Skip to content

Commit 68a537c

Browse files
chore: bump to wrongsecrets 1.9.2 (#729)
* chore: bump to wrongsecrets 1.9.2 * [pre-commit.ci lite] apply automatic fixes --------- Co-authored-by: pre-commit-ci-lite[bot] <117423508+pre-commit-ci-lite[bot]@users.noreply.github.com>
1 parent ed68c10 commit 68a537c

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

aws/build-and-deploy-aws.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ echo "App password is ${APP_PASSWORD}"
140140
echo "executing helm install of wrongsecrets"
141141
helm upgrade --install wrongsecrets ../helm/wrongsecrets-ctf-party \
142142
--set="balancer.env.K8S_ENV=aws" \
143-
--set="balancer.tag=1.9.1beta5-cloud" \
143+
--set="balancer.tag=1.9.2-cloud" \
144144
--set="balancer.env.IRSA_ROLE=${IRSA_ROLE_ARN}" \
145145
--set="balancer.env.REACT_APP_ACCESS_PASSWORD=${APP_PASSWORD}" \
146146
--set="balancer.env.REACT_APP_S3_BUCKET_URL=s3://${STATE_BUCKET}" \

azure/build-and-deploy-azure.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ echo "You can find the app password in password.txt"
153153

154154
helm upgrade --install wrongsecrets ../helm/wrongsecrets-ctf-party \
155155
--set="balancer.env.K8S_ENV=azure" \
156-
--set="balancer.tag=1.9.0alpha5-cloud" \
156+
--set="balancer.tag=1.9.2-cloud" \
157157
--set="balancer.env.REACT_APP_AZ_BLOB_URL=https://${AZ_STORAGE_ACCOUNT}.blob.core.windows.net/tfstate" \
158158
--set="balancer.env.REACT_APP_ACCESS_PASSWORD=${APP_PASSWORD}" \
159159
--set="balancer.env.REACT_APP_CREATE_TEAM_HMAC_KEY=${CREATE_TEAM_HMAC}" \

gcp/build-and-deploy-gcp.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ echo "You can find the app password in password.txt"
104104

105105
helm upgrade --install wrongsecrets ../helm/wrongsecrets-ctf-party \
106106
--set="balancer.env.K8S_ENV=gcp" \
107-
--set="balancer.tag=1.9.0alpha5-cloud" \
107+
--set="balancer.tag=1.9.2-cloud" \
108108
--set="balancer.env.REACT_APP_GCP_BUCKET_URL=https://console.cloud.google.com/storage/browser/${GCP_BUCKET_NAME}" \
109109
--set="balancer.env.REACT_APP_ACCESS_PASSWORD=${APP_PASSWORD}" \
110110
--set="balancer.env.REACT_APP_CREATE_TEAM_HMAC_KEY=${CREATE_TEAM_HMAC}" \

helm/wrongsecrets-ctf-party/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
176176
| virtualdesktop.securityContext.readOnlyRootFilesystem | bool | `true` | |
177177
| virtualdesktop.securityContext.runAsNonRoot | bool | `true` | |
178178
| virtualdesktop.securityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
179-
| virtualdesktop.tag | string | `"1.9.2beta11"` | |
179+
| virtualdesktop.tag | string | `"1.9.2"` | |
180180
| virtualdesktop.tolerations | list | `[]` | |
181181
| wrongsecrets.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
182182
| wrongsecrets.config | string | See values.yaml for full details | Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets |
@@ -189,7 +189,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
189189
| wrongsecrets.resources | object | `{"requests":{"cpu":"256Mi","memory":"300Mi"}}` | Optional resources definitions to set for each Wrongsecrets instance |
190190
| wrongsecrets.runtimeClassName | string | `nil` | Optional Can be used to configure the runtime class for the Wrongsecrets instances pods to add an additional layer of isolation to reduce the impact of potential container escapes. (see: https://kubernetes.io/docs/concepts/containers/runtime-class/) |
191191
| wrongsecrets.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}}` | Optional securityContext definitions to set for each Wrongsecrets instance |
192-
| wrongsecrets.tag | string | `"1.9.2beta11-no-vault"` | |
192+
| wrongsecrets.tag | string | `"1.9.2-no-vault"` | |
193193
| wrongsecrets.tolerations | list | `[]` | Optional Configure kubernetes toleration for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
194194
| wrongsecrets.volumes | list | `[]` | Optional Volumes to set for each Wrongsecrets instance (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
195195
| wrongsecretsCleanup.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the wrongsecretsCleanup Job(see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |

helm/wrongsecrets-ctf-party/values.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ wrongsecrets:
147147
maxInstances: 500
148148
# -- Wrongsecrets Image to use
149149
image: jeroenwillemsen/wrongsecrets
150-
tag: 1.9.2beta11-no-vault
150+
tag: 1.9.2-no-vault
151151
# -- Change the key when hosting a CTF event. This key gets used to generate the challenge flags. See: https://github.com/OWASP/wrongsecrets#ctf
152152
ctfKey: "[email protected]!9uR_K!NfkkTr"
153153
# -- Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets
@@ -209,7 +209,7 @@ virtualdesktop:
209209
maxInstances: 500
210210
# -- Wrongsecrets Image to use
211211
image: jeroenwillemsen/wrongsecrets-desktop-k8s
212-
tag: 1.9.2beta11
212+
tag: 1.9.2
213213
repository: commjoenie/wrongSecrets
214214
resources:
215215
request:

0 commit comments

Comments
 (0)