Skip to content

Commit da18007

Browse files
authored
Merge pull request #266 from OWASP/addchallenge33andvault
Add challenge 33 and Vault
2 parents fe90cdd + 7db5d5b commit da18007

File tree

9 files changed

+1856
-57
lines changed

9 files changed

+1856
-57
lines changed

helm/wrongsecrets-ctf-party/templates/wrongsecrets-balancer/deployment.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,8 @@ spec:
6666
value: {{ .Values.balancer.env.SECRETS_MANAGER_SECRET_ID_1 }}
6767
- name: SECRETS_MANAGER_SECRET_ID_2
6868
value: {{ .Values.balancer.env.SECRETS_MANAGER_SECRET_ID_2 }}
69+
- name: CHALLENGE33_VALUE
70+
value: {{ .Values.balancer.env.CHALLENGE33_VALUE }}
6971
- name: COOKIEPARSER_SECRET
7072
valueFrom:
7173
secretKeyRef:

helm/wrongsecrets-ctf-party/values.yaml

Lines changed: 36 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ balancer:
3434
# -- Set this to a fixed random alpa-numeric string (recommended length 24 chars). If not set this get randomly generated with every helm upgrade, each rotation invalidates all active cookies / sessions requirering users to login again.
3535
cookieParserSecret: null
3636
repository: jeroenwillemsen/wrongsecrets-balancer
37-
tag: 1.6.4aws
37+
tag: 1.6.5aws
3838
# -- Number of replicas of the wrongsecrets-balancer deployment. Changing this in a commit? PLEASE UPDATE THE GITHUB WORKLFOWS THEN!(NUMBER OF "TRUE")
3939
replicas: 2
4040
service:
@@ -84,6 +84,7 @@ balancer:
8484
IRSA_ROLE: arn:aws:iam::233483431651:role/wrongsecrets-secret-manager #change this in your own AWS role!
8585
SECRETS_MANAGER_SECRET_ID_1: "wrongsecret" #only change if you need non-default AWS SM entries
8686
SECRETS_MANAGER_SECRET_ID_2: "wrongsecret-2" #only change if you need non-default AWS SM entries
87+
CHALLENGE33_VALUE: "VkJVR2gzd3UvM0kxbmFIajFVZjk3WTBMcThCNS85MnExandwMy9hWVN3SFNKSThXcWRabllMajc4aEVTbGZQUEtmMVpLUGFwNHoyK3IrRzlOUndkRlUvWUJNVFkzY05ndU1tNUM2bDJwVEs5SmhQRm5VemVySXdNcm5odTlHanJxU0ZuL0J0T3ZMblFhL21TZ1hETkpZVU9VOGdDSEZzOUpFZVF2OWhwV3B5eGxCMk5xdTBNSHJQTk9EWTNab2hoa2pXWGF4YmpDWmk5U3BtSHlkVTA2WjdMcVd5RjM5RzZWOENGNkxCUGtkVW4zYUpBVisrRjBROUljU009Cg=="
8788
metrics:
8889
# -- enables prometheus metrics for the balancer. If set to true you should change the prometheus-scraper password
8990
enabled: true
@@ -108,7 +109,7 @@ wrongsecrets:
108109
maxInstances: 500
109110
# -- Wrongsecrets Image to use
110111
image: jeroenwillemsen/wrongsecrets
111-
tag: 1.6.4-no-vault
112+
tag: 1.6.5-no-vault
112113
# -- Change the key when hosting a CTF event. This key gets used to generate the challenge flags. See: https://github.com/OWASP/wrongsecrets#ctf
113114
ctfKey: "[email protected]!9uR_K!NfkkTr"
114115
# -- Specify a custom Juice Shop config.yaml. See the JuiceShop Config Docs for more detail: https://pwning.owasp-juice.shop/part1/customization.html#yaml-configuration-file
@@ -200,7 +201,7 @@ virtualdesktop:
200201
maxInstances: 500
201202
# -- Juice Shop Image to use
202203
image: jeroenwillemsen/wrongsecrets-desktop-k8s
203-
tag: 1.6.4
204+
tag: 1.6.5
204205
repository: commjoenie/wrongSecrets
205206
resources:
206207
request:
@@ -225,6 +226,38 @@ virtualdesktop:
225226
envFrom: []
226227
tolerations: []
227228

229+
vaultContainer:
230+
# -- Specifies how many JuiceShop instances MultiJuicer should start at max. Set to -1 to remove the max Juice Shop instance cap
231+
maxInstances: 500
232+
# -- Juice Shop Image to use
233+
image: hashicorp/vault
234+
tag: 1.15.1
235+
repository: commjoenie/wrongSecrets
236+
resources:
237+
request:
238+
memory: 128mb
239+
cpu: 50m
240+
limits:
241+
memory: 256mb
242+
cpu: 1200m
243+
securityContext:
244+
allowPrivilegeEscalation: false
245+
readOnlyRootFilesystem: true
246+
runAsNonRoot: true
247+
capabilities:
248+
drop:
249+
- ALL
250+
seccompProfile:
251+
type: RuntimeDefault
252+
runtimeClassName: {}
253+
affinity: {}
254+
# -- Optional mount environment variables from configMaps or secrets (see: https://kubernetes.io/docs/tasks/inject-data-application/distribute-credentials-secure/#configure-all-key-value-pairs-in-a-secret-as-container-environment-variables)
255+
256+
envFrom: []
257+
tolerations: []
258+
259+
260+
228261
# Deletes unused Wrongsecrets namespaces after a configurable period of inactivity
229262
wrongsecretsCleanup:
230263
repository: jeroenwillemsen/wrongsecrets-ctf-cleaner

0 commit comments

Comments
 (0)