Closed mmerkes closed 10 months ago
This issue is currently awaiting triage.
If cloud-provider-aws contributors determine this is a relevant issue, they will accept it by applying the triage/accepted
label and provide further guidance.
The triage/accepted
label can be added by org members by writing /triage accepted
in a comment.
/lgtm /approve
/approve cancel
need to get the vulns patched on this branch
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: Once this PR has been reviewed and has the lgtm label, please ask for approval from cartermckinnon. For more information see the Kubernetes Code Review Process.
The full list of commands accepted by this bot can be found here.
Dependency updates have been addressed on this branch in other PR's. @mmerkes is out of the office for a bit, and we need to get this fix in for a batch of releases soon. CI is green on the jobs that matter.
What type of PR is this? /kind bug
What this PR does / why we need it: See https://github.com/kubernetes/cloud-provider-aws/pull/753 Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Does this PR introduce a user-facing change?: