Skip to content

Commit

Permalink
Add release v2.9.0
Browse files Browse the repository at this point in the history
  • Loading branch information
rajch committed Dec 22, 2024
1 parent 999aeb7 commit 8397222
Show file tree
Hide file tree
Showing 5 changed files with 25 additions and 20 deletions.
6 changes: 6 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,9 @@
## Release 2.9.0

This release has upgraded dependencies based on CVE recommendations.

Also, from this release onwards, all weave images will use the `iptables-nft` backend for `iptables` by default. To use the legacy mode, set the environment variable `IPTABLES_BACKEND` to `legacy`. To do this for the Docker plugin, export the variable before using the `weave` script. For the Kubernetes addon, set the variable in the manifest.

## Release 2.8.10

This release bumps the Go version to 1.23.1 and the alpine base image to version 3.20.3 as per CVE recommendations.
Expand Down
7 changes: 7 additions & 0 deletions reweave/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,13 @@

All changes made to the weave net codebase since the fork will be documented in this file.

## 2.9.0

### Changed

* Changed version in `reweave/Makefile` to 2.9.0
* Modified reweave and main CHANGELOG.md

## 2.9.0-beta1

From this version onwards, we will assume that the default backend for `iptables` is `iptables-nft`. For backward compatibility, we will include `iptables-legacy` in the weave images, and provide a way to use that if required.
Expand Down
2 changes: 1 addition & 1 deletion reweave/Makefile
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
IMAGE_VERSION ?= 2.9.0-beta1
IMAGE_VERSION ?= 2.9.0
REGISTRY_USER ?= rajchaudhuri

ALPINE_BASEIMAGE ?= alpine:3.20.3
Expand Down
2 changes: 1 addition & 1 deletion reweave/scans/badge.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"schemaVersion": 1, "label": "Vulnerabilty count", "message": "2", "color": "orange"}
{"schemaVersion": 1, "label": "Vulnerabilty count", "message": "0", "color": "blue"}
28 changes: 10 additions & 18 deletions reweave/scans/report.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@

```
Report date: 2024-12-22
Unique vulnerability count: 2
Images version: 2.8.10
Unique vulnerability count: 0
Images version: 2.9.0
```

## Scanner Details
Expand All @@ -23,35 +23,27 @@ Supported DB Schema: 5

## Vulnerabilities

### weave-kube: (2)
### weave-kube: (0)

```
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
golang.org/x/crypto v0.21.0 0.31.0 go-module GHSA-v778-237x-gjrc Critical
golang.org/x/net v0.23.0 0.33.0 go-module GHSA-w32m-9786-jp63 High
No vulnerabilities found
```

### weave-npc: (2)
### weave-npc: (0)

```
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
golang.org/x/crypto v0.21.0 0.31.0 go-module GHSA-v778-237x-gjrc Critical
golang.org/x/net v0.23.0 0.33.0 go-module GHSA-w32m-9786-jp63 High
No vulnerabilities found
```

### weave: (2)
### weave: (0)

```
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
golang.org/x/crypto v0.21.0 0.31.0 go-module GHSA-v778-237x-gjrc Critical
golang.org/x/net v0.23.0 0.33.0 go-module GHSA-w32m-9786-jp63 High
No vulnerabilities found
```

### weaveexec: (2)
### weaveexec: (0)

```
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
golang.org/x/crypto v0.21.0 0.31.0 go-module GHSA-v778-237x-gjrc Critical
golang.org/x/net v0.23.0 0.33.0 go-module GHSA-w32m-9786-jp63 High
No vulnerabilities found
```

0 comments on commit 8397222

Please sign in to comment.