mirror of https://github.com/kubernetes/kops.git
Migrate to registry.k8s.io
Signed-off-by: Ciprian Hacman <ciprian@hakman.dev>
This commit is contained in:
parent
d751d0f056
commit
a4ed2b0654
6
Makefile
6
Makefile
|
@ -631,7 +631,7 @@ check-markdown-links:
|
||||||
.PHONY: bazel-kube-apiserver-healthcheck-export-linux-amd64 bazel-kube-apiserver-healthcheck-export-linux-arm64
|
.PHONY: bazel-kube-apiserver-healthcheck-export-linux-amd64 bazel-kube-apiserver-healthcheck-export-linux-arm64
|
||||||
bazel-kube-apiserver-healthcheck-export-linux-amd64 bazel-kube-apiserver-healthcheck-export-linux-arm64: bazel-kube-apiserver-healthcheck-export-linux-%:
|
bazel-kube-apiserver-healthcheck-export-linux-amd64 bazel-kube-apiserver-healthcheck-export-linux-arm64: bazel-kube-apiserver-healthcheck-export-linux-%:
|
||||||
mkdir -p ${BAZELIMAGES}
|
mkdir -p ${BAZELIMAGES}
|
||||||
DOCKER_REGISTRY="" DOCKER_IMAGE_PREFIX="k8s.gcr.io/kops/" KUBE_APISERVER_HEALTHCHECK_TAG=${KUBE_APISERVER_HEALTHCHECK_TAG} ${BAZEL} ${BAZEL_OPTIONS} build ${BAZEL_CONFIG} --@io_bazel_rules_go//go/config:pure --platforms=@io_bazel_rules_go//go/toolchain:linux_$* //cmd/kube-apiserver-healthcheck:image-bundle-$*.tar.gz.sha256
|
DOCKER_REGISTRY="" DOCKER_IMAGE_PREFIX="registry.k8s.io/kops/" KUBE_APISERVER_HEALTHCHECK_TAG=${KUBE_APISERVER_HEALTHCHECK_TAG} ${BAZEL} ${BAZEL_OPTIONS} build ${BAZEL_CONFIG} --@io_bazel_rules_go//go/config:pure --platforms=@io_bazel_rules_go//go/toolchain:linux_$* //cmd/kube-apiserver-healthcheck:image-bundle-$*.tar.gz.sha256
|
||||||
cp -fp ${BAZEL_BIN}/cmd/kube-apiserver-healthcheck/image-bundle-$*.tar.gz ${BAZELIMAGES}/kube-apiserver-healthcheck-$*.tar.gz
|
cp -fp ${BAZEL_BIN}/cmd/kube-apiserver-healthcheck/image-bundle-$*.tar.gz ${BAZELIMAGES}/kube-apiserver-healthcheck-$*.tar.gz
|
||||||
cp -fp ${BAZEL_BIN}/cmd/kube-apiserver-healthcheck/image-bundle-$*.tar.gz.sha256 ${BAZELIMAGES}/kube-apiserver-healthcheck-$*.tar.gz.sha256
|
cp -fp ${BAZEL_BIN}/cmd/kube-apiserver-healthcheck/image-bundle-$*.tar.gz.sha256 ${BAZELIMAGES}/kube-apiserver-healthcheck-$*.tar.gz.sha256
|
||||||
|
|
||||||
|
@ -642,7 +642,7 @@ bazel-kube-apiserver-healthcheck-export: bazel-kube-apiserver-healthcheck-export
|
||||||
.PHONY: bazel-kops-controller-export-linux-amd64 bazel-kops-controller-export-linux-arm64
|
.PHONY: bazel-kops-controller-export-linux-amd64 bazel-kops-controller-export-linux-arm64
|
||||||
bazel-kops-controller-export-linux-amd64 bazel-kops-controller-export-linux-arm64: bazel-kops-controller-export-linux-%:
|
bazel-kops-controller-export-linux-amd64 bazel-kops-controller-export-linux-arm64: bazel-kops-controller-export-linux-%:
|
||||||
mkdir -p ${BAZELIMAGES}
|
mkdir -p ${BAZELIMAGES}
|
||||||
DOCKER_REGISTRY="" DOCKER_IMAGE_PREFIX="k8s.gcr.io/kops/" KOPS_CONTROLLER_TAG=${KOPS_CONTROLLER_TAG} ${BAZEL} ${BAZEL_OPTIONS} build ${BAZEL_CONFIG} --@io_bazel_rules_go//go/config:pure --platforms=@io_bazel_rules_go//go/toolchain:linux_$* //cmd/kops-controller:image-bundle-$*.tar.gz.sha256
|
DOCKER_REGISTRY="" DOCKER_IMAGE_PREFIX="registry.k8s.io/kops/" KOPS_CONTROLLER_TAG=${KOPS_CONTROLLER_TAG} ${BAZEL} ${BAZEL_OPTIONS} build ${BAZEL_CONFIG} --@io_bazel_rules_go//go/config:pure --platforms=@io_bazel_rules_go//go/toolchain:linux_$* //cmd/kops-controller:image-bundle-$*.tar.gz.sha256
|
||||||
cp -fp ${BAZEL_BIN}/cmd/kops-controller/image-bundle-$*.tar.gz ${BAZELIMAGES}/kops-controller-$*.tar.gz
|
cp -fp ${BAZEL_BIN}/cmd/kops-controller/image-bundle-$*.tar.gz ${BAZELIMAGES}/kops-controller-$*.tar.gz
|
||||||
cp -fp ${BAZEL_BIN}/cmd/kops-controller/image-bundle-$*.tar.gz.sha256 ${BAZELIMAGES}/kops-controller-$*.tar.gz.sha256
|
cp -fp ${BAZEL_BIN}/cmd/kops-controller/image-bundle-$*.tar.gz.sha256 ${BAZELIMAGES}/kops-controller-$*.tar.gz.sha256
|
||||||
|
|
||||||
|
@ -653,7 +653,7 @@ bazel-kops-controller-export: bazel-kops-controller-export-linux-amd64 bazel-kop
|
||||||
.PHONY: bazel-dns-controller-export-linux-amd64 bazel-dns-controller-export-linux-arm64
|
.PHONY: bazel-dns-controller-export-linux-amd64 bazel-dns-controller-export-linux-arm64
|
||||||
bazel-dns-controller-export-linux-amd64 bazel-dns-controller-export-linux-arm64: bazel-dns-controller-export-linux-%:
|
bazel-dns-controller-export-linux-amd64 bazel-dns-controller-export-linux-arm64: bazel-dns-controller-export-linux-%:
|
||||||
mkdir -p ${BAZELIMAGES}
|
mkdir -p ${BAZELIMAGES}
|
||||||
DOCKER_REGISTRY="" DOCKER_IMAGE_PREFIX="k8s.gcr.io/kops/" DNS_CONTROLLER_TAG=${DNS_CONTROLLER_TAG} ${BAZEL} ${BAZEL_OPTIONS} build ${BAZEL_CONFIG} --@io_bazel_rules_go//go/config:pure --platforms=@io_bazel_rules_go//go/toolchain:linux_$* //dns-controller/cmd/dns-controller:image-bundle-$*.tar.gz.sha256
|
DOCKER_REGISTRY="" DOCKER_IMAGE_PREFIX="registry.k8s.io/kops/" DNS_CONTROLLER_TAG=${DNS_CONTROLLER_TAG} ${BAZEL} ${BAZEL_OPTIONS} build ${BAZEL_CONFIG} --@io_bazel_rules_go//go/config:pure --platforms=@io_bazel_rules_go//go/toolchain:linux_$* //dns-controller/cmd/dns-controller:image-bundle-$*.tar.gz.sha256
|
||||||
cp -fp ${BAZEL_BIN}/dns-controller/cmd/dns-controller/image-bundle-$*.tar.gz ${BAZELIMAGES}/dns-controller-$*.tar.gz
|
cp -fp ${BAZEL_BIN}/dns-controller/cmd/dns-controller/image-bundle-$*.tar.gz ${BAZELIMAGES}/dns-controller-$*.tar.gz
|
||||||
cp -fp ${BAZEL_BIN}/dns-controller/cmd/dns-controller/image-bundle-$*.tar.gz.sha256 ${BAZELIMAGES}/dns-controller-$*.tar.gz.sha256
|
cp -fp ${BAZEL_BIN}/dns-controller/cmd/dns-controller/image-bundle-$*.tar.gz.sha256 ${BAZELIMAGES}/dns-controller-$*.tar.gz.sha256
|
||||||
|
|
||||||
|
|
|
@ -899,7 +899,7 @@ func completeKubernetesVersion(cmd *cobra.Command, args []string, toComplete str
|
||||||
tooNewVersion.Pre = nil
|
tooNewVersion.Pre = nil
|
||||||
tooNewVersion.Build = nil
|
tooNewVersion.Build = nil
|
||||||
|
|
||||||
repo, err := name.NewRepository("k8s.gcr.io/kube-apiserver")
|
repo, err := name.NewRepository("registry.k8s.io/kube-apiserver")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return commandutils.CompletionError("parsing kube-apiserver repo", err)
|
return commandutils.CompletionError("parsing kube-apiserver repo", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -62,13 +62,13 @@ sed -i.bak -e "s@KUBE_APISERVER_HEALTHCHECK_TAG=${KOPS_RELEASE_VERSION}@KUBE_API
|
||||||
sed -i.bak -e "s@\"${KOPS_RELEASE_VERSION}\"@\"${NEW_RELEASE_VERSION}\"@g" upup/pkg/fi/cloudup/bootstrapchannelbuilder/bootstrapchannelbuilder.go
|
sed -i.bak -e "s@\"${KOPS_RELEASE_VERSION}\"@\"${NEW_RELEASE_VERSION}\"@g" upup/pkg/fi/cloudup/bootstrapchannelbuilder/bootstrapchannelbuilder.go
|
||||||
sed -i.bak -e "s@${KOPS_RELEASE_VERSION}@${NEW_RELEASE_VERSION}@g" upup/pkg/fi/cloudup/urls_test.go
|
sed -i.bak -e "s@${KOPS_RELEASE_VERSION}@${NEW_RELEASE_VERSION}@g" upup/pkg/fi/cloudup/urls_test.go
|
||||||
|
|
||||||
git grep -l k8s.gcr.io/kops/dns-controller | xargs -I {} sed -i.bak -e "s@dns-controller:${KOPS_RELEASE_VERSION}@dns-controller:${NEW_RELEASE_VERSION}@g" {}
|
git grep -l registry.k8s.io/kops/dns-controller | xargs -I {} sed -i.bak -e "s@dns-controller:${KOPS_RELEASE_VERSION}@dns-controller:${NEW_RELEASE_VERSION}@g" {}
|
||||||
git grep -l "version..v${KOPS_RELEASE_VERSION}" upup/models/cloudup/resources/addons/dns-controller.addons.k8s.io/ | xargs -I {} sed -i.bak -e "s@version: v${KOPS_RELEASE_VERSION}@version: v${NEW_RELEASE_VERSION}@g" {}
|
git grep -l "version..v${KOPS_RELEASE_VERSION}" upup/models/cloudup/resources/addons/dns-controller.addons.k8s.io/ | xargs -I {} sed -i.bak -e "s@version: v${KOPS_RELEASE_VERSION}@version: v${NEW_RELEASE_VERSION}@g" {}
|
||||||
|
|
||||||
git grep -l k8s.gcr.io/kops/kops-controller | xargs -I {} sed -i.bak -e "s@kops-controller:${KOPS_RELEASE_VERSION}@kops-controller:${NEW_RELEASE_VERSION}@g" {}
|
git grep -l registry.k8s.io/kops/kops-controller | xargs -I {} sed -i.bak -e "s@kops-controller:${KOPS_RELEASE_VERSION}@kops-controller:${NEW_RELEASE_VERSION}@g" {}
|
||||||
git grep -l "version..v${KOPS_RELEASE_VERSION}" upup/models/cloudup/resources/addons/kops-controller.addons.k8s.io/ | xargs -I {} sed -i.bak -e "s@version: v${KOPS_RELEASE_VERSION}@version: v${NEW_RELEASE_VERSION}@g" {}
|
git grep -l "version..v${KOPS_RELEASE_VERSION}" upup/models/cloudup/resources/addons/kops-controller.addons.k8s.io/ | xargs -I {} sed -i.bak -e "s@version: v${KOPS_RELEASE_VERSION}@version: v${NEW_RELEASE_VERSION}@g" {}
|
||||||
|
|
||||||
git grep -l k8s.gcr.io/kops/kube-apiserver-healthcheck | xargs -I {} sed -i.bak -e "s@kube-apiserver-healthcheck:${KOPS_RELEASE_VERSION}@kube-apiserver-healthcheck:${NEW_RELEASE_VERSION}@g" {}
|
git grep -l registry.k8s.io/kops/kube-apiserver-healthcheck | xargs -I {} sed -i.bak -e "s@kube-apiserver-healthcheck:${KOPS_RELEASE_VERSION}@kube-apiserver-healthcheck:${NEW_RELEASE_VERSION}@g" {}
|
||||||
|
|
||||||
git grep -l "version..${KOPS_RELEASE_VERSION}" upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/ | xargs -I {} sed -i.bak -e "s@version: ${KOPS_RELEASE_VERSION}@version: ${NEW_RELEASE_VERSION}@g" {}
|
git grep -l "version..${KOPS_RELEASE_VERSION}" upup/pkg/fi/cloudup/tests/bootstrapchannelbuilder/ | xargs -I {} sed -i.bak -e "s@version: ${KOPS_RELEASE_VERSION}@version: ${NEW_RELEASE_VERSION}@g" {}
|
||||||
|
|
||||||
|
|
|
@ -124,7 +124,7 @@ func (a *AssetBuilder) RemapImage(image string) (string, error) {
|
||||||
CanonicalLocation: image,
|
CanonicalLocation: image,
|
||||||
}
|
}
|
||||||
|
|
||||||
if strings.HasPrefix(image, "k8s.gcr.io/kops/dns-controller:") {
|
if strings.HasPrefix(image, "k8s.gcr.io/kops/dns-controller:") || strings.HasPrefix(image, "registry.k8s.io/kops/dns-controller:") {
|
||||||
// To use user-defined DNS Controller:
|
// To use user-defined DNS Controller:
|
||||||
// 1. DOCKER_REGISTRY=[your docker hub repo] make dns-controller-push
|
// 1. DOCKER_REGISTRY=[your docker hub repo] make dns-controller-push
|
||||||
// 2. export DNSCONTROLLER_IMAGE=[your docker hub repo]
|
// 2. export DNSCONTROLLER_IMAGE=[your docker hub repo]
|
||||||
|
@ -135,7 +135,7 @@ func (a *AssetBuilder) RemapImage(image string) (string, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if strings.HasPrefix(image, "k8s.gcr.io/kops/kops-controller:") {
|
if strings.HasPrefix(image, "k8s.gcr.io/kops/kops-controller:") || strings.HasPrefix(image, "registry.k8s.io/kops/kops-controller:") {
|
||||||
// To use user-defined DNS Controller:
|
// To use user-defined DNS Controller:
|
||||||
// 1. DOCKER_REGISTRY=[your docker hub repo] make kops-controller-push
|
// 1. DOCKER_REGISTRY=[your docker hub repo] make kops-controller-push
|
||||||
// 2. export KOPSCONTROLLER_IMAGE=[your docker hub repo]
|
// 2. export KOPSCONTROLLER_IMAGE=[your docker hub repo]
|
||||||
|
@ -146,7 +146,7 @@ func (a *AssetBuilder) RemapImage(image string) (string, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if strings.HasPrefix(image, "k8s.gcr.io/kops/kube-apiserver-healthcheck:") {
|
if strings.HasPrefix(image, "k8s.gcr.io/kops/kube-apiserver-healthcheck:") || strings.HasPrefix(image, "registry.k8s.io/kops/kube-apiserver-healthcheck:") {
|
||||||
override := os.Getenv("KUBE_APISERVER_HEALTHCHECK_IMAGE")
|
override := os.Getenv("KUBE_APISERVER_HEALTHCHECK_IMAGE")
|
||||||
if override != "" {
|
if override != "" {
|
||||||
image = override
|
image = override
|
||||||
|
@ -157,7 +157,8 @@ func (a *AssetBuilder) RemapImage(image string) (string, error) {
|
||||||
containerProxy := strings.TrimSuffix(*a.AssetsLocation.ContainerProxy, "/")
|
containerProxy := strings.TrimSuffix(*a.AssetsLocation.ContainerProxy, "/")
|
||||||
normalized := image
|
normalized := image
|
||||||
|
|
||||||
// If the image name contains only a single / we need to determine if the image is located on docker-hub or if it's using a convenient URL like k8s.gcr.io/<image-name>
|
// If the image name contains only a single / we need to determine if the image is located on docker-hub or if it's using a convenient URL,
|
||||||
|
// like k8s.gcr.io/<image-name> or registry.k8s.io/<image-name>
|
||||||
// In case of a hub image it should be sufficient to just prepend the proxy url, producing eg docker-proxy.example.com/weaveworks/weave-kube
|
// In case of a hub image it should be sufficient to just prepend the proxy url, producing eg docker-proxy.example.com/weaveworks/weave-kube
|
||||||
if strings.Count(normalized, "/") <= 1 && !strings.ContainsAny(strings.Split(normalized, "/")[0], ".:") {
|
if strings.Count(normalized, "/") <= 1 && !strings.ContainsAny(strings.Split(normalized, "/")[0], ".:") {
|
||||||
normalized = containerProxy + "/" + normalized
|
normalized = containerProxy + "/" + normalized
|
||||||
|
@ -176,8 +177,9 @@ func (a *AssetBuilder) RemapImage(image string) (string, error) {
|
||||||
registryMirror := *a.AssetsLocation.ContainerRegistry
|
registryMirror := *a.AssetsLocation.ContainerRegistry
|
||||||
normalized := image
|
normalized := image
|
||||||
|
|
||||||
// Remove the 'standard' kubernetes image prefix, just for sanity
|
// Remove the 'standard' kubernetes image prefixes, just for sanity
|
||||||
normalized = strings.TrimPrefix(normalized, "k8s.gcr.io/")
|
normalized = strings.TrimPrefix(normalized, "k8s.gcr.io/")
|
||||||
|
normalized = strings.TrimPrefix(normalized, "registry.k8s.io/")
|
||||||
|
|
||||||
// When assembling the cluster spec, kops may call the option more then once until the config converges
|
// When assembling the cluster spec, kops may call the option more then once until the config converges
|
||||||
// This means that this function may me called more than once on the same image
|
// This means that this function may me called more than once on the same image
|
||||||
|
|
|
@ -76,7 +76,7 @@ func TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL(t *
|
||||||
builder := buildAssetBuilder(t)
|
builder := buildAssetBuilder(t)
|
||||||
|
|
||||||
proxyURL := "proxy.example.com/"
|
proxyURL := "proxy.example.com/"
|
||||||
image := "k8s.gcr.io/kube-apiserver"
|
image := "registry.k8s.io/kube-apiserver"
|
||||||
expected := "proxy.example.com/kube-apiserver"
|
expected := "proxy.example.com/kube-apiserver"
|
||||||
version, _ := util.ParseKubernetesVersion("1.10")
|
version, _ := util.ParseKubernetesVersion("1.10")
|
||||||
|
|
||||||
|
@ -116,7 +116,7 @@ func TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags(t *testing.T
