Skip to content

Latest commit

 

History

History
 
 

releasing

Releasing

This document describes how to perform a semver release of one of the several Go modules in this repository.

In this repo, releasing a module is accomplished by applying a tag to the repo and pushing it upstream. A minor release branch is also created as necessary to track patch releases.

A properly formatted tag (described below) contains the module name and version.

Pushing the tag upstream will trigger GitHub Actions to build a release and make it available on the release page. GitHub Actions reads its instructions from the release.yaml file in .github/workflows directory.

And, container image contains kustomize binary will build Google Cloud Build that instructions from cloudbuild_kustomize_image.yaml file triggered by tags contain kustomize and release versions.

We use a Go program to make the tagging and branch creation process less error prone.

See this multi-module repo tagging discussion for an explanation of the path-like portion of these tags.

semver review

Go's semver-compatible version tags take the form v{major}.{minor}.{patch}:

major minor patch
API change enhancements bug fixes
manual update maybe auto-update auto-update encouraged
  • If there are only bug fixes or refactors, increment patch from whatever it is now.
  • If there are new features, increment minor.
  • If there's an API change (either the Go API or the CLI behavior with respect to CLI arguments and flags), increment major.

Release sequence

The dependencies determine the release order:

module depends on
sigs.k8s.io/kustomize/kyaml no local dependencies
sigs.k8s.io/kustomize/cmd/config kyaml,
sigs.k8s.io/kustomize/api kyaml
sigs.k8s.io/kustomize/kustomize cmd/config, api

Thus, do kyaml first, then cmd/config, etc.

⚠️ IMPORTANT: The full release sequence should always be completed unless there is a really compelling reason not to AND the new release is fully backwards compatible with the latest released versions of our modules that depend on it (this is not detected by our CI, as we develop against the head versions of all modules). If we end up with a situation where the latest kyaml is not compatible with the latest api, for example, it causes end user confusion, particularly when automation attempts to upgrade kyaml for them.

Prep work

⚠️ IMPORTANT: Check for release-blocking issues

We use the release-blocker tag to track issues that need to be solved before the next release. Typically, this would be a new regression introduced on the master branch and not present in the previous release. If any such issues exist, the release should be delayed.

It is also a good idea to scan any untriaged issues for potential blockers we haven't labelled yet before proceeding.

Consider fetching new OpenAPI data

Ideally, Kustomize's embedded openapi data would cover a wide range of Kubernetes releases. But today, we only embed a specific version. This means updating that version can be disruptive to people who still use older Kubernetes versions and depend on API versions that were removed in later releases. However, by remaining out of date, we will not support GVKs introduced in more recent releases. So far, we have leaned in favour of the older versions, because some removed GVs are for very popular APIs. This should be constantly reevaluated until a better solution is in place. See issue kubernetes-sigs#5016.

The Kubernetes OpenAPI data changes no more frequently than once per quarter. You can check the current builtin versions that kustomize is using with the following command.

kustomize openapi info

Instructions on how to get a new OpenAPI sample can be found in the OpenAPI Readme.

Set up the release tools

Prepare your source directory

The release scripts expect Kustomize code to be cloned at a path ending in sigs.k8s.io/kustomize. Run all commands from that directory unless otherwise specified.

Load some helper functions

source releasing/helpers.sh

Install the release tool

( cd cmd/gorepomod; go install . )

Authenticate to github using gh (version 1.8.1 or higher).

gh auth login

Release kyaml

Establish clean state

refreshMaster &&
testKustomizeRepo

While you're waiting for the tests, review the commit log:

releasing/compile-changelog.sh kyaml HEAD

Based on the changes to be included in this release, decide whether a patch, minor or major version bump is needed: semver review.

kyaml has no intra-repo deps, so if the tests pass, it can just be released.

Release it

The default increment is a new patch version.

gorepomod release kyaml [patch|minor|major] --doIt

Note the version:

versionKyaml=v0.10.20   # EDIT THIS!

See the process of the build history of GitHub Actions job.

Undraft the release on the kustomize repo release page:

  • Make sure the version number is what you expect.
  • Remove references to commits that aren't relevant to end users of this module (e.g. test commits, refactors).
  • Make sure each commit left in the release notes includes a PR reference.

Release cmd/config

Pin to the most recent kyaml

gorepomod pin kyaml --doIt

Create the PR:

createBranch pinToKyaml "Update kyaml to $versionKyaml"
createPr

Review the resulting PR and get a collaborator to LGTM. Wait for CI to pass.

Once the PR merges, get back on master and do paranoia test:

refreshMaster &&
testKustomizeRepo

While you're waiting for the tests, review the commit log:

releasing/compile-changelog.sh cmd/config HEAD

Based on the changes to be included in this release, decide whether a patch, minor or major version bump is needed: semver review.

Release it

gorepomod release cmd/config [patch|minor|major] --doIt

Note the version:

versionCmdConfig=v0.9.12 # EDIT THIS!

See the process of the build history of GitHub Actions job.

Undraft the release on the kustomize repo release page:

  • Make sure the version number is what you expect.
  • Remove references to commits that aren't relevant to end users of this module (e.g. test commits, refactors).
  • Make sure each commit left in the release notes includes a PR reference.

Release api

This is the kustomize API, used by the kustomize CLI.

Pin to the new cmd/config

gorepomod pin cmd/config --doIt

Create the PR:

createBranch pinToCmdConfig "Update cmd/config to $versionCmdConfig" &&
createPr

Review the resulting PR and get a collaborator to LGTM. Wait for CI to pass.

Once the PR merges, get back on master and do paranoia test:

refreshMaster &&
testKustomizeRepo

While you're waiting for the tests, review the commit log:

releasing/compile-changelog.sh api HEAD

Based on the changes to be included in this release, decide whether a patch, minor or major version bump is needed: semver review.

Release it

gorepomod release api [patch|minor|major] --doIt

Note the version:

versionApi=v0.8.10 # EDIT THIS!

See the process of the build history of GitHub Actions job.

Undraft the release on the kustomize repo release page:

  • Make sure the version number is what you expect.
  • Remove references to commits that aren't relevant to end users of this module (e.g. test commits, refactors).
  • Make sure each commit left in the release notes includes a PR reference.

Release the kustomize CLI

For major releases: increment the module version

Update module sigs.k8s.io/kustomize/kustomize/vX in kustomize/go.mod to the version you're about to release, and then update all the require statements across the module to match.

Search for uses of the version number across the codebase and update them as needed.

Example: kubernetes-sigs#5021

Pin to the new API

gorepomod pin api --doIt

Create the PR:

createBranch pinToApi "Update api to $versionApi" &&
createPr

Review the resulting PR and get a collaborator to LGTM. Wait for CI to pass.

Once the PR merges, get back on master and do paranoia test:

refreshMaster &&
testKustomizeRepo

While you're waiting for the tests, review the commit log:

releasing/compile-changelog.sh kustomize HEAD

Based on the changes to be included in this release, decide whether a patch, minor or major version bump is needed: semver review.

Release it

gorepomod release kustomize [patch|minor|major] --doIt

See the process of the build history of GitHub Actions job.

And check the process of the build status for container image.

Undraft the release on the kustomize repo release page:

  • Make sure the version number is what you expect.
  • Remove references to commits that aren't relevant to end users of the CLI (e.g. test commits, refactors, changes that only surface in Go).
  • Make sure each commit left in the release notes includes a PR reference.

Confirm the kustomize binary is correct

  • Follow the installation instructions to install your new release and make sure it reports the expected version number.

    If not, something is very wrong.

  • Visit the release page and edit the release notes as desired.

Return the repo to development mode

Go back into development mode, where all modules depend on in-repo code:

gorepomod unpin api         --doIt &&
gorepomod unpin cmd/config  --doIt &&
gorepomod unpin kyaml       --doIt

Edit the prow-presubmit-target in the Makefile to test examples against your new release. For example:

sed -i "" "s/LATEST_RELEASE=.*/LATEST_RELEASE=v5.0.0/" Makefile

Create the PR:

createBranch unpinEverything "Back to development mode; unpin the modules" &&
createPr

Review the resulting PR and get a collaborator to LGTM. Wait for CI to pass.

Once the PR merges, get back on master and do paranoia test:

refreshMaster &&
testKustomizeRepo

Publish Official Docker Image

Fork and clone the k8s.io repo.

Checkout a new branch.

Edit file registry.k8s.io/images/k8s-staging-kustomize/images.yaml to add the new kustomize version and the image sha256.

Image sha256 can be found in the image registry in the GCP project k8s-staging-kustomize.

Commit and push your changes. Then create a PR to k8s.io to promote the new image.

Update kustomize-in-kubectl

To update the version of kustomize shipped with kubectl, first fork and clone the kubernetes/kubernetes repo.

In the root of the kubernetes/kubernetes repo, run the following command:

./hack/update-kustomize.sh

When prompted, review the list of suggested module versions and make sure it matches the versions used in the latest kustomize release. If kyaml, cmd/config or api has been released more recently than kustomize/v4, do not use the more recent version.

If code used by the kustomize attachment points has changed, kubectl will fail to compile and you will need to update them. The code you'll need to change is likely in the staging/src/k8s.io/cli-runtime/pkg/resource and/or staging/src/k8s.io/kubectl/pkg/cmd/kustomize packages.

Here are some example PRs:

kubernetes/kubernetes#103419

kubernetes/kubernetes#106389

Testing changes to the release pipeline

You can test the release script locally by running create-release.sh. See each of those files for more details on their usage.