Skip to content

Commit 7cb0e26

Browse files
authored
Merge branch 'main' into apr-7-minor-updates
2 parents 904ac4b + 87b8a58 commit 7cb0e26

File tree

56 files changed

+2864
-943
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+2864
-943
lines changed

.github/workflows/build-oss.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ jobs:
9999

100100
- name: Docker meta
101101
id: meta
102-
uses: docker/metadata-action@507c2f2dc502c992ad446e3d7a5dfbe311567a96 # v4.3.0
102+
uses: docker/metadata-action@c4ee3adeed93b1fa6a762f209fb01608c1a22f1e # v4.4.0
103103
with:
104104
images: |
105105
name=nginx/nginx-ingress
@@ -151,7 +151,7 @@ jobs:
151151
IC_VERSION=${{ github.event_name == 'pull_request' && 'CI' || steps.meta.outputs.version }}
152152
153153
- name: Run Trivy vulnerability scanner
154-
uses: aquasecurity/trivy-action@1f0aa582c8c8f5f7639610d6d38baddfea4fdcee # 0.9.2
154+
uses: aquasecurity/trivy-action@e5f43133f6e8736992c9f3c1b3296e24b37e17f2 # 0.10.0
155155
continue-on-error: true
156156
with:
157157
image-ref: nginx/nginx-ingress:${{ steps.meta.outputs.version }}
@@ -160,7 +160,7 @@ jobs:
160160
ignore-unfixed: "true"
161161

162162
- name: Upload Trivy scan results to GitHub Security tab
163-
uses: github/codeql-action/upload-sarif@7df0ce34898d659f95c0c4a09eaa8d4e32ee64db # v2.2.12
163+
uses: github/codeql-action/upload-sarif@b2c19fb9a2a485599ccf4ed5d65527d94bc57226 # v2.3.0
164164
continue-on-error: true
165165
with:
166166
sarif_file: "trivy-results-${{ inputs.image }}.sarif"

.github/workflows/build-plus.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ jobs:
7474

7575
- name: Docker meta
7676
id: meta
77-
uses: docker/metadata-action@507c2f2dc502c992ad446e3d7a5dfbe311567a96 # v4.3.0
77+
uses: docker/metadata-action@c4ee3adeed93b1fa6a762f209fb01608c1a22f1e # v4.4.0
7878
with:
7979
images: |
8080
name=gcr.io/f5-gcs-7899-ptg-ingrss-ctlr/dev/nginx-ic${{ contains(inputs.nap_modules, 'dos') && '-dos' || '' }}${{ contains(inputs.nap_modules, 'waf') && '-nap' || '' }}/nginx-plus-ingress
@@ -152,7 +152,7 @@ jobs:
152152
${{ inputs.nap_modules != '' && contains(inputs.image, 'ubi') && format('"rhel_license={0}"', secrets.RHEL_LICENSE) || '' }}
153153
154154
- name: Run Trivy vulnerability scanner
155-
uses: aquasecurity/trivy-action@1f0aa582c8c8f5f7639610d6d38baddfea4fdcee # 0.9.2
155+
uses: aquasecurity/trivy-action@e5f43133f6e8736992c9f3c1b3296e24b37e17f2 # 0.10.0
156156
continue-on-error: true
157157
with:
158158
image-ref: docker.io/${{ inputs.image }}:${{ steps.meta.outputs.version }}
@@ -161,7 +161,7 @@ jobs:
161161
ignore-unfixed: 'true'
162162

163163
- name: Upload Trivy scan results to GitHub Security tab
164-
uses: github/codeql-action/upload-sarif@7df0ce34898d659f95c0c4a09eaa8d4e32ee64db # v2.2.12
164+
uses: github/codeql-action/upload-sarif@b2c19fb9a2a485599ccf4ed5d65527d94bc57226 # v2.3.0
165165
continue-on-error: true
166166
with:
167167
sarif_file: 'trivy-results-${{ inputs.image }}.sarif'

.github/workflows/ci.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ jobs:
7373
- name: Run Tests
7474
run: make cover
7575
- name: Upload coverage to Codecov
76-
uses: codecov/codecov-action@40a12dcee2df644d47232dde008099a3e9e4f865 # v3.1.2
76+
uses: codecov/codecov-action@894ff025c7b54547a9a2a1e9f228beae737ad3c2 # v3.1.3
7777
with:
7878
files: ./coverage.txt
7979

@@ -232,7 +232,7 @@ jobs:
232232
{\"image\": \"debian-plus-nap\", \"marker\": \"appprotect\"}], \
233233
\"k8s\": [\"${{ needs.checks.outputs.k8s_latest }}\"]}" >> $GITHUB_OUTPUT
234234
else
235-
echo "matrix={\"k8s\": [\"1.22.15\", \"1.23.13\", \"1.24.7\", \"1.25.3\", \"${{ needs.checks.outputs.k8s_latest }}\"], \
235+
echo "matrix={\"k8s\": [\"1.22.17\", \"1.23.17\", \"1.24.12\", \"1.25.8\", \"1.26.3\", \"${{ needs.checks.outputs.k8s_latest }}\"], \
236236
\"images\": [{\"image\": \"debian\"}, {\"image\": \"debian-plus\"}]}" >> $GITHUB_OUTPUT
237237
fi
238238

.github/workflows/codeql-analysis.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ jobs:
3636

3737
# Initializes the CodeQL tools for scanning.
3838
- name: Initialize CodeQL
39-
uses: github/codeql-action/init@7df0ce34898d659f95c0c4a09eaa8d4e32ee64db # v2.2.12
39+
uses: github/codeql-action/init@b2c19fb9a2a485599ccf4ed5d65527d94bc57226 # v2.3.0
4040
with:
4141
languages: ${{ matrix.language }}
4242
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -47,7 +47,7 @@ jobs:
4747
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
4848
# If this step fails, then you should remove it and run the build manually (see below)
4949
- name: Autobuild
50-
uses: github/codeql-action/autobuild@7df0ce34898d659f95c0c4a09eaa8d4e32ee64db # v2.2.12
50+
uses: github/codeql-action/autobuild@b2c19fb9a2a485599ccf4ed5d65527d94bc57226 # v2.3.0
5151

5252
# ℹ️ Command-line programs to run using the OS shell.
5353
# 📚 https://git.io/JvXDl
@@ -61,4 +61,4 @@ jobs:
6161
# make release
6262

6363
- name: Perform CodeQL Analysis
64-
uses: github/codeql-action/analyze@7df0ce34898d659f95c0c4a09eaa8d4e32ee64db # v2.2.12
64+
uses: github/codeql-action/analyze@b2c19fb9a2a485599ccf4ed5d65527d94bc57226 # v2.3.0

.github/workflows/scorecards.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,6 @@ jobs:
5353

5454
# Upload the results to GitHub's code scanning dashboard.
5555
- name: "Upload to code-scanning"
56-
uses: github/codeql-action/upload-sarif@7df0ce34898d659f95c0c4a09eaa8d4e32ee64db # v2.2.12
56+
uses: github/codeql-action/upload-sarif@b2c19fb9a2a485599ccf4ed5d65527d94bc57226 # v2.3.0
5757
with:
5858
sarif_file: results.sarif

.pre-commit-config.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ repos:
4545
- id: golangci-lint
4646
args: [--new-from-patch=/tmp/diff.patch]
4747
- repo: https://github.com/asottile/pyupgrade
48-
rev: v3.3.1
48+
rev: v3.3.2
4949
hooks:
5050
- id: pyupgrade
5151
- repo: https://github.com/PyCQA/isort

cmd/nginx-ingress/flags.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -289,6 +289,7 @@ func initialChecks() {
289289
if err != nil {
290290
glog.Fatalf("Failed startup check: %v", err)
291291
}
292+
glog.Info("AWS startup check passed")
292293
}
293294

294295
glog.Infof("Starting with flags: %+q", os.Args[1:])

deployments/common/crds/appprotectdos.f5.com_dosprotectedresources.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
22
kind: CustomResourceDefinition
33
metadata:
44
annotations:
5-
controller-gen.kubebuilder.io/version: v0.11.3
6-
creationTimestamp: null
5+
controller-gen.kubebuilder.io/version: v0.11.4
76
name: dosprotectedresources.appprotectdos.f5.com
87
spec:
98
group: appprotectdos.f5.com

deployments/common/crds/externaldns.nginx.org_dnsendpoints.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
22
kind: CustomResourceDefinition
33
metadata:
44
annotations:
5-
controller-gen.kubebuilder.io/version: v0.11.3
6-
creationTimestamp: null
5+
controller-gen.kubebuilder.io/version: v0.11.4
76
name: dnsendpoints.externaldns.nginx.org
87
spec:
98
group: externaldns.nginx.org

deployments/common/crds/k8s.nginx.org_globalconfigurations.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
22
kind: CustomResourceDefinition
33
metadata:
44
annotations:
5-
controller-gen.kubebuilder.io/version: v0.11.3
6-
creationTimestamp: null
5+
controller-gen.kubebuilder.io/version: v0.11.4
76
name: globalconfigurations.k8s.nginx.org
87
spec:
98
group: k8s.nginx.org

0 commit comments

Comments
 (0)