From e33caa6a1b8c3e305a45aeead4a0d8ca58d6e310 Mon Sep 17 00:00:00 2001 From: chenk Date: Sun, 9 Jun 2024 12:53:39 +0300 Subject: [PATCH] release: prepare v0.21.3 (#2126) Signed-off-by: chenk --- CONTRIBUTING.md | 6 +-- RELEASING.md | 10 ++--- deploy/helm/Chart.yaml | 4 +- deploy/helm/README.md | 2 +- deploy/helm/templates/specs/cis-1.23.yaml | 2 +- deploy/helm/templates/specs/nsa-1.0.yaml | 2 +- deploy/helm/templates/specs/pss-baseline.yaml | 2 +- .../helm/templates/specs/pss-restricted.yaml | 2 +- deploy/static/namespace.yaml | 2 +- deploy/static/trivy-operator.yaml | 38 +++++++++---------- docs/docs/crds/clustercompliance-report.md | 2 +- docs/docs/crds/configaudit-report.md | 2 +- docs/docs/crds/exposedsecret-report.md | 2 +- docs/docs/crds/rbacassessment-report.md | 2 +- .../caching_scan_results_by_repo_digest.md | 4 +- docs/docs/design/design_compliance_report.md | 4 +- .../design_starboard_at_scale.excalidraw | 4 +- .../design_trivy_file_system_scanner.md | 6 +-- ..._scan_job_in_same_namespace_of_workload.md | 6 +-- docs/docs/design/ttl_scans.md | 4 +- docs/getting-started/installation/olm.md | 4 +- docs/tutorials/private-registries.md | 2 +- mkdocs.yml | 4 +- tests/itest/helper/helper.go | 2 +- 24 files changed, 59 insertions(+), 59 deletions(-) diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index f1523a23d..19cd0e4ea 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -344,8 +344,8 @@ chart, then run `mage generate:docs` to ensure the helm docs are up-to-date. To install [Operator Lifecycle Manager] (OLM) run: ``` -kubectl apply -f https://github.com/operator-framework/operator-lifecycle-manager/releases/download/v0.21.2/crds.yaml -kubectl apply -f https://github.com/operator-framework/operator-lifecycle-manager/releases/download/v0.21.2/olm.yaml +kubectl apply -f https://github.com/operator-framework/operator-lifecycle-manager/releases/download/v0.21.3/crds.yaml +kubectl apply -f https://github.com/operator-framework/operator-lifecycle-manager/releases/download/v0.21.3/olm.yaml ``` or @@ -353,7 +353,7 @@ or ``` curl -L https://github.com/operator-framework/operator-lifecycle-manager/releases/download/v0.21.4/install.sh -o install.sh chmod +x install.sh -./install.sh v0.21.2 +./install.sh v0.21.3 ``` ### Build the Catalog Image diff --git a/RELEASING.md b/RELEASING.md index afded163d..7b01b7fed 100644 --- a/RELEASING.md +++ b/RELEASING.md @@ -46,17 +46,17 @@ 5. Create an annotated git tag and push it to the `upstream`. This will trigger the [`.github/workflows/release.yaml`] workflow ```sh - git tag -v0.21.2 -m 'Release v0.21.2' - git push upstream v0.21.2 + git tag -v0.21.3 -m 'Release v0.21.3' + git push upstream v0.21.3 ``` 6. Verify that the `release` workflow has built and published the following artifacts 1. Trivy-operator container images published to DockerHub - `docker.io/aquasec/trivy-operator:0.21.2` + `docker.io/aquasec/trivy-operator:0.21.3` 2. Trivy-operator container images published to Amazon ECR Public Gallery - `public.ecr.aws/aquasecurity/trivy-operator:0.21.2` + `public.ecr.aws/aquasecurity/trivy-operator:0.21.3` 3. Trivy-operator container images published to GitHub Container Registry - `ghcr.io/aquasecurity/trivy-operator:0.21.2` + `ghcr.io/aquasecurity/trivy-operator:0.21.3` 7. Submit trivy-operator Operator to OperatorHub and ArtifactHUB by opening the PR to the repository. diff --git a/deploy/helm/Chart.yaml b/deploy/helm/Chart.yaml index 6d8f98f76..df4732357 100644 --- a/deploy/helm/Chart.yaml +++ b/deploy/helm/Chart.yaml @@ -6,12 +6,12 @@ type: application # This is the chart version. This version number should be incremented each time you make changes # to the chart and its templates, including the app version. # Versions are expected to follow Semantic Versioning (https://semver.org/) -version: 0.23.2 +version: 0.23.3 # This is the version number of the application being deployed. This version number should be # incremented each time you make changes to the application. Versions are not expected to # follow Semantic Versioning. They should reflect the version the application is using. -appVersion: 0.21.2 +appVersion: 0.21.3 # kubeVersion: A SemVer range of compatible Kubernetes versions (optional) diff --git a/deploy/helm/README.md b/deploy/helm/README.md index 7d7be2e16..7c852b46b 100644 --- a/deploy/helm/README.md +++ b/deploy/helm/README.md @@ -1,6 +1,6 @@ # trivy-operator -![Version: 0.23.2](https://img.shields.io/badge/Version-0.23.2-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.21.2](https://img.shields.io/badge/AppVersion-0.21.2-informational?style=flat-square) +![Version: 0.23.3](https://img.shields.io/badge/Version-0.23.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.21.3](https://img.shields.io/badge/AppVersion-0.21.3-informational?style=flat-square) Keeps security report resources updated diff --git a/deploy/helm/templates/specs/cis-1.23.yaml b/deploy/helm/templates/specs/cis-1.23.yaml index 1b1a836b1..aa56e9cb3 100644 --- a/deploy/helm/templates/specs/cis-1.23.yaml +++ b/deploy/helm/templates/specs/cis-1.23.yaml @@ -6,7 +6,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: 0.21.2 + app.kubernetes.io/version: 0.21.3 app.kubernetes.io/managed-by: kubectl spec: cron: {{ .Values.compliance.cron | quote}} diff --git a/deploy/helm/templates/specs/nsa-1.0.yaml b/deploy/helm/templates/specs/nsa-1.0.yaml index caa66d463..a5aa7b9e3 100644 --- a/deploy/helm/templates/specs/nsa-1.0.yaml +++ b/deploy/helm/templates/specs/nsa-1.0.yaml @@ -6,7 +6,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl spec: cron: {{ .Values.compliance.cron | quote }} diff --git a/deploy/helm/templates/specs/pss-baseline.yaml b/deploy/helm/templates/specs/pss-baseline.yaml index f64dac455..de78d71bf 100644 --- a/deploy/helm/templates/specs/pss-baseline.yaml +++ b/deploy/helm/templates/specs/pss-baseline.yaml @@ -6,7 +6,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: 0.21.2 + app.kubernetes.io/version: 0.21.3 app.kubernetes.io/managed-by: kubectl spec: cron: {{ .Values.compliance.cron | quote }} diff --git a/deploy/helm/templates/specs/pss-restricted.yaml b/deploy/helm/templates/specs/pss-restricted.yaml index dd64a3424..82063c44e 100644 --- a/deploy/helm/templates/specs/pss-restricted.yaml +++ b/deploy/helm/templates/specs/pss-restricted.yaml @@ -6,7 +6,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: 0.21.2 + app.kubernetes.io/version: 0.21.3 app.kubernetes.io/managed-by: kubectl spec: cron: {{ .Values.compliance.cron | quote }} diff --git a/deploy/static/namespace.yaml b/deploy/static/namespace.yaml index b7cfda585..4bb5b9379 100644 --- a/deploy/static/namespace.yaml +++ b/deploy/static/namespace.yaml @@ -6,5 +6,5 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl diff --git a/deploy/static/trivy-operator.yaml b/deploy/static/trivy-operator.yaml index dd0682591..2801eeeeb 100644 --- a/deploy/static/trivy-operator.yaml +++ b/deploy/static/trivy-operator.yaml @@ -2919,7 +2919,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl --- # Source: trivy-operator/templates/configmaps/operator.yaml @@ -2931,7 +2931,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl data: nodeCollector.volumes: "[{\"hostPath\":{\"path\":\"/var/lib/etcd\"},\"name\":\"var-lib-etcd\"},{\"hostPath\":{\"path\":\"/var/lib/kubelet\"},\"name\":\"var-lib-kubelet\"},{\"hostPath\":{\"path\":\"/var/lib/kube-scheduler\"},\"name\":\"var-lib-kube-scheduler\"},{\"hostPath\":{\"path\":\"/var/lib/kube-controller-manager\"},\"name\":\"var-lib-kube-controller-manager\"},{\"hostPath\":{\"path\":\"/etc/systemd\"},\"name\":\"etc-systemd\"},{\"hostPath\":{\"path\":\"/lib/systemd\"},\"name\":\"lib-systemd\"},{\"hostPath\":{\"path\":\"/etc/kubernetes\"},\"name\":\"etc-kubernetes\"},{\"hostPath\":{\"path\":\"/etc/cni/net.d/\"},\"name\":\"etc-cni-netd\"}]" @@ -2957,7 +2957,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl data: --- @@ -2970,7 +2970,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl data: OPERATOR_LOG_DEV_MODE: "false" @@ -3023,7 +3023,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl data: trivy.repository: "ghcr.io/aquasecurity/trivy" @@ -3060,7 +3060,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl data: --- @@ -3073,7 +3073,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl data: --- @@ -3086,7 +3086,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl spec: replicas: 1 @@ -3106,7 +3106,7 @@ spec: automountServiceAccountToken: true containers: - name: "trivy-operator" - image: "ghcr.io/aquasecurity/trivy-operator:0.21.2" + image: "ghcr.io/aquasecurity/trivy-operator:0.21.3" imagePullPolicy: IfNotPresent env: - name: OPERATOR_NAMESPACE @@ -3167,7 +3167,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl spec: clusterIP: None @@ -3558,7 +3558,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl roleRef: apiGroup: rbac.authorization.k8s.io @@ -3579,7 +3579,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl rules: - apiGroups: @@ -3606,7 +3606,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl roleRef: apiGroup: rbac.authorization.k8s.io @@ -3626,7 +3626,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl rules: - apiGroups: @@ -3656,7 +3656,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl roleRef: apiGroup: rbac.authorization.k8s.io @@ -3676,7 +3676,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -3701,7 +3701,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -3726,7 +3726,7 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -3751,5 +3751,5 @@ metadata: labels: app.kubernetes.io/name: trivy-operator app.kubernetes.io/instance: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" app.kubernetes.io/managed-by: kubectl diff --git a/docs/docs/crds/clustercompliance-report.md b/docs/docs/crds/clustercompliance-report.md index 90c0d1f4e..dea40e5e6 100644 --- a/docs/docs/crds/clustercompliance-report.md +++ b/docs/docs/crds/clustercompliance-report.md @@ -1346,7 +1346,7 @@ status: "app.kubernetes.io/instance": "trivy-operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "trivy-operator", - "app.kubernetes.io/version": "0.21.2" + "app.kubernetes.io/version": "0.21.3" }, "name": "cis", "resourceVersion": "8985", diff --git a/docs/docs/crds/configaudit-report.md b/docs/docs/crds/configaudit-report.md index bda7323bd..b0fdd153f 100644 --- a/docs/docs/crds/configaudit-report.md +++ b/docs/docs/crds/configaudit-report.md @@ -34,7 +34,7 @@ report: scanner: name: Trivy vendor: Aqua Security - version: '0.21.2' + version: '0.21.3' summary: criticalCount: 2 highCount: 0 diff --git a/docs/docs/crds/exposedsecret-report.md b/docs/docs/crds/exposedsecret-report.md index 7b80f6fd6..b24ec9a94 100644 --- a/docs/docs/crds/exposedsecret-report.md +++ b/docs/docs/crds/exposedsecret-report.md @@ -33,7 +33,7 @@ metadata: report: artifact: repository: myimagewithsecret - tag: v0.21.2 + tag: v0.21.3 registry: server: index.docker.io scanner: diff --git a/docs/docs/crds/rbacassessment-report.md b/docs/docs/crds/rbacassessment-report.md index aeee85bc2..eac7c7908 100644 --- a/docs/docs/crds/rbacassessment-report.md +++ b/docs/docs/crds/rbacassessment-report.md @@ -176,7 +176,7 @@ report: scanner: name: Trivy vendor: Aqua Security - version: '0.21.2' + version: '0.21.3' summary: criticalCount: 1 highCount: 0 diff --git a/docs/docs/design/caching_scan_results_by_repo_digest.md b/docs/docs/design/caching_scan_results_by_repo_digest.md index 545502c20..cb5ea20c3 100644 --- a/docs/docs/design/caching_scan_results_by_repo_digest.md +++ b/docs/docs/design/caching_scan_results_by_repo_digest.md @@ -129,5 +129,5 @@ We can't use something like ownerReference since it would delete all vulnerabili a gate. * Both Trivy-Operator CLI and Trivy-Operator Operator can read and leverage ClusterVulnerabilityReports. -[Standalone]: https://aquasecurity.github.io/trivy-operator/v0.21.2/integrations/vulnerability-scanners/trivy/#standalone -[ClientServer]: https://aquasecurity.github.io/trivy-operator/v0.21.2/integrations/vulnerability-scanners/trivy/#clientserver +[Standalone]: https://aquasecurity.github.io/trivy-operator/v0.21.3/integrations/vulnerability-scanners/trivy/#standalone +[ClientServer]: https://aquasecurity.github.io/trivy-operator/v0.21.3/integrations/vulnerability-scanners/trivy/#clientserver diff --git a/docs/docs/design/design_compliance_report.md b/docs/docs/design/design_compliance_report.md index 82670e582..46a92177c 100644 --- a/docs/docs/design/design_compliance_report.md +++ b/docs/docs/design/design_compliance_report.md @@ -542,7 +542,7 @@ metadata: name: clustercompliancereports.aquasecurity.github.io labels: app.kubernetes.io/managed-by: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" spec: group: aquasecurity.github.io scope: Cluster @@ -678,7 +678,7 @@ metadata: name: clustercompliancedetailreports.aquasecurity.github.io labels: app.kubernetes.io/managed-by: trivy-operator - app.kubernetes.io/version: "0.21.2" + app.kubernetes.io/version: "0.21.3" spec: group: aquasecurity.github.io versions: diff --git a/docs/docs/design/design_starboard_at_scale.excalidraw b/docs/docs/design/design_starboard_at_scale.excalidraw index ef7d0038e..c120856fc 100644 --- a/docs/docs/design/design_starboard_at_scale.excalidraw +++ b/docs/docs/design/design_starboard_at_scale.excalidraw @@ -11835,7 +11835,7 @@ "versionNonce": 596868769, "isDeleted": false, "boundElementIds": null, - "text": "apiVersion: batch/v1\nkind: Job\nmetadata:\n name: scan-vulnerabilityreport-\n namespace: trivy-system\nspec:\n template:\n spec:\n containers:\n - name: nginx\n image: aquasec/trivy:0.21.2\n command: [\"trivy\", \"image\", \"nginx:1.16\"]\n restartPolicy: Never\n backoffLimit: 1", + "text": "apiVersion: batch/v1\nkind: Job\nmetadata:\n name: scan-vulnerabilityreport-\n namespace: trivy-system\nspec:\n template:\n spec:\n containers:\n - name: nginx\n image: aquasec/trivy:0.21.3\n command: [\"trivy\", \"image\", \"nginx:1.16\"]\n restartPolicy: Never\n backoffLimit: 1", "fontSize": 20, "fontFamily": 3, "textAlign": "left", @@ -11895,7 +11895,7 @@ "boundElementIds": [], "fontSize": 20, "fontFamily": 3, - "text": "apiVersion: v1\nkind: Pod\nmetadata:\n name: scan-vulnerabilityreport--\n namespace: trivy-system\nspec:\n containers:\n - name: nginx\n image: aquasec/trivy:0.21.2\n command: [\"trivy\", \"image\", \"nginx:1.16\"]\n", + "text": "apiVersion: v1\nkind: Pod\nmetadata:\n name: scan-vulnerabilityreport--\n namespace: trivy-system\nspec:\n containers:\n - name: nginx\n image: aquasec/trivy:0.21.3\n command: [\"trivy\", \"image\", \"nginx:1.16\"]\n", "baseline": 259, "textAlign": "left", "verticalAlign": "top" diff --git a/docs/docs/design/design_trivy_file_system_scanner.md b/docs/docs/design/design_trivy_file_system_scanner.md index 86185aa02..f02c2b134 100644 --- a/docs/docs/design/design_trivy_file_system_scanner.md +++ b/docs/docs/design/design_trivy_file_system_scanner.md @@ -117,10 +117,10 @@ spec: emptyDir: { } initContainers: # The trivy-get-binary init container is used to copy out the trivy executable - # binary from the upstream Trivy container image, i.e. aquasec/trivy:0.21.2, + # binary from the upstream Trivy container image, i.e. aquasec/trivy:0.21.3, # to a shared emptyDir volume. - name: trivy-get-binary - image: aquasec/trivy:0.21.2 + image: aquasec/trivy:0.21.3 command: - cp - -v @@ -135,7 +135,7 @@ spec: # This won't be required once Trivy supports ClientServer mode # for the fs subcommand. - name: trivy-download-db - image: aquasec/trivy:0.21.2 + image: aquasec/trivy:0.21.3 command: - /var/trivy-operator/trivy - --download-db-only diff --git a/docs/docs/design/design_vuln_scan_job_in_same_namespace_of_workload.md b/docs/docs/design/design_vuln_scan_job_in_same_namespace_of_workload.md index deea93121..44a3b3c1f 100644 --- a/docs/docs/design/design_vuln_scan_job_in_same_namespace_of_workload.md +++ b/docs/docs/design/design_vuln_scan_job_in_same_namespace_of_workload.md @@ -167,7 +167,7 @@ spec: emptyDir: { } initContainers: - name: trivy-get-binary - image: aquasec/trivy:0.21.2 + image: aquasec/trivy:0.21.3 command: - cp - -v @@ -177,7 +177,7 @@ spec: - name: scan-volume mountPath: /var/trivy-operator - name: trivy-download-db - image: aquasec/trivy:0.21.2 + image: aquasec/trivy:0.21.3 command: - /var/trivy-operator/trivy - --download-db-only @@ -219,6 +219,6 @@ With this approach trivy operator will not have to worry about managing(create/d - As we will run scan job with service account of workload and if there are some very strict PSP defined in the cluster then scan job will be blocked due to the PSP. -[ECR registry configuration]: https://aquasecurity.github.io/trivy-operator/v0.21.2/integrations/managed-registries/#amazon-elastic-container-registry-ecr +[ECR registry configuration]: https://aquasecurity.github.io/trivy-operator/v0.21.3/integrations/managed-registries/#amazon-elastic-container-registry-ecr [IAM role to service account]: https://docs.aws.amazon.com/eks/latest/userguide/specify-service-account-role.html [Trivy fs command]: https://github.com/aquasecurity/trivy-operator/blob/main/docs/design/design_trivy_file_system_scanner.md diff --git a/docs/docs/design/ttl_scans.md b/docs/docs/design/ttl_scans.md index 30a7e77fe..808d0bb1f 100644 --- a/docs/docs/design/ttl_scans.md +++ b/docs/docs/design/ttl_scans.md @@ -44,13 +44,13 @@ metadata: report: artifact: repository: fluxcd/source-controller - tag: v0.21.2 + tag: v0.21.3 registry: server: ghcr.io scanner: name: Trivy vendor: Aqua Security - version: 0.21.2 + version: 0.21.3 summary: criticalCount: 0 highCount: 0 diff --git a/docs/getting-started/installation/olm.md b/docs/getting-started/installation/olm.md index 3c44a79b0..4adc76118 100644 --- a/docs/getting-started/installation/olm.md +++ b/docs/getting-started/installation/olm.md @@ -12,9 +12,9 @@ configure it to watch the `default` namespaces: 1. Install the Operator Lifecycle Manager: ``` - curl -L https://github.com/operator-framework/operator-lifecycle-manager/releases/download/v0.21.2/install.sh -o install.sh + curl -L https://github.com/operator-framework/operator-lifecycle-manager/releases/download/v0.21.3/install.sh -o install.sh chmod +x install.sh - ./install.sh v0.21.2 + ./install.sh v0.21.3 ``` 2. Create the namespace to install the operator in: diff --git a/docs/tutorials/private-registries.md b/docs/tutorials/private-registries.md index a8fc6ae21..d9015b6c9 100644 --- a/docs/tutorials/private-registries.md +++ b/docs/tutorials/private-registries.md @@ -303,4 +303,4 @@ data: The last way that you could give the Trivy operator access to your private container registry is through managed registries. In this case, the container registry and your Kubernetes cluster would have to be on the same cloud provider; then you can define access to your container namespace as part of the IAM account. Once defined, trivy will already have the permissions for the registry. -For additional information, please refer to the [documentation on managed registries.](https://aquasecurity.github.io/trivy-operator/v0.21.2/docs/vulnerability-scanning/managed-registries/) +For additional information, please refer to the [documentation on managed registries.](https://aquasecurity.github.io/trivy-operator/v0.21.3/docs/vulnerability-scanning/managed-registries/) diff --git a/mkdocs.yml b/mkdocs.yml index e817c1f5e..6f86565fc 100644 --- a/mkdocs.yml +++ b/mkdocs.yml @@ -90,8 +90,8 @@ extra: provider: mike default: latest var: - prev_git_tag: "v0.21.1" - chart_version: "0.23.2" + prev_git_tag: "v0.21.2" + chart_version: "0.23.3" social: - icon: fontawesome/brands/twitter link: https://twitter.com/AquaTrivy diff --git a/tests/itest/helper/helper.go b/tests/itest/helper/helper.go index 9e2f5d302..3537f50c1 100644 --- a/tests/itest/helper/helper.go +++ b/tests/itest/helper/helper.go @@ -236,7 +236,7 @@ var ( trivyScanner = v1alpha1.Scanner{ Name: v1alpha1.ScannerNameTrivy, Vendor: "Aqua Security", - Version: "0.21.2", + Version: "0.21.3", } )