Skip to content

Commit

Permalink
chore(deps): bump kube-bench from v0.6.6 to v0.6.9 (#1240)
Browse files Browse the repository at this point in the history
Signed-off-by: Jose Donizetti <jdbjunior@gmail.com>

Signed-off-by: Jose Donizetti <jdbjunior@gmail.com>
  • Loading branch information
josedonizetti authored Aug 10, 2022
1 parent 37af6ba commit 73f3be9
Show file tree
Hide file tree
Showing 9 changed files with 11 additions and 11 deletions.
2 changes: 1 addition & 1 deletion deploy/helm/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -191,7 +191,7 @@ compliance:
# failEntriesLimit the flag to limit the number of fail entries per control check in the cluster compliance detail report
failEntriesLimit: 10
kubeBench:
imageRef: docker.io/aquasec/kube-bench:v0.6.6
imageRef: docker.io/aquasec/kube-bench:v0.6.9

polaris:
# createConfig indicates whether to create config objects
Expand Down
2 changes: 1 addition & 1 deletion deploy/static/03-starboard-operator.config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ metadata:
data:
vulnerabilityReports.scanner: "Trivy"
configAuditReports.scanner: "Polaris"
kube-bench.imageRef: "docker.io/aquasec/kube-bench:v0.6.6"
kube-bench.imageRef: "docker.io/aquasec/kube-bench:v0.6.9"
compliance.failEntriesLimit: "10"
---
apiVersion: v1
Expand Down
2 changes: 1 addition & 1 deletion deploy/static/starboard.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -806,7 +806,7 @@ metadata:
data:
vulnerabilityReports.scanner: "Trivy"
configAuditReports.scanner: "Polaris"
kube-bench.imageRef: "docker.io/aquasec/kube-bench:v0.6.6"
kube-bench.imageRef: "docker.io/aquasec/kube-bench:v0.6.9"
compliance.failEntriesLimit: "10"
---
apiVersion: v1
Expand Down
2 changes: 1 addition & 1 deletion docs/settings.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ configuration settings for common use cases. For example, switch Trivy from [Sta
| `scanJob.tolerations` | N/A | JSON representation of the [tolerations] to be applied to the scanner pods so that they can run on nodes with matching taints. Example: `'[{"key":"key1", "operator":"Equal", "value":"value1", "effect":"NoSchedule"}]'` |
| `scanJob.annotations` | N/A | One-line comma-separated representation of the annotations which the user wants the scanner pods to be annotated with. Example: `foo=bar,env=stage` will annotate the scanner pods with the annotations `foo: bar` and `env: stage` |
| `scanJob.templateLabel` | N/A | One-line comma-separated representation of the template labels which the user wants the scanner pods to be labeled with. Example: `foo=bar,env=stage` will labeled the scanner pods with the labels `foo: bar` and `env: stage` |
| `kube-bench.imageRef` | `docker.io/aquasec/kube-bench:v0.6.6` | kube-bench image reference |
| `kube-bench.imageRef` | `docker.io/aquasec/kube-bench:v0.6.9` | kube-bench image reference |
| `kube-hunter.imageRef` | `docker.io/aquasec/kube-hunter:0.6.5` | kube-hunter image reference |
| `kube-hunter.quick` | `"false"` | Whether to use kube-hunter's "quick" scanning mode (subnet 24). Set to `"true"` to enable. |
| `compliance.failEntriesLimit` | `"10"` | Limit the number of fail entries per control check in the cluster compliance detail report. |
Expand Down
2 changes: 1 addition & 1 deletion itest/starboard/starboard_cli_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1263,7 +1263,7 @@ var _ = Describe("Starboard CLI", func() {
"Scanner": Equal(v1alpha1.Scanner{
Name: "kube-bench",
Vendor: "Aqua Security",
Version: "v0.6.6",
Version: "v0.6.9",
}),
}),
}))
Expand Down
6 changes: 3 additions & 3 deletions pkg/kubebench/scanner_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ var (

func TestKubeBenchPlugin_GetScanJobSpec(t *testing.T) {
config := starboard.ConfigData{
"kube-bench.imageRef": "docker.io/aquasec/kube-bench:v0.6.6",
"kube-bench.imageRef": "docker.io/aquasec/kube-bench:v0.6.9",
}
node := corev1.Node{
ObjectMeta: metav1.ObjectMeta{
Expand Down Expand Up @@ -96,7 +96,7 @@ func TestKubeBenchPlugin_GetScanJobSpec(t *testing.T) {
Containers: []corev1.Container{
{
Name: "kube-bench",
Image: "docker.io/aquasec/kube-bench:v0.6.6",
Image: "docker.io/aquasec/kube-bench:v0.6.9",
ImagePullPolicy: corev1.PullIfNotPresent,
TerminationMessagePolicy: corev1.TerminationMessageFallbackToLogsOnError,
Command: []string{"sh"},
Expand Down Expand Up @@ -153,7 +153,7 @@ func TestKubeBenchPlugin_GetScanJobSpec(t *testing.T) {

func TestKubeBenchPlugin_ParseCISKubeBenchOutput(t *testing.T) {
config := starboard.ConfigData{
"kube-bench.imageRef": "docker.io/aquasec/kube-bench:v0.6.6",
"kube-bench.imageRef": "docker.io/aquasec/kube-bench:v0.6.9",
}
var testCases = []struct {
name string
Expand Down
2 changes: 1 addition & 1 deletion pkg/kubebench/testdata/goldenMultiple.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"scanner": {
"name": "kube-bench",
"vendor": "Aqua Security",
"version": "v0.6.6"
"version": "v0.6.9"
},
"summary": {
"passCount": 82,
Expand Down
2 changes: 1 addition & 1 deletion pkg/kubebench/testdata/goldenSingle.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"scanner": {
"name": "kube-bench",
"vendor": "Aqua Security",
"version": "v0.6.6"
"version": "v0.6.9"
},
"summary": {
"passCount": 41,
Expand Down
2 changes: 1 addition & 1 deletion pkg/starboard/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@ func GetDefaultConfig() ConfigData {
keyVulnerabilityReportsScanner: "Trivy",
keyConfigAuditReportsScanner: "Polaris",

"kube-bench.imageRef": "docker.io/aquasec/kube-bench:v0.6.6",
"kube-bench.imageRef": "docker.io/aquasec/kube-bench:v0.6.9",
"kube-hunter.imageRef": "docker.io/aquasec/kube-hunter:0.6.5",
"kube-hunter.quick": "false",
"compliance.failEntriesLimit": "10",
Expand Down

0 comments on commit 73f3be9

Please sign in to comment.