1
0
mirror of https://github.com/ohmyzsh/ohmyzsh.git synced 2026-02-11 05:39:45 +08:00

Compare commits

...

5 Commits

Author SHA1 Message Date
Patrik Wehrli
addbf79f2e
Merge 4e3fed007a into 9df4ea095f 2026-02-02 20:50:33 +01:00
dependabot[bot]
9df4ea095f
chore(deps): bump step-security/harden-runner from 2.14.0 to 2.14.1 (#13547)
Bumps [step-security/harden-runner](https://github.com/step-security/harden-runner) from 2.14.0 to 2.14.1.
- [Release notes](https://github.com/step-security/harden-runner/releases)
- [Commits](20cf305ff2...e3f713f2d8)

---
updated-dependencies:
- dependency-name: step-security/harden-runner
  dependency-version: 2.14.1
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2026-02-02 09:49:29 +01:00
dependabot[bot]
1a253c375a
chore(deps): bump github/codeql-action from 4.31.11 to 4.32.0 (#13548)
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 4.31.11 to 4.32.0.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](19b2f06db2...b20883b0cd)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-version: 4.32.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2026-02-02 09:49:06 +01:00
Patrik Wehrli
4e3fed007a
Merge branch 'ohmyzsh:master' into features/rke-plugin 2022-10-19 13:43:00 +02:00
Patrik Wehrli
0fc24e62cf Add rke command completion 2020-10-13 21:37:47 +02:00
7 changed files with 185 additions and 7 deletions

View File

@ -13,7 +13,7 @@ jobs:
contents: write # this is needed to push commits and branches contents: write # this is needed to push commits and branches
steps: steps:
- name: Harden the runner (Audit all outbound calls) - name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0 uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
with: with:
egress-policy: audit egress-policy: audit

View File

@ -26,7 +26,7 @@ jobs:
- macos-latest - macos-latest
steps: steps:
- name: Harden the runner (Audit all outbound calls) - name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0 uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
with: with:
egress-policy: audit egress-policy: audit
@ -47,7 +47,7 @@ jobs:
- test - test
steps: steps:
- name: Harden the runner (Audit all outbound calls) - name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0 uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
with: with:
egress-policy: audit egress-policy: audit

View File

@ -24,7 +24,7 @@ jobs:
if: github.repository == 'ohmyzsh/ohmyzsh' if: github.repository == 'ohmyzsh/ohmyzsh'
steps: steps:
- name: Harden the runner (Audit all outbound calls) - name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0 uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
with: with:
egress-policy: audit egress-policy: audit

View File

@ -17,7 +17,7 @@ jobs:
if: github.repository == 'ohmyzsh/ohmyzsh' if: github.repository == 'ohmyzsh/ohmyzsh'
steps: steps:
- name: Harden the runner (Audit all outbound calls) - name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0 uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
with: with:
egress-policy: audit egress-policy: audit
- name: Authenticate as @ohmyzsh - name: Authenticate as @ohmyzsh

View File

@ -36,7 +36,7 @@ jobs:
steps: steps:
- name: Harden the runner (Audit all outbound calls) - name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0 uses: step-security/harden-runner@e3f713f2d8f53843e71c69a996d56f51aa9adfb9 # v2.14.1
with: with:
egress-policy: audit egress-policy: audit
@ -60,6 +60,6 @@ jobs:
retention-days: 5 retention-days: 5
- name: "Upload to code-scanning" - name: "Upload to code-scanning"
uses: github/codeql-action/upload-sarif@19b2f06db2b6f5108140aeb04014ef02b648f789 # v4.31.11 uses: github/codeql-action/upload-sarif@b20883b0cd1f46c72ae0ba6d1090936928f9fa30 # v4.32.0
with: with:
sarif_file: results.sarif sarif_file: results.sarif

9
plugins/rke/README.md Normal file
View File

@ -0,0 +1,9 @@
# RKE plugin
This plugin adds auto-completion for [rke](https://rancher.com/products/rke/).
To use it add `rke` to the plugins array in your zshrc file.
```zsh
plugins=(... rke)
```

169
plugins/rke/_rke Normal file
View File

@ -0,0 +1,169 @@
#compdef rke
typeset -A opt_args
_arguments -C \
'1:cmd:->cmds' \
'2:subcmd:->subcmds' \
'*:: :->args' \
&& ret=0
case "$state" in
(cmds)
local commands; commands=(
'up:Bring the cluster up'
'remove:Teardown the cluster and clean cluster nodes'
'version:Show cluster Kubernetes version'
'config:Setup cluster configuration'
'etcd:etcd snapshot save/restore operations in k8s cluster'
'cert:Certificates management for RKE cluster'
'encrypt:Manage cluster encryption provider keys'
'help:Shows a list of commands or help for one command'
)
_describe -t commands 'command' commands && ret=0
;;
(subcmds)
case $line[1] in
(up)
local ups; ups=(
'--config:Specify an alternate cluster YAML file (default: "cluster.yml") $RKE_CONFIG'
'--local:Deploy Kubernetes cluster locally'
'--dind:Deploy Kubernetes cluster in docker containers (experimental)'
'--dind-storage-driver:Storage driver for the docker in docker containers (experimental)'
'--dind-dns-server:DNS resolver to be used by docker in docker container. Useful if host is running systemd-resovld (default: "8.8.8.8")'
'--update-only:Skip idempotent deployment of control and etcd plane'
'--disable-port-check:Disable port check validation between nodes'
'--init:Initiate RKE cluster'
'--cert-dir:Specify a certificate dir path'
'--custom-certs:Use custom certificates from a cert dir'
'--ssh-agent-auth:Use SSH Agent Auth defined by SSH_AUTH_SOCK'
'--ignore-docker-version:Disable Docker version check'
)
_describe -t ups 'up' ups && ret=0
;;
(remove)
local removes; removes=(
'--config:Specify an alternate cluster YAML file (default: "cluster.yml") $RKE_CONFIG'
'--force:Force removal of the cluster'
'--local:Remove Kubernetes cluster locally'
'--dind:Remove Kubernetes cluster deplozed in dind mode'
'--ssh-agent-auth:Use SSH Agent Auth defined by SSH_AUTH_SOCK'
'--ignore-docker-version:Disable Docker version check'
)
_describe -t removes 'remove' removes && ret=0
;;
(version)
local versions; versions=(
'--config:Specify an alternate cluster YAML file (default: "cluster.yml") $RKE_CONFIG'
)
_describe -t versions 'version' versions && ret=0
;;
(config)
local configs; configs=(
'--name:Name of the configuration file (default: "cluster.yml")'
'-n:Name of the configuration file (default: "cluster.yml")'
'--empty:Generate Empty configuration file'
'-e:Generate Empty configuration file'
'--print:Print configuration'
'-p:Print configuration'
'--system-images:Generate the default system images'
'-s:Generate the default system images'
'--list-version:List the default kubernetes version'
'-l:List the default kubernetes version'
'--all:Used with -s and -l, get all available versions'
'-a:Used with -s and -l, get all available versions'
'--version:Generate the default system images for specific k8s versions'
)
_describe -t configs 'config' configs && ret=0
;;
(etcd)
local etcds; etcds=(
'snapshot-save:Take snapshot on all etcd hosts'
'snapshot-restore:Restore existing snapshot'
)
_describe -t etcds 'etcd' etcds && ret=0
;;
(cert)
local certs; certs=(
'rotate:Rotate RKE cluster certificates'
'generate-csr:Generate certificate sign requests for k8s components'
)
_describe -t certs 'cert' certs && ret=0
;;
(encrypt)
local encrypts; encrypts=(
'rotate-key:Rotate cluster encryption provider key'
)
_describe -t encrypts "encrypts" encrypts && ret=0
;;
esac
;;
(args)
case $line[2] in
(snapshot-save)
local saveopts; saveopts=(
'--name:Specify snapshot name'
'--config:Specify an alternate cluster YAML file (default: "cluster.yml") $RKE_CONFIG'
'--s3:Enabled backup to s3'
'--s3-endpoint:Specify s3 endpoint url (default: "s3.amazonaws.com")'
'--s3-endpoint-ca:Specify a custom CA cert to connect to S3 endpoint'
'--access-key:Specify s3 accessKey'
'--secret-key:Specify s3 secretKey'
'--bucket-name:Specify s3 bucket name'
'--region:Specify the s3 bucket location (optional)'
'--folder:Specify s3 folder name'
'--ssh-agent-auth:Use SSH Agent Auth defined by SSH_AUTH_SOCK'
'--ignore-docker-version:Disable Docker version check'
)
_describe -t saveopts 'snapshot-save' saveopts && ret=0
;;
(snapshot-restore)
local restoreopts; restoreopts=(
'--name:Specify snapshot name'
'--config:Specify an alternate cluster YAML file (default: "cluster.yml") $RKE_CONFIG'
'--s3:Enabled backup to s3'
'--s3-endpoint:Specify s3 endpoint url (default: "s3.amazonaws.com")'
'--s3-endpoint-ca:Specify a custom CA cert to connect to S3 endpoint'
'--access-key:Specify s3 accessKey'
'--secret-key:Specify s3 secretKey'
'--bucket-name:Specify s3 bucket name'
'--region:Specify the s3 bucket location (optional)'
'--folder:Specify s3 folder name'
'--cert-dir value:Specify a certificate dir path'
'--custom-certs:Use custom certificates from a cert dir'
'--use-local-state:Use local state file (do not check or use snapshot archive for state file)'
'--ssh-agent-auth:Use SSH Agent Auth defined by SSH_AUTH_SOCK'
'--ignore-docker-version:Disable Docker version check'
)
_describe -t restoreopts 'snapshot-restore' restoreopts && ret=0
;;
(rotate)
local rotateopts; rotateopts=(
'--config:Specify an alternate cluster YAML file (default: "cluster.yml") $RKE_CONFIG'
'--service:Specify a k8s service to rotate certs, (allowed values: kube-apiserver, kube-controller-manager, kube-scheduler, kubelet, kube-proxy, etcd)'
'--rotate-ca:Rotate all certificates including CA certs'
'--ssh-agent-auth:Use SSH Agent Auth defined by SSH_AUTH_SOCK'
'--ignore-docker-version:Disable Docker version check'
)
_describe -t rotateopts 'rotate' rotateopts && ret=0
;;
(generate-csr)
local generatecsropts; generatecsropts=(
'--config:Specify an alternate cluster YAML file (default: "cluster.yml") $RKE_CONFIG'
'--cert-dir: Specify a certificate dir path'
)
_describe -t generatecsropts 'generate-csr' generatecsropts && ret=0
;;
(rotate-key)
local rotatekeyopts; rotatekeyopts=(
'--config:Specify an alternate cluster YAML file (default: "cluster.yml") $RKE_CONFIG'
'--ssh-agent-auth:Use SSH Agent Auth defined by SSH_AUTH_SOCK'
'--ignore-docker-version:Disable Docker version check'
)
_describe -t rotatekeyopts 'rotate-key' rotatekeyopts && ret=0
;;
esac
;;
esac
return ret