Skip to content

Update Go modules (major)#1236

Closed
red-hat-konflux[bot] wants to merge 1 commit intomainfrom
konflux/mintmaker/main/major-go-modules
Closed

Update Go modules (major)#1236
red-hat-konflux[bot] wants to merge 1 commit intomainfrom
konflux/mintmaker/main/major-go-modules

Conversation

@red-hat-konflux
Copy link
Copy Markdown
Contributor

@red-hat-konflux red-hat-konflux Bot commented Apr 7, 2026

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Confidence
github.com/cenkalti/backoff/v4 v4.3.0v5.0.3 age confidence
github.com/netsampler/goflow2 v1.3.7v2.2.6 age confidence
github.com/pion/dtls/v2 v2.2.12v3.1.2 age confidence
github.com/pion/transport/v2 v2.2.10v4.0.1 age confidence
go.yaml.in/yaml/v2 v2.4.3v3.0.4 age confidence
gopkg.in/evanphx/json-patch.v4 v4.13.0v5.9.11 age confidence
gopkg.in/yaml.v2 v2.4.0v3.0.1 age confidence

Warning

Some dependencies could not be looked up. Check the warning logs for more information.


Release Notes

cenkalti/backoff (github.com/cenkalti/backoff/v4)

v5.0.3

Compare Source

v5.0.2

Compare Source

v5.0.1

Compare Source

v5.0.0

Compare Source

netsampler/goflow2 (github.com/netsampler/goflow2)

v2.2.6

Compare Source

v2.2.5

Compare Source

v2.2.4

Compare Source

v2.2.3

Compare Source

v2.2.2

Compare Source

v2.2.1

Compare Source

v2.2.0

Compare Source

v2.1.5

Compare Source

v2.1.4

Compare Source

v2.1.3

Compare Source

v2.1.2

Compare Source

v2.1.1

Compare Source

v2.1.0

Compare Source

v2.0.0

Compare Source

pion/dtls (github.com/pion/dtls/v2)

v3.1.2

Compare Source

Changelog

  • a621789 Retract v3.1.0
  • 1beb12f Fix OpenSSL Interop for RSA SignatureHashAlgos
  • 605dc7e Update module golang.org/x/crypto to v0.45.0 [SECURITY] (#​756)
  • 2d6d27f Update CI configs to v0.11.39

v3.1.1

Compare Source

Changelog

  • fa21c26 Retract v3.1.0
  • dc45e23 Fix OpenSSL Interop for RSA SignatureHashAlgos

v3.1.0

Compare Source

Options patterns, Security fix and performance improvements.

Changelog

v3.0.11

Compare Source

Backport security fix for GHSA-9f3f-wv7r-qc8r (CVE-2026-26014)

This is the only release with the security fix for Go v1.21.

v3.0.10

Compare Source

Changelog

v3.0.9

Compare Source

Changelog

  • ab5f89b Implement TLS_EMPTY_RENEGOTIATION_INFO_SCSV
  • d5761ac Prevent negative intervals

v3.0.8

Compare Source

Changelog

  • ffd97f5 Backoff handshake retransmit
  • 7ab1bc9 Update actions/checkout action to v6
  • bdb5f23 Update module github.com/pion/transport/v3 to v3.1.1 (#​754)
  • 1d9b6b1 Update module github.com/pion/transport/v3 to v3.1.0
  • c06c3a7 Lock while writing to encryptedPackets
  • ca7d80e Update CI configs to v0.11.32
  • 9cfb13f Improve the record layer fuzz tests
  • daa0fd4 Add fuzz tests for gcm
  • 9ed5950 Add fuzz tests for ccm
  • 7b68bd9 Add fuzz tests for packet buffer
  • 7c62411 Update CI configs to v0.11.31
  • 3e12f76 Add more tests for prf
  • e7cbd62 Migrate elliptic curves from elliptic to ecdh
  • 6ff535f Update module github.com/pion/transport/v3 to v3.0.8
  • f6b0286 Add the supported_versions extension
  • 120a895 Handle ECONNREFUSED timeout
  • ed044c0 Update CI configs to v0.11.29
  • 5611b14 Apply go modernize
  • 27c3405 Update actions/checkout action to v5
  • 8764fbd Update CI configs to v0.11.26
  • 465f544 Update CI configs to v0.11.25
  • 6e1e3c9 Update module github.com/stretchr/testify to v1.11.1
  • 495a7b5 Update CI configs to v0.11.24
  • 0b11eab Update module github.com/stretchr/testify to v1.11.0
  • b8c2ab4 Fix lint issues with golangci-lint@​v2
  • 0bf1902 Update CI configs to v0.11.22

v3.0.7

Compare Source

Changelog

  • e3cf6bc Comply with RFC5746 and RFC5246
  • f0c0987 Update module github.com/pion/logging to v0.2.4
  • 63bf30c Update CI configs to v0.11.20
  • 34fbe21 Replace interface{} with any
  • 8bf2c71 Fix packet buffer read index after buffer resize
  • 806ff2f Refactor cfg.onFlightState, avoid data race
  • f5e908f Update CI configs to v0.11.19
  • 58d3b7e Update lint rules, force testify/assert
  • e57dc04 Update social media links, move to discord

v3.0.6

Compare Source

What's Changed

Full Changelog: pion/dtls@v3.0.5...v3.0.6

v3.0.5

Compare Source

Changelog

  • fbc7bae Update docker.io/library/golang Docker tag to v1.24 (#​694)
  • 13b929b Update module golang.org/x/net to v0.37.0 (#​697)
  • 3a0f50a Use crypto.Signer whenever possible (#​681)
  • 16d6306 Update module golang.org/x/net to v0.34.0 (#​693)
  • 8eb9a91 Upgrade golangci-lint, more linters
  • 1c0df61 Update module github.com/pion/logging to v0.2.3 (#​691)
  • 1e4ae60 Update module golang.org/x/net to v0.33.0 [SECURITY]
  • ceb8458 Update module golang.org/x/crypto to v0.31.0 [SECURITY]
  • 4e34db5 Update module golang.org/x/net to v0.31.0
  • 02434c7 Update module golang.org/x/crypto to v0.29.0

v3.0.4

Compare Source

Changelog

  • b3e02c4 Update module golang.org/x/net to v0.30.0
  • 3f61fd2 Fix RSA signature verification issue
  • d796437 Improve fuzzing

v3.0.3

Compare Source

Changelog

  • 98a05d6 Fix incorrect client retransmissions
  • d7f5fee Update module golang.org/x/net to v0.29.0
  • 0be603a Update module golang.org/x/crypto to v0.27.0
  • 0790369 Update module golang.org/x/net to v0.28.0
  • f13eec1 Update module golang.org/x/crypto to v0.26.0
  • e193dc2 Update go.mod version to 1.20

v3.0.2

Compare Source

Changelog

  • 1a02350 Fix race between Conn.Close and Conn.Handshake
  • 032d60c Update CI configs to v0.11.15
  • f6ecbc2 Update docker.io/library/golang Docker tag to v1.23
  • fd18984 Fix pkg.go.dev link

v3.0.1

Compare Source

Changelog

  • e20b162 Fix multiple calls to Handshake
  • f3e8a9e Fix segfault in State::serialize method
  • 5a72b12 Update module github.com/pion/transport/v3 to v3.0.7
  • c5ab822 Update module golang.org/x/net to v0.27.0
  • 23674bd Update module golang.org/x/crypto to v0.25.0
  • 7ab74fb Add support for MKI in use_srtp
  • 7139e0e Fix time units in example
  • 2ed7caa Update module github.com/pion/transport/v3 to v3.0.6

v3.0.0

Compare Source

Pion DTLS v3.0.0 is now available. Pion DTLS is a Go implementation of DTLS. It allows for secure communication over UDP. It is commonly used for VPNs, WebRTC and other real-time protocols.

This release includes 115 commits from 17 authors. This release added Connection Identifiers, concurrent handshaking when Accepting inbound connections, Censorship Circumvention and better resilience against packet loss during handshaking.

A special thank you to kevmo314 and hasheddan for all their hard work on making this release happen.

This release contains breaking changes. Please read the following carefully, the breakage can't be caught at compile time. Each change will have a linked commit. Looking at examples/ in the linked commit should show what code you need to change in your application.

Breaking Changes

Before /v2 Pion DTLS would handshake on Server or Client creation. This design caused the Accept implementation to be blocking. A new connection couldn't be accept until the previous one had finished.
This design also doesn't match the crypto/tls implementation in stdlib. This mismatch would cause frustration/confusion for users.

Now the handshaking only occurs when Read,Write or Handshake is called. In most cases users shouldn't notice a difference.
If you do want a Handshake performed without a Read or Write this is the change needed.

Before
  dtlsConn, err := dtls.Client(dtlsEndpoint, dtlsConfig)
  if err != nil {
    // handle error
  }

  // Perform logic from negotiated SRTP Profile
  srtpProfile, ok := dtlsConn.SelectedSRTPProtectionProfile()
After
  dtlsConn, err = dtls.Client(dtlsEndpoint, dtlsEndpoint.RemoteAddr(), dtlsConfig)
  if err != nil {
    // handle error
  }

  err = dtlsConn.Handshake()
  if err != nil {
    // Explicitly perform handshake
  }

  // Perform logic from negotiated SRTP Profile
  srtpProfile, ok := dtlsConn.SelectedSRTPProtectionProfile()

This change was made in e4064683

New Features

Connection IDs

Connection IDs is a new feature added to the DTLS protocol itself. This change allows for clients to change IPs/Ports during a session. This allows for devices to roam (like phones) or for low power devices to shut down and reconnect without losing their DTLS session!

Connection ID generation is pluggable via the dtls.Config structure, and a random CID generator with a static size is provided for convenience. A new example has been added to demonstrate this functionality.

For those interested in digging deeper into the full set of changes, the majority of work was done in #​570.

Censorship Circumvention

Software that is used to circumvent censorship like snowflake uses Pion. To block this (and other) software goverments have looked for patterns and differences in Pion DTLS and blocked it.

This new release contains hooks that allows users to randomize and circumvent these blocks. Users can modify ClientHello, ServerHello and CertificateRequest. Users can also smuggle information in a ServerHello/ClientHello RandomBytes.

You can see them all here here

Changelog

The complete log between v2.2.7 and v3.0.0:

