Update GitHub actions dependencies (#11952)

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: andreaTP <andrea.peruffo1982@gmail.com>
This commit is contained in:
Bruno Oliveira da Silva 2022-05-12 09:53:59 -03:00 committed by GitHub
parent d2d68c25fd
commit 83ef30c106
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
9 changed files with 28 additions and 25 deletions

View file

@ -32,7 +32,7 @@ jobs:
run: mkdir -p ~/.m2 ; cp .github/settings.xml ~/.m2/ run: mkdir -p ~/.m2 ; cp .github/settings.xml ~/.m2/
- name: Initialize CodeQL - name: Initialize CodeQL
uses: github/codeql-action/init@v2.1.8 uses: github/codeql-action/init@v2.1.9
with: with:
languages: java languages: java
@ -40,6 +40,6 @@ jobs:
run: mvn install -Dmaven.test.skip -DskipQuarkus -DskipTestsuite -DskipExamples -DskipTests run: mvn install -Dmaven.test.skip -DskipQuarkus -DskipTestsuite -DskipExamples -DskipTests
- name: Perform CodeQL Analysis - name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2.1.8 uses: github/codeql-action/analyze@v2.1.9
env: env:
CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"interpret-results":["--max-paths",0]}}' CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"interpret-results":["--max-paths",0]}}'

View file

@ -32,7 +32,7 @@ jobs:
run: mkdir -p ~/.m2 ; cp .github/settings.xml ~/.m2/ run: mkdir -p ~/.m2 ; cp .github/settings.xml ~/.m2/
- name: Initialize CodeQL - name: Initialize CodeQL
uses: github/codeql-action/init@v2.1.8 uses: github/codeql-action/init@v2.1.9
env: env:
CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"finalize":["--no-run-unnecessary-builds"]}}' CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"finalize":["--no-run-unnecessary-builds"]}}'
with: with:
@ -43,6 +43,6 @@ jobs:
run: mvn install -Dmaven.test.skip -DskipQuarkus -DskipTestsuite -DskipExamples -DskipTests run: mvn install -Dmaven.test.skip -DskipQuarkus -DskipTestsuite -DskipExamples -DskipTests
- name: Perform CodeQL Analysis - name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2.1.8 uses: github/codeql-action/analyze@v2.1.9
env: env:
CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"interpret-results":["--max-paths",0]}}' CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"interpret-results":["--max-paths",0]}}'

View file

@ -32,7 +32,7 @@ jobs:
run: mkdir -p ~/.m2 ; cp .github/settings.xml ~/.m2/ run: mkdir -p ~/.m2 ; cp .github/settings.xml ~/.m2/
- name: Initialize CodeQL - name: Initialize CodeQL
uses: github/codeql-action/init@v2.1.8 uses: github/codeql-action/init@v2.1.9
env: env:
CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"finalize":["--no-run-unnecessary-builds"]}}' CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"finalize":["--no-run-unnecessary-builds"]}}'
with: with:
@ -43,6 +43,6 @@ jobs:
run: mvn install -Dmaven.test.skip -DskipQuarkus -DskipTestsuite -DskipExamples -DskipTests run: mvn install -Dmaven.test.skip -DskipQuarkus -DskipTestsuite -DskipExamples -DskipTests
- name: Perform CodeQL Analysis - name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2.1.8 uses: github/codeql-action/analyze@v2.1.9
env: env:
CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"interpret-results":["--max-paths",0]}}' CODEQL_ACTION_EXTRA_OPTIONS: '{"database":{"interpret-results":["--max-paths",0]}}'

View file

@ -59,7 +59,7 @@ jobs:
java-version: ${{ env.JDK_VERSION }} java-version: ${{ env.JDK_VERSION }}
cache: 'maven' cache: 'maven'
- name: Setup Minikube-Kubernetes - name: Setup Minikube-Kubernetes
uses: manusa/actions-setup-minikube@v2.4.3 uses: manusa/actions-setup-minikube@v2.6.0
with: with:
minikube version: ${{ env.MINIKUBE_VERSION }} minikube version: ${{ env.MINIKUBE_VERSION }}
kubernetes version: ${{ env.KUBERNETES_VERSION }} kubernetes version: ${{ env.KUBERNETES_VERSION }}
@ -105,7 +105,7 @@ jobs:
java-version: ${{ env.JDK_VERSION }} java-version: ${{ env.JDK_VERSION }}
cache: 'maven' cache: 'maven'
- name: Setup Minikube-Kubernetes - name: Setup Minikube-Kubernetes
uses: manusa/actions-setup-minikube@v2.4.3 uses: manusa/actions-setup-minikube@v2.6.0
with: with:
minikube version: ${{ env.MINIKUBE_VERSION }} minikube version: ${{ env.MINIKUBE_VERSION }}
kubernetes version: ${{ env.KUBERNETES_VERSION }} kubernetes version: ${{ env.KUBERNETES_VERSION }}
@ -151,7 +151,7 @@ jobs:
java-version: ${{ env.JDK_VERSION }} java-version: ${{ env.JDK_VERSION }}
cache: 'maven' cache: 'maven'
- name: Setup Minikube-Kubernetes - name: Setup Minikube-Kubernetes
uses: manusa/actions-setup-minikube@v2.4.3 uses: manusa/actions-setup-minikube@v2.6.0
with: with:
minikube version: ${{ env.MINIKUBE_VERSION }} minikube version: ${{ env.MINIKUBE_VERSION }}
kubernetes version: ${{ env.KUBERNETES_VERSION }} kubernetes version: ${{ env.KUBERNETES_VERSION }}

View file

@ -15,14 +15,14 @@
uses: actions/checkout@v3 uses: actions/checkout@v3
- name: Set up QEMU - name: Set up QEMU
uses: docker/setup-qemu-action@v1 uses: docker/setup-qemu-action@v2
- name: Set up Docker Buildx - name: Set up Docker Buildx
uses: docker/setup-buildx-action@v1 uses: docker/setup-buildx-action@v2
- name: Container metadata - name: Container metadata
id: meta id: meta
uses: docker/metadata-action@v3 uses: docker/metadata-action@v4
with: with:
images: quay.io/keycloak/keycloak images: quay.io/keycloak/keycloak
tags: | tags: |
@ -31,14 +31,14 @@
type=semver,pattern={{major}}.{{minor}} type=semver,pattern={{major}}.{{minor}}
- name: Login to Quay - name: Login to Quay
uses: docker/login-action@v1 uses: docker/login-action@v2
with: with:
registry: quay.io registry: quay.io
username: ${{ secrets.QUAY_USERNAME }} username: ${{ secrets.QUAY_USERNAME }}
password: ${{ secrets.QUAY_TOKEN }} password: ${{ secrets.QUAY_TOKEN }}
- name: Build and push - name: Build and push
uses: docker/build-push-action@v2 uses: docker/build-push-action@v3
with: with:
context: quarkus/container context: quarkus/container
platforms: linux/amd64,linux/arm64 platforms: linux/amd64,linux/arm64

View file

@ -20,7 +20,7 @@ jobs:
- name: Container metadata - name: Container metadata
id: meta id: meta
uses: docker/metadata-action@v3 uses: docker/metadata-action@v4
with: with:
images: quay.io/keycloak/keycloak-operator images: quay.io/keycloak/keycloak-operator
tags: | tags: |
@ -29,7 +29,7 @@ jobs:
type=semver,pattern={{major}}.{{minor}} type=semver,pattern={{major}}.{{minor}}
- name: Login to Quay - name: Login to Quay
uses: docker/login-action@v1 uses: docker/login-action@v2
with: with:
registry: quay.io registry: quay.io
username: ${{ secrets.QUAY_USERNAME }} username: ${{ secrets.QUAY_USERNAME }}

View file

@ -32,7 +32,7 @@ jobs:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
- name: Upload scanner results to GitHub - name: Upload scanner results to GitHub
uses: github/codeql-action/upload-sarif@v2.1.8 uses: github/codeql-action/upload-sarif@v2.1.9
with: with:
sarif_file: quarkus-report.sarif sarif_file: quarkus-report.sarif
@ -60,6 +60,6 @@ jobs:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
- name: Upload scanner results for the Operator to GitHub - name: Upload scanner results for the Operator to GitHub
uses: github/codeql-action/upload-sarif@v2.1.8 uses: github/codeql-action/upload-sarif@v2.1.9
with: with:
sarif_file: operator-report.sarif sarif_file: operator-report.sarif

View file

@ -10,7 +10,7 @@ jobs:
runs-on: "ubuntu-18.04" runs-on: "ubuntu-18.04"
steps: steps:
- name: Run Trivy vulnerability scanner - name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@40c4ca9e7421287d0c5576712fdff370978f9c3c uses: aquasecurity/trivy-action@2b30463ddb3d11724a04e760e020c7d9af24d8b3
with: with:
image-ref: 'quay.io/keycloak/keycloak:nightly' image-ref: 'quay.io/keycloak/keycloak:nightly'
format: 'template' format: 'template'
@ -20,7 +20,7 @@ jobs:
ignore-unfixed: true ignore-unfixed: true
- name: Upload Trivy scan results to GitHub Security tab - name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v2.1.8 uses: github/codeql-action/upload-sarif@v2.1.9
with: with:
sarif_file: 'trivy-results.sarif' sarif_file: 'trivy-results.sarif'
@ -29,7 +29,7 @@ jobs:
runs-on: "ubuntu-18.04" runs-on: "ubuntu-18.04"
steps: steps:
- name: Run Trivy vulnerability scanner - name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@40c4ca9e7421287d0c5576712fdff370978f9c3c uses: aquasecurity/trivy-action@2b30463ddb3d11724a04e760e020c7d9af24d8b3
with: with:
image-ref: 'quay.io/keycloak/keycloak:legacy' image-ref: 'quay.io/keycloak/keycloak:legacy'
format: 'template' format: 'template'
@ -39,7 +39,7 @@ jobs:
ignore-unfixed: true ignore-unfixed: true
- name: Upload Trivy scan results to GitHub Security tab - name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v2.1.8 uses: github/codeql-action/upload-sarif@v2.1.9
with: with:
sarif_file: 'legacy-results.sarif' sarif_file: 'legacy-results.sarif'
@ -48,7 +48,7 @@ jobs:
runs-on: "ubuntu-18.04" runs-on: "ubuntu-18.04"
steps: steps:
- name: Run Trivy vulnerability scanner - name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@40c4ca9e7421287d0c5576712fdff370978f9c3c uses: aquasecurity/trivy-action@2b30463ddb3d11724a04e760e020c7d9af24d8b3
with: with:
image-ref: 'quay.io/keycloak/keycloak-operator:nightly' image-ref: 'quay.io/keycloak/keycloak-operator:nightly'
format: 'template' format: 'template'
@ -58,6 +58,6 @@ jobs:
ignore-unfixed: true ignore-unfixed: true
- name: Upload Trivy scan results to GitHub Security tab - name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v2.1.8 uses: github/codeql-action/upload-sarif@v2.1.9
with: with:
sarif_file: 'operator-results.sarif' sarif_file: 'operator-results.sarif'

View file

@ -126,6 +126,9 @@ public class KeycloakIngressE2EIT extends ClusterOperatorTest {
kc.getSpec().setDisableDefaultIngress(true); kc.getSpec().setDisableDefaultIngress(true);
K8sUtils.deployKeycloak(k8sclient, kc, true); K8sUtils.deployKeycloak(k8sclient, kc, true);
assertThat(k8sclient.network().v1().ingresses().inNamespace(namespace).list().getItems().size()).isEqualTo(0); Awaitility.await()
.untilAsserted(() -> {
assertThat(k8sclient.network().v1().ingresses().inNamespace(namespace).list().getItems().size()).isEqualTo(0);
});
} }
} }