Skip to content

Commit 940efc7

Browse files
authored
cut v2.5.3 release (#3255)
1 parent e34378d commit 940efc7

File tree

10 files changed

+23
-23
lines changed

10 files changed

+23
-23
lines changed

.ko.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
defaultBaseImage: public.ecr.aws/eks-distro-build-tooling/eks-distro-minimal-base-nonroot:2023-02-22-1677092456.2
1+
defaultBaseImage: public.ecr.aws/eks-distro-build-tooling/eks-distro-minimal-base-nonroot:2023-06-06-1686078098.2
22
builds:
33
- env:
44
- CGO_ENABLED=0

Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
MAKEFILE_PATH = $(dir $(realpath -s $(firstword $(MAKEFILE_LIST))))
33

44
# Image URL to use all building/pushing image targets
5-
IMG ?= public.ecr.aws/eks/aws-load-balancer-controller:v2.5.2
5+
IMG ?= public.ecr.aws/eks/aws-load-balancer-controller:v2.5.3
66
# Image URL to use for builder stage in Docker build
77
BUILD_IMAGE ?= public.ecr.aws/docker/library/golang:1.20.5
88
# Image URL to use for base layer in Docker build
9-
BASE_IMAGE ?= public.ecr.aws/eks-distro-build-tooling/eks-distro-minimal-base-nonroot:2023-02-22-1677092456.2
9+
BASE_IMAGE ?= public.ecr.aws/eks-distro-build-tooling/eks-distro-minimal-base-nonroot:2023-06-06-1686078098.2
1010
IMG_PLATFORM ?= linux/amd64,linux/arm64
1111
# ECR doesn't appear to support SPDX SBOM
1212
IMG_SBOM ?= none

config/controller/kustomization.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@ kind: Kustomization
99
images:
1010
- name: controller
1111
newName: public.ecr.aws/eks/aws-load-balancer-controller
12-
newTag: v2.5.2
12+
newTag: v2.5.3

docs/deploy/installation.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -82,15 +82,15 @@ Example condition for cluster name resource tag:
8282
2. Download an IAM policy for the LBC using one of the following commands:<p>
8383
If your cluster is in a US Gov Cloud region:
8484
```
85-
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.2/docs/install/iam_policy_us-gov.json
85+
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.3/docs/install/iam_policy_us-gov.json
8686
```
8787
If your cluster is in a China region:
8888
```
89-
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.2/docs/install/iam_policy_cn.json
89+
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.3/docs/install/iam_policy_cn.json
9090
```
9191
If your cluster is in any other region:
9292
```
93-
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.2/docs/install/iam_policy.json
93+
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.3/docs/install/iam_policy.json
9494
```
9595
9696
3. Create an IAM policy named `AWSLoadBalancerControllerIAMPolicy`. If you downloaded a different policy, replace `iam-policy` with the name of the policy that you downloaded.
@@ -116,7 +116,7 @@ Example condition for cluster name resource tag:
116116
### Option B: Attach IAM policies to nodes
117117
If you're not setting up IAM roles for service accounts, apply the IAM policies from the following URL at a minimum. Please be aware of the possibility that the controller permissions may be assumed by other users in a pod after retrieving the node role credentials, so the best practice would be using IRSA instead of attaching IAM policy directly.
118118
```
119-
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.2/docs/install/iam_policy.json
119+
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.3/docs/install/iam_policy.json
120120
```
121121
122122
The following IAM permissions subset is for those using `TargetGroupBinding` only and don't plan to use the LBC to manage security group rules:
@@ -199,7 +199,7 @@ We recommend using the Helm chart to install the controller. The chart supports
199199
### Apply YAML
200200
1. Download the spec for the LBC.
201201
```
202-
wget https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/download/v2.5.2/v2_5_2_full.yaml
202+
wget https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/download/v2.5.3/v2_5_3_full.yaml
203203
```
204204
2. Edit the saved yaml file, go to the Deployment spec, and set the controller `--cluster-name` arg value to your EKS cluster name
205205
```
@@ -223,15 +223,15 @@ We recommend using the Helm chart to install the controller. The chart supports
223223
```
224224
4. Apply the yaml file
225225
```
226-
kubectl apply -f v2_5_2_full.yaml
226+
kubectl apply -f v2_5_3_full.yaml
227227
```
228228
5. Optionally download the default ingressclass and ingressclass params
229229
```
230-
wget https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/download/v2.5.2/v2_5_2_ingclass.yaml
230+
wget https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/download/v2.5.3/v2_5_3_ingclass.yaml
231231
```
232232
6. Apply the ingressclass and params
233233
```
234-
kubectl apply -f v2_5_2_ingclass.yaml
234+
kubectl apply -f v2_5_3_ingclass.yaml
235235
```
236236
237237
## Create Update Strategy

docs/examples/echo_server.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -87,9 +87,9 @@ In this walkthrough, you'll
8787
1. Deploy all the echoserver resources (namespace, service, deployment)
8888

8989
```bash
90-
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.2/docs/examples/echoservice/echoserver-namespace.yaml &&\
91-
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.2/docs/examples/echoservice/echoserver-service.yaml &&\
92-
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.2/docs/examples/echoservice/echoserver-deployment.yaml
90+
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.3/docs/examples/echoservice/echoserver-namespace.yaml &&\
91+
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.3/docs/examples/echoservice/echoserver-service.yaml &&\
92+
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.3/docs/examples/echoservice/echoserver-deployment.yaml
9393
```
9494

9595
1. List all the resources to ensure they were created.
@@ -113,7 +113,7 @@ In this walkthrough, you'll
113113
1. Download the echoserver ingress manifest locally.
114114

115115
```bash
116-
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.2/docs/examples/echoservice/echoserver-ingress.yaml
116+
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.3/docs/examples/echoservice/echoserver-ingress.yaml
117117
```
118118

119119
1. Configure the subnets, either by add annotation to the ingress or add tags to subnets. This step is optional in lieu of auto-discovery.
@@ -300,7 +300,7 @@ You should get back a valid response.
300300
follow below steps if you want to use kube2iam to provide the AWS credentials
301301

302302
1. configure the proper policy
303-
The policy to be used can be fetched from https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.2/docs/install/iam_policy.json
303+
The policy to be used can be fetched from https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.5.3/docs/install/iam_policy.json
304304

305305
1. configure the proper role and create the trust relationship
306306
You have to find which role is associated with your K8S nodes. Once you found take note of the full arn:

helm/aws-load-balancer-controller/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
apiVersion: v2
22
name: aws-load-balancer-controller
33
description: AWS Load Balancer Controller Helm chart for Kubernetes
4-
version: 1.5.3
5-
appVersion: v2.5.2
4+
version: 1.5.4
5+
appVersion: v2.5.3
66
home: https://github.com/aws/eks-charts
77
icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
88
sources:

helm/aws-load-balancer-controller/test.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ replicaCount: 2
66

77
image:
88
repository: public.ecr.aws/eks/aws-load-balancer-controller
9-
tag: v2.5.2
9+
tag: v2.5.3
1010
pullPolicy: IfNotPresent
1111

1212
imagePullSecrets: []

helm/aws-load-balancer-controller/values.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ replicaCount: 2
66

77
image:
88
repository: public.ecr.aws/eks/aws-load-balancer-controller
9-
tag: v2.5.2
9+
tag: v2.5.3
1010
pullPolicy: IfNotPresent
1111

1212
imagePullSecrets: []

version-stable.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2.5.2
1+
2.5.3

version.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2.5.2
1+
2.5.3

0 commit comments

Comments
 (0)