Skip to content

Releases: k8snetworkplumbingwg/network-resources-injector

v1.5

27 Jul 17:40
e6218f9
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v1.4...v1.5

v1.4

04 Jul 09:37
8eb1c4f
Compare
Choose a tag to compare

What's Changed

Container Image

  • ghcr.io/k8snetworkplumbingwg/network-resources-injector:v1.4

Full Changelog: v1.3...v1.4

v1.3

28 Nov 08:58
9329584
Compare
Choose a tag to compare

What's Changed

Full Changelog: v1.2...v1.3

Container Image

  • ghcr.io/k8snetworkplumbingwg/network-resources-injector:v1.3

New features & bug fixes & test improvements

19 Jul 11:59
b1714b3
Compare
Choose a tag to compare

New features:
#96 Switch to admission v1
#103 Configurable failure policy
#105 Bump Multus version
#106 make webhook to use local net-attach-def cache
#108 Add controlSwitches package to toggle feature state at runtime

Bug fixes:
#51 mount podnetinfo in all containers
#100 Ignore AdmissionReview request with empty namespace
#104 Allow multiple add patch Ops for UDI annotations

Test improvements:
#107 Add absolute path of support scripts to PATH

v1.1 New features & bug / vulnerability fixes

12 Apr 15:57
Compare
Choose a tag to compare

Feature/enhancements:
#59 Enable customized injection for pod annotations
#29 Honor the existing resources quantity
#83 #72 #66 Add github workflows for image creation, build & test. Add E2E testing using KinD

Bug / vulnerability fixes:
#76 CVE-2021-20206 - Update containernetworking/cni to v0.8.1
#77 CVE-2021-3121 - update protobuf to v1.3.2
#63 CVE-2020-29652 - golang: crypto/ssh: crafted authentication request can
lead to nil pointer dereference
#74 Fix Golang 1.16 build issue
#79 add nod selector even though resource requests empty

v1.0: New features and security improvements

21 Dec 16:54
Compare
Choose a tag to compare

Project has moved from Intel to Network Plumbing Working Group with new URL https://github.com/k8snetworkplumbingwg/network-resources-injector

New features:

  • Inject resource name in default network #47
  • Add NodeSelector support #21
  • Expose hugepages requests/limits to container via Downward API #42
  • Security improvement including: Allow addition of client CA to NRI TLS endpoint, Restrict acceptable HTTP verbs to POST only, limit max message body, request timeouts, limit to TLS 1.2/1.3 only, limit curve preferences and cipher suits, omit symbol table and debug info when building binary, decrease necessiary pod linux privilages needed to only CAP_NET_BIND_SERVICE, introduce requests/limits to prevent DOS of limited resources on host (cpu, mem)