Skip to content

Commit f415017

Browse files
committed
requested changes
Signed-off-by: osamamagdy <[email protected]>
1 parent 9a44c85 commit f415017

File tree

9 files changed

+15
-247
lines changed

9 files changed

+15
-247
lines changed

.github/dependabot.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,3 +34,11 @@ updates:
3434
directory: "/aws"
3535
schedule:
3636
interval: "monthly"
37+
- package-ecosystem: "terraform"
38+
directory: "/azure"
39+
schedule:
40+
interval: "monthly"
41+
- package-ecosystem: "terraform"
42+
directory: "/gcp"
43+
schedule:
44+
interval: "monthly"

gcp/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,13 +54,13 @@ The bucket name should be in the output. Please use that to configure the Terraf
5454
10. Go to the values of the helm chart and replace the wrongsecrets.config with this:
5555

5656
```yaml
57-
K8S_ENV: "azure"
57+
K8S_ENV: "gcp"
5858
```
5959
6060
and replace the value of wrongsecrets.env having the name 'K8S_ENV' with this:
6161
6262
```yaml
63-
value: "azure"
63+
value: "gcp"
6464
```
6565
6666
11. Run `./build-and-deploy-gcp.sh`
@@ -135,7 +135,7 @@ We added additional scripts for adding a Load Balancer and ingress so that you c
135135
Do the following:
136136

137137
1. Follow the installation section first.
138-
2. Run `./k8s-nginx-lb-script.sh` and the script will return the url at which you can reach the application. (Be aware this opens the url's to the internet in general, if you'd like to limit the access please do this using the security groups in Azure)
138+
2. Run `./k8s-nginx-lb-script.sh` and the script will return the url at which you can reach the application. (Be aware this opens the url's to the internet in general, if you'd like to limit the access please do this using the security groups in gcp)
139139
3. When you are done, before you do cleanup, first run `./k8s-nginx-lb-script-cleanup.sh`.
140140

141141
Note that you might have to do some manual cleanups after that.

gcp/build-and-deploy-gcp.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,8 +68,6 @@ echo "Apply secretsmanager storage volume"
6868
kubectl apply -f./k8s/secret-volume.yml
6969

7070

71-
envsubst <./k8s/secret-challenge-vault-deployment.yml.tpl >./k8s/secret-challenge-vault-deployment.yml
72-
7371
echo "Installing metrics api-server"
7472
kubectl apply -f https://github.com/kubernetes-sigs/metrics-server/releases/latest/download/components.yaml
7573

gcp/k8s-nginx-lb-script-cleanup.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,4 +29,4 @@ kubectl delete namespace ingress-nginx
2929
echo "Fecthing network endpoint groups. If this yields results, clean them up:"
3030
gcloud compute network-endpoint-groups list
3131

32-
echo "After tha, you can delete using terraform destroy"
32+
echo "Finished Cleaning ingress, you can now delete everything else using terraform destroy"

gcp/k8s/ctfd_resources/index_fragment.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
<div class="col-md-6 offset-md-3">
33
<img class="w-100 mx-auto d-block" style="max-width: 500px;padding: 50px;padding-top: 14vh;" src="https://owasp.org/www-project-wrongsecrets/assets/images/icon.png" />
44
<h3 class="text-center">
5-
<p>Welcome to the OWASP Benelux day 2022 CTF!</p>
5+
<p>Welcome to the Wrongsecrets CTF Party!</p>
66
<p>Star us on GitHub:</p>
77
<a href="https://github.com/OWASP/wrongsecrets"><i class="fab fa-github fa-2x" aria-hidden="true"></i></a>
88
</h3>

gcp/k8s/secret-challenge-vault-deployment.yml

Lines changed: 0 additions & 119 deletions
This file was deleted.

gcp/k8s/secret-challenge-vault-deployment.yml.tpl

Lines changed: 0 additions & 119 deletions
This file was deleted.

helm/wrongsecrets-ctf-party/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
8282
| balancer.env.GCP_SECRETS_MANAGER_SECRET_ID_1 | string | `"wrongsecret"` | |
8383
| balancer.env.GCP_SECRETS_MANAGER_SECRET_ID_2 | string | `"wrongsecret-2"` | |
8484
| balancer.env.IRSA_ROLE | string | `"arn:aws:iam::233483431651:role/wrongsecrets-secret-manager"` | |
85-
| balancer.env.K8S_ENV | string | `"gcp"` | |
85+
| balancer.env.K8S_ENV | string | `"k8s"` | |
8686
| balancer.env.REACT_APP_ACCESS_PASSWORD | string | `""` | |
8787
| balancer.env.REACT_APP_CREATE_TEAM_HMAC_KEY | string | `"hardcodedkey"` | |
8888
| balancer.env.REACT_APP_CTFD_URL | string | `"https://ctfd.io"` | |

helm/wrongsecrets-ctf-party/values.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ balancer:
9292
REACT_APP_HEROKU_WRONGSECRETS_URL: "https://wrongsecrets-ctf.herokuapp.com" #required for 3 domain setup
9393
REACT_APP_CTFD_URL: "https://ctfd.io" #requierd for 2 and 3 domain setup
9494
REACT_APP_S3_BUCKET_URL: "s3://funstuff" #the s3 bucket you use for teh aws challenges, don't forget to make it accessible!
95-
K8S_ENV: "gcp" #or 'aws', 'azure', or 'gcp'
95+
K8S_ENV: "k8s" #or 'aws', 'azure', or 'gcp'
9696
REACT_APP_ACCESS_PASSWORD: "" #DEFAULT NO PASSWORD, PLAYING THIS IN PUBLIC? PUT A FANCY STRING HERE, BUT BE GENTLE: USERS NEED TO BE ABLE TO COPY THAT STUFF...
9797
REACT_APP_CREATE_TEAM_HMAC_KEY: "hardcodedkey"
9898
IRSA_ROLE: arn:aws:iam::233483431651:role/wrongsecrets-secret-manager #change this in your own AWS role!

0 commit comments

Comments
 (0)