Skip to content

Commit 86dd894

Browse files
rebase
1 parent 7f6f80a commit 86dd894

16 files changed

+72
-74
lines changed

test/e2e/shared/aws_helpers.go

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ import (
3737
)
3838

3939
type WaitForLoadBalancerToExistForServiceInput struct {
40-
AWSSessionV2 *aws.Config
40+
AWSSession *aws.Config
4141
ServiceName string
4242
ServiceNamespace string
4343
ClusterName string
@@ -65,7 +65,7 @@ func WaitForLoadBalancerToExistForService(ctx context.Context, input WaitForLoad
6565
}
6666

6767
type GetLoadBalancerARNsInput struct {
68-
AWSSessionV2 *aws.Config
68+
AWSSession *aws.Config
6969
ServiceName string
7070
ServiceNamespace string
7171
ClusterName string
@@ -81,8 +81,8 @@ func GetLoadBalancerARNs(ctx context.Context, input GetLoadBalancerARNsInput) ([
8181
serviceTag: {string(infrav1.ResourceLifecycleOwned)},
8282
}
8383
descInput := &DescribeResourcesByTagsInput{
84-
AWSSessionV2: input.AWSSessionV2,
85-
Tags: tags,
84+
AWSSession: input.AWSSession,
85+
Tags: tags,
8686
}
8787

8888
descOutput, err := DescribeResourcesByTags(ctx, *descInput)
@@ -123,8 +123,8 @@ func GetLoadBalancerARNs(ctx context.Context, input GetLoadBalancerARNsInput) ([
123123
}
124124

125125
type DescribeResourcesByTagsInput struct {
126-
AWSSessionV2 *aws.Config
127-
Tags map[string][]string
126+
AWSSession *aws.Config
127+
Tags map[string][]string
128128
}
129129

130130
type DescribeResourcesByTagsOutput struct {
@@ -147,7 +147,7 @@ func DescribeResourcesByTags(ctx context.Context, input DescribeResourcesByTagsI
147147
})
148148
}
149149

150-
rgSvc := rgapi.NewFromConfig(*input.AWSSessionV2)
150+
rgSvc := rgapi.NewFromConfig(*input.AWSSession)
151151
awsOutput, err := rgSvc.GetResources(ctx, &awsInput)
152152
if err != nil {
153153
return nil, fmt.Errorf("getting resources by tags: %w", err)
@@ -164,15 +164,15 @@ func DescribeResourcesByTags(ctx context.Context, input DescribeResourcesByTagsI
164164
}
165165

166166
type CheckClassicElbHealthCheckInput struct {
167-
AWSSessionV2 *aws.Config
167+
AWSSession *aws.Config
168168
LoadBalancerName string
169169
ExpectedTarget string
170170
}
171171

172172
func CheckClassicElbHealthCheck(ctx context.Context, input CheckClassicElbHealthCheckInput, intervals ...interface{}) {
173173
Byf("Checking the health check for the classic load balancer %s", input.LoadBalancerName)
174174

175-
elbSvc := elb.NewFromConfig(*input.AWSSessionV2)
175+
elbSvc := elb.NewFromConfig(*input.AWSSession)
176176

177177
Eventually(func() error {
178178
out, err := elbSvc.DescribeLoadBalancers(ctx, &elb.DescribeLoadBalancersInput{

test/e2e/suites/managed/addon.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ import (
3838
type CheckAddonExistsSpecInput struct {
3939
E2EConfig *clusterctl.E2EConfig
4040
BootstrapClusterProxy framework.ClusterProxy
41-
AWSSessionV2 *awsv2.Config
41+
AWSSession *awsv2.Config
4242
Namespace *corev1.Namespace
4343
ClusterName string
4444
AddonName string
@@ -51,7 +51,7 @@ func CheckAddonExistsSpec(ctx context.Context, inputGetter func() CheckAddonExis
5151
input := inputGetter()
5252
Expect(input.E2EConfig).ToNot(BeNil(), "Invalid argument. input.E2EConfig can't be nil")
5353
Expect(input.BootstrapClusterProxy).ToNot(BeNil(), "Invalid argument. input.BootstrapClusterProxy can't be nil")
54-
Expect(input.AWSSessionV2).ToNot(BeNil(), "Invalid argument. input.AWSSessionV2 can't be nil")
54+
Expect(input.AWSSession).ToNot(BeNil(), "Invalid argument. input.AWSSession can't be nil")
5555
Expect(input.Namespace).NotTo(BeNil(), "Invalid argument. input.Namespace can't be nil")
5656
Expect(input.ClusterName).ShouldNot(BeEmpty(), "Invalid argument. input.ClusterName can't be empty")
5757
Expect(input.AddonName).ShouldNot(BeEmpty(), "Invalid argument. input.AddonName can't be empty")
@@ -69,7 +69,7 @@ func CheckAddonExistsSpec(ctx context.Context, inputGetter func() CheckAddonExis
6969
By(fmt.Sprintf("Checking EKS addon %s is installed on cluster %s and is active", input.AddonName, input.ClusterName))
7070
waitForEKSAddonToHaveStatus(ctx, waitForEKSAddonToHaveStatusInput{
7171
ControlPlane: controlPlane,
72-
AWSSessionV2: input.AWSSessionV2,
72+
AWSSession: input.AWSSession,
7373
AddonName: input.AddonName,
7474
AddonVersion: input.AddonVersion,
7575
AddonStatus: []string{string(ekstypes.AddonStatusActive), string(ekstypes.AddonStatusDegraded)},
@@ -79,7 +79,7 @@ func CheckAddonExistsSpec(ctx context.Context, inputGetter func() CheckAddonExis
7979
By(fmt.Sprintf("Checking EKS addon %s has the correct configuration", input.AddonName))
8080
checkEKSAddonConfiguration(ctx, checkEKSAddonConfigurationInput{
8181
ControlPlane: controlPlane,
82-
AWSSessionV2: input.AWSSessionV2,
82+
AWSSession: input.AWSSession,
8383
AddonName: input.AddonName,
8484
AddonVersion: input.AddonVersion,
8585
AddonConfiguration: input.AddonConfiguration,

test/e2e/suites/managed/addon_helpers.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,23 +32,23 @@ import (
3232

3333
type waitForEKSAddonToHaveStatusInput struct {
3434
ControlPlane *ekscontrolplanev1.AWSManagedControlPlane
35-
AWSSessionV2 *aws.Config
35+
AWSSession *aws.Config
3636
AddonName string
3737
AddonVersion string
3838
AddonStatus []string
3939
}
4040

4141
func waitForEKSAddonToHaveStatus(ctx context.Context, input waitForEKSAddonToHaveStatusInput, intervals ...interface{}) {
4242
Expect(input.ControlPlane).ToNot(BeNil(), "Invalid argument. input.ControlPlane can't be nil")
43-
Expect(input.AWSSessionV2).ToNot(BeNil(), "Invalid argument. input.AWSSessionV2 can't be nil")
43+
Expect(input.AWSSession).ToNot(BeNil(), "Invalid argument. input.AWSSession can't be nil")
4444
Expect(input.AddonName).ShouldNot(BeEmpty(), "Invalid argument. input.AddonName can't be empty")
4545
Expect(input.AddonVersion).ShouldNot(BeEmpty(), "Invalid argument. input.AddonVersion can't be empty")
4646
Expect(input.AddonStatus).ShouldNot(BeEmpty(), "Invalid argument. input.AddonStatus can't be empty")
4747

4848
ginkgo.By(fmt.Sprintf("Ensuring EKS addon %s has status in %q for EKS cluster %s", input.AddonName, input.AddonStatus, input.ControlPlane.Spec.EKSClusterName))
4949

5050
Eventually(func() (bool, error) {
51-
installedAddon, err := getEKSClusterAddon(ctx, input.ControlPlane.Spec.EKSClusterName, input.AddonName, input.AWSSessionV2)
51+
installedAddon, err := getEKSClusterAddon(ctx, input.ControlPlane.Spec.EKSClusterName, input.AddonName, input.AWSSession)
5252
if err != nil {
5353
return false, err
5454
}
@@ -71,23 +71,23 @@ func waitForEKSAddonToHaveStatus(ctx context.Context, input waitForEKSAddonToHav
7171

7272
type checkEKSAddonConfigurationInput struct {
7373
ControlPlane *ekscontrolplanev1.AWSManagedControlPlane
74-
AWSSessionV2 *aws.Config
74+
AWSSession *aws.Config
7575
AddonName string
7676
AddonVersion string
7777
AddonConfiguration string
7878
}
7979

8080
func checkEKSAddonConfiguration(ctx context.Context, input checkEKSAddonConfigurationInput, intervals ...interface{}) {
8181
Expect(input.ControlPlane).ToNot(BeNil(), "Invalid argument. input.ControlPlane can't be nil")
82-
Expect(input.AWSSessionV2).ToNot(BeNil(), "Invalid argument. input.AWSSessionV2 can't be nil")
82+
Expect(input.AWSSession).ToNot(BeNil(), "Invalid argument. input.AWSSession can't be nil")
8383
Expect(input.AddonName).ShouldNot(BeEmpty(), "Invalid argument. input.AddonName can't be empty")
8484
Expect(input.AddonVersion).ShouldNot(BeEmpty(), "Invalid argument. input.AddonVersion can't be empty")
8585
Expect(input.AddonConfiguration).ShouldNot(BeEmpty(), "Invalid argument. input.AddonConfiguration can't be empty")
8686

8787
ginkgo.By(fmt.Sprintf("Ensuring EKS addon %s has config in %q for EKS cluster %s", input.AddonName, input.AddonConfiguration, input.ControlPlane.Spec.EKSClusterName))
8888

8989
Eventually(func() (bool, error) {
90-
installedAddon, err := getEKSClusterAddon(ctx, input.ControlPlane.Spec.EKSClusterName, input.AddonName, input.AWSSessionV2)
90+
installedAddon, err := getEKSClusterAddon(ctx, input.ControlPlane.Spec.EKSClusterName, input.AddonName, input.AWSSession)
9191
if err != nil {
9292
return false, err
9393
}

test/e2e/suites/managed/aws_node_env.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ import (
3939
type UpdateAwsNodeVersionSpecInput struct {
4040
E2EConfig *clusterctl.E2EConfig
4141
BootstrapClusterProxy framework.ClusterProxy
42-
AWSSessionV2 *aws.Config
42+
AWSSession *aws.Config
4343
Namespace *corev1.Namespace
4444
ClusterName string
4545
}
@@ -49,7 +49,7 @@ func CheckAwsNodeEnvVarsSet(ctx context.Context, inputGetter func() UpdateAwsNod
4949
input := inputGetter()
5050
Expect(input.E2EConfig).ToNot(BeNil(), "Invalid argument. input.E2EConfig can't be nil")
5151
Expect(input.BootstrapClusterProxy).ToNot(BeNil(), "Invalid argument. input.BootstrapClusterProxy can't be nil")
52-
Expect(input.AWSSessionV2).ToNot(BeNil(), "Invalid argument. input.AWSSessionV2 can't be nil")
52+
Expect(input.AWSSession).ToNot(BeNil(), "Invalid argument. input.AWSSession can't be nil")
5353
Expect(input.Namespace).NotTo(BeNil(), "Invalid argument. input.Namespace can't be nil")
5454
Expect(input.ClusterName).ShouldNot(BeEmpty(), "Invalid argument. input.ClusterName can't be empty")
5555

test/e2e/suites/managed/cluster.go

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,7 @@ type ManagedClusterSpecInput struct {
4343
E2EConfig *clusterctl.E2EConfig
4444
ConfigClusterFn DefaultConfigClusterFn
4545
BootstrapClusterProxy framework.ClusterProxy
46-
AWSSession aws.Config
47-
AWSSessionV2 *aws.Config
46+
AWSSession *aws.Config
4847
Namespace *corev1.Namespace
4948
ClusterName string
5049
Flavour string
@@ -88,14 +87,14 @@ func ManagedClusterSpec(ctx context.Context, inputGetter func() ManagedClusterSp
8887

8988
ginkgo.By("Checking EKS cluster is active")
9089
eksClusterName := getEKSClusterName(input.Namespace.Name, input.ClusterName)
91-
verifyClusterActiveAndOwned(ctx, eksClusterName, input.AWSSessionV2)
90+
verifyClusterActiveAndOwned(ctx, eksClusterName, input.AWSSession)
9291

9392
if input.CluserSpecificRoles {
9493
ginkgo.By("Checking that the cluster specific IAM role exists")
95-
VerifyRoleExistsAndOwned(ctx, fmt.Sprintf("%s-iam-service-role", input.ClusterName), eksClusterName, true, input.AWSSessionV2)
94+
VerifyRoleExistsAndOwned(ctx, fmt.Sprintf("%s-iam-service-role", input.ClusterName), eksClusterName, true, input.AWSSession)
9695
} else {
9796
ginkgo.By("Checking that the cluster default IAM role exists")
98-
VerifyRoleExistsAndOwned(ctx, ekscontrolplanev1.DefaultEKSControlPlaneRole, eksClusterName, false, input.AWSSessionV2)
97+
VerifyRoleExistsAndOwned(ctx, ekscontrolplanev1.DefaultEKSControlPlaneRole, eksClusterName, false, input.AWSSession)
9998
}
10099

101100
ginkgo.By("Checking kubeconfig secrets exist")

test/e2e/suites/managed/control_plane.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ import (
3838
// UpgradeControlPlaneVersionSpecInput is the input type for UpgradeControlPlaneVersionSpec.
3939
type UpgradeControlPlaneVersionSpecInput struct {
4040
E2EConfig *clusterctl.E2EConfig
41-
AWSSessionV2 *aws.Config
41+
AWSSession *aws.Config
4242
BootstrapClusterProxy framework.ClusterProxy
4343
ClusterName string
4444
Namespace *corev1.Namespace
@@ -49,7 +49,7 @@ type UpgradeControlPlaneVersionSpecInput struct {
4949
func UpgradeControlPlaneVersionSpec(ctx context.Context, inputGetter func() UpgradeControlPlaneVersionSpecInput) {
5050
input := inputGetter()
5151
Expect(input.E2EConfig).ToNot(BeNil(), "Invalid argument. input.E2EConfig can't be nil")
52-
Expect(input.AWSSessionV2).ToNot(BeNil(), "Invalid argument. input.AWSSessionV2 can't be nil")
52+
Expect(input.AWSSession).ToNot(BeNil(), "Invalid argument. input.AWSSession can't be nil")
5353
Expect(input.BootstrapClusterProxy).ToNot(BeNil(), "Invalid argument. input.BootstrapClusterProxy can't be nil")
5454
Expect(input.ClusterName).ToNot(BeNil(), "Invalid argument. input.ClusterName can't be nil")
5555
Expect(input.Namespace).ToNot(BeNil(), "Invalid argument. input.Namespace can't be nil")
@@ -72,7 +72,7 @@ func UpgradeControlPlaneVersionSpec(ctx context.Context, inputGetter func() Upgr
7272
ginkgo.By("Waiting for EKS control-plane to be upgraded to new version")
7373
waitForControlPlaneToBeUpgraded(ctx, waitForControlPlaneToBeUpgradedInput{
7474
ControlPlane: controlPlane,
75-
AWSSessionV2: input.AWSSessionV2,
75+
AWSSession: input.AWSSession,
7676
UpgradeVersion: input.UpgradeVersion,
7777
}, input.E2EConfig.GetIntervals("", "wait-control-plane-upgrade")...)
7878
}

test/e2e/suites/managed/control_plane_helpers.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,13 +40,13 @@ import (
4040

4141
type waitForControlPlaneToBeUpgradedInput struct {
4242
ControlPlane *ekscontrolplanev1.AWSManagedControlPlane
43-
AWSSessionV2 *aws.Config
43+
AWSSession *aws.Config
4444
UpgradeVersion string
4545
}
4646

4747
func waitForControlPlaneToBeUpgraded(ctx context.Context, input waitForControlPlaneToBeUpgradedInput, intervals ...interface{}) {
4848
Expect(input.ControlPlane).ToNot(BeNil(), "Invalid argument. input.ControlPlane can't be nil")
49-
Expect(input.AWSSessionV2).ToNot(BeNil(), "Invalid argument. input.AWSSessionV2 can't be nil")
49+
Expect(input.AWSSession).ToNot(BeNil(), "Invalid argument. input.AWSSession can't be nil")
5050
Expect(input.UpgradeVersion).ToNot(BeNil(), "Invalid argument. input.UpgradeVersion can't be nil")
5151

5252
By(fmt.Sprintf("Ensuring EKS control-plane has been upgraded to kubernetes version %s", input.UpgradeVersion))
@@ -55,7 +55,7 @@ func waitForControlPlaneToBeUpgraded(ctx context.Context, input waitForControlPl
5555
expectedVersion := fmt.Sprintf("%d.%d", v.Major(), v.Minor())
5656

