Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update go 1.22.7 #5763

Merged
merged 3 commits into from
Sep 16, 2024
Merged

Conversation

koba1t
Copy link
Member

@koba1t koba1t commented Sep 14, 2024

fix #5762

@k8s-ci-robot
Copy link
Contributor

This PR has multiple commits, and the default merge method is: merge.
You can request commits to be squashed using the label: tide/merge-method-squash

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Sep 14, 2024
@k8s-ci-robot k8s-ci-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels Sep 14, 2024
@koba1t
Copy link
Member Author

koba1t commented Sep 14, 2024

@varshaprasad96
Please type the retest command after kubernetes/test-infra#33478 is merged.

@varshaprasad96
Copy link
Member

/retest

Copy link
Member

@varshaprasad96 varshaprasad96 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 16, 2024
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: koba1t, varshaprasad96

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [koba1t,varshaprasad96]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot merged commit 88f19bf into kubernetes-sigs:master Sep 16, 2024
10 checks passed
@koba1t koba1t deleted the update_go_1.22.7 branch September 16, 2024 11:48
@sbueringer
Copy link
Member

sbueringer commented Oct 15, 2024

@koba1t Was the minimum go version in the go.mod file intentionally bumped to 1.22.7? (instead of just 1.22.0)

We have a dependency to kyaml and the minimum go version in the kyaml go.mod file would now force us to also require 1.22.7 as min version (which I would prefer to avoid if possible, as it in turn forces everyone that uses our module also to use >= 1.22.7)

(xref: kubernetes-sigs/cluster-api-provider-vsphere#3222 (comment))

@koba1t
Copy link
Member Author

koba1t commented Oct 16, 2024

@sbueringer

Sorry, I just wanted to use go >= 1.22.0.
However, I feel that it is hard to downgrade the golang version of this project.

If it is acceptable, can you wait to upgrade kyaml until kubernetes-sigs/cluster-api-provider-vsphere is upgraded to go 1.23?

@sbueringer
Copy link
Member

sbueringer commented Oct 16, 2024

Sorry, I just wanted to use go >= 1.22.0.

No worries.

If it is acceptable, can you wait to upgrade kyaml until kubernetes-sigs/cluster-api-provider-vsphere is upgraded to go 1.23?

Talked to @chrischdi. We're fine, we have ways to work around it.

However, I feel that it is hard to downgrade the golang version of this project.

For us it's okay to keep it as is. Just one note for the future. There is a difference between the Go version that is used to compile a module and the minimium go version ("go 1.22.7") defined in the go.mod file. The latter forces everyone that imports the module to:

  • also require a minimum go version of >= 1.22.7
  • compile with at least Go 1.22.7

This affects everyone who has a transitive dependency on a module.

E.g. controller-runtime chose because of that to only require 1.22.0 in their go module: https://github.com/kubernetes-sigs/controller-runtime/blob/v0.18.5/go.mod

So overall I would just recommend going forward to use .0 versions in the go.mod file. You can (and should) still use a higher Go patch version for running unit tests, compiling binaries etc.

@chrischdi
Copy link
Member

chrischdi commented Oct 16, 2024

Note: For fixing the linked issue it should have been enough to bump the go version used for compiling and keep the go 1.21. That would even be cherry-pickable to branches for patch releases.

(Edit:)For fixing those issues it would still have been

Still okay I think to bump the directive to e.g. go 1.22.0 for a next minor release.

tmeijn pushed a commit to tmeijn/dotfiles that referenced this pull request Oct 17, 2024
This MR contains the following updates:

| Package | Update | Change |
|---|---|---|
| [kubernetes-sigs/kustomize](https://github.com/kubernetes-sigs/kustomize) | minor | `v5.4.3` -> `v5.5.0` |

MR created with the help of [el-capitano/tools/renovate-bot](https://gitlab.com/el-capitano/tools/renovate-bot).

**Proposed changes to behavior should be submitted there as MRs.**

---

### Release Notes

<details>
<summary>kubernetes-sigs/kustomize (kubernetes-sigs/kustomize)</summary>

### [`v5.5.0`](https://github.com/kubernetes-sigs/kustomize/releases/tag/kustomize/v5.5.0)

[Compare Source](kubernetes-sigs/kustomize@kustomize/v5.4.3...kustomize/v5.5.0)

### Breaking change

A starlark support for krm functions was removed to cleanup dependencies. kubernetes-sigs/kustomize#5768
This feature was deprecated 3 years ago and removed because there was no desire to continue using it.
kubernetes-sigs/kustomize#5768 (comment)

#### Feature

[#&#8203;5751](kubernetes-sigs/kustomize#5751): Add `--helm-debug` Flag to Kustomize for Enhanced Helm Debugging

#### Fix Bugs

[#&#8203;5458](kubernetes-sigs/kustomize#5458): Sort built-in Namespace kind before CRDs with the same name
[#&#8203;5745](kubernetes-sigs/kustomize#5745): Add Annotation to Control Inline List Conversion in Kustomize Resources"

#### Dependencies

[#&#8203;5763](kubernetes-sigs/kustomize#5763): Update go 1.22.7
[#&#8203;5781](kubernetes-sigs/kustomize#5781): Update kyaml to v0.18.1
[#&#8203;5782](kubernetes-sigs/kustomize#5782): Update cmd/config to v0.15.0
[#&#8203;5783](kubernetes-sigs/kustomize#5783): Update api to v0.18.0

</details>

---

### Configuration

📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever MR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this MR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this MR, check this box

---

This MR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy40NDAuNyIsInVwZGF0ZWRJblZlciI6IjM3LjQ0MC43IiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6WyJSZW5vdmF0ZSBCb3QiXX0=-->
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Vulnerability in stdlib of Kustomize Binary
5 participants