mirror of https://github.com/k3s-io/k3s
Use k8s.gcr.io vanity domain for container images
parent
17117051c4
commit
eba5b6092a
|
@ -177,15 +177,15 @@ filename | sha256 hash
|
||||||
### Other notable changes
|
### Other notable changes
|
||||||
|
|
||||||
* kube-apiserver now drops unneeded path information if an older version of Windows kubectl sends it. ([#44586](https://github.com/kubernetes/kubernetes/pull/44586), [@mml](https://github.com/mml))
|
* kube-apiserver now drops unneeded path information if an older version of Windows kubectl sends it. ([#44586](https://github.com/kubernetes/kubernetes/pull/44586), [@mml](https://github.com/mml))
|
||||||
* Bump gcr.io/google_containers/glbc from 0.8.0 to 0.9.2. Release notes: [0.9.0](https://github.com/kubernetes/ingress/releases/tag/0.9.0), [0.9.1](https://github.com/kubernetes/ingress/releases/tag/0.9.1), [0.9.2](https://github.com/kubernetes/ingress/releases/tag/0.9.2) ([#43098](https://github.com/kubernetes/kubernetes/pull/43098), [@timstclair](https://github.com/timstclair))
|
* Bump k8s.gcr.io/glbc from 0.8.0 to 0.9.2. Release notes: [0.9.0](https://github.com/kubernetes/ingress/releases/tag/0.9.0), [0.9.1](https://github.com/kubernetes/ingress/releases/tag/0.9.1), [0.9.2](https://github.com/kubernetes/ingress/releases/tag/0.9.2) ([#43098](https://github.com/kubernetes/kubernetes/pull/43098), [@timstclair](https://github.com/timstclair))
|
||||||
* Patch CVE-2016-8859 in alpine based images: ([#42937](https://github.com/kubernetes/kubernetes/pull/42937), [@timstclair](https://github.com/timstclair))
|
* Patch CVE-2016-8859 in alpine based images: ([#42937](https://github.com/kubernetes/kubernetes/pull/42937), [@timstclair](https://github.com/timstclair))
|
||||||
* - gcr.io/google-containers/etcd-empty-dir-cleanup
|
* - k8s.gcr.io/etcd-empty-dir-cleanup
|
||||||
* - gcr.io/google-containers/kube-dnsmasq-amd64
|
* - k8s.gcr.io/kube-dnsmasq-amd64
|
||||||
* Check if pathExists before performing Unmount ([#39311](https://github.com/kubernetes/kubernetes/pull/39311), [@rkouj](https://github.com/rkouj))
|
* Check if pathExists before performing Unmount ([#39311](https://github.com/kubernetes/kubernetes/pull/39311), [@rkouj](https://github.com/rkouj))
|
||||||
* Unmount operation should not fail if volume is already unmounted ([#38547](https://github.com/kubernetes/kubernetes/pull/38547), [@rkouj](https://github.com/rkouj))
|
* Unmount operation should not fail if volume is already unmounted ([#38547](https://github.com/kubernetes/kubernetes/pull/38547), [@rkouj](https://github.com/rkouj))
|
||||||
* Updates base image used for `kube-addon-manager` to latest `python:2.7-slim` and embedded `kubectl` to `v1.3.10`. No functionality changes expected. ([#42842](https://github.com/kubernetes/kubernetes/pull/42842), [@ixdy](https://github.com/ixdy))
|
* Updates base image used for `kube-addon-manager` to latest `python:2.7-slim` and embedded `kubectl` to `v1.3.10`. No functionality changes expected. ([#42842](https://github.com/kubernetes/kubernetes/pull/42842), [@ixdy](https://github.com/ixdy))
|
||||||
* list-resources: don't fail if the grep fails to match any resources ([#41933](https://github.com/kubernetes/kubernetes/pull/41933), [@ixdy](https://github.com/ixdy))
|
* list-resources: don't fail if the grep fails to match any resources ([#41933](https://github.com/kubernetes/kubernetes/pull/41933), [@ixdy](https://github.com/ixdy))
|
||||||
* Update gcr.io/google-containers/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
|
* Update k8s.gcr.io/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
|
||||||
* Backporting TPR fix to 1.4 ([#42380](https://github.com/kubernetes/kubernetes/pull/42380), [@foxish](https://github.com/foxish))
|
* Backporting TPR fix to 1.4 ([#42380](https://github.com/kubernetes/kubernetes/pull/42380), [@foxish](https://github.com/foxish))
|
||||||
* Fix AWS device allocator to only use valid device names ([#41455](https://github.com/kubernetes/kubernetes/pull/41455), [@gnufied](https://github.com/gnufied))
|
* Fix AWS device allocator to only use valid device names ([#41455](https://github.com/kubernetes/kubernetes/pull/41455), [@gnufied](https://github.com/gnufied))
|
||||||
* Reverts to looking up the current VM in vSphere using the machine's UUID, either obtained via sysfs or via the `vm-uuid` parameter in the cloud configuration file. ([#40892](https://github.com/kubernetes/kubernetes/pull/40892), [@robdaemon](https://github.com/robdaemon))
|
* Reverts to looking up the current VM in vSphere using the machine's UUID, either obtained via sysfs or via the `vm-uuid` parameter in the cloud configuration file. ([#40892](https://github.com/kubernetes/kubernetes/pull/40892), [@robdaemon](https://github.com/robdaemon))
|
||||||
|
|
|
@ -249,18 +249,18 @@ filename | sha256 hash
|
||||||
|
|
||||||
* kube-up (with gce/gci and gce/coreos providers) now ensures the authentication token file contains correct tokens for the control plane components, even if the file already exists (ensures upgrades and downgrades work successfully) ([#43676](https://github.com/kubernetes/kubernetes/pull/43676), [@liggitt](https://github.com/liggitt))
|
* kube-up (with gce/gci and gce/coreos providers) now ensures the authentication token file contains correct tokens for the control plane components, even if the file already exists (ensures upgrades and downgrades work successfully) ([#43676](https://github.com/kubernetes/kubernetes/pull/43676), [@liggitt](https://github.com/liggitt))
|
||||||
* Patch CVE-2016-8859 in alpine based images: ([#42936](https://github.com/kubernetes/kubernetes/pull/42936), [@timstclair](https://github.com/timstclair))
|
* Patch CVE-2016-8859 in alpine based images: ([#42936](https://github.com/kubernetes/kubernetes/pull/42936), [@timstclair](https://github.com/timstclair))
|
||||||
* - gcr.io/google-containers/cluster-proportional-autoscaler-amd64
|
* - k8s.gcr.io/cluster-proportional-autoscaler-amd64
|
||||||
* - gcr.io/google-containers/dnsmasq-metrics-amd64
|
* - k8s.gcr.io/dnsmasq-metrics-amd64
|
||||||
* - gcr.io/google-containers/etcd-empty-dir-cleanup
|
* - k8s.gcr.io/etcd-empty-dir-cleanup
|
||||||
* - gcr.io/google-containers/kube-addon-manager
|
* - k8s.gcr.io/kube-addon-manager
|
||||||
* - gcr.io/google-containers/kube-dnsmasq-amd64
|
* - k8s.gcr.io/kube-dnsmasq-amd64
|
||||||
* - Disable thin_ls due to excessive iops ([#43113](https://github.com/kubernetes/kubernetes/pull/43113), [@dashpole](https://github.com/dashpole))
|
* - Disable thin_ls due to excessive iops ([#43113](https://github.com/kubernetes/kubernetes/pull/43113), [@dashpole](https://github.com/dashpole))
|
||||||
* - Ignore .mount cgroups, fixing dissappearing stats
|
* - Ignore .mount cgroups, fixing dissappearing stats
|
||||||
* - Fix wc goroutine leak
|
* - Fix wc goroutine leak
|
||||||
* - Update aws-sdk-go dependency to 1.6.10
|
* - Update aws-sdk-go dependency to 1.6.10
|
||||||
* PodSecurityPolicy authorization is correctly enforced by the PodSecurityPolicy admission plugin. ([#43489](https://github.com/kubernetes/kubernetes/pull/43489), [@liggitt](https://github.com/liggitt))
|
* PodSecurityPolicy authorization is correctly enforced by the PodSecurityPolicy admission plugin. ([#43489](https://github.com/kubernetes/kubernetes/pull/43489), [@liggitt](https://github.com/liggitt))
|
||||||
* Bump gcr.io/google_containers/glbc from 0.9.1 to 0.9.2. Release notes: [0.9.2](https://github.com/kubernetes/ingress/releases/tag/0.9.2) ([#43097](https://github.com/kubernetes/kubernetes/pull/43097), [@timstclair](https://github.com/timstclair))
|
* Bump k8s.gcr.io/glbc from 0.9.1 to 0.9.2. Release notes: [0.9.2](https://github.com/kubernetes/ingress/releases/tag/0.9.2) ([#43097](https://github.com/kubernetes/kubernetes/pull/43097), [@timstclair](https://github.com/timstclair))
|
||||||
* Update gcr.io/google-containers/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
|
* Update k8s.gcr.io/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
|
||||||
* restored normalization of custom `--etcd-prefix` when `--storage-backend` is set to etcd3 ([#42506](https://github.com/kubernetes/kubernetes/pull/42506), [@liggitt](https://github.com/liggitt))
|
* restored normalization of custom `--etcd-prefix` when `--storage-backend` is set to etcd3 ([#42506](https://github.com/kubernetes/kubernetes/pull/42506), [@liggitt](https://github.com/liggitt))
|
||||||
|
|
||||||
|
|
||||||
|
@ -655,7 +655,7 @@ Features for this release were tracked via the use of the [kubernetes/features](
|
||||||
- [alpha] Introducing the v1alpha1 CRI API to allow pluggable container runtimes; an experimental docker-CRI integration is ready for testing and feedback. ([docs](https://github.com/kubernetes/community/blob/master/contributors/devel/container-runtime-interface.md)) ([kubernetes/features#54](https://github.com/kubernetes/features/issues/54))
|
- [alpha] Introducing the v1alpha1 CRI API to allow pluggable container runtimes; an experimental docker-CRI integration is ready for testing and feedback. ([docs](https://github.com/kubernetes/community/blob/master/contributors/devel/container-runtime-interface.md)) ([kubernetes/features#54](https://github.com/kubernetes/features/issues/54))
|
||||||
- [alpha] Kubelet launches container in a per pod cgroup hierarchy based on quality of service tier ([kubernetes/features#126](https://github.com/kubernetes/features/issues/126))
|
- [alpha] Kubelet launches container in a per pod cgroup hierarchy based on quality of service tier ([kubernetes/features#126](https://github.com/kubernetes/features/issues/126))
|
||||||
- [beta] Kubelet integrates with memcg notification API to detect when a hard eviction threshold is crossed ([kubernetes/features#125](https://github.com/kubernetes/features/issues/125))
|
- [beta] Kubelet integrates with memcg notification API to detect when a hard eviction threshold is crossed ([kubernetes/features#125](https://github.com/kubernetes/features/issues/125))
|
||||||
- [beta] Introducing the beta version containerized node conformance test gcr.io/google_containers/node-test:0.2 for users to verify node setup. ([docs](http://kubernetes.io/docs/admin/node-conformance/)) ([kubernetes/features#84](https://github.com/kubernetes/features/issues/84))
|
- [beta] Introducing the beta version containerized node conformance test k8s.gcr.io/node-test:0.2 for users to verify node setup. ([docs](http://kubernetes.io/docs/admin/node-conformance/)) ([kubernetes/features#84](https://github.com/kubernetes/features/issues/84))
|
||||||
- **Scheduling**
|
- **Scheduling**
|
||||||
- [alpha] Added support for accounting opaque integer resources. ([docs](http://kubernetes.io/docs/user-guide/compute-resources/#opaque-integer-resources-alpha-feature)) ([kubernetes/features#76](https://github.com/kubernetes/features/issues/76))
|
- [alpha] Added support for accounting opaque integer resources. ([docs](http://kubernetes.io/docs/user-guide/compute-resources/#opaque-integer-resources-alpha-feature)) ([kubernetes/features#76](https://github.com/kubernetes/features/issues/76))
|
||||||
- [beta] PodDisruptionBudget has been promoted to beta, can be used to safely drain nodes while respecting application SLO's ([docs](http://kubernetes.io/docs/tasks/administer-cluster/safely-drain-node/)) ([kubernetes/features#85](https://github.com/kubernetes/features/issues/85))
|
- [beta] PodDisruptionBudget has been promoted to beta, can be used to safely drain nodes while respecting application SLO's ([docs](http://kubernetes.io/docs/tasks/administer-cluster/safely-drain-node/)) ([kubernetes/features#85](https://github.com/kubernetes/features/issues/85))
|
||||||
|
|
|
@ -1935,7 +1935,7 @@ Features for this release were tracked via the use of the [kubernetes/features](
|
||||||
* Fixes a bug in the OpenStack-Heat kubernetes provider, in the handling of differences between the Identity v2 and Identity v3 APIs ([#40105](https://github.com/kubernetes/kubernetes/pull/40105), [@sc68cal](https://github.com/sc68cal))
|
* Fixes a bug in the OpenStack-Heat kubernetes provider, in the handling of differences between the Identity v2 and Identity v3 APIs ([#40105](https://github.com/kubernetes/kubernetes/pull/40105), [@sc68cal](https://github.com/sc68cal))
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
* Update gcr.io/google-containers/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
|
* Update k8s.gcr.io/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
|
||||||
* Remove unnecessary metrics (http/process/go) from being exposed by etcd-version-monitor ([#41807](https://github.com/kubernetes/kubernetes/pull/41807), [@shyamjvs](https://github.com/shyamjvs))
|
* Remove unnecessary metrics (http/process/go) from being exposed by etcd-version-monitor ([#41807](https://github.com/kubernetes/kubernetes/pull/41807), [@shyamjvs](https://github.com/shyamjvs))
|
||||||
* Align the hyperkube image to support running binaries at /usr/local/bin/ like the other server images ([#41017](https://github.com/kubernetes/kubernetes/pull/41017), [@luxas](https://github.com/luxas))
|
* Align the hyperkube image to support running binaries at /usr/local/bin/ like the other server images ([#41017](https://github.com/kubernetes/kubernetes/pull/41017), [@luxas](https://github.com/luxas))
|
||||||
* Bump up GLBC version from 0.9.0-beta to 0.9.1 ([#41037](https://github.com/kubernetes/kubernetes/pull/41037), [@bprashanth](https://github.com/bprashanth))
|
* Bump up GLBC version from 0.9.0-beta to 0.9.1 ([#41037](https://github.com/kubernetes/kubernetes/pull/41037), [@bprashanth](https://github.com/bprashanth))
|
||||||
|
@ -1982,7 +1982,7 @@ Features for this release were tracked via the use of the [kubernetes/features](
|
||||||
* Use kube-dns:1.11.0 ([#39925](https://github.com/kubernetes/kubernetes/pull/39925), [@sadlil](https://github.com/sadlil))
|
* Use kube-dns:1.11.0 ([#39925](https://github.com/kubernetes/kubernetes/pull/39925), [@sadlil](https://github.com/sadlil))
|
||||||
|
|
||||||
### DNS Autoscaler
|
### DNS Autoscaler
|
||||||
* Patch CVE-2016-8859 in gcr.io/google-containers/cluster-proportional-autoscaler-amd64 ([#42933](https://github.com/kubernetes/kubernetes/pull/42933), [@timstclair](https://github.com/timstclair))
|
* Patch CVE-2016-8859 in k8s.gcr.io/cluster-proportional-autoscaler-amd64 ([#42933](https://github.com/kubernetes/kubernetes/pull/42933), [@timstclair](https://github.com/timstclair))
|
||||||
|
|
||||||
### Cluster Autoscaler
|
### Cluster Autoscaler
|
||||||
* Allow the Horizontal Pod Autoscaler controller to talk to the metrics API and custom metrics API as standard APIs. ([#41824](https://github.com/kubernetes/kubernetes/pull/41824), [@DirectXMan12](https://github.com/DirectXMan12))
|
* Allow the Horizontal Pod Autoscaler controller to talk to the metrics API and custom metrics API as standard APIs. ([#41824](https://github.com/kubernetes/kubernetes/pull/41824), [@DirectXMan12](https://github.com/DirectXMan12))
|
||||||
|
@ -2149,7 +2149,7 @@ filename | sha256 hash
|
||||||
* Rescheduler uses taints in v1beta1 and will remove old ones (in version v1alpha1) right after its start. ([#43106](https://github.com/kubernetes/kubernetes/pull/43106), [@piosz](https://github.com/piosz))
|
* Rescheduler uses taints in v1beta1 and will remove old ones (in version v1alpha1) right after its start. ([#43106](https://github.com/kubernetes/kubernetes/pull/43106), [@piosz](https://github.com/piosz))
|
||||||
* kubeadm: `kubeadm reset` won't drain and remove the current node anymore ([#42713](https://github.com/kubernetes/kubernetes/pull/42713), [@luxas](https://github.com/luxas))
|
* kubeadm: `kubeadm reset` won't drain and remove the current node anymore ([#42713](https://github.com/kubernetes/kubernetes/pull/42713), [@luxas](https://github.com/luxas))
|
||||||
* hack/godep-restore.sh: use godep v79 which works ([#42965](https://github.com/kubernetes/kubernetes/pull/42965), [@sttts](https://github.com/sttts))
|
* hack/godep-restore.sh: use godep v79 which works ([#42965](https://github.com/kubernetes/kubernetes/pull/42965), [@sttts](https://github.com/sttts))
|
||||||
* Patch CVE-2016-8859 in gcr.io/google-containers/cluster-proportional-autoscaler-amd64 ([#42933](https://github.com/kubernetes/kubernetes/pull/42933), [@timstclair](https://github.com/timstclair))
|
* Patch CVE-2016-8859 in k8s.gcr.io/cluster-proportional-autoscaler-amd64 ([#42933](https://github.com/kubernetes/kubernetes/pull/42933), [@timstclair](https://github.com/timstclair))
|
||||||
* Disable devicemapper thin_ls due to excessive iops ([#42899](https://github.com/kubernetes/kubernetes/pull/42899), [@dashpole](https://github.com/dashpole))
|
* Disable devicemapper thin_ls due to excessive iops ([#42899](https://github.com/kubernetes/kubernetes/pull/42899), [@dashpole](https://github.com/dashpole))
|
||||||
|
|
||||||
|
|
||||||
|
@ -2383,7 +2383,7 @@ filename | sha256 hash
|
||||||
* Add configurable limits to CronJob resource to specify how many successful and failed jobs are preserved. ([#40932](https://github.com/kubernetes/kubernetes/pull/40932), [@peay](https://github.com/peay))
|
* Add configurable limits to CronJob resource to specify how many successful and failed jobs are preserved. ([#40932](https://github.com/kubernetes/kubernetes/pull/40932), [@peay](https://github.com/peay))
|
||||||
* Deprecate outofdisk-transition-frequency and low-diskspace-threshold-mb flags ([#41941](https://github.com/kubernetes/kubernetes/pull/41941), [@dashpole](https://github.com/dashpole))
|
* Deprecate outofdisk-transition-frequency and low-diskspace-threshold-mb flags ([#41941](https://github.com/kubernetes/kubernetes/pull/41941), [@dashpole](https://github.com/dashpole))
|
||||||
* Add OWNERS for sample-apiserver in staging ([#42094](https://github.com/kubernetes/kubernetes/pull/42094), [@sttts](https://github.com/sttts))
|
* Add OWNERS for sample-apiserver in staging ([#42094](https://github.com/kubernetes/kubernetes/pull/42094), [@sttts](https://github.com/sttts))
|
||||||
* Update gcr.io/google-containers/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
|
* Update k8s.gcr.io/rescheduler to v0.2.2, which uses busybox as a base image instead of ubuntu. ([#41911](https://github.com/kubernetes/kubernetes/pull/41911), [@ixdy](https://github.com/ixdy))
|
||||||
* Add storage.k8s.io/v1 API ([#40088](https://github.com/kubernetes/kubernetes/pull/40088), [@jsafrane](https://github.com/jsafrane))
|
* Add storage.k8s.io/v1 API ([#40088](https://github.com/kubernetes/kubernetes/pull/40088), [@jsafrane](https://github.com/jsafrane))
|
||||||
* Juju - K8s master charm now properly keeps distributed master files in sync for an HA control plane. ([#41351](https://github.com/kubernetes/kubernetes/pull/41351), [@chuckbutler](https://github.com/chuckbutler))
|
* Juju - K8s master charm now properly keeps distributed master files in sync for an HA control plane. ([#41351](https://github.com/kubernetes/kubernetes/pull/41351), [@chuckbutler](https://github.com/chuckbutler))
|
||||||
* Fix zsh completion: unknown file attribute error ([#38104](https://github.com/kubernetes/kubernetes/pull/38104), [@elipapa](https://github.com/elipapa))
|
* Fix zsh completion: unknown file attribute error ([#38104](https://github.com/kubernetes/kubernetes/pull/38104), [@elipapa](https://github.com/elipapa))
|
||||||
|
|
|
@ -75018,7 +75018,7 @@
|
||||||
],
|
],
|
||||||
"properties": {
|
"properties": {
|
||||||
"names": {
|
"names": {
|
||||||
"description": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]",
|
"description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]",
|
||||||
"type": "array",
|
"type": "array",
|
||||||
"items": {
|
"items": {
|
||||||
"type": "string"
|
"type": "string"
|
||||||
|
|
|
@ -20257,7 +20257,7 @@
|
||||||
"items": {
|
"items": {
|
||||||
"type": "string"
|
"type": "string"
|
||||||
},
|
},
|
||||||
"description": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]"
|
"description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]"
|
||||||
},
|
},
|
||||||
"sizeBytes": {
|
"sizeBytes": {
|
||||||
"type": "integer",
|
"type": "integer",
|
||||||
|
|
|
@ -62,7 +62,11 @@ DOCKERIZED_BINARIES = {
|
||||||
|
|
||||||
[docker_bundle(
|
[docker_bundle(
|
||||||
name = binary,
|
name = binary,
|
||||||
images = {"gcr.io/google_containers/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal"},
