-
Notifications
You must be signed in to change notification settings - Fork 517
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upstream pull #438
Upstream pull #438
Changes from all commits
5a1180b
3419e8e
c107842
5198bac
b7f741b
57c6616
c4c8538
0a481f6
a8ef2eb
8e31a73
a47c834
9d72b2d
cf56025
0c7bdf5
e0ceced
87a5807
8058d7e
9d1f423
8672787
059d8e6
45c7f75
5b1c746
f9ceefc
faa296a
d259749
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
This file was deleted.
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,125 @@ | ||
--- | ||
on: | ||
push: | ||
branches: | ||
- '**' # matches every branch | ||
tags: | ||
- '*' # matches every tag that doesn't contain a '/' | ||
|
||
|
||
jobs: | ||
build_and_push_image: | ||
runs-on: self-hosted | ||
steps: | ||
- | ||
name: Checkout | ||
uses: actions/checkout@v2 | ||
- | ||
name: Prepare | ||
id: prep | ||
run: | | ||
REPOSITORY_NAME=$(echo "$GITHUB_REPOSITORY" | awk -F / '{print $2}') | ||
REGISTRY_PATH="${{ secrets.ARTIFACTORY_URL }}/xmix-docker-dev/${REPOSITORY_NAME}" | ||
VERSION=edge | ||
if [[ $GITHUB_REF == refs/tags/* ]]; then | ||
VERSION=${GITHUB_REF#refs/tags/} | ||
elif [[ $GITHUB_REF == refs/heads/* ]]; then | ||
VERSION=$(echo ${GITHUB_REF#refs/heads/} | sed -r 's#/+#-#g') | ||
elif [[ $GITHUB_REF == refs/pull/* ]]; then | ||
VERSION=pr-${{ github.event.number }} | ||
fi | ||
TAGS="${REGISTRY_PATH}:${VERSION}" | ||
# TODO: Refine... was creating too many hashes | ||
# if [ "${{ github.event_name }}" = "push" ]; then | ||
# TAGS="$TAGS,${DOCKER_IMAGE}:sha-${GITHUB_SHA::8}" | ||
# fi | ||
# if we pushed a tag, we also want publish a new latest image | ||
if [[ $GITHUB_REF == refs/tags/* ]]; then | ||
TAGS="$TAGS,${REGISTRY_PATH}:latest" | ||
fi | ||
echo "TAGS to build and push are ${TAGS}" | ||
echo ::set-output name=version::${VERSION} | ||
echo ::set-output name=tags::${TAGS} | ||
echo ::set-output name=created::$(date -u +'%Y-%m-%dT%H:%M:%SZ') | ||
- | ||
name: Set up Docker Buildx | ||
uses: docker/setup-buildx-action@v1 | ||
- | ||
name: Login to Nuance JFrog Artifactory | ||
if: github.event_name != 'pull_request' | ||
uses: docker/login-action@v1 | ||
with: | ||
registry: ${{ secrets.ARTIFACTORY_URL }} | ||
username: ${{ secrets.XMIX_PUBLISH_USERNAME }} | ||
password: ${{ secrets.XMIX_PUBLISH_PASSWORD }} | ||
- | ||
name: Build and push to artifactory | ||
uses: docker/build-push-action@v2 | ||
with: | ||
build-args: VERSION=${{ steps.prep.outputs.version }} | ||
context: . | ||
file: ./Dockerfile | ||
push: ${{ github.event_name != 'pull_request' }} | ||
tags: ${{ steps.prep.outputs.tags }} | ||
labels: | | ||
org.opencontainers.image.source=${{ github.event.repository.html_url }} | ||
org.opencontainers.image.created=${{ steps.prep.outputs.created }} | ||
org.opencontainers.image.revision=${{ github.sha }} | ||
|
||
build_and_push_acrimage: | ||
runs-on: self-hosted | ||
steps: | ||
- | ||
name: Checkout | ||
uses: actions/checkout@v2 | ||
- | ||
name: Prepare | ||
id: prep | ||
run: | | ||
ACR_REPOSITORY_NAME=$(echo "$GITHUB_REPOSITORY" | awk -F / '{print $2}') | ||
ACR_REGISTRY_PATH="${{ secrets.DEVACR_URL }}/docker/base-images/${ACR_REPOSITORY_NAME}" | ||
VERSION=edge | ||
if [[ $GITHUB_REF == refs/tags/* ]]; then | ||
VERSION=${GITHUB_REF#refs/tags/} | ||
elif [[ $GITHUB_REF == refs/heads/* ]]; then | ||
VERSION=$(echo ${GITHUB_REF#refs/heads/} | sed -r 's#/+#-#g') | ||
elif [[ $GITHUB_REF == refs/pull/* ]]; then | ||
VERSION=pr-${{ github.event.number }} | ||
fi | ||
TAGS="${ACR_REGISTRY_PATH}:${VERSION}" | ||
# TODO: Refine... was creating too many hashes | ||
# if [ "${{ github.event_name }}" = "push" ]; then | ||
# TAGS="$TAGS,${DOCKER_IMAGE}:sha-${GITHUB_SHA::8}" | ||
# fi | ||
# if we pushed a tag, we also want publish a new latest image | ||
if [[ $GITHUB_REF == refs/tags/* ]]; then | ||
TAGS="$TAGS,${ACR_REGISTRY_PATH}:latest" | ||
fi | ||
echo "TAGS to build and push are ${TAGS}" | ||
echo ::set-output name=version::${VERSION} | ||
echo ::set-output name=tags::${TAGS} | ||
echo ::set-output name=created::$(date -u +'%Y-%m-%dT%H:%M:%SZ') | ||
- | ||
name: Set up Docker Buildx | ||
uses: docker/setup-buildx-action@v1 | ||
- | ||
name: Login to ACR Docker | ||
if: github.event_name != 'pull_request' | ||
uses: docker/login-action@v1 | ||
with: | ||
registry: ${{ secrets.DEVACR_URL }} | ||
username: ${{ secrets.XMIX_DEVACR_USERNAME }} | ||
password: ${{ secrets.XMIX_DEVACR_PASSWORD }} | ||
- | ||
name: Build and push to acr | ||
uses: docker/build-push-action@v2 | ||
with: | ||
build-args: VERSION=${{ steps.prep.outputs.version }} | ||
context: . | ||
file: ./Dockerfile | ||
push: ${{ github.event_name != 'pull_request' }} | ||
tags: ${{ steps.prep.outputs.tags }} | ||
labels: | | ||
org.opencontainers.image.source=${{ github.event.repository.html_url }} | ||
org.opencontainers.image.created=${{ steps.prep.outputs.created }} | ||
org.opencontainers.image.revision=${{ github.sha }} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,14 +1,27 @@ | ||
module github.com/fullstorydev/grpcurl | ||
Check failure on line 1 in go.mod Wiz Inc. (e194d921e3) - fullstorydev / Wiz Vulnerability Scannergolang.org/x/net:0.10.0
Check failure on line 1 in go.mod Wiz Inc. (e194d921e3) - fullstorydev / Wiz Vulnerability Scannergoogle.golang.org/grpc:1.50.0
|
||
|
||
go 1.15 | ||
go 1.17 | ||
|
||
require ( | ||
github.com/jhump/protoreflect v1.13.0 | ||
google.golang.org/grpc v1.50.0 | ||
google.golang.org/protobuf v1.30.0 | ||
) | ||
|
||
require ( | ||
cloud.google.com/go v0.56.0 // indirect | ||
github.com/davecgh/go-spew v1.1.1 // indirect | ||
github.com/golang/protobuf v1.4.2 | ||
github.com/jhump/protoreflect v1.10.1 | ||
google.golang.org/grpc v1.37.0 | ||
google.golang.org/protobuf v1.25.1-0.20200805231151-a709e31e5d12 | ||
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 // indirect | ||
gopkg.in/yaml.v2 v2.2.8 // indirect | ||
github.com/census-instrumentation/opencensus-proto v0.2.1 // indirect | ||
github.com/cespare/xxhash/v2 v2.1.1 // indirect | ||
github.com/cncf/udpa/go v0.0.0-20210930031921-04548b0d99d4 // indirect | ||
github.com/cncf/xds/go v0.0.0-20211011173535-cb28da3451f1 // indirect | ||
github.com/envoyproxy/go-control-plane v0.10.2-0.20220325020618-49ff273808a1 // indirect | ||
github.com/envoyproxy/protoc-gen-validate v0.1.0 // indirect | ||
github.com/golang/protobuf v1.5.2 // indirect | ||
golang.org/x/net v0.10.0 // indirect | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Dependency Risk: golang.org/x/[email protected] has 3 vulnerabilitiesUpgrade to version Severity: Medium Vulnerabilities:
You received this notification because a new code risk has been identified |
||
golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d // indirect | ||
golang.org/x/sys v0.8.0 // indirect | ||
golang.org/x/term v0.8.0 // indirect | ||
golang.org/x/text v0.9.0 // indirect | ||
google.golang.org/appengine v1.6.5 // indirect | ||
google.golang.org/genproto v0.0.0-20221010155953-15ba04fc1c0e // indirect | ||
) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Dependency Risk: google.golang.org/[email protected] has 2 vulnerabilities
Upgrade to version
1.56.3
to mitigate all risks. This is a minor change from the installed version.Severity: High 🚨
Status: Open 🔴
Vulnerabilities:
You received this notification because a new code risk has been identified