Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kubeshark-cli for openSUSE:Factory 
checked in at 2025-01-05 15:31:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kubeshark-cli (Old)
 and      /work/SRC/openSUSE:Factory/.kubeshark-cli.new.1881 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kubeshark-cli"

Sun Jan  5 15:31:27 2025 rev:11 rq:1234888 version:52.3.94

Changes:
--------
--- /work/SRC/openSUSE:Factory/kubeshark-cli/kubeshark-cli.changes      
2024-12-10 23:45:42.670003627 +0100
+++ /work/SRC/openSUSE:Factory/.kubeshark-cli.new.1881/kubeshark-cli.changes    
2025-01-05 15:31:42.946896077 +0100
@@ -1,0 +2,27 @@
+Sat Jan 04 08:09:40 UTC 2025 - opensuse_buildserv...@ojkastl.de
+
+- Update to version 52.3.94 (52.3.93 was yanked):
+  * :sparkles: Update the Helm chart
+  * :bookmark: Bump the Helm chart version to 52.3.93
+  * extended the https macro to include http2 in addition to http
+  * added https as a default macro (#1680)
+  * Add `CUSTOM_MACROS` to `ConfigMap` (#1674)
+  * Revert "Revert "Initialize kubeshark pinned eBPF resources
+    inside init container (#1665)" (#1676)" (#1678)
+  * Add save/activate/delete role scripting permissions (#1675)
+  * Revert "Initialize kubeshark pinned eBPF resources inside init
+    container (#1665)" (#1676)
+  * Added security capabilities, especially IPC_LOCK (#1671)
+  * Revert "Add `CUSTOM_MACROS` to `ConfigMap`"
+  * Add `CUSTOM_MACROS` to `ConfigMap`
+  * Initialize kubeshark pinned eBPF resources inside init
+    container (#1665)
+  * Replace sniffer 30001 port with 48999 (#1670)
+  * Add hub metrics port (#1666)
+  * removed the loglevel flag (#1669)
+  * Create save/activate/delete role scripting permissions
+    (#1667)
+  * Add --time param to pcapdump (#1664)
+  * from debug to logLevel (#1668)
+
+-------------------------------------------------------------------

Old:
----
  kubeshark-cli-52.3.92.obscpio

New:
----
  kubeshark-cli-52.3.94.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ kubeshark-cli.spec ++++++
--- /var/tmp/diff_new_pack.c3znvH/_old  2025-01-05 15:31:43.982938689 +0100
+++ /var/tmp/diff_new_pack.c3znvH/_new  2025-01-05 15:31:43.986938854 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package kubeshark-cli
 #
-# Copyright (c) 2024 SUSE LLC
+# Copyright (c) 2025 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -19,7 +19,7 @@
 %define executable_name kubeshark
 
 Name:           kubeshark-cli
-Version:        52.3.92
+Version:        52.3.94
 Release:        0
 Summary:        CLI for the API traffic analyzer for Kubernetes
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.c3znvH/_old  2025-01-05 15:31:44.018940170 +0100
+++ /var/tmp/diff_new_pack.c3znvH/_new  2025-01-05 15:31:44.018940170 +0100
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/kubeshark/kubeshark</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v52.3.92</param>
+    <param name="revision">v52.3.94</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="versionrewrite-pattern">v(.*)</param>
     <param name="changesgenerate">enable</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.c3znvH/_old  2025-01-05 15:31:44.038940993 +0100
+++ /var/tmp/diff_new_pack.c3znvH/_new  2025-01-05 15:31:44.042941157 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/kubeshark/kubeshark</param>
-              <param 
name="changesrevision">cd1d7e4a58d522adb2b3ef3718b660a3983a16a6</param></service></servicedata>
+              <param 
name="changesrevision">317357e83b2d77e8df6214d3ae24725abb4573d0</param></service></servicedata>
 (No newline at EOF)
 

++++++ kubeshark-cli-52.3.92.obscpio -> kubeshark-cli-52.3.94.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeshark-cli-52.3.92/cmd/pcapDump.go 
new/kubeshark-cli-52.3.94/cmd/pcapDump.go
--- old/kubeshark-cli-52.3.92/cmd/pcapDump.go   2024-12-09 20:42:05.000000000 
+0100
+++ new/kubeshark-cli-52.3.94/cmd/pcapDump.go   2025-01-04 00:42:21.000000000 
+0100
@@ -3,6 +3,7 @@
 import (
        "errors"
        "path/filepath"
+       "time"
 
        "github.com/creasty/defaults"
        "github.com/kubeshark/kubeshark/config/configStructs"
@@ -43,41 +44,26 @@
                        return err
                }
 
-               // Handle copy operation if the copy string is provided
-
-               if !cmd.Flags().Changed(configStructs.PcapDumpEnabled) {
-                       destDir, _ := 
cmd.Flags().GetString(configStructs.PcapDest)
-                       log.Info().Msg("Copying PCAP files")
-                       err = copyPcapFiles(clientset, config, destDir)
-                       if err != nil {
-                               log.Error().Err(err).Msg("Error copying PCAP 
files")
-                               return err
-                       }
-               } else {
-                       // Handle start operation if the start string is 
provided
-
-                       enabled, err := 
cmd.Flags().GetBool(configStructs.PcapDumpEnabled)
-                       if err != nil {
-                               log.Error().Err(err).Msg("Error getting 
pcapdump enable flag")
-                               return err
-                       }
-                       timeInterval, _ := 
cmd.Flags().GetString(configStructs.PcapTimeInterval)
-                       maxTime, _ := 
cmd.Flags().GetString(configStructs.PcapMaxTime)
-                       maxSize, _ := 
cmd.Flags().GetString(configStructs.PcapMaxSize)
-                       err = startStopPcap(clientset, enabled, timeInterval, 
maxTime, maxSize)
+               // Parse the `--time` flag
+               timeIntervalStr, _ := cmd.Flags().GetString("time")
+               var cutoffTime *time.Time // Use a pointer to distinguish 
between provided and not provided
+               if timeIntervalStr != "" {
+                       duration, err := time.ParseDuration(timeIntervalStr)
                        if err != nil {
-                               log.Error().Err(err).Msg("Error 
starting/stopping PCAP dump")
+                               log.Error().Err(err).Msg("Invalid time 
interval")
                                return err
                        }
+                       tempCutoffTime := time.Now().Add(-duration)
+                       cutoffTime = &tempCutoffTime
+               }
 
-                       if enabled {
-                               log.Info().Msg("Pcapdump started successfully")
-                               return nil
-                       } else {
-                               log.Info().Msg("Pcapdump stopped successfully")
-                               return nil
-                       }
-
+               // Handle copy operation if the copy string is provided
+               destDir, _ := cmd.Flags().GetString(configStructs.PcapDest)
+               log.Info().Msg("Copying PCAP files")
+               err = copyPcapFiles(clientset, config, destDir, cutoffTime)
+               if err != nil {
+                       log.Error().Err(err).Msg("Error copying PCAP files")
+                       return err
                }
 
                return nil
@@ -92,10 +78,7 @@
                log.Debug().Err(err).Send()
        }
 
-       pcapDumpCmd.Flags().String(configStructs.PcapTimeInterval, 
defaultPcapDumpConfig.PcapTimeInterval, "Time interval for PCAP file rotation 
(used with --start)")
-       pcapDumpCmd.Flags().String(configStructs.PcapMaxTime, 
defaultPcapDumpConfig.PcapMaxTime, "Maximum time for retaining old PCAP files 
(used with --start)")
-       pcapDumpCmd.Flags().String(configStructs.PcapMaxSize, 
defaultPcapDumpConfig.PcapMaxSize, "Maximum size of PCAP files before deletion 
(used with --start)")
+       pcapDumpCmd.Flags().String(configStructs.PcapTime, "", "Time interval 
(e.g., 10m, 1h) in the past for which the pcaps are copied")
        pcapDumpCmd.Flags().String(configStructs.PcapDest, "", "Local 
destination path for copied PCAP files (can not be used together with 
--enabled)")
-       pcapDumpCmd.Flags().String(configStructs.PcapKubeconfig, "", 
"Enabled/Disable to pcap dumps (can not be used together with --dest)")
-
+       pcapDumpCmd.Flags().String(configStructs.PcapKubeconfig, "", "Path for 
kubeconfig (if not provided the default location will be checked)")
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeshark-cli-52.3.92/cmd/pcapDumpRunner.go 
new/kubeshark-cli-52.3.94/cmd/pcapDumpRunner.go
--- old/kubeshark-cli-52.3.92/cmd/pcapDumpRunner.go     2024-12-09 
20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/cmd/pcapDumpRunner.go     2025-01-04 
00:42:21.000000000 +0100
@@ -6,8 +6,8 @@
        "fmt"
        "os"
        "path/filepath"
-       "strconv"
        "strings"
+       "time"
 
        "github.com/kubeshark/gopacket"
        "github.com/kubeshark/gopacket/layers"
@@ -54,7 +54,7 @@
 }
 
 // listFilesInPodDir lists all files in the specified directory inside the pod 
across multiple namespaces
-func listFilesInPodDir(ctx context.Context, clientset *clientk8s.Clientset, 
config *rest.Config, podName string, namespaces []string, configMapName, 
configMapKey string) ([]NamespaceFiles, error) {
+func listFilesInPodDir(ctx context.Context, clientset *clientk8s.Clientset, 
config *rest.Config, podName string, namespaces []string, configMapName, 
configMapKey string, cutoffTime *time.Time) ([]NamespaceFiles, error) {
        var namespaceFilesList []NamespaceFiles
 
        for _, namespace := range namespaces {
@@ -114,12 +114,42 @@
 
                // Split the output (file names) into a list
                files := strings.Split(strings.TrimSpace(stdoutBuf.String()), 
"\n")
-               if len(files) > 0 {
-                       // Append the NamespaceFiles struct to the list
+               if len(files) == 0 {
+                       log.Info().Msgf("No files found in directory %s in pod 
%s", srcFilePath, podName)
+                       continue
+               }
+
+               var filteredFiles []string
+
+               // Filter files based on cutoff time if provided
+               for _, file := range files {
+                       if cutoffTime != nil {
+                               parts := strings.Split(file, "-")
+                               if len(parts) < 2 {
+                                       log.Warn().Msgf("Skipping file with 
invalid format: %s", file)
+                                       continue
+                               }
+
+                               timestampStr := parts[len(parts)-2] + 
parts[len(parts)-1][:6] // Extract YYYYMMDDHHMMSS
+                               fileTime, err := time.Parse("20060102150405", 
timestampStr)
+                               if err != nil {
+                                       log.Warn().Err(err).Msgf("Skipping file 
with unparsable timestamp: %s", file)
+                                       continue
+                               }
+
+                               if fileTime.Before(*cutoffTime) {
+                                       continue
+                               }
+                       }
+                       // Add file to filtered list
+                       filteredFiles = append(filteredFiles, file)
+               }
+
+               if len(filteredFiles) > 0 {
                        namespaceFilesList = append(namespaceFilesList, 
NamespaceFiles{
                                Namespace: namespace,
                                SrcDir:    srcDir,
-                               Files:     files,
+                               Files:     filteredFiles,
                        })
                }
        }
@@ -229,63 +259,8 @@
        return nil
 }
 
-// setPcapConfigInKubernetes sets the PCAP config for all pods across multiple 
namespaces
-func setPcapConfigInKubernetes(ctx context.Context, clientset 
*clientk8s.Clientset, podName string, namespaces []string, enabledPcap bool, 
timeInterval, maxTime, maxSize string) error {
-       for _, namespace := range namespaces {
-               // Load the existing ConfigMap in the current namespace
-               configMap, err := 
clientset.CoreV1().ConfigMaps(namespace).Get(ctx, "kubeshark-config-map", 
metav1.GetOptions{})
-               if err != nil {
-                       log.Error().Err(err).Msgf("failed to get ConfigMap in 
namespace %s", namespace)
-                       continue
-               }
-
-               // Update the values with user-provided input
-               configMap.Data["PCAP_TIME_INTERVAL"] = timeInterval
-               configMap.Data["PCAP_MAX_SIZE"] = maxSize
-               configMap.Data["PCAP_MAX_TIME"] = maxTime
-               configMap.Data["PCAP_DUMP_ENABLE"] = 
strconv.FormatBool(enabledPcap)
-
-               // Apply the updated ConfigMap back to the cluster in the 
current namespace
-               _, err = clientset.CoreV1().ConfigMaps(namespace).Update(ctx, 
configMap, metav1.UpdateOptions{})
-               if err != nil {
-                       log.Error().Err(err).Msgf("failed to update ConfigMap 
in namespace %s", namespace)
-                       continue
-               }
-       }
-
-       return nil
-}
-
-// startPcap function for starting the PCAP capture
-func startStopPcap(clientset *kubernetes.Clientset, pcapEnable bool, 
timeInterval, maxTime, maxSize string) error {
-       kubernetesProvider, err := getKubernetesProviderForCli(false, false)
-       if err != nil {
-               log.Error().Err(err).Send()
-               return err
-       }
-
-       targetNamespaces := kubernetesProvider.GetNamespaces()
-
-       // List worker pods
-       workerPods, err := listWorkerPods(context.Background(), clientset, 
targetNamespaces)
-       if err != nil {
-               log.Error().Err(err).Msg("Error listing worker pods")
-               return err
-       }
-
-       // Iterate over each pod to start the PCAP capture by updating the 
configuration in Kubernetes
-       for _, pod := range workerPods {
-               err := setPcapConfigInKubernetes(context.Background(), 
clientset, pod.Name, targetNamespaces, pcapEnable, timeInterval, maxTime, 
maxSize)
-               if err != nil {
-                       log.Error().Err(err).Msgf("Error setting PCAP config 
for pod %s", pod.Name)
-                       continue
-               }
-       }
-       return nil
-}
-
 // copyPcapFiles function for copying the PCAP files from the worker pods
-func copyPcapFiles(clientset *kubernetes.Clientset, config *rest.Config, 
destDir string) error {
+func copyPcapFiles(clientset *kubernetes.Clientset, config *rest.Config, 
destDir string, cutoffTime *time.Time) error {
        kubernetesProvider, err := getKubernetesProviderForCli(false, false)
        if err != nil {
                log.Error().Err(err).Send()
@@ -305,7 +280,7 @@
        // Iterate over each pod to get the PCAP directory from config and copy 
files
        for _, pod := range workerPods {
                // Get the list of NamespaceFiles (files per namespace) and 
their source directories
-               namespaceFiles, err := listFilesInPodDir(context.Background(), 
clientset, config, pod.Name, targetNamespaces, 
SELF_RESOURCES_PREFIX+SUFFIX_CONFIG_MAP, "PCAP_SRC_DIR")
+               namespaceFiles, err := listFilesInPodDir(context.Background(), 
clientset, config, pod.Name, targetNamespaces, 
SELF_RESOURCES_PREFIX+SUFFIX_CONFIG_MAP, "PCAP_SRC_DIR", cutoffTime)
                if err != nil {
                        log.Error().Err(err).Msgf("Error listing files in pod 
%s", pod.Name)
                        continue
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeshark-cli-52.3.92/config/config.go 
new/kubeshark-cli-52.3.94/config/config.go
--- old/kubeshark-cli-52.3.92/config/config.go  2024-12-09 20:42:05.000000000 
+0100
+++ new/kubeshark-cli-52.3.94/config/config.go  2025-01-04 00:42:21.000000000 
+0100
@@ -63,6 +63,9 @@
 
        Config = CreateDefaultConfig()
        Config.Tap.Debug = DebugMode
+       if DebugMode {
+               Config.LogLevel = "debug"
+       }
        cmdName = cmd.Name()
        if utils.Contains([]string{
                "clean",
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeshark-cli-52.3.92/config/configStruct.go 
new/kubeshark-cli-52.3.94/config/configStruct.go
--- old/kubeshark-cli-52.3.92/config/configStruct.go    2024-12-09 
20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/config/configStruct.go    2025-01-04 
00:42:21.000000000 +0100
@@ -62,6 +62,11 @@
                                                        Filter:                 
 "",
                                                        CanDownloadPCAP:        
 true,
                                                        CanUseScripting:        
 true,
+                                                       ScriptingPermissions: 
configStructs.ScriptingPermissions{
+                                                               CanSave: true,
+                                                               CanActivate: 
true,
+                                                               CanDelete: true,
+                                                       },
                                                        CanUpdateTargetedPods:  
 true,
                                                        
CanStopTrafficCapturing: true,
                                                        ShowAdminConsoleLink:   
 true,
@@ -113,6 +118,7 @@
        Scripting                 configStructs.ScriptingConfig 
`yaml:"scripting" json:"scripting"`
        Manifests                 ManifestsConfig               
`yaml:"manifests,omitempty" json:"manifests,omitempty"`
        Timezone                  string                        
`yaml:"timezone" json:"timezone"`
+       LogLevel                  string                        
`yaml:"logLevel" json:"logLevel" default:"warning"`
 }
 
 func (config *ConfigStruct) ImagePullPolicy() v1.PullPolicy {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/kubeshark-cli-52.3.92/config/configStructs/tapConfig.go 
new/kubeshark-cli-52.3.94/config/configStructs/tapConfig.go
--- old/kubeshark-cli-52.3.92/config/configStructs/tapConfig.go 2024-12-09 
20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/config/configStructs/tapConfig.go 2025-01-04 
00:42:21.000000000 +0100
@@ -43,6 +43,7 @@
        PcapTimeInterval             = "timeInterval"
        PcapKubeconfig               = "kubeconfig"
        PcapDumpEnabled              = "enabled"
+       PcapTime                     = "time"
 )
 
 type ResourceLimitsHub struct {
@@ -71,7 +72,7 @@
 }
 
 type WorkerConfig struct {
-       SrvPort uint16 `yaml:"srvPort" json:"srvPort" default:"30001"`
+       SrvPort uint16 `yaml:"srvPort" json:"srvPort" default:"48999"`
 }
 
 type HubConfig struct {
@@ -116,13 +117,20 @@
        Tracer  ResourceRequirementsWorker `yaml:"tracer" json:"tracer"`
 }
 
+type ScriptingPermissions struct {
+       CanSave     bool `yaml:"canSave" json:"canSave" default:"true"`
+       CanActivate bool `yaml:"canActivate" json:"canActivate" default:"true"`
+       CanDelete   bool `yaml:"canDelete" json:"canDelete" default:"true"`
+}
+
 type Role struct {
-       Filter                  string `yaml:"filter" json:"filter" default:""`
-       CanDownloadPCAP         bool   `yaml:"canDownloadPCAP" 
json:"canDownloadPCAP" default:"false"`
-       CanUseScripting         bool   `yaml:"canUseScripting" 
json:"canUseScripting" default:"false"`
-       CanUpdateTargetedPods   bool   `yaml:"canUpdateTargetedPods" 
json:"canUpdateTargetedPods" default:"false"`
-       CanStopTrafficCapturing bool   `yaml:"canStopTrafficCapturing" 
json:"canStopTrafficCapturing" default:"false"`
-       ShowAdminConsoleLink    bool   `yaml:"showAdminConsoleLink" 
json:"showAdminConsoleLink" default:"false"`
+       Filter                  string               `yaml:"filter" 
json:"filter" default:""`
+       CanDownloadPCAP         bool                 `yaml:"canDownloadPCAP" 
json:"canDownloadPCAP" default:"false"`
+       CanUseScripting         bool                 `yaml:"canUseScripting" 
json:"canUseScripting" default:"false"`
+       ScriptingPermissions    ScriptingPermissions 
`yaml:"scriptingPermissions" json:"scriptingPermissions"`
+       CanUpdateTargetedPods   bool                 
`yaml:"canUpdateTargetedPods" json:"canUpdateTargetedPods" default:"false"`
+       CanStopTrafficCapturing bool                 
`yaml:"canStopTrafficCapturing" json:"canStopTrafficCapturing" default:"false"`
+       ShowAdminConsoleLink    bool                 
`yaml:"showAdminConsoleLink" json:"showAdminConsoleLink" default:"false"`
 }
 
 type SamlConfig struct {
@@ -201,6 +209,7 @@
        PcapMaxTime      string `yaml:"maxTime" json:"maxTime" default:"1h"`
        PcapMaxSize      string `yaml:"maxSize" json:"maxSize" default:"500MB"`
        PcapSrcDir       string `yaml:"pcapSrcDir" json:"pcapSrcDir" 
default:"pcapdump"`
+       PcapTime         string `yaml:"time" json:"time" default:"time"`
 }
 
 type TapConfig struct {
@@ -243,6 +252,7 @@
        Capabilities                 CapabilitiesConfig    `yaml:"capabilities" 
json:"capabilities"`
        GlobalFilter                 string                `yaml:"globalFilter" 
json:"globalFilter" default:""`
        EnabledDissectors            []string              
`yaml:"enabledDissectors" json:"enabledDissectors"`
+       CustomMacros                 map[string]string     `yaml:"customMacros" 
json:"customMacros" default:"{\"https\":\"tls and (http or http2)\"}"`
        Metrics                      MetricsConfig         `yaml:"metrics" 
json:"metrics"`
        Pprof                        PprofConfig           `yaml:"pprof" 
json:"pprof"`
        Misc                         MiscConfig            `yaml:"misc" 
json:"misc"`
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeshark-cli-52.3.92/helm-chart/Chart.yaml 
new/kubeshark-cli-52.3.94/helm-chart/Chart.yaml
--- old/kubeshark-cli-52.3.92/helm-chart/Chart.yaml     2024-12-09 
20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/helm-chart/Chart.yaml     2025-01-04 
00:42:21.000000000 +0100
@@ -1,6 +1,6 @@
 apiVersion: v2
 name: kubeshark
-version: "52.3.92"
+version: "52.3.94"
 description: The API Traffic Analyzer for Kubernetes
 home: https://kubeshark.co
 keywords:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeshark-cli-52.3.92/helm-chart/README.md 
new/kubeshark-cli-52.3.94/helm-chart/README.md
--- old/kubeshark-cli-52.3.92/helm-chart/README.md      2024-12-09 
20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/helm-chart/README.md      2025-01-04 
00:42:21.000000000 +0100
@@ -131,7 +131,7 @@
 | `tap.docker.overrideImage`                | Can be used to directly override 
image names  | `""`                                                    |
 | `tap.docker.overrideTag`                  | Can be used to override image 
tags            | `""`                                                    |
 | `tap.proxy.hub.srvPort`                   | Hub server port. Change if 
already occupied.  | `8898`                                                  |
-| `tap.proxy.worker.srvPort`                | Worker server port. Change if 
already occupied.| `30001`                                                |
+| `tap.proxy.worker.srvPort`                | Worker server port. Change if 
already occupied.| `48999`                                                |
 | `tap.proxy.front.port`                    | Front service port. Change if 
already occupied.| `8899`                                                 |
 | `tap.proxy.host`                          | Change to 0.0.0.0 top open up to 
the world.   | `127.0.0.1`                                             |
 | `tap.regex`                               | Target (process traffic from) 
pods that match regex | `.*`                                              |
@@ -175,7 +175,7 @@
 | `tap.auth.saml.x509crt`                   | A self-signed X.509 `.cert` 
contents <br/>(effective, if `tap.auth.type = saml`)          | ``              
                                        |
 | `tap.auth.saml.x509key`                   | A self-signed X.509 `.key` 
contents <br/>(effective, if `tap.auth.type = saml`)           | ``             
                                         |
 | `tap.auth.saml.roleAttribute`             | A SAML attribute name 
corresponding to user's authorization role <br/>(effective, if `tap.auth.type = 
saml`)  | `role` |
-| `tap.auth.saml.roles`                     | A list of SAML authorization 
roles and their permissions <br/>(effective, if `tap.auth.type = saml`)  | 
`{"admin":{"canDownloadPCAP":true,"canUpdateTargetedPods":true,"canUseScripting":true,
 "canStopTrafficCapturing":true, "filter":"","showAdminConsoleLink":true}}` |
+| `tap.auth.saml.roles`                     | A list of SAML authorization 
roles and their permissions <br/>(effective, if `tap.auth.type = saml`)  | 
`{"admin":{"canDownloadPCAP":true,"canUpdateTargetedPods":true,"canUseScripting":true,
 "scriptingPermissions":{"canSave":true, "canActivate":true, "canDelete":true}, 
"canStopTrafficCapturing":true, "filter":"","showAdminConsoleLink":true}}` |
 | `tap.ingress.enabled`                     | Enable `Ingress`                 
               | `false`                                                 |
 | `tap.ingress.className`                   | Ingress class name               
             | `""`                                                    |
 | `tap.ingress.host`                        | Host of the `Ingress`            
              | `ks.svc.cluster.local`                                  |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/kubeshark-cli-52.3.92/helm-chart/templates/04-hub-deployment.yaml 
new/kubeshark-cli-52.3.94/helm-chart/templates/04-hub-deployment.yaml
--- old/kubeshark-cli-52.3.92/helm-chart/templates/04-hub-deployment.yaml       
2024-12-09 20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/helm-chart/templates/04-hub-deployment.yaml       
2025-01-04 00:42:21.000000000 +0100
@@ -31,9 +31,8 @@
             - ./hub
             - -port
             - "8080"
-          {{- if .Values.tap.debug }}
-            - -debug
-          {{- end }}
+            - -loglevel
+            - '{{ .Values.logLevel | default "warning" }}'
           env:
           - name: POD_NAME
             valueFrom:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/kubeshark-cli-52.3.92/helm-chart/templates/09-worker-daemon-set.yaml 
new/kubeshark-cli-52.3.94/helm-chart/templates/09-worker-daemon-set.yaml
--- old/kubeshark-cli-52.3.92/helm-chart/templates/09-worker-daemon-set.yaml    
2024-12-09 20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/helm-chart/templates/09-worker-daemon-set.yaml    
2025-01-04 00:42:21.000000000 +0100
@@ -25,6 +25,39 @@
       name: kubeshark-worker-daemon-set
       namespace: kubeshark
     spec:
+      initContainers:
+        - command:
+          - /bin/sh
+          - -c
+          - mkdir -p /sys/fs/bpf && mount | grep -q '/sys/fs/bpf' || mount -t 
bpf bpf /sys/fs/bpf
+        {{- if .Values.tap.docker.overrideTag.worker }}
+          image: '{{ .Values.tap.docker.registry }}/worker:{{ 
.Values.tap.docker.overrideTag.worker }}{{ include 
"kubeshark.dockerTagDebugVersion" . }}'
+        {{ else }}
+          image: '{{ .Values.tap.docker.registry }}/worker:{{ not (eq 
.Values.tap.docker.tag "") | ternary .Values.tap.docker.tag (include 
"kubeshark.defaultVersion" .) }}{{ include "kubeshark.dockerTagDebugVersion" . 
}}'
+        {{- end }}
+          imagePullPolicy: {{ .Values.tap.docker.imagePullPolicy }}
+          name: check-bpf
+          securityContext:
+            privileged: true
+          volumeMounts:
+          - mountPath: /sys
+            name: sys
+            mountPropagation: Bidirectional
+        - command:
+          - ./tracer
+          - -init-bpf
+        {{- if .Values.tap.docker.overrideTag.worker }}
+          image: '{{ .Values.tap.docker.registry }}/worker:{{ 
.Values.tap.docker.overrideTag.worker }}{{ include 
"kubeshark.dockerTagDebugVersion" . }}'
+        {{ else }}
+          image: '{{ .Values.tap.docker.registry }}/worker:{{ not (eq 
.Values.tap.docker.tag "") | ternary .Values.tap.docker.tag (include 
"kubeshark.defaultVersion" .) }}{{ include "kubeshark.dockerTagDebugVersion" . 
}}'
+        {{- end }}
+          imagePullPolicy: {{ .Values.tap.docker.imagePullPolicy }}
+          name: init-bpf
+          securityContext:
+            privileged: true
+          volumeMounts:
+          - mountPath: /sys
+            name: sys
       containers:
         - command:
             - ./worker
@@ -36,6 +69,8 @@
             - '{{ .Values.tap.metrics.port }}'
             - -packet-capture
             - '{{ .Values.tap.packetCapture }}'
+            - -loglevel
+            - '{{ .Values.logLevel | default "warning" }}'
           {{- if .Values.tap.tls }}
             - -unixsocket
           {{- end }}
@@ -54,9 +89,6 @@
             - '{{ .Values.tap.misc.resolutionStrategy }}'
             - -staletimeout
             - '{{ .Values.tap.misc.staleTimeoutSeconds }}'
-          {{- if .Values.tap.debug }}
-            - -debug
-          {{- end }}
         {{- if .Values.tap.docker.overrideImage.worker }}
           image: '{{ .Values.tap.docker.overrideImage.worker }}'
         {{- else if .Values.tap.docker.overrideTag.worker }}
@@ -123,6 +155,11 @@
                 {{ print "- " . }}
                 {{- end }}
                 {{- end }}
+                {{- if .Values.tap.capabilities.ebpfCapture }}
+                {{- range .Values.tap.capabilities.ebpfCapture }}
+                {{ print "- " . }}
+                {{- end }}
+                {{- end }}
               drop:
                 - ALL
           readinessProbe:
@@ -156,9 +193,6 @@
           {{- if ne .Values.tap.packetCapture "ebpf" }}
             - -disable-ebpf
           {{- end }}
-          {{- if .Values.tap.debug }}
-            - -debug
-          {{- end }}
           {{- if .Values.tap.disableTlsLog }}
             - -disable-tls-log
           {{- end }}
@@ -166,6 +200,8 @@
             - -port
             - '{{ add .Values.tap.proxy.worker.srvPort 1 }}'
           {{- end }}
+            # - -loglevel
+            # - '{{ .Values.logLevel | default "warning" }}'
         {{- if .Values.tap.docker.overrideTag.worker }}
           image: '{{ .Values.tap.docker.registry }}/worker:{{ 
.Values.tap.docker.overrideTag.worker }}{{ include 
"kubeshark.dockerTagDebugVersion" . }}'
         {{ else }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/kubeshark-cli-52.3.92/helm-chart/templates/12-config-map.yaml 
new/kubeshark-cli-52.3.94/helm-chart/templates/12-config-map.yaml
--- old/kubeshark-cli-52.3.92/helm-chart/templates/12-config-map.yaml   
2024-12-09 20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/helm-chart/templates/12-config-map.yaml   
2025-01-04 00:42:21.000000000 +0100
@@ -50,6 +50,7 @@
                             {{- end }}'
     DUPLICATE_TIMEFRAME: '{{ .Values.tap.misc.duplicateTimeframe }}'
     ENABLED_DISSECTORS: '{{ gt (len .Values.tap.enabledDissectors) 0 | ternary 
(join "," .Values.tap.enabledDissectors) "" }}'
+    CUSTOM_MACROS: '{{ toJson .Values.tap.customMacros }}'
     DISSECTORS_UPDATING_ENABLED: '{{ .Values.dissectorsUpdatingEnabled | 
ternary "true" "false" }}'
     DETECT_DUPLICATES: '{{ .Values.tap.misc.detectDuplicates | ternary "true" 
"false" }}'
     PCAP_DUMP_ENABLE: '{{ .Values.pcapdump.enabled }}'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/kubeshark-cli-52.3.92/helm-chart/templates/16-hub-service-metrics.yaml 
new/kubeshark-cli-52.3.94/helm-chart/templates/16-hub-service-metrics.yaml
--- old/kubeshark-cli-52.3.92/helm-chart/templates/16-hub-service-metrics.yaml  
1970-01-01 01:00:00.000000000 +0100
+++ new/kubeshark-cli-52.3.94/helm-chart/templates/16-hub-service-metrics.yaml  
2025-01-04 00:42:21.000000000 +0100
@@ -0,0 +1,23 @@
+---
+kind: Service
+apiVersion: v1
+metadata:
+  labels:
+    {{- include "kubeshark.labels" . | nindent 4 }}
+  annotations:
+    prometheus.io/scrape: 'true'
+    prometheus.io/port: '9100'
+  {{- if .Values.tap.annotations }}
+    {{- toYaml .Values.tap.annotations | nindent 4 }}
+  {{- end }}
+  name: kubeshark-hub-metrics
+  namespace: {{ .Release.Namespace }}
+spec:
+  selector:
+    app.kubeshark.co/app: hub
+    {{- include "kubeshark.labels" . | nindent 4 }}
+  ports:
+  - name: metrics
+    protocol: TCP
+    port: 9100
+    targetPort: 9100
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/kubeshark-cli-52.3.92/helm-chart/templates/16-network-policies.yaml 
new/kubeshark-cli-52.3.94/helm-chart/templates/16-network-policies.yaml
--- old/kubeshark-cli-52.3.92/helm-chart/templates/16-network-policies.yaml     
2024-12-09 20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/helm-chart/templates/16-network-policies.yaml     
1970-01-01 01:00:00.000000000 +0100
@@ -1,76 +0,0 @@
-apiVersion: networking.k8s.io/v1
-kind: NetworkPolicy
-metadata:
-  labels:
-    {{- include "kubeshark.labels" . | nindent 4 }}
-  annotations:
-  {{- if .Values.tap.annotations }}
-    {{- toYaml .Values.tap.annotations | nindent 4 }}
-  {{- end }}
-  name: kubeshark-hub-network-policy
-  namespace: {{ .Release.Namespace }}
-spec:
-  podSelector:
-    matchLabels:
-      app.kubeshark.co/app: hub
-  policyTypes:
-    - Ingress
-    - Egress
-  ingress:
-    - ports:
-        - protocol: TCP
-          port: 8080
-  egress:
-    - {}
----
-apiVersion: networking.k8s.io/v1
-kind: NetworkPolicy
-metadata:
-  labels:
-    {{- include "kubeshark.labels" . | nindent 4 }}
-  annotations:
-  {{- if .Values.tap.annotations }}
-    {{- toYaml .Values.tap.annotations | nindent 4 }}
-  {{- end }}
-  name: kubeshark-front-network-policy
-  namespace: {{ .Release.Namespace }}
-spec:
-  podSelector:
-    matchLabels:
-      app.kubeshark.co/app: front
-  policyTypes:
-    - Ingress
-    - Egress
-  ingress:
-    - ports:
-        - protocol: TCP
-          port: 8080
-  egress:
-    - {}
----
-apiVersion: networking.k8s.io/v1
-kind: NetworkPolicy
-metadata:
-  labels:
-    {{- include "kubeshark.labels" . | nindent 4 }}
-  annotations:
-  {{- if .Values.tap.annotations }}
-    {{- toYaml .Values.tap.annotations | nindent 4 }}
-  {{- end }}
-  name: kubeshark-worker-network-policy
-  namespace: {{ .Release.Namespace }}
-spec:
-  podSelector:
-    matchLabels:
-      app.kubeshark.co/app: worker
-  policyTypes:
-    - Ingress
-    - Egress
-  ingress:
-    - ports:
-        - protocol: TCP
-          port: {{ .Values.tap.proxy.worker.srvPort }}
-        - protocol: TCP
-          port: {{ .Values.tap.metrics.port }}
-  egress:
-    - {}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/kubeshark-cli-52.3.92/helm-chart/templates/17-network-policies.yaml 
new/kubeshark-cli-52.3.94/helm-chart/templates/17-network-policies.yaml
--- old/kubeshark-cli-52.3.92/helm-chart/templates/17-network-policies.yaml     
1970-01-01 01:00:00.000000000 +0100
+++ new/kubeshark-cli-52.3.94/helm-chart/templates/17-network-policies.yaml     
2025-01-04 00:42:21.000000000 +0100
@@ -0,0 +1,79 @@
+apiVersion: networking.k8s.io/v1
+kind: NetworkPolicy
+metadata:
+  labels:
+    {{- include "kubeshark.labels" . | nindent 4 }}
+  annotations:
+  {{- if .Values.tap.annotations }}
+    {{- toYaml .Values.tap.annotations | nindent 4 }}
+  {{- end }}
+  name: kubeshark-hub-network-policy
+  namespace: {{ .Release.Namespace }}
+spec:
+  podSelector:
+    matchLabels:
+      app.kubeshark.co/app: hub
+  policyTypes:
+    - Ingress
+    - Egress
+  ingress:
+    - ports:
+        - protocol: TCP
+          port: 8080
+    - ports:
+        - protocol: TCP
+          port: 9100
+  egress:
+    - {}
+---
+apiVersion: networking.k8s.io/v1
+kind: NetworkPolicy
+metadata:
+  labels:
+    {{- include "kubeshark.labels" . | nindent 4 }}
+  annotations:
+  {{- if .Values.tap.annotations }}
+    {{- toYaml .Values.tap.annotations | nindent 4 }}
+  {{- end }}
+  name: kubeshark-front-network-policy
+  namespace: {{ .Release.Namespace }}
+spec:
+  podSelector:
+    matchLabels:
+      app.kubeshark.co/app: front
+  policyTypes:
+    - Ingress
+    - Egress
+  ingress:
+    - ports:
+        - protocol: TCP
+          port: 8080
+  egress:
+    - {}
+---
+apiVersion: networking.k8s.io/v1
+kind: NetworkPolicy
+metadata:
+  labels:
+    {{- include "kubeshark.labels" . | nindent 4 }}
+  annotations:
+  {{- if .Values.tap.annotations }}
+    {{- toYaml .Values.tap.annotations | nindent 4 }}
+  {{- end }}
+  name: kubeshark-worker-network-policy
+  namespace: {{ .Release.Namespace }}
+spec:
+  podSelector:
+    matchLabels:
+      app.kubeshark.co/app: worker
+  policyTypes:
+    - Ingress
+    - Egress
+  ingress:
+    - ports:
+        - protocol: TCP
+          port: {{ .Values.tap.proxy.worker.srvPort }}
+        - protocol: TCP
+          port: {{ .Values.tap.metrics.port }}
+  egress:
+    - {}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeshark-cli-52.3.92/helm-chart/values.yaml 
new/kubeshark-cli-52.3.94/helm-chart/values.yaml
--- old/kubeshark-cli-52.3.92/helm-chart/values.yaml    2024-12-09 
20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/helm-chart/values.yaml    2025-01-04 
00:42:21.000000000 +0100
@@ -16,7 +16,7 @@
       front: ""
   proxy:
     worker:
-      srvPort: 30001
+      srvPort: 48999
     hub:
       srvPort: 8898
     front:
@@ -85,6 +85,10 @@
           filter: ""
           canDownloadPCAP: true
           canUseScripting: true
+          scriptingPermissions:
+            canSave: true
+            canActivate: true
+            canDelete: true
           canUpdateTargetedPods: true
           canStopTrafficCapturing: true
           showAdminConsoleLink: true
@@ -134,6 +138,8 @@
   - syscall
   - ws
   - ldap
+  customMacros:
+    https: tls and (http or http2)
   metrics:
     port: 49100
   pprof:
@@ -160,6 +166,7 @@
   maxTime: 1h
   maxSize: 500MB
   pcapSrcDir: pcapdump
+  time: time
 kube:
   configPath: ""
   context: ""
@@ -178,3 +185,4 @@
   active: []
   console: true
 timezone: ""
+logLevel: warning
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeshark-cli-52.3.92/manifests/complete.yaml 
new/kubeshark-cli-52.3.94/manifests/complete.yaml
--- old/kubeshark-cli-52.3.92/manifests/complete.yaml   2024-12-09 
20:42:05.000000000 +0100
+++ new/kubeshark-cli-52.3.94/manifests/complete.yaml   2025-01-04 
00:42:21.000000000 +0100
@@ -1,13 +1,13 @@
 ---
-# Source: kubeshark/templates/16-network-policies.yaml
+# Source: kubeshark/templates/17-network-policies.yaml
 apiVersion: networking.k8s.io/v1
 kind: NetworkPolicy
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-hub-network-policy
@@ -23,18 +23,21 @@
     - ports:
         - protocol: TCP
           port: 8080
+    - ports:
+        - protocol: TCP
+          port: 9100
   egress:
     - {}
 ---
-# Source: kubeshark/templates/16-network-policies.yaml
+# Source: kubeshark/templates/17-network-policies.yaml
 apiVersion: networking.k8s.io/v1
 kind: NetworkPolicy
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-front-network-policy
@@ -53,15 +56,15 @@
   egress:
     - {}
 ---
-# Source: kubeshark/templates/16-network-policies.yaml
+# Source: kubeshark/templates/17-network-policies.yaml
 apiVersion: networking.k8s.io/v1
 kind: NetworkPolicy
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-worker-network-policy
@@ -76,7 +79,7 @@
   ingress:
     - ports:
         - protocol: TCP
-          port: 30001
+          port: 48999
         - protocol: TCP
           port: 49100
   egress:
@@ -87,10 +90,10 @@
 kind: ServiceAccount
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-service-account
@@ -104,10 +107,10 @@
   namespace: default
   labels:
     app.kubeshark.co/app: hub
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
 stringData:
     LICENSE: ''
@@ -121,10 +124,10 @@
   namespace: default
   labels:
     app.kubeshark.co/app: hub
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
 stringData:
   AUTH_SAML_X509_CRT: |
@@ -137,10 +140,10 @@
   namespace: default
   labels:
     app.kubeshark.co/app: hub
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
 stringData:
   AUTH_SAML_X509_KEY: |
@@ -152,10 +155,10 @@
   name: kubeshark-nginx-config-map
   namespace: default
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
 data:
   default.conf: |
@@ -216,10 +219,10 @@
   namespace: default
   labels:
     app.kubeshark.co/app: hub
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
 data:
     POD_REGEX: '.*'
@@ -236,7 +239,7 @@
     AUTH_TYPE: 'oidc'
     AUTH_SAML_IDP_METADATA_URL: ''
     AUTH_SAML_ROLE_ATTRIBUTE: 'role'
-    AUTH_SAML_ROLES: 
'{"admin":{"canDownloadPCAP":true,"canStopTrafficCapturing":true,"canUpdateTargetedPods":true,"canUseScripting":true,"filter":"","showAdminConsoleLink":true}}'
+    AUTH_SAML_ROLES: 
'{"admin":{"canDownloadPCAP":true,"canStopTrafficCapturing":true,"canUpdateTargetedPods":true,"canUseScripting":true,"filter":"","scriptingPermissions":{"canActivate":true,"canDelete":true,"canSave":true},"showAdminConsoleLink":true}}'
     TELEMETRY_DISABLED: 'false'
     SCRIPTING_DISABLED: ''
     TARGETED_PODS_UPDATE_DISABLED: ''
@@ -253,6 +256,7 @@
     CLOUD_LICENSE_ENABLED: 'true'
     DUPLICATE_TIMEFRAME: '200ms'
     ENABLED_DISSECTORS: 'amqp,dns,http,icmp,kafka,redis,sctp,syscall,ws,ldap'
+    CUSTOM_MACROS: '{"https":"tls and (http or http2)"}'
     DISSECTORS_UPDATING_ENABLED: 'true'
     DETECT_DUPLICATES: 'false'
     PCAP_DUMP_ENABLE: 'true'
@@ -266,10 +270,10 @@
 kind: ClusterRole
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-cluster-role-default
@@ -314,10 +318,10 @@
 kind: ClusterRoleBinding
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-cluster-role-binding-default
@@ -336,10 +340,10 @@
 kind: Role
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-self-config-role
@@ -366,10 +370,10 @@
 kind: RoleBinding
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-self-config-role-binding
@@ -389,10 +393,10 @@
 metadata:
   labels:
     app.kubeshark.co/app: hub
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-hub
@@ -411,10 +415,10 @@
 kind: Service
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-front
@@ -433,10 +437,10 @@
 apiVersion: v1
 metadata:
   labels:
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
     prometheus.io/scrape: 'true'
@@ -446,10 +450,10 @@
 spec:
   selector:
     app.kubeshark.co/app: worker
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   ports:
   - name: metrics
@@ -457,6 +461,35 @@
     port: 49100
     targetPort: 49100
 ---
+# Source: kubeshark/templates/16-hub-service-metrics.yaml
+kind: Service
+apiVersion: v1
+metadata:
+  labels:
+    helm.sh/chart: kubeshark-52.3.94
+    app.kubernetes.io/name: kubeshark
+    app.kubernetes.io/instance: kubeshark
+    app.kubernetes.io/version: "52.3.94"
+    app.kubernetes.io/managed-by: Helm
+  annotations:
+    prometheus.io/scrape: 'true'
+    prometheus.io/port: '9100'
+  name: kubeshark-hub-metrics
+  namespace: default
+spec:
+  selector:
+    app.kubeshark.co/app: hub
+    helm.sh/chart: kubeshark-52.3.94
+    app.kubernetes.io/name: kubeshark
+    app.kubernetes.io/instance: kubeshark
+    app.kubernetes.io/version: "52.3.94"
+    app.kubernetes.io/managed-by: Helm
+  ports:
+  - name: metrics
+    protocol: TCP
+    port: 9100
+    targetPort: 9100
+---
 # Source: kubeshark/templates/09-worker-daemon-set.yaml
 apiVersion: apps/v1
 kind: DaemonSet
@@ -464,10 +497,10 @@
   labels:
     app.kubeshark.co/app: worker
     sidecar.istio.io/inject: "false"
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-worker-daemon-set
@@ -482,25 +515,52 @@
     metadata:
       labels:
         app.kubeshark.co/app: worker
-        helm.sh/chart: kubeshark-52.3.92
+        helm.sh/chart: kubeshark-52.3.94
         app.kubernetes.io/name: kubeshark
         app.kubernetes.io/instance: kubeshark
-        app.kubernetes.io/version: "52.3.92"
+        app.kubernetes.io/version: "52.3.94"
         app.kubernetes.io/managed-by: Helm
       name: kubeshark-worker-daemon-set
       namespace: kubeshark
     spec:
+      initContainers:
+        - command:
+          - /bin/sh
+          - -c
+          - mkdir -p /sys/fs/bpf && mount | grep -q '/sys/fs/bpf' || mount -t 
bpf bpf /sys/fs/bpf
+          image: 'docker.io/kubeshark/worker:v52.3.94'
+          imagePullPolicy: Always
+          name: check-bpf
+          securityContext:
+            privileged: true
+          volumeMounts:
+          - mountPath: /sys
+            name: sys
+            mountPropagation: Bidirectional
+        - command:
+          - ./tracer
+          - -init-bpf
+          image: 'docker.io/kubeshark/worker:v52.3.94'
+          imagePullPolicy: Always
+          name: init-bpf
+          securityContext:
+            privileged: true
+          volumeMounts:
+          - mountPath: /sys
+            name: sys
       containers:
         - command:
             - ./worker
             - -i
             - any
             - -port
-            - '30001'
+            - '48999'
             - -metrics-port
             - '49100'
             - -packet-capture
             - 'best'
+            - -loglevel
+            - 'warning'
             - -unixsocket
             - -servicemesh
             - -procfs
@@ -510,7 +570,7 @@
             - 'auto'
             - -staletimeout
             - '30'
-          image: 'docker.io/kubeshark/worker:v52.3.92'
+          image: 'docker.io/kubeshark/worker:v52.3.94'
           imagePullPolicy: Always
           name: sniffer
           ports:
@@ -559,6 +619,10 @@
                 - SYS_ADMIN
                 - SYS_PTRACE
                 - DAC_OVERRIDE
+                - SYS_ADMIN
+                - SYS_PTRACE
+                - SYS_RESOURCE
+                - IPC_LOCK
               drop:
                 - ALL
           readinessProbe:
@@ -567,14 +631,14 @@
             successThreshold: 1
             initialDelaySeconds: 5
             tcpSocket:
-              port: 30001
+              port: 48999
           livenessProbe:
             periodSeconds: 1
             failureThreshold: 3
             successThreshold: 1
             initialDelaySeconds: 5
             tcpSocket:
-              port: 30001
+              port: 48999
           volumeMounts:
             - mountPath: /hostproc
               name: proc
@@ -590,7 +654,9 @@
             - /hostproc
             - -disable-ebpf
             - -disable-tls-log
-          image: 'docker.io/kubeshark/worker:v52.3.92'
+            # - -loglevel
+            # - 'warning'
+          image: 'docker.io/kubeshark/worker:v52.3.94'
           imagePullPolicy: Always
           name: tracer
           env:
@@ -692,10 +758,10 @@
 metadata:
   labels:
     app.kubeshark.co/app: hub
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-hub
@@ -711,10 +777,10 @@
     metadata:
       labels:
         app.kubeshark.co/app: hub
-        helm.sh/chart: kubeshark-52.3.92
+        helm.sh/chart: kubeshark-52.3.94
         app.kubernetes.io/name: kubeshark
         app.kubernetes.io/instance: kubeshark
-        app.kubernetes.io/version: "52.3.92"
+        app.kubernetes.io/version: "52.3.94"
         app.kubernetes.io/managed-by: Helm
     spec:
       dnsPolicy: ClusterFirstWithHostNet
@@ -725,6 +791,8 @@
             - ./hub
             - -port
             - "8080"
+            - -loglevel
+            - 'warning'
           env:
           - name: POD_NAME
             valueFrom:
@@ -742,7 +810,7 @@
             value: 'https://api.kubeshark.co'
           - name: PROFILING_ENABLED
             value: 'false'
-          image: 'docker.io/kubeshark/hub:v52.3.92'
+          image: 'docker.io/kubeshark/hub:v52.3.94'
           imagePullPolicy: Always
           readinessProbe:
             periodSeconds: 1
@@ -796,10 +864,10 @@
 metadata:
   labels:
     app.kubeshark.co/app: front
-    helm.sh/chart: kubeshark-52.3.92
+    helm.sh/chart: kubeshark-52.3.94
     app.kubernetes.io/name: kubeshark
     app.kubernetes.io/instance: kubeshark
-    app.kubernetes.io/version: "52.3.92"
+    app.kubernetes.io/version: "52.3.94"
     app.kubernetes.io/managed-by: Helm
   annotations:
   name: kubeshark-front
@@ -815,10 +883,10 @@
     metadata:
       labels:
         app.kubeshark.co/app: front
-        helm.sh/chart: kubeshark-52.3.92
+        helm.sh/chart: kubeshark-52.3.94
         app.kubernetes.io/name: kubeshark
         app.kubernetes.io/instance: kubeshark
-        app.kubernetes.io/version: "52.3.92"
+        app.kubernetes.io/version: "52.3.94"
         app.kubernetes.io/managed-by: Helm
     spec:
       containers:
@@ -853,7 +921,7 @@
               value: 'false'
             - name: REACT_APP_SENTRY_ENVIRONMENT
               value: 'production'
-          image: 'docker.io/kubeshark/front:v52.3.92'
+          image: 'docker.io/kubeshark/front:v52.3.94'
           imagePullPolicy: Always
           name: kubeshark-front
           livenessProbe:

++++++ kubeshark-cli.obsinfo ++++++
--- /var/tmp/diff_new_pack.c3znvH/_old  2025-01-05 15:31:44.178946751 +0100
+++ /var/tmp/diff_new_pack.c3znvH/_new  2025-01-05 15:31:44.182946915 +0100
@@ -1,5 +1,5 @@
 name: kubeshark-cli
-version: 52.3.92
-mtime: 1733773325
-commit: cd1d7e4a58d522adb2b3ef3718b660a3983a16a6
+version: 52.3.94
+mtime: 1735947741
+commit: 317357e83b2d77e8df6214d3ae24725abb4573d0
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/kubeshark-cli/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.kubeshark-cli.new.1881/vendor.tar.gz differ: char 
5, line 1

Reply via email to