  • 0a8d838 Prepare /v3
  • b6fd38e Update module github.com/pion/transport/v3 to v3.0.5
  • e406468 Perform handshake on first read/write
  • 6178064 Mark NULL and AES256CM SRTP ciphers as supported
  • bc3159a Added DTLS-SRTP IDs for NULL and AES256CM ciphers
  • d013d0c On Read Retransmit send FSM to SENDING
  • ec76652 Retransmit last flight when in finished
  • 602dc71 Make localConnectionID thread safe
  • 0a1b73a Respect disableRetransmitBackoff
  • a6d9640 Add OnConnectionAttempt to Config
  • 48d6748 Implement retransmit backoff according to 4.2.4.1
  • 45e16a0 Update module golang.org/x/net to v0.26.0
  • a5d1fac Flight3: respect curves configuration
  • 61b3466 Add ability to select cert based on ch rand bytes
  • eddca22 Update module golang.org/x/crypto to v0.24.0
  • edc7ad0 Limit size of encrypted packet queue
  • fbbdf66 Update module golang.org/x/net to v0.25.0
  • efd6737 Add test for PSK and Identity
  • cb62aac Fix typo in test
  • 494c1a3 Remove testify dependency
  • adec94a Update golang Docker tag to v1.22
  • 8738ce1 Add handshake hooking
  • 2c36d63 Update module golang.org/x/net to v0.24.0
  • d606c79 Update module golang.org/x/crypto to v0.22.0
  • f6f666e Update module golang.org/x/net to v0.23.0 [SECURITY]
  • e008bc4 Update CI configs to v0.11.12
  • 3e667b0 Update go.mod version to 1.19
  • ae51db9 Update CI configs to v0.11.7
  • 8244c45 Update CI configs to v0.11.4
  • 0ad9cfd Update module github.com/pion/transport/v3 to v3.0.2
  • 8a93e0e Fix TestErrorsTemporary
  • 38e39e4 Update module golang.org/x/net to v0.22.0
  • a245727 Update module golang.org/x/crypto to v0.21.0
  • 5e95b5c Update module github.com/stretchr/testify to v1.9.0
  • 35a00d3 Fix linter errors
  • 96b8c29 Fix linter errors
  • 2597464 Update module golang.org/x/net to v0.20.0
  • 42b6772 Update module golang.org/x/crypto to v0.18.0
  • bb54a30 If not found in the cache return nil
  • 3427819 Format code
  • 798b32a Fix flight1parse processing exception
  • ba72fba Update CI configs to v0.11.3
  • 520d84c Update CI configs to v0.11.0
  • cfa868c Remove 'AUTHORS.txt' from README.md
  • b4a403c Remove 'Generate Authors' workflow
  • 9ffd96c Drop invalid record silently during handshake
  • 3e8a7d7 Update module golang.org/x/crypto to v0.17.0 [SECURITY]
  • dc751e3 Update module golang.org/x/net to v0.19.0
  • 3f3d833 Update module golang.org/x/crypto to v0.16.0
  • a8f7062 Use atomic to avoid stale SRTP protection profile
  • 9cc3df9 Respect Algorithm value in CertificateRequest
  • 7faf25f Update module golang.org/x/net to v0.17.0 [SECURITY]
  • c864545 Update module golang.org/x/net to v0.15.0
  • 28431d9 Export CipherSuiteID in connection State
  • 8401874 Update module golang.org/x/crypto to v0.13.0
  • 744e27a Update actions/checkout action to v4
  • 2b584af Specifying underlying type of conn ID atomic.Value
  • 70caf30 Use atomic.Value to maintain Go 1.13 compatibility
  • 60064c6 Update module github.com/pion/transport/v3 to v3.0.1
  • ef50d6b Update AUTHORS.txt
  • 7e5003a Update AUTHORS.txt
  • dbc7fd9 Update module github.com/pion/transport/v3 to v3.0.0
  • a681f67 Correctly identify client and server with PSK ID
  • e85f106 Update module github.com/pion/transport/v2 to v2.2.2
  • 7bf18f8 Update module golang.org/x/net to v0.14.0
  • 609e5be Clear CIDs on potential session resumption
  • e142ee1 Serialize CIDs in state
  • 37fbc04 Add CID send only client example
  • 6df50a6 Add CID listener example
  • f5875c1 Set UDP routing if CID is enabled
  • e663309 Add CID routing unit tests
  • 9db84b5 Add CID based datagram routing
  • a8998af Add UDP net.PacketListener unit tests
  • 71db42b Introduce UDP net.PacketListener
  • 3afeb7d Add PacketBuffer unit tests
  • eb305b1 Introduce net PacketBuffer
  • 703da0c Consume net package in tests
  • 4f53ce1 Introduce net package
  • f1d8b0a Wrap Alerts when CID is negotiated
  • 3082313 Convert nil CIDs to empty byte slice
  • 83b1254 Fix name of cipher suite initialization function
  • 818feb8 Set timeout to 10 minutes on e2e workflow
  • d29c6f0 Add basic connection ID generators
  • 2f2bc8d Add e2e CID tests
  • ee04141 Update tests to wrap net.Conn
  • f960a37 Wrap net.Conn in DTLS listener
  • afb61f1 Update DTLS Conn to use PacketConn and CID
  • d082911 Add Conn to PacketConn utility
  • e5420de Update handshaker to handle CID extension
  • 8922879 Update ciphersuites to support CIDs
  • 8ba47cb Implement AEAD additional data with CID
  • 27fd131 Add local and remote CID to state
  • 9a37bfd Implement AddUint48 utility
  • 1ce6f27 Add CID content type
  • 6af61b1 Allow packets to specify CID wrapped
  • b7b1e44 Add support for CID related generators
  • 2005135 Add support for parsing CID records
  • 9e4a4e7 Add DTLS connection ID extension
  • e9b3ce0 Update pion/transport to latest
  • a1d270f Update module golang.org/x/crypto to v0.12.0
  • a6eca6c Update CI configs to v0.10.11
  • eb34e7d Update module golang.org/x/net to v0.13.0
  • c9eb5f2 Update module golang.org/x/net to v0.12.0
  • b033847 Clean up unneccessary nested logic
  • 7307f62 Fix return of nil alertErrors
  • b905606 Add unmarshal unit tests for extensions
  • 0736d45 Fix parsing supported EC point formats
  • 93704b3 Add Daniel Mangum to AUTHORS.txt
  • cabe5b8 Enable Supported Signature Algorithms
  • 265bf11 Enable Elliptic Curve Supported Point Formats
  • d7303d0 Wait for OpenSSL server shutdown in e2e test
  • 159122f Update e2e Go image to 1.20
  • 8a11cf2 Remove extraneous error checks in handshaker
  • 4fc3d8f Update module golang.org/x/net to v0.11.0
  • 4b76abf Update module golang.org/x/crypto to v0.10.0
pion/transport (github.com/pion/transport/v2)

v4.0.1

Compare Source

Changelog

  • 34f6010 Upgrade all submoudles to v4
  • 099f50c Upgrade module to v4
  • 1274e04 Major release API cleanup
  • db239a8 Add Net.CreateListenConfig
  • 37ee413 Support dynamic IP registration
  • 4f3e204 Add an OS-dependent reuse-port helper
  • 5ae6667 Update CI configs to v0.11.36
  • 8eb05fb Fix gosec slice bounds warnings
  • ed40907 Add new queue simulation

v3.1.1

Compare Source

Changelog

  • 90bd2e1 Use ping-pong buffer for batch conn

v3.1.0

Compare Source

Changelog

v3.0.8

Compare Source

Changelog

  • ecc075c Unblock tbf on close
  • 9774e41 Enhance filters with API compatibility
  • 44c78d5 Add loss and delay filter to vnet
  • d458a44 Add missing lock
  • e464f80 Use Gosched instead of sleep
  • 5253aa9 Update CI configs to v0.11.29
  • 7a1ef19 Update CI configs to v0.11.26
  • a46d2e2 Update CI configs to v0.11.25
  • f7e8b38 Update CI configs to v0.11.24
  • ff8b26e Update module github.com/stretchr/testify to v1.11.1
  • 168cd17 Update module github.com/stretchr/testify to v1.11.0
  • c6ab4c7 Fix lint issues with golangci-lint@​v2
  • 0f83320 Update CI configs to v0.11.22
  • 16ea91a Update module github.com/pion/logging to v0.2.4
  • 9589b4b Handle replay after wrapping in replaydetector
  • 0597a76 Make packetio.TestBufferAlloc stable
  • 43c8901 Update CI configs to v0.11.19
  • 19a9306 Update social media links, move to discord
  • b47f3b6 Update lint rules, force testify/assert for tests
  • 68f413c Update CI configs to v0.11.18
  • 3ede094 Update module golang.org/x/net to v0.34.0 (#​326)
  • 9e40329 Update module github.com/pion/logging to v0.2.3 (#​325)
  • 839bffc Upgrade golangci-lint, more linters
  • 527176e Update module golang.org/x/net to v0.33.0 [SECURITY]
  • 95a2949 Update module golang.org/x/net to v0.31.0
  • 44f8069 Update module github.com/stretchr/testify to v1.10.0
  • 1eb3a05 Update module golang.org/x/net to v0.30.0
  • 538047e Update module github.com/wlynxg/anet to v0.0.5
  • ba0d1f8 Update module golang.org/x/sys to v0.26.0
  • ea4fc43 Update module golang.org/x/net to v0.29.0
  • e8ac9ae Update module golang.org/x/sys to v0.24.0
  • c5cdc15 Update module golang.org/x/net to v0.28.0
  • 8476d76 Update go.mod version to 1.20
  • b3a5c41 Update CI configs to v0.11.15
  • 7395bcf Update module github.com/wlynxg/anet to v0.0.4

v3.0.7

Compare Source

What's Changed

Full Changelog: pion/transport@v3.0.6...v3.0.7

v3.0.6

Compare Source

What's Changed

Full Changelog: pion/transport@v3.0.5...v3.0.6

v3.0.5

Compare Source

What's Changed

Full Changelog: pion/transport@v3.0.4...v3.0.5

v3.0.4

Compare Source

What's Changed

Full Changelog: pion/transport@v3.0.3...v3.0.4

v3.0.3

Compare Source

What's Changed

New Contributors

Full Changelog: pion/transport@v3.0.2...v3.0.3

v3.0.2

Compare Source

What's Changed

Full Changelog: pion/transport@v2.2.4...v3.0.2

v3.0.1

Compare Source

Changelog

  • 701ff64 Use atomic Int32 instead of Bool

v3.0.0

Compare Source

Changelog

  • a66d5b7 Update AUTHORS.txt
  • 82ae7e5 Update AUTHORS.txt
  • b1019b7 Remove named return values
  • 241097e Update replaydetector tests to include latest
  • 0d51df0 Add latest seqnum notify to

Configuration

📅 Schedule: Branch creation - On day 7 of the month, every 3 months ( * * 7 */3 * ) (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux Bot added the dependencies Pull requests that update a dependency file label Apr 7, 2026
@red-hat-konflux
Copy link
Copy Markdown
Contributor Author

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: go.sum
Command failed: mod upgrade --mod-name=github.com/cenkalti/backoff/v4 -t=5
could not load package: err: exit status 1: stderr: go: inconsistent vendoring in /tmp/renovate/repos/github/netobserv/flowlogs-pipeline:
	github.com/netsampler/goflow2/v2@v2.2.6: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/pion/dtls/v3@v3.1.2: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/pion/logging@v0.2.4: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/pion/transport/v4@v4.0.1: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/xdg-go/scram@v1.2.0: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	gopkg.in/evanphx/json-patch.v5@v5.9.11: is explicitly required in go.mod, but not marked as explicit in vendor/modules.txt
	github.com/pion/logging@v0.2.3: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod
	github.com/xdg-go/scram@v1.1.2: is marked as explicit in vendor/modules.txt, but not explicitly required in go.mod

	To ignore the vendor directory, use -mod=readonly or -mod=mod.
	To sync the vendor directory, run:
		go mod vendor


@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented Apr 7, 2026

Important

Review skipped

Bot user detected.

To trigger a single review, invoke the @coderabbitai review command.

⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 45a77229-a1ae-40f8-beae-feeac584d914

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Use the checkbox below for a quick retry:

  • 🔍 Trigger review
✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch konflux/mintmaker/main/major-go-modules

Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Apr 7, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign memodi for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Apr 7, 2026

Hi @red-hat-konflux[bot]. Thanks for your PR.

I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work.

Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@jotak jotak closed this Apr 29, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file needs-ok-to-test

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant