Move from k8s.gcr.io to registry.k8s.io

Signed-off-by: Davanum Srinivas <davanum@gmail.com>
This commit is contained in:
Davanum Srinivas
2022-05-10 08:30:09 -04:00
parent aae07c6f7b
commit 50bea1dad8
232 changed files with 509 additions and 507 deletions

View File

@@ -18,7 +18,7 @@ TEMP_DIR:=$(shell mktemp -d)
VERSION=v9.1.6
KUBECTL_VERSION?=v1.20.2
BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):v1.0.1
BASEIMAGE=registry.k8s.io/debian-base-$(ARCH):v1.0.1
SUDO=$(if $(filter 0,$(shell id -u)),,sudo)

View File

@@ -25,7 +25,7 @@ Otherwise it will be omitted.
#### Images
addon-manager images are pushed to `k8s.gcr.io`. As addon-manager is built for multiple architectures, there is an image per architecture in the format - `k8s.gcr.io/addon-manager/kube-addon-manager-$(ARCH):$(VERSION)`.
addon-manager images are pushed to `registry.k8s.io`. As addon-manager is built for multiple architectures, there is an image per architecture in the format - `registry.k8s.io/addon-manager/kube-addon-manager-$(ARCH):$(VERSION)`.
#### How to release
@@ -56,4 +56,4 @@ $ make push ARCH=s390x
# ---> staging-k8s.gcr.io/addon-manager/kube-addon-manager-s390x:VERSION
```
If you don't want to push the images, run `make` or `make build` instead
If you don't want to push the images, run `make` or `make build` instead

View File

@@ -18,7 +18,7 @@ spec:
spec:
priorityClassName: system-cluster-critical
containers:
- image: k8s.gcr.io/cpvpa-amd64:v0.8.3
- image: registry.k8s.io/cpvpa-amd64:v0.8.3
name: autoscaler
command:
- /cpvpa

View File

@@ -21,7 +21,7 @@ spec:
supplementalGroups: [ 65534 ]
fsGroup: 65534
containers:
- image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.7.1
- image: registry.k8s.io/cluster-proportional-autoscaler-amd64:1.7.1
name: autoscaler
command:
- /cluster-proportional-autoscaler

View File

@@ -18,7 +18,7 @@ spec:
spec:
priorityClassName: system-cluster-critical
containers:
- image: k8s.gcr.io/cpvpa-amd64:v0.8.3
- image: registry.k8s.io/cpvpa-amd64:v0.8.3
name: autoscaler
command:
- /cpvpa

View File

@@ -26,7 +26,7 @@ spec:
# Any image is permissible as long as:
# 1. It serves a 404 page at /
# 2. It serves 200 on a /healthz endpoint
image: k8s.gcr.io/networking/ingress-gce-404-server-with-metrics-amd64:v1.10.11
image: registry.k8s.io/networking/ingress-gce-404-server-with-metrics-amd64:v1.10.11
livenessProbe:
httpGet:
path: /healthz

View File

@@ -36,7 +36,7 @@ spec:
hostPath:
path: /dev
containers:
- image: "k8s.gcr.io/nvidia-gpu-device-plugin@sha256:4b036e8844920336fa48f36edeb7d4398f426d6a934ba022848deed2edbf09aa"
- image: "registry.k8s.io/nvidia-gpu-device-plugin@sha256:4b036e8844920336fa48f36edeb7d4398f426d6a934ba022848deed2edbf09aa"
command: ["/usr/bin/nvidia-gpu-device-plugin", "-logtostderr"]
name: nvidia-gpu-device-plugin
resources:

View File

@@ -86,7 +86,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: autoscaler
image: k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.4
image: registry.k8s.io/cpa/cluster-proportional-autoscaler:1.8.4
resources:
requests:
cpu: "20m"

View File

@@ -139,7 +139,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: coredns
image: k8s.gcr.io/coredns/coredns:v1.8.6
image: registry.k8s.io/coredns/coredns:v1.8.6
imagePullPolicy: IfNotPresent
resources:
limits:

View File

@@ -139,7 +139,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: coredns
image: k8s.gcr.io/coredns/coredns:v1.8.6
image: registry.k8s.io/coredns/coredns:v1.8.6
imagePullPolicy: IfNotPresent
resources:
limits:

View File

@@ -139,7 +139,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: coredns
image: k8s.gcr.io/coredns/coredns:v1.8.6
image: registry.k8s.io/coredns/coredns:v1.8.6
imagePullPolicy: IfNotPresent
resources:
limits:

View File

@@ -114,7 +114,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: kubedns
image: k8s.gcr.io/dns/k8s-dns-kube-dns:1.21.1
image: registry.k8s.io/dns/k8s-dns-kube-dns:1.21.1
resources:
# TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in
@@ -170,7 +170,7 @@ spec:
runAsUser: 1001
runAsGroup: 1001
- name: dnsmasq
image: k8s.gcr.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
image: registry.k8s.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
livenessProbe:
httpGet:
path: /healthcheck/dnsmasq
@@ -217,7 +217,7 @@ spec:
- NET_BIND_SERVICE
- SETGID
- name: sidecar
image: k8s.gcr.io/dns/k8s-dns-sidecar:1.21.1
image: registry.k8s.io/dns/k8s-dns-sidecar:1.21.1
livenessProbe:
httpGet:
path: /metrics

View File

@@ -114,7 +114,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: kubedns
image: k8s.gcr.io/dns/k8s-dns-kube-dns:1.21.1
image: registry.k8s.io/dns/k8s-dns-kube-dns:1.21.1
resources:
# TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in
@@ -170,7 +170,7 @@ spec:
runAsUser: 1001
runAsGroup: 1001
- name: dnsmasq
image: k8s.gcr.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
image: registry.k8s.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
livenessProbe:
httpGet:
path: /healthcheck/dnsmasq
@@ -217,7 +217,7 @@ spec:
- NET_BIND_SERVICE
- SETGID
- name: sidecar
image: k8s.gcr.io/dns/k8s-dns-sidecar:1.21.1
image: registry.k8s.io/dns/k8s-dns-sidecar:1.21.1
livenessProbe:
httpGet:
path: /metrics

View File

@@ -114,7 +114,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: kubedns
image: k8s.gcr.io/dns/k8s-dns-kube-dns:1.21.1
image: registry.k8s.io/dns/k8s-dns-kube-dns:1.21.1
resources:
# TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in
@@ -170,7 +170,7 @@ spec:
runAsUser: 1001
runAsGroup: 1001
- name: dnsmasq
image: k8s.gcr.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
image: registry.k8s.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
livenessProbe:
httpGet:
path: /healthcheck/dnsmasq
@@ -217,7 +217,7 @@ spec:
- NET_BIND_SERVICE
- SETGID
- name: sidecar
image: k8s.gcr.io/dns/k8s-dns-sidecar:1.21.1
image: registry.k8s.io/dns/k8s-dns-sidecar:1.21.1
livenessProbe:
httpGet:
path: /metrics

View File

@@ -19,7 +19,7 @@ We have the following variables in the yaml:
Note: The local listen IP address for NodeLocal DNSCache can be any address that can be guaranteed to not collide with any existing IP in your cluster. It's recommended to use an address with a local scope, per example, from the link-local range 169.254.0.0/16 for IPv4 or from the Unique Local Address range in IPv6 fd00::/8.
The following variables will be set by the node-cache images - k8s.gcr.io/k8s-dns-node-cache:1.15.6 or later.
The following variables will be set by the node-cache images - registry.k8s.io/k8s-dns-node-cache:1.15.6 or later.
The values will be determined by reading the kube-dns configMap for custom
Upstream server configuration.
`__PILLAR__CLUSTER__DNS__` - Upstream server for in-cluster queries.

View File

@@ -138,7 +138,7 @@ spec:
operator: "Exists"
containers:
- name: node-cache
image: k8s.gcr.io/dns/k8s-dns-node-cache:1.21.1
image: registry.k8s.io/dns/k8s-dns-node-cache:1.21.1
resources:
requests:
cpu: 25m

View File

@@ -19,7 +19,7 @@ spec:
serviceAccountName: fluentd-gcp-scaler
containers:
- name: fluentd-gcp-scaler
image: k8s.gcr.io/fluentd-gcp-scaler:0.5.2
image: registry.k8s.io/fluentd-gcp-scaler:0.5.2
command:
- /scaler.sh
- --ds-name=fluentd-gcp-{{ fluentd_gcp_yaml_version }}

View File

@@ -29,7 +29,7 @@ spec:
hostNetwork: true
containers:
- name: ip-masq-agent
image: k8s.gcr.io/networking/ip-masq-agent-amd64:v2.6.0
image: registry.k8s.io/networking/ip-masq-agent-amd64:v2.6.0
args:
- --masq-chain=IP-MASQ
- --nomasq-all-reserved-ranges

View File

@@ -43,7 +43,7 @@ spec:
effect: "NoSchedule"
containers:
- name: metadata-proxy
image: k8s.gcr.io/metadata-proxy:v0.1.12
image: registry.k8s.io/metadata-proxy:v0.1.12
args: ["--addr=0.0.0.0:988"]
securityContext:
privileged: true

View File

@@ -50,7 +50,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: metrics-server
image: k8s.gcr.io/metrics-server/metrics-server:v0.5.2
image: registry.k8s.io/metrics-server/metrics-server:v0.5.2
command:
- /metrics-server
- --metric-resolution=30s
@@ -81,7 +81,7 @@ spec:
- mountPath: /tmp
name: tmp-dir
- name: metrics-server-nanny
image: k8s.gcr.io/autoscaling/addon-resizer:1.8.14
image: registry.k8s.io/autoscaling/addon-resizer:1.8.14
resources:
limits:
cpu: 100m

View File

@@ -47,7 +47,7 @@ spec:
spec:
containers:
- name: node-problem-detector
image: k8s.gcr.io/node-problem-detector/node-problem-detector:v0.8.9
image: registry.k8s.io/node-problem-detector/node-problem-detector:v0.8.9
command:
- "/bin/sh"
- "-c"

View File

@@ -22,7 +22,7 @@ spec:
serviceAccount: volume-snapshot-controller
containers:
- name: volume-snapshot-controller
image: k8s.gcr.io/sig-storage/snapshot-controller:v4.0.0
image: registry.k8s.io/sig-storage/snapshot-controller:v4.0.0
args:
- "--v=5"
- "--metrics-path=/metrics"