You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Feat: initial start with k8s 1.25 migration
* bump to k8s 1.25.6 in workflows
* Feat(646): Adding PSA to k8s def files
* feat(646): Update required config for minikube configration part 2
* feat(1.25): updated namespaced creation of vault as vault needs different security context config than our main workload
* feat(1.25): updated vault liveiness checks as we have to test after every step again
* feat(646): adding service account, BUT CONFIG OF APP NEEDS TO BE UPDATED TO CONTACT VAULT IN THE RIGHT NS
* feat(646): First working setup for k8s minikube vault done, now preparing aws, azure, and okteto (to be finished & tested)
* feat(646): complete okteto setup: we cannot do anything with workspace patching, tehrefore limitting securitycontext only
* Feat(636): fix docs
* feat(646): make http the same for all providers
* feat(646): make precommit happy :(
* fix(646): fix readmes again....
* build(deps): update hashicorp/google-beta requirement from ~> 4.54.0 to ~> 4.55.0
Updates the requirements on [hashicorp/google-beta](https://github.com/hashicorp/terraform-provider-google-beta) to permit the latest version.
- [Release notes](https://github.com/hashicorp/terraform-provider-google-beta/releases)
- [Changelog](https://github.com/hashicorp/terraform-provider-google-beta/blob/main/CHANGELOG.md)
- [Commits](hashicorp/terraform-provider-google-beta@v4.54.0...v4.55.0)
---
updated-dependencies:
- dependency-name: hashicorp/google-beta
dependency-type: direct:production
...
Signed-off-by: dependabot[bot] <[email protected]>
* build(deps): update hashicorp/google requirement from ~> 4.54.0 to ~> 4.55.0
Updates the requirements on [hashicorp/google](https://github.com/hashicorp/terraform-provider-google) to permit the latest version.
- [Release notes](https://github.com/hashicorp/terraform-provider-google/releases)
- [Changelog](https://github.com/hashicorp/terraform-provider-google/blob/main/CHANGELOG.md)
- [Commits](hashicorp/terraform-provider-google@v4.54.0...v4.55.0)
---
updated-dependencies:
- dependency-name: hashicorp/google
dependency-type: direct:production
...
Signed-off-by: dependabot[bot] <[email protected]>
* Adding the Table of contents
* doc(x): added @puneeth072003 as contriubtor
* Adding the requeseted changes
* Making corrections
* Fixed spelling
* Update README.md
* Feat(OWASP#646): updated centralized vault upgrade script, migrated GCP to k8s 1.25
* Feat(OWASP#646): updated gcp docs
* feat(OWASP#646): Started Azure migration (Found out we have to migrate to azure identities, wIP
* feat(OWASP#646): Got Kubernetes 1.25 working in Azure using audit with aad-pod-identity
* fix: add terraform lockfiles
* fix: fix AWS setup for k8s 1.25
* Update README.md
* build(deps): bump erzz/codeclimate-standalone from 0.0.4 to 0.0.5
Bumps [erzz/codeclimate-standalone](https://github.com/erzz/codeclimate-standalone) from 0.0.4 to 0.0.5.
- [Release notes](https://github.com/erzz/codeclimate-standalone/releases)
- [Changelog](https://github.com/erzz/codeclimate-standalone/blob/main/CHANGELOG.md)
- [Commits](erzz/codeclimate-standalone@v0.0.4...v0.0.5)
---
updated-dependencies:
- dependency-name: erzz/codeclimate-standalone
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <[email protected]>
* Update codeclimate_standalone.yml
---------
Signed-off-by: dependabot[bot] <[email protected]>
Co-authored-by: Jeroen Willemsen <[email protected]>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Ben de Haan <[email protected]>
@@ -283,7 +318,7 @@ We have 3 ways of playing CTFs:
283
318
Want to use CTFD to play a CTF based on the free Heroku wrongsecrets-ctf instance together with CTFD? You can!
284
319
285
320
NOTE: CTFD support now works based on the [Juiceshop CTF CLI](https://github.com/juice-shop/juice-shop-ctf).
286
-
NOTE-II: [https://wrongsecrets-ctf.herokuapp.com](https://wrongsecrets-ctf.herokuapp.com) is based on a free heroku instance, which takes time to warm up.
321
+
NOTE-II: [https://wrongsecrets-ctf.herokuapp.com](https://wrongsecrets-ctf.herokuapp.com)(temporary down based on lack of oss credits) is based on a free heroku instance, which takes time to warm up.
287
322
Initial creation of the zip file for CTFD requires you to visit [https://wrongsecrets-ctf.herokuapp.com/api/Challenges](https://wrongsecrets-ctf.herokuapp.com/api/Challenges) once before executing the steps below.
288
323
289
324
Follow the following steps:
@@ -313,16 +348,16 @@ For development on local machine use the `local` profile `./mvnw spring-boot:run
313
348
If you want to test against vault without K8s: start vault locally with
vault kv put secret/secret-challenge vaultpassword.password="$(openssl rand -base64 16)"
328
363
```
@@ -359,6 +394,8 @@ Requirements: make sure you have the following tools installed: [Docker](https:/
359
394
7. Now go to the run configuration of the app and make sure you have the active profile `without-vault`. This is done by setting the VM options arguments to `-Dserver.port=8080 -Dspring.profiles.active=local,without-vault`. Set `K8S_ENV=docker` as environment argument.
360
395
8. Repeat step 6: run the app again, you should have a properly running application which is visitable in your browser at http://localhost:8080.
361
396
397
+
**Pictorial Guide** on how to get the project started in IntelliJ IDEA is available at [*Contributing.md*](https://github.com/OWASP/wrongsecrets/blob/master/CONTRIBUTING.md#how-to-get-started-with-the-project-in-intellij-idea).
398
+
362
399
Feel free to edit and propose changes via pull requests. Be sure to follow our guidance in the [documentation](https://github.com/OWASP/wrongsecrets/blob/master/CONTRIBUTING.md) to get your work accepted.
363
400
364
401
Please note that we officially only support Linux and MacOS for development. If you want to develop using a Windows machine, use WSL2 or a virtual machine running Linux. We did include Windows detection & a bunch of `exe` files for a first experiment, but are looking for active maintainers of them. Want to make sure it runs on Windows? Create PRs ;-).
@@ -385,6 +422,8 @@ Follow the steps below on adding a challenge:
385
422
4. Don't forget to add `@Order` annotation to your challenge ;-).
386
423
5. Review the [CONTRIBUTING guide](CONTRIBUTING.md) for setting up your contributing environment and writing good commit messages.
387
424
425
+
For more details please refer [*Contributing.md*](https://github.com/OWASP/wrongsecrets/blob/master/CONTRIBUTING.md#how-to-add-a-challenge).
426
+
388
427
If you want to move existing cloud challenges to another cloud: extend Challenge classes in the `org.owasp.wrongsecrets.challenges.cloud` package and make sure you add the required Terraform in a folder with the separate cloud identified. Make sure that the environment is added to `org.owasp.wrongsecrets.RuntimeEnvironment`.
389
428
Collaborate with the others at the project to get your container running so you can test at the cloud account.
Copy file name to clipboardExpand all lines: aws/k8s-vault-aws-start.sh
+3Lines changed: 3 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,9 @@ AWS_REGION="eu-west-1"
12
12
echo"This is a script to bootstrap the configuration. You need to have installed: helm, kubectl, jq, vault, grep, cat, sed, and awscli, and is only tested on mac, Debian and Ubuntu"
13
13
echo"This script is based on the steps defined in https://learn.hashicorp.com/tutorials/vault/kubernetes-minikube. Vault is awesome!"
14
14
15
+
echo"Setting up workspace PSA to restricted for default"
16
+
kubectl apply -f ../k8s/workspace-psa.yml
17
+
15
18
kubectl get configmaps | grep 'secrets-file'&>/dev/null
0 commit comments