Skip to content

Commit

Permalink
Bump to v0.5.0
Browse files Browse the repository at this point in the history
Signed-off-by: Sascha Grunert <[email protected]>
  • Loading branch information
saschagrunert authored and k8s-ci-robot committed Oct 18, 2022
1 parent 51bd04c commit 9d77a69
Show file tree
Hide file tree
Showing 13 changed files with 32 additions and 30 deletions.
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
0.4.4-dev
0.5.0
Original file line number Diff line number Diff line change
Expand Up @@ -98,11 +98,11 @@ metadata:
]
capabilities: Basic Install
categories: Security
olm.skipRange: '>=0.4.1 <0.4.4-dev'
olm.skipRange: '>=0.4.1 <0.5.0'
operatorframework.io/suggested-namespace: security-profiles-operator
operators.operatorframework.io/builder: operator-sdk-v1.22.2
operators.operatorframework.io/project_layout: go.kubebuilder.io/v3
name: security-profiles-operator.v0.4.4-dev
name: security-profiles-operator.v0.5.0
namespace: placeholder
spec:
apiservicedefinitions: {}
Expand Down Expand Up @@ -425,7 +425,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
image: k8s.gcr.io/security-profiles-operator/security-profiles-operator:v0.5.0
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down Expand Up @@ -499,4 +499,4 @@ spec:
name: rbac-proxy
- image: quay.io/security-profiles-operator/selinuxd
name: selinuxd
version: 0.4.4-dev
version: 0.5.0
2 changes: 1 addition & 1 deletion dependencies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -172,7 +172,7 @@ dependencies:
match: BOM_VERSION

- name: spo-current
version: 0.4.4-dev
version: 0.5.0
refPaths:
- path: VERSION
match: ^.*
Expand Down
4 changes: 2 additions & 2 deletions deploy/helm/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,5 +2,5 @@ apiVersion: v2
name: security-profiles-operator
description: "The Kubernetes Security Profiles Operator."
type: application
version: "0.4.4-dev"
appVersion: "0.4.4-dev"
version: "0.5.0"
appVersion: "0.5.0"
8 changes: 4 additions & 4 deletions deploy/kustomize-deployment/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@ kind: Kustomization

images:
- name: security-profiles-operator
newName: gcr.io/k8s-staging-sp-operator/security-profiles-operator
newTag: latest
# newName: gcr.io/k8s-staging-sp-operator/security-profiles-operator
# newTag: latest
# For images to be released:
# newName: k8s.gcr.io/security-profiles-operator/security-profiles-operator
# newTag: v0.4.4
newName: k8s.gcr.io/security-profiles-operator/security-profiles-operator
newTag: v0.5.0

commonLabels:
app: security-profiles-operator
Expand Down
2 changes: 1 addition & 1 deletion deploy/namespace-operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2922,7 +2922,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
image: k8s.gcr.io/security-profiles-operator/security-profiles-operator:v0.5.0
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down
2 changes: 1 addition & 1 deletion deploy/openshift-dev.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2920,7 +2920,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
image: image-registry.openshift-image-registry.svc:5000/openshift/security-profiles-operator:latest
image: k8s.gcr.io/security-profiles-operator/security-profiles-operator:v0.5.0
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down
2 changes: 1 addition & 1 deletion deploy/operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2920,7 +2920,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
image: k8s.gcr.io/security-profiles-operator/security-profiles-operator:v0.5.0
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down
2 changes: 1 addition & 1 deletion deploy/webhook-operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2920,7 +2920,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
image: k8s.gcr.io/security-profiles-operator/security-profiles-operator:v0.5.0
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down
2 changes: 1 addition & 1 deletion examples/olm/install-resources.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ metadata:
namespace: olm
spec:
sourceType: grpc
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator-catalog:latest
image: k8s.gcr.io/security-profiles-operator/security-profiles-operator-catalog:v0.5.0
---
apiVersion: operators.coreos.com/v1
kind: OperatorGroup
Expand Down
8 changes: 3 additions & 5 deletions hack/ci/e2e-olm.sh
Original file line number Diff line number Diff line change
Expand Up @@ -31,10 +31,8 @@ function build_and_push_packages() {
OPERATOR_MANIFEST=deploy/operator-ci.yaml

# Create a manifest with local image
pushd deploy/base
kustomize edit set image security-profiles-operator=$IMG
popd
kustomize build --reorder=none deploy/overlays/cluster -o ${OPERATOR_MANIFEST}
cp deploy/operator.yaml ${OPERATOR_MANIFEST}
sed -i "s#k8s.gcr.io/security-profiles-operator/security-profiles-operator.*\$#${IMG}#" ${OPERATOR_MANIFEST}

# this is a kludge, we need to make sure kustomize can be overwritten
rm -f build/kustomize
Expand Down Expand Up @@ -62,7 +60,7 @@ function deploy_spo() {
kubectl -ncert-manager wait --for condition=ready pod -l app.kubernetes.io/instance=cert-manager

# let's roll..
sed -i "s#gcr.io/k8s-staging-sp-operator/security-profiles-operator-catalog:latest#${CATALOG_IMG}#g" examples/olm/install-resources.yaml
sed -i "s#k8s.gcr.io/security-profiles-operator/security-profiles-operator-catalog:v0.5.0#${CATALOG_IMG}#g" examples/olm/install-resources.yaml
kubectl create -f examples/olm/install-resources.yaml
}

Expand Down
2 changes: 1 addition & 1 deletion installation-usage.md
Original file line number Diff line number Diff line change
Expand Up @@ -158,7 +158,7 @@ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/
kubectl --namespace cert-manager wait --for condition=ready pod -l app.kubernetes.io/instance=cert-manager
# Install the chart from a release URL (note: helm also allows users to
# specify a file path instead of a URL, if desired):
helm install security-profiles-operator https://github.com/kubernetes-sigs/security-profiles-operator/releases/download/v0.4.4-dev/security-profiles-operator-0.4.4-dev.tgz
helm install security-profiles-operator https://github.com/kubernetes-sigs/security-profiles-operator/releases/download/v0.5.0/security-profiles-operator-0.5.0.tgz
```

### Installation on AKS
Expand Down
18 changes: 11 additions & 7 deletions release.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,17 +13,21 @@ The first PR targets this repository and:

- bumps the [`VERSION`](VERSION) file to the target version
- changes the `images` `newName`/`newTag` fields of
[./deploy/base/kustomization.yaml](deploy/base/kustomization.yaml) from
`gcr.io/k8s-staging-sp-operator/security-profiles-operator` to
[./deploy/kustomize-deployment/kustomization.yaml](deploy/kustomize-deployment/kustomization.yaml)
from `gcr.io/k8s-staging-sp-operator/security-profiles-operator` to
`k8s.gcr.io/security-profiles-operator/security-profiles-operator` (`newName`) and the
corresponding tag (`newTag`). After that the make target `make bundle`
has to be run and the changes have to be committed.
- changes the tag in the same way in the OLM example manifest at
- changes the `image` in the `CatalogSource` in the same way at
[./examples/olm/install-resources.yaml](/examples/olm/install-resources.yaml)
- changes [`hack/ci/e2e-olm.sh`](/hack/ci/e2e-olm.sh) to sed
`"s#k8s.gcr.io/security-profiles-operator/security-profiles-operator-catalog:v0.4.3#${CATALOG_IMG}#g"`
`"s#k8s.gcr.io/security-profiles-operator/security-profiles-operator-catalog:v0.0.0#${CATALOG_IMG}#g"`
instead of
`"s#gcr.io/k8s-staging-sp-operator/security-profiles-operator-catalog:latest#${CATALOG_IMG}#g"`
(please note to change the version `v0.0.0` to the upcoming release)
- updates [./dependencies.yaml](./dependencies.yaml) `spo-current` version as
well as its linked files. Run `make verify-dependencies` to verify the
results.

After this PR has been merged, we have to watch out the successful build of the
container image via the automatically triggered
Expand Down Expand Up @@ -64,9 +68,9 @@ After that, another PR against this repository has to be created, which:
- bumps the [`VERSION`](VERSION) file to the next minor version, but now including the
suffix `-dev`, for example `1.0.0-dev`.
- changes the `images` `newName`/`newTag` fields in
[./deploy/base/kustomization.yaml](deploy/base/kustomization.yaml) back to
`gcr.io/k8s-staging-sp-operator/security-profiles-operator` (`newName`) and `latest`
(`newTag`) and runc `make bundle`
[./deploy/kustomize-deployment/kustomization.yaml](deploy/kustomize-deployment/kustomization.yaml)
back to `gcr.io/k8s-staging-sp-operator/security-profiles-operator`
(`newName`) and `latest` (`newTag`) and runc `make bundle`
- changes the tag in the same way in the OLM example manifest at
[./examples/olm/install-resources.yaml](/examples/olm/install-resources.yaml)
- reverts the changes to [`hack/ci/e2e-olm.sh`](/hack/ci/e2e-olm.sh)
Expand Down

0 comments on commit 9d77a69

Please sign in to comment.