Skip to content

Commit

Permalink
🛡️ security(VSecM Helm Charts): add security labels to namespaces (#1035
Browse files Browse the repository at this point in the history
)

* 🛡️ security(VSecM Helm Charts): add security labels to namespaces

Signed-off-by: Volkan Ă–zçelik <[email protected]>

* version update

Signed-off-by: Volkan Ă–zçelik <[email protected]>

* add helm charts work

Signed-off-by: Volkan Ă–zçelik <[email protected]>

* remove redundant manifests

Signed-off-by: Volkan Ă–zçelik <[email protected]>

---------

Signed-off-by: Volkan Ă–zçelik <[email protected]>
  • Loading branch information
v0lkan authored Jul 1, 2024
1 parent 616bcb9 commit ecff796
Show file tree
Hide file tree
Showing 116 changed files with 6,598 additions and 259 deletions.
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
ifdef VSECM_VERSION
VERSION := $(VSECM_VERSION)
else
VERSION := 0.26.0
VERSION := 0.26.1
endif

# Set deploySpire to false, if you want to use existing spire deployment
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/example/init-container.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o example \
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/example/multiple-secrets.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o sloth \
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/example/sdk-go.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o env \
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/example/sidecar.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o env \
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/util/inspector.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o sloth \
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/util/keygen.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o vsecm-keygen \
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist-fips/init-container.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ RUN CGO_ENABLED=0 GOEXPERIMENT=boringcrypto GOOS=linux go build -mod vendor -a -
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist-fips/keystone.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ RUN CGO_ENABLED=0 GOEXPERIMENT=boringcrypto GOOS=linux go build -mod vendor -a -
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist-fips/safe.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ RUN CGO_ENABLED=0 GOEXPERIMENT=boringcrypto GOOS=linux go build -mod vendor -a -
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist-fips/sentinel.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ RUN CGO_ENABLED=0 GOEXPERIMENT=boringcrypto GOOS=linux go build -mod vendor -a -
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist-fips/sidecar.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ RUN CGO_ENABLED=0 GOEXPERIMENT=boringcrypto GOOS=linux go build -mod vendor -a -
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist/init-container.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o vsecm-init-container \
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist/keystone.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o vsecm-keystone \
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist/safe.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o vsecm-safe ./app/safe/cm
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist/sentinel.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o sloth ./app/sentinel/bac
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion dockerfiles/vsecm-ist/sidecar.Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ RUN CGO_ENABLED=0 GOOS=linux go build -mod vendor -a -o vsecm-sidecar ./app/side
# generate clean, final image for end users
FROM gcr.io/distroless/static-debian11

ENV APP_VERSION="0.26.0"
ENV APP_VERSION="0.26.1"

LABEL "maintainers"="VSecM Maintainers <[email protected]>"
LABEL "version"=$APP_VERSION
Expand Down
2 changes: 1 addition & 1 deletion docs/config.toml
Original file line number Diff line number Diff line change
Expand Up @@ -22,4 +22,4 @@ smart_punctuation = true

[extra]
author = "VMware Secrets Manager Contributors"
version = "0.26.0"
version = "0.26.1"
2 changes: 1 addition & 1 deletion docs/content/timeline/changelog.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ weight = 11

TBD

## [0.26.0] - 2024-06-28
## [0.26.1] - 2024-06-28

### Added

Expand Down
4 changes: 2 additions & 2 deletions docs/content/timeline/roadmap.md
Original file line number Diff line number Diff line change
Expand Up @@ -242,7 +242,7 @@ We will create new iterations from it as the time gets closer.

## Closed Iterations

### VSecM v0.26.0 (*codename: Fornax*)
### VSecM v0.26.1 (*codename: Fornax*)

**Apr 25, 2024 - May 22, 2024**

Expand All @@ -252,7 +252,7 @@ We also introduced a lot of flexibility such as ability to use custom
namespaces, trust domains, and regex-based SPIFFEID validation.

[Here is a list of issues that are candidate for VSecM vFornax
](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.26.0-candidate+).
](https://github.com/vmware-tanzu/secrets-manager/issues?q=+label%3Av0.26.1-candidate+).

### VSecM v0.25.0 (*codename: Eridanus*)

Expand Down
2 changes: 1 addition & 1 deletion examples/multiple_secrets/k8s-eks/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
serviceAccountName: example
containers:
- name: main
image: vsecm/example-multiple-secrets:0.26.0
image: vsecm/example-multiple-secrets:0.26.1
volumeMounts:
# Volume mount for SPIRE unix domain socket.
- name: spire-agent-socket
Expand Down
2 changes: 1 addition & 1 deletion examples/multiple_secrets/k8s-eks/image-override.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ spec:
spec:
containers:
- name: main
image: public.ecr.aws/h8y1n7y7/example-multiple-secrets:0.26.0
image: public.ecr.aws/h8y1n7y7/example-multiple-secrets:0.26.1
env:
- name: VSECM_LOG_LEVEL
value: "7"
2 changes: 1 addition & 1 deletion examples/multiple_secrets/k8s/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
serviceAccountName: example
containers:
- name: main
image: vsecm/example-multiple-secrets:0.26.0
image: vsecm/example-multiple-secrets:0.26.1
volumeMounts:
# Volume mount for SPIRE unix domain socket.
- name: spire-agent-socket
Expand Down
2 changes: 1 addition & 1 deletion examples/multiple_secrets/k8s/image-override.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ spec:
spec:
containers:
- name: main
image: localhost:5000/example-multiple-secrets:0.26.0
image: localhost:5000/example-multiple-secrets:0.26.1
env:
- name: VSECM_LOG_LEVEL
value: "7"
2 changes: 1 addition & 1 deletion examples/operator_decrpyt_secrets/reveal.sh
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
# <>/' Copyright 2023-present VMware Secrets Manager contributors.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */
VERSION="0.26.0"
VERSION="0.26.1"

docker run --rm \
-v "$(pwd)":/vsecm \
Expand Down
4 changes: 2 additions & 2 deletions examples/using_init_container/k8s-eks/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,13 +28,13 @@ spec:
serviceAccountName: example
containers:
- name: main
image: vsecm/example-using-init-container:0.26.0
image: vsecm/example-using-init-container:0.26.1

initContainers:
# See `./register.sh` to register the workload and finalize
# this init container.
- name: init-container
image: vsecm/vsecm-ist-init-container:0.26.0
image: vsecm/vsecm-ist-init-container:0.26.1
volumeMounts:
# Volume mount for SPIRE unix domain socket.
- name: spire-agent-socket
Expand Down
4 changes: 2 additions & 2 deletions examples/using_init_container/k8s-eks/image-override.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ spec:
spec:
containers:
- name: main
image: public.ecr.aws/h8y1n7y7/example-using-init-container:0.26.0
image: public.ecr.aws/h8y1n7y7/example-using-init-container:0.26.1
initContainers:
- name: init-container
image: public.ecr.aws/h8y1n7y7/vsecm-ist-init-container:0.26.0
image: public.ecr.aws/h8y1n7y7/vsecm-ist-init-container:0.26.1
4 changes: 2 additions & 2 deletions examples/using_init_container/k8s/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,13 +28,13 @@ spec:
serviceAccountName: example
containers:
- name: main
image: vsecm/example-using-init-container:0.26.0
image: vsecm/example-using-init-container:0.26.1

initContainers:
# See `./register.sh` to register the workload and finalize
# this init container.
- name: init-container
image: vsecm/vsecm-ist-init-container:0.26.0
image: vsecm/vsecm-ist-init-container:0.26.1
volumeMounts:
# Volume mount for SPIRE unix domain socket.
- name: spire-agent-socket
Expand Down
4 changes: 2 additions & 2 deletions examples/using_init_container/k8s/image-override.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ spec:
spec:
containers:
- name: main
image: localhost:5000/example-using-init-container:0.26.0
image: localhost:5000/example-using-init-container:0.26.1
initContainers:
- name: init-container
image: localhost:5000/vsecm-ist-init-container:0.26.0
image: localhost:5000/vsecm-ist-init-container:0.26.1
2 changes: 1 addition & 1 deletion examples/using_sdk_go/k8s-eks/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
serviceAccountName: example
containers:
- name: main
image: vsecm/example-using-sdk-go:0.26.0
image: vsecm/example-using-sdk-go:0.26.1
volumeMounts:
# Volume mount for SPIRE unix domain socket.
- name: spire-agent-socket
Expand Down
2 changes: 1 addition & 1 deletion examples/using_sdk_go/k8s-eks/image-override.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,4 +18,4 @@ spec:
spec:
containers:
- name: main
image: public.ecr.aws/h8y1n7y7/example-using-sdk-go:0.26.0
image: public.ecr.aws/h8y1n7y7/example-using-sdk-go:0.26.1
2 changes: 1 addition & 1 deletion examples/using_sdk_go/k8s/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
serviceAccountName: example
containers:
- name: main
image: vsecm/example-using-sdk-go:0.26.0
image: vsecm/example-using-sdk-go:0.26.1
volumeMounts:
# Volume mount for SPIRE unix domain socket.
- name: spire-agent-socket
Expand Down
2 changes: 1 addition & 1 deletion examples/using_sdk_go/k8s/image-override.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,4 +18,4 @@ spec:
spec:
containers:
- name: main
image: localhost:5000/example-using-sdk-go:0.26.0
image: localhost:5000/example-using-sdk-go:0.26.1
4 changes: 2 additions & 2 deletions examples/using_sidecar/k8s-eks/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,13 +28,13 @@ spec:
serviceAccountName: example
containers:
- name: main
image: vsecm/example-using-sidecar:0.26.0
image: vsecm/example-using-sidecar:0.26.1
volumeMounts:
# `main` shares this volume with `sidecar`.
- mountPath: /opt/vsecm
name: vsecm-secrets-volume
- name: sidecar
image: vsecm/vsecm-ist-sidecar:0.26.0
image: vsecm/vsecm-ist-sidecar:0.26.1
volumeMounts:
# /opt/vsecm/secrets.json is the place the secrets will be at.
- mountPath: /opt/vsecm
Expand Down
4 changes: 2 additions & 2 deletions examples/using_sidecar/k8s-eks/image-override.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,6 @@ spec:
spec:
containers:
- name: main
image: public.ecr.aws/h8y1n7y7/example-using-sidecar:0.26.0
image: public.ecr.aws/h8y1n7y7/example-using-sidecar:0.26.1
- name: sidecar
image: public.ecr.aws/h8y1n7y7/vsecm-ist-sidecar:0.26.0
image: public.ecr.aws/h8y1n7y7/vsecm-ist-sidecar:0.26.1
4 changes: 2 additions & 2 deletions examples/using_sidecar/k8s/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,13 +28,13 @@ spec:
serviceAccountName: example
containers:
- name: main
image: vsecm/example-using-sidecar:0.26.0
image: vsecm/example-using-sidecar:0.26.1
volumeMounts:
# `main` shares this volume with `sidecar`.
- mountPath: /opt/vsecm
name: vsecm-secrets-volume
- name: sidecar
image: vsecm/vsecm-ist-sidecar:0.26.0
image: vsecm/vsecm-ist-sidecar:0.26.1
volumeMounts:
# /opt/vsecm/secrets.json is the place the secrets will be at.
- mountPath: /opt/vsecm
Expand Down
4 changes: 2 additions & 2 deletions examples/using_sidecar/k8s/image-override.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,6 @@ spec:
spec:
containers:
- name: main
image: localhost:5000/example-using-sidecar:0.26.0
image: localhost:5000/example-using-sidecar:0.26.1
- name: sidecar
image: localhost:5000/vsecm-ist-sidecar:0.26.0
image: localhost:5000/vsecm-ist-sidecar:0.26.1
2 changes: 1 addition & 1 deletion examples/using_vsecm_inspector/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
serviceAccountName: vsecm-inspector
containers:
- name: main
image: localhost:5000/vsecm-inspector:0.26.0
image: localhost:5000/vsecm-inspector:0.26.1
volumeMounts:
- name: spire-agent-socket
mountPath: /spire-agent-socket
Expand Down
4 changes: 2 additions & 2 deletions examples/workshop_aegis/init-container/Deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
serviceAccountName: example
containers:
- name: main
image: vsecm/example-using-init-container:0.26.0
image: vsecm/example-using-init-container:0.26.1
env:
- name: SECRET
valueFrom:
Expand All @@ -50,7 +50,7 @@ spec:
# See `./register.sh` to register the workload and finalize
# this init container.
- name: init-container
image: vsecm/vsecm-ist-init-container:0.26.0
image: vsecm/vsecm-ist-init-container:0.26.1
volumeMounts:
# Volume mount for SPIRE unix domain socket.
- name: spire-agent-socket
Expand Down
Loading

0 comments on commit ecff796

Please sign in to comment.