From a6ca95193bc17b365fd32047931c5ad3c2008e63 Mon Sep 17 00:00:00 2001 From: Kyma Bot Date: Mon, 18 Nov 2024 18:48:51 +0000 Subject: [PATCH] Bumping test-infra and testimages MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit No eu.gcr.io/kyma-project/test-infra/ changes. europe-docker.pkg.dev/kyma-project/prod/ changes: https://github.com/kyma-project/test-infra/compare/21ea20ee...cd35b6d0 (2024‑11‑15 → 2024‑11‑18) --- .github/actions/image-builder/action.yml | 2 +- .github/workflows/autobump-docs-index-md.yml | 2 +- .github/workflows/autobump-security-config.yaml | 2 +- .github/workflows/image-autobumper.yml | 2 +- .github/workflows/image-syncer.yml | 2 +- .github/workflows/pull-validate-kaniko-build-config.yml | 2 +- .../environments/dev/secrets-rotator/terraform.tfvars | 4 ++-- configs/terraform/environments/prod/terraform.tfvars | 4 ++-- configs/terraform/modules/cors-proxy/cors-proxy.tf | 2 +- .../github-webhook-gateway/github-webhook-gateway.tf | 2 +- .../modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf | 2 +- .../secrets-leaks-log-scanner/github-issue-creator.tf | 2 +- .../secrets-leaks-log-scanner/github-issue-finder.tf | 2 +- .../secrets-leaks-log-scanner/secrets-leak-log-scanner.tf | 2 +- .../security-dashboard-token/security-dashboard-token.tf | 2 +- .../components/automated-approver_external-plugin.yaml | 2 +- .../external-secrets/external_secrets_checker_prow.yaml | 6 +++--- prow/jobs/kyma-project/test-infra/kyma-bot.yaml | 2 +- 18 files changed, 22 insertions(+), 22 deletions(-) diff --git a/.github/actions/image-builder/action.yml b/.github/actions/image-builder/action.yml index 1ece76c13e0a..597851059119 100644 --- a/.github/actions/image-builder/action.yml +++ b/.github/actions/image-builder/action.yml @@ -82,7 +82,7 @@ runs: id: prepare-tags shell: bash - - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241115-21ea20ee + - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241118-cd35b6d0 id: build with: args: --name=${{ inputs.image-name }} --context=${{ inputs.context }} --dockerfile=${{ inputs.dockerfile }} --azure-access-token=${{ inputs.ado-token }} --oidc-token=${{ inputs.oidc-token }} ${{ steps.prepare-build-args.outputs.build-args }} ${{ steps.prepare-tags.outputs.tags }} --export-tags=${{ inputs.export-tags }} --config=${{ inputs.config }} --env-file=${{ inputs.env-file }} --build-in-ado=true --use-go-internal-sap-modules=${{ inputs.use-go-internal-sap-modules }} \ No newline at end of file diff --git a/.github/workflows/autobump-docs-index-md.yml b/.github/workflows/autobump-docs-index-md.yml index e41f5d484f08..debc078dd280 100644 --- a/.github/workflows/autobump-docs-index-md.yml +++ b/.github/workflows/autobump-docs-index-md.yml @@ -59,6 +59,6 @@ jobs: --workdir /github/test-infra \ --privileged \ --cap-drop ALL \ - europe-docker.pkg.dev/kyma-project/prod/markdown-index:v20241115-21ea20ee \ + europe-docker.pkg.dev/kyma-project/prod/markdown-index:v20241118-cd35b6d0 \ --config=${{ env.AUTOBUMP_CONFIG_PATH }} \ --labels-override=kind/chore,area/documentation diff --git a/.github/workflows/autobump-security-config.yaml b/.github/workflows/autobump-security-config.yaml index 9fe50fd813f2..65ad695801d3 100644 --- a/.github/workflows/autobump-security-config.yaml +++ b/.github/workflows/autobump-security-config.yaml @@ -71,7 +71,7 @@ jobs: --rm \ --privileged \ --cap-drop ALL \ - europe-docker.pkg.dev/kyma-project/prod/image-detector:v20241115-21ea20ee \ + europe-docker.pkg.dev/kyma-project/prod/image-detector:v20241118-cd35b6d0 \ --terraform-dir=${{ env.TERRAFORM_CONFIGS_DIR }} \ --sec-scanner-config=${{ env.SEC_SCANNERS_CONFIG_PATH }} \ --autobump-config=${{ env.AUTOBUMP_CONFIG_PATH }} diff --git a/.github/workflows/image-autobumper.yml b/.github/workflows/image-autobumper.yml index 120ad1e57882..cdcd8ec7913e 100644 --- a/.github/workflows/image-autobumper.yml +++ b/.github/workflows/image-autobumper.yml @@ -4,7 +4,7 @@ on: inputs: docker-image: description: 'Docker image with tag to be used' - default: 'europe-docker.pkg.dev/kyma-project/prod/image-autobumper:v20241115-21ea20ee' + default: 'europe-docker.pkg.dev/kyma-project/prod/image-autobumper:v20241118-cd35b6d0' type: string autobump-config-path: description: 'Path to the autobump config file, relative to the repository root' diff --git a/.github/workflows/image-syncer.yml b/.github/workflows/image-syncer.yml index a5b01b049e3b..21555d821e8a 100644 --- a/.github/workflows/image-syncer.yml +++ b/.github/workflows/image-syncer.yml @@ -100,7 +100,7 @@ jobs: --workdir /github/workspace --rm --volume "$GITHUB_WORKSPACE:/github/workspace" - europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241115-21ea20ee + europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241118-cd35b6d0 --images-file=/github/workspace/external-images.yaml --access-token=${{ steps.authenticate_in_gcp.outputs.access_token }} --dry-run=${{ steps.set_dry_run_flag.outputs.DRY_RUN }} diff --git a/.github/workflows/pull-validate-kaniko-build-config.yml b/.github/workflows/pull-validate-kaniko-build-config.yml index 77dd76a483a1..a5547b5749b1 100644 --- a/.github/workflows/pull-validate-kaniko-build-config.yml +++ b/.github/workflows/pull-validate-kaniko-build-config.yml @@ -50,7 +50,7 @@ jobs: secrets: |- ado-pat:${{ vars.GCP_KYMA_PROJECT_PROJECT_ID }}/${{ vars.IMAGE_BUILDER_ADO_PAT_GCP_SECRET_NAME }} - - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241115-21ea20ee + - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241118-cd35b6d0 id: build with: args: --name=test-infra/ginkgo --context=. --dockerfile=images/ginkgo/Dockerfile --azure-access-token=${{ steps.secrets.outputs.ado-pat }} --oidc-token=${{ steps.get_oidc.outputs.jwt }} --env-file='envs' --build-in-ado=true --test-kaniko-build-config=true --config="./configs/image-builder-client-config.yaml" \ No newline at end of file diff --git a/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars b/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars index 0950bd890bb9..493adc18060d 100644 --- a/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars +++ b/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars @@ -1,8 +1,8 @@ project_id = "sap-kyma-neighbors-dev" region = "europe-west3" service_account_keys_rotator_service_name = "service-account-keys-rotator" -service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241115-21ea20ee" #gitleaks:allow +service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241118-cd35b6d0" #gitleaks:allow service_account_keys_cleaner_service_name = "service-account-keys-cleaner" -service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241115-21ea20ee" #gitleaks:allow +service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241118-cd35b6d0" #gitleaks:allow service_account_key_latest_version_min_age = 24 service_account_keys_cleaner_scheduler_cron_schedule = "0 0 * * 1-5" diff --git a/configs/terraform/environments/prod/terraform.tfvars b/configs/terraform/environments/prod/terraform.tfvars index 750097bc1955..1eebe79f3d11 100644 --- a/configs/terraform/environments/prod/terraform.tfvars +++ b/configs/terraform/environments/prod/terraform.tfvars @@ -8,9 +8,9 @@ kyma_project_artifact_registry_collection = { }, } service_account_keys_rotator_service_name = "service-account-keys-rotator" -service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241115-21ea20ee" #gitleaks:allow +service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241118-cd35b6d0" #gitleaks:allow service_account_keys_cleaner_service_name = "service-account-keys-cleaner" -service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241115-21ea20ee" #gitleaks:allow +service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241118-cd35b6d0" #gitleaks:allow service_account_key_latest_version_min_age = 24 service_account_keys_cleaner_scheduler_cron_schedule = "0 0 * * 1-5" diff --git a/configs/terraform/modules/cors-proxy/cors-proxy.tf b/configs/terraform/modules/cors-proxy/cors-proxy.tf index bc8e1d71a28a..5ffa29e463da 100644 --- a/configs/terraform/modules/cors-proxy/cors-proxy.tf +++ b/configs/terraform/modules/cors-proxy/cors-proxy.tf @@ -28,7 +28,7 @@ resource "google_cloud_run_service" "cors_proxy" { template { spec { containers { - image = "europe-docker.pkg.dev/kyma-project/prod/cors-proxy:v20241115-21ea20ee" + image = "europe-docker.pkg.dev/kyma-project/prod/cors-proxy:v20241118-cd35b6d0" env { name = "COMPONENT_NAME" value = "cors-proxy" diff --git a/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf b/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf index 2fdff541d209..e7e738287c50 100644 --- a/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf +++ b/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf @@ -67,7 +67,7 @@ resource "google_cloud_run_service" "github_webhook_gateway" { spec { service_account_name = google_service_account.github_webhook_gateway.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/github-webhook-gateway:v20241115-21ea20ee" + image = "europe-docker.pkg.dev/kyma-project/prod/github-webhook-gateway:v20241118-cd35b6d0" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf b/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf index 49954df67f92..2fc9297d0344 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf @@ -47,7 +47,7 @@ resource "google_cloud_run_service" "gcs_bucket_mover" { spec { service_account_name = google_service_account.gcs_bucket_mover.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/move-gcs-bucket:v20241115-21ea20ee" + image = "europe-docker.pkg.dev/kyma-project/prod/move-gcs-bucket:v20241118-cd35b6d0" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf index a8f655cbd503..47a1633b91a3 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf @@ -24,7 +24,7 @@ resource "google_cloud_run_service" "github_issue_creator" { spec { service_account_name = google_service_account.github_issue_creator.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/create-github-issue:v20241115-21ea20ee" + image = "europe-docker.pkg.dev/kyma-project/prod/create-github-issue:v20241118-cd35b6d0" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf index d60e90d4569c..03f9a05cdb62 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf @@ -24,7 +24,7 @@ resource "google_cloud_run_service" "github_issue_finder" { spec { service_account_name = google_service_account.github_issue_finder.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/search-github-issue:v20241115-21ea20ee" + image = "europe-docker.pkg.dev/kyma-project/prod/search-github-issue:v20241118-cd35b6d0" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf b/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf index c816f518894d..14cf3852cd72 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf @@ -23,7 +23,7 @@ resource "google_cloud_run_service" "secrets_leak_log_scanner" { spec { service_account_name = google_service_account.secrets_leak_log_scanner.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/scan-logs-for-secrets:v20241115-21ea20ee" #gitleaks:allow + image = "europe-docker.pkg.dev/kyma-project/prod/scan-logs-for-secrets:v20241118-cd35b6d0" #gitleaks:allow env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf b/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf index a031b95e608b..e961031cbc37 100644 --- a/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf +++ b/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf @@ -31,7 +31,7 @@ resource "google_cloud_run_service" "security_dashboard_token" { template { spec { containers { - image = "europe-docker.pkg.dev/kyma-project/prod/dashboard-token-proxy:v20241115-21ea20ee" #gitleaks:allow ignore gitleaks detection + image = "europe-docker.pkg.dev/kyma-project/prod/dashboard-token-proxy:v20241118-cd35b6d0" #gitleaks:allow ignore gitleaks detection env { name = "CLIENT_SECRET" value_from { diff --git a/prow/cluster/components/automated-approver_external-plugin.yaml b/prow/cluster/components/automated-approver_external-plugin.yaml index bb809527c554..665eff7acb13 100644 --- a/prow/cluster/components/automated-approver_external-plugin.yaml +++ b/prow/cluster/components/automated-approver_external-plugin.yaml @@ -16,7 +16,7 @@ spec: spec: containers: - name: automated-approver - image: europe-docker.pkg.dev/kyma-project/prod/automated-approver:v20241115-21ea20ee + image: europe-docker.pkg.dev/kyma-project/prod/automated-approver:v20241118-cd35b6d0 imagePullPolicy: Always args: - --dry-run=false diff --git a/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml b/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml index 88c5dee256e9..74062ea35865 100644 --- a/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml +++ b/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml @@ -13,7 +13,7 @@ spec: spec: containers: - name: secret-checker-untrusted - image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241115-21ea20ee #gitleaks:allow + image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241118-cd35b6d0 #gitleaks:allow imagePullPolicy: IfNotPresent command: - /externalsecretschecker @@ -49,7 +49,7 @@ spec: spec: containers: - name: secret-checker-trusted - image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241115-21ea20ee #gitleaks:allow + image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241118-cd35b6d0 #gitleaks:allow imagePullPolicy: IfNotPresent command: - /externalsecretschecker @@ -85,7 +85,7 @@ spec: spec: containers: - name: secret-checker-prow - image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241115-21ea20ee #gitleaks:allow + image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241118-cd35b6d0 #gitleaks:allow imagePullPolicy: IfNotPresent command: - /externalsecretschecker diff --git a/prow/jobs/kyma-project/test-infra/kyma-bot.yaml b/prow/jobs/kyma-project/test-infra/kyma-bot.yaml index b5c3f364b022..851bfdd4bcc1 100644 --- a/prow/jobs/kyma-project/test-infra/kyma-bot.yaml +++ b/prow/jobs/kyma-project/test-infra/kyma-bot.yaml @@ -22,7 +22,7 @@ presubmits: # runs on PRs spec: serviceAccountName: sa-prowjob-gcp-logging-client containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/usersmapchecker:v20241115-21ea20ee" + - image: "europe-docker.pkg.dev/kyma-project/prod/usersmapchecker:v20241118-cd35b6d0" imagePullPolicy: Always securityContext: privileged: false