diff --git a/.github/actions/image-builder/action.yml b/.github/actions/image-builder/action.yml index 29dd2a6b7089..e412f45b9be7 100644 --- a/.github/actions/image-builder/action.yml +++ b/.github/actions/image-builder/action.yml @@ -78,7 +78,7 @@ runs: id: prepare-tags shell: bash - - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241018-c202ad3e + - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241022-db7fb7b8 id: build with: args: --name=${{ inputs.image-name }} --context=${{ inputs.context }} --dockerfile=${{ inputs.dockerfile }} --azure-access-token=${{ inputs.ado-token }} --oidc-token=${{ inputs.oidc-token }} ${{ steps.prepare-build-args.outputs.build-args }} ${{ steps.prepare-tags.outputs.tags }} --export-tags=${{ inputs.export-tags }} --config=${{ inputs.config }} --env-file=${{ inputs.env-file }} --build-in-ado=true \ No newline at end of file diff --git a/.github/workflows/autobump-docs-index-md.yml b/.github/workflows/autobump-docs-index-md.yml index de00db712bfc..3c46aaa261a2 100644 --- a/.github/workflows/autobump-docs-index-md.yml +++ b/.github/workflows/autobump-docs-index-md.yml @@ -58,6 +58,6 @@ jobs: -v ${{ github.workspace }}:/github/test-infra \ --workdir /github/test-infra \ --user $UID \ - europe-docker.pkg.dev/kyma-project/prod/markdown-index:v20241018-c202ad3e \ + europe-docker.pkg.dev/kyma-project/prod/markdown-index:v20241022-db7fb7b8 \ --config=${{ env.AUTOBUMP_CONFIG_PATH }} \ --labels-override=kind/chore,area/documentation diff --git a/.github/workflows/hello-world.yml b/.github/workflows/hello-world.yml index a21de1e63101..53bae4fb7653 100644 --- a/.github/workflows/hello-world.yml +++ b/.github/workflows/hello-world.yml @@ -47,6 +47,6 @@ jobs: -v ${{ github.workspace }}:/github/workspace \ --workdir /github/workspace \ --user $UID \ - europe-docker.pkg.dev/kyma-project/prod/markdown-index:v20241018-c202ad3e \ + europe-docker.pkg.dev/kyma-project/prod/markdown-index:v20241022-db7fb7b8 \ --config=${{ env.AUTOBUMP_CONFIG_PATH }} \ --labels-override=kind/chore,area/documentation diff --git a/.github/workflows/image-autobumper.yml b/.github/workflows/image-autobumper.yml index c1dc730225c8..1492044c48d5 100644 --- a/.github/workflows/image-autobumper.yml +++ b/.github/workflows/image-autobumper.yml @@ -4,7 +4,7 @@ on: inputs: docker-image: description: 'Docker image with tag to be used' - default: 'europe-docker.pkg.dev/kyma-project/prod/image-autobumper:v20241018-f89b4fdd' + default: 'europe-docker.pkg.dev/kyma-project/prod/image-autobumper:v20241022-db7fb7b8' type: string autobump-config-path: description: 'Path to the autobump config file, relative to the repository root' diff --git a/.github/workflows/image-syncer.yml b/.github/workflows/image-syncer.yml index c0478259e116..2a7e500980ea 100644 --- a/.github/workflows/image-syncer.yml +++ b/.github/workflows/image-syncer.yml @@ -100,7 +100,7 @@ jobs: --workdir /github/workspace --rm --volume "$GITHUB_WORKSPACE:/github/workspace" - europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241018-c202ad3e + europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241022-db7fb7b8 --images-file=/github/workspace/external-images.yaml --access-token=${{ steps.authenticate_in_gcp.outputs.access_token }} --dry-run=${{ steps.set_dry_run_flag.outputs.DRY_RUN }} diff --git a/.github/workflows/pull-validate-kaniko-build-config.yml b/.github/workflows/pull-validate-kaniko-build-config.yml index c68b59e3419e..fa5df7e44da0 100644 --- a/.github/workflows/pull-validate-kaniko-build-config.yml +++ b/.github/workflows/pull-validate-kaniko-build-config.yml @@ -50,7 +50,7 @@ jobs: secrets: |- ado-pat:${{ vars.GCP_KYMA_PROJECT_PROJECT_ID }}/${{ vars.IMAGE_BUILDER_ADO_PAT_GCP_SECRET_NAME }} - - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241018-c202ad3e + - uses: docker://europe-docker.pkg.dev/kyma-project/prod/image-builder:v20241022-db7fb7b8 id: build with: args: --name=test-infra/ginkgo --context=. --dockerfile=prow/images/ginkgo/Dockerfile --azure-access-token=${{ steps.secrets.outputs.ado-pat }} --oidc-token=${{ steps.get_oidc.outputs.jwt }} --env-file='envs' --build-in-ado=true --test-kaniko-build-config=true --config="./configs/image-builder-client-config.yaml" \ No newline at end of file diff --git a/.github/workflows/push-update-security-config.yaml b/.github/workflows/push-update-security-config.yaml index ef0b8f37e192..9bac9723ad6d 100644 --- a/.github/workflows/push-update-security-config.yaml +++ b/.github/workflows/push-update-security-config.yaml @@ -70,7 +70,7 @@ jobs: --workdir /github/workspace \ --rm \ --user $UID \ - europe-docker.pkg.dev/kyma-project/prod/image-detector:v20241018-c202ad3e \ + europe-docker.pkg.dev/kyma-project/prod/image-detector:v20241022-db7fb7b8 \ --terraform-dir=${{ env.TERRAFORM_CONFIGS_DIR }} \ --sec-scanner-config=${{ env.SEC_SCANNERS_CONFIG_PATH }} \ --autobump-config=${{ env.AUTOBUMP_CONFIG_PATH }} diff --git a/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars b/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars index f24a7788c1aa..5140df1a1ae4 100644 --- a/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars +++ b/configs/terraform/environments/dev/secrets-rotator/terraform.tfvars @@ -1,8 +1,8 @@ project_id = "sap-kyma-neighbors-dev" region = "europe-west3" service_account_keys_rotator_service_name = "service-account-keys-rotator" -service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241018-c202ad3e" #gitleaks:allow +service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241022-db7fb7b8" #gitleaks:allow service_account_keys_cleaner_service_name = "service-account-keys-cleaner" -service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241018-c202ad3e" #gitleaks:allow +service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241022-db7fb7b8" #gitleaks:allow service_account_key_latest_version_min_age = 24 service_account_keys_cleaner_scheduler_cron_schedule = "0 0 * * 1-5" diff --git a/configs/terraform/environments/prod/terraform.tfvars b/configs/terraform/environments/prod/terraform.tfvars index cc54e56398f3..2051b33bbd54 100644 --- a/configs/terraform/environments/prod/terraform.tfvars +++ b/configs/terraform/environments/prod/terraform.tfvars @@ -8,9 +8,9 @@ kyma_project_artifact_registry_collection = { }, } service_account_keys_rotator_service_name = "service-account-keys-rotator" -service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241018-c202ad3e" #gitleaks:allow +service_account_keys_rotator_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/rotate-service-account:v20241022-db7fb7b8" #gitleaks:allow service_account_keys_cleaner_service_name = "service-account-keys-cleaner" -service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241018-c202ad3e" #gitleaks:allow +service_account_keys_cleaner_image = "europe-docker.pkg.dev/kyma-project/prod/test-infra/service-account-keys-cleaner:v20241022-db7fb7b8" #gitleaks:allow service_account_key_latest_version_min_age = 24 service_account_keys_cleaner_scheduler_cron_schedule = "0 0 * * 1-5" diff --git a/configs/terraform/modules/cors-proxy/cors-proxy.tf b/configs/terraform/modules/cors-proxy/cors-proxy.tf index 6589ffde305a..dfd0a382b79b 100644 --- a/configs/terraform/modules/cors-proxy/cors-proxy.tf +++ b/configs/terraform/modules/cors-proxy/cors-proxy.tf @@ -28,7 +28,7 @@ resource "google_cloud_run_service" "cors_proxy" { template { spec { containers { - image = "europe-docker.pkg.dev/kyma-project/prod/cors-proxy:v20241018-c202ad3e" + image = "europe-docker.pkg.dev/kyma-project/prod/cors-proxy:v20241022-db7fb7b8" env { name = "COMPONENT_NAME" value = "cors-proxy" diff --git a/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf b/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf index 513f951a2b8f..ac6111cfe1ad 100644 --- a/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf +++ b/configs/terraform/modules/github-webhook-gateway/github-webhook-gateway.tf @@ -67,7 +67,7 @@ resource "google_cloud_run_service" "github_webhook_gateway" { spec { service_account_name = google_service_account.github_webhook_gateway.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/github-webhook-gateway:v20241018-c202ad3e" + image = "europe-docker.pkg.dev/kyma-project/prod/github-webhook-gateway:v20241022-db7fb7b8" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf b/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf index 7b6675c7dd9d..40952eadb436 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/gcs-bucket-mover.tf @@ -47,7 +47,7 @@ resource "google_cloud_run_service" "gcs_bucket_mover" { spec { service_account_name = google_service_account.gcs_bucket_mover.