Skip to content

Commit

Permalink
release: prepare v0.4.0-rc (#566)
Browse files Browse the repository at this point in the history
* release: prepare v0.4.0-rc

Signed-off-by: chenk <hen.keinan@gmail.com>

* release: prepare v0.4.0-rc

Signed-off-by: chenk <hen.keinan@gmail.com>

Signed-off-by: chenk <hen.keinan@gmail.com>
  • Loading branch information
chen-keinan authored Oct 7, 2022
1 parent cfbfcab commit 5b9498d
Show file tree
Hide file tree
Showing 10 changed files with 33 additions and 33 deletions.
4 changes: 2 additions & 2 deletions deploy/helm/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,12 +6,12 @@ type: application
# This is the chart version. This version number should be incremented each time you make changes
# to the chart and its templates, including the app version.
# Versions are expected to follow Semantic Versioning (https://semver.org/)
version: 0.3.0
version: 0.4.0-rc

# This is the version number of the application being deployed. This version number should be
# incremented each time you make changes to the application. Versions are not expected to
# follow Semantic Versioning. They should reflect the version the application is using.
appVersion: 0.3.0
appVersion: 0.4.0-rc

# kubeVersion: A SemVer range of compatible Kubernetes versions (optional)

Expand Down
2 changes: 1 addition & 1 deletion deploy/helm/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ operator:
configAuditScannerScanOnlyCurrentRevisions: true
# batchDeleteDelay the duration to wait before deleting another batch of config audit reports.
batchDeleteDelay: 10s
# accessGlobalSecretsAndServiceAccount The flag to enable access to global secrets/service accounts to allow `vulnerability scan job` to pull images from private registries
# accessGlobalSecretsAndServiceAccount The flag to enable access to global secrets/service accounts to allow `vulnerability scan job` to pull images from private registries
accessGlobalSecretsAndServiceAccount: true

# metricsFindingsEnabled the flag to enable metrics for findings
Expand Down
2 changes: 1 addition & 1 deletion deploy/specs/nsa-1.0.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
spec:
name: nsa
Expand Down
2 changes: 1 addition & 1 deletion deploy/static/namespace.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,5 +6,5 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
36 changes: 18 additions & 18 deletions deploy/static/trivy-operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1160,7 +1160,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
---
# Source: trivy-operator/templates/config.yaml
Expand All @@ -1172,7 +1172,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
data:
---
Expand All @@ -1185,7 +1185,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
data:
scanJob.podTemplateContainerSecurityContext: "{\"allowPrivilegeEscalation\":false,\"capabilities\":{\"drop\":[\"ALL\"]},\"privileged\":false,\"readOnlyRootFilesystem\":true}"
Expand All @@ -1201,7 +1201,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
data:
trivy.repository: "ghcr.io/aquasecurity/trivy"
Expand Down Expand Up @@ -1229,7 +1229,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
spec:
replicas: 1
Expand All @@ -1249,7 +1249,7 @@ spec:
automountServiceAccountToken: true
containers:
- name: "trivy-operator"
image: "ghcr.io/aquasecurity/trivy-operator:0.3.0"
image: "ghcr.io/aquasecurity/trivy-operator:0.4.0-rc"
imagePullPolicy: IfNotPresent
env:
- name: OPERATOR_NAMESPACE
Expand Down Expand Up @@ -1349,7 +1349,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
rules:
- apiGroups:
Expand All @@ -1376,7 +1376,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
roleRef:
apiGroup: rbac.authorization.k8s.io
Expand All @@ -1396,7 +1396,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
data:
# example
Expand Down Expand Up @@ -1446,7 +1446,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
---
# Source: trivy-operator/templates/rbac.yaml
Expand Down Expand Up @@ -1745,7 +1745,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
Expand All @@ -1770,7 +1770,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
Expand All @@ -1795,7 +1795,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
Expand All @@ -1819,7 +1819,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
roleRef:
apiGroup: rbac.authorization.k8s.io
Expand All @@ -1839,7 +1839,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
rules:
- apiGroups:
Expand Down Expand Up @@ -1869,7 +1869,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
roleRef:
apiGroup: rbac.authorization.k8s.io
Expand All @@ -1889,7 +1889,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
spec:
clusterIP: None
Expand All @@ -1909,5 +1909,5 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/version: "0.3.0"
app.kubernetes.io/version: "0.4.0-rc"
app.kubernetes.io/managed-by: kubectl
2 changes: 1 addition & 1 deletion docs/crds/configaudit-report.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ report:
scanner:
name: Trivy
vendor: Aqua Security
version: '0.3.0'
version: '0.4.0-rc'
summary:
criticalCount: 2
highCount: 0
Expand Down
2 changes: 1 addition & 1 deletion docs/crds/exposedsecret-report.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ metadata:
report:
artifact:
repository: myimagewithsecret
tag: v0.3.0
tag: v0.4.0-rc
registry:
server: index.docker.io
scanner:
Expand Down
2 changes: 1 addition & 1 deletion docs/crds/rbacassessment-report.md
Original file line number Diff line number Diff line change
Expand Up @@ -177,7 +177,7 @@ report:
scanner:
name: Trivy
vendor: Aqua Security
version: '0.3.0'
version: '0.4.0-rc'
summary:
criticalCount: 1
highCount: 0
Expand Down
10 changes: 5 additions & 5 deletions docs/tutorials/private-registries.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ Lastly, we can deploy the operator inside our cluster with referencing our new `
helm upgrade --install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
--version 0.3.0
--version 0.4.0-rc
--values ./values.yaml
```

Expand All @@ -55,7 +55,7 @@ Alternatively, it is possible to set the values directly through Helm instead of
helm upgrade --install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
--version 0.3.0
--version 0.4.0-rc
--set="trivy.command=fs"
--set="trivyOperator.scanJobPodTemplateContainerSecurityContext.runAsUser=0"
```
Expand Down Expand Up @@ -218,7 +218,7 @@ Lastly, we can deploy the operator inside our cluster with referencing our new `
helm upgrade --install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
--version 0.3.0
--version 0.4.0-rc
--values ./values.yaml
```

Expand All @@ -227,7 +227,7 @@ Alternatively, it is possible to set the values directly through Helm instead of
helm upgrade --install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
--version 0.3.0
--version 0.4.0-rc
--set-json='operator.privateRegistryScanSecretsNames={"app":"dockerconfigjson-github-com"}'
```

Expand All @@ -249,5 +249,5 @@ trivy-operator 1/1 1 1 99s

The last way that you could give the Trivy operator access to your private container registry is through managed registries. In this case, the container registry and your Kubernetes cluster would have to be on the same cloud provider; then you can define access to your container namespace as part of the IAM account. Once defined, trivy will already have the permissions for the registry.

For additional information, please refer to the [documentation on managed registries.](https://aquasecurity.github.io/trivy-operator/v0.3.0/vulnerability-scanning/managed-registries/#amazon-elastic-container-registry-ecr)
For additional information, please refer to the [documentation on managed registries.](https://aquasecurity.github.io/trivy-operator/v0.4.0-rc/vulnerability-scanning/managed-registries/#amazon-elastic-container-registry-ecr)

4 changes: 2 additions & 2 deletions mkdocs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -78,8 +78,8 @@ extra:
method: mike
provider: mike
var:
prev_git_tag: "v0.2.1"
chart_version: "0.3.0"
prev_git_tag: "v0.3.0"
chart_version: "0.4.0-rc"

plugins:
- search
Expand Down

0 comments on commit 5b9498d

Please sign in to comment.