From f0f1e85234f550942edaadb652d866a2f5caa1c2 Mon Sep 17 00:00:00 2001 From: Nick Larsen Date: Fri, 18 Jul 2025 14:19:00 +0200 Subject: [PATCH] chore: Release 25.7.0-rc1 Signed-off-by: Nick Larsen --- CHANGELOG.md | 2 ++ Cargo.lock | 10 +++++----- Cargo.nix | 10 +++++----- Cargo.toml | 2 +- deploy/helm/secret-operator/Chart.yaml | 4 ++-- deploy/helm/secret-operator/crds/crds.yaml | 16 ++++++++-------- docs/antora.yml | 3 ++- tests/release.yaml | 6 +++--- 8 files changed, 28 insertions(+), 25 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 137221e1..582bd5fe 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,6 +4,8 @@ All notable changes to this project will be documented in this file. ## [Unreleased] +## [25.7.0-rc1] - 2025-07-18 + ### Added - Add format-specific annotations to override secret file names ([#572]). The following new diff --git a/Cargo.lock b/Cargo.lock index ba584e04..6ad3c0b6 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -2146,7 +2146,7 @@ checksum = "b15813163c1d831bf4a13c3610c05c0d03b39feb07f7e09fa234dac9b15aaf39" [[package]] name = "p12" -version = "0.0.0-dev" +version = "25.7.0-rc1" dependencies = [ "cbc", "cipher", @@ -2995,7 +2995,7 @@ checksum = "a8f112729512f8e442d81f95a8a7ddf2b7c6b8a1a6f509a95864142b30cab2d3" [[package]] name = "stackable-krb5-provision-keytab" -version = "0.0.0-dev" +version = "25.7.0-rc1" dependencies = [ "byteorder", "futures 0.3.31", @@ -3065,7 +3065,7 @@ dependencies = [ [[package]] name = "stackable-secret-operator" -version = "0.0.0-dev" +version = "25.7.0-rc1" dependencies = [ "anyhow", "async-trait", @@ -3106,7 +3106,7 @@ dependencies = [ [[package]] name = "stackable-secret-operator-crd-utils" -version = "0.0.0-dev" +version = "25.7.0-rc1" dependencies = [ "serde", "stackable-operator", @@ -3114,7 +3114,7 @@ dependencies = [ [[package]] name = "stackable-secret-operator-olm-deployer" -version = "0.0.0-dev" +version = "25.7.0-rc1" dependencies = [ "anyhow", "built", diff --git a/Cargo.nix b/Cargo.nix index 6de33101..15206d58 100644 --- a/Cargo.nix +++ b/Cargo.nix @@ -7036,7 +7036,7 @@ rec { }; "p12" = rec { crateName = "p12"; - version = "0.0.0-dev"; + version = "25.7.0-rc1"; edition = "2021"; src = lib.cleanSourceWith { filter = sourceFilter; src = ./rust/p12; }; authors = [ @@ -9748,7 +9748,7 @@ rec { }; "stackable-krb5-provision-keytab" = rec { crateName = "stackable-krb5-provision-keytab"; - version = "0.0.0-dev"; + version = "25.7.0-rc1"; edition = "2021"; crateBin = [ { @@ -10032,7 +10032,7 @@ rec { }; "stackable-secret-operator" = rec { crateName = "stackable-secret-operator"; - version = "0.0.0-dev"; + version = "25.7.0-rc1"; edition = "2021"; crateBin = [ { @@ -10207,7 +10207,7 @@ rec { }; "stackable-secret-operator-crd-utils" = rec { crateName = "stackable-secret-operator-crd-utils"; - version = "0.0.0-dev"; + version = "25.7.0-rc1"; edition = "2021"; src = lib.cleanSourceWith { filter = sourceFilter; src = ./rust/crd-utils; }; libName = "stackable_secret_operator_crd_utils"; @@ -10230,7 +10230,7 @@ rec { }; "stackable-secret-operator-olm-deployer" = rec { crateName = "stackable-secret-operator-olm-deployer"; - version = "0.0.0-dev"; + version = "25.7.0-rc1"; edition = "2021"; crateBin = [ { diff --git a/Cargo.toml b/Cargo.toml index 90cf9d76..3c0ab154 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -4,7 +4,7 @@ default-members = ["rust/operator-binary"] resolver = "2" [workspace.package] -version = "0.0.0-dev" +version = "25.7.0-rc1" authors = ["Stackable GmbH "] license = "OSL-3.0" edition = "2021" diff --git a/deploy/helm/secret-operator/Chart.yaml b/deploy/helm/secret-operator/Chart.yaml index 921bb49b..425d29fa 100644 --- a/deploy/helm/secret-operator/Chart.yaml +++ b/deploy/helm/secret-operator/Chart.yaml @@ -1,8 +1,8 @@ --- apiVersion: v2 name: secret-operator -version: "0.0.0-dev" -appVersion: "0.0.0-dev" +version: "25.7.0-rc1" +appVersion: "25.7.0-rc1" description: The Stackable Operator for Stackable Secret Operator home: https://github.com/stackabletech/secret-operator maintainers: diff --git a/deploy/helm/secret-operator/crds/crds.yaml b/deploy/helm/secret-operator/crds/crds.yaml index f04a9b8f..30b16aa0 100644 --- a/deploy/helm/secret-operator/crds/crds.yaml +++ b/deploy/helm/secret-operator/crds/crds.yaml @@ -22,10 +22,10 @@ spec: description: Auto-generated derived type for SecretClassSpec via `CustomResource` properties: spec: - description: A [SecretClass](https://docs.stackable.tech/home/nightly/secret-operator/secretclass) is a cluster-global Kubernetes resource that defines a category of secrets that the Secret Operator knows how to provision. + description: A [SecretClass](https://docs.stackable.tech/home/25.7/secret-operator/secretclass) is a cluster-global Kubernetes resource that defines a category of secrets that the Secret Operator knows how to provision. properties: backend: - description: Each SecretClass is associated with a single [backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend), which dictates the mechanism for issuing that kind of Secret. + description: Each SecretClass is associated with a single [backend](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#backend), which dictates the mechanism for issuing that kind of Secret. oneOf: - required: - k8sSearch @@ -38,7 +38,7 @@ spec: properties: autoTls: description: |- - The [`autoTls` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-autotls) issues a TLS certificate signed by the Secret Operator. The certificate authority can be provided by the administrator, or managed automatically by the Secret Operator. + The [`autoTls` backend](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#backend-autotls) issues a TLS certificate signed by the Secret Operator. The certificate authority can be provided by the administrator, or managed automatically by the Secret Operator. A new certificate and key pair will be generated and signed for each Pod, keys or certificates are never reused. properties: @@ -147,7 +147,7 @@ spec: A new certificate will be requested the first time it is used by a Pod, it will be reused after that (subject to cert-manager renewal rules). - [1]: https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-certmanager + [1]: https://docs.stackable.tech/home/25.7/secret-operator/secretclass#backend-certmanager properties: defaultCertificateLifetime: default: 1d @@ -201,7 +201,7 @@ spec: - issuer type: object k8sSearch: - description: The [`k8sSearch` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-k8ssearch) can be used to mount Secrets across namespaces into Pods. + description: The [`k8sSearch` backend](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#backend-k8ssearch) can be used to mount Secrets across namespaces into Pods. properties: searchNamespace: description: Configures the namespace searched for Secret objects. @@ -231,7 +231,7 @@ spec: - searchNamespace type: object kerberosKeytab: - description: The [`kerberosKeytab` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-kerberoskeytab) creates a Kerberos keytab file for a selected realm. The Kerberos KDC and administrator credentials must be provided by the administrator. + description: The [`kerberosKeytab` backend](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#backend-kerberoskeytab) creates a Kerberos keytab file for a selected realm. The Kerberos KDC and administrator credentials must be provided by the administrator. properties: admin: description: Kerberos admin configuration settings. @@ -380,12 +380,12 @@ spec: properties: spec: description: |- - A [TrustStore](https://docs.stackable.tech/home/nightly/secret-operator/truststore) requests information about how to validate secrets issued by a [SecretClass](https://docs.stackable.tech/home/nightly/secret-operator/secretclass). + A [TrustStore](https://docs.stackable.tech/home/25.7/secret-operator/truststore) requests information about how to validate secrets issued by a [SecretClass](https://docs.stackable.tech/home/25.7/secret-operator/secretclass). The requested information is written to a ConfigMap with the same name as the TrustStore. properties: format: - description: The [format](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#format) that the data should be converted into. + description: The [format](https://docs.stackable.tech/home/25.7/secret-operator/secretclass#format) that the data should be converted into. enum: - tls-pem - tls-pkcs12 diff --git a/docs/antora.yml b/docs/antora.yml index d522680b..35013e93 100644 --- a/docs/antora.yml +++ b/docs/antora.yml @@ -1,3 +1,4 @@ --- name: home -version: "nightly" +version: "25.7" +prerelease: false diff --git a/tests/release.yaml b/tests/release.yaml index ef1ad6e5..80d2ede4 100644 --- a/tests/release.yaml +++ b/tests/release.yaml @@ -7,8 +7,8 @@ releases: description: Integration test products: commons: - operatorVersion: 0.0.0-dev + operatorVersion: 25.7.0-rc1 secret: - operatorVersion: 0.0.0-dev + operatorVersion: 25.7.0-rc1 listener: - operatorVersion: 0.0.0-dev + operatorVersion: 25.7.0-rc1