Skip to content

Commit

Permalink
Merge pull request #229 from ksoclabs/eng-2305
Browse files Browse the repository at this point in the history
Bump rad-sbom to fix critical vulnerability
  • Loading branch information
mateuszdyminski authored Jan 13, 2025
2 parents 948b082 + de00f4e commit cf51b26
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/ci.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ jobs:
version: v3.14.2
- uses: actions/setup-python@v4
with:
python-version: 3.7
python-version: 3.11
- name: Set up chart-testing
uses: helm/chart-testing-action@v2.6.1
- name: Run chart-testing (lint)
Expand Down
2 changes: 1 addition & 1 deletion stable/ksoc-plugins/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
apiVersion: v2
name: ksoc-plugins
version: 1.9.8
version: 1.9.9
description: A Helm chart to run the KSOC plugins
home: https://ksoc.com
icon: https://ksoc.com/hubfs/Ksoc-logo.svg
Expand Down
2 changes: 1 addition & 1 deletion stable/ksoc-plugins/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -573,7 +573,7 @@ The command removes all the Kubernetes components associated with the chart and
| ksocSbom.env.SBOM_CHECK_LATEST | bool | `false` | Experimental: Whether to check for the latest image in the container registry and generate SBOM for it. If deployed image has tag with semver format, rad-sbom tries to get the newest image, newest minor version, or newest patch version. If the tag is not in semver format, rad-sbom tries to get the newest image from the container registry based on the tag time. Please be aware that time-based algorithm requires many requests to the container registry and may be slow. It works only if credentials are provided. Please note that this feature is experimental and may not work with all container registries. |
| ksocSbom.env.SBOM_FORMAT | string | `"cyclonedx-json"` | The format of the generated SBOM. Currently we support: syft-json,cyclonedx-json,spdx-json |
| ksocSbom.image.repository | string | `"public.ecr.aws/n8h5y2v5/rad-security/rad-sbom"` | The image to use for the ksoc-sbom deployment |
| ksocSbom.image.tag | string | `"v1.1.33"` | |
| ksocSbom.image.tag | string | `"v1.1.34"` | |
| ksocSbom.nodeSelector | object | `{}` | |
| ksocSbom.podAnnotations | object | `{}` | |
| ksocSbom.resources.limits.cpu | string | `"1000m"` | |
Expand Down
2 changes: 1 addition & 1 deletion stable/ksoc-plugins/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ ksocSbom:
image:
# -- The image to use for the ksoc-sbom deployment
repository: public.ecr.aws/n8h5y2v5/rad-security/rad-sbom
tag: v1.1.33
tag: v1.1.34
env:
# -- Whether to mutate the image in pod spec by adding digest at the end. By default, digests are added to images to ensure
# that the image that runs in the cluster matches the digest of the build. Disable this if your continuous deployment
Expand Down

0 comments on commit cf51b26

Please sign in to comment.