Skip to content

Commit

Permalink
chore: Bump up kube-bench from v0.5.0 to v0.6.3 (#630)
Browse files Browse the repository at this point in the history
Signed-off-by: Daniel Pacak <pacak.daniel@gmail.com>
  • Loading branch information
danielpacak authored Jun 26, 2021
1 parent 5623487 commit 0d612c1
Show file tree
Hide file tree
Showing 6 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion deploy/helm/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ trivy:
severity: UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL

kubeBench:
imageRef: docker.io/aquasec/kube-bench:0.5.0
imageRef: docker.io/aquasec/kube-bench:0.6.3

polaris:
imageRef: quay.io/fairwinds/polaris:3.2
Expand Down
2 changes: 1 addition & 1 deletion deploy/static/05-starboard-operator.config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ metadata:
data:
vulnerabilityReports.scanner: Trivy
configAuditReports.scanner: Polaris
kube-bench.imageRef: docker.io/aquasec/kube-bench:0.5.0
kube-bench.imageRef: docker.io/aquasec/kube-bench:0.6.3
---
apiVersion: v1
kind: ConfigMap
Expand Down
2 changes: 1 addition & 1 deletion docs/settings.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ The following tables list available configuration settings with their default va
| `trivy.insecureRegistry.<id>` | N/A | The registry to which insecure connections are allowed. There can be multiple registries with different registry `<id>`. |
| `aqua.imageRef` | `docker.io/aquasec/scanner:5.3` | Aqua scanner image reference. The tag determines the version of the `scanner` binary executable and it must be compatible with version of Aqua console. |
| `aqua.serverURL` | N/A | The endpoint URL of Aqua management console |
| `kube-bench.imageRef` | `docker.io/aquasec/kube-bench:0.5.0` | kube-bench image reference |
| `kube-bench.imageRef` | `docker.io/aquasec/kube-bench:0.6.3` | kube-bench image reference |
| `kube-hunter.imageRef` | `docker.io/aquasec/kube-hunter:0.4.1` | kube-hunter image reference |
| `kube-hunter.quick` | `"false"` | Whether to use kube-hunter's "quick" scanning mode (subnet 24). Set to `"true"` to enable. |
| `polaris.imageRef` | `quay.io/fairwinds/polaris:3.2` | Polaris image reference |
Expand Down
2 changes: 1 addition & 1 deletion itest/starboard/starboard_cli_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1044,7 +1044,7 @@ var _ = Describe("Starboard CLI", func() {
"Scanner": Equal(v1alpha1.Scanner{
Name: "kube-bench",
Vendor: "Aqua Security",
Version: "0.5.0",
Version: "0.6.3",
}),
}),
}))
Expand Down
4 changes: 2 additions & 2 deletions pkg/kubebench/scanner_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ var (

func TestKubeBenchPlugin_GetScanJobSpec(t *testing.T) {
config := starboard.ConfigData{
"kube-bench.imageRef": "docker.io/aquasec/kube-bench:0.5.0",
"kube-bench.imageRef": "docker.io/aquasec/kube-bench:0.6.3",
}
node := corev1.Node{
ObjectMeta: metav1.ObjectMeta{
Expand Down Expand Up @@ -96,7 +96,7 @@ func TestKubeBenchPlugin_GetScanJobSpec(t *testing.T) {
Containers: []corev1.Container{
{
Name: "kube-bench",
Image: "docker.io/aquasec/kube-bench:0.5.0",
Image: "docker.io/aquasec/kube-bench:0.6.3",
ImagePullPolicy: corev1.PullIfNotPresent,
TerminationMessagePolicy: corev1.TerminationMessageFallbackToLogsOnError,
Command: []string{"sh"},
Expand Down
2 changes: 1 addition & 1 deletion pkg/starboard/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ func GetDefaultConfig() ConfigData {
keyVulnerabilityReportsScanner: string(Trivy),
keyConfigAuditReportsScanner: string(Polaris),

"kube-bench.imageRef": "docker.io/aquasec/kube-bench:0.5.0",
"kube-bench.imageRef": "docker.io/aquasec/kube-bench:0.6.3",
"kube-hunter.imageRef": "docker.io/aquasec/kube-hunter:0.4.1",
"kube-hunter.quick": "false",
}
Expand Down

0 comments on commit 0d612c1

Please sign in to comment.