5757
Eventually(func() (bool, error) {
58-
cluster, err := getEKSCluster(ctx, input.ControlPlane.Spec.EKSClusterName, input.AWSSessionV2)
58+
cluster, err := getEKSCluster(ctx, input.ControlPlane.Spec.EKSClusterName, input.AWSSession)
5959
if err != nil {
6060
return false, err
6161
}

test/e2e/suites/managed/eks_ipv6_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ var _ = ginkgo.Describe("[managed] [general] [ipv6] EKS cluster tests", func() {
6666
E2EConfig: e2eCtx.E2EConfig,
6767
ConfigClusterFn: defaultConfigCluster,
6868
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
69-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
69+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
7070
Namespace: namespace,
7171
ClusterName: clusterName,
7272
Flavour: EKSIPv6ClusterFlavor,
@@ -81,7 +81,7 @@ var _ = ginkgo.Describe("[managed] [general] [ipv6] EKS cluster tests", func() {
8181
E2EConfig: e2eCtx.E2EConfig,
8282
ConfigClusterFn: defaultConfigCluster,
8383
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
84-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
84+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
8585
Namespace: namespace,
8686
ClusterName: clusterName,
8787
IncludeScaling: false,

test/e2e/suites/managed/eks_legacy_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ var _ = ginkgo.Describe("[managed] [legacy] EKS cluster tests - single kind", fu
6666
E2EConfig: e2eCtx.E2EConfig,
6767
ConfigClusterFn: defaultConfigCluster,
6868
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
69-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
69+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
7070
Namespace: namespace,
7171
ClusterName: clusterName,
7272
Flavour: EKSControlPlaneOnlyLegacyFlavor,
@@ -81,7 +81,7 @@ var _ = ginkgo.Describe("[managed] [legacy] EKS cluster tests - single kind", fu
8181
E2EConfig: e2eCtx.E2EConfig,
8282
ConfigClusterFn: defaultConfigCluster,
8383
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
84-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
84+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
8585
Namespace: namespace,
8686
ClusterName: clusterName,
8787
IncludeScaling: false,

test/e2e/suites/managed/eks_test.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ var _ = ginkgo.Describe("[managed] [general] EKS cluster tests", func() {
6464
E2EConfig: e2eCtx.E2EConfig,
6565
ConfigClusterFn: defaultConfigCluster,
6666
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
67-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
67+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
6868
Namespace: namespace,
6969
ClusterName: clusterName,
7070
Flavour: EKSControlPlaneOnlyWithAddonFlavor,
@@ -78,7 +78,7 @@ var _ = ginkgo.Describe("[managed] [general] EKS cluster tests", func() {
7878
return UpdateAwsNodeVersionSpecInput{
7979
E2EConfig: e2eCtx.E2EConfig,
8080
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
81-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
81+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
8282
Namespace: namespace,
8383
ClusterName: clusterName,
8484
}
@@ -89,7 +89,7 @@ var _ = ginkgo.Describe("[managed] [general] EKS cluster tests", func() {
8989
return CheckAddonExistsSpecInput{
9090
E2EConfig: e2eCtx.E2EConfig,
9191
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
92-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
92+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
9393
Namespace: namespace,
9494
ClusterName: clusterName,
9595
AddonName: cniAddonName,
@@ -103,7 +103,7 @@ var _ = ginkgo.Describe("[managed] [general] EKS cluster tests", func() {
103103
E2EConfig: e2eCtx.E2EConfig,
104104
ConfigClusterFn: defaultConfigCluster,
105105
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
106-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
106+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
107107
Namespace: namespace,
108108
ClusterName: clusterName,
109109
Replicas: 1,
@@ -117,7 +117,7 @@ var _ = ginkgo.Describe("[managed] [general] EKS cluster tests", func() {
117117
E2EConfig: e2eCtx.E2EConfig,
118118
ConfigClusterFn: defaultConfigCluster,
119119
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
120-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
120+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
121121
Namespace: namespace,
122122
ClusterName: clusterName,
123123
IncludeScaling: true,
@@ -133,7 +133,7 @@ var _ = ginkgo.Describe("[managed] [general] EKS cluster tests", func() {
133133
E2EConfig: e2eCtx.E2EConfig,
134134
ConfigClusterFn: defaultConfigCluster,
135135
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
136-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
136+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
137137
Namespace: namespace,
138138
ClusterName: clusterName,
139139
IncludeScaling: true,
@@ -150,7 +150,7 @@ var _ = ginkgo.Describe("[managed] [general] EKS cluster tests", func() {
150150
E2EConfig: e2eCtx.E2EConfig,
151151
ConfigClusterFn: defaultConfigCluster,
152152
BootstrapClusterProxy: e2eCtx.Environment.BootstrapClusterProxy,
153-
AWSSessionV2: e2eCtx.BootstrapUserAWSSessionV2,
153+
AWSSession: e2eCtx.BootstrapUserAWSSessionV2,
154154
Namespace: namespace,
155155
ClusterName: clusterName,
156156
IncludeScaling: true,

0 commit comments

Comments
 (0)