metadata: annotations: karpenter.sh/do-not-evict: "true" prow.k8s.io/context: dynamodb-recommended-policy-test prow.k8s.io/job: dynamodb-recommended-policy-test creationTimestamp: "2025-10-17T18:57:44Z" generation: 10 labels: created-by-prow: "true" event-GUID: 27d91f70-ab8b-11f0-88b4-5011771e8a15 preset-test-config: "true" prow.k8s.io/build-id: "1979260556573413376" prow.k8s.io/context: dynamodb-recommended-policy-test prow.k8s.io/id: 2a035513-ab8b-11f0-9c7e-9a468196a9ed prow.k8s.io/is-optional: "false" prow.k8s.io/job: dynamodb-recommended-policy-test prow.k8s.io/refs.base_ref: main prow.k8s.io/refs.org: aws-controllers-k8s prow.k8s.io/refs.pull: "154" prow.k8s.io/refs.repo: dynamodb-controller prow.k8s.io/type: presubmit name: 2a035513-ab8b-11f0-9c7e-9a468196a9ed namespace: prow resourceVersion: "803609512" uid: b6d24b95-47da-40ce-a824-1a52d38aef86 spec: agent: kubernetes cluster: default context: dynamodb-recommended-policy-test decoration_config: censor_secrets: true censoring_options: include_directories: - /etc/github gcs_configuration: bucket: s3://ack-prow-logs path_strategy: explicit grace_period: 1h0m0s s3_credentials_secret: s3-credentials timeout: 48h0m0s utility_images: clonerefs: gcr.io/k8s-prow/clonerefs:v20221121-dfec9ce18d entrypoint: gcr.io/k8s-prow/entrypoint:v20221121-dfec9ce18d initupload: gcr.io/k8s-prow/initupload:v20221121-dfec9ce18d sidecar: gcr.io/k8s-prow/sidecar:v20221121-dfec9ce18d extra_refs: - base_ref: main org: aws-controllers-k8s repo: test-infra workdir: true job: dynamodb-recommended-policy-test namespace: test-pods pod_spec: containers: - command: - wrapper.sh - bash - -c - make test-recommended-policy SERVICE=$SERVICE env: - name: SERVICE value: dynamodb - name: TEST_CONFIG_PATH value: /etc/config/test_config.yaml image: public.ecr.aws/m5q3e4b2/prow:prow-integration-0.0.41 name: "" resources: limits: cpu: 250m memory: 256Mi requests: cpu: 250m memory: 256Mi securityContext: runAsUser: 0 volumeMounts: - mountPath: /etc/config name: config-volume serviceAccountName: pre-submit-service-account volumes: - configMap: name: test-config name: config-volume prowjob_defaults: tenant_id: GlobalDefaultID refs: base_link: https://github.com/aws-controllers-k8s/dynamodb-controller/commit/156aeb3e023cceb51dab0d06e9f57660247d9771 base_ref: main base_sha: 156aeb3e023cceb51dab0d06e9f57660247d9771 org: aws-controllers-k8s pulls: - author: shabbskagalwala author_link: https://github.com/shabbskagalwala commit_link: https://github.com/aws-controllers-k8s/dynamodb-controller/pull/154/commits/320ffcc54556aae4afd303c6ddee820011380634 link: https://github.com/aws-controllers-k8s/dynamodb-controller/pull/154 number: 154 sha: 320ffcc54556aae4afd303c6ddee820011380634 title: '[feat]: allow adding resource policy to dynamodb tables' repo: dynamodb-controller repo_link: https://github.com/aws-controllers-k8s/dynamodb-controller report: true rerun_command: /test dynamodb-recommended-policy-test type: presubmit status: build_id: "1979260556573413376" completionTime: "2025-10-17T18:58:07Z" description: Job succeeded. pendingTime: "2025-10-17T18:57:44Z" pod_name: 2a035513-ab8b-11f0-9c7e-9a468196a9ed prev_report_states: gcsk8sreporter: success gcsreporter: success github-reporter: success startTime: "2025-10-17T18:57:44Z" state: success url: https://prow.ack.aws.dev/view/s3/ack-prow-logs/pr-logs/pull/aws-controllers-k8s_dynamodb-controller/154/dynamodb-recommended-policy-test/1979260556573413376