K9s/release v0.30.2 (#2376)

* fix #2370

* Fix #2362

* K9s V0.30.2 release docs
mine
Fernand Galiana 2023-12-24 22:57:48 -07:00 committed by GitHub
parent e113f4b7c5
commit 1efadc81a6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 117 additions and 21 deletions

View File

@ -11,7 +11,7 @@ DATE ?= $(shell TZ=UTC date -j -f "%s" ${SOURCE_DATE_EPOCH} +"%Y-%m-%dT%H:
else
DATE ?= $(shell date -u -d @${SOURCE_DATE_EPOCH} +"%Y-%m-%dT%H:%M:%SZ")
endif
VERSION ?= v0.30.1
VERSION ?= v0.30.2
IMG_NAME := derailed/k9s
IMAGE := ${IMG_NAME}:${VERSION}

View File

@ -898,7 +898,7 @@ k9s:
memory: 100Mi
imageScans:
enable: false
blackList:
exclusions:
namespaces: []
labels: {}
logger:

View File

@ -116,8 +116,8 @@ k9s:
# ImageScan config changed from v0.29.0!
imageScans:
enable: false
# Now figures exclusions ie blacklist namespaces or specific workload labels
blackList:
# Now figures exclusions ie excludes certain namespaces or specific workload labels
exclusions:
# Exclude the following namespaces for image vulscans!
namespaces:
- kube-system
@ -236,13 +236,13 @@ This is a feature reported by many of you and its (finally!) here. As of this dr
---
# The Black List...
# Vulnerability Scan Exclusions...
As it seems customary with all k9s new features, folks want to turn them off ;(
The `Vulscan` feature did not get out unscaped ;(
As it was rightfully so pointed out, you may want to opted out scans for images that you do not control.
Tho I think it might be a good idea to run wide open once in a while to see if your cluster has any holes??
For this reason, we've opted to intro a blacklist section under the image scan configuration to exclude certain images from the scans.
For this reason, we've opted to intro an exclusion section under the image scan configuration to exclude certain images from the scans.
Here is a sample configuration:
@ -258,7 +258,7 @@ k9s:
noIcons: false
imageScans:
enable: true
blackList:
exclusions:
# Skip scans on these namespaces
namespaces:
- ns-1

View File

@ -19,7 +19,7 @@ On Slack? Please join us [K9slackers](https://join.slack.com/t/k9sers/shared_inv
## 🎄 Maintenance Release! 🎄
🎵 `On The twentyfouth day of Christmas my true love gave to me... Bugs!!` 🎵
🎵 `On The eleventh day of Christmas my true love gave to me... Bugs!!` 🎵
Got to love the aftermath... Thank you all for pitch'in in and help flesh out bugs!! The gift that keeps on... giving?
@ -41,8 +41,8 @@ Please dial [K9s Channel](https://www.youtube.com/channel/UC897uwPygni4QIjkPCpgj
* [#2368](https://github.com/derailed/k9s/issues/2368) Pod CPU and MEM columns are empty in 0.30.0
* [#2367](https://github.com/derailed/k9s/issues/2367) k9s 0.30.0 issue loading plugins
* [#2366](https://github.com/derailed/k9s/issues/2366) List pods of deployment is now impossible
* [#2264](https://github.com/derailed/k9s/issues/2264) k9s 0.30.0 fields and values missed in action in the "namespace view"
* [#2263](https://github.com/derailed/k9s/issues/2263) Default 0.30.0 default skin on macOS is no good
* [#2364](https://github.com/derailed/k9s/issues/2364) k9s 0.30.0 fields and values missed in action in the "namespace view"
* [#2363](https://github.com/derailed/k9s/issues/2363) Default 0.30.0 default skin on macOS is no good
---

View File

@ -0,0 +1,96 @@
<img src="https://raw.githubusercontent.com/derailed/k9s/master/assets/k9s-xmas.png" align="center" width="800" height="auto"/>
# Release v0.30.2
## Notes
Thank you to all that contributed with flushing out issues and enhancements for K9s!
I'll try to mark some of these issues as fixed. But if you don't mind grab the latest rev
and see if we're happier with some of the fixes!
If you've filed an issue please help me verify and close.
Your support, kindness and awesome suggestions to make K9s better are, as ever, very much noted and appreciated!
Also big thanks to all that have allocated their own time to help others on both slack and on this repo!!
As you may know, K9s is not pimped out by corps with deep pockets, thus if you feel K9s is helping your Kubernetes journey,
please consider joining our [sponsorship program](https://github.com/sponsors/derailed) and/or make some noise on social! [@kitesurfer](https://twitter.com/kitesurfer)
On Slack? Please join us [K9slackers](https://join.slack.com/t/k9sers/shared_invite/enQtOTA5MDEyNzI5MTU0LWQ1ZGI3MzliYzZhZWEyNzYxYzA3NjE0YTk1YmFmNzViZjIyNzhkZGI0MmJjYzhlNjdlMGJhYzE2ZGU1NjkyNTM)
## 🎄 Maintenance Release! 🎄
🎵 `On The eleventh day of Christmas my true love gave to me... More Bugs!!` 🎵
Thank you all for pitching in and help flesh out bugs!!
---
## [!!FEATURE NAME CHANGED!!] Vulnerability Scan Exclusions...
As it seems customary with all k9s new features, folks want to turn them off ;(
The `Vulscan` feature did not get out unscaped ;(
As it was rightfully so pointed out, you may want to opted out scans for images that you do not control.
Tho I think it might be a good idea to run wide open once in a while to see if your cluster has any holes??
For this reason, we've opted to intro an exclusion section under the image scan configuration to exclude certain images from the scans.
Here is a sample configuration:
```yaml
k9s:
liveViewAutoRefresh: false
refreshRate: 2
ui:
enableMouse: false
headless: false
logoless: false
crumbsless: false
noIcons: false
imageScans:
enable: true
# MOTE!! Field Name changed!!
exclusions:
# Skip scans on these namespaces
namespaces:
- ns-1
- ns-2
# Skip scans for pods matching these labels
labels:
- app:
- fred
- blee
- duh
- env:
- dev
```
---
## Videos Are In The Can!
Please dial [K9s Channel](https://www.youtube.com/channel/UC897uwPygni4QIjkPCpgjmw) for up coming content...
* [K9s v0.30.0 Sneak peek](https://youtu.be/mVBc1XneRJ4)
* [Vulnerability Scans](https://youtu.be/ULkl0MsaidU)
---
## Resolved Issues
* [#2374](https://github.com/derailed/k9s/issues/2374) The headless parameter does not function properly (v0.30.1)
* [#2372](https://github.com/derailed/k9s/issues/2372) Unable to set default resource to load (v0.30.1)
* [#2371](https://github.com/derailed/k9s/issues/2371) --write cli option does not work (0.30.X)
* [#2370](https://github.com/derailed/k9s/issues/2370) Wrong list of pods on node (0.30.X)
* [#2362](https://github.com/derailed/k9s/issues/2362) blackList: Use inclusive language alternatives
---
## Contributed PRs
Please be sure to give `Big Thanks!` and `ATTA Girls/Boys!` to all the fine contributors for making K9s better for all of us!!
* [#2375](https://github.com/derailed/k9s/pull/2375) get node filtering params from matching context values
* [#2373](https://github.com/derailed/k9s/pull/2373) fix command line flags not working
---
<img src="https://raw.githubusercontent.com/derailed/k9s/master/assets/imhotep_logo.png" width="32" height="auto"/> © 2023 Imhotep Software LLC. All materials licensed under [Apache v2.0](http://www.apache.org/licenses/LICENSE-2.0)

View File

@ -170,7 +170,7 @@ var expectedConfig = `k9s:
memory: 100Mi
imageScans:
enable: false
blackList:
exclusions:
namespaces: []
labels: {}
logger:
@ -212,7 +212,7 @@ var resetConfig = `k9s:
memory: 100Mi
imageScans:
enable: false
blackList:
exclusions:
namespaces: []
labels: {}
logger:

View File

@ -21,19 +21,19 @@ func (l Labels) exclude(k, val string) bool {
return false
}
// Blacklist tracks vul scan exclusions.
type BlackList struct {
// ScanExcludes tracks vul scan exclusions.
type ScanExcludes struct {
Namespaces []string `yaml:"namespaces"`
Labels Labels `yaml:"labels"`
}
func newBlackList() BlackList {
return BlackList{
func newScanExcludes() ScanExcludes {
return ScanExcludes{
Labels: make(Labels),
}
}
func (b BlackList) exclude(ns string, ll map[string]string) bool {
func (b ScanExcludes) exclude(ns string, ll map[string]string) bool {
for _, nss := range b.Namespaces {
if nss == ns {
return true
@ -50,14 +50,14 @@ func (b BlackList) exclude(ns string, ll map[string]string) bool {
// ImageScans tracks vul scans options.
type ImageScans struct {
Enable bool `yaml:"enable"`
BlackList BlackList `yaml:"blackList"`
Enable bool `yaml:"enable"`
Exclusions ScanExcludes `yaml:"exclusions"`
}
// NewImageScans returns a new instance.
func NewImageScans() *ImageScans {
return &ImageScans{
BlackList: newBlackList(),
Exclusions: newScanExcludes(),
}
}
@ -67,5 +67,5 @@ func (i *ImageScans) ShouldExclude(ns string, ll map[string]string) bool {
return false
}
return i.BlackList.exclude(ns, ll)
return i.Exclusions.exclude(ns, ll)
}