-
-
Notifications
You must be signed in to change notification settings - Fork 2
Update oryd/hydra Docker tag to v2 #6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
develop
Choose a base branch
from
renovate/oryd-hydra-2.x
base: develop
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
842f860 to
1d094d0
Compare
e58c2c9 to
39feb1f
Compare
39feb1f to
4f63249
Compare
f83bba0 to
4ed4739
Compare
4f63249 to
3223a72
Compare
3223a72 to
073aa90
Compare
073aa90 to
12eeae0
Compare
12eeae0 to
ad7ced8
Compare
ad7ced8 to
e32dcb3
Compare
e32dcb3 to
1958e81
Compare
1958e81 to
e3742cc
Compare
e3742cc to
2c07a8e
Compare
2c07a8e to
83156e2
Compare
83156e2 to
8aa0d53
Compare
8aa0d53 to
bd31ee8
Compare
847dcf5 to
e2de042
Compare
e2de042 to
730ff0b
Compare
91bb8ff to
6a8b697
Compare
2366d22 to
4126ac9
Compare
730ff0b to
67bbf64
Compare
67bbf64 to
290f506
Compare
290f506 to
501fd18
Compare
501fd18 to
a5d0b83
Compare
|
Important Review skippedBot user detected. To trigger a single review, invoke the You can disable this status message by setting the Comment |
a5d0b83 to
d63e531
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.11.10->v2.3.0Release Notes
ory/hydra (oryd/hydra)
v2.3.0Compare Source
We’re thrilled to announce the release of Ory Hydra 2.3.0! This version comes packed with graceful token refresh, performance improvements, and fixes that enhance stability, reduce database load, and streamline the developer experience. We strongly recommend upgrading to take advantage of these enhancements and ensure the best possible OAuth2 and OpenID Connect experience with Ory Hydra. Thank you to everyone who contributed!
Ory Hydra now supports graceful refresh token rotation, making OAuth2 and OpenID Connect refresh flows significantly more resilient in scenarios such as Single Page Apps and IoT. Even in highly distributed or concurrent environments, Hydra gracefully handles token refreshes reliably, ensuring tokens are not dropped or double-used.
PRs: #3860, #3895
Previously, the
redirect_uriwas not required when performing flows withscope=openid. This release enforces the requirement to comply with the OpenID Connect standard.PR: #3900
Hydra now supports explicit SQL migration commands
migrate sql up|down|statusthat streamline database schema management and help with zero-downtime upgrades.PR: #3894
The CLI introduces new parameters and an option to specify a custom client ID on creation, making it easier to manage and script Hydra deployments.
PRs: #3718, #3725, #3874
hydra perform authorization-codeA minimal built-in UI for login and consent can be enabled when testing with the CLI, removing the need to spin up a separate service.
PR: #3845
Unused indices have been removed, down migration scripts renamed for consistency, and all migrations are more efficient overall.
PRs: #3859, #3911
Improve persistence logic – Database transactions and concurrency have been improved across the authorization and token handlers.
PRs: #3756, #3763, #3886
Support for more claims in password grant – You can now include additional claims in the password grant flow, providing extra flexibility in advanced scenarios. Only available with an Ory Enterprise License.
PR: #3864
Transaction Wrappers
Authorization and token issuance are now wrapped more consistently to prevent partial writes and race conditions.
PRs: #3730, #3763
Improved Docker setup
Docker configurations have been refined, removing inconsistencies in the Compose setup and enabling a fully static binary build.
PRs: #3826, #3924
Proper JSON round-tripping
Fixed an issue causing custom claims to break if they were nested or unexpectedly typed. JSON round-trips are now correct.
PR: #3819
Speed up public key retrieval
Reduced overhead for the JWK public endpoint, solving CPU contention issues in large-scale deployments.
PRs: #3787, #3870
Fix Docker Compose references
The CLI now properly references
docker composeinstead ofdocker-compose, ensuring compatibility with modern Docker setups.PR: #3815
Dependency upgrades
Bumped
fosite,ory/x,pgx/v5, and various third-party libraries for improved stability and performance.Updated docs
Updated examples, improved JWK documentation, added notes on Docker Compose usage, and refined OpenID Connect discovery docs.
More tracing context
Tracing calls have been consistently standardized with
otelx.End(), and additional context ensures better observability.Code generation & housekeeping
Various housekeeping tasks: pinned GHA versions, fixed minor comment typos, updated newsletters/links, and more.
To upgrade to 2.3.0, follow the usual steps:
v2.3.0.hydra migrate sql up(if using the new commands) or your usual migration procedure.Check the migration docs for detailed information.
As always, we love hearing from our community. Here are some ways to get involved:
Thanks to all contributors for making Ory Hydra the best-in-class OAuth2 and OpenID Connect server.
For Ory Hydra v2.4.0 we are looking at another highly anticipated community-contributed feature, the OAuth 2.0 Device Authorization Grant!
Full Changelog: v2.2.0...v2.3.0
Happy building with Ory Hydra!
Breaking Changes
Going forward, OAuth2 Clients requesting an OpenID Connect flow must include the
redirect_uriparameter or the request will be rejected.Deleting consents no longer returns 404 in certain edge cases but instead always 204.
Bug Fixes
Advertise support for response_mode=form_post in OIDC discovery document (#3861) (9cc5f28)
Broken JSON round-tripping for custom claims (b36b701):
Adding custom claims with numerical types (think JavaScript Number) previously did not
round-trip through Hydra correctly. For example, passing UNIX timestamps in custom claims
would end up as floating points in exponential notation in the final token. That, in turn,
confused or broke downstream consumers of the token, including Kratos.
Ref go-jose/go-jose#144
Change comment on revokeOAuth2LoginSessions (#3853) (6d829dd)
Change index name in down migration (#3911) (3a09db2)
Correct span names (554238b)
Correctly pass multiple token audiences and prompt parameters when performing the authorization code flow from the CLI (#3736) (632faef)
Cpu contention when reading JWKs and suppress generating duplicate JWKs (#3870) (d5f65c5):
Previously each concurrent caller would need to lock a shared mutex when reading or writing a given JWK set.
The read path now doesn't require locking a mutex at all and instead returns valid query results directly.
The write path is now protected by a concurrency control mechanism (using x/sync/singleflight) to ensure only one JWK set is generated and persisted.
Note: Duplicate JWK sets may still be improperly generated if running more than one Hydra instance in a high traffic environment.
Do not iteratively delete records (#3766) (5ef20a2):
Resolves performance issues on some databases when deleting consent.
Do not retry sending responses (#3764) (1bbfdb5)
docs: Adjust note about SDK support on oauth2 flow endpoints (#3812) (d0e047c)
Error log when RP responds with status code 204 (#3731) (153e4b5)
Faster GetPublicKeys (#3787) (04c34aa):
GetPublicKeys used to fetch all keys in a set, even if they were actually not being used. This patch fixes that.
Improve docker set up (#3924) (8ca6cbd), closes #3914 #3683:
Improves the docker set up and removes some unused files.
Incorrect context passthru (fa50e3e)
Incorrect indices (#3778) (cb0004b)
Limit HTTP response size (2559819)
Omit explicit transaction in ConfirmLoginSession and add tracing (#3886) (a5b2d75)
Pass context to database ping (fa21711)
Require
redirect_uriin openid requests (#3900) (5caa629):Resolves a deviation from the OpenID Connect spec, where the
redirect_uriwas not required when performing flows withscope=openid.Untyped int build issues on 32bit architectures (#3885) (68aa167)
Upgrade fosite and improve webhook integration (#3727) (89323e2)
Use docker compose rather than docker-compose (#3815) (ffdfb73)
Wrap authorize response in transaction (#3763) (5b106aa)
Wrap token handler in transaction (#3730) (67a85cc)
Code Generation
Documentation
Features
Add access token strategy parameter to cli (#3718) (7862dc3), closes #3717
Add expiry and requested times to logout table (#3837) (f83193f)
Add id parameter to create oauth2-client cli (#3725) (b372fd2):
Fixes #3724
Add Inspect option to registry (2013450)
Add migrate sql up|down|status (#3894) (d27882f):
This patch adds the ability to execute down migrations using:
Please read
hydra migrate sql down --helpcarefully.Going forward, please use the following commands
instead of the previous, now deprecated
commands.
See ory-corp/cloud#7350
Built-in login/consent UI for
hydra perform authorization-code(#3845) (7f8bd90)Graceful refresh token rotation (#3860) (e278b40), closes #1831 #3770:
This patch adds a configuration flag which enables graceful refresh token rotation. Previously, refresh tokens could only be used once. On reuse, all tokens of that chain would be revoked.
This is particularly challenging in environments, where it's difficult to make guarantees on synchronization. This could lead to refresh tokens being sent twice due to some parallel execution.
To resolve this, refresh tokens can now be graceful by changing
oauth2.grant.refresh_token.grace_period=10s(example value). During this time, a refresh token can be used multiple times to generate new refresh, ID, and access tokens.All tokens will correctly be invalidated, when the refresh token is re-used after the grace period expires, or when the delete consent endpoint is used.
Handle concurrent refreshes and improve graceful refreshing (#3895) (0a6c966):
This patch improves Ory Hydra's ability to deal with refresh flows which, for example, concurrently refresh the same token. Furthermore, graceful token refresh has been improved to handle a variety of edge cases and scenarios.
Additionally, serializability errors in CockroachDB are now correctly retried.
See ory-corp/cloud#7311
Closes #3895
Improve persistence logic (#3756) (50301e0)
Reduce size of verifiers (#3857) (0cd00dc)
Remove unused indices (#3859) (56fc3da)
Support more claims in password grant (#3864) (41476ec):
For the resource owner password grant, the Kratos identity ID is now written to the sub claim, and the username is written to the ext.username claim. Further, token hooks are called for the initial token issuance as well as refresh flows for access tokens issued via the resource owner password grant, allowing users to customize the fields present in the access token (for the jwt strategy) as well as on introspection.
Update clients from files through the CLI (#3874) (f777fd1)
Upgrade to jackc/pgx/v5 (#3798) (cd7e7ef)
Tests
Unclassified
Artifacts can be verified with cosign using this public key.
v2.2.0Compare Source
Ory Hydra, the OAuth2 and OpenID Connect server designed for web-scale deployments introduces over 6x higher OAuth2 throughput on a single PostgreSQL instance!
Want to check out Ory Hydra yourself? Try common OAuth2 flows in the Ory OAuth2 Get Started guide!
This version significantly enhances performance, processing over 6x more authorization flows than version 2.1, thanks to architectural improvements that minimize database interactions for login and consent processes.
Key improvements include:
Thank all contributors who have made this release available!
Bug Fixes
Return empty slice if requested_scope or audience is null (#3711) (65165e7)
Correct id token type in token exchange response (#3625) (d1f9ba8):
Closes ory/client-go#2
Dropped persistence/sql test errors (#3670) (22f0119)
Handle logout double-submit gracefully (#3675) (5133cf9)
Handle subject mismatch gracefully (#3619) (af0d477):
We now redirect to the original request URL if the subjects between
the remembered Hydra session and what was confirmed by the login
screen does not match.
Handle token hook auth config (#3677) (1a40833):
Improved SSRF protection (#3669) (24c3be5)
Incorrect down migration (#3708) (8812e0e), closes /github.com/ory/hydra/pull/3705#discussion_r1471514014
Remove required mark (#3693) (3a764a0)
Timeout in jwt-bearer grants when too many grants are available (#3692) (a748797)
Verifiable credentials JWT format (#3614) (0176adc)
Add exceptions for internal IP addresses (#3608) (1f1121c)
Add kid to verifiable credential header (#3606) (9f1c8d1)
Deflake ttl test (6741a49)
Docker build (#3609) (01ff9da)
Enable CORS with hot-reloaded origins (#3601) (6f592fc)
Only query access tokens by hashed signature (a21e945)
Racy random string generation (#3555) (1b26c4c)
Reject invalid JWKS in client configuration / dependency cleanup and bump (#3603) (1d73d83)
Restore ability to override auth and token urls for exemplary app (#3590) (dfb129a)
Return proper error when the grant request cannot be parsed (#3558) (26f2d34)
Use correct tracer in middleware (#3567) (807cbd2)
Documentation
Features
Add --skip-logout-consent flag to CLI (#3709) (f502d6e)
Add authentication options to hooks (#3633) (5c8e792)
Add flag to export public keys (#3684) (62c006b)
Add missing index for jwk table (#3691) (39ee5e1)
Add prompt=registration (#3636) (19857d2):
Ory Hydra now supports a
registrationvalue for thepromptparameter ofthe authorization request. When specifying
prompt=registration, Ory Hydrawill redirect the user to the URL found under
urls.registration(instead of
urls.login).Add skip_logout_consent option to clients (#3705) (2a653e6):
Adds a special field which disables the logout consent screen when performing OIDC logout.
Allow injecting extra fosite strategies (#3646) (88b0b7c)
Re-enable legacy client IDs (#3628) (5dd7d30):
This patch changes the primary key of the
hydra_clienttable. We do not expect issues, as that table is probably not overly huge in any deployment. We do however highly recommend to test the migration performance on a staging environment with a similar database setup.Remove flow cookie (#3639) (cde3a30):
This patch removes the flow cookie. All information is already tracked in the request query parameters as part of the {login|consent}_{challenge|verifier}.
Remove login session cookie during consent flow (#3667) (5f41949)
Support multiple token URLs (#3676) (95cc273)
Add
hydra migrate statussubcommand (#3579) (749eb8d)Add more resolution to events and collect client metrics (#3568) (466e66b)
Add state override (b8b9154)
Add support for OIDC VC (#3575) (219a7c0):
This adds initial support for issuing verifiable credentials
as specified in https://openid.net/specs/openid-connect-userinfo-vc-1_0.html.
Because the spec is still in draft, public identifiers are
suffixed with
draft_00.Allow additional SQL migrations (#3587) (8900cbb)
Allow Go migrations (#3602) (8eed306)
Allow to disable claim mirroring (#3563) (c72a316):
This PR introduces another config option called
oauth2:mirror_top_level_claimswhich may be used to disable the mirroring of custom claims into theextclaim of the jwt.This new config option is an opt-in. If unused the behavior remains as-is to ensure backwards compatibility.
Example:
Closes #3348
Bump fosite and add some more tracing (0b56f53)
cmd: Add route that redirects to the auth code url (4db6416)
Parallel generation of JSON web key set (#3561) (5bd9002)
Propagate logout to identity provider (#3596) (c004fee):
This commit improves the integration between Hydra and Kratos when logging
out the user.
This adds a new configuration key for configuring a Kratos admin URL.
Additionally, Kratos can send a session ID when accepting a login request.
If a session ID was specified and a Kratos admin URL was configured,
Hydra will disable the corresponding Kratos session through the admin API
if a frontchannel or backchannel logout was triggered.
Support different jwt scope claim strategies (#3531) (45da11e)
Changelog
b346f90autogen(docs): generate and bump docs01aeffcautogen(docs): regenerate and update changelog3a65840autogen(docs): regenerate and update changelog2dc52b4autogen(docs): regenerate and update changelog7473259autogen(docs): regenerate and update changelog4b8c971autogen(docs): regenerate and update changelogd0dfc0fautogen(docs): regenerate and update changelog9e9be2dautogen(docs): regenerate and update changelogada59a5autogen(docs): regenerate and update changelogcdd2647autogen(docs): regenerate and update changeloge4c160fautogen(docs): regenerate and update changelog5121dbaautogen(docs): regenerate and update changelog21e0a9bautogen(docs): regenerate and update changelog89b1b1bautogen(docs): regenerate and update changelog0a5e043autogen(docs): regenerate and update changelog6cbe089autogen(docs): regenerate and update changelog7861702autogen(docs): regenerate and update changelogc9f4b5fautogen(docs): regenerate and update changelogfe260d1autogen(docs): regenerate and update changelogfbf39ddautogen(docs): regenerate and update changelog9b33fc5autogen(docs): regenerate and update changelogf9cee32autogen(docs): regenerate and update changelog841d58bautogen(docs): regenerate and update changelog4a8e9a4autogen(docs): regenerate and update changelogcdc0becautogen(openapi): regenerate swagger spec and internal client4a00e3eautogen(openapi): regenerate swagger spec and internal clientdedcf5bautogen(openapi): regenerate swagger spec and internal client92eb03aautogen(openapi): regenerate swagger spec and internal clientf9a87d3autogen(openapi): regenerate swagger spec and internal client1ff8f20autogen(openapi): regenerate swagger spec and internal client11bf9dfautogen(openapi): regenerate swagger spec and internal cliente796893autogen(openapi): regenerate swagger spec and internal client27f2ef5autogen(openapi): regenerate swagger spec and internal client35d6295autogen(openapi): regenerate swagger spec and internal clientce00a42autogen(openapi): regenerate swagger spec and internal clientdb4fd7dautogen(openapi): regenerate swagger spec and internal client146b162autogen(openapi): regenerate swagger spec and internal cliente1636d1autogen(openapi): regenerate swagger spec and internal client9389773autogen(openapi): regenerate swagger spec and internal clientaf859feautogen(openapi): regenerate swagger spec and internal clientf1708f2autogen(openapi): regenerate swagger spec and internal client3e8413eautogen(openapi): regenerate swagger spec and internal client11c8c72autogen(openapi): regenerate swagger spec and internal client800ce0aautogen: add v2.2.0-rc.3 to version.schema.json8168ee3autogen: pin v2.2.0-pre.1 release commit0487217autogen: render config schemaa0c06ecchore(deps): bump @cypress/request and cypress (#3641)b177f81chore(deps): bump axios and @openapitools/openapi-generator-cli (#3701)23c8194chore(deps): bump debug from 3.2.6 to 3.2.7 (#3640)18d9793chore(deps): bump follow-redirects in /test/e2e/oauth2-client (#3697)4fa2889chore(deps): bump github.com/docker/docker (#3707)2ba3547chore(deps): bump golang.org/x/crypto from 0.15.0 to 0.17.0 (#3680)efc00a8chore(deps): bump golang.org/x/net from 0.14.0 to 0.17.0 (#3645)083c90dchore: build tag (#3613)3615e3dchore: bump docker base images (#3632)aa8a364chore: bump openapi-generator (#3696)2dc6606chore: improve context (#3656)8e94929chore: update otel (#3686)f0501d2docs: fix typo (#3649)f502d6efeat: add --skip-logout-consent flag to CLI (#3709)5c8e792feat: add authentication options to hooks (#3633)62c006bfeat: add flag to export public keys (#3684)39ee5e1feat: add missing index for jwk table (#3691)19857d2feat: add prompt=registration (#3636)2a653e6feat: add skip_logout_consent option to clients (#3705)88b0b7cfeat: allow injecting extra fosite strategies (#3646)5dd7d30feat: re-enable legacy client IDs (#3628)cde3a30feat: remove flow cookie (#3639)5f41949feat: remove login session cookie during consent flow (#3667)95cc273feat: support multiple token URLs (#3676)d1f9ba8fix: correct id token type in token exchange response (#3625)22f0119fix: dropped persistence/sql test errors (#3670)5133cf9fix: handle logout double-submit gracefully (#3675)af0d477fix: handle subject mismatch gracefully (#3619)1a40833fix: handle token hook auth config (#3677)24c3be5fix: improved SSRF protection (#3669)8812e0efix: incorrect down migration (#3708)3a764a0fix: remove required mark (#3693)a748797fix: timeout in jwt-bearer grants when too many grants are available (#3692)0176adcfix: verifiable credentials JWT format (#3614)8e6c4bfautogen(docs): regenerate and update changelog33950dbautogen(docs): regenerate and update changelog28e9e31autogen(openapi): regenerate swagger spec and internal client57096beautogen: pin v2.2.0 release commitbfc05d0chore(deps): bump github.com/opencontainers/runc from 1.1.8 to 1.1.12 (#3710)65165e7fix: return empty slice if requested_scope or audience is null (#3711)Artifacts can be verified with cosign using this public key.
