You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: build-and-deploy-container.sh
+1-1
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ echo "This Script can be used to 'easily' build all WrongSecrets CTF party Compo
4
4
echo"For this to work the local kubernetes cluster must have access to the same local registry / image cache which 'docker build ...' writes its image to"
5
5
echo"For example docker-desktop with its included k8s cluster"
Copy file name to clipboardExpand all lines: build-and-deploy.sh
+1-1
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ echo "This Script can be used to 'easily' build all WrongSecrets CTF party Compo
4
4
echo"For this to work the local kubernetes cluster must have access to the same local registry / image cache which 'docker build ...' writes its image to"
5
5
echo"For example docker-desktop with its included k8s cluster"
Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
46
46
@@ -109,7 +109,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
109
109
| balancer.service.loadBalancerSourceRanges | string |`nil`| list of IP CIDRs allowed access to lb (if supported) |
110
110
| balancer.service.type | string |`"ClusterIP"`| Kubernetes service type |
111
111
| balancer.skipOwnerReference | bool |`false`| If set to true this skips setting ownerReferences on the teams wrongsecrets Deployment and Services. This lets MultiJuicer run in older kubernetes cluster which don't support the reference type or the app/v1 deployment type |
112
-
| balancer.tag | string |`"1.6.7aws"`||
112
+
| balancer.tag | string |`"1.6.9aws"`||
113
113
| balancer.tolerations | list |`[]`| Optional Configure kubernetes toleration for the created wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/)|
114
114
| balancer.volumeMounts[0]| object |`{"mountPath":"/home/app/config/","name":"config-volume"}`| If true, creates a volumeMount for the created pods. This is required for the podSecurityPolicy to work |
115
115
| balancer.volumes[0]| object |`{"configMap":{"name":"wrongsecrets-balancer-config"},"name":"config-volume"}`| If true, creates a volume for the created pods. This is required for the podSecurityPolicy to work |
@@ -154,7 +154,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
| wrongsecrets.affinity | object |`{}`| Optional Configure kubernetes scheduling affinity for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity)|
160
160
| wrongsecrets.config | string | See values.yaml for full details | Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets|
@@ -167,7 +167,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
167
167
| wrongsecrets.resources | object |`{"requests":{"cpu":"256Mi","memory":"300Mi"}}`| Optional resources definitions to set for each Wrongsecrets instance |
168
168
| wrongsecrets.runtimeClassName | string |`nil`| Optional Can be used to configure the runtime class for the Wrongsecrets instances pods to add an additional layer of isolation to reduce the impact of potential container escapes. (see: https://kubernetes.io/docs/concepts/containers/runtime-class/)|
169
169
| wrongsecrets.securityContext | object |`{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}}`| Optional securityContext definitions to set for each Wrongsecrets instance |
170
-
| wrongsecrets.tag | string |`"1.6.7-no-vault"`||
170
+
| wrongsecrets.tag | string |`"1.6.9-no-vault"`||
171
171
| wrongsecrets.tolerations | list |`[]`| Optional Configure kubernetes toleration for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/)|
172
172
| wrongsecrets.volumes | list |`[]`| Optional Volumes to set for each Wrongsecrets instance (see: https://kubernetes.io/docs/concepts/storage/volumes/)|
173
173
| wrongsecretsCleanup.affinity | object |`{}`| Optional Configure kubernetes scheduling affinity for the wrongsecretsCleanup Job(see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity)|
Copy file name to clipboardExpand all lines: helm/wrongsecrets-ctf-party/values.yaml
+4-6
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ balancer:
40
40
# -- Set this to a fixed random alpa-numeric string (recommended length 24 chars). If not set this get randomly generated with every helm upgrade, each rotation invalidates all active cookies / sessions requirering users to login again.
41
41
cookieParserSecret: null
42
42
repository: jeroenwillemsen/wrongsecrets-balancer
43
-
tag: 1.6.7aws
43
+
tag: 1.6.9aws
44
44
# -- Number of replicas of the wrongsecrets-balancer deployment. Changing this in a commit? PLEASE UPDATE THE GITHUB WORKLFOWS THEN!(NUMBER OF "TRUE")
45
45
replicas: 2
46
46
# -- Port to expose on the balancer pods which the container listens on
@@ -117,7 +117,7 @@ balancer:
117
117
# -- Target port for the ServiceMonitor to scrape
118
118
targetPort: 3000
119
119
# -- Path to scrape for metrics
120
-
path: '/balancer/metrics'
120
+
path: "/balancer/metrics"
121
121
basicAuth:
122
122
username: prometheus-scraper
123
123
# -- Should be changed when metrics are enabled.
@@ -159,7 +159,7 @@ wrongsecrets:
159
159
maxInstances: 500
160
160
# -- Wrongsecrets Image to use
161
161
image: jeroenwillemsen/wrongsecrets
162
-
tag: 1.6.7-no-vault
162
+
tag: 1.6.9-no-vault
163
163
# -- Change the key when hosting a CTF event. This key gets used to generate the challenge flags. See: https://github.com/OWASP/wrongsecrets#ctf
@@ -158,7 +158,7 @@ See [production notes](./guides/production-notes/production-notes.md) for a chec
158
158
You got some options on how to setup the stack, with some option to customize the WrongSecrets and Virtual desktop instances to your own liking.
159
159
You can find the default config values under: [helm/wrongsecrets-ctf-party/values.yaml](helm/wrongsecrets-ctf-party/values.yaml)
160
160
161
-
The default ctfd config values are here: [aws/k8s/ctfd-values.yaml](aws/k8s/ctfd-values.yaml). Note that these values are not used, and instead only se in the file [aws/build-an-deploy-aws.sh](aws/build-an-deploy-aws.sh).
161
+
The default ctfd config values are here: [aws/k8s/ctfd-values.yaml](aws/k8s/ctfd-values.yaml). Note that these values are not used, and instead only se in the file [aws/build-and-deploy-aws.sh](aws/build-and-deploy-aws.sh).
162
162
163
163
Download & Save the file and tell helm to use your config file over the default by running:
0 commit comments