-
Notifications
You must be signed in to change notification settings - Fork 561
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ Add support for additionalControlPlaneIngressRule on AWSManaged… #4783
base: main
Are you sure you want to change the base?
Conversation
Welcome @fad3t! |
Hi @fad3t. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hey there 👋 anything I can do to push this forward? Thanks! |
0b0d722
to
eb671ff
Compare
/lgtm |
/retest |
I am interested in getting this feature merged. Not sure how to clean up from the failed rebase, though. |
@fad3t would be possible to transfer the branch without the rebase ? |
326d7a5
to
eb671ff
Compare
89d1bb6
to
eb671ff
Compare
Sure, what exactly do you want me to do? |
a3b7ee8
to
4232d46
Compare
This will probably fail (due to AMI issue) but worth a try: /test pull-cluster-api-provider-aws-e2e |
When the e2e passes/fails lets just check the error and then unhold and get it merged. /hold /lgtm |
Are we good @richardcase ? |
/test pull-cluster-api-provider-aws-e2e |
1 similar comment
/test pull-cluster-api-provider-aws-e2e |
/test ? |
@richardcase: The following commands are available to trigger required jobs:
The following commands are available to trigger optional jobs:
Use
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/test pull-cluster-api-provider-aws-e2e-eks |
@fad3t: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
What type of PR is this?
/kind feature
What this PR does / why we need it:
This change adds support for additional control plane ingress rules when using the AWS managed control plane.
Currently, the additional security group gets created but is empty, even if additional ingress rules are specified in the managed control plane specs.
Fixes #4788
Special notes for your reviewer:
Checklist:
Release note: