diff --git a/README.md b/README.md index 5cf80337..188b04f1 100644 --- a/README.md +++ b/README.md @@ -273,5 +273,4 @@ to make this project a reality! --- - © 2019 Imhotep Software LLC. -All materials licensed under [Apache v2.0](http://www.apache.org/licenses/LICENSE-2.0) + © 2019 Imhotep Software LLC. All materials licensed under [Apache v2.0](http://www.apache.org/licenses/LICENSE-2.0) diff --git a/assets/k9s_small.png b/assets/k9s_small.png new file mode 100644 index 00000000..7f827fb1 Binary files /dev/null and b/assets/k9s_small.png differ diff --git a/change_logs/release_0.4.1.md b/change_logs/release_0.4.1.md index 79a24c52..67f569cd 100644 --- a/change_logs/release_0.4.1.md +++ b/change_logs/release_0.4.1.md @@ -1,3 +1,5 @@ + + # Release v0.4.1 ## Notes @@ -14,33 +16,35 @@ Thank you so much for your support and awesome suggestions to make K9s better!! ## Change Logs -### Subject View +### o Subject View You can now view users/groups that are bound by RBAC rules without having to type to full subject name. To activate use the following command mode ```text - # for users + # For users :usr - # for groups + # For groups :grp ``` - These commands will pull all the available cluster and role binding associated with these subject types. - You can then select and `` to see the associated policies. - You can also filter/sort like in any other K9s views with the added bonus of auto updates when new - users/groups binding come into your clusters. + These commands will pull all the available cluster and role bindings associated with these subject types. + Use select + `` to see the associated RBACK policy rules. + You can also filter/sort, like in any other K9s views with the added bonus of auto updates when new user/group bindings come into your clusters. - To see ServiceAccount RBAC policies, you can now navigate to the serviceaccount view aka `:sa` and press `` - to view the associated policy rules. + To see ServiceAccount RBAC policies, you can navigate to the serviceaccount view aka `:sa` and select + `` to view the associated policy rules. -### Fu View +### o ~~FuView~~ is now PolicyView - Has been renamed policy view to see all RBAC policies available on a subject. - You can now use `pol` (instead of `fu`) to list out RBAC policies associated with a + The Fu command has been depracated for pol(icy) command to see all RBAC policies available on a subject. You can use `pol` (instead of `fu`) to list out RBAC policies associated with a user/group or serviceaccount. -### Enter now has a meaning! + ```text + # To list out all the RBAC policies associated with user `fernand` + :pol u:fernand + ``` + +### Enter. Yes Please! Pressing `` on most resource views will now describe the resource by default. @@ -48,7 +52,11 @@ Thank you so much for your support and awesome suggestions to make K9s better!! ## Resolved Bugs -+ [Issue #143](https://github.com/derailed/k9s/issues/143) -+ [Issue #140](https://github.com/derailed/k9s/issues/140) - NOTE! Describe on v1 HPA is busted just like it is when running v 1.13 of - kubectl against a v1.12 cluster. ++ RBAC long subject names [Issue #143](https://github.com/derailed/k9s/issues/143) ++ Support HPA v1 [Issue #140](https://github.com/derailed/k9s/issues/140) + > NOTE: Describe on v1 HPA is busted just like it is when running kubectl v1.13 + > against an older cluster. + +--- + + © 2019 Imhotep Software LLC. All materials licensed under [Apache v2.0](http://www.apache.org/licenses/LICENSE-2.0)