diff --git a/charts/cdefense/Chart.yaml b/charts/cdefense/Chart.yaml index f784fda..0da92ef 100755 --- a/charts/cdefense/Chart.yaml +++ b/charts/cdefense/Chart.yaml @@ -13,9 +13,9 @@ type: application # This is the chart version. This version number should be incremented each time you make changes # to the chart and its templates, including the app version. # Versions are expected to follow Semantic Versioning (https://semver.org/) -version: 4.9.0 +version: 4.9.1 # This is the version number of the application being deployed. This version number should be # incremented each time you make changes to the application. Versions are not expected to # follow Semantic Versioning. They should reflect the version the application is using. # It is recommended to use it with quotes. -appVersion: "4.9.0" +appVersion: "4.9.1" diff --git a/charts/cdefense/templates/api/config.yaml b/charts/cdefense/templates/api/config.yaml index 17490a3..e4d3a34 100644 --- a/charts/cdefense/templates/api/config.yaml +++ b/charts/cdefense/templates/api/config.yaml @@ -31,9 +31,9 @@ data: ONLINE_SCAN_POOL_SIZE: "20" CDEFENSE_BACKEND_URL: "http://newapi" CLOUDDEFENSE_NEWAPI_BASE_URL: https://{{ .Values.hostname }}/ - K8_RESOURCES_REQUEST_MEMORY: "3Gi" - K8_RESOURCES_REQUEST_CPU: "2000m" - K8_RESOURCES_LIMIT_MEMORY: "4Gi" + K8_RESOURCES_REQUEST_MEMORY: {{ .Values.api.job.resource.memory.request }} + K8_RESOURCES_REQUEST_CPU: {{ .Values.api.job.resource.cpu.request }} + K8_RESOURCES_LIMIT_MEMORY: {{ .Values.api.job.resource.memory.limit }} DATAJOB_WEBHOOK_URL: "https://discord.com/api/webhooks/1006160865386582077/HndjuqofW-wYXspUb5_iv-AJN46UojZZvQDksz1a2cgvx1Q1lUJkdZ_IhZrlsh_ytKKO" PROFILER_WEBHOOK_URL: "https://discord.com/api/webhooks/1102883054806114375/DwZqyzMTpYf66kMyQ47b7lgFLNFGfqmxQxEBfnfOZtH6cMJIFzoNw17pmQnG9OmNk9Tv" CLOUDDEFENSE_SENDGRID_EMAIL: "support-noreply@clouddefense.ai" \ No newline at end of file diff --git a/charts/cdefense/values.yaml b/charts/cdefense/values.yaml index 34f593a..3773885 100644 --- a/charts/cdefense/values.yaml +++ b/charts/cdefense/values.yaml @@ -1,4 +1,4 @@ -version: "release-4.9.0" +version: "release-4.9.1" domain: clouddefenseai.com hostname: cdefense.clouddefenseai.com @@ -117,6 +117,12 @@ api: region: us-west-2 bucket: cdefense-cli-logs job: + resource: + memory: + request: "3Gi" + limit: "4Gi" + cpu: + request: "2000m" nodeSelector: key: label value: job diff --git a/release.md b/release.md index e081340..6291ad6 100644 --- a/release.md +++ b/release.md @@ -1,21 +1,23 @@ -Release Date : 09.07.2024 -Release Notes : 4.9.0 +Release Date : 30.07.2024 +Release Notes : 4.9.1 New Features: -1) The ability to provide scan results under pull request: We have introduced the ability to provide scan results directly under pull request, giving the developer early insights into code analysis. -2) Functionality for Team Admin to be able to assign applications to teams from under Team management: We have introduced the functionality for a team admin role to be able to change application assigned team to a different team the Team Admin is part of. -3) Tags update for report: We have provided feature to have the associated tags with an application to be available as separate columns on checking the 'separateColumns' checkbox. -4) Added note under Applications Branches page to highlight the Protected and Un-protected branch count -5) Added sorting for the Rule management columns for Global and Application level for ease of use. -6) Introduced EXPLOITABLE SEVERITY COUNT configuration under Build Policy filter/rules -7) Added latest scan status on the top level Application list under Application page for better user-experience. -8) Added click functionality for OWASP Top 10, SANS Top 25, and Most Critical Vulnerabilities charts under Dashboard to show insights into the Application responsible for violation. +1) Vulnerability Report Branch detail: We have added Branch name details under the Global Vulnerability Report for better insight into the report data. +2) Application Report generation for Zero vulnerability: We have added the option to download the Application Report in the absence of vulnerabilities. +3) Added "OWASP Top 10" and "SANS Top 25" labels: We have added the "OWASP Top 10" and "SANS Top 25" labels for the respective found vulnerabilities. +4) Added filter option to get the "OWASP Top 10" and "SANS Top 25" vulnerabilities under Scan History: We have added the filter option to get the "OWASP Top 10" and "SANS Top 25" for found vulnerabilities for better usability. +5) Added Excluded filter option and respective label for vulnerabilities removed after getting added to the "Excluded Path" setting: Added Excluded filter option and respective label for better user experience. +6) Team Admins to have access to change the User Membership: We have provided the Team Admin the access to change its User membership to another team. +7) AppUser to be able to raise a request to mark a vulnerability as False Positive: We have provided AppUser the access to request for a vulnerability to be marked as False Positive via approval. +8) Added "Open Source" Report feature under Report drop-down menu: We have added the "Open Source" Report feature under Report to give better insights into the Vulnerability metrics. +9) Added the Pull Request Build Policy Configuration: We have added the Pull Request Policy configuration for the Delta scan. Improvements: -1) Fixed the Comprehensive Report under application scan results page: We have fixed the Comprehensive Report under Application page. +1) Fixed the False Positive marked vulnerability Expiration: We have fixed the False Positive marked vulnerability Expiration. 2) Bug Fixing on Backend: Fixed bugs across the application for better user experience. 3) Fixed list of UI issues. -4) Improved latency issue under Application page for better user experience. -5) Updated Audit logs and Import logs for better readability and correctness. \ No newline at end of file +4) Fixed Vulnerability Retest functionality. +5) Fixed Scan History update on deleting an "Excluded File" from the Application Setting +6) Fixed Vulnerability Page latency issues. \ No newline at end of file