Skip to content

Commit e6b93fd

Browse files
authored
Merge branch 'main' into remove-unused-functions
2 parents ce659bf + 426716b commit e6b93fd

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+22
-2723
lines changed

.github/workflows/build-oss.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ jobs:
201201

202202
- name: Run Docker Scout vulnerability scanner
203203
id: docker-scout
204-
uses: docker/scout-action@e1c0d589b972d5605e035bbf74ed95cfc306d597 # v1.15.0
204+
uses: docker/scout-action@6ac950eb733f8b2811f25c05d97bfb3d181b8026 # v1.15.1
205205
with:
206206
command: cves,recommendations
207207
image: ${{ steps.meta.outputs.tags }}

.github/workflows/build-plus.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ jobs:
222222

223223
- name: Run Docker Scout vulnerability scanner
224224
id: docker-scout
225-
uses: docker/scout-action@e1c0d589b972d5605e035bbf74ed95cfc306d597 # v1.15.0
225+
uses: docker/scout-action@6ac950eb733f8b2811f25c05d97bfb3d181b8026 # v1.15.1
226226
with:
227227
command: cves,recommendations
228228
image: ${{ steps.meta.outputs.tags }}

.github/workflows/codeql-analysis.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ jobs:
7070

7171
# Initializes the CodeQL tools for scanning.
7272
- name: Initialize CodeQL
73-
uses: github/codeql-action/init@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
73+
uses: github/codeql-action/init@396bb3e45325a47dd9ef434068033c6d5bb0d11a # v3.27.3
7474
with:
7575
languages: ${{ matrix.language }}
7676
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -89,7 +89,7 @@ jobs:
8989
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
9090
# If this step fails, then you should remove it and run the build manually (see below)
9191
- name: Autobuild
92-
uses: github/codeql-action/autobuild@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
92+
uses: github/codeql-action/autobuild@396bb3e45325a47dd9ef434068033c6d5bb0d11a # v3.27.3
9393

9494
# ℹ️ Command-line programs to run using the OS shell.
9595
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
@@ -102,6 +102,6 @@ jobs:
102102
# ./location_of_script_within_repo/buildscript.sh
103103

104104
- name: Perform CodeQL Analysis
105-
uses: github/codeql-action/analyze@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
105+
uses: github/codeql-action/analyze@396bb3e45325a47dd9ef434068033c6d5bb0d11a # v3.27.3
106106
with:
107107
category: "/language:${{matrix.language}}"

.github/workflows/image-promotion.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ jobs:
143143
fi
144144
145145
- name: Upload SARIF file
146-
uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
146+
uses: github/codeql-action/upload-sarif@396bb3e45325a47dd9ef434068033c6d5bb0d11a # v3.27.3
147147
if: steps.check-sarif.outputs.sarif_has_results == 'true'
148148
with:
149149
sarif_file: govulncheck.sarif
@@ -449,7 +449,7 @@ jobs:
449449

450450
- name: Run Docker Scout vulnerability scanner
451451
id: docker-scout
452-
uses: docker/scout-action@e1c0d589b972d5605e035bbf74ed95cfc306d597 # v1.15.0
452+
uses: docker/scout-action@6ac950eb733f8b2811f25c05d97bfb3d181b8026 # v1.15.1
453453
with:
454454
command: cves,recommendations
455455
image: ${{ steps.meta.outputs.tags }}
@@ -468,7 +468,7 @@ jobs:
468468
overwrite: true
469469

470470
- name: Upload Scan results to GitHub Security tab
471-
uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
471+
uses: github/codeql-action/upload-sarif@396bb3e45325a47dd9ef434068033c6d5bb0d11a # v3.27.3
472472
with:
473473
sarif_file: "${{ steps.directory.outputs.directory }}/"
474474

@@ -539,7 +539,7 @@ jobs:
539539

540540
- name: Run Docker Scout vulnerability scanner
541541
id: docker-scout
542-
uses: docker/scout-action@e1c0d589b972d5605e035bbf74ed95cfc306d597 # v1.15.0
542+
uses: docker/scout-action@6ac950eb733f8b2811f25c05d97bfb3d181b8026 # v1.15.1
543543
with:
544544
command: cves,recommendations
545545
image: ${{ steps.meta.outputs.tags }}
@@ -558,7 +558,7 @@ jobs:
558558
overwrite: true
559559

560560
- name: Upload Scan results to GitHub Security tab
561-
uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
561+
uses: github/codeql-action/upload-sarif@396bb3e45325a47dd9ef434068033c6d5bb0d11a # v3.27.3
562562
with:
563563
sarif_file: "${{ steps.directory.outputs.directory }}/"
564564

@@ -636,7 +636,7 @@ jobs:
636636

637637
- name: Run Docker Scout vulnerability scanner
638638
id: docker-scout
639-
uses: docker/scout-action@e1c0d589b972d5605e035bbf74ed95cfc306d597 # v1.15.0
639+
uses: docker/scout-action@6ac950eb733f8b2811f25c05d97bfb3d181b8026 # v1.15.1
640640
with:
641641
command: cves,recommendations
642642
image: ${{ steps.meta.outputs.tags }}
@@ -655,7 +655,7 @@ jobs:
655655
overwrite: true
656656

657657
- name: Upload Scan results to GitHub Security tab
658-
uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
658+
uses: github/codeql-action/upload-sarif@396bb3e45325a47dd9ef434068033c6d5bb0d11a # v3.27.3
659659
with:
660660
sarif_file: "${{ steps.directory.outputs.directory }}/"
661661

.github/workflows/scorecards.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,6 @@ jobs:
5757

5858
# Upload the results to GitHub's code scanning dashboard.
5959
- name: "Upload to code-scanning"
60-
uses: github/codeql-action/upload-sarif@4f3212b61783c3c68e8309a0f18a699764811cda # v3.27.1
60+
uses: github/codeql-action/upload-sarif@396bb3e45325a47dd9ef434068033c6d5bb0d11a # v3.27.3
6161
with:
6262
sarif_file: results.sarif

config/crd/bases/k8s.nginx.org_globalconfigurations.yaml

Lines changed: 0 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -64,47 +64,3 @@ spec:
6464
type: object
6565
served: true
6666
storage: true
67-
- name: v1alpha1
68-
schema:
69-
openAPIV3Schema:
70-
description: GlobalConfiguration defines the GlobalConfiguration resource.
71-
properties:
72-
apiVersion:
73-
description: |-
74-
APIVersion defines the versioned schema of this representation of an object.
75-
Servers should convert recognized schemas to the latest internal value, and
76-
may reject unrecognized values.
77-
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
78-
type: string
79-
kind:
80-
description: |-
81-
Kind is a string value representing the REST resource this object represents.
82-
Servers may infer this from the endpoint the client submits requests to.
83-
Cannot be updated.
84-
In CamelCase.
85-
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
86-
type: string
87-
metadata:
88-
type: object
89-
spec:
90-
description: GlobalConfigurationSpec is the spec of the GlobalConfiguration
91-
resource.
92-
properties:
93-
listeners:
94-
items:
95-
description: Listener defines a listener.
96-
properties:
97-
name:
98-
type: string
99-
port:
100-
type: integer
101-
protocol:
102-
type: string
103-
ssl:
104-
type: boolean
105-
type: object
106-
type: array
107-
type: object
108-
type: object
109-
served: true
110-
storage: false

config/crd/bases/k8s.nginx.org_policies.yaml

Lines changed: 0 additions & 110 deletions
Original file line numberDiff line numberDiff line change
@@ -250,113 +250,3 @@ spec:
250250
storage: true
251251
subresources:
252252
status: {}
253-
- name: v1alpha1
254-
schema:
255-
openAPIV3Schema:
256-
description: Policy defines a Policy for VirtualServer and VirtualServerRoute
257-
resources.
258-
properties:
259-
apiVersion:
260-
description: |-
261-
APIVersion defines the versioned schema of this representation of an object.
262-
Servers should convert recognized schemas to the latest internal value, and
263-
may reject unrecognized values.
264-
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
265-
type: string
266-
kind:
267-
description: |-
268-
Kind is a string value representing the REST resource this object represents.
269-
Servers may infer this from the endpoint the client submits requests to.
270-
Cannot be updated.
271-
In CamelCase.
272-
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
273-
type: string
274-
metadata:
275-
type: object
276-
spec:
277-
description: |-
278-
PolicySpec is the spec of the Policy resource.
279-
The spec includes multiple fields, where each field represents a different policy.
280-
Only one policy (field) is allowed.
281-
properties:
282-
accessControl:
283-
description: AccessControl defines an access policy based on the source
284-
IP of a request.
285-
properties:
286-
allow:
287-
items:
288-
type: string
289-
type: array
290-
deny:
291-
items:
292-
type: string
293-
type: array
294-
type: object
295-
egressMTLS:
296-
description: EgressMTLS defines an Egress MTLS policy.
297-
properties:
298-
ciphers:
299-
type: string
300-
protocols:
301-
type: string
302-
serverName:
303-
type: boolean
304-
sessionReuse:
305-
type: boolean
306-
sslName:
307-
type: string
308-
tlsSecret:
309-
type: string
310-
trustedCertSecret:
311-
type: string
312-
verifyDepth:
313-
type: integer
314-
verifyServer:
315-
type: boolean
316-
type: object
317-
ingressMTLS:
318-
description: IngressMTLS defines an Ingress MTLS policy.
319-
properties:
320-
clientCertSecret:
321-
type: string
322-
verifyClient:
323-
type: string
324-
verifyDepth:
325-
type: integer
326-
type: object
327-
jwt:
328-
description: JWTAuth holds JWT authentication configuration.
329-
properties:
330-
realm:
331-
type: string
332-
secret:
333-
type: string
334-
token:
335-
type: string
336-
type: object
337-
rateLimit:
338-
description: RateLimit defines a rate limit policy.
339-
properties:
340-
burst:
341-
type: integer
342-
delay:
343-
type: integer
344-
dryRun:
345-
type: boolean
346-
key:
347-
type: string
348-
logLevel:
349-
type: string
350-
noDelay:
351-
type: boolean
352-
rate:
353-
type: string
354-
rejectCode:
355-
type: integer
356-
zoneSize:
357-
type: string
358-
type: object
359-
type: object
360-
type: object
361-
served: true
362-
storage: false

0 commit comments

Comments
 (0)