-
Notifications
You must be signed in to change notification settings - Fork 30
[main] Upgrade to latest dependencies #648
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[main] Upgrade to latest dependencies #648
Conversation
39753a6
to
ad62d04
Compare
45a172c
to
c2b18a3
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
c2b18a3
to
e18e5a7
Compare
e18e5a7
to
9c407bd
Compare
38275d8
to
2f40ff4
Compare
e74d566
to
b8eb2e5
Compare
706aafa
to
8763dcc
Compare
8415e60
to
7a0a9ac
Compare
7a0a9ac
to
90cba45
Compare
238d68a
to
cc0c726
Compare
9030add
to
78b7f67
Compare
bumping golang.org/x/net 8da7ed1...99b3ae0: > 99b3ae0 go.mod: update golang.org/x dependencies > 85d1d54 go.mod: update golang.org/x dependencies > cde1dda proxy, http/httpproxy: do not mismatch IPv6 zone ids against hosts > fe7f039 publicsuffix: spruce up code gen and speed up PublicSuffix > 459513d internal/http3: move more common stream processing to genericConn > aad0180 http2: fix flakiness from t.Log when GOOS=js > b73e574 http2: don't log expected errors from writing invalid trailers > 5f45c77 internal/http3: make read-data tests usable for server handlers > 43c2540 http2, internal/httpcommon: reject userinfo in :authority > 1d78a08 http2, internal/httpcommon: factor out server header logic for h2/h3 > 0d7dc54 quic: add Conn.ConnectionState > b4c8655 http2: avoid extended CONNECT hang when connection breaks during startup > 163d836 internal/http3: add Server > 447f458 context: delete lone example > 918d64e context: delete dead code, sync docs with upstream context package > 5095d0c all: upgrade go directive to at least 1.23.0 [generated] > 8844327 internal/httpcommon: don't depend on net/http > cd9d661 route: fix RTM_GET netmask parsing on Darwin > df97a48 go.mod: update golang.org/x dependencies > 2dab271 route: treat short sockaddr lengths as unspecified > b914489 internal/http3: refactor in prep for sharing transport/server code > ebd23f8 route: fix parsing network address of length zero > 938a9fb internal/http3: add request/response body transfer > 145b2d7 internal/http3: add RoundTrip > 5bda71a internal/http3: define connection and stream error types > 3c1185a internal/http3: return error on mid-frame EOF > a6c2c7f http2, internal/httpcommon: factor out common request header logic for h2/h3 > c72e89d internal/http3: QPACK encoding and decoding > 93c1957 internal/http3: add Transport and ClientConn > 45432b5 internal/socket, webdav: use testing.T.TempDir > 56691ee quic: don't return EOF from ReadByte when we have a byte > 7ad0ebf internal/http3: qpack wire primitives > f6b2e53 internal/http3: basic stream read/write operations > 78717f9 internal/http3: error codes > 84b528b internal/http3: new package > 445eead http2: encode :protocol pseudo-header before regular headers > 5566b43 quic: add the ability to create an endpoint with a fake network > 97dd44e http2, internal/gate: move Gate type to an internal package > 35e1007 quic, internal/quic/quicwire: split wire encode/decode functions to new package > 0a5dcdd http2: disable extended CONNECT by default > 03179ce quic: report error string when peer closes connection > 4428704 quic: surface connection errors in stream methods > dc3b8a8 quic: return error from Stream.Flush > 2e60102 quic, internal/testcert: move test cert to internal package bumping golang.org/x/sys d4ac05d...74cfc93: > 74cfc93 all: upgrade go directive to at least 1.23.0 [generated] > 863b3c4 unix: update glibc to 2.41 > 4d4692e unix: add Auxv > b215a1c unix: update to Linux kernel 6.13 > c756214 cpu: add support for AVX-VNNI and IFMA detection > 1c14dca unix: add GetPeerUcred and UcredGet for solaris Signed-off-by: Knative Automation <[email protected]>
78b7f67
to
5e3cc5f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: creydr, knative-automation The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Cron -knative-prow-robot
/cc knative-extensions/eventing-writers
/assign knative-extensions/eventing-writers
Produced by: knative-extensions/knobots/actions/update-deps