Skip to content

Commit

Permalink
[release-1.23] update to Go 1.19.11 (#5553)
Browse files Browse the repository at this point in the history
Also:
* fix codespell issues
* disable tools linting

Signed-off-by: Steve Kriss <[email protected]>
  • Loading branch information
skriss authored Jul 12, 2023
1 parent 1d74a85 commit 3a77d79
Show file tree
Hide file tree
Showing 5 changed files with 8 additions and 6 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/build_daily.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ on:
env:
GOPROXY: https://proxy.golang.org/
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
GO_VERSION: 1.19.8
GO_VERSION: 1.19.11
jobs:
e2e-envoy-xds:
runs-on: ubuntu-latest
Expand Down
6 changes: 4 additions & 2 deletions .github/workflows/prbuild.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ on:
env:
GOPROXY: https://proxy.golang.org/
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
GO_VERSION: 1.19.8
GO_VERSION: 1.19.11
jobs:
lint:
runs-on: ubuntu-latest
Expand All @@ -22,7 +22,9 @@ jobs:
uses: golangci/golangci-lint-action@v3
with:
version: v1.48.0
args: --build-tags=e2e,conformance,gcp,oidc,tools,none
# TODO: re-enable linting tools package once https://github.com/projectcontour/contour/issues/5077
# is resolved
args: --build-tags=e2e,conformance,gcp,oidc,none
- uses: act10ns/slack@v1
with:
status: ${{ job.status }}
Expand Down
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ endif
IMAGE_PLATFORMS ?= linux/amd64,linux/arm64

# Base build image to use.
BUILD_BASE_IMAGE ?= golang:1.19.8
BUILD_BASE_IMAGE ?= golang:1.19.11

# Enable build with CGO.
BUILD_CGO_ENABLED ?= 0
Expand Down
2 changes: 1 addition & 1 deletion changelogs/CHANGELOG-v1.20.0.md
Original file line number Diff line number Diff line change
Expand Up @@ -195,7 +195,7 @@ This change should be a no-op for most users, however be sure to re-apply the re

Adds a `Path` & `Prefix` field to the `HTTPProxy.Spec.Route.RequestRedirectPolicy` which allows
for redirects to also specify the path or prefix to redirect to. When specified, an
HTTP 302 response will be sent to the requestor with the new path or prefix specified.
HTTP 302 response will be sent to the requester with the new path or prefix specified.

_Note: Only one of path or prefix can be specified on a single route._

Expand Down
2 changes: 1 addition & 1 deletion site/content/posts/2020-01-16-announcing-contour-1.1.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ The header request policy has the following configuration:
The following example takes requests from `headers.projectcontour.io/` and applies the following logic:

* Adds the header `X-Foo: bar` to any request before it is proxied to the Kubernetes service named `s1` and removes the header `X-Baz`
* After the request is processed by service `s1`, the response back to the requestor will have the header `X-Service-Name: s1` added and will remove the header `X-Internal-Secret`
* After the request is processed by service `s1`, the response back to the requester will have the header `X-Service-Name: s1` added and will remove the header `X-Internal-Secret`

```yaml
apiVersion: projectcontour.io/v1
Expand Down

0 comments on commit 3a77d79

Please sign in to comment.