Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release-1.14] Bump go to 1.21.10 #7007

Closed
wants to merge 91 commits into from

Conversation

inteon
Copy link
Member

@inteon inteon commented May 13, 2024

Fixes GO-2024-2824 (GHSA-2jwv-jmq4-4j3r).

Kind

/kind cleanup

Release Note

Upgrade Go to 1.21.10, fixing GO-2024-2824 (https://github.com/advisories/GHSA-2jwv-jmq4-4j3r).

SgtCoDFish and others added 30 commits January 22, 2024 14:28
Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
…1.14.0-beta.0

[Release v1.14.0-beta.0] Update cmd/cmctl's go.mod to v1.14.0-beta.0
…ss retries

Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
…76-to-release-1.14

[release-1.14] Replace the azcore.ResponseError error message to make it stable across retries
…scovery: true

Signed-off-by: Richard Wall <richard.wall@venafi.com>
Signed-off-by: Richard Wall <richard.wall@venafi.com>
…79-to-release-1.14

[release-1.14] Remove unnecessary Azure workload identity setting: DisableInstanceDiscovery: true
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
(cherry picked from commit 3d406a0)
Signed-off-by: Richard Wall <richard.wall@venafi.com>
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
…83-to-release-1.14

[release-1.14] Redact the body of failed authentication requests
…release-1.14

[release-1.14] Add Make target for trivy startupapicheck image scan
Signed-off-by: Richard Wall <richard.wall@venafi.com>
[Release v1.14.0] Update cmd/cmctl's go.mod to v1.14.0
See cert-manager#6639

This was discovered during the release of cert-manager v1.14.0. See the
summary on Slack:

https://kubernetes.slack.com/archives/CDEQJ0Q8M/p1706723744656039?thread_ts=1706713005.073879&cid=CDEQJ0Q8M

Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
…92-to-release-1.14

[release-1.14] Fix mistakenly changed cainjector image value
manual backport of cert-manager#6695

Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
…atereadme

[release-1.14] fix helm readme
…s service by default

Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
Co-authored-by: Richard Wall <wallrj@users.noreply.github.com>
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
…mfix

[release-1.14] Fix backwards incompatible change: include a prometheus service by default
also updates helm docs!

Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
…mreadmeci

[release-1.14] add CI check for updated helm docs
Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
…ate-helm-tool

[release-1.14] Update helm-tool to latest and regenerate helm readme
…gs-bugfix

[release-1.14] CLI flags parsing bugfix
Signed-off-by: Richard Wall <richard.wall@venafi.com>
[Release v1.14.1] Update cmd/cmctl's go.mod to v1.14.1
Currently the TLS code here is imported by the approver-policy project. Long term we should break this code out to a new package, for now we can just move it out internal to unblock our ability to update the approver-policy imports.

Signed-off-by: Adam Talbot <adam.talbot@venafi.com>
jetstack-bot and others added 16 commits April 10, 2024 15:55
…75-to-release-1.14

[release-1.14] Limit DigitalOcean records for cleanup to TXT only
Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
…equests

Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
…k-6923-to-release-1.14

[release-1.14] Fix flaky dns test
…has been patched

Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
…k-6938-to-release-1.14

[release-1.14] Remove docker custom network hack which has been moved to the test runner
[release-1.14] Disable rclone gcs bucket ACL
Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
…1.14.5

[Release v1.14.5] Update cmd/cmctl's go.mod to v1.14.5
Signed-off-by: Ashley Davis <ashley.davis@venafi.com>
…k-6997-to-release-1.14

[release-1.14] Move roadmap to community repo
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
@cert-manager-prow cert-manager-prow bot added release-note Denotes a PR that will be considered when it comes time to generate release notes. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. dco-signoff: no Indicates that at least one commit in this pull request is missing the DCO sign-off message. labels May 13, 2024
@cert-manager-prow
Copy link
Contributor

Thanks for your pull request. Before we can look at it, you'll need to add a 'DCO signoff' to your commits.

📝 Please follow instructions in the contributing guide to update your commits with the DCO

Full details of the Developer Certificate of Origin can be found at developercertificate.org.

The list of commits missing DCO signoff:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@cert-manager-prow cert-manager-prow bot added area/acme Indicates a PR directly modifies the ACME Issuer code area/acme/dns01 Indicates a PR modifies ACME DNS01 provider code labels May 13, 2024
@inteon inteon closed this May 13, 2024
@cert-manager-prow cert-manager-prow bot added the area/acme/http01 Indicates a PR modifies ACME HTTP01 provider code label May 13, 2024
@cert-manager-prow
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please ask for approval from inteon. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@cert-manager-prow cert-manager-prow bot added area/deploy Indicates a PR modifies deployment configuration needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. area/testing Issues relating to testing labels May 13, 2024
@cert-manager-prow
Copy link
Contributor

PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@cert-manager-prow cert-manager-prow bot added the size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. label May 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/acme/dns01 Indicates a PR modifies ACME DNS01 provider code area/acme/http01 Indicates a PR modifies ACME HTTP01 provider code area/acme Indicates a PR directly modifies the ACME Issuer code area/deploy Indicates a PR modifies deployment configuration area/testing Issues relating to testing dco-signoff: no Indicates that at least one commit in this pull request is missing the DCO sign-off message. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. release-note Denotes a PR that will be considered when it comes time to generate release notes. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

7 participants