From 821a17744be286bbc1ef38c5afd892b97c3d2765 Mon Sep 17 00:00:00 2001 From: chenk Date: Fri, 3 Mar 2023 08:43:24 +0200 Subject: [PATCH] release: prepare v0.12.0-rc (#1016) Signed-off-by: chenk --- deploy/helm/Chart.yaml | 4 +-- deploy/specs/cis-1.23.yaml | 2 +- deploy/specs/nsa-1.0.yaml | 2 +- deploy/specs/pss-baseline.yaml | 2 +- deploy/specs/pss-restricted.yaml | 2 +- deploy/static/namespace.yaml | 2 +- deploy/static/trivy-operator.yaml | 36 +++++++++++----------- docs/docs/crds/clustercompliance-report.md | 2 +- docs/docs/crds/configaudit-report.md | 2 +- docs/docs/crds/exposedsecret-report.md | 2 +- docs/docs/crds/rbacassessment-report.md | 2 +- docs/tutorials/grafana-dashboard.md | 2 +- docs/tutorials/private-registries.md | 10 +++--- mkdocs.yml | 4 +-- 14 files changed, 37 insertions(+), 37 deletions(-) diff --git a/deploy/helm/Chart.yaml b/deploy/helm/Chart.yaml index 285482d7b..4c4647630 100644 --- a/deploy/helm/Chart.yaml +++ b/deploy/helm/Chart.yaml @@ -6,12 +6,12 @@ type: application # This is the chart version. This version number should be incremented each time you make changes # to the chart and its templates, including the app version. # Versions are expected to follow Semantic Versioning (https://semver.org/) -version: 0.11.1 +version: 0.12.0-rc # This is the version number of the application being deployed. This version number should be # incremented each time you make changes to the application. Versions are not expected to # follow Semantic Versioning. They should reflect the version the application is using. -appVersion: 0.11.1 +appVersion: 0.12.0-rc # kubeVersion: A SemVer range of compatible Kubernetes versions (optional) diff --git a/deploy/specs/cis-1.23.yaml b/deploy/specs/cis-1.23.yaml index cb982fd28..d069a8d68 100644 --- a/deploy/specs/cis-1.23.yaml +++ b/deploy/specs/cis-1.23.yaml @@ -6,7 +6,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: 0.11.1 + app.kubernetes.io/version: 0.12.0-rc app.kubernetes.io/managed-by: kubectl spec: cron: 0 */6 * * * diff --git a/deploy/specs/nsa-1.0.yaml b/deploy/specs/nsa-1.0.yaml index 7647e1f47..facddfa0c 100644 --- a/deploy/specs/nsa-1.0.yaml +++ b/deploy/specs/nsa-1.0.yaml @@ -6,7 +6,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl spec: cron: "0 */6 * * *" diff --git a/deploy/specs/pss-baseline.yaml b/deploy/specs/pss-baseline.yaml index 7ce69a0ff..f36e29121 100644 --- a/deploy/specs/pss-baseline.yaml +++ b/deploy/specs/pss-baseline.yaml @@ -6,7 +6,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: 0.11.1 + app.kubernetes.io/version: 0.12.0-rc app.kubernetes.io/managed-by: kubectl spec: cron: 0 */6 * * * diff --git a/deploy/specs/pss-restricted.yaml b/deploy/specs/pss-restricted.yaml index 620dab608..f25941dff 100644 --- a/deploy/specs/pss-restricted.yaml +++ b/deploy/specs/pss-restricted.yaml @@ -6,7 +6,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: 0.11.1 + app.kubernetes.io/version: 0.12.0-rc app.kubernetes.io/managed-by: kubectl spec: cron: 0 */6 * * * diff --git a/deploy/static/namespace.yaml b/deploy/static/namespace.yaml index 6abd1eb0d..29e49b0f2 100644 --- a/deploy/static/namespace.yaml +++ b/deploy/static/namespace.yaml @@ -6,5 +6,5 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl diff --git a/deploy/static/trivy-operator.yaml b/deploy/static/trivy-operator.yaml index b56c2f15e..1740de9e3 100644 --- a/deploy/static/trivy-operator.yaml +++ b/deploy/static/trivy-operator.yaml @@ -1764,7 +1764,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl --- # Source: trivy-operator/templates/config.yaml @@ -1776,7 +1776,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl --- # Source: trivy-operator/templates/config.yaml @@ -1788,7 +1788,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl data: --- @@ -1801,7 +1801,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl data: scanJob.podTemplateContainerSecurityContext: "{\"allowPrivilegeEscalation\":false,\"capabilities\":{\"drop\":[\"ALL\"]},\"privileged\":false,\"readOnlyRootFilesystem\":true}" @@ -1820,7 +1820,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl data: trivy.repository: "ghcr.io/aquasecurity/trivy" @@ -1849,7 +1849,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl spec: replicas: 1 @@ -1869,7 +1869,7 @@ spec: automountServiceAccountToken: true containers: - name: "trivy-operator" - image: "ghcr.io/aquasecurity/trivy-operator:0.11.1" + image: "ghcr.io/aquasecurity/trivy-operator:0.12.0-rc" imagePullPolicy: IfNotPresent env: - name: OPERATOR_NAMESPACE @@ -1979,7 +1979,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl rules: - apiGroups: @@ -2006,7 +2006,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl roleRef: apiGroup: rbac.authorization.k8s.io @@ -2026,7 +2026,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl data: # example @@ -2076,7 +2076,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl --- # Source: trivy-operator/templates/rbac.yaml @@ -2407,7 +2407,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -2432,7 +2432,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -2457,7 +2457,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -2481,7 +2481,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl roleRef: apiGroup: rbac.authorization.k8s.io @@ -2501,7 +2501,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl rules: - apiGroups: @@ -2531,7 +2531,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl roleRef: apiGroup: rbac.authorization.k8s.io @@ -2551,7 +2551,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.11.1" + app.kubernetes.io/version: "0.12.0-rc" app.kubernetes.io/managed-by: kubectl spec: clusterIP: None diff --git a/docs/docs/crds/clustercompliance-report.md b/docs/docs/crds/clustercompliance-report.md index 979bfc62f..e6cbdf877 100644 --- a/docs/docs/crds/clustercompliance-report.md +++ b/docs/docs/crds/clustercompliance-report.md @@ -1346,7 +1346,7 @@ status: "app.kubernetes.io/instance": "trivy-operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "trivy-operator", - "app.kubernetes.io/version": "0.11.1" + "app.kubernetes.io/version": "0.12.0-rc" }, "name": "cis", "resourceVersion": "8985", diff --git a/docs/docs/crds/configaudit-report.md b/docs/docs/crds/configaudit-report.md index fb50a90af..fdc397985 100644 --- a/docs/docs/crds/configaudit-report.md +++ b/docs/docs/crds/configaudit-report.md @@ -36,7 +36,7 @@ report: scanner: name: Trivy vendor: Aqua Security - version: '0.11.1' + version: '0.12.0-rc' summary: criticalCount: 2 highCount: 0 diff --git a/docs/docs/crds/exposedsecret-report.md b/docs/docs/crds/exposedsecret-report.md index 0e212f553..7629fb59b 100644 --- a/docs/docs/crds/exposedsecret-report.md +++ b/docs/docs/crds/exposedsecret-report.md @@ -34,7 +34,7 @@ metadata: report: artifact: repository: myimagewithsecret - tag: v0.11.1 + tag: v0.12.0-rc registry: server: index.docker.io scanner: diff --git a/docs/docs/crds/rbacassessment-report.md b/docs/docs/crds/rbacassessment-report.md index ab50f27ab..5b2233a93 100644 --- a/docs/docs/crds/rbacassessment-report.md +++ b/docs/docs/crds/rbacassessment-report.md @@ -177,7 +177,7 @@ report: scanner: name: Trivy vendor: Aqua Security - version: '0.11.1' + version: '0.12.0-rc' summary: criticalCount: 1 highCount: 0 diff --git a/docs/tutorials/grafana-dashboard.md b/docs/tutorials/grafana-dashboard.md index 1123a113d..d31d75b23 100644 --- a/docs/tutorials/grafana-dashboard.md +++ b/docs/tutorials/grafana-dashboard.md @@ -92,7 +92,7 @@ Next, we can install the operator with the following command: helm install trivy-operator aqua/trivy-operator \ --namespace trivy-system \ --create-namespace \ - --version 0.11.1 \ + --version 0.12.0-rc \ --values trivy-values.yaml ``` diff --git a/docs/tutorials/private-registries.md b/docs/tutorials/private-registries.md index 84e917a68..07b144db5 100644 --- a/docs/tutorials/private-registries.md +++ b/docs/tutorials/private-registries.md @@ -47,7 +47,7 @@ Lastly, we can deploy the operator inside our cluster with referencing our new ` helm upgrade --install trivy-operator aqua/trivy-operator \ --namespace trivy-system \ --create-namespace \ - --version 0.11.1 + --version 0.12.0-rc --values ./values.yaml ``` @@ -57,7 +57,7 @@ Alternatively, it is possible to set the values directly through Helm instead of helm upgrade --install trivy-operator aqua/trivy-operator \ --namespace trivy-system \ --create-namespace \ - --version 0.11.1 + --version 0.12.0-rc --set="trivy.command=fs" --set="trivyOperator.scanJobPodTemplateContainerSecurityContext.runAsUser=0" ``` @@ -230,7 +230,7 @@ Lastly, we can deploy the operator inside our cluster with referencing our new ` helm upgrade --install trivy-operator aqua/trivy-operator \ --namespace trivy-system \ --create-namespace \ - --version 0.11.1 + --version 0.12.0-rc --values ./values.yaml ``` @@ -240,7 +240,7 @@ Alternatively, it is possible to set the values directly through Helm instead of helm upgrade --install trivy-operator aqua/trivy-operator \ --namespace trivy-system \ --create-namespace \ - --version 0.11.1 + --version 0.12.0-rc --set-json='operator.privateRegistryScanSecretsNames={"app":"dockerconfigjson-github-com"}' ``` @@ -262,4 +262,4 @@ trivy-operator 1/1 1 1 99s The last way that you could give the Trivy operator access to your private container registry is through managed registries. In this case, the container registry and your Kubernetes cluster would have to be on the same cloud provider; then you can define access to your container namespace as part of the IAM account. Once defined, trivy will already have the permissions for the registry. -For additional information, please refer to the [documentation on managed registries.](https://aquasecurity.github.io/trivy-operator/v0.11.1/vulnerability-scanning/managed-registries/#amazon-elastic-container-registry-ecr) +For additional information, please refer to the [documentation on managed registries.](https://aquasecurity.github.io/trivy-operator/v0.12.0-rc/vulnerability-scanning/managed-registries/#amazon-elastic-container-registry-ecr) diff --git a/mkdocs.yml b/mkdocs.yml index 47f1127bd..2ed937f51 100644 --- a/mkdocs.yml +++ b/mkdocs.yml @@ -85,8 +85,8 @@ extra: method: mike provider: mike var: - prev_git_tag: "v0.11.0" - chart_version: "0.11.1" + prev_git_tag: "v0.11.1" + chart_version: "0.12.0-rc" plugins: - search