Skip to content

Commit c70f6b0

Browse files
Merge pull request #531 from splunk/promote-develop-to-master-1.0.3
Promote Develop to Master for Splunk Operator Release 1.0.3
2 parents 898641a + 0ef82d7 commit c70f6b0

File tree

4 files changed

+17
-8
lines changed

4 files changed

+17
-8
lines changed

.github/workflows/automated-release-workflow.yml

+7-6
Original file line numberDiff line numberDiff line change
@@ -37,10 +37,6 @@ jobs:
3737
run: |
3838
echo "SHORT_SHA=${GITHUB_SHA::12}" >> $GITHUB_ENV
3939
echo $SHORT_SHA
40-
41-
- name: Get current date
42-
id: date
43-
run: echo "::set-output name=date::$(date +'%Y-%m-%d')"
4440
4541
- name: Configure Docker Credentials
4642
uses: docker/login-action@v1
@@ -76,6 +72,7 @@ jobs:
7672
- name: Run Make Package
7773
run: |
7874
build/package.sh
75+
docker images
7976
8077
- name: Upload Release Artifacts
8178
uses: actions/upload-artifact@v2
@@ -97,11 +94,15 @@ jobs:
9794
tag: "${{ github.event.inputs.release_version }}"
9895
draft: true
9996

100-
- name: Tag Splunk Operator Image
97+
- name: Promote LATEST Splunk Operator Image to Release TAG
98+
run: |
99+
docker tag splunk/splunk-operator:latest splunk/splunk-operator:${{ github.event.inputs.release_version }}
100+
101+
- name: Tag Splunk Operator Image if not same as release tag
101102
if: github.event.inputs.release_version != github.event.inputs.operator_image_tag
102103
run: |
103104
docker tag splunk/splunk-operator:${{ github.event.inputs.release_version }} splunk/splunk-operator:${{ github.event.inputs.operator_image_tag }}
104105
105-
- name: Tag and Push release RC Image
106+
- name: Push Release Image
106107
run: |
107108
docker push splunk/splunk-operator:${{ github.event.inputs.operator_image_tag }}

.github/workflows/build-test-push-workflow.yml

+8
Original file line numberDiff line numberDiff line change
@@ -246,6 +246,14 @@ jobs:
246246
with:
247247
username: ${{ secrets.DOCKERHUB_USERNAME }}
248248
password: ${{ secrets.DOCKERHUB_PUSH_TOKEN}}
249+
- name: Configure AWS credentials
250+
uses: aws-actions/configure-aws-credentials@v1
251+
with:
252+
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
253+
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
254+
aws-region: ${{ secrets.AWS_DEFAULT_REGION }}
255+
- name: Login to Amazon ECR
256+
uses: aws-actions/amazon-ecr-login@v1
249257
- name: Pull Splunk Operator Image Locally
250258
run: |
251259
docker pull ${{ secrets.ECR_REPOSITORY }}/${{ env.SPLUNK_OPERATOR_IMAGE_NAME }}:$GITHUB_SHA

docs/Examples.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -839,7 +839,7 @@ Use the kubectl command to create the global kubernetes secret object:
839839

840840
3. Create a kubernetes secret object referencing the namespace. Example: splunk-`<desired_namespace`>-secret.
841841
In the example below, we are creating the global kubernetes secret object, defining the default administrator and pass4Symmkey tokens, and passing in the values.
842-
`kubectl create secret generic splunk-<desired_namespace>-secret --from-literal='password=<admin_password_value>' --from-literal='pass4Symmkey=<pass4Symmkey_value>'`
842+
`kubectl create secret generic splunk-<desired_namespace>-secret --from-literal='password=<admin_password_value>' --from-literal='pass4SymmKey=<pass4Symmkey_value>'`
843843

844844
### Reading global kubernetes secret object
845845

docs/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ COMMUNITY DEVELOPED: Splunk Operator for Kubernetes is an open source product de
2323
If you're interested in contributing to the SOK open source project, review the [Contributing to the Project](CONTRIBUTING.md) page.
2424

2525
**Community Support & Discussions on
26-
[Slack](https://splunk-usergroups.slack.com)** channel #kubernetes
26+
[Slack](https://splunk-usergroups.slack.com)** channel #splunk-operator-for-kubernetes
2727

2828
**File Issues or Enhancements in
2929
[GitHub](https://github.com/splunk/splunk-operator/issues)** splunk/splunk-operator

0 commit comments

Comments
 (0)