fix(deps): update all dependencies #16
Loading…
x
Reference in New Issue
Block a user
No description provided.
Delete Branch "renovate/all"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This PR contains the following updates:
1.0.97
->1.0.98
4.5.32
->4.5.37
0.17.1
->0.18.0
1.44.1
->1.45.0
Release Notes
dtolnay/anyhow (anyhow)
v1.0.98
Compare Source
self.into_boxed_dyn_error()
andself.reallocate_into_boxed_dyn_error_without_backtrace()
methods for anyhow::Error (#415)clap-rs/clap (clap)
v4.5.37
Compare Source
Features
ArgMatches::try_clear_id()
v4.5.36
Compare Source
Fixes
v4.5.35
Compare Source
Fixes
help_heading
v4.5.34
Compare Source
Fixes
flatten_help(true)
and subcommands without argumentsv4.5.33
Compare Source
Fixes
dagger/dagger (dagger-sdk)
v0.18.6
Compare Source
🔥 Breaking Changes
Cache URI-based secrets based on their plaintext value rather than the URI by @sipsma in https://github.com/dagger/dagger/pull/10311
Previously, the "cache key" for URI-based secrets (e.g.
env://FOO
,file:///some/path
, etc.) was the URI string. This meant that operations including the secret (e.g. as an environment variable in a Container) would be cached based on the URI value. If two secrets from different clients had the same URI but different plaintext values, cache for operations that include them would be shared.In many cases, even when URIs were the same, the plaintext of secrets could be meaningfully different, which made this behavior surprising and lead to unexpected results.
Now, URI-based secrets are cached based on secure hashes of their plaintext value. Two secrets that have the same URI but different plaintext values will be cached separately, and operations that include them will not share cache.
However, there are cases where users do want secrets with different plaintexts to share cache, e.g. secrets that rotate in plaintext value frequently but aren't meaningfully different and thus shouldn't bust the cache of operations that include them.
To continue supporting those use cases, there is a new optional
cacheKey
argument toSecret
that can be used to specify a custom cache key. If provided, the cache key will be used instead of the default plaintext-based cache key, allowing any secrets sharing that cache-key to be cached together.SDKs can provide this as an optional argument to the
Secret
constructor. Other example usages:dagger shell:
dagger shell -c "some-function --secret-arg $(secret env://FOO --cache-key my-cache-key)"
dagger call (supports a special syntax that sets the cache key via a query param in the URI):
dagger call some-function --secret-arg env://FOO?cacheKey=my-cache-key
Added
GitRepository.branches
API by @jedevc in https://github.com/dagger/dagger/pull/10250File
top-level field added to allow easier creation ofFile
objects by @jedevc in https://github.com/dagger/dagger/pull/10290Fixed
GitRepository.tags
patterns
arg is now respected for local git repositories by @jedevc in https://github.com/dagger/dagger/pull/10250dagger call
by @helderco in https://github.com/dagger/dagger/pull/10305Container.build
with a Dockerfile that isFROM scratch
by @sipsma in https://github.com/dagger/dagger/pull/10332What to do next?
v0.18.5
Compare Source
Added
depth
arg toGitRef.tree
to control the depth of a clone by @jedevc in https://github.com/dagger/dagger/pull/9980GitRef.ref
field for resolving the full ref string for a reference by @jedevc in https://github.com/dagger/dagger/pull/9980Fixed
Git.tree
checkouts by @jedevc in https://github.com/dagger/dagger/pull/9980withExec
when secrets created bySetSecret
in function calls are included by @sipsma in https://github.com/dagger/dagger/pull/10260What to do next?
v0.18.4
Compare Source
Fixed
Directory
andFile
flags by @helderco in https://github.com/dagger/dagger/pull/10169CurrentModule
API during SDK module initialization by @sipsma in https://github.com/dagger/dagger/pull/10213llm.withModel
from a module function by @sipsma in https://github.com/dagger/dagger/pull/10230.plaintext
on a URI-based secret from a module w/ cache hit by @sipsma in https://github.com/dagger/dagger/pull/10223setSecret
provided empty plaintext value and passed between function calls by @sipsma in https://github.com/dagger/dagger/pull/10223Experimental
What to do next?
v0.18.3
Compare Source
Added
--recursive
flag fordagger develop
by @jedevc in https://github.com/dagger/dagger/pull/9860Container.build
andDirectory.dockerBuild
by @sipsma in https://github.com/dagger/dagger/pull/10088ttl
for local secret caching for vault by @rajatjindal in https://github.com/dagger/dagger/pull/9997Fixed
Experimental
What to do next?
v0.18.2
Compare Source
Changed
with-exec
positional arguments by @helderco in https://github.com/dagger/dagger/pull/10063Fixed
What to do next?
v0.18.1
Compare Source
What to do next?
v0.18.0
Compare Source
Changed
Fixed
What to do next?
v0.17.2
Compare Source
Added
Directory.filter
API for improved ergonomics by @rajatjindal in https://github.com/dagger/dagger/pull/9976This was previously possible by doing
Query.directory.withDirectory("", dir)
, but this breaks the chain.Changed
What to do next?
tokio-rs/tokio (tokio)
v1.45.0
: Tokio v1.45.0Compare Source
Added
worker_total_busy_duration
,worker_park_count
, andworker_unpark_count
(#6899, #7276)Command::spawn_with
(#7249)Changed
Unpin
for some trait impls (#7204)runtime::Handle
as unwind safe (#7230)Unstable
v1.44.2
: Tokio v1.44.2Compare Source
This release fixes a soundness issue in the broadcast channel. The channel
accepts values that are
Send
but!Sync
. Previously, the channel calledclone()
on these values without synchronizing. This release fixes the channelby synchronizing calls to
.clone()
(Thanks Austin Bonander for finding andreporting the issue).
Fixed
clone()
call in broadcast channel (#7232)Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.
chore(deps): update rust crate clap to v4.5.33to chore(deps): update rust crate clap to v4.5.3491080a96fa
to59a02f69ff
chore(deps): update rust crate clap to v4.5.34to fix(deps): update all dependencies59a02f69ff
to1420142503
1420142503
to7f8c9ad7e7
7f8c9ad7e7
to8cd650fad5
8cd650fad5
toe4672c1b22
e4672c1b22
to59bc31de87
59bc31de87
tob538199cae
b538199cae
tof787bd730b
f787bd730b
to6f0bfecc74
6f0bfecc74
tob35813bf7a
b35813bf7a
to052de92da2
052de92da2
toeb358b6b07
eb358b6b07
to89f86e7e2f
89f86e7e2f
tobff0171547
bff0171547
to423f04cb6a
423f04cb6a
to0e209c9620
0e209c9620
to8576e77d0a
8576e77d0a
to61d9a0f97b
61d9a0f97b
to304c7dd058
304c7dd058
tocc4435a6f2
cc4435a6f2
tof828d210ea
f828d210ea
to13d92fc021
13d92fc021
toe1f3acfc4f
e1f3acfc4f
to28c92f9e8b
28c92f9e8b
to0a12f36fdb
0a12f36fdb
to1e90c2b622
1e90c2b622
to0b580069c4
0b580069c4
toc7a9b20933
c7a9b20933
to3855cc1457
3855cc1457
to75acc9c93c
⚠️ Artifact update problem
Renovate failed to update artifacts related to this branch. You probably do not want to merge this PR as-is.
♻ Renovate will retry this branch, including artifacts, only when one of the following happens:
The artifact failure details are included below:
File name: Cargo.lock
File name: Cargo.lock
75acc9c93c
tod57e30898d
Checkout
From your project repository, check out a new branch and test the changes.