Skip to content

Commit

Permalink
Build(deps): bump the major group with 2 updates (#738)
Browse files Browse the repository at this point in the history
* Build(deps): bump the major group with 2 updates

Bumps the major group with 2 updates: [aws-actions/amazon-ecr-login](https://github.com/aws-actions/amazon-ecr-login) and [docker/build-push-action](https://github.com/docker/build-push-action).


Updates `aws-actions/amazon-ecr-login` from 1 to 2
- [Release notes](https://github.com/aws-actions/amazon-ecr-login/releases)
- [Changelog](https://github.com/aws-actions/amazon-ecr-login/blob/main/CHANGELOG.md)
- [Commits](aws-actions/amazon-ecr-login@v1...v2)

Updates `docker/build-push-action` from 4 to 5
- [Release notes](https://github.com/docker/build-push-action/releases)
- [Commits](docker/build-push-action@v4...v5)

---
updated-dependencies:
- dependency-name: aws-actions/amazon-ecr-login
  dependency-type: direct:production
  update-type: version-update:semver-major
  dependency-group: major
- dependency-name: docker/build-push-action
  dependency-type: direct:production
  update-type: version-update:semver-major
  dependency-group: major
...

Signed-off-by: dependabot[bot] <[email protected]>

* Add provinence: false to all build-push-action calls

---------

Signed-off-by: dependabot[bot] <[email protected]>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Clay Benson <[email protected]>
  • Loading branch information
dependabot[bot] and ClayBenson94 authored Oct 9, 2023
1 parent 9a09859 commit fb70537
Showing 1 changed file with 35 additions and 10 deletions.
45 changes: 35 additions & 10 deletions .github/workflows/build_application_images.yml
Original file line number Diff line number Diff line change
Expand Up @@ -52,9 +52,9 @@ jobs:
aws-region: us-east-1
- name: Login to Amazon ECR
id: login-ecr
uses: aws-actions/amazon-ecr-login@v1
uses: aws-actions/amazon-ecr-login@v2
- name: Build and push
uses: docker/build-push-action@v4
uses: docker/build-push-action@v5
env:
ECR_REGISTRY: ${{ steps.login-ecr.outputs.registry }}
ECR_REPOSITORY: mint-db-migrate
Expand All @@ -67,6 +67,11 @@ jobs:
cache-from: type=gha,scope=${{ env.GIT_REF_NAME }}-db_migrate
build-args: |
TAG=9.10-alpine
# As of Buildx verion 0.10, image are build with provenance by default.
# Lambda currently does not support functions that use multi-architecture container images (https://docs.aws.amazon.com/lambda/latest/dg/images-create.html#images-reqs)
# As such, the Lambda for vulnerability scanning will fail if the image is built with provenance.
# More information can be found here: https://github.com/docker/buildx/issues/1533
provenance: false
- name: Announce failure
if: ${{ failure() }}
run: |
Expand All @@ -91,9 +96,9 @@ jobs:
aws-region: us-east-1
- name: Login to Amazon ECR
id: login-ecr
uses: aws-actions/amazon-ecr-login@v1
uses: aws-actions/amazon-ecr-login@v2
- name: Build and push
uses: docker/build-push-action@v4
uses: docker/build-push-action@v5
env:
ECR_REGISTRY: ${{ steps.login-ecr.outputs.registry }}
ECR_REPOSITORY: mint-db-clean
Expand All @@ -105,6 +110,11 @@ jobs:
cache-from: type=gha,scope=${{ env.GIT_REF_NAME }}-db_clean
cache-to: type=gha,mode=max,scope=${{ env.GIT_REF_NAME }}-db_clean
context: .
# As of Buildx verion 0.10, image are build with provenance by default.
# Lambda currently does not support functions that use multi-architecture container images (https://docs.aws.amazon.com/lambda/latest/dg/images-create.html#images-reqs)
# As such, the Lambda for vulnerability scanning will fail if the image is built with provenance.
# More information can be found here: https://github.com/docker/buildx/issues/1533
provenance: false
- name: Announce failure
if: ${{ failure() }}
run: |
Expand All @@ -129,7 +139,7 @@ jobs:
aws-region: us-east-1
- name: Login to Amazon ECR
id: login-ecr
uses: aws-actions/amazon-ecr-login@v1
uses: aws-actions/amazon-ecr-login@v2
- name: Calculate build args
id: calculate-build-args
run: |
Expand All @@ -138,7 +148,7 @@ jobs:
echo "APPLICATION_DATETIME=${APPLICATION_DATETIME}" >> $GITHUB_OUTPUT
echo "APPLICATION_TS=${APPLICATION_TS}" >> $GITHUB_OUTPUT
- name: Build and push
uses: docker/build-push-action@v4
uses: docker/build-push-action@v5
env:
ECR_REGISTRY: ${{ steps.login-ecr.outputs.registry }}
ECR_REPOSITORY: mint-backend
Expand All @@ -153,6 +163,11 @@ jobs:
ARG_APPLICATION_DATETIME=${{ steps.calculate-build-args.outputs.APPLICATION_DATETIME }}
ARG_APPLICATION_TS=${{ steps.calculate-build-args.outputs.APPLICATION_TS }}
ARG_APPLICATION_VERSION=${{ env.GIT_HASH }}
# As of Buildx verion 0.10, image are build with provenance by default.
# Lambda currently does not support functions that use multi-architecture container images (https://docs.aws.amazon.com/lambda/latest/dg/images-create.html#images-reqs)
# As such, the Lambda for vulnerability scanning will fail if the image is built with provenance.
# More information can be found here: https://github.com/docker/buildx/issues/1533
provenance: false
- name: Announce failure
if: ${{ failure() }}
run: |
Expand All @@ -178,9 +193,9 @@ jobs:
aws-region: us-east-1
- name: Login to Amazon ECR
id: login-ecr
uses: aws-actions/amazon-ecr-login@v1
uses: aws-actions/amazon-ecr-login@v2
- name: Build and push
uses: docker/build-push-action@v4
uses: docker/build-push-action@v5
env:
ECR_REGISTRY: ${{ steps.login-ecr.outputs.registry }}
ECR_REPOSITORY: mint-faktory
Expand All @@ -192,6 +207,11 @@ jobs:
context: .
cache-to: type=gha,scope=${{ env.GIT_REF_NAME }}-faktory
cache-from: type=gha,mode=max,scope=${{ env.GIT_REF_NAME }}-faktory
# As of Buildx verion 0.10, image are build with provenance by default.
# Lambda currently does not support functions that use multi-architecture container images (https://docs.aws.amazon.com/lambda/latest/dg/images-create.html#images-reqs)
# As such, the Lambda for vulnerability scanning will fail if the image is built with provenance.
# More information can be found here: https://github.com/docker/buildx/issues/1533
provenance: false
- name: Announce failure
if: ${{ failure() }}
run: |
Expand All @@ -216,9 +236,9 @@ jobs:
aws-region: us-east-1
- name: Login to Amazon ECR
id: login-ecr
uses: aws-actions/amazon-ecr-login@v1
uses: aws-actions/amazon-ecr-login@v2
- name: Build and push
uses: docker/build-push-action@v4
uses: docker/build-push-action@v5
env:
ECR_REGISTRY: ${{ steps.login-ecr.outputs.registry }}
ECR_REPOSITORY: mint-logstash
Expand All @@ -230,6 +250,11 @@ jobs:
context: "./logstash/"
cache-to: type=gha,scope=${{ env.GIT_REF_NAME }}-logstash
cache-from: type=gha,mode=max,scope=${{ env.GIT_REF_NAME }}-logstash
# As of Buildx verion 0.10, image are build with provenance by default.
# Lambda currently does not support functions that use multi-architecture container images (https://docs.aws.amazon.com/lambda/latest/dg/images-create.html#images-reqs)
# As such, the Lambda for vulnerability scanning will fail if the image is built with provenance.
# More information can be found here: https://github.com/docker/buildx/issues/1533
provenance: false
- name: Announce failure
if: ${{ failure() }}
run: |
Expand Down

0 comments on commit fb70537

Please sign in to comment.