Skip to content

Upgrade dependencies#7094

Merged
cert-manager-prow[bot] merged 3 commits intocert-manager:masterfrom
inteon:upgrade_deps
Jun 17, 2024
Merged

Upgrade dependencies#7094
cert-manager-prow[bot] merged 3 commits intocert-manager:masterfrom
inteon:upgrade_deps

Conversation

@inteon
Copy link
Copy Markdown
Member

@inteon inteon commented Jun 13, 2024

  • upgrade go dependencies
  • upgrade test dependencies

By continuously upgrading our dependencies, we reduce the amount of breaking changes that we have to fix when upgrading right before a release. Instead, by keeping dependencies up-to-date, we fix breaking changes as they come.

Go dependencies were upgraded by running go-mod-upgrade at the root (with the go workspace setup) and calling make tidy afterwards.

Kind

/kind cleanup

Release Note

NONE

Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
@cert-manager-prow cert-manager-prow bot added kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. release-note-none Denotes a PR that doesn't merit a release note. dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. area/acme Indicates a PR directly modifies the ACME Issuer code area/testing Issues relating to testing labels Jun 13, 2024
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
@cert-manager-prow cert-manager-prow bot added the area/acme/dns01 Indicates a PR modifies ACME DNS01 provider code label Jun 13, 2024
@inteon
Copy link
Copy Markdown
Member Author

inteon commented Jun 13, 2024

/test ?

@cert-manager-prow
Copy link
Copy Markdown
Contributor

@inteon: The following commands are available to trigger required jobs:

  • /test pull-cert-manager-master-e2e-v1-30
  • /test pull-cert-manager-master-e2e-v1-30-upgrade
  • /test pull-cert-manager-master-make-test
  • /test pull-cert-manager-master-make-verify

The following commands are available to trigger optional jobs:

  • /test pull-cert-manager-master-e2e-v1-25
  • /test pull-cert-manager-master-e2e-v1-26
  • /test pull-cert-manager-master-e2e-v1-27
  • /test pull-cert-manager-master-e2e-v1-28
  • /test pull-cert-manager-master-e2e-v1-29
  • /test pull-cert-manager-master-e2e-v1-30-bestpractice-install
  • /test pull-cert-manager-master-e2e-v1-30-feature-gates-disabled
  • /test pull-cert-manager-master-e2e-v1-30-issuers-venafi-cloud
  • /test pull-cert-manager-master-e2e-v1-30-issuers-venafi-tpp
  • /test pull-cert-manager-master-license

Use /test all to run the following jobs that were automatically triggered:

  • pull-cert-manager-master-e2e-v1-30
  • pull-cert-manager-master-e2e-v1-30-upgrade
  • pull-cert-manager-master-license
  • pull-cert-manager-master-make-test
  • pull-cert-manager-master-make-verify
Details

In response to this:

/test ?

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@inteon
Copy link
Copy Markdown
Member Author

inteon commented Jun 13, 2024

/test pull-cert-manager-master-e2e-v1-30-bestpractice-install

Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
@inteon
Copy link
Copy Markdown
Member Author

inteon commented Jun 17, 2024

/approve

@cert-manager-prow cert-manager-prow bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 17, 2024
@maelvls
Copy link
Copy Markdown
Member

maelvls commented Jun 17, 2024

Hey, please explain why this PR is worth it.

I don't see the point of upgrading to the latest versions of every lib unless we are about to do a release. If there is a reason, such as upgrading as early as possible to the latest controller-runtime version so that we don't get stuck when trying to upgrade to the latest versions of the k8s.io/* modules, please write it in the PR description.

If you want this practice of upgrading controller-runtime often and you would prefer not to have to write that down in each PR description, we can add that policy to https://cert-manager.io/docs/contributing/.

You can use @erikgb's #6967 as an example of description.

Also, what's the process for upgrading all the go.mod projects at once? Do you run go-mod-upgrade in each individual module?

@inteon
Copy link
Copy Markdown
Member Author

inteon commented Jun 17, 2024

Hey, please explain why this PR is worth it.

I don't see the point of upgrading to the latest versions of every lib unless we are about to do a release. If there is a reason, such as upgrading as early as possible to the latest controller-runtime version so that we don't get stuck when trying to upgrade to the latest versions of the k8s.io/* modules, please write it in the PR description.

If you want this practice of upgrading controller-runtime often and you would prefer not to have to write that down in each PR description, we can add that policy to https://cert-manager.io/docs/contributing/.

You can use @erikgb's #6967 as an example of description.

Also, what's the process for upgrading all the go.mod projects at once? Do you run go-mod-upgrade in each individual module?

I added replies to your questions in the PR description.

@inteon
Copy link
Copy Markdown
Member Author

inteon commented Jun 17, 2024

/test pull-cert-manager-master-e2e-v1-30-bestpractice-install

@maelvls
Copy link
Copy Markdown
Member

maelvls commented Jun 17, 2024

Thanks for the clarification!

/lgtm
/approve

@cert-manager-prow
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: inteon, maelvls

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@cert-manager-prow cert-manager-prow bot added the lgtm Indicates that a PR is ready to be merged. label Jun 17, 2024
@cert-manager-prow cert-manager-prow bot merged commit d44f654 into cert-manager:master Jun 17, 2024

$(bin_dir)/downloaded/pebble-$(PEBBLE_COMMIT).tar.gz: | $(bin_dir)/downloaded
$(CURL) https://github.com/letsencrypt/pebble/archive/$(PEBBLE_COMMIT).tar.gz -o $@
$(CURL) https://github.com/inteon/pebble/archive/$(PEBBLE_COMMIT).tar.gz -o $@
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why?

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was not able to upgrade pebble to the latest version, because of this: letsencrypt/pebble#468
So, I fixed the issue in my branch with the goal of upstreaming this change, but the PR was denied.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So, I guess we should downgrade again or fix this in another manner.

IMAGE_projectcontour_arm64 := ghcr.io/projectcontour/contour:v1.29.1@sha256:dbfec77951e123bf383a09412a51df218b716aaf3fe7b2778bb2f208ac495dc5

# https://github.com/letsencrypt/pebble/releases
PEBBLE_COMMIT = ba5f81dd80fa870cbc19326f2d5a46f45f0b5ee3
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But this commit doesn't contain your Ed25519 changes

it should be this, right?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. area/acme/dns01 Indicates a PR modifies ACME DNS01 provider code area/acme Indicates a PR directly modifies the ACME Issuer code area/testing Issues relating to testing dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. lgtm Indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesn't merit a release note. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants