Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bre 303 fix db client ingress #202

Closed

Conversation

mimartin12
Copy link
Contributor

No description provided.

mimartin12 and others added 30 commits June 19, 2024 14:40
commit 1116424
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 11:03:52 2024 -0600

    Add feature flag support
    - Create a configmap that is templated from source values
    - Mount the config map into general directory /etc/bitwarden/code
    - Set `globalSettings__launchDarkly__flagDataFilePath` value to the path

commit 36504d7
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 10:56:46 2024 -0600

    Update linter

commit de88464
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 10:43:06 2024 -0600

    Add feature flag inputs to values file.
- Ensure that the last item doesn't have a trailing comma.
- Update .gitignore to ignore test values for now
- Add hooks for feature flag confirm map
- Have comments for code complexity
commit 6e803d6
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 17:02:04 2024 -0600

    Fix logs indentation

commit b4b7128
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:48:06 2024 -0600

    Linting

commit 0474ef9
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:45:34 2024 -0600

    Update test values and base values

commit 2dd7115
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:42:06 2024 -0600

    Remove key connector resources on helm uninstall.

commit c293506
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:36:08 2024 -0600

    Update mount paths for Key Connector files

commit a9a4bfc
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:35:38 2024 -0600

    Update config maps
    - Support custom cloud URIs
    - Update paths for Key Connector files

commit 1178afa
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 15:24:00 2024 -0600

    Fix paths for key connector ingress

commit dcaf36a
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 10:07:04 2024 -0600

    Check in test values

commit 0798f5e
Author: Micaiah Martin <[email protected]>
Date:   Tue Jun 25 16:32:02 2024 -0600

    Fix incorrect service name being used

commit 207d669
Author: Micaiah Martin <[email protected]>
Date:   Tue Jun 25 14:51:09 2024 -0600

    Add Key Connector deployment
    - Adds Key connector component configs
    - Supports setting up JSON database, certificate RSA, and filesystem cert provider
    - Automatically generate the certificate and filesystem structure
    - Setup PVC for JSON db

commit 557849d
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 14:47:34 2024 -0600

    Fix schema

commit 88fd30f
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 14:43:59 2024 -0600

    Add inputs for Key Connector to Values file
- Allows users to set annotations to each component and volume
- Implement sync waves
- conditionally handle jobs based on toggle for Argo CD.
- Default argoCDSupport to be true
…on keys

Add pre-install-secret-main which does the following:
- Generate a secure MSSQL password and then hit the endpoints for Bitwarden installation keys/ID
- Provide users the values for these secrets via a pod, which can be access via the Argo CD GUI.
- Utilize Akv2k8s to create a single Kubernetes secret with shared secrets from a provided Azure Key Vault name
- Add a bit of output to the generate-cloud-ids container
- Add inputs for GitHub metadata, expecting to be passed by ApplicationSet
- Add job to publish endpoints to a github comment and store the comment ID state as a ConfigMap
- Extend service account permissions to create config maps
---
Users may need to specify a specific version for a single component.

Argo CD Image updater will need to update these to digests when a new image is pushed to the registry

This adds the ability to define tags for each Bitwarden component and the MSSQL migrator utility. Allowing us to use a tag for each component if we wish to do so.

Deployments now have a $tag variable and this value is set on the logic of
Check for .tag value > Check for override value > Set value from Default

There was also some refactor for Key Connector to bring it in alignment with this new pattern, we no longer use `version` but instead use `tag` for key connector.
- By adding argocd.argoproj.io/hook-delete-policy: HookFailed annotation, we only remove the PVCs and DB if the hook fails, instead of every sync.
- Moved DB storageClass to managed disk and RWO
- Setup init container to ensure the permissions are set to container user
- Adds ability to toggle deployment of a DB client for interacting with the ephemeral database.
commit 895b5e0
Author: Micaiah Martin <[email protected]>
Date:   Tue Oct 1 09:54:18 2024 -0600

    Set tags as "dev" by default
* Added additional SMTP environment variables  (bitwarden#174)

* Updated core and web versions (bitwarden#179)

* Bumped version to 2024.9.1 (bitwarden#180)

* Added additional annotations for nginx (bitwarden#178)

* chore(deps): update gh minor (bitwarden#165)

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>

* Updated core and web versions (bitwarden#183)

* Bumped version to 2024.9.2 (bitwarden#184)

* Update README.md

* Squashed commit of the following:

commit 1116424
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 11:03:52 2024 -0600

    Add feature flag support
    - Create a configmap that is templated from source values
    - Mount the config map into general directory /etc/bitwarden/code
    - Set `globalSettings__launchDarkly__flagDataFilePath` value to the path

commit 36504d7
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 10:56:46 2024 -0600

    Update linter

commit de88464
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 10:43:06 2024 -0600

    Add feature flag inputs to values file.

* Fix issue with only a single feature flag defined.
- Ensure that the last item doesn't have a trailing comma.
- Update .gitignore to ignore test values for now

* Add comments and hook annotations
- Add hooks for feature flag confirm map
- Have comments for code complexity

* Add Key Connector deployment via toggle for helm chart.

commit 6e803d6
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 17:02:04 2024 -0600

    Fix logs indentation

commit b4b7128
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:48:06 2024 -0600

    Linting

commit 0474ef9
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:45:34 2024 -0600

    Update test values and base values

commit 2dd7115
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:42:06 2024 -0600

    Remove key connector resources on helm uninstall.

commit c293506
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:36:08 2024 -0600

    Update mount paths for Key Connector files

commit a9a4bfc
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:35:38 2024 -0600

    Update config maps
    - Support custom cloud URIs
    - Update paths for Key Connector files

commit 1178afa
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 15:24:00 2024 -0600

    Fix paths for key connector ingress

commit dcaf36a
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 10:07:04 2024 -0600

    Check in test values

commit 0798f5e
Author: Micaiah Martin <[email protected]>
Date:   Tue Jun 25 16:32:02 2024 -0600

    Fix incorrect service name being used

commit 207d669
Author: Micaiah Martin <[email protected]>
Date:   Tue Jun 25 14:51:09 2024 -0600

    Add Key Connector deployment
    - Adds Key connector component configs
    - Supports setting up JSON database, certificate RSA, and filesystem cert provider
    - Automatically generate the certificate and filesystem structure
    - Setup PVC for JSON db

commit 557849d
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 14:47:34 2024 -0600

    Fix schema

commit 88fd30f
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 14:43:59 2024 -0600

    Add inputs for Key Connector to Values file

* Add annotation support for components and volumes
- Allows users to set annotations to each component and volume

* Add Argo CD support
- Implement sync waves
- conditionally handle jobs based on toggle for Argo CD.
- Default argoCDSupport to be true

* BRE-166 Support generating secrets for MSSQL and Bitwarden installation keys

Add pre-install-secret-main which does the following:
- Generate a secure MSSQL password and then hit the endpoints for Bitwarden installation keys/ID
- Provide users the values for these secrets via a pod, which can be access via the Argo CD GUI.
- Utilize Akv2k8s to create a single Kubernetes secret with shared secrets from a provided Azure Key Vault name

* BRE-166: Set defaults to USDEV for argo cd syncs
- Add a bit of output to the generate-cloud-ids container

* BRE-166: Fix Argo CD sync as it doesn't support Helm lookup functions.

* Set default key vault to USDEV

* Publish endpoints to GitHub Pull Request
- Add inputs for GitHub metadata, expecting to be passed by ApplicationSet
- Add job to publish endpoints to a github comment and store the comment ID state as a ConfigMap
- Extend service account permissions to create config maps

* Set default annotations via values file

* BRE-178: Support individual tags for components
---
Users may need to specify a specific version for a single component.

Argo CD Image updater will need to update these to digests when a new image is pushed to the registry

This adds the ability to define tags for each Bitwarden component and the MSSQL migrator utility. Allowing us to use a tag for each component if we wish to do so.

Deployments now have a $tag variable and this value is set on the logic of
Check for .tag value > Check for override value > Set value from Default

There was also some refactor for Key Connector to bring it in alignment with this new pattern, we no longer use `version` but instead use `tag` for key connector.

* BRE 270: Fix email auth

* BRE-273: Add workaround for PVC removal and database re-creation
- By adding argocd.argoproj.io/hook-delete-policy: HookFailed annotation, we only remove the PVCs and DB if the hook fails, instead of every sync.

* BRE-275: Set defaults for image registry to ACR.

* BRE-274: Expose MSSQL via Ingress

* BRE-300: Resolve MSSQL storage deployment permissions
- Moved DB storageClass to managed disk and RWO
- Setup init container to ensure the permissions are set to container user

* BRE-298: DB Client extension
- Adds ability to toggle deployment of a DB client for interacting with the ephemeral database.

