelentyev/usestdlibvars from 1.25.0 to 1.26...327a78a
build(deps): bump golang.org/x/tools from 0.21.0 to 0.22.0 (#4802)02740ea
intrange: add style preset (#4797)4e53f51
docs: update revive configuration (#4790)839b9d7
chore: improve issue templatesa7817a1
chore: improve issue templatesd3a0412
dev: improve issue templates44b3cdd
build(deps): bump github.com/go-viper/mapstructure/v2 from 2.0.0-alpha.1 to 2...615b873
unparam: bump to HEAD (#4786)Updates
github.com/google/go-containerregistry
from 0.19.1 to 0.19.2Release notes
Sourced from github.com/google/go-containerregistry's releases.
Commits
1b4e407
Add -O shorthand for --omit-digest-tags to crane. (#1958)3764db2
Fix windows race condition when writing image with duplicate layers (#1921)39d1148
Add Context support to auth methods (#1949)ff385a9
feat: mutate platform (#1919)98dd3e9
Support podman auth file REGISTRY_AUTH_FILE. (#1914)051d642
registry: Implement Range requests for blobs (#1917)0309184
Add JSON marshalling funcs for Digest. (#1915)Updates
github.com/in-toto/attestation
from 1.0.1 to 1.1.0Release notes
Sourced from github.com/in-toto/attestation's releases.
Commits
36c1129
Merge pull request #359 from marcelamelara/update-versioninga62b90a
Make linter happy4adf92e
Add examples of different tagged release scenariosc1af60d
Add tagged release process to specb382eb5
Update link in README to 1.1 (#357)bbbfea7
Merge pull request #358 from in-toto/actions-regenerate-attestation-libraries241d47f
Regenerate attestation librariesd6e910a
Merge pull request #356 from in-toto/dependabot/go_modules/google.golang.org/...a8fc604
Bump google.golang.org/protobuf from 1.34.0 to 1.34.106eafe3
Clarify that digests don't have to be cryptographic ones. (#338)Updates
github.com/sigstore/sigstore
from 1.8.3 to 1.8.4Release notes
Sourced from github.com/sigstore/sigstore's releases.
Commits
5cd937f
build(deps): Bump github.com/hashicorp/vault/api96fc144
build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates2b99005
build(deps): Bump the all group in /pkg/signature/kms/aws with 3 updatesfa5d64b
sync go mod186a1e5
build(deps): Bump the all group across 1 directory with 4 updates1ba2030
Fix Hashicorp Vault KMS to use PKCS1 v1.5ec88c0b
---bbe51a7
---1d8a874
---acb4db4
build(deps): Bump golangci/golangci-lint-action from 5.3.0 to 6.0.1Updates
github.com/sigstore/sigstore/pkg/signature/kms/aws
from 1.8.3 to 1.8.4Release notes
Sourced from github.com/sigstore/sigstore/pkg/signature/kms/aws's releases.
Commits
5cd937f
build(deps): Bump github.com/hashicorp/vault/api96fc144
build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates2b99005
build(deps): Bump the all group in /pkg/signature/kms/aws with 3 updatesfa5d64b
sync go mod186a1e5
build(deps): Bump the all group across 1 directory with 4 updates1ba2030
Fix Hashicorp Vault KMS to use PKCS1 v1.5ec88c0b
---bbe51a7
---1d8a874
---acb4db4
build(deps): Bump golangci/golangci-lint-action from 5.3.0 to 6.0.1Updates
github.com/sigstore/sigstore/pkg/signature/kms/azure
from 1.8.3 to 1.8.4Release notes
Sourced from github.com/sigstore/sigstore/pkg/signature/kms/azure's releases.
Commits
5cd937f
build(deps): Bump github.com/hashicorp/vault/api96fc144
build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates2b99005
build(deps): Bump the all group in /pkg/signature/kms/aws with 3 updatesfa5d64b
sync go mod186a1e5
build(deps): Bump the all group across 1 directory with 4 updates1ba2030
Fix Hashicorp Vault KMS to use PKCS1 v1.5ec88c0b
---bbe51a7
---1d8a874
---acb4db4
build(deps): Bump golangci/golangci-lint-action from 5.3.0 to 6.0.1Updates
github.com/sigstore/sigstore/pkg/signature/kms/gcp
from 1.8.3 to 1.8.4Release notes
Sourced from github.com/sigstore/sigstore/pkg/signature/kms/gcp's releases.
Commits
5cd937f
build(deps): Bump github.com/hashicorp/vault/api96fc144
build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates2b99005
build(deps): Bump the all group in /pkg/signature/kms/aws with 3 updatesfa5d64b
sync go mod186a1e5
build(deps): Bump the all group across 1 directory with 4 updates1ba2030
Fix Hashicorp Vault KMS to use PKCS1 v1.5ec88c0b
---bbe51a7
---1d8a874
---acb4db4
build(deps): Bump golangci/golangci-lint-action from 5.3.0 to 6.0.1Updates
github.com/sigstore/sigstore/pkg/signature/kms/hashivault
from 1.8.3 to 1.8.4Release notes
Sourced from github.com/sigstore/sigstore/pkg/signature/kms/hashivault's releases.
Commits
5cd937f
build(deps): Bump github.com/hashicorp/vault/api96fc144
build(deps): Bump the all group in /pkg/signature/kms/gcp with 2 updates2b99005
build(deps): Bump the all group in /pkg/signature/kms/aws with 3 updatesfa5d64b
sync go mod186a1e5
build(deps): Bump the all group across 1 directory with 4 updates1ba2030
Fix Hashicorp Vault KMS to use PKCS1 v1.5ec88c0b
---bbe51a7
---1d8a874
---acb4db4
build(deps): Bump golangci/golangci-lint-action from 5.3.0 to 6.0.1Updates
github.com/spiffe/go-spiffe/v2
from 2.2.0 to 2.3.0Release notes
Sourced from github.com/spiffe/go-spiffe/v2's releases.
Changelog
Sourced from github.com/spiffe/go-spiffe/v2's changelog.
Commits
94335b2
v2.3.0 changelog (#290)c1e1faf
Bump google.golang.org/protobuf from 1.33.0 to 1.34.2 in /v2 (#289)0e8e7f0
Bump google.golang.org/grpc from 1.63.2 to 1.64.0 in /v2 (#287)ff0d21e
Bump github.com/go-jose/go-jose/v4 from 4.0.1 to 4.0.2 in /v2 (#286)5460476
Allow empty x509 bundles to be sent in responses (#288)fb781b6
Bump golang.org/x/net from 0.20.0 to 0.23.0 in /v2 (#282)d4e119d
Bump google.golang.org/grpc from 1.62.1 to 1.63.2 in /v2 (#280)fb89f07
Bump github.com/Microsoft/go-winio from 0.6.1 to 0.6.2 in /v2 (#283)Updates
github.com/tektoncd/pipeline
from 0.58.0 to 0.60.2Release notes
Sourced from github.com/tektoncd/pipeline's releases.
... (truncated)
Changelog
Sourced from github.com/tektoncd/pipeline's changelog.
... (truncated)
Commits
ee3af64
Fix: Identify workspace usage in a Taskf2b1420
Allow less strict validation of the Resolver Name during Webhook.ff91c3a
Update GetNameAndNamespace Parametersd649ded
---bef4eef
---4b6fcd4
---fceed89
chore(deps): bump github.com/containerd/containerd from 1.7.15 to 1.7.174631a71
---2261ae2
---4573753
Fix: Faulty Remote Resource Accepted by Remote ResolutionUpdates
golang.org/x/crypto
from 0.22.0 to 0.24.0Commits
332fd65
go.mod: update golang.org/x dependencies0b431c7
x509roots/fallback: update bundle349231f
ssh: implement CryptoPublicKey on sk keys44c9b0f
ssh: allow server auth callbacks to send additional banners67b1361
sha3: reenable s390x assembly477a5b4
sha3: make APIs usable with zero allocations59b5a86
sha3: disable s390x assembly10f366e
sha3: simplify XOR functions905d78a
go.mod: update golang.org/x dependenciesebb717d
ssh: validate key type in SSH_MSG_USERAUTH_PK_OK responseUpdates
google.golang.org/grpc
from 1.63.2 to 1.64.0Release notes
Sourced from google.golang.org/grpc's releases.
Hi @dependabot[bot]. Thanks for your PR.
I'm waiting for a tektoncd member to verify that this patch is reasonable to test. If it is, they should reply with
/ok-to-test
on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.Once the patch is verified, the new status will be reflected by the
ok-to-test
label.I understand the commands that are listed here.
/retest
Looks like these dependencies are updatable in another way, so this is no longer needed.