Skip to content

Commit f27f0b1

Browse files
committed
Release 1.6.7B: now with new versions
1 parent 2089599 commit f27f0b1

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

helm/wrongsecrets-ctf-party/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
103103
| balancer.service.loadBalancerSourceRanges | string | `nil` | list of IP CIDRs allowed access to lb (if supported) |
104104
| balancer.service.type | string | `"ClusterIP"` | Kubernetes service type |
105105
| balancer.skipOwnerReference | bool | `false` | If set to true this skips setting ownerReferences on the teams wrongsecrets Deployment and Services. This lets MultiJuicer run in older kubernetes cluster which don't support the reference type or the app/v1 deployment type |
106-
| balancer.tag | string | `"1.6.6aws"` | |
106+
| balancer.tag | string | `"1.6.7aws"` | |
107107
| balancer.tolerations | list | `[]` | Optional Configure kubernetes toleration for the created wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
108108
| balancer.volumeMounts[0] | object | `{"mountPath":"/home/app/config/","name":"config-volume"}` | If true, creates a volumeMount for the created pods. This is required for the podSecurityPolicy to work |
109109
| balancer.volumes[0] | object | `{"configMap":{"name":"wrongsecrets-balancer-config"},"name":"config-volume"}` | If true, creates a volume for the created pods. This is required for the podSecurityPolicy to work |
@@ -148,7 +148,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
148148
| virtualdesktop.securityContext.readOnlyRootFilesystem | bool | `true` | |
149149
| virtualdesktop.securityContext.runAsNonRoot | bool | `true` | |
150150
| virtualdesktop.securityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
151-
| virtualdesktop.tag | string | `"1.6.6"` | |
151+
| virtualdesktop.tag | string | `"1.6.7"` | |
152152
| virtualdesktop.tolerations | list | `[]` | |
153153
| wrongsecrets.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
154154
| wrongsecrets.config | string | See values.yaml for full details | Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets |
@@ -161,7 +161,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
161161
| wrongsecrets.resources | object | `{"requests":{"cpu":"256Mi","memory":"300Mi"}}` | Optional resources definitions to set for each Wrongsecrets instance |
162162
| wrongsecrets.runtimeClassName | string | `nil` | Optional Can be used to configure the runtime class for the Wrongsecrets instances pods to add an additional layer of isolation to reduce the impact of potential container escapes. (see: https://kubernetes.io/docs/concepts/containers/runtime-class/) |
163163
| wrongsecrets.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}}` | Optional securityContext definitions to set for each Wrongsecrets instance |
164-
| wrongsecrets.tag | string | `"1.6.7RC3-no-vault"` | |
164+
| wrongsecrets.tag | string | `"1.6.7-no-vault"` | |
165165
| wrongsecrets.tolerations | list | `[]` | Optional Configure kubernetes toleration for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
166166
| wrongsecrets.volumes | list | `[]` | Optional Volumes to set for each Wrongsecrets instance (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
167167
| wrongsecretsCleanup.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the wrongsecretsCleanup Job(see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |

helm/wrongsecrets-ctf-party/values.yaml

+3-3
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ balancer:
4040
# -- Set this to a fixed random alpa-numeric string (recommended length 24 chars). If not set this get randomly generated with every helm upgrade, each rotation invalidates all active cookies / sessions requirering users to login again.
4141
cookieParserSecret: null
4242
repository: jeroenwillemsen/wrongsecrets-balancer
43-
tag: 1.6.6aws
43+
tag: 1.6.7aws
4444
# -- Number of replicas of the wrongsecrets-balancer deployment. Changing this in a commit? PLEASE UPDATE THE GITHUB WORKLFOWS THEN!(NUMBER OF "TRUE")
4545
replicas: 2
4646
# -- Port to expose on the balancer pods which the container listens on
@@ -153,7 +153,7 @@ wrongsecrets:
153153
maxInstances: 500
154154
# -- Wrongsecrets Image to use
155155
image: jeroenwillemsen/wrongsecrets
156-
tag: 1.6.7RC3-no-vault
156+
tag: 1.6.7-no-vault
157157
# -- Change the key when hosting a CTF event. This key gets used to generate the challenge flags. See: https://github.com/OWASP/wrongsecrets#ctf
158158
ctfKey: "[email protected]!9uR_K!NfkkTr"
159159
# -- Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets
@@ -215,7 +215,7 @@ virtualdesktop:
215215
maxInstances: 500
216216
# -- Wrongsecrets Image to use
217217
image: jeroenwillemsen/wrongsecrets-desktop-k8s
218-
tag: 1.6.6
218+
tag: 1.6.7
219219
repository: commjoenie/wrongSecrets
220220
resources:
221221
request:

0 commit comments

Comments
 (0)