Bump the go_modules group across 1 directory with 2 updates #1077
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Bumps the go_modules group with 2 updates in the /protocol/stan/v2 directory: github.com/nats-io/nats-server/v2 and github.com/nats-io/nats-streaming-server.
Updates
github.com/nats-io/nats-server/v2
from 2.9.23 to 2.10.17Release notes
Sourced from github.com/nats-io/nats-server/v2's releases.
... (truncated)
Commits
b91de03
Release v2.10.17158e6d4
[FIX] Data race in runAsLeader. (#5604)cdbf35c
Bump to 2.10.17-RC.9ffc90f8
Protect against no mset or mset.ackqacb2ee8
Cherry-picks for 2.10.17 (#5598)b8df1ea
[FIXED] Memory growth from NRG create and delete operations (#5600)8ccb693
Fix logging when exceeding JetStream account limits10b5169
Avoid datarace storing mpay from a JWT claimcc0ec6a
Bump to 2.10.17-RC.87238011
Cherry picks for v2.10.17-RC.8 (#5590)Updates
github.com/nats-io/nats-streaming-server
from 0.24.3 to 0.24.6Release notes
Sourced from github.com/nats-io/nats-streaming-server's releases.
... (truncated)
Commits
cc8b894
Merge pull request #1251 from nats-io/release_0_24_6a493d6b
Release v0.24.60d989ab
Merge pull request #1249 from nats-io/release_0_24_5bcaeb85
Release v0.24.521ffbb7
Merge pull request #1247 from pgvishnuram/main58df84d
fix for CVE-2022-2719126bda51
Merge pull request #1245 from nats-io/release_0_24_4cf29817
Release v0.24.4db22f4b
Bump versionYou can trigger a rebase of this PR by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditionsYou can disable automated security fix PRs for this repo from the Security Alerts page.