Skip to content

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Aug 28, 2025

Bumps the go_modules group with 4 updates in the / directory: github.com/coredns/coredns, github.com/minio/console, github.com/nats-io/nats-server/v2 and github.com/nats-io/nats-streaming-server.

Updates github.com/coredns/coredns from 1.4.0 to 1.12.2

Release notes

Sourced from github.com/coredns/coredns's releases.

v1.12.2

This release introduces significant improvements to plugin stability and extensibility. It adds multicluster support to the Kubernetes plugin, fallthrough support in the file plugin, and a new SetProxyOptions function for the forward plugin. Notably, the QUIC (DoQ) plugin now limits concurrent streams, improving performance under load. Several bug fixes and optimizations improve reliability across plugins, including rewrite, proxy, and metrics.

Brought to You By

Ambrose Chua, Arthur Outhenin-Chalandre, Ben Kochie, Colden Cullen, Gleb Kogtev, Hirotaka Tagawa, Kevin Lyda, Manuel Rüger, Mark Mickan, Parfenov Ivan, skipper, vdbe, Viktor Oreshkin, Ville Vesilehto, Yannick Epstein, Yong Tang

Noteworthy Changes

v1.12.1

In this release:

  • kubernetes: Revert recent change to only create PTR records for endpoints with hostname defined.
  • forward: added option to return SERVFAIL immediately if all upstreams are unhealthy.

Brought to You By

... (truncated)

Changelog

Sourced from github.com/coredns/coredns's changelog.

Makefile for releasing CoreDNS

The release is controlled from coremain/version.go. The version found there is

used to tag the git repo and to build the assets that are uploaded to GitHub.

The release should be accompanied by release notes in the notes/ subdirectory.

These are published on coredns.io. For example see: notes/coredns-1.5.1.md

Use make -f Makefile.release notes to create a skeleton notes document.

For this to work properly you must fetch the tag of the previous release.

Be sure to prune the PR list a bit, not everything is worthy!

As seen in notes/coredns-1.5.1.md we want to style the notes in the following manner:

* important changes at the top

* people who committed/review code (the latter is harder to get)

* Slightly abbreviated list of pull requests merged for this release.

Steps to release, first:

1. Up the version in coremain/version.go

2. Do a make -f Makefile.doc # This has been automated in GitHub, so you can probably skip this step

3. go generate

4. Send PR to get this merged.

Then:

1. Open an issue for this release

2. In an issue give the command: /release master VERSION

Where VERSION is the version of the release - the release script double checks this with the

actual CoreDNS version in coremain/version.go

3. (to test as release /release -t master VERSION can be used.

See https://github.com/coredns/release for documentation README on what needs to be setup for this to be

automated (can still be done by hand if needed). Especially what environment variables need to be

set! This further depends on Caddy being setup and dreck running as a plugin in Caddy.

To release we run, these target from the this Makefile.release ordered like:

* make release

* make github-push

Testing this is hard-ish as you don't want to accidentally release a coredns. If not executing the github-push target

you should be fine.

Docker image creation and upload are now separate steps, because it often failed before. See the Makefile.docker for

details.

ifeq (, $(shell which curl)) $(error "No curl in $$PATH, please install") endif

... (truncated)

Commits

Updates github.com/golang-jwt/jwt/v4 from 4.1.0 to 4.5.2

Release notes

Sourced from github.com/golang-jwt/jwt/v4's releases.

v4.5.2

See GHSA-mh63-6h87-95cp

Full Changelog: golang-jwt/jwt@v4.5.1...v4.5.2

v4.5.1

Security

Unclear documentation of the error behavior in ParseWithClaims in <= 4.5.0 could lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by ParseWithClaims return both error codes. If users only check for the jwt.ErrTokenExpired using error.Is, they will ignore the embedded jwt.ErrTokenSignatureInvalid and thus potentially accept invalid tokens.

This issue was documented in GHSA-29wx-vh33-7x7r and fixed in this release.

Note: v5 was not affected by this issue. So upgrading to this release version is also recommended.

What's Changed

  • Back-ported error-handling logic in ParseWithClaims from v5 branch. This fixes GHSA-29wx-vh33-7x7r.

