Skip to content

Commit

Permalink
Merge pull request #769 from M00nF1sh/v1.0.1
Browse files Browse the repository at this point in the history
cut release 1.0.1
  • Loading branch information
k8s-ci-robot authored Dec 6, 2018
2 parents d0f2a34 + d9cc1c3 commit ebac62d
Show file tree
Hide file tree
Showing 9 changed files with 17 additions and 17 deletions.
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@

all: container

TAG?=v1.0.0
TAG?=v1.0.1
PREFIX?=894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller
ARCH?=amd64
OS?=linux
Expand Down
2 changes: 1 addition & 1 deletion alb-ingress-controller-helm/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
apiVersion: v1
appVersion: v1.0.0
appVersion: v1.0.1
description: The ALB Ingress Controller satisfies Kubernetes ingress resources by provisioning Application Load Balancers.
engine: gotpl
home: https://github.com/kubernetes-sigs/aws-alb-ingress-controller
Expand Down
2 changes: 1 addition & 1 deletion alb-ingress-controller-helm/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ The following tables lists the configurable parameters of the alb-ingress-contro
| `awsRegion` | AWS region of k8s cluster, required if ec2metadata is unavailable from controller pod | N/A |
| `awsVpcID` | AWS VPC ID of k8s cluster, required if ec2metadata is unavailable from controller pod | N/A |
| `image.repository` | controller container image repository | `894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller`|
| `image.tag` | controller container image tag | `v1.0.0` |
| `image.tag` | controller container image tag | `v1.0.1` |
| `image.pullPolicy` | controller container image pull policy | `IfNotPresent` |
| `extraEnv` | map of environment variables to be injected into the controller pod | `{}` |
| `nodeSelector` | node labels for controller pod assignment | `{}` |
Expand Down
2 changes: 1 addition & 1 deletion alb-ingress-controller-helm/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ awsVpcID: ""

image:
repository: 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller
tag: "v1.0.0"
tag: "v1.0.1"
pullPolicy: IfNotPresent

extraArgs: {}
Expand Down
2 changes: 1 addition & 1 deletion docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

# AWS ALB Ingress Controller

**NOTE:** The current image version is `v1.0.0`. Please file any issues you find and note the version used.
**NOTE:** The current image version is `v1.0.1`. Please file any issues you find and note the version used.

The AWS ALB Ingress Controller satisfies Kubernetes [ingress resources](https://kubernetes.io/docs/user-guide/ingress) by provisioning [Application Load Balancers](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/introduction.html).

Expand Down
2 changes: 1 addition & 1 deletion docs/examples/alb-ingress-controller.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ spec:
#- name: AWS_SECRET_ACCESS_KEY
# value: SECRETVALUE
# Repository location of the ALB Ingress Controller.
image: 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller:v1.0.0
image: 894847497797.dkr.ecr.us-west-2.amazonaws.com/aws-alb-ingress-controller:v1.0.1
imagePullPolicy: Always
name: server
resources: {}
Expand Down
4 changes: 2 additions & 2 deletions docs/guide/controller/setup.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ You can choose to install ALB ingress controller via Helm or Kubectl
### Kubectl
1. Download sample ALB ingress controller manifest
``` bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/alb-ingress-controller.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/alb-ingress-controller.yaml
```

2. Configure the ALB ingress controller manifest
Expand All @@ -45,7 +45,7 @@ You can choose to install ALB ingress controller via Helm or Kubectl
3. Deploy the RBAC roles manifest

```bash
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/rbac-role.yaml
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/rbac-role.yaml
```

4. Deploy the ALB ingress controller manifest
Expand Down
2 changes: 1 addition & 1 deletion docs/guide/external-dns/setup.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Adequate roles and policies must be configured in AWS and available to the node(
1. Download sample external-dns manifest

``` bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/external-dns.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/external-dns.yaml
```

2. Edit the `--domain-filter` flag to include your hosted zone(s)
Expand Down
16 changes: 8 additions & 8 deletions docs/guide/walkthrough/echoserver.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,8 +43,8 @@ In this walkthrough, you'll
1. Download the example alb-ingress-manifest locally.

```bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/alb-ingress-controller.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/rbac-role.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/alb-ingress-controller.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/rbac-role.yaml
```

1. Edit the manifest and set the following parameters and environment variables.
Expand Down Expand Up @@ -100,9 +100,9 @@ In this walkthrough, you'll
1. Deploy all the echoserver resources (namespace, service, deployment)

```bash
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/echoservice/echoserver-namespace.yaml &&\
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/echoservice/echoserver-service.yaml &&\
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/echoservice/echoserver-deployment.yaml
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/echoservice/echoserver-namespace.yaml &&\
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/echoservice/echoserver-service.yaml &&\
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/echoservice/echoserver-deployment.yaml
```

1. List all the resources to ensure they were created.
Expand All @@ -126,7 +126,7 @@ In this walkthrough, you'll
1. Download the echoserver ingress manifest locally.

```bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/echoservice/echoserver-ingress.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/echoservice/echoserver-ingress.yaml
```

1. Configure the subnets, either by add annotation to the ingress or add tags to subnets.
Expand Down Expand Up @@ -235,7 +235,7 @@ In this walkthrough, you'll
1. Download external-dns to manage Route 53.

```bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/external-dns.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/external-dns.yaml
```

1. Edit the `--domain-filter` flag to include your hosted zone(s)
Expand Down Expand Up @@ -300,7 +300,7 @@ In this walkthrough, you'll
follow below steps If you want to use kube2iam to provide the AWS credentials

1. configure the proper policy
The policy to be used can be fetched from https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.0/docs/examples/iam-policy.json
The policy to be used can be fetched from https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.0.1/docs/examples/iam-policy.json

1. configure the proper role and create the trust relationship
You have to find which role is associated woth your K8S nodes. Once you found take note of the full arn:
Expand Down

0 comments on commit ebac62d

Please sign in to comment.