Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Renovate: Update External dependencies (major) #44

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 21, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/containerd/containerd v1.7.26 -> v2.0.3 age adoption passing confidence
github.com/euank/go-kmsg-parser/v2 v2.1.0 -> v3.0.0 age adoption passing confidence

Release Notes

containerd/containerd (github.com/containerd/containerd)

v2.0.3: containerd 2.0.3

Compare Source

Welcome to the v2.0.3 release of containerd!

The third patch release for containerd 2.0 includes various bug fixes and updates.

Highlights
  • Update remote content to break up writes to avoid grpc message size limits (#​11457)
  • Update runc binary to v1.2.5 (#​11394)
Container Runtime Interface (CRI)
Node Resource Interface (NRI)
  • Fix initial sync race when registering NRI plugins (#​11329)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Akihiro Suda
  • Mike Brown
  • Phil Estes
  • Akhil Mohan
  • Chifeng Cai
  • Krisztian Litkey
  • Wei Fu
  • Andrey Smirnov
  • Austin Vazquez
  • Chris Henzie
  • Jing Xu
  • Jonathan A. Sternberg
  • Jose Fernandez
  • Kirtana Ashok
  • Lei Liu
  • Maksym Pavlenko
  • Michael Zappa
  • Samuel Karp
  • fengwei0328
  • zounengren
Changes
42 commits

  • Prepare release notes for v2.0.3 (#​11443)
  • Update remote content to break up writes to avoid grpc message size limits (#​11457)
    • eaa7ca80d proxy: break up writes from the remote writer to avoid grpc limits
  • Fix privileged container sysfs can't be rw because pod is ro by default (#​11456)
    • c7f64196f Fix privileged container sysfs can't be rw because pod is ro by default
  • go.{mod,sum}: bump CDI deps to v.0.8.1. (#​11430)
  • Prefer runtime options for PluginInfo request (#​11446)
    • 569af34cb Prefer runtime options for PluginInfo request
  • pkg: prevent oom watcher from depending on shim pkg (#​11439)
    • 0ce93e16a prevent oom watcher depend on shim pkg.
  • CI: arm64-8core-32gb -> ubuntu-24.04-arm (#​11436)
    • f3284aa68 CI: arm64-8core-32gb -> ubuntu-24.04-arm
  • Revert "Add timestamp to PodSandboxStatusResponse for kubernetes Evented PLEG" (#​11403)
    • b5313993c Revert "Add timestamp to PodSandboxStatusResponse for kubernetes Evented PLEG"
  • move the device after the options when using mkfs.ext4 (#​11411)
    • f95a426b8 move the device after the options when using mkfs.ext4
  • update build to go1.23.6, test go1.24.0 (#​11410)
    • 4d19a6adf update build to go1.23.6, test go1.24.0
  • build(deps): bump actions/cache from 4.1.2 to 4.2.0 (#​11405)
    • c738c3aab build(deps): bump actions/cache from 4.1.2 to 4.2.0
  • Upgrade x/net to 0.33.0 to fix vulnerability GHSA-w32m-9786-jp63 (#​11387)
  • Update install-imgcrypt to allow change install repo (#​11357)
    • 0785bd8cc Update install-imgcrypt to allow change install repo
  • Update runc binary to v1.2.5 (#​11394)
  • Update go-cni version to fix Race Condition issue (#​11269)
  • Fix initial sync race when registering NRI plugins (#​11329)
    • 79cdbf61b cri,nri: block NRI plugin sync. during event processing.
  • Update github.com/containerd/imgcrypt to v2.0.0 (#​11325)
    • 9d5cfce83 Update github.com/containerd/imgcrypt to v2.0.0
  • Move CDI device spec out of the OCI package (#​11265)
    • f58939c33 Remove deprecated WithCDIDevices in oci spec opts
    • 3d53430fe Move CDI device spec out of the OCI package
  • update to go1.23.5 / go1.22.11 (#​11297)
  • build(deps): bump google.golang.org/protobuf from 1.35.1 to 1.35.2 (#​11263)
    • 3a6ab80d0 build(deps): bump google.golang.org/protobuf from 1.35.1 to 1.35.2

Changes from containerd/go-cni
2 commits

Dependency Changes
  • github.com/containerd/go-cni v1.1.11 -> v1.1.12
  • github.com/containerd/imgcrypt/v2 v2.0.0-rc.1 -> v2.0.0
  • github.com/containers/ocicrypt v1.2.0 -> v1.2.1
  • github.com/petermattis/goid 4fcff4a new
  • github.com/sasha-s/go-deadlock v0.3.5 new
  • github.com/smallstep/pkcs7 v0.1.1 new
  • golang.org/x/crypto v0.28.0 -> v0.31.0
  • golang.org/x/net v0.30.0 -> v0.33.0
  • golang.org/x/oauth2 v0.22.0 -> v0.23.0
  • golang.org/x/sync v0.8.0 -> v0.10.0
  • golang.org/x/sys v0.26.0 -> v0.28.0
  • golang.org/x/term v0.25.0 -> v0.27.0
  • golang.org/x/text v0.19.0 -> v0.21.0
  • google.golang.org/grpc v1.67.1 -> v1.68.1
  • google.golang.org/protobuf v1.35.1 -> v1.35.2
  • tags.cncf.io/container-device-interface v0.8.0 -> v0.8.1

Previous release can be found at v2.0.2

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.2: containerd 2.0.2

Compare Source

Welcome to the v2.0.2 release of containerd!

The second patch release for containerd 2.0 includes a number of bug fixes and improvements.

Highlights
Container Runtime Interface (CRI)
  • Remove confusing warning in cri runtime config migration (#​11256)
  • Fix runtime platform loading in cri image plugin init (#​11248)
Runtime

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Jin Dong
  • Derek McGowan
  • Akihiro Suda
  • Kazuyoshi Kato
  • Henry Wang
  • Krisztian Litkey
  • Phil Estes
  • Samuel Karp
  • Sebastiaan van Stijn
  • Akhil Mohan
  • Brian Goff
  • Chongyi Zheng
  • Maksym Pavlenko
  • Mike Brown
  • Pierre Gimalac
  • Wei Fu
Changes
23 commits

  • Prepare release notes for v2.0.2 (#​11245)
  • Update platforms to latest rc (#​11259)
  • Remove confusing warning in cri runtime config migration (#​11256)
    • 468079c5c Remove confusing warning in cri runtime config migration
  • Fix runtime platform loading in cri image plugin init (#​11248)
    • a2d9d4fd5 Fix runtime platform loading in cri image plugin init
  • make sure console master tty is closed on task exit (#​11246)
    • 184ffad01 Add integ test to check tty leak
    • 17181ed33 fix master tty leak due to leaking init container object
  • Bump up otelttrpc to 0.1.0 (#​11242)
  • ctr: ctr images import --all-platforms: fix unpack (#​11236)
    • c4270430d ctr: ctr images import --all-platforms: fix unpack
  • Update runc binary to v1.2.4 (#​11239)
  • downgrade go-difflib and go-spew to tagged releases (#​11222)
    • f34147772 downgrade go-difflib and go-spew to tagged releases
  • Add a build tag to disable std plugin import (#​11213)
    • dca769485 chore: add a build tag to disable containerd plugin import
  • Update golangci to 1.60.3 (#​11187)

Changes from containerd/otelttrpc
6 commits

Changes from containerd/platforms
6 commits

Changes from containerd/ttrpc
5 commits

Dependency Changes
  • github.com/containerd/otelttrpc ea5083f -> v0.1.0
  • github.com/containerd/platforms v1.0.0-rc.0 -> v1.0.0-rc.1
  • github.com/containerd/ttrpc v1.2.6 -> v1.2.7
  • github.com/davecgh/go-spew d8f796a -> v1.1.1
  • github.com/pmezard/go-difflib 5d4384e -> v1.0.0
  • github.com/stretchr/testify v1.9.0 -> v1.10.0

Previous release can be found at v2.0.1

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.1: containerd 2.0.1

Compare Source

Welcome to the v2.0.1 release of containerd!

The first patch release for containerd 2.0 includes a number of bug fixes and improvements.

Highlights
Container Runtime Interface (CRI)
Image Distribution
  • Update differ to handle zstd media types (#​11068)
Runtime
  • Update runc binary to v1.2.3 (#​11142)
  • Fix panic due to nil dereference cgroups v2 (#​11098)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Wei Fu
  • Archit Kulkarni
  • Jin Dong
  • Phil Estes
  • Akhil Mohan
  • Akihiro Suda
  • Alexey Lunev
  • Austin Vazquez
  • Maksym Pavlenko
  • Mike Brown
  • Michael Zappa
  • Samuel Karp
  • Sebastiaan van Stijn
  • Andrey Smirnov
  • Davanum Srinivas
Changes
50 commits

  • Prepare release notes for v2.0.1 (#​11158)
  • build(deps): bump actions/attest-build-provenance from 1.4.4 to 2.1.0 (#​11154)
    • fe6957084 build(deps): bump actions/attest-build-provenance from 1.4.4 to 2.1.0
  • update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+ (#​11153)
    • eb2ce6882 update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+
  • ctr pull should unpack for default platform when transfer service is used (#​11139)
    • 44cdca68b ctr pull unpack for default platform using transfer service
  • Fix apply IoOwner options when not in user namespace (#​11151)
    • 018d83650 internal/cri: should not apply IoOwner options
  • Update go-cni for CNI STATUS (#​11146)
    • 5eb7995a9 feat: update go-cni version for CNI STATUS
  • Fix cri grpc plugin config migration (#​11140)
    • a2302ea89 Add integration test for custom configuration
    • be5eda069 complete cri grpc config migration
  • Update runc binary to v1.2.3 (#​11142)
  • Update differ to handle zstd media types (#​11068)
    • 73f57acb0 Update differ to handle zstd media types
  • update to go1.23.4 / go1.22.10 (#​11109)
  • CI: update Fedora to 41 (#​11110)
  • Fix panic due to nil dereference cgroups v2 (#​11098)
    • 3ba2df924 fix panic due to nil dereference cgroups v2
  • Publish attestation as release artifact (#​11067)
    • 34a45cab2 Publish attestation as release artifact
  • Move rockylinux 9.4 to almalinux/9 in CI (#​11053)
    • 7dec6b460 move rocky 9.4 to almalinux/9 in CI
  • *: should align pipe's owner with init process (#​11035)
    • cf07f28ee *: should align pipe's owner with init process
  • fix: set the credentials even if not provided (#​11031)
    • 986088866 fix: set the credentials even if not provided
  • fsverity_test.go: fix nil pointer derefence, fix test fail, fix minor/major device numbers resolving (#​10978)
    • 30b929ece fsverity_test.go: fix major/minor device number resolving
    • 10996a334 fsverity_test.go: fix nil pointer dereference, fix test fail
  • update runc binary to 1.2.2 (#​11023)
  • Revert "Disable vagrant strict dependency checking" (#​11009)
    • 6399c936f Revert "Disable vagrant strict dependency checking"
  • fsverity_linux.go: Fix fsverity.IsEnabled() for big endian systems (#​11005)
    • a7f2b562f fsverity_linux.go: Fix fsverity.IsEnabled() for big endian systems
  • bump github.com/containerd/typeurl/v2 from 2.2.2 to 2.2.3 (#​10997)
    • 389e781ea build(deps): bump github.com/containerd/typeurl/v2 from 2.2.2 to 2.2.3
  • update to go1.23.3 / go1.22.9 (#​10973)
  • ci: enable marking 2.0 releases as latest (#​10963)
    • 458215f6c ci: enable marking 2.0 releases as latest
  • Avoid arch info in the sed/replace when building cri-cni-containerd.tar.gz (#​10968)
    • e99c2b55c Avoid arch info in the sed/replace when building cri-cni-containerd.tar.gz

Changes from containerd/go-cni
7 commits

Dependency Changes
  • github.com/containerd/go-cni v1.1.10 -> v1.1.11
  • github.com/containerd/typeurl/v2 v2.2.2 -> v2.2.3

Previous release can be found at v2.0.0

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.

v2.0.0: containerd 2.0.0

Compare Source

Welcome to the v2.0.0 release of containerd!

