Skip to content

Commit

Permalink
cut v2.3.0 release (kubernetes-sigs#2304)
Browse files Browse the repository at this point in the history
  • Loading branch information
kishorj authored Oct 19, 2021
1 parent 3161e16 commit 42d2638
Show file tree
Hide file tree
Showing 4 changed files with 8 additions and 8 deletions.
4 changes: 2 additions & 2 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
MAKEFILE_PATH = $(dir $(realpath -s $(firstword $(MAKEFILE_LIST))))

# Image URL to use all building/pushing image targets
IMG ?= amazon/aws-alb-ingress-controller:v2.2.1
IMG ?= amazon/aws-alb-ingress-controller:v2.3.0

CRD_OPTIONS ?= "crd:crdVersions=v1"

Expand Down Expand Up @@ -101,7 +101,7 @@ docs-preview: docs-dependencies

# publish the versioned docs using mkdocs mike util
docs-publish: docs-dependencies
pipenv run mike deploy v2.2 latest -p --update-aliases
pipenv run mike deploy v2.3 latest -p --update-aliases

# install dependencies needed to preview and publish docs
docs-dependencies:
Expand Down
2 changes: 1 addition & 1 deletion config/controller/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@ kind: Kustomization
images:
- name: controller
newName: amazon/aws-alb-ingress-controller
newTag: v2.2.1
newTag: v2.3.0
4 changes: 2 additions & 2 deletions config/default/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -41,15 +41,15 @@ vars:
objref:
kind: Certificate
group: cert-manager.io
version: v1alpha2
version: v1
name: serving-cert # this name should match the one in certificate.yaml
fieldref:
fieldpath: metadata.namespace
- name: CERTIFICATE_NAME
objref:
kind: Certificate
group: cert-manager.io
version: v1alpha2
version: v1
name: serving-cert # this name should match the one in certificate.yaml
- name: SERVICE_NAMESPACE # namespace of the service
objref:
Expand Down
6 changes: 3 additions & 3 deletions docs/deploy/installation.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ The IAM permissions can either be setup via IAM roles for ServiceAccount or can
1. Download IAM policy for the AWS Load Balancer Controller
```
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.2.1/docs/install/iam_policy.json
curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.3.0/docs/install/iam_policy.json
```
1. Create an IAM policy called AWSLoadBalancerControllerIAMPolicy
Expand Down Expand Up @@ -150,7 +150,7 @@ curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-lo
### Apply YAML
1. Download spec for load balancer controller.
```
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/v2.2.1/docs/install/v2_2_1_full.yaml
wget https://github.com/kubernetes-sigs/aws-load-balancer-controller/releases/download/v2.3.0/v2_3_0_full.yaml
```
1. Edit the saved yaml file, go to the Deployment spec, and set the controller --cluster-name arg value to your EKS cluster name
```
Expand All @@ -174,7 +174,7 @@ curl -o iam-policy.json https://raw.githubusercontent.com/kubernetes-sigs/aws-lo
```
1. Apply the yaml file
```
kubectl apply -f v2_2_1_full.yaml
kubectl apply -f v2_3_0_full.yaml
```

0 comments on commit 42d2638

Please sign in to comment.