Merge pull request #109938 from dims/move-from-k8s.gcr.io-to-registry.k8s.io

Move from k8s.gcr.io to registry.k8s.io
This commit is contained in:
Kubernetes Prow Robot 2022-05-31 13:45:23 -07:00 committed by GitHub
commit 78fb1fa9a2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
232 changed files with 509 additions and 507 deletions

View File

@ -4932,7 +4932,7 @@
"description": "Describe a container image",
"properties": {
"names": {
"description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]",
"description": "Names by which this image is known. e.g. [\"kubernetes.example/hyperkube:v1.0.7\", \"cloud-vendor.registry.example/cloud-vendor/hyperkube:v1.0.7\"]",
"items": {
"type": "string"
},

View File

@ -1230,7 +1230,7 @@
"description": "Describe a container image",
"properties": {
"names": {
"description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]",
"description": "Names by which this image is known. e.g. [\"kubernetes.example/hyperkube:v1.0.7\", \"cloud-vendor.registry.example/cloud-vendor/hyperkube:v1.0.7\"]",
"items": {
"default": "",
"type": "string"

View File

@ -40,8 +40,8 @@ source "${KUBE_ROOT}/hack/lib/init.sh"
readonly KUBE_BUILD_IMAGE_REPO=kube-build
readonly KUBE_BUILD_IMAGE_CROSS_TAG="$(cat "${KUBE_ROOT}/build/build-image/cross/VERSION")"
readonly KUBE_DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY:-k8s.gcr.io}"
readonly KUBE_BASE_IMAGE_REGISTRY="${KUBE_BASE_IMAGE_REGISTRY:-k8s.gcr.io/build-image}"
readonly KUBE_DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY:-registry.k8s.io}"
readonly KUBE_BASE_IMAGE_REGISTRY="${KUBE_BASE_IMAGE_REGISTRY:-registry.k8s.io/build-image}"
# This version number is used to cause everyone to rebuild their data containers
# and build image. This is especially useful for automated build systems like

View File

@ -32,11 +32,11 @@ dependencies:
version: 1.8.6
refPaths:
- path: cluster/addons/dns/coredns/coredns.yaml.base
match: k8s.gcr.io/coredns
match: registry.k8s.io/coredns
- path: cluster/addons/dns/coredns/coredns.yaml.in
match: k8s.gcr.io/coredns
match: registry.k8s.io/coredns
- path: cluster/addons/dns/coredns/coredns.yaml.sed
match: k8s.gcr.io/coredns
match: registry.k8s.io/coredns
- name: "coredns-kubeadm"
version: 1.8.6
@ -109,29 +109,29 @@ dependencies:
#- path: hack/lib/golang.sh
# match: minimum_go_version=go([0-9]+\.[0-9]+)
- name: "k8s.gcr.io/kube-cross: dependents"
- name: "registry.k8s.io/kube-cross: dependents"
version: v1.25.0-go1.18.2-bullseye.0
refPaths:
- path: build/build-image/cross/VERSION
# Base images
- name: "k8s.gcr.io/debian-base: dependents"
- name: "registry.k8s.io/debian-base: dependents"
version: bullseye-v1.2.0
refPaths:
- path: cluster/images/etcd/Makefile
match: BASEIMAGE\?\=k8s\.gcr\.io\/build-image\/debian-base:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
match: BASEIMAGE\?\=registry\.k8s\.io\/build-image\/debian-base:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
- path: cluster/images/etcd/Makefile
match: BASEIMAGE\?\=k8s\.gcr\.io\/build-image\/debian-base-arm:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
match: BASEIMAGE\?\=registry\.k8s\.io\/build-image\/debian-base-arm:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
- path: cluster/images/etcd/Makefile
match: BASEIMAGE\?\=k8s\.gcr\.io\/build-image\/debian-base-arm64:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
match: BASEIMAGE\?\=registry\.k8s\.io\/build-image\/debian-base-arm64:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
- path: cluster/images/etcd/Makefile
match: BASEIMAGE\?\=k8s\.gcr\.io\/build-image\/debian-base-ppc64le:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
match: BASEIMAGE\?\=registry\.k8s\.io\/build-image\/debian-base-ppc64le:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
- path: cluster/images/etcd/Makefile
match: BASEIMAGE\?\=k8s\.gcr\.io\/build-image\/debian-base-s390x:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
match: BASEIMAGE\?\=registry\.k8s\.io\/build-image\/debian-base-s390x:[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)
- path: test/conformance/image/Makefile
match: BASE_IMAGE_VERSION\?=
- name: "k8s.gcr.io/debian-iptables: dependents"
- name: "registry.k8s.io/debian-iptables: dependents"
version: bullseye-v1.3.0
refPaths:
- path: build/common.sh
@ -139,27 +139,27 @@ dependencies:
- path: test/utils/image/manifest.go
match: configs\[DebianIptables\] = Config{list\.BuildImageRegistry, "debian-iptables", "[a-zA-Z]+\-v((([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?)"}
- name: "k8s.gcr.io/go-runner: dependents"
- name: "registry.k8s.io/go-runner: dependents"
version: v2.3.1-go1.18.2-bullseye.0
refPaths:
- path: build/common.sh
match: __default_go_runner_version=
- name: "k8s.gcr.io/pause"
- name: "registry.k8s.io/pause"
version: 3.7
refPaths:
- path: build/pause/Makefile
match: TAG\s*\?=
- name: "k8s.gcr.io/pause: dependents"
- name: "registry.k8s.io/pause: dependents"
version: 3.7
refPaths:
- path: cluster/gce/config-common.sh
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: cluster/gce/gci/configure-helper.sh
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: cluster/gce/windows/smoke-test.sh
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: cmd/kubeadm/app/constants/constants.go
match: PauseVersion\s+=
- path: cmd/kubeadm/app/util/template_test.go
@ -171,43 +171,43 @@ dependencies:
- path: cmd/kubelet/app/options/container_runtime.go
match: defaultPodSandboxImageVersion\s+=
- path: hack/testdata/pod-with-precision.json
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: staging/src/k8s.io/kubectl/testdata/set/multi-resource-yaml.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: staging/src/k8s.io/kubectl/testdata/set/namespaced-resource.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/cmd/core.sh
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/fixtures/pkg/kubectl/cmd/set/multi-resource-yaml.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/fixtures/pkg/kubectl/cmd/set/namespaced-resource.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/benchmark-controller.json
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/scheduler_perf/config/pod-default.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/scheduler_perf/config/pod-with-node-affinity.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/scheduler_perf/config/pod-with-pod-affinity.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/scheduler_perf/config/pod-with-pod-anti-affinity.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/scheduler_perf/config/pod-with-preferred-pod-affinity.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/scheduler_perf/config/pod-with-preferred-pod-anti-affinity.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/scheduler_perf/config/pod-with-preferred-topology-spreading.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/scheduler_perf/config/pod-with-secret-volume.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/integration/scheduler_perf/config/pod-with-topology-spreading.yaml
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/utils/runners.go
match: k8s.gcr.io\/pause:\d+\.\d+
match: registry.k8s.io\/pause:\d+\.\d+
- path: test/utils/image/manifest.go
match: configs\[Pause\] = Config{list\.GcRegistry, "pause", "\d+\.\d+(.\d+)?"}
- name: "k8s.gcr.io/setcap: dependents"
- name: "registry.k8s.io/setcap: dependents"
version: bullseye-v1.2.0
refPaths:
- path: build/common.sh

View File

@ -340,10 +340,10 @@ function kube::release::create_docker_images_for_server() {
images_dir="${RELEASE_IMAGES}/${arch}"
mkdir -p "${images_dir}"
# k8s.gcr.io is the constant tag in the docker archives, this is also the default for config scripts in GKE.
# registry.k8s.io is the constant tag in the docker archives, this is also the default for config scripts in GKE.
# We can use KUBE_DOCKER_REGISTRY to include and extra registry in the docker archive.
# If we use KUBE_DOCKER_REGISTRY="k8s.gcr.io", then the extra tag (same) is ignored, see release_docker_image_tag below.
local -r docker_registry="k8s.gcr.io"
# If we use KUBE_DOCKER_REGISTRY="registry.k8s.io", then the extra tag (same) is ignored, see release_docker_image_tag below.
local -r docker_registry="registry.k8s.io"
# Docker tags cannot contain '+'
local docker_tag="${KUBE_GIT_VERSION/+/_}"
if [[ -z "${docker_tag}" ]]; then

View File

@ -40,7 +40,7 @@ ALL_OS_ARCH.windows = $(foreach arch, $(ALL_ARCH.windows), $(foreach osversion,
ALL_OS_ARCH = $(foreach os, $(ALL_OS), ${ALL_OS_ARCH.${os}})
CFLAGS = -Os -Wall -Werror -static -DVERSION=v$(TAG)-$(REV)
KUBE_CROSS_IMAGE ?= k8s.gcr.io/build-image/kube-cross
KUBE_CROSS_IMAGE ?= registry.k8s.io/build-image/kube-cross
KUBE_CROSS_VERSION ?= $(shell cat ../build-image/cross/VERSION)
# NOTE(claudiub): The Windows pause image also requires the wincat binary we're compiling for the

View File

@ -410,8 +410,8 @@ define RELEASE_SKIP_TESTS_HELP_INFO
# Args:
# KUBE_RELEASE_RUN_TESTS: Whether to run tests. Set to 'y' to run tests anyways.
# KUBE_FASTBUILD: Whether to cross-compile for other architectures. Set to 'false' to do so.
# KUBE_DOCKER_REGISTRY: Registry of released images, default to k8s.gcr.io
# KUBE_BASE_IMAGE_REGISTRY: Registry of base images for controlplane binaries, default to k8s.gcr.io/build-image
# KUBE_DOCKER_REGISTRY: Registry of released images, default to registry.k8s.io
# KUBE_BASE_IMAGE_REGISTRY: Registry of base images for controlplane binaries, default to registry.k8s.io/build-image
#
# Example:
# make release-skip-tests

View File

@ -18,7 +18,7 @@ TEMP_DIR:=$(shell mktemp -d)
VERSION=v9.1.6
KUBECTL_VERSION?=v1.20.2
BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):v1.0.1
BASEIMAGE=registry.k8s.io/debian-base-$(ARCH):v1.0.1
SUDO=$(if $(filter 0,$(shell id -u)),,sudo)

View File

@ -25,7 +25,7 @@ Otherwise it will be omitted.
#### Images
addon-manager images are pushed to `k8s.gcr.io`. As addon-manager is built for multiple architectures, there is an image per architecture in the format - `k8s.gcr.io/addon-manager/kube-addon-manager-$(ARCH):$(VERSION)`.
addon-manager images are pushed to `registry.k8s.io`. As addon-manager is built for multiple architectures, there is an image per architecture in the format - `registry.k8s.io/addon-manager/kube-addon-manager-$(ARCH):$(VERSION)`.
#### How to release
@ -56,4 +56,4 @@ $ make push ARCH=s390x
# ---> staging-k8s.gcr.io/addon-manager/kube-addon-manager-s390x:VERSION
```
If you don't want to push the images, run `make` or `make build` instead
If you don't want to push the images, run `make` or `make build` instead

View File

@ -18,7 +18,7 @@ spec:
spec:
priorityClassName: system-cluster-critical
containers:
- image: k8s.gcr.io/cpvpa-amd64:v0.8.3
- image: registry.k8s.io/cpvpa-amd64:v0.8.3
name: autoscaler
command:
- /cpvpa

View File

@ -21,7 +21,7 @@ spec:
supplementalGroups: [ 65534 ]
fsGroup: 65534
containers:
- image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.7.1
- image: registry.k8s.io/cluster-proportional-autoscaler-amd64:1.7.1
name: autoscaler
command:
- /cluster-proportional-autoscaler

View File

@ -18,7 +18,7 @@ spec:
spec:
priorityClassName: system-cluster-critical
containers:
- image: k8s.gcr.io/cpvpa-amd64:v0.8.3
- image: registry.k8s.io/cpvpa-amd64:v0.8.3
name: autoscaler
command:
- /cpvpa

View File

@ -26,7 +26,7 @@ spec:
# Any image is permissible as long as:
# 1. It serves a 404 page at /
# 2. It serves 200 on a /healthz endpoint
image: k8s.gcr.io/networking/ingress-gce-404-server-with-metrics-amd64:v1.10.11
image: registry.k8s.io/networking/ingress-gce-404-server-with-metrics-amd64:v1.10.11
livenessProbe:
httpGet:
path: /healthz

View File

@ -36,7 +36,7 @@ spec:
hostPath:
path: /dev
containers:
- image: "k8s.gcr.io/nvidia-gpu-device-plugin@sha256:4b036e8844920336fa48f36edeb7d4398f426d6a934ba022848deed2edbf09aa"
- image: "registry.k8s.io/nvidia-gpu-device-plugin@sha256:4b036e8844920336fa48f36edeb7d4398f426d6a934ba022848deed2edbf09aa"
command: ["/usr/bin/nvidia-gpu-device-plugin", "-logtostderr"]
name: nvidia-gpu-device-plugin
resources:

View File

@ -86,7 +86,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: autoscaler
image: k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.4
image: registry.k8s.io/cpa/cluster-proportional-autoscaler:1.8.4
resources:
requests:
cpu: "20m"

View File

@ -139,7 +139,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: coredns
image: k8s.gcr.io/coredns/coredns:v1.8.6
image: registry.k8s.io/coredns/coredns:v1.8.6
imagePullPolicy: IfNotPresent
resources:
limits:

View File

@ -139,7 +139,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: coredns
image: k8s.gcr.io/coredns/coredns:v1.8.6
image: registry.k8s.io/coredns/coredns:v1.8.6
imagePullPolicy: IfNotPresent
resources:
limits:

View File

@ -139,7 +139,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: coredns
image: k8s.gcr.io/coredns/coredns:v1.8.6
image: registry.k8s.io/coredns/coredns:v1.8.6
imagePullPolicy: IfNotPresent
resources:
limits:

View File

@ -114,7 +114,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: kubedns
image: k8s.gcr.io/dns/k8s-dns-kube-dns:1.21.1
image: registry.k8s.io/dns/k8s-dns-kube-dns:1.21.1
resources:
# TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in
@ -170,7 +170,7 @@ spec:
runAsUser: 1001
runAsGroup: 1001
- name: dnsmasq
image: k8s.gcr.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
image: registry.k8s.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
livenessProbe:
httpGet:
path: /healthcheck/dnsmasq
@ -217,7 +217,7 @@ spec:
- NET_BIND_SERVICE
- SETGID
- name: sidecar
image: k8s.gcr.io/dns/k8s-dns-sidecar:1.21.1
image: registry.k8s.io/dns/k8s-dns-sidecar:1.21.1
livenessProbe:
httpGet:
path: /metrics

View File

@ -114,7 +114,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: kubedns
image: k8s.gcr.io/dns/k8s-dns-kube-dns:1.21.1
image: registry.k8s.io/dns/k8s-dns-kube-dns:1.21.1
resources:
# TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in
@ -170,7 +170,7 @@ spec:
runAsUser: 1001
runAsGroup: 1001
- name: dnsmasq
image: k8s.gcr.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
image: registry.k8s.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
livenessProbe:
httpGet:
path: /healthcheck/dnsmasq
@ -217,7 +217,7 @@ spec:
- NET_BIND_SERVICE
- SETGID
- name: sidecar
image: k8s.gcr.io/dns/k8s-dns-sidecar:1.21.1
image: registry.k8s.io/dns/k8s-dns-sidecar:1.21.1
livenessProbe:
httpGet:
path: /metrics

View File

@ -114,7 +114,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: kubedns
image: k8s.gcr.io/dns/k8s-dns-kube-dns:1.21.1
image: registry.k8s.io/dns/k8s-dns-kube-dns:1.21.1
resources:
# TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in
@ -170,7 +170,7 @@ spec:
runAsUser: 1001
runAsGroup: 1001
- name: dnsmasq
image: k8s.gcr.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
image: registry.k8s.io/dns/k8s-dns-dnsmasq-nanny:1.21.1
livenessProbe:
httpGet:
path: /healthcheck/dnsmasq
@ -217,7 +217,7 @@ spec:
- NET_BIND_SERVICE
- SETGID
- name: sidecar
image: k8s.gcr.io/dns/k8s-dns-sidecar:1.21.1
image: registry.k8s.io/dns/k8s-dns-sidecar:1.21.1
livenessProbe:
httpGet:
path: /metrics

View File

@ -19,7 +19,7 @@ We have the following variables in the yaml:
Note: The local listen IP address for NodeLocal DNSCache can be any address that can be guaranteed to not collide with any existing IP in your cluster. It's recommended to use an address with a local scope, per example, from the link-local range 169.254.0.0/16 for IPv4 or from the Unique Local Address range in IPv6 fd00::/8.
The following variables will be set by the node-cache images - k8s.gcr.io/k8s-dns-node-cache:1.15.6 or later.
The following variables will be set by the node-cache images - registry.k8s.io/k8s-dns-node-cache:1.15.6 or later.
The values will be determined by reading the kube-dns configMap for custom
Upstream server configuration.
`__PILLAR__CLUSTER__DNS__` - Upstream server for in-cluster queries.

View File

@ -138,7 +138,7 @@ spec:
operator: "Exists"
containers:
- name: node-cache
image: k8s.gcr.io/dns/k8s-dns-node-cache:1.21.1
image: registry.k8s.io/dns/k8s-dns-node-cache:1.21.1
resources:
requests:
cpu: 25m

View File

@ -19,7 +19,7 @@ spec:
serviceAccountName: fluentd-gcp-scaler
containers:
- name: fluentd-gcp-scaler
image: k8s.gcr.io/fluentd-gcp-scaler:0.5.2
image: registry.k8s.io/fluentd-gcp-scaler:0.5.2
command:
- /scaler.sh
- --ds-name=fluentd-gcp-{{ fluentd_gcp_yaml_version }}

View File

@ -29,7 +29,7 @@ spec:
hostNetwork: true
containers:
- name: ip-masq-agent
image: k8s.gcr.io/networking/ip-masq-agent-amd64:v2.6.0
image: registry.k8s.io/networking/ip-masq-agent-amd64:v2.6.0
args:
- --masq-chain=IP-MASQ
- --nomasq-all-reserved-ranges

View File

@ -43,7 +43,7 @@ spec:
effect: "NoSchedule"
containers:
- name: metadata-proxy
image: k8s.gcr.io/metadata-proxy:v0.1.12
image: registry.k8s.io/metadata-proxy:v0.1.12
args: ["--addr=0.0.0.0:988"]
securityContext:
privileged: true

View File

@ -50,7 +50,7 @@ spec:
kubernetes.io/os: linux
containers:
- name: metrics-server
image: k8s.gcr.io/metrics-server/metrics-server:v0.5.2
image: registry.k8s.io/metrics-server/metrics-server:v0.5.2
command:
- /metrics-server
- --metric-resolution=30s
@ -81,7 +81,7 @@ spec:
- mountPath: /tmp
name: tmp-dir
- name: metrics-server-nanny
image: k8s.gcr.io/autoscaling/addon-resizer:1.8.14
image: registry.k8s.io/autoscaling/addon-resizer:1.8.14
resources:
limits:
cpu: 100m

View File

@ -47,7 +47,7 @@ spec:
spec:
containers:
- name: node-problem-detector
image: k8s.gcr.io/node-problem-detector/node-problem-detector:v0.8.9
image: registry.k8s.io/node-problem-detector/node-problem-detector:v0.8.9
command:
- "/bin/sh"
- "-c"

View File

@ -22,7 +22,7 @@ spec:
serviceAccount: volume-snapshot-controller
containers:
- name: volume-snapshot-controller
image: k8s.gcr.io/sig-storage/snapshot-controller:v4.0.0
image: registry.k8s.io/sig-storage/snapshot-controller:v4.0.0
args:
- "--v=5"
- "--metrics-path=/metrics"

View File

@ -27,7 +27,7 @@ spec:
nodeSelector:
kubernetes.io/os: linux
containers:
- image: k8s.gcr.io/kas-network-proxy/proxy-agent:v0.0.30
- image: registry.k8s.io/kas-network-proxy/proxy-agent:v0.0.30
name: konnectivity-agent
command: ["/proxy-agent"]
args: [

View File

@ -160,7 +160,7 @@ export WINDOWS_KUBEPROXY_KUBECONFIG_FILE="${WINDOWS_K8S_DIR}\kubeproxy.kubeconfi
# Path for kube-proxy kubeconfig file on Windows nodes.
export WINDOWS_NODEPROBLEMDETECTOR_KUBECONFIG_FILE="${WINDOWS_K8S_DIR}\node-problem-detector.kubeconfig"
# Pause container image for Windows container.
export WINDOWS_INFRA_CONTAINER="k8s.gcr.io/pause:3.7"
export WINDOWS_INFRA_CONTAINER="registry.k8s.io/pause:3.7"
# Storage Path for csi-proxy. csi-proxy only needs to be installed for Windows.
export CSI_PROXY_STORAGE_PATH="https://storage.googleapis.com/gke-release/csi-proxy"
# Version for csi-proxy

View File

@ -200,7 +200,7 @@ HEAPSTER_MACHINE_TYPE=${HEAPSTER_MACHINE_TYPE:-}
NUM_ADDITIONAL_NODES=${NUM_ADDITIONAL_NODES:-}
ADDITIONAL_MACHINE_TYPE=${ADDITIONAL_MACHINE_TYPE:-}
# Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. v3.5.1-0) if you need
# Set etcd image (e.g. registry.k8s.io/etcd) and version (e.g. v3.5.1-0) if you need
# non-default version.
export ETCD_IMAGE=${TEST_ETCD_IMAGE:-}
export ETCD_DOCKER_REPOSITORY=${TEST_ETCD_DOCKER_REPOSITORY:-}

View File

@ -1720,7 +1720,7 @@ function prepare-kube-proxy-manifest-variables {
local -r src_file=$1;
local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig"
local kube_docker_registry="k8s.gcr.io"
local kube_docker_registry="registry.k8s.io"
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
kube_docker_registry=${KUBE_DOCKER_REGISTRY}
fi
@ -2057,7 +2057,7 @@ function compute-master-manifest-variables {
CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}},"
CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
fi
DOCKER_REGISTRY="k8s.gcr.io"
DOCKER_REGISTRY="registry.k8s.io"
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}"
fi
@ -2989,7 +2989,7 @@ spec:
- name: vol
containers:
- name: pv-recycler
image: k8s.gcr.io/debian-base:v2.0.0
image: registry.k8s.io/debian-base:v2.0.0
command:
- /bin/sh
args:
@ -3002,7 +3002,7 @@ EOF
# fixup the alternate registry if specified
if [[ -n "${KUBE_ADDON_REGISTRY:-}" ]]; then
sed -i -e "s@k8s.gcr.io@${KUBE_ADDON_REGISTRY}@g" "${PV_RECYCLER_OVERRIDE_TEMPLATE}"
sed -i -e "s@registry.k8s.io@${KUBE_ADDON_REGISTRY}@g" "${PV_RECYCLER_OVERRIDE_TEMPLATE}"
fi
}
@ -3074,7 +3074,7 @@ oom_score = -999
[plugins."io.containerd.grpc.v1.cri"]
stream_server_address = "127.0.0.1"
max_container_log_line_size = ${CONTAINERD_MAX_CONTAINER_LOG_LINE:-262144}
sandbox_image = "${CONTAINERD_INFRA_CONTAINER:-"k8s.gcr.io/pause:3.7"}"
sandbox_image = "${CONTAINERD_INFRA_CONTAINER:-"registry.k8s.io/pause:3.7"}"
[plugins."io.containerd.grpc.v1.cri".cni]
bin_dir = "${KUBE_HOME}/bin"
conf_dir = "/etc/cni/net.d"
@ -3085,10 +3085,10 @@ oom_score = -999
runtime_type = "io.containerd.runc.v2"
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"]
endpoint = ["https://mirror.gcr.io","https://registry-1.docker.io"]
# Enable registry.k8s.io as the primary mirror for k8s.gcr.io
# Enable registry.k8s.io as the primary mirror for registry.k8s.io
# See: https://github.com/kubernetes/k8s.io/issues/3411
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."k8s.gcr.io"]
endpoint = ["https://registry.k8s.io", "https://k8s.gcr.io",]
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."registry.k8s.io"]
endpoint = ["https://registry.k8s.io", "https://registry.k8s.io",]
EOF
if [[ "${CONTAINER_RUNTIME_TEST_HANDLER:-}" == "true" ]]; then

View File

@ -399,12 +399,12 @@ function install-kube-manifests {
echo "Downloading k8s manifests tar"
download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}"
tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite
local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-k8s.gcr.io}"
if [[ "${kube_addon_registry}" != "k8s.gcr.io" ]]; then
local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-registry.k8s.io}"
if [[ "${kube_addon_registry}" != "registry.k8s.io" ]]; then
find "${dst_dir}" \( -name '*.yaml' -or -name '*.yaml.in' \) -print0 | \
xargs -0 sed -ri "s@(image:\s.*)k8s.gcr.io@\1${kube_addon_registry}@"
xargs -0 sed -ri "s@(image:\s.*)registry.k8s.io@\1${kube_addon_registry}@"
find "${dst_dir}" \( -name '*.manifest' -or -name '*.json' \) -print0 | \
xargs -0 sed -ri "s@(image\":\s+\")k8s.gcr.io@\1${kube_addon_registry}@"
xargs -0 sed -ri "s@(image\":\s+\")registry.k8s.io@\1${kube_addon_registry}@"
fi
cp "${dst_dir}/kubernetes/gci-trusty/gci-configure-helper.sh" "${KUBE_BIN}/configure-helper.sh"
cp "${dst_dir}/kubernetes/gci-trusty/configure-kubeapiserver.sh" "${KUBE_BIN}/configure-kubeapiserver.sh"
@ -454,8 +454,8 @@ function try-load-docker-image {
container=${img##*/}
container=${container%.tar}
# find the right one for which we will need an additional tag
container=$(ctr -n k8s.io images ls | grep "k8s.gcr.io/${container}" | awk '{print $1}' | cut -f 2 -d '/')
${tag_image_command} "k8s.gcr.io/${container}" "${KUBE_ADDON_REGISTRY}/${container}"
container=$(ctr -n k8s.io images ls | grep "registry.k8s.io/${container}" | awk '{print $1}' | cut -f 2 -d '/')
${tag_image_command} "registry.k8s.io/${container}" "${KUBE_ADDON_REGISTRY}/${container}"
fi
# Re-enable errexit.
set -e

View File

@ -10,7 +10,7 @@ readonly APISERVER_CLIENT_CERT_PATH=/foo/bar
readonly CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
readonly CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}},"
readonly INSECURE_PORT_MAPPING="{ \"name\": \"local\", \"containerPort\": 8080, \"hostPort\": 8080},"
readonly DOCKER_REGISTRY="k8s.gcr.io"
readonly DOCKER_REGISTRY="registry.k8s.io"
readonly ENABLE_LEGACY_ABAC=false
readonly ETC_MANIFESTS=${KUBE_HOME}/etc/kubernetes/manifests
readonly KUBE_API_SERVER_DOCKER_TAG=v1.11.0-alpha.0.1808_3c7452dc11645d-dirty

View File

@ -19,7 +19,7 @@
"containers": [
{
"name": "cluster-autoscaler",
"image": "k8s.gcr.io/autoscaling/cluster-autoscaler:v1.22.0",
"image": "registry.k8s.io/autoscaling/cluster-autoscaler:v1.22.0",
"livenessProbe": {
"httpGet": {
"path": "/health-check",

View File

@ -18,7 +18,7 @@
{
"name": "etcd-container",
{{security_context}}
"image": "{{ pillar.get('etcd_docker_repository', 'k8s.gcr.io/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.5.3-0') }}",
"image": "{{ pillar.get('etcd_docker_repository', 'registry.k8s.io/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.5.3-0') }}",
"resources": {
"requests": {
"cpu": {{ cpulimit }}

View File

@ -20,7 +20,7 @@ spec:
{{ disallow_privilege_escalation}}
{{ capabilities }}
{{ drop_capabilities }}
image: k8s.gcr.io/kas-network-proxy/proxy-server:v0.0.30
image: registry.k8s.io/kas-network-proxy/proxy-server:v0.0.30
resources:
requests:
cpu: 25m

View File

@ -23,7 +23,7 @@ spec:
- all
# When updating version also bump it in:
# - test/kubemark/resources/manifests/kube-addon-manager.yaml
image: k8s.gcr.io/addon-manager/kube-addon-manager:v9.1.6
image: registry.k8s.io/addon-manager/kube-addon-manager:v9.1.6
command:
- /bin/bash
- -c

View File

@ -358,7 +358,7 @@ spec:
spec:
containers:
- name: pause-win
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7
nodeSelector:
kubernetes.io/os: windows
tolerations:

View File

@ -7,6 +7,6 @@ spec:
hostNetwork: true
containers:
- name: etcd-version-monitor
image: k8s.gcr.io/etcd-version-monitor:0.1.3
image: registry.k8s.io/etcd-version-monitor:0.1.3
command:
- /etcd-version-monitor

View File

@ -15,7 +15,7 @@
# Build the etcd image
#
# Usage:
# [BUNDLED_ETCD_VERSIONS=3.0.17 3.1.20 3.2.32 3.3.17 3.4.18 3.5.4] [REGISTRY=k8s.gcr.io] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push)
# [BUNDLED_ETCD_VERSIONS=3.0.17 3.1.20 3.2.32 3.3.17 3.4.18 3.5.4] [REGISTRY=registry.k8s.io] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push)
#
# The image contains different etcd versions to simplify
# upgrades. Thus be careful when removing any versions from here.
@ -36,7 +36,7 @@ LATEST_ETCD_VERSION?=3.5.4
# for each revision of this image at that etcd version.
REVISION?=0
# IMAGE_TAG Uniquely identifies k8s.gcr.io/etcd docker image with a tag of the form "<etcd-version>-<revision>".
# IMAGE_TAG Uniquely identifies registry.k8s.io/etcd docker image with a tag of the form "<etcd-version>-<revision>".
IMAGE_TAG=$(LATEST_ETCD_VERSION)-$(REVISION)
ARCH?=amd64
@ -62,9 +62,9 @@ IMAGE_SUFFIX.linux = $(OS)-$(ARCH)
IMAGE_SUFFIX.windows = $(OS)-$(ARCH)-$(OSVERSION)
IMAGE_SUFFIX := ${IMAGE_SUFFIX.${OS}}
# Image should be pulled from k8s.gcr.io, which will auto-detect
# Image should be pulled from registry.k8s.io, which will auto-detect
# region (us, eu, asia, ...) and pull from the closest.
REGISTRY?=k8s.gcr.io
REGISTRY?=registry.k8s.io
# Images should be pushed to staging-k8s.gcr.io.
PUSH_REGISTRY?=staging-k8s.gcr.io
@ -92,19 +92,19 @@ DOCKERFILE.windows = Dockerfile.windows
DOCKERFILE := ${DOCKERFILE.${OS}}
ifeq ($(ARCH),amd64)
BASEIMAGE?=k8s.gcr.io/build-image/debian-base:bullseye-v1.2.0
BASEIMAGE?=registry.k8s.io/build-image/debian-base:bullseye-v1.2.0
endif
ifeq ($(ARCH),arm)
BASEIMAGE?=k8s.gcr.io/build-image/debian-base-arm:bullseye-v1.2.0
BASEIMAGE?=registry.k8s.io/build-image/debian-base-arm:bullseye-v1.2.0
endif
ifeq ($(ARCH),arm64)
BASEIMAGE?=k8s.gcr.io/build-image/debian-base-arm64:bullseye-v1.2.0
BASEIMAGE?=registry.k8s.io/build-image/debian-base-arm64:bullseye-v1.2.0
endif
ifeq ($(ARCH),ppc64le)
BASEIMAGE?=k8s.gcr.io/build-image/debian-base-ppc64le:bullseye-v1.2.0
BASEIMAGE?=registry.k8s.io/build-image/debian-base-ppc64le:bullseye-v1.2.0
endif
ifeq ($(ARCH),s390x)
BASEIMAGE?=k8s.gcr.io/build-image/debian-base-s390x:bullseye-v1.2.0
BASEIMAGE?=registry.k8s.io/build-image/debian-base-s390x:bullseye-v1.2.0
endif
BASE.windows = mcr.microsoft.com/windows/nanoserver
@ -240,8 +240,8 @@ unit-test:
docker run --rm --interactive -v $(shell pwd)/../../../:/go/src/k8s.io/kubernetes$(DOCKER_VOL_OPTS) -e GOARCH=$(ARCH) golang:$(GOLANG_VERSION) \
/bin/bash -c "CGO_ENABLED=0 go test -v k8s.io/kubernetes/cluster/images/etcd/migrate"
# Integration tests require both a golang build environment and all the etcd binaries from a `k8s.gcr.io/etcd` image (`/usr/local/bin/etcd-<version>`, ...).
# Since the `k8s.gcr.io/etcd` image is for runtime only and does not have a build golang environment, we create a new docker image to run integration tests
# Integration tests require both a golang build environment and all the etcd binaries from a `registry.k8s.io/etcd` image (`/usr/local/bin/etcd-<version>`, ...).
# Since the `registry.k8s.io/etcd` image is for runtime only and does not have a build golang environment, we create a new docker image to run integration tests
# with.
build-integration-test-image: build
cp -r $(TEMP_DIR) $(TEMP_DIR)_integration_test

View File

@ -1,4 +1,4 @@
### k8s.gcr.io/etcd docker image
### registry.k8s.io/etcd docker image
Provides docker images containing etcd and etcdctl binaries for multiple etcd
version as well as a migration operator utility for upgrading and downgrading
@ -6,14 +6,14 @@ etcd--it's data directory in particular--to a target version.
#### Versioning
Each `k8s.gcr.io/etcd` docker image is tagged with an version string of the form
Each `registry.k8s.io/etcd` docker image is tagged with an version string of the form
`<etcd-version>-<image-revision>`, e.g. `3.0.17-0`. The etcd version is the
SemVer of latest etcd version available in the image. The image revision
distinguishes between docker images with the same lastest etcd version but
changes (bug fixes and backward compatible improvements) to the migration
utility bundled with the image.
In addition to the latest etcd version, each `k8s.gcr.io/etcd` image contains
In addition to the latest etcd version, each `registry.k8s.io/etcd` image contains
etcd and etcdctl binaries for older versions of etcd. These are used by the
migration operator utility when performing downgrades and multi-step upgrades,
but can also be used as the etcd target version.
@ -41,7 +41,7 @@ Downgrades to the previous minor version of the 3.x series is supported.
By default, `migrate` will write data directory files with default permissions
according to the umask it is run with. When run in the published
`k8s.gcr.io/etcd` images the default umask is 0022 which will result in 0755
`registry.k8s.io/etcd` images the default umask is 0022 which will result in 0755
directory permissions and 0644 file permissions.
#### Cross building

View File

@ -19,6 +19,6 @@
# See https://console.cloud.google.com/gcr/images/k8s-staging-build-image/global/go-runner
# for a list of available versions. This base image should be updated
# periodically.
FROM k8s.gcr.io/build-image/go-runner:v2.3.1-go1.17.2-bullseye.0
FROM registry.k8s.io/build-image/go-runner:v2.3.1-go1.17.2-bullseye.0
COPY kubemark /kubemark

View File

@ -116,8 +116,8 @@ type ClusterConfiguration struct {
CertificatesDir string
// ImageRepository sets the container registry to pull images from.
// If empty, `k8s.gcr.io` will be used by default; in case of kubernetes version is a CI build (kubernetes version starts with `ci/`)
// `gcr.io/k8s-staging-ci-images` will be used as a default for control plane components and for kube-proxy, while `k8s.gcr.io`
// If empty, `registry.k8s.io` will be used by default; in case of kubernetes version is a CI build (kubernetes version starts with `ci/`)
// `gcr.io/k8s-staging-ci-images` will be used as a default for control plane components and for kube-proxy, while `registry.k8s.io`
// will be used for all the other images.
ImageRepository string

View File

@ -40,7 +40,8 @@ const (
// DefaultCertificatesDir defines default certificate directory
DefaultCertificatesDir = "/etc/kubernetes/pki"
// DefaultImageRepository defines default image registry
DefaultImageRepository = "k8s.gcr.io"
// (previously this defaulted to k8s.gcr.io)
DefaultImageRepository = "registry.k8s.io"
// DefaultManifestsDir defines default manifests directory
DefaultManifestsDir = "/etc/kubernetes/manifests"
// DefaultClusterName defines the default cluster name

View File

@ -188,7 +188,7 @@ limitations under the License.
// etcd:
// # one of local or external
// local:
// imageRepository: "k8s.gcr.io"
// imageRepository: "registry.k8s.io"
// imageTag: "3.2.24"
// dataDir: "/var/lib/etcd"
// extraArgs:
@ -242,7 +242,7 @@ limitations under the License.
// readOnly: false
// pathType: File
// certificatesDir: "/etc/kubernetes/pki"
// imageRepository: "k8s.gcr.io"
// imageRepository: "registry.k8s.io"
// useHyperKubeImage: false
// clusterName: "example-cluster"
// ---

View File

@ -96,8 +96,8 @@ type ClusterConfiguration struct {
CertificatesDir string `json:"certificatesDir,omitempty"`
// ImageRepository sets the container registry to pull images from.
// If empty, `k8s.gcr.io` will be used by default; in case of kubernetes version is a CI build (kubernetes version starts with `ci/`)
// `gcr.io/k8s-staging-ci-images` will be used as a default for control plane components and for kube-proxy, while `k8s.gcr.io`
// If empty, `registry.k8s.io` will be used by default; in case of kubernetes version is a CI build (kubernetes version starts with `ci/`)
// `gcr.io/k8s-staging-ci-images` will be used as a default for control plane components and for kube-proxy, while `registry.k8s.io`
// will be used for all the other images.
ImageRepository string `json:"imageRepository,omitempty"`

View File

@ -42,7 +42,8 @@ const (
// DefaultCertificatesDir defines default certificate directory
DefaultCertificatesDir = "/etc/kubernetes/pki"
// DefaultImageRepository defines default image registry
DefaultImageRepository = "k8s.gcr.io"
// (previously this defaulted to k8s.gcr.io)
DefaultImageRepository = "registry.k8s.io"
// DefaultManifestsDir defines default manifests directory
DefaultManifestsDir = "/etc/kubernetes/manifests"
// DefaultClusterName defines the default cluster name

View File

@ -195,7 +195,7 @@ limitations under the License.
// etcd:
// # one of local or external
// local:
// imageRepository: "k8s.gcr.io"
// imageRepository: "registry.k8s.io"
// imageTag: "3.2.24"
// dataDir: "/var/lib/etcd"
// extraArgs:
@ -249,7 +249,7 @@ limitations under the License.
// readOnly: false
// pathType: File
// certificatesDir: "/etc/kubernetes/pki"
// imageRepository: "k8s.gcr.io"
// imageRepository: "registry.k8s.io"
// clusterName: "example-cluster"
// ---
// apiVersion: kubelet.config.k8s.io/v1beta1

View File

@ -122,8 +122,8 @@ type ClusterConfiguration struct {
CertificatesDir string `json:"certificatesDir,omitempty"`
// ImageRepository sets the container registry to pull images from.
// If empty, `k8s.gcr.io` will be used by default; in case of kubernetes version is a CI build (kubernetes version starts with `ci/`)
// `gcr.io/k8s-staging-ci-images` will be used as a default for control plane components and for kube-proxy, while `k8s.gcr.io`
// If empty, `registry.k8s.io` will be used by default; in case of kubernetes version is a CI build (kubernetes version starts with `ci/`)
// `gcr.io/k8s-staging-ci-images` will be used as a default for control plane components and for kube-proxy, while `registry.k8s.io`
// will be used for all the other images.
// +optional
ImageRepository string `json:"imageRepository,omitempty"`

View File

@ -235,13 +235,13 @@ func TestConfigImagesListOutput(t *testing.T) {
KubernetesVersion: dummyKubernetesVersionStr,
},
outputFormat: "text",
expectedOutput: `k8s.gcr.io/kube-apiserver:{{.KubeVersion}}
k8s.gcr.io/kube-controller-manager:{{.KubeVersion}}
k8s.gcr.io/kube-scheduler:{{.KubeVersion}}
k8s.gcr.io/kube-proxy:{{.KubeVersion}}
k8s.gcr.io/pause:{{.PauseVersion}}
k8s.gcr.io/etcd:{{.EtcdVersion}}
k8s.gcr.io/coredns/coredns:{{.CoreDNSVersion}}
expectedOutput: `registry.k8s.io/kube-apiserver:{{.KubeVersion}}
registry.k8s.io/kube-controller-manager:{{.KubeVersion}}
registry.k8s.io/kube-scheduler:{{.KubeVersion}}
registry.k8s.io/kube-proxy:{{.KubeVersion}}
registry.k8s.io/pause:{{.PauseVersion}}
registry.k8s.io/etcd:{{.EtcdVersion}}
registry.k8s.io/coredns/coredns:{{.CoreDNSVersion}}
`,
},
{
@ -254,13 +254,13 @@ k8s.gcr.io/coredns/coredns:{{.CoreDNSVersion}}
"kind": "Images",
"apiVersion": "output.kubeadm.k8s.io/v1alpha2",
"images": [
"k8s.gcr.io/kube-apiserver:{{.KubeVersion}}",
"k8s.gcr.io/kube-controller-manager:{{.KubeVersion}}",
"k8s.gcr.io/kube-scheduler:{{.KubeVersion}}",
"k8s.gcr.io/kube-proxy:{{.KubeVersion}}",
"k8s.gcr.io/pause:{{.PauseVersion}}",
"k8s.gcr.io/etcd:{{.EtcdVersion}}",
"k8s.gcr.io/coredns/coredns:{{.CoreDNSVersion}}"
"registry.k8s.io/kube-apiserver:{{.KubeVersion}}",
"registry.k8s.io/kube-controller-manager:{{.KubeVersion}}",
"registry.k8s.io/kube-scheduler:{{.KubeVersion}}",
"registry.k8s.io/kube-proxy:{{.KubeVersion}}",
"registry.k8s.io/pause:{{.PauseVersion}}",
"registry.k8s.io/etcd:{{.EtcdVersion}}",
"registry.k8s.io/coredns/coredns:{{.CoreDNSVersion}}"
]
}
`,
@ -273,13 +273,13 @@ k8s.gcr.io/coredns/coredns:{{.CoreDNSVersion}}
outputFormat: "yaml",
expectedOutput: `apiVersion: output.kubeadm.k8s.io/v1alpha2
images:
- k8s.gcr.io/kube-apiserver:{{.KubeVersion}}
- k8s.gcr.io/kube-controller-manager:{{.KubeVersion}}
- k8s.gcr.io/kube-scheduler:{{.KubeVersion}}
- k8s.gcr.io/kube-proxy:{{.KubeVersion}}
- k8s.gcr.io/pause:{{.PauseVersion}}
- k8s.gcr.io/etcd:{{.EtcdVersion}}
- k8s.gcr.io/coredns/coredns:{{.CoreDNSVersion}}
- registry.k8s.io/kube-apiserver:{{.KubeVersion}}
- registry.k8s.io/kube-controller-manager:{{.KubeVersion}}
- registry.k8s.io/kube-scheduler:{{.KubeVersion}}
- registry.k8s.io/kube-proxy:{{.KubeVersion}}
- registry.k8s.io/pause:{{.PauseVersion}}
- registry.k8s.io/etcd:{{.EtcdVersion}}
- registry.k8s.io/coredns/coredns:{{.CoreDNSVersion}}
kind: Images
`,
},
@ -289,13 +289,13 @@ kind: Images
KubernetesVersion: dummyKubernetesVersionStr,
},
outputFormat: `go-template={{range .images}}{{.}}{{"\n"}}{{end}}`,
expectedOutput: `k8s.gcr.io/kube-apiserver:{{.KubeVersion}}
k8s.gcr.io/kube-controller-manager:{{.KubeVersion}}
k8s.gcr.io/kube-scheduler:{{.KubeVersion}}
k8s.gcr.io/kube-proxy:{{.KubeVersion}}
k8s.gcr.io/pause:{{.PauseVersion}}
k8s.gcr.io/etcd:{{.EtcdVersion}}
k8s.gcr.io/coredns/coredns:{{.CoreDNSVersion}}
expectedOutput: `registry.k8s.io/kube-apiserver:{{.KubeVersion}}
registry.k8s.io/kube-controller-manager:{{.KubeVersion}}
registry.k8s.io/kube-scheduler:{{.KubeVersion}}
registry.k8s.io/kube-proxy:{{.KubeVersion}}
registry.k8s.io/pause:{{.PauseVersion}}
registry.k8s.io/etcd:{{.EtcdVersion}}
registry.k8s.io/coredns/coredns:{{.CoreDNSVersion}}
`,
},
{
@ -304,8 +304,8 @@ k8s.gcr.io/coredns/coredns:{{.CoreDNSVersion}}
KubernetesVersion: dummyKubernetesVersionStr,
},
outputFormat: `jsonpath={range.images[*]}{@} {end}`,
expectedOutput: "k8s.gcr.io/kube-apiserver:{{.KubeVersion}} k8s.gcr.io/kube-controller-manager:{{.KubeVersion}} k8s.gcr.io/kube-scheduler:{{.KubeVersion}} " +
"k8s.gcr.io/kube-proxy:{{.KubeVersion}} k8s.gcr.io/pause:{{.PauseVersion}} k8s.gcr.io/etcd:{{.EtcdVersion}} k8s.gcr.io/coredns/coredns:{{.CoreDNSVersion}} ",
expectedOutput: "registry.k8s.io/kube-apiserver:{{.KubeVersion}} registry.k8s.io/kube-controller-manager:{{.KubeVersion}} registry.k8s.io/kube-scheduler:{{.KubeVersion}} " +
"registry.k8s.io/kube-proxy:{{.KubeVersion}} registry.k8s.io/pause:{{.PauseVersion}} registry.k8s.io/etcd:{{.EtcdVersion}} registry.k8s.io/coredns/coredns:{{.CoreDNSVersion}} ",
},
}

View File

@ -218,7 +218,7 @@ var (
etcd:
local:
dataDir: /var/lib/etcd
imageRepository: k8s.gcr.io
imageRepository: registry.k8s.io
kind: ClusterConfiguration
kubernetesVersion: 1.2.3
networking:
@ -234,7 +234,7 @@ var (
ClusterName: "LeCluster",
KubernetesVersion: "1.2.3",
CertificatesDir: "/etc/kubernetes/pki",
ImageRepository: "k8s.gcr.io",
ImageRepository: "registry.k8s.io",
Networking: kubeadmapiv1.Networking{
DNSDomain: "cluster.local",
ServiceSubnet: "10.96.0.0/12",

View File

@ -48,7 +48,7 @@ func GetDNSImage(cfg *kubeadmapi.ClusterConfiguration) string {
if cfg.DNS.ImageRepository != "" {
dnsImageRepository = cfg.DNS.ImageRepository
}
// Handle the renaming of the official image from "k8s.gcr.io/coredns" to "k8s.gcr.io/coredns/coredns
// Handle the renaming of the official image from "registry.k8s.io/coredns" to "registry.k8s.io/coredns/coredns
if dnsImageRepository == kubeadmapiv1beta2.DefaultImageRepository {
dnsImageRepository = fmt.Sprintf("%s/coredns", dnsImageRepository)
}

View File

@ -29,7 +29,7 @@ import (
const (
testversion = "v10.1.2-alpha.1.100+0123456789abcdef+SOMETHING"
expected = "v10.1.2-alpha.1.100_0123456789abcdef_SOMETHING"
gcrPrefix = "k8s.gcr.io"
gcrPrefix = "registry.k8s.io"
)
func TestGetGenericImage(t *testing.T) {

View File

@ -77,12 +77,12 @@ func TestBuildKubeletArgMap(t *testing.T) {
nodeRegOpts: &kubeadmapi.NodeRegistrationOptions{
CRISocket: "unix:///var/run/containerd/containerd.sock",
},
pauseImage: "k8s.gcr.io/pause:3.7",
pauseImage: "registry.k8s.io/pause:3.7",
},
expected: map[string]string{
"container-runtime": "remote",
"container-runtime-endpoint": "unix:///var/run/containerd/containerd.sock",
"pod-infra-container-image": "k8s.gcr.io/pause:3.7",
"pod-infra-container-image": "registry.k8s.io/pause:3.7",
},
},
}

View File

@ -83,7 +83,7 @@ metadata:
spec:
containers:
- name: etcd
image: k8s.gcr.io/etcd:` + fakeCurrentEtcdVersion
image: registry.k8s.io/etcd:` + fakeCurrentEtcdVersion
func getEtcdVersion(v *versionutil.Version) string {
etcdVer, _, _ := constants.EtcdSupportedVersion(constants.SupportedEtcdVersion, v.String())

View File

@ -80,7 +80,7 @@ etcd:
local:
dataDir: %%s
image: ""
imageRepository: k8s.gcr.io
imageRepository: registry.k8s.io
kubernetesVersion: %%s
networking:
dnsDomain: cluster.local
@ -997,7 +997,7 @@ metadata:
spec:
containers:
- name: etcd
image: k8s.gcr.io/etcd:` + expectedEtcdVersion
image: registry.k8s.io/etcd:` + expectedEtcdVersion
manifestsDir, err := os.MkdirTemp("", "GetEtcdImageTagFromStaticPod-test-manifests")
if err != nil {

View File

@ -22,8 +22,8 @@ import (
const (
validTmpl = "image: {{ .ImageRepository }}/pause:3.7"
validTmplOut = "image: k8s.gcr.io/pause:3.7"
doNothing = "image: k8s.gcr.io/pause:3.7"
validTmplOut = "image: registry.k8s.io/pause:3.7"
doNothing = "image: registry.k8s.io/pause:3.7"
invalidTmpl1 = "{{ .baz }/d}"
invalidTmpl2 = "{{ !foobar }}"
)
@ -40,7 +40,7 @@ func TestParseTemplate(t *testing.T) {
name: "should parse a valid template and set the right values",
template: validTmpl,
data: struct{ ImageRepository, Arch string }{
ImageRepository: "k8s.gcr.io",
ImageRepository: "registry.k8s.io",
Arch: "amd64",
},
output: validTmplOut,
@ -50,7 +50,7 @@ func TestParseTemplate(t *testing.T) {
name: "should noop if there aren't any {{ .foo }} present",
template: doNothing,
data: struct{ ImageRepository, Arch string }{
ImageRepository: "k8s.gcr.io",
ImageRepository: "registry.k8s.io",
Arch: "amd64",
},
output: doNothing,

View File

@ -23,7 +23,7 @@ import (
const (
// When these values are updated, also update test/utils/image/manifest.go
defaultPodSandboxImageName = "k8s.gcr.io/pause"
defaultPodSandboxImageName = "registry.k8s.io/pause"
defaultPodSandboxImageVersion = "3.7"
)

View File

@ -43,7 +43,7 @@ STABLE_BUILD_SCM_REVISION ${KUBE_GIT_VERSION-}
STABLE_BUILD_MAJOR_VERSION ${KUBE_GIT_MAJOR-}
STABLE_BUILD_MINOR_VERSION ${KUBE_GIT_MINOR-}
STABLE_DOCKER_TAG ${KUBE_GIT_VERSION/+/_}
STABLE_DOCKER_REGISTRY ${KUBE_DOCKER_REGISTRY:-k8s.gcr.io}
STABLE_DOCKER_REGISTRY ${KUBE_DOCKER_REGISTRY:-registry.k8s.io}
STABLE_DOCKER_PUSH_REGISTRY ${KUBE_DOCKER_PUSH_REGISTRY:-${KUBE_DOCKER_REGISTRY:-staging-k8s.gcr.io}}
gitCommit ${KUBE_GIT_COMMIT-}
gitTreeState ${KUBE_GIT_TREE_STATE-}

View File

@ -16,6 +16,6 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:test-cmd
image: registry.k8s.io/nginx:test-cmd
ports:
- containerPort: 80

View File

@ -17,6 +17,6 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:test-cmd
image: registry.k8s.io/nginx:test-cmd
ports:
- containerPort: 80

View File

@ -17,6 +17,6 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:test-cmd
image: registry.k8s.io/nginx:test-cmd
ports:
- containerPort: 80

View File

@ -16,9 +16,9 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:test-cmd
image: registry.k8s.io/nginx:test-cmd
ports:
- containerPort: 80
- name: perl
image: k8s.gcr.io/perl
image: registry.k8s.io/perl
terminationGracePeriodSeconds: 0

View File

@ -16,8 +16,8 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:test-cmd
image: registry.k8s.io/nginx:test-cmd
ports:
- containerPort: 80
- name: perl
image: k8s.gcr.io/perl
image: registry.k8s.io/perl

View File

@ -16,6 +16,6 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:test-cmd
image: registry.k8s.io/nginx:test-cmd
ports:
- containerPort: 80

View File

@ -16,6 +16,6 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:1.7.9
image: registry.k8s.io/nginx:1.7.9
ports:
- containerPort: 80

View File

@ -8,4 +8,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7

View File

@ -8,4 +8,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7

View File

@ -11,7 +11,7 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7
---
apiVersion: v1
kind: Namespace

View File

@ -8,7 +8,7 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7
---
apiVersion: v1
kind: Pod
@ -17,7 +17,7 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7
---
apiVersion: v1
kind: Pod
@ -26,5 +26,5 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7

View File

@ -43,7 +43,7 @@
"spec":{
"containers":[{
"name": "mock-container",
"image": "k8s.gcr.io/pause:3.7",
"image": "registry.k8s.io/pause:3.7",
"ports":[{
"containerPort":9949,
"protocol":"TCP"

View File

@ -41,7 +41,7 @@
"spec":{
"containers":[{
"name": "mock-container",
"image": "k8s.gcr.io/pause:3.7",
"image": "registry.k8s.io/pause:3.7",
"ports":[{
"containerPort":9949,
"protocol":"TCP"

View File

@ -47,7 +47,7 @@
"spec":{
"containers":[{
"name": "mock-container",
"image": "k8s.gcr.io/pause:3.7",
"image": "registry.k8s.io/pause:3.7",
"ports":[{
"containerPort":9949,
"protocol":"TCP"

View File

@ -45,7 +45,7 @@
"spec":{
"containers":[{
"name": "mock-container",
"image": "k8s.gcr.io/pause:3.7",
"image": "registry.k8s.io/pause:3.7",
"ports":[{
"containerPort":9949,
"protocol":"TCP"

View File

@ -26,7 +26,7 @@
"spec":{
"containers":[{
"name": "mock-container",
"image": "k8s.gcr.io/pause:3.7",
"image": "registry.k8s.io/pause:3.7",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
@ -60,7 +60,7 @@
"spec":{
"containers":[{
"name": "mock-container",
"image": "k8s.gcr.io/pause:3.7",
"image": "registry.k8s.io/pause:3.7",
"ports":[{
"containerPort":9949,
"protocol":"TCP"

View File

@ -26,7 +26,7 @@
"spec":{
"containers":[{
"name": "mock-container",
"image": "k8s.gcr.io/pause:3.7",
"image": "registry.k8s.io/pause:3.7",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
@ -60,7 +60,7 @@
"spec":{
"containers":[{
"name": "mock-container",
"image": "k8s.gcr.io/pause:3.7",
"image": "registry.k8s.io/pause:3.7",
"ports":[{
"containerPort":9949,
"protocol":"TCP"

View File

@ -29,7 +29,7 @@ spec:
spec:
containers:
- name: mock-container
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7
ports:
- containerPort: 9949
protocol: TCP

View File

@ -27,7 +27,7 @@ spec:
spec:
containers:
- name: mock-container
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7
ports:
- containerPort: 9949
protocol: TCP

View File

@ -15,4 +15,4 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:1.7.9
image: registry.k8s.io/nginx:1.7.9

View File

@ -14,5 +14,5 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:1.7.9
image: registry.k8s.io/nginx:1.7.9
terminationMessagePolicy: null

View File

@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7

View File

@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.4
image: registry.k8s.io/pause:3.4

View File

@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
image: k8s.gcr.io/busybox
image: registry.k8s.io/busybox
command: [ "/bin/sh", "-c", "env" ]
env:
- name: TEST_CMD_1

View File

@ -8,5 +8,5 @@ metadata:
spec:
containers:
- name: kubernetes-serve-hostname
image: k8s.gcr.io/e2e-test-images/agnhost:2.32
image: registry.k8s.io/e2e-test-images/agnhost:2.32
command: ["/agnhost", "serve-hostname"]

View File

@ -9,7 +9,7 @@
"containers": [
{
"name": "kubernetes-pause",
"image": "k8s.gcr.io/pause:3.7"
"image": "registry.k8s.io/pause:3.7"
}
],
"restartPolicy": "Never",

View File

@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7

View File

@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7

View File

@ -8,4 +8,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7

View File

@ -16,6 +16,6 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:1.7.9
image: registry.k8s.io/nginx:1.7.9
ports:
- containerPort: 80

View File

@ -16,6 +16,6 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:1.7.9
image: registry.k8s.io/nginx:1.7.9
ports:
- containerPort: 80

View File

@ -16,6 +16,6 @@ spec:
spec:
containers:
- name: nginx
image: k8s.gcr.io/nginx:1.7.9
image: registry.k8s.io/nginx:1.7.9
ports:
- containerPort: 80

View File

@ -29,6 +29,6 @@ spec:
namespaces: []
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:latest
image: registry.k8s.io/pause:latest
- name: app
image: k8s.gcr.io/nginx:test-cmd
image: registry.k8s.io/nginx:test-cmd

View File

@ -29,4 +29,4 @@ spec:
namespaces: []
containers:
- name: kubernetes-pause
image: k8s.gcr.io/pause:2.0
image: registry.k8s.io/pause:2.0

View File

@ -20,7 +20,7 @@ spec:
terminationGracePeriodSeconds: 5
containers:
- name: nginx
image: k8s.gcr.io/nginx-slim:0.8
image: registry.k8s.io/nginx-slim:0.8
ports:
- containerPort: 80
name: web
@ -29,7 +29,7 @@ spec:
- -c
- 'while true; do sleep 1; done'
- name: pause
image: k8s.gcr.io/pause:2.0
image: registry.k8s.io/pause:2.0
ports:
- containerPort: 81
name: web-2

View File

@ -20,7 +20,7 @@ spec:
terminationGracePeriodSeconds: 5
containers:
- name: nginx
image: k8s.gcr.io/nginx-slim:0.7
image: registry.k8s.io/nginx-slim:0.7
ports:
- containerPort: 80
name: web

View File

@ -8,7 +8,7 @@ metadata:
spec:
containers:
- name: kubernetes-pause2
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7
resources:
requests:
memory: "64Mi"

View File

@ -8,7 +8,7 @@ metadata:
spec:
containers:
- name: kubernetes-pause1
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7
resources:
requests:
memory: "1G"

View File

@ -8,4 +8,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause3
image: k8s.gcr.io/pause:3.7
image: registry.k8s.io/pause:3.7

Some files were not shown because too many files have changed in this diff Show More