Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release-1.23] update to Go 1.19.11 #5553

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/build_daily.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ on:
env:
GOPROXY: https://proxy.golang.org/
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
GO_VERSION: 1.19.8
GO_VERSION: 1.19.11
jobs:
e2e-envoy-xds:
runs-on: ubuntu-latest
Expand Down
6 changes: 4 additions & 2 deletions .github/workflows/prbuild.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ on:
env:
GOPROXY: https://proxy.golang.org/
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
GO_VERSION: 1.19.8
GO_VERSION: 1.19.11
jobs:
lint:
runs-on: ubuntu-latest
Expand All @@ -22,7 +22,9 @@ jobs:
uses: golangci/golangci-lint-action@v3
with:
version: v1.48.0
args: --build-tags=e2e,conformance,gcp,oidc,tools,none
# TODO: re-enable linting tools package once https://github.com/projectcontour/contour/issues/5077
# is resolved
args: --build-tags=e2e,conformance,gcp,oidc,none
- uses: act10ns/slack@v1
with:
status: ${{ job.status }}
Expand Down
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ endif
IMAGE_PLATFORMS ?= linux/amd64,linux/arm64

# Base build image to use.
BUILD_BASE_IMAGE ?= golang:1.19.8
BUILD_BASE_IMAGE ?= golang:1.19.11

# Enable build with CGO.
BUILD_CGO_ENABLED ?= 0
Expand Down
2 changes: 1 addition & 1 deletion changelogs/CHANGELOG-v1.20.0.md
Original file line number Diff line number Diff line change
Expand Up @@ -195,7 +195,7 @@ This change should be a no-op for most users, however be sure to re-apply the re

Adds a `Path` & `Prefix` field to the `HTTPProxy.Spec.Route.RequestRedirectPolicy` which allows
for redirects to also specify the path or prefix to redirect to. When specified, an
HTTP 302 response will be sent to the requestor with the new path or prefix specified.
HTTP 302 response will be sent to the requester with the new path or prefix specified.

_Note: Only one of path or prefix can be specified on a single route._

Expand Down
2 changes: 1 addition & 1 deletion site/content/posts/2020-01-16-announcing-contour-1.1.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ The header request policy has the following configuration:
The following example takes requests from `headers.projectcontour.io/` and applies the following logic:

* Adds the header `X-Foo: bar` to any request before it is proxied to the Kubernetes service named `s1` and removes the header `X-Baz`
* After the request is processed by service `s1`, the response back to the requestor will have the header `X-Service-Name: s1` added and will remove the header `X-Internal-Secret`
* After the request is processed by service `s1`, the response back to the requester will have the header `X-Service-Name: s1` added and will remove the header `X-Internal-Secret`

```yaml
apiVersion: projectcontour.io/v1
Expand Down
Loading