The first major release of containerd 2.x focuses on the continued stability of
containerd's core feature set with an easy upgrade from containerd 1.x. This
release includes the stabilization of new features added in the last 1.x release
as well as the removal of features which were deprecated in 1.x. The goal is to
support the vast community of containerd users well into the future along with
their ever increasing deployment footprints and variety of use cases.

See containerd 2.0 documentation for details on what is new and has changed in this release.

Highlights
  • Allow sections of Plugins to be merged, and not overwritten as entire sections. (#​9982)
  • Add Update API for sandbox controller (#​9903)
  • Configure otel from env instead of config.toml (#​8970)
  • Enable NRI by default (#​9744)
  • Add PluginInfo to introspection API (#​9442)
  • Remove overlayfs volatile option on temp mounts (#​9555)
  • Expose usage of deprecated features (#​9258)
  • Use Intel ISA-L's igzip if available (#​9200)
  • Introduce top level config migration (#​9223)
  • Add image delete target (#​8989)
  • Remove LimitNOFILE from containerd.service (#​8924)
  • Add support for image expiration during garbage collection (#​9022)
  • Reduce the contention between ref lock and boltdb lock in content store (#​8792)
  • Remove "containerd.io/restart.logpath" label (#​8264)
  • Remove aufs snapshotter (#​8263)
  • Fix deadlock during NRI plugin registration (containerd/nri#79)
  • Support arm64/v9 and minor variants (containerd/platforms#8)
  • Fix deadlock when writing to pipe blocks (containerd/ttrpc#168)
Build and Release Toolchain
  • Generate attestation for artifacts during release (#​10543)
  • Remove cri-containerd-*.tar.gz release bundles (#​9096)
Container Runtime Interface (CRI)
  • Use 'UserSpecifiedImage' from CRI to set the image-name annotation (#​10747)
  • Fine-grained SupplementalGroups control (#​9737)
  • Add support to set loopback to up (#​10238)
  • KEP-3857: Recursive Read-only (RRO) mounts (#​9787)
  • Add support for multiple subscribers to CRI container events (#​9661)
  • Enable CDI by default (#​9621)
  • Remove non-sandboxed CRI implementation (#​9228)
  • Add support for userns in stateless and stateful pods with idmap mounts (KEP-127, k8s >= 1.27) (#​8287)
  • Use sandboxed CRI by default (#​8994)
  • Implement RuntimeConfig CRI call (#​8722)
  • Add support for user namespaces (KEP-127) (#​8803)
  • Remove CRI v1alpha2 (#​8276)
Go client
  • Add api Go module and move all protos under api (#​10151)
  • Move packages based on contributing guide (#​9365)
  • Generalize plugin library (#​9214)
  • Use github.com/containerd/log (#​9086)
Image Distribution
  • Support to syncfs after pull by using diff plugin (#​10284)
  • Skip "unknown" in image platform listing (#​10257)
  • Update unpacker to fetch all provided content (#​10202)
  • Enable Transfer service API to support plain HTTP (#​10024)
  • Enable Transfer service to use registry configuration directory (#​9908)
  • Disable the support for Schema 1 images (#​9765)
  • Update Transfer service to add OCI descriptors to Progress structure (#​9630)
  • Update import and export to allow references to missing content (#​9554)
  • Add option to perform syncfs after pull (#​9401)
  • Add image verifier transfer service plugin system based on a binary directory (#​8493)
Runtime
  • Implement RuntimeStatus.features.supplemental_groups_policy from KEP-3619 (#​10410)
  • Add pprof to runc-shim (#​10242)
  • Provide runtime options in plugin info (#​10251)
  • Store bootstrap parameters in sandbox metadata (#​9736)
  • Update apparmor to allow confined runc to kill containers (#​10123)
  • Support vsock connection to task api (#​9738)
  • Update RuntimeDefault seccomp profile to disallow io_uring related syscalls (#​9320)
  • Switch runc shim to task service v3 and fix restore (#​9233)
  • Add sandboxer configuration and move sandbox controllers to plugins (#​8268)
  • Add annotations to CreateSandbox request (#​8960)
  • Add SandboxMetrics (#​8680)
  • Publish sandbox events (#​8602)
  • Remove the CriuPath field from runc's options (#​8279)
  • Remove io.containerd.runtime.v1.linux and io.containerd.runc.v1 (#​8262)
Security Advisories
Breaking
  • Remove disable_cgroup from CRI config (#​10594)
  • Disable the support for Schema 1 images (#​9765)
  • Update RuntimeDefault seccomp profile to disallow io_uring related syscalls (#​9320)
  • Move client to subpackage (#​9316)
  • Remove LimitNOFILE from containerd.service (#​8924)
  • Remove CRI v1alpha2 (#​8276)
  • Remove io.containerd.runtime.v1.linux and io.containerd.runc.v1 (#​8262)
  • Remove "containerd.io/restart.logpath" label (#​8264)
  • Remove aufs snapshotter (#​8263)
Deprecations
  • Update warnings for deprecated CRI config fields (#​10509)
  • Add type alias for event Envelope (#​10279)
  • Postpone removal of deprecated CRI config properties (#​9966)
  • Deprecate go-plugin configuration option (#​9238)
  • CNI conf_template in CRI is no longer deprecated (#​8637)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Derek McGowan
  • Akihiro Suda
  • Maksym Pavlenko
  • Wei Fu
  • Phil Estes
  • Sebastiaan van Stijn
  • Samuel Karp
  • Krisztian Litkey
  • Kazuyoshi Kato
  • Austin Vazquez
  • Rodrigo Campos
  • Danny Canter
  • Abel Feng
  • Mike Brown
  • Kirtana Ashok
  • Akhil Mohan
  • Iceber Gu
  • Gabriel Adrian Samfira
  • Jin Dong
  • Kohei Tokunaga
  • Bjorn Neergaard
  • Brian Goff
  • Justin Chadwell
  • rongfu.leng
  • James Sturtevant
  • Davanum Srinivas
  • Paul "TBBle" Hampson
  • Henry Wang
  • Enrico Weigelt
  • Laura Brehm
  • Marat Radchenko
  • Paweł Gronowski
  • Shingo Omura
  • Hsing-Yu (David) Chen
  • Ilya Hanov
  • Cardy.Tang
  • Swagat Bora
  • Aditi Sharma
  • Amit Barve
  • Bryant Biggs
  • Evan Lezar
  • James Jenkins
  • Jordan Liggitt
  • Kay Yan
  • Markus Lehtonen
  • Nashwan Azhari
  • Shuaiyi Zhang
  • Vinayak Goyal
  • helen
  • Alexandru Matei
  • Anthony Nandaa
  • Avi Deitcher
  • Charity Kathure
  • Cory Snider
  • Ed Bartosh
  • Etienne Champetier
  • Kevin Parsons
  • Michael Zappa
  • Milas Bowman
  • lengrongfu
  • ningmingxiao
  • yanggang
  • zounengren
  • Aditya Ramani
  • Adrian Reber
  • Amir M. Ghazanfari
  • Antonio Ojea
  • Artem Khramov
  • Brad Davidson
  • Chen Yiyang
  • Chongyi Zheng
  • Christian Muehlhaeuser
  • Djordje Lukic
  • Edgar Lee
  • Eric Lin
  • Ethan Lowman
  • Jiang Liu
  • June Rhodes
  • Kern Walster
  • Lei Jitang
  • Lucas Rattz
  • Mahamed Ali
  • Maksim An
  • Michael Crosby
  • Peteris Rudzusiks
  • Ray Burgemeestre
  • Sam Edwards
  • Samruddhi Khandale
  • Sascha Grunert
  • Steve Griffith
  • Tony Fang
  • Tõnis Tiigi
  • VERNOU Cédric
  • Vishal Reddy Gurrala
  • Xiaojin Zhang
  • Yang Yang
  • hang.jiang
  • harshitasao
  • jerryzhuang
  • roman-kiselenko
  • zhanluxianshen
  • Aaron Lehmann
  • AbdelrahmanElawady
