From 05f3c4b340faeaf69f83eaf6a181c7c467552158 Mon Sep 17 00:00:00 2001 From: Jeroen Willemsen Date: Mon, 8 Jul 2024 19:58:44 +0200 Subject: [PATCH] Release 1.9.0 --- .github/scripts/.bash_history | 2 +- Dockerfile.web | 4 ++-- aws/k8s/secret-challenge-vault-deployment.yml | 2 +- azure/k8s/secret-challenge-vault-deployment.yml.tpl | 2 +- fly.toml | 2 +- gcp/k8s/secret-challenge-vault-deployment.yml.tpl | 2 +- js/index.js | 2 +- k8s/secret-challenge-deployment.yml | 2 +- k8s/secret-challenge-vault-deployment.yml | 2 +- okteto/k8s/secret-challenge-ctf-deployment.yml | 2 +- okteto/k8s/secret-challenge-deployment.yml | 2 +- 11 files changed, 12 insertions(+), 12 deletions(-) diff --git a/.github/scripts/.bash_history b/.github/scripts/.bash_history index 9bcb367c4..af44606c0 100644 --- a/.github/scripts/.bash_history +++ b/.github/scripts/.bash_history @@ -347,7 +347,7 @@ rm -rf jdk-18_linux-x64_bin.deb git rebase -i main git rebase -i master git stash -export tempPassword="X7CfStlX2wOz2uSar0hUirsoXAW2f4Z8BDdjoqc4Bh0=" +export tempPassword="9JrI2Z/bBdMdQhYfUUlQToF3/vvFUf0pkGrBKeuH7d8=" mvn run tempPassword k6 npx k6 diff --git a/Dockerfile.web b/Dockerfile.web index c309bd67f..4a376cd44 100644 --- a/Dockerfile.web +++ b/Dockerfile.web @@ -1,5 +1,5 @@ -FROM jeroenwillemsen/wrongsecrets:1.9.0RC1-no-vault -ARG argBasedVersion="1.9.0RC1-no-vault" +FROM jeroenwillemsen/wrongsecrets:1.9.0-no-vault +ARG argBasedVersion="1.9.0-no-vault" ARG CANARY_URLS="http://canarytokens.com/terms/about/s7cfbdakys13246ewd8ivuvku/post.jsp,http://canarytokens.com/terms/about/y0all60b627gzp19ahqh7rl6j/post.jsp" ARG CTF_ENABLED=false ARG HINTS_ENABLED=true diff --git a/aws/k8s/secret-challenge-vault-deployment.yml b/aws/k8s/secret-challenge-vault-deployment.yml index 5fe665ac3..c02ee9ffa 100644 --- a/aws/k8s/secret-challenge-vault-deployment.yml +++ b/aws/k8s/secret-challenge-vault-deployment.yml @@ -58,7 +58,7 @@ spec: volumeAttributes: secretProviderClass: "wrongsecrets-aws-secretsmanager" containers: - - image: jeroenwillemsen/wrongsecrets:1.9.0RC1-k8s-vault + - image: jeroenwillemsen/wrongsecrets:1.9.0-k8s-vault imagePullPolicy: IfNotPresent name: secret-challenge command: [ "/bin/sh" ] diff --git a/azure/k8s/secret-challenge-vault-deployment.yml.tpl b/azure/k8s/secret-challenge-vault-deployment.yml.tpl index 7ba6f248b..ea95a6f9e 100644 --- a/azure/k8s/secret-challenge-vault-deployment.yml.tpl +++ b/azure/k8s/secret-challenge-vault-deployment.yml.tpl @@ -61,7 +61,7 @@ spec: volumeAttributes: secretProviderClass: "azure-wrongsecrets-vault" containers: - - image: jeroenwillemsen/wrongsecrets:1.9.0RC1-k8s-vault + - image: jeroenwillemsen/wrongsecrets:1.9.0-k8s-vault imagePullPolicy: IfNotPresent name: secret-challenge command: ["/bin/sh"] diff --git a/fly.toml b/fly.toml index a0090ec4e..4b7fa6bb7 100644 --- a/fly.toml +++ b/fly.toml @@ -8,7 +8,7 @@ app = "wrongsecrets" primary_region = "ams" [build] - image = "docker.io/jeroenwillemsen/wrongsecrets:1.9.0RC1-no-vault" + image = "docker.io/jeroenwillemsen/wrongsecrets:1.9.0-no-vault" [env] K8S_ENV = "Fly(Docker)" diff --git a/gcp/k8s/secret-challenge-vault-deployment.yml.tpl b/gcp/k8s/secret-challenge-vault-deployment.yml.tpl index 0cb07687a..e7bc6ee21 100644 --- a/gcp/k8s/secret-challenge-vault-deployment.yml.tpl +++ b/gcp/k8s/secret-challenge-vault-deployment.yml.tpl @@ -58,7 +58,7 @@ spec: volumeAttributes: secretProviderClass: "wrongsecrets-gcp-secretsmanager" containers: - - image: jeroenwillemsen/wrongsecrets:1.9.0RC1-k8s-vault + - image: jeroenwillemsen/wrongsecrets:1.9.0-k8s-vault imagePullPolicy: IfNotPresent name: secret-challenge command: ["/bin/sh"] diff --git a/js/index.js b/js/index.js index 095838024..0e4f2166f 100644 --- a/js/index.js +++ b/js/index.js @@ -1,5 +1,5 @@ function secret() { - var password = "qU6u6WA=" + 9 + "R9KX" + 6 + "Ob8=" + 2 + "nZs/" + 7; + var password = "bLyTXxM=" + 9 + "vucJ" + 6 + "F30=" + 2 + "Hqp3" + 7; return password; } diff --git a/k8s/secret-challenge-deployment.yml b/k8s/secret-challenge-deployment.yml index db16f722d..45f020e7a 100644 --- a/k8s/secret-challenge-deployment.yml +++ b/k8s/secret-challenge-deployment.yml @@ -28,7 +28,7 @@ spec: runAsGroup: 2000 fsGroup: 2000 containers: - - image: jeroenwillemsen/wrongsecrets:1.9.0RC1-no-vault + - image: jeroenwillemsen/wrongsecrets:1.9.0-no-vault imagePullPolicy: IfNotPresent name: secret-challenge ports: diff --git a/k8s/secret-challenge-vault-deployment.yml b/k8s/secret-challenge-vault-deployment.yml index 899343977..1a4c915bb 100644 --- a/k8s/secret-challenge-vault-deployment.yml +++ b/k8s/secret-challenge-vault-deployment.yml @@ -50,7 +50,7 @@ spec: type: RuntimeDefault serviceAccountName: vault containers: - - image: jeroenwillemsen/wrongsecrets:1.9.0RC1-k8s-vault + - image: jeroenwillemsen/wrongsecrets:1.9.0-k8s-vault imagePullPolicy: IfNotPresent name: secret-challenge command: ["/bin/sh"] diff --git a/okteto/k8s/secret-challenge-ctf-deployment.yml b/okteto/k8s/secret-challenge-ctf-deployment.yml index b29ddec25..83cdcabe0 100644 --- a/okteto/k8s/secret-challenge-ctf-deployment.yml +++ b/okteto/k8s/secret-challenge-ctf-deployment.yml @@ -28,7 +28,7 @@ spec: runAsGroup: 2000 fsGroup: 2000 containers: - - image: jeroenwillemsen/wrongsecrets:1.9.0RC1-no-vault + - image: jeroenwillemsen/wrongsecrets:1.9.0-no-vault name: secret-challenge-ctf imagePullPolicy: IfNotPresent securityContext: diff --git a/okteto/k8s/secret-challenge-deployment.yml b/okteto/k8s/secret-challenge-deployment.yml index 99d6e3807..b18eb668b 100644 --- a/okteto/k8s/secret-challenge-deployment.yml +++ b/okteto/k8s/secret-challenge-deployment.yml @@ -28,7 +28,7 @@ spec: runAsGroup: 2000 fsGroup: 2000 containers: - - image: jeroenwillemsen/wrongsecrets:1.9.0RC1-no-vault + - image: jeroenwillemsen/wrongsecrets:1.9.0-no-vault name: secret-challenge imagePullPolicy: IfNotPresent securityContext: