Skip to content

Commit

Permalink
Merge pull request #147 from eclipse-tractusx/release/0.5.3
Browse files Browse the repository at this point in the history
Release version 0.5.3
  • Loading branch information
lgblaumeiser authored Feb 3, 2025
2 parents c7eea27 + 71a31a2 commit 685dfc4
Show file tree
Hide file tree
Showing 41 changed files with 510 additions and 776 deletions.
14 changes: 7 additions & 7 deletions .github/actions/run-deployment-test/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ inputs:
runs:
using: "composite"
steps:
- uses: actions/checkout@v3.3.0
- uses: actions/checkout@v4
- uses: ./.github/actions/setup-java

- name: Build docker images
Expand All @@ -62,17 +62,17 @@ runs:
./gradlew -p ${{ inputs.rootDir }} dockerize
- name: Setup Helm
uses: azure/setup-helm@v3.5
uses: azure/setup-helm@v4
with:
version: v3.8.1
version: v3.16.1

- name: Setup Kubectl
uses: azure/setup-kubectl@v3.2
uses: azure/setup-kubectl@v4
with:
version: 'v1.28.2'
version: 'v1.31.1'

- name: Create k8s Kind Cluster
uses: helm/kind-action@v1.5.0
uses: helm/kind-action@v1.12.0
with:
config: ${{ inputs.cluster-config }}
node_image: kindest/node:${{ inputs.k8sversion }}
Expand Down Expand Up @@ -101,7 +101,7 @@ runs:
run: |
helm repo add hashicorp https://helm.releases.hashicorp.com
helm install vault hashicorp/vault \
helm install vault hashicorp/vault --version 0.28.0 \
-f system-tests/helm/values-vault-test.yaml \
--wait-for-jobs --timeout=120s --dependency-update
Expand Down
62 changes: 62 additions & 0 deletions .github/workflows/dash-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,62 @@
#################################################################################
# Copyright (c) 2024 Contributors to the Eclipse Foundation
#
# See the NOTICE file(s) distributed with this work for additional
# information regarding copyright ownership.
#
# This program and the accompanying materials are made available under the
# terms of the Apache License, Version 2.0 which is available at
# https://www.apache.org/licenses/LICENSE-2.0.
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# SPDX-License-Identifier: Apache-2.0
#################################################################################


name: "3rd Party dependency check (Eclipse Dash)"

on:
workflow_dispatch:
push:
branches:
- main
pull_request:
branches:
- main

permissions:
contents: write

jobs:
check-dependencies:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: ./.github/actions/setup-java

- name: generate dependency list
run: |
./gradlew allDependencies | grep -Poh "(?<=\s)[\w.-]+:[\w.-]+:[^:\s\[\]]+" | sort | uniq > dependency-list
cat dependency-list
- name: Run dash
id: run-dash
uses: eclipse-tractusx/sig-infra/.github/actions/run-dash@main
with:
dash_input: dependency-list
dependencies_file: DEPENDENCIES
fail_on_out_of_date: true
fail_on_rejected: true
fail_on_restricted: false

- name: print generated file
if: failure()
run: |
echo "=== Please copy the following content back to DEPENDENCIES ==="
cat DEPENDENCIES
echo "=== end of content ==="
2 changes: 1 addition & 1 deletion .github/workflows/draft-new-release.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ jobs:
GITHUB_PACKAGE_USERNAME: ${{ github.actor }}
GITHUB_PACKAGE_PASSWORD: ${{ secrets.GITHUB_TOKEN }}
- name: Bump version in /charts
uses: mikefarah/yq@v4.44.2
uses: mikefarah/yq@v4.45.1
with:
cmd: |-
find charts -name Chart.yaml -maxdepth 3 | xargs -n1 yq -i '.appVersion = "${{ github.event.inputs.version }}" | .version = "${{ github.event.inputs.version }}"'
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/helm-lint.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -55,9 +55,9 @@ jobs:
- name: python (setup)
uses: actions/setup-python@v5
with:
python-version: 3.7
python-version: 3.13
- name: chart-testing (setup)
uses: helm/chart-testing-action@v2.6.1
uses: helm/chart-testing-action@v2.7.0

Check warning on line 60 in .github/workflows/helm-lint.yaml

View workflow job for this annotation

GitHub Actions / Analyze

[LOW] Unpinned Actions Full Length Commit SHA

Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload. When selecting a SHA, you should verify it is from the action's repository and not a repository fork.
#####################
### Chart Testing ###
#####################
Expand Down
58 changes: 58 additions & 0 deletions .github/workflows/secrets-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
#################################################################################
# Copyright (c) 2024 Contributors to the Eclipse Foundation
#
# See the NOTICE file(s) distributed with this work for additional
# information regarding copyright ownership.
#
# This program and the accompanying materials are made available under the
# terms of the Apache License, Version 2.0 which is available at
# https://www.apache.org/licenses/LICENSE-2.0.
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# SPDX-License-Identifier: Apache-2.0
#################################################################################


name: "Secrets scan (TruffleHog)"

on:
push:
branches: [ main ]
pull_request:
schedule:
- cron: "15 0 * * *" # Once a day

permissions:
actions: read
contents: read
security-events: write
id-token: write
issues: write

jobs:
ScanSecrets:
name: Scan secrets
runs-on: ubuntu-latest
steps:
- name: Checkout Repository
uses: actions/checkout@v4
with:
fetch-depth: 0 # Ensure full clone for pull request workflows

- name: TruffleHog OSS
id: trufflehog
uses: trufflesecurity/trufflehog@a94d152bf65bebf5baa486d3d4dfee520af2ceed
continue-on-error: true
with:
path: ./ # Scan the entire repository
base: "${{ github.event.repository.default_branch }}" # Set base branch for comparison (pull requests)
extra_args: --filter-entropy=4 --results=verified,unknown --debug

- name: Scan Results Status
if: steps.trufflehog.outcome == 'failure'
run: exit 1 # Set workflow run to failure if TruffleHog finds secrets
40 changes: 40 additions & 0 deletions .github/workflows/triage-issue.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
#################################################################################
# Copyright (c) 2025 Cofinity-X
#
# See the NOTICE file(s) distributed with this work for additional
# information regarding copyright ownership.
#
# This program and the accompanying materials are made available under the
# terms of the Apache License, Version 2.0 which is available at
# https://www.apache.org/licenses/LICENSE-2.0.
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# SPDX-License-Identifier: Apache-2.0
#################################################################################


name: triage opened issue

on:
issues:
types:
- reopened
- opened

jobs:
label-issue:
runs-on: ubuntu-latest
permissions:
issues: write
steps:
- run: gh issue edit "$NUMBER" --add-label "$LABELS"
env:
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
GH_REPO: ${{ github.repository }}
NUMBER: ${{ github.event.issue.number }}
LABELS: triage
4 changes: 2 additions & 2 deletions .github/workflows/trivy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ jobs:
steps:
- uses: actions/checkout@v4
- name: Run Trivy vulnerability scanner in repo mode
uses: aquasecurity/trivy-action@0.24.0
uses: aquasecurity/trivy-action@0.29.0

Check warning on line 61 in .github/workflows/trivy.yml

View workflow job for this annotation

GitHub Actions / Analyze

[LOW] Unpinned Actions Full Length Commit SHA

Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload. When selecting a SHA, you should verify it is from the action's repository and not a repository fork.
with:
scan-type: "config"
# ignore-unfixed: true
Expand Down Expand Up @@ -98,7 +98,7 @@ jobs:
## the next two steps will only execute if the image exists check was successful
- name: Run Trivy vulnerability scanner
if: success() && steps.imageCheck.outcome != 'failure'
uses: aquasecurity/trivy-action@0.24.0
uses: aquasecurity/trivy-action@0.29.0
with:
image-ref: "tractusx/${{ matrix.image }}:sha-${{ needs.git-sha7.outputs.value }}"
format: "sarif"
Expand Down
8 changes: 4 additions & 4 deletions .github/workflows/upgradeability-test.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -48,15 +48,15 @@ jobs:
- name: "Setup Helm"
uses: azure/setup-helm@v4

Check warning on line 49 in .github/workflows/upgradeability-test.yaml

View workflow job for this annotation

GitHub Actions / Analyze

[LOW] Unpinned Actions Full Length Commit SHA

Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload. When selecting a SHA, you should verify it is from the action's repository and not a repository fork.
with:
version: v3.8.1
version: v3.16.1

- name: "Setup Kubectl"
uses: azure/setup-kubectl@v4
with:
version: 'v1.28.2'
version: 'v1.31.1'

- name: Create k8s Kind Cluster
uses: helm/kind-action@v1.10.0
uses: helm/kind-action@v1.12.0

- name: "Update helm repo"
run: |
Expand All @@ -76,7 +76,7 @@ jobs:
run: |
helm repo add hashicorp https://helm.releases.hashicorp.com
helm install vault hashicorp/vault \
helm install vault hashicorp/vault --version 0.28.0 \
-f system-tests/helm/values-vault-test.yaml \
--wait-for-jobs --timeout=120s --dependency-update
Expand Down
5 changes: 1 addition & 4 deletions .github/workflows/verify.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ jobs:

- uses: addnab/docker-run-action@v3

Check warning on line 37 in .github/workflows/verify.yaml

View workflow job for this annotation

GitHub Actions / Analyze

[LOW] Unpinned Actions Full Length Commit SHA

Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload. When selecting a SHA, you should verify it is from the action's repository and not a repository fork.
with:
image: jnorwood/helm-docs:v1.10.0
image: jnorwood/helm-docs:v1.14.2
options: -v ${{ github.workspace }}/charts:/helm-docs
run: helm-docs

Expand Down Expand Up @@ -64,9 +64,6 @@ jobs:
exit 1;
fi
verify-dependencies:
uses: eclipse-edc/.github/.github/workflows/dependency-check.yml@main

verify-formatting:
runs-on: ubuntu-latest
steps:
Expand Down
Loading

0 comments on commit 685dfc4

Please sign in to comment.