Skip to content

Commit ebac62d

Browse files
authored
Merge pull request #769 from M00nF1sh/v1.0.1
cut release 1.0.1
2 parents d0f2a34 + d9cc1c3 commit ebac62d

File tree

9 files changed

+17
-17
lines changed

9 files changed

+17
-17
lines changed

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717

1818
all: container
1919

20-
TAG?=v1.0.0
20+
TAG?=v1.0.1
2121
PREFIX?=894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller
2222
ARCH?=amd64
2323
OS?=linux

alb-ingress-controller-helm/Chart.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
apiVersion: v1
2-
appVersion: v1.0.0
2+
appVersion: v1.0.1
33
description: The ALB Ingress Controller satisfies Kubernetes ingress resources by provisioning Application Load Balancers.
44
engine: gotpl
55
home: https://github.com/kubernetes-sigs/aws-alb-ingress-controller

alb-ingress-controller-helm/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ The following tables lists the configurable parameters of the alb-ingress-contro
4949
| `awsRegion` | AWS region of k8s cluster, required if ec2metadata is unavailable from controller pod | N/A |
5050
| `awsVpcID` | AWS VPC ID of k8s cluster, required if ec2metadata is unavailable from controller pod | N/A |
5151
| `image.repository` | controller container image repository | `894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller`|
52-
| `image.tag` | controller container image tag | `v1.0.0` |
52+
| `image.tag` | controller container image tag | `v1.0.1` |
5353
| `image.pullPolicy` | controller container image pull policy | `IfNotPresent` |
5454
| `extraEnv` | map of environment variables to be injected into the controller pod | `{}` |
5555
| `nodeSelector` | node labels for controller pod assignment | `{}` |

alb-ingress-controller-helm/values.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ awsVpcID: ""
1616

1717
image:
1818
repository: 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller
19-
tag: "v1.0.0"
19+
tag: "v1.0.1"
2020
pullPolicy: IfNotPresent
2121

2222
extraArgs: {}

docs/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
# AWS ALB Ingress Controller
77

8-
**NOTE:** The current image version is `v1.0.0`. Please file any issues you find and note the version used.
8+
**NOTE:** The current image version is `v1.0.1`. Please file any issues you find and note the version used.
99

1010
The AWS ALB Ingress Controller satisfies Kubernetes [ingress resources](https://kubernetes.io/docs/user-guide/ingress) by provisioning [Application Load Balancers](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/introduction.html).
1111

docs/examples/alb-ingress-controller.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ spec:
7171
#- name: AWS_SECRET_ACCESS_KEY
7272
# value: SECRETVALUE
7373
# Repository location of the ALB Ingress Controller.
74-
image: 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller:v1.0.0
74+
image: 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller:v1.0.1
7575
imagePullPolicy: Always
7676
name: server
7777
resources: {}

docs/guide/controller/setup.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ You can choose to install ALB ingress controller via Helm or Kubectl
2727
### Kubectl
2828
1. Download sample ALB ingress controller manifest
2929
``` bash
30-
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/alb-ingress-controller.yaml
30+
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/alb-ingress-controller.yaml
3131
```
3232

3333
2. Configure the ALB ingress controller manifest
@@ -45,7 +45,7 @@ You can choose to install ALB ingress controller via Helm or Kubectl
4545
3. Deploy the RBAC roles manifest
4646

4747
```bash
48-
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/rbac-role.yaml
48+
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/rbac-role.yaml
4949
```
5050

5151
4. Deploy the ALB ingress controller manifest

docs/guide/external-dns/setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Adequate roles and policies must be configured in AWS and available to the node(
99
1. Download sample external-dns manifest
1010

1111
``` bash
12-
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/external-dns.yaml
12+
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/external-dns.yaml
1313
```
1414

1515
2. Edit the `--domain-filter` flag to include your hosted zone(s)

docs/guide/walkthrough/echoserver.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,8 @@ In this walkthrough, you'll
4343
1. Download the example alb-ingress-manifest locally.
4444

4545
```bash
46-
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/alb-ingress-controller.yaml
47-
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/rbac-role.yaml
46+
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/alb-ingress-controller.yaml
47+
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/rbac-role.yaml
4848
```
4949

5050
1. Edit the manifest and set the following parameters and environment variables.
@@ -100,9 +100,9 @@ In this walkthrough, you'll
100100
1. Deploy all the echoserver resources (namespace, service, deployment)
101101

102102
```bash
103-
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/echoservice/echoserver-namespace.yaml &&\
104-
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/echoservice/echoserver-service.yaml &&\
105-
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/echoservice/echoserver-deployment.yaml
103+
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/echoservice/echoserver-namespace.yaml &&\
104+
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/echoservice/echoserver-service.yaml &&\
105+
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/echoservice/echoserver-deployment.yaml
106106
```
107107

108108
1. List all the resources to ensure they were created.
@@ -126,7 +126,7 @@ In this walkthrough, you'll
126126
1. Download the echoserver ingress manifest locally.
127127

128128
```bash
129-
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/echoservice/echoserver-ingress.yaml
129+
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/echoservice/echoserver-ingress.yaml
130130
```
131131

132132
1. Configure the subnets, either by add annotation to the ingress or add tags to subnets.
@@ -235,7 +235,7 @@ In this walkthrough, you'll
235235
1. Download external-dns to manage Route 53.
236236

237237
```bash
238-
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/external-dns.yaml
238+
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/external-dns.yaml
239239
```
240240

241241
1. Edit the `--domain-filter` flag to include your hosted zone(s)
@@ -300,7 +300,7 @@ In this walkthrough, you'll
300300
follow below steps If you want to use kube2iam to provide the AWS credentials
301301

302302
1. configure the proper policy
303-
The policy to be used can be fetched from https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/iam-policy.json
303+
The policy to be used can be fetched from https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/iam-policy.json
304304

305305
1. configure the proper role and create the trust relationship
306306
You have to find which role is associated woth your K8S nodes. Once you found take note of the full arn:

0 commit comments

Comments
 (0)