Skip to content

chore(deps): bump github.com/argoproj/argo-cd/v3 from 3.3.6 to 3.3.9#1142

Open
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/github.com/argoproj/argo-cd/v3-3.3.9
Open

chore(deps): bump github.com/argoproj/argo-cd/v3 from 3.3.6 to 3.3.9#1142
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/github.com/argoproj/argo-cd/v3-3.3.9

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github May 8, 2026

Bumps github.com/argoproj/argo-cd/v3 from 3.3.6 to 3.3.9.

Release notes

Sourced from github.com/argoproj/argo-cd/v3's releases.

v3.3.9

[!IMPORTANT] This release contains a security fix to a critical vulnerability: GHSA-3v3m-wc6v-x4x3

Quick Start

Non-HA:

kubectl create namespace argocd
kubectl apply -n argocd --server-side --force-conflicts -f https://raw.githubusercontent.com/argoproj/argo-cd/v3.3.9/manifests/install.yaml

HA:

kubectl create namespace argocd
kubectl apply -n argocd --server-side --force-conflicts -f https://raw.githubusercontent.com/argoproj/argo-cd/v3.3.9/manifests/ha/install.yaml

Release Signatures and Provenance

All Argo CD container images are signed by cosign. A Provenance is generated for container images and CLI binaries which meet the SLSA Level 3 specifications. See the documentation on how to verify.

Release Notes Blog Post

For a detailed breakdown of the key changes and improvements in this release, check out the official blog post

Upgrading

If upgrading from a different minor version, be sure to read the upgrading documentation.

Changelog

Bug fixes

Documentation

Dependency updates

  • 0a2ba7c4c16c711532e557bd8d796d7fda95c745: chore(deps): bump SonarSource/sonarqube-scan-action from 7.0.0 to 8.0.0 (cherry pick #27602 to release-3.3) (#27610) (@​dudinea)
  • 184b8a915ac2fc4b467395465912fc943fb5cdd7: chore(deps): bump go version to resolve CVEs (#27509) (@​crenshaw-dev)

Other work

  • fd7ecb33235498cc0913b9444d327a289a0ab218: Merge commit from fork (@​alexmt)

Full Changelog: argoproj/argo-cd@v3.3.8...v3.3.9

... (truncated)

Commits
  • 1b1bb48 Bump version to 3.3.9 on release-3.3 branch (#27619)
  • fd7ecb3 Merge commit from fork
  • 5a3a892 docs: fix progressive sync since version to reflect beta promotion in v3.3.0 ...
  • 0a2ba7c chore(deps): bump SonarSource/sonarqube-scan-action from 7.0.0 to 8.0.0 (cher...
  • 741a6f5 fix: put/get ocimetadata to/from redis cache (#27521) (cherry-pick #27589 for...
  • c89b3a9 fix(ui): prevent pod logs viewer crash on stale container index (cherry-pick ...
  • 96107fe fix: ApplicationSet DuckType Generator panics on non-string values in Clus… (...
  • 184b8a9 chore(deps): bump go version to resolve CVEs (#27509)
  • 8178655 fix(server): Avoid error when attempting a second delete operation (cherry-pi...
  • 7ae7d2c Bump version to 3.3.8 on release-3.3 branch (#27486)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/argoproj/argo-cd/v3](https://github.com/argoproj/argo-cd) from 3.3.6 to 3.3.9.
- [Release notes](https://github.com/argoproj/argo-cd/releases)
- [Changelog](https://github.com/argoproj/argo-cd/blob/master/CHANGELOG.md)
- [Commits](argoproj/argo-cd@v3.3.6...v3.3.9)

---
updated-dependencies:
- dependency-name: github.com/argoproj/argo-cd/v3
  dependency-version: 3.3.9
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels May 8, 2026
@openshift-ci openshift-ci Bot requested review from svghadi and varshab1210 May 8, 2026 04:47
@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented May 8, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign trdoyle81 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented May 8, 2026

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a redhat-developer member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work.

Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code needs-ok-to-test

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants