-
Notifications
You must be signed in to change notification settings - Fork 264
Comparing changes
Open a pull request
base repository: microsoft/hcsshim
base: v0.11.8
head repository: microsoft/hcsshim
compare: v0.12.0
Commits on May 8, 2023
-
Allow patch dependabot updates (#1756)
Patch updates can be disabled for most dependencies, but ignoring all patch-fixes has caused errors (notably containerd). Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for a452efa - Browse repository at this point
Copy the full SHA a452efaView commit details -
omnibus dependency updates (#1767)
Update dependencies and vendor (and update `test/go.mod`, as appropriate) for: - 1758 - 1759 - 1760 - 1761 - 1762 - 1763 - 1764 - 1765 Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 478b6da - Browse repository at this point
Copy the full SHA 478b6daView commit details -
Checkout appropriate containerd ref (#1752)
Use containerd version from go.mod when checking out and building upstream containerd for testing. containerd integration tests updated in 1.6.20 to work on windows. Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for de0e116 - Browse repository at this point
Copy the full SHA de0e116View commit details
Commits on May 9, 2023
-
gcs: Support routing container stdio to sidecar
Signed-off-by: Ashish Sachdeva <asachdev@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for b1b0768 - Browse repository at this point
Copy the full SHA b1b0768View commit details -
Merge pull request #1728 from ashishsachdeva/asachdev/logsredirection
gcs: Support routing container stdio to sidecar
Configuration menu - View commit details
-
Copy full SHA for a1d874a - Browse repository at this point
Copy the full SHA a1d874aView commit details
Commits on May 11, 2023
-
Enable guest agent unit tests in the ci
Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 655649b - Browse repository at this point
Copy the full SHA 655649bView commit details -
Bump github.com/docker/distribution in /test (#1771)
Bumps [github.com/docker/distribution](https://github.com/docker/distribution) from 2.8.1+incompatible to 2.8.2+incompatible. - [Release notes](https://github.com/docker/distribution/releases) - [Commits](distribution/distribution@v2.8.1...v2.8.2) --- updated-dependencies: - dependency-name: github.com/docker/distribution dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Configuration menu - View commit details
-
Copy full SHA for 154f877 - Browse repository at this point
Copy the full SHA 154f877View commit details -
Bump github.com/docker/distribution (#1772)
Bumps [github.com/docker/distribution](https://github.com/docker/distribution) from 2.8.1+incompatible to 2.8.2+incompatible. - [Release notes](https://github.com/docker/distribution/releases) - [Commits](distribution/distribution@v2.8.1...v2.8.2) --- updated-dependencies: - dependency-name: github.com/docker/distribution dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Configuration menu - View commit details
-
Copy full SHA for 5d2fe12 - Browse repository at this point
Copy the full SHA 5d2fe12View commit details
Commits on May 12, 2023
-
Merge pull request #1773 from katiewasnothere/kabaldau/run_guest_unit…
…_tests Enable guest agent unit tests in the CI
Configuration menu - View commit details
-
Copy full SHA for 889236e - Browse repository at this point
Copy the full SHA 889236eView commit details
Commits on May 15, 2023
-
formalize ignored (test) dependency updates (#1769)
Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 497a346 - Browse repository at this point
Copy the full SHA 497a346View commit details -
Rewrite SCSI support in new package
The existing SCSI implementation in internal/uvm has evolved organically over time into what it is today. This creates unecessary difficulty when adding new features to the code, makes it harder to maintain, and has been a source of bugs. Additionally, there is a significant functional issue that the current scsi code tightly couples the idea of attaching a SCSI device to a VM, with the use/mounting of that device inside the VM. This creates difficulty when we want to re-use the same SCSI attachment multiple times, especially in the future when we will need to mount multiple partitions from a device. This is addressed here by largely rewriting the shim's SCSI code, and moving it to a new internal/uvm/scsi package. The new code features a main Manager type, which delegates to attachManager and mountManager for tracking of attachments to the VM, and mounting of devices inside the VM, respectively. attachManager and mountManager also rely on a set of interfaces for the actual backend implementation of interacting with a VM. This will also allow for easier testing of the scsi package in isolation in the future. One consequence of this change is it is no longer possible for the caller to request a specific UVM path for a SCSI mount. The support for this was already kind of a sham, because if the disk was already mounted, you would get back its existing mount path instead of the one you wanted, so the caller already had to handle that case. Additionally, I'm not aware of any reason why the specific location the disk is mounted is actually relevant. Because of these reasons, and to simplify the overall package interface, the mount path is determined by the scsi package, using a format string passed to the Manager at creation time. Signed-off-by: Kevin Parsons <kevpar@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for d98a2ef - Browse repository at this point
Copy the full SHA d98a2efView commit details -
Merge pull request #1744 from kevpar/new-scsi
Rewrite SCSI support in new package
Configuration menu - View commit details
-
Copy full SHA for 5c5d85c - Browse repository at this point
Copy the full SHA 5c5d85cView commit details -
Support more flexible LCOW layer parsing
Previously, layer information for both Windows and Linux containers was passed throughout the shim through the OCI runtime spec's Windows.LayerFolders field. This was used to store the set of directories used for the layers, including the scratch. The exact semantics of what is expected in these directories differed between Windows and Linux. This approach worked okay, but had a few annoying limitations. For instance, there was no way to represent more complex layer data, such as a VHD path as well as a partition index on that VHD. This change removes the use of Windows.LayerFolders completely for Linux containers, and instead creates a new layers.LCOWLayers type that is used to represent Linux layer configuration. This new type is passed into hcsoci.CreateContainer, and from there is passed into layers.MountLCOWLayers where it is actually used to set up the filesystem for the container. The new layers.LCOWLayers type is currently quite simple, but having this as a proper Go type allows us a lot of flexibility in the future. We can add more fields on this struct, but we could also change out the nested LCOWLayer type for an interface, for instance, if we wanted to support new types of layers that have drastically different representation. This change does not aim to touch the way Windows container layers are handled, nor how the Windows UVM root filesystem is set up. These would be good things to improve in the future, but the Windows container layers are more complicated in how they are used, so this is left for future work. Signed-off-by: Kevin Parsons <kevpar@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 76b9454 - Browse repository at this point
Copy the full SHA 76b9454View commit details -
Add lcow-partitioned-layer mount type
Adds support for a new type of LCOW mount that can use individual disk partitions for each read-only layer. This change adds the work to parse the new layer type and pass it through the shim, as well as the support to the shim-side SCSI package to send the partition index in the guest request. This change does not add the GCS-side work to actually mount the specified partition. That will come in a future change. This change also does not handle formatting the scratch disk. It it desired to be able to format it on the fly when creating the container, but that will also come in a future change. Signed-off-by: Kevin Parsons <kevpar@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 776be9a - Browse repository at this point
Copy the full SHA 776be9aView commit details -
Merge pull request #1745 from kevpar/lcow-layers
Support flexible LCOW layer parsing and partitioned layers
Configuration menu - View commit details
-
Copy full SHA for 22bf0b5 - Browse repository at this point
Copy the full SHA 22bf0b5View commit details -
PRs: - #1775 - #1777 - #1778 (needed to update `test/go.mod` as well). Update dependabot.yml to avoid automated major/minor updates in containerd-related dependencies. Revert `github.com/containerd/ttrpc` in `test/` to `1.1.1`, since it is used to communicate with shim in `containerd-shim-runhcs-v1` tests, and the versions should match. Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 94df0f3 - Browse repository at this point
Copy the full SHA 94df0f3View commit details -
Guest agent support for partitions on SCSI devices
* Update `ControllerLunToName` to `GetDevicePath` and take in partition as an additional param * Wait for partition subdirectory to appear for the devices * Update device encryption and verity device names with partition index * Update device encryption and verity device tests * Add new unit tests for `GetDevicePath` Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 1a2aca3 - Browse repository at this point
Copy the full SHA 1a2aca3View commit details -
Merge pull request #1747 from katiewasnothere/kabaldau/scsi_partition…
…_guest Guest agent support for partitions on SCSI devices
Configuration menu - View commit details
-
Copy full SHA for e5af8fb - Browse repository at this point
Copy the full SHA e5af8fbView commit details -
Add feature to ensure scsi device is formatted with target filesystem
* Add new `EnsureFilesystem` and `Filesystem` options on LCOWMappedVirtualDisk * Add matching `EnsureFilesystem` and `Filesystem` options on scsi MountConfig * Set `EnsureFilesystem` and `Filesystem` when attaching scratch devices * Add plumbing in guest scsi package to support `EnsureFilesystem` and `Filesystem`. * Create new `Config` type in guest scsi package for passing in setup/cleanup configuration settings * Add new call to get a device's filesystem by reading its superblock * Add new scsi unit tests for new features and update existing tests * New package for formatting using xfs * Move xfs formatting for encrypted devices out of crypt pkg into scsi Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for af8c444 - Browse repository at this point
Copy the full SHA af8c444View commit details -
Merge pull request #1757 from katiewasnothere/kabaldau/scsi_ensure_fi…
…lesystem SCSI ensure filesystem
Configuration menu - View commit details
-
Copy full SHA for 7769a64 - Browse repository at this point
Copy the full SHA 7769a64View commit details
Commits on May 16, 2023
-
Update containerd-shim-runhcs-v1 tests (#1783)
Update shim tests to match current shim behavior. Run shim tests in GitHub CI. Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 55f8c42 - Browse repository at this point
Copy the full SHA 55f8c42View commit details
Commits on May 23, 2023
-
Configuration menu - View commit details
-
Copy full SHA for c271b98 - Browse repository at this point
Copy the full SHA c271b98View commit details -
update tar2ext4 package (#1785)
Add another `ReadExt4SuperBlockReadSeeker` implementation to work with `io.ReadSeeker` in addition to working with files directly. This way we'll be able to work with e.g. ext4 GPT partitions. The existing `ReadExt4SuperBlock` works the same, but has been updated to call `ReadExt4SuperBlockReadSeeker`. Add `ReadDMVerityInfoReader` that reads dmverity superblock from an `io.Reader` and update `ReadDMVerityInfo` accordingly. Additionally write verity superblock directly without `io.SeekEnd`, assumming that the writer is already set at correct offset. `ComputeAndWriteHashDevice` parameters have been updated accordingly. Add `Ext4FileSystemSize` function that reads ext4 superblock from a given `io.ReadSeeker` and returns the underlying ext4 filesystem size and its superblock. Signed-off-by: Maksim An <maksiman@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 36359c0 - Browse repository at this point
Copy the full SHA 36359c0View commit details
Commits on May 30, 2023
-
Bump github.com/containerd/ttrpc from 1.1.1 to 1.1.2 (#1791)
* Bump github.com/containerd/ttrpc from 1.1.1 to 1.1.2 Bumps [github.com/containerd/ttrpc](https://github.com/containerd/ttrpc) from 1.1.1 to 1.1.2. - [Release notes](https://github.com/containerd/ttrpc/releases) - [Commits](containerd/ttrpc@v1.1.1...v1.1.2) --- updated-dependencies: - dependency-name: github.com/containerd/ttrpc dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com> * tidy ./test Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> --------- Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 933d9b1 - Browse repository at this point
Copy the full SHA 933d9b1View commit details -
Use
gh
cli to download releases (#1792)Use official github cli tool to download releases, instead of manually creating URLs. Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for f1a2711 - Browse repository at this point
Copy the full SHA f1a2711View commit details -
Add test for support of NFS mount (#1726)
LCOW kernel needs to be built with certain config options(`CONFIG_NFS_FS=y`, `CONFIG_NFS_V4=y` & `CONFIG_NFS_V4_1=y`)_in order to be able to successfully run a NFS client and mount a NFS inside a container. This test attempts to mount a (fake) NFS server to ensure that the kernel has the capabilities of running a NFS client. We don't mount a real NFS server because creating a real NFS server that will work in all kinds of test environments is not simple. Instead, we look at the error returned by the NFS mount operation and decide if the failure is because the server wasn't available (i.e a `Connection refused` error) or because the kernel doesn't support NFS clients (`No Device` error). Limitations on different approaches of starting a real NFS server: 1. Starting another LCOW container that runs a NFS server: By default on Linux the NFS server runs in the kernel and to enable that the kernel must be built with `NFSD_*` config options (note that the config options for running NFS server are different than the config options required for NFS client), which we don't currently do and it doesn't make sense to just enable these options for a test. 2. Running a userspace NFS server: There are a few userspace NFS server projects but getting them to run inside the UtilityVM wasn't very easy. We didn't want to spend a lot of time on this test. 3. Running NFS server on the windows host: Not all builds of windows support this so the test won't run in all environments. Signed-off-by: Amit Barve <ambarve@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for e322ac5 - Browse repository at this point
Copy the full SHA e322ac5View commit details -
[gcs.test] update scratch space cleanup order (#1794)
Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 9fd0e72 - Browse repository at this point
Copy the full SHA 9fd0e72View commit details -
[func.test]update lcow layer processing (#1795)
Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 566a34d - Browse repository at this point
Copy the full SHA 566a34dView commit details
Commits on May 31, 2023
-
tests: fix uvm resources update tests (#1796)
inject fragment logic has been added and the uvm resource update tests are failing for a completely different reason. Update the tests to check for specific "invalid resource" message. Signed-off-by: Maksim An <maksiman@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 4f8d26f - Browse repository at this point
Copy the full SHA 4f8d26fView commit details
Commits on Jun 2, 2023
-
tests: add rego e2e tests for dump_stacks and get_properties (#1793)
Signed-off-by: Maksim An <maksiman@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 8a094ae - Browse repository at this point
Copy the full SHA 8a094aeView commit details -
Minor fixes to SCSI mount operation (#1798)
During a recent refactor SCSI mount operation code removed a retry logic that is needed when examining the filesystem type on a SCSI device. Retry is needed because sometimes attempting to open a SCSI devices immediately after attaching it results in ENXIO/ENOENT errors. This adds the retry logic back. Names of some images used in the tests had changed, this commit updates those names too. Signed-off-by: Amit Barve <ambarve@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 8d4a20c - Browse repository at this point
Copy the full SHA 8d4a20cView commit details -
[ci] Enable caching for proto and integration jobs (#1755)
Caching is enabled by default in `actions/setup-go@v4` (https://githut b.com/actions/setup-go#caching-dependency-files-and-build-outputs) so update the `go.sum` path when checking out hcsshim to a non-default path. Additionally, disable for linting, since that often causes errors. Without caching, wont need to explicitly delete the module cache. Relies on: #1752 Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 25b6855 - Browse repository at this point
Copy the full SHA 25b6855View commit details
Commits on Jun 3, 2023
-
fix integration test failure (#1799)
Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for f5c5797 - Browse repository at this point
Copy the full SHA f5c5797View commit details
Commits on Jun 5, 2023
-
Bump github.com/sirupsen/logrus from 1.9.2 to 1.9.3 (#1800)
* Bump github.com/sirupsen/logrus from 1.9.2 to 1.9.3 Bumps [github.com/sirupsen/logrus](https://github.com/sirupsen/logrus) from 1.9.2 to 1.9.3. - [Release notes](https://github.com/sirupsen/logrus/releases) - [Changelog](https://github.com/sirupsen/logrus/blob/master/CHANGELOG.md) - [Commits](sirupsen/logrus@v1.9.2...v1.9.3) --- updated-dependencies: - dependency-name: github.com/sirupsen/logrus dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com> * tidy test Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> --------- Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 7193878 - Browse repository at this point
Copy the full SHA 7193878View commit details -
Version control and vendor mockgen (#1802)
Explicitly track `github.com/golang/mock/mockgen` as a go dependency. (There is no change in our go.mod or go.sum, since the package is already being used by the generated code and elsewhere). Add `//go:generate` directives to create the mocked files and ensure the results are always up to date. Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 61e0112 - Browse repository at this point
Copy the full SHA 61e0112View commit details
Commits on Jun 6, 2023
-
Revert image name change in the ArgsEscaped test (#1804)
In a previous commit, the image used in the ArgsEscaped test was changed incorrectly. This fixes that. Signed-off-by: Amit Barve <ambarve@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for b8cf9e7 - Browse repository at this point
Copy the full SHA b8cf9e7View commit details
Commits on Jun 8, 2023
-
Add support for NetworkConfigProxy v0 and v1 api
* Add tests for NetworkConfigProxy v0 support Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for cbb43e5 - Browse repository at this point
Copy the full SHA cbb43e5View commit details
Commits on Jun 9, 2023
-
Add file wide deprecated option to ncproxygrpc v0 api
Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 37cd9df - Browse repository at this point
Copy the full SHA 37cd9dfView commit details -
Merge pull request #1797 from katiewasnothere/kabaldau/ncproxy_v1_api
Add support for NetworkConfigProxy v0 and v1 api
Configuration menu - View commit details
-
Copy full SHA for cc9303b - Browse repository at this point
Copy the full SHA cc9303bView commit details -
Create a v0 nodenetsvc api and plumb through ncproxy code
Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 10c29fc - Browse repository at this point
Copy the full SHA 10c29fcView commit details
Commits on Jun 10, 2023
-
When fetch pid counts the contianer can be in an invalid state sometimes
Signed-off-by: James Sturtevant <jstur@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 2095093 - Browse repository at this point
Copy the full SHA 2095093View commit details
Commits on Jun 12, 2023
-
Merge pull request #1806 from katiewasnothere/kabaldau/ncproxy_nodene…
…tsvc Support v0 and v1 nodenetsvc api for ncproxy
Configuration menu - View commit details
-
Copy full SHA for 4daa334 - Browse repository at this point
Copy the full SHA 4daa334View commit details -
Add deprecated option to all types and fields for ncproxy v0 apis
Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 10a4309 - Browse repository at this point
Copy the full SHA 10a4309View commit details -
Add new entries in golangci.yml to prevent linter errors from depreca…
…ted ncproxy api use Signed-off-by: Kathryn Baldauf <kabaldau@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 46d8160 - Browse repository at this point
Copy the full SHA 46d8160View commit details -
Merge pull request #1809 from katiewasnothere/kabaldau/ncproxy_v0_dep…
…recated_tag Add deprecated option to all types and fields for ncproxy v0 apis
Configuration menu - View commit details
-
Copy full SHA for c197eb5 - Browse repository at this point
Copy the full SHA c197eb5View commit details
Commits on Jun 15, 2023
-
Merge pull request #1807 from jsturtevant/fix-pids-query
When fetching the pid counts for the container the state can be invalid sometimes
Configuration menu - View commit details
-
Copy full SHA for d8cf194 - Browse repository at this point
Copy the full SHA d8cf194View commit details
Commits on Jun 19, 2023
-
skip failing test, use gotestsum (#1820)
Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 4ede1fd - Browse repository at this point
Copy the full SHA 4ede1fdView commit details -
Bump golang.org/x/sys from 0.8.0 to 0.9.0 (#1818)
* Bump golang.org/x/sys from 0.8.0 to 0.9.0 Bumps [golang.org/x/sys](https://github.com/golang/sys) from 0.8.0 to 0.9.0. - [Commits](golang/sys@v0.8.0...v0.9.0) --- updated-dependencies: - dependency-name: golang.org/x/sys dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> * tidy test Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> --------- Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 74521d4 - Browse repository at this point
Copy the full SHA 74521d4View commit details -
Bump golang.org/x/sync from 0.2.0 to 0.3.0 (#1817)
* Bump golang.org/x/sync from 0.2.0 to 0.3.0 Bumps [golang.org/x/sync](https://github.com/golang/sync) from 0.2.0 to 0.3.0. - [Commits](golang/sync@v0.2.0...v0.3.0) --- updated-dependencies: - dependency-name: golang.org/x/sync dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> * tidy test Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> --------- Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 73986ca - Browse repository at this point
Copy the full SHA 73986caView commit details -
Bump github.com/lestrrat-go/jwx from 1.2.25 to 1.2.26 (#1812)
* Bump github.com/lestrrat-go/jwx from 1.2.25 to 1.2.26 Bumps [github.com/lestrrat-go/jwx](https://github.com/lestrrat-go/jwx) from 1.2.25 to 1.2.26. - [Release notes](https://github.com/lestrrat-go/jwx/releases) - [Changelog](https://github.com/lestrrat-go/jwx/blob/v1.2.26/Changes) - [Commits](lestrrat-go/jwx@v1.2.25...v1.2.26) --- updated-dependencies: - dependency-name: github.com/lestrrat-go/jwx dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com> * tidy test Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> --------- Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Hamza El-Saawy <hamzaelsaawy@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for 6eea50b - Browse repository at this point
Copy the full SHA 6eea50bView commit details
There are no files selected for viewing