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/move-gcs-bucket:v20241018-c202ad3e" + image = "europe-docker.pkg.dev/kyma-project/prod/move-gcs-bucket:v20241022-db7fb7b8" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf index f7b1ad33ad52..b7b02d0723df 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-creator.tf @@ -24,7 +24,7 @@ resource "google_cloud_run_service" "github_issue_creator" { spec { service_account_name = google_service_account.github_issue_creator.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/create-github-issue:v20241018-c202ad3e" + image = "europe-docker.pkg.dev/kyma-project/prod/create-github-issue:v20241022-db7fb7b8" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf index 2493b818a0a1..22db2c56f483 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/github-issue-finder.tf @@ -24,7 +24,7 @@ resource "google_cloud_run_service" "github_issue_finder" { spec { service_account_name = google_service_account.github_issue_finder.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/search-github-issue:v20241018-c202ad3e" + image = "europe-docker.pkg.dev/kyma-project/prod/search-github-issue:v20241022-db7fb7b8" env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf b/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf index 8b49748bb5d2..e259d83eaa79 100644 --- a/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf +++ b/configs/terraform/modules/secrets-leaks-log-scanner/secrets-leak-log-scanner.tf @@ -23,7 +23,7 @@ resource "google_cloud_run_service" "secrets_leak_log_scanner" { spec { service_account_name = google_service_account.secrets_leak_log_scanner.email containers { - image = "europe-docker.pkg.dev/kyma-project/prod/scan-logs-for-secrets:v20241018-c202ad3e" #gitleaks:allow + image = "europe-docker.pkg.dev/kyma-project/prod/scan-logs-for-secrets:v20241022-db7fb7b8" #gitleaks:allow env { name = "PROJECT_ID" value = var.gcp_project_id diff --git a/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf b/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf index 893dec9e9fee..04dc9a84f7cd 100644 --- a/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf +++ b/configs/terraform/modules/security-dashboard-token/security-dashboard-token.tf @@ -31,7 +31,7 @@ resource "google_cloud_run_service" "security_dashboard_token" { template { spec { containers { - image = "europe-docker.pkg.dev/kyma-project/prod/dashboard-token-proxy:v20241018-c202ad3e" #gitleaks:allow ignore gitleaks detection + image = "europe-docker.pkg.dev/kyma-project/prod/dashboard-token-proxy:v20241022-db7fb7b8" #gitleaks:allow ignore gitleaks detection env { name = "CLIENT_SECRET" value_from { diff --git a/prow/cluster/components/automated-approver_external-plugin.yaml b/prow/cluster/components/automated-approver_external-plugin.yaml index 4d33caadff68..bf1f36dd8ea8 100644 --- a/prow/cluster/components/automated-approver_external-plugin.yaml +++ b/prow/cluster/components/automated-approver_external-plugin.yaml @@ -16,7 +16,7 @@ spec: spec: containers: - name: automated-approver - image: europe-docker.pkg.dev/kyma-project/prod/automated-approver:v20241018-c202ad3e + image: europe-docker.pkg.dev/kyma-project/prod/automated-approver:v20241022-db7fb7b8 imagePullPolicy: Always args: - --dry-run=false diff --git a/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml b/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml index dfddc4cbfe93..68e8c0dcb5c8 100644 --- a/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml +++ b/prow/cluster/resources/external-secrets/external_secrets_checker_prow.yaml @@ -13,7 +13,7 @@ spec: spec: containers: - name: secret-checker-untrusted - image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241018-c202ad3e #gitleaks:allow + image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241022-db7fb7b8 #gitleaks:allow imagePullPolicy: IfNotPresent command: - /externalsecretschecker @@ -49,7 +49,7 @@ spec: spec: containers: - name: secret-checker-trusted - image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241018-c202ad3e #gitleaks:allow + image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241022-db7fb7b8 #gitleaks:allow imagePullPolicy: IfNotPresent command: - /externalsecretschecker @@ -85,7 +85,7 @@ spec: spec: containers: - name: secret-checker-prow - image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241018-c202ad3e #gitleaks:allow + image: europe-docker.pkg.dev/kyma-project/prod/externalsecretschecker:v20241022-db7fb7b8 #gitleaks:allow imagePullPolicy: IfNotPresent command: - /externalsecretschecker diff --git a/prow/jobs/kyma-project/test-infra/image-syncer.yaml b/prow/jobs/kyma-project/test-infra/image-syncer.yaml index 98c991605e8c..e6c1831f1404 100644 --- a/prow/jobs/kyma-project/test-infra/image-syncer.yaml +++ b/prow/jobs/kyma-project/test-infra/image-syncer.yaml @@ -22,7 +22,7 @@ presubmits: # runs on PRs - ^main$ spec: containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241018-c202ad3e" + - image: "europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241022-db7fb7b8" securityContext: privileged: false seccompProfile: @@ -61,7 +61,7 @@ postsubmits: # runs on main - ^main$ spec: containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241018-c202ad3e" + - image: "europe-docker.pkg.dev/kyma-project/prod/image-syncer:v20241022-db7fb7b8" securityContext: privileged: false seccompProfile: diff --git a/prow/jobs/kyma-project/test-infra/kyma-bot.yaml b/prow/jobs/kyma-project/test-infra/kyma-bot.yaml index aaf89f58c5b5..ee1fb9bda62f 100644 --- a/prow/jobs/kyma-project/test-infra/kyma-bot.yaml +++ b/prow/jobs/kyma-project/test-infra/kyma-bot.yaml @@ -22,7 +22,7 @@ presubmits: # runs on PRs spec: serviceAccountName: sa-prowjob-gcp-logging-client containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/usersmapchecker:v20241018-c202ad3e" + - image: "europe-docker.pkg.dev/kyma-project/prod/usersmapchecker:v20241022-db7fb7b8" imagePullPolicy: Always securityContext: privileged: false diff --git a/prow/jobs/kyma-project/test-infra/periodics.yaml b/prow/jobs/kyma-project/test-infra/periodics.yaml index 54d94d28935e..2368d6f0e83d 100644 --- a/prow/jobs/kyma-project/test-infra/periodics.yaml +++ b/prow/jobs/kyma-project/test-infra/periodics.yaml @@ -51,7 +51,7 @@ periodics: # runs on schedule cluster: trusted-workload spec: containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/diskscollector:v20241018-c202ad3e" + - image: "europe-docker.pkg.dev/kyma-project/prod/diskscollector:v20241022-db7fb7b8" securityContext: privileged: false seccompProfile: @@ -83,7 +83,7 @@ periodics: # runs on schedule cluster: trusted-workload spec: containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/ipcleaner:v20241018-c202ad3e" + - image: "europe-docker.pkg.dev/kyma-project/prod/ipcleaner:v20241022-db7fb7b8" securityContext: privileged: false seccompProfile: @@ -115,7 +115,7 @@ periodics: # runs on schedule cluster: trusted-workload spec: containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/clusterscollector:v20241018-c202ad3e" + - image: "europe-docker.pkg.dev/kyma-project/prod/clusterscollector:v20241022-db7fb7b8" securityContext: privileged: false seccompProfile: @@ -147,7 +147,7 @@ periodics: # runs on schedule cluster: trusted-workload spec: containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/vmscollector:v20241018-c202ad3e" + - image: "europe-docker.pkg.dev/kyma-project/prod/vmscollector:v20241022-db7fb7b8" securityContext: privileged: false seccompProfile: @@ -180,7 +180,7 @@ periodics: # runs on schedule cluster: trusted-workload spec: containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/orphanremover:v20241018-c202ad3e" + - image: "europe-docker.pkg.dev/kyma-project/prod/orphanremover:v20241022-db7fb7b8" securityContext: privileged: false seccompProfile: @@ -212,7 +212,7 @@ periodics: # runs on schedule cluster: trusted-workload spec: containers: - - image: "europe-docker.pkg.dev/kyma-project/prod/dnscollector:v20241018-c202ad3e" + - image: "europe-docker.pkg.dev/kyma-project/prod/dnscollector:v20241022-db7fb7b8" securityContext: privileged: false seccompProfile: