metadata: annotations: karpenter.sh/do-not-evict: "true" prow.k8s.io/context: dynamodb-recommended-policy-test prow.k8s.io/job: dynamodb-recommended-policy-test creationTimestamp: "2025-10-17T19:29:20Z" generation: 10 labels: created-by-prow: "true" event-GUID: 8eb0f480-ab8f-11f0-8964-58c9db4c8961 preset-test-config: "true" prow.k8s.io/build-id: "1979268508206239744" prow.k8s.io/context: dynamodb-recommended-policy-test prow.k8s.io/id: 9401e65e-ab8f-11f0-9c7e-9a468196a9ed prow.k8s.io/is-optional: "false" prow.k8s.io/job: dynamodb-recommended-policy-test prow.k8s.io/refs.base_ref: main prow.k8s.io/refs.org: aws-controllers-k8s prow.k8s.io/refs.pull: "154" prow.k8s.io/refs.repo: dynamodb-controller prow.k8s.io/type: presubmit name: 9401e65e-ab8f-11f0-9c7e-9a468196a9ed namespace: prow resourceVersion: "803628535" uid: 41911667-90ff-4fb0-9ee3-416be1682533 spec: agent: kubernetes cluster: default context: dynamodb-recommended-policy-test decoration_config: censor_secrets: true censoring_options: include_directories: - /etc/github gcs_configuration: bucket: s3://ack-prow-logs path_strategy: explicit grace_period: 1h0m0s s3_credentials_secret: s3-credentials timeout: 48h0m0s utility_images: clonerefs: gcr.io/k8s-prow/clonerefs:v20221121-dfec9ce18d entrypoint: gcr.io/k8s-prow/entrypoint:v20221121-dfec9ce18d initupload: gcr.io/k8s-prow/initupload:v20221121-dfec9ce18d sidecar: gcr.io/k8s-prow/sidecar:v20221121-dfec9ce18d extra_refs: - base_ref: main org: aws-controllers-k8s repo: test-infra workdir: true job: dynamodb-recommended-policy-test namespace: test-pods pod_spec: containers: - command: - wrapper.sh - bash - -c - make test-recommended-policy SERVICE=$SERVICE env: - name: SERVICE value: dynamodb - name: TEST_CONFIG_PATH value: /etc/config/test_config.yaml image: public.ecr.aws/m5q3e4b2/prow:prow-integration-0.0.41 name: "" resources: limits: cpu: 250m memory: 256Mi requests: cpu: 250m memory: 256Mi securityContext: runAsUser: 0 volumeMounts: - mountPath: /etc/config name: config-volume serviceAccountName: pre-submit-service-account volumes: - configMap: name: test-config name: config-volume prowjob_defaults: tenant_id: GlobalDefaultID refs: base_link: https://github.com/aws-controllers-k8s/dynamodb-controller/commit/156aeb3e023cceb51dab0d06e9f57660247d9771 base_ref: main base_sha: 156aeb3e023cceb51dab0d06e9f57660247d9771 org: aws-controllers-k8s pulls: - author: shabbskagalwala author_link: https://github.com/shabbskagalwala commit_link: https://github.com/aws-controllers-k8s/dynamodb-controller/pull/154/commits/f868396426a2ac83b2261f54a4cf2077b6f540d9 link: https://github.com/aws-controllers-k8s/dynamodb-controller/pull/154 number: 154 sha: f868396426a2ac83b2261f54a4cf2077b6f540d9 title: '[feat]: allow adding resource policy to dynamodb tables' repo: dynamodb-controller repo_link: https://github.com/aws-controllers-k8s/dynamodb-controller report: true rerun_command: /test dynamodb-recommended-policy-test type: presubmit status: build_id: "1979268508206239744" completionTime: "2025-10-17T19:29:51Z" description: Job succeeded. pendingTime: "2025-10-17T19:29:20Z" pod_name: 9401e65e-ab8f-11f0-9c7e-9a468196a9ed prev_report_states: gcsk8sreporter: success gcsreporter: success github-reporter: success startTime: "2025-10-17T19:29:20Z" state: success url: https://prow.ack.aws.dev/view/s3/ack-prow-logs/pr-logs/pull/aws-controllers-k8s_dynamodb-controller/154/dynamodb-recommended-policy-test/1979268508206239744