Skip to content

Commit 2cbd0a4

Browse files
authored
Release artifacts for release v1.4.1 (#259)
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
1 parent 0e3b7d8 commit 2cbd0a4

File tree

5 files changed

+8
-6
lines changed

5 files changed

+8
-6
lines changed

config/controller/kustomization.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ kind: Kustomization
66
images:
77
- name: controller
88
newName: public.ecr.aws/aws-controllers-k8s/ec2-controller
9-
newTag: 1.4.0
9+
newTag: 1.4.1

helm/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
apiVersion: v1
22
name: ec2-chart
33
description: A Helm chart for the ACK service controller for Amazon Elastic Cloud Compute (EC2)
4-
version: 1.4.0
5-
appVersion: 1.4.0
4+
version: 1.4.1
5+
appVersion: 1.4.1
66
home: https://github.com/aws-controllers-k8s/ec2-controller
77
icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
88
sources:

helm/templates/NOTES.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{{ .Chart.Name }} has been installed.
2-
This chart deploys "public.ecr.aws/aws-controllers-k8s/ec2-controller:1.4.0".
2+
This chart deploys "public.ecr.aws/aws-controllers-k8s/ec2-controller:1.4.1".
33

44
Check its status by running:
55
kubectl --namespace {{ .Release.Namespace }} get pods -l "app.kubernetes.io/instance={{ .Release.Name }}"

helm/values.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
image:
66
repository: public.ecr.aws/aws-controllers-k8s/ec2-controller
7-
tag: 1.4.0
7+
tag: 1.4.1
88
pullPolicy: IfNotPresent
99
pullSecrets: []
1010

test/e2e/tests/test_vpc.py

+3-1
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,7 @@ def test_crud_tags(self, ec2_client, simple_vpc):
230230
resource = k8s.get_resource(ref)
231231
assert len(resource["spec"]["tags"]) == 0
232232

233+
k8s.wait_on_condition(ref, "ACK.ResourceSynced", "True", wait_periods=5)
233234
# Delete k8s resource
234235
_, deleted = k8s.delete_custom_resource(ref)
235236
assert deleted is True
@@ -282,7 +283,7 @@ def test_update_disallow_default_security_group_rule(self, ec2_client, simple_vp
282283
}
283284
k8s.patch_custom_resource(ref, updates)
284285
time.sleep(MODIFY_WAIT_AFTER_SECONDS)
285-
286+
k8s.wait_on_condition(ref, "ACK.ResourceSynced", "True", wait_periods=5)
286287
# Make sure default security group rule is deleted
287288
assert not contains_default_sg_rule(ec2_client, resource_id)
288289

@@ -480,6 +481,7 @@ def test_vpc_updation_multiple_cidr(self,ec2_client):
480481
k8s.patch_custom_resource(ref, updates)
481482
time.sleep(MODIFY_WAIT_AFTER_SECONDS)
482483

484+
k8s.wait_on_condition(ref, "ACK.ResourceSynced", "True", wait_periods=5)
483485
# Re-Validate CIDR Blocks State
484486
vpc = ec2_validator.get_vpc(resource_id)
485487
assert vpc['CidrBlockAssociationSet'][0]['CidrBlockState']['State'] == "associated"

0 commit comments

Comments
 (0)