diff --git a/aws/build-and-deploy-aws.sh b/aws/build-and-deploy-aws.sh index 1db813a48..75bcc1c4f 100755 --- a/aws/build-and-deploy-aws.sh +++ b/aws/build-and-deploy-aws.sh @@ -140,7 +140,7 @@ echo "App password is ${APP_PASSWORD}" echo "executing helm install of wrongsecrets" helm upgrade --install wrongsecrets ../helm/wrongsecrets-ctf-party \ --set="balancer.env.K8S_ENV=aws" \ - --set="balancer.tag=1.9.1beta5-cloud" \ + --set="balancer.tag=1.9.2-cloud" \ --set="balancer.env.IRSA_ROLE=${IRSA_ROLE_ARN}" \ --set="balancer.env.REACT_APP_ACCESS_PASSWORD=${APP_PASSWORD}" \ --set="balancer.env.REACT_APP_S3_BUCKET_URL=s3://${STATE_BUCKET}" \ diff --git a/azure/build-and-deploy-azure.sh b/azure/build-and-deploy-azure.sh index 68028d461..15c07976b 100755 --- a/azure/build-and-deploy-azure.sh +++ b/azure/build-and-deploy-azure.sh @@ -153,7 +153,7 @@ echo "You can find the app password in password.txt" helm upgrade --install wrongsecrets ../helm/wrongsecrets-ctf-party \ --set="balancer.env.K8S_ENV=azure" \ - --set="balancer.tag=1.9.0alpha5-cloud" \ + --set="balancer.tag=1.9.2-cloud" \ --set="balancer.env.REACT_APP_AZ_BLOB_URL=https://${AZ_STORAGE_ACCOUNT}.blob.core.windows.net/tfstate" \ --set="balancer.env.REACT_APP_ACCESS_PASSWORD=${APP_PASSWORD}" \ --set="balancer.env.REACT_APP_CREATE_TEAM_HMAC_KEY=${CREATE_TEAM_HMAC}" \ diff --git a/gcp/build-and-deploy-gcp.sh b/gcp/build-and-deploy-gcp.sh index 58cec4358..1151369c7 100755 --- a/gcp/build-and-deploy-gcp.sh +++ b/gcp/build-and-deploy-gcp.sh @@ -104,7 +104,7 @@ echo "You can find the app password in password.txt" helm upgrade --install wrongsecrets ../helm/wrongsecrets-ctf-party \ --set="balancer.env.K8S_ENV=gcp" \ - --set="balancer.tag=1.9.0alpha5-cloud" \ + --set="balancer.tag=1.9.2-cloud" \ --set="balancer.env.REACT_APP_GCP_BUCKET_URL=https://console.cloud.google.com/storage/browser/${GCP_BUCKET_NAME}" \ --set="balancer.env.REACT_APP_ACCESS_PASSWORD=${APP_PASSWORD}" \ --set="balancer.env.REACT_APP_CREATE_TEAM_HMAC_KEY=${CREATE_TEAM_HMAC}" \ diff --git a/helm/wrongsecrets-ctf-party/README.md b/helm/wrongsecrets-ctf-party/README.md index 20888e298..43b770008 100644 --- a/helm/wrongsecrets-ctf-party/README.md +++ b/helm/wrongsecrets-ctf-party/README.md @@ -176,7 +176,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets | virtualdesktop.securityContext.readOnlyRootFilesystem | bool | `true` | | | virtualdesktop.securityContext.runAsNonRoot | bool | `true` | | | virtualdesktop.securityContext.seccompProfile.type | string | `"RuntimeDefault"` | | -| virtualdesktop.tag | string | `"1.9.2beta11"` | | +| virtualdesktop.tag | string | `"1.9.2"` | | | virtualdesktop.tolerations | list | `[]` | | | wrongsecrets.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) | | wrongsecrets.config | string | See values.yaml for full details | Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets | @@ -189,7 +189,7 @@ Run Multi User "Capture the Flags" or Security Trainings with OWASP Wrongsecrets | wrongsecrets.resources | object | `{"requests":{"cpu":"256Mi","memory":"300Mi"}}` | Optional resources definitions to set for each Wrongsecrets instance | | wrongsecrets.runtimeClassName | string | `nil` | Optional Can be used to configure the runtime class for the Wrongsecrets instances pods to add an additional layer of isolation to reduce the impact of potential container escapes. (see: https://kubernetes.io/docs/concepts/containers/runtime-class/) | | wrongsecrets.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}}` | Optional securityContext definitions to set for each Wrongsecrets instance | -| wrongsecrets.tag | string | `"1.9.2beta11-no-vault"` | | +| wrongsecrets.tag | string | `"1.9.2-no-vault"` | | | wrongsecrets.tolerations | list | `[]` | Optional Configure kubernetes toleration for the created Wrongsecrets instances (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) | | wrongsecrets.volumes | list | `[]` | Optional Volumes to set for each Wrongsecrets instance (see: https://kubernetes.io/docs/concepts/storage/volumes/) | | wrongsecretsCleanup.affinity | object | `{}` | Optional Configure kubernetes scheduling affinity for the wrongsecretsCleanup Job(see: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) | diff --git a/helm/wrongsecrets-ctf-party/values.yaml b/helm/wrongsecrets-ctf-party/values.yaml index b5f85e12f..037650752 100644 --- a/helm/wrongsecrets-ctf-party/values.yaml +++ b/helm/wrongsecrets-ctf-party/values.yaml @@ -147,7 +147,7 @@ wrongsecrets: maxInstances: 500 # -- Wrongsecrets Image to use image: jeroenwillemsen/wrongsecrets - tag: 1.9.2beta11-no-vault + tag: 1.9.2-no-vault # -- Change the key when hosting a CTF event. This key gets used to generate the challenge flags. See: https://github.com/OWASP/wrongsecrets#ctf ctfKey: "zLp@.-6fMW6L-7R3b!9uR_K!NfkkTr" # -- Specify a custom Wrongsecrets config.yaml. See the Wrongsecrets Docs for any needed ENVs: https://github.com/OWASP/wrongsecrets @@ -209,7 +209,7 @@ virtualdesktop: maxInstances: 500 # -- Wrongsecrets Image to use image: jeroenwillemsen/wrongsecrets-desktop-k8s - tag: 1.9.2beta11 + tag: 1.9.2 repository: commjoenie/wrongSecrets resources: request: