From 785dd1417daef588232d9ff49be820b0fbca516f Mon Sep 17 00:00:00 2001 From: Tom McKay Date: Wed, 29 Sep 2021 13:18:13 -0400 Subject: [PATCH] Release v0.2.0 --- Makefile | 2 +- ...keeper-operator.clusterserviceversion.yaml | 6 +-- config/default/kustomization.yaml | 38 +++---------------- config/manager/kustomization.yaml | 2 +- config/rbac/base/kustomization.yaml | 10 +++-- deploy/gatekeeper-operator.yaml | 2 +- 6 files changed, 18 insertions(+), 42 deletions(-) diff --git a/Makefile b/Makefile index de6971b5..ddf24014 100644 --- a/Makefile +++ b/Makefile @@ -3,7 +3,7 @@ # To re-generate a bundle for another specific version without changing the standard setup, you can: # - use the VERSION as arg of the bundle target (e.g make bundle VERSION=0.0.2) # - use environment variables to overwrite this value (e.g export VERSION=0.0.2) -VERSION ?= v0.2.0-rc.3 +VERSION ?= v0.2.0 # CHANNELS define the bundle channels used in the bundle. # Add a new line here if you would like to change its default config. (E.g CHANNELS = "candidate,fast,stable") diff --git a/bundle/manifests/gatekeeper-operator.clusterserviceversion.yaml b/bundle/manifests/gatekeeper-operator.clusterserviceversion.yaml index f4facdae..c33ecf14 100644 --- a/bundle/manifests/gatekeeper-operator.clusterserviceversion.yaml +++ b/bundle/manifests/gatekeeper-operator.clusterserviceversion.yaml @@ -18,7 +18,7 @@ metadata: capabilities: Basic Install operators.operatorframework.io/builder: operator-sdk-v1.10.0+git operators.operatorframework.io/project_layout: go.kubebuilder.io/v3 - name: gatekeeper-operator.v0.2.0-rc.3 + name: gatekeeper-operator.v0.2.0 namespace: placeholder spec: apiservicedefinitions: {} @@ -318,7 +318,7 @@ spec: env: - name: RELATED_IMAGE_GATEKEEPER value: openpolicyagent/gatekeeper:v3.5.2 - image: quay.io/gatekeeper/gatekeeper-operator:v0.2.0-rc.3 + image: quay.io/gatekeeper/gatekeeper-operator:v0.2.0 imagePullPolicy: Always livenessProbe: httpGet: @@ -451,4 +451,4 @@ spec: provider: name: Red Hat replaces: gatekeeper-operator.v0.1.2 - version: 0.2.0-rc.3 + version: 0.2.0 diff --git a/config/default/kustomization.yaml b/config/default/kustomization.yaml index b24f7e1d..88b2606c 100644 --- a/config/default/kustomization.yaml +++ b/config/default/kustomization.yaml @@ -14,9 +14,6 @@ namePrefix: gatekeeper-operator- commonLabels: control-plane: gatekeeper-operator-controller-manager -bases: -- ../crd -- ../manager # [WEBHOOK] To enable webhook, uncomment all the sections with [WEBHOOK] prefix including the one in # crd/kustomization.yaml #- ../webhook @@ -25,10 +22,10 @@ bases: # [PROMETHEUS] To enable prometheus monitor, uncomment all sections with 'PROMETHEUS'. #- ../prometheus -patchesStrategicMerge: # Protect the /metrics endpoint by putting it behind auth. # If you want your controller-manager to expose the /metrics # endpoint w/o any authn/z, please comment the following line. +patchesStrategicMerge: - manager_auth_proxy_patch.yaml # Mount the controller config file for loading manager configurations @@ -45,31 +42,8 @@ patchesStrategicMerge: #- webhookcainjection_patch.yaml # the following config is for teaching kustomize how to do var substitution -vars: -# [CERTMANAGER] To enable cert-manager, uncomment all sections with 'CERTMANAGER' prefix. -#- name: CERTIFICATE_NAMESPACE # namespace of the certificate CR -# objref: -# kind: Certificate -# group: cert-manager.io -# version: v1 -# name: serving-cert # this name should match the one in certificate.yaml -# fieldref: -# fieldpath: metadata.namespace -#- name: CERTIFICATE_NAME -# objref: -# kind: Certificate -# group: cert-manager.io -# version: v1 -# name: serving-cert # this name should match the one in certificate.yaml -#- name: SERVICE_NAMESPACE # namespace of the service -# objref: -# kind: Service -# version: v1 -# name: webhook-service -# fieldref: -# fieldpath: metadata.namespace -#- name: SERVICE_NAME -# objref: -# kind: Service -# version: v1 -# name: webhook-service +apiVersion: kustomize.config.k8s.io/v1beta1 +kind: Kustomization +resources: +- ../crd +- ../manager diff --git a/config/manager/kustomization.yaml b/config/manager/kustomization.yaml index 4c8f6b51..e207e7e4 100644 --- a/config/manager/kustomization.yaml +++ b/config/manager/kustomization.yaml @@ -14,4 +14,4 @@ kind: Kustomization images: - name: controller newName: quay.io/gatekeeper/gatekeeper-operator - newTag: v0.2.0-rc.3 + newTag: v0.2.0 diff --git a/config/rbac/base/kustomization.yaml b/config/rbac/base/kustomization.yaml index bcfe7d62..0799c7ea 100644 --- a/config/rbac/base/kustomization.yaml +++ b/config/rbac/base/kustomization.yaml @@ -14,21 +14,23 @@ namePrefix: gatekeeper-operator- commonLabels: control-plane: gatekeeper-operator-controller-manager -resources: # All RBAC will be applied under this service account in # the deployment namespace. You may comment out this resource # if your manager will use a service account that exists at # runtime. Be sure to update RoleBinding and ClusterRoleBinding # subjects if changing service account names. +# Comment the following 4 lines if you want to disable +# the auth proxy (https://github.com/brancz/kube-rbac-proxy) +# which protects your /metrics endpoint. +resources: - service_account.yaml - role.yaml - role_binding.yaml - leader_election_role.yaml - leader_election_role_binding.yaml -# Comment the following 4 lines if you want to disable -# the auth proxy (https://github.com/brancz/kube-rbac-proxy) -# which protects your /metrics endpoint. - auth_proxy_service.yaml - auth_proxy_role.yaml - auth_proxy_role_binding.yaml - auth_proxy_client_clusterrole.yaml +apiVersion: kustomize.config.k8s.io/v1beta1 +kind: Kustomization diff --git a/deploy/gatekeeper-operator.yaml b/deploy/gatekeeper-operator.yaml index b4b5126f..5fa61e7d 100644 --- a/deploy/gatekeeper-operator.yaml +++ b/deploy/gatekeeper-operator.yaml @@ -1240,7 +1240,7 @@ spec: env: - name: RELATED_IMAGE_GATEKEEPER value: openpolicyagent/gatekeeper:v3.5.2 - image: quay.io/gatekeeper/gatekeeper-operator:v0.2.0-rc.3 + image: quay.io/gatekeeper/gatekeeper-operator:v0.2.0 imagePullPolicy: Always livenessProbe: httpGet: