sigs.k8s.io/cluster-api-provider-azure@v1.14.3/docs/book/src/developers/releasing.md (about) 1 # CAPZ Releases 2 3 ## Release Cadence 4 5 CAPZ minor versions (that is, 1.**5**.0 versus 1.**4**.x) are typically released every two months. In order to be practical and flexible, we will consider a more rapid minor release (for example, earlier than two months following the latest minor release) if any of the following conditions are true: 6 7 - Significant set of well-tested features introduced since the last release. 8 - The guiding principle here is to avoid minor releases that introduce excess feature changes, to aid release testing and validation, and to allow users the option of adopting fewer changes when upgrading. 9 - User demand for rapid adoption of a specific feature or feature. 10 11 Additionally, we will consider delaying a minor release if no significant features have landed during the normal two-month release cycle. 12 13 CAPZ patch versions (for example, 1.5.**2** versus 1.5.**1**) are released as often as weekly. Each week at the open office hours meeting, maintainers decide whether or not a patch release is called for based on community input. A patch release may bypass this cadence if circumstances warrant. 14 15 ## Release Support 16 17 The two most recent minor releases of CAPZ will be supported with bug fixes. Assuming minor releases arrive every two months on average, each minor release will receive fixes for four months. 18 19 For example, let's assume CAPZ v1.4.2 is the current release, and v1.3.2 is the latest in the previous minor release line. When v1.5.0 is released, it becomes the current release. v1.4.2 becomes the previous release line and remains supported. And v1.3.2 reaches end-of-life and no longer receives support through bug fixes. 20 21 Note that "support" in this context refers strictly to whether or not bug fixes are backported to a release line. Please see [the support documentation](https://github.com/kubernetes-sigs/cluster-api-provider-azure/blob/main/SUPPORT.md) for more general information about how to get help with CAPZ. 22 23 ### Bug Fixes and Test Improvements 24 25 Any significant user-facing bug fix that lands in the `main` branch should be backported to the current and previous release lines. Security-related fixes are automatically considered significant and user-facing. 26 27 Improvements or significant changes to tests should be backported to the current release line. This is intended to minimize friction in the event of a critical test fix. Test improvements or changes may sometimes need to be backported to the previous release line in the event that tests break on all release branches. 28 29 ### Experimental API Changes 30 31 Experimental Cluster API features (for example, `AzureManagedCluster`) may evolve more rapidly than graduated v1 features. CAPZ allows general changes, enhancements, or additions in this area to be cherry-picked into the current release branch for inclusion in patch releases. This will accelerate the effort to graduate experimental features to the stable API by allowing faster adoption and iteration. 32 33 Breaking changes are also allowed in experimental APIs; those changes will not be included in a patch release, but will be introduced in a new minor release, with appropriate release notes. 34 35 ### Timing of Merges 36 37 Sometimes pull requests touch a large number of files and are more likely to create challenges for the automated cherry-pick process. In such cases, maintainers may prefer to delay merging such changes until the end of a minor release cycle. 38 39 ## Release Process 40 41 ### Update main metadata.yaml (skip for patch releases) 42 43 - Make sure the [metadata.yaml](https://github.com/kubernetes-sigs/cluster-api-provider-azure/blob/main/metadata.yaml) file in the root of the project is up to date and contains the new release with the correct cluster-api contract version. 44 - If not, open a [PR](https://github.com/kubernetes-sigs/cluster-api-provider-azure/pull/1928) to add it. 45 46 This must be done prior to generating release artifacts, so the release contains the correct metadata information for `clusterctl` to use. 47 48 ### Change milestone (skip for patch releases) 49 50 - Create a [new GitHub milestone](https://github.com/kubernetes-sigs/cluster-api-provider-azure/milestones/new) for the next release. This requires specific write permissions to the project and must be done by a maintainer. 51 - Change the milestone applier so new changes can be applied to the appropriate release. 52 - Open a PR in https://github.com/kubernetes/test-infra to change [this line](https://github.com/kubernetes/test-infra/blob/25db54eb9d52e08c16b3601726d8f154f8741025/config/prow/plugins.yaml#L344). 53 - See an [example PR](https://github.com/kubernetes/test-infra/pull/16827). 54 55 ### Update test provider versions (skip for patch releases) 56 57 This can be done in parallel with release publishing and does not impact the release or its artifacts. 58 59 #### Update test metadata.yaml 60 61 Using that same next release version used to create a new milestone, update the the CAPZ provider [metadata.yaml](https://github.com/kubernetes-sigs/cluster-api-provider-azure/blob/main/test/e2e/data/shared/v1beta1_provider/metadata.yaml) that we use to run PR and periodic cluster E2E tests against the main branch templates. (This `metadata.yaml` is in the `test/e2e/data/shared/v1beta1_provider` directory; it's not the one in the project's root that we edited earlier.) 62 63 For example, if the latest stable API version of CAPZ that we run E2E tests against is `v1beta`, and we're releasing `v1.12.0`, and our next release version is `v1.13.0`, then we want to ensure that the `metadata.yaml` defines a contract between `v1.13.0` and `v1beta1`: 64 65 ```yaml 66 apiVersion: clusterctl.cluster.x-k8s.io/v1alpha3 67 releaseSeries: 68 - major: 1 69 minor: 11 70 contract: v1beta1 71 - major: 1 72 minor: 12 73 contract: v1beta1 74 - major: 1 75 minor: 13 76 contract: v1beta1 77 ``` 78 79 Additionally, we need to update the `type: InfrastructureProvider` spec in [azure-dev.yaml](https://github.com/kubernetes-sigs/cluster-api-provider-azure/blob/main/test/e2e/config/azure-dev.yaml) to express that our intent is to test (using the above example) `1.13`. By convention we use a sentinel patch version "99" to express "any patch version". In this example we want to look for the `type: InfrastructureProvider` with a `name` value of `v1.12.99` and update it to `v1.13.99`: 80 81 ```yaml 82 - name: v1.13.99 # "vNext"; use manifests from local source files 83 ``` 84 85 #### Update clusterctl API version upgrade tests 86 87 Update the [API version upgrade tests](https://github.com/kubernetes-sigs/cluster-api-provider-azure/blob/v1.12.1/test/e2e/capi_test.go#L214) to use the oldest supported release versions of CAPI and CAPZ after the release is cut as "Init" provider versions. See [this PR](https://github.com/kubernetes-sigs/cluster-api-provider-azure/pull/4433) for more details. 88 89 ### Open a PR for release notes 90 91 1. If you don't have a GitHub token, create one by going to your GitHub settings, in [Personal access tokens](https://github.com/settings/tokens). Make sure you give the token the `repo` scope. 92 93 1. Fetch the latest changes from upstream and check out the `main` branch: 94 95 ```sh 96 git fetch upstream 97 git checkout main 98 ``` 99 100 1. Generate release notes by running the following commands on the `main` branch: 101 102 ```sh 103 export GITHUB_TOKEN=<your GH token> 104 export RELEASE_TAG=v1.2.3 # change this to the tag of the release to be cut 105 make release-notes 106 ``` 107 108 1. Review the release notes file generated at `CHANGELOG/<RELEASE_TAG>.md` and make any necessary changes: 109 110 - Move items out of "Uncategorized" into an appropriate section. 111 - Change anything attributed to "k8s-cherrypick-robot" to credit the original author. 112 - Fix any typos or other errors. 113 114 1. Open a pull request against the `main` branch with the release notes. 115 116 <aside class="note warning"> 117 <h1> Note </h1> 118 The commit should contain only a single release notes file and nothing else. Otherwise, automation will not work. 119 </aside> 120 121 Merging the PR will automatically trigger a [Github Action](https://github.com/kubernetes-sigs/cluster-api-provider-azure/actions) to create a release branch (if needed), push a tag, and publish a draft release. 122 123 ### Promote image to prod repo 124 125 - Images are built by the [post push images job](https://testgrid.k8s.io/sig-cluster-lifecycle-cluster-api-provider-azure#post-cluster-api-provider-azure-push-images). This will push the image to a [staging repository][staging-repository]. 126 - Wait for the above job to complete for the tag commit and for the image to exist in the staging directory, then create a PR to promote the image and tag. Assuming you're on the `main` branch and that `$RELEASE_TAG` is still set in your environment: 127 - `make promote-images` 128 129 This will automatically create a PR in [k8s.io](https://github.com/kubernetes/k8s.io) and assign the CAPZ maintainers. (See an [example PR](https://github.com/kubernetes/k8s.io/pull/4284).) 130 131 <aside class="note warning"> 132 <h1> Note </h1> 133 <code class="hjls">make promote-images</code> assumes your git remote entries are using <code class="hjls">https://</code> URLs. Using <code class="hjls">git@</code> URLs will cause the command to fail. 134 </aside> 135 136 For reviewers of the above-created PR, to confirm that the resultant image SHA-to-tag addition is valid, you can check against the [staging repository][staging-repository]. 137 138 Using [the above example PR](https://github.com/kubernetes/k8s.io/pull/4284), to verify that the image identified by SHA `d0636fad7f4ced58b5385615a53b7cb2053f79c4788bd299e0ac9e46a25b5053` has the expected `v1.4.3`, tag, you would inspect the image metadata by viewing it in the Google Container Registry UI: 139 140 - https://console.cloud.google.com/gcr/images/k8s-staging-cluster-api-azure/global/cluster-api-azure-controller@sha256:d0636fad7f4ced58b5385615a53b7cb2053f79c4788bd299e0ac9e46a25b5053 141 142 ### Release in GitHub 143 144 - Proofread the GitHub release content and fix any remaining errors. (This is copied from the release notes generated earlier.) If you made changes, save it as a draft–don't publish it yet. 145 - Ensure that the promoted release image is live: 146 147 ```sh 148 docker pull registry.k8s.io/cluster-api-azure/cluster-api-azure-controller:${RELEASE_TAG} 149 ``` 150 151 Don't move on to the next step until the above command succeeds. 152 153 - Publish the release in GitHub. Check `Set as the latest release` if appropriate. (This requires specific write permissions to the project and must be done by a maintainer.) 154 - [Announce][release-announcement] the new release. 155 156 ### Versioning 157 158 cluster-api-provider-azure follows the [semantic versionining][semver] specification. 159 160 Example versions: 161 162 - Pre-release: `v0.1.1-alpha.1` 163 - Minor release: `v0.1.0` 164 - Patch release: `v0.1.1` 165 - Major release: `v1.0.0` 166 167 ### Expected artifacts 168 169 1. A release yaml file `infrastructure-components.yaml` containing the resources needed to deploy to Kubernetes 170 2. A `cluster-templates.yaml` for each supported flavor 171 3. A `metadata.yaml` which maps release series to cluster-api contract version 172 4. Release notes 173 174 ### Update Upstream Tests (skip for patch releases) 175 176 For major and minor releases we will need to update the set of capz-dependent `test-infra` jobs so that they use our latest release branch. For example, if we cut a new `1.3.0` minor release, from a newly created `release-1.3` git branch, then we need to update all test jobs to use capz at `release-1.3` instead of `release-1.2`. 177 178 Here is a reference PR that applied the required test job changes following the `1.3.0` minor release described above: 179 180 - [Reference test-infra PR](https://github.com/kubernetes/test-infra/pull/26200) 181 182 ### Update Netlify branch (skip for patch releases) 183 184 Go to [the Netlify branches and deploy contexts in site settings](https://app.netlify.com/sites/kubernetes-sigs-cluster-api-provider-azure/settings/deploys#branches-and-deploy-contexts) and click "edit settings". Update the "Production branch" to the new release branch and click "Save". The, go to the [Netlify site deploys](https://app.netlify.com/sites/kubernetes-sigs-cluster-api-provider-azure/deploys) and trigger a new deploy. 185 186  187 188 Note: this step requires access to the Netlify site. If you don't have access, please ask a maintainer to update the branch. 189 190 ### Communication 191 192 #### Roadmap 193 194 Consider whether anything should be updated in the [roadmap document](../roadmap.md) by answering the following questions: 195 1. Have any of the Epics listed been entirely or largely achieved? If so, then the Epic should likely be removed and highlighted during the release communications. 196 2. Are there any new Epics we want to highlight? If so, then consider opening a PR to add them and bringing them up in the next office hours planning meeting with the milestone review. 197 3. Have any updates to the roadmap document occurred in the past 6 months? If not, it should be updated in some form. 198 199 If any changes need to be made, it should not block the release itself. 200 201 #### Patch Releases 202 203 1. Announce the release in Kubernetes Slack on the [#cluster-api-azure](https://kubernetes.slack.com/archives/CEX9HENG7) channel. 204 205 #### Minor/Major Releases 206 207 1. Follow the communications process for [pre-releases](#pre-releases) 208 2. An announcement email is sent to `kubernetes-sig-azure@googlegroups.com` and `kubernetes-sig-cluster-lifecycle@googlegroups.com` with the subject `[ANNOUNCE] cluster-api-provider-azure <version> has been released` 209 210 [release-announcement]: #communication 211 [semver]: https://semver.org/#semantic-versioning-200 212 [template]: /docs/release-notes-template.md 213 [versioning]: #versioning 214 [staging-repository]: https://console.cloud.google.com/gcr/images/k8s-staging-cluster-api-azure/GLOBAL/cluster-api-azure-controller?rImageListsize=30