diff --git a/RELEASING.md b/RELEASING.md
index ec53041bb..2a63d0232 100644
--- a/RELEASING.md
+++ b/RELEASING.md
@@ -46,17 +46,17 @@
5. Create an annotated git tag and push it to the `upstream`. This will trigger the [`.github/workflows/release.yaml`] workflow
```
- git tag -v0.13.2 -m 'Release v0.13.2'
- git push upstream v0.13.2
+ git tag -v0.14.0-rc -m 'Release v0.14.0-rc'
+ git push upstream v0.14.0-rc
```
6. Verify that the `release` workflow has built and published the following artifacts
1. Trivy-operator container images published to DockerHub
- `docker.io/aquasec/trivy-operator:0.13.2`
+ `docker.io/aquasec/trivy-operator:0.14.0-rc`
2. Trivy-operator container images published to Amazon ECR Public Gallery
- `public.ecr.aws/aquasecurity/trivy-operator:0.13.2`
+ `public.ecr.aws/aquasecurity/trivy-operator:0.14.0-rc`
2. Trivy-operator container images published to GitHub Container Registry
- `ghcr.io/aquasecurity/trivy-operator:0.13.2`
+ `ghcr.io/aquasecurity/trivy-operator:0.14.0-rc`
7. Publish the Helm chart by manually triggering the [`.github/workflows/publish-helm-chart.yaml`] workflow
8. Publish docs on by manually triggering the [`.github/workflows/publish-docs.yaml`] workflow
9. Submit trivy-operator Operator to OperatorHub and ArtifactHUB by opening the PR to the repository.
diff --git a/deploy/helm/Chart.yaml b/deploy/helm/Chart.yaml
index 417014a9f..a83c92ec4 100644
--- a/deploy/helm/Chart.yaml
+++ b/deploy/helm/Chart.yaml
@@ -6,12 +6,12 @@ type: application
# This is the chart version. This version number should be incremented each time you make changes
# to the chart and its templates, including the app version.
# Versions are expected to follow Semantic Versioning (https://semver.org/)
-version: 0.13.2
+version: 0.14.0-rc
# This is the version number of the application being deployed. This version number should be
# incremented each time you make changes to the application. Versions are not expected to
# follow Semantic Versioning. They should reflect the version the application is using.
-appVersion: 0.13.2
+appVersion: 0.14.0-rc
# kubeVersion: A SemVer range of compatible Kubernetes versions (optional)
diff --git a/deploy/helm/templates/specs/cis-1.23.yaml b/deploy/helm/templates/specs/cis-1.23.yaml
index 21da0a86f..6f5fa4fda 100644
--- a/deploy/helm/templates/specs/cis-1.23.yaml
+++ b/deploy/helm/templates/specs/cis-1.23.yaml
@@ -6,7 +6,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: 0.13.2
+ app.kubernetes.io/version: 0.14.0-rc
app.kubernetes.io/managed-by: kubectl
spec:
cron: {{ .Values.compliance.cron | quote}}
diff --git a/deploy/helm/templates/specs/nsa-1.0.yaml b/deploy/helm/templates/specs/nsa-1.0.yaml
index fe62854cb..87007ba5f 100644
--- a/deploy/helm/templates/specs/nsa-1.0.yaml
+++ b/deploy/helm/templates/specs/nsa-1.0.yaml
@@ -6,7 +6,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
spec:
cron: {{ .Values.compliance.cron | quote }}
diff --git a/deploy/helm/templates/specs/pss-baseline.yaml b/deploy/helm/templates/specs/pss-baseline.yaml
index 545dee5b5..acaca503c 100644
--- a/deploy/helm/templates/specs/pss-baseline.yaml
+++ b/deploy/helm/templates/specs/pss-baseline.yaml
@@ -6,7 +6,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: 0.13.2
+ app.kubernetes.io/version: 0.14.0-rc
app.kubernetes.io/managed-by: kubectl
spec:
cron: {{ .Values.compliance.cron | quote }}
diff --git a/deploy/helm/templates/specs/pss-restricted.yaml b/deploy/helm/templates/specs/pss-restricted.yaml
index 8ce0c7403..1140002a9 100644
--- a/deploy/helm/templates/specs/pss-restricted.yaml
+++ b/deploy/helm/templates/specs/pss-restricted.yaml
@@ -6,7 +6,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: 0.13.2
+ app.kubernetes.io/version: 0.14.0-rc
app.kubernetes.io/managed-by: kubectl
spec:
cron: {{ .Values.compliance.cron | quote }}
diff --git a/deploy/static/namespace.yaml b/deploy/static/namespace.yaml
index 29c1c5f58..138013e47 100644
--- a/deploy/static/namespace.yaml
+++ b/deploy/static/namespace.yaml
@@ -6,5 +6,5 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
diff --git a/deploy/static/trivy-operator.yaml b/deploy/static/trivy-operator.yaml
index d082c51a9..936d87c3d 100644
--- a/deploy/static/trivy-operator.yaml
+++ b/deploy/static/trivy-operator.yaml
@@ -1764,7 +1764,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
---
# Source: trivy-operator/templates/config.yaml
@@ -1776,7 +1776,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
---
# Source: trivy-operator/templates/config.yaml
@@ -1788,7 +1788,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
data:
---
@@ -1801,7 +1801,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
data:
nodeCollector.volumes: "[{\"hostPath\":{\"path\":\"/var/lib/etcd\"},\"name\":\"var-lib-etcd\"},{\"hostPath\":{\"path\":\"/var/lib/kubelet\"},\"name\":\"var-lib-kubelet\"},{\"hostPath\":{\"path\":\"/var/lib/kube-scheduler\"},\"name\":\"var-lib-kube-scheduler\"},{\"hostPath\":{\"path\":\"/var/lib/kube-controller-manager\"},\"name\":\"var-lib-kube-controller-manager\"},{\"hostPath\":{\"path\":\"/etc/systemd\"},\"name\":\"etc-systemd\"},{\"hostPath\":{\"path\":\"/lib/systemd\"},\"name\":\"lib-systemd\"},{\"hostPath\":{\"path\":\"/etc/kubernetes\"},\"name\":\"etc-kubernetes\"},{\"hostPath\":{\"path\":\"/etc/cni/net.d/\"},\"name\":\"etc-cni-netd\"}]"
@@ -1823,7 +1823,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
data:
trivy.repository: "ghcr.io/aquasecurity/trivy"
@@ -1853,7 +1853,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
spec:
replicas: 1
@@ -1873,7 +1873,7 @@ spec:
automountServiceAccountToken: true
containers:
- name: "trivy-operator"
- image: "ghcr.io/aquasecurity/trivy-operator:0.13.2"
+ image: "ghcr.io/aquasecurity/trivy-operator:0.14.0-rc"
imagePullPolicy: IfNotPresent
env:
- name: OPERATOR_NAMESPACE
@@ -1989,7 +1989,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
rules:
- apiGroups:
@@ -2016,7 +2016,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -2036,7 +2036,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
data:
# example
@@ -2086,7 +2086,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
---
# Source: trivy-operator/templates/rbac.yaml
@@ -2417,7 +2417,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
@@ -2442,7 +2442,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
@@ -2467,7 +2467,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
@@ -2491,7 +2491,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -2511,7 +2511,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
rules:
- apiGroups:
@@ -2541,7 +2541,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -2561,7 +2561,7 @@ metadata:
labels:
app.kubernetes.io/name: trivy-operator
app.kubernetes.io/instance: trivy-operator
- app.kubernetes.io/version: "0.13.2"
+ app.kubernetes.io/version: "0.14.0-rc"
app.kubernetes.io/managed-by: kubectl
spec:
clusterIP: None
diff --git a/docs/docs/crds/clustercompliance-report.md b/docs/docs/crds/clustercompliance-report.md
index 0d65d3f1e..021af691f 100644
--- a/docs/docs/crds/clustercompliance-report.md
+++ b/docs/docs/crds/clustercompliance-report.md
@@ -1346,7 +1346,7 @@ status:
"app.kubernetes.io/instance": "trivy-operator",
"app.kubernetes.io/managed-by": "kubectl",
"app.kubernetes.io/name": "trivy-operator",
- "app.kubernetes.io/version": "0.13.2"
+ "app.kubernetes.io/version": "0.14.0-rc"
},
"name": "cis",
"resourceVersion": "8985",
diff --git a/docs/docs/crds/configaudit-report.md b/docs/docs/crds/configaudit-report.md
index 85f7920ac..5ba434b87 100644
--- a/docs/docs/crds/configaudit-report.md
+++ b/docs/docs/crds/configaudit-report.md
@@ -36,7 +36,7 @@ report:
scanner:
name: Trivy
vendor: Aqua Security
- version: '0.13.2'
+ version: '0.14.0-rc'
summary:
criticalCount: 2
highCount: 0
diff --git a/docs/docs/crds/exposedsecret-report.md b/docs/docs/crds/exposedsecret-report.md
index a7eb8dd95..636994820 100644
--- a/docs/docs/crds/exposedsecret-report.md
+++ b/docs/docs/crds/exposedsecret-report.md
@@ -34,7 +34,7 @@ metadata:
report:
artifact:
repository: myimagewithsecret
- tag: v0.13.2
+ tag: v0.14.0-rc
registry:
server: index.docker.io
scanner:
diff --git a/docs/docs/crds/rbacassessment-report.md b/docs/docs/crds/rbacassessment-report.md
index 09753f2ed..30ce4c4cf 100644
--- a/docs/docs/crds/rbacassessment-report.md
+++ b/docs/docs/crds/rbacassessment-report.md
@@ -177,7 +177,7 @@ report:
scanner:
name: Trivy
vendor: Aqua Security
- version: '0.13.2'
+ version: '0.14.0-rc'
summary:
criticalCount: 1
highCount: 0
diff --git a/docs/docs/design/caching_scan_results_by_repo_digest.md b/docs/docs/design/caching_scan_results_by_repo_digest.md
index 7661440a3..5acb92e5f 100644
--- a/docs/docs/design/caching_scan_results_by_repo_digest.md
+++ b/docs/docs/design/caching_scan_results_by_repo_digest.md
@@ -129,5 +129,5 @@ We can't use something like ownerReference since it would delete all vulnerabili
a gate.
* Both Trivy-Operator CLI and Trivy-Operator Operator can read and leverage ClusterVulnerabilityReports.
-[Standalone]: https://aquasecurity.github.io/trivy-operator/v0.13.2/integrations/vulnerability-scanners/trivy/#standalone
-[ClientServer]: https://aquasecurity.github.io/trivy-operator/v0.13.2/integrations/vulnerability-scanners/trivy/#clientserver
+[Standalone]: https://aquasecurity.github.io/trivy-operator/v0.14.0-rc/integrations/vulnerability-scanners/trivy/#standalone
+[ClientServer]: https://aquasecurity.github.io/trivy-operator/v0.14.0-rc/integrations/vulnerability-scanners/trivy/#clientserver
diff --git a/docs/tutorials/grafana-dashboard.md b/docs/tutorials/grafana-dashboard.md
index 52a4befb8..cbe8d123a 100644
--- a/docs/tutorials/grafana-dashboard.md
+++ b/docs/tutorials/grafana-dashboard.md
@@ -92,7 +92,7 @@ Next, we can install the operator with the following command:
helm install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
- --version 0.13.2 \
+ --version 0.14.0-rc \
--values trivy-values.yaml
```
@@ -143,7 +143,7 @@ Run the following command to port-forward the Trivy Operator Service:
kubectl port-forward service/trivy-operator -n trivy-system 5000:80
```
-Once you open the 'http://localhost:5000/metrics' you should see all the metrics gathered from the operator. However, this is obviously not the prettiest way of looking at them. Thus, the next sections will show you how to query metrics through Prometheus and visualise them in Grafana.
+Once you open the '' you should see all the metrics gathered from the operator. However, this is obviously not the prettiest way of looking at them. Thus, the next sections will show you how to query metrics through Prometheus and visualise them in Grafana.
### Query Trivy Operator Metrics in Prometheus
@@ -176,7 +176,7 @@ sum(trivy_image_exposedsecrets)
Lastly, we want to visualise the security issues within our cluster in a Grafana Dashboard.
-For this, navigate to the Grafana URL 'http://localhost:3000'.
+For this, navigate to the Grafana URL ''.
Username: admin
Password: prom-operator
diff --git a/docs/tutorials/private-registries.md b/docs/tutorials/private-registries.md
index 8f8ab80f0..65d894b18 100644
--- a/docs/tutorials/private-registries.md
+++ b/docs/tutorials/private-registries.md
@@ -47,7 +47,7 @@ Lastly, we can deploy the operator inside our cluster with referencing our new `
helm upgrade --install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
- --version 0.13.2
+ --version 0.14.0-rc
--values ./values.yaml
```
@@ -57,7 +57,7 @@ Alternatively, it is possible to set the values directly through Helm instead of
helm upgrade --install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
- --version 0.13.2
+ --version 0.14.0-rc
--set="trivy.command=fs"
--set="trivyOperator.scanJobPodTemplateContainerSecurityContext.runAsUser=0"
```
@@ -230,7 +230,7 @@ Lastly, we can deploy the operator inside our cluster with referencing our new `
helm upgrade --install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
- --version 0.13.2
+ --version 0.14.0-rc
--values ./values.yaml
```
@@ -240,7 +240,7 @@ Alternatively, it is possible to set the values directly through Helm instead of
helm upgrade --install trivy-operator aqua/trivy-operator \
--namespace trivy-system \
--create-namespace \
- --version 0.13.2
+ --version 0.14.0-rc
--set-json='operator.privateRegistryScanSecretsNames={"app":"dockerconfigjson-github-com"}'
```
@@ -262,4 +262,4 @@ trivy-operator 1/1 1 1 99s
The last way that you could give the Trivy operator access to your private container registry is through managed registries. In this case, the container registry and your Kubernetes cluster would have to be on the same cloud provider; then you can define access to your container namespace as part of the IAM account. Once defined, trivy will already have the permissions for the registry.
-For additional information, please refer to the [documentation on managed registries.](https://aquasecurity.github.io/trivy-operator/v0.13.2/docs/vulnerability-scanning/managed-registries/)
+For additional information, please refer to the [documentation on managed registries.](https://aquasecurity.github.io/trivy-operator/v0.14.0-rc/docs/vulnerability-scanning/managed-registries/)
diff --git a/mkdocs.yml b/mkdocs.yml
index 443e48058..b06deb8ad 100644
--- a/mkdocs.yml
+++ b/mkdocs.yml
@@ -86,8 +86,8 @@ extra:
method: mike
provider: mike
var:
- prev_git_tag: "v0.13.1"
- chart_version: "0.13.2"
+ prev_git_tag: "v0.13.2"
+ chart_version: "0.14.0-rc"
plugins:
- search