Skip to content

Commit aa0d083

Browse files
saschagrunertk8s-ci-robot
authored andcommitted
Bump to v0.7.0
Signed-off-by: Sascha Grunert <[email protected]>
1 parent 980054a commit aa0d083

19 files changed

+43
-33
lines changed

VERSION

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
0.6.1-dev
1+
0.7.0

bundle/manifests/security-profiles-operator.clusterserviceversion.yaml

+6-6
Original file line numberDiff line numberDiff line change
@@ -241,15 +241,15 @@ metadata:
241241
]
242242
capabilities: Basic Install
243243
categories: Security
244-
containerImage: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.6.0
245-
olm.skipRange: '>=0.4.1 <0.6.1-dev'
244+
containerImage: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.7.0
245+
olm.skipRange: '>=0.4.1 <0.7.0'
246246
operatorframework.io/cluster-monitoring: "true"
247247
operatorframework.io/suggested-namespace: security-profiles-operator
248248
operators.openshift.io/valid-subscription: '["OpenShift Kubernetes Engine", "OpenShift
249249
Container Platform", "OpenShift Platform Plus"]'
250250
operators.operatorframework.io/builder: operator-sdk-v1.25.0
251251
operators.operatorframework.io/project_layout: go.kubebuilder.io/v3
252-
name: security-profiles-operator.v0.6.1-dev
252+
name: security-profiles-operator.v0.7.0
253253
namespace: placeholder
254254
spec:
255255
apiservicedefinitions: {}
@@ -862,7 +862,7 @@ spec:
862862
fieldPath: spec.nodeName
863863
- name: KUBELET_DIR
864864
value: /var/lib/kubelet
865-
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
865+
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.7.0
866866
imagePullPolicy: Always
867867
name: security-profiles-operator
868868
resources:
@@ -968,5 +968,5 @@ spec:
968968
name: rbac-proxy
969969
- image: quay.io/security-profiles-operator/selinuxd
970970
name: selinuxd
971-
replaces: security-profiles-operator.v0.5.0
972-
version: 0.6.1-dev
971+
replaces: security-profiles-operator.v0.6.0
972+
version: 0.7.0

dependencies.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ dependencies:
206206
match: BOM_VERSION
207207

208208
- name: spo-current
209-
version: 0.6.1-dev
209+
version: 0.7.0
210210
refPaths:
211211
- path: VERSION
212212
match: ^.*

deploy/base/clusterserviceversion.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
alm-examples: '[]'
77
capabilities: Basic Install
88
categories: Security
9-
containerImage: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.6.0
9+
containerImage: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.7.0
1010
olm.skipRange: '>=0.4.1 <0.4.2-dev'
1111
operatorframework.io/suggested-namespace: security-profiles-operator
1212
operators.openshift.io/valid-subscription: '["OpenShift Kubernetes Engine", "OpenShift Container Platform", "OpenShift Platform Plus"]'
@@ -89,5 +89,5 @@ spec:
8989
provider:
9090
name: Kubernetes SIGs
9191
url: https://github.com/kubernetes-sigs
92-
replaces: security-profiles-operator.v0.5.0
92+
replaces: security-profiles-operator.v0.6.0
9393
version: 0.0.0

deploy/catalog-preamble.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,8 @@
1313
"package": "security-profiles-operator",
1414
"entries": [
1515
{
16-
"name": "security-profiles-operator.v0.6.1-dev",
17-
"skipRange": ">=0.4.1 <0.6.1-dev"
16+
"name": "security-profiles-operator.v0.7.0",
17+
"skipRange": ">=0.4.1 <0.7.0"
1818
}
1919
]
2020
}

deploy/helm/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,5 +2,5 @@ apiVersion: v2
22
name: security-profiles-operator
33
description: "The Kubernetes Security Profiles Operator."
44
type: application
5-
version: "0.6.1-dev"
6-
appVersion: "0.6.1-dev"
5+
version: "0.7.0"
6+
appVersion: "0.7.0"

deploy/kustomize-deployment/kustomization.yaml

+5-5
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ kind: Kustomization
33

44
images:
55
- name: security-profiles-operator
6-
newName: gcr.io/k8s-staging-sp-operator/security-profiles-operator
7-
newTag: latest
8-
# For images to be released:
9-
# newName: registry.k8s.io/security-profiles-operator/security-profiles-operator
10-
# newTag: v0.6.1
6+
# newName: gcr.io/k8s-staging-sp-operator/security-profiles-operator
7+
# newTag: latest
8+
# For images to be released:
9+
newName: registry.k8s.io/security-profiles-operator/security-profiles-operator
10+
newTag: v0.7.0
1111

1212

1313
resources:

deploy/namespace-operator.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -3008,7 +3008,7 @@ spec:
30083008
fieldPath: spec.nodeName
30093009
- name: KUBELET_DIR
30103010
value: /var/lib/kubelet
3011-
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
3011+
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.7.0
30123012
imagePullPolicy: Always
30133013
name: security-profiles-operator
30143014
resources:

deploy/openshift-dev.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -2999,7 +2999,7 @@ spec:
29992999
fieldPath: spec.nodeName
30003000
- name: KUBELET_DIR
30013001
value: /var/lib/kubelet
3002-
image: image-registry.openshift-image-registry.svc:5000/openshift/security-profiles-operator:latest
3002+
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.7.0
30033003
imagePullPolicy: Always
30043004
name: security-profiles-operator
30053005
resources:

deploy/openshift-downstream.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -3019,7 +3019,7 @@ spec:
30193019
fieldPath: spec.nodeName
30203020
- name: KUBELET_DIR
30213021
value: /var/lib/kubelet
3022-
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
3022+
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.7.0
30233023
imagePullPolicy: Always
30243024
name: security-profiles-operator
30253025
resources:

deploy/operator.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -3006,7 +3006,7 @@ spec:
30063006
fieldPath: spec.nodeName
30073007
- name: KUBELET_DIR
30083008
value: /var/lib/kubelet
3009-
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
3009+
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.7.0
30103010
imagePullPolicy: Always
30113011
name: security-profiles-operator
30123012
resources:

deploy/webhook-operator.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -3006,7 +3006,7 @@ spec:
30063006
fieldPath: spec.nodeName
30073007
- name: KUBELET_DIR
30083008
value: /var/lib/kubelet
3009-
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
3009+
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.7.0
30103010
imagePullPolicy: Always
30113011
name: security-profiles-operator
30123012
resources:

examples/olm/install-resources.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ metadata:
1717
namespace: olm
1818
spec:
1919
sourceType: grpc
20-
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator-catalog:latest
20+
image: registry.k8s.io/security-profiles-operator/security-profiles-operator-catalog:v0.7.0
2121
---
2222
apiVersion: operators.coreos.com/v1alpha1
2323
kind: Subscription

hack/ci/e2e-olm.sh

+2-2
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ function build_and_push_packages() {
4545

4646
# Create a manifest with local image
4747
cp deploy/operator.yaml ${OPERATOR_MANIFEST}
48-
sed -i "s#gcr.io/k8s-staging-sp-operator/security-profiles-operator.*\$#${IMG}#" ${OPERATOR_MANIFEST}
48+
sed -i "s#registry.k8s.io/security-profiles-operator.*\$#${IMG}#" ${OPERATOR_MANIFEST}
4949
grep ${IMG} ${OPERATOR_MANIFEST} || exit 1
5050

5151
# this is a kludge, we need to make sure kustomize can be overwritten
@@ -73,7 +73,7 @@ function deploy_deps() {
7373
kubectl -ncert-manager wait --for condition=ready pod -l app.kubernetes.io/instance=cert-manager
7474

7575
# All installation methods run off the same catalog
76-
sed -i "s#gcr.io/k8s-staging-sp-operator/security-profiles-operator-catalog:latest#${CATALOG_IMG}#g" examples/olm/install-resources.yaml
76+
sed -i "s#registry.k8s.io/security-profiles-operator/security-profiles-operator-catalog:v0.7.0#${CATALOG_IMG}#g" examples/olm/install-resources.yaml
7777

7878
}
7979

hack/deploy-localhost.patch

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ index d7bf1964..d2a9c614 100644
1515
fieldPath: spec.nodeName
1616
- name: KUBELET_DIR
1717
value: /var/lib/kubelet
18-
- image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
18+
- image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.7.0
1919
- imagePullPolicy: Always
2020
+ image: localhost/security-profiles-operator:latest
2121
+ imagePullPolicy: IfNotPresent

hack/release.sh

+10-1
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,13 @@ sed -i 's;image: .*;image: registry.k8s.io/security-profiles-operator/security-p
4343

4444
# Update e2e tests
4545
# shellcheck disable=SC2016
46-
sed -i 's;gcr.io/k8s-staging-sp-operator.*;registry.k8s.io/security-profiles-operator/security-profiles-operator-catalog:v'"$VERSION"'#${CATALOG_IMG}#g" examples/olm/install-resources.yaml;g' hack/ci/e2e-olm.sh
46+
sed -i 's;gcr.io.*catalog.*;registry.k8s.io/security-profiles-operator/security-profiles-operator-catalog:v'"$VERSION"'#${CATALOG_IMG}#g" examples/olm/install-resources.yaml;g' hack/ci/e2e-olm.sh
47+
sed -i 's;gcr.io/k8s-staging-sp-operator/;registry.k8s.io/;g' hack/ci/e2e-olm.sh
4748
sed -i 's;gcr.io/k8s-staging-sp-operator/;registry.k8s.io/;g' test/e2e_test.go
4849

50+
# Update patches
51+
sed -i 's;gcr.io.*;registry.k8s.io/security-profiles-operator/security-profiles-operator:v'"$VERSION"';g' hack/deploy-localhost.patch
52+
4953
# Update dependencies.yaml
5054
FILES=(
5155
dependencies.yaml
@@ -63,7 +67,12 @@ OPERATOR_VERSION=$(curl -sSfL --retry 5 --retry-delay 3 "https://operatorhub.io/
6367
sed -i 's;replaces:.*;replaces: '"$OPERATOR_VERSION"';g' $FILE
6468
sed -i 's;containerImage:.*;containerImage: registry.k8s.io/security-profiles-operator/security-profiles-operator:v'"$VERSION"';g' $FILE
6569

70+
# Stage the sources, because `make bundle` will use `git restore`
71+
git add .
72+
6673
# Build bundle
6774
make bundle
6875

76+
git add .
77+
6978
echo "Done. Commit the changes to a new branch and create a PR from it"

installation-usage.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -204,9 +204,9 @@ kubectl annotate ns $spo_ns \
204204
--overwrite
205205

206206
# Install the chart from the release URL (or a file path if desired)
207-
helm install security-profiles-operator --namespace security-profiles-operator https://github.com/kubernetes-sigs/security-profiles-operator/releases/download/v0.6.1-dev/security-profiles-operator-0.6.1-dev.tgz
207+
helm install security-profiles-operator --namespace security-profiles-operator https://github.com/kubernetes-sigs/security-profiles-operator/releases/download/v0.7.0/security-profiles-operator-0.7.0.tgz
208208
# Or update it with
209-
# helm upgrade --install security-profiles-operator --namespace security-profiles-operator https://github.com/kubernetes-sigs/security-profiles-operator/releases/download/v0.6.1-dev/security-profiles-operator-0.6.1-dev.tgz
209+
# helm upgrade --install security-profiles-operator --namespace security-profiles-operator https://github.com/kubernetes-sigs/security-profiles-operator/releases/download/v0.7.0/security-profiles-operator-0.7.0.tgz
210210
```
211211

212212
#### Troubleshooting and maintenance

release.md

+1
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ The script basically:
2929
- updates [./dependencies.yaml](./dependencies.yaml) `spo-current` version as
3030
well as its linked files. Run `make verify-dependencies` to verify the
3131
results.
32+
- updates ./hack/deploy-localhost.patch to match the new deployment
3233
- updates [./deploy/base/clusterserviceversion.yaml](./deploy/base/clusterserviceversion.yaml)
3334
to change `replaces` to the latest available version on OperatorHub as well as
3435
update the `containerImage`.

test/e2e_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -289,8 +289,8 @@ func (e *e2e) deployOperator(manifest string) {
289289
// ones from the nodes
290290
e.logf("Setting imagePullPolicy to '%s' in manifest: %s", e.pullPolicy, manifest)
291291
e.updateManifest(manifest, "imagePullPolicy: Always", fmt.Sprintf("imagePullPolicy: %s", e.pullPolicy))
292-
e.updateManifest(manifest, "image: .*gcr.io/k8s-staging-sp-operator/.*", fmt.Sprintf("image: %s", e.testImage))
293-
e.updateManifest(manifest, "value: .*gcr.io/k8s-staging-sp-operator/.*", fmt.Sprintf("value: %s", e.testImage))
292+
e.updateManifest(manifest, "image: .*registry.k8s.io/.*", fmt.Sprintf("image: %s", e.testImage))
293+
e.updateManifest(manifest, "value: .*registry.k8s.io/.*", fmt.Sprintf("value: %s", e.testImage))
294294
e.updateManifest(manifest, "value: .*quay.io/.*/selinuxd.*", fmt.Sprintf("value: %s", e.selinuxdImage))
295295
if e.selinuxEnabled {
296296
e.updateManifest(manifest, "enableSelinux: false", "enableSelinux: true")

0 commit comments

Comments
 (0)