Skip to content

Commit b8df302

Browse files
committed
fix: bump to 1.6.9
1 parent 896728b commit b8df302

File tree

4 files changed

+11
-13
lines changed

4 files changed

+11
-13
lines changed

azure/k8s/secret-challenge-vault-deployment.yml.tpl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ spec:
4141
volumeAttributes:
4242
secretProviderClass: "azure-wrongsecrets-vault"
4343
containers:
44-
- image: jeroenwillemsen/wrongsecrets:1.6.7-k8s-vault
44+
- image: jeroenwillemsen/wrongsecrets:1.6.9-k8s-vault
4545
imagePullPolicy: IfNotPresent
4646
name: secret-challenge
4747
securityContext:

helm/wrongsecrets-ctf-party/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,10 +28,10 @@ type: application
2828

2929
# This is the chart version. This version number should be incremented each time you make changes
3030
# to the chart and its templates, including the app version.
31-
version: 1.6.7
31+
version: 1.6.9
3232

3333
# This is the version number of the application being deployed. This version number should be
3434
# incremented each time you make changes to the application.
35-
appVersion: 1.6.7
35+
appVersion: 1.6.9
3636

3737
dependencies: []

helm/wrongsecrets-ctf-party/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To uninstall the chart:
4040
helm delete my-wrongsecrets-ctf-party
4141
# wrongsecrets-ctf-party
4242

43-
![Version: 1.6.7](https://img.shields.io/badge/Version-1.6.7-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.6.7](https://img.shields.io/badge/AppVersion-1.6.7-informational?style=flat-square)
43+
![Version: 1.6.9](https://img.shields.io/badge/Version-1.6.9-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.6.9](https://img.shields.io/badge/AppVersion-1.6.9-informational?style=flat-square)
4444

4545
Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
4646

@@ -109,7 +109,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
109109
| balancer.service.loadBalancerSourceRanges | string | `nil` | list of IP CIDRs allowed access to lb (if supported) |
110110
| balancer.service.type | string | `"ClusterIP"` | Kubernetes service type |
111111
| balancer.skipOwnerReference | bool | `false` | If set to true this skips setting ownerReferences on the teams wrongsecrets Deployment and Services. This lets MultiJuicer run in older kubernetes cluster which don't support the reference type or the app/v1 deployment type |
112-
| balancer.tag | string | `"1.6.7aws"` | |
112+
| balancer.tag | string | `"1.6.9aws"` | |
113113
| balancer.tolerations | list | `[]` | Optional Configure kubernetes toleration for the created wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
114114
| balancer.volumeMounts[0] | object | `{"mountPath":"/home/app/config/","name":"config-volume"}` | If true, creates a volumeMount for the created pods. This is required for the podSecurityPolicy to work |
115115
| balancer.volumes[0] | object | `{"configMap":{"name":"wrongsecrets-balancer-config"},"name":"config-volume"}` | If true, creates a volume for the created pods. This is required for the podSecurityPolicy to work |
@@ -154,7 +154,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
154154
| virtualdesktop.securityContext.readOnlyRootFilesystem | bool | `true` | |
155155
| virtualdesktop.securityContext.runAsNonRoot | bool | `true` | |
156156
| virtualdesktop.securityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
157-
| virtualdesktop.tag | string | `"1.6.7"` | |
157+
| virtualdesktop.tag | string | `"1.6.9"` | |
158158
| virtualdesktop.tolerations | list | `[]` | |
159159
| wrongsecrets.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
160160
| wrongsecrets.config | string | See values.yaml for full details | Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets |
@@ -167,7 +167,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
167167
| wrongsecrets.resources | object | `{"requests":{"cpu":"256Mi","memory":"300Mi"}}` | Optional resources definitions to set for each Wrongsecrets instance |
168168
| wrongsecrets.runtimeClassName | string | `nil` | Optional Can be used to configure the runtime class for the Wrongsecrets instances pods to add an additional layer of isolation to reduce the impact of potential container escapes. (see: https://kubernetes.io/docs/concepts/containers/runtime-class/) |
169169
| wrongsecrets.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}}` | Optional securityContext definitions to set for each Wrongsecrets instance |
170-
| wrongsecrets.tag | string | `"1.6.7-no-vault"` | |
170+
| wrongsecrets.tag | string | `"1.6.9-no-vault"` | |
171171
| wrongsecrets.tolerations | list | `[]` | Optional Configure kubernetes toleration for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
172172
| wrongsecrets.volumes | list | `[]` | Optional Volumes to set for each Wrongsecrets instance (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
173173
| wrongsecretsCleanup.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the wrongsecretsCleanup Job(see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |

helm/wrongsecrets-ctf-party/values.yaml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ balancer:
4040
# -- Set this to a fixed random alpa-numeric string (recommended length 24 chars). If not set this get randomly generated with every helm upgrade, each rotation invalidates all active cookies / sessions requirering users to login again.
4141
cookieParserSecret: null
4242
repository: jeroenwillemsen/wrongsecrets-balancer
43-
tag: 1.6.7aws
43+
tag: 1.6.9aws
4444
# -- Number of replicas of the wrongsecrets-balancer deployment. Changing this in a commit? PLEASE UPDATE THE GITHUB WORKLFOWS THEN!(NUMBER OF "TRUE")
4545
replicas: 2
4646
# -- Port to expose on the balancer pods which the container listens on
@@ -117,7 +117,7 @@ balancer:
117117
# -- Target port for the ServiceMonitor to scrape
118118
targetPort: 3000
119119
# -- Path to scrape for metrics
120-
path: '/balancer/metrics'
120+
path: "/balancer/metrics"
121121
basicAuth:
122122
username: prometheus-scraper
123123
# -- Should be changed when metrics are enabled.
@@ -159,7 +159,7 @@ wrongsecrets:
159159
maxInstances: 500
160160
# -- Wrongsecrets Image to use
161161
image: jeroenwillemsen/wrongsecrets
162-
tag: 1.6.7-no-vault
162+
tag: 1.6.9-no-vault
163163
# -- Change the key when hosting a CTF event. This key gets used to generate the challenge flags. See: https://github.com/OWASP/wrongsecrets#ctf
164164
ctfKey: "[email protected]!9uR_K!NfkkTr"
165165
# -- Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets
@@ -221,7 +221,7 @@ virtualdesktop:
221221
maxInstances: 500
222222
# -- Wrongsecrets Image to use
223223
image: jeroenwillemsen/wrongsecrets-desktop-k8s
224-
tag: 1.6.7
224+
tag: 1.6.9
225225
repository: commjoenie/wrongSecrets
226226
resources:
227227
request:
@@ -277,8 +277,6 @@ vaultContainer:
277277
envFrom: []
278278
tolerations: []
279279

280-
281-
282280
# Deletes unused Wrongsecrets namespaces after a configurable period of inactivity
283281
wrongsecretsCleanup:
284282
repository: jeroenwillemsen/wrongsecrets-ctf-cleaner

0 commit comments

Comments
 (0)