Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade golang from 1.18 to 1.20 #60

Open
wants to merge 32 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
32 commits
Select commit Hold shift + click to select a range
1f6b3b6
Publish to GitHub registry on push to main in forks
kaovilai Mar 22, 2022
8bf4390
Merge pull request #5 from vmware-tanzu/main
kaovilai Aug 16, 2022
aa26702
Merge pull request #6 from vmware-tanzu/main
kaovilai Aug 18, 2022
a15bd15
Merge branch 'vmware-tanzu:main' into main
kaovilai Oct 3, 2022
9186688
Merge branch 'vmware-tanzu:main' into main
kaovilai Oct 13, 2022
cb8995d
Create sync-fork.yml
kaovilai Oct 14, 2022
2e7afc2
Update sync-fork.yml
kaovilai Oct 14, 2022
b431867
Update sync-fork.yml
kaovilai Oct 14, 2022
b1e6405
Update sync-fork.yml
kaovilai Oct 14, 2022
7decb43
Update sync-fork.yml
kaovilai Oct 14, 2022
bff332e
Update sync-fork.yml
kaovilai Oct 14, 2022
a7a74d5
Merge pull request #12 from vmware-tanzu/main
kaovilai Oct 17, 2022
53129a9
Merge pull request #13 from vmware-tanzu/main
kaovilai Oct 17, 2022
78833eb
Merge pull request #14 from vmware-tanzu/main
kaovilai Oct 18, 2022
1289269
Create dependabot.yml
kaovilai Oct 18, 2022
def9034
Update dependabot.yml
kaovilai Oct 18, 2022
898451d
Create codeql.yml
kaovilai Oct 18, 2022
799dd34
Update codeql.yml
kaovilai Oct 18, 2022
b3d3e84
Update auto-assignees.yml
kaovilai Oct 18, 2022
d3e8981
Merge pull request #20 from vmware-tanzu/main
kaovilai Oct 20, 2022
cd1009b
Merge pull request #22 from vmware-tanzu/main
kaovilai Oct 24, 2022
90b73d3
Merge pull request #30 from vmware-tanzu/main
github-actions[bot] Oct 27, 2022
5d7e624
Merge pull request #33 from vmware-tanzu/main
github-actions[bot] Oct 31, 2022
925b625
Merge pull request #35 from vmware-tanzu/main
github-actions[bot] Nov 1, 2022
6d950be
Merge pull request #36 from vmware-tanzu/main
github-actions[bot] Nov 1, 2022
249020d
Merge pull request #37 from vmware-tanzu/main
github-actions[bot] Nov 1, 2022
65f08c0
Merge pull request #38 from vmware-tanzu/main
github-actions[bot] Nov 1, 2022
0a164ea
Merge pull request #39 from vmware-tanzu/main
github-actions[bot] Nov 2, 2022
ba44353
Merge pull request #40 from vmware-tanzu/main
github-actions[bot] Nov 3, 2022
5ae3906
Merge pull request #43 from vmware-tanzu/main
github-actions[bot] Nov 3, 2022
a9dd561
Merge pull request #44 from vmware-tanzu/main
github-actions[bot] Nov 3, 2022
15aacec
fix: hack/build-image/Dockerfile to reduce vulnerabilities
snyk-bot Feb 5, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 2 additions & 9 deletions .github/auto-assignees.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,17 +9,10 @@ reviewers:

groups:
maintainers:
- dsu-igeek
- sseago
- reasonerjt
- ywk253100
- blackpiglet
- qiuming-best
- shubham-pampattiwar
- Lyndon-Li
- kaovilai

tech-writer:
- a-mccarthy
- kaovilai

files:
'site/**':
Expand Down
12 changes: 12 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# To get started with Dependabot version updates, you'll need to specify which
# package ecosystems to update and where the package manifests are located.
# Please see the documentation for all configuration options:
# https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates


version: 2
updates:
- package-ecosystem: "gomod" # See documentation for possible values
directory: "/" # Location of package manifests
schedule:
interval: "weekly"
74 changes: 74 additions & 0 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,74 @@
# For most projects, this workflow file will not need changing; you simply need
# to commit it to your repository.
#
# You may wish to alter this file to override the set of languages analyzed,
# or to provide custom queries or build logic.
#
# ******** NOTE ********
# We have attempted to detect the languages in your repository. Please check
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL"

on:
push:
branches: [ "main" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "main" ]
schedule:
- cron: '28 10 * * 1'

jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write

strategy:
fail-fast: false
matrix:
language: [ 'go', 'javascript' ]
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby' ]
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support

steps:
- name: Checkout repository
uses: actions/checkout@v3

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.

# Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality


# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@v2

# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun

# If the Autobuild fails above, remove it and uncomment the following three lines.
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.

# - run: |
# echo "Run, Build Application using script"
# ./location_of_script_within_repo/buildscript.sh

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
with:
category: "/language:${{matrix.language}}"
21 changes: 20 additions & 1 deletion .github/workflows/push.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,8 @@ jobs:
build:
name: Build
runs-on: ubuntu-latest
permissions:
packages: write
steps:

- name: Set up Go
Expand Down Expand Up @@ -58,13 +60,30 @@ jobs:

# Use the JSON key in secret to login gcr.io
- uses: 'docker/login-action@v1'
id: gcr-login
with:
registry: 'gcr.io' # or REGION.docker.pkg.dev
username: '_json_key'
password: '${{ secrets.GCR_SA_KEY }}'
continue-on-error: true

# Push image to GCR to facilitate some environments that have rate limitation to docker hub, e.g. vSphere.
- name: Publish container image to GCR
if: github.repository == 'vmware-tanzu/velero'
if: github.repository == 'vmware-tanzu/velero' && steps.gcr-login.outcome == 'success'
run: |
REGISTRY=gcr.io/velero-gcp ./hack/docker-push.sh

- name: Login to GitHub registry if it's a fork
if: github.event_name != 'pull_request' && github.repository != 'vmware-tanzu/velero'
id: ghcr-login
uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c
with:
registry: ghcr.io
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

- name: Publish container image to GitHub registry if it's a fork
if: github.event_name != 'pull_request' && github.repository != 'vmware-tanzu/velero' && steps.ghcr-login.outcome == 'success'
run: |
REGISTRY=ghcr.io/${{ github.actor }} ./hack/docker-push.sh

33 changes: 33 additions & 0 deletions .github/workflows/sync-fork.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@

name: Sync Fork

on:
schedule:
- cron: '*/30 * * * *' # every 30 minutes
workflow_dispatch: # on button click

jobs:
sync:
runs-on: ubuntu-latest
strategy:
matrix:
include:
- base: main
head: vmware-tanzu:main
- base: release-1.9
head: vmware-tanzu:release-1.9
- base: konveyor-dev
head: openshift:konveyor-dev
- base: konveyor-1.9
head: openshift:konveyor-1.9
- base: oadp-1.1
head: openshift:oadp-1.1
- base: oadp-1.0
head: openshift:oadp-1.0
fail-fast: false
steps:
- uses: kaovilai/[email protected]
with:
token: ${{ secrets.GITHUB_TOKEN }}
base: ${{ matrix.base }}
head: ${{ matrix.head }}
2 changes: 1 addition & 1 deletion hack/build-image/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and
# limitations under the License.

FROM golang:1.18
FROM golang:1.20

ARG GOPROXY

Expand Down