Full Changelog: golang-jwt/jwt@v4.5.0...v4.5.1

v4.5.0

What's Changed

Full Changelog: golang-jwt/jwt@v4.4.3...v4.5.0

v4.4.3

What's Changed

New Contributors

Full Changelog: golang-jwt/jwt@v4.4.2...v4.4.3

v4.4.2

What's Changed

... (truncated)

Commits

Updates github.com/minio/console from 0.12.8 to 0.28.0

Release notes

Sourced from github.com/minio/console's releases.

Release version v0.28.0

Changelog

  • fc9319e55 Added identifier field to Event destinations page & migrated to mds (#2816)
  • beed4895c Apply permission check for create accesskey button (#2822)
  • dc90db659 Changed SSO Login screen to hide login form by default (#2807)
  • 7a9b775b0 Changed Share Object logic to use Access Keys (#2827)
  • 920fc7d93 Fix Subpath behavior (#2818)
  • 629dd669c Fix anonymous access rule not displayed due to style (#2820)
  • 6e314a2fa Fix crash when backend has no rrSCParity property (#2826)
  • d93537261 Fix download of large files in Console (#2773)
  • 58b64a573 Fixed an issue with allowResources & KeyBar (#2817)
  • 028570279 Migrated Access Keys page components to mds (#2834)
  • 57bfe97d0 Release v0.28.0 (#2831)
  • 17e791afb Replace RIGHT-TO-LEFT OVERRIDE unicode (#2828)
  • 22ec87d00 improve playwright tests with refactoring and clean up (#2809)
  • bda1cd1f2 mds-released-V0.4.3 (#2830)
  • b87b4156e mds-released-v0.4.2 (#2815)

Release version v0.27.0

Changelog

  • cde6d1b0e Added Disable login animation with env variable (#2799)
  • be60569a1 Changed Object Browser components to use new mds components (#2796)
  • 1583b69fb Made Service Account creation consistent with mc (#2801)
  • 93f010b88 Release v0.27.0 (#2813)
  • c117601e5 Update madmin-go to 2.1.1 (#2810)
  • c5d4cdf1b fix to show or hide show deleted objects option based on versioning status (#2780)
  • f78f838ed mds-released-v0.4.1 (#2808)

Release version v0.26.4

Changelog

  • 4d783c5e4 Added Object Version read-only field in Edit Lifecycle Modal (#2772)
  • 81e0c82fe Changed GitHub labels (#2768)
  • 0dacc4d49 Changed breadcrumbs back button behavior (#2776)
  • 211ab3fd9 Fix incorrect logo appearing for Standard License holders (#2797)
  • 8882f1da0 Fix yaml vulnerability (#2785)
  • 75b3a6bea Fixed Object Version selector visibility in Add Lifecycle Rule modal (#2769)
  • f7a7f01d7 Fixed issue while getting locking status of a bucket (#2790)
  • 6020590b2 Make playwright run faster (#2737)
  • 51226a74d Release v0.26.4 (#2798)
  • 0e0f5030d Remove health diagnostic warning (#2779)
  • 056d487f1 Show progress bar when loading Usage Info (#2784)
  • b8083215b Update Dev Docs with MinIO naming conventions (#2783)
  • 61c864e74 Update Dev Documentation (#2781)
  • 1477def4f Updated Console UI dependencies (#2787)
  • fb5193d89 Updated mds to v0.4.0 (#2794)
  • 29507cda7 Updated xml2js library (#2770)
  • e983473a5 Upgrade Go Dependencies (#2786)
  • 2c84a5293 Use FormLayout from mds (#2788)
  • 90c8ea7f0 Use PageLayout from mds (#2789)

... (truncated)

Commits

Updates github.com/nats-io/nats-server/v2 from 2.3.2 to 2.10.27

Release notes

Sourced from github.com/nats-io/nats-server/v2's releases.

Release v2.10.27

Changelog

Go Version

  • 1.24.1

CVEs

  • This release contains fixes for CVE-2025-30215, a CRITICAL severity vulnerability affecting all NATS Server versions from v2.2.0, prior to v2.11.1 or v2.10.27.

Fixed

JetStream

  • Correctly validate the calling account on a number of system API calls
  • Check system and account limits when processing a stream restore
  • Fixed a performance regression when using max messages per subject of 1 (#6688)

Complete Changes

nats-io/nats-server@v2.10.26...v2.10.27

Release v2.10.27-binary

Changelog

Go Version

  • 1.24.1

CVEs

  • This is a binary-only release containing fixes for CVE-2025-30215, a CRITICAL severity vulnerability affecting all NATS Server versions from v2.2.0, prior to v2.11.1 or v2.10.27. Public disclosure of the details, including the source code, will be made available no sooner than a week from the release date. All environments should update as soon as possible. For workflows that rely on building from source, we recommend using the binary in the interim.

Release v2.10.26

Changelog

Refer to the 2.10 Upgrade Guide for backwards compatibility notes with 2.9.x.

Go Version

Dependencies

  • github.com/nats-io/nats.go v1.39.1 (#6574)
  • golang.org/x/crypto v0.34.0 (#6574)
  • golang.org/x/sys v0.30.0 (#6487)
  • golang.org/x/time v0.10.0 (#6487)
  • github.com/nats-io/nkeys v0.4.10 (#6494)

... (truncated)

Commits
  • 6b830a9 Release v2.10.27
  • c6bbff7 Release v2.10.27-binary
  • 4b0e2ca Test subject state optimization
  • d984613 Optimize removeSeqPerSubject() for MaxMsgPerSubject == 1
  • 406f836 Improved request account validation
  • 372d7c5 Check server and account limits on stream restore
  • 20019bf Import GitHub Actions, goreleaser and golangci-lint workflow changes from main
  • 14fa949 Release v2.10.26
  • 50ee75c Release v2.10.26-RC.7
  • 723dca8 Fix for data race for c.out
  • Additional commits viewable in compare view

Updates github.com/prometheus/client_golang from 1.11.0 to 1.22.0

Release notes

Sourced from github.com/prometheus/client_golang's releases.

v1.22.0 - 2025-04-07

⚠️ This release contains potential breaking change if you use experimental zstd support introduce in #1496 ⚠️

Experimental support for zstd on scrape was added, controlled by the request Accept-Encoding header. It was enabled by default since version 1.20, but now you need to add a blank import to enable it. The decision to make it opt-in by default was originally made because the Go standard library was expected to have default zstd support added soon, golang/go#62513 however, the work took longer than anticipated and it will be postponed to upcoming major Go versions.

e.g.:

import (
  _ "github.com/prometheus/client_golang/prometheus/promhttp/zstd"
)
  • [FEATURE] prometheus: Add new CollectorFunc utility #1724
  • [CHANGE] Minimum required Go version is now 1.22 (we also test client_golang against latest go version - 1.24) #1738
  • [FEATURE] api: WithLookbackDelta and WithStats options have been added to API client. #1743
  • [CHANGE] ⚠️ promhttp: Isolate zstd support and klauspost/compress library use to promhttp/zstd package. #1765

... (truncated)

Changelog

Sourced from github.com/prometheus/client_golang's changelog.

1.22.0 / 2025-04-07

⚠️ This release contains potential breaking change if you use experimental zstd support introduce in #1496 ⚠️

Experimental support for zstd on scrape was added, controlled by the request Accept-Encoding header. It was enabled by default since version 1.20, but now you need to add a blank import to enable it. The decision to make it opt-in by default was originally made because the Go standard library was expected to have default zstd support added soon, golang/go#62513 however, the work took longer than anticipated and it will be postponed to upcoming major Go versions.

e.g.:

import (
  _ "github.com/prometheus/client_golang/prometheus/promhttp/zstd"
)
  • [FEATURE] prometheus: Add new CollectorFunc utility #1724
  • [CHANGE] Minimum required Go version is now 1.22 (we also test client_golang against latest go version - 1.24) #1738
  • [FEATURE] api: WithLookbackDelta and WithStats options have been added to API client. #1743
  • [CHANGE] ⚠️ promhttp: Isolate zstd support and klauspost/compress library use to promhttp/zstd package. #1765

1.21.1 / 2025-03-04

  • [BUGFIX] prometheus: Revert of Inc, Add and Observe cumulative metric CAS optimizations (#1661), causing regressions on low contention cases.
  • [BUGFIX] prometheus: Fix GOOS=ios build, broken due to process_collector_* wrong build tags.

