@@ -130,7 +130,7 @@ jobs:
130
130
with :
131
131
distribution : " zulu"
132
132
java-version : 17
133
- - uses : gradle/actions/setup-gradle@v3
133
+ - uses : gradle/actions/setup-gradle@v4
134
134
- name : Run lint on smoke test
135
135
if : ${{ steps.ci-optimize.outputs.smoke-test-change == 'true' }}
136
136
run : |
@@ -154,7 +154,7 @@ jobs:
154
154
with :
155
155
distribution : " zulu"
156
156
java-version : 17
157
- - uses : gradle/actions/setup-gradle@v3
157
+ - uses : gradle/actions/setup-gradle@v4
158
158
- name : Check out the repo
159
159
uses : acryldata/sane-checkout-action@v3
160
160
- name : Pre-build artifacts for docker image
@@ -191,7 +191,7 @@ jobs:
191
191
with :
192
192
image : ${{ env.DATAHUB_GMS_IMAGE }}:${{ needs.setup.outputs.unique_tag }}
193
193
- name : Run Trivy vulnerability scanner
194
- uses : aquasecurity/trivy-action@0.26 .0
194
+ uses : aquasecurity/trivy-action@0.29 .0
195
195
env :
196
196
TRIVY_OFFLINE_SCAN : true
197
197
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -205,7 +205,7 @@ jobs:
205
205
ignore-unfixed : true
206
206
vuln-type : " os,library"
207
207
- name : Upload Trivy scan results to GitHub Security tab
208
- uses : github/codeql-action/upload-sarif@v2
208
+ uses : github/codeql-action/upload-sarif@v3
209
209
with :
210
210
sarif_file : " trivy-results.sarif"
211
211
@@ -225,7 +225,7 @@ jobs:
225
225
with :
226
226
distribution : " zulu"
227
227
java-version : 17
228
- - uses : gradle/actions/setup-gradle@v3
228
+ - uses : gradle/actions/setup-gradle@v4
229
229
- name : Check out the repo
230
230
uses : acryldata/sane-checkout-action@v3
231
231
- name : Pre-build artifacts for docker image
@@ -262,7 +262,7 @@ jobs:
262
262
with :
263
263
image : ${{ env.DATAHUB_MAE_CONSUMER_IMAGE }}:${{ needs.setup.outputs.unique_tag }}
264
264
- name : Run Trivy vulnerability scanner
265
- uses : aquasecurity/trivy-action@0.26 .0
265
+ uses : aquasecurity/trivy-action@0.29 .0
266
266
env :
267
267
TRIVY_OFFLINE_SCAN : true
268
268
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -276,7 +276,7 @@ jobs:
276
276
ignore-unfixed : true
277
277
vuln-type : " os,library"
278
278
- name : Upload Trivy scan results to GitHub Security tab
279
- uses : github/codeql-action/upload-sarif@v2
279
+ uses : github/codeql-action/upload-sarif@v3
280
280
with :
281
281
sarif_file : " trivy-results.sarif"
282
282
@@ -296,7 +296,7 @@ jobs:
296
296
with :
297
297
distribution : " zulu"
298
298
java-version : 17
299
- - uses : gradle/actions/setup-gradle@v3
299
+ - uses : gradle/actions/setup-gradle@v4
300
300
- name : Check out the repo
301
301
uses : acryldata/sane-checkout-action@v3
302
302
- name : Pre-build artifacts for docker image
@@ -333,7 +333,7 @@ jobs:
333
333
with :
334
334
image : ${{ env.DATAHUB_MCE_CONSUMER_IMAGE }}:${{ needs.setup.outputs.unique_tag }}
335
335
- name : Run Trivy vulnerability scanner
336
- uses : aquasecurity/trivy-action@0.26 .0
336
+ uses : aquasecurity/trivy-action@0.29 .0
337
337
env :
338
338
TRIVY_OFFLINE_SCAN : true
339
339
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -347,7 +347,7 @@ jobs:
347
347
ignore-unfixed : true
348
348
vuln-type : " os,library"
349
349
- name : Upload Trivy scan results to GitHub Security tab
350
- uses : github/codeql-action/upload-sarif@v2
350
+ uses : github/codeql-action/upload-sarif@v3
351
351
with :
352
352
sarif_file : " trivy-results.sarif"
353
353
@@ -367,7 +367,7 @@ jobs:
367
367
with :
368
368
distribution : " zulu"
369
369
java-version : 17
370
- - uses : gradle/actions/setup-gradle@v3
370
+ - uses : gradle/actions/setup-gradle@v4
371
371
- name : Check out the repo
372
372
uses : acryldata/sane-checkout-action@v3
373
373
- name : Pre-build artifacts for docker image
@@ -404,7 +404,7 @@ jobs:
404
404
with :
405
405
image : ${{ env.DATAHUB_UPGRADE_IMAGE }}:${{ needs.setup.outputs.unique_tag }}
406
406
- name : Run Trivy vulnerability scanner
407
- uses : aquasecurity/trivy-action@0.26 .0
407
+ uses : aquasecurity/trivy-action@0.29 .0
408
408
env :
409
409
TRIVY_OFFLINE_SCAN : true
410
410
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -418,7 +418,7 @@ jobs:
418
418
ignore-unfixed : true
419
419
vuln-type : " os,library"
420
420
- name : Upload Trivy scan results to GitHub Security tab
421
- uses : github/codeql-action/upload-sarif@v2
421
+ uses : github/codeql-action/upload-sarif@v3
422
422
with :
423
423
sarif_file : " trivy-results.sarif"
424
424
@@ -438,7 +438,7 @@ jobs:
438
438
with :
439
439
distribution : " zulu"
440
440
java-version : 17
441
- - uses : gradle/actions/setup-gradle@v3
441
+ - uses : gradle/actions/setup-gradle@v4
442
442
- name : Check out the repo
443
443
uses : acryldata/sane-checkout-action@v3
444
444
- name : Pre-build artifacts for docker image
@@ -475,7 +475,7 @@ jobs:
475
475
with :
476
476
image : ${{ env.DATAHUB_FRONTEND_IMAGE }}:${{ needs.setup.outputs.unique_tag }}
477
477
- name : Run Trivy vulnerability scanner
478
- uses : aquasecurity/trivy-action@0.26 .0
478
+ uses : aquasecurity/trivy-action@0.29 .0
479
479
env :
480
480
TRIVY_OFFLINE_SCAN : true
481
481
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -489,7 +489,7 @@ jobs:
489
489
ignore-unfixed : true
490
490
vuln-type : " os,library"
491
491
- name : Upload Trivy scan results to GitHub Security tab
492
- uses : github/codeql-action/upload-sarif@v2
492
+ uses : github/codeql-action/upload-sarif@v3
493
493
with :
494
494
sarif_file : " trivy-results.sarif"
495
495
@@ -536,7 +536,7 @@ jobs:
536
536
with :
537
537
image : ${{ env.DATAHUB_KAFKA_SETUP_IMAGE }}:${{ needs.setup.outputs.unique_tag }}
538
538
- name : Run Trivy vulnerability scanner
539
- uses : aquasecurity/trivy-action@0.26 .0
539
+ uses : aquasecurity/trivy-action@0.29 .0
540
540
env :
541
541
TRIVY_OFFLINE_SCAN : true
542
542
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -550,7 +550,7 @@ jobs:
550
550
ignore-unfixed : true
551
551
vuln-type : " os,library"
552
552
- name : Upload Trivy scan results to GitHub Security tab
553
- uses : github/codeql-action/upload-sarif@v2
553
+ uses : github/codeql-action/upload-sarif@v3
554
554
with :
555
555
sarif_file : " trivy-results.sarif"
556
556
@@ -597,7 +597,7 @@ jobs:
597
597
with :
598
598
image : ${{ env.DATAHUB_MYSQL_SETUP_IMAGE }}:${{ needs.setup.outputs.unique_tag }}
599
599
- name : Run Trivy vulnerability scanner
600
- uses : aquasecurity/trivy-action@0.26 .0
600
+ uses : aquasecurity/trivy-action@0.29 .0
601
601
env :
602
602
TRIVY_OFFLINE_SCAN : true
603
603
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -611,7 +611,7 @@ jobs:
611
611
ignore-unfixed : true
612
612
vuln-type : " os,library"
613
613
- name : Upload Trivy scan results to GitHub Security tab
614
- uses : github/codeql-action/upload-sarif@v2
614
+ uses : github/codeql-action/upload-sarif@v3
615
615
with :
616
616
sarif_file : " trivy-results.sarif"
617
617
@@ -658,7 +658,7 @@ jobs:
658
658
with :
659
659
image : ${{ env.DATAHUB_ELASTIC_SETUP_IMAGE }}:${{ needs.setup.outputs.unique_tag }}
660
660
- name : Run Trivy vulnerability scanner
661
- uses : aquasecurity/trivy-action@0.26 .0
661
+ uses : aquasecurity/trivy-action@0.29 .0
662
662
env :
663
663
TRIVY_OFFLINE_SCAN : true
664
664
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -672,7 +672,7 @@ jobs:
672
672
ignore-unfixed : true
673
673
vuln-type : " os,library"
674
674
- name : Upload Trivy scan results to GitHub Security tab
675
- uses : github/codeql-action/upload-sarif@v2
675
+ uses : github/codeql-action/upload-sarif@v3
676
676
with :
677
677
sarif_file : " trivy-results.sarif"
678
678
@@ -829,7 +829,7 @@ jobs:
829
829
with :
830
830
distribution : " zulu"
831
831
java-version : 17
832
- - uses : gradle/actions/setup-gradle@v3
832
+ - uses : gradle/actions/setup-gradle@v4
833
833
- name : Build codegen
834
834
if : ${{ needs.setup.outputs.ingestion_change == 'true' || needs.setup.outputs.publish == 'true' || needs.setup.outputs.pr-publish =='true' }}
835
835
run : ./gradlew :metadata-ingestion:codegen
@@ -886,7 +886,7 @@ jobs:
886
886
with :
887
887
image : ${{ env.DATAHUB_INGESTION_IMAGE }}:${{ needs.datahub_ingestion_slim_build.outputs.tag }}
888
888
- name : Run Trivy vulnerability scanner Slim Image
889
- uses : aquasecurity/trivy-action@0.26 .0
889
+ uses : aquasecurity/trivy-action@0.29 .0
890
890
env :
891
891
TRIVY_OFFLINE_SCAN : true
892
892
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -901,7 +901,7 @@ jobs:
901
901
vuln-type : " os,library"
902
902
timeout : 15m
903
903
- name : Upload Trivy scan results to GitHub Security tab
904
- uses : github/codeql-action/upload-sarif@v2
904
+ uses : github/codeql-action/upload-sarif@v3
905
905
with :
906
906
sarif_file : " trivy-results.sarif"
907
907
@@ -930,7 +930,7 @@ jobs:
930
930
with :
931
931
distribution : " zulu"
932
932
java-version : 17
933
- - uses : gradle/actions/setup-gradle@v3
933
+ - uses : gradle/actions/setup-gradle@v4
934
934
- name : Build codegen
935
935
if : ${{ needs.setup.outputs.ingestion_change == 'true' || needs.setup.outputs.publish == 'true' || needs.setup.outputs.pr-publish == 'true' }}
936
936
run : ./gradlew :metadata-ingestion:codegen
@@ -985,7 +985,7 @@ jobs:
985
985
with :
986
986
image : ${{ env.DATAHUB_INGESTION_IMAGE }}:${{ needs.datahub_ingestion_full_build.outputs.tag }}
987
987
- name : Run Trivy vulnerability scanner Full Image
988
- uses : aquasecurity/trivy-action@0.26 .0
988
+ uses : aquasecurity/trivy-action@0.29 .0
989
989
env :
990
990
TRIVY_OFFLINE_SCAN : true
991
991
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2,ghcr.io/aquasecurity/trivy-db:2
@@ -1000,7 +1000,7 @@ jobs:
1000
1000
vuln-type : " os,library"
1001
1001
timeout : 15m
1002
1002
- name : Upload Trivy scan results to GitHub Security tab
1003
- uses : github/codeql-action/upload-sarif@v2
1003
+ uses : github/codeql-action/upload-sarif@v3
1004
1004
with :
1005
1005
sarif_file : " trivy-results.sarif"
1006
1006
@@ -1018,8 +1018,8 @@ jobs:
1018
1018
# python_batch_count is used to split pytests in the smoke-test (batches of actual test functions)
1019
1019
# cypress_batch_count is used to split the collection of cypress test specs into batches.
1020
1020
run : |
1021
- echo "cypress_batch_count=11 " >> "$GITHUB_OUTPUT"
1022
- echo "python_batch_count=5 " >> "$GITHUB_OUTPUT"
1021
+ echo "cypress_batch_count=5 " >> "$GITHUB_OUTPUT"
1022
+ echo "python_batch_count=3 " >> "$GITHUB_OUTPUT"
1023
1023
1024
1024
- id : set-matrix
1025
1025
# For m batches for python and n batches for cypress, we need a test matrix of python x m + cypress x n.
@@ -1083,7 +1083,7 @@ jobs:
1083
1083
with :
1084
1084
distribution : " zulu"
1085
1085
java-version : 17
1086
- - uses : gradle/actions/setup-gradle@v3
1086
+ - uses : gradle/actions/setup-gradle@v4
1087
1087
- name : Login to DockerHub
1088
1088
uses : docker/login-action@v3
1089
1089
if : ${{ needs.setup.outputs.docker-login == 'true' }}
0 commit comments