Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kubeshark-cli for openSUSE:Factory checked in at 2025-03-25 22:11:25 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kubeshark-cli (Old) and /work/SRC/openSUSE:Factory/.kubeshark-cli.new.2696 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kubeshark-cli" Tue Mar 25 22:11:25 2025 rev:17 rq:1255788 version:52.6.0 Changes: -------- --- /work/SRC/openSUSE:Factory/kubeshark-cli/kubeshark-cli.changes 2025-03-02 12:21:43.792258550 +0100 +++ /work/SRC/openSUSE:Factory/.kubeshark-cli.new.2696/kubeshark-cli.changes 2025-03-25 22:20:01.561539188 +0100 @@ -1,0 +2,25 @@ +Tue Mar 25 05:43:14 UTC 2025 - opensuse_buildserv...@ojkastl.de + +- Update to version 52.6.0: + In this release, we fixed several bugs and added notable + integrations. Highlights include support for OIDC with DEX and + the ability to host Kubeshark behind a reverse proxy using a + custom path. + * Bug Fixes & New Features + - Optimized service map performance for large clusters + (thousands of pods and above). + - Improved SCTP reassembler support. + - Fixed a bug related to LDAP protocol dissection. + - Added OIDC with DEX integration for SSO authentication. + Read more in our OIDC with DEX section. + https://docs.kubeshark.co/en/oidc + - Introduced a watchdog mechanism that terminates the Worker if + it deems it non-functional. This feature is enabled by + default and can be disabled using the Helm value: --set + tap.watchdog.enabled=false + - Added support for hosting Kubeshark behind a reverse proxy + with a custom path. + Read more in our Reverse Proxy with a Custom Path section. + https://docs.kubeshark.co/en/custom_path + +------------------------------------------------------------------- Old: ---- kubeshark-cli-52.5.0.obscpio New: ---- kubeshark-cli-52.6.0.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ kubeshark-cli.spec ++++++ --- /var/tmp/diff_new_pack.v579hx/_old 2025-03-25 22:20:02.285569239 +0100 +++ /var/tmp/diff_new_pack.v579hx/_new 2025-03-25 22:20:02.293569571 +0100 @@ -19,7 +19,7 @@ %define executable_name kubeshark Name: kubeshark-cli -Version: 52.5.0 +Version: 52.6.0 Release: 0 Summary: CLI for the API traffic analyzer for Kubernetes License: Apache-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.v579hx/_old 2025-03-25 22:20:02.329571065 +0100 +++ /var/tmp/diff_new_pack.v579hx/_new 2025-03-25 22:20:02.333571231 +0100 @@ -3,7 +3,7 @@ <param name="url">https://github.com/kubeshark/kubeshark</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v52.5.0</param> + <param name="revision">v52.6.0</param> <param name="versionformat">@PARENT_TAG@</param> <param name="versionrewrite-pattern">v(.*)</param> <param name="changesgenerate">enable</param> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.v579hx/_old 2025-03-25 22:20:02.353572061 +0100 +++ /var/tmp/diff_new_pack.v579hx/_new 2025-03-25 22:20:02.357572227 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/kubeshark/kubeshark</param> - <param name="changesrevision">eec44040382181dd1f849fac8aa7e05675a8b4a2</param></service></servicedata> + <param name="changesrevision">dc50ef48fd6841d5d45c7a90e1a8aeb8ef66f9ee</param></service></servicedata> (No newline at EOF) ++++++ kubeshark-cli-52.5.0.obscpio -> kubeshark-cli-52.6.0.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/RELEASE.md.TEMPLATE new/kubeshark-cli-52.6.0/RELEASE.md.TEMPLATE --- old/kubeshark-cli-52.5.0/RELEASE.md.TEMPLATE 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/RELEASE.md.TEMPLATE 2025-03-24 23:03:27.000000000 +0100 @@ -10,7 +10,7 @@ **Mac** (AArch64/Apple M1 silicon) ``` -rm -f kubeshark && curl -Lo kubeshark https://github.com/kubeshark/kubeshark/releases/download/_VER_/kubeshark_darwin_arm64 && chmod 755 kubeshark +curl -Lo kubeshark https://github.com/kubeshark/kubeshark/releases/download/_VER_/kubeshark_darwin_arm64 && chmod 755 kubeshark ``` **Linux** (x86-64) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/cmd/tap.go new/kubeshark-cli-52.6.0/cmd/tap.go --- old/kubeshark-cli-52.5.0/cmd/tap.go 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/cmd/tap.go 2025-03-24 23:03:27.000000000 +0100 @@ -61,4 +61,5 @@ tapCmd.Flags().Bool(configStructs.IngressEnabledLabel, defaultTapConfig.Ingress.Enabled, "Enable Ingress") tapCmd.Flags().Bool(configStructs.TelemetryEnabledLabel, defaultTapConfig.Telemetry.Enabled, "Enable/disable Telemetry") tapCmd.Flags().Bool(configStructs.ResourceGuardEnabledLabel, defaultTapConfig.ResourceGuard.Enabled, "Enable/disable resource guard") + tapCmd.Flags().Bool(configStructs.WatchdogEnabled, defaultTapConfig.Watchdog.Enabled, "Enable/disable watchdog") } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/config/configStructs/tapConfig.go new/kubeshark-cli-52.6.0/config/configStructs/tapConfig.go --- old/kubeshark-cli-52.5.0/config/configStructs/tapConfig.go 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/config/configStructs/tapConfig.go 2025-03-24 23:03:27.000000000 +0100 @@ -44,6 +44,7 @@ PcapKubeconfig = "kubeconfig" PcapDumpEnabled = "enabled" PcapTime = "time" + WatchdogEnabled = "watchdogEnabled" ) type ResourceLimitsHub struct { @@ -190,6 +191,14 @@ Annotations map[string]string `yaml:"annotations" json:"annotations" default:"{}"` } +type RoutingConfig struct { + Front FrontRoutingConfig `yaml:"front" json:"front"` +} + +type FrontRoutingConfig struct { + BasePath string `yaml:"basePath" json:"basePath" default:""` +} + type ReleaseConfig struct { Repo string `yaml:"repo" json:"repo" default:"https://helm.kubeshark.co"` Name string `yaml:"name" json:"name" default:"kubeshark"` @@ -209,6 +218,10 @@ Environment string `yaml:"environment" json:"environment" default:"production"` } +type WatchdogConfig struct { + Enabled bool `yaml:"enabled" json:"enabled" default:"true"` +} + type CapabilitiesConfig struct { NetworkCapture []string `yaml:"networkCapture" json:"networkCapture" default:"[]"` ServiceMeshCapture []string `yaml:"serviceMeshCapture" json:"serviceMeshCapture" default:"[]"` @@ -304,10 +317,12 @@ Tolerations TolerationsConfig `yaml:"tolerations" json:"tolerations" default:"{}"` Auth AuthConfig `yaml:"auth" json:"auth"` Ingress IngressConfig `yaml:"ingress" json:"ingress"` + Routing RoutingConfig `yaml:"routing" json:"routing"` IPv6 bool `yaml:"ipv6" json:"ipv6" default:"true"` Debug bool `yaml:"debug" json:"debug" default:"false"` Telemetry TelemetryConfig `yaml:"telemetry" json:"telemetry"` ResourceGuard ResourceGuardConfig `yaml:"resourceGuard" json:"resourceGuard"` + Watchdog WatchdogConfig `yaml:"watchdog" json:"watchdog"` Sentry SentryConfig `yaml:"sentry" json:"sentry"` DefaultFilter string `yaml:"defaultFilter" json:"defaultFilter" default:"!dns and !error"` LiveConfigMapChangesDisabled bool `yaml:"liveConfigMapChangesDisabled" json:"liveConfigMapChangesDisabled" default:"false"` diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/Chart.yaml new/kubeshark-cli-52.6.0/helm-chart/Chart.yaml --- old/kubeshark-cli-52.5.0/helm-chart/Chart.yaml 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/Chart.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -1,6 +1,6 @@ apiVersion: v2 name: kubeshark -version: "52.5" +version: "52.6" description: The API Traffic Analyzer for Kubernetes home: https://kubeshark.co keywords: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/README.md new/kubeshark-cli-52.6.0/helm-chart/README.md --- old/kubeshark-cli-52.5.0/helm-chart/README.md 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/README.md 2025-03-24 23:03:27.000000000 +0100 @@ -196,11 +196,12 @@ | `tap.ingress.host` | Host of the `Ingress` | `ks.svc.cluster.local` | | `tap.ingress.tls` | `Ingress` TLS configuration | `[]` | | `tap.ingress.annotations` | `Ingress` annotations | `{}` | +| `tap.routing.front.basePath` | Set this value to serve `front` under specific base path. Example: `/custompath` (forward slash must be present) | `""` | | `tap.ipv6` | Enable IPv6 support for the front-end | `true` | | `tap.debug` | Enable debug mode | `false` | | `tap.telemetry.enabled` | Enable anonymous usage statistics collection | `true` | | `tap.resourceGuard.enabled` | Enable resource guard worker process, which watches RAM/disk usage and enables/disables traffic capture based on available resources | `false` | -| `tap.sentry.enabled` | Enable sending of error logs to Sentry | `false` | +| `tap.sentry.enabled` | Enable sending of error logs to Sentry | `true` (only for qualified users) | | `tap.sentry.environment` | Sentry environment to label error logs with | `production` | | `tap.defaultFilter` | Sets the default dashboard KFL filter (e.g. `http`). By default, this value is set to filter out noisy protocols such as DNS, UDP, ICMP and TCP. The user can easily change this, **temporarily**, in the Dashboard. For a permanent change, you should change this value in the `values.yaml` or `config.yaml` file. | `"!dns and !error"` | | `tap.liveConfigMapChangesDisabled` | If set to `true`, all user functionality (scripting, targeting settings, global & default KFL modification, traffic recording, traffic capturing on/off, protocol dissectors) involving dynamic ConfigMap changes from UI will be disabled | `false` | @@ -228,7 +229,7 @@ DriverContainer image. Kernel versions can be matched literally or using a regular expression -## Installing with SAML enabled +# Installing with SAML enabled ### Prerequisites: @@ -293,3 +294,226 @@ UaV5sbRtTzYLxpOSQyi8CEFA+A== -----END PRIVATE KEY----- ``` + +# Installing with Dex OIDC authentication + +[**Click here to see full docs**](https://docs.kubeshark.co/en/saml#installing-with-oidc-enabled-dex-idp). + +Choose this option, if **you already have a running instance** of Dex in your cluster & +you want to set up Dex OIDC authentication for Kubeshark users. + +Kubeshark supports authentication using [Dex - A Federated OpenID Connect Provider](https://dexidp.io/). +Dex is an abstraction layer designed for integrating a wide variety of Identity Providers. + +**Requirement:** +Your Dex IdP must have a publicly accessible URL. + +### Pre-requisites: + +**1. If you configured Ingress for Kubeshark:** + +(see section: "Installing with Ingress (EKS) enabled") + +OAuth2 callback URL is: <br/> +`https://<kubeshark-ingress-hostname>/api/oauth2/callback` + +**2. If you did not configure Ingress for Kubeshark:** + +OAuth2 callback URL is: <br/> +`http://0.0.0.0:8899/api/oauth2/callback` + +Use chosen OAuth2 callback URL to replace `<your-kubeshark-host>` in Step 3. + +**3. Add this static client to your Dex IdP configuration (`config.yaml`):** +```yaml +staticClients: + - id: kubeshark + secret: create your own client password + name: Kubeshark + redirectURIs: + - https://<your-kubeshark-host>/api/oauth2/callback +``` + +**Final step:** + +Add these helm values to set up OIDC authentication powered by your Dex IdP: + +```yaml +# values.yaml + +tap: + auth: + enabled: true + type: dex + dexOidc: + issuer: <put Dex IdP issuer URL here> + clientId: kubeshark + clientSecret: create your own client password + refreshTokenLifetime: "3960h" # 165 days + oauth2StateParamExpiry: "10m" +``` + +Once you run `helm install kubeshark kubeshark/kubeshark -f ./values.yaml`, Kubeshark will be installed with (Dex) OIDC authentication enabled. + +--- + +# Installing your own Dex IdP along with Kubeshark + +Choose this option, if **you need to deploy an instance of Dex IdP** along with Kubeshark & +set up Dex OIDC authentication for Kubeshark users. + +Depending on Ingress enabled/disabled, your Dex configuration might differ. + +**Requirement:** +Please, configure Ingress using `tap.ingress` for your Kubeshark installation. For example: + +```yaml +tap: + ingress: + enabled: true + className: "alb" + host: ks.example.com + tls: [] + annotations: + alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-1:7..8:certificate/b...65c + alb.ingress.kubernetes.io/target-type: ip + alb.ingress.kubernetes.io/scheme: internet-facing +``` + +The following Dex settings will have these values: + +| Setting | Value | +|-------------------------------------------------------|----------------------------------------------| +| `tap.auth.dexOidc.issuer` | `https://ks.example.com/dex` | +| `tap.auth.dexConfig.issuer` | `https://ks.example.com/dex` | +| `tap.auth.dexConfig.staticClients -> redirectURIs` | `https://ks.example.com/api/oauth2/callback` | +| `tap.auth.dexConfig.connectors -> config.redirectURI` | `https://ks.example.com/dex/callback` | + +--- + +### Before proceeding with Dex IdP installation: + +Please, make sure to prepare the following things first. + +1. Choose **[Connectors](https://dexidp.io/docs/connectors/)** to enable in Dex IdP. + - i.e. how many kind of "Log in with ..." options you'd like to offer your users + - You will need to specify connectors in `tap.auth.dexConfig.connectors` +2. Choose type of **[Storage](https://dexidp.io/docs/configuration/storage/)** to use in Dex IdP. + - You will need to specify storage settings in `tap.auth.dexConfig.storage` + - default: `memory` +3. Decide on the OAuth2 `?state=` param expiration time: + - field: `tap.auth.dexOidc.oauth2StateParamExpiry` + - default: `10m` (10 minutes) + - valid time units are `s`, `m`, `h` +4. Decide on the refresh token expiration: + - field 1: `tap.auth.dexOidc.expiry.refreshTokenLifetime` + - field 2: `tap.auth.dexConfig.expiry.refreshTokens.absoluteLifetime` + - default: `3960h` (165 days) + - valid time units are `s`, `m`, `h` +5. Create a unique & secure password to set in these fields: + - field 1: `tap.auth.dexOidc.clientSecret` + - field 2: `tap.auth.dexConfig.staticClients -> secret` + - password must be the same for these 2 fields +6. Discover more possibilities of **[Dex Configuration](https://dexidp.io/docs/configuration/)** + - if you decide to include more configuration options, make sure to add them into `tap.auth.dexConfig` +--- + +### Once you are ready with all the points described above: + +Use these helm `values.yaml` fields to: +- Deploy your own instance of Dex IdP along with Kubeshark +- Enable OIDC authentication for Kubeshark users + +Make sure to: +- Replace `<your-ingress-hostname>` with a correct Kubeshark Ingress host (`tap.auth.ingress.host`). + - refer to section **Installing with Ingress (EKS) enabled** to find out how you can configure Ingress host. + +Helm `values.yaml`: +```yaml +tap: + auth: + enabled: true + type: dex + dexOidc: + issuer: https://<your-ingress-hostname>/dex + + # Client ID/secret must be taken from `tap.auth.dexConfig.staticClients -> id/secret` + clientId: kubeshark + clientSecret: create your own client password + + refreshTokenLifetime: "3960h" # 165 days + oauth2StateParamExpiry: "10m" + dexConfig: + # This field is REQUIRED! + # + # The base path of Dex and the external name of the OpenID Connect service. + # This is the canonical URL that all clients MUST use to refer to Dex. If a + # path is provided, Dex's HTTP service will listen at a non-root URL. + issuer: https://<your-ingress-hostname>/dex + + # Expiration configuration for tokens, signing keys, etc. + expiry: + refreshTokens: + validIfNotUsedFor: "2160h" # 90 days + absoluteLifetime: "3960h" # 165 days + + # This field is REQUIRED! + # + # The storage configuration determines where Dex stores its state. + # See the documentation (https://dexidp.io/docs/storage/) for further information. + storage: + type: memory + + # This field is REQUIRED! + # + # Attention: + # Do not change this field and its values. + # This field is required for internal Kubeshark-to-Dex communication. + # + # HTTP service configuration + web: + http: 0.0.0.0:5556 + + # This field is REQUIRED! + # + # Attention: + # Do not change this field and its values. + # This field is required for internal Kubeshark-to-Dex communication. + # + # Telemetry configuration + telemetry: + http: 0.0.0.0:5558 + + # This field is REQUIRED! + # + # Static clients registered in Dex by default. + staticClients: + - id: kubeshark + secret: create your own client password + name: Kubeshark + redirectURIs: + - https://<your-ingress-hostname>/api/oauth2/callback + + # Enable the password database. + # It's a "virtual" connector (identity provider) that stores + # login credentials in Dex's store. + enablePasswordDB: true + + # Connectors are used to authenticate users against upstream identity providers. + # See the documentation (https://dexidp.io/docs/connectors/) for further information. + # + # Attention: + # When you define a new connector, `config.redirectURI` must be: + # https://<your-ingress-hostname>/dex/callback + # + # Example with Google connector: + # connectors: + # - type: google + # id: google + # name: Google + # config: + # clientID: your Google Cloud Auth app client ID + # clientSecret: your Google Auth app client ID + # redirectURI: https://<your-ingress-hostname>/dex/callback + connectors: [] +``` diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/06-front-deployment.yaml new/kubeshark-cli-52.6.0/helm-chart/templates/06-front-deployment.yaml --- old/kubeshark-cli-52.5.0/helm-chart/templates/06-front-deployment.yaml 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/06-front-deployment.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -26,12 +26,16 @@ - env: - name: REACT_APP_AUTH_ENABLED value: '{{- if or (and .Values.cloudLicenseEnabled (not (empty .Values.license))) (not .Values.internetConnectivity) -}} - "false" - {{- else -}} - {{ .Values.cloudLicenseEnabled | ternary "true" .Values.tap.auth.enabled }} - {{- end }}' + {{ (and .Values.tap.auth.enabled (eq .Values.tap.auth.type "dex")) | ternary true false }} + {{- else -}} + {{ .Values.cloudLicenseEnabled | ternary "true" .Values.tap.auth.enabled }} + {{- end }}' - name: REACT_APP_AUTH_TYPE - value: '{{ not (eq .Values.tap.auth.type "") | ternary (.Values.cloudLicenseEnabled | ternary "oidc" .Values.tap.auth.type) " " }}' + value: '{{- if and .Values.cloudLicenseEnabled (not (eq .Values.tap.auth.type "dex")) -}} + default + {{- else -}} + {{ .Values.tap.auth.type }} + {{- end }}' - name: REACT_APP_AUTH_SAML_IDP_METADATA_URL value: '{{ not (eq .Values.tap.auth.saml.idpMetadataUrl "") | ternary .Values.tap.auth.saml.idpMetadataUrl " " }}' - name: REACT_APP_TIMEZONE diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/09-worker-daemon-set.yaml new/kubeshark-cli-52.6.0/helm-chart/templates/09-worker-daemon-set.yaml --- old/kubeshark-cli-52.5.0/helm-chart/templates/09-worker-daemon-set.yaml 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/09-worker-daemon-set.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -69,6 +69,9 @@ {{- if .Values.tap.resourceGuard.enabled }} - -enable-resource-guard {{- end }} + {{- if .Values.tap.watchdog.enabled }} + - -enable-watchdog + {{- end }} - -resolution-strategy - '{{ .Values.tap.misc.resolutionStrategy }}' - -staletimeout diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/11-nginx-config-map.yaml new/kubeshark-cli-52.6.0/helm-chart/templates/11-nginx-config-map.yaml --- old/kubeshark-cli-52.5.0/helm-chart/templates/11-nginx-config-map.yaml 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/11-nginx-config-map.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -20,8 +20,8 @@ client_header_buffer_size 32k; large_client_header_buffers 8 64k; - location /api { - rewrite ^/api(.*)$ $1 break; + location {{ default "" (((.Values.tap).routing).front).basePath }}/api { + rewrite ^{{ default "" (((.Values.tap).routing).front).basePath }}/api(.*)$ $1 break; proxy_pass http://kubeshark-hub; proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; @@ -35,8 +35,8 @@ proxy_pass_request_headers on; } - location /saml { - rewrite ^/saml(.*)$ /saml$1 break; + location {{ default "" (((.Values.tap).routing).front).basePath }}/saml { + rewrite ^{{ default "" (((.Values.tap).routing).front).basePath }}/saml(.*)$ /saml$1 break; proxy_pass http://kubeshark-hub; proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; @@ -46,6 +46,34 @@ proxy_pass_request_headers on; } +{{- if .Values.tap.auth.dexConfig }} + location /dex { + rewrite ^{{ default "" (((.Values.tap).routing).front).basePath }}/dex(.*)$ /dex$1 break; + proxy_pass http://kubeshark-dex; + proxy_set_header X-Forwarded-For $remote_addr; + proxy_set_header Host $http_host; + proxy_set_header Upgrade websocket; + proxy_set_header Connection Upgrade; + proxy_set_header Authorization $http_authorization; + proxy_pass_header Authorization; + proxy_connect_timeout 4s; + proxy_read_timeout 120s; + proxy_send_timeout 12s; + proxy_pass_request_headers on; + } +{{- end }} + +{{- if (((.Values.tap).routing).front).basePath }} + location {{ .Values.tap.routing.front.basePath }} { + rewrite ^{{ .Values.tap.routing.front.basePath }}(.*)$ $1 break; + root /usr/share/nginx/html; + index index.html index.htm; + try_files $uri $uri/ /index.html; + expires -1; + add_header Cache-Control no-cache; + } +{{- end }} + location / { root /usr/share/nginx/html; index index.html index.htm; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/12-config-map.yaml new/kubeshark-cli-52.6.0/helm-chart/templates/12-config-map.yaml --- old/kubeshark-cli-52.5.0/helm-chart/templates/12-config-map.yaml 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/12-config-map.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -18,14 +18,21 @@ INGRESS_HOST: '{{ .Values.tap.ingress.host }}' PROXY_FRONT_PORT: '{{ .Values.tap.proxy.front.port }}' AUTH_ENABLED: '{{- if and .Values.cloudLicenseEnabled (not (empty .Values.license)) -}} - "false" + {{ and .Values.tap.auth.enabled (eq .Values.tap.auth.type "dex") | ternary true false }} {{- else -}} {{ .Values.cloudLicenseEnabled | ternary "true" (.Values.tap.auth.enabled | ternary "true" "") }} {{- end }}' - AUTH_TYPE: '{{ .Values.cloudLicenseEnabled | ternary "oidc" (.Values.tap.auth.type) }}' + AUTH_TYPE: '{{- if and .Values.cloudLicenseEnabled (not (eq .Values.tap.auth.type "dex")) -}} + default + {{- else -}} + {{ .Values.tap.auth.type }} + {{- end }}' AUTH_SAML_IDP_METADATA_URL: '{{ .Values.tap.auth.saml.idpMetadataUrl }}' AUTH_SAML_ROLE_ATTRIBUTE: '{{ .Values.tap.auth.saml.roleAttribute }}' AUTH_SAML_ROLES: '{{ .Values.tap.auth.saml.roles | toJson }}' + AUTH_OIDC_ISSUER: '{{ default "not set" (((.Values.tap).auth).dexOidc).issuer }}' + AUTH_OIDC_REFRESH_TOKEN_LIFETIME: '{{ default "3960h" (((.Values.tap).auth).dexOidc).refreshTokenLifetime }}' + AUTH_OIDC_STATE_PARAM_EXPIRY: '{{ default "10m" (((.Values.tap).auth).dexOidc).oauth2StateParamExpiry }}' TELEMETRY_DISABLED: '{{ not .Values.internetConnectivity | ternary "true" (not .Values.tap.telemetry.enabled | ternary "true" "false") }}' SCRIPTING_DISABLED: '{{- if .Values.tap.liveConfigMapChangesDisabled -}} {{- if .Values.demoModeEnabled -}} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/13-secret.yaml new/kubeshark-cli-52.6.0/helm-chart/templates/13-secret.yaml --- old/kubeshark-cli-52.5.0/helm-chart/templates/13-secret.yaml 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/13-secret.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -9,6 +9,8 @@ stringData: LICENSE: '{{ .Values.license }}' SCRIPTING_ENV: '{{ .Values.scripting.env | toJson }}' + OIDC_CLIENT_ID: '{{ default "not set" (((.Values.tap).auth).dexOidc).clientId }}' + OIDC_CLIENT_SECRET: '{{ default "not set" (((.Values.tap).auth).dexOidc).clientSecret }}' --- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/17-network-policies.yaml new/kubeshark-cli-52.6.0/helm-chart/templates/17-network-policies.yaml --- old/kubeshark-cli-52.5.0/helm-chart/templates/17-network-policies.yaml 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/17-network-policies.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -60,6 +60,31 @@ {{- if .Values.tap.annotations }} {{- toYaml .Values.tap.annotations | nindent 4 }} {{- end }} + name: kubeshark-dex-network-policy + namespace: {{ .Release.Namespace }} +spec: + podSelector: + matchLabels: + app.kubeshark.co/app: dex + policyTypes: + - Ingress + - Egress + ingress: + - ports: + - protocol: TCP + port: 5556 + egress: + - {} +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + labels: + {{- include "kubeshark.labels" . | nindent 4 }} + annotations: + {{- if .Values.tap.annotations }} + {{- toYaml .Values.tap.annotations | nindent 4 }} + {{- end }} name: kubeshark-worker-network-policy namespace: {{ .Release.Namespace }} spec: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/18-dex-deployment.yaml new/kubeshark-cli-52.6.0/helm-chart/templates/18-dex-deployment.yaml --- old/kubeshark-cli-52.5.0/helm-chart/templates/18-dex-deployment.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/18-dex-deployment.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -0,0 +1,116 @@ +{{- if .Values.tap.auth.dexConfig }} + +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + labels: + app.kubeshark.co/app: dex + {{- include "kubeshark.labels" . | nindent 4 }} + annotations: + {{- if .Values.tap.annotations }} + {{- toYaml .Values.tap.annotations | nindent 4 }} + {{- end }} + name: {{ include "kubeshark.name" . }}-dex + namespace: {{ .Release.Namespace }} +spec: + replicas: 1 # Set the desired number of replicas + selector: + matchLabels: + app.kubeshark.co/app: dex + {{- include "kubeshark.selectorLabels" . | nindent 6 }} + template: + metadata: + labels: + app.kubeshark.co/app: dex + {{- include "kubeshark.labels" . | nindent 8 }} + spec: + containers: + - name: kubeshark-dex + image: 'dexidp/dex:v2.42.0-alpine' + ports: + - name: http + containerPort: 5556 + protocol: TCP + - name: telemetry + containerPort: 5558 + protocol: TCP + args: + - dex + - serve + - /etc/dex/dex-config.yaml + imagePullPolicy: {{ .Values.tap.docker.imagePullPolicy }} + volumeMounts: + - name: dex-secret-conf-volume + mountPath: /etc/dex/dex-config.yaml + subPath: dex-config.yaml + readOnly: true + livenessProbe: + httpGet: + path: /healthz/live + port: 5558 + periodSeconds: 1 + failureThreshold: 3 + successThreshold: 1 + initialDelaySeconds: 3 + readinessProbe: + httpGet: + path: /healthz/ready + port: 5558 + periodSeconds: 1 + failureThreshold: 3 + successThreshold: 1 + initialDelaySeconds: 3 + timeoutSeconds: 1 + resources: + limits: + cpu: 750m + memory: 1Gi + requests: + cpu: 50m + memory: 50Mi + {{- if .Values.tap.docker.imagePullSecrets }} + imagePullSecrets: + {{- range .Values.tap.docker.imagePullSecrets }} + - name: {{ . }} + {{- end }} + {{- end }} +{{- if gt (len .Values.tap.nodeSelectorTerms.dex) 0}} + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + {{- toYaml .Values.tap.nodeSelectorTerms.dex | nindent 12 }} +{{- end }} + {{- if or .Values.tap.dns.nameservers .Values.tap.dns.searches .Values.tap.dns.options }} + dnsConfig: + {{- if .Values.tap.dns.nameservers }} + nameservers: + {{- range .Values.tap.dns.nameservers }} + - {{ . | quote }} + {{- end }} + {{- end }} + {{- if .Values.tap.dns.searches }} + searches: + {{- range .Values.tap.dns.searches }} + - {{ . | quote }} + {{- end }} + {{- end }} + {{- if .Values.tap.dns.options }} + options: + {{- range .Values.tap.dns.options }} + - name: {{ .name | quote }} + {{- if .value }} + value: {{ .value | quote }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + volumes: + - name: dex-secret-conf-volume + secret: + secretName: kubeshark-dex-conf-secret + dnsPolicy: ClusterFirstWithHostNet + serviceAccountName: {{ include "kubeshark.serviceAccountName" . }} + +{{- end }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/19-dex-service.yaml new/kubeshark-cli-52.6.0/helm-chart/templates/19-dex-service.yaml --- old/kubeshark-cli-52.5.0/helm-chart/templates/19-dex-service.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/19-dex-service.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -0,0 +1,25 @@ +{{- if .Values.tap.auth.dexConfig }} + +--- +apiVersion: v1 +kind: Service +metadata: + labels: + app.kubeshark.co/app: dex + {{- include "kubeshark.labels" . | nindent 4 }} + annotations: + {{- if .Values.tap.annotations }} + {{- toYaml .Values.tap.annotations | nindent 4 }} + {{- end }} + name: kubeshark-dex + namespace: {{ .Release.Namespace }} +spec: + ports: + - name: kubeshark-dex + port: 80 + targetPort: 5556 + selector: + app.kubeshark.co/app: dex + type: ClusterIP + +{{- end }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/20-dex-secret.yaml new/kubeshark-cli-52.6.0/helm-chart/templates/20-dex-secret.yaml --- old/kubeshark-cli-52.5.0/helm-chart/templates/20-dex-secret.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/20-dex-secret.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -0,0 +1,14 @@ +{{- if .Values.tap.auth.dexConfig }} + +kind: Secret +apiVersion: v1 +metadata: + name: kubeshark-dex-conf-secret + namespace: {{ .Release.Namespace }} + labels: + app.kubeshark.co/app: hub + {{- include "kubeshark.labels" . | nindent 4 }} +data: + dex-config.yaml: {{ .Values.tap.auth.dexConfig | toYaml | b64enc | quote }} + +{{- end }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/NOTES.txt new/kubeshark-cli-52.6.0/helm-chart/templates/NOTES.txt --- old/kubeshark-cli-52.5.0/helm-chart/templates/NOTES.txt 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/NOTES.txt 2025-03-24 23:03:27.000000000 +0100 @@ -34,7 +34,7 @@ {{ if .Values.tap.ingress.enabled }} You can now access the application through the following URL: -http{{ if .Values.tap.ingress.tls }}s{{ end }}://{{ .Values.tap.ingress.host }} +http{{ if .Values.tap.ingress.tls }}s{{ end }}://{{ .Values.tap.ingress.host }}{{ default "" (((.Values.tap).routing).front).basePath }}/ {{- else }} To access the application, follow these steps: @@ -44,6 +44,6 @@ kubectl port-forward -n {{ .Release.Namespace }} service/kubeshark-front 8899:80 2. Once port forwarding is done, you can access the application by visiting the following URL in your web browser: - http://0.0.0.0:8899 + http://0.0.0.0:8899{{ default "" (((.Values.tap).routing).front).basePath }}/ {{- end }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/templates/_helpers.tpl new/kubeshark-cli-52.6.0/helm-chart/templates/_helpers.tpl --- old/kubeshark-cli-52.5.0/helm-chart/templates/_helpers.tpl 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/templates/_helpers.tpl 2025-03-24 23:03:27.000000000 +0100 @@ -86,3 +86,15 @@ {{- end -}} {{- $sentryEnabledVal -}} {{- end -}} + +{{/* +Dex IdP: retrieve a secret for static client with a specific ID +*/}} +{{- define "getDexKubesharkStaticClientSecret" -}} + {{- $clientId := .clientId -}} + {{- range .clients }} + {{- if eq .id $clientId }} + {{- .secret }} + {{- end }} + {{- end }} +{{- end }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/helm-chart/values.yaml new/kubeshark-cli-52.6.0/helm-chart/values.yaml --- old/kubeshark-cli-52.5.0/helm-chart/values.yaml 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/helm-chart/values.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -131,12 +131,17 @@ host: ks.svc.cluster.local tls: [] annotations: {} + routing: + front: + basePath: "" ipv6: true debug: false telemetry: enabled: true resourceGuard: enabled: false + watchdog: + enabled: true sentry: enabled: false environment: production diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.5.0/manifests/complete.yaml new/kubeshark-cli-52.6.0/manifests/complete.yaml --- old/kubeshark-cli-52.5.0/manifests/complete.yaml 2025-03-01 21:00:24.000000000 +0100 +++ new/kubeshark-cli-52.6.0/manifests/complete.yaml 2025-03-24 23:03:27.000000000 +0100 @@ -4,10 +4,10 @@ kind: NetworkPolicy metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-hub-network-policy @@ -34,10 +34,10 @@ kind: NetworkPolicy metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-front-network-policy @@ -61,10 +61,37 @@ kind: NetworkPolicy metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" + app.kubernetes.io/managed-by: Helm + annotations: + name: kubeshark-dex-network-policy + namespace: default +spec: + podSelector: + matchLabels: + app.kubeshark.co/app: dex + policyTypes: + - Ingress + - Egress + ingress: + - ports: + - protocol: TCP + port: 5556 + egress: + - {} +--- +# Source: kubeshark/templates/17-network-policies.yaml +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + labels: + helm.sh/chart: kubeshark-52.6 + app.kubernetes.io/name: kubeshark + app.kubernetes.io/instance: kubeshark + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-worker-network-policy @@ -90,10 +117,10 @@ kind: ServiceAccount metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-service-account @@ -107,14 +134,16 @@ namespace: default labels: app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm stringData: LICENSE: '' SCRIPTING_ENV: '{}' + OIDC_CLIENT_ID: 'not set' + OIDC_CLIENT_SECRET: 'not set' --- # Source: kubeshark/templates/13-secret.yaml kind: Secret @@ -124,10 +153,10 @@ namespace: default labels: app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm stringData: AUTH_SAML_X509_CRT: | @@ -140,10 +169,10 @@ namespace: default labels: app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm stringData: AUTH_SAML_X509_KEY: | @@ -155,10 +184,10 @@ name: kubeshark-nginx-config-map namespace: default labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm data: default.conf: | @@ -219,10 +248,10 @@ namespace: default labels: app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm data: POD_REGEX: '.*' @@ -236,10 +265,13 @@ INGRESS_HOST: 'ks.svc.cluster.local' PROXY_FRONT_PORT: '8899' AUTH_ENABLED: 'true' - AUTH_TYPE: 'oidc' + AUTH_TYPE: 'default' AUTH_SAML_IDP_METADATA_URL: '' AUTH_SAML_ROLE_ATTRIBUTE: 'role' AUTH_SAML_ROLES: '{"admin":{"canDownloadPCAP":true,"canStopTrafficCapturing":true,"canUpdateTargetedPods":true,"canUseScripting":true,"filter":"","scriptingPermissions":{"canActivate":true,"canDelete":true,"canSave":true},"showAdminConsoleLink":true}}' + AUTH_OIDC_ISSUER: 'not set' + AUTH_OIDC_REFRESH_TOKEN_LIFETIME: '3960h' + AUTH_OIDC_STATE_PARAM_EXPIRY: '10m' TELEMETRY_DISABLED: 'false' SCRIPTING_DISABLED: 'false' TARGETED_PODS_UPDATE_DISABLED: '' @@ -271,10 +303,10 @@ kind: ClusterRole metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-cluster-role-default @@ -319,10 +351,10 @@ kind: ClusterRoleBinding metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-cluster-role-binding-default @@ -341,10 +373,10 @@ kind: Role metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-self-config-role @@ -371,10 +403,10 @@ kind: RoleBinding metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-self-config-role-binding @@ -394,10 +426,10 @@ metadata: labels: app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-hub @@ -416,10 +448,10 @@ kind: Service metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-front @@ -438,10 +470,10 @@ apiVersion: v1 metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: prometheus.io/scrape: 'true' @@ -451,10 +483,10 @@ spec: selector: app.kubeshark.co/app: worker - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm ports: - name: metrics @@ -467,10 +499,10 @@ apiVersion: v1 metadata: labels: - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: prometheus.io/scrape: 'true' @@ -480,10 +512,10 @@ spec: selector: app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm ports: - name: metrics @@ -498,10 +530,10 @@ labels: app.kubeshark.co/app: worker sidecar.istio.io/inject: "false" - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-worker-daemon-set @@ -516,10 +548,10 @@ metadata: labels: app.kubeshark.co/app: worker - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm name: kubeshark-worker-daemon-set namespace: kubeshark @@ -529,7 +561,7 @@ - /bin/sh - -c - mkdir -p /sys/fs/bpf && mount | grep -q '/sys/fs/bpf' || mount -t bpf bpf /sys/fs/bpf - image: 'docker.io/kubeshark/worker:v52.5' + image: 'docker.io/kubeshark/worker:v52.6' imagePullPolicy: Always name: mount-bpf securityContext: @@ -554,11 +586,12 @@ - -servicemesh - -procfs - /hostproc + - -enable-watchdog - -resolution-strategy - 'auto' - -staletimeout - '30' - image: 'docker.io/kubeshark/worker:v52.5' + image: 'docker.io/kubeshark/worker:v52.6' imagePullPolicy: Always name: sniffer ports: @@ -632,7 +665,7 @@ - -disable-tls-log - -loglevel - 'warning' - image: 'docker.io/kubeshark/worker:v52.5' + image: 'docker.io/kubeshark/worker:v52.6' imagePullPolicy: Always name: tracer env: @@ -724,10 +757,10 @@ metadata: labels: app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-hub @@ -743,10 +776,10 @@ metadata: labels: app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm spec: dnsPolicy: ClusterFirstWithHostNet @@ -776,7 +809,7 @@ value: 'https://api.kubeshark.co' - name: PROFILING_ENABLED value: 'false' - image: 'docker.io/kubeshark/hub:v52.5' + image: 'docker.io/kubeshark/hub:v52.6' imagePullPolicy: Always readinessProbe: periodSeconds: 10 @@ -839,10 +872,10 @@ metadata: labels: app.kubeshark.co/app: front - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-front @@ -858,10 +891,10 @@ metadata: labels: app.kubeshark.co/app: front - helm.sh/chart: kubeshark-52.5 + helm.sh/chart: kubeshark-52.6 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.5" + app.kubernetes.io/version: "52.6" app.kubernetes.io/managed-by: Helm spec: containers: @@ -869,7 +902,7 @@ - name: REACT_APP_AUTH_ENABLED value: 'true' - name: REACT_APP_AUTH_TYPE - value: 'oidc' + value: 'default' - name: REACT_APP_AUTH_SAML_IDP_METADATA_URL value: ' ' - name: REACT_APP_TIMEZONE @@ -898,7 +931,7 @@ value: 'false' - name: REACT_APP_SENTRY_ENVIRONMENT value: 'production' - image: 'docker.io/kubeshark/front:v52.5' + image: 'docker.io/kubeshark/front:v52.6' imagePullPolicy: Always name: kubeshark-front livenessProbe: ++++++ kubeshark-cli.obsinfo ++++++ --- /var/tmp/diff_new_pack.v579hx/_old 2025-03-25 22:20:02.509578536 +0100 +++ /var/tmp/diff_new_pack.v579hx/_new 2025-03-25 22:20:02.525579201 +0100 @@ -1,5 +1,5 @@ name: kubeshark-cli -version: 52.5.0 -mtime: 1740859224 -commit: eec44040382181dd1f849fac8aa7e05675a8b4a2 +version: 52.6.0 +mtime: 1742853807 +commit: dc50ef48fd6841d5d45c7a90e1a8aeb8ef66f9ee ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/kubeshark-cli/vendor.tar.gz /work/SRC/openSUSE:Factory/.kubeshark-cli.new.2696/vendor.tar.gz differ: char 5, line 1