1.21.0 / 2025-02-17

⚠️ This release contains potential breaking change if you upgrade github.com/prometheus/common to 0.62+ together with client_golang. ⚠️

New common version changes model.NameValidationScheme global variable, which relaxes the validation of label names and metric name, allowing all UTF-8 characters. Typically, this should not break any user, unless your test or usage expects strict certain names to panic/fail on client_golang metric registration, gathering or scrape. In case of problems change model.NameValidationScheme to old model.LegacyValidation value in your project init function.

  • [BUGFIX] gocollector: Fix help message for runtime/metric metrics. #1583
  • [BUGFIX] prometheus: Fix Desc.String() method for no labels case. #1687
  • [ENHANCEMENT] prometheus: Optimize popular prometheus.BuildFQName function; now up to 30% faster. #1665
  • [ENHANCEMENT] prometheus: Optimize Inc, Add and Observe cumulative metrics; now up to 50% faster under high concurrent contention. #1661
  • [CHANGE] Upgrade prometheus/common to 0.62.0 which changes model.NameValidationScheme global variable. #1712
  • [CHANGE] Add support for Go 1.23. #1602
  • [FEATURE] process_collector: Add support for Darwin systems. #1600 #1616 #1625 #1675 #1715
  • [FEATURE] api: Add ability to invoke CloseIdleConnections on api.Client using api.Client.(CloseIdler).CloseIdleConnections() casting. #1513
  • [FEATURE] promhttp: Add promhttp.HandlerOpts.EnableOpenMetricsTextCreatedSamples option to create OpenMetrics _created lines. Not recommended unless you want to use opt-in Created Timestamp feature. Community works on OpenMetrics 2.0 format that should make those lines obsolete (they increase cardinality significantly). #1408
  • [FEATURE] prometheus: Add NewConstNativeHistogram function. #1654

1.20.5 / 2024-10-15

  • [BUGFIX] testutil: Reverted #1424; functions using compareMetricFamilies are (again) only failing if filtered metricNames are in the expected input.

1.20.4 / 2024-09-07

... (truncated)

Commits
  • d50be25 Cut 1.22.0 (#1793)
  • 1043db7 Cut 1.22.0-rc.0 (#1768)
  • e575c9c promhttp: Isolate zstd support and klauspost/compress library use to promhttp...
  • f2276aa Merge pull request #1764 from prometheus/dependabot/github_actions/github-act...
  • 9df772c build(deps): bump peter-evans/create-pull-request
  • a3548c5 Merge pull request #1754 from saswatamcode/exp-eh
  • 60fd2b0 Remove go.work file for now
  • 8f9d0de exp: Add dependabot config
  • c5cf981 Merge pull request #1762 from prometheus/release-1.21
  • 8a42da3 Fix ios build. (#1758)
  • Additional commits viewable in compare view

Updates golang.org/x/crypto from 0.0.0-20210921155107-089bfa567519 to 0.38.0

Commits

Updates golang.org/x/oauth2 from 0.0.0-20210819190943-2bc19b11175f to 0.30.0

Commits

Updates golang.org/x/sys from 0.0.0-20211020174200-9d6173849985 to 0.33.0

Commits

Updates github.com/lestrrat-go/jwx from 1.2.7 to 1.2.25

Release notes

Sourced from github.com/lestrrat-go/jwx's releases.

v1.2.25

v1.2.25 23 May 2022
[Bug Fixes][Security]
  * [jwe] An old bug from at least 7 years ago existed in handling AES-CBC unpadding,
    where the unpad operation might remove more bytes than necessary ([#744](https://github.com/lestrrat-go/jwx/issues/744))
    This affects all jwx code that is available before v2.0.2 and v1.2.25.

v1.2.24

v1.2.24 05 May 2022
[Security]
  * Upgrade golang.org/x/crypto ([#724](https://github.com/lestrrat-go/jwx/issues/724))

v1.2.23

v1.2.23 13 Apr 2022
[Bug fixes]
  * [jwk] jwk.AutoRefresh had a race condition when `Configure()` was
    called concurrently ([#686](https://github.com/lestrrat-go/jwx/issues/686))
    (It has been patched correctly, but we may come back to revisit
     the design choices in the near future)

v1.2.22

v1.2.22 08 Apr 2022
[Bug fixes]
  * [jws] jws.Verify was ignoring the `b64` header when it was present
    in the protected headers ([#681](https://github.com/lestrrat-go/jwx/issues/681)). Now the following should work:
  jws.Sign(..., jws.WithDetachedPayload(payload))
  // previously payload had to be base64 encoded
  jws.Verify(..., jws.WithDetachedPayload(payload))

(note: v2 branch was not affected)

v1.2.21

v1.2.21 30 Mar 2022
[Bug fixes]
  * [jwk] RSA keys without p and q can now be parsed.

v1.2.20

v1.2.20 03 Mar 2022
</tr></table> 

... (truncated)

Changelog

Sourced from github.com/lestrrat-go/jwx's changelog.

v1.2.25 23 May 2022 [Bug Fixes][Security]

  • [jwe] An old bug from at least 7 years ago existed in handling AES-CBC unpadding, where the unpad operation might remove more bytes than necessary (#744) This affects all jwx code that is available before v2.0.2 and v1.2.25.

v1.2.24 05 May 2022 [Security]

  • Upgrade golang.org/x/crypto (#724)

v1.2.23 13 Apr 2022 [Bug fixes]

  • [jwk] jwk.AutoRefresh had a race condition when Configure() was called concurrently (#686) (It has been patched correctly, but we may come back to revisit the design choices in the near future)

v1.2.22 08 Apr 2022 [Bug fixes]

  • [jws] jws.Verify was ignoring the b64 header when it was present in the protected headers (#681). Now the following should work:

    jws.Sign(..., jws.WithDetachedPayload(payload)) // previously payload had to be base64 encoded jws.Verify(..., jws.WithDetachedPayload(payload))

    (note: v2 branch was not affected)

v1.2.21 30 Mar 2022 [Bug fixes]

  • [jwk] RSA keys without p and q can now be parsed.

v1.2.20 03 Mar 2022 [Miscellaneous]

v1.2.19 22 Feb 2022 [New Feature]

  • [jwk] jwk.Parse (and (jwk.AutoRefresh).Configure) can accept a new option jwk.WithIgnoreParseError(bool), which allows users to ignore errors during parsing of each key contained in the JWKS, allowing you to "skip" invalid keys.

    This option should not be used lightly, as it hides the presence of possibly faulty keys. However, this can be an escape hatch if you are faced with a faulty JWKS that you do not control.

v1.2.18 23 Jan 2022

... (truncated)

Commits

Updates github.com/nats-io/nats-streaming-server from 0.21.2 to 0.24.1

Release notes

Sourced from github.com/nats-io/nats-streaming-server's releases.

Release v0.24.1

Changelog

Note that we added a deprecation notice for this project. See note here

Go Version

  • 1.17.6: Both release executables and Docker images are built with this Go release.

Updated

  • Dependencies (#1238)
    • NATS Server v2.7.1 -> v2.7.2

Fixed

  • Possible panic when monitoring endpoints are inspected while the server is in the middle of recovering its state. Thanks to @​wilstoff for the report (#1236)
  • Possible panic on message redelivery (#1237)

Complete Changes

nats-io/nats-streaming-server@v0.24.0...v0.24.1

Release v0.24.0

Changelog

Note that we added a deprecation notice for this project. See note here

Go Version

  • 1.17.6: Both release executables and Docker images are built with this Go release.

Updated

  • Dependencies (#1233, #1234)
    • NATS Server v2.6.6 -> v2.7.1
    • Hashicorp RAFT v1.3.2 -> v1.3.3

Changed

  • The /vendor directory has been removed and the executable is now built with go modules (#1233)
  • The error messages "request missing subject", "request for missing inbox" and "request for missing client" have been respectively replaced by "request for unknown channel", "request for unknown inbox" and "request for unknown client". This is mentioned here in case some users were filtering on those error messages (#1231)

Fixed

  • Clustering:
    • Don't report "sub close request missing subject" during RAFT's log replay. Thanks to @​wilstoff for the report (#1231)
  • Link to documentation in README.md. Thanks to @​EJTJ3 for the contribution (#1227)
  • Missing log statement when failing to create a channel (#1232)

Complete Changes

nats-io/nats-streaming-server@v0.23.2...v0.24.0

... (truncated)

Commits
  • 82edf4b Merge pull request #1238 from nats-io/release_0_24_1
  • 27f09c3 Release v0.24.1
  • 6ac167b Merge pull request #1237 from nats-io/fix_panic_on_redelivery
  • aacb792 Merge pull request #1236 from nats-io/fix_1235
  • 31fd271 [FIXED] Possible panic on message redelivery
  • c6f1e64 [FIXED] Possible panic on startup when monitoring endpoint inspected
  • a17a5b6 Merge pull request #1234 from nats-io/release_0_24_0
  • ef90792 Release v0.24.0
  • 65b89d7 Merge pull request #1233 from nats-io/go_1_17_and_go_mod
  • f767235 Update Travis to Go 1.17 and remove vendor directory
  • Additional commits viewable in compare view

Updates go.mongodb.org/mongo-driver from 1.4.6 to 1.12.1

Release notes

Sourced from go.mongodb.org/mongo-driver's releases.

MongoDB Go Driver 1.12.1

The MongoDB Go Driver Team is pleased to release version 1.12.1 of the official Go driver.

Release Notes

This release fixes a bug in the Go Driver where connections are leaked if a user runs a transaction while connected to a load balancer. To resolve this issue, the Go Driver will now unpin connections when ending a session.

This release fixes a logging design oversight in which enabling logging with options.LogComponentAll does not result in the publication of logs.

This release fixes two runtime errors, which occur on unmarshaling an empty bson.RawValue with an invalid type, specifically the 0x00 (null) type, and on marshaling a nil pointer of ReadConcern.


For a full list of tickets included in this release, please see the links below:

Full Changelog: v1.12.0...v1.12.1

Documentation for the Go driver can be found on pkg.go.dev and the MongoDB documentation site. BSON library documentation is also available on pkg.go.dev. Questions and inquiries can be asked on the MongoDB Developer Community. Bugs can be reported in the Go Driver project in the MongoDB JIRA where a list of current issues can be found. Your feedback on the Go driver is greatly appreciated!

MongoDB Go Driver 1.12.0

The MongoDB Go Driver Team is pleased to release version 1.12.0 of the official Go driver.

Release Notes

This release adds support for MongoDB 7.0, including production-ready support for Queryable Encryption. It also adds a new logging interface and configuration API improvements.

Production-Ready Queryable Encryption

This release introduces backwards breaking changes to the Queryable Encryption protocol. Using Queryable Encryption now requires MongoDB 7.0+ and libmongocrypt v1.8.0+.

It also adds the new ClientEncryption.CreateEncryptedCollection method to automatically create data encryption keys when creating a new encrypted collection and adds the ability to fetch KMS credentials automatically from Azure, GCP, and AWS environments.

Logging

This release introduces a logging interface to allow users to more easily record detailed information about connection management and command execution within their application.

The logging configuration adds a new LogSink interface that is compatible with the logr.LogSink interface, allowing users to use existing logr a...

Description has been truncated

Bumps the go_modules group with 4 updates in the / directory: [github.com/coredns/coredns](https://github.com/coredns/coredns), [github.com/minio/console](https://github.com/minio/console), [github.com/nats-io/nats-server/v2](https://github.com/nats-io/nats-server) and [github.com/nats-io/nats-streaming-server](https://github.com/nats-io/nats-streaming-server).


Updates `github.com/coredns/coredns` from 1.4.0 to 1.12.2
- [Release notes](https://github.com/coredns/coredns/releases)
- [Changelog](https://github.com/coredns/coredns/blob/master/Makefile.release)
- [Commits](coredns/coredns@v1.4.0...v1.12.2)

Updates `github.com/golang-jwt/jwt/v4` from 4.1.0 to 4.5.2
- [Release notes](https://github.com/golang-jwt/jwt/releases)
- [Changelog](https://github.com/golang-jwt/jwt/blob/main/VERSION_HISTORY.md)
- [Commits](golang-jwt/jwt@v4.1.0...v4.5.2)

Updates `github.com/minio/console` from 0.12.8 to 0.28.0
- [Release notes](https://github.com/minio/console/releases)
- [Changelog](https://github.com/minio/object-browser/blob/master/CHANGELOG.md)
- [Commits](minio/object-browser@v0.12.8...v0.28.0)

Updates `github.com/nats-io/nats-server/v2` from 2.3.2 to 2.10.27
- [Release notes](https://github.com/nats-io/nats-server/releases)
- [Changelog](https://github.com/nats-io/nats-server/blob/main/.goreleaser.yml)
- [Commits](nats-io/nats-server@v2.3.2...v2.10.27)

Updates `github.com/prometheus/client_golang` from 1.11.0 to 1.22.0
- [Release notes](https://github.com/prometheus/client_golang/releases)
- [Changelog](https://github.com/prometheus/client_golang/blob/main/CHANGELOG.md)
- [Commits](prometheus/client_golang@v1.11.0...v1.22.0)

Updates `golang.org/x/crypto` from 0.0.0-20210921155107-089bfa567519 to 0.38.0
- [Commits](https://github.com/golang/crypto/commits/v0.38.0)

Updates `golang.org/x/oauth2` from 0.0.0-20210819190943-2bc19b11175f to 0.30.0
- [Commits](https://github.com/golang/oauth2/commits/v0.30.0)

Updates `golang.org/x/sys` from 0.0.0-20211020174200-9d6173849985 to 0.33.0
- [Commits](https://github.com/golang/sys/commits/v0.33.0)

Updates `github.com/lestrrat-go/jwx` from 1.2.7 to 1.2.25
- [Release notes](https://github.com/lestrrat-go/jwx/releases)
- [Changelog](https://github.com/lestrrat-go/jwx/blob/v1.2.25/Changes)
- [Commits](lestrrat-go/jwx@v1.2.7...v1.2.25)

Updates `github.com/nats-io/nats-streaming-server` from 0.21.2 to 0.24.1
- [Release notes](https://github.com/nats-io/nats-streaming-server/releases)
- [Changelog](https://github.com/nats-io/nats-streaming-server/blob/main/.goreleaser.yml)
- [Commits](nats-io/nats-streaming-server@v0.21.2...v0.24.1)

Updates `go.mongodb.org/mongo-driver` from 1.4.6 to 1.12.1
- [Release notes](https://github.com/mongodb/mongo-go-driver/releases)
- [Commits](mongodb/mongo-go-driver@1.4.6...v1.12.1)

Updates `golang.org/x/net` from 0.0.0-20211020060615-d418f374d309 to 0.40.0
- [Commits](https://github.com/golang/net/commits/v0.40.0)

Updates `golang.org/x/text` from 0.3.7 to 0.25.0
- [Release notes](https://github.com/golang/text/releases)
- [Commits](golang/text@v0.3.7...v0.25.0)

Updates `google.golang.org/grpc` from 1.41.0 to 1.72.2
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.41.0...v1.72.2)

Updates `google.golang.org/protobuf` from 1.27.1 to 1.36.6

Updates `gopkg.in/square/go-jose.v2` from 2.3.1 to 2.5.1

Updates `gopkg.in/yaml.v3` from 3.0.0-20210107192922-496545a6307b to 3.0.1

---
updated-dependencies:
- dependency-name: github.com/coredns/coredns
  dependency-version: 1.12.2
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/golang-jwt/jwt/v4
  dependency-version: 4.5.2
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/minio/console
  dependency-version: 0.28.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/nats-io/nats-server/v2
  dependency-version: 2.10.27
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/prometheus/client_golang
  dependency-version: 1.22.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: golang.org/x/crypto
  dependency-version: 0.38.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: golang.org/x/oauth2
  dependency-version: 0.30.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: golang.org/x/sys
  dependency-version: 0.33.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/lestrrat-go/jwx
  dependency-version: 1.2.25
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: github.com/nats-io/nats-streaming-server
  dependency-version: 0.24.1
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: go.mongodb.org/mongo-driver
  dependency-version: 1.12.1
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/net
  dependency-version: 0.40.0
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: golang.org/x/text
  dependency-version: 0.25.0
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: google.golang.org/grpc
  dependency-version: 1.72.2
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: google.golang.org/protobuf
  dependency-version: 1.36.6
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: gopkg.in/square/go-jose.v2
  dependency-version: 2.5.1
  dependency-type: indirect
  dependency-group: go_modules
- dependency-name: gopkg.in/yaml.v3
  dependency-version: 3.0.1
  dependency-type: indirect
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Aug 28, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants