3636 outputs :
3737 go_path : ${{ steps.vars.outputs.go_path }}
3838 go_code_md5 : ${{ steps.vars.outputs.go_code_md5 }}
39+ go_proxy : ${{ steps.vars.outputs.go_proxy }}
3940 binary_cache_hit : ${{ steps.binary-cache.outputs.cache-hit }}
4041 chart_version : ${{ steps.vars.outputs.chart_version }}
4142 ic_version : ${{ steps.vars.outputs.ic_version }}
5859 - name : Set Variables
5960 id : vars
6061 run : |
61- echo "go_path=$(go env GOPATH) " >> $GITHUB_OUTPUT
62+ echo "go_proxy="https://azr.artifactory.f5net.com/artifactory/api/go/f5-nginx-go-dev " >> $GITHUB_OUTPUT
6263 source .github/data/version.txt
6364 echo "ic_version=${IC_VERSION}" >> $GITHUB_OUTPUT
6465 echo "chart_version=${HELM_CHART_VERSION}" >> $GITHUB_OUTPUT
8081
8182 - name : Authenticate to Google Cloud
8283 id : auth
83- uses : google-github-actions/auth@ba79af03959ebeac9769e648f473a284504d9193 # v2.1.10
84+ uses : google-github-actions/auth@140bb5113ffb6b65a7e9b937a81fa96cf5064462 # v2.1.11
8485 with :
8586 token_format : access_token
8687 workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
@@ -118,6 +119,9 @@ jobs:
118119 permissions :
119120 contents : read
120121 security-events : write
122+ needs : [checks]
123+ env :
124+ GOPROXY : ${{ needs.checks.outputs.go_proxy }}
121125 steps :
122126 - name : Checkout Repository
123127 uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
@@ -127,6 +131,15 @@ jobs:
127131 with :
128132 go-version-file : go.mod
129133
134+ - name : Setup netrc
135+ run : |
136+ cat <<EOF > $HOME/.netrc
137+ machine azr.artifactory.f5net.com
138+ login ${{ secrets.ARTIFACTORY_USER }}
139+ password ${{ secrets.ARTIFACTORY_TOKEN }}
140+ EOF
141+ chmod 600 $HOME/.netrc
142+
130143 - name : govulncheck
131144 uses : golang/govulncheck-action@b625fbe08f3bccbe446d94fbf87fcc875a4f50ee # v1.0.4
132145 with :
@@ -143,7 +156,7 @@ jobs:
143156 fi
144157
145158 - name : Upload SARIF file
146- uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
159+ uses : github/codeql-action/upload-sarif@d6bbdef45e766d081b84a2def353b0055f728d3e # v3.29.3
147160 if : steps.check-sarif.outputs.sarif_has_results == 'true'
148161 with :
149162 sarif_file : govulncheck.sarif
@@ -164,6 +177,16 @@ jobs:
164177 go-version-file : go.mod
165178 if : ${{ needs.checks.outputs.binary_cache_hit != 'true' }}
166179
180+ - name : Setup netrc
181+ run : |
182+ cat <<EOF > $HOME/.netrc
183+ machine azr.artifactory.f5net.com
184+ login ${{ secrets.ARTIFACTORY_USER }}
185+ password ${{ secrets.ARTIFACTORY_TOKEN }}
186+ EOF
187+ chmod 600 $HOME/.netrc
188+ if : ${{ needs.checks.outputs.binary_cache_hit != 'true' }}
189+
167190 - name : Build binaries
168191 uses : goreleaser/goreleaser-action@9c156ee8a17a598857849441385a2041ef570552 # v6.3.0
169192 with :
@@ -172,6 +195,7 @@ jobs:
172195 env :
173196 GITHUB_TOKEN : ${{ secrets.GITHUB_TOKEN }}
174197 GOPATH : ${{ needs.checks.outputs.go_path }}
198+ GOPROXY : ${{ needs.checks.outputs.go_proxy }}
175199 AWS_PRODUCT_CODE : ${{ secrets.AWS_PRODUCT_CODE }}
176200 AWS_PUB_KEY : ${{ secrets.AWS_PUB_KEY }}
177201 AWS_NAP_DOS_PRODUCT_CODE : ${{ secrets.AWS_NAP_DOS_PRODUCT_CODE }}
@@ -420,7 +444,7 @@ jobs:
420444
421445 - name : Authenticate to Google Cloud
422446 id : auth
423- uses : google-github-actions/auth@ba79af03959ebeac9769e648f473a284504d9193 # v2.1.10
447+ uses : google-github-actions/auth@140bb5113ffb6b65a7e9b937a81fa96cf5064462 # v2.1.11
424448 with :
425449 token_format : access_token
426450 workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
@@ -450,7 +474,7 @@ jobs:
450474
451475 - name : Run Docker Scout vulnerability scanner
452476 id : docker-scout
453- uses : docker/scout-action@aceeb83b88f2ae54376891227858dda7af647183 # v1.18.1
477+ uses : docker/scout-action@f8c776824083494ab0d56b8105ba2ca85c86e4de # v1.18.2
454478 with :
455479 command : cves
456480 image : ${{ steps.meta.outputs.tags }}
@@ -468,7 +492,7 @@ jobs:
468492 overwrite : true
469493
470494 - name : Upload Scan results to GitHub Security tab
471- uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
495+ uses : github/codeql-action/upload-sarif@d6bbdef45e766d081b84a2def353b0055f728d3e # v3.29.3
472496 with :
473497 sarif_file : " ${{ steps.directory.outputs.directory }}/"
474498
@@ -509,7 +533,7 @@ jobs:
509533
510534 - name : Authenticate to Google Cloud
511535 id : auth
512- uses : google-github-actions/auth@ba79af03959ebeac9769e648f473a284504d9193 # v2.1.10
536+ uses : google-github-actions/auth@140bb5113ffb6b65a7e9b937a81fa96cf5064462 # v2.1.11
513537 with :
514538 token_format : access_token
515539 workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
@@ -539,7 +563,7 @@ jobs:
539563
540564 - name : Run Docker Scout vulnerability scanner
541565 id : docker-scout
542- uses : docker/scout-action@aceeb83b88f2ae54376891227858dda7af647183 # v1.18.1
566+ uses : docker/scout-action@f8c776824083494ab0d56b8105ba2ca85c86e4de # v1.18.2
543567 with :
544568 command : cves
545569 image : ${{ steps.meta.outputs.tags }}
@@ -557,7 +581,7 @@ jobs:
557581 overwrite : true
558582
559583 - name : Upload Scan results to GitHub Security tab
560- uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
584+ uses : github/codeql-action/upload-sarif@d6bbdef45e766d081b84a2def353b0055f728d3e # v3.29.3
561585 with :
562586 sarif_file : " ${{ steps.directory.outputs.directory }}/"
563587
@@ -605,7 +629,7 @@ jobs:
605629
606630 - name : Authenticate to Google Cloud
607631 id : auth
608- uses : google-github-actions/auth@ba79af03959ebeac9769e648f473a284504d9193 # v2.1.10
632+ uses : google-github-actions/auth@140bb5113ffb6b65a7e9b937a81fa96cf5064462 # v2.1.11
609633 with :
610634 token_format : access_token
611635 workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
@@ -635,7 +659,7 @@ jobs:
635659
636660 - name : Run Docker Scout vulnerability scanner
637661 id : docker-scout
638- uses : docker/scout-action@aceeb83b88f2ae54376891227858dda7af647183 # v1.18.1
662+ uses : docker/scout-action@f8c776824083494ab0d56b8105ba2ca85c86e4de # v1.18.2
639663 with :
640664 command : cves
641665 image : ${{ steps.meta.outputs.tags }}
@@ -653,7 +677,7 @@ jobs:
653677 overwrite : true
654678
655679 - name : Upload Scan results to GitHub Security tab
656- uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
680+ uses : github/codeql-action/upload-sarif@d6bbdef45e766d081b84a2def353b0055f728d3e # v3.29.3
657681 with :
658682 sarif_file : " ${{ steps.directory.outputs.directory }}/"
659683 continue-on-error : true
0 commit comments