diff --git a/.github/actions/image-builder/action.yml b/.github/actions/image-builder/action.yml index fae48c741246..46e2cb33a2b4 100644 --- a/.github/actions/image-builder/action.yml +++ b/.github/actions/image-builder/action.yml @@ -82,7 +82,7 @@ runs: id: prepare-tags shell: bash - - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241204-0a1fe059 + - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241205-5b38c317 id: build with: args: --name=${{ inputs.image-name }} --context=${{ inputs.context }} --dockerfile=${{ inputs.dockerfile }} --azure-access-token=${{ inputs.ado-token }} --oidc-token=${{ inputs.oidc-token }} ${{ steps.prepare-build-args.outputs.build-args }} ${{ steps.prepare-tags.outputs.tags }} --export-tags=${{ inputs.export-tags }} --config=${{ inputs.config }} --env-file=${{ inputs.env-file }} --build-in-ado=true --use-go-internal-sap-modules=${{ inputs.use-go-internal-sap-modules }} \ No newline at end of file diff --git a/.github/workflows/autobump-docs-index-md.yml b/.github/workflows/autobump-docs-index-md.yml index 4f13d858facd..751551f8f13f 100644 --- a/.github/workflows/autobump-docs-index-md.yml +++ b/.github/workflows/autobump-docs-index-md.yml @@ -59,6 +59,6 @@ jobs: --workdir /github/test-infra \ --privileged \ --cap-drop ALL \ - europe-docker.pkg.dev/kyma-project/prod/markdown-index:v20241205-d383be51 \ + europe-docker.pkg.dev/kyma-project/prod/markdown-index:v20241205-5b38c317 \ --config=${{ env.AUTOBUMP_CONFIG_PATH }} \ --labels-override=kind/chore,area/documentation diff --git a/.github/workflows/autobump-security-config.yaml b/.github/workflows/autobump-security-config.yaml index bb65bba9476c..8ae0e20a6e4f 100644 --- a/.github/workflows/autobump-security-config.yaml +++ b/.github/workflows/autobump-security-config.yaml @@ -71,7 +71,7 @@ jobs: --rm \ --privileged \ --cap-drop ALL \ - europe-docker.pkg.dev/kyma-project/prod/image-detector:v20241204-0a1fe059 \ + europe-docker.pkg.dev/kyma-project/prod/image-detector:v20241205-5b38c317 \ --terraform-dir=${{ env.TERRAFORM_CONFIGS_DIR }} \ --sec-scanner-config=${{ env.SEC_SCANNERS_CONFIG_PATH }} \ --autobump-config=${{ env.AUTOBUMP_CONFIG_PATH }} diff --git a/.github/workflows/image-autobumper.yml b/.github/workflows/image-autobumper.yml index 81fc4a4276b4..dd73ba13cab7 100644 --- a/.github/workflows/image-autobumper.yml +++ b/.github/workflows/image-autobumper.yml @@ -4,7 +4,7 @@ on: inputs: docker-image: description: 'Docker image with tag to be used' - default: 'europe-docker.pkg.dev/kyma-project/prod/image-autobumper:v20241205-d383be51' + default: 'europe-docker.pkg.dev/kyma-project/prod/image-autobumper:v20241205-5b38c317' type: string autobump-config-path: description: 'Path to the autobump config file, relative to the repository root' diff --git a/.github/workflows/image-syncer.yml b/.github/workflows/image-syncer.yml index 1e55844c6a32..6ed29b834a43 100644 --- a/.github/workflows/image-syncer.yml +++ b/.github/workflows/image-syncer.yml @@ -100,7 +100,7 @@ jobs: --workdir /github/workspace --rm --volume "$GITHUB_WORKSPACE:/github/workspace" - europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241205-d383be51 + europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241205-5b38c317 --images-file=/github/workspace/external-images.yaml --access-token=${{ steps.authenticate_in_gcp.outputs.access_token }} --dry-run=${{ steps.set_dry_run_flag.outputs.DRY_RUN }} diff --git a/.github/workflows/pull-validate-kaniko-build-config.yml b/.github/workflows/pull-validate-kaniko-build-config.yml index 6d75dfc854ae..004c973a2f6e 100644 --- a/.github/workflows/pull-validate-kaniko-build-config.yml +++ b/.github/workflows/pull-validate-kaniko-build-config.yml @@ -50,7 +50,7 @@ jobs: secrets: |- ado-pat:${{ vars.GCP_KYMA_PROJECT_PROJECT_ID }}/${{ vars.IMAGE_BUILDER_ADO_PAT_GCP_SECRET_NAME }} - - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241204-0a1fe059 + - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241205-5b38c317 id: build with: args: --name=test-infra/ginkgo --context=. --dockerfile=images/ginkgo/Dockerfile --azure-access-token=${{ steps.secrets.outputs.ado-pat }} --oidc-token=${{ steps.get_oidc.outputs.jwt }} --env-file='envs' --build-in-ado=true --test-kaniko-build-config=true --config="./configs/image-builder-client-config.yaml" \ No newline at end of file diff --git a/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars b/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars index eba5f717ab20..0ed6f201a159 100644 --- a/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars +++ b/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars @@ -1,7 +1,7 @@ project_id = "sap-kyma-neighbors-dev" region = "europe-west3" service_account_keys_rotator_service_name = "service-account-keys-rotator" -service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241205-d383be51" #gitleaks:allow +service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241205-5b38c317" #gitleaks:allow service_account_keys_cleaner_service_name = "service-account-keys-cleaner" service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241205-5b38c317" #gitleaks:allow service_account_key_latest_version_min_age = 24 diff --git a/configs/terraform/environments/prod/terraform.tfvars b/configs/terraform/environments/prod/terraform.tfvars index e1443902d3d1..33e844d50d42 100644 --- a/configs/terraform/environments/prod/terraform.tfvars +++ b/configs/terraform/environments/prod/terraform.tfvars @@ -8,7 +8,7 @@ kyma_project_artifact_registry_collection = { }, } service_account_keys_rotator_service_name = "service-account-keys-rotator" -service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241205-d383be51" #gitleaks:allow +service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241205-5b38c317" #gitleaks:allow service_account_keys_cleaner_service_name = "service-account-keys-cleaner" service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241205-5b38c317" #gitleaks:allow service_account_key_latest_version_min_age = 24 diff --git a/configs/terraform/modules/cors-proxy/cors-proxy.tf b/configs/terraform/modules/cors-proxy/cors-proxy.tf index 5c58411771a7..fc9203650829 100644 --- a/configs/terraform/modules/cors-proxy/cors-proxy.tf +++ b/configs/terraform/modules/cors-proxy/cors-proxy.tf @@ -28,7 +28,7 @@ resource "google_cloud_run_service" "cors_proxy" { template { spec { containers { - image = "europe-docker.pkg.dev/kyma-project/prod/cors-proxy:v20241205-d383be51" + image = "europe-docker.pkg.dev/kyma-project/prod/cors-proxy:v20241205-5b38c317" env { name = "COMPONENT_NAME" value = "cors-proxy" diff --git a/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf b/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf index 11730b50afe9..b25cfab6d30c 100644 --- a/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf +++ b/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf @@ -67,7 +67,7 @@ resource "google_cloud_run_service" "github_webhook_gateway" { spec { service_account_name = google_service_account.github_webhook_gateway.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/github-webhook-gateway:v20241205-d383be51" + image = "europe-docker.pkg.dev/kyma-project/prod/github-webhook-gateway:v20241205-5b38c317" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf b/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf index ca1bf9006c81..736c89f60944 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf @@ -47,7 +47,7 @@ resource "google_cloud_run_service" "gcs_bucket_mover" { spec { service_account_name = google_service_account.gcs_bucket_mover.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/move-gcs-bucket:v20241204-0a1fe059" + image = "europe-docker.pkg.dev/kyma-project/prod/move-gcs-bucket:v20241205-5b38c317" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf index bdecc43596b4..c963e1aa84e9 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf @@ -24,7 +24,7 @@ resource "google_cloud_run_service" "github_issue_creator" { spec { service_account_name = google_service_account.github_issue_creator.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/create-github-issue:v20241204-0a1fe059" + image = "europe-docker.pkg.dev/kyma-project/prod/create-github-issue:v20241205-5b38c317" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf index 4fe041613b12..d054809bfbaa 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf @@ -24,7 +24,7 @@ resource "google_cloud_run_service" "github_issue_finder" { spec { service_account_name = google_service_account.github_issue_finder.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/search-github-issue:v20241204-0a1fe059" + image = "europe-docker.pkg.dev/kyma-project/prod/search-github-issue:v20241205-5b38c317" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf b/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf index 9e9673ed0bd2..ab2be9c13d21 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf @@ -23,7 +23,7 @@ resource "google_cloud_run_service" "secrets_leak_log_scanner" { spec { service_account_name = google_service_account.secrets_leak_log_scanner.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/scan-logs-for-secrets:v20241204-0a1fe059" #gitleaks:allow + image = "europe-docker.pkg.dev/kyma-project/prod/scan-logs-for-secrets:v20241205-5b38c317" #gitleaks:allow env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf b/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf index 408a68658f14..b077d3d9631e 100644 --- a/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf +++ b/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf @@ -31,7 +31,7 @@ resource "google_cloud_run_service" "security_dashboard_token" { template { spec { containers { - image = "europe-docker.pkg.dev/kyma-project/prod/dashboard-token-proxy:v20241205-d383be51" #gitleaks:allow ignore gitleaks detection + image = "europe-docker.pkg.dev/kyma-project/prod/dashboard-token-proxy:v20241205-5b38c317" #gitleaks:allow ignore gitleaks detection env { name = "CLIENT_SECRET" value_from { diff --git a/prow/cluster/components/automated-approver_external-plugin.yaml b/prow/cluster/components/automated-approver_external-plugin.yaml index 2fcef5f3d260..42903fc4f7dd 100644 --- a/prow/cluster/components/automated-approver_external-plugin.yaml +++ b/prow/cluster/components/automated-approver_external-plugin.yaml @@ -16,7 +16,7 @@ spec: spec: containers: - name: automated-approver - image: europe-docker.pkg.dev/kyma-project/prod/automated-approver:v20241204-0a1fe059 + image: europe-docker.pkg.dev/kyma-project/prod/automated-approver:v20241205-5b38c317 imagePullPolicy: Always args: - --dry-run=false diff --git a/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml b/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml index d8ec7806c7f2..f4cf325fa4d0 100644 --- a/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml +++ b/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml @@ -13,7 +13,7 @@ spec: spec: containers: - name: secret-checker-untrusted - image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241205-d383be51 #gitleaks:allow + image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241205-5b38c317 #gitleaks:allow imagePullPolicy: IfNotPresent command: - /externalsecretschecker @@ -49,7 +49,7 @@ spec: spec: containers: - name: secret-checker-trusted - image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241205-d383be51 #gitleaks:allow + image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241205-5b38c317 #gitleaks:allow imagePullPolicy: IfNotPresent command: - /externalsecretschecker @@ -85,7 +85,7 @@ spec: spec: containers: - name: secret-checker-prow - image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241205-d383be51 #gitleaks:allow + image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241205-5b38c317 #gitleaks:allow imagePullPolicy: IfNotPresent command: - /externalsecretschecker diff --git a/prow/jobs/kyma-project/test-infra/kyma-bot.yaml b/prow/jobs/kyma-project/test-infra/kyma-bot.yaml index 471f93bd81d4..33a97ca652a5 100644 --- a/prow/jobs/kyma-project/test-infra/kyma-bot.yaml +++ b/prow/jobs/kyma-project/test-infra/kyma-bot.yaml @@ -22,7 +22,7 @@ presubmits: # runs on PRs spec: serviceAccountName: sa-prowjob-gcp-logging-client containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/usersmapchecker:v20241205-d383be51" + - image: "europe-docker.pkg.dev/kyma-project/prod/usersmapchecker:v20241205-5b38c317" imagePullPolicy: Always securityContext: privileged: false