  • Adrien Delorme
  • Alex Couture-Beil
  • Alex Ellis
  • Alex Rodriguez
  • Angelos Kolaitis
  • Antonio Huete Jimenez
  • Antti Kervinen
  • Arash Haghighat
  • Arkin Modi
  • Ben Foster
  • Benjamin Peterson
  • Bin Tang
  • Bin Xin
  • BinBin He
  • Brennan Kinney
  • Changqing Li
  • ChengenH
  • ChengyuZhu6
  • Christian Stewart
  • Colin O'Dell
  • Craig Ingram
  • Daisy Rong
  • David Porter
  • David Son
  • Derek Nola
  • Eng Zer Jun
  • Erikson Tung
  • Fabiano Fidêncio
  • Fahed Dorgaa
  • Gabriela Cervantes
  • Gary McDonald
  • Iain Macdonald
  • James Lakin
  • Jan Dubois
  • Jaroslav Jindrak
  • Javier Maestro
  • Jian Wang
  • Jiongchi Yu
  • Julien Balestra
  • Kir Kolyshkin
  • Kirill A. Korinsky
  • Konstantin Khlebnikov
  • Lei Liu
  • Matteo Pulcini
  • Mauri de Souza Meneguzzo
  • Mike Baynton
  • Niklas Gehlen
  • Pan Yibo
  • Paul Meyer
  • Qasim Sarfraz
  • Qiutong Song
  • Reinhard Tartler
  • Robbie Buxton
  • Robert-André Mauchin
  • Ruihua Wen
  • Saket Jajoo
  • Sameer
  • Shengjing Zhu
  • Shiming Zhang
  • Shukui Yang
  • StepSecurity Bot
  • Talon
  • Tariq Ibrahim
  • Tianon Gravi
  • Tim Hockin
  • TinaMor
  • Tobias Klauser
  • Tomáš Virtus
  • Wang Xinwen
  • William Chen
  • Xinyang Ge
  • Yibo Zhuang
  • Yuhang Wei
  • Yury Gargay
  • Zechun Chen
  • Zhang Tianyang
  • Zoe
  • baijia
  • bo.jiang
  • bzsuni
  • charles-chenzz
  • chschumacher1994
  • cormick
  • guangli.bao
  • guangwu
  • jinda.ljd
  • jingtao.liang
  • krglosse
  • pigletfly
  • rokkiter
  • wangxiang
  • zhangpeng
  • zhaojizhuang
  • 吴小白
  • 张钰
  • 沈陵
  • 谭九鼎
Dependency Changes
  • dario.cat/mergo v1.0.1 new
  • github.com/AdaLogics/go-fuzz-headers 1f10f66 -> e8a1dd7
  • github.com/AdamKorcz/go-118-fuzz-build 5330a85 -> 2b5cbb2
  • github.com/Microsoft/go-winio v0.6.0 -> v0.6.2
  • github.com/Microsoft/hcsshim v0.10.0-rc.7 -> v0.12.9
  • github.com/cenkalti/backoff/v4 v4.2.0 -> v4.3.0
  • github.com/cespare/xxhash/v2 v2.2.0 -> v2.3.0
  • github.com/checkpoint-restore/checkpointctl v1.3.0 new
  • github.com/checkpoint-restore/go-criu/v7 v7.2.0 new
  • github.com/cilium/ebpf v0.9.1 -> v0.11.0
  • github.com/containerd/cgroups/v3 v3.0.1 -> v3.0.3
  • github.com/containerd/console v1.0.3 -> v1.0.4
  • github.com/containerd/containerd/api v1.8.0 new
  • github.com/containerd/continuity v0.3.0 -> v0.4.4
  • github.com/containerd/errdefs v1.0.0 new
  • github.com/containerd/errdefs/pkg v0.3.0 new
  • github.com/containerd/go-cni v1.1.9 -> v1.1.10
  • github.com/containerd/go-runc v1.0.0 -> v1.1.0
  • github.com/containerd/imgcrypt/v2 v2.0.0-rc.1 new
  • github.com/containerd/log v0.1.0 new
  • github.com/containerd/nri v0.3.0 -> v0.8.0
  • github.com/containerd/otelttrpc ea5083f new
  • github.com/containerd/platforms v1.0.0-rc.0 new
  • github.com/containerd/plugin v1.0.0 new
  • github.com/containerd/ttrpc v1.2.1 -> v1.2.6
  • github.com/containerd/typeurl/v2 v2.1.0 -> v2.2.2
  • github.com/containerd/zfs/v2 v2.0.0-rc.0 new
  • github.com/containernetworking/cni v1.1.2 -> v1.2.3
  • github.com/containernetworking/plugins v1.2.0 -> v1.5.1
  • github.com/containers/ocicrypt v1.1.6 -> v1.2.0
  • github.com/cpuguy83/go-md2man/v2 v2.0.2 -> v2.0.5
  • github.com/davecgh/go-spew v1.1.1 -> d8f796a
  • github.com/distribution/reference v0.6.0 new
  • github.com/emicklei/go-restful/v3 v3.10.1 -> v3.11.0
  • github.com/felixge/httpsnoop v1.0.4 new
  • github.com/fsnotify/fsnotify v1.6.0 -> v1.7.0
  • github.com/fxamacker/cbor/v2 v2.7.0 new
  • github.com/go-jose/go-jose/v4 v4.0.4 new
  • github.com/go-logr/logr v1.2.3 -> v1.4.2
  • github.com/golang/protobuf v1.5.2 -> v1.5.4
  • github.com/google/go-cmp v0.5.9 -> v0.6.0
  • github.com/google/uuid v1.3.0 -> v1.6.0
  • github.com/gorilla/websocket v1.5.0 new
  • github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus v1.0.1 new
  • github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.1.0 new
  • github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.0 -> v2.22.0
  • github.com/intel/goresctrl v0.3.0 -> v0.8.0
  • github.com/klauspost/compress v1.16.0 -> v1.17.11
  • github.com/mdlayher/socket v0.4.1 new
  • github.com/mdlayher/vsock v1.2.1 new
  • github.com/mistifyio/go-zfs/v3 v3.0.1 new
  • github.com/moby/spdystream v0.2.0 -> v0.4.0
  • github.com/moby/sys/mountinfo v0.6.2 -> v0.7.2
  • github.com/moby/sys/sequential v0.5.0 -> v0.6.0
  • github.com/moby/sys/signal v0.7.0 -> v0.7.1
  • github.com/moby/sys/symlink v0.2.0 -> v0.3.0
  • github.com/moby/sys/user v0.3.0 new
  • github.com/moby/sys/userns v0.1.0 new
  • github.com/munnerz/goautoneg a7dc8b6 new
  • github.com/mxk/go-flowrate cca7078 new
  • github.com/opencontainers/image-spec 3a7f492 -> v1.1.0
  • github.com/opencontainers/runtime-spec v1.1.0-rc.1 -> v1.2.0
  • github.com/opencontainers/runtime-tools 946c877 -> 2e043c6
  • github.com/opencontainers/selinux v1.11.0 -> v1.11.1
  • github.com/pelletier/go-toml/v2 v2.2.3 new
  • github.com/pmezard/go-difflib v1.0.0 -> 5d4384e
  • github.com/prometheus/client_golang v1.14.0 -> v1.20.5
  • github.com/prometheus/client_model v0.3.0 -> v0.6.1
  • github.com/prometheus/common v0.37.0 -> v0.55.0
  • github.com/prometheus/procfs v0.8.0 -> v0.15.1
  • github.com/sirupsen/logrus v1.9.0 -> v1.9.3
  • github.com/stefanberger/go-pkcs11uri 78d3cae -> 7828495
  • github.com/stretchr/testify v1.8.2 -> v1.9.0
  • github.com/urfave/cli/v2 v2.27.5 new
  • github.com/vishvananda/netlink v1.2.1-beta.2 -> v1.3.0
  • github.com/vishvananda/netns 2eb08e3 -> v0.0.4
  • github.com/x448/float16 v0.8.4 new
  • github.com/xrash/smetrics 686a1a2 new
  • go.etcd.io/bbolt v1.3.7 -> v1.3.11
  • go.mozilla.org/pkcs7 432b235 -> v0.9.0
  • go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.40.0 -> v0.56.0
  • go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.56.0 new
  • go.opentelemetry.io/otel v1.14.0 -> v1.31.0
  • go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.14.0 -> v1.31.0
  • go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.14.0 -> v1.31.0
  • go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.14.0 -> v1.31.0
  • go.opentelemetry.io/otel/metric v0.37.0 -> v1.31.0
  • go.opentelemetry.io/otel/sdk v1.14.0 -> v1.31.0
  • go.opentelemetry.io/otel/trace v1.14.0 -> v1.31.0
  • go.opentelemetry.io/proto/otlp v0.19.0 -> v1.3.1
  • golang.org/x/crypto v0.1.0 -> v0.28.0
  • golang.org/x/exp aacd6d4 new
  • golang.org/x/mod v0.7.0 -> v0.21.0
  • golang.org/x/net v0.7.0 -> v0.30.0
  • golang.org/x/oauth2 v0.4.0 -> v0.22.0
  • golang.org/x/sync v0.1.0 -> v0.8.0
  • golang.org/x/sys v0.6.0 -> v0.26.0
  • golang.org/x/term v0.5.0 -> v0.25.0
  • golang.org/x/text v0.7.0 -> v0.19.0
  • golang.org/x/time 90d013b -> v0.3.0
  • google.golang.org/genproto/googleapis/api 5fefd90 new
  • google.golang.org/genproto/googleapis/rpc 324edc3 new
  • google.golang.org/grpc v1.53.0 -> v1.67.1
  • google.golang.org/protobuf v1.28.1 -> v1.35.1
  • k8s.io/api

Configuration

📅 Schedule: Branch creation - "before 8am on Friday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link
Contributor Author

renovate bot commented Feb 21, 2025

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: go.sum
Command failed: mod upgrade --mod-name=github.com/containerd/containerd -t=2
err: exit status 1: stderr: go: inconsistent vendoring in /tmp/renovate/repos/github/sapcc/kubernetes-oomkill-exporter:
	github.com/containerd/containerd@v1.7.23: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/containerd/containerd/v2@v2.0.3: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/euank/go-kmsg-parser/v3@v3.0.0: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/containerd/containerd@v1.7.26: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod

	To ignore the vendor directory, use -mod=readonly or -mod=mod.
	To sync the vendor directory, run:
		go mod vendor

could not load package
github.com/marwan-at-work/mod/major.Run
	/runner/cache/others/go/pkg/mod/github.com/marwan-at-work/mod@v0.7.1/major/major.go:47
main.upgrade
	/runner/cache/others/go/pkg/mod/github.com/marwan-at-work/mod@v0.7.1/cmd/mod/main.go:75
main.main.withExit.func1
	/runner/cache/others/go/pkg/mod/github.com/marwan-at-work/mod@v0.7.1/cmd/mod/main.go:88
github.com/urfave/cli/v2.(*Command).Run
	/runner/cache/others/go/pkg/mod/github.com/urfave/cli/v2@v2.25.1/command.go:274
github.com/urfave/cli/v2.(*Command).Run
	/runner/cache/others/go/pkg/mod/github.com/urfave/cli/v2@v2.25.1/command.go:267
github.com/urfave/cli/v2.(*App).RunContext
	/runner/cache/others/go/pkg/mod/github.com/urfave/cli/v2@v2.25.1/app.go:332
github.com/urfave/cli/v2.(*App).Run
	/runner/cache/others/go/pkg/mod/github.com/urfave/cli/v2@v2.25.1/app.go:309
main.main
	/runner/cache/others/go/pkg/mod/github.com/marwan-at-work/mod@v0.7.1/cmd/mod/main.go:71
runtime.main
	/opt/containerbase/tools/golang/1.24.0/src/runtime/proc.go:283
runtime.goexit
	/opt/containerbase/tools/golang/1.24.0/src/runtime/asm_amd64.s:1700

@renovate renovate bot force-pushed the renovate/major-external-dependencies branch from c484232 to 4423f37 Compare February 28, 2025 15:58
@renovate renovate bot force-pushed the renovate/major-external-dependencies branch from 4423f37 to 6e03637 Compare February 28, 2025 20:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant