diff --git a/api/openapi-spec/swagger.json b/api/openapi-spec/swagger.json
index 4d96ea2ec3..6e286b0737 100644
--- a/api/openapi-spec/swagger.json
+++ b/api/openapi-spec/swagger.json
@@ -76545,7 +76545,7 @@
],
"properties": {
"names": {
- "description": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]",
+ "description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]",
"type": "array",
"items": {
"type": "string"
diff --git a/api/swagger-spec/v1.json b/api/swagger-spec/v1.json
index b5c645c96a..441cf97502 100644
--- a/api/swagger-spec/v1.json
+++ b/api/swagger-spec/v1.json
@@ -20261,7 +20261,7 @@
"items": {
"type": "string"
},
- "description": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]"
+ "description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]"
},
"sizeBytes": {
"type": "integer",
diff --git a/build/BUILD b/build/BUILD
index 7e7beb7d67..8d3cdbba44 100644
--- a/build/BUILD
+++ b/build/BUILD
@@ -62,7 +62,11 @@ DOCKERIZED_BINARIES = {
[docker_bundle(
name = binary,
- images = {"gcr.io/google_containers/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal"},
+ # TODO(thockin): remove the google_containers name after release 1.10.
+ images = {
+ "k8s.gcr.io/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal",
+ "gcr.io/google_containers/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal",
+ },
stamp = True,
) for binary in DOCKERIZED_BINARIES.keys()]
diff --git a/build/build-image/Dockerfile b/build/build-image/Dockerfile
index 59be59e409..f9d0adaf03 100644
--- a/build/build-image/Dockerfile
+++ b/build/build-image/Dockerfile
@@ -13,7 +13,7 @@
# limitations under the License.
# This file creates a standard build environment for building Kubernetes
-FROM gcr.io/google_containers/kube-cross:KUBE_BUILD_IMAGE_CROSS_TAG
+FROM k8s.gcr.io/kube-cross:KUBE_BUILD_IMAGE_CROSS_TAG
# Mark this as a kube-build container
RUN touch /kube-build-image
diff --git a/build/build-image/cross/Makefile b/build/build-image/cross/Makefile
index c8ed25375c..fb49f3f2d0 100644
--- a/build/build-image/cross/Makefile
+++ b/build/build-image/cross/Makefile
@@ -21,7 +21,7 @@ TAG=$(shell cat VERSION)
all: push
build:
- docker build --pull -t gcr.io/google_containers/$(IMAGE):$(TAG) .
+ docker build --pull -t staging-k8s.gcr.io/$(IMAGE):$(TAG) .
push: build
- gcloud docker -- push gcr.io/google_containers/$(IMAGE):$(TAG)
+ gcloud docker -- push staging-k8s.gcr.io/$(IMAGE):$(TAG)
diff --git a/build/common.sh b/build/common.sh
index 6e4d01e695..7289801157 100755
--- a/build/common.sh
+++ b/build/common.sh
@@ -96,7 +96,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,busybox
kube-scheduler,busybox
kube-aggregator,busybox
- kube-proxy,gcr.io/google-containers/debian-iptables-amd64:${debian_iptables_version}
+ kube-proxy,k8s.gcr.io/debian-iptables-amd64:${debian_iptables_version}
);;
"arm")
local targets=(
@@ -105,7 +105,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,arm32v7/busybox
kube-scheduler,arm32v7/busybox
kube-aggregator,arm32v7/busybox
- kube-proxy,gcr.io/google-containers/debian-iptables-arm:${debian_iptables_version}
+ kube-proxy,k8s.gcr.io/debian-iptables-arm:${debian_iptables_version}
);;
"arm64")
local targets=(
@@ -114,7 +114,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,arm64v8/busybox
kube-scheduler,arm64v8/busybox
kube-aggregator,arm64v8/busybox
- kube-proxy,gcr.io/google-containers/debian-iptables-arm64:${debian_iptables_version}
+ kube-proxy,k8s.gcr.io/debian-iptables-arm64:${debian_iptables_version}
);;
"ppc64le")
local targets=(
@@ -123,7 +123,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,ppc64le/busybox
kube-scheduler,ppc64le/busybox
kube-aggregator,ppc64le/busybox
- kube-proxy,gcr.io/google-containers/debian-iptables-ppc64le:${debian_iptables_version}
+ kube-proxy,k8s.gcr.io/debian-iptables-ppc64le:${debian_iptables_version}
);;
"s390x")
local targets=(
@@ -132,7 +132,7 @@ kube::build::get_docker_wrapped_binaries() {
kube-controller-manager,s390x/busybox
kube-scheduler,s390x/busybox
kube-aggregator,s390x/busybox
- kube-proxy,gcr.io/google-containers/debian-iptables-s390x:${debian_iptables_version}
+ kube-proxy,k8s.gcr.io/debian-iptables-s390x:${debian_iptables_version}
);;
esac
diff --git a/build/debian-base/Makefile b/build/debian-base/Makefile
index 47eafa5c64..51513ca50e 100755
--- a/build/debian-base/Makefile
+++ b/build/debian-base/Makefile
@@ -14,7 +14,7 @@
all: build
-REGISTRY ?= gcr.io/google-containers
+REGISTRY ?= staging-k8s.gcr.io
IMAGE ?= debian-base
BUILD_IMAGE ?= debian-build
diff --git a/build/debian-hyperkube-base/Makefile b/build/debian-hyperkube-base/Makefile
index 54ca29f7e9..ff798c1d07 100644
--- a/build/debian-hyperkube-base/Makefile
+++ b/build/debian-hyperkube-base/Makefile
@@ -15,15 +15,15 @@
# Build the hyperkube base image. This image is used to build the hyperkube image.
#
# Usage:
-# [ARCH=amd64] [REGISTRY="gcr.io/google-containers"] make (build|push)
+# [ARCH=amd64] [REGISTRY="staging-k8s.gcr.io"] make (build|push)
-REGISTRY?=gcr.io/google-containers
+REGISTRY?=staging-k8s.gcr.io
IMAGE?=debian-hyperkube-base
TAG=0.8
ARCH?=amd64
CACHEBUST?=1
-BASEIMAGE=gcr.io/google-containers/debian-base-$(ARCH):0.3
+BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):0.3
CNI_VERSION=v0.6.0
TEMP_DIR:=$(shell mktemp -d)
diff --git a/build/debian-hyperkube-base/README.md b/build/debian-hyperkube-base/README.md
index 2cef311cb6..736684a60d 100644
--- a/build/debian-hyperkube-base/README.md
+++ b/build/debian-hyperkube-base/README.md
@@ -1,6 +1,6 @@
### debian-hyperkube-base
-Serves as the base image for `gcr.io/google-containers/hyperkube-${ARCH}`
+Serves as the base image for `k8s.gcr.io/hyperkube-${ARCH}`
images.
This image is compiled for multiple architectures.
@@ -12,19 +12,19 @@ If you're editing the Dockerfile or some other thing, please bump the `TAG` in t
```console
# Build for linux/amd64 (default)
$ make push ARCH=amd64
-# ---> gcr.io/google-containers/debian-hyperkube-base-amd64:TAG
+# ---> staging-k8s.gcr.io/debian-hyperkube-base-amd64:TAG
$ make push ARCH=arm
-# ---> gcr.io/google-containers/debian-hyperkube-base-arm:TAG
+# ---> staging-k8s.gcr.io/debian-hyperkube-base-arm:TAG
$ make push ARCH=arm64
-# ---> gcr.io/google-containers/debian-hyperkube-base-arm64:TAG
+# ---> staging-k8s.gcr.io/debian-hyperkube-base-arm64:TAG
$ make push ARCH=ppc64le
-# ---> gcr.io/google-containers/debian-hyperkube-base-ppc64le:TAG
+# ---> staging-k8s.gcr.io/debian-hyperkube-base-ppc64le:TAG
$ make push ARCH=s390x
-# ---> gcr.io/google-containers/debian-hyperkube-base-s390x:TAG
+# ---> staging-k8s.gcr.io/debian-hyperkube-base-s390x:TAG
```
If you don't want to push the images, run `make build` instead
diff --git a/build/debian-iptables/Makefile b/build/debian-iptables/Makefile
index 1cc75edf17..62f42b1ed5 100644
--- a/build/debian-iptables/Makefile
+++ b/build/debian-iptables/Makefile
@@ -14,7 +14,7 @@
.PHONY: build push
-REGISTRY?="gcr.io/google-containers"
+REGISTRY?="staging-k8s.gcr.io"
IMAGE=debian-iptables
TAG=v10
ARCH?=amd64
@@ -34,7 +34,7 @@ ifeq ($(ARCH),s390x)
QEMUARCH=s390x
endif
-BASEIMAGE=gcr.io/google-containers/debian-base-$(ARCH):0.3
+BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):0.3
build:
cp ./* $(TEMP_DIR)
diff --git a/build/debian-iptables/README.md b/build/debian-iptables/README.md
index f5c0b3c7e0..a961cd6f6d 100644
--- a/build/debian-iptables/README.md
+++ b/build/debian-iptables/README.md
@@ -1,6 +1,6 @@
### debian-iptables
-Serves as the base image for `gcr.io/google_containers/kube-proxy-${ARCH}` and multiarch (not `amd64`) `gcr.io/google_containers/flannel-${ARCH}` images.
+Serves as the base image for `k8s.gcr.io/kube-proxy-${ARCH}` and multiarch (not `amd64`) `k8s.gcr.io/flannel-${ARCH}` images.
This image is compiled for multiple architectures.
@@ -11,19 +11,19 @@ If you're editing the Dockerfile or some other thing, please bump the `TAG` in t
```console
# Build for linux/amd64 (default)
$ make push ARCH=amd64
-# ---> gcr.io/google_containers/debian-iptables-amd64:TAG
+# ---> staging-k8s.gcr.io/debian-iptables-amd64:TAG
$ make push ARCH=arm
-# ---> gcr.io/google_containers/debian-iptables-arm:TAG
+# ---> staging-k8s.gcr.io/debian-iptables-arm:TAG
$ make push ARCH=arm64
-# ---> gcr.io/google_containers/debian-iptables-arm64:TAG
+# ---> staging-k8s.gcr.io/debian-iptables-arm64:TAG
$ make push ARCH=ppc64le
-# ---> gcr.io/google_containers/debian-iptables-ppc64le:TAG
+# ---> staging-k8s.gcr.io/debian-iptables-ppc64le:TAG
$ make push ARCH=s390x
-# ---> gcr.io/google_containers/debian-iptables-s390x:TAG
+# ---> staging-k8s.gcr.io/debian-iptables-s390x:TAG
```
If you don't want to push the images, run `make` or `make build` instead
diff --git a/build/lib/release.sh b/build/lib/release.sh
index 25a904cf4b..f3e1c9b313 100644
--- a/build/lib/release.sh
+++ b/build/lib/release.sh
@@ -284,7 +284,11 @@ function kube::release::create_docker_images_for_server() {
local images_dir="${RELEASE_IMAGES}/${arch}"
mkdir -p "${images_dir}"
- local -r docker_registry="gcr.io/google_containers"
+ local -r docker_registry="k8s.gcr.io"
+ # TODO(thockin): Remove all traces of this after 1.10 release.
+ # The following is the old non-indirected registry name. To ease the
+ # transition to the new name (above), we are double-tagging saved images.
+ local -r deprecated_registry="gcr.io/google_containers"
# Docker tags cannot contain '+'
local docker_tag="${KUBE_GIT_VERSION/+/_}"
if [[ -z "${docker_tag}" ]]; then
@@ -305,14 +309,17 @@ function kube::release::create_docker_images_for_server() {
local docker_file_path="${docker_build_path}/Dockerfile"
local binary_file_path="${binary_dir}/${binary_name}"
local docker_image_tag="${docker_registry}"
+ local deprecated_image_tag="${deprecated_registry}"
if [[ ${arch} == "amd64" ]]; then
# If we are building a amd64 docker image, preserve the original
# image name
docker_image_tag+="/${binary_name}:${docker_tag}"
+ deprecated_image_tag+="/${binary_name}:${docker_tag}"
else
# If we are building a docker image for another architecture,
# append the arch in the image tag
docker_image_tag+="/${binary_name}-${arch}:${docker_tag}"
+ deprecated_image_tag+="/${binary_name}-${arch}:${docker_tag}"
fi
@@ -324,7 +331,8 @@ function kube::release::create_docker_images_for_server() {
printf " FROM ${base_image} \n ADD ${binary_name} /usr/local/bin/${binary_name}\n" > ${docker_file_path}
"${DOCKER[@]}" build --pull -q -t "${docker_image_tag}" ${docker_build_path} >/dev/null
- "${DOCKER[@]}" save "${docker_image_tag}" > "${binary_dir}/${binary_name}.tar"
+ "${DOCKER[@]}" tag "${docker_image_tag}" ${deprecated_image_tag} >/dev/null
+ "${DOCKER[@]}" save "${docker_image_tag}" ${deprecated_image_tag} > "${binary_dir}/${binary_name}.tar"
echo "${docker_tag}" > ${binary_dir}/${binary_name}.docker_tag
rm -rf ${docker_build_path}
ln "${binary_dir}/${binary_name}.tar" "${images_dir}/"
@@ -343,6 +351,7 @@ function kube::release::create_docker_images_for_server() {
# not a release
kube::log::status "Deleting docker image ${docker_image_tag}"
"${DOCKER[@]}" rmi ${docker_image_tag} &>/dev/null || true
+ "${DOCKER[@]}" rmi ${deprecated_image_tag} &>/dev/null || true
fi
) &
done
diff --git a/build/pause/Makefile b/build/pause/Makefile
index fb5e5a75b4..807973fcff 100644
--- a/build/pause/Makefile
+++ b/build/pause/Makefile
@@ -16,7 +16,7 @@
include ../../hack/make-rules/Makefile.manifest
-REGISTRY ?= gcr.io/google_containers
+REGISTRY ?= staging-k8s.gcr.io
IMAGE = $(REGISTRY)/pause
IMAGE_WITH_ARCH = $(IMAGE)-$(ARCH)
@@ -29,7 +29,7 @@ ARCH ?= amd64
ALL_ARCH = amd64 arm arm64 ppc64le s390x
CFLAGS = -Os -Wall -Werror -static -DVERSION=v$(TAG)-$(REV)
-KUBE_CROSS_IMAGE ?= gcr.io/google_containers/kube-cross
+KUBE_CROSS_IMAGE ?= k8s.gcr.io/kube-cross
KUBE_CROSS_VERSION ?= $(shell cat ../build-image/cross/VERSION)
BIN = pause
diff --git a/build/root/WORKSPACE b/build/root/WORKSPACE
index aa3ade68d3..88f35e1eaf 100644
--- a/build/root/WORKSPACE
+++ b/build/root/WORKSPACE
@@ -60,16 +60,16 @@ http_file(
docker_pull(
name = "debian-iptables-amd64",
digest = "sha256:a3b936c0fb98a934eecd2cfb91f73658d402b29116084e778ce9ddb68e55383e",
- registry = "gcr.io",
- repository = "google-containers/debian-iptables-amd64",
+ registry = "k8s.gcr.io",
+ repository = "debian-iptables-amd64",
tag = "v10", # ignored, but kept here for documentation
)
docker_pull(
name = "debian-hyperkube-base-amd64",
digest = "sha256:fc1b461367730660ac5a40c1eb2d1b23221829acf8a892981c12361383b3742b",
- registry = "gcr.io",
- repository = "google-containers/debian-hyperkube-base-amd64",
+ registry = "k8s.gcr.io",
+ repository = "debian-hyperkube-base-amd64",
tag = "0.8", # ignored, but kept here for documentation
)
diff --git a/cluster/addons/addon-manager/Makefile b/cluster/addons/addon-manager/Makefile
index 2bb4822727..bc653be93a 100644
--- a/cluster/addons/addon-manager/Makefile
+++ b/cluster/addons/addon-manager/Makefile
@@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-IMAGE=gcr.io/google-containers/kube-addon-manager
+IMAGE=staging-k8s.gcr.io/kube-addon-manager
ARCH?=amd64
TEMP_DIR:=$(shell mktemp -d)
VERSION=v8.5
diff --git a/cluster/addons/addon-manager/README.md b/cluster/addons/addon-manager/README.md
index e9ae53458c..6dcdd1e67c 100644
--- a/cluster/addons/addon-manager/README.md
+++ b/cluster/addons/addon-manager/README.md
@@ -40,20 +40,20 @@ The `addon-manager` is built for multiple architectures.
```console
# Build for linux/amd64 (default)
$ make push ARCH=amd64
-# ---> gcr.io/google-containers/kube-addon-manager-amd64:VERSION
-# ---> gcr.io/google-containers/kube-addon-manager:VERSION (image with backwards-compatible naming)
+# ---> staging-k8s.gcr.io/kube-addon-manager-amd64:VERSION
+# ---> staging-k8s.gcr.io/kube-addon-manager:VERSION (image with backwards-compatible naming)
$ make push ARCH=arm
-# ---> gcr.io/google-containers/kube-addon-manager-arm:VERSION
+# ---> staging-k8s.gcr.io/kube-addon-manager-arm:VERSION
$ make push ARCH=arm64
-# ---> gcr.io/google-containers/kube-addon-manager-arm64:VERSION
+# ---> staging-k8s.gcr.io/kube-addon-manager-arm64:VERSION
$ make push ARCH=ppc64le
-# ---> gcr.io/google-containers/kube-addon-manager-ppc64le:VERSION
+# ---> staging-k8s.gcr.io/kube-addon-manager-ppc64le:VERSION
$ make push ARCH=s390x
-# ---> gcr.io/google-containers/kube-addon-manager-s390x:VERSION
+# ---> staging-k8s.gcr.io/kube-addon-manager-s390x:VERSION
```
If you don't want to push the images, run `make` or `make build` instead
diff --git a/cluster/addons/calico-policy-controller/calico-node-vertical-autoscaler-deployment.yaml b/cluster/addons/calico-policy-controller/calico-node-vertical-autoscaler-deployment.yaml
index c66c3e0720..50ffcab83d 100644
--- a/cluster/addons/calico-policy-controller/calico-node-vertical-autoscaler-deployment.yaml
+++ b/cluster/addons/calico-policy-controller/calico-node-vertical-autoscaler-deployment.yaml
@@ -17,7 +17,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
containers:
- - image: gcr.io/google_containers/cpvpa-amd64:v0.6.0
+ - image: k8s.gcr.io/cpvpa-amd64:v0.6.0
name: autoscaler
command:
- /cpvpa
diff --git a/cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-deployment.yaml b/cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-deployment.yaml
index 4f493b8bcf..b338df79df 100644
--- a/cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-deployment.yaml
+++ b/cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-deployment.yaml
@@ -17,7 +17,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
containers:
- - image: gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2
+ - image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2
name: autoscaler
command:
- /cluster-proportional-autoscaler
diff --git a/cluster/addons/calico-policy-controller/typha-vertical-autoscaler-deployment.yaml b/cluster/addons/calico-policy-controller/typha-vertical-autoscaler-deployment.yaml
index c59be9af62..4f55962685 100644
--- a/cluster/addons/calico-policy-controller/typha-vertical-autoscaler-deployment.yaml
+++ b/cluster/addons/calico-policy-controller/typha-vertical-autoscaler-deployment.yaml
@@ -17,7 +17,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
containers:
- - image: gcr.io/google_containers/cpvpa-amd64:v0.6.0
+ - image: k8s.gcr.io/cpvpa-amd64:v0.6.0
name: autoscaler
command:
- /cpvpa
diff --git a/cluster/addons/cluster-loadbalancing/glbc/default-svc-controller.yaml b/cluster/addons/cluster-loadbalancing/glbc/default-svc-controller.yaml
index 28c4a1f6ed..3fa0e6f789 100644
--- a/cluster/addons/cluster-loadbalancing/glbc/default-svc-controller.yaml
+++ b/cluster/addons/cluster-loadbalancing/glbc/default-svc-controller.yaml
@@ -24,7 +24,7 @@ spec:
# Any image is permissible as long as:
# 1. It serves a 404 page at /
# 2. It serves 200 on a /healthz endpoint
- image: gcr.io/google_containers/defaultbackend:1.4
+ image: k8s.gcr.io/defaultbackend:1.4
livenessProbe:
httpGet:
path: /healthz
diff --git a/cluster/addons/cluster-monitoring/google/heapster-controller.yaml b/cluster/addons/cluster-monitoring/google/heapster-controller.yaml
index 429be0da77..e5c512d4f5 100644
--- a/cluster/addons/cluster-monitoring/google/heapster-controller.yaml
+++ b/cluster/addons/cluster-monitoring/google/heapster-controller.yaml
@@ -58,7 +58,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
containers:
- - image: gcr.io/google_containers/heapster-amd64:v1.5.0
+ - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster
livenessProbe:
httpGet:
@@ -71,13 +71,13 @@ spec:
- /heapster
- --source=kubernetes.summary_api:''
- --sink=gcm
- - image: gcr.io/google_containers/heapster-amd64:v1.5.0
+ - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: eventer
command:
- /eventer
- --source=kubernetes:''
- --sink=gcl
- - image: gcr.io/google_containers/addon-resizer:1.8.1
+ - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny
resources:
limits:
@@ -110,7 +110,7 @@ spec:
- --container=heapster
- --poll-period=300000
- --estimator=exponential
- - image: gcr.io/google_containers/addon-resizer:1.8.1
+ - image: k8s.gcr.io/addon-resizer:1.8.1
name: eventer-nanny
resources:
limits:
diff --git a/cluster/addons/cluster-monitoring/googleinfluxdb/heapster-controller-combined.yaml b/cluster/addons/cluster-monitoring/googleinfluxdb/heapster-controller-combined.yaml
index 90e3ca3230..384ec060d2 100644
--- a/cluster/addons/cluster-monitoring/googleinfluxdb/heapster-controller-combined.yaml
+++ b/cluster/addons/cluster-monitoring/googleinfluxdb/heapster-controller-combined.yaml
@@ -58,8 +58,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
containers:
- - image: gcr.io/google_containers/heapster-amd64:v1.5.0
-
+ - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster
livenessProbe:
httpGet:
@@ -73,13 +72,13 @@ spec:
- --source=kubernetes.summary_api:''
- --sink=influxdb:http://monitoring-influxdb:8086
- --sink=gcm:?metrics=autoscaling
- - image: gcr.io/google_containers/heapster-amd64:v1.5.0
+ - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: eventer
command:
- /eventer
- --source=kubernetes:''
- --sink=gcl
- - image: gcr.io/google_containers/addon-resizer:1.8.1
+ - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny
resources:
limits:
@@ -112,7 +111,7 @@ spec:
- --container=heapster
- --poll-period=300000
- --estimator=exponential
- - image: gcr.io/google_containers/addon-resizer:1.8.1
+ - image: k8s.gcr.io/addon-resizer:1.8.1
name: eventer-nanny
resources:
limits:
diff --git a/cluster/addons/cluster-monitoring/influxdb/heapster-controller.yaml b/cluster/addons/cluster-monitoring/influxdb/heapster-controller.yaml
index 46a8e36813..6ed433f417 100644
--- a/cluster/addons/cluster-monitoring/influxdb/heapster-controller.yaml
+++ b/cluster/addons/cluster-monitoring/influxdb/heapster-controller.yaml
@@ -58,7 +58,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
containers:
- - image: gcr.io/google_containers/heapster-amd64:v1.5.0
+ - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster
livenessProbe:
httpGet:
@@ -71,13 +71,13 @@ spec:
- /heapster
- --source=kubernetes.summary_api:''
- --sink=influxdb:http://monitoring-influxdb:8086
- - image: gcr.io/google_containers/heapster-amd64:v1.5.0
+ - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: eventer
command:
- /eventer
- --source=kubernetes:''
- --sink=influxdb:http://monitoring-influxdb:8086
- - image: gcr.io/google_containers/addon-resizer:1.8.1
+ - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny
resources:
limits:
@@ -110,7 +110,7 @@ spec:
- --container=heapster
- --poll-period=300000
- --estimator=exponential
- - image: gcr.io/google_containers/addon-resizer:1.8.1
+ - image: k8s.gcr.io/addon-resizer:1.8.1
name: eventer-nanny
resources:
limits:
diff --git a/cluster/addons/cluster-monitoring/influxdb/influxdb-grafana-controller.yaml b/cluster/addons/cluster-monitoring/influxdb/influxdb-grafana-controller.yaml
index d562c74847..7c78ed2c49 100644
--- a/cluster/addons/cluster-monitoring/influxdb/influxdb-grafana-controller.yaml
+++ b/cluster/addons/cluster-monitoring/influxdb/influxdb-grafana-controller.yaml
@@ -29,7 +29,7 @@ spec:
operator: "Exists"
containers:
- name: influxdb
- image: gcr.io/google_containers/heapster-influxdb-amd64:v1.3.3
+ image: k8s.gcr.io/heapster-influxdb-amd64:v1.3.3
resources:
limits:
cpu: 100m
@@ -46,7 +46,7 @@ spec:
- name: influxdb-persistent-storage
mountPath: /data
- name: grafana
- image: gcr.io/google_containers/heapster-grafana-amd64:v4.4.3
+ image: k8s.gcr.io/heapster-grafana-amd64:v4.4.3
env:
resources:
# keep request = limit to keep this container in guaranteed class
diff --git a/cluster/addons/cluster-monitoring/stackdriver/heapster-controller.yaml b/cluster/addons/cluster-monitoring/stackdriver/heapster-controller.yaml
index c035d51a7a..f4943654d7 100644
--- a/cluster/addons/cluster-monitoring/stackdriver/heapster-controller.yaml
+++ b/cluster/addons/cluster-monitoring/stackdriver/heapster-controller.yaml
@@ -45,7 +45,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
containers:
- - image: gcr.io/google_containers/heapster-amd64:v1.5.0
+ - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster
livenessProbe:
httpGet:
@@ -60,7 +60,7 @@ spec:
- --sink=stackdriver:?cluster_name={{ cluster_name }}&use_old_resources={{ use_old_resources }}&use_new_resources={{ use_new_resources }}&min_interval_sec=100&batch_export_timeout_sec=110
# BEGIN_PROMETHEUS_TO_SD
- name: prom-to-sd
- image: gcr.io/google-containers/prometheus-to-sd:v0.2.2
+ image: k8s.gcr.io/prometheus-to-sd:v0.2.2
command:
- /monitor
- --source=heapster:http://localhost:8082?whitelisted=stackdriver_requests_count,stackdriver_timeseries_count
@@ -78,7 +78,7 @@ spec:
fieldRef:
fieldPath: metadata.namespace
# END_PROMETHEUS_TO_SD
- - image: gcr.io/google_containers/addon-resizer:1.8.1
+ - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny
resources:
limits:
diff --git a/cluster/addons/cluster-monitoring/standalone/heapster-controller.yaml b/cluster/addons/cluster-monitoring/standalone/heapster-controller.yaml
index ff994966d5..c3f9f8ce61 100644
--- a/cluster/addons/cluster-monitoring/standalone/heapster-controller.yaml
+++ b/cluster/addons/cluster-monitoring/standalone/heapster-controller.yaml
@@ -45,7 +45,7 @@ spec:
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
containers:
- - image: gcr.io/google_containers/heapster-amd64:v1.5.0
+ - image: k8s.gcr.io/heapster-amd64:v1.5.0
name: heapster
livenessProbe:
httpGet:
@@ -57,7 +57,7 @@ spec:
command:
- /heapster
- --source=kubernetes.summary_api:''
- - image: gcr.io/google_containers/addon-resizer:1.8.1
+ - image: k8s.gcr.io/addon-resizer:1.8.1
name: heapster-nanny
resources:
limits:
diff --git a/cluster/addons/dashboard/dashboard-controller.yaml b/cluster/addons/dashboard/dashboard-controller.yaml
index 0c7ca6b5d8..5a2377620b 100644
--- a/cluster/addons/dashboard/dashboard-controller.yaml
+++ b/cluster/addons/dashboard/dashboard-controller.yaml
@@ -29,7 +29,7 @@ spec:
spec:
containers:
- name: kubernetes-dashboard
- image: gcr.io/google_containers/kubernetes-dashboard-amd64:v1.8.0
+ image: k8s.gcr.io/kubernetes-dashboard-amd64:v1.8.0
resources:
limits:
cpu: 100m
diff --git a/cluster/addons/device-plugins/nvidia-gpu/daemonset.yaml b/cluster/addons/device-plugins/nvidia-gpu/daemonset.yaml
index 5b157548c1..c66e0e0d37 100644
--- a/cluster/addons/device-plugins/nvidia-gpu/daemonset.yaml
+++ b/cluster/addons/device-plugins/nvidia-gpu/daemonset.yaml
@@ -36,7 +36,7 @@ spec:
hostPath:
path: /dev
containers:
- - image: "gcr.io/google-containers/nvidia-gpu-device-plugin@sha256:0e79da6998a61257585e0d3fb5848240129f0fa5b4ad972dfed4049448093c33"
+ - image: "k8s.gcr.io/nvidia-gpu-device-plugin@sha256:0e79da6998a61257585e0d3fb5848240129f0fa5b4ad972dfed4049448093c33"
command: ["/usr/bin/nvidia-gpu-device-plugin", "-logtostderr"]
name: nvidia-gpu-device-plugin
resources:
diff --git a/cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml b/cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml
index cd89c6cd3f..dc638e44dc 100644
--- a/cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml
+++ b/cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml
@@ -80,7 +80,7 @@ spec:
spec:
containers:
- name: autoscaler
- image: gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2-r2
+ image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2
resources:
requests:
cpu: "20m"
diff --git a/cluster/addons/dns/kube-dns.yaml.base b/cluster/addons/dns/kube-dns.yaml.base
index edf77c3569..ffd13ed47b 100644
--- a/cluster/addons/dns/kube-dns.yaml.base
+++ b/cluster/addons/dns/kube-dns.yaml.base
@@ -94,7 +94,7 @@ spec:
optional: true
containers:
- name: kubedns
- image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.8
+ image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.8
resources:
# TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in
@@ -145,7 +145,7 @@ spec:
- name: kube-dns-config
mountPath: /kube-dns-config
- name: dnsmasq
- image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.8
+ image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.8
livenessProbe:
httpGet:
path: /healthcheck/dnsmasq
@@ -184,7 +184,7 @@ spec:
- name: kube-dns-config
mountPath: /etc/k8s/dns/dnsmasq-nanny
- name: sidecar
- image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.8
+ image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.8
livenessProbe:
httpGet:
path: /metrics
diff --git a/cluster/addons/dns/kube-dns.yaml.in b/cluster/addons/dns/kube-dns.yaml.in
index ea20f6d0ff..c3698a4877 100644
--- a/cluster/addons/dns/kube-dns.yaml.in
+++ b/cluster/addons/dns/kube-dns.yaml.in
@@ -94,7 +94,7 @@ spec:
optional: true
containers:
- name: kubedns
- image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.8
+ image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.8
resources:
# TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in
@@ -145,7 +145,7 @@ spec:
- name: kube-dns-config
mountPath: /kube-dns-config
- name: dnsmasq
- image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.8
+ image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.8
livenessProbe:
httpGet:
path: /healthcheck/dnsmasq
@@ -184,7 +184,7 @@ spec:
- name: kube-dns-config
mountPath: /etc/k8s/dns/dnsmasq-nanny
- name: sidecar
- image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.8
+ image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.8
livenessProbe:
httpGet:
path: /metrics
diff --git a/cluster/addons/dns/kube-dns.yaml.sed b/cluster/addons/dns/kube-dns.yaml.sed
index af5772fc34..3d44112eba 100644
--- a/cluster/addons/dns/kube-dns.yaml.sed
+++ b/cluster/addons/dns/kube-dns.yaml.sed
@@ -94,7 +94,7 @@ spec:
optional: true
containers:
- name: kubedns
- image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.8
+ image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.8
resources:
# TODO: Set memory limits when we've profiled the container for large
# clusters, then set request = limit to keep this container in
@@ -145,7 +145,7 @@ spec:
- name: kube-dns-config
mountPath: /kube-dns-config
- name: dnsmasq
- image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.8
+ image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.8
livenessProbe:
httpGet:
path: /healthcheck/dnsmasq
@@ -184,7 +184,7 @@ spec:
- name: kube-dns-config
mountPath: /etc/k8s/dns/dnsmasq-nanny
- name: sidecar
- image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.8
+ image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.8
livenessProbe:
httpGet:
path: /metrics
diff --git a/cluster/addons/etcd-empty-dir-cleanup/etcd-empty-dir-cleanup.yaml b/cluster/addons/etcd-empty-dir-cleanup/etcd-empty-dir-cleanup.yaml
index e6ca6f9e2c..dd14bdc9bd 100644
--- a/cluster/addons/etcd-empty-dir-cleanup/etcd-empty-dir-cleanup.yaml
+++ b/cluster/addons/etcd-empty-dir-cleanup/etcd-empty-dir-cleanup.yaml
@@ -23,4 +23,4 @@ spec:
dnsPolicy: Default
containers:
- name: etcd-empty-dir-cleanup
- image: gcr.io/google-containers/etcd-empty-dir-cleanup:3.1.10.0
+ image: k8s.gcr.io/etcd-empty-dir-cleanup:3.1.10.0
diff --git a/cluster/addons/fluentd-elasticsearch/es-image/Makefile b/cluster/addons/fluentd-elasticsearch/es-image/Makefile
index 51222ad380..28f55a4a4a 100755
--- a/cluster/addons/fluentd-elasticsearch/es-image/Makefile
+++ b/cluster/addons/fluentd-elasticsearch/es-image/Makefile
@@ -14,7 +14,7 @@
.PHONY: binary build push
-PREFIX = gcr.io/google-containers
+PREFIX = staging-k8s.gcr.io
IMAGE = elasticsearch
TAG = v5.6.4
diff --git a/cluster/addons/fluentd-elasticsearch/es-statefulset.yaml b/cluster/addons/fluentd-elasticsearch/es-statefulset.yaml
index 5aea165ee0..36adf38831 100644
--- a/cluster/addons/fluentd-elasticsearch/es-statefulset.yaml
+++ b/cluster/addons/fluentd-elasticsearch/es-statefulset.yaml
@@ -73,7 +73,7 @@ spec:
spec:
serviceAccountName: elasticsearch-logging
containers:
- - image: gcr.io/google-containers/elasticsearch:v5.6.4
+ - image: k8s.gcr.io/elasticsearch:v5.6.4
name: elasticsearch-logging
resources:
# need more cpu upon initialization, therefore burstable class
diff --git a/cluster/addons/fluentd-elasticsearch/fluentd-es-ds.yaml b/cluster/addons/fluentd-elasticsearch/fluentd-es-ds.yaml
index f390b3890a..bd2d6d2558 100644
--- a/cluster/addons/fluentd-elasticsearch/fluentd-es-ds.yaml
+++ b/cluster/addons/fluentd-elasticsearch/fluentd-es-ds.yaml
@@ -75,7 +75,7 @@ spec:
serviceAccountName: fluentd-es
containers:
- name: fluentd-es
- image: gcr.io/google-containers/fluentd-elasticsearch:v2.0.4
+ image: k8s.gcr.io/fluentd-elasticsearch:v2.0.4
env:
- name: FLUENTD_ARGS
value: --no-supervisor -q
diff --git a/cluster/addons/fluentd-elasticsearch/fluentd-es-image/Makefile b/cluster/addons/fluentd-elasticsearch/fluentd-es-image/Makefile
index 651e6e0d50..3e07bdeb35 100644
--- a/cluster/addons/fluentd-elasticsearch/fluentd-es-image/Makefile
+++ b/cluster/addons/fluentd-elasticsearch/fluentd-es-image/Makefile
@@ -14,7 +14,7 @@
.PHONY: build push
-PREFIX = gcr.io/google-containers
+PREFIX = staging-k8s.gcr.io
IMAGE = fluentd-elasticsearch
TAG = v2.0.4
diff --git a/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md b/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md
index 8b97511a00..9a651d522f 100644
--- a/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md
+++ b/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md
@@ -4,11 +4,11 @@ that collects Docker container log files using [Fluentd][fluentd]
and sends them to an instance of [Elasticsearch][elasticsearch].
This image is designed to be used as part of the [Kubernetes][kubernetes]
cluster bring up process. The image resides at GCR under the name
-[gcr.io/google-containers/fluentd-elasticsearch][image].
+[k8s.gcr.io/fluentd-elasticsearch][image].
[fluentd]: http://www.fluentd.org/
[elasticsearch]: https://www.elastic.co/products/elasticsearch
[kubernetes]: https://kubernetes.io
-[image]: https://gcr.io/google-containers/fluentd-elasticsearch
+[image]: https://k8s.gcr.io/fluentd-elasticsearch
[![Analytics](https://kubernetes-site.appspot.com/UA-36037335-10/GitHub/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md?pixel)]()
diff --git a/cluster/addons/fluentd-gcp/event-exporter.yaml b/cluster/addons/fluentd-gcp/event-exporter.yaml
index 246fa8c42b..6321b3844f 100644
--- a/cluster/addons/fluentd-gcp/event-exporter.yaml
+++ b/cluster/addons/fluentd-gcp/event-exporter.yaml
@@ -47,12 +47,12 @@ spec:
serviceAccountName: event-exporter-sa
containers:
- name: event-exporter
- image: gcr.io/google-containers/event-exporter:v0.1.7
+ image: k8s.gcr.io/event-exporter:v0.1.7
command:
- '/event-exporter'
# BEGIN_PROMETHEUS_TO_SD
- name: prometheus-to-sd-exporter
- image: gcr.io/google-containers/prometheus-to-sd:v0.2.2
+ image: k8s.gcr.io/prometheus-to-sd:v0.2.2
command:
- /monitor
- --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons
diff --git a/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml b/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml
index 130e84aacc..118de635a4 100644
--- a/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml
+++ b/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml
@@ -27,7 +27,7 @@ spec:
dnsPolicy: Default
containers:
- name: fluentd-gcp
- image: gcr.io/google-containers/fluentd-gcp:2.0.14
+ image: k8s.gcr.io/fluentd-gcp:2.0.14
env:
- name: FLUENTD_ARGS
value: --no-supervisor -q
@@ -82,7 +82,7 @@ spec:
fi;
# BEGIN_PROMETHEUS_TO_SD
- name: prometheus-to-sd-exporter
- image: gcr.io/google-containers/prometheus-to-sd:v0.2.2
+ image: k8s.gcr.io/prometheus-to-sd:v0.2.2
command:
- /monitor
- --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons
diff --git a/cluster/addons/ip-masq-agent/ip-masq-agent.yaml b/cluster/addons/ip-masq-agent/ip-masq-agent.yaml
index f6bb21c01b..c27a802cb7 100644
--- a/cluster/addons/ip-masq-agent/ip-masq-agent.yaml
+++ b/cluster/addons/ip-masq-agent/ip-masq-agent.yaml
@@ -28,7 +28,7 @@ spec:
hostNetwork: true
containers:
- name: ip-masq-agent
- image: gcr.io/google-containers/ip-masq-agent-amd64:v2.0.2
+ image: k8s.gcr.io/ip-masq-agent-amd64:v2.0.2
resources:
requests:
cpu: 10m
diff --git a/cluster/addons/metadata-proxy/gce/metadata-proxy.yaml b/cluster/addons/metadata-proxy/gce/metadata-proxy.yaml
index e537a7ff16..22e84bb204 100644
--- a/cluster/addons/metadata-proxy/gce/metadata-proxy.yaml
+++ b/cluster/addons/metadata-proxy/gce/metadata-proxy.yaml
@@ -38,7 +38,7 @@ spec:
dnsPolicy: Default
containers:
- name: metadata-proxy
- image: gcr.io/google_containers/metadata-proxy:v0.1.9
+ image: k8s.gcr.io/metadata-proxy:v0.1.9
securityContext:
privileged: true
# Request and limit resources to get guaranteed QoS.
@@ -51,7 +51,7 @@ spec:
cpu: "30m"
# BEGIN_PROMETHEUS_TO_SD
- name: prometheus-to-sd-exporter
- image: gcr.io/google_containers/prometheus-to-sd:v0.2.2
+ image: k8s.gcr.io/prometheus-to-sd:v0.2.2
# Request and limit resources to get guaranteed QoS.
resources:
requests:
diff --git a/cluster/addons/metrics-server/metrics-server-deployment.yaml b/cluster/addons/metrics-server/metrics-server-deployment.yaml
index 1ed7dbc728..b5c087b12c 100644
--- a/cluster/addons/metrics-server/metrics-server-deployment.yaml
+++ b/cluster/addons/metrics-server/metrics-server-deployment.yaml
@@ -47,7 +47,7 @@ spec:
serviceAccountName: metrics-server
containers:
- name: metrics-server
- image: gcr.io/google_containers/metrics-server-amd64:v0.2.1
+ image: k8s.gcr.io/metrics-server-amd64:v0.2.1
command:
- /metrics-server
- --source=kubernetes.summary_api:''
@@ -56,7 +56,7 @@ spec:
name: https
protocol: TCP
- name: metrics-server-nanny
- image: gcr.io/google_containers/addon-resizer:1.8.1
+ image: k8s.gcr.io/addon-resizer:1.8.1
resources:
limits:
cpu: 100m
diff --git a/cluster/addons/node-problem-detector/npd.yaml b/cluster/addons/node-problem-detector/npd.yaml
index 87365ad17f..714125ea58 100644
--- a/cluster/addons/node-problem-detector/npd.yaml
+++ b/cluster/addons/node-problem-detector/npd.yaml
@@ -43,7 +43,7 @@ spec:
spec:
containers:
- name: node-problem-detector
- image: gcr.io/google_containers/node-problem-detector:v0.4.1
+ image: k8s.gcr.io/node-problem-detector:v0.4.1
command:
- "/bin/sh"
- "-c"
diff --git a/cluster/addons/python-image/Makefile b/cluster/addons/python-image/Makefile
index 6da4f7d3ce..f23f924706 100644
--- a/cluster/addons/python-image/Makefile
+++ b/cluster/addons/python-image/Makefile
@@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-IMAGE=gcr.io/google_containers/python
+IMAGE=staging-k8s.gcr.io/python
VERSION=v1
.PHONY: build push
diff --git a/cluster/gce/config-test.sh b/cluster/gce/config-test.sh
index b3490014ec..93d254a1b8 100755
--- a/cluster/gce/config-test.sh
+++ b/cluster/gce/config-test.sh
@@ -149,7 +149,7 @@ ENABLE_METRICS_SERVER="${KUBE_ENABLE_METRICS_SERVER:-true}"
# Useful for scheduling heapster in large clusters with nodes of small size.
HEAPSTER_MACHINE_TYPE="${HEAPSTER_MACHINE_TYPE:-}"
-# Set etcd image (e.g. gcr.io/google_containers/etcd) and version (e.g. 3.2.14) if you need
+# Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.2.14) if you need
# non-default version.
ETCD_IMAGE="${TEST_ETCD_IMAGE:-}"
ETCD_DOCKER_REPOSITORY="${TEST_ETCD_DOCKER_REPOSITORY:-}"
diff --git a/cluster/gce/gci/configure-helper.sh b/cluster/gce/gci/configure-helper.sh
index fed87cfba3..b80d868f26 100644
--- a/cluster/gce/gci/configure-helper.sh
+++ b/cluster/gce/gci/configure-helper.sh
@@ -1288,7 +1288,7 @@ function prepare-kube-proxy-manifest-variables {
local -r src_file=$1;
local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig"
- local kube_docker_registry="gcr.io/google_containers"
+ local kube_docker_registry="k8s.gcr.io"
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
kube_docker_registry=${KUBE_DOCKER_REGISTRY}
fi
@@ -1462,7 +1462,7 @@ function compute-master-manifest-variables {
CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}},"
CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true},"
fi
- DOCKER_REGISTRY="gcr.io/google_containers"
+ DOCKER_REGISTRY="k8s.gcr.io"
if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then
DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}"
fi
@@ -2325,7 +2325,7 @@ spec:
- name: vol
containers:
- name: pv-recycler
- image: gcr.io/google_containers/busybox:1.27
+ image: k8s.gcr.io/busybox:1.27
command:
- /bin/sh
args:
diff --git a/cluster/gce/gci/configure.sh b/cluster/gce/gci/configure.sh
index fa5a26e676..24ab1f7466 100644
--- a/cluster/gce/gci/configure.sh
+++ b/cluster/gce/gci/configure.sh
@@ -234,12 +234,12 @@ function install-kube-manifests {
echo "Downloading k8s manifests tar"
download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}"
tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite
- local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-gcr.io/google_containers}"
- if [[ "${kube_addon_registry}" != "gcr.io/google_containers" ]]; then
+ local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-k8s.gcr.io}"
+ if [[ "${kube_addon_registry}" != "k8s.gcr.io" ]]; then
find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \
- xargs sed -ri "s@(image:\s.*)gcr.io/google_containers@\1${kube_addon_registry}@"
+ xargs sed -ri "s@(image:\s.*)k8s.gcr.io@\1${kube_addon_registry}@"
find "${dst_dir}" -name \*.manifest -or -name \*.json | \
- xargs sed -ri "s@(image\":\s+\")gcr.io/google_containers@\1${kube_addon_registry}@"
+ xargs sed -ri "s@(image\":\s+\")k8s.gcr.io@\1${kube_addon_registry}@"
fi
cp "${dst_dir}/kubernetes/gci-trusty/gci-configure-helper.sh" "${KUBE_BIN}/configure-helper.sh"
cp "${dst_dir}/kubernetes/gci-trusty/health-monitor.sh" "${KUBE_BIN}/health-monitor.sh"
diff --git a/cluster/gce/gci/mounter/Makefile b/cluster/gce/gci/mounter/Makefile
index 72efa3b77c..85ee3343d8 100644
--- a/cluster/gce/gci/mounter/Makefile
+++ b/cluster/gce/gci/mounter/Makefile
@@ -13,7 +13,7 @@
# limitations under the License.
TAG=v2
-REGISTRY=gcr.io/google_containers
+REGISTRY=staging-k8s.gcr.io
IMAGE=gci-mounter
all: container
diff --git a/cluster/gce/manifests/cluster-autoscaler.manifest b/cluster/gce/manifests/cluster-autoscaler.manifest
index 16b78f454e..f580afe48f 100644
--- a/cluster/gce/manifests/cluster-autoscaler.manifest
+++ b/cluster/gce/manifests/cluster-autoscaler.manifest
@@ -14,15 +14,15 @@
"containers": [
{
"name": "cluster-autoscaler",
- "image": "gcr.io/google_containers/cluster-autoscaler:v1.1.1",
+ "image": "k8s.gcr.io/cluster-autoscaler:v1.1.1",
"livenessProbe": {
"httpGet": {
"path": "/health-check",
"port": 8085
- },
+ },
"initialDelaySeconds": 600,
"periodSeconds": 60
- },
+ },
"command": [
"./run.sh",
"--kubernetes=http://127.0.0.1:8080?inClusterConfig=f",
diff --git a/cluster/gce/manifests/e2e-image-puller.manifest b/cluster/gce/manifests/e2e-image-puller.manifest
index 5266508500..0351558258 100644
--- a/cluster/gce/manifests/e2e-image-puller.manifest
+++ b/cluster/gce/manifests/e2e-image-puller.manifest
@@ -14,13 +14,13 @@ spec:
cpu: 100m
limits:
cpu: 100m
- image: gcr.io/google_containers/busybox:1.24
+ image: k8s.gcr.io/busybox:1.24
# TODO: Replace this with a go script that pulls in parallel?
# Currently it takes ~5m to pull all e2e images, so this is OK, and
# fewer moving parts is always better.
# TODO: Replace the hardcoded image list with an autogen list; the list is
# currently hard-coded for static verification. It was generated via:
- # grep -Iiroh "gcr.io/google_.*" "${KUBE_ROOT}/test/e2e" | \
+ # grep -Iiroh "gcr.io/.*" "${KUBE_ROOT}/test/e2e" | \
# sed -e "s/[,\")}]//g" | awk '{print $1}' | sort | uniq | tr '\n' ' '
# We always want the subshell to exit 0 so this pod doesn't end up
# blocking tests in an Error state.
@@ -29,52 +29,52 @@ spec:
- -c
- >
for i in
- gcr.io/google_containers/alpine-with-bash:1.0
- gcr.io/google_containers/apparmor-loader:0.1
- gcr.io/google_containers/busybox:1.24
- gcr.io/google_containers/dnsutils:e2e
- gcr.io/google_containers/e2e-net-amd64:1.0
- gcr.io/google_containers/echoserver:1.6
- gcr.io/google_containers/eptest:0.1
- gcr.io/google_containers/fakegitserver:0.1
- gcr.io/google_containers/galera-install:0.1
- gcr.io/google_containers/invalid-image:invalid-tag
- gcr.io/google_containers/iperf:e2e
- gcr.io/google_containers/jessie-dnsutils:e2e
- gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.14.5
- gcr.io/google_containers/liveness:e2e
- gcr.io/google_containers/logs-generator:v0.1.0
- gcr.io/google_containers/mounttest:0.8
- gcr.io/google_containers/mounttest-user:0.5
- gcr.io/google_containers/mysql-galera:e2e
- gcr.io/google_containers/mysql-healthz:1.0
- gcr.io/google_containers/netexec:1.4
- gcr.io/google_containers/netexec:1.5
- gcr.io/google_containers/netexec:1.7
- gcr.io/google_containers/nettest:1.7
- gcr.io/google_containers/nginx:1.7.9
- gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.1
- gcr.io/google_containers/nginx-slim:0.7
- gcr.io/google_containers/nginx-slim:0.8
- gcr.io/google_containers/node-problem-detector:v0.3.0
- gcr.io/google_containers/pause
- gcr.io/google_containers/porter:4524579c0eb935c056c8e75563b4e1eda31587e0
- gcr.io/google_containers/portforwardtester:1.2
- gcr.io/google_containers/redis-install-3.2.0:e2e
- gcr.io/google_containers/resource_consumer:beta4
- gcr.io/google_containers/resource_consumer/controller:beta4
+ k8s.gcr.io/alpine-with-bash:1.0
+ k8s.gcr.io/apparmor-loader:0.1
+ k8s.gcr.io/busybox:1.24
+ k8s.gcr.io/dnsutils:e2e
+ k8s.gcr.io/e2e-net-amd64:1.0
+ k8s.gcr.io/echoserver:1.6
+ k8s.gcr.io/eptest:0.1
+ k8s.gcr.io/fakegitserver:0.1
+ k8s.gcr.io/galera-install:0.1
+ k8s.gcr.io/invalid-image:invalid-tag
+ k8s.gcr.io/iperf:e2e
+ k8s.gcr.io/jessie-dnsutils:e2e
+ k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.5
+ k8s.gcr.io/liveness:e2e
+ k8s.gcr.io/logs-generator:v0.1.0
+ k8s.gcr.io/mounttest:0.8
+ k8s.gcr.io/mounttest-user:0.5
+ k8s.gcr.io/mysql-galera:e2e
+ k8s.gcr.io/mysql-healthz:1.0
+ k8s.gcr.io/netexec:1.4
+ k8s.gcr.io/netexec:1.5
+ k8s.gcr.io/netexec:1.7
+ k8s.gcr.io/nettest:1.7
+ k8s.gcr.io/nginx:1.7.9
+ k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.1
+ k8s.gcr.io/nginx-slim:0.7
+ k8s.gcr.io/nginx-slim:0.8
+ k8s.gcr.io/node-problem-detector:v0.3.0
+ k8s.gcr.io/pause
+ k8s.gcr.io/porter:4524579c0eb935c056c8e75563b4e1eda31587e0
+ k8s.gcr.io/portforwardtester:1.2
+ k8s.gcr.io/redis-install-3.2.0:e2e
+ k8s.gcr.io/resource_consumer:beta4
+ k8s.gcr.io/resource_consumer/controller:beta4
gcr.io/kubernetes-e2e-test-images/serve-hostname-amd64:1.1
gcr.io/kubernetes-e2e-test-images/hostexec-amd64:1.1
- gcr.io/google_containers/servicelb:0.1
- gcr.io/google_containers/test-webserver:e2e
- gcr.io/google_containers/update-demo:kitten
- gcr.io/google_containers/update-demo:nautilus
- gcr.io/google_containers/volume-ceph:0.1
- gcr.io/google_containers/volume-gluster:0.2
- gcr.io/google_containers/volume-iscsi:0.1
- gcr.io/google_containers/volume-nfs:0.8
- gcr.io/google_containers/volume-rbd:0.1
- gcr.io/google_containers/zookeeper-install-3.5.0-alpha:e2e
+ k8s.gcr.io/servicelb:0.1
+ k8s.gcr.io/test-webserver:e2e
+ k8s.gcr.io/update-demo:kitten
+ k8s.gcr.io/update-demo:nautilus
+ k8s.gcr.io/volume-ceph:0.1
+ k8s.gcr.io/volume-gluster:0.2
+ k8s.gcr.io/volume-iscsi:0.1
+ k8s.gcr.io/volume-nfs:0.8
+ k8s.gcr.io/volume-rbd:0.1
+ k8s.gcr.io/zookeeper-install-3.5.0-alpha:e2e
gcr.io/google_samples/gb-redisslave:nonexistent
; do echo $(date '+%X') pulling $i; docker pull $i 1>/dev/null; done; exit 0;
securityContext:
@@ -91,7 +91,7 @@ spec:
cpu: 100m
limits:
cpu: 100m
- image: gcr.io/google_containers/kube-nethealth-amd64:1.0
+ image: k8s.gcr.io/kube-nethealth-amd64:1.0
command:
- /bin/sh
- -c
diff --git a/cluster/gce/manifests/etcd.manifest b/cluster/gce/manifests/etcd.manifest
index 25b2484752..8fbc0afcc1 100644
--- a/cluster/gce/manifests/etcd.manifest
+++ b/cluster/gce/manifests/etcd.manifest
@@ -13,7 +13,7 @@
"containers":[
{
"name": "etcd-container",
- "image": "{{ pillar.get('etcd_docker_repository', 'gcr.io/google_containers/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.2.14') }}",
+ "image": "{{ pillar.get('etcd_docker_repository', 'k8s.gcr.io/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.2.14') }}",
"resources": {
"requests": {
"cpu": {{ cpulimit }}
diff --git a/cluster/gce/manifests/glbc.manifest b/cluster/gce/manifests/glbc.manifest
index 3fbf2f6d42..07ea32936c 100644
--- a/cluster/gce/manifests/glbc.manifest
+++ b/cluster/gce/manifests/glbc.manifest
@@ -13,7 +13,7 @@ spec:
terminationGracePeriodSeconds: 600
hostNetwork: true
containers:
- - image: gcr.io/google_containers/glbc:0.9.7
+ - image: k8s.gcr.io/glbc:0.9.7
livenessProbe:
httpGet:
path: /healthz
diff --git a/cluster/gce/manifests/kube-addon-manager.yaml b/cluster/gce/manifests/kube-addon-manager.yaml
index 7c8192b6c8..0e852f62be 100644
--- a/cluster/gce/manifests/kube-addon-manager.yaml
+++ b/cluster/gce/manifests/kube-addon-manager.yaml
@@ -13,7 +13,7 @@ spec:
- name: kube-addon-manager
# When updating version also bump it in:
# - test/kubemark/resources/manifests/kube-addon-manager.yaml
- image: gcr.io/google-containers/kube-addon-manager:v8.5
+ image: k8s.gcr.io/kube-addon-manager:v8.5
command:
- /bin/bash
- -c
diff --git a/cluster/gce/manifests/rescheduler.manifest b/cluster/gce/manifests/rescheduler.manifest
index 584d35ca79..b496449a78 100644
--- a/cluster/gce/manifests/rescheduler.manifest
+++ b/cluster/gce/manifests/rescheduler.manifest
@@ -13,7 +13,7 @@ metadata:
spec:
hostNetwork: true
containers:
- - image: gcr.io/google-containers/rescheduler:v0.3.1
+ - image: k8s.gcr.io/rescheduler:v0.3.1
name: rescheduler
volumeMounts:
- mountPath: /var/log/rescheduler.log
diff --git a/cluster/gce/util.sh b/cluster/gce/util.sh
index 795904ed9a..8893f7ac69 100755
--- a/cluster/gce/util.sh
+++ b/cluster/gce/util.sh
@@ -210,7 +210,6 @@ function copy-to-staging() {
# ZONE
# Vars set:
# PREFERRED_REGION
-# KUBE_ADDON_REGISTRY
function set-preferred-region() {
case ${ZONE} in
asia-*)
@@ -223,26 +222,12 @@ function set-preferred-region() {
PREFERRED_REGION=("us" "eu" "asia")
;;
esac
- local -r preferred="${PREFERRED_REGION[0]}"
if [[ "${RELEASE_REGION_FALLBACK}" != "true" ]]; then
- PREFERRED_REGION=( "${preferred}" )
- fi
-
- # If we're using regional GCR, and we're outside the US, go to the
- # regional registry. The gcr.io/google_containers registry is
- # appropriate for US (for now).
- if [[ "${REGIONAL_KUBE_ADDONS}" == "true" ]] && [[ "${preferred}" != "us" ]]; then
- KUBE_ADDON_REGISTRY="${preferred}.gcr.io/google_containers"
- else
- KUBE_ADDON_REGISTRY="gcr.io/google_containers"
+ PREFERRED_REGION=( "${PREFERRED_REGION[0]}" )
fi
}
-if [[ "${ENABLE_DOCKER_REGISTRY_CACHE:-}" == "true" ]]; then
- DOCKER_REGISTRY_MIRROR_URL="https://mirror.gcr.io"
-fi
-
# Take the local tar files and upload them to Google Storage. They will then be
# downloaded by the master as part of the start up script for the master.
#
@@ -275,6 +260,10 @@ function upload-server-tars() {
set-preferred-region
+ if [[ "${ENABLE_DOCKER_REGISTRY_CACHE:-}" == "true" ]]; then
+ DOCKER_REGISTRY_MIRROR_URL="https://mirror.gcr.io"
+ fi
+
SERVER_BINARY_TAR_HASH=$(sha1sum-file "${SERVER_BINARY_TAR}")
if [[ -n "${KUBE_MANIFESTS_TAR:-}" ]]; then
KUBE_MANIFESTS_TAR_HASH=$(sha1sum-file "${KUBE_MANIFESTS_TAR}")
diff --git a/cluster/get-kube-local.sh b/cluster/get-kube-local.sh
index 972ebce6d7..21a8243dd9 100755
--- a/cluster/get-kube-local.sh
+++ b/cluster/get-kube-local.sh
@@ -97,7 +97,7 @@ function create_cluster {
--pid=host \
--privileged=true \
-d \
- gcr.io/google_containers/hyperkube-${arch}:${release} \
+ k8s.gcr.io/hyperkube-${arch}:${release} \
/hyperkube kubelet \
--containerized \
--hostname-override="127.0.0.1" \
diff --git a/cluster/images/etcd-empty-dir-cleanup/Makefile b/cluster/images/etcd-empty-dir-cleanup/Makefile
index 0fc6994af3..3c6c1c89ba 100644
--- a/cluster/images/etcd-empty-dir-cleanup/Makefile
+++ b/cluster/images/etcd-empty-dir-cleanup/Makefile
@@ -15,7 +15,7 @@
.PHONY: build push
ETCD_VERSION = 3.1.10
-IMAGE = gcr.io/google-containers/etcd-empty-dir-cleanup
+IMAGE = staging-k8s.gcr.io/etcd-empty-dir-cleanup
TAG = 3.1.10.0
clean:
diff --git a/cluster/images/etcd-version-monitor/Makefile b/cluster/images/etcd-version-monitor/Makefile
index e061b90015..32921579f3 100644
--- a/cluster/images/etcd-version-monitor/Makefile
+++ b/cluster/images/etcd-version-monitor/Makefile
@@ -15,11 +15,11 @@
# Build the etcd-version-monitor image
#
# Usage:
-# [GOLANG_VERSION=1.8.3] [REGISTRY=gcr.io/google-containers] [TAG=test] make (build|push)
+# [GOLANG_VERSION=1.8.3] [REGISTRY=staging-k8s.gcr.io] [TAG=test] make (build|push)
# TODO(shyamjvs): Support architectures other than amd64 if needed.
ARCH:=amd64
GOLANG_VERSION?=1.8.3
-REGISTRY?=gcr.io/google-containers
+REGISTRY?=staging-k8s.gcr.io
TAG?=0.1.1
IMAGE:=$(REGISTRY)/etcd-version-monitor:$(TAG)
CURRENT_DIR:=$(pwd)
@@ -30,8 +30,12 @@ build:
cp etcd-version-monitor.go Dockerfile $(TEMP_DIR)
# Compile etcd-version-monitor.
- docker run -it -v $(shell pwd)/../../../:/go/src/k8s.io/kubernetes -v $(TEMP_DIR):/build -e GOARCH=$(ARCH) golang:$(GOLANG_VERSION) \
- /bin/bash -c "CGO_ENABLED=0 go build -o /build/etcd-version-monitor k8s.io/kubernetes/cluster/images/etcd-version-monitor"
+ docker run -it \
+ -v $(shell pwd)/../../../:/go/src/k8s.io/kubernetes \
+ -v $(TEMP_DIR):/build \
+ -e GOARCH=$(ARCH) \
+ golang:$(GOLANG_VERSION) \
+ /bin/bash -c "CGO_ENABLED=0 go build -o /build/etcd-version-monitor k8s.io/kubernetes/cluster/images/etcd-version-monitor"
docker build -t $(IMAGE) $(TEMP_DIR)
diff --git a/cluster/images/etcd-version-monitor/README.md b/cluster/images/etcd-version-monitor/README.md
index adacfb2ca3..727ff7b2a2 100644
--- a/cluster/images/etcd-version-monitor/README.md
+++ b/cluster/images/etcd-version-monitor/README.md
@@ -18,7 +18,7 @@ latency metrics (`etcd_grpc_unary_requests_duration_seconds`) to be exposed.
To run this tool as a docker container:
- make build
-- docker run --net=host -i -t gcr.io/google_containers/etcd-version-monitor:test /etcd-version-monitor --logtostderr
+- docker run --net=host -i -t k8s.gcr.io/etcd-version-monitor:test /etcd-version-monitor --logtostderr
To run this as a pod on the kubernetes cluster:
- Place the 'etcd-version-monitor.yaml' in the manifests directory of
diff --git a/cluster/images/etcd-version-monitor/etcd-version-monitor.yaml b/cluster/images/etcd-version-monitor/etcd-version-monitor.yaml
index 49f1db3981..f632ac2ed6 100644
--- a/cluster/images/etcd-version-monitor/etcd-version-monitor.yaml
+++ b/cluster/images/etcd-version-monitor/etcd-version-monitor.yaml
@@ -7,7 +7,7 @@ spec:
hostNetwork: true
containers:
- name: etcd-version-monitor
- image: gcr.io/google-containers/etcd-version-monitor:0.1.0
+ image: k8s.gcr.io/etcd-version-monitor:0.1.0
command:
- /etcd-version-monitor
- --logtostderr
diff --git a/cluster/images/etcd/Makefile b/cluster/images/etcd/Makefile
index d63614c397..401811cad1 100644
--- a/cluster/images/etcd/Makefile
+++ b/cluster/images/etcd/Makefile
@@ -15,7 +15,7 @@
# Build the etcd image
#
# Usage:
-# [TAGS=2.2.1 2.3.7 3.0.17 3.1.11 3.2.14] [REGISTRY=gcr.io/google_containers] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push)
+# [TAGS=2.2.1 2.3.7 3.0.17 3.1.11 3.2.14] [REGISTRY=k8s.gcr.io] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push)
# The image contains different etcd versions to simplify
# upgrades. Thus be careful when removing any tag from here.
@@ -29,7 +29,7 @@
TAGS?=2.2.1 2.3.7 3.0.17 3.1.11 3.2.14
REGISTRY_TAG?=3.2.14
ARCH?=amd64
-REGISTRY?=gcr.io/google_containers
+REGISTRY?=k8s.gcr.io
# golang version should match the golang version from https://github.com/coreos/etcd/releases for REGISTRY_TAG version of etcd.
GOLANG_VERSION?=1.8.5
GOARM=7
diff --git a/cluster/images/etcd/README.md b/cluster/images/etcd/README.md
index e7dfde8bf6..df5cfe5b3d 100644
--- a/cluster/images/etcd/README.md
+++ b/cluster/images/etcd/README.md
@@ -10,20 +10,20 @@ For other architectures, `etcd` is cross-compiled from source. Arch-specific `bu
```console
# Build for linux/amd64 (default)
$ make push ARCH=amd64
-# ---> gcr.io/google_containers/etcd-amd64:TAG
-# ---> gcr.io/google_containers/etcd:TAG
+# ---> staging-k8s.gcr.io/etcd-amd64:TAG
+# ---> staging-k8s.gcr.io/etcd:TAG
$ make push ARCH=arm
-# ---> gcr.io/google_containers/etcd-arm:TAG
+# ---> staging-k8s.gcr.io/etcd-arm:TAG
$ make push ARCH=arm64
-# ---> gcr.io/google_containers/etcd-arm64:TAG
+# ---> staging-k8s.gcr.io/etcd-arm64:TAG
$ make push ARCH=ppc64le
-# ---> gcr.io/google_containers/etcd-ppc64le:TAG
+# ---> staging-k8s.gcr.io/etcd-ppc64le:TAG
$ make push ARCH=s390x
-# ---> gcr.io/google_containers/etcd-s390x:TAG
+# ---> staging-k8s.gcr.io/etcd-s390x:TAG
```
If you don't want to push the images, run `make` or `make build` instead
diff --git a/cluster/images/hyperkube/BUILD b/cluster/images/hyperkube/BUILD
index 6ca2ff6d61..9d77f735a2 100644
--- a/cluster/images/hyperkube/BUILD
+++ b/cluster/images/hyperkube/BUILD
@@ -27,7 +27,7 @@ docker_build(
docker_bundle(
name = "hyperkube",
- images = {"gcr.io/google-containers/hyperkube-amd64:{STABLE_DOCKER_TAG}": "hyperkube-internal"},
+ images = {"k8s.gcr.io/hyperkube-amd64:{STABLE_DOCKER_TAG}": "hyperkube-internal"},
stamp = True,
)
diff --git a/cluster/images/hyperkube/Dockerfile b/cluster/images/hyperkube/Dockerfile
index 71d2300a04..ab90560341 100644
--- a/cluster/images/hyperkube/Dockerfile
+++ b/cluster/images/hyperkube/Dockerfile
@@ -16,7 +16,7 @@ FROM BASEIMAGE
# Create symlinks for each hyperkube server
# Also create symlinks to /usr/local/bin/ where the server image binaries live, so the hyperkube image may be
-# used instead of gcr.io/google_containers/kube-* without any modifications.
+# used instead of k8s.gcr.io/kube-* without any modifications.
# TODO: replace manual symlink creation with --make-symlink command once
# cross-building with qemu supports go binaries. See #28702
# RUN /hyperkube --make-symlinks
diff --git a/cluster/images/hyperkube/Makefile b/cluster/images/hyperkube/Makefile
index ccecb9b80e..bd2c4005e6 100644
--- a/cluster/images/hyperkube/Makefile
+++ b/cluster/images/hyperkube/Makefile
@@ -15,14 +15,14 @@
# Build the hyperkube image.
#
# Usage:
-# [ARCH=amd64] [REGISTRY="gcr.io/google-containers"] make (build|push) VERSION={some_released_version_of_kubernetes}
+# [ARCH=amd64] [REGISTRY="staging-k8s.gcr.io"] make (build|push) VERSION={some_released_version_of_kubernetes}
-REGISTRY?=gcr.io/google-containers
+REGISTRY?=staging-k8s.gcr.io
ARCH?=amd64
OUT_DIR?=_output
HYPERKUBE_BIN?=$(OUT_DIR)/dockerized/bin/linux/$(ARCH)/hyperkube
-BASEIMAGE=gcr.io/google-containers/debian-hyperkube-base-$(ARCH):0.8
+BASEIMAGE=k8s.gcr.io/debian-hyperkube-base-$(ARCH):0.8
TEMP_DIR:=$(shell mktemp -d -t hyperkubeXXXXXX)
all: build
diff --git a/cluster/images/hyperkube/README.md b/cluster/images/hyperkube/README.md
index 60fba63aa4..1bdf38682e 100644
--- a/cluster/images/hyperkube/README.md
+++ b/cluster/images/hyperkube/README.md
@@ -10,23 +10,23 @@
$ build/run.sh make cross
# Build for linux/amd64 (default)
-# export REGISTRY=$HOST/$ORG to switch from gcr.io/google_containers
+# export REGISTRY=$HOST/$ORG to switch from staging-k8s.gcr.io
$ make push VERSION={target_version} ARCH=amd64
-# ---> gcr.io/google_containers/hyperkube-amd64:VERSION
-# ---> gcr.io/google_containers/hyperkube:VERSION (image with backwards-compatible naming)
+# ---> staging-k8s.gcr.io/hyperkube-amd64:VERSION
+# ---> staging-k8s.gcr.io/hyperkube:VERSION (image with backwards-compatible naming)
$ make push VERSION={target_version} ARCH=arm
-# ---> gcr.io/google_containers/hyperkube-arm:VERSION
+# ---> staging-k8s.gcr.io/hyperkube-arm:VERSION
$ make push VERSION={target_version} ARCH=arm64
-# ---> gcr.io/google_containers/hyperkube-arm64:VERSION
+# ---> staging-k8s.gcr.io/hyperkube-arm64:VERSION
$ make push VERSION={target_version} ARCH=ppc64le
-# ---> gcr.io/google_containers/hyperkube-ppc64le:VERSION
+# ---> staging-k8s.gcr.io/hyperkube-ppc64le:VERSION
$ make push VERSION={target_version} ARCH=s390x
-# ---> gcr.io/google_containers/hyperkube-s390x:VERSION
+# ---> staging-k8s.gcr.io/hyperkube-s390x:VERSION
```
If you don't want to push the images, run `make` or `make build` instead
diff --git a/cluster/images/kubemark/BUILD b/cluster/images/kubemark/BUILD
index ce7ceb8612..c56bec980c 100644
--- a/cluster/images/kubemark/BUILD
+++ b/cluster/images/kubemark/BUILD
@@ -12,8 +12,8 @@ docker_build(
docker_push(
name = "push",
image = ":image",
- registry = "gcr.io",
- repository = "$(PROJECT)/kubemark",
+ registry = "$(REGISTRY)",
+ repository = "kubemark",
stamp = True,
tag = "latest",
tags = ["manual"],
diff --git a/cluster/images/kubemark/Makefile b/cluster/images/kubemark/Makefile
index 6786aeea24..eef4047883 100644
--- a/cluster/images/kubemark/Makefile
+++ b/cluster/images/kubemark/Makefile
@@ -15,18 +15,21 @@
# build Kubemark image from currently built binaries containing both 'real' master and Hollow Node.
# This makefile assumes that the kubemark binary is present in this directory.
-REGISTRY?=gcr.io
-PROJECT?=google_containers
+# Allow the caller to override this. Beware make's precedence. This:
+# REGISTRY=$VAR make
+# .. is not the same as:
+# make REGISTRY=$VAR
+REGISTRY := $(if $(REGISTRY),$(REGISTRY),staging-k8s.gcr.io)
all: gcloudpush
build:
- docker build --pull -t $(REGISTRY)/$(PROJECT)/kubemark .
+ docker build --pull -t $(REGISTRY)/kubemark .
gcloudpush: build
- gcloud docker -- push $(REGISTRY)/$(PROJECT)/kubemark
+ gcloud docker -- push $(REGISTRY)/kubemark
push: build
- docker -- push $(REGISTRY)/$(PROJECT)/kubemark
+ docker -- push $(REGISTRY)/kubemark
.PHONY: all build gcloudpush push
diff --git a/cluster/juju/layers/kubernetes-worker/reactive/kubernetes_worker.py b/cluster/juju/layers/kubernetes-worker/reactive/kubernetes_worker.py
index bd84c939c5..ea795e6dca 100644
--- a/cluster/juju/layers/kubernetes-worker/reactive/kubernetes_worker.py
+++ b/cluster/juju/layers/kubernetes-worker/reactive/kubernetes_worker.py
@@ -686,10 +686,10 @@ def launch_default_ingress_controller():
context['defaultbackend_image'] == "auto"):
if context['arch'] == 's390x':
context['defaultbackend_image'] = \
- "gcr.io/google_containers/defaultbackend-s390x:1.4"
+ "k8s.gcr.io/defaultbackend-s390x:1.4"
else:
context['defaultbackend_image'] = \
- "gcr.io/google_containers/defaultbackend:1.4"
+ "k8s.gcr.io/defaultbackend:1.4"
# Render the default http backend (404) replicationcontroller manifest
manifest = addon_path.format('default-http-backend.yaml')
@@ -712,7 +712,7 @@ def launch_default_ingress_controller():
"docker.io/cdkbot/nginx-ingress-controller-s390x:0.9.0-beta.13"
else:
context['ingress_image'] = \
- "gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.15" # noqa
+ "k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.15" # noqa
context['juju_application'] = hookenv.service_name()
manifest = addon_path.format('ingress-daemon-set.yaml')
render('ingress-daemon-set.yaml', manifest, context)
diff --git a/cluster/kubemark/gce/config-default.sh b/cluster/kubemark/gce/config-default.sh
index 9e6337cfa8..6d9282d061 100644
--- a/cluster/kubemark/gce/config-default.sh
+++ b/cluster/kubemark/gce/config-default.sh
@@ -62,7 +62,7 @@ TERMINATED_POD_GC_THRESHOLD=${TERMINATED_POD_GC_THRESHOLD:-100}
KUBE_APISERVER_REQUEST_TIMEOUT=300
ETCD_COMPACTION_INTERVAL_SEC="${KUBEMARK_ETCD_COMPACTION_INTERVAL_SEC:-}"
-# Set etcd image (e.g. gcr.io/google_containers/etcd) and version (e.g. 3.1.10) if you need
+# Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.1.10) if you need
# non-default version.
ETCD_IMAGE="${TEST_ETCD_IMAGE:-}"
ETCD_VERSION="${TEST_ETCD_VERSION:-}"
diff --git a/cluster/log-dump/logexporter-daemonset.yaml b/cluster/log-dump/logexporter-daemonset.yaml
index 8099da1b9d..27aafa876f 100644
--- a/cluster/log-dump/logexporter-daemonset.yaml
+++ b/cluster/log-dump/logexporter-daemonset.yaml
@@ -36,7 +36,7 @@ spec:
spec:
containers:
- name: logexporter-test
- image: gcr.io/google-containers/logexporter:v0.1.1
+ image: k8s.gcr.io/logexporter:v0.1.1
env:
- name: NODE_NAME
valueFrom:
diff --git a/cluster/restore-from-backup.sh b/cluster/restore-from-backup.sh
index ffa916d71c..d4283fcef1 100755
--- a/cluster/restore-from-backup.sh
+++ b/cluster/restore-from-backup.sh
@@ -160,7 +160,7 @@ if [ "${ETCD_API}" == "etcd2" ]; then
echo "Starting etcd ${ETCD_VERSION} to restore data"
image=$(docker run -d -v ${BACKUP_DIR}:/var/etcd/data \
--net=host -p ${etcd_port}:${etcd_port} \
- "gcr.io/google_containers/etcd:${ETCD_VERSION}" /bin/sh -c \
+ "k8s.gcr.io/etcd:${ETCD_VERSION}" /bin/sh -c \
"/usr/local/bin/etcd --data-dir /var/etcd/data --force-new-cluster")
if [ "$?" -ne "0" ]; then
echo "Docker container didn't started correctly"
@@ -191,7 +191,7 @@ elif [ "${ETCD_API}" == "etcd3" ]; then
# Run etcdctl snapshot restore command and wait until it is finished.
# setting with --name in the etcd manifest file and then it seems to work.
docker run -v ${BACKUP_DIR}:/var/tmp/backup --env ETCDCTL_API=3 \
- "gcr.io/google_containers/etcd:${ETCD_VERSION}" /bin/sh -c \
+ "k8s.gcr.io/etcd:${ETCD_VERSION}" /bin/sh -c \
"/usr/local/bin/etcdctl snapshot restore ${BACKUP_DIR}/${snapshot} --name ${NAME} --initial-cluster ${INITIAL_CLUSTER} --initial-advertise-peer-urls ${INITIAL_ADVERTISE_PEER_URLS}; mv /${NAME}.etcd/member /var/tmp/backup/"
if [ "$?" -ne "0" ]; then
echo "Docker container didn't started correctly"
diff --git a/cmd/kubeadm/app/apis/kubeadm/v1alpha1/defaults.go b/cmd/kubeadm/app/apis/kubeadm/v1alpha1/defaults.go
index 772a9612ee..a2a967a019 100644
--- a/cmd/kubeadm/app/apis/kubeadm/v1alpha1/defaults.go
+++ b/cmd/kubeadm/app/apis/kubeadm/v1alpha1/defaults.go
@@ -47,7 +47,7 @@ const (
// DefaultCertificatesDir defines default certificate directory
DefaultCertificatesDir = "/etc/kubernetes/pki"
// DefaultImageRepository defines default image registry
- DefaultImageRepository = "gcr.io/google_containers"
+ DefaultImageRepository = "k8s.gcr.io"
// DefaultManifestsDir defines default manifests directory
DefaultManifestsDir = "/etc/kubernetes/manifests"
diff --git a/cmd/kubeadm/app/images/images_test.go b/cmd/kubeadm/app/images/images_test.go
index 6c1173e6c2..466f204500 100644
--- a/cmd/kubeadm/app/images/images_test.go
+++ b/cmd/kubeadm/app/images/images_test.go
@@ -27,7 +27,7 @@ import (
const (
testversion = "v10.1.2-alpha.1.100+0123456789abcdef+SOMETHING"
expected = "v10.1.2-alpha.1.100_0123456789abcdef_SOMETHING"
- gcrPrefix = "gcr.io/google_containers"
+ gcrPrefix = "k8s.gcr.io"
)
func TestGetCoreImage(t *testing.T) {
diff --git a/cmd/kubeadm/app/phases/selfhosting/selfhosting_test.go b/cmd/kubeadm/app/phases/selfhosting/selfhosting_test.go
index 9b1b3306b5..5b30899d77 100644
--- a/cmd/kubeadm/app/phases/selfhosting/selfhosting_test.go
+++ b/cmd/kubeadm/app/phases/selfhosting/selfhosting_test.go
@@ -66,7 +66,7 @@ spec:
- --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
- --authorization-mode=Node,RBAC
- --etcd-servers=http://127.0.0.1:2379
- image: gcr.io/google_containers/kube-apiserver-amd64:v1.7.4
+ image: k8s.gcr.io/kube-apiserver-amd64:v1.7.4
livenessProbe:
failureThreshold: 8
httpGet:
@@ -153,7 +153,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: status.hostIP
- image: gcr.io/google_containers/kube-apiserver-amd64:v1.7.4
+ image: k8s.gcr.io/kube-apiserver-amd64:v1.7.4
livenessProbe:
failureThreshold: 8
httpGet:
@@ -225,7 +225,7 @@ spec:
- --cluster-signing-key-file=/etc/kubernetes/pki/ca.key
- --address=127.0.0.1
- --use-service-account-credentials=true
- image: gcr.io/google_containers/kube-controller-manager-amd64:v1.7.4
+ image: k8s.gcr.io/kube-controller-manager-amd64:v1.7.4
livenessProbe:
failureThreshold: 8
httpGet:
@@ -300,7 +300,7 @@ spec:
- --cluster-signing-key-file=/etc/kubernetes/pki/ca.key
- --address=127.0.0.1
- --use-service-account-credentials=true
- image: gcr.io/google_containers/kube-controller-manager-amd64:v1.7.4
+ image: k8s.gcr.io/kube-controller-manager-amd64:v1.7.4
livenessProbe:
failureThreshold: 8
httpGet:
@@ -373,7 +373,7 @@ spec:
- --leader-elect=true
- --kubeconfig=/etc/kubernetes/scheduler.conf
- --address=127.0.0.1
- image: gcr.io/google_containers/kube-scheduler-amd64:v1.7.4
+ image: k8s.gcr.io/kube-scheduler-amd64:v1.7.4
livenessProbe:
failureThreshold: 8
httpGet:
@@ -424,7 +424,7 @@ spec:
- --leader-elect=true
- --kubeconfig=/etc/kubernetes/scheduler.conf
- --address=127.0.0.1
- image: gcr.io/google_containers/kube-scheduler-amd64:v1.7.4
+ image: k8s.gcr.io/kube-scheduler-amd64:v1.7.4
livenessProbe:
failureThreshold: 8
httpGet:
@@ -526,7 +526,7 @@ metadata:
name: testpod
spec:
containers:
- - image: gcr.io/google_containers/busybox
+ - image: k8s.gcr.io/busybox
`,
expectError: false,
},
@@ -542,7 +542,7 @@ spec:
"spec": {
"containers": [
{
- "image": "gcr.io/google_containers/busybox"
+ "image": "k8s.gcr.io/busybox"
}
]
}
@@ -557,7 +557,7 @@ kind: Pod
metadata:
name: testpod
spec:
- - image: gcr.io/google_containers/busybox
+ - image: k8s.gcr.io/busybox
`,
expectError: true,
},
diff --git a/cmd/kubeadm/app/phases/upgrade/staticpods_test.go b/cmd/kubeadm/app/phases/upgrade/staticpods_test.go
index e51a129579..5b131fbca1 100644
--- a/cmd/kubeadm/app/phases/upgrade/staticpods_test.go
+++ b/cmd/kubeadm/app/phases/upgrade/staticpods_test.go
@@ -61,7 +61,7 @@ etcd:
image: ""
keyFile: ""
featureFlags: null
-imageRepository: gcr.io/google_containers
+imageRepository: k8s.gcr.io
kubernetesVersion: %s
networking:
dnsDomain: cluster.local
diff --git a/cmd/kubeadm/app/util/template_test.go b/cmd/kubeadm/app/util/template_test.go
index ed5fee9c33..c3833bc1b3 100644
--- a/cmd/kubeadm/app/util/template_test.go
+++ b/cmd/kubeadm/app/util/template_test.go
@@ -22,8 +22,8 @@ import (
const (
validTmpl = "image: {{ .ImageRepository }}/pause-{{ .Arch }}:3.1"
- validTmplOut = "image: gcr.io/google_containers/pause-amd64:3.1"
- doNothing = "image: gcr.io/google_containers/pause-amd64:3.1"
+ validTmplOut = "image: k8s.gcr.io/pause-amd64:3.1"
+ doNothing = "image: k8s.gcr.io/pause-amd64:3.1"
invalidTmpl1 = "{{ .baz }/d}"
invalidTmpl2 = "{{ !foobar }}"
)
@@ -39,7 +39,7 @@ func TestParseTemplate(t *testing.T) {
{
template: validTmpl,
data: struct{ ImageRepository, Arch string }{
- ImageRepository: "gcr.io/google_containers",
+ ImageRepository: "k8s.gcr.io",
Arch: "amd64",
},
output: validTmplOut,
@@ -49,7 +49,7 @@ func TestParseTemplate(t *testing.T) {
{
template: doNothing,
data: struct{ ImageRepository, Arch string }{
- ImageRepository: "gcr.io/google_containers",
+ ImageRepository: "k8s.gcr.io",
Arch: "amd64",
},
output: doNothing,
diff --git a/cmd/kubelet/app/options/container_runtime.go b/cmd/kubelet/app/options/container_runtime.go
index b57a4e20bc..4225e8dd50 100644
--- a/cmd/kubelet/app/options/container_runtime.go
+++ b/cmd/kubelet/app/options/container_runtime.go
@@ -26,8 +26,8 @@ import (
)
const (
- // When these values are updated, also update test/utils/image/manifest.go
- defaultPodSandboxImageName = "gcr.io/google_containers/pause"
+ // When these values are updated, also update test/e2e/framework/util.go
+ defaultPodSandboxImageName = "k8s.gcr.io/pause"
defaultPodSandboxImageVersion = "3.1"
// From pkg/kubelet/rkt/rkt.go to avoid circular import
defaultRktAPIServiceEndpoint = "localhost:15441"
diff --git a/docs/api-reference/v1/definitions.html b/docs/api-reference/v1/definitions.html
index be51d396db..ff90e1d21f 100755
--- a/docs/api-reference/v1/definitions.html
+++ b/docs/api-reference/v1/definitions.html
@@ -5201,7 +5201,7 @@ Examples:
names |
-Names by which this image is known. e.g. ["gcr.io/google_containers/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"] |
+Names by which this image is known. e.g. ["k8s.gcr.io/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"] |
true |
string array |
|
diff --git a/examples/cluster-dns/dns-backend-rc.yaml b/examples/cluster-dns/dns-backend-rc.yaml
index 9649d367b5..4af1b0dcba 100644
--- a/examples/cluster-dns/dns-backend-rc.yaml
+++ b/examples/cluster-dns/dns-backend-rc.yaml
@@ -15,7 +15,7 @@ spec:
spec:
containers:
- name: dns-backend
- image: gcr.io/google_containers/example-dns-backend:v1
+ image: k8s.gcr.io/example-dns-backend:v1
ports:
- name: backend-port
containerPort: 8000
diff --git a/examples/cluster-dns/dns-frontend-pod.yaml b/examples/cluster-dns/dns-frontend-pod.yaml
index b424478383..4a7695f113 100644
--- a/examples/cluster-dns/dns-frontend-pod.yaml
+++ b/examples/cluster-dns/dns-frontend-pod.yaml
@@ -7,7 +7,7 @@ metadata:
spec:
containers:
- name: dns-frontend
- image: gcr.io/google_containers/example-dns-frontend:v1
+ image: k8s.gcr.io/example-dns-frontend:v1
command:
- python
- client.py
diff --git a/examples/cluster-dns/images/backend/Makefile b/examples/cluster-dns/images/backend/Makefile
index 67992ec266..bac8c89876 100644
--- a/examples/cluster-dns/images/backend/Makefile
+++ b/examples/cluster-dns/images/backend/Makefile
@@ -13,7 +13,7 @@
# limitations under the License.
TAG = v1
-PREFIX = gcr.io/google_containers
+PREFIX = staging-k8s.gcr.io
IMAGE = example-dns-backend
all: push
diff --git a/examples/cluster-dns/images/frontend/Makefile b/examples/cluster-dns/images/frontend/Makefile
index 2f6337545f..4c17fb59f5 100644
--- a/examples/cluster-dns/images/frontend/Makefile
+++ b/examples/cluster-dns/images/frontend/Makefile
@@ -13,7 +13,7 @@
# limitations under the License.
TAG = v1
-PREFIX = gcr.io/google_containers
+PREFIX = staging-k8s.gcr.io
IMAGE = example-dns-frontend
all: push
diff --git a/examples/explorer/Makefile b/examples/explorer/Makefile
index 35dd5bd7e7..f550a15a15 100644
--- a/examples/explorer/Makefile
+++ b/examples/explorer/Makefile
@@ -21,10 +21,10 @@ explorer: explorer.go
CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -ldflags '-w' ./explorer.go
container: explorer
- docker build --pull -t gcr.io/google_containers/explorer:$(TAG) .
+ docker build --pull -t staging-k8s.gcr.io/explorer:$(TAG) .
push: container
- gcloud docker -- push gcr.io/google_containers/explorer:$(TAG)
+ gcloud docker -- push staging-k8s.gcr.io/explorer:$(TAG)
clean:
rm -f explorer
diff --git a/examples/explorer/pod.yaml b/examples/explorer/pod.yaml
index 2c26c3e174..0437a24922 100644
--- a/examples/explorer/pod.yaml
+++ b/examples/explorer/pod.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: explorer
- image: gcr.io/google_containers/explorer:1.0
+ image: k8s.gcr.io/explorer:1.0
args: ["-port=8080"]
ports:
- containerPort: 8080
diff --git a/examples/guestbook-go/Makefile b/examples/guestbook-go/Makefile
index 9c63819ebc..ce17d07e80 100644
--- a/examples/guestbook-go/Makefile
+++ b/examples/guestbook-go/Makefile
@@ -15,9 +15,9 @@
# Build the guestbook-go example
# Usage:
-# [VERSION=v3] [REGISTRY="gcr.io/google_containers"] make build
+# [VERSION=v3] [REGISTRY="staging-k8s.gcr.io"] make build
VERSION?=v3
-REGISTRY?=gcr.io/google_containers
+REGISTRY?=staging-k8s.gcr.io
release: clean build push clean
diff --git a/examples/guestbook-go/guestbook-controller.json b/examples/guestbook-go/guestbook-controller.json
index 82c0e9134f..0e3553c865 100644
--- a/examples/guestbook-go/guestbook-controller.json
+++ b/examples/guestbook-go/guestbook-controller.json
@@ -22,7 +22,7 @@
"containers":[
{
"name":"guestbook",
- "image":"gcr.io/google_containers/guestbook:v3",
+ "image":"k8s.gcr.io/guestbook:v3",
"ports":[
{
"name":"http-server",
diff --git a/examples/guestbook/all-in-one/guestbook-all-in-one.yaml b/examples/guestbook/all-in-one/guestbook-all-in-one.yaml
index 7735c79898..a3415d6a99 100644
--- a/examples/guestbook/all-in-one/guestbook-all-in-one.yaml
+++ b/examples/guestbook/all-in-one/guestbook-all-in-one.yaml
@@ -30,7 +30,7 @@ spec:
spec:
containers:
- name: master
- image: gcr.io/google_containers/redis:e2e # or just image: redis
+ image: k8s.gcr.io/redis:e2e # or just image: redis
resources:
requests:
cpu: 100m
diff --git a/examples/guestbook/legacy/redis-master-controller.yaml b/examples/guestbook/legacy/redis-master-controller.yaml
index 0bdf976175..28208103b4 100644
--- a/examples/guestbook/legacy/redis-master-controller.yaml
+++ b/examples/guestbook/legacy/redis-master-controller.yaml
@@ -17,7 +17,7 @@ spec:
spec:
containers:
- name: master
- image: gcr.io/google_containers/redis:e2e # or just image: redis
+ image: k8s.gcr.io/redis:e2e # or just image: redis
resources:
requests:
cpu: 100m
diff --git a/examples/guestbook/redis-master-deployment.yaml b/examples/guestbook/redis-master-deployment.yaml
index 3fbcc0f01c..d457a09934 100644
--- a/examples/guestbook/redis-master-deployment.yaml
+++ b/examples/guestbook/redis-master-deployment.yaml
@@ -13,7 +13,7 @@ spec:
spec:
containers:
- name: master
- image: gcr.io/google_containers/redis:e2e # or just image: redis
+ image: k8s.gcr.io/redis:e2e # or just image: redis
resources:
requests:
cpu: 100m
diff --git a/examples/kubectl-container/Makefile b/examples/kubectl-container/Makefile
index ea127f1514..a4094ff8bf 100644
--- a/examples/kubectl-container/Makefile
+++ b/examples/kubectl-container/Makefile
@@ -37,11 +37,11 @@ tag: .tag
container:
$(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion))
- docker build --pull -t gcr.io/google_containers/kubectl:$(TAG) .
+ docker build --pull -t staging-k8s.gcr.io/kubectl:$(TAG) .
push: container
$(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion))
- gcloud docker -- push gcr.io/google_containers/kubectl:$(TAG)
+ gcloud docker -- push staging-k8s.gcr.io/kubectl:$(TAG)
clean:
rm -f kubectl
diff --git a/examples/kubectl-container/pod.json b/examples/kubectl-container/pod.json
index ed0ec6599c..540715a6c5 100644
--- a/examples/kubectl-container/pod.json
+++ b/examples/kubectl-container/pod.json
@@ -8,7 +8,7 @@
"containers": [
{
"name": "bb",
- "image": "gcr.io/google_containers/busybox",
+ "image": "k8s.gcr.io/busybox",
"command": [
"sh", "-c", "sleep 5; wget -O - ${KUBERNETES_RO_SERVICE_HOST}:${KUBERNETES_RO_SERVICE_PORT}/api/v1/pods/; sleep 10000"
],
@@ -36,7 +36,7 @@
},
{
"name": "kubectl",
- "image": "gcr.io/google_containers/kubectl:v0.18.0-120-gaeb4ac55ad12b1-dirty",
+ "image": "k8s.gcr.io/kubectl:v0.18.0-120-gaeb4ac55ad12b1-dirty",
"imagePullPolicy": "Always",
"args": [
"proxy", "-p", "8001"
diff --git a/examples/spark/spark-gluster/spark-master-controller.yaml b/examples/spark/spark-gluster/spark-master-controller.yaml
index d0b365b713..28cb6ac3fb 100644
--- a/examples/spark/spark-gluster/spark-master-controller.yaml
+++ b/examples/spark/spark-gluster/spark-master-controller.yaml
@@ -16,7 +16,7 @@ spec:
spec:
containers:
- name: spark-master
- image: gcr.io/google_containers/spark:1.5.2_v1
+ image: k8s.gcr.io/spark:1.5.2_v1
command: ["/start-master"]
ports:
- containerPort: 7077
diff --git a/examples/spark/spark-gluster/spark-worker-controller.yaml b/examples/spark/spark-gluster/spark-worker-controller.yaml
index 69cc3cec95..0030d8a667 100644
--- a/examples/spark/spark-gluster/spark-worker-controller.yaml
+++ b/examples/spark/spark-gluster/spark-worker-controller.yaml
@@ -17,7 +17,7 @@ spec:
spec:
containers:
- name: spark-worker
- image: gcr.io/google_containers/spark:1.5.2_v1
+ image: k8s.gcr.io/spark:1.5.2_v1
command: ["/start-worker"]
ports:
- containerPort: 8888
diff --git a/examples/spark/spark-master-controller.yaml b/examples/spark/spark-master-controller.yaml
index 60fb7ba8a1..ceaef078d2 100644
--- a/examples/spark/spark-master-controller.yaml
+++ b/examples/spark/spark-master-controller.yaml
@@ -13,7 +13,7 @@ spec:
spec:
containers:
- name: spark-master
- image: gcr.io/google_containers/spark:1.5.2_v1
+ image: k8s.gcr.io/spark:1.5.2_v1
command: ["/start-master"]
ports:
- containerPort: 7077
diff --git a/examples/spark/spark-worker-controller.yaml b/examples/spark/spark-worker-controller.yaml
index 9c748b3e04..3e5ed50ce0 100644
--- a/examples/spark/spark-worker-controller.yaml
+++ b/examples/spark/spark-worker-controller.yaml
@@ -13,7 +13,7 @@ spec:
spec:
containers:
- name: spark-worker
- image: gcr.io/google_containers/spark:1.5.2_v1
+ image: k8s.gcr.io/spark:1.5.2_v1
command: ["/start-worker"]
ports:
- containerPort: 8081
diff --git a/examples/spark/zeppelin-controller.yaml b/examples/spark/zeppelin-controller.yaml
index 56bb90d421..2f578fcfc2 100644
--- a/examples/spark/zeppelin-controller.yaml
+++ b/examples/spark/zeppelin-controller.yaml
@@ -13,7 +13,7 @@ spec:
spec:
containers:
- name: zeppelin
- image: gcr.io/google_containers/zeppelin:v0.5.6_v1
+ image: k8s.gcr.io/zeppelin:v0.5.6_v1
ports:
- containerPort: 8080
resources:
diff --git a/examples/storage/cassandra/image/Dockerfile b/examples/storage/cassandra/image/Dockerfile
index 45b7595123..5c4658d7f1 100644
--- a/examples/storage/cassandra/image/Dockerfile
+++ b/examples/storage/cassandra/image/Dockerfile
@@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-FROM gcr.io/google_containers/ubuntu-slim:0.9
+FROM k8s.gcr.io/ubuntu-slim:0.9
ARG BUILD_DATE
ARG VCS_REF
diff --git a/examples/storage/redis/redis-controller.yaml b/examples/storage/redis/redis-controller.yaml
index fcb5e67cd6..dab2f7f1ab 100644
--- a/examples/storage/redis/redis-controller.yaml
+++ b/examples/storage/redis/redis-controller.yaml
@@ -13,7 +13,7 @@ spec:
spec:
containers:
- name: redis
- image: gcr.io/google_containers/redis:v1
+ image: k8s.gcr.io/redis:v1
ports:
- containerPort: 6379
resources:
diff --git a/examples/storage/redis/redis-master.yaml b/examples/storage/redis/redis-master.yaml
index 57305a7a35..589de648f5 100644
--- a/examples/storage/redis/redis-master.yaml
+++ b/examples/storage/redis/redis-master.yaml
@@ -9,7 +9,7 @@ metadata:
spec:
containers:
- name: master
- image: gcr.io/google_containers/redis:v1
+ image: k8s.gcr.io/redis:v1
env:
- name: MASTER
value: "true"
diff --git a/examples/storage/redis/redis-sentinel-controller.yaml b/examples/storage/redis/redis-sentinel-controller.yaml
index da09e10cbb..6c4b14347a 100644
--- a/examples/storage/redis/redis-sentinel-controller.yaml
+++ b/examples/storage/redis/redis-sentinel-controller.yaml
@@ -15,7 +15,7 @@ spec:
spec:
containers:
- name: sentinel
- image: gcr.io/google_containers/redis:v1
+ image: k8s.gcr.io/redis:v1
env:
- name: SENTINEL
value: "true"
diff --git a/examples/storage/rethinkdb/admin-pod.yaml b/examples/storage/rethinkdb/admin-pod.yaml
index eac07f33a5..12163909d6 100644
--- a/examples/storage/rethinkdb/admin-pod.yaml
+++ b/examples/storage/rethinkdb/admin-pod.yaml
@@ -7,7 +7,7 @@ metadata:
name: rethinkdb-admin
spec:
containers:
- - image: gcr.io/google_containers/rethinkdb:1.16.0_1
+ - image: k8s.gcr.io/rethinkdb:1.16.0_1
name: rethinkdb
env:
- name: POD_NAMESPACE
diff --git a/examples/storage/rethinkdb/rc.yaml b/examples/storage/rethinkdb/rc.yaml
index 36b319191c..23becb6e88 100644
--- a/examples/storage/rethinkdb/rc.yaml
+++ b/examples/storage/rethinkdb/rc.yaml
@@ -16,7 +16,7 @@ spec:
role: replicas
spec:
containers:
- - image: gcr.io/google_containers/rethinkdb:1.16.0_1
+ - image: k8s.gcr.io/rethinkdb:1.16.0_1
name: rethinkdb
env:
- name: POD_NAMESPACE
diff --git a/examples/volumes/portworx/portworx-volume-pod.yaml b/examples/volumes/portworx/portworx-volume-pod.yaml
index c5f195911a..f44302f59e 100644
--- a/examples/volumes/portworx/portworx-volume-pod.yaml
+++ b/examples/volumes/portworx/portworx-volume-pod.yaml
@@ -4,7 +4,7 @@ metadata:
name: test-portworx-volume-pod
spec:
containers:
- - image: gcr.io/google_containers/test-webserver
+ - image: k8s.gcr.io/test-webserver
name: test-container
volumeMounts:
- mountPath: /test-portworx-volume
diff --git a/examples/volumes/portworx/portworx-volume-pvcpod.yaml b/examples/volumes/portworx/portworx-volume-pvcpod.yaml
index fb92b320f1..bef2d49656 100644
--- a/examples/volumes/portworx/portworx-volume-pvcpod.yaml
+++ b/examples/volumes/portworx/portworx-volume-pvcpod.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
- image: gcr.io/google_containers/test-webserver
+ image: k8s.gcr.io/test-webserver
volumeMounts:
- name: test-volume
mountPath: /test-portworx-volume
diff --git a/examples/volumes/portworx/portworx-volume-pvcscpod.yaml b/examples/volumes/portworx/portworx-volume-pvcscpod.yaml
index 464bf5d8fd..8bdd513192 100644
--- a/examples/volumes/portworx/portworx-volume-pvcscpod.yaml
+++ b/examples/volumes/portworx/portworx-volume-pvcscpod.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
- image: gcr.io/google_containers/test-webserver
+ image: k8s.gcr.io/test-webserver
volumeMounts:
- name: test-volume
mountPath: /test-portworx-volume
diff --git a/examples/volumes/scaleio/pod-sc-pvc.yaml b/examples/volumes/scaleio/pod-sc-pvc.yaml
index ceed7b567e..c94e7bc393 100644
--- a/examples/volumes/scaleio/pod-sc-pvc.yaml
+++ b/examples/volumes/scaleio/pod-sc-pvc.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: pod-sio-small-container
- image: gcr.io/google_containers/test-webserver
+ image: k8s.gcr.io/test-webserver
volumeMounts:
- mountPath: /test
name: test-data
diff --git a/examples/volumes/scaleio/pod.yaml b/examples/volumes/scaleio/pod.yaml
index 4b53b2b53c..b13ec668c7 100644
--- a/examples/volumes/scaleio/pod.yaml
+++ b/examples/volumes/scaleio/pod.yaml
@@ -4,7 +4,7 @@ metadata:
name: pod-0
spec:
containers:
- - image: gcr.io/google_containers/test-webserver
+ - image: k8s.gcr.io/test-webserver
name: pod-0
volumeMounts:
- mountPath: /test-pd
diff --git a/examples/volumes/vsphere/simple-statefulset.yaml b/examples/volumes/vsphere/simple-statefulset.yaml
index 3684a3b64e..d9de93c257 100644
--- a/examples/volumes/vsphere/simple-statefulset.yaml
+++ b/examples/volumes/vsphere/simple-statefulset.yaml
@@ -27,7 +27,7 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google_containers/nginx-slim:0.8
+ image: k8s.gcr.io/nginx-slim:0.8
ports:
- containerPort: 80
name: web
diff --git a/examples/volumes/vsphere/vsphere-volume-pod.yaml b/examples/volumes/vsphere/vsphere-volume-pod.yaml
index 8660d62e49..0204ad3a59 100644
--- a/examples/volumes/vsphere/vsphere-volume-pod.yaml
+++ b/examples/volumes/vsphere/vsphere-volume-pod.yaml
@@ -4,7 +4,7 @@ metadata:
name: test-vmdk
spec:
containers:
- - image: gcr.io/google_containers/test-webserver
+ - image: k8s.gcr.io/test-webserver
name: test-container
volumeMounts:
- mountPath: /test-vmdk
diff --git a/examples/volumes/vsphere/vsphere-volume-pvcpod.yaml b/examples/volumes/vsphere/vsphere-volume-pvcpod.yaml
index 291664adaa..326c0031f3 100644
--- a/examples/volumes/vsphere/vsphere-volume-pvcpod.yaml
+++ b/examples/volumes/vsphere/vsphere-volume-pvcpod.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
- image: gcr.io/google_containers/test-webserver
+ image: k8s.gcr.io/test-webserver
volumeMounts:
- name: test-volume
mountPath: /test-vmdk
diff --git a/examples/volumes/vsphere/vsphere-volume-pvcscpod.yaml b/examples/volumes/vsphere/vsphere-volume-pvcscpod.yaml
index 036aeb280c..c569a0b36d 100644
--- a/examples/volumes/vsphere/vsphere-volume-pvcscpod.yaml
+++ b/examples/volumes/vsphere/vsphere-volume-pvcscpod.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
- image: gcr.io/google_containers/test-webserver
+ image: k8s.gcr.io/test-webserver
volumeMounts:
- name: test-volume
mountPath: /test-vmdk
diff --git a/hack/gen-swagger-doc/README.md b/hack/gen-swagger-doc/README.md
index eacf5119d8..5b35be4aff 100644
--- a/hack/gen-swagger-doc/README.md
+++ b/hack/gen-swagger-doc/README.md
@@ -3,7 +3,7 @@ This folder contains the sources needed to build the gen-swagger-doc container.
To build the container image,
```
-$ sudo docker build -t gcr.io/google_containers/gen-swagger-docs:v1 .
+$ sudo docker build -t k8s.gcr.io/gen-swagger-docs:v1 .
```
To generate the html docs,
diff --git a/hack/lib/swagger.sh b/hack/lib/swagger.sh
index 25bf16d818..af872d807e 100644
--- a/hack/lib/swagger.sh
+++ b/hack/lib/swagger.sh
@@ -117,7 +117,7 @@ kube::swagger::gen_api_ref_docs() {
-v "${swagger_spec_path}":/swagger-source:z \
-v "${register_file}":/register.go:z \
--net=host -e "https_proxy=${KUBERNETES_HTTPS_PROXY:-}" \
- gcr.io/google_containers/gen-swagger-docs:v8 \
+ k8s.gcr.io/gen-swagger-docs:v8 \
"${swagger_json_name}"
done
diff --git a/hack/local-up-cluster.sh b/hack/local-up-cluster.sh
index d1a3464303..8308b98ee6 100755
--- a/hack/local-up-cluster.sh
+++ b/hack/local-up-cluster.sh
@@ -795,7 +795,7 @@ function start_kubelet {
--privileged=true \
-i \
--cidfile=$KUBELET_CIDFILE \
- gcr.io/google_containers/kubelet \
+ k8s.gcr.io/kubelet \
/kubelet --v=${LOG_LEVEL} --containerized ${priv_arg}--chaos-chance="${CHAOS_CHANCE}" --pod-manifest-path="${POD_MANIFEST_PATH}" --hostname-override="${HOSTNAME_OVERRIDE}" ${cloud_config_arg} \ --address="127.0.0.1" --kubeconfig "$CERT_DIR"/kubelet.kubeconfig --port="$KUBELET_PORT" --enable-controller-attach-detach="${ENABLE_CONTROLLER_ATTACH_DETACH}" &> $KUBELET_LOG &
fi
}
diff --git a/hack/make-rules/test-cmd-util.sh b/hack/make-rules/test-cmd-util.sh
index 0528c2f740..0734ec051b 100755
--- a/hack/make-rules/test-cmd-util.sh
+++ b/hack/make-rules/test-cmd-util.sh
@@ -37,15 +37,15 @@ KUBELET_HEALTHZ_PORT=${KUBELET_HEALTHZ_PORT:-10248}
CTLRMGR_PORT=${CTLRMGR_PORT:-10252}
PROXY_HOST=127.0.0.1 # kubectl only serves on localhost.
-IMAGE_NGINX="gcr.io/google-containers/nginx:1.7.9"
-IMAGE_DEPLOYMENT_R1="gcr.io/google-containers/nginx:test-cmd" # deployment-revision1.yaml
+IMAGE_NGINX="k8s.gcr.io/nginx:1.7.9"
+IMAGE_DEPLOYMENT_R1="k8s.gcr.io/nginx:test-cmd" # deployment-revision1.yaml
IMAGE_DEPLOYMENT_R2="$IMAGE_NGINX" # deployment-revision2.yaml
-IMAGE_PERL="gcr.io/google-containers/perl"
-IMAGE_PAUSE_V2="gcr.io/google-containers/pause:2.0"
-IMAGE_DAEMONSET_R2="gcr.io/google-containers/pause:latest"
-IMAGE_DAEMONSET_R2_2="gcr.io/google-containers/nginx:test-cmd" # rollingupdate-daemonset-rv2.yaml
-IMAGE_STATEFULSET_R1="gcr.io/google_containers/nginx-slim:0.7"
-IMAGE_STATEFULSET_R2="gcr.io/google_containers/nginx-slim:0.8"
+IMAGE_PERL="k8s.gcr.io/perl"
+IMAGE_PAUSE_V2="k8s.gcr.io/pause:2.0"
+IMAGE_DAEMONSET_R2="k8s.gcr.io/pause:latest"
+IMAGE_DAEMONSET_R2_2="k8s.gcr.io/nginx:test-cmd" # rollingupdate-daemonset-rv2.yaml
+IMAGE_STATEFULSET_R1="k8s.gcr.io/nginx-slim:0.7"
+IMAGE_STATEFULSET_R2="k8s.gcr.io/nginx-slim:0.8"
# Expose kubectl directly for readability
PATH="${KUBE_OUTPUT_HOSTBIN}":$PATH
@@ -719,9 +719,9 @@ run_pod_tests() {
kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'changed-with-yaml:'
## Patch pod from JSON can change image
# Command
- kubectl patch "${kube_flags[@]}" -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml -p='{"spec":{"containers":[{"name": "kubernetes-serve-hostname", "image": "gcr.io/google_containers/pause-amd64:3.1"}]}}'
- # Post-condition: valid-pod POD has image gcr.io/google_containers/pause-amd64:3.1
- kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'gcr.io/google_containers/pause-amd64:3.1:'
+ kubectl patch "${kube_flags[@]}" -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml -p='{"spec":{"containers":[{"name": "kubernetes-serve-hostname", "image": "k8s.gcr.io/pause-amd64:3.1"}]}}'
+ # Post-condition: valid-pod POD has expected image
+ kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'k8s.gcr.io/pause-amd64:3.1:'
## If resourceVersion is specified in the patch, it will be treated as a precondition, i.e., if the resourceVersion is different from that is stored in the server, the Patch should be rejected
ERROR_FILE="${KUBE_TEMP}/conflict-error"
@@ -802,13 +802,13 @@ __EOF__
kubectl delete node node-v1-test "${kube_flags[@]}"
## kubectl edit can update the image field of a POD. tmp-editor.sh is a fake editor
- echo -e "#!/bin/bash\n${SED} -i \"s/nginx/gcr.io\/google_containers\/serve_hostname/g\" \$1" > /tmp/tmp-editor.sh
+ echo -e "#!/bin/bash\n${SED} -i \"s/nginx/k8s.gcr.io\/serve_hostname/g\" \$1" > /tmp/tmp-editor.sh
chmod +x /tmp/tmp-editor.sh
# Pre-condition: valid-pod POD has image nginx
kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'nginx:'
[[ "$(EDITOR=/tmp/tmp-editor.sh kubectl edit "${kube_flags[@]}" pods/valid-pod --output-patch=true | grep Patch:)" ]]
- # Post-condition: valid-pod POD has image gcr.io/google_containers/serve_hostname
- kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'gcr.io/google_containers/serve_hostname:'
+ # Post-condition: valid-pod POD has image k8s.gcr.io/serve_hostname
+ kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'k8s.gcr.io/serve_hostname:'
# cleaning
rm /tmp/tmp-editor.sh
@@ -2766,7 +2766,7 @@ run_deployment_tests() {
create_and_use_new_namespace
kube::log::status "Testing deployments"
# Test kubectl create deployment (using default - old generator)
- kubectl create deployment test-nginx-extensions --image=gcr.io/google-containers/nginx:test-cmd
+ kubectl create deployment test-nginx-extensions --image=k8s.gcr.io/nginx:test-cmd
# Post-Condition: Deployment "nginx" is created.
kube::test::get_object_assert 'deploy test-nginx-extensions' "{{$container_name_field}}" 'nginx'
# and old generator was used, iow. old defaults are applied
@@ -2781,7 +2781,7 @@ run_deployment_tests() {
kubectl delete deployment test-nginx-extensions "${kube_flags[@]}"
# Test kubectl create deployment
- kubectl create deployment test-nginx-apps --image=gcr.io/google-containers/nginx:test-cmd --generator=deployment-basic/apps.v1beta1
+ kubectl create deployment test-nginx-apps --image=k8s.gcr.io/nginx:test-cmd --generator=deployment-basic/apps.v1beta1
# Post-Condition: Deployment "nginx" is created.
kube::test::get_object_assert 'deploy test-nginx-apps' "{{$container_name_field}}" 'nginx'
# and new generator was used, iow. new defaults are applied
@@ -2826,7 +2826,7 @@ run_deployment_tests() {
kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
# Create deployment
- kubectl create deployment nginx-deployment --image=gcr.io/google-containers/nginx:test-cmd
+ kubectl create deployment nginx-deployment --image=k8s.gcr.io/nginx:test-cmd
# Wait for rs to come up.
kube::test::wait_object_assert rs "{{range.items}}{{$rs_replicas_field}}{{end}}" '1'
# Delete the deployment with cascade set to false.
@@ -3084,7 +3084,7 @@ run_rs_tests() {
# Test set commands
# Pre-condition: frontend replica set exists at generation 1
kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '1'
- kubectl set image rs/frontend "${kube_flags[@]}" *=gcr.io/google-containers/pause:test-cmd
+ kubectl set image rs/frontend "${kube_flags[@]}" *=k8s.gcr.io/pause:test-cmd
kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '2'
kubectl set env rs/frontend "${kube_flags[@]}" foo=bar
kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '3'
@@ -3171,7 +3171,7 @@ run_daemonset_tests() {
# Template Generation should stay 1
kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '1'
# Test set commands
- kubectl set image daemonsets/bind "${kube_flags[@]}" *=gcr.io/google-containers/pause:test-cmd
+ kubectl set image daemonsets/bind "${kube_flags[@]}" *=k8s.gcr.io/pause:test-cmd
kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '2'
kubectl set env daemonsets/bind "${kube_flags[@]}" foo=bar
kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '3'
diff --git a/hack/testdata/deployment-label-change1.yaml b/hack/testdata/deployment-label-change1.yaml
index cfcbae3d74..bcd1830427 100644
--- a/hack/testdata/deployment-label-change1.yaml
+++ b/hack/testdata/deployment-label-change1.yaml
@@ -13,6 +13,6 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:test-cmd
+ image: k8s.gcr.io/nginx:test-cmd
ports:
- containerPort: 80
diff --git a/hack/testdata/deployment-label-change2.yaml b/hack/testdata/deployment-label-change2.yaml
index 9e465bdb6b..a8bb4acd1a 100644
--- a/hack/testdata/deployment-label-change2.yaml
+++ b/hack/testdata/deployment-label-change2.yaml
@@ -17,6 +17,6 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:test-cmd
+ image: k8s.gcr.io/nginx:test-cmd
ports:
- containerPort: 80
diff --git a/hack/testdata/deployment-multicontainer-resources.yaml b/hack/testdata/deployment-multicontainer-resources.yaml
index 533e2e46f4..b36ace094b 100644
--- a/hack/testdata/deployment-multicontainer-resources.yaml
+++ b/hack/testdata/deployment-multicontainer-resources.yaml
@@ -16,9 +16,9 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:test-cmd
+ image: k8s.gcr.io/nginx:test-cmd
ports:
- containerPort: 80
- name: perl
- image: gcr.io/google-containers/perl
+ image: k8s.gcr.io/perl
terminationGracePeriodSeconds: 0
diff --git a/hack/testdata/deployment-multicontainer.yaml b/hack/testdata/deployment-multicontainer.yaml
index 115888a029..117483957f 100644
--- a/hack/testdata/deployment-multicontainer.yaml
+++ b/hack/testdata/deployment-multicontainer.yaml
@@ -16,8 +16,8 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:test-cmd
+ image: k8s.gcr.io/nginx:test-cmd
ports:
- containerPort: 80
- name: perl
- image: gcr.io/google-containers/perl
+ image: k8s.gcr.io/perl
diff --git a/hack/testdata/deployment-revision1.yaml b/hack/testdata/deployment-revision1.yaml
index cfbec36c45..2bcb8edea7 100644
--- a/hack/testdata/deployment-revision1.yaml
+++ b/hack/testdata/deployment-revision1.yaml
@@ -16,6 +16,6 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:test-cmd
+ image: k8s.gcr.io/nginx:test-cmd
ports:
- containerPort: 80
diff --git a/hack/testdata/deployment-revision2.yaml b/hack/testdata/deployment-revision2.yaml
index 4b171f604b..1ed91c1375 100644
--- a/hack/testdata/deployment-revision2.yaml
+++ b/hack/testdata/deployment-revision2.yaml
@@ -16,6 +16,6 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:1.7.9
+ image: k8s.gcr.io/nginx:1.7.9
ports:
- containerPort: 80
diff --git a/hack/testdata/filter/pod-apply-selector.yaml b/hack/testdata/filter/pod-apply-selector.yaml
index 73b83d6ba3..f296b68b9a 100644
--- a/hack/testdata/filter/pod-apply-selector.yaml
+++ b/hack/testdata/filter/pod-apply-selector.yaml
@@ -8,4 +8,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/hack/testdata/filter/pod-dont-apply.yaml b/hack/testdata/filter/pod-dont-apply.yaml
index 7ea1610de9..9b8f9f6e90 100644
--- a/hack/testdata/filter/pod-dont-apply.yaml
+++ b/hack/testdata/filter/pod-dont-apply.yaml
@@ -8,4 +8,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/hack/testdata/multi-resource-json-modify.json b/hack/testdata/multi-resource-json-modify.json
index 3ff562e6d9..2f88c0ac8e 100644
--- a/hack/testdata/multi-resource-json-modify.json
+++ b/hack/testdata/multi-resource-json-modify.json
@@ -43,7 +43,7 @@
"spec":{
"containers":[{
"name": "mock-container",
- "image": "gcr.io/google-containers/pause:2.0",
+ "image": "k8s.gcr.io/pause:2.0",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
diff --git a/hack/testdata/multi-resource-json.json b/hack/testdata/multi-resource-json.json
index 8ba2198e6d..869fdc7cbf 100644
--- a/hack/testdata/multi-resource-json.json
+++ b/hack/testdata/multi-resource-json.json
@@ -41,7 +41,7 @@
"spec":{
"containers":[{
"name": "mock-container",
- "image": "gcr.io/google-containers/pause:2.0",
+ "image": "k8s.gcr.io/pause:2.0",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
diff --git a/hack/testdata/multi-resource-list-modify.json b/hack/testdata/multi-resource-list-modify.json
index e0885c1024..af902efcfc 100644
--- a/hack/testdata/multi-resource-list-modify.json
+++ b/hack/testdata/multi-resource-list-modify.json
@@ -47,7 +47,7 @@
"spec":{
"containers":[{
"name": "mock-container",
- "image": "gcr.io/google-containers/pause:2.0",
+ "image": "k8s.gcr.io/pause:2.0",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
diff --git a/hack/testdata/multi-resource-list.json b/hack/testdata/multi-resource-list.json
index 8918223aed..17abca285a 100644
--- a/hack/testdata/multi-resource-list.json
+++ b/hack/testdata/multi-resource-list.json
@@ -45,7 +45,7 @@
"spec":{
"containers":[{
"name": "mock-container",
- "image": "gcr.io/google-containers/pause:2.0",
+ "image": "k8s.gcr.io/pause:2.0",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
diff --git a/hack/testdata/multi-resource-rclist-modify.json b/hack/testdata/multi-resource-rclist-modify.json
index 369d73399b..a28169c8ee 100644
--- a/hack/testdata/multi-resource-rclist-modify.json
+++ b/hack/testdata/multi-resource-rclist-modify.json
@@ -26,7 +26,7 @@
"spec":{
"containers":[{
"name": "mock-container",
- "image": "gcr.io/google-containers/pause:2.0",
+ "image": "k8s.gcr.io/pause:2.0",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
@@ -60,7 +60,7 @@
"spec":{
"containers":[{
"name": "mock-container",
- "image": "gcr.io/google-containers/pause:2.0",
+ "image": "k8s.gcr.io/pause:2.0",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
diff --git a/hack/testdata/multi-resource-rclist.json b/hack/testdata/multi-resource-rclist.json
index 369d73399b..a28169c8ee 100644
--- a/hack/testdata/multi-resource-rclist.json
+++ b/hack/testdata/multi-resource-rclist.json
@@ -26,7 +26,7 @@
"spec":{
"containers":[{
"name": "mock-container",
- "image": "gcr.io/google-containers/pause:2.0",
+ "image": "k8s.gcr.io/pause:2.0",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
@@ -60,7 +60,7 @@
"spec":{
"containers":[{
"name": "mock-container",
- "image": "gcr.io/google-containers/pause:2.0",
+ "image": "k8s.gcr.io/pause:2.0",
"ports":[{
"containerPort":9949,
"protocol":"TCP"
diff --git a/hack/testdata/multi-resource-yaml-modify.yaml b/hack/testdata/multi-resource-yaml-modify.yaml
index 86fe824197..067b75630b 100644
--- a/hack/testdata/multi-resource-yaml-modify.yaml
+++ b/hack/testdata/multi-resource-yaml-modify.yaml
@@ -29,7 +29,7 @@ spec:
spec:
containers:
- name: mock-container
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
ports:
- containerPort: 9949
protocol: TCP
diff --git a/hack/testdata/multi-resource-yaml.yaml b/hack/testdata/multi-resource-yaml.yaml
index bef9e88b2c..642ebdb47e 100644
--- a/hack/testdata/multi-resource-yaml.yaml
+++ b/hack/testdata/multi-resource-yaml.yaml
@@ -27,7 +27,7 @@ spec:
spec:
containers:
- name: mock-container
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
ports:
- containerPort: 9949
protocol: TCP
diff --git a/hack/testdata/null-propagation/deployment-l1.yaml b/hack/testdata/null-propagation/deployment-l1.yaml
index c5123abc5e..051fba91f8 100644
--- a/hack/testdata/null-propagation/deployment-l1.yaml
+++ b/hack/testdata/null-propagation/deployment-l1.yaml
@@ -10,4 +10,4 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:1.7.9
+ image: k8s.gcr.io/nginx:1.7.9
diff --git a/hack/testdata/null-propagation/deployment-l2.yaml b/hack/testdata/null-propagation/deployment-l2.yaml
index ffcbcc099b..3b2426a768 100644
--- a/hack/testdata/null-propagation/deployment-l2.yaml
+++ b/hack/testdata/null-propagation/deployment-l2.yaml
@@ -14,5 +14,5 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:1.7.9
+ image: k8s.gcr.io/nginx:1.7.9
terminationMessagePolicy: null
diff --git a/hack/testdata/pod-apply.yaml b/hack/testdata/pod-apply.yaml
index a736a599d8..235d1c8f0f 100644
--- a/hack/testdata/pod-apply.yaml
+++ b/hack/testdata/pod-apply.yaml
@@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/hack/testdata/pod-with-api-env.yaml b/hack/testdata/pod-with-api-env.yaml
index aef451ac2f..3f76d210df 100644
--- a/hack/testdata/pod-with-api-env.yaml
+++ b/hack/testdata/pod-with-api-env.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
- image: gcr.io/google_containers/busybox
+ image: k8s.gcr.io/busybox
command: [ "/bin/sh", "-c", "env" ]
env:
- name: TEST_CMD_1
diff --git a/hack/testdata/pod-with-precision.json b/hack/testdata/pod-with-precision.json
index ce59d9c100..6835de64de 100644
--- a/hack/testdata/pod-with-precision.json
+++ b/hack/testdata/pod-with-precision.json
@@ -9,7 +9,7 @@
"containers": [
{
"name": "kubernetes-pause",
- "image": "gcr.io/google_containers/pause-amd64:3.1"
+ "image": "k8s.gcr.io/pause-amd64:3.1"
}
],
"restartPolicy": "Never",
diff --git a/hack/testdata/pod.yaml b/hack/testdata/pod.yaml
index 8ccadcecdb..92b504ef77 100644
--- a/hack/testdata/pod.yaml
+++ b/hack/testdata/pod.yaml
@@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/hack/testdata/prune/a.yaml b/hack/testdata/prune/a.yaml
index aa86f28df4..badd10caa8 100644
--- a/hack/testdata/prune/a.yaml
+++ b/hack/testdata/prune/a.yaml
@@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/hack/testdata/prune/b.yaml b/hack/testdata/prune/b.yaml
index 6d212ead91..f92fbc47f0 100644
--- a/hack/testdata/prune/b.yaml
+++ b/hack/testdata/prune/b.yaml
@@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/hack/testdata/recursive/deployment/deployment/nginx-broken.yaml b/hack/testdata/recursive/deployment/deployment/nginx-broken.yaml
index 6d98eda02c..18c0d4ea7a 100644
--- a/hack/testdata/recursive/deployment/deployment/nginx-broken.yaml
+++ b/hack/testdata/recursive/deployment/deployment/nginx-broken.yaml
@@ -13,6 +13,6 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:1.7.9
+ image: k8s.gcr.io/nginx:1.7.9
ports:
- containerPort: 80
diff --git a/hack/testdata/recursive/deployment/deployment/nginx.yaml b/hack/testdata/recursive/deployment/deployment/nginx.yaml
index f956f0272b..f416d6c25c 100644
--- a/hack/testdata/recursive/deployment/deployment/nginx.yaml
+++ b/hack/testdata/recursive/deployment/deployment/nginx.yaml
@@ -13,6 +13,6 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:1.7.9
+ image: k8s.gcr.io/nginx:1.7.9
ports:
- containerPort: 80
diff --git a/hack/testdata/recursive/deployment/nginx.yaml b/hack/testdata/recursive/deployment/nginx.yaml
index 9842a65da0..7988317f46 100644
--- a/hack/testdata/recursive/deployment/nginx.yaml
+++ b/hack/testdata/recursive/deployment/nginx.yaml
@@ -13,6 +13,6 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google-containers/nginx:1.7.9
+ image: k8s.gcr.io/nginx:1.7.9
ports:
- containerPort: 80
diff --git a/hack/testdata/rollingupdate-daemonset-rv2.yaml b/hack/testdata/rollingupdate-daemonset-rv2.yaml
index 3214dcffe9..b807e958dd 100644
--- a/hack/testdata/rollingupdate-daemonset-rv2.yaml
+++ b/hack/testdata/rollingupdate-daemonset-rv2.yaml
@@ -24,6 +24,6 @@ spec:
namespaces: []
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:latest
+ image: k8s.gcr.io/pause:latest
- name: app
- image: gcr.io/google-containers/nginx:test-cmd
+ image: k8s.gcr.io/nginx:test-cmd
diff --git a/hack/testdata/rollingupdate-daemonset.yaml b/hack/testdata/rollingupdate-daemonset.yaml
index c8a9cdca21..4bc77ed5bf 100644
--- a/hack/testdata/rollingupdate-daemonset.yaml
+++ b/hack/testdata/rollingupdate-daemonset.yaml
@@ -24,4 +24,4 @@ spec:
namespaces: []
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/hack/testdata/rollingupdate-statefulset-rv2.yaml b/hack/testdata/rollingupdate-statefulset-rv2.yaml
index fec5493ab6..4e4fc4e609 100644
--- a/hack/testdata/rollingupdate-statefulset-rv2.yaml
+++ b/hack/testdata/rollingupdate-statefulset-rv2.yaml
@@ -18,7 +18,7 @@ spec:
terminationGracePeriodSeconds: 5
containers:
- name: nginx
- image: gcr.io/google_containers/nginx-slim:0.8
+ image: k8s.gcr.io/nginx-slim:0.8
ports:
- containerPort: 80
name: web
@@ -27,7 +27,7 @@ spec:
- -c
- 'while true; do sleep 1; done'
- name: pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
ports:
- containerPort: 81
name: web-2
diff --git a/hack/testdata/rollingupdate-statefulset.yaml b/hack/testdata/rollingupdate-statefulset.yaml
index 2acbf0f322..ffdc242e17 100644
--- a/hack/testdata/rollingupdate-statefulset.yaml
+++ b/hack/testdata/rollingupdate-statefulset.yaml
@@ -18,7 +18,7 @@ spec:
terminationGracePeriodSeconds: 5
containers:
- name: nginx
- image: gcr.io/google_containers/nginx-slim:0.7
+ image: k8s.gcr.io/nginx-slim:0.7
ports:
- containerPort: 80
name: web
diff --git a/hack/testdata/sorted-pods/sorted-pod1.yaml b/hack/testdata/sorted-pods/sorted-pod1.yaml
index fba02b9017..aa767a2ea2 100644
--- a/hack/testdata/sorted-pods/sorted-pod1.yaml
+++ b/hack/testdata/sorted-pods/sorted-pod1.yaml
@@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/hack/testdata/sorted-pods/sorted-pod2.yaml b/hack/testdata/sorted-pods/sorted-pod2.yaml
index f0ab7e906e..f05040569b 100644
--- a/hack/testdata/sorted-pods/sorted-pod2.yaml
+++ b/hack/testdata/sorted-pods/sorted-pod2.yaml
@@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/hack/testdata/sorted-pods/sorted-pod3.yaml b/hack/testdata/sorted-pods/sorted-pod3.yaml
index 5d166786c7..e02c501fa1 100644
--- a/hack/testdata/sorted-pods/sorted-pod3.yaml
+++ b/hack/testdata/sorted-pods/sorted-pod3.yaml
@@ -7,4 +7,4 @@ metadata:
spec:
containers:
- name: kubernetes-pause
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
diff --git a/pkg/api/testing/deep_copy_test.go b/pkg/api/testing/deep_copy_test.go
index 27c9f42f6a..a93ccd00aa 100644
--- a/pkg/api/testing/deep_copy_test.go
+++ b/pkg/api/testing/deep_copy_test.go
@@ -64,7 +64,7 @@ var benchmarkPod api.Pod = api.Pod{
Containers: []api.Container{
{
Name: "etcd-container",
- Image: "gcr.io/google_containers/etcd:2.0.9",
+ Image: "k8s.gcr.io/etcd:2.0.9",
Command: []string{
"/usr/local/bin/etcd",
"--addr",
@@ -120,7 +120,7 @@ var benchmarkPod api.Pod = api.Pod{
},
Ready: true,
RestartCount: 0,
- Image: "gcr.io/google_containers/etcd:2.0.9",
+ Image: "k8s.gcr.io/etcd:2.0.9",
ImageID: "docker://b6b9a86dc06aa1361357ca1b105feba961f6a4145adca6c54e142c0be0fe87b0",
ContainerID: "docker://3cbbf818f1addfc252957b4504f56ef2907a313fe6afc47fc75373674255d46d",
},
diff --git a/pkg/api/testing/replication_controller_example.json b/pkg/api/testing/replication_controller_example.json
index 70eef1cff3..8f858c023f 100644
--- a/pkg/api/testing/replication_controller_example.json
+++ b/pkg/api/testing/replication_controller_example.json
@@ -47,7 +47,7 @@
"containers": [
{
"name": "elasticsearch-logging",
- "image": "gcr.io/google_containers/elasticsearch:1.0",
+ "image": "k8s.gcr.io/elasticsearch:1.0",
"ports": [
{
"name": "db",
diff --git a/pkg/kubectl/validation/testdata/v1/invalidPod1.json b/pkg/kubectl/validation/testdata/v1/invalidPod1.json
index d935742d77..384d185791 100644
--- a/pkg/kubectl/validation/testdata/v1/invalidPod1.json
+++ b/pkg/kubectl/validation/testdata/v1/invalidPod1.json
@@ -11,7 +11,7 @@
"containers": [
{
"name": "master",
- "image": "gcr.io/fake_project/fake_image:fake_tag",
+ "image": "gcr.io/fake_project/fake_image:fake_tag",
"args": "this is a bad command"
}
]
diff --git a/pkg/kubectl/validation/testdata/v1/invalidPod3.json b/pkg/kubectl/validation/testdata/v1/invalidPod3.json
index 4d99181dc0..69e0e85389 100644
--- a/pkg/kubectl/validation/testdata/v1/invalidPod3.json
+++ b/pkg/kubectl/validation/testdata/v1/invalidPod3.json
@@ -14,7 +14,7 @@
"containers": [
{
"name": "apache-php",
- "image": "gcr.io/fake_project/fake_image:fake_tag",
+ "image": "gcr.io/fake_project/fake_image:fake_tag",
"ports": [
{
"name": "apache",
diff --git a/pkg/kubectl/validation/testdata/v1/invalidPod4.yaml b/pkg/kubectl/validation/testdata/v1/invalidPod4.yaml
index f02bf7b336..a6958db5eb 100644
--- a/pkg/kubectl/validation/testdata/v1/invalidPod4.yaml
+++ b/pkg/kubectl/validation/testdata/v1/invalidPod4.yaml
@@ -11,4 +11,4 @@ spec:
args:
-
command:
- -
\ No newline at end of file
+ -
diff --git a/pkg/kubelet/dockershim/docker_sandbox.go b/pkg/kubelet/dockershim/docker_sandbox.go
index b314969a6c..0f06049cff 100644
--- a/pkg/kubelet/dockershim/docker_sandbox.go
+++ b/pkg/kubelet/dockershim/docker_sandbox.go
@@ -37,7 +37,7 @@ import (
)
const (
- defaultSandboxImage = "gcr.io/google_containers/pause-amd64:3.1"
+ defaultSandboxImage = "k8s.gcr.io/pause-amd64:3.1"
// Various default sandbox resources requests/limits.
defaultSandboxCPUshares int64 = 2
diff --git a/pkg/kubelet/images/image_gc_manager_test.go b/pkg/kubelet/images/image_gc_manager_test.go
index ee0fc79802..783675dacb 100644
--- a/pkg/kubelet/images/image_gc_manager_test.go
+++ b/pkg/kubelet/images/image_gc_manager_test.go
@@ -33,7 +33,7 @@ import (
)
var zero time.Time
-var sandboxImage = "gcr.io/google_containers/pause-amd64:latest"
+var sandboxImage = "k8s.gcr.io/pause-amd64:latest"
func newRealImageGCManager(policy ImageGCPolicy) (*realImageGCManager, *containertest.FakeRuntime, *statstest.StatsProvider) {
fakeRuntime := &containertest.FakeRuntime{}
diff --git a/pkg/kubelet/kubelet_node_status_test.go b/pkg/kubelet/kubelet_node_status_test.go
index 38636f70e1..79ee6e88e2 100644
--- a/pkg/kubelet/kubelet_node_status_test.go
+++ b/pkg/kubelet/kubelet_node_status_test.go
@@ -96,7 +96,7 @@ func generateImageTags() []string {
// that kubelet report up to maxNamesPerImageInNodeStatus tags.
count := rand.IntnRange(maxNamesPerImageInNodeStatus+1, maxImageTagsForTest+1)
for ; count > 0; count-- {
- tagList = append(tagList, "gcr.io/google_containers:v"+strconv.Itoa(count))
+ tagList = append(tagList, "k8s.gcr.io:v"+strconv.Itoa(count))
}
return tagList
}
@@ -492,11 +492,11 @@ func TestUpdateExistingNodeStatus(t *testing.T) {
// images will be sorted from max to min in node status.
Images: []v1.ContainerImage{
{
- Names: []string{"gcr.io/google_containers:v3", "gcr.io/google_containers:v4"},
+ Names: []string{"k8s.gcr.io:v3", "k8s.gcr.io:v4"},
SizeBytes: 456,
},
{
- Names: []string{"gcr.io/google_containers:v1", "gcr.io/google_containers:v2"},
+ Names: []string{"k8s.gcr.io:v1", "k8s.gcr.io:v2"},
SizeBytes: 123,
},
},
@@ -680,11 +680,11 @@ func TestUpdateNodeStatusWithRuntimeStateError(t *testing.T) {
},
Images: []v1.ContainerImage{
{
- Names: []string{"gcr.io/google_containers:v3", "gcr.io/google_containers:v4"},
+ Names: []string{"k8s.gcr.io:v3", "k8s.gcr.io:v4"},
SizeBytes: 456,
},
{
- Names: []string{"gcr.io/google_containers:v1", "gcr.io/google_containers:v2"},
+ Names: []string{"k8s.gcr.io:v1", "k8s.gcr.io:v2"},
SizeBytes: 123,
},
},
diff --git a/pkg/kubelet/kubelet_test.go b/pkg/kubelet/kubelet_test.go
index 1b996c2d1a..18746c67d6 100644
--- a/pkg/kubelet/kubelet_test.go
+++ b/pkg/kubelet/kubelet_test.go
@@ -127,12 +127,12 @@ func newTestKubelet(t *testing.T, controllerAttachDetachEnabled bool) *TestKubel
imageList := []kubecontainer.Image{
{
ID: "abc",
- RepoTags: []string{"gcr.io/google_containers:v1", "gcr.io/google_containers:v2"},
+ RepoTags: []string{"k8s.gcr.io:v1", "k8s.gcr.io:v2"},
Size: 123,
},
{
ID: "efg",
- RepoTags: []string{"gcr.io/google_containers:v3", "gcr.io/google_containers:v4"},
+ RepoTags: []string{"k8s.gcr.io:v3", "k8s.gcr.io:v4"},
Size: 456,
},
}
diff --git a/pkg/volume/util/operationexecutor/operation_executor.go b/pkg/volume/util/operationexecutor/operation_executor.go
index 7df9f43d79..1d35438c30 100644
--- a/pkg/volume/util/operationexecutor/operation_executor.go
+++ b/pkg/volume/util/operationexecutor/operation_executor.go
@@ -453,7 +453,7 @@ type MountedVolume struct {
// name: test-pd
// spec:
// containers:
- // - image: gcr.io/google_containers/test-webserver
+ // - image: k8s.gcr.io/test-webserver
// name: test-container
// volumeMounts:
// - mountPath: /test-pd
@@ -491,7 +491,7 @@ type MountedVolume struct {
// name: test-pd
// spec:
// containers:
- // - image: gcr.io/google_containers/test-webserver
+ // - image: k8s.gcr.io/test-webserver
// name: test-container
// volumeMounts:
// - mountPath: /test-pd
diff --git a/pkg/volume/util/operationexecutor/operation_executor_test.go b/pkg/volume/util/operationexecutor/operation_executor_test.go
index 18e68a3ab0..6aabd54b1f 100644
--- a/pkg/volume/util/operationexecutor/operation_executor_test.go
+++ b/pkg/volume/util/operationexecutor/operation_executor_test.go
@@ -493,7 +493,7 @@ func getTestPodWithSecret(podName, secretName string) *v1.Pod {
Containers: []v1.Container{
{
Name: "secret-volume-test",
- Image: "gcr.io/google_containers/mounttest:0.8",
+ Image: "k8s.gcr.io/mounttest:0.8",
Args: []string{
"--file_content=/etc/secret-volume/data-1",
"--file_mode=/etc/secret-volume/data-1"},
@@ -532,7 +532,7 @@ func getTestPodWithGCEPD(podName, pdName string) *v1.Pod {
Containers: []v1.Container{
{
Name: "pd-volume-test",
- Image: "gcr.io/google_containers/mounttest:0.8",
+ Image: "k8s.gcr.io/mounttest:0.8",
Args: []string{
"--file_content=/etc/pd-volume/data-1",
},
diff --git a/pkg/volume/util/util_test.go b/pkg/volume/util/util_test.go
index 5fd11f0861..6dcc125eb5 100644
--- a/pkg/volume/util/util_test.go
+++ b/pkg/volume/util/util_test.go
@@ -164,7 +164,7 @@ metadata:
name: testpod
spec:
containers:
- - image: gcr.io/google_containers/busybox
+ - image: k8s.gcr.io/busybox
`,
false,
},
@@ -181,7 +181,7 @@ spec:
"spec": {
"containers": [
{
- "image": "gcr.io/google_containers/busybox"
+ "image": "k8s.gcr.io/busybox"
}
]
}
@@ -197,7 +197,7 @@ kind: Pod
metadata:
name: testpod
spec:
- - image: gcr.io/google_containers/busybox
+ - image: k8s.gcr.io/busybox
`,
true,
},
diff --git a/pkg/volume/util_test.go b/pkg/volume/util_test.go
index 273722a0c3..011793defe 100644
--- a/pkg/volume/util_test.go
+++ b/pkg/volume/util_test.go
@@ -94,8 +94,8 @@ func TestRecyclerPod(t *testing.T) {
// Pod gets Running and Succeeded
newPodEvent(watch.Added, "podRecyclerSuccess", v1.PodPending, ""),
newEvent(v1.EventTypeNormal, "Successfully assigned recycler-for-podRecyclerSuccess to 127.0.0.1"),
- newEvent(v1.EventTypeNormal, "pulling image \"gcr.io/google_containers/busybox\""),
- newEvent(v1.EventTypeNormal, "Successfully pulled image \"gcr.io/google_containers/busybox\""),
+ newEvent(v1.EventTypeNormal, "pulling image \"k8s.gcr.io/busybox\""),
+ newEvent(v1.EventTypeNormal, "Successfully pulled image \"k8s.gcr.io/busybox\""),
newEvent(v1.EventTypeNormal, "Created container with docker id 83d929aeac82"),
newEvent(v1.EventTypeNormal, "Started container with docker id 83d929aeac82"),
newPodEvent(watch.Modified, "podRecyclerSuccess", v1.PodRunning, ""),
@@ -103,8 +103,8 @@ func TestRecyclerPod(t *testing.T) {
},
expectedEvents: []mockEvent{
{v1.EventTypeNormal, "Successfully assigned recycler-for-podRecyclerSuccess to 127.0.0.1"},
- {v1.EventTypeNormal, "pulling image \"gcr.io/google_containers/busybox\""},
- {v1.EventTypeNormal, "Successfully pulled image \"gcr.io/google_containers/busybox\""},
+ {v1.EventTypeNormal, "pulling image \"k8s.gcr.io/busybox\""},
+ {v1.EventTypeNormal, "Successfully pulled image \"k8s.gcr.io/busybox\""},
{v1.EventTypeNormal, "Created container with docker id 83d929aeac82"},
{v1.EventTypeNormal, "Started container with docker id 83d929aeac82"},
},
diff --git a/staging/src/k8s.io/api/core/v1/generated.proto b/staging/src/k8s.io/api/core/v1/generated.proto
index ad22fec198..e5d8f74db6 100644
--- a/staging/src/k8s.io/api/core/v1/generated.proto
+++ b/staging/src/k8s.io/api/core/v1/generated.proto
@@ -637,7 +637,7 @@ message Container {
// Describe a container image
message ContainerImage {
// Names by which this image is known.
- // e.g. ["gcr.io/google_containers/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]
+ // e.g. ["k8s.gcr.io/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]
repeated string names = 1;
// The size of the image in bytes.
diff --git a/staging/src/k8s.io/api/core/v1/types.go b/staging/src/k8s.io/api/core/v1/types.go
index 01d5a0d828..d1b464fd40 100644
--- a/staging/src/k8s.io/api/core/v1/types.go
+++ b/staging/src/k8s.io/api/core/v1/types.go
@@ -3928,7 +3928,7 @@ type PodSignature struct {
// Describe a container image
type ContainerImage struct {
// Names by which this image is known.
- // e.g. ["gcr.io/google_containers/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]
+ // e.g. ["k8s.gcr.io/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]
Names []string `json:"names" protobuf:"bytes,1,rep,name=names"`
// The size of the image in bytes.
// +optional
diff --git a/staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go b/staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go
index 860975f718..2c274b13d9 100644
--- a/staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go
+++ b/staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go
@@ -310,7 +310,7 @@ func (Container) SwaggerDoc() map[string]string {
var map_ContainerImage = map[string]string{
"": "Describe a container image",
- "names": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]",
+ "names": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]",
"sizeBytes": "The size of the image in bytes.",
}
diff --git a/test/e2e/framework/nodes_util.go b/test/e2e/framework/nodes_util.go
index 60a545414d..20fd2a157d 100644
--- a/test/e2e/framework/nodes_util.go
+++ b/test/e2e/framework/nodes_util.go
@@ -83,7 +83,7 @@ func ingressUpgradeGCE(isUpgrade bool) error {
command = "sudo sed -i -re 's/(image:)(.*)/\\1 gcr.io\\/k8s-ingress-image-push\\/ingress-gce-e2e-glbc-amd64:latest/' /etc/kubernetes/manifests/glbc.manifest"
} else {
// Downgrade
- command = "sudo sed -i -re 's/(image:)(.*)/\\1 gcr.io\\/google_containers\\/glbc:0.9.7/' /etc/kubernetes/manifests/glbc.manifest"
+ command = "sudo sed -i -re 's/(image:)(.*)/\\1 k8s.gcr.io\\/glbc:0.9.7/' /etc/kubernetes/manifests/glbc.manifest"
}
sshResult, err := NodeExec(GetMasterHost(), command)
LogSSHResult(sshResult)
diff --git a/test/e2e/instrumentation/monitoring/custom_metrics_deployments.go b/test/e2e/instrumentation/monitoring/custom_metrics_deployments.go
index b6e861575e..f1d3e0926b 100644
--- a/test/e2e/instrumentation/monitoring/custom_metrics_deployments.go
+++ b/test/e2e/instrumentation/monitoring/custom_metrics_deployments.go
@@ -127,7 +127,7 @@ func StackdriverExporterPod(podName, namespace, podLabel, metricName string, met
func stackdriverExporterContainerSpec(name string, metricName string, metricValue int64) corev1.Container {
return corev1.Container{
Name: name,
- Image: "gcr.io/google-containers/sd-dummy-exporter:v0.1.0",
+ Image: "k8s.gcr.io/sd-dummy-exporter:v0.1.0",
ImagePullPolicy: corev1.PullPolicy("Always"),
Command: []string{"/sd_dummy_exporter", "--pod-id=$(POD_ID)", "--metric-name=" + metricName, fmt.Sprintf("--metric-value=%v", metricValue)},
Env: []corev1.EnvVar{
@@ -175,7 +175,7 @@ func prometheusExporterPodSpec(metricName string, metricValue int64, port int32)
Containers: []corev1.Container{
{
Name: "prometheus-exporter",
- Image: "gcr.io/google-containers/prometheus-dummy-exporter:v0.1.0",
+ Image: "k8s.gcr.io/prometheus-dummy-exporter:v0.1.0",
ImagePullPolicy: corev1.PullPolicy("Always"),
Command: []string{"/prometheus_dummy_exporter", "--metric-name=" + metricName,
fmt.Sprintf("--metric-value=%v", metricValue), fmt.Sprintf("=--port=%d", port)},
@@ -183,7 +183,7 @@ func prometheusExporterPodSpec(metricName string, metricValue int64, port int32)
},
{
Name: "prometheus-to-sd",
- Image: "gcr.io/google-containers/prometheus-to-sd:v0.2.3",
+ Image: "k8s.gcr.io/prometheus-to-sd:v0.2.3",
ImagePullPolicy: corev1.PullPolicy("Always"),
Command: []string{"/monitor", fmt.Sprintf("--source=:http://localhost:%d", port),
"--stackdriver-prefix=custom.googleapis.com", "--pod-id=$(POD_ID)", "--namespace-id=$(POD_NAMESPACE)"},
diff --git a/test/e2e/testing-manifests/ingress/http/rc.yaml b/test/e2e/testing-manifests/ingress/http/rc.yaml
index 9b7d3b624d..a4bcd5e395 100644
--- a/test/e2e/testing-manifests/ingress/http/rc.yaml
+++ b/test/e2e/testing-manifests/ingress/http/rc.yaml
@@ -11,7 +11,7 @@ spec:
spec:
containers:
- name: echoheaders
- image: gcr.io/google_containers/echoserver:1.6
+ image: k8s.gcr.io/echoserver:1.6
ports:
- containerPort: 8080
readinessProbe:
diff --git a/test/e2e/testing-manifests/ingress/nginx/rc.yaml b/test/e2e/testing-manifests/ingress/nginx/rc.yaml
index 9d21ff5500..b80b0837a1 100644
--- a/test/e2e/testing-manifests/ingress/nginx/rc.yaml
+++ b/test/e2e/testing-manifests/ingress/nginx/rc.yaml
@@ -17,7 +17,7 @@ spec:
spec:
terminationGracePeriodSeconds: 0
containers:
- - image: gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.1
+ - image: k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.1
livenessProbe:
httpGet:
path: /healthz
diff --git a/test/e2e/testing-manifests/ingress/static-ip-2/rc.yaml b/test/e2e/testing-manifests/ingress/static-ip-2/rc.yaml
index abf9b036ed..391ad67444 100644
--- a/test/e2e/testing-manifests/ingress/static-ip-2/rc.yaml
+++ b/test/e2e/testing-manifests/ingress/static-ip-2/rc.yaml
@@ -11,6 +11,6 @@ spec:
spec:
containers:
- name: echoheaders-https
- image: gcr.io/google_containers/echoserver:1.6
+ image: k8s.gcr.io/echoserver:1.6
ports:
- containerPort: 8080
diff --git a/test/e2e/testing-manifests/ingress/static-ip/rc.yaml b/test/e2e/testing-manifests/ingress/static-ip/rc.yaml
index abf9b036ed..391ad67444 100644
--- a/test/e2e/testing-manifests/ingress/static-ip/rc.yaml
+++ b/test/e2e/testing-manifests/ingress/static-ip/rc.yaml
@@ -11,6 +11,6 @@ spec:
spec:
containers:
- name: echoheaders-https
- image: gcr.io/google_containers/echoserver:1.6
+ image: k8s.gcr.io/echoserver:1.6
ports:
- containerPort: 8080
diff --git a/test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml b/test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml
index 528aa25a12..b1ce4229cb 100644
--- a/test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml
+++ b/test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml
@@ -17,7 +17,7 @@ spec:
version: v1
spec:
containers:
- - image: gcr.io/google_containers/servicelb:0.1
+ - image: k8s.gcr.io/servicelb:0.1
imagePullPolicy: Always
livenessProbe:
httpGet:
diff --git a/test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml b/test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml
index c2aa34ca1f..f09c090d5b 100644
--- a/test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml
+++ b/test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml
@@ -12,7 +12,7 @@ spec:
spec:
containers:
- name: netexec
- image: gcr.io/google_containers/netexec:1.4
+ image: k8s.gcr.io/netexec:1.4
ports:
- containerPort: 8080
# This is to force these pods to land on different hosts.
diff --git a/test/e2e/testing-manifests/statefulset/cassandra/tester.yaml b/test/e2e/testing-manifests/statefulset/cassandra/tester.yaml
index 65699f8e3c..8139cf5f99 100644
--- a/test/e2e/testing-manifests/statefulset/cassandra/tester.yaml
+++ b/test/e2e/testing-manifests/statefulset/cassandra/tester.yaml
@@ -11,7 +11,7 @@ spec:
spec:
containers:
- name: test-server
- image: gcr.io/google-containers/cassandra-e2e-test:0.1
+ image: k8s.gcr.io/cassandra-e2e-test:0.1
imagePullPolicy: Always
ports:
- containerPort: 8080
diff --git a/test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml b/test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml
index f1be16ff7c..f61574e8cf 100644
--- a/test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml
+++ b/test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml
@@ -15,7 +15,7 @@ spec:
spec:
containers:
- name: etcd
- image: gcr.io/google_containers/etcd-amd64:2.2.5
+ image: k8s.gcr.io/etcd-amd64:2.2.5
imagePullPolicy: Always
ports:
- containerPort: 2380
diff --git a/test/e2e/testing-manifests/statefulset/etcd/tester.yaml b/test/e2e/testing-manifests/statefulset/etcd/tester.yaml
index c5ea0b90c1..ee53bc1419 100644
--- a/test/e2e/testing-manifests/statefulset/etcd/tester.yaml
+++ b/test/e2e/testing-manifests/statefulset/etcd/tester.yaml
@@ -11,7 +11,7 @@ spec:
spec:
containers:
- name: test-server
- image: gcr.io/google-containers/etcd-statefulset-e2e-test:0.0
+ image: k8s.gcr.io/etcd-statefulset-e2e-test:0.0
imagePullPolicy: Always
ports:
- containerPort: 8080
diff --git a/test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml b/test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml
index 85f4c080c6..20483ea454 100644
--- a/test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml
+++ b/test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml
@@ -12,7 +12,7 @@ spec:
spec:
initContainers:
- name: install
- image: gcr.io/google_containers/galera-install:0.1
+ image: k8s.gcr.io/galera-install:0.1
imagePullPolicy: Always
args:
- "--work-dir=/work-dir"
@@ -41,7 +41,7 @@ spec:
mountPath: "/etc/mysql"
containers:
- name: mysql
- image: gcr.io/google_containers/mysql-galera:e2e
+ image: k8s.gcr.io/mysql-galera:e2e
ports:
- containerPort: 3306
name: mysql
@@ -55,7 +55,7 @@ spec:
- --defaults-file=/etc/mysql/my-galera.cnf
- --user=root
readinessProbe:
- # TODO: If docker exec is buggy just use gcr.io/google_containers/mysql-healthz:1.0
+ # TODO: If docker exec is buggy just use k8s.gcr.io/mysql-healthz:1.0
exec:
command:
- sh
diff --git a/test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml b/test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml
index c7e7ff8d4f..3a60b3473a 100644
--- a/test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml
+++ b/test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml
@@ -11,7 +11,7 @@ spec:
spec:
containers:
- name: test-server
- image: gcr.io/google-containers/mysql-e2e-test:0.1
+ image: k8s.gcr.io/mysql-e2e-test:0.1
imagePullPolicy: Always
ports:
- containerPort: 8080
diff --git a/test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml b/test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml
index a483fd5dd3..0436fe25ba 100644
--- a/test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml
+++ b/test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml
@@ -15,7 +15,7 @@ spec:
spec:
containers:
- name: nginx
- image: gcr.io/google_containers/nginx-slim:0.8
+ image: k8s.gcr.io/nginx-slim:0.8
ports:
- containerPort: 80
name: web
@@ -31,4 +31,4 @@ spec:
accessModes: [ "ReadWriteOnce" ]
resources:
requests:
- storage: 1Gi
\ No newline at end of file
+ storage: 1Gi
diff --git a/test/e2e/testing-manifests/statefulset/redis/statefulset.yaml b/test/e2e/testing-manifests/statefulset/redis/statefulset.yaml
index e5ed3a798b..85c6b497ac 100644
--- a/test/e2e/testing-manifests/statefulset/redis/statefulset.yaml
+++ b/test/e2e/testing-manifests/statefulset/redis/statefulset.yaml
@@ -12,7 +12,7 @@ spec:
spec:
initContainers:
- name: install
- image: gcr.io/google_containers/redis-install-3.2.0:e2e
+ image: k8s.gcr.io/redis-install-3.2.0:e2e
imagePullPolicy: Always
args:
- "--install-into=/opt"
diff --git a/test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml b/test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml
index 62c534cddc..d08e62800e 100644
--- a/test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml
+++ b/test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml
@@ -12,7 +12,7 @@ spec:
spec:
initContainers:
- name: install
- image: gcr.io/google_containers/zookeeper-install-3.5.0-alpha:e2e
+ image: k8s.gcr.io/zookeeper-install-3.5.0-alpha:e2e
imagePullPolicy: Always
args:
- "--install-into=/opt"
diff --git a/test/e2e_node/conformance/build/Makefile b/test/e2e_node/conformance/build/Makefile
index abc03366bc..20d74356af 100644
--- a/test/e2e_node/conformance/build/Makefile
+++ b/test/e2e_node/conformance/build/Makefile
@@ -15,7 +15,7 @@
# Build the node-test image.
#
# Usage:
-# [ARCH=amd64] [REGISTRY="gcr.io/google_containers"] [BIN_DIR="../../../../_output/bin"] make (build|push) VERSION={some_version_number e.g. 0.1}
+# [ARCH=amd64] [REGISTRY="staging-k8s.gcr.io"] [BIN_DIR="../../../../_output/bin"] make (build|push) VERSION={some_version_number e.g. 0.1}
# SYSTEM_SPEC_NAME is the name of the system spec used for the node conformance
# test. The specs are expected to be in SYSTEM_SPEC_DIR.
@@ -23,7 +23,7 @@ SYSTEM_SPEC_NAME?=
SYSTEM_SPEC_DIR?=../../system/specs
# TODO(random-liu): Add this into release progress.
-REGISTRY?=gcr.io/google_containers
+REGISTRY?=staging-k8s.gcr.io
ARCH?=amd64
# BIN_DIR is the directory to find binaries, overwrite with ../../../../_output/bin
# for local development.
diff --git a/test/e2e_node/conformance/run_test.sh b/test/e2e_node/conformance/run_test.sh
index af9f2febc8..6ddb247883 100755
--- a/test/e2e_node/conformance/run_test.sh
+++ b/test/e2e_node/conformance/run_test.sh
@@ -44,7 +44,7 @@ SKIP=${SKIP:-""}
TEST_ARGS=${TEST_ARGS:-""}
# REGISTRY is the image registry for node test image.
-REGISTRY=${REGISTRY:-"gcr.io/google_containers"}
+REGISTRY=${REGISTRY:-"k8s.gcr.io"}
# ARCH is the architecture of current machine, the script will use this to
# select corresponding test container image.
diff --git a/test/e2e_node/gke_environment_test.go b/test/e2e_node/gke_environment_test.go
index ee1ddafd4e..dd88976b39 100644
--- a/test/e2e_node/gke_environment_test.go
+++ b/test/e2e_node/gke_environment_test.go
@@ -84,7 +84,7 @@ func checkIPTables() (err error) {
// checkPublicGCR checks the access to the public Google Container Registry by
// pulling the busybox image.
func checkPublicGCR() error {
- const image = "gcr.io/google-containers/busybox"
+ const image = "k8s.gcr.io/busybox"
output, err := runCommand("docker", "images", "-q", image)
if len(output) != 0 {
if _, err := runCommand("docker", "rmi", "-f", image); err != nil {
@@ -170,7 +170,7 @@ func checkDockerConfig() error {
// checkDockerNetworkClient checks client networking by pinging an external IP
// address from a container.
func checkDockerNetworkClient() error {
- const imageName = "gcr.io/google-containers/busybox"
+ const imageName = "k8s.gcr.io/busybox"
output, err := runCommand("docker", "run", "--rm", imageName, "sh", "-c", "ping -w 5 -q google.com")
if err != nil {
return err
@@ -185,7 +185,7 @@ func checkDockerNetworkClient() error {
// within a container and accessing it from outside.
func checkDockerNetworkServer() error {
const (
- imageName = "gcr.io/google-containers/nginx:1.7.9"
+ imageName = "k8s.gcr.io/nginx:1.7.9"
hostAddr = "127.0.0.1"
hostPort = "8088"
containerPort = "80"
diff --git a/test/e2e_node/image_id_test.go b/test/e2e_node/image_id_test.go
index a131c398b8..090eafa286 100644
--- a/test/e2e_node/image_id_test.go
+++ b/test/e2e_node/image_id_test.go
@@ -28,7 +28,7 @@ import (
var _ = framework.KubeDescribe("ImageID", func() {
- busyBoxImage := "gcr.io/google_containers/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff"
+ busyBoxImage := "k8s.gcr.io/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff"
f := framework.NewDefaultFramework("image-id-test")
diff --git a/test/e2e_node/image_list.go b/test/e2e_node/image_list.go
index bd55bf59e8..00a35955a7 100644
--- a/test/e2e_node/image_list.go
+++ b/test/e2e_node/image_list.go
@@ -43,10 +43,10 @@ const (
// before test running so that the image pulling won't fail in actual test.
var NodeImageWhiteList = sets.NewString(
"google/cadvisor:latest",
- "gcr.io/google-containers/stress:v1",
+ "k8s.gcr.io/stress:v1",
busyboxImage,
- "gcr.io/google_containers/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff",
- "gcr.io/google_containers/node-problem-detector:v0.4.1",
+ "k8s.gcr.io/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff",
+ "k8s.gcr.io/node-problem-detector:v0.4.1",
imageutils.GetE2EImage(imageutils.NginxSlim),
imageutils.GetE2EImage(imageutils.ServeHostname),
imageutils.GetE2EImage(imageutils.Netexec),
diff --git a/test/e2e_node/jenkins/gci-init-gpu.yaml b/test/e2e_node/jenkins/gci-init-gpu.yaml
index 064b77095c..3b943de33f 100644
--- a/test/e2e_node/jenkins/gci-init-gpu.yaml
+++ b/test/e2e_node/jenkins/gci-init-gpu.yaml
@@ -2,7 +2,7 @@
runcmd:
- modprobe configs
- - docker run -v /dev:/dev -v /home/kubernetes/bin/nvidia:/rootfs/nvidia -v /etc/os-release:/rootfs/etc/os-release -v /proc/sysrq-trigger:/sysrq -e BASE_DIR=/rootfs/nvidia --privileged gcr.io/google_containers/cos-nvidia-driver-install@sha256:cb55c7971c337fece62f2bfe858662522a01e43ac9984a2dd1dd5c71487d225c
+ - docker run -v /dev:/dev -v /home/kubernetes/bin/nvidia:/rootfs/nvidia -v /etc/os-release:/rootfs/etc/os-release -v /proc/sysrq-trigger:/sysrq -e BASE_DIR=/rootfs/nvidia --privileged k8s.gcr.io/cos-nvidia-driver-install@sha256:cb55c7971c337fece62f2bfe858662522a01e43ac9984a2dd1dd5c71487d225c
- mount /tmp /tmp -o remount,exec,suid
- usermod -a -G docker jenkins
- mkdir -p /var/lib/kubelet
diff --git a/test/e2e_node/node_problem_detector_linux.go b/test/e2e_node/node_problem_detector_linux.go
index 3c9b6453ec..9333b66cba 100644
--- a/test/e2e_node/node_problem_detector_linux.go
+++ b/test/e2e_node/node_problem_detector_linux.go
@@ -45,7 +45,7 @@ var _ = framework.KubeDescribe("NodeProblemDetector", func() {
pollInterval = 1 * time.Second
pollConsistent = 5 * time.Second
pollTimeout = 1 * time.Minute
- image = "gcr.io/google_containers/node-problem-detector:v0.4.1"
+ image = "k8s.gcr.io/node-problem-detector:v0.4.1"
)
f := framework.NewDefaultFramework("node-problem-detector")
var c clientset.Interface
diff --git a/test/e2e_node/remote/node_conformance.go b/test/e2e_node/remote/node_conformance.go
index 59e322a77b..625940bf19 100644
--- a/test/e2e_node/remote/node_conformance.go
+++ b/test/e2e_node/remote/node_conformance.go
@@ -53,7 +53,7 @@ func commandToString(c *exec.Cmd) string {
// Image path constants.
const (
- conformanceRegistry = "gcr.io/google_containers"
+ conformanceRegistry = "k8s.gcr.io"
conformanceArch = runtime.GOARCH
conformanceTarfile = "node_conformance.tar"
conformanceTestBinary = "e2e_node.test"
diff --git a/test/e2e_node/runtime_conformance_test.go b/test/e2e_node/runtime_conformance_test.go
index a616dd9b1e..0a8b7ac57d 100644
--- a/test/e2e_node/runtime_conformance_test.go
+++ b/test/e2e_node/runtime_conformance_test.go
@@ -275,13 +275,13 @@ while true; do sleep 1; done
},
{
description: "should not be able to pull non-existing image from gcr.io",
- image: "gcr.io/google_containers/invalid-image:invalid-tag",
+ image: "k8s.gcr.io/invalid-image:invalid-tag",
phase: v1.PodPending,
waiting: true,
},
{
description: "should be able to pull image from gcr.io",
- image: "gcr.io/google_containers/alpine-with-bash:1.0",
+ image: "k8s.gcr.io/alpine-with-bash:1.0",
phase: v1.PodRunning,
waiting: false,
},
diff --git a/test/fixtures/doc-yaml/admin/high-availability/etcd.yaml b/test/fixtures/doc-yaml/admin/high-availability/etcd.yaml
index 3c73984ba9..d9f2b8e64d 100644
--- a/test/fixtures/doc-yaml/admin/high-availability/etcd.yaml
+++ b/test/fixtures/doc-yaml/admin/high-availability/etcd.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
hostNetwork: true
containers:
- - image: gcr.io/google_containers/etcd:2.0.9
+ - image: k8s.gcr.io/etcd:2.0.9
name: etcd-container
command:
- /usr/local/bin/etcd
diff --git a/test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml b/test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml
index a41a2c666d..a415ebc19d 100644
--- a/test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml
+++ b/test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml
@@ -6,7 +6,7 @@ spec:
hostNetwork: true
containers:
- name: kube-apiserver
- image: gcr.io/google_containers/kube-apiserver:9680e782e08a1a1c94c656190011bd02
+ image: k8s.gcr.io/kube-apiserver:9680e782e08a1a1c94c656190011bd02
command:
- /bin/sh
- -c
diff --git a/test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml b/test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml
index a7cfbd5785..7985192978 100644
--- a/test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml
+++ b/test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml
@@ -10,7 +10,7 @@ spec:
- /usr/local/bin/kube-controller-manager --master=127.0.0.1:8080 --cluster-name=e2e-test-bburns
--cluster-cidr=10.245.0.0/16 --allocate-node-cidrs=true --cloud-provider=gce --service-account-private-key-file=/srv/kubernetes/server.key
--v=2 1>>/var/log/kube-controller-manager.log --leader-elect 2>&1
- image: gcr.io/google_containers/kube-controller-manager:fda24638d51a48baa13c35337fcd4793
+ image: k8s.gcr.io/kube-controller-manager:fda24638d51a48baa13c35337fcd4793
livenessProbe:
httpGet:
path: /healthz
diff --git a/test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml b/test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml
index eeef9bb628..1da3091859 100644
--- a/test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml
+++ b/test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml
@@ -6,7 +6,7 @@ spec:
hostNetwork: true
containers:
- name: kube-scheduler
- image: gcr.io/google_containers/kube-scheduler:34d0b8f8b31e27937327961528739bc9
+ image: k8s.gcr.io/kube-scheduler:34d0b8f8b31e27937327961528739bc9
command:
- /bin/sh
- -c
diff --git a/test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml b/test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml
index b63f25deba..ecb45dd95f 100644
--- a/test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml
+++ b/test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: kubernetes-serve-hostname
- image: gcr.io/google_containers/serve_hostname
+ image: k8s.gcr.io/serve_hostname
resources:
limits:
cpu: "3"
diff --git a/test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml b/test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml
index c1ec54183b..d83e91267a 100644
--- a/test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml
+++ b/test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml
@@ -7,7 +7,7 @@ metadata:
spec:
containers:
- name: kubernetes-serve-hostname
- image: gcr.io/google_containers/serve_hostname
+ image: k8s.gcr.io/serve_hostname
resources:
limits:
cpu: "1"
diff --git a/test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml b/test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml
index a4796fc24c..6414555355 100644
--- a/test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml
+++ b/test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
- image: gcr.io/google_containers/busybox
+ image: k8s.gcr.io/busybox
command: [ "/bin/sh", "-c", "env" ]
env:
- name: MY_POD_NAME
diff --git a/test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml b/test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml
index 461691df22..204c4ddf59 100644
--- a/test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml
+++ b/test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml
@@ -10,7 +10,7 @@ spec:
- /bin/sh
- -c
- echo ok > /tmp/health; sleep 10; rm -rf /tmp/health; sleep 600
- image: gcr.io/google_containers/busybox
+ image: k8s.gcr.io/busybox
livenessProbe:
exec:
command:
diff --git a/test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml b/test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml
index e7196c6559..1a6ef7bc64 100644
--- a/test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml
+++ b/test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml
@@ -8,7 +8,7 @@ spec:
containers:
- args:
- /server
- image: gcr.io/google_containers/liveness
+ image: k8s.gcr.io/liveness
livenessProbe:
httpGet:
path: /healthz
diff --git a/test/fixtures/doc-yaml/user-guide/multi-pod.yaml b/test/fixtures/doc-yaml/user-guide/multi-pod.yaml
index 1a1d758e99..c795ce6f4d 100644
--- a/test/fixtures/doc-yaml/user-guide/multi-pod.yaml
+++ b/test/fixtures/doc-yaml/user-guide/multi-pod.yaml
@@ -42,7 +42,7 @@ metadata:
spec:
containers:
- name: kubernetes-serve-hostname
- image: gcr.io/google_containers/serve_hostname
+ image: k8s.gcr.io/serve_hostname
resources:
limits:
cpu: "1"
diff --git a/test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml b/test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml
index a5d9c0ff75..d93d4095e1 100644
--- a/test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml
+++ b/test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
- image: gcr.io/google_containers/busybox
+ image: k8s.gcr.io/busybox
command: [ "/bin/sh", "-c", "env" ]
env:
- name: MY_SECRET_DATA
diff --git a/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml b/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml
index 8f87a8dea5..1ff2e8652f 100644
--- a/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml
+++ b/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml
@@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
- image: gcr.io/google_containers/mounttest:0.8
+ image: k8s.gcr.io/mounttest:0.8
command: [ "/mt", "--file_content=/etc/secret-volume/data-1" ]
volumeMounts:
# name must match the volume name below
diff --git a/test/fixtures/pkg/kubectl/builder/kitten-rc.yaml b/test/fixtures/pkg/kubectl/builder/kitten-rc.yaml
index 91f1aa06c3..48b15cc190 100644
--- a/test/fixtures/pkg/kubectl/builder/kitten-rc.yaml
+++ b/test/fixtures/pkg/kubectl/builder/kitten-rc.yaml
@@ -13,7 +13,7 @@ spec:
version: kitten
spec:
containers:
- - image: gcr.io/google_containers/update-demo:kitten
+ - image: k8s.gcr.io/update-demo:kitten
name: update-demo
ports:
- containerPort: 80
diff --git a/test/fixtures/pkg/kubectl/cmd/auth/rbac-resource-plus.yaml b/test/fixtures/pkg/kubectl/cmd/auth/rbac-resource-plus.yaml
index c358d8aa28..958e054ec5 100644
--- a/test/fixtures/pkg/kubectl/cmd/auth/rbac-resource-plus.yaml
+++ b/test/fixtures/pkg/kubectl/cmd/auth/rbac-resource-plus.yaml
@@ -30,7 +30,7 @@ items:
spec:
containers:
- name: kubernetes-serve-hostname
- image: gcr.io/google_containers/serve_hostname
+ image: k8s.gcr.io/serve_hostname
resources:
limits:
cpu: "1"
diff --git a/test/fixtures/pkg/kubectl/cmd/set/multi-resource-yaml.yaml b/test/fixtures/pkg/kubectl/cmd/set/multi-resource-yaml.yaml
index 35b388c7a9..4c1c6f244f 100644
--- a/test/fixtures/pkg/kubectl/cmd/set/multi-resource-yaml.yaml
+++ b/test/fixtures/pkg/kubectl/cmd/set/multi-resource-yaml.yaml
@@ -13,7 +13,7 @@ spec:
spec:
containers:
- name: mock-container
- image: gcr.io/google-containers/pause:2.0
+ image: k8s.gcr.io/pause:2.0
---
apiVersion: v1
kind: ReplicationController
@@ -30,4 +30,4 @@ spec:
spec:
containers:
- name: mock-container
- image: gcr.io/google-containers/pause:2.0
\ No newline at end of file
+ image: k8s.gcr.io/pause:2.0
diff --git a/test/images/iperf/BASEIMAGE b/test/images/iperf/BASEIMAGE
index 1bf3907f76..7f7f90c89a 100644
--- a/test/images/iperf/BASEIMAGE
+++ b/test/images/iperf/BASEIMAGE
@@ -1,4 +1,4 @@
-amd64=gcr.io/google_containers/ubuntu-slim:0.12
-arm=gcr.io/google_containers/ubuntu-slim-arm:0.12
-arm64=gcr.io/google_containers/ubuntu-slim-arm64:0.12
-ppc64le=gcr.io/google_containers/ubuntu-slim-ppc64le:0.12
+amd64=k8s.gcr.io/ubuntu-slim:0.12
+arm=k8s.gcr.io/ubuntu-slim-arm:0.12
+arm64=k8s.gcr.io/ubuntu-slim-arm64:0.12
+ppc64le=k8s.gcr.io/ubuntu-slim-ppc64le:0.12
diff --git a/test/images/logs-generator/README.md b/test/images/logs-generator/README.md
index 8f89bb4a4b..889ba2a7bd 100644
--- a/test/images/logs-generator/README.md
+++ b/test/images/logs-generator/README.md
@@ -33,7 +33,7 @@ line in a given run of the container.
Image is located in the public repository of Google Container Registry under the name
```
-gcr.io/google_containers/logs-generator:v0.1.1
+k8s.gcr.io/logs-generator:v0.1.1
```
## Examples
@@ -42,13 +42,13 @@ gcr.io/google_containers/logs-generator:v0.1.1
docker run -i \
-e "LOGS_GENERATOR_LINES_TOTAL=10" \
-e "LOGS_GENERATOR_DURATION=1s" \
- gcr.io/google_containers/logs-generator:v0.1.1
+ k8s.gcr.io/logs-generator:v0.1.1
```
```
kubectl run logs-generator \
--generator=run-pod/v1 \
- --image=gcr.io/google_containers/logs-generator:v0.1.1 \
+ --image=k8s.gcr.io/logs-generator:v0.1.1 \
--restart=Never \
--env "LOGS_GENERATOR_LINES_TOTAL=1000" \
--env "LOGS_GENERATOR_DURATION=1m"
diff --git a/test/images/pets/peer-finder/BASEIMAGE b/test/images/pets/peer-finder/BASEIMAGE
index 425fce2600..0b04ef6e4d 100644
--- a/test/images/pets/peer-finder/BASEIMAGE
+++ b/test/images/pets/peer-finder/BASEIMAGE
@@ -1,4 +1,4 @@
-amd64=gcr.io/google-containers/debian-base-amd64:0.3
-arm=gcr.io/google-containers/debian-base-arm:0.3
-arm64=gcr.io/google-containers/debian-base-arm64:0.3
-ppc64le=gcr.io/google-containers/debian-base-ppc64le:0.3
+amd64=k8s.gcr.io/debian-base-amd64:0.3
+arm=k8s.gcr.io/debian-base-arm:0.3
+arm64=k8s.gcr.io/debian-base-arm64:0.3
+ppc64le=k8s.gcr.io/debian-base-ppc64le:0.3
diff --git a/test/images/pets/redis-installer/BASEIMAGE b/test/images/pets/redis-installer/BASEIMAGE
index 425fce2600..0b04ef6e4d 100644
--- a/test/images/pets/redis-installer/BASEIMAGE
+++ b/test/images/pets/redis-installer/BASEIMAGE
@@ -1,4 +1,4 @@
-amd64=gcr.io/google-containers/debian-base-amd64:0.3
-arm=gcr.io/google-containers/debian-base-arm:0.3
-arm64=gcr.io/google-containers/debian-base-arm64:0.3
-ppc64le=gcr.io/google-containers/debian-base-ppc64le:0.3
+amd64=k8s.gcr.io/debian-base-amd64:0.3
+arm=k8s.gcr.io/debian-base-arm:0.3
+arm64=k8s.gcr.io/debian-base-arm64:0.3
+ppc64le=k8s.gcr.io/debian-base-ppc64le:0.3
diff --git a/test/images/pets/redis-installer/README.md b/test/images/pets/redis-installer/README.md
index 04024c1359..e1c3587af3 100644
--- a/test/images/pets/redis-installer/README.md
+++ b/test/images/pets/redis-installer/README.md
@@ -4,7 +4,7 @@ The image in this directory is the init container for contrib/pets/redis but for
You can execute the image locally via:
```
-$ docker run -it gcr.io/google_containers/redis-install-3.2.0:e2e --cmd --install-into=/opt --work-dir=/work-dir
+$ docker run -it k8s.gcr.io/redis-install-3.2.0:e2e --cmd --install-into=/opt --work-dir=/work-dir
```
To share the installation with other containers mount the appropriate volumes as `--install-into` and `--work-dir`, where `install-into` is the directory to install redis into, and `work-dir` is the directory to install the user/admin supplied on-{start,change} hook scripts.
diff --git a/test/images/pets/zookeeper-installer/BASEIMAGE b/test/images/pets/zookeeper-installer/BASEIMAGE
index 425fce2600..0b04ef6e4d 100644
--- a/test/images/pets/zookeeper-installer/BASEIMAGE
+++ b/test/images/pets/zookeeper-installer/BASEIMAGE
@@ -1,4 +1,4 @@
-amd64=gcr.io/google-containers/debian-base-amd64:0.3
-arm=gcr.io/google-containers/debian-base-arm:0.3
-arm64=gcr.io/google-containers/debian-base-arm64:0.3
-ppc64le=gcr.io/google-containers/debian-base-ppc64le:0.3
+amd64=k8s.gcr.io/debian-base-amd64:0.3
+arm=k8s.gcr.io/debian-base-arm:0.3
+arm64=k8s.gcr.io/debian-base-arm64:0.3
+ppc64le=k8s.gcr.io/debian-base-ppc64le:0.3
diff --git a/test/images/pets/zookeeper-installer/README.md b/test/images/pets/zookeeper-installer/README.md
index 071bc7aa48..598ca7afe9 100644
--- a/test/images/pets/zookeeper-installer/README.md
+++ b/test/images/pets/zookeeper-installer/README.md
@@ -4,7 +4,7 @@ The image in this directory is the init container for contrib/pets/zookeeper but
You can execute the image locally via:
```
-$ docker run -it gcr.io/google_containers/zookeeper-install-3.5.0-alpha:e2e --cmd --install-into=/opt --work-dir=/work-dir
+$ docker run -it k8s.gcr.io/zookeeper-install-3.5.0-alpha:e2e --cmd --install-into=/opt --work-dir=/work-dir
```
To share the installation with other containers mount the appropriate volumes as `--install-into` and `--work-dir`, where `install-into` is the directory to install zookeeper into, and `work-dir` is the directory to install the user/admin supplied on-{start,change} hook scripts.
diff --git a/test/images/resource-consumer/BASEIMAGE b/test/images/resource-consumer/BASEIMAGE
index 425fce2600..0b04ef6e4d 100644
--- a/test/images/resource-consumer/BASEIMAGE
+++ b/test/images/resource-consumer/BASEIMAGE
@@ -1,4 +1,4 @@
-amd64=gcr.io/google-containers/debian-base-amd64:0.3
-arm=gcr.io/google-containers/debian-base-arm:0.3
-arm64=gcr.io/google-containers/debian-base-arm64:0.3
-ppc64le=gcr.io/google-containers/debian-base-ppc64le:0.3
+amd64=k8s.gcr.io/debian-base-amd64:0.3
+arm=k8s.gcr.io/debian-base-arm:0.3
+arm64=k8s.gcr.io/debian-base-arm64:0.3
+ppc64le=k8s.gcr.io/debian-base-ppc64le:0.3
diff --git a/test/images/resource-consumer/README.md b/test/images/resource-consumer/README.md
index 19801af8e3..742bafee36 100644
--- a/test/images/resource-consumer/README.md
+++ b/test/images/resource-consumer/README.md
@@ -48,7 +48,7 @@ Custom metrics in Prometheus format are exposed on "/metrics" endpoint.
###CURL example
```console
-$ kubectl run resource-consumer --image=gcr.io/google_containers/resource_consumer:beta --expose --service-overrides='{ "spec": { "type": "LoadBalancer" } }' --port 8080
+$ kubectl run resource-consumer --image=k8s.gcr.io/resource_consumer:beta --expose --service-overrides='{ "spec": { "type": "LoadBalancer" } }' --port 8080
$ kubectl get services resource-consumer
```
@@ -62,7 +62,7 @@ $ curl --data "millicores=300&durationSec=600" http://:8080/Consume
## Image
-Docker image of Resource Consumer can be found in Google Container Registry as gcr.io/google_containers/resource_consumer:beta
+Docker image of Resource Consumer can be found in Google Container Registry as k8s.gcr.io/resource_consumer:beta
## Use cases
diff --git a/test/images/serve-hostname/README.md b/test/images/serve-hostname/README.md
index 28d3733664..a4647ff95f 100644
--- a/test/images/serve-hostname/README.md
+++ b/test/images/serve-hostname/README.md
@@ -15,19 +15,19 @@ $ make all-push
# Build for linux/amd64 (default)
$ make push ARCH=amd64
-# ---> gcr.io/google_containers/serve_hostname-amd64:TAG
+# ---> staging-k8s.gcr.io/serve_hostname-amd64:TAG
$ make push ARCH=arm
-# ---> gcr.io/google_containers/serve_hostname-arm:TAG
+# ---> staging-k8s.gcr.io/serve_hostname-arm:TAG
$ make push ARCH=arm64
-# ---> gcr.io/google_containers/serve_hostname-arm64:TAG
+# ---> staging-k8s.gcr.io/serve_hostname-arm64:TAG
$ make push ARCH=ppc64le
-# ---> gcr.io/google_containers/serve_hostname-ppc64le:TAG
+# ---> staging-k8s.gcr.io/serve_hostname-ppc64le:TAG
$ make push ARCH=s390x
-# ---> gcr.io/google_containers/serve_hostname-s390x:TAG
+# ---> staging-k8s.gcr.io/serve_hostname-s390x:TAG
```
Of course, if you don't want to push the images, run `make all-container` or `make container ARCH={target_arch}` instead.
diff --git a/test/images/volumes-tester/ceph/Makefile b/test/images/volumes-tester/ceph/Makefile
index 2883aafb64..96c9bdbd40 100644
--- a/test/images/volumes-tester/ceph/Makefile
+++ b/test/images/volumes-tester/ceph/Makefile
@@ -13,7 +13,7 @@
# limitations under the License.
TAG = 0.1
-PREFIX = gcr.io/google_containers
+PREFIX = staging-k8s.gcr.io
all: push
diff --git a/test/images/volumes-tester/gluster/Makefile b/test/images/volumes-tester/gluster/Makefile
index 4aa5b11351..c4b1654e4f 100644
--- a/test/images/volumes-tester/gluster/Makefile
+++ b/test/images/volumes-tester/gluster/Makefile
@@ -13,7 +13,7 @@
# limitations under the License.
TAG = 0.4
-PREFIX = gcr.io/google_containers
+PREFIX = staging-k8s.gcr.io
all: push
diff --git a/test/images/volumes-tester/iscsi/Makefile b/test/images/volumes-tester/iscsi/Makefile
index dd830d4fd2..df13471923 100644
--- a/test/images/volumes-tester/iscsi/Makefile
+++ b/test/images/volumes-tester/iscsi/Makefile
@@ -13,7 +13,7 @@
# limitations under the License.
TAG = 0.1
-PREFIX = gcr.io/google_containers
+PREFIX = staging-k8s.gcr.io
all: push
diff --git a/test/images/volumes-tester/nfs/Makefile b/test/images/volumes-tester/nfs/Makefile
index 1e53b19c8b..1c1fc322e2 100644
--- a/test/images/volumes-tester/nfs/Makefile
+++ b/test/images/volumes-tester/nfs/Makefile
@@ -13,7 +13,7 @@
# limitations under the License.
TAG = 0.8
-PREFIX = gcr.io/google_containers
+PREFIX = staging-k8s.gcr.io
all: push
diff --git a/test/images/volumes-tester/rbd/Makefile b/test/images/volumes-tester/rbd/Makefile
index dcf3c69f37..27c67f47e2 100644
--- a/test/images/volumes-tester/rbd/Makefile
+++ b/test/images/volumes-tester/rbd/Makefile
@@ -13,7 +13,7 @@
# limitations under the License.
TAG = 0.1
-PREFIX = gcr.io/google_containers
+PREFIX = staging-k8s.gcr.io
all: push
diff --git a/test/integration/benchmark-controller.json b/test/integration/benchmark-controller.json
index 47ac4ae0cd..4cce2217eb 100644
--- a/test/integration/benchmark-controller.json
+++ b/test/integration/benchmark-controller.json
@@ -17,7 +17,7 @@
"spec": {
"containers": [{
"name": "test-container",
- "image": "gcr.io/google_containers/pause-amd64:3.1"
+ "image": "k8s.gcr.io/pause-amd64:3.1"
}]
}
}
diff --git a/test/integration/framework/util.go b/test/integration/framework/util.go
index c9d42a99c4..8fbb57de4b 100644
--- a/test/integration/framework/util.go
+++ b/test/integration/framework/util.go
@@ -31,7 +31,7 @@ import (
const (
// When these values are updated, also update cmd/kubelet/app/options/container_runtime.go
// A copy of these values exist in test/utils/image/manifest.go
- currentPodInfraContainerImageName = "gcr.io/google_containers/pause"
+ currentPodInfraContainerImageName = "k8s.gcr.io/pause"
currentPodInfraContainerImageVersion = "3.1"
)
diff --git a/test/integration/master/synthetic_master_test.go b/test/integration/master/synthetic_master_test.go
index d00f8766b2..aa063be5d2 100644
--- a/test/integration/master/synthetic_master_test.go
+++ b/test/integration/master/synthetic_master_test.go
@@ -279,7 +279,7 @@ var deploymentExtensions string = `
"spec": {
"containers": [{
"name": "nginx",
- "image": "gcr.io/google-containers/nginx:1.7.9"
+ "image": "k8s.gcr.io/nginx:1.7.9"
}]
}
}
@@ -306,7 +306,7 @@ var deploymentApps string = `
"spec": {
"containers": [{
"name": "nginx",
- "image": "gcr.io/google-containers/nginx:1.7.9"
+ "image": "k8s.gcr.io/nginx:1.7.9"
}]
}
}
diff --git a/test/integration/scheduler/volume_binding_test.go b/test/integration/scheduler/volume_binding_test.go
index 35f60f8102..de733fd248 100644
--- a/test/integration/scheduler/volume_binding_test.go
+++ b/test/integration/scheduler/volume_binding_test.go
@@ -324,7 +324,7 @@ func makePod(name, ns string, pvcs []string) *v1.Pod {
Containers: []v1.Container{
{
Name: "write-pod",
- Image: "gcr.io/google_containers/busybox:1.24",
+ Image: "k8s.gcr.io/busybox:1.24",
Command: []string{"/bin/sh"},
Args: []string{"-c", "while true; do sleep 1; done"},
},
diff --git a/test/kubemark/resources/cluster-autoscaler_template.json b/test/kubemark/resources/cluster-autoscaler_template.json
index f42c060e25..ffe4a61f8b 100644
--- a/test/kubemark/resources/cluster-autoscaler_template.json
+++ b/test/kubemark/resources/cluster-autoscaler_template.json
@@ -14,7 +14,7 @@
"containers": [
{
"name": "cluster-autoscaler",
- "image": "gcr.io/google_containers/cluster-autoscaler:v1.0.0",
+ "image": "k8s.gcr.io/cluster-autoscaler:v1.0.0",
"command": [
"./run.sh",
"--kubernetes=https://{{master_ip}}:443?inClusterConfig=0&useServiceAccount=0&auth=/kubeconfig/cluster_autoscaler.kubeconfig",
diff --git a/test/kubemark/resources/heapster_template.json b/test/kubemark/resources/heapster_template.json
index 491596b2ff..5a9bb512ea 100644
--- a/test/kubemark/resources/heapster_template.json
+++ b/test/kubemark/resources/heapster_template.json
@@ -33,7 +33,7 @@
"containers": [
{
"name": "heapster",
- "image": "gcr.io/google_containers/heapster:v1.3.0",
+ "image": "k8s.gcr.io/heapster:v1.3.0",
"resources": {
"requests": {
"cpu": "{{METRICS_CPU}}m",
@@ -55,7 +55,7 @@
},
{
"name": "eventer",
- "image": "gcr.io/google_containers/heapster:v1.3.0",
+ "image": "k8s.gcr.io/heapster:v1.3.0",
"resources": {
"requests": {
"memory": "{{EVENTER_MEM}}Ki"
diff --git a/test/kubemark/resources/hollow-node_template.yaml b/test/kubemark/resources/hollow-node_template.yaml
index 06352442c0..3a16f1f353 100644
--- a/test/kubemark/resources/hollow-node_template.yaml
+++ b/test/kubemark/resources/hollow-node_template.yaml
@@ -93,7 +93,7 @@ spec:
cpu: {{HOLLOW_PROXY_CPU}}m
memory: {{HOLLOW_PROXY_MEM}}Ki
- name: hollow-node-problem-detector
- image: gcr.io/google_containers/node-problem-detector:v0.4.1
+ image: k8s.gcr.io/node-problem-detector:v0.4.1
env:
- name: NODE_NAME
valueFrom:
diff --git a/test/kubemark/resources/start-kubemark-master.sh b/test/kubemark/resources/start-kubemark-master.sh
index b8d3c8d0ab..fd2b900f09 100755
--- a/test/kubemark/resources/start-kubemark-master.sh
+++ b/test/kubemark/resources/start-kubemark-master.sh
@@ -695,7 +695,7 @@ fi
# Setup docker flags and load images of the master components.
assemble-docker-flags
-DOCKER_REGISTRY="gcr.io/google_containers"
+DOCKER_REGISTRY="k8s.gcr.io"
load-docker-images
readonly audit_policy_file="/etc/audit_policy.config"
diff --git a/test/kubemark/start-kubemark.sh b/test/kubemark/start-kubemark.sh
index 5d792c8e8d..6d8ed41afb 100755
--- a/test/kubemark/start-kubemark.sh
+++ b/test/kubemark/start-kubemark.sh
@@ -193,14 +193,14 @@ function create-and-upload-hollow-node-image {
echo 'Cannot find cmd/kubemark binary'
exit 1
fi
-
+
echo "Copying kubemark binary to ${MAKE_DIR}"
cp "${KUBEMARK_BIN}" "${MAKE_DIR}"
CURR_DIR=`pwd`
cd "${MAKE_DIR}"
RETRIES=3
for attempt in $(seq 1 ${RETRIES}); do
- if ! REGISTRY="${CONTAINER_REGISTRY}" PROJECT="${PROJECT}" make "${KUBEMARK_IMAGE_MAKE_TARGET}"; then
+ if ! REGISTRY="${FULL_REGISTRY}" make "${KUBEMARK_IMAGE_MAKE_TARGET}"; then
if [[ $((attempt)) -eq "${RETRIES}" ]]; then
echo "${color_red}Make failed. Exiting.${color_norm}"
exit 1
@@ -221,7 +221,7 @@ function create-and-upload-hollow-node-image {
function create-and-upload-hollow-node-image-bazel {
RETRIES=3
for attempt in $(seq 1 ${RETRIES}); do
- if ! bazel run //cluster/images/kubemark:push --define PROJECT="${PROJECT}"; then
+ if ! bazel run //cluster/images/kubemark:push --define REGISTRY="${FULL_REGISTRY}"; then
if [[ $((attempt)) -eq "${RETRIES}" ]]; then
echo "${color_red}Image push failed. Exiting.${color_norm}"
exit 1
@@ -457,6 +457,15 @@ write-local-kubeconfig
copy-resource-files-to-master
start-master-components
+# TODO: Simplify. The caller should have to pass a full registry or nothing.
+if [[ -n "${CONTAINER_REGISTRY}" && -n "${PROJECT}" ]]; then
+ FULL_REGISTRY="${CONTAINER_REGISTRY}/${PROJECT}"
+elif [[ -n "${CONTAINER_REGISTRY}" ]]; then
+ FULL_REGISTRY="${CONTAINER_REGISTRY}"
+else
+ FULL_REGISTRY=staging-k8s.gcr.io
+fi
+
# Setup for hollow-nodes.
echo ""
echo -e "${color_yellow}STARTING SETUP FOR HOLLOW-NODES${color_norm}"
diff --git a/test/utils/image/manifest.go b/test/utils/image/manifest.go
index 947132c3cc..85b0e5fd5d 100644
--- a/test/utils/image/manifest.go
+++ b/test/utils/image/manifest.go
@@ -23,7 +23,7 @@ import (
const (
e2eRegistry = "gcr.io/kubernetes-e2e-test-images"
- gcRegistry = "gcr.io/google-containers"
+ gcRegistry = "k8s.gcr.io"
PrivateRegistry = "gcr.io/k8s-authenticated-test"
sampleRegistry = "gcr.io/google-samples"
)