Skip to content

Commit

Permalink
update to version 1.1.0 (#362)
Browse files Browse the repository at this point in the history
  • Loading branch information
rbren authored Jun 23, 2020
1 parent 5705f81 commit 80662bd
Show file tree
Hide file tree
Showing 6 changed files with 82 additions and 109 deletions.
10 changes: 10 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# x.x.x (next release)

# 1.1.0
* Add namespace filter in UI
* Add priorityClass check
* Support reading from STDIN
* Ensure severity is set for all custom checks
* Support audit files which use \r or \r\n as newline character
* Add option to exempt an entire controller from checks via config file
* Fixed case where parent resources trigger error
* Fixed UI zero-state

# 1.0.3
* Fixed case where parent resources trigger error
* Fixed dashboard link when `--base-path` is set
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
[![Version][version-image]][version-link] [![CircleCI][circleci-image]][circleci-link] [![Go Report Card][goreport-image]][goreport-link]
</div>

[version-image]: https://img.shields.io/static/v1.svg?label=Version&message=1.0.3&color=239922
[version-image]: https://img.shields.io/static/v1.svg?label=Version&message=1.1.0&color=239922
[version-link]: https://github.com/FairwindsOps/polaris

[goreport-image]: https://goreportcard.com/badge/github.com/FairwindsOps/polaris
Expand Down
65 changes: 21 additions & 44 deletions deploy/dashboard.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,21 +14,7 @@ metadata:
labels:
app: polaris
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: polaris-view
labels:
app: polaris
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: view
subjects:
- kind: ServiceAccount
name: polaris
namespace: polaris
---
# Source: polaris/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
Expand All @@ -46,6 +32,23 @@ rules:
- 'get'
- 'list'
---
# Source: polaris/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: polaris-view
labels:
app: polaris
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: view
subjects:
- kind: ServiceAccount
name: polaris
namespace: polaris
---
# Source: polaris/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
Expand All @@ -60,7 +63,6 @@ subjects:
- kind: ServiceAccount
name: polaris
namespace: polaris

---
# Source: polaris/templates/dashboard.service.yaml
apiVersion: v1
Expand Down Expand Up @@ -107,7 +109,7 @@ spec:
- command:
- polaris
- dashboard
image: 'quay.io/fairwinds/polaris:1.0'
image: 'quay.io/fairwinds/polaris:1.1'
imagePullPolicy: 'Always'
name: dashboard
ports:
Expand All @@ -126,8 +128,8 @@ spec:
periodSeconds: 20
resources:
limits:
cpu: 100m
memory: 128Mi
cpu: 150m
memory: 512Mi
requests:
cpu: 100m
memory: 128Mi
Expand All @@ -142,28 +144,3 @@ spec:
serviceAccountName: polaris
nodeSelector:
tolerations:
---
# Source: polaris/templates/audit.job.yaml

---
# Source: polaris/templates/audit.rbac.yaml

---
# Source: polaris/templates/configmap.yaml


---
# Source: polaris/templates/ingress.yaml

---
# Source: polaris/templates/webhook.deployment.yaml

---
# Source: polaris/templates/webhook.rbac.yaml

---
# Source: polaris/templates/webhook.secret.yaml

---
# Source: polaris/templates/webhook.service.yaml

104 changes: 45 additions & 59 deletions deploy/webhook.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,15 @@ kind: Namespace
metadata:
name: polaris
---
# Source: polaris/templates/rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: polaris
namespace: polaris
labels:
app: polaris
---
# Source: polaris/templates/webhook.secret.yaml
# The name of this secret is static as it is populated by the webhook pod.
apiVersion: v1
Expand All @@ -19,29 +28,6 @@ stringData:
cert.pem: ''
---
# Source: polaris/templates/rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: polaris
namespace: polaris
labels:
app: polaris
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: polaris-view
labels:
app: polaris
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: view
subjects:
- kind: ServiceAccount
name: polaris
namespace: polaris
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
Expand All @@ -59,22 +45,6 @@ rules:
- 'get'
- 'list'
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: polaris
labels:
app: polaris
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: polaris
subjects:
- kind: ServiceAccount
name: polaris
namespace: polaris

---
# Source: polaris/templates/webhook.rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
Expand All @@ -101,6 +71,39 @@ rules:
verbs:
- '*'
---
# Source: polaris/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: polaris-view
labels:
app: polaris
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: view
subjects:
- kind: ServiceAccount
name: polaris
namespace: polaris
---
# Source: polaris/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: polaris
labels:
app: polaris
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: polaris
subjects:
- kind: ServiceAccount
name: polaris
namespace: polaris
---
# Source: polaris/templates/webhook.rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
Expand All @@ -116,6 +119,7 @@ subjects:
name: polaris
namespace: polaris
---
# Source: polaris/templates/webhook.rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
Expand All @@ -133,6 +137,7 @@ rules:
verbs:
- '*'
---
# Source: polaris/templates/webhook.rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
Expand Down Expand Up @@ -194,7 +199,7 @@ spec:
command:
- polaris
- webhook
image: 'quay.io/fairwinds/polaris:1.0'
image: 'quay.io/fairwinds/polaris:1.1'
imagePullPolicy: 'Always'
ports:
- containerPort: 9876
Expand Down Expand Up @@ -248,22 +253,3 @@ spec:
secretName: polaris-webhook
- name: cr-logs
emptyDir: {}
---
# Source: polaris/templates/audit.job.yaml

---
# Source: polaris/templates/audit.rbac.yaml

---
# Source: polaris/templates/configmap.yaml


---
# Source: polaris/templates/dashboard.deployment.yaml

---
# Source: polaris/templates/dashboard.service.yaml

---
# Source: polaris/templates/ingress.yaml

2 changes: 1 addition & 1 deletion main.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ import (

const (
// Version represents the current release version of Polaris
Version = "1.0.3"
Version = "1.1.0"
)

func main() {
Expand Down
8 changes: 4 additions & 4 deletions scripts/generate-deployment-files.sh
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,13 @@

set -eo pipefail

helm template $CHARTS_DIR/stable/polaris/ \
--name polaris --namespace polaris \
helm template polaris $CHARTS_DIR/stable/polaris/ \
--namespace polaris \
--set templateOnly=true \
> deploy/dashboard.yaml

helm template $CHARTS_DIR/stable/polaris/ \
--name polaris --namespace polaris \
helm template polaris $CHARTS_DIR/stable/polaris/ \
--namespace polaris \
--set templateOnly=true \
--set webhook.enable=true \
--set dashboard.enable=false \
Expand Down

0 comments on commit 80662bd

Please sign in to comment.