Skip to content

Commit 0e6b9d8

Browse files
authored
Merge pull request #425 from OWASP/prep-release-1.8.0
Prepare 1.8.0 release
2 parents b07450e + b54fd40 commit 0e6b9d8

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

helm/wrongsecrets-ctf-party/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,11 @@ type: application
2828

2929
# This is the chart version. This version number should be incremented each time you make changes
3030
# to the chart and its templates, including the app version.
31-
version: 1.7.2
31+
version: 1.8.0
3232

3333
# This is the version number of the application being deployed. This version number should be
3434
# incremented each time you make changes to the application.
35-
appVersion: 1.7.2
35+
appVersion: 1.8.0
3636

3737
dependencies:
3838
- name: kube-prometheus-stack

helm/wrongsecrets-ctf-party/README.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To uninstall the chart:
4141
helm delete my-wrongsecrets-ctf-party
4242
# wrongsecrets-ctf-party
4343

44-
![Version: 1.7.2](https://img.shields.io/badge/Version-1.7.2-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.7.2](https://img.shields.io/badge/AppVersion-1.7.2-informational?style=flat-square)
44+
![Version: 1.8.0](https://img.shields.io/badge/Version-1.8.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.8.0](https://img.shields.io/badge/AppVersion-1.8.0-informational?style=flat-square)
4545

4646
Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
4747

@@ -116,7 +116,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
116116
| balancer.service.loadBalancerSourceRanges | string | `nil` | list of IP CIDRs allowed access to lb (if supported) |
117117
| balancer.service.type | string | `"ClusterIP"` | Kubernetes service type |
118118
| balancer.skipOwnerReference | bool | `false` | If set to true this skips setting ownerReferences on the teams wrongsecrets Deployment and Services. This lets MultiJuicer run in older kubernetes cluster which don't support the reference type or the app/v1 deployment type |
119-
| balancer.tag | string | `"1.7.2cloud"` | |
119+
| balancer.tag | string | `"1.8.0cloud"` | |
120120
| balancer.tolerations | list | `[]` | Optional Configure kubernetes toleration for the created wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
121121
| balancer.volumeMounts[0] | object | `{"mountPath":"/home/app/config/","name":"config-volume"}` | If true, creates a volumeMount for the created pods. This is required for the podSecurityPolicy to work |
122122
| balancer.volumes[0] | object | `{"configMap":{"name":"wrongsecrets-balancer-config"},"name":"config-volume"}` | If true, creates a volume for the created pods. This is required for the podSecurityPolicy to work |
@@ -176,7 +176,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
176176
| virtualdesktop.securityContext.readOnlyRootFilesystem | bool | `true` | |
177177
| virtualdesktop.securityContext.runAsNonRoot | bool | `true` | |
178178
| virtualdesktop.securityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
179-
| virtualdesktop.tag | string | `"1.7.2"` | |
179+
| virtualdesktop.tag | string | `"1.8.0B"` | |
180180
| virtualdesktop.tolerations | list | `[]` | |
181181
| wrongsecrets.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
182182
| wrongsecrets.config | string | See values.yaml for full details | Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets |
@@ -189,7 +189,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
189189
| wrongsecrets.resources | object | `{"requests":{"cpu":"256Mi","memory":"300Mi"}}` | Optional resources definitions to set for each Wrongsecrets instance |
190190
| wrongsecrets.runtimeClassName | string | `nil` | Optional Can be used to configure the runtime class for the Wrongsecrets instances pods to add an additional layer of isolation to reduce the impact of potential container escapes. (see: https://kubernetes.io/docs/concepts/containers/runtime-class/) |
191191
| wrongsecrets.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}}` | Optional securityContext definitions to set for each Wrongsecrets instance |
192-
| wrongsecrets.tag | string | `"1.7.2-no-vault"` | |
192+
| wrongsecrets.tag | string | `"1.8.0-no-vault"` | |
193193
| wrongsecrets.tolerations | list | `[]` | Optional Configure kubernetes toleration for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
194194
| wrongsecrets.volumes | list | `[]` | Optional Volumes to set for each Wrongsecrets instance (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
195195
| wrongsecretsCleanup.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the wrongsecretsCleanup Job(see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
@@ -212,7 +212,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
212212
| wrongsecretsCleanup.resources.limits.memory | string | `"256Mi"` | |
213213
| wrongsecretsCleanup.resources.requests.memory | string | `"256Mi"` | |
214214
| wrongsecretsCleanup.successfulJobsHistoryLimit | int | `1` | |
215-
| wrongsecretsCleanup.tag | float | `0.4` | |
215+
| wrongsecretsCleanup.tag | float | `0.5` | |
216216
| wrongsecretsCleanup.tolerations | list | `[]` | Optional Configure kubernetes toleration for the wrongsecretsCleanup Job (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
217217

218218
----------------------------------------------

helm/wrongsecrets-ctf-party/values.yaml

+4-4
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ balancer:
4040
# -- Set this to a fixed random alpa-numeric string (recommended length 24 chars). If not set this get randomly generated with every helm upgrade, each rotation invalidates all active cookies / sessions requirering users to login again.
4141
cookieParserSecret: null
4242
repository: jeroenwillemsen/wrongsecrets-balancer
43-
tag: 1.7.2cloud
43+
tag: 1.8.0cloud
4444
# -- Number of replicas of the wrongsecrets-balancer deployment. Changing this in a commit? PLEASE UPDATE THE GITHUB WORKLFOWS THEN!(NUMBER OF "TRUE")
4545
replicas: 2
4646
# -- Port to expose on the balancer pods which the container listens on
@@ -147,7 +147,7 @@ wrongsecrets:
147147
maxInstances: 500
148148
# -- Wrongsecrets Image to use
149149
image: jeroenwillemsen/wrongsecrets
150-
tag: 1.7.2-no-vault
150+
tag: 1.8.0-no-vault
151151
# -- Change the key when hosting a CTF event. This key gets used to generate the challenge flags. See: https://github.com/OWASP/wrongsecrets#ctf
152152
ctfKey: "[email protected]!9uR_K!NfkkTr"
153153
# -- Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets
@@ -209,7 +209,7 @@ virtualdesktop:
209209
maxInstances: 500
210210
# -- Wrongsecrets Image to use
211211
image: jeroenwillemsen/wrongsecrets-desktop-k8s
212-
tag: 1.7.2
212+
tag: 1.8.0B
213213
repository: commjoenie/wrongSecrets
214214
resources:
215215
request:
@@ -268,7 +268,7 @@ vaultContainer:
268268
# Deletes unused Wrongsecrets namespaces after a configurable period of inactivity
269269
wrongsecretsCleanup:
270270
repository: jeroenwillemsen/wrongsecrets-ctf-cleaner
271-
tag: 0.4
271+
tag: 0.5
272272
enabled: true
273273
# -- Cron in which the clean up job is run. Defaults to once in a quarter. Change this if your grace period if shorter than 15 minutes. See "https://crontab.guru/#0,15,30,45_*_*_*_*" for more details.
274274
cron: "0,15,30,45 * * * *"

0 commit comments

Comments
 (0)