Bump EKS Distro base image tag files to latest
This PR updates the base image tag in tag file(s) with the tag of the newly-built EKS Distro base image and/or its minimal variants.
EKS_DISTRO_BASE
The following yum packages were updated:
curl.x86_64
libcurl.x86_64
EKS_DISTRO_MINIMAL_BASE_DOCKER_CLIENT
The following yum packages were updated:
docker.x86_64
EKS_DISTRO_MINIMAL_BASE_GIT
The following yum packages were updated:
libcurl.x86_64
EKS_DISTRO_MINIMAL_BASE_GLIBC
The following yum packages were updated:
ca-certificates.noarch
tzdata.noarch
EKS_DISTRO_MINIMAL_BASE_HAPROXY
The following yum packages were updated:
ca-certificates.noarch
tzdata.noarch
EKS_DISTRO_MINIMAL_BASE_IPTABLES
The following yum packages were updated:
EKS_DISTRO_MINIMAL_BASE_KIND_AL2023
The following yum packages were updated:
amazon-linux-repo-cdn.noarch
system-release.noarch
EKS_DISTRO_MINIMAL_BASE_NGINX
The following yum packages were updated:
ca-certificates.noarch
tzdata.noarch
EKS_DISTRO_MINIMAL_BASE_NONROOT
The following yum packages were updated:
ca-certificates.noarch
tzdata.noarch
EKS_DISTRO_MINIMAL_BASE_NSENTER
The following yum packages were updated:
ca-certificates.noarch
tzdata.noarch
EKS_DISTRO_MINIMAL_BASE_PYTHON_3.11_AL2023
The following yum packages were updated:
amazon-linux-repo-cdn.noarch
system-release.noarch
EKS_DISTRO_MINIMAL_BASE_PYTHON_3.9_AL2023
The following yum packages were updated:
amazon-linux-repo-cdn.noarch
system-release.noarch
EKS_DISTRO_MINIMAL_BASE
The following yum packages were updated:
ca-certificates.noarch
tzdata.noarch
/hold /area dependencies
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: Once this PR has been reviewed and has the lgtm label, please assign abhinavmpandey08 for approval. For more information see the Kubernetes Code Review Process.
The full list of commands accepted by this bot can be found here.
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
Hi @eks-distro-pr-bot. Thanks for your PR.
I'm waiting for a aws member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test label.
I understand the commands that are listed here.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.