Skip to content

Commit 72a806a

Browse files
committed
Update POM file with new version: 1.4.6
1 parent 85d9026 commit 72a806a

9 files changed

+19
-18
lines changed

.github/scripts/docker-create-and-push.sh

+3-3
Original file line numberDiff line numberDiff line change
@@ -87,9 +87,9 @@ git restore src/main/resources/.bash_history
8787
echo "committing changes and new pom file with version ${tag}"
8888
git commit -am "Update POM file with new version: ${tag}"
8989
git push
90-
#echo "tagging version"
91-
#git tag -a $tag -m "${message}"
92-
#git push --tags
90+
echo "tagging version"
91+
git tag -a $tag -m "${message}"
92+
git push --tags
9393

9494
echo "Don't forget to update experiment-bed"
9595
echo "git checkout experiment-bed && git merge master --no-edit"

Dockerfile.web

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
FROM jeroenwillemsen/wrongsecrets:challenge21test5-no-vault
1+
FROM jeroenwillemsen/wrongsecrets:1.4.6-no-vault
22

3-
ARG argBasedVersion="1.4.5"
3+
ARG argBasedVersion="1.4.6"
44
ARG CANARY_URLS="http://canarytokens.com/terms/about/s7cfbdakys13246ewd8ivuvku/post.jsp,http://canarytokens.com/terms/about/y0all60b627gzp19ahqh7rl6j/post.jsp"
55
ENV APP_VERSION=$argBasedVersion
66
ENV K8S_ENV=Heroku(Docker)

README.md

+8-7
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66

77
Welcome to the OWASP WrongSecrets p0wnable app. With this app, we have packed various ways of how to not store your secrets. These can help you to realize whether your secret management is ok. The challenge is to find all the different secrets by means of various tools and techniques.
88

9-
Can you solve all the 20 challenges?
9+
Can you solve all the 21 challenges?
1010
![screenshot.png](screenshot.png)
1111

1212
## Support
@@ -15,7 +15,7 @@ Need support? Contact us via [OWASP Slack](https://owasp.slack.com/archives/C02K
1515

1616
## Basic docker exercises
1717

18-
_Can be used for challenges 1-4, 8, 12-20_
18+
_Can be used for challenges 1-4, 8, 12-21_
1919

2020
For the basic docker exercises you currently require:
2121

@@ -25,7 +25,7 @@ For the basic docker exercises you currently require:
2525
You can install it by doing:
2626

2727
```bash
28-
docker run -p 8080:8080 jeroenwillemsen/wrongsecrets:1.4.5-no-vault
28+
docker run -p 8080:8080 jeroenwillemsen/wrongsecrets:1.4.6-no-vault
2929
```
3030

3131
Now you can try to find the secrets by means of solving the challenge offered at:
@@ -44,6 +44,7 @@ Now you can try to find the secrets by means of solving the challenge offered at
4444
- [localhost:8080/challenge/18](http://localhost:8080/challenge/18)
4545
- [localhost:8080/challenge/19](http://localhost:8080/challenge/19)
4646
- [localhost:8080/challenge/20](http://localhost:8080/challenge/20)
47+
- [localhost:8080/challenge/21](http://localhost:8080/challenge/21)
4748

4849
Note that these challenges are still very basic, and so are their explanations. Feel free to file a PR to make them look better ;-).
4950

@@ -60,7 +61,7 @@ You can test them out at [https://wrongsecrets.herokuapp.com/](https://wrongsecr
6061

6162
## Basic K8s exercise
6263

63-
_Can be used for challenges 1-6, 8, 12-19_
64+
_Can be used for challenges 1-6, 8, 12-21_
6465

6566
### Minikube based
6667

@@ -107,7 +108,7 @@ now you can use the provided IP address and port to further play with the K8s va
107108

108109
## Vault exercises with minikube
109110

110-
_Can be used for challenges 1-8, 12-19_
111+
_Can be used for challenges 1-8, 12-21_
111112
Make sure you have the following installed:
112113

113114
- minikube with docker (or comment out line 8 and work at your own k8s setup),
@@ -118,13 +119,13 @@ Make sure you have the following installed:
118119
- vault [Install from here](https://www.vaultproject.io/downloads),
119120
- grep, Cat, and Sed
120121

121-
Run `./k8s-vault-minkube-start.sh`, when the script is done, then the challenges will wait for you at <http://localhost:8080> . This will allow you to run challenges 1-8, 12-20.
122+
Run `./k8s-vault-minkube-start.sh`, when the script is done, then the challenges will wait for you at <http://localhost:8080> . This will allow you to run challenges 1-8, 12-21.
122123

123124
When you stopped the `k8s-vault-minikube-start.sh` script and want to resume the port forward run: `k8s-vault-minikube-resume.sh`. This is because if you run the start script again it will replace the secret in the vault and not update the secret-challenge application with the new secret.
124125

125126
## Cloud Challenges
126127

127-
_Can be used for challenges 1-20_
128+
_Can be used for challenges 1-21_
128129

129130
**READ THIS**: Given that the exercises below contain IAM privilege escalation exercises,
130131
never run this on an account which is related to your production environment or can influence your account-over-arching resources.

aws/k8s/secret-challenge-vault-deployment.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ spec:
3737
volumeAttributes:
3838
secretProviderClass: "wrongsecrets-aws-secretsmanager"
3939
containers:
40-
- image: jeroenwillemsen/wrongsecrets:challenge21test5-k8s-vault
40+
- image: jeroenwillemsen/wrongsecrets:1.4.6-k8s-vault
4141
imagePullPolicy: IfNotPresent
4242
ports:
4343
- containerPort: 8080

azure/k8s/secret-challenge-vault-deployment.yml.tpl

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ spec:
3535
volumeAttributes:
3636
secretProviderClass: "azure-wrongsecrets-vault"
3737
containers:
38-
- image: jeroenwillemsen/wrongsecrets:challenge21test5-k8s-vault
38+
- image: jeroenwillemsen/wrongsecrets:1.4.6-k8s-vault
3939
imagePullPolicy: IfNotPresent
4040
ports:
4141
- containerPort: 8080

gcp/k8s/secret-challenge-vault-deployment.yml.tpl

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ spec:
3737
volumeAttributes:
3838
secretProviderClass: "wrongsecrets-gcp-secretsmanager"
3939
containers:
40-
- image: jeroenwillemsen/wrongsecrets:challenge21test5-k8s-vault
40+
- image: jeroenwillemsen/wrongsecrets:1.4.6-k8s-vault
4141
imagePullPolicy: IfNotPresent
4242
ports:
4343
- containerPort: 8080

k8s/secret-challenge-deployment.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ spec:
2828
runAsGroup: 2000
2929
fsGroup: 2000
3030
containers:
31-
- image: jeroenwillemsen/wrongsecrets:challenge21test5-no-vault
31+
- image: jeroenwillemsen/wrongsecrets:1.4.6-no-vault
3232
imagePullPolicy: IfNotPresent
3333
ports:
3434
- containerPort: 8080

k8s/secret-challenge-vault-deployment.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ spec:
3030
runAsNonRoot: true
3131
serviceAccountName: vault
3232
containers:
33-
- image: jeroenwillemsen/wrongsecrets:challenge21test5-k8s-vault
33+
- image: jeroenwillemsen/wrongsecrets:1.4.6-k8s-vault
3434
imagePullPolicy: IfNotPresent
3535
ports:
3636
- containerPort: 8080

pom.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
</parent>
1010
<groupId>org.owasp</groupId>
1111
<artifactId>wrongsecrets</artifactId>
12-
<version>challenge21test5-SNAPSHOT</version>
12+
<version>1.4.6-SNAPSHOT</version>
1313
<name>OWASP WrongSecrets</name>
1414
<description>Examples with how to not use secrets</description>
1515
<url>https://owasp.org/www-project-wrongsecrets/</url>

0 commit comments

Comments
 (0)