v2.1.2Compare Source
We are excited to announce the next Ory Hydra release! This release includes the following important changes:
We appreciate your continuous support and feedback. Please feel free to reach out to us with any further suggestions or issues.
Bug Fixes
Add index on requested_at for refresh tokens and use it in janitor (#3516) (5b8e712)
Disable health check request logs (#3496) (eddf7f3)
Do not use prepared SQL statements and bump deps (#3506) (31b9e66)
Proper SameSite=None in dev mode (#3502) (5751fae)
Sqa config values unified across projects (#3490) (1b1899e)
sql: Incorrect JWK query (#3499) (13ce0d6):
persister_grant_jwkhad an OR statement without bracket leading to not using the last part of the query.Code Generation
Documentation
Features
Changelog
0e84c24autogen(docs): generate and bump docs9f37172autogen(docs): regenerate and update changelog872720bautogen(docs): regenerate and update changelog4907223autogen(docs): regenerate and update changelogba45af0autogen(docs): regenerate and update changelog3703e5aautogen(docs): regenerate and update changelogca85a17autogen(docs): regenerate and update changelog0e7e95fautogen(docs): regenerate and update changelogbe8f726autogen: add v2.1.1 to version.schema.jsond94ed6eautogen: pin v2.1.2 release commit20c6fa7autogen: render config schema400b9afchore(deps): bump @nestjs/core and @openapitools/openapi-generator-cli (#3493)f2f007dchore(deps): bump github.com/docker/distribution (#3514)b69a332chore: bump ory/x (#3518)cf20054chore: remove unneeded dependency (#3494)e2b7665chore: update nodemon version for oauth2 client (#3503)b71a36bdocs: incorrect json output format example (#3497)083d518feat: add --skip-consent flag to hydra cli (#3492)13ce0d6fix(sql): incorrect JWK query (#3499)5b8e712fix: add index on requested_at for refresh tokens and use it in janitor (#3516)eddf7f3fix: disable health check request logs (#3496)31b9e66fix: do not use prepared SQL statements and bump deps (#3506)5751faefix: proper SameSite=None in dev mode (#3502)1b1899efix: sqa config values unified across projects (#3490)Artifacts can be verified with cosign using this public key.
v2.1.1Compare Source
We are excited to share this year's Q1 release of Ory Hydra: v2.1!
Highlights:
Don't want to run the upgrade yourself? Switch to Ory Network!
Bug Fixes
Code Generation
Changelog
df16a26autogen(docs): generate and bump docsed2ac06autogen(docs): regenerate and update changelog6078f85autogen(docs): regenerate and update changelogddfbd65autogen: add v2.1.0 to version.schema.json6efae7cautogen: pin v2.1.1 release commitad549d6autogen: pin v2.1.1 release commit2f7cda5autogen: render config schema0448284chore: update ory/x (#3480)8720b25fix: double-hashed access token signatures (#3486)6e1f545fix: reduce SQL tracing noise (#3481)Artifacts can be verified with cosign using this public key.
v2.1.0Compare Source
We are excited to share this year's Q1 release of Ory Hydra: v2.1.0!
Highlights:
Don't want to run the upgrade yourself? Switch to Ory Network!
Bug Fixes
Code Generation
Configuration
📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM, only on Monday ( * 0-3 * * 1 ) (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.