Closed jim-barber-he closed 2 weeks ago
@dims By any chance, do you know anyone that could look into the image promotion failure? Thanks!
seems the problem I reported has been discussed at https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/722
Ignore below:
another problem,
the latest release (currently it is v0.5.27 )
it has only 2 assets now , both are source code only
But if you compare to the older releases, they have 10 assets, with all built binary for different OSs
can you try 602401143452.dkr.ecr.us-east-2.amazonaws.com/eks/authenticator:v0.5.27 instead?
@nnmin-aws The kOps project has a problem with this image missing, as the current release references it. I would appreciate some feedback on how to move forward, because this missing image will break things for many of our users.
This is holding for quite some time, do you know if there is an ETA for the fix? using kOps as well and as @hakman suggested we are forced to find workarounds for the missing released image
apology for the inconvenience. we will have a new release today. please kindly note v0.5.x is only for k8s version <=1.23 and will stop release since 1.23 has end of life. please kindly pick up v0.6.x. thank you!
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
What happened?
I set up a cluster using kops v1.29.0 that tried to use the following image for aws-iam-authenticator
The pods were stuck unable to pull the image and the events when you describe the pods say:
If I edited the DaemonSet and changed the image to the previous version of
602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.21
then everything works fine.I think perhaps the image publishing for that release failed? The
goreleaser
threw an error in your repo's pipeline when trying to publishhttps://github.com/kubernetes-sigs/aws-iam-authenticator/actions/runs/8854199394/job/24316751369
What you expected to happen?
Be able to pull the image and use it for the current 0.5 release.
Anything else we need to know?
No response
Installation tooling
kOps
AWS IAM Authenticator server Version
v0.5.27
Client information
Kubernetes API Version
v1.29.5
aws-iam-authenticator YAML manifest
No response
kube-apiserver YAML manifest
No response
aws-iam-authenticator logs
No response