Skip to content

Commit 5efe3c9

Browse files
authored
Merge pull request #808 from sushanth0910/release-0.6
Release 0.6
2 parents 8769c8f + 328aa55 commit 5efe3c9

File tree

23 files changed

+597
-1137
lines changed

23 files changed

+597
-1137
lines changed

CHANGELOG.md

Lines changed: 0 additions & 92 deletions
This file was deleted.

deploy/example.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,7 @@ spec:
227227
# - output (output kubeconfig to plug into your apiserver configuration, mounted from the host)
228228
containers:
229229
- name: aws-iam-authenticator
230-
image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.3
230+
image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.6.26
231231
args:
232232
- server
233233
# uncomment if using EKS-Style ConfigMap

docs/RELEASE.md

Lines changed: 17 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
# AWS IAM Authenticator Release Process
22

3-
NOTE: Your GitHub account must have the required permissions and you must have generated a GitHub token.
4-
53
## Choosing the release version and branch
64

75
Using semantic versioning, pick a release number that makes sense by bumping the major, minor or patch release version. If its a major or minor release (backwards incompatible changes, and new features, respectively) then you will want to start this process with an alpha release first. Here are some examples:
@@ -28,106 +26,44 @@ v1.6.2 -> v2.0.0-alpha.0
2826
-> v2.0.0
2927
```
3028

31-
You also might need to create a release branch, if it doesn't already exist, if this release requires backporting changes to an older major or minor version. For example, in the case that we are backporting a fix to the v0.5 release branch, and we have a v0.6 release branch (which we don't at the time of writing), then we would do the following:
29+
You also might need to create a release branch, if it doesn't already exist, if this release requires backporting changes to an older major or minor version. For example, in the case that we are backporting a fix to the v0.5 release branch, and we have a v0.6 release branch, then we would do the following:
3230

3331
1. Create the release branch (named release-0.5) if it doesn't exist from the last v0.5.x tagged release (or check it out if it already exists).
3432
2. Cherry-pick the necessary commits onto the release branch.
3533
3. Follow the instructions below to create the release commit.
3634
4. Create a pull request to merge your fork of the release branch into the upstream release branch (i.e. nckturner/aws-iam-authenticator/release-0.5 -> kubernetes-sigs/aws-iam-authenticator/release-0.5).
37-
5. Follow the instructions below, except creating the tag on the release branch instead of master.
38-
6. Run goreleaser from the release branch.
35+
5. CI will handle the rest automatically. This includes:
36+
- creating and pushing the git tag into the upstream release branch
37+
- running Goreleaser on the release branch
38+
- creating the GitHub release
39+
- Populating the release with the changes
40+
- building and uploading the binaries to the release
3941

4042
## Creating the release commit
4143

42-
### Updating the Makefile
43-
44-
Bump the version number in the Makefile:
45-
46-
```
47-
VERSION ?= v0.5.2
48-
```
49-
50-
This ensures the binary version is correct.
51-
52-
### Updating the CHANGELOG
53-
54-
We need to generate the CHANGELOG for the new release by running `./hack/changelog.py`. First check the correctness of the output using the `--print-only` flag. Pass the previous release tag, and the commit SHA of the most recent commit (the new tag will include the changelog, so it hasn't been created yet). The commands use a `--token` field. Generate it from [github personal access token](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token).
55-
56-
```
57-
./hack/changelog.py --token=$GITHUB_TOKEN --section-title="Release v0.5.2" --range=v0.5.1..90653708db3f6437a446bbeec15b5036db66a855 --print-only
58-
```
59-
60-
After checking for correctness, pass the `--changelog-file` argument to add the new text.
61-
```
62-
./hack/changelog.py --token=$GITHUB_TOKEN --section-title="Release v0.5.2" --range=v0.5.1..90653708db3f6437a446bbeec15b5036db66a855 --changelog-file=CHANGELOG.md
63-
```
44+
Update the `version.txt` with your new semantic version. This must be a standalone commit which only updates the `version.txt` file.
6445

6546
Also, bump the image version in `deploy/example.yaml` to the new version.
6647

67-
Push the changes to a branch on your fork, and create a PR against the kubernetes-sigs upstream repository.
68-
69-
70-
## Tagging the release
71-
72-
One the PR merges, pull the master branch locally and tag the release commit with the relase tag.
73-
```
74-
git pull upstream master
75-
git tag v0.5.2
76-
```
77-
78-
## Run goreleaser
79-
80-
In order to run goreleaser to make the release, you'll need to authenticate to the release ECR registry, and then run goreleaser.
81-
82-
```
83-
aws ecr get-login-password --region us-west-2 | docker login --username AWS --password-stdin 602401143452.dkr.ecr.us-west-2.amazonaws.com
84-
goreleaser release --rm-dist
85-
```
86-
87-
TODO: configure goreleaser to use `./hack/changelog.py` to format the release text.
48+
Push (or cherry-pick) the changes to a branch on your fork, and create a PR against the kubernetes-sigs upstream repository.
8849

8950
## Check the release on GitHub
9051

9152
Look at the release that was just published and validate that the release has the appropriate assets. The assets should include the following:
9253

9354
```
94-
authenticator_0.5.2_checksums.txt
95-
aws-iam-authenticator-0.5.2.tar.gz
96-
aws-iam-authenticator-0.5.2.zip
97-
aws-iam-authenticator_0.5.2_darwin_amd64
98-
aws-iam-authenticator_0.5.2_linux_amd64
99-
aws-iam-authenticator_0.5.2_windows_amd64.exe
55+
authenticator_0.6.26_checksums.txt
56+
aws-iam-authenticator_0.6.26_darwin_amd64
57+
aws-iam-authenticator_0.6.26_darwin_arm64
58+
aws-iam-authenticator_0.6.26_linux_amd64
59+
aws-iam-authenticator_0.6.26_linux_arm64
60+
aws-iam-authenticator_0.6.26_linux_ppc64le
61+
aws-iam-authenticator_0.6.26_linux_s390x
62+
aws-iam-authenticator_0.6.26_windows_amd64.exe
10063
Source code (zip)
10164
Source code (tar.gz)
10265
```
10366

104-
Check the ECR registry to make sure that the images were published. Finally, edit the release text to match previous releases, by copying the changelog text and adding the container image links. The format of the release text should be similar to the following:
105-
106-
````
107-
## Changelog
108-
109-
* Added partition flag ([#341](https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/341), @micahhausler)
110-
* Update link to Kops docs site ([#338](https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/338), @rifelpet)
111-
* Security Improvements on the example yaml ([#335](https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/335), @pjbgf)
112-
* Fix RBAC on example file: service account requires get to ConfigMap ([#334](https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/334), @pjbgf)
113-
* Add AccessKeyID as variable for username ([#337](https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/337), @pjbgf)
114-
* Added server side AWS account ID log redaction ([#327](https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/327), @micahhausler)
115-
116-
## Docker Images
117-
118-
Note: You must log in with the registry ID and your role must have the necessary ECR privileges:
119-
```
120-
$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
121-
```
122-
123-
* `docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-debian-jessie`
124-
* `docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-alpine-3.7`
125-
* `docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-debian-stretch`
126-
* `docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-amazonlinux-2`
127-
* `docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-alpine-3.6`
128-
* `docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.2-scratch`
129-
````
130-
13167
## Post Release
13268

13369
In a new PR after the images are pushed to ECR, update the yaml in `deploy/example.yaml`:

0 commit comments

Comments
 (0)