* Update Key Connector registry and bump version

* BRE-255: Added 'Go to Environment' button, fixes the default URL button

* Squashed commit of the following:

commit 895b5e0
Author: Micaiah Martin <[email protected]>
Date:   Tue Oct 1 09:54:18 2024 -0600

    Set tags as "dev" by default

* Revert "Set tags as "dev" by default"

This reverts commit 895b5e0.

---------

Co-authored-by: keithhubner <[email protected]>
Co-authored-by: Bitwarden DevOps <[email protected]>
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
mimartin12 and others added 25 commits October 17, 2024 11:39
- By adding argocd.argoproj.io/hook-delete-policy: HookFailed annotation, we only remove the PVCs and DB if the hook fails, instead of every sync.
- Moved DB storageClass to managed disk and RWO
- Setup init container to ensure the permissions are set to container user
- Adds ability to toggle deployment of a DB client for interacting with the ephemeral database.
commit 895b5e0
Author: Micaiah Martin <[email protected]>
Date:   Tue Oct 1 09:54:18 2024 -0600

    Set tags as "dev" by default
* Added additional SMTP environment variables  (bitwarden#174)

* Updated core and web versions (bitwarden#179)

* Bumped version to 2024.9.1 (bitwarden#180)

* Added additional annotations for nginx (bitwarden#178)

* chore(deps): update gh minor (bitwarden#165)

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>

* Updated core and web versions (bitwarden#183)

* Bumped version to 2024.9.2 (bitwarden#184)

* Update README.md

* Squashed commit of the following:

commit 1116424
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 11:03:52 2024 -0600

    Add feature flag support
    - Create a configmap that is templated from source values
    - Mount the config map into general directory /etc/bitwarden/code
    - Set `globalSettings__launchDarkly__flagDataFilePath` value to the path

commit 36504d7
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 10:56:46 2024 -0600

    Update linter

commit de88464
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 10:43:06 2024 -0600

    Add feature flag inputs to values file.

* Fix issue with only a single feature flag defined.
- Ensure that the last item doesn't have a trailing comma.
- Update .gitignore to ignore test values for now

* Add comments and hook annotations
- Add hooks for feature flag confirm map
- Have comments for code complexity

* Add Key Connector deployment via toggle for helm chart.

commit 6e803d6
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 17:02:04 2024 -0600

    Fix logs indentation

commit b4b7128
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:48:06 2024 -0600

    Linting

commit 0474ef9
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:45:34 2024 -0600

    Update test values and base values

commit 2dd7115
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:42:06 2024 -0600

    Remove key connector resources on helm uninstall.

commit c293506
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:36:08 2024 -0600

    Update mount paths for Key Connector files

commit a9a4bfc
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 16:35:38 2024 -0600

    Update config maps
    - Support custom cloud URIs
    - Update paths for Key Connector files

commit 1178afa
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 15:24:00 2024 -0600

    Fix paths for key connector ingress

commit dcaf36a
Author: Micaiah Martin <[email protected]>
Date:   Wed Jun 26 10:07:04 2024 -0600

    Check in test values

commit 0798f5e
Author: Micaiah Martin <[email protected]>
Date:   Tue Jun 25 16:32:02 2024 -0600

    Fix incorrect service name being used

commit 207d669
Author: Micaiah Martin <[email protected]>
Date:   Tue Jun 25 14:51:09 2024 -0600

    Add Key Connector deployment
    - Adds Key connector component configs
    - Supports setting up JSON database, certificate RSA, and filesystem cert provider
    - Automatically generate the certificate and filesystem structure
    - Setup PVC for JSON db

commit 557849d
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 14:47:34 2024 -0600

    Fix schema

commit 88fd30f
Author: Micaiah Martin <[email protected]>
Date:   Fri Jun 21 14:43:59 2024 -0600

    Add inputs for Key Connector to Values file

* Add annotation support for components and volumes
- Allows users to set annotations to each component and volume

* Add Argo CD support
- Implement sync waves
- conditionally handle jobs based on toggle for Argo CD.
- Default argoCDSupport to be true

* BRE-166 Support generating secrets for MSSQL and Bitwarden installation keys

Add pre-install-secret-main which does the following:
- Generate a secure MSSQL password and then hit the endpoints for Bitwarden installation keys/ID
- Provide users the values for these secrets via a pod, which can be access via the Argo CD GUI.
- Utilize Akv2k8s to create a single Kubernetes secret with shared secrets from a provided Azure Key Vault name

* BRE-166: Set defaults to USDEV for argo cd syncs
- Add a bit of output to the generate-cloud-ids container

* BRE-166: Fix Argo CD sync as it doesn't support Helm lookup functions.

* Set default key vault to USDEV

* Publish endpoints to GitHub Pull Request
- Add inputs for GitHub metadata, expecting to be passed by ApplicationSet
- Add job to publish endpoints to a github comment and store the comment ID state as a ConfigMap
- Extend service account permissions to create config maps

* Set default annotations via values file

* BRE-178: Support individual tags for components
---
Users may need to specify a specific version for a single component.

Argo CD Image updater will need to update these to digests when a new image is pushed to the registry

This adds the ability to define tags for each Bitwarden component and the MSSQL migrator utility. Allowing us to use a tag for each component if we wish to do so.

Deployments now have a $tag variable and this value is set on the logic of
Check for .tag value > Check for override value > Set value from Default

There was also some refactor for Key Connector to bring it in alignment with this new pattern, we no longer use `version` but instead use `tag` for key connector.

* BRE 270: Fix email auth

* BRE-273: Add workaround for PVC removal and database re-creation
- By adding argocd.argoproj.io/hook-delete-policy: HookFailed annotation, we only remove the PVCs and DB if the hook fails, instead of every sync.

* BRE-275: Set defaults for image registry to ACR.

* BRE-274: Expose MSSQL via Ingress

* BRE-300: Resolve MSSQL storage deployment permissions
- Moved DB storageClass to managed disk and RWO
- Setup init container to ensure the permissions are set to container user

* BRE-298: DB Client extension
- Adds ability to toggle deployment of a DB client for interacting with the ephemeral database.

* Update Key Connector registry and bump version

* BRE-255: Added 'Go to Environment' button, fixes the default URL button

* Squashed commit of the following:

commit 895b5e0
Author: Micaiah Martin <[email protected]>
Date:   Tue Oct 1 09:54:18 2024 -0600

    Set tags as "dev" by default

* Revert "Set tags as "dev" by default"

This reverts commit 895b5e0.

---------

Co-authored-by: keithhubner <[email protected]>
Co-authored-by: Bitwarden DevOps <[email protected]>
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
…rom-all-workflows

[BRE-372] - Clean up document start
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
* Move entirely to Akv2k8s to handle secret

* Tweak sync wave value for MSSQL connection string
* Enable key connector

* Increase liveness probe delay

* Revert "Enable key connector"

This reverts commit 5f5596f.
…n keys, then default it to `false`.

65c6fba
Author: Micaiah Martin <[email protected]>
Date:   Mon Nov 25 11:40:37 2024 -0700

    Reinstate shared secret

commit 736d016
Merge: b6cef74 7f970f5
Author: Micaiah Martin <[email protected]>
Date:   Mon Nov 25 11:39:14 2024 -0700

    Merge branch 'main' into BRE-385-share-encryption-keys

commit b6cef74
Author: Micaiah Martin <[email protected]>
Date:   Mon Nov 25 11:39:11 2024 -0700

    Clean up file

commit 1a24064
Author: Micaiah Martin <[email protected]>
Date:   Mon Nov 25 11:18:19 2024 -0700

    Update comments and values for CI

commit bc00848
Author: Micaiah Martin <[email protected]>
Date:   Mon Nov 4 11:28:49 2024 -0700

    Add akv2k8s manifest to use shared keys

commit 07da2c2
Author: Micaiah Martin <[email protected]>
Date:   Mon Nov 4 10:20:40 2024 -0700

    Set up values
@mimartin12 mimartin12 closed this Nov 25, 2024
@mimartin12 mimartin12 deleted the BRE-303-fix-db-client-ingress branch November 25, 2024 21:21
@CLAassistant
Copy link

CLAassistant commented Nov 25, 2024

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you all sign our Contributor License Agreement before we can accept your contribution.
0 out of 2 committers have signed the CLA.

❌ Eeebru
❌ mimartin12
You have signed the CLA already but the status is still pending? Let us recheck it.

@mimartin12 mimartin12 restored the BRE-303-fix-db-client-ingress branch November 25, 2024 21:22
Copy link
Contributor

Logo
Checkmarx One – Scan Summary & Detailsc23aa3b1-ad6e-456b-b7f3-80e2e9d02459

Fixed Issues

Severity Issue Source File / Package
HIGH Privilege Escalation Allowed /admin.yaml: 46
HIGH Privilege Escalation Allowed /api.yaml: 46
HIGH Privilege Escalation Allowed /notifications.yaml: 46
HIGH Privilege Escalation Allowed /identity.yaml: 46
HIGH Privilege Escalation Allowed /events.yaml: 46
HIGH Privilege Escalation Allowed /sso.yaml: 46
HIGH Privilege Escalation Allowed /icons.yaml: 46
HIGH Privilege Escalation Allowed /mssql.yaml: 37
HIGH Privilege Escalation Allowed /web.yaml: 32
HIGH Privilege Escalation Allowed /attachments.yaml: 32
HIGH Volume Mount With OS Directory Write Permissions /identity.yaml: 121
HIGH Volume Mount With OS Directory Write Permissions /admin.yaml: 114
HIGH Volume Mount With OS Directory Write Permissions /sso.yaml: 121
HIGH Volume Mount With OS Directory Write Permissions /api.yaml: 119
HIGH Volume Mount With OS Directory Write Permissions /sso.yaml: 121
HIGH Volume Mount With OS Directory Write Permissions /identity.yaml: 121
HIGH Volume Mount With OS Directory Write Permissions /mssql.yaml: 116
HIGH Volume Mount With OS Directory Write Permissions /api.yaml: 119
HIGH Volume Mount With OS Directory Write Permissions /api.yaml: 119
HIGH Volume Mount With OS Directory Write Permissions /mssql.yaml: 116
HIGH Volume Mount With OS Directory Write Permissions /sso.yaml: 121
HIGH Volume Mount With OS Directory Write Permissions /attachments.yaml: 85
HIGH Volume Mount With OS Directory Write Permissions /mssql.yaml: 116
HIGH Volume Mount With OS Directory Write Permissions /web.yaml: 71
HIGH Volume Mount With OS Directory Write Permissions /admin.yaml: 114
HIGH Volume Mount With OS Directory Write Permissions /identity.yaml: 121
MEDIUM Container Running As Root /identity.yaml: 46
MEDIUM Container Running As Root /notifications.yaml: 46
MEDIUM Container Running As Root /icons.yaml: 46
MEDIUM Container Running As Root /mssql.yaml: 37
MEDIUM Container Running As Root /attachments.yaml: 32
MEDIUM Container Running As Root /events.yaml: 46
MEDIUM Container Running As Root /web.yaml: 32
MEDIUM Container Running As Root /sso.yaml: 46
MEDIUM Container Running As Root /api.yaml: 46
MEDIUM Container Running As Root /admin.yaml: 46
MEDIUM Container Running With Low UID /admin.yaml: 87
MEDIUM Container Running With Low UID /web.yaml: 66
MEDIUM Container Running With Low UID /sso.yaml: 91
MEDIUM Container Running With Low UID /mssql.yaml: 37
MEDIUM Container Running With Low UID /notifications.yaml: 83
MEDIUM Container Running With Low UID /identity.yaml: 91
MEDIUM Container Running With Low UID /api.yaml: 89
MEDIUM Container Running With Low UID /attachments.yaml: 66
MEDIUM Container Running With Low UID /icons.yaml: 83
MEDIUM Container Running With Low UID /events.yaml: 83
MEDIUM NET_RAW Capabilities Not Being Dropped /mssql.yaml: 37
MEDIUM Readiness Probe Is Not Configured /icons.yaml: 46
MEDIUM Readiness Probe Is Not Configured /attachments.yaml: 32
MEDIUM Readiness Probe Is Not Configured /api.yaml: 46
MEDIUM Readiness Probe Is Not Configured /admin.yaml: 46
MEDIUM Readiness Probe Is Not Configured /sso.yaml: 46
MEDIUM Readiness Probe Is Not Configured /notifications.yaml: 46
MEDIUM Readiness Probe Is Not Configured /events.yaml: 46
MEDIUM Readiness Probe Is Not Configured /web.yaml: 32
MEDIUM Readiness Probe Is Not Configured /identity.yaml: 46
MEDIUM Seccomp Profile Is Not Configured /identity.yaml: 91
MEDIUM Seccomp Profile Is Not Configured /attachments.yaml: 66
MEDIUM Seccomp Profile Is Not Configured /sso.yaml: 91
MEDIUM Seccomp Profile Is Not Configured /events.yaml: 83
MEDIUM Seccomp Profile Is Not Configured /web.yaml: 66
MEDIUM Seccomp Profile Is Not Configured /api.yaml: 89
MEDIUM Seccomp Profile Is Not Configured /notifications.yaml: 83
MEDIUM Seccomp Profile Is Not Configured /icons.yaml: 83
MEDIUM Seccomp Profile Is Not Configured /mssql.yaml: 37
MEDIUM Seccomp Profile Is Not Configured /admin.yaml: 87
MEDIUM Service Account Token Automount Not Disabled /attachments.yaml: 27
MEDIUM Service Account Token Automount Not Disabled /mssql.yaml: 32
MEDIUM Service Account Token Automount Not Disabled /sso.yaml: 27
MEDIUM Service Account Token Automount Not Disabled /notifications.yaml: 27
MEDIUM Service Account Token Automount Not Disabled /events.yaml: 27
MEDIUM Service Account Token Automount Not Disabled /icons.yaml: 27
MEDIUM Service Account Token Automount Not Disabled /api.yaml: 27
MEDIUM Service Account Token Automount Not Disabled /identity.yaml: 27
MEDIUM Service Account Token Automount Not Disabled /admin.yaml: 27
MEDIUM Service Account Token Automount Not Disabled /web.yaml: 27
MEDIUM Unpinned Actions Full Length Commit SHA /version-bump-self-host.yml: 95
MEDIUM Unpinned Actions Full Length Commit SHA /version-bump-self-host.yml: 102
MEDIUM Unpinned Actions Full Length Commit SHA /release.yml: 62
MEDIUM Unpinned Actions Full Length Commit SHA /version-bump-self-host.yml: 110
MEDIUM Unpinned Actions Full Length Commit SHA /version-bump-self-host.yml: 22
MEDIUM Unpinned Actions Full Length Commit SHA /tests.yml: 37
MEDIUM Unpinned Actions Full Length Commit SHA /release.yml: 38
MEDIUM Unpinned Actions Full Length Commit SHA /version-bump-self-host.yml: 38
MEDIUM Unpinned Actions Full Length Commit SHA /update-versions-self-host.yml: 51
MEDIUM Unpinned Actions Full Length Commit SHA /update-versions-self-host.yml: 26
MEDIUM Unpinned Actions Full Length Commit SHA /update-versions-self-host.yml: 130
MEDIUM Unpinned Actions Full Length Commit SHA /version-bump-sm-operator.yml: 46
MEDIUM Unpinned Actions Full Length Commit SHA /version-bump-sm-operator.yml: 29
MEDIUM Using Unrecommended Namespace /mssql.yaml: 113
LOW Image Pull Policy Of The Container Is Not Set To Always /identity.yaml: 46
LOW Image Pull Policy Of The Container Is Not Set To Always /web.yaml: 32
LOW Image Pull Policy Of The Container Is Not Set To Always /events.yaml: 46
LOW Image Pull Policy Of The Container Is Not Set To Always /icons.yaml: 46
LOW Image Pull Policy Of The Container Is Not Set To Always /attachments.yaml: 32
LOW Image Pull Policy Of The Container Is Not Set To Always /notifications.yaml: 46
LOW Image Pull Policy Of The Container Is Not Set To Always /sso.yaml: 46
LOW Image Pull Policy Of The Container Is Not Set To Always /admin.yaml: 46
LOW Image Pull Policy Of The Container Is Not Set To Always /api.yaml: 46
LOW Image Without Digest /identity.yaml: 46
LOW Image Without Digest /notifications.yaml: 46
LOW Image Without Digest /mssql.yaml: 37
LOW Image Without Digest /icons.yaml: 46
LOW Image Without Digest /events.yaml: 46
LOW Image Without Digest /attachments.yaml: 32
LOW Image Without Digest /web.yaml: 32
LOW Image Without Digest /admin.yaml: 46
LOW Image Without Digest /sso.yaml: 46
LOW Image Without Digest /api.yaml: 46
LOW Missing AppArmor Profile /web.yaml: 22
LOW Missing AppArmor Profile /admin.yaml: 22
LOW Missing AppArmor Profile /api.yaml: 22
LOW Missing AppArmor Profile /icons.yaml: 22
LOW Missing AppArmor Profile /notifications.yaml: 22
LOW Missing AppArmor Profile /attachments.yaml: 22
LOW Missing AppArmor Profile /sso.yaml: 22
LOW Missing AppArmor Profile /identity.yaml: 22
LOW Missing AppArmor Profile /events.yaml: 22
LOW Missing AppArmor Profile /mssql.yaml: 24
LOW No Drop Capabilities for Containers /web.yaml: 66
LOW No Drop Capabilities for Containers /sso.yaml: 91
LOW No Drop Capabilities for Containers /notifications.yaml: 83
LOW No Drop Capabilities for Containers /events.yaml: 83
LOW No Drop Capabilities for Containers /web.yaml: 32
LOW No Drop Capabilities for Containers /admin.yaml: 87
LOW No Drop Capabilities for Containers /attachments.yaml: 66
LOW No Drop Capabilities for Containers /api.yaml: 89
LOW No Drop Capabilities for Containers /identity.yaml: 91
LOW No Drop Capabilities for Containers /admin.yaml: 46
LOW No Drop Capabilities for Containers /sso.yaml: 46
LOW No Drop Capabilities for Containers /icons.yaml: 83
LOW No Drop Capabilities for Containers /identity.yaml: 46
LOW No Drop Capabilities for Containers /attachments.yaml: 32
LOW No Drop Capabilities for Containers /events.yaml: 46
LOW No Drop Capabilities for Containers /mssql.yaml: 37
LOW No Drop Capabilities for Containers /api.yaml: 46
LOW No Drop Capabilities for Containers /notifications.yaml: 46
LOW No Drop Capabilities for Containers /icons.yaml: 46
LOW Pod or Container Without LimitRange /volumes.yaml: 162
LOW Pod or Container Without LimitRange /volumes.yaml: 192
LOW Pod or Container Without LimitRange /volumes.yaml: 67
LOW Pod or Container Without LimitRange /volumes.yaml: 37
LOW Pod or Container Without LimitRange /volumes.yaml: 132
LOW Pod or Container Without LimitRange /volumes.yaml: 7
LOW Pod or Container Without ResourceQuota /volumes.yaml: 37
LOW Pod or Container Without ResourceQuota /volumes.yaml: 67
LOW Pod or Container Without ResourceQuota /volumes.yaml: 7
LOW Pod or Container Without ResourceQuota /volumes.yaml: 132
LOW Pod or Container Without ResourceQuota /volumes.yaml: 162
LOW Pod or Container Without ResourceQuota /volumes.yaml: 192
LOW Pod or Container Without Security Context /sso.yaml: 46
LOW Pod or Container Without Security Context /icons.yaml: 46
LOW Pod or Container Without Security Context /admin.yaml: 46
LOW Pod or Container Without Security Context /events.yaml: 46
LOW Pod or Container Without Security Context /mssql.yaml: 37
LOW Pod or Container Without Security Context /identity.yaml: 46
LOW Pod or Container Without Security Context /web.yaml: 32
LOW Pod or Container Without Security Context /attachments.yaml: 32
LOW Pod or Container Without Security Context /notifications.yaml: 46
LOW Pod or Container Without Security Context /api.yaml: 46
LOW Root Container Not Mounted Read-only /identity.yaml: 46
LOW Root Container Not Mounted Read-only /mssql.yaml: 37
LOW Root Container Not Mounted Read-only /icons.yaml: 46
LOW Root Container Not Mounted Read-only /sso.yaml: 46
LOW Root Container Not Mounted Read-only /notifications.yaml: 46
LOW Root Container Not Mounted Read-only /admin.yaml: 46
LOW Root Container Not Mounted Read-only /events.yaml: 46
LOW Root Container Not Mounted Read-only /web.yaml: 32
LOW Root Container Not Mounted Read-only /api.yaml: 46
LOW Root Container Not Mounted Read-only /attachments.yaml: 32
LOW Secrets As Environment Variables /attachments.yaml: 32
LOW Secrets As Environment Variables /events.yaml: 46
LOW Secrets As Environment Variables /api.yaml: 46
LOW Secrets As Environment Variables /icons.yaml: 46
LOW Secrets As Environment Variables /sso.yaml: 46
LOW Secrets As Environment Variables /notifications.yaml: 46
LOW Secrets As Environment Variables /admin.yaml: 46
LOW Secrets As Environment Variables /mssql.yaml: 37
LOW Secrets As Environment Variables /identity.yaml: 46
LOW Secrets As Environment Variables /web.yaml: 32
LOW StatefulSet Without Service Name /mssql.yaml: 16

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants