Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update from update/networkservicemesh/sdk-k8s #428

Merged
merged 1 commit into from
May 16, 2024

Conversation

nsmbot
Copy link
Collaborator

@nsmbot nsmbot commented May 16, 2024

Update go.mod and go.sum to latest version from networkservicemesh/sdk-k8s@main
PR link: networkservicemesh/sdk-k8s#505
Commit: ad6911f
Author: Network Service Mesh Bot
Date: 2024-05-16 03:00:58 -0500
Message:

  • Update go.mod and go.sum to latest version from networkservicemesh/sdk@main (# 505)
    PR link: Fix some leaks in authorize chain elements sdk#1623
    Commit: 3b79590
    Author: Nikita Skrynnik
    Date: 2024-05-16 18:55:35 +1100
    Message:
    • Fix some leaks in authorize chain elements (# 1623)
  • fix some leaks in authorize chain elements
  • fix go linter issues
  • add tests for memory leaks
  • fix go linter issues
  • rerun CI

…k-k8s@main

PR link: networkservicemesh/sdk-k8s#505

Commit: ad6911f
Author: Network Service Mesh Bot
Date: 2024-05-16 03:00:58 -0500
Message:
  - Update go.mod and go.sum to latest version from networkservicemesh/sdk@main (#505)
PR link: networkservicemesh/sdk#1623
Commit: 3b79590
Author: Nikita Skrynnik
Date: 2024-05-16 18:55:35 +1100
Message:
    - Fix some leaks in authorize chain elements (#1623)
* fix some leaks in authorize chain elements
* fix go linter issues
* add tests for memory leaks
* fix go linter issues
* rerun CI
---------
Signed-off-by: NSMBot <[email protected]>
@nsmbot nsmbot merged commit f7f4eea into main May 16, 2024
14 checks passed
@nsmbot nsmbot deleted the update/networkservicemesh/sdk-k8s branch May 16, 2024 08:04
nsmbot pushed a commit to networkservicemesh/deployments-k8s that referenced this pull request May 16, 2024
…d-admission-webhook-k8s@main

PR link: networkservicemesh/cmd-admission-webhook-k8s#428

Commit: f7f4eea
Author: Network Service Mesh Bot
Date: 2024-05-16 03:04:39 -0500
Message:
  - Update go.mod and go.sum to latest version from networkservicemesh/sdk-k8s@main (#428)
PR link: networkservicemesh/sdk-k8s#505
Commit: ad6911f
Author: Network Service Mesh Bot
Date: 2024-05-16 03:00:58 -0500
Message:
    - Update go.mod and go.sum to latest version from networkservicemesh/sdk@main (#505)
PR link: networkservicemesh/sdk#1623
Commit: 3b79590
Author: Nikita Skrynnik
Date: 2024-05-16 18:55:35 +1100
Message:
        - Fix some leaks in authorize chain elements (#1623)
* fix some leaks in authorize chain elements
* fix go linter issues
* add tests for memory leaks
* fix go linter issues
* rerun CI
---------
Signed-off-by: NSMBot <[email protected]>
nsmbot added a commit to networkservicemesh/deployments-k8s that referenced this pull request May 16, 2024
…d-admission-webhook-k8s@main (#11975)

PR link: networkservicemesh/cmd-admission-webhook-k8s#428

Commit: f7f4eea
Author: Network Service Mesh Bot
Date: 2024-05-16 03:04:39 -0500
Message:
  - Update go.mod and go.sum to latest version from networkservicemesh/sdk-k8s@main (#428)
PR link: networkservicemesh/sdk-k8s#505
Commit: ad6911f
Author: Network Service Mesh Bot
Date: 2024-05-16 03:00:58 -0500
Message:
    - Update go.mod and go.sum to latest version from networkservicemesh/sdk@main (#505)
PR link: networkservicemesh/sdk#1623
Commit: 3b79590
Author: Nikita Skrynnik
Date: 2024-05-16 18:55:35 +1100
Message:
        - Fix some leaks in authorize chain elements (#1623)
* fix some leaks in authorize chain elements
* fix go linter issues
* add tests for memory leaks
* fix go linter issues
* rerun CI
---------

Signed-off-by: NSMBot <[email protected]>
Co-authored-by: NSMBot <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant