From 13a9e313f33b165da0077302ca183a364999ec53 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Wed, 8 May 2024 14:31:21 +0000 Subject: [PATCH] build(deps): bump golang.org/x/image from 0.15.0 to 0.16.0 Bumps [golang.org/x/image](https://github.com/golang/image) from 0.15.0 to 0.16.0. - [Commits](https://github.com/golang/image/compare/v0.15.0...v0.16.0) --- updated-dependencies: - dependency-name: golang.org/x/image dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] --- go.mod | 2 +- go.sum | 4 ++-- vendor/golang.org/x/image/tiff/reader.go | 2 +- vendor/modules.txt | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/go.mod b/go.mod index d6853ce926..66894bc4fa 100644 --- a/go.mod +++ b/go.mod @@ -102,7 +102,7 @@ require ( go.opentelemetry.io/otel/trace v1.26.0 golang.org/x/crypto v0.23.0 golang.org/x/exp v0.0.0-20240205201215-2c58cdc269a3 - golang.org/x/image v0.15.0 + golang.org/x/image v0.16.0 golang.org/x/net v0.25.0 golang.org/x/oauth2 v0.20.0 golang.org/x/sync v0.7.0 diff --git a/go.sum b/go.sum index 7b9f2d523a..af062d236a 100644 --- a/go.sum +++ b/go.sum @@ -2211,8 +2211,8 @@ golang.org/x/image v0.0.0-20210607152325-775e3b0c77b9/go.mod h1:023OzeP/+EPmXeap golang.org/x/image v0.0.0-20210628002857-a66eb6448b8d/go.mod h1:023OzeP/+EPmXeapQh35lcL3II3LrY8Ic+EFFKVhULM= golang.org/x/image v0.0.0-20211028202545-6944b10bf410/go.mod h1:023OzeP/+EPmXeapQh35lcL3II3LrY8Ic+EFFKVhULM= golang.org/x/image v0.0.0-20220302094943-723b81ca9867/go.mod h1:023OzeP/+EPmXeapQh35lcL3II3LrY8Ic+EFFKVhULM= -golang.org/x/image v0.15.0 h1:kOELfmgrmJlw4Cdb7g/QGuB3CvDrXbqEIww/pNtNBm8= -golang.org/x/image v0.15.0/go.mod h1:HUYqC05R2ZcZ3ejNQsIHQDQiwWM4JBqmm6MKANTp4LE= +golang.org/x/image v0.16.0 h1:9kloLAKhUufZhA12l5fwnx2NZW39/we1UhBesW433jw= +golang.org/x/image v0.16.0/go.mod h1:ugSZItdV4nOxyqp56HmXwH0Ry0nBCpjnZdpDaIHdoPs= golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU= golang.org/x/lint v0.0.0-20190301231843-5614ed5bae6f/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= diff --git a/vendor/golang.org/x/image/tiff/reader.go b/vendor/golang.org/x/image/tiff/reader.go index f31569b6da..0ad1552909 100644 --- a/vendor/golang.org/x/image/tiff/reader.go +++ b/vendor/golang.org/x/image/tiff/reader.go @@ -40,7 +40,7 @@ var errNoPixels = FormatError("not enough pixel data") const maxChunkSize = 10 << 20 // 10M -// safeReadtAt is a verbatim copy of internal/saferio.ReadDataAt from the +// safeReadAt is a verbatim copy of internal/saferio.ReadDataAt from the // standard library, which is used to read data from a reader using a length // provided by untrusted data, without allocating the entire slice ahead of time // if it is large (>maxChunkSize). This allows us to avoid allocating giant diff --git a/vendor/modules.txt b/vendor/modules.txt index e7ce86efde..4a04c16f08 100644 --- a/vendor/modules.txt +++ b/vendor/modules.txt @@ -2071,7 +2071,7 @@ golang.org/x/crypto/ssh/knownhosts golang.org/x/exp/constraints golang.org/x/exp/maps golang.org/x/exp/slices -# golang.org/x/image v0.15.0 +# golang.org/x/image v0.16.0 ## explicit; go 1.18 golang.org/x/image/bmp golang.org/x/image/ccitt