Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
143 commits
Select commit Hold shift + click to select a range
1ae6f15
Use docker-buildx and make smoke tests run
akondur Oct 24, 2024
52ce30c
Add a '.'
akondur Oct 24, 2024
05400a3
Test again
akondur Oct 24, 2024
f6bef93
Change env variable value
akondur Oct 24, 2024
f2fc5f8
Trigger int testing
akondur Oct 25, 2024
68e49c4
Minimize changes only to smoke tests to start with
akondur Oct 25, 2024
b3eb55f
Initial changes for graviton smoke tests
akondur Oct 25, 2024
b3f836d
Merge branch 'develop' into CSPL_2920
akondur Oct 28, 2024
dfd0876
Try this
akondur Oct 28, 2024
f7a2648
Add the argument again
akondur Oct 28, 2024
3f745cf
Try passing build arguments
akondur Oct 28, 2024
3d9e4e7
Add a default value
akondur Oct 28, 2024
36ac76c
Hardcode
akondur Oct 28, 2024
34379dc
Change tag
akondur Oct 28, 2024
40d8f66
Pull locally
akondur Oct 28, 2024
a391b10
Don't push for graviton
akondur Oct 29, 2024
bc3e661
Display operator image
akondur Oct 31, 2024
12531e7
Change eks instance type
akondur Oct 31, 2024
3e7345f
Dump version
akondur Oct 31, 2024
a3c1908
Describe
akondur Oct 31, 2024
9be9090
Don't need to tag for graviton
akondur Nov 1, 2024
6aafeb7
Re-run change kust
akondur Nov 1, 2024
ec29b76
Avoid describe
akondur Nov 1, 2024
dd88888
Enable everything and try again
akondur Nov 4, 2024
456d86a
Remove push-latest, re-run pipelines
akondur Nov 4, 2024
a18b2e7
Re-run tests
akondur Nov 6, 2024
789e478
Enable int tests
akondur Nov 6, 2024
45ea9da
Update error logs
akondur Nov 6, 2024
a5d7225
Further enhance
akondur Nov 6, 2024
1555d21
Don't use platform in FROM in dockerfile, remove TARGETOSIMAGE, ignor…
akondur Nov 7, 2024
8d9dfdb
Trigger int and smoke as well
akondur Nov 7, 2024
133bec4
Pull image fix - int tests
akondur Nov 7, 2024
11d1d3f
Set graviton to true int tests
akondur Nov 7, 2024
879ed33
Re-trigger
akondur Nov 8, 2024
991d80e
Trigger
akondur Nov 8, 2024
f2de239
Re-trigger
akondur Nov 8, 2024
945e149
Disable int tests for now.
akondur Nov 12, 2024
aa6ec96
Avoid vul testing for graviton for now
akondur Nov 12, 2024
d2d124c
Add support for Ubuntu
akondur Nov 14, 2024
b570cc7
Pass as build arg
akondur Nov 14, 2024
87fd60c
Echo BASE_OS
akondur Nov 14, 2024
e56a203
Address review comments
akondur Nov 14, 2024
6c9b789
Fix docker builds
akondur Nov 15, 2024
33f3aba
Change logic for Ubuntu
akondur Nov 15, 2024
4ba29e4
Test package version
akondur Nov 15, 2024
2c61852
Run without package versions
akondur Nov 15, 2024
458b751
Fix unattended-upgrades
akondur Nov 15, 2024
5187f08
Build for amd64 as well for pipelines
akondur Nov 15, 2024
97c5bec
Remove space
akondur Nov 15, 2024
568290b
Change to AS
akondur Nov 15, 2024
524d5e6
Merge branch 'develop' into CSPL_2920
akondur Nov 19, 2024
a888197
Trigger for 9.2.4 AL2023 ARM
akondur Nov 19, 2024
31fa22f
Merge branch 'CSPL_2920' of github.com:splunk/splunk-operator into CS…
akondur Nov 19, 2024
8ab8c1a
Merge branch 'develop' into CSPL_2920
akondur Nov 19, 2024
81e7502
Try installing certificates on SOK container
akondur Nov 19, 2024
354eefe
Trigger both arm and ubuntu. Add cert for ubuntu
akondur Nov 19, 2024
0bab91f
Merge branch 'develop' into CSPL_2920
akondur Nov 19, 2024
6685ec5
Merge branch 'develop' into CSPL_2920
akondur Nov 20, 2024
da1f11a
Merge branch 'develop' into CSPL_2920
akondur Nov 22, 2024
44e54e0
Trigger workflows for 9.2.4 AL2023 ARM64
akondur Nov 26, 2024
35f3e15
Merge branch 'develop' into CSPL_2920
akondur Dec 3, 2024
2a07a31
trigger AL2023 build for splunk 9.2.4
rlieberman-splunk Dec 4, 2024
a625571
trigger AL2023 build for splunk 9.3.2
rlieberman-splunk Dec 4, 2024
a02f50d
trigger Ubuntu build for splunk 9.2.4
rlieberman-splunk Dec 4, 2024
98df5dd
trigger Ubuntu build for splunk 9.3.2
rlieberman-splunk Dec 4, 2024
6270cdd
trigger AL2023 build for splunk 9.2.4
rlieberman-splunk Dec 5, 2024
0e066ac
Merge pull request #1414 from splunk/main
rlieberman-splunk Dec 6, 2024
012d5c1
Merge branch 'develop' into CSPL_2920
akondur Dec 9, 2024
8d4568b
use new label to test app framework tests that hang during teardown
rlieberman-splunk Dec 10, 2024
fc95d7c
use shorter label for testing tag
rlieberman-splunk Dec 10, 2024
3a78dfa
trigger integration test for PR
rlieberman-splunk Dec 10, 2024
f70f23d
trigger rebuild of sok images for arm64 architectures
rlieberman-splunk Dec 11, 2024
223a957
trigger rebuild for sok container on linux arm64
rlieberman-splunk Dec 11, 2024
501dea2
remove build and test workflow for now
rlieberman-splunk Dec 11, 2024
44a01d4
trigger rebuild for sok container on ubuntu arm64
rlieberman-splunk Dec 11, 2024
2bee1d0
separate suite tag for failing test
rlieberman-splunk Dec 11, 2024
68cf212
get correct standalone for readiness checks
rlieberman-splunk Dec 12, 2024
b116765
get correct standalone for readiness checks
rlieberman-splunk Dec 12, 2024
2d1f4a0
add sleep for managermc1 failing test case
rlieberman-splunk Dec 12, 2024
f620d4b
dump splunk version during consistently check for search head cluster
rlieberman-splunk Dec 13, 2024
4b50e13
clean up new workflows
rlieberman-splunk Dec 13, 2024
ddbb6b1
merge integration test fixes branch
rlieberman-splunk Dec 13, 2024
85acc39
merge commit for pulling splunk enterprise image
akondur Dec 9, 2024
5749ef8
re-enable test case, correct merge conflict
rlieberman-splunk Dec 13, 2024
22fba1a
feat: [CSPL-3253]: Change default storageClassName value in PVC
Dec 16, 2024
261d84c
add back feature branch for integration test workflow trigger
rlieberman-splunk Dec 17, 2024
37b2374
Initial changes to support deployer spec in SHC CRD
akondur Dec 18, 2024
9fc919f
Integration testing enabled
akondur Dec 18, 2024
5fa3bd2
Merge pull request #1393 from splunk/CSPL_2920
rlieberman-splunk Dec 18, 2024
21b12b2
Merge branch 'develop' into feature/CSPL-3253
akondur Dec 18, 2024
79d28de
Remove SHC updating phase check
akondur Dec 18, 2024
e819012
Remove change splunk operator name step in integration test workflow
rlieberman-splunk Dec 18, 2024
98743b4
Merge branch 'develop' into CSPL_3256
akondur Dec 18, 2024
713d14e
Trigger int testing again
akondur Dec 19, 2024
75ded11
Fix int test bug
akondur Dec 19, 2024
9b3a1f3
remove specific branch to run integration tests
rlieberman-splunk Dec 19, 2024
502397d
Add a comment, rename TC.
akondur Dec 19, 2024
478244a
Add UT and return error if not deployer sts
akondur Dec 19, 2024
1696ce3
Merge pull request #1420 from splunk/feature/CSPL_3298
rlieberman-splunk Dec 19, 2024
987c4cf
Merge branch 'develop' into feature/CSPL-3253
patrykw-splunk Dec 20, 2024
8306aea
Merge pull request #1417 from splunk/feature/CSPL-3253
akondur Dec 20, 2024
9f6642c
Merge branch 'develop' into CSPL_3256
akondur Dec 20, 2024
1138d9d
Add node affinity as well.
akondur Jan 14, 2025
4d4f6a9
[CSPL-3269] Change error log for clarification (#1422)
rlieberman-splunk Jan 15, 2025
10f30f9
Merge branch 'develop' into CSPL_3256
akondur Jan 17, 2025
3d5dd4b
Restore int-test workflow
akondur Jan 22, 2025
59b8171
Merge pull request #1419 from splunk/CSPL_3256
akondur Jan 23, 2025
07f1447
CSPL-3156: Add kubectl-splunk Plugin for Executing Splunk Commands wi…
vivekr-splunk Jan 27, 2025
9598514
CSPL-2966: Feature: Manual App Updates per Custom Resource (CR) in Sp…
vivekr-splunk Jan 27, 2025
a24dec2
CSPL-3064: Support for Distroless Image Creation in Splunk Operator f…
vivekr-splunk Jan 28, 2025
a2b8fd8
Splunk Operator 2.7.1 release (#1426)
github-actions[bot] Jan 31, 2025
be93365
Update distroless RC and release tags (#1433)
rlieberman-splunk Jan 31, 2025
e027504
Merge branch 'main' of https://github.com/splunk/splunk-operator into…
rlieberman-splunk Feb 4, 2025
57783d3
Merge main back to develop for 2.7.1 (#1434) (#1438)
rlieberman-splunk Feb 6, 2025
1a0d331
Fix typo in pprof registered urls and in READMEs (#1427)
patrykw-splunk Feb 7, 2025
5cd2ddb
CSPL-3434: Use ubi8-minimal base image (#1439)
rlieberman-splunk Feb 10, 2025
ae982a4
CSPL-3434: Update dockerfile to work with al2023 base image (#1441)
rlieberman-splunk Feb 11, 2025
81f6a40
CSPL-3435 Fix bias_lang_migration.sh logic for monitoringConsole
Feb 12, 2025
52ce0fb
Ignore secret checks in the indexercluster when the pod is not yet cr…
rlieberman-splunk Feb 13, 2025
5862586
Merge pull request #1443 from splunk/bugfix/CSPL-3435-fix-bias-lang-m…
patrykw-splunk Feb 13, 2025
06b1fa9
Support tar.gz
Feb 24, 2025
7050554
Update test
Feb 26, 2025
2e5cd99
Merge pull request #1452 from splunk/CSPL-3426
Igor-splunk Feb 28, 2025
66232c2
CSPL-3460: Update dependencies (#1449)
rlieberman-splunk Feb 28, 2025
e60b2be
CSPL-3518 Service Type default does not get overwritten if not set to…
kasiakoziol Mar 4, 2025
b948b39
Update semgrep scanner to run on ubuntu latest (#1458)
rlieberman-splunk Mar 4, 2025
380467d
CSPL-3527: Add pull request template (#1459)
rlieberman-splunk Mar 6, 2025
cfd650c
Merge pull request #1456 from splunk/bug/CSPL_3518_default_servicetyp…
kasiakoziol Mar 12, 2025
fe9d031
CSPL-3534 Fixing string processing in cluster script
kasiakoziol Mar 12, 2025
6f4d463
Merge pull request #1466 from splunk/bugfix/CSPL-3534
kasiakoziol Mar 13, 2025
f71beac
CSPL-3529 Disable ARM tests for develop branch
kasiakoziol Mar 13, 2025
e3278d7
Merge pull request #1467 from splunk/fix/CSPL-3529_disable_arm_tests
kasiakoziol Mar 17, 2025
61f7583
Bugfix/CSPL-3547 add app migration step to bias language script (#1469)
patrykw-splunk Mar 19, 2025
1b555b0
CSPL-3499: Fix Segmentation Fault in Splunk Operator Due to App Volum…
rlieberman-splunk Mar 27, 2025
f2d6c10
CSPL-3463: Push RC images to ECR Repo (#1455)
rlieberman-splunk Mar 27, 2025
a36cc63
Add wait after updating CR and before checking status (#1482)
rlieberman-splunk Apr 11, 2025
49b9709
CSPL-3674: Update project maintainers (#1484)
rlieberman-splunk Apr 14, 2025
781caa1
CSPL-3590: Update github.com/golang-jwt/jwt/v5 and golang.org/x/net d…
rlieberman-splunk Apr 14, 2025
c1ac691
CSPL-3673: Update install docs with arguments (#1483)
rlieberman-splunk Apr 15, 2025
69ad376
Add labels to the metadata of the statefulsets created by the operato…
rlieberman-splunk Apr 17, 2025
b42eaef
bugfix: add extraEnvs to splunk-operator helm-chart (#1490)
patrykw-splunk Apr 22, 2025
21b3e54
CSPL-3624 Helm changes for 2.8.0 release
kasiakoziol Apr 23, 2025
d43829c
Merge pull request #1491 from splunk/CSPL-3624
kasiakoziol Apr 24, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .env
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
OPERATOR_SDK_VERSION=v1.31.0
REVIEWERS=vivekr-splunk,akondur
REVIEWERS=vivekr-splunk,rlieberman-splunk,patrykw-splunk,Igor-splunk,kasiakoziol
GO_VERSION=1.23.0
AWSCLI_URL=https://awscli.amazonaws.com/awscli-exe-linux-x86_64-2.8.6.zip
KUBECTL_VERSION=v1.29.1
Expand Down
4 changes: 0 additions & 4 deletions .github/ISSUE_TEMPLATE/app-framework.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,6 @@ description: File any requests related to app framework under this template
title: "App Framework: "
labels:
- app framework
assignees:
- gaurav-splunk
- jryb
- sgontla

body:
- type: dropdown
Expand Down
4 changes: 0 additions & 4 deletions .github/ISSUE_TEMPLATE/generic.yml
Original file line number Diff line number Diff line change
@@ -1,10 +1,6 @@
name: Generic
description: File generic requests under this template(use only if the issue does not match any of the other templates)
title: "Splunk Operator: "
assignees:
- jryb
- kumarajeet
- vivekr-splunk

body:
- type: dropdown
Expand Down
4 changes: 0 additions & 4 deletions .github/ISSUE_TEMPLATE/ingress.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,6 @@ description: File any requests related to ingestion under this template
title: "Ingestion: "
labels:
- ingestion
assignees:
- vebken-splunk
- mgaldino-splunk
- vivekr-splunk

body:
- type: dropdown
Expand Down
2 changes: 0 additions & 2 deletions .github/ISSUE_TEMPLATE/monitoring-console.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,6 @@ description: File any requests related to monitoring console under this template
title: "Monitoring Console: "
labels:
- monitoring console
assignees:
- kashok-splunk

body:
- type: dropdown
Expand Down
2 changes: 0 additions & 2 deletions .github/ISSUE_TEMPLATE/secret-management.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,6 @@ description: File any issues related to secret management under this template
title: "Secret Management: "
labels:
- secrets
assignees:
- akondur

body:
- type: dropdown
Expand Down
4 changes: 0 additions & 4 deletions .github/ISSUE_TEMPLATE/smartstore.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,6 @@ description: File any issues related to smart store under this template
title: "Smartstore: "
labels:
- smartstore
assignees:
- gaurav-splunk
- sgontla
- vivekr-splunk

body:
- type: dropdown
Expand Down
23 changes: 23 additions & 0 deletions .github/pull_request_template.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
### Description

_What does this PR have in it?_

### Key Changes

_Highlight the updates in specific files_

### Testing and Verification

_How did you test these changes? What automated tests are added?_

### Related Issues

_Jira tickets, GitHub issues, Support tickets..._

### PR Checklist

- [ ] Code changes adhere to the project's coding standards.
- [ ] Relevant unit and integration tests are included.
- [ ] Documentation has been updated accordingly.
- [ ] All tests pass locally.
- [ ] The PR description follows the project's guidelines.
59 changes: 2 additions & 57 deletions .github/workflows/arm-AL2023-build-test-push-workflow-AL2023.yml
Original file line number Diff line number Diff line change
@@ -1,9 +1,6 @@
name: Arm AL2023 Smoke Test WorkFlow
on:
push:
branches:
- develop
- main
workflow_dispatch:
jobs:
check-formating:
runs-on: ubuntu-latest
Expand Down Expand Up @@ -104,60 +101,8 @@ jobs:
env:
COSIGN_PRIVATE_KEY: ${{ secrets.COSIGN_PRIVATE_KEY }}
COSIGN_PASSWORD: ${{ secrets.COSIGN_PASSWORD }}
vulnerability-scan:
permissions:
actions: read
contents: read
security-events: write
runs-on: ubuntu-latest
needs: build-operator-image-arm-al2023
env:
SPLUNK_ENTERPRISE_IMAGE: ${{ secrets.SPLUNK_ENTERPRISE_IMAGE }}
SPLUNK_OPERATOR_IMAGE_NAME: splunk/splunk-operator
ECR_REPOSITORY: ${{ secrets.ECR_REPOSITORY }}
S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
IMAGE_NAME: ${{ secrets.ECR_REPOSITORY }}/splunk/splunk-operator:${{ github.sha }}
steps:
- name: Set up cosign
uses: sigstore/cosign-installer@main
- uses: actions/checkout@v2
- name: Dotenv Action
id: dotenv
uses: falti/dotenv-action@d4d12eaa0e1dd06d5bdc3d7af3bf4c8c93cb5359
- name: Set up Docker Buildx
uses: docker/[email protected]
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v1
with:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: ${{ secrets.AWS_DEFAULT_REGION }}

- name: Login to Amazon ECR
uses: aws-actions/amazon-ecr-login@v1
- name: Pull Splunk Operator Image Locally
run: |
docker pull ${{ env.IMAGE_NAME }}
- name: Verify Signed Splunk Operator image
run: |
cosign verify --key env://COSIGN_PUBLIC_KEY ${{ env.IMAGE_NAME }}
env:
COSIGN_PUBLIC_KEY: ${{ secrets.COSIGN_PUBLIC_KEY }}
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: '${{ env.IMAGE_NAME }}'
format: sarif
#exit-code: 1
severity: 'CRITICAL'
ignore-unfixed: true
output: 'trivy-results.sarif'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
smoke-tests-arm-al2023:
needs: vulnerability-scan
needs: build-operator-image-arm-al2023
strategy:
fail-fast: false
matrix:
Expand Down
5 changes: 1 addition & 4 deletions .github/workflows/arm-AL2023-int-test-workflow.yml
Original file line number Diff line number Diff line change
@@ -1,9 +1,6 @@
name: Arm AL2023 Integration Test WorkFlow
on:
push:
branches:
- develop
- main
workflow_dispatch:
jobs:
build-operator-image-arm-al2023:
runs-on: ubuntu-latest
Expand Down
59 changes: 2 additions & 57 deletions .github/workflows/arm-Ubuntu-build-test-push-workflow.yml
Original file line number Diff line number Diff line change
@@ -1,9 +1,6 @@
name: Arm Ubuntu Smoke Test WorkFlow
on:
push:
branches:
- develop
- main
workflow_dispatch:
jobs:
check-formating:
runs-on: ubuntu-latest
Expand Down Expand Up @@ -104,60 +101,8 @@ jobs:
env:
COSIGN_PRIVATE_KEY: ${{ secrets.COSIGN_PRIVATE_KEY }}
COSIGN_PASSWORD: ${{ secrets.COSIGN_PASSWORD }}
vulnerability-scan:
permissions:
actions: read
contents: read
security-events: write
runs-on: ubuntu-latest
needs: build-operator-image-arm-ubuntu
env:
SPLUNK_ENTERPRISE_IMAGE: ${{ secrets.SPLUNK_ENTERPRISE_IMAGE }}
SPLUNK_OPERATOR_IMAGE_NAME: splunk/splunk-operator
ECR_REPOSITORY: ${{ secrets.ECR_REPOSITORY }}
S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
IMAGE_NAME: ${{ secrets.ECR_REPOSITORY }}/splunk/splunk-operator:${{ github.sha }}
steps:
- name: Set up cosign
uses: sigstore/cosign-installer@main
- uses: actions/checkout@v2
- name: Dotenv Action
id: dotenv
uses: falti/dotenv-action@d4d12eaa0e1dd06d5bdc3d7af3bf4c8c93cb5359
- name: Set up Docker Buildx
uses: docker/[email protected]
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v1
with:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: ${{ secrets.AWS_DEFAULT_REGION }}

- name: Login to Amazon ECR
uses: aws-actions/amazon-ecr-login@v1
- name: Pull Splunk Operator Image Locally
run: |
docker pull ${{ env.IMAGE_NAME }}
- name: Verify Signed Splunk Operator image
run: |
cosign verify --key env://COSIGN_PUBLIC_KEY ${{ env.IMAGE_NAME }}
env:
COSIGN_PUBLIC_KEY: ${{ secrets.COSIGN_PUBLIC_KEY }}
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: '${{ env.IMAGE_NAME }}'
format: sarif
#exit-code: 1
severity: 'CRITICAL'
ignore-unfixed: true
output: 'trivy-results.sarif'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
smoke-tests-arm-ubuntu:
needs: vulnerability-scan
needs: build-operator-image-arm-ubuntu
strategy:
fail-fast: false
matrix:
Expand Down
5 changes: 1 addition & 4 deletions .github/workflows/arm-Ubuntu-int-test-workflow.yml
Original file line number Diff line number Diff line change
@@ -1,9 +1,6 @@
name: Arm Ubuntu Integration Test WorkFlow Ubuntu
on:
push:
branches:
- develop
- main
workflow_dispatch:
jobs:
build-operator-image-arm-ubuntu:
runs-on: ubuntu-latest
Expand Down
25 changes: 21 additions & 4 deletions .github/workflows/automated-release-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,8 @@ jobs:
contents: write
pull-requests: write
if: github.ref == 'refs/heads/main'
env:
SPLUNK_OPERATOR_RC_IMAGE_NAME: splunk/splunk-operator-rc
steps:
- name: Set up cosign
uses: sigstore/cosign-installer@main
Expand All @@ -34,6 +36,19 @@ jobs:
id: dotenv
uses: falti/dotenv-action@d4d12eaa0e1dd06d5bdc3d7af3bf4c8c93cb5359

- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v4
with:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: us-east-1

- name: Login to Amazon ECR
id: login-ecr-public
uses: aws-actions/amazon-ecr-login@v2
with:
registry-type: public

- name: Setup Go
uses: actions/setup-go@v2
with:
Expand Down Expand Up @@ -82,15 +97,17 @@ jobs:

- name: Pull RC Splunk Operator Image
run: |
docker pull splunk/splunk-operator-rc:${{ github.event.inputs.release_version }}-RC
docker pull ${{ secrets.PUBLIC_ECR_REPOSITORY }}/${{ env.SPLUNK_OPERATOR_RC_IMAGE_NAME }}:${{ github.event.inputs.release_version }}-RC

- name: Promote RC Image to Release
run: |
docker tag splunk/splunk-operator-rc:${{ github.event.inputs.release_version }}-RC splunk/splunk-operator:${{ github.event.inputs.operator_image_tag }}
docker tag ${{ secrets.PUBLIC_ECR_REPOSITORY }}/${{ env.SPLUNK_OPERATOR_RC_IMAGE_NAME }}:${{ github.event.inputs.release_version }}-RC splunk/splunk-operator:${{ github.event.inputs.operator_image_tag }}
docker tag splunk/splunk-operator:${{ github.event.inputs.operator_image_tag }} splunk/splunk-operator:latest

- name: Push Release Image
run: |
docker push splunk/splunk-operator:${{ github.event.inputs.operator_image_tag }}
docker push splunk/splunk-operator:latest

- name: Sign Splunk Operator image with a key
run: |
Expand All @@ -107,11 +124,11 @@ jobs:

- name: Pull Distroless RC Splunk Operator Image
run: |
docker pull splunk/splunk-operator-rc:${{ github.event.inputs.release_version }}-distroless-RC
docker pull ${{ secrets.PUBLIC_ECR_REPOSITORY }}/${{ env.SPLUNK_OPERATOR_RC_IMAGE_NAME }}:${{ github.event.inputs.release_version }}-RC-distroless

- name: Promote Distroless RC Image to Release
run: |
docker tag splunk/splunk-operator-rc:${{ github.event.inputs.release_version }}-distroless-RC splunk/splunk-operator:${{ github.event.inputs.operator_image_tag }}-distroless
docker tag ${{ secrets.PUBLIC_ECR_REPOSITORY }}/${{ env.SPLUNK_OPERATOR_RC_IMAGE_NAME }}:${{ github.event.inputs.release_version }}-RC-distroless splunk/splunk-operator:${{ github.event.inputs.operator_image_tag }}-distroless

- name: Push Distroless Release Image
run: |
Expand Down
40 changes: 6 additions & 34 deletions .github/workflows/build-test-push-workflow.yml
Original file line number Diff line number Diff line change
@@ -1,5 +1,10 @@
name: Build and Test
on: push
on:
pull_request: {}
push:
branches:
- main
- develop
jobs:
check-formating:
runs-on: ubuntu-latest
Expand Down Expand Up @@ -303,36 +308,3 @@ jobs:
# name: Integration Tests # Name of the check run which will be created
# path: inttest-*.xml # Path to test results
# reporter: jest-junit # Format of test results
push-latest:
needs: smoke-tests
if: github.ref == 'refs/heads/main'
runs-on: ubuntu-latest
env:
SPLUNK_OPERATOR_IMAGE_NAME: splunk/splunk-operator
TAG: latest
steps:
- name: Checkout Code
uses: actions/checkout@v2
- name: Dotenv Action
id: dotenv
uses: falti/dotenv-action@d4d12eaa0e1dd06d5bdc3d7af3bf4c8c93cb5359
- name: Set up Docker Buildx
uses: docker/[email protected]
- name: Configure Docker Hub credentials
uses: docker/login-action@v1
with:
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_PUSH_TOKEN}}
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v1
with:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: ${{ secrets.AWS_DEFAULT_REGION }}
- name: Login to Amazon ECR
uses: aws-actions/amazon-ecr-login@v1
- name: Re-tag Splunk Operator Image
run: |
docker tag ${{ secrets.ECR_REPOSITORY }}/${{ env.SPLUNK_OPERATOR_IMAGE_NAME }}:$GITHUB_SHA ${{ env.SPLUNK_OPERATOR_IMAGE_NAME }}:${{ env.TAG }}
- name: Push Splunk Operator Image to Docker Hub
run: docker push ${{ env.SPLUNK_OPERATOR_IMAGE_NAME }}:${{ env.TAG }}
Loading
Loading