Skip to content

Commit b33b024

Browse files
authored
Images: Bump Alpine to v3.23.0. (#14249)
1 parent a33bf1b commit b33b024

File tree

14 files changed

+34
-24
lines changed

14 files changed

+34
-24
lines changed

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ clean-chroot-image: ## Removes local image
110110

111111
.PHONY: build
112112
build: ## Build ingress controller, debug tool and pre-stop hook.
113-
E2E_IMAGE=golang:$(GO_VERSION)-alpine3.22 USE_SHELL=/bin/sh build/run-in-docker.sh \
113+
E2E_IMAGE=golang:$(GO_VERSION)-alpine3.23 USE_SHELL=/bin/sh build/run-in-docker.sh \
114114
MAC_OS=$(MAC_OS) \
115115
PKG=$(PKG) \
116116
ARCH=$(ARCH) \

docs/examples/customization/sysctl/patch.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
"spec": {
55
"initContainers": [{
66
"name": "sysctl",
7-
"image": "alpine:3.22.2",
7+
"image": "alpine:3.23.0",
88
"securityContext": {
99
"privileged": true
1010
},

docs/user-guide/nginx-configuration/annotations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -861,7 +861,7 @@ It can be enabled using the following annotation:
861861
```yaml
862862
nginx.ingress.kubernetes.io/enable-modsecurity: "true"
863863
```
864-
ModSecurity will run in "Detection-Only" mode using the [recommended configuration](https://github.com/SpiderLabs/ModSecurity/blob/v3/master/modsecurity.conf-recommended).
864+
ModSecurity will run in "Detection-Only" mode using the [recommended configuration](https://github.com/owasp-modsecurity/ModSecurity/blob/v3/master/modsecurity.conf-recommended).
865865

866866
You can enable the [OWASP Core Rule Set](https://www.modsecurity.org/CRS/Documentation/) by
867867
setting the following annotation:
@@ -883,7 +883,7 @@ nginx.ingress.kubernetes.io/modsecurity-snippet: |
883883

884884
Note: If you use both `enable-owasp-core-rules` and `modsecurity-snippet` annotations together, only the
885885
`modsecurity-snippet` will take effect. If you wish to include the [OWASP Core Rule Set](https://www.modsecurity.org/CRS/Documentation/) or
886-
[recommended configuration](https://github.com/SpiderLabs/ModSecurity/blob/v3/master/modsecurity.conf-recommended) simply use the include
886+
[recommended configuration](https://github.com/owasp-modsecurity/ModSecurity/blob/v3/master/modsecurity.conf-recommended) simply use the include
887887
statement:
888888

889889
nginx 0.24.1 and below

docs/user-guide/third-party-addons/modsecurity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
# ModSecurity Web Application Firewall
22

3-
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx that is developed by Trustwave's SpiderLabs. It has a robust event-based programming language which provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis - [https://www.modsecurity.org](https://www.modsecurity.org)
3+
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx that is developed by OWASP. It has a robust event-based programming language which provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis - [https://www.modsecurity.org](https://www.modsecurity.org)
44

5-
The [ModSecurity-nginx](https://github.com/SpiderLabs/ModSecurity-nginx) connector is the connection point between NGINX and libmodsecurity (ModSecurity v3).
5+
The [ModSecurity-nginx](https://github.com/owasp-modsecurity/ModSecurity-nginx) connector is the connection point between NGINX and libmodsecurity (ModSecurity v3).
66

77
The default ModSecurity configuration file is located in `/etc/nginx/modsecurity/modsecurity.conf`. This is the only file located in this directory and contains the default recommended configuration. Using a volume we can replace this file with the desired configuration.
88
To enable the ModSecurity feature we need to specify `enable-modsecurity: "true"` in the configuration configmap.
99

1010
>__Note:__ the default configuration use detection only, because that minimizes the chances of post-installation disruption.
11-
Due to the value of the setting [SecAuditLogType=Concurrent](https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-(v2.x)#secauditlogtype) the ModSecurity log is stored in multiple files inside the directory `/var/log/audit`.
11+
Due to the value of the setting [SecAuditLogType=Concurrent](https://github.com/owasp-modsecurity/ModSecurity/wiki/Reference-Manual-(v2.x)#secauditlogtype) the ModSecurity log is stored in multiple files inside the directory `/var/log/audit`.
1212
The default `Serial` value in SecAuditLogType can impact performance.
1313

1414
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.

images/cfssl/rootfs/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
# See the License for the specific language governing permissions and
1313
# limitations under the License.
1414

15-
FROM alpine:3.22.2
15+
FROM alpine:3.23.0
1616

1717
RUN echo "@testing https://dl-cdn.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
1818
RUN apk update \

images/custom-error-pages/rootfs/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414

1515
ARG GOLANG_VERSION
1616

17-
FROM golang:${GOLANG_VERSION}-alpine3.22 AS builder
17+
FROM golang:${GOLANG_VERSION}-alpine3.23 AS builder
1818

1919
RUN apk update \
2020
&& apk upgrade && apk add git

images/ext-auth-example-authsvc/rootfs/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
ARG GOLANG_VERSION
22

3-
FROM golang:${GOLANG_VERSION}-alpine3.22 AS builder
3+
FROM golang:${GOLANG_VERSION}-alpine3.23 AS builder
44
RUN mkdir /authsvc
55
WORKDIR /authsvc
66
COPY . ./

images/fastcgi-helloserver/rootfs/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
# limitations under the License.
1414
ARG GOLANG_VERSION
1515

16-
FROM golang:${GOLANG_VERSION}-alpine3.22 AS builder
16+
FROM golang:${GOLANG_VERSION}-alpine3.23 AS builder
1717

1818
WORKDIR /go/src/k8s.io/ingress-nginx/images/fastcgi
1919

images/go-grpc-greeter-server/rootfs/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
ARG GOLANG_VERSION
22

3-
FROM golang:${GOLANG_VERSION}-alpine3.22 AS build
3+
FROM golang:${GOLANG_VERSION}-alpine3.23 AS build
44

55
WORKDIR /go/src/greeter-server
66

images/nginx/rootfs/Dockerfile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
1212
# See the License for the specific language governing permissions and
1313
# limitations under the License.
14-
FROM alpine:3.22.2 AS builder
14+
FROM alpine:3.23.0 AS builder
1515

1616
COPY . /
1717

@@ -21,7 +21,7 @@ RUN apk update \
2121
&& /build.sh
2222

2323
# Use a multi-stage build
24-
FROM alpine:3.22.2
24+
FROM alpine:3.23.0
2525

2626
ENV PATH=$PATH:/usr/local/luajit/bin:/usr/local/nginx/sbin:/usr/local/nginx/bin
2727

0 commit comments

Comments
 (0)