|
# TODO(thockin): remove the google_containers name after release 1.10.
|
||||||
|
images = {
|
||||||
|
"k8s.gcr.io/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal",
|
||||||
|
"gcr.io/google_containers/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal",
|
||||||
|
},
|
||||||
stamp = True,
|
stamp = True,
|
||||||
) for binary in DOCKERIZED_BINARIES.keys()]
|
) for binary in DOCKERIZED_BINARIES.keys()]
|
||||||
|
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
# This file creates a standard build environment for building Kubernetes
|
# This file creates a standard build environment for building Kubernetes
|
||||||
FROM gcr.io/google_containers/kube-cross:KUBE_BUILD_IMAGE_CROSS_TAG
|
FROM k8s.gcr.io/kube-cross:KUBE_BUILD_IMAGE_CROSS_TAG
|
||||||
|
|
||||||
# Mark this as a kube-build container
|
# Mark this as a kube-build container
|
||||||
RUN touch /kube-build-image
|
RUN touch /kube-build-image
|
||||||
|
|
|
@ -21,7 +21,7 @@ TAG=$(shell cat VERSION)
|
||||||
all: push
|
all: push
|
||||||
|
|
||||||
build:
|
build:
|
||||||
docker build --pull -t gcr.io/google_containers/$(IMAGE):$(TAG) .
|
docker build --pull -t k8s.gcr.io/$(IMAGE):$(TAG) .
|
||||||
|
|
||||||
push: build
|
push: build
|
||||||
gcloud docker --server=gcr.io -- push gcr.io/google_containers/$(IMAGE):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push k8s.gcr.io/$(IMAGE):$(TAG)
|
||||||
|
|
|
@ -96,7 +96,7 @@ kube::build::get_docker_wrapped_binaries() {
|
||||||
kube-controller-manager,busybox
|
kube-controller-manager,busybox
|
||||||
kube-scheduler,busybox
|
kube-scheduler,busybox
|
||||||
kube-aggregator,busybox
|
kube-aggregator,busybox
|
||||||
kube-proxy,gcr.io/google-containers/debian-iptables-amd64:${debian_iptables_version}
|
kube-proxy,k8s.gcr.io/debian-iptables-amd64:${debian_iptables_version}
|
||||||
);;
|
);;
|
||||||
"arm")
|
"arm")
|
||||||
local targets=(
|
local targets=(
|
||||||
|
@ -105,7 +105,7 @@ kube::build::get_docker_wrapped_binaries() {
|
||||||
kube-controller-manager,arm32v7/busybox
|
kube-controller-manager,arm32v7/busybox
|
||||||
kube-scheduler,arm32v7/busybox
|
kube-scheduler,arm32v7/busybox
|
||||||
kube-aggregator,arm32v7/busybox
|
kube-aggregator,arm32v7/busybox
|
||||||
kube-proxy,gcr.io/google-containers/debian-iptables-arm:${debian_iptables_version}
|
kube-proxy,k8s.gcr.io/debian-iptables-arm:${debian_iptables_version}
|
||||||
);;
|
);;
|
||||||
"arm64")
|
"arm64")
|
||||||
local targets=(
|
local targets=(
|
||||||
|
@ -114,7 +114,7 @@ kube::build::get_docker_wrapped_binaries() {
|
||||||
kube-controller-manager,arm64v8/busybox
|
kube-controller-manager,arm64v8/busybox
|
||||||
kube-scheduler,arm64v8/busybox
|
kube-scheduler,arm64v8/busybox
|
||||||
kube-aggregator,arm64v8/busybox
|
kube-aggregator,arm64v8/busybox
|
||||||
kube-proxy,gcr.io/google-containers/debian-iptables-arm64:${debian_iptables_version}
|
kube-proxy,k8s.gcr.io/debian-iptables-arm64:${debian_iptables_version}
|
||||||
);;
|
);;
|
||||||
"ppc64le")
|
"ppc64le")
|
||||||
local targets=(
|
local targets=(
|
||||||
|
@ -123,7 +123,7 @@ kube::build::get_docker_wrapped_binaries() {
|
||||||
kube-controller-manager,ppc64le/busybox
|
kube-controller-manager,ppc64le/busybox
|
||||||
kube-scheduler,ppc64le/busybox
|
kube-scheduler,ppc64le/busybox
|
||||||
kube-aggregator,ppc64le/busybox
|
kube-aggregator,ppc64le/busybox
|
||||||
kube-proxy,gcr.io/google-containers/debian-iptables-ppc64le:${debian_iptables_version}
|
kube-proxy,k8s.gcr.io/debian-iptables-ppc64le:${debian_iptables_version}
|
||||||
);;
|
);;
|
||||||
"s390x")
|
"s390x")
|
||||||
local targets=(
|
local targets=(
|
||||||
|
@ -132,7 +132,7 @@ kube::build::get_docker_wrapped_binaries() {
|
||||||
kube-controller-manager,s390x/busybox
|
kube-controller-manager,s390x/busybox
|
||||||
kube-scheduler,s390x/busybox
|
kube-scheduler,s390x/busybox
|
||||||
kube-aggregator,s390x/busybox
|
kube-aggregator,s390x/busybox
|
||||||
kube-proxy,gcr.io/google-containers/debian-iptables-s390x:${debian_iptables_version}
|
kube-proxy,k8s.gcr.io/debian-iptables-s390x:${debian_iptables_version}
|
||||||
);;
|
);;
|
||||||
esac
|
esac
|
||||||
|
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
|
|
||||||
all: build
|
all: build
|
||||||
|
|
||||||
REGISTRY ?= gcr.io/google-containers
|
REGISTRY ?= k8s.gcr.io
|
||||||
IMAGE ?= debian-base
|
IMAGE ?= debian-base
|
||||||
BUILD_IMAGE ?= debian-build
|
BUILD_IMAGE ?= debian-build
|
||||||
|
|
||||||
|
@ -71,7 +71,7 @@ endif
|
||||||
rm -rf $(TEMP_DIR)
|
rm -rf $(TEMP_DIR)
|
||||||
|
|
||||||
push: build
|
push: build
|
||||||
gcloud docker -- push $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG)
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
docker rmi -f $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG) || true
|
docker rmi -f $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG) || true
|
||||||
|
|
|
@ -15,15 +15,15 @@
|
||||||
# Build the hyperkube base image. This image is used to build the hyperkube image.
|
# Build the hyperkube base image. This image is used to build the hyperkube image.
|
||||||
#
|
#
|
||||||
# Usage:
|
# Usage:
|
||||||
# [ARCH=amd64] [REGISTRY="gcr.io/google-containers"] make (build|push)
|
# [ARCH=amd64] [REGISTRY="k8s.gcr.io"] make (build|push)
|
||||||
|
|
||||||
REGISTRY?=gcr.io/google-containers
|
REGISTRY?=k8s.gcr.io
|
||||||
IMAGE?=debian-hyperkube-base
|
IMAGE?=debian-hyperkube-base
|
||||||
TAG=0.8
|
TAG=0.8
|
||||||
ARCH?=amd64
|
ARCH?=amd64
|
||||||
CACHEBUST?=1
|
CACHEBUST?=1
|
||||||
|
|
||||||
BASEIMAGE=gcr.io/google-containers/debian-base-$(ARCH):0.3
|
BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):0.3
|
||||||
CNI_VERSION=v0.6.0
|
CNI_VERSION=v0.6.0
|
||||||
|
|
||||||
TEMP_DIR:=$(shell mktemp -d)
|
TEMP_DIR:=$(shell mktemp -d)
|
||||||
|
@ -57,4 +57,4 @@ endif
|
||||||
rm -rf $(TEMP_DIR)
|
rm -rf $(TEMP_DIR)
|
||||||
|
|
||||||
push: build
|
push: build
|
||||||
gcloud docker -- push $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG)
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
### debian-hyperkube-base
|
### debian-hyperkube-base
|
||||||
|
|
||||||
Serves as the base image for `gcr.io/google-containers/hyperkube-${ARCH}`
|
Serves as the base image for `k8s.gcr.io/hyperkube-${ARCH}`
|
||||||
images.
|
images.
|
||||||
|
|
||||||
This image is compiled for multiple architectures.
|
This image is compiled for multiple architectures.
|
||||||
|
@ -12,19 +12,19 @@ If you're editing the Dockerfile or some other thing, please bump the `TAG` in t
|
||||||
```console
|
```console
|
||||||
# Build for linux/amd64 (default)
|
# Build for linux/amd64 (default)
|
||||||
$ make push ARCH=amd64
|
$ make push ARCH=amd64
|
||||||
# ---> gcr.io/google-containers/debian-hyperkube-base-amd64:TAG
|
# ---> k8s.gcr.io/debian-hyperkube-base-amd64:TAG
|
||||||
|
|
||||||
$ make push ARCH=arm
|
$ make push ARCH=arm
|
||||||
# ---> gcr.io/google-containers/debian-hyperkube-base-arm:TAG
|
# ---> k8s.gcr.io/debian-hyperkube-base-arm:TAG
|
||||||
|
|
||||||
$ make push ARCH=arm64
|
$ make push ARCH=arm64
|
||||||
# ---> gcr.io/google-containers/debian-hyperkube-base-arm64:TAG
|
# ---> k8s.gcr.io/debian-hyperkube-base-arm64:TAG
|
||||||
|
|
||||||
$ make push ARCH=ppc64le
|
$ make push ARCH=ppc64le
|
||||||
# ---> gcr.io/google-containers/debian-hyperkube-base-ppc64le:TAG
|
# ---> k8s.gcr.io/debian-hyperkube-base-ppc64le:TAG
|
||||||
|
|
||||||
$ make push ARCH=s390x
|
$ make push ARCH=s390x
|
||||||
# ---> gcr.io/google-containers/debian-hyperkube-base-s390x:TAG
|
# ---> k8s.gcr.io/debian-hyperkube-base-s390x:TAG
|
||||||
```
|
```
|
||||||
|
|
||||||
If you don't want to push the images, run `make build` instead
|
If you don't want to push the images, run `make build` instead
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
|
|
||||||
.PHONY: build push
|
.PHONY: build push
|
||||||
|
|
||||||
REGISTRY?="gcr.io/google-containers"
|
REGISTRY?="k8s.gcr.io"
|
||||||
IMAGE=debian-iptables
|
IMAGE=debian-iptables
|
||||||
TAG=v10
|
TAG=v10
|
||||||
ARCH?=amd64
|
ARCH?=amd64
|
||||||
|
@ -34,7 +34,7 @@ ifeq ($(ARCH),s390x)
|
||||||
QEMUARCH=s390x
|
QEMUARCH=s390x
|
||||||
endif
|
endif
|
||||||
|
|
||||||
BASEIMAGE=gcr.io/google-containers/debian-base-$(ARCH):0.3
|
BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):0.3
|
||||||
|
|
||||||
build:
|
build:
|
||||||
cp ./* $(TEMP_DIR)
|
cp ./* $(TEMP_DIR)
|
||||||
|
@ -55,6 +55,6 @@ endif
|
||||||
docker build --pull -t $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG) $(TEMP_DIR)
|
docker build --pull -t $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG) $(TEMP_DIR)
|
||||||
|
|
||||||
push: build
|
push: build
|
||||||
gcloud docker -- push $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(REGISTRY)/$(IMAGE)-$(ARCH):$(TAG)
|
||||||
|
|
||||||
all: push
|
all: push
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
### debian-iptables
|
### debian-iptables
|
||||||
|
|
||||||
Serves as the base image for `gcr.io/google_containers/kube-proxy-${ARCH}` and multiarch (not `amd64`) `gcr.io/google_containers/flannel-${ARCH}` images.
|
Serves as the base image for `k8s.gcr.io/kube-proxy-${ARCH}` and multiarch (not `amd64`) `k8s.gcr.io/flannel-${ARCH}` images.
|
||||||
|
|
||||||
This image is compiled for multiple architectures.
|
This image is compiled for multiple architectures.
|
||||||
|
|
||||||
|
@ -11,19 +11,19 @@ If you're editing the Dockerfile or some other thing, please bump the `TAG` in t
|
||||||
```console
|
```console
|
||||||
# Build for linux/amd64 (default)
|
# Build for linux/amd64 (default)
|
||||||
$ make push ARCH=amd64
|
$ make push ARCH=amd64
|
||||||
# ---> gcr.io/google_containers/debian-iptables-amd64:TAG
|
# ---> k8s.gcr.io/debian-iptables-amd64:TAG
|
||||||
|
|
||||||
$ make push ARCH=arm
|
$ make push ARCH=arm
|
||||||
# ---> gcr.io/google_containers/debian-iptables-arm:TAG
|
# ---> k8s.gcr.io/debian-iptables-arm:TAG
|
||||||
|
|
||||||
$ make push ARCH=arm64
|
$ make push ARCH=arm64
|
||||||
# ---> gcr.io/google_containers/debian-iptables-arm64:TAG
|
# ---> k8s.gcr.io/debian-iptables-arm64:TAG
|
||||||
|
|
||||||
$ make push ARCH=ppc64le
|
$ make push ARCH=ppc64le
|
||||||
# ---> gcr.io/google_containers/debian-iptables-ppc64le:TAG
|
# ---> k8s.gcr.io/debian-iptables-ppc64le:TAG
|
||||||
|
|
||||||
$ make push ARCH=s390x
|
$ make push ARCH=s390x
|
||||||
# ---> gcr.io/google_containers/debian-iptables-s390x:TAG
|
# ---> k8s.gcr.io/debian-iptables-s390x:TAG
|
||||||
```
|
```
|
||||||
|
|
||||||
If you don't want to push the images, run `make` or `make build` instead
|
If you don't want to push the images, run `make` or `make build` instead
|
||||||
|
|
|
@ -285,7 +285,11 @@ function kube::release::create_docker_images_for_server() {
|
||||||
local images_dir="${RELEASE_IMAGES}/${arch}"
|
local images_dir="${RELEASE_IMAGES}/${arch}"
|
||||||
mkdir -p "${images_dir}"
|
mkdir -p "${images_dir}"
|
||||||
|
|
||||||
local -r docker_registry="gcr.io/google_containers"
|
local -r docker_registry="k8s.gcr.io"
|
||||||
|
# TODO(thockin): Remove all traces of this after 1.10 release.
|
||||||
|
# The following is the old non-indirected registry name. To ease the
|
||||||
|
# transition to the new name (above), we are double-tagging saved images.
|
||||||
|
local -r deprecated_registry="gcr.io/google_containers"
|
||||||
# Docker tags cannot contain '+'
|
# Docker tags cannot contain '+'
|
||||||
local docker_tag="${KUBE_GIT_VERSION/+/_}"
|
local docker_tag="${KUBE_GIT_VERSION/+/_}"
|
||||||
if [[ -z "${docker_tag}" ]]; then
|
if [[ -z "${docker_tag}" ]]; then
|
||||||
|
@ -306,14 +310,17 @@ function kube::release::create_docker_images_for_server() {
|
||||||
local docker_file_path="${docker_build_path}/Dockerfile"
|
local docker_file_path="${docker_build_path}/Dockerfile"
|
||||||
local binary_file_path="${binary_dir}/${binary_name}"
|
local binary_file_path="${binary_dir}/${binary_name}"
|
||||||
local docker_image_tag="${docker_registry}"
|
local docker_image_tag="${docker_registry}"
|
||||||
|
local deprecated_image_tag="${deprecated_registry}"
|
||||||
if [[ ${arch} == "amd64" ]]; then
|
if [[ ${arch} == "amd64" ]]; then
|
||||||
# If we are building a amd64 docker image, preserve the original
|
# If we are building a amd64 docker image, preserve the original
|
||||||
# image name
|
# image name
|
||||||
docker_image_tag+="/${binary_name}:${docker_tag}"
|
docker_image_tag+="/${binary_name}:${docker_tag}"
|
||||||
|
deprecated_image_tag+="/${binary_name}:${docker_tag}"
|
||||||
else
|
else
|
||||||
# If we are building a docker image for another architecture,
|
# If we are building a docker image for another architecture,
|
||||||
# append the arch in the image tag
|
# append the arch in the image tag
|
||||||
docker_image_tag+="/${binary_name}-${arch}:${docker_tag}"
|
docker_image_tag+="/${binary_name}-${arch}:${docker_tag}"
|
||||||
|
deprecated_image_tag+="/${binary_name}-${arch}:${docker_tag}"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|
||||||
|
@ -325,7 +332,8 @@ function kube::release::create_docker_images_for_server() {
|
||||||
printf " FROM ${base_image} \n ADD ${binary_name} /usr/local/bin/${binary_name}\n" > ${docker_file_path}
|
printf " FROM ${base_image} \n ADD ${binary_name} /usr/local/bin/${binary_name}\n" > ${docker_file_path}
|
||||||
|
|
||||||
"${DOCKER[@]}" build --pull -q -t "${docker_image_tag}" ${docker_build_path} >/dev/null
|
"${DOCKER[@]}" build --pull -q -t "${docker_image_tag}" ${docker_build_path} >/dev/null
|
||||||
"${DOCKER[@]}" save "${docker_image_tag}" > "${binary_dir}/${binary_name}.tar"
|
"${DOCKER[@]}" tag "${docker_image_tag}" ${deprecated_image_tag} >/dev/null
|
||||||
|
"${DOCKER[@]}" save "${docker_image_tag}" ${deprecated_image_tag} > "${binary_dir}/${binary_name}.tar"
|
||||||
echo "${docker_tag}" > ${binary_dir}/${binary_name}.docker_tag
|
echo "${docker_tag}" > ${binary_dir}/${binary_name}.docker_tag
|
||||||
rm -rf ${docker_build_path}
|
rm -rf ${docker_build_path}
|
||||||
ln "${binary_dir}/${binary_name}.tar" "${images_dir}/"
|
ln "${binary_dir}/${binary_name}.tar" "${images_dir}/"
|
||||||
|
@ -344,6 +352,7 @@ function kube::release::create_docker_images_for_server() {
|
||||||
# not a release
|
# not a release
|
||||||
kube::log::status "Deleting docker image ${docker_image_tag}"
|
kube::log::status "Deleting docker image ${docker_image_tag}"
|
||||||
"${DOCKER[@]}" rmi ${docker_image_tag} &>/dev/null || true
|
"${DOCKER[@]}" rmi ${docker_image_tag} &>/dev/null || true
|
||||||
|
"${DOCKER[@]}" rmi ${deprecated_image_tag} &>/dev/null || true
|
||||||
fi
|
fi
|
||||||
) &
|
) &
|
||||||
done
|
done
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
|
|
||||||
.PHONY: all push push-legacy container clean orphan
|
.PHONY: all push push-legacy container clean orphan
|
||||||
|
|
||||||
REGISTRY ?= gcr.io/google_containers
|
REGISTRY ?= k8s.gcr.io
|
||||||
IMAGE = $(REGISTRY)/pause-$(ARCH)
|
IMAGE = $(REGISTRY)/pause-$(ARCH)
|
||||||
LEGACY_AMD64_IMAGE = $(REGISTRY)/pause
|
LEGACY_AMD64_IMAGE = $(REGISTRY)/pause
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ ARCH ?= amd64
|
||||||
ALL_ARCH = amd64 arm arm64 ppc64le s390x
|
ALL_ARCH = amd64 arm arm64 ppc64le s390x
|
||||||
|
|
||||||
CFLAGS = -Os -Wall -Werror -static
|
CFLAGS = -Os -Wall -Werror -static
|
||||||
KUBE_CROSS_IMAGE ?= gcr.io/google_containers/kube-cross
|
KUBE_CROSS_IMAGE ?= k8s.gcr.io/kube-cross
|
||||||
KUBE_CROSS_VERSION ?= $(shell cat ../build-image/cross/VERSION)
|
KUBE_CROSS_VERSION ?= $(shell cat ../build-image/cross/VERSION)
|
||||||
|
|
||||||
BIN = pause
|
BIN = pause
|
||||||
|
@ -87,13 +87,13 @@ endif
|
||||||
|
|
||||||
push: .push-$(ARCH)
|
push: .push-$(ARCH)
|
||||||
.push-$(ARCH): .container-$(ARCH)
|
.push-$(ARCH): .container-$(ARCH)
|
||||||
gcloud docker -- push $(IMAGE):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(IMAGE):$(TAG)
|
||||||
touch $@
|
touch $@
|
||||||
|
|
||||||
push-legacy: .push-legacy-$(ARCH)
|
push-legacy: .push-legacy-$(ARCH)
|
||||||
.push-legacy-$(ARCH): .container-$(ARCH)
|
.push-legacy-$(ARCH): .container-$(ARCH)
|
||||||
ifeq ($(ARCH),amd64)
|
ifeq ($(ARCH),amd64)
|
||||||
gcloud docker -- push $(LEGACY_AMD64_IMAGE):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(LEGACY_AMD64_IMAGE):$(TAG)
|
||||||
endif
|
endif
|
||||||
touch $@
|
touch $@
|
||||||
|
|
||||||
|
|
|
@ -81,16 +81,16 @@ http_file(
|
||||||
docker_pull(
|
docker_pull(
|
||||||
name = "debian-iptables-amd64",
|
name = "debian-iptables-amd64",
|
||||||
digest = "sha256:a3b936c0fb98a934eecd2cfb91f73658d402b29116084e778ce9ddb68e55383e",
|
digest = "sha256:a3b936c0fb98a934eecd2cfb91f73658d402b29116084e778ce9ddb68e55383e",
|
||||||
registry = "gcr.io",
|
registry = "k8s.gcr.io",
|
||||||
repository = "google-containers/debian-iptables-amd64",
|
repository = "debian-iptables-amd64",
|
||||||
tag = "v10", # ignored, but kept here for documentation
|
tag = "v10", # ignored, but kept here for documentation
|
||||||
)
|
)
|
||||||
|
|
||||||
docker_pull(
|
docker_pull(
|
||||||
name = "debian-hyperkube-base-amd64",
|
name = "debian-hyperkube-base-amd64",
|
||||||
digest = "sha256:fc1b461367730660ac5a40c1eb2d1b23221829acf8a892981c12361383b3742b",
|
digest = "sha256:fc1b461367730660ac5a40c1eb2d1b23221829acf8a892981c12361383b3742b",
|
||||||
registry = "gcr.io",
|
registry = "k8s.gcr.io",
|
||||||
repository = "google-containers/debian-hyperkube-base-amd64",
|
repository = "debian-hyperkube-base-amd64",
|
||||||
tag = "0.8", # ignored, but kept here for documentation
|
tag = "0.8", # ignored, but kept here for documentation
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -12,7 +12,7 @@
|
||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
IMAGE=gcr.io/google-containers/kube-addon-manager
|
IMAGE=k8s.gcr.io/kube-addon-manager
|
||||||
ARCH?=amd64
|
ARCH?=amd64
|
||||||
TEMP_DIR:=$(shell mktemp -d)
|
TEMP_DIR:=$(shell mktemp -d)
|
||||||
VERSION=v8.4
|
VERSION=v8.4
|
||||||
|
@ -46,12 +46,12 @@ build:
|
||||||
docker build --pull -t $(IMAGE)-$(ARCH):$(VERSION) $(TEMP_DIR)
|
docker build --pull -t $(IMAGE)-$(ARCH):$(VERSION) $(TEMP_DIR)
|
||||||
|
|
||||||
push: build
|
push: build
|
||||||
gcloud docker -- push $(IMAGE)-$(ARCH):$(VERSION)
|
gcloud docker --server=k8s.gcr.io -- push $(IMAGE)-$(ARCH):$(VERSION)
|
||||||
ifeq ($(ARCH),amd64)
|
ifeq ($(ARCH),amd64)
|
||||||
# Backward compatibility. TODO: deprecate this image tag
|
# Backward compatibility. TODO: deprecate this image tag
|
||||||
docker rmi $(IMAGE):$(VERSION) 2>/dev/null || true
|
docker rmi $(IMAGE):$(VERSION) 2>/dev/null || true
|
||||||
docker tag $(IMAGE)-$(ARCH):$(VERSION) $(IMAGE):$(VERSION)
|
docker tag $(IMAGE)-$(ARCH):$(VERSION) $(IMAGE):$(VERSION)
|
||||||
gcloud docker -- push $(IMAGE):$(VERSION)
|
gcloud docker --server=k8s.gcr.io -- push $(IMAGE):$(VERSION)
|
||||||
endif
|
endif
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
|
|
|
@ -40,20 +40,20 @@ The `addon-manager` is built for multiple architectures.
|
||||||
```console
|
```console
|
||||||
# Build for linux/amd64 (default)
|
# Build for linux/amd64 (default)
|
||||||
$ make push ARCH=amd64
|
$ make push ARCH=amd64
|
||||||
# ---> gcr.io/google-containers/kube-addon-manager-amd64:VERSION
|
# ---> k8s.gcr.io/kube-addon-manager-amd64:VERSION
|
||||||
# ---> gcr.io/google-containers/kube-addon-manager:VERSION (image with backwards-compatible naming)
|
# ---> k8s.gcr.io/kube-addon-manager:VERSION (image with backwards-compatible naming)
|
||||||
|
|
||||||
$ make push ARCH=arm
|
$ make push ARCH=arm
|
||||||
# ---> gcr.io/google-containers/kube-addon-manager-arm:VERSION
|
# ---> k8s.gcr.io/kube-addon-manager-arm:VERSION
|
||||||
|
|
||||||
$ make push ARCH=arm64
|
$ make push ARCH=arm64
|
||||||
# ---> gcr.io/google-containers/kube-addon-manager-arm64:VERSION
|
# ---> k8s.gcr.io/kube-addon-manager-arm64:VERSION
|
||||||
|
|
||||||
$ make push ARCH=ppc64le
|
$ make push ARCH=ppc64le
|
||||||
# ---> gcr.io/google-containers/kube-addon-manager-ppc64le:VERSION
|
# ---> k8s.gcr.io/kube-addon-manager-ppc64le:VERSION
|
||||||
|
|
||||||
$ make push ARCH=s390x
|
$ make push ARCH=s390x
|
||||||
# ---> gcr.io/google-containers/kube-addon-manager-s390x:VERSION
|
# ---> k8s.gcr.io/kube-addon-manager-s390x:VERSION
|
||||||
```
|
```
|
||||||
|
|
||||||
If you don't want to push the images, run `make` or `make build` instead
|
If you don't want to push the images, run `make` or `make build` instead
|
||||||
|
|
|
@ -17,7 +17,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/cpvpa-amd64:v0.6.0
|
- image: k8s.gcr.io/cpvpa-amd64:v0.6.0
|
||||||
name: autoscaler
|
name: autoscaler
|
||||||
command:
|
command:
|
||||||
- /cpvpa
|
- /cpvpa
|
||||||
|
|
|
@ -17,7 +17,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2
|
- image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2
|
||||||
name: autoscaler
|
name: autoscaler
|
||||||
command:
|
command:
|
||||||
- /cluster-proportional-autoscaler
|
- /cluster-proportional-autoscaler
|
||||||
|
|
|
@ -17,7 +17,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/cpvpa-amd64:v0.6.0
|
- image: k8s.gcr.io/cpvpa-amd64:v0.6.0
|
||||||
name: autoscaler
|
name: autoscaler
|
||||||
command:
|
command:
|
||||||
- /cpvpa
|
- /cpvpa
|
||||||
|
|
|
@ -24,7 +24,7 @@ spec:
|
||||||
# Any image is permissible as long as:
|
# Any image is permissible as long as:
|
||||||
# 1. It serves a 404 page at /
|
# 1. It serves a 404 page at /
|
||||||
# 2. It serves 200 on a /healthz endpoint
|
# 2. It serves 200 on a /healthz endpoint
|
||||||
image: gcr.io/google_containers/defaultbackend:1.3
|
image: k8s.gcr.io/defaultbackend:1.3
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /healthz
|
path: /healthz
|
||||||
|
|
|
@ -71,7 +71,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/heapster-amd64:v1.5.0
|
- image: k8s.gcr.io/heapster-amd64:v1.5.0
|
||||||
name: heapster
|
name: heapster
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -84,13 +84,13 @@ spec:
|
||||||
- /heapster
|
- /heapster
|
||||||
- --source=kubernetes.summary_api:''
|
- --source=kubernetes.summary_api:''
|
||||||
- --sink=gcm
|
- --sink=gcm
|
||||||
- image: gcr.io/google_containers/heapster-amd64:v1.5.0
|
- image: k8s.gcr.io/heapster-amd64:v1.5.0
|
||||||
name: eventer
|
name: eventer
|
||||||
command:
|
command:
|
||||||
- /eventer
|
- /eventer
|
||||||
- --source=kubernetes:''
|
- --source=kubernetes:''
|
||||||
- --sink=gcl
|
- --sink=gcl
|
||||||
- image: gcr.io/google_containers/addon-resizer:1.8.1
|
- image: k8s.gcr.io/addon-resizer:1.8.1
|
||||||
name: heapster-nanny
|
name: heapster-nanny
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
@ -123,7 +123,7 @@ spec:
|
||||||
- --container=heapster
|
- --container=heapster
|
||||||
- --poll-period=300000
|
- --poll-period=300000
|
||||||
- --estimator=exponential
|
- --estimator=exponential
|
||||||
- image: gcr.io/google_containers/addon-resizer:1.8.1
|
- image: k8s.gcr.io/addon-resizer:1.8.1
|
||||||
name: eventer-nanny
|
name: eventer-nanny
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
|
|
@ -71,8 +71,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/heapster-amd64:v1.5.0
|
- image: k8s.gcr.io/heapster-amd64:v1.5.0
|
||||||
|
|
||||||
name: heapster
|
name: heapster
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -86,13 +85,13 @@ spec:
|
||||||
- --source=kubernetes.summary_api:''
|
- --source=kubernetes.summary_api:''
|
||||||
- --sink=influxdb:http://monitoring-influxdb:8086
|
- --sink=influxdb:http://monitoring-influxdb:8086
|
||||||
- --sink=gcm:?metrics=autoscaling
|
- --sink=gcm:?metrics=autoscaling
|
||||||
- image: gcr.io/google_containers/heapster-amd64:v1.5.0
|
- image: k8s.gcr.io/heapster-amd64:v1.5.0
|
||||||
name: eventer
|
name: eventer
|
||||||
command:
|
command:
|
||||||
- /eventer
|
- /eventer
|
||||||
- --source=kubernetes:''
|
- --source=kubernetes:''
|
||||||
- --sink=gcl
|
- --sink=gcl
|
||||||
- image: gcr.io/google_containers/addon-resizer:1.8.1
|
- image: k8s.gcr.io/addon-resizer:1.8.1
|
||||||
name: heapster-nanny
|
name: heapster-nanny
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
@ -125,7 +124,7 @@ spec:
|
||||||
- --container=heapster
|
- --container=heapster
|
||||||
- --poll-period=300000
|
- --poll-period=300000
|
||||||
- --estimator=exponential
|
- --estimator=exponential
|
||||||
- image: gcr.io/google_containers/addon-resizer:1.8.1
|
- image: k8s.gcr.io/addon-resizer:1.8.1
|
||||||
name: eventer-nanny
|
name: eventer-nanny
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
|
|
@ -71,7 +71,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/heapster-amd64:v1.5.0
|
- image: k8s.gcr.io/heapster-amd64:v1.5.0
|
||||||
name: heapster
|
name: heapster
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -84,13 +84,13 @@ spec:
|
||||||
- /heapster
|
- /heapster
|
||||||
- --source=kubernetes.summary_api:''
|
- --source=kubernetes.summary_api:''
|
||||||
- --sink=influxdb:http://monitoring-influxdb:8086
|
- --sink=influxdb:http://monitoring-influxdb:8086
|
||||||
- image: gcr.io/google_containers/heapster-amd64:v1.5.0
|
- image: k8s.gcr.io/heapster-amd64:v1.5.0
|
||||||
name: eventer
|
name: eventer
|
||||||
command:
|
command:
|
||||||
- /eventer
|
- /eventer
|
||||||
- --source=kubernetes:''
|
- --source=kubernetes:''
|
||||||
- --sink=influxdb:http://monitoring-influxdb:8086
|
- --sink=influxdb:http://monitoring-influxdb:8086
|
||||||
- image: gcr.io/google_containers/addon-resizer:1.8.1
|
- image: k8s.gcr.io/addon-resizer:1.8.1
|
||||||
name: heapster-nanny
|
name: heapster-nanny
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
@ -123,7 +123,7 @@ spec:
|
||||||
- --container=heapster
|
- --container=heapster
|
||||||
- --poll-period=300000
|
- --poll-period=300000
|
||||||
- --estimator=exponential
|
- --estimator=exponential
|
||||||
- image: gcr.io/google_containers/addon-resizer:1.8.1
|
- image: k8s.gcr.io/addon-resizer:1.8.1
|
||||||
name: eventer-nanny
|
name: eventer-nanny
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
|
|
@ -29,7 +29,7 @@ spec:
|
||||||
operator: "Exists"
|
operator: "Exists"
|
||||||
containers:
|
containers:
|
||||||
- name: influxdb
|
- name: influxdb
|
||||||
image: gcr.io/google_containers/heapster-influxdb-amd64:v1.3.3
|
image: k8s.gcr.io/heapster-influxdb-amd64:v1.3.3
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
|
@ -46,7 +46,7 @@ spec:
|
||||||
- name: influxdb-persistent-storage
|
- name: influxdb-persistent-storage
|
||||||
mountPath: /data
|
mountPath: /data
|
||||||
- name: grafana
|
- name: grafana
|
||||||
image: gcr.io/google_containers/heapster-grafana-amd64:v4.4.3
|
image: k8s.gcr.io/heapster-grafana-amd64:v4.4.3
|
||||||
env:
|
env:
|
||||||
resources:
|
resources:
|
||||||
# keep request = limit to keep this container in guaranteed class
|
# keep request = limit to keep this container in guaranteed class
|
||||||
|
|
|
@ -56,7 +56,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/heapster-amd64:v1.5.0
|
- image: k8s.gcr.io/heapster-amd64:v1.5.0
|
||||||
name: heapster
|
name: heapster
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -71,7 +71,7 @@ spec:
|
||||||
- --sink=stackdriver:?cluster_name={{ cluster_name }}&use_old_resources={{ use_old_resources }}&use_new_resources={{ use_new_resources }}&min_interval_sec=100&batch_export_timeout_sec=110
|
- --sink=stackdriver:?cluster_name={{ cluster_name }}&use_old_resources={{ use_old_resources }}&use_new_resources={{ use_new_resources }}&min_interval_sec=100&batch_export_timeout_sec=110
|
||||||
# BEGIN_PROMETHEUS_TO_SD
|
# BEGIN_PROMETHEUS_TO_SD
|
||||||
- name: prom-to-sd
|
- name: prom-to-sd
|
||||||
image: gcr.io/google-containers/prometheus-to-sd:v0.2.2
|
image: k8s.gcr.io/prometheus-to-sd:v0.2.2
|
||||||
command:
|
command:
|
||||||
- /monitor
|
- /monitor
|
||||||
- --source=heapster:http://localhost:8082?whitelisted=stackdriver_requests_count,stackdriver_timeseries_count
|
- --source=heapster:http://localhost:8082?whitelisted=stackdriver_requests_count,stackdriver_timeseries_count
|
||||||
|
@ -89,7 +89,7 @@ spec:
|
||||||
fieldRef:
|
fieldRef:
|
||||||
fieldPath: metadata.namespace
|
fieldPath: metadata.namespace
|
||||||
# END_PROMETHEUS_TO_SD
|
# END_PROMETHEUS_TO_SD
|
||||||
- image: gcr.io/google_containers/addon-resizer:1.8.1
|
- image: k8s.gcr.io/addon-resizer:1.8.1
|
||||||
name: heapster-nanny
|
name: heapster-nanny
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
|
|
@ -56,7 +56,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/heapster-amd64:v1.5.0
|
- image: k8s.gcr.io/heapster-amd64:v1.5.0
|
||||||
name: heapster
|
name: heapster
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -68,7 +68,7 @@ spec:
|
||||||
command:
|
command:
|
||||||
- /heapster
|
- /heapster
|
||||||
- --source=kubernetes.summary_api:''
|
- --source=kubernetes.summary_api:''
|
||||||
- image: gcr.io/google_containers/addon-resizer:1.8.1
|
- image: k8s.gcr.io/addon-resizer:1.8.1
|
||||||
name: heapster-nanny
|
name: heapster-nanny
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
|
|
@ -29,7 +29,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: kubernetes-dashboard
|
- name: kubernetes-dashboard
|
||||||
image: gcr.io/google_containers/kubernetes-dashboard-amd64:v1.8.0
|
image: k8s.gcr.io/kubernetes-dashboard-amd64:v1.8.0
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
|
|
|
@ -77,7 +77,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: autoscaler
|
- name: autoscaler
|
||||||
image: gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2-r2
|
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
cpu: "20m"
|
cpu: "20m"
|
||||||
|
|
|
@ -94,7 +94,7 @@ spec:
|
||||||
optional: true
|
optional: true
|
||||||
containers:
|
containers:
|
||||||
- name: kubedns
|
- name: kubedns
|
||||||
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7
|
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.7
|
||||||
resources:
|
resources:
|
||||||
# TODO: Set memory limits when we've profiled the container for large
|
# TODO: Set memory limits when we've profiled the container for large
|
||||||
# clusters, then set request = limit to keep this container in
|
# clusters, then set request = limit to keep this container in
|
||||||
|
@ -145,7 +145,7 @@ spec:
|
||||||
- name: kube-dns-config
|
- name: kube-dns-config
|
||||||
mountPath: /kube-dns-config
|
mountPath: /kube-dns-config
|
||||||
- name: dnsmasq
|
- name: dnsmasq
|
||||||
image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7
|
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.7
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /healthcheck/dnsmasq
|
path: /healthcheck/dnsmasq
|
||||||
|
@ -184,7 +184,7 @@ spec:
|
||||||
- name: kube-dns-config
|
- name: kube-dns-config
|
||||||
mountPath: /etc/k8s/dns/dnsmasq-nanny
|
mountPath: /etc/k8s/dns/dnsmasq-nanny
|
||||||
- name: sidecar
|
- name: sidecar
|
||||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7
|
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.7
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /metrics
|
path: /metrics
|
||||||
|
|
|
@ -94,7 +94,7 @@ spec:
|
||||||
optional: true
|
optional: true
|
||||||
containers:
|
containers:
|
||||||
- name: kubedns
|
- name: kubedns
|
||||||
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7
|
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.7
|
||||||
resources:
|
resources:
|
||||||
# TODO: Set memory limits when we've profiled the container for large
|
# TODO: Set memory limits when we've profiled the container for large
|
||||||
# clusters, then set request = limit to keep this container in
|
# clusters, then set request = limit to keep this container in
|
||||||
|
@ -145,7 +145,7 @@ spec:
|
||||||
- name: kube-dns-config
|
- name: kube-dns-config
|
||||||
mountPath: /kube-dns-config
|
mountPath: /kube-dns-config
|
||||||
- name: dnsmasq
|
- name: dnsmasq
|
||||||
image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7
|
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.7
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /healthcheck/dnsmasq
|
path: /healthcheck/dnsmasq
|
||||||
|
@ -184,7 +184,7 @@ spec:
|
||||||
- name: kube-dns-config
|
- name: kube-dns-config
|
||||||
mountPath: /etc/k8s/dns/dnsmasq-nanny
|
mountPath: /etc/k8s/dns/dnsmasq-nanny
|
||||||
- name: sidecar
|
- name: sidecar
|
||||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7
|
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.7
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /metrics
|
path: /metrics
|
||||||
|
|
|
@ -94,7 +94,7 @@ spec:
|
||||||
optional: true
|
optional: true
|
||||||
containers:
|
containers:
|
||||||
- name: kubedns
|
- name: kubedns
|
||||||
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7
|
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.7
|
||||||
resources:
|
resources:
|
||||||
# TODO: Set memory limits when we've profiled the container for large
|
# TODO: Set memory limits when we've profiled the container for large
|
||||||
# clusters, then set request = limit to keep this container in
|
# clusters, then set request = limit to keep this container in
|
||||||
|
@ -145,7 +145,7 @@ spec:
|
||||||
- name: kube-dns-config
|
- name: kube-dns-config
|
||||||
mountPath: /kube-dns-config
|
mountPath: /kube-dns-config
|
||||||
- name: dnsmasq
|
- name: dnsmasq
|
||||||
image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7
|
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.7
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /healthcheck/dnsmasq
|
path: /healthcheck/dnsmasq
|
||||||
|
@ -184,7 +184,7 @@ spec:
|
||||||
- name: kube-dns-config
|
- name: kube-dns-config
|
||||||
mountPath: /etc/k8s/dns/dnsmasq-nanny
|
mountPath: /etc/k8s/dns/dnsmasq-nanny
|
||||||
- name: sidecar
|
- name: sidecar
|
||||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7
|
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.7
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /metrics
|
path: /metrics
|
||||||
|
|
|
@ -23,4 +23,4 @@ spec:
|
||||||
dnsPolicy: Default
|
dnsPolicy: Default
|
||||||
containers:
|
containers:
|
||||||
- name: etcd-empty-dir-cleanup
|
- name: etcd-empty-dir-cleanup
|
||||||
image: gcr.io/google-containers/etcd-empty-dir-cleanup:3.0.14.0
|
image: k8s.gcr.io/etcd-empty-dir-cleanup:3.0.14.0
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
|
|
||||||
.PHONY: binary build push
|
.PHONY: binary build push
|
||||||
|
|
||||||
PREFIX = gcr.io/google-containers
|
PREFIX = k8s.gcr.io
|
||||||
IMAGE = elasticsearch
|
IMAGE = elasticsearch
|
||||||
TAG = v5.6.4
|
TAG = v5.6.4
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ build:
|
||||||
docker build --pull -t $(PREFIX)/$(IMAGE):$(TAG) .
|
docker build --pull -t $(PREFIX)/$(IMAGE):$(TAG) .
|
||||||
|
|
||||||
push:
|
push:
|
||||||
gcloud docker -- push $(PREFIX)/$(IMAGE):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(PREFIX)/$(IMAGE):$(TAG)
|
||||||
|
|
||||||
binary:
|
binary:
|
||||||
CGO_ENABLED=0 GOOS=linux go build -a -ldflags "-w" elasticsearch_logging_discovery.go
|
CGO_ENABLED=0 GOOS=linux go build -a -ldflags "-w" elasticsearch_logging_discovery.go
|
||||||
|
|
|
@ -73,7 +73,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
serviceAccountName: elasticsearch-logging
|
serviceAccountName: elasticsearch-logging
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google-containers/elasticsearch:v5.6.4
|
- image: k8s.gcr.io/elasticsearch:v5.6.4
|
||||||
name: elasticsearch-logging
|
name: elasticsearch-logging
|
||||||
resources:
|
resources:
|
||||||
# need more cpu upon initialization, therefore burstable class
|
# need more cpu upon initialization, therefore burstable class
|
||||||
|
|
|
@ -75,7 +75,7 @@ spec:
|
||||||
serviceAccountName: fluentd-es
|
serviceAccountName: fluentd-es
|
||||||
containers:
|
containers:
|
||||||
- name: fluentd-es
|
- name: fluentd-es
|
||||||
image: gcr.io/google-containers/fluentd-elasticsearch:v2.0.2
|
image: k8s.gcr.io/fluentd-elasticsearch:v2.0.2
|
||||||
env:
|
env:
|
||||||
- name: FLUENTD_ARGS
|
- name: FLUENTD_ARGS
|
||||||
value: --no-supervisor -q
|
value: --no-supervisor -q
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
|
|
||||||
.PHONY: build push
|
.PHONY: build push
|
||||||
|
|
||||||
PREFIX = gcr.io/google-containers
|
PREFIX = k8s.gcr.io
|
||||||
IMAGE = fluentd-elasticsearch
|
IMAGE = fluentd-elasticsearch
|
||||||
TAG = v2.0.2
|
TAG = v2.0.2
|
||||||
|
|
||||||
|
@ -22,4 +22,4 @@ build:
|
||||||
docker build --pull -t $(PREFIX)/$(IMAGE):$(TAG) .
|
docker build --pull -t $(PREFIX)/$(IMAGE):$(TAG) .
|
||||||
|
|
||||||
push:
|
push:
|
||||||
gcloud docker -- push $(PREFIX)/$(IMAGE):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(PREFIX)/$(IMAGE):$(TAG)
|
||||||
|
|
|
@ -4,11 +4,11 @@ that collects Docker container log files using [Fluentd][fluentd]
|
||||||
and sends them to an instance of [Elasticsearch][elasticsearch].
|
and sends them to an instance of [Elasticsearch][elasticsearch].
|
||||||
This image is designed to be used as part of the [Kubernetes][kubernetes]
|
This image is designed to be used as part of the [Kubernetes][kubernetes]
|
||||||
cluster bring up process. The image resides at GCR under the name
|
cluster bring up process. The image resides at GCR under the name
|
||||||
[gcr.io/google-containers/fluentd-elasticsearch][image].
|
[k8s.gcr.io/fluentd-elasticsearch][image].
|
||||||
|
|
||||||
[fluentd]: http://www.fluentd.org/
|
[fluentd]: http://www.fluentd.org/
|
||||||
[elasticsearch]: https://www.elastic.co/products/elasticsearch
|
[elasticsearch]: https://www.elastic.co/products/elasticsearch
|
||||||
[kubernetes]: https://kubernetes.io
|
[kubernetes]: https://kubernetes.io
|
||||||
[image]: https://gcr.io/google-containers/fluentd-elasticsearch
|
[image]: https://k8s.gcr.io/fluentd-elasticsearch
|
||||||
|
|
||||||
[![Analytics](https://kubernetes-site.appspot.com/UA-36037335-10/GitHub/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md?pixel)]()
|
[![Analytics](https://kubernetes-site.appspot.com/UA-36037335-10/GitHub/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md?pixel)]()
|
||||||
|
|
|
@ -47,12 +47,12 @@ spec:
|
||||||
serviceAccountName: event-exporter-sa
|
serviceAccountName: event-exporter-sa
|
||||||
containers:
|
containers:
|
||||||
- name: event-exporter
|
- name: event-exporter
|
||||||
image: gcr.io/google-containers/event-exporter:v0.1.7
|
image: k8s.gcr.io/event-exporter:v0.1.7
|
||||||
command:
|
command:
|
||||||
- '/event-exporter'
|
- '/event-exporter'
|
||||||
# BEGIN_PROMETHEUS_TO_SD
|
# BEGIN_PROMETHEUS_TO_SD
|
||||||
- name: prometheus-to-sd-exporter
|
- name: prometheus-to-sd-exporter
|
||||||
image: gcr.io/google-containers/prometheus-to-sd:v0.2.2
|
image: k8s.gcr.io/prometheus-to-sd:v0.2.2
|
||||||
command:
|
command:
|
||||||
- /monitor
|
- /monitor
|
||||||
- --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons
|
- --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons
|
||||||
|
|
|
@ -27,7 +27,7 @@ spec:
|
||||||
dnsPolicy: Default
|
dnsPolicy: Default
|
||||||
containers:
|
containers:
|
||||||
- name: fluentd-gcp
|
- name: fluentd-gcp
|
||||||
image: gcr.io/google-containers/fluentd-gcp:2.0.11
|
image: k8s.gcr.io/fluentd-gcp:2.0.11
|
||||||
env:
|
env:
|
||||||
- name: FLUENTD_ARGS
|
- name: FLUENTD_ARGS
|
||||||
value: --no-supervisor -q
|
value: --no-supervisor -q
|
||||||
|
@ -82,7 +82,7 @@ spec:
|
||||||
fi;
|
fi;
|
||||||
# BEGIN_PROMETHEUS_TO_SD
|
# BEGIN_PROMETHEUS_TO_SD
|
||||||
- name: prometheus-to-sd-exporter
|
- name: prometheus-to-sd-exporter
|
||||||
image: gcr.io/google-containers/prometheus-to-sd:v0.2.2
|
image: k8s.gcr.io/prometheus-to-sd:v0.2.2
|
||||||
command:
|
command:
|
||||||
- /monitor
|
- /monitor
|
||||||
- --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons
|
- --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons
|
||||||
|
|
|
@ -28,7 +28,7 @@ spec:
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
containers:
|
containers:
|
||||||
- name: ip-masq-agent
|
- name: ip-masq-agent
|
||||||
image: gcr.io/google-containers/ip-masq-agent-amd64:v2.0.2
|
image: k8s.gcr.io/ip-masq-agent-amd64:v2.0.2
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
cpu: 10m
|
cpu: 10m
|
||||||
|
|
|
@ -38,7 +38,7 @@ spec:
|
||||||
dnsPolicy: Default
|
dnsPolicy: Default
|
||||||
containers:
|
containers:
|
||||||
- name: metadata-proxy
|
- name: metadata-proxy
|
||||||
image: gcr.io/google_containers/metadata-proxy:v0.1.6
|
image: k8s.gcr.io/metadata-proxy:v0.1.6
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: true
|
||||||
# Request and limit resources to get guaranteed QoS.
|
# Request and limit resources to get guaranteed QoS.
|
||||||
|
@ -51,7 +51,7 @@ spec:
|
||||||
cpu: "30m"
|
cpu: "30m"
|
||||||
# BEGIN_PROMETHEUS_TO_SD
|
# BEGIN_PROMETHEUS_TO_SD
|
||||||
- name: prometheus-to-sd-exporter
|
- name: prometheus-to-sd-exporter
|
||||||
image: gcr.io/google_containers/prometheus-to-sd:v0.2.2
|
image: k8s.gcr.io/prometheus-to-sd:v0.2.2
|
||||||
# Request and limit resources to get guaranteed QoS.
|
# Request and limit resources to get guaranteed QoS.
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -47,7 +47,7 @@ spec:
|
||||||
serviceAccountName: metrics-server
|
serviceAccountName: metrics-server
|
||||||
containers:
|
containers:
|
||||||
- name: metrics-server
|
- name: metrics-server
|
||||||
image: gcr.io/google_containers/metrics-server-amd64:v0.2.0
|
image: k8s.gcr.io/metrics-server-amd64:v0.2.0
|
||||||
command:
|
command:
|
||||||
- /metrics-server
|
- /metrics-server
|
||||||
- --source=kubernetes.summary_api:''
|
- --source=kubernetes.summary_api:''
|
||||||
|
@ -56,7 +56,7 @@ spec:
|
||||||
name: https
|
name: https
|
||||||
protocol: TCP
|
protocol: TCP
|
||||||
- name: metrics-server-nanny
|
- name: metrics-server-nanny
|
||||||
image: gcr.io/google_containers/addon-resizer:1.8.1
|
image: k8s.gcr.io/addon-resizer:1.8.1
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
|
|
|
@ -43,7 +43,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: node-problem-detector
|
- name: node-problem-detector
|
||||||
image: gcr.io/google_containers/node-problem-detector:v0.4.1
|
image: k8s.gcr.io/node-problem-detector:v0.4.1
|
||||||
command:
|
command:
|
||||||
- "/bin/sh"
|
- "/bin/sh"
|
||||||
- "-c"
|
- "-c"
|
||||||
|
|
|
@ -12,7 +12,7 @@
|
||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
IMAGE=gcr.io/google_containers/python
|
IMAGE=k8s.gcr.io/python
|
||||||
VERSION=v1
|
VERSION=v1
|
||||||
|
|
||||||
.PHONY: build push
|
.PHONY: build push
|
||||||
|
@ -21,5 +21,5 @@ build:
|
||||||
docker build --pull -t "$(IMAGE):$(VERSION)" .
|
docker build --pull -t "$(IMAGE):$(VERSION)" .
|
||||||
|
|
||||||
push:
|
push:
|
||||||
gcloud docker -- push "$(IMAGE):$(VERSION)"
|
gcloud docker --server=k8s.gcr.io -- push "$(IMAGE):$(VERSION)"
|
||||||
|
|
||||||
|
|
|
@ -199,7 +199,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: kube-registry-proxy
|
- name: kube-registry-proxy
|
||||||
image: gcr.io/google_containers/kube-registry-proxy:0.4
|
image: k8s.gcr.io/kube-registry-proxy:0.4
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
|
|
|
@ -15,10 +15,10 @@
|
||||||
.PHONY: build push vet test clean
|
.PHONY: build push vet test clean
|
||||||
|
|
||||||
TAG = 0.4
|
TAG = 0.4
|
||||||
REPO = gcr.io/google_containers/kube-registry-proxy
|
REPO = k8s.gcr.io/kube-registry-proxy
|
||||||
|
|
||||||
build:
|
build:
|
||||||
docker build --pull -t $(REPO):$(TAG) .
|
docker build --pull -t $(REPO):$(TAG) .
|
||||||
|
|
||||||
push:
|
push:
|
||||||
gcloud docker -- push $(REPO):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(REPO):$(TAG)
|
||||||
|
|
|
@ -478,7 +478,7 @@ function stage-images() {
|
||||||
|
|
||||||
local docker_cmd=("docker")
|
local docker_cmd=("docker")
|
||||||
|
|
||||||
if [[ "${KUBE_DOCKER_REGISTRY}" == "gcr.io/"* ]]; then
|
if [[ "${KUBE_DOCKER_REGISTRY}" =~ "gcr.io/" ]]; then
|
||||||
local docker_push_cmd=("gcloud" "docker")
|
local docker_push_cmd=("gcloud" "docker")
|
||||||
else
|
else
|
||||||
local docker_push_cmd=("${docker_cmd[@]}")
|
local docker_push_cmd=("${docker_cmd[@]}")
|
||||||
|
@ -493,7 +493,7 @@ function stage-images() {
|
||||||
(
|
(
|
||||||
"${docker_cmd[@]}" load -i "${temp_dir}/kubernetes/server/bin/${binary}.tar"
|
"${docker_cmd[@]}" load -i "${temp_dir}/kubernetes/server/bin/${binary}.tar"
|
||||||
"${docker_cmd[@]}" rmi "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}" 2>/dev/null || true
|
"${docker_cmd[@]}" rmi "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}" 2>/dev/null || true
|
||||||
"${docker_cmd[@]}" tag "gcr.io/google_containers/${binary}:${docker_tag}" "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}"
|
"${docker_cmd[@]}" tag "k8s.gcr.io/${binary}:${docker_tag}" "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}"
|
||||||
"${docker_push_cmd[@]}" push "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}"
|
"${docker_push_cmd[@]}" push "${KUBE_DOCKER_REGISTRY}/${binary}:${KUBE_IMAGE_TAG}"
|
||||||
) &> "${temp_dir}/${binary}-push.log" &
|
) &> "${temp_dir}/${binary}-push.log" &
|
||||||
done
|
done
|
||||||
|
|
|
@ -151,7 +151,7 @@ ENABLE_METRICS_SERVER="${KUBE_ENABLE_METRICS_SERVER:-true}"
|
||||||
# Useful for scheduling heapster in large clusters with nodes of small size.
|
# Useful for scheduling heapster in large clusters with nodes of small size.
|
||||||
HEAPSTER_MACHINE_TYPE="${HEAPSTER_MACHINE_TYPE:-}"
|
HEAPSTER_MACHINE_TYPE="${HEAPSTER_MACHINE_TYPE:-}"
|
||||||
|
|
||||||
# Set etcd image (e.g. gcr.io/google_containers/etcd) and version (e.g. 3.1.10) if you need
|
# Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.1.10) if you need
|
||||||
# non-default version.
|
# non-default version.
|
||||||
ETCD_IMAGE="${TEST_ETCD_IMAGE:-}"
|
ETCD_IMAGE="${TEST_ETCD_IMAGE:-}"
|
||||||
ETCD_DOCKER_REPOSITORY="${TEST_ETCD_DOCKER_REPOSITORY:-}"
|
ETCD_DOCKER_REPOSITORY="${TEST_ETCD_DOCKER_REPOSITORY:-}"
|
||||||
|
|
|
@ -671,7 +671,7 @@ function prepare-kube-proxy-manifest-variables {
|
||||||
remove-salt-config-comments "${src_file}"
|
remove-salt-config-comments "${src_file}"
|
||||||
|
|
||||||
local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig"
|
local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig"
|
||||||
local kube_docker_registry="gcr.io/google_containers"
|
local kube_docker_registry="k8s.gcr.io"
|
||||||
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
|
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
|
||||||
kube_docker_registry=${KUBE_DOCKER_REGISTRY}
|
kube_docker_registry=${KUBE_DOCKER_REGISTRY}
|
||||||
fi
|
fi
|
||||||
|
@ -853,7 +853,7 @@ function compute-master-manifest-variables {
|
||||||
CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}},"
|
CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}},"
|
||||||
CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
|
CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
|
||||||
fi
|
fi
|
||||||
DOCKER_REGISTRY="gcr.io/google_containers"
|
DOCKER_REGISTRY="k8s.gcr.io"
|
||||||
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
|
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
|
||||||
DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}"
|
DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}"
|
||||||
fi
|
fi
|
||||||
|
|
|
@ -140,12 +140,12 @@ function install-kube-binary-config {
|
||||||
echo "Downloading k8s manifests tar"
|
echo "Downloading k8s manifests tar"
|
||||||
download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}"
|
download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}"
|
||||||
tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite
|
tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite
|
||||||
local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-gcr.io/google_containers}"
|
local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-k8s.gcr.io}"
|
||||||
if [[ "${kube_addon_registry}" != "gcr.io/google_containers" ]]; then
|
if [[ "${kube_addon_registry}" != "k8s.gcr.io" ]]; then
|
||||||
find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \
|
find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \
|
||||||
xargs sed -ri "s@(image:\s.*)gcr.io/google_containers@\1${kube_addon_registry}@"
|
xargs sed -ri "s@(image:\s.*)k8s.gcr.io@\1${kube_addon_registry}@"
|
||||||
find "${dst_dir}" -name \*.manifest -or -name \*.json | \
|
find "${dst_dir}" -name \*.manifest -or -name \*.json | \
|
||||||
xargs sed -ri "s@(image\":\s+\")gcr.io/google_containers@\1${kube_addon_registry}@"
|
xargs sed -ri "s@(image\":\s+\")k8s.gcr.io@\1${kube_addon_registry}@"
|
||||||
fi
|
fi
|
||||||
cp "${dst_dir}/kubernetes/gci-trusty/container-linux-configure-helper.sh" "${KUBE_HOME}/bin/configure-helper.sh"
|
cp "${dst_dir}/kubernetes/gci-trusty/container-linux-configure-helper.sh" "${KUBE_HOME}/bin/configure-helper.sh"
|
||||||
chmod -R 755 "${kube_bin}"
|
chmod -R 755 "${kube_bin}"
|
||||||
|
|
|
@ -1274,7 +1274,7 @@ function prepare-kube-proxy-manifest-variables {
|
||||||
remove-salt-config-comments "${src_file}"
|
remove-salt-config-comments "${src_file}"
|
||||||
|
|
||||||
local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig"
|
local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig"
|
||||||
local kube_docker_registry="gcr.io/google_containers"
|
local kube_docker_registry="k8s.gcr.io"
|
||||||
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
|
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
|
||||||
kube_docker_registry=${KUBE_DOCKER_REGISTRY}
|
kube_docker_registry=${KUBE_DOCKER_REGISTRY}
|
||||||
fi
|
fi
|
||||||
|
@ -1446,7 +1446,7 @@ function compute-master-manifest-variables {
|
||||||
CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}},"
|
CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}},"
|
||||||
CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
|
CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
|
||||||
fi
|
fi
|
||||||
DOCKER_REGISTRY="gcr.io/google_containers"
|
DOCKER_REGISTRY="k8s.gcr.io"
|
||||||
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
|
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
|
||||||
DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}"
|
DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}"
|
||||||
fi
|
fi
|
||||||
|
@ -2325,7 +2325,7 @@ spec:
|
||||||
- name: vol
|
- name: vol
|
||||||
containers:
|
containers:
|
||||||
- name: pv-recycler
|
- name: pv-recycler
|
||||||
image: gcr.io/google_containers/busybox:1.27
|
image: k8s.gcr.io/busybox:1.27
|
||||||
command:
|
command:
|
||||||
- /bin/sh
|
- /bin/sh
|
||||||
args:
|
args:
|
||||||
|
|
|
@ -221,12 +221,12 @@ function install-kube-manifests {
|
||||||
echo "Downloading k8s manifests tar"
|
echo "Downloading k8s manifests tar"
|
||||||
download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}"
|
download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}"
|
||||||
tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite
|
tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite
|
||||||
local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-gcr.io/google_containers}"
|
local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-k8s.gcr.io}"
|
||||||
if [[ "${kube_addon_registry}" != "gcr.io/google_containers" ]]; then
|
if [[ "${kube_addon_registry}" != "k8s.gcr.io" ]]; then
|
||||||
find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \
|
find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \
|
||||||
xargs sed -ri "s@(image:\s.*)gcr.io/google_containers@\1${kube_addon_registry}@"
|
xargs sed -ri "s@(image:\s.*)k8s.gcr.io@\1${kube_addon_registry}@"
|
||||||
find "${dst_dir}" -name \*.manifest -or -name \*.json | \
|
find "${dst_dir}" -name \*.manifest -or -name \*.json | \
|
||||||
xargs sed -ri "s@(image\":\s+\")gcr.io/google_containers@\1${kube_addon_registry}@"
|
xargs sed -ri "s@(image\":\s+\")k8s.gcr.io@\1${kube_addon_registry}@"
|
||||||
fi
|
fi
|
||||||
cp "${dst_dir}/kubernetes/gci-trusty/gci-configure-helper.sh" "${KUBE_BIN}/configure-helper.sh"
|
cp "${dst_dir}/kubernetes/gci-trusty/gci-configure-helper.sh" "${KUBE_BIN}/configure-helper.sh"
|
||||||
cp "${dst_dir}/kubernetes/gci-trusty/health-monitor.sh" "${KUBE_BIN}/health-monitor.sh"
|
cp "${dst_dir}/kubernetes/gci-trusty/health-monitor.sh" "${KUBE_BIN}/health-monitor.sh"
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
TAG=v2
|
TAG=v2
|
||||||
REGISTRY=gcr.io/google_containers
|
REGISTRY=k8s.gcr.io
|
||||||
IMAGE=gci-mounter
|
IMAGE=gci-mounter
|
||||||
|
|
||||||
all: container
|
all: container
|
||||||
|
@ -22,7 +22,7 @@ container:
|
||||||
docker build --pull -t ${REGISTRY}/${IMAGE}:${TAG} .
|
docker build --pull -t ${REGISTRY}/${IMAGE}:${TAG} .
|
||||||
|
|
||||||
push:
|
push:
|
||||||
gcloud docker -- push ${REGISTRY}/${IMAGE}:${TAG}
|
gcloud docker --server=k8s.gcr.io -- push ${REGISTRY}/${IMAGE}:${TAG}
|
||||||
|
|
||||||
upload:
|
upload:
|
||||||
./stage-upload.sh ${TAG} ${REGISTRY}/${IMAGE}:${TAG}
|
./stage-upload.sh ${TAG} ${REGISTRY}/${IMAGE}:${TAG}
|
||||||
|
|
|
@ -236,12 +236,12 @@ function set-preferred-region() {
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# If we're using regional GCR, and we're outside the US, go to the
|
# If we're using regional GCR, and we're outside the US, go to the
|
||||||
# regional registry. The gcr.io/google_containers registry is
|
# regional registry. The k8s.gcr.io registry is
|
||||||
# appropriate for US (for now).
|
# appropriate for US (for now).
|
||||||
if [[ "${REGIONAL_KUBE_ADDONS}" == "true" ]] && [[ "${preferred}" != "us" ]]; then
|
if [[ "${REGIONAL_KUBE_ADDONS}" == "true" ]] && [[ "${preferred}" != "us" ]]; then
|
||||||
KUBE_ADDON_REGISTRY="${preferred}.gcr.io/google_containers"
|
KUBE_ADDON_REGISTRY="${preferred}.k8s.gcr.io"
|
||||||
else
|
else
|
||||||
KUBE_ADDON_REGISTRY="gcr.io/google_containers"
|
KUBE_ADDON_REGISTRY="k8s.gcr.io"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [[ "${ENABLE_DOCKER_REGISTRY_CACHE:-}" == "true" ]]; then
|
if [[ "${ENABLE_DOCKER_REGISTRY_CACHE:-}" == "true" ]]; then
|
||||||
|
|
|
@ -97,7 +97,7 @@ function create_cluster {
|
||||||
--pid=host \
|
--pid=host \
|
||||||
--privileged=true \
|
--privileged=true \
|
||||||
-d \
|
-d \
|
||||||
gcr.io/google_containers/hyperkube-${arch}:${release} \
|
k8s.gcr.io/hyperkube-${arch}:${release} \
|
||||||
/hyperkube kubelet \
|
/hyperkube kubelet \
|
||||||
--containerized \
|
--containerized \
|
||||||
--hostname-override="127.0.0.1" \
|
--hostname-override="127.0.0.1" \
|
||||||
|
|
|
@ -15,7 +15,7 @@
|
||||||
.PHONY: build push
|
.PHONY: build push
|
||||||
|
|
||||||
ETCD_VERSION = 3.0.14
|
ETCD_VERSION = 3.0.14
|
||||||
IMAGE = gcr.io/google-containers/etcd-empty-dir-cleanup
|
IMAGE = k8s.gcr.io/etcd-empty-dir-cleanup
|
||||||
TAG = 3.0.14.0
|
TAG = 3.0.14.0
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
|
@ -29,4 +29,4 @@ build: clean
|
||||||
rm -rf etcdctl etcd-v$(ETCD_VERSION)-linux-amd64 etcd-v$(ETCD_VERSION)-linux-amd64.tar.gz
|
rm -rf etcdctl etcd-v$(ETCD_VERSION)-linux-amd64 etcd-v$(ETCD_VERSION)-linux-amd64.tar.gz
|
||||||
|
|
||||||
push: build
|
push: build
|
||||||
gcloud docker -- push $(IMAGE):$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(IMAGE):$(TAG)
|
||||||
|
|
|
@ -15,11 +15,11 @@
|
||||||
# Build the etcd-version-monitor image
|
# Build the etcd-version-monitor image
|
||||||
#
|
#
|
||||||
# Usage:
|
# Usage:
|
||||||
# [GOLANG_VERSION=1.8.3] [REGISTRY=gcr.io/google-containers] [TAG=test] make (build|push)
|
# [GOLANG_VERSION=1.8.3] [REGISTRY=k8s.gcr.io] [TAG=test] make (build|push)
|
||||||
# TODO(shyamjvs): Support architectures other than amd64 if needed.
|
# TODO(shyamjvs): Support architectures other than amd64 if needed.
|
||||||
ARCH:=amd64
|
ARCH:=amd64
|
||||||
GOLANG_VERSION?=1.8.3
|
GOLANG_VERSION?=1.8.3
|
||||||
REGISTRY?=gcr.io/google-containers
|
REGISTRY?=k8s.gcr.io
|
||||||
TAG?=0.1.1
|
TAG?=0.1.1
|
||||||
IMAGE:=$(REGISTRY)/etcd-version-monitor:$(TAG)
|
IMAGE:=$(REGISTRY)/etcd-version-monitor:$(TAG)
|
||||||
CURRENT_DIR:=$(pwd)
|
CURRENT_DIR:=$(pwd)
|
||||||
|
@ -30,13 +30,17 @@ build:
|
||||||
cp etcd-version-monitor.go Dockerfile $(TEMP_DIR)
|
cp etcd-version-monitor.go Dockerfile $(TEMP_DIR)
|
||||||
|
|
||||||
# Compile etcd-version-monitor.
|
# Compile etcd-version-monitor.
|
||||||
docker run -it -v $(shell pwd)/../../../:/go/src/k8s.io/kubernetes -v $(TEMP_DIR):/build -e GOARCH=$(ARCH) golang:$(GOLANG_VERSION) \
|
docker run -it \
|
||||||
/bin/bash -c "CGO_ENABLED=0 go build -o /build/etcd-version-monitor k8s.io/kubernetes/cluster/images/etcd-version-monitor"
|
-v $(shell pwd)/../../../:/go/src/k8s.io/kubernetes \
|
||||||
|
-v $(TEMP_DIR):/build \
|
||||||
|
-e GOARCH=$(ARCH) \
|
||||||
|
golang:$(GOLANG_VERSION) \
|
||||||
|
/bin/bash -c "CGO_ENABLED=0 go build -o /build/etcd-version-monitor k8s.io/kubernetes/cluster/images/etcd-version-monitor"
|
||||||
|
|
||||||
docker build -t $(IMAGE) $(TEMP_DIR)
|
docker build -t $(IMAGE) $(TEMP_DIR)
|
||||||
|
|
||||||
push: build
|
push: build
|
||||||
gcloud docker -- push $(IMAGE)
|
gcloud docker --server=k8s.gcr.io -- push $(IMAGE)
|
||||||
|
|
||||||
all: build
|
all: build
|
||||||
|
|
||||||
|
|
|
@ -18,7 +18,7 @@ latency metrics (`etcd_grpc_unary_requests_duration_seconds`) to be exposed.
|
||||||
|
|
||||||
To run this tool as a docker container:
|
To run this tool as a docker container:
|
||||||
- make build
|
- make build
|
||||||
- docker run --net=host -i -t gcr.io/google_containers/etcd-version-monitor:test /etcd-version-monitor --logtostderr
|
- docker run --net=host -i -t k8s.gcr.io/etcd-version-monitor:test /etcd-version-monitor --logtostderr
|
||||||
|
|
||||||
To run this as a pod on the kubernetes cluster:
|
To run this as a pod on the kubernetes cluster:
|
||||||
- Place the 'etcd-version-monitor.yaml' in the manifests directory of
|
- Place the 'etcd-version-monitor.yaml' in the manifests directory of
|
||||||
|
|
|
@ -7,7 +7,7 @@ spec:
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
containers:
|
containers:
|
||||||
- name: etcd-version-monitor
|
- name: etcd-version-monitor
|
||||||
image: gcr.io/google-containers/etcd-version-monitor:0.1.0
|
image: k8s.gcr.io/etcd-version-monitor:0.1.0
|
||||||
command:
|
command:
|
||||||
- /etcd-version-monitor
|
- /etcd-version-monitor
|
||||||
- --logtostderr
|
- --logtostderr
|
||||||
|
|
|
@ -15,7 +15,7 @@
|
||||||
# Build the etcd image
|
# Build the etcd image
|
||||||
#
|
#
|
||||||
# Usage:
|
# Usage:
|
||||||
# [TAGS=2.2.1 2.3.7 3.0.17 3.1.10] [REGISTRY=gcr.io/google_containers] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push)
|
# [TAGS=2.2.1 2.3.7 3.0.17 3.1.10] [REGISTRY=k8s.gcr.io] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push)
|
||||||
|
|
||||||
# The image contains different etcd versions to simplify
|
# The image contains different etcd versions to simplify
|
||||||
# upgrades. Thus be careful when removing any tag from here.
|
# upgrades. Thus be careful when removing any tag from here.
|
||||||
|
@ -29,7 +29,7 @@
|
||||||
TAGS?=2.2.1 2.3.7 3.0.17 3.1.10
|
TAGS?=2.2.1 2.3.7 3.0.17 3.1.10
|
||||||
REGISTRY_TAG?=3.1.10
|
REGISTRY_TAG?=3.1.10
|
||||||
ARCH?=amd64
|
ARCH?=amd64
|
||||||
REGISTRY?=gcr.io/google_containers
|
REGISTRY?=k8s.gcr.io
|
||||||
GOLANG_VERSION?=1.7.6
|
GOLANG_VERSION?=1.7.6
|
||||||
GOARM=7
|
GOARM=7
|
||||||
TEMP_DIR:=$(shell mktemp -d)
|
TEMP_DIR:=$(shell mktemp -d)
|
||||||
|
@ -105,12 +105,12 @@ endif
|
||||||
docker build --pull -t $(REGISTRY)/etcd-$(ARCH):$(REGISTRY_TAG) $(TEMP_DIR)
|
docker build --pull -t $(REGISTRY)/etcd-$(ARCH):$(REGISTRY_TAG) $(TEMP_DIR)
|
||||||
|
|
||||||
push: build
|
push: build
|
||||||
gcloud docker -- push $(REGISTRY)/etcd-$(ARCH):$(REGISTRY_TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(REGISTRY)/etcd-$(ARCH):$(REGISTRY_TAG)
|
||||||
|
|
||||||
ifeq ($(ARCH),amd64)
|
ifeq ($(ARCH),amd64)
|
||||||
# Backward compatibility. TODO: deprecate this image tag
|
# Backward compatibility. TODO: deprecate this image tag
|
||||||
docker tag $(REGISTRY)/etcd-$(ARCH):$(REGISTRY_TAG) $(REGISTRY)/etcd:$(REGISTRY_TAG)
|
docker tag $(REGISTRY)/etcd-$(ARCH):$(REGISTRY_TAG) $(REGISTRY)/etcd:$(REGISTRY_TAG)
|
||||||
gcloud docker -- push $(REGISTRY)/etcd:$(REGISTRY_TAG)
|
gcloud docker --server=k8s.gcr.io -- push $(REGISTRY)/etcd:$(REGISTRY_TAG)
|
||||||
endif
|
endif
|
||||||
|
|
||||||
all: build
|
all: build
|
||||||
|
|
|
@ -10,20 +10,20 @@ For other architectures, `etcd` is cross-compiled from source. Arch-specific `bu
|
||||||
```console
|
```console
|
||||||
# Build for linux/amd64 (default)
|
# Build for linux/amd64 (default)
|
||||||
$ make push ARCH=amd64
|
$ make push ARCH=amd64
|
||||||
# ---> gcr.io/google_containers/etcd-amd64:TAG
|
# ---> k8s.gcr.io/etcd-amd64:TAG
|
||||||
# ---> gcr.io/google_containers/etcd:TAG
|
# ---> k8s.gcr.io/etcd:TAG
|
||||||
|
|
||||||
$ make push ARCH=arm
|
$ make push ARCH=arm
|
||||||
# ---> gcr.io/google_containers/etcd-arm:TAG
|
# ---> k8s.gcr.io/etcd-arm:TAG
|
||||||
|
|
||||||
$ make push ARCH=arm64
|
$ make push ARCH=arm64
|
||||||
# ---> gcr.io/google_containers/etcd-arm64:TAG
|
# ---> k8s.gcr.io/etcd-arm64:TAG
|
||||||
|
|
||||||
$ make push ARCH=ppc64le
|
$ make push ARCH=ppc64le
|
||||||
# ---> gcr.io/google_containers/etcd-ppc64le:TAG
|
# ---> k8s.gcr.io/etcd-ppc64le:TAG
|
||||||
|
|
||||||
$ make push ARCH=s390x
|
$ make push ARCH=s390x
|
||||||
# ---> gcr.io/google_containers/etcd-s390x:TAG
|
# ---> k8s.gcr.io/etcd-s390x:TAG
|
||||||
```
|
```
|
||||||
|
|
||||||
If you don't want to push the images, run `make` or `make build` instead
|
If you don't want to push the images, run `make` or `make build` instead
|
||||||
|
|
|
@ -27,7 +27,7 @@ docker_build(
|
||||||
|
|
||||||
docker_bundle(
|
docker_bundle(
|
||||||
name = "hyperkube",
|
name = "hyperkube",
|
||||||
images = {"gcr.io/google-containers/hyperkube-amd64:{STABLE_DOCKER_TAG}": "hyperkube-internal"},
|
images = {"k8s.gcr.io/hyperkube-amd64:{STABLE_DOCKER_TAG}": "hyperkube-internal"},
|
||||||
stamp = True,
|
stamp = True,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -16,7 +16,7 @@ FROM BASEIMAGE
|
||||||
|
|
||||||
# Create symlinks for each hyperkube server
|
# Create symlinks for each hyperkube server
|
||||||
# Also create symlinks to /usr/local/bin/ where the server image binaries live, so the hyperkube image may be
|
# Also create symlinks to /usr/local/bin/ where the server image binaries live, so the hyperkube image may be
|
||||||
# used instead of gcr.io/google_containers/kube-* without any modifications.
|
# used instead of k8s.gcr.io/kube-* without any modifications.
|
||||||
# TODO: replace manual symlink creation with --make-symlink command once
|
# TODO: replace manual symlink creation with --make-symlink command once
|
||||||
# cross-building with qemu supports go binaries. See #28702
|
# cross-building with qemu supports go binaries. See #28702
|
||||||
# RUN /hyperkube --make-symlinks
|
# RUN /hyperkube --make-symlinks
|
||||||
|
|
|
@ -15,13 +15,13 @@
|
||||||
# Build the hyperkube image.
|
# Build the hyperkube image.
|
||||||
#
|
#
|
||||||
# Usage:
|
# Usage:
|
||||||
# [ARCH=amd64] [REGISTRY="gcr.io/google-containers"] make (build|push) VERSION={some_released_version_of_kubernetes}
|
# [ARCH=amd64] [REGISTRY="k8s.gcr.io"] make (build|push) VERSION={some_released_version_of_kubernetes}
|
||||||
|
|
||||||
REGISTRY?=gcr.io/google-containers
|
REGISTRY?=k8s.gcr.io
|
||||||
ARCH?=amd64
|
ARCH?=amd64
|
||||||
HYPERKUBE_BIN?=_output/dockerized/bin/linux/$(ARCH)/hyperkube
|
HYPERKUBE_BIN?=_output/dockerized/bin/linux/$(ARCH)/hyperkube
|
||||||
|
|
||||||
BASEIMAGE=gcr.io/google-containers/debian-hyperkube-base-$(ARCH):0.8
|
BASEIMAGE=k8s.gcr.io/debian-hyperkube-base-$(ARCH):0.8
|
||||||
TEMP_DIR:=$(shell mktemp -d -t hyperkubeXXXXXX)
|
TEMP_DIR:=$(shell mktemp -d -t hyperkubeXXXXXX)
|
||||||
|
|
||||||
all: build
|
all: build
|
||||||
|
@ -44,11 +44,11 @@ endif
|
||||||
rm -rf "${TEMP_DIR}"
|
rm -rf "${TEMP_DIR}"
|
||||||
|
|
||||||
push: build
|
push: build
|
||||||
gcloud docker -- push ${REGISTRY}/hyperkube-${ARCH}:${VERSION}
|
gcloud docker --server=k8s.gcr.io -- push ${REGISTRY}/hyperkube-${ARCH}:${VERSION}
|
||||||
ifeq ($(ARCH),amd64)
|
ifeq ($(ARCH),amd64)
|
||||||
docker rmi ${REGISTRY}/hyperkube:${VERSION} 2>/dev/null || true
|
docker rmi ${REGISTRY}/hyperkube:${VERSION} 2>/dev/null || true
|
||||||
docker tag ${REGISTRY}/hyperkube-${ARCH}:${VERSION} ${REGISTRY}/hyperkube:${VERSION}
|
docker tag ${REGISTRY}/hyperkube-${ARCH}:${VERSION} ${REGISTRY}/hyperkube:${VERSION}
|
||||||
gcloud docker -- push ${REGISTRY}/hyperkube:${VERSION}
|
gcloud docker --server=k8s.gcr.io -- push ${REGISTRY}/hyperkube:${VERSION}
|
||||||
endif
|
endif
|
||||||
|
|
||||||
.PHONY: build push all
|
.PHONY: build push all
|
||||||
|
|
|
@ -10,23 +10,23 @@
|
||||||
$ build/run.sh make cross
|
$ build/run.sh make cross
|
||||||
|
|
||||||
# Build for linux/amd64 (default)
|
# Build for linux/amd64 (default)
|
||||||
# export REGISTRY=$HOST/$ORG to switch from gcr.io/google_containers
|
# export REGISTRY=$HOST/$ORG to switch from k8s.gcr.io
|
||||||
|
|
||||||
$ make push VERSION={target_version} ARCH=amd64
|
$ make push VERSION={target_version} ARCH=amd64
|
||||||
# ---> gcr.io/google_containers/hyperkube-amd64:VERSION
|
# ---> k8s.gcr.io/hyperkube-amd64:VERSION
|
||||||
# ---> gcr.io/google_containers/hyperkube:VERSION (image with backwards-compatible naming)
|
# ---> k8s.gcr.io/hyperkube:VERSION (image with backwards-compatible naming)
|
||||||
|
|
||||||
$ make push VERSION={target_version} ARCH=arm
|
$ make push VERSION={target_version} ARCH=arm
|
||||||
# ---> gcr.io/google_containers/hyperkube-arm:VERSION
|
# ---> k8s.gcr.io/hyperkube-arm:VERSION
|
||||||
|
|
||||||
$ make push VERSION={target_version} ARCH=arm64
|
$ make push VERSION={target_version} ARCH=arm64
|
||||||
# ---> gcr.io/google_containers/hyperkube-arm64:VERSION
|
# ---> k8s.gcr.io/hyperkube-arm64:VERSION
|
||||||
|
|
||||||
$ make push VERSION={target_version} ARCH=ppc64le
|
$ make push VERSION={target_version} ARCH=ppc64le
|
||||||
# ---> gcr.io/google_containers/hyperkube-ppc64le:VERSION
|
# ---> k8s.gcr.io/hyperkube-ppc64le:VERSION
|
||||||
|
|
||||||
$ make push VERSION={target_version} ARCH=s390x
|
$ make push VERSION={target_version} ARCH=s390x
|
||||||
# ---> gcr.io/google_containers/hyperkube-s390x:VERSION
|
# ---> k8s.gcr.io/hyperkube-s390x:VERSION
|
||||||
```
|
```
|
||||||
|
|
||||||
If you don't want to push the images, run `make` or `make build` instead
|
If you don't want to push the images, run `make` or `make build` instead
|
||||||
|
|
|
@ -15,8 +15,8 @@
|
||||||
# build Kubemark image from currently built binaries containing both 'real' master and Hollow Node.
|
# build Kubemark image from currently built binaries containing both 'real' master and Hollow Node.
|
||||||
# This makefile assumes that the kubemark binary is present in this directory.
|
# This makefile assumes that the kubemark binary is present in this directory.
|
||||||
|
|
||||||
REGISTRY?=gcr.io
|
REGISTRY ?= gcr.io
|
||||||
PROJECT?=google_containers
|
PROJECT ?=
|
||||||
|
|
||||||
all: gcloudpush
|
all: gcloudpush
|
||||||
|
|
||||||
|
|
|
@ -635,10 +635,10 @@ def launch_default_ingress_controller():
|
||||||
addon_path = '/root/cdk/addons/{}'
|
addon_path = '/root/cdk/addons/{}'
|
||||||
|
|
||||||
context['defaultbackend_image'] = \
|
context['defaultbackend_image'] = \
|
||||||
"gcr.io/google_containers/defaultbackend:1.4"
|
"k8s.gcr.io/defaultbackend:1.4"
|
||||||
if arch() == 's390x':
|
if arch() == 's390x':
|
||||||
context['defaultbackend_image'] = \
|
context['defaultbackend_image'] = \
|
||||||
"gcr.io/google_containers/defaultbackend-s390x:1.4"
|
"k8s.gcr.io/defaultbackend-s390x:1.4"
|
||||||
|
|
||||||
# Render the default http backend (404) replicationcontroller manifest
|
# Render the default http backend (404) replicationcontroller manifest
|
||||||
manifest = addon_path.format('default-http-backend.yaml')
|
manifest = addon_path.format('default-http-backend.yaml')
|
||||||
|
@ -655,7 +655,7 @@ def launch_default_ingress_controller():
|
||||||
|
|
||||||
# Render the ingress replication controller manifest
|
# Render the ingress replication controller manifest
|
||||||
context['ingress_image'] = \
|
context['ingress_image'] = \
|
||||||
"gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.13"
|
"k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.13"
|
||||||
if arch() == 's390x':
|
if arch() == 's390x':
|
||||||
context['ingress_image'] = \
|
context['ingress_image'] = \
|
||||||
"docker.io/cdkbot/nginx-ingress-controller-s390x:0.9.0-beta.13"
|
"docker.io/cdkbot/nginx-ingress-controller-s390x:0.9.0-beta.13"
|
||||||
|
|
|
@ -61,7 +61,7 @@ RUNTIME_CONFIG="${KUBE_RUNTIME_CONFIG:-}"
|
||||||
TERMINATED_POD_GC_THRESHOLD=${TERMINATED_POD_GC_THRESHOLD:-100}
|
TERMINATED_POD_GC_THRESHOLD=${TERMINATED_POD_GC_THRESHOLD:-100}
|
||||||
KUBE_APISERVER_REQUEST_TIMEOUT=300
|
KUBE_APISERVER_REQUEST_TIMEOUT=300
|
||||||
|
|
||||||
# Set etcd image (e.g. gcr.io/google_containers/etcd) and version (e.g. 3.1.10) if you need
|
# Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.1.10) if you need
|
||||||
# non-default version.
|
# non-default version.
|
||||||
ETCD_IMAGE="${TEST_ETCD_IMAGE:-}"
|
ETCD_IMAGE="${TEST_ETCD_IMAGE:-}"
|
||||||
ETCD_VERSION="${TEST_ETCD_VERSION:-}"
|
ETCD_VERSION="${TEST_ETCD_VERSION:-}"
|
||||||
|
|
|
@ -36,7 +36,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: logexporter-test
|
- name: logexporter-test
|
||||||
image: gcr.io/google-containers/logexporter:v0.1.1
|
image: k8s.gcr.io/logexporter:v0.1.1
|
||||||
env:
|
env:
|
||||||
- name: NODE_NAME
|
- name: NODE_NAME
|
||||||
valueFrom:
|
valueFrom:
|
||||||
|
|
|
@ -160,7 +160,7 @@ if [ "${ETCD_API}" == "etcd2" ]; then
|
||||||
echo "Starting etcd ${ETCD_VERSION} to restore data"
|
echo "Starting etcd ${ETCD_VERSION} to restore data"
|
||||||
image=$(docker run -d -v ${BACKUP_DIR}:/var/etcd/data \
|
image=$(docker run -d -v ${BACKUP_DIR}:/var/etcd/data \
|
||||||
--net=host -p ${etcd_port}:${etcd_port} \
|
--net=host -p ${etcd_port}:${etcd_port} \
|
||||||
"gcr.io/google_containers/etcd:${ETCD_VERSION}" /bin/sh -c \
|
"k8s.gcr.io/etcd:${ETCD_VERSION}" /bin/sh -c \
|
||||||
"/usr/local/bin/etcd --data-dir /var/etcd/data --force-new-cluster")
|
"/usr/local/bin/etcd --data-dir /var/etcd/data --force-new-cluster")
|
||||||
if [ "$?" -ne "0" ]; then
|
if [ "$?" -ne "0" ]; then
|
||||||
echo "Docker container didn't started correctly"
|
echo "Docker container didn't started correctly"
|
||||||
|
@ -191,7 +191,7 @@ elif [ "${ETCD_API}" == "etcd3" ]; then
|
||||||
# Run etcdctl snapshot restore command and wait until it is finished.
|
# Run etcdctl snapshot restore command and wait until it is finished.
|
||||||
# setting with --name in the etcd manifest file and then it seems to work.
|
# setting with --name in the etcd manifest file and then it seems to work.
|
||||||
docker run -v ${BACKUP_DIR}:/var/tmp/backup --env ETCDCTL_API=3 \
|
docker run -v ${BACKUP_DIR}:/var/tmp/backup --env ETCDCTL_API=3 \
|
||||||
"gcr.io/google_containers/etcd:${ETCD_VERSION}" /bin/sh -c \
|
"k8s.gcr.io/etcd:${ETCD_VERSION}" /bin/sh -c \
|
||||||
"/usr/local/bin/etcdctl snapshot restore ${BACKUP_DIR}/${snapshot} --name ${NAME} --initial-cluster ${INITIAL_CLUSTER} --initial-advertise-peer-urls ${INITIAL_ADVERTISE_PEER_URLS}; mv /${NAME}.etcd/member /var/tmp/backup/"
|
"/usr/local/bin/etcdctl snapshot restore ${BACKUP_DIR}/${snapshot} --name ${NAME} --initial-cluster ${INITIAL_CLUSTER} --initial-advertise-peer-urls ${INITIAL_ADVERTISE_PEER_URLS}; mv /${NAME}.etcd/member /var/tmp/backup/"
|
||||||
if [ "$?" -ne "0" ]; then
|
if [ "$?" -ne "0" ]; then
|
||||||
echo "Docker container didn't started correctly"
|
echo "Docker container didn't started correctly"
|
||||||
|
|
|
@ -81,7 +81,7 @@ for docker_file in "${KUBE_DOCKER_WRAPPED_BINARIES[@]}"; do
|
||||||
done
|
done
|
||||||
|
|
||||||
cat <<EOF >>"${docker_images_sls_file}"
|
cat <<EOF >>"${docker_images_sls_file}"
|
||||||
kube_docker_registry: '$(echo ${KUBE_DOCKER_REGISTRY:-gcr.io/google_containers})'
|
kube_docker_registry: '$(echo ${KUBE_DOCKER_REGISTRY:-k8s.gcr.io})'
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
# TODO(zmerlynn): Forgive me, this is really gross. But in order to
|
# TODO(zmerlynn): Forgive me, this is really gross. But in order to
|
||||||
|
@ -89,13 +89,13 @@ EOF
|
||||||
# have to templatize a couple of the add-ons anyways, manually
|
# have to templatize a couple of the add-ons anyways, manually
|
||||||
# templatize the addon registry for regional support. When we get
|
# templatize the addon registry for regional support. When we get
|
||||||
# better templating, we can fix this.
|
# better templating, we can fix this.
|
||||||
readonly kube_addon_registry="${KUBE_ADDON_REGISTRY:-gcr.io/google_containers}"
|
readonly kube_addon_registry="${KUBE_ADDON_REGISTRY:-k8s.gcr.io}"
|
||||||
if [[ "${kube_addon_registry}" != "gcr.io/google_containers" ]]; then
|
if [[ "${kube_addon_registry}" != "k8s.gcr.io" ]]; then
|
||||||
find /srv/salt-new -name \*.yaml -or -name \*.yaml.in | \
|
find /srv/salt-new -name \*.yaml -or -name \*.yaml.in | \
|
||||||
xargs sed -ri "s@(image:\s.*)gcr.io/google_containers@\1${kube_addon_registry}@"
|
xargs sed -ri "s@(image:\s.*)k8s.gcr.io@\1${kube_addon_registry}@"
|
||||||
# All the legacy .manifest files with hardcoded gcr.io are JSON.
|
# All the legacy .manifest files with hardcoded gcr.io are JSON.
|
||||||
find /srv/salt-new -name \*.manifest -or -name \*.json | \
|
find /srv/salt-new -name \*.manifest -or -name \*.json | \
|
||||||
xargs sed -ri "s@(image\":\s+\")gcr.io/google_containers@\1${kube_addon_registry}@"
|
xargs sed -ri "s@(image\":\s+\")k8s.gcr.io@\1${kube_addon_registry}@"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
echo "+++ Swapping in new configs"
|
echo "+++ Swapping in new configs"
|
||||||
|
|
|
@ -25,15 +25,15 @@
|
||||||
"containers": [
|
"containers": [
|
||||||
{
|
{
|
||||||
"name": "cluster-autoscaler",
|
"name": "cluster-autoscaler",
|
||||||
"image": "gcr.io/google_containers/cluster-autoscaler:v1.1.0",
|
"image": "k8s.gcr.io/cluster-autoscaler:v1.1.0",
|
||||||
"livenessProbe": {
|
"livenessProbe": {
|
||||||
"httpGet": {
|
"httpGet": {
|
||||||
"path": "/health-check",
|
"path": "/health-check",
|
||||||
"port": 8085
|
"port": 8085
|
||||||
},
|
},
|
||||||
"initialDelaySeconds": 600,
|
"initialDelaySeconds": 600,
|
||||||
"periodSeconds": 60
|
"periodSeconds": 60
|
||||||
},
|
},
|
||||||
"command": [
|
"command": [
|
||||||
"./run.sh",
|
"./run.sh",
|
||||||
"--kubernetes=http://127.0.0.1:8080?inClusterConfig=f",
|
"--kubernetes=http://127.0.0.1:8080?inClusterConfig=f",
|
||||||
|
|
|
@ -14,13 +14,13 @@ spec:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
limits:
|
limits:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
image: gcr.io/google_containers/busybox:1.24
|
image: k8s.gcr.io/busybox:1.24
|
||||||
# TODO: Replace this with a go script that pulls in parallel?
|
# TODO: Replace this with a go script that pulls in parallel?
|
||||||
# Currently it takes ~5m to pull all e2e images, so this is OK, and
|
# Currently it takes ~5m to pull all e2e images, so this is OK, and
|
||||||
# fewer moving parts is always better.
|
# fewer moving parts is always better.
|
||||||
# TODO: Replace the hardcoded image list with an autogen list; the list is
|
# TODO: Replace the hardcoded image list with an autogen list; the list is
|
||||||
# currently hard-coded for static verification. It was generated via:
|
# currently hard-coded for static verification. It was generated via:
|
||||||
# grep -Iiroh "gcr.io/google_.*" "${KUBE_ROOT}/test/e2e" | \
|
# grep -Iiroh "gcr.io/.*" "${KUBE_ROOT}/test/e2e" | \
|
||||||
# sed -e "s/[,\")}]//g" | awk '{print $1}' | sort | uniq | tr '\n' ' '
|
# sed -e "s/[,\")}]//g" | awk '{print $1}' | sort | uniq | tr '\n' ' '
|
||||||
# We always want the subshell to exit 0 so this pod doesn't end up
|
# We always want the subshell to exit 0 so this pod doesn't end up
|
||||||
# blocking tests in an Error state.
|
# blocking tests in an Error state.
|
||||||
|
@ -29,52 +29,52 @@ spec:
|
||||||
- -c
|
- -c
|
||||||
- >
|
- >
|
||||||
for i in
|
for i in
|
||||||
gcr.io/google_containers/alpine-with-bash:1.0
|
k8s.gcr.io/alpine-with-bash:1.0
|
||||||
gcr.io/google_containers/apparmor-loader:0.1
|
k8s.gcr.io/apparmor-loader:0.1
|
||||||
gcr.io/google_containers/busybox:1.24
|
k8s.gcr.io/busybox:1.24
|
||||||
gcr.io/google_containers/dnsutils:e2e
|
k8s.gcr.io/dnsutils:e2e
|
||||||
gcr.io/google_containers/e2e-net-amd64:1.0
|
k8s.gcr.io/e2e-net-amd64:1.0
|
||||||
gcr.io/google_containers/echoserver:1.6
|
k8s.gcr.io/echoserver:1.6
|
||||||
gcr.io/google_containers/eptest:0.1
|
k8s.gcr.io/eptest:0.1
|
||||||
gcr.io/google_containers/fakegitserver:0.1
|
k8s.gcr.io/fakegitserver:0.1
|
||||||
gcr.io/google_containers/galera-install:0.1
|
k8s.gcr.io/galera-install:0.1
|
||||||
gcr.io/google_containers/hostexec:1.2
|
k8s.gcr.io/hostexec:1.2
|
||||||
gcr.io/google_containers/invalid-image:invalid-tag
|
k8s.gcr.io/invalid-image:invalid-tag
|
||||||
gcr.io/google_containers/iperf:e2e
|
k8s.gcr.io/iperf:e2e
|
||||||
gcr.io/google_containers/jessie-dnsutils:e2e
|
k8s.gcr.io/jessie-dnsutils:e2e
|
||||||
gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.14.5
|
k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.5
|
||||||
gcr.io/google_containers/liveness:e2e
|
k8s.gcr.io/liveness:e2e
|
||||||
gcr.io/google_containers/logs-generator:v0.1.0
|
k8s.gcr.io/logs-generator:v0.1.0
|
||||||
gcr.io/google_containers/mounttest:0.8
|
k8s.gcr.io/mounttest:0.8
|
||||||
gcr.io/google_containers/mounttest-user:0.5
|
k8s.gcr.io/mounttest-user:0.5
|
||||||
gcr.io/google_containers/mysql-galera:e2e
|
k8s.gcr.io/mysql-galera:e2e
|
||||||
gcr.io/google_containers/mysql-healthz:1.0
|
k8s.gcr.io/mysql-healthz:1.0
|
||||||
gcr.io/google_containers/netexec:1.4
|
k8s.gcr.io/netexec:1.4
|
||||||
gcr.io/google_containers/netexec:1.5
|
k8s.gcr.io/netexec:1.5
|
||||||
gcr.io/google_containers/netexec:1.7
|
k8s.gcr.io/netexec:1.7
|
||||||
gcr.io/google_containers/nettest:1.7
|
k8s.gcr.io/nettest:1.7
|
||||||
gcr.io/google_containers/nginx:1.7.9
|
k8s.gcr.io/nginx:1.7.9
|
||||||
gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.1
|
k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.1
|
||||||
gcr.io/google_containers/nginx-slim:0.7
|
k8s.gcr.io/nginx-slim:0.7
|
||||||
gcr.io/google_containers/nginx-slim:0.8
|
k8s.gcr.io/nginx-slim:0.8
|
||||||
gcr.io/google_containers/node-problem-detector:v0.3.0
|
k8s.gcr.io/node-problem-detector:v0.3.0
|
||||||
gcr.io/google_containers/pause
|
k8s.gcr.io/pause
|
||||||
gcr.io/google_containers/porter:4524579c0eb935c056c8e75563b4e1eda31587e0
|
k8s.gcr.io/porter:4524579c0eb935c056c8e75563b4e1eda31587e0
|
||||||
gcr.io/google_containers/portforwardtester:1.2
|
k8s.gcr.io/portforwardtester:1.2
|
||||||
gcr.io/google_containers/redis-install-3.2.0:e2e
|
k8s.gcr.io/redis-install-3.2.0:e2e
|
||||||
gcr.io/google_containers/resource_consumer:beta4
|
k8s.gcr.io/resource_consumer:beta4
|
||||||
gcr.io/google_containers/resource_consumer/controller:beta4
|
k8s.gcr.io/resource_consumer/controller:beta4
|
||||||
gcr.io/kubernetes-e2e-test-images/serve-hostname-amd64:1.1
|
gcr.io/kubernetes-e2e-test-images/serve-hostname-amd64:1.1
|
||||||
gcr.io/google_containers/servicelb:0.1
|
k8s.gcr.io/servicelb:0.1
|
||||||
gcr.io/google_containers/test-webserver:e2e
|
k8s.gcr.io/test-webserver:e2e
|
||||||
gcr.io/google_containers/update-demo:kitten
|
k8s.gcr.io/update-demo:kitten
|
||||||
gcr.io/google_containers/update-demo:nautilus
|
k8s.gcr.io/update-demo:nautilus
|
||||||
gcr.io/google_containers/volume-ceph:0.1
|
k8s.gcr.io/volume-ceph:0.1
|
||||||
gcr.io/google_containers/volume-gluster:0.2
|
k8s.gcr.io/volume-gluster:0.2
|
||||||
gcr.io/google_containers/volume-iscsi:0.1
|
k8s.gcr.io/volume-iscsi:0.1
|
||||||
gcr.io/google_containers/volume-nfs:0.8
|
k8s.gcr.io/volume-nfs:0.8
|
||||||
gcr.io/google_containers/volume-rbd:0.1
|
k8s.gcr.io/volume-rbd:0.1
|
||||||
gcr.io/google_containers/zookeeper-install-3.5.0-alpha:e2e
|
k8s.gcr.io/zookeeper-install-3.5.0-alpha:e2e
|
||||||
gcr.io/google_samples/gb-redisslave:nonexistent
|
gcr.io/google_samples/gb-redisslave:nonexistent
|
||||||
; do echo $(date '+%X') pulling $i; docker pull $i 1>/dev/null; done; exit 0;
|
; do echo $(date '+%X') pulling $i; docker pull $i 1>/dev/null; done; exit 0;
|
||||||
securityContext:
|
securityContext:
|
||||||
|
@ -91,7 +91,7 @@ spec:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
limits:
|
limits:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
image: gcr.io/google_containers/kube-nethealth-amd64:1.0
|
image: k8s.gcr.io/kube-nethealth-amd64:1.0
|
||||||
command:
|
command:
|
||||||
- /bin/sh
|
- /bin/sh
|
||||||
- -c
|
- -c
|
||||||
|
|
|
@ -39,7 +39,7 @@
|
||||||
"containers":[
|
"containers":[
|
||||||
{
|
{
|
||||||
"name": "etcd-container",
|
"name": "etcd-container",
|
||||||
"image": "{{ pillar.get('etcd_docker_repository', 'gcr.io/google_containers/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.1.10') }}",
|
"image": "{{ pillar.get('etcd_docker_repository', 'k8s.gcr.io/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.1.10') }}",
|
||||||
"resources": {
|
"resources": {
|
||||||
"requests": {
|
"requests": {
|
||||||
"cpu": {{ cpulimit }}
|
"cpu": {{ cpulimit }}
|
||||||
|
|
|
@ -13,7 +13,7 @@ spec:
|
||||||
- name: kube-addon-manager
|
- name: kube-addon-manager
|
||||||
# When updating version also bump it in:
|
# When updating version also bump it in:
|
||||||
# - test/kubemark/resources/manifests/kube-addon-manager.yaml
|
# - test/kubemark/resources/manifests/kube-addon-manager.yaml
|
||||||
image: gcr.io/google-containers/kube-addon-manager:v6.5
|
image: k8s.gcr.io/kube-addon-manager:v6.5
|
||||||
command:
|
command:
|
||||||
- /bin/bash
|
- /bin/bash
|
||||||
- -c
|
- -c
|
||||||
|
|
|
@ -18,7 +18,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: kube-registry-proxy
|
- name: kube-registry-proxy
|
||||||
image: gcr.io/google_containers/kube-registry-proxy:0.4
|
image: k8s.gcr.io/kube-registry-proxy:0.4
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
|
|
|
@ -13,7 +13,7 @@ spec:
|
||||||
terminationGracePeriodSeconds: 600
|
terminationGracePeriodSeconds: 600
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/glbc:0.9.7
|
- image: k8s.gcr.io/glbc:0.9.7
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
path: /healthz
|
path: /healthz
|
||||||
|
|
|
@ -13,7 +13,7 @@ metadata:
|
||||||
spec:
|
spec:
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google-containers/rescheduler:v0.3.1
|
- image: k8s.gcr.io/rescheduler:v0.3.1
|
||||||
name: rescheduler
|
name: rescheduler
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /var/log/rescheduler.log
|
- mountPath: /var/log/rescheduler.log
|
||||||
|
|
|
@ -47,7 +47,7 @@ const (
|
||||||
// DefaultCertificatesDir defines default certificate directory
|
// DefaultCertificatesDir defines default certificate directory
|
||||||
DefaultCertificatesDir = "/etc/kubernetes/pki"
|
DefaultCertificatesDir = "/etc/kubernetes/pki"
|
||||||
// DefaultImageRepository defines default image registry
|
// DefaultImageRepository defines default image registry
|
||||||
DefaultImageRepository = "gcr.io/google_containers"
|
DefaultImageRepository = "k8s.gcr.io"
|
||||||
// DefaultManifestsDir defines default manifests directory
|
// DefaultManifestsDir defines default manifests directory
|
||||||
DefaultManifestsDir = "/etc/kubernetes/manifests"
|
DefaultManifestsDir = "/etc/kubernetes/manifests"
|
||||||
|
|
||||||
|
|
|
@ -27,7 +27,7 @@ import (
|
||||||
const (
|
const (
|
||||||
testversion = "v10.1.2-alpha.1.100+0123456789abcdef+SOMETHING"
|
testversion = "v10.1.2-alpha.1.100+0123456789abcdef+SOMETHING"
|
||||||
expected = "v10.1.2-alpha.1.100_0123456789abcdef_SOMETHING"
|
expected = "v10.1.2-alpha.1.100_0123456789abcdef_SOMETHING"
|
||||||
gcrPrefix = "gcr.io/google_containers"
|
gcrPrefix = "k8s.gcr.io"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestGetCoreImage(t *testing.T) {
|
func TestGetCoreImage(t *testing.T) {
|
||||||
|
|
|
@ -66,7 +66,7 @@ spec:
|
||||||
- --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
|
- --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
|
||||||
- --authorization-mode=Node,RBAC
|
- --authorization-mode=Node,RBAC
|
||||||
- --etcd-servers=http://127.0.0.1:2379
|
- --etcd-servers=http://127.0.0.1:2379
|
||||||
image: gcr.io/google_containers/kube-apiserver-amd64:v1.7.4
|
image: k8s.gcr.io/kube-apiserver-amd64:v1.7.4
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
failureThreshold: 8
|
failureThreshold: 8
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -148,7 +148,7 @@ spec:
|
||||||
- --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
|
- --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
|
||||||
- --authorization-mode=Node,RBAC
|
- --authorization-mode=Node,RBAC
|
||||||
- --etcd-servers=http://127.0.0.1:2379
|
- --etcd-servers=http://127.0.0.1:2379
|
||||||
image: gcr.io/google_containers/kube-apiserver-amd64:v1.7.4
|
image: k8s.gcr.io/kube-apiserver-amd64:v1.7.4
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
failureThreshold: 8
|
failureThreshold: 8
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -220,7 +220,7 @@ spec:
|
||||||
- --cluster-signing-key-file=/etc/kubernetes/pki/ca.key
|
- --cluster-signing-key-file=/etc/kubernetes/pki/ca.key
|
||||||
- --address=127.0.0.1
|
- --address=127.0.0.1
|
||||||
- --use-service-account-credentials=true
|
- --use-service-account-credentials=true
|
||||||
image: gcr.io/google_containers/kube-controller-manager-amd64:v1.7.4
|
image: k8s.gcr.io/kube-controller-manager-amd64:v1.7.4
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
failureThreshold: 8
|
failureThreshold: 8
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -295,7 +295,7 @@ spec:
|
||||||
- --cluster-signing-key-file=/etc/kubernetes/pki/ca.key
|
- --cluster-signing-key-file=/etc/kubernetes/pki/ca.key
|
||||||
- --address=127.0.0.1
|
- --address=127.0.0.1
|
||||||
- --use-service-account-credentials=true
|
- --use-service-account-credentials=true
|
||||||
image: gcr.io/google_containers/kube-controller-manager-amd64:v1.7.4
|
image: k8s.gcr.io/kube-controller-manager-amd64:v1.7.4
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
failureThreshold: 8
|
failureThreshold: 8
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -368,7 +368,7 @@ spec:
|
||||||
- --leader-elect=true
|
- --leader-elect=true
|
||||||
- --kubeconfig=/etc/kubernetes/scheduler.conf
|
- --kubeconfig=/etc/kubernetes/scheduler.conf
|
||||||
- --address=127.0.0.1
|
- --address=127.0.0.1
|
||||||
image: gcr.io/google_containers/kube-scheduler-amd64:v1.7.4
|
image: k8s.gcr.io/kube-scheduler-amd64:v1.7.4
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
failureThreshold: 8
|
failureThreshold: 8
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -419,7 +419,7 @@ spec:
|
||||||
- --leader-elect=true
|
- --leader-elect=true
|
||||||
- --kubeconfig=/etc/kubernetes/scheduler.conf
|
- --kubeconfig=/etc/kubernetes/scheduler.conf
|
||||||
- --address=127.0.0.1
|
- --address=127.0.0.1
|
||||||
image: gcr.io/google_containers/kube-scheduler-amd64:v1.7.4
|
image: k8s.gcr.io/kube-scheduler-amd64:v1.7.4
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
failureThreshold: 8
|
failureThreshold: 8
|
||||||
httpGet:
|
httpGet:
|
||||||
|
@ -521,7 +521,7 @@ metadata:
|
||||||
name: testpod
|
name: testpod
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- image: gcr.io/google_containers/busybox
|
- image: k8s.gcr.io/busybox
|
||||||
`,
|
`,
|
||||||
expectError: false,
|
expectError: false,
|
||||||
},
|
},
|
||||||
|
@ -537,7 +537,7 @@ spec:
|
||||||
"spec": {
|
"spec": {
|
||||||
"containers": [
|
"containers": [
|
||||||
{
|
{
|
||||||
"image": "gcr.io/google_containers/busybox"
|
"image": "k8s.gcr.io/busybox"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -552,7 +552,7 @@ kind: Pod
|
||||||
metadata:
|
metadata:
|
||||||
name: testpod
|
name: testpod
|
||||||
spec:
|
spec:
|
||||||
- image: gcr.io/google_containers/busybox
|
- image: k8s.gcr.io/busybox
|
||||||
`,
|
`,
|
||||||
expectError: true,
|
expectError: true,
|
||||||
},
|
},
|
||||||
|
|
|
@ -61,7 +61,7 @@ etcd:
|
||||||
image: ""
|
image: ""
|
||||||
keyFile: ""
|
keyFile: ""
|
||||||
featureFlags: null
|
featureFlags: null
|
||||||
imageRepository: gcr.io/google_containers
|
imageRepository: k8s.gcr.io
|
||||||
kubernetesVersion: %s
|
kubernetesVersion: %s
|
||||||
networking:
|
networking:
|
||||||
dnsDomain: cluster.local
|
dnsDomain: cluster.local
|
||||||
|
|
|
@ -22,8 +22,8 @@ import (
|
||||||
|
|
||||||
const (
|
const (
|
||||||
validTmpl = "image: {{ .ImageRepository }}/pause-{{ .Arch }}:3.0"
|
validTmpl = "image: {{ .ImageRepository }}/pause-{{ .Arch }}:3.0"
|
||||||
validTmplOut = "image: gcr.io/google_containers/pause-amd64:3.0"
|
validTmplOut = "image: k8s.gcr.io/pause-amd64:3.0"
|
||||||
doNothing = "image: gcr.io/google_containers/pause-amd64:3.0"
|
doNothing = "image: k8s.gcr.io/pause-amd64:3.0"
|
||||||
invalidTmpl1 = "{{ .baz }/d}"
|
invalidTmpl1 = "{{ .baz }/d}"
|
||||||
invalidTmpl2 = "{{ !foobar }}"
|
invalidTmpl2 = "{{ !foobar }}"
|
||||||
)
|
)
|
||||||
|
@ -39,7 +39,7 @@ func TestParseTemplate(t *testing.T) {
|
||||||
{
|
{
|
||||||
template: validTmpl,
|
template: validTmpl,
|
||||||
data: struct{ ImageRepository, Arch string }{
|
data: struct{ ImageRepository, Arch string }{
|
||||||
ImageRepository: "gcr.io/google_containers",
|
ImageRepository: "k8s.gcr.io",
|
||||||
Arch: "amd64",
|
Arch: "amd64",
|
||||||
},
|
},
|
||||||
output: validTmplOut,
|
output: validTmplOut,
|
||||||
|
@ -49,7 +49,7 @@ func TestParseTemplate(t *testing.T) {
|
||||||
{
|
{
|
||||||
template: doNothing,
|
template: doNothing,
|
||||||
data: struct{ ImageRepository, Arch string }{
|
data: struct{ ImageRepository, Arch string }{
|
||||||
ImageRepository: "gcr.io/google_containers",
|
ImageRepository: "k8s.gcr.io",
|
||||||
Arch: "amd64",
|
Arch: "amd64",
|
||||||
},
|
},
|
||||||
output: doNothing,
|
output: doNothing,
|
||||||
|
|
|
@ -27,7 +27,7 @@ import (
|
||||||
|
|
||||||
const (
|
const (
|
||||||
// When these values are updated, also update test/e2e/framework/util.go
|
// When these values are updated, also update test/e2e/framework/util.go
|
||||||
defaultPodSandboxImageName = "gcr.io/google_containers/pause"
|
defaultPodSandboxImageName = "k8s.gcr.io/pause"
|
||||||
defaultPodSandboxImageVersion = "3.0"
|
defaultPodSandboxImageVersion = "3.0"
|
||||||
// From pkg/kubelet/rkt/rkt.go to avoid circular import
|
// From pkg/kubelet/rkt/rkt.go to avoid circular import
|
||||||
defaultRktAPIServiceEndpoint = "localhost:15441"
|
defaultRktAPIServiceEndpoint = "localhost:15441"
|
||||||
|
|
|
@ -5194,7 +5194,7 @@ Examples:<br>
|
||||||
<tbody>
|
<tbody>
|
||||||
<tr>
|
<tr>
|
||||||
<td class="tableblock halign-left valign-top"><p class="tableblock">names</p></td>
|
<td class="tableblock halign-left valign-top"><p class="tableblock">names</p></td>
|
||||||
<td class="tableblock halign-left valign-top"><p class="tableblock">Names by which this image is known. e.g. ["gcr.io/google_containers/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]</p></td>
|
<td class="tableblock halign-left valign-top"><p class="tableblock">Names by which this image is known. e.g. ["k8s.gcr.io/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]</p></td>
|
||||||
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
<td class="tableblock halign-left valign-top"><p class="tableblock">true</p></td>
|
||||||
<td class="tableblock halign-left valign-top"><p class="tableblock">string array</p></td>
|
<td class="tableblock halign-left valign-top"><p class="tableblock">string array</p></td>
|
||||||
<td class="tableblock halign-left valign-top"></td>
|
<td class="tableblock halign-left valign-top"></td>
|
||||||
|
|
|
@ -15,7 +15,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: dns-backend
|
- name: dns-backend
|
||||||
image: gcr.io/google_containers/example-dns-backend:v1
|
image: k8s.gcr.io/example-dns-backend:v1
|
||||||
ports:
|
ports:
|
||||||
- name: backend-port
|
- name: backend-port
|
||||||
containerPort: 8000
|
containerPort: 8000
|
||||||
|
|
|
@ -7,7 +7,7 @@ metadata:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: dns-frontend
|
- name: dns-frontend
|
||||||
image: gcr.io/google_containers/example-dns-frontend:v1
|
image: k8s.gcr.io/example-dns-frontend:v1
|
||||||
command:
|
command:
|
||||||
- python
|
- python
|
||||||
- client.py
|
- client.py
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
TAG = v1
|
TAG = v1
|
||||||
PREFIX = gcr.io/google_containers
|
PREFIX = k8s.gcr.io
|
||||||
IMAGE = example-dns-backend
|
IMAGE = example-dns-backend
|
||||||
|
|
||||||
all: push
|
all: push
|
||||||
|
@ -22,6 +22,6 @@ image:
|
||||||
docker build --pull -t $(PREFIX)/$(IMAGE):$(TAG) .
|
docker build --pull -t $(PREFIX)/$(IMAGE):$(TAG) .
|
||||||
|
|
||||||
push: image
|
push: image
|
||||||
gcloud docker -- push $(PREFIX)/$(IMAGE)
|
gcloud docker --server=k8s.gcr.io -- push $(PREFIX)/$(IMAGE)
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
TAG = v1
|
TAG = v1
|
||||||
PREFIX = gcr.io/google_containers
|
PREFIX = k8s.gcr.io
|
||||||
IMAGE = example-dns-frontend
|
IMAGE = example-dns-frontend
|
||||||
|
|
||||||
all: push
|
all: push
|
||||||
|
@ -22,6 +22,6 @@ image:
|
||||||
docker build --pull -t $(PREFIX)/$(IMAGE):$(TAG) .
|
docker build --pull -t $(PREFIX)/$(IMAGE):$(TAG) .
|
||||||
|
|
||||||
push: image
|
push: image
|
||||||
gcloud docker -- push $(PREFIX)/$(IMAGE)
|
gcloud docker --server=k8s.gcr.io -- push $(PREFIX)/$(IMAGE)
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
|
|
|
@ -21,10 +21,10 @@ explorer: explorer.go
|
||||||
CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -ldflags '-w' ./explorer.go
|
CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -ldflags '-w' ./explorer.go
|
||||||
|
|
||||||
container: explorer
|
container: explorer
|
||||||
docker build --pull -t gcr.io/google_containers/explorer:$(TAG) .
|
docker build --pull -t k8s.gcr.io/explorer:$(TAG) .
|
||||||
|
|
||||||
push: container
|
push: container
|
||||||
gcloud docker -- push gcr.io/google_containers/explorer:$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push k8s.gcr.io/explorer:$(TAG)
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
rm -f explorer
|
rm -f explorer
|
||||||
|
|
|
@ -5,7 +5,7 @@ metadata:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: explorer
|
- name: explorer
|
||||||
image: gcr.io/google_containers/explorer:1.0
|
image: k8s.gcr.io/explorer:1.0
|
||||||
args: ["-port=8080"]
|
args: ["-port=8080"]
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 8080
|
- containerPort: 8080
|
||||||
|
|
|
@ -15,9 +15,9 @@
|
||||||
# Build the guestbook-go example
|
# Build the guestbook-go example
|
||||||
|
|
||||||
# Usage:
|
# Usage:
|
||||||
# [VERSION=v3] [REGISTRY="gcr.io/google_containers"] make build
|
# [VERSION=v3] [REGISTRY="k8s.gcr.io"] make build
|
||||||
VERSION?=v3
|
VERSION?=v3
|
||||||
REGISTRY?=gcr.io/google_containers
|
REGISTRY?=k8s.gcr.io
|
||||||
|
|
||||||
release: clean build push clean
|
release: clean build push clean
|
||||||
|
|
||||||
|
@ -29,7 +29,7 @@ build:
|
||||||
|
|
||||||
# push the image to an registry
|
# push the image to an registry
|
||||||
push:
|
push:
|
||||||
gcloud docker -- push ${REGISTRY}/guestbook:${VERSION}
|
gcloud docker --server=k8s.gcr.io -- push ${REGISTRY}/guestbook:${VERSION}
|
||||||
|
|
||||||
# remove previous images and containers
|
# remove previous images and containers
|
||||||
clean:
|
clean:
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
"containers":[
|
"containers":[
|
||||||
{
|
{
|
||||||
"name":"guestbook",
|
"name":"guestbook",
|
||||||
"image":"gcr.io/google_containers/guestbook:v3",
|
"image":"k8s.gcr.io/guestbook:v3",
|
||||||
"ports":[
|
"ports":[
|
||||||
{
|
{
|
||||||
"name":"http-server",
|
"name":"http-server",
|
||||||
|
|
|
@ -30,7 +30,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: master
|
- name: master
|
||||||
image: gcr.io/google_containers/redis:e2e # or just image: redis
|
image: k8s.gcr.io/redis:e2e # or just image: redis
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
|
|
|
@ -17,7 +17,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: master
|
- name: master
|
||||||
image: gcr.io/google_containers/redis:e2e # or just image: redis
|
image: k8s.gcr.io/redis:e2e # or just image: redis
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
|
|
|
@ -13,7 +13,7 @@ spec:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: master
|
- name: master
|
||||||
image: gcr.io/google_containers/redis:e2e # or just image: redis
|
image: k8s.gcr.io/redis:e2e # or just image: redis
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
cpu: 100m
|
cpu: 100m
|
||||||
|
|
|
@ -37,11 +37,11 @@ tag: .tag
|
||||||
|
|
||||||
container:
|
container:
|
||||||
$(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion))
|
$(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion))
|
||||||
docker build --pull -t gcr.io/google_containers/kubectl:$(TAG) .
|
docker build --pull -t k8s.gcr.io/kubectl:$(TAG) .
|
||||||
|
|
||||||
push: container
|
push: container
|
||||||
$(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion))
|
$(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion))
|
||||||
gcloud docker -- push gcr.io/google_containers/kubectl:$(TAG)
|
gcloud docker --server=k8s.gcr.io -- push k8s.gcr.io/kubectl:$(TAG)
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
rm -f kubectl
|
rm -f kubectl
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue