Skip to content

Bump github.com/tektoncd/pipeline from 0.61.0 to 1.0.1 in /prow/plugins/agent-plugin#869

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/prow/plugins/agent-plugin/github.com/tektoncd/pipeline-1.0.1
Open

Bump github.com/tektoncd/pipeline from 0.61.0 to 1.0.1 in /prow/plugins/agent-plugin#869
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/prow/plugins/agent-plugin/github.com/tektoncd/pipeline-1.0.1

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Mar 25, 2026

Bumps github.com/tektoncd/pipeline from 0.61.0 to 1.0.1.

Release notes

Sourced from github.com/tektoncd/pipeline's releases.

Tekton Pipeline release v1.0.1 "Oriental Omnidroid"

-Docs @ v1.0.1 -Examples @ v1.0.1

Installation one-liner

kubectl apply -f https://infra.tekton.dev/tekton-releases/pipeline/previous/v1.0.1/release.yaml

Attestation

The Rekor UUID for this release is 108e9186e8c5677ac065838c723ea199e9f0cc152e2c53d2430fb164dfe15d3e59766eef70923f9f

Obtain the attestation:

REKOR_UUID=108e9186e8c5677ac065838c723ea199e9f0cc152e2c53d2430fb164dfe15d3e59766eef70923f9f
rekor-cli get --uuid $REKOR_UUID --format json | jq -r .Attestation | jq .

Verify that all container images in the attestation are in the release file:

RELEASE_FILE=https://infra.tekton.dev/tekton-releases/pipeline/previous/v1.0.1/release.yaml
REKOR_UUID=108e9186e8c5677ac065838c723ea199e9f0cc152e2c53d2430fb164dfe15d3e59766eef70923f9f
Obtains the list of images with sha from the attestation
REKOR_ATTESTATION_IMAGES=$(rekor-cli get --uuid "$REKOR_UUID" --format json | jq -r .Attestation | jq -r '.subject[]|.name + ":v1.0.1@sha256:" + .digest.sha256')
Download the release file
curl -L "$RELEASE_FILE" > release.yaml
For each image in the attestation, match it to the release file
for image in $REKOR_ATTESTATION_IMAGES; do
printf $image; grep -q $image release.yaml && echo " ===> ok" || echo " ===> no match";
done

Changes

⚠️ Security Fixes

  • GHSA-j5q5-j9gm-2w5c (Critical): Path traversal in git resolver allows reading arbitrary files from the resolver pod. Fixed by validating the pathInRepo parameter to prevent directory traversal.

... (truncated)

Changelog

Sourced from github.com/tektoncd/pipeline's changelog.

Tekton Pipeline Releases

Release Frequency

Tekton Pipelines follows the Tekton community [release policy][release-policy] as follows:

  • Versions are numbered according to semantic versioning: vX.Y.Z
  • A new release is produced on a monthly basis
  • Four releases a year are chosen for long term support (LTS). All remaining releases are supported for approximately 1 month (until the next release is produced)
    • LTS releases take place in January, April, July and October every year
    • The first Tekton Pipelines LTS release will be v0.41.0 in October 2022
    • Releases happen towards the middle of the month, between the 13th and the 20th, depending on week-ends and readiness

Tekton Pipelines produces nightly builds, publicly available on gcr.io/tekton-nightly.

Transition Process

Before release v0.41 Tekton Pipelines has worked on the basis of an undocumented support period of four months, which will be maintained for the releases between v0.37 and v0.40.

Release Process

Tekton Pipeline releases are made of YAML manifests and container images. Manifests are published to cloud object-storage as well as [GitHub][tekton-pipeline-releases]. Container images are signed by [Sigstore][sigstore] via [Tekton Chains][tekton-chains]; signatures can be verified through the [public key][chains-public-key] hosted by the Tekton Chains project.

Further documentation available:

  • The Tekton Pipeline [release process][tekton-releases-docs]
  • [Installing Tekton][tekton-installation]
  • Standard for [release notes][release-notes-standards]

Release

v1.10

  • Latest Release: [v1.10.2][v1.10-2] (2026-03-18) ([docs][v1.10-2-docs], [examples][v1.10-2-examples])
  • Initial Release: [v1.10.0][v1.10-0] (2026-02-27)
  • End of Life: 2026-03-27
  • Patch Releases: [v1.10.0][v1.10-0], [v1.10.1][v1.10-1], [v1.10.2][v1.10-2]

v1.9 (LTS)

... (truncated)

Commits
  • ec77550 fix: prevent path traversal in git resolver pathInRepo parameter
  • ebc197e Fix panic in GenerateDeterministicNameFromSpec with long resolver names
  • 26b5684 tekton: update plumbing ref to latest commit
  • 1c906be chore(release-pipeline): update references to oci bucket
  • 15c4ea5 feat: upload release manifests to oracle cloud
  • 5b48325 Fix tekton/publish sed for combined-based-image digest replacement
  • 4467873 chore: centralize ko base image configuration
  • 89766c7 ci: add CI summary fan-in job for branch protection
  • 5bbc807 tekton: update plumbing ref to latest commit
  • c4e8164 tekton: update plumbing ref to include full image references fix
  • Additional commits viewable in compare view

@dependabot dependabot bot added go Pull requests that update go code dependencies labels Mar 25, 2026
@ack-prow ack-prow bot requested review from knottnt and michaelhtm March 25, 2026 18:28
@ack-prow
Copy link
Copy Markdown

ack-prow bot commented Mar 25, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot]
Once this PR has been reviewed and has the lgtm label, please assign knottnt for approval by writing /assign @knottnt in a comment. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@ack-prow ack-prow bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Mar 25, 2026
@ack-prow
Copy link
Copy Markdown

ack-prow bot commented Mar 25, 2026

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a aws-controllers-k8s member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@ack-bot ack-bot added area/dependency Issues or PRs related to dependency changes and removed dependencies labels Mar 26, 2026
Bumps [github.com/tektoncd/pipeline](https://github.com/tektoncd/pipeline) from 0.61.0 to 1.0.1.
- [Release notes](https://github.com/tektoncd/pipeline/releases)
- [Changelog](https://github.com/tektoncd/pipeline/blob/main/releases.md)
- [Commits](tektoncd/pipeline@v0.61.0...v1.0.1)

---
updated-dependencies:
- dependency-name: github.com/tektoncd/pipeline
  dependency-version: 1.0.1
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/prow/plugins/agent-plugin/github.com/tektoncd/pipeline-1.0.1 branch from 1f8af35 to 01ecb44 Compare April 6, 2026 18:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/dependency Issues or PRs related to dependency changes go Pull requests that update go code needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant