Skip to content

Commit

Permalink
Bump to v0.8.1
Browse files Browse the repository at this point in the history
Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
  • Loading branch information
saschagrunert authored and k8s-ci-robot committed Nov 30, 2023
1 parent c417e62 commit d42108c
Show file tree
Hide file tree
Showing 16 changed files with 29 additions and 29 deletions.
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
0.8.1-dev
0.8.1
Original file line number Diff line number Diff line change
Expand Up @@ -241,15 +241,15 @@ metadata:
]
capabilities: Basic Install
categories: Security
containerImage: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.0
olm.skipRange: '>=0.4.1 <0.8.1-dev'
containerImage: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.1
olm.skipRange: '>=0.4.1 <0.8.1'
operatorframework.io/cluster-monitoring: "true"
operatorframework.io/suggested-namespace: security-profiles-operator
operators.openshift.io/valid-subscription: '["OpenShift Kubernetes Engine", "OpenShift
Container Platform", "OpenShift Platform Plus"]'
operators.operatorframework.io/builder: operator-sdk-v1.25.0
operators.operatorframework.io/project_layout: go.kubebuilder.io/v3
name: security-profiles-operator.v0.8.1-dev
name: security-profiles-operator.v0.8.1
namespace: placeholder
spec:
apiservicedefinitions: {}
Expand Down Expand Up @@ -874,7 +874,7 @@ spec:
fieldPath: spec.nodeName
- name: KUBELET_DIR
value: /var/lib/kubelet
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.1
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down Expand Up @@ -985,5 +985,5 @@ spec:
name: selinuxd-el8
- image: quay.io/security-profiles-operator/selinuxd-el9:latest
name: selinuxd-el9
replaces: security-profiles-operator.v0.7.1
version: 0.8.1-dev
replaces: security-profiles-operator.v0.8.0
version: 0.8.1
2 changes: 1 addition & 1 deletion dependencies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -188,7 +188,7 @@ dependencies:
match: BOM_VERSION

- name: spo-current
version: 0.8.1-dev
version: 0.8.1
refPaths:
- path: VERSION
match: ^.*
Expand Down
4 changes: 2 additions & 2 deletions deploy/base/clusterserviceversion.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ metadata:
alm-examples: '[]'
capabilities: Basic Install
categories: Security
containerImage: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.0
containerImage: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.1
olm.skipRange: '>=0.4.1 <0.4.2-dev'
operatorframework.io/suggested-namespace: security-profiles-operator
operators.openshift.io/valid-subscription: '["OpenShift Kubernetes Engine", "OpenShift Container Platform", "OpenShift Platform Plus"]'
Expand Down Expand Up @@ -89,5 +89,5 @@ spec:
provider:
name: Kubernetes SIGs
url: https://github.com/kubernetes-sigs
replaces: security-profiles-operator.v0.7.1
replaces: security-profiles-operator.v0.8.0
version: 0.0.0
4 changes: 2 additions & 2 deletions deploy/catalog-preamble.json
Original file line number Diff line number Diff line change
Expand Up @@ -13,8 +13,8 @@
"package": "security-profiles-operator",
"entries": [
{
"name": "security-profiles-operator.v0.8.1-dev",
"skipRange": ">=0.4.1 <0.8.1-dev"
"name": "security-profiles-operator.v0.8.1",
"skipRange": ">=0.4.1 <0.8.1"
}
]
}
4 changes: 2 additions & 2 deletions deploy/helm/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,5 +2,5 @@ apiVersion: v2
name: security-profiles-operator
description: "The Kubernetes Security Profiles Operator."
type: application
version: "0.8.1-dev"
appVersion: "0.8.1-dev"
version: "0.8.1"
appVersion: "0.8.1"
8 changes: 4 additions & 4 deletions deploy/kustomize-deployment/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,11 +3,11 @@ kind: Kustomization

images:
- name: security-profiles-operator
newName: gcr.io/k8s-staging-sp-operator/security-profiles-operator
newTag: latest
# newName: gcr.io/k8s-staging-sp-operator/security-profiles-operator
# newTag: latest
# For images to be released:
# newName: registry.k8s.io/security-profiles-operator/security-profiles-operator
# newTag: v0.8.1
newName: registry.k8s.io/security-profiles-operator/security-profiles-operator
newTag: v0.8.1


resources:
Expand Down
2 changes: 1 addition & 1 deletion deploy/namespace-operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3210,7 +3210,7 @@ spec:
fieldPath: spec.nodeName
- name: KUBELET_DIR
value: /var/lib/kubelet
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.1
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down
2 changes: 1 addition & 1 deletion deploy/openshift-dev.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3201,7 +3201,7 @@ spec:
fieldPath: spec.nodeName
- name: KUBELET_DIR
value: /var/lib/kubelet
image: image-registry.openshift-image-registry.svc:5000/openshift/security-profiles-operator:latest
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.1
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down
2 changes: 1 addition & 1 deletion deploy/openshift-downstream.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3221,7 +3221,7 @@ spec:
fieldPath: spec.nodeName
- name: KUBELET_DIR
value: /var/lib/kubelet
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.1
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down
2 changes: 1 addition & 1 deletion deploy/operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3208,7 +3208,7 @@ spec:
fieldPath: spec.nodeName
- name: KUBELET_DIR
value: /var/lib/kubelet
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.1
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down
2 changes: 1 addition & 1 deletion deploy/webhook-operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3208,7 +3208,7 @@ spec:
fieldPath: spec.nodeName
- name: KUBELET_DIR
value: /var/lib/kubelet
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.1
imagePullPolicy: Always
name: security-profiles-operator
resources:
Expand Down
2 changes: 1 addition & 1 deletion examples/olm/install-resources.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ metadata:
namespace: olm
spec:
sourceType: grpc
image: gcr.io/k8s-staging-sp-operator/security-profiles-operator-catalog:latest
image: registry.k8s.io/security-profiles-operator/security-profiles-operator-catalog:v0.8.1
---
apiVersion: operators.coreos.com/v1alpha1
kind: Subscription
Expand Down
4 changes: 2 additions & 2 deletions hack/ci/e2e-olm.sh
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ function build_and_push_packages() {

# Create a manifest with local image
cp deploy/operator.yaml ${OPERATOR_MANIFEST}
sed -i "s#gcr.io/k8s-staging-sp-operator/security-profiles-operator.*\$#${IMG}#" ${OPERATOR_MANIFEST}
sed -i "s#registry.k8s.io/security-profiles-operator.*\$#${IMG}#" ${OPERATOR_MANIFEST}
grep ${IMG} ${OPERATOR_MANIFEST} || exit 1

# this is a kludge, we need to make sure kustomize can be overwritten
Expand Down Expand Up @@ -73,7 +73,7 @@ function deploy_deps() {
kubectl_wait -ncert-manager --for condition=ready pod -l app.kubernetes.io/instance=cert-manager

# All installation methods run off the same catalog
sed -i "s#gcr.io/k8s-staging-sp-operator/security-profiles-operator-catalog:latest#${CATALOG_IMG}#g" examples/olm/install-resources.yaml
sed -i "s#registry.k8s.io/security-profiles-operator/security-profiles-operator-catalog:v0.8.1#${CATALOG_IMG}#g" examples/olm/install-resources.yaml

}

Expand Down
2 changes: 1 addition & 1 deletion hack/deploy-localhost.patch
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ index d7bf1964..d2a9c614 100644
fieldPath: spec.nodeName
- name: KUBELET_DIR
value: /var/lib/kubelet
- image: gcr.io/k8s-staging-sp-operator/security-profiles-operator:latest
- image: registry.k8s.io/security-profiles-operator/security-profiles-operator:v0.8.1
- imagePullPolicy: Always
+ image: localhost/security-profiles-operator:latest
+ imagePullPolicy: IfNotPresent
Expand Down
4 changes: 2 additions & 2 deletions test/e2e_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -306,8 +306,8 @@ func (e *e2e) deployOperator(manifest string) {
// ones from the nodes
e.logf("Setting imagePullPolicy to '%s' in manifest: %s", e.pullPolicy, manifest)
e.updateManifest(manifest, "imagePullPolicy: Always", fmt.Sprintf("imagePullPolicy: %s", e.pullPolicy))
e.updateManifest(manifest, "image: .*gcr.io/k8s-staging-sp-operator/.*", fmt.Sprintf("image: %s", e.testImage))
e.updateManifest(manifest, "value: .*gcr.io/k8s-staging-sp-operator/.*", fmt.Sprintf("value: %s", e.testImage))
e.updateManifest(manifest, "image: .*registry.k8s.io/.*", fmt.Sprintf("image: %s", e.testImage))
e.updateManifest(manifest, "value: .*registry.k8s.io/.*", fmt.Sprintf("value: %s", e.testImage))
e.updateManifest(manifest, "value: .*quay.io/.*/selinuxd.*", fmt.Sprintf("value: %s", e.selinuxdImage))
if e.selinuxEnabled {
e.updateManifest(manifest, "enableSelinux: false", "enableSelinux: true")
Expand Down

0 comments on commit d42108c

Please sign in to comment.