Skip to content

Commit

Permalink
chore: bump to wrongsecrets 1.9.2 (#729)
Browse files Browse the repository at this point in the history
* chore: bump to wrongsecrets 1.9.2

* [pre-commit.ci lite] apply automatic fixes

---------

Co-authored-by: pre-commit-ci-lite[bot] <117423508+pre-commit-ci-lite[bot]@users.noreply.github.com>
  • Loading branch information
bendehaan and pre-commit-ci-lite[bot] authored Oct 10, 2024
1 parent ed68c10 commit 68a537c
Show file tree
Hide file tree
Showing 5 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion aws/build-and-deploy-aws.sh
Original file line number Diff line number Diff line change
Expand Up @@ -140,7 +140,7 @@ echo "App password is ${APP_PASSWORD}"
echo "executing helm install of wrongsecrets"
helm upgrade --install wrongsecrets ../helm/wrongsecrets-ctf-party \
--set="balancer.env.K8S_ENV=aws" \
--set="balancer.tag=1.9.1beta5-cloud" \
--set="balancer.tag=1.9.2-cloud" \
--set="balancer.env.IRSA_ROLE=${IRSA_ROLE_ARN}" \
--set="balancer.env.REACT_APP_ACCESS_PASSWORD=${APP_PASSWORD}" \
--set="balancer.env.REACT_APP_S3_BUCKET_URL=s3://${STATE_BUCKET}" \
Expand Down
2 changes: 1 addition & 1 deletion azure/build-and-deploy-azure.sh
Original file line number Diff line number Diff line change
Expand Up @@ -153,7 +153,7 @@ echo "You can find the app password in password.txt"

helm upgrade --install wrongsecrets ../helm/wrongsecrets-ctf-party \
--set="balancer.env.K8S_ENV=azure" \
--set="balancer.tag=1.9.0alpha5-cloud" \
--set="balancer.tag=1.9.2-cloud" \
--set="balancer.env.REACT_APP_AZ_BLOB_URL=https://${AZ_STORAGE_ACCOUNT}.blob.core.windows.net/tfstate" \
--set="balancer.env.REACT_APP_ACCESS_PASSWORD=${APP_PASSWORD}" \
--set="balancer.env.REACT_APP_CREATE_TEAM_HMAC_KEY=${CREATE_TEAM_HMAC}" \
Expand Down
2 changes: 1 addition & 1 deletion gcp/build-and-deploy-gcp.sh
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ echo "You can find the app password in password.txt"

helm upgrade --install wrongsecrets ../helm/wrongsecrets-ctf-party \
--set="balancer.env.K8S_ENV=gcp" \
--set="balancer.tag=1.9.0alpha5-cloud" \
--set="balancer.tag=1.9.2-cloud" \
--set="balancer.env.REACT_APP_GCP_BUCKET_URL=https://console.cloud.google.com/storage/browser/${GCP_BUCKET_NAME}" \
--set="balancer.env.REACT_APP_ACCESS_PASSWORD=${APP_PASSWORD}" \
--set="balancer.env.REACT_APP_CREATE_TEAM_HMAC_KEY=${CREATE_TEAM_HMAC}" \
Expand Down
4 changes: 2 additions & 2 deletions helm/wrongsecrets-ctf-party/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -176,7 +176,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
| virtualdesktop.securityContext.readOnlyRootFilesystem | bool | `true` | |
| virtualdesktop.securityContext.runAsNonRoot | bool | `true` | |
| virtualdesktop.securityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
| virtualdesktop.tag | string | `"1.9.2beta11"` | |
| virtualdesktop.tag | string | `"1.9.2"` | |
| virtualdesktop.tolerations | list | `[]` | |
| wrongsecrets.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
| wrongsecrets.config | string | See values.yaml for full details | Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets |
Expand All @@ -189,7 +189,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets
| wrongsecrets.resources | object | `{"requests":{"cpu":"256Mi","memory":"300Mi"}}` | Optional resources definitions to set for each Wrongsecrets instance |
| wrongsecrets.runtimeClassName | string | `nil` | Optional Can be used to configure the runtime class for the Wrongsecrets instances pods to add an additional layer of isolation to reduce the impact of potential container escapes. (see: https://kubernetes.io/docs/concepts/containers/runtime-class/) |
| wrongsecrets.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}}` | Optional securityContext definitions to set for each Wrongsecrets instance |
| wrongsecrets.tag | string | `"1.9.2beta11-no-vault"` | |
| wrongsecrets.tag | string | `"1.9.2-no-vault"` | |
| wrongsecrets.tolerations | list | `[]` | Optional Configure kubernetes toleration for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
| wrongsecrets.volumes | list | `[]` | Optional Volumes to set for each Wrongsecrets instance (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
| wrongsecretsCleanup.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the wrongsecretsCleanup Job(see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
Expand Down
4 changes: 2 additions & 2 deletions helm/wrongsecrets-ctf-party/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ wrongsecrets:
maxInstances: 500
# -- Wrongsecrets Image to use
image: jeroenwillemsen/wrongsecrets
tag: 1.9.2beta11-no-vault
tag: 1.9.2-no-vault
# -- Change the key when hosting a CTF event. This key gets used to generate the challenge flags. See: https://github.com/OWASP/wrongsecrets#ctf
ctfKey: "[email protected]!9uR_K!NfkkTr"
# -- Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets
Expand Down Expand Up @@ -209,7 +209,7 @@ virtualdesktop:
maxInstances: 500
# -- Wrongsecrets Image to use
image: jeroenwillemsen/wrongsecrets-desktop-k8s
tag: 1.9.2beta11
tag: 1.9.2
repository: commjoenie/wrongSecrets
resources:
request:
Expand Down

0 comments on commit 68a537c

Please sign in to comment.