|
||||||
builder := buildAssetBuilder(t)
|
builder := buildAssetBuilder(t)
|
||||||
|
|
||||||
proxyURL := "proxy.example.com/"
|
proxyURL := "proxy.example.com/"
|
||||||
image := "k8s.gcr.io/kube-apiserver:1.2.3"
|
image := "registry.k8s.io/kube-apiserver:1.2.3"
|
||||||
expected := "proxy.example.com/kube-apiserver:1.2.3"
|
expected := "proxy.example.com/kube-apiserver:1.2.3"
|
||||||
version, _ := util.ParseKubernetesVersion("1.10")
|
version, _ := util.ParseKubernetesVersion("1.10")
|
||||||
|
|
||||||
|
|
|
@ -88,17 +88,17 @@ func (b *AWSCloudControllerManagerOptionsBuilder) BuildOptions(o interface{}) er
|
||||||
// See https://us.gcr.io/k8s-artifacts-prod/provider-aws/cloud-controller-manager
|
// See https://us.gcr.io/k8s-artifacts-prod/provider-aws/cloud-controller-manager
|
||||||
switch b.KubernetesVersion.Minor {
|
switch b.KubernetesVersion.Minor {
|
||||||
case 19:
|
case 19:
|
||||||
eccm.Image = "k8s.gcr.io/provider-aws/cloud-controller-manager:v1.19.0-alpha.1"
|
eccm.Image = "registry.k8s.io/provider-aws/cloud-controller-manager:v1.19.0-alpha.1"
|
||||||
case 20:
|
case 20:
|
||||||
eccm.Image = "k8s.gcr.io/provider-aws/cloud-controller-manager:v1.20.0-alpha.0"
|
eccm.Image = "registry.k8s.io/provider-aws/cloud-controller-manager:v1.20.0-alpha.0"
|
||||||
case 21:
|
case 21:
|
||||||
eccm.Image = "k8s.gcr.io/provider-aws/cloud-controller-manager:v1.21.0-alpha.0"
|
eccm.Image = "registry.k8s.io/provider-aws/cloud-controller-manager:v1.21.0-alpha.0"
|
||||||
case 22:
|
case 22:
|
||||||
eccm.Image = "k8s.gcr.io/provider-aws/cloud-controller-manager:v1.22.0-alpha.2"
|
eccm.Image = "registry.k8s.io/provider-aws/cloud-controller-manager:v1.22.0-alpha.2"
|
||||||
case 23:
|
case 23:
|
||||||
eccm.Image = "k8s.gcr.io/provider-aws/cloud-controller-manager:v1.23.0-alpha.0"
|
eccm.Image = "registry.k8s.io/provider-aws/cloud-controller-manager:v1.23.0-alpha.0"
|
||||||
case 24:
|
case 24:
|
||||||
eccm.Image = "k8s.gcr.io/provider-aws/cloud-controller-manager:v1.23.0-alpha.0"
|
eccm.Image = "registry.k8s.io/provider-aws/cloud-controller-manager:v1.23.0-alpha.0"
|
||||||
default:
|
default:
|
||||||
eccm.Image = "gcr.io/k8s-staging-provider-aws/cloud-controller-manager:latest"
|
eccm.Image = "gcr.io/k8s-staging-provider-aws/cloud-controller-manager:latest"
|
||||||
}
|
}
|
||||||
|
|
|
@ -39,20 +39,20 @@ func (b *ClusterAutoscalerOptionsBuilder) BuildOptions(o interface{}) error {
|
||||||
|
|
||||||
if cas.Image == nil {
|
if cas.Image == nil {
|
||||||
|
|
||||||
image := "k8s.gcr.io/autoscaling/cluster-autoscaler:latest"
|
image := "registry.k8s.io/autoscaling/cluster-autoscaler:latest"
|
||||||
v, err := util.ParseKubernetesVersion(clusterSpec.KubernetesVersion)
|
v, err := util.ParseKubernetesVersion(clusterSpec.KubernetesVersion)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
switch v.Minor {
|
switch v.Minor {
|
||||||
case 23:
|
case 23:
|
||||||
image = "k8s.gcr.io/autoscaling/cluster-autoscaler:v1.23.0"
|
image = "registry.k8s.io/autoscaling/cluster-autoscaler:v1.23.0"
|
||||||
case 22:
|
case 22:
|
||||||
image = "k8s.gcr.io/autoscaling/cluster-autoscaler:v1.22.2"
|
image = "registry.k8s.io/autoscaling/cluster-autoscaler:v1.22.2"
|
||||||
case 21:
|
case 21:
|
||||||
image = "k8s.gcr.io/autoscaling/cluster-autoscaler:v1.21.2"
|
image = "registry.k8s.io/autoscaling/cluster-autoscaler:v1.21.2"
|
||||||
case 20:
|
case 20:
|
||||||
image = "k8s.gcr.io/autoscaling/cluster-autoscaler:v1.20.1"
|
image = "registry.k8s.io/autoscaling/cluster-autoscaler:v1.20.1"
|
||||||
case 19:
|
case 19:
|
||||||
image = "k8s.gcr.io/autoscaling/cluster-autoscaler:v1.19.2"
|
image = "registry.k8s.io/autoscaling/cluster-autoscaler:v1.19.2"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
cas.Image = fi.String(image)
|
cas.Image = fi.String(image)
|
||||||
|
|
|
@ -129,7 +129,7 @@ func Image(component string, clusterSpec *kops.ClusterSpec, assetsBuilder *asset
|
||||||
imageName := component
|
imageName := component
|
||||||
|
|
||||||
if !IsBaseURL(clusterSpec.KubernetesVersion) {
|
if !IsBaseURL(clusterSpec.KubernetesVersion) {
|
||||||
image := "k8s.gcr.io/" + imageName + ":" + "v" + kubernetesVersion.String()
|
image := "registry.k8s.io/" + imageName + ":" + "v" + kubernetesVersion.String()
|
||||||
|
|
||||||
image, err := assetsBuilder.RemapImage(image)
|
image, err := assetsBuilder.RemapImage(image)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -142,12 +142,12 @@ func Image(component string, clusterSpec *kops.ClusterSpec, assetsBuilder *asset
|
||||||
// are loading from a tarfile then the image is tagged with
|
// are loading from a tarfile then the image is tagged with
|
||||||
// the architecture suffix.
|
// the architecture suffix.
|
||||||
//
|
//
|
||||||
// i.e. k8s.gcr.io/kube-apiserver:v1.20.0 is a manifest list
|
// i.e. registry.k8s.io/kube-apiserver:v1.20.0 is a manifest list
|
||||||
// and we _can_ also pull
|
// and we _can_ also pull
|
||||||
// k8s.gcr.io/kube-apiserver-amd64:v1.20.0 directly. But if
|
// registry.k8s.io/kube-apiserver-amd64:v1.20.0 directly. But if
|
||||||
// we load https://.../v1.20.0/amd64/kube-apiserver.tar then
|
// we load https://.../v1.20.0/amd64/kube-apiserver.tar then
|
||||||
// the image inside that tar file is named
|
// the image inside that tar file is named
|
||||||
// "k8s.gcr.io/kube-apiserver-amd64:v1.20.0"
|
// "registry.k8s.io/kube-apiserver-amd64:v1.20.0"
|
||||||
imageName += "-amd64"
|
imageName += "-amd64"
|
||||||
|
|
||||||
baseURL := clusterSpec.KubernetesVersion
|
baseURL := clusterSpec.KubernetesVersion
|
||||||
|
@ -163,7 +163,7 @@ func Image(component string, clusterSpec *kops.ClusterSpec, assetsBuilder *asset
|
||||||
tag := strings.TrimSpace(string(b))
|
tag := strings.TrimSpace(string(b))
|
||||||
klog.V(2).Infof("Found tag %q for %q", tag, component)
|
klog.V(2).Infof("Found tag %q for %q", tag, component)
|
||||||
|
|
||||||
image := "k8s.gcr.io/" + imageName + ":" + tag
|
image := "registry.k8s.io/" + imageName + ":" + tag
|
||||||
|
|
||||||
return image, nil
|
return image, nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -178,7 +178,7 @@ metadata:
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: k8s.gcr.io/etcdadm/etcd-manager:v3.0.20220203
|
- image: registry.k8s.io/etcdadm/etcd-manager:v3.0.20220203
|
||||||
name: etcd-manager
|
name: etcd-manager
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -45,7 +45,7 @@ func TestImage(t *testing.T) {
|
||||||
VFS: map[string]string{
|
VFS: map[string]string{
|
||||||
"memfs://v1.20.0-download/bin/linux/amd64/kube-apiserver.docker_tag": "1-20-0dockertag",
|
"memfs://v1.20.0-download/bin/linux/amd64/kube-apiserver.docker_tag": "1-20-0dockertag",
|
||||||
},
|
},
|
||||||
Expected: "k8s.gcr.io/kube-apiserver-amd64:1-20-0dockertag",
|
Expected: "registry.k8s.io/kube-apiserver-amd64:1-20-0dockertag",
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Component: "kube-apiserver",
|
Component: "kube-apiserver",
|
||||||
|
@ -54,7 +54,7 @@ func TestImage(t *testing.T) {
|
||||||
KubernetesVersion: "1.20.0",
|
KubernetesVersion: "1.20.0",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
Expected: "k8s.gcr.io/kube-apiserver:v1.20.0",
|
Expected: "registry.k8s.io/kube-apiserver:v1.20.0",
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -79,7 +79,7 @@ kind: Pod
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: healthcheck
|
- name: healthcheck
|
||||||
image: k8s.gcr.io/kops/kube-apiserver-healthcheck:1.24.0-alpha.2
|
image: registry.k8s.io/kops/kube-apiserver-healthcheck:1.24.0-alpha.2
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
# The sidecar serves a healthcheck on the same port,
|
# The sidecar serves a healthcheck on the same port,
|
||||||
|
|
|
@ -110,7 +110,7 @@ func (b *KubeDnsOptionsBuilder) BuildOptions(o interface{}) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
if nodeLocalDNS.Image == nil {
|
if nodeLocalDNS.Image == nil {
|
||||||
nodeLocalDNS.Image = fi.String("k8s.gcr.io/dns/k8s-dns-node-cache:1.21.3")
|
nodeLocalDNS.Image = fi.String("registry.k8s.io/dns/k8s-dns-node-cache:1.21.3")
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
|
|
@ -173,7 +173,7 @@ func (b *KubeletOptionsBuilder) BuildOptions(o interface{}) error {
|
||||||
|
|
||||||
// Prevent image GC from pruning the pause image
|
// Prevent image GC from pruning the pause image
|
||||||
// https://github.com/kubernetes/enhancements/tree/master/keps/sig-node/2040-kubelet-cri#pinned-images
|
// https://github.com/kubernetes/enhancements/tree/master/keps/sig-node/2040-kubelet-cri#pinned-images
|
||||||
image := "k8s.gcr.io/pause:3.6"
|
image := "registry.k8s.io/pause:3.6"
|
||||||
var err error
|
var err error
|
||||||
if image, err = b.AssetBuilder.RemapImage(image); err != nil {
|
if image, err = b.AssetBuilder.RemapImage(image); err != nil {
|
||||||
return err
|
return err
|
||||||
|
|
|
@ -62,7 +62,7 @@ func (b *NodeProblemDetectorOptionsBuilder) BuildOptions(o interface{}) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
if npd.Image == nil {
|
if npd.Image == nil {
|
||||||
npd.Image = fi.String("k8s.gcr.io/node-problem-detector/node-problem-detector:v0.8.8")
|
npd.Image = fi.String("registry.k8s.io/node-problem-detector/node-problem-detector:v0.8.8")
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
|
|
@ -285,7 +285,7 @@ spec:
|
||||||
- name: ebs-plugin
|
- name: ebs-plugin
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: true
|
||||||
image: k8s.gcr.io/provider-aws/aws-ebs-csi-driver:{{ .Version }}
|
image: registry.k8s.io/provider-aws/aws-ebs-csi-driver:{{ .Version }}
|
||||||
args:
|
args:
|
||||||
- node
|
- node
|
||||||
- --endpoint=$(CSI_ENDPOINT)
|
- --endpoint=$(CSI_ENDPOINT)
|
||||||
|
@ -326,7 +326,7 @@ spec:
|
||||||
periodSeconds: 10
|
periodSeconds: 10
|
||||||
failureThreshold: 5
|
failureThreshold: 5
|
||||||
- name: node-driver-registrar
|
- name: node-driver-registrar
|
||||||
image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0
|
image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.1.0
|
||||||
args:
|
args:
|
||||||
- --csi-address=$(ADDRESS)
|
- --csi-address=$(ADDRESS)
|
||||||
- --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)
|
- --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)
|
||||||
|
@ -346,7 +346,7 @@ spec:
|
||||||
- name: registration-dir
|
- name: registration-dir
|
||||||
mountPath: /registration
|
mountPath: /registration
|
||||||
- name: liveness-probe
|
- name: liveness-probe
|
||||||
image: k8s.gcr.io/sig-storage/livenessprobe:v2.2.0
|
image: registry.k8s.io/sig-storage/livenessprobe:v2.2.0
|
||||||
args:
|
args:
|
||||||
- --csi-address=/csi/csi.sock
|
- --csi-address=/csi/csi.sock
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
|
@ -426,7 +426,7 @@ spec:
|
||||||
{{ end }}
|
{{ end }}
|
||||||
containers:
|
containers:
|
||||||
- name: ebs-plugin
|
- name: ebs-plugin
|
||||||
image: k8s.gcr.io/provider-aws/aws-ebs-csi-driver:{{ .Version }}
|
image: registry.k8s.io/provider-aws/aws-ebs-csi-driver:{{ .Version }}
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
args:
|
args:
|
||||||
- controller
|
- controller
|
||||||
|
@ -475,7 +475,7 @@ spec:
|
||||||
periodSeconds: 10
|
periodSeconds: 10
|
||||||
failureThreshold: 5
|
failureThreshold: 5
|
||||||
- name: csi-provisioner
|
- name: csi-provisioner
|
||||||
image: k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0
|
image: registry.k8s.io/sig-storage/csi-provisioner:v2.2.0
|
||||||
args:
|
args:
|
||||||
- --csi-address=$(ADDRESS)
|
- --csi-address=$(ADDRESS)
|
||||||
- --v=5
|
- --v=5
|
||||||
|
@ -490,7 +490,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /var/lib/csi/sockets/pluginproxy/
|
mountPath: /var/lib/csi/sockets/pluginproxy/
|
||||||
- name: csi-attacher
|
- name: csi-attacher
|
||||||
image: k8s.gcr.io/sig-storage/csi-attacher:v3.2.0
|
image: registry.k8s.io/sig-storage/csi-attacher:v3.2.0
|
||||||
args:
|
args:
|
||||||
- --csi-address=$(ADDRESS)
|
- --csi-address=$(ADDRESS)
|
||||||
- --v=5
|
- --v=5
|
||||||
|
@ -502,7 +502,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /var/lib/csi/sockets/pluginproxy/
|
mountPath: /var/lib/csi/sockets/pluginproxy/
|
||||||
- name: csi-snapshotter
|
- name: csi-snapshotter
|
||||||
image: k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0
|
image: registry.k8s.io/sig-storage/csi-snapshotter:v4.0.0
|
||||||
args:
|
args:
|
||||||
- --csi-address=$(ADDRESS)
|
- --csi-address=$(ADDRESS)
|
||||||
- --leader-election=true
|
- --leader-election=true
|
||||||
|
@ -513,7 +513,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /var/lib/csi/sockets/pluginproxy/
|
mountPath: /var/lib/csi/sockets/pluginproxy/
|
||||||
- name: csi-resizer
|
- name: csi-resizer
|
||||||
image: k8s.gcr.io/sig-storage/csi-resizer:v1.1.0
|
image: registry.k8s.io/sig-storage/csi-resizer:v1.1.0
|
||||||
imagePullPolicy: Always
|
imagePullPolicy: Always
|
||||||
args:
|
args:
|
||||||
- --csi-address=$(ADDRESS)
|
- --csi-address=$(ADDRESS)
|
||||||
|
@ -525,7 +525,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /var/lib/csi/sockets/pluginproxy/
|
mountPath: /var/lib/csi/sockets/pluginproxy/
|
||||||
- name: liveness-probe
|
- name: liveness-probe
|
||||||
image: k8s.gcr.io/sig-storage/livenessprobe:v2.2.0
|
image: registry.k8s.io/sig-storage/livenessprobe:v2.2.0
|
||||||
args:
|
args:
|
||||||
- --csi-address=/csi/csi.sock
|
- --csi-address=/csi/csi.sock
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
|
|
|
@ -117,9 +117,9 @@ spec:
|
||||||
serviceAccountName: cloud-controller-manager
|
serviceAccountName: cloud-controller-manager
|
||||||
containers:
|
containers:
|
||||||
- name: cloud-controller-manager
|
- name: cloud-controller-manager
|
||||||
# for in-tree providers we use k8s.gcr.io/cloud-controller-manager
|
# for in-tree providers we use registry.k8s.io/cloud-controller-manager
|
||||||
# this can be replaced with any other image for out-of-tree providers
|
# this can be replaced with any other image for out-of-tree providers
|
||||||
image: k8s.gcr.io/cloud-controller-manager:v{{ .KubernetesVersion }} # Reviewers: Will this work?
|
image: registry.k8s.io/cloud-controller-manager:v{{ .KubernetesVersion }} # Reviewers: Will this work?
|
||||||
command:
|
command:
|
||||||
- /usr/local/bin/cloud-controller-manager
|
- /usr/local/bin/cloud-controller-manager
|
||||||
- --cloud-provider={{ GetCloudProvider }}
|
- --cloud-provider={{ GetCloudProvider }}
|
||||||
|
|
|
@ -154,7 +154,7 @@ spec:
|
||||||
k8s-app: kube-dns
|
k8s-app: kube-dns
|
||||||
containers:
|
containers:
|
||||||
- name: coredns
|
- name: coredns
|
||||||
image: {{ if KubeDNS.CoreDNSImage }}{{ KubeDNS.CoreDNSImage }}{{ else }}k8s.gcr.io/coredns/coredns:v1.8.5{{ end }}
|
image: {{ if KubeDNS.CoreDNSImage }}{{ KubeDNS.CoreDNSImage }}{{ else }}registry.k8s.io/coredns/coredns:v1.8.5{{ end }}
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
@ -318,7 +318,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: autoscaler
|
- name: autoscaler
|
||||||
image: {{ if KubeDNS.CPAImage }}{{ KubeDNS.CPAImage }}{{ else }}k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.4{{ end }}
|
image: {{ if KubeDNS.CPAImage }}{{ KubeDNS.CPAImage }}{{ else }}registry.k8s.io/cpa/cluster-proportional-autoscaler:1.8.4{{ end }}
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
cpu: "20m"
|
cpu: "20m"
|
||||||
|
|
|
@ -38,7 +38,7 @@ spec:
|
||||||
serviceAccount: dns-controller
|
serviceAccount: dns-controller
|
||||||
containers:
|
containers:
|
||||||
- name: dns-controller
|
- name: dns-controller
|
||||||
image: k8s.gcr.io/kops/dns-controller:1.24.0-alpha.2
|
image: registry.k8s.io/kops/dns-controller:1.24.0-alpha.2
|
||||||
args:
|
args:
|
||||||
{{ range $arg := DnsControllerArgv }}
|
{{ range $arg := DnsControllerArgv }}
|
||||||
- "{{ $arg }}"
|
- "{{ $arg }}"
|
||||||
|
|
|
@ -40,7 +40,7 @@ spec:
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
capabilities:
|
capabilities:
|
||||||
drop: ["ALL"]
|
drop: ["ALL"]
|
||||||
image: k8s.gcr.io/external-dns/external-dns:v0.10.1
|
image: registry.k8s.io/external-dns/external-dns:v0.10.1
|
||||||
args:
|
args:
|
||||||
{{ range $arg := ExternalDnsArgv }}
|
{{ range $arg := ExternalDnsArgv }}
|
||||||
- "{{ $arg }}"
|
- "{{ $arg }}"
|
||||||
|
|
|
@ -346,7 +346,7 @@ spec:
|
||||||
priorityClassName: csi-gce-pd-controller
|
priorityClassName: csi-gce-pd-controller
|
||||||
containers:
|
containers:
|
||||||
- name: csi-provisioner
|
- name: csi-provisioner
|
||||||
image: k8s.gcr.io/sig-storage/csi-provisioner:v2.1.0
|
image: registry.k8s.io/sig-storage/csi-provisioner:v2.1.0
|
||||||
args:
|
args:
|
||||||
- "--v=5"
|
- "--v=5"
|
||||||
- "--csi-address=/csi/csi.sock"
|
- "--csi-address=/csi/csi.sock"
|
||||||
|
@ -380,7 +380,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /csi
|
mountPath: /csi
|
||||||
- name: csi-attacher
|
- name: csi-attacher
|
||||||
image: k8s.gcr.io/sig-storage/csi-attacher:v3.1.0
|
image: registry.k8s.io/sig-storage/csi-attacher:v3.1.0
|
||||||
args:
|
args:
|
||||||
- "--v=5"
|
- "--v=5"
|
||||||
- "--csi-address=/csi/csi.sock"
|
- "--csi-address=/csi/csi.sock"
|
||||||
|
@ -409,7 +409,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /csi
|
mountPath: /csi
|
||||||
- name: csi-resizer
|
- name: csi-resizer
|
||||||
image: k8s.gcr.io/sig-storage/csi-resizer:v1.1.0
|
image: registry.k8s.io/sig-storage/csi-resizer:v1.1.0
|
||||||
args:
|
args:
|
||||||
- "--v=5"
|
- "--v=5"
|
||||||
- "--csi-address=/csi/csi.sock"
|
- "--csi-address=/csi/csi.sock"
|
||||||
|
@ -438,7 +438,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /csi
|
mountPath: /csi
|
||||||
- name: csi-snapshotter
|
- name: csi-snapshotter
|
||||||
image: k8s.gcr.io/sig-storage/csi-snapshotter:v3.0.3
|
image: registry.k8s.io/sig-storage/csi-snapshotter:v3.0.3
|
||||||
args:
|
args:
|
||||||
- "--v=5"
|
- "--v=5"
|
||||||
- "--csi-address=/csi/csi.sock"
|
- "--csi-address=/csi/csi.sock"
|
||||||
|
@ -457,7 +457,7 @@ spec:
|
||||||
- name: gce-pd-driver
|
- name: gce-pd-driver
|
||||||
# Don't change base image without changing pdImagePlaceholder in
|
# Don't change base image without changing pdImagePlaceholder in
|
||||||
# test/k8s-integration/main.go
|
# test/k8s-integration/main.go
|
||||||
image: k8s.gcr.io/cloud-provider-gcp/gcp-compute-persistent-disk-csi-driver:v1.3.4
|
image: registry.k8s.io/cloud-provider-gcp/gcp-compute-persistent-disk-csi-driver:v1.3.4
|
||||||
args:
|
args:
|
||||||
- "--v=5"
|
- "--v=5"
|
||||||
- "--endpoint=unix:/csi/csi.sock"
|
- "--endpoint=unix:/csi/csi.sock"
|
||||||
|
@ -504,7 +504,7 @@ spec:
|
||||||
kubernetes.io/os: linux
|
kubernetes.io/os: linux
|
||||||
containers:
|
containers:
|
||||||
- name: csi-driver-registrar
|
- name: csi-driver-registrar
|
||||||
image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0
|
image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.1.0
|
||||||
args:
|
args:
|
||||||
- "--v=5"
|
- "--v=5"
|
||||||
- "--csi-address=/csi/csi.sock"
|
- "--csi-address=/csi/csi.sock"
|
||||||
|
@ -522,7 +522,7 @@ spec:
|
||||||
- name: gce-pd-driver
|
- name: gce-pd-driver
|
||||||
# Don't change base image without changing pdImagePlaceholder in
|
# Don't change base image without changing pdImagePlaceholder in
|
||||||
# test/k8s-integration/main.go
|
# test/k8s-integration/main.go
|
||||||
image: k8s.gcr.io/cloud-provider-gcp/gcp-compute-persistent-disk-csi-driver:v1.3.4
|
image: registry.k8s.io/cloud-provider-gcp/gcp-compute-persistent-disk-csi-driver:v1.3.4
|
||||||
args:
|
args:
|
||||||
- "--v=5"
|
- "--v=5"
|
||||||
- "--endpoint=unix:/csi/csi.sock"
|
- "--endpoint=unix:/csi/csi.sock"
|
||||||
|
|
|
@ -53,7 +53,7 @@ spec:
|
||||||
serviceAccount: kops-controller
|
serviceAccount: kops-controller
|
||||||
containers:
|
containers:
|
||||||
- name: kops-controller
|
- name: kops-controller
|
||||||
image: k8s.gcr.io/kops/kops-controller:1.24.0-alpha.2
|
image: registry.k8s.io/kops/kops-controller:1.24.0-alpha.2
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
{{ if .UseHostCertificates }}
|
{{ if .UseHostCertificates }}
|
||||||
- mountPath: /etc/ssl/certs
|
- mountPath: /etc/ssl/certs
|
||||||
|
|
|
@ -53,7 +53,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: autoscaler
|
- name: autoscaler
|
||||||
image: {{ if KubeDNS.CPAImage }}{{ KubeDNS.CPAImage }}{{ else }}k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.3{{ end }}
|
image: {{ if KubeDNS.CPAImage }}{{ KubeDNS.CPAImage }}{{ else }}registry.k8s.io/cpa/cluster-proportional-autoscaler:1.8.3{{ end }}
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
cpu: "20m"
|
cpu: "20m"
|
||||||
|
@ -130,7 +130,7 @@ spec:
|
||||||
|
|
||||||
containers:
|
containers:
|
||||||
- name: kubedns
|
- name: kubedns
|
||||||
image: k8s.gcr.io/k8s-dns-kube-dns:1.15.13
|
image: registry.k8s.io/k8s-dns-kube-dns:1.15.13
|
||||||
resources:
|
resources:
|
||||||
# TODO: Set memory limits when we've profiled the container for large
|
# TODO: Set memory limits when we've profiled the container for large
|
||||||
# clusters, then set request = limit to keep this container in
|
# clusters, then set request = limit to keep this container in
|
||||||
|
@ -182,7 +182,7 @@ spec:
|
||||||
mountPath: /kube-dns-config
|
mountPath: /kube-dns-config
|
||||||
|
|
||||||
- name: dnsmasq
|
- name: dnsmasq
|
||||||
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny:1.15.13
|
image: registry.k8s.io/k8s-dns-dnsmasq-nanny:1.15.13
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /healthcheck/dnsmasq
|
path: /healthcheck/dnsmasq
|
||||||
|
@ -224,7 +224,7 @@ spec:
|
||||||
mountPath: /etc/k8s/dns/dnsmasq-nanny
|
mountPath: /etc/k8s/dns/dnsmasq-nanny
|
||||||
|
|
||||||
- name: sidecar
|
- name: sidecar
|
||||||
image: k8s.gcr.io/k8s-dns-sidecar:1.15.13
|
image: registry.k8s.io/k8s-dns-sidecar:1.15.13
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /metrics
|
path: /metrics
|
||||||
|
|
|
@ -142,7 +142,7 @@ spec:
|
||||||
{{ if or (not UseKopsControllerForNodeBootstrap) (WithDefaultBool .MetricsServer.Insecure true) }}
|
{{ if or (not UseKopsControllerForNodeBootstrap) (WithDefaultBool .MetricsServer.Insecure true) }}
|
||||||
- --kubelet-insecure-tls
|
- --kubelet-insecure-tls
|
||||||
{{ end }}
|
{{ end }}
|
||||||
image: {{ or .MetricsServer.Image "k8s.gcr.io/metrics-server/metrics-server:v0.6.0" }}
|
image: {{ or .MetricsServer.Image "registry.k8s.io/metrics-server/metrics-server:v0.6.0" }}
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
failureThreshold: 3
|
failureThreshold: 3
|
||||||
|
|
|
@ -1201,7 +1201,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: snapshot-validation
|
- name: snapshot-validation
|
||||||
image: k8s.gcr.io/sig-storage/snapshot-validation-webhook:v5.0.0
|
image: registry.k8s.io/sig-storage/snapshot-validation-webhook:v5.0.0
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
args: ['--tls-cert-file=/etc/snapshot-validation-webhook/certs/tls.crt', '--tls-private-key-file=/etc/snapshot-validation-webhook/certs/tls.key']
|
args: ['--tls-cert-file=/etc/snapshot-validation-webhook/certs/tls.crt', '--tls-private-key-file=/etc/snapshot-validation-webhook/certs/tls.key']
|
||||||
ports:
|
ports:
|
||||||
|
|
|
@ -263,7 +263,7 @@ spec:
|
||||||
serviceAccount: csi-cinder-controller-sa
|
serviceAccount: csi-cinder-controller-sa
|
||||||
containers:
|
containers:
|
||||||
- name: csi-attacher
|
- name: csi-attacher
|
||||||
image: k8s.gcr.io/sig-storage/csi-attacher:v3.1.0
|
image: registry.k8s.io/sig-storage/csi-attacher:v3.1.0
|
||||||
args:
|
args:
|
||||||
- "--csi-address=$(ADDRESS)"
|
- "--csi-address=$(ADDRESS)"
|
||||||
- "--timeout=3m"
|
- "--timeout=3m"
|
||||||
|
@ -275,7 +275,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /var/lib/csi/sockets/pluginproxy/
|
mountPath: /var/lib/csi/sockets/pluginproxy/
|
||||||
- name: csi-provisioner
|
- name: csi-provisioner
|
||||||
image: k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0
|
image: registry.k8s.io/sig-storage/csi-provisioner:v2.2.0
|
||||||
args:
|
args:
|
||||||
- "--csi-address=$(ADDRESS)"
|
- "--csi-address=$(ADDRESS)"
|
||||||
- "--timeout=3m"
|
- "--timeout=3m"
|
||||||
|
@ -292,7 +292,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /var/lib/csi/sockets/pluginproxy/
|
mountPath: /var/lib/csi/sockets/pluginproxy/
|
||||||
- name: csi-snapshotter
|
- name: csi-snapshotter
|
||||||
image: k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0
|
image: registry.k8s.io/sig-storage/csi-snapshotter:v4.0.0
|
||||||
args:
|
args:
|
||||||
- "--csi-address=$(ADDRESS)"
|
- "--csi-address=$(ADDRESS)"
|
||||||
- "--timeout=3m"
|
- "--timeout=3m"
|
||||||
|
@ -305,7 +305,7 @@ spec:
|
||||||
- mountPath: /var/lib/csi/sockets/pluginproxy/
|
- mountPath: /var/lib/csi/sockets/pluginproxy/
|
||||||
name: socket-dir
|
name: socket-dir
|
||||||
- name: csi-resizer
|
- name: csi-resizer
|
||||||
image: k8s.gcr.io/sig-storage/csi-resizer:v1.1.0
|
image: registry.k8s.io/sig-storage/csi-resizer:v1.1.0
|
||||||
args:
|
args:
|
||||||
- "--csi-address=$(ADDRESS)"
|
- "--csi-address=$(ADDRESS)"
|
||||||
- "--timeout=3m"
|
- "--timeout=3m"
|
||||||
|
@ -318,7 +318,7 @@ spec:
|
||||||
- name: socket-dir
|
- name: socket-dir
|
||||||
mountPath: /var/lib/csi/sockets/pluginproxy/
|
mountPath: /var/lib/csi/sockets/pluginproxy/
|
||||||
- name: liveness-probe
|
- name: liveness-probe
|
||||||
image: k8s.gcr.io/sig-storage/livenessprobe:v2.2.0
|
image: registry.k8s.io/sig-storage/livenessprobe:v2.2.0
|
||||||
args:
|
args:
|
||||||
- "--csi-address=$(ADDRESS)"
|
- "--csi-address=$(ADDRESS)"
|
||||||
env:
|
env:
|
||||||
|
@ -438,7 +438,7 @@ spec:
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
containers:
|
containers:
|
||||||
- name: node-driver-registrar
|
- name: node-driver-registrar
|
||||||
image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0
|
image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.1.0
|
||||||
args:
|
args:
|
||||||
- "--csi-address=$(ADDRESS)"
|
- "--csi-address=$(ADDRESS)"
|
||||||
- "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)"
|
- "--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)"
|
||||||
|
@ -458,7 +458,7 @@ spec:
|
||||||
- name: registration-dir
|
- name: registration-dir
|
||||||
mountPath: /registration
|
mountPath: /registration
|
||||||
- name: liveness-probe
|
- name: liveness-probe
|
||||||
image: k8s.gcr.io/sig-storage/livenessprobe:v2.2.0
|
image: registry.k8s.io/sig-storage/livenessprobe:v2.2.0
|
||||||
args:
|
args:
|
||||||
- --csi-address=/csi/csi.sock
|
- --csi-address=/csi/csi.sock
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
|
|
|
@ -1477,10 +1477,10 @@ func (n *nodeUpConfigBuilder) buildWarmPoolImages(ig *kops.InstanceGroup) []stri
|
||||||
//"docker.io/cilium/",
|
//"docker.io/cilium/",
|
||||||
//"docker.io/cloudnativelabs/kube-router:",
|
//"docker.io/cloudnativelabs/kube-router:",
|
||||||
//"docker.io/weaveworks/",
|
//"docker.io/weaveworks/",
|
||||||
"k8s.gcr.io/kube-proxy:",
|
"registry.k8s.io/kube-proxy:",
|
||||||
"k8s.gcr.io/provider-aws/",
|
"registry.k8s.io/provider-aws/",
|
||||||
"k8s.gcr.io/sig-storage/csi-node-driver-registrar:",
|
"registry.k8s.io/sig-storage/csi-node-driver-registrar:",
|
||||||
"k8s.gcr.io/sig-storage/livenessprobe:",
|
"registry.k8s.io/sig-storage/livenessprobe:",
|
||||||
"quay.io/calico/",
|
"quay.io/calico/",
|
||||||
"quay.io/cilium/",
|
"quay.io/cilium/",
|
||||||
"quay.io/coreos/flannel:",
|
"quay.io/coreos/flannel:",
|
||||||
|
|
Loading…
Reference in New Issue