diff --git a/api/openapi-spec/swagger.json b/api/openapi-spec/swagger.json index 4d96ea2ec3..6e286b0737 100644 --- a/api/openapi-spec/swagger.json +++ b/api/openapi-spec/swagger.json @@ -76545,7 +76545,7 @@ ], "properties": { "names": { - "description": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]", + "description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]", "type": "array", "items": { "type": "string" diff --git a/api/swagger-spec/v1.json b/api/swagger-spec/v1.json index b5c645c96a..441cf97502 100644 --- a/api/swagger-spec/v1.json +++ b/api/swagger-spec/v1.json @@ -20261,7 +20261,7 @@ "items": { "type": "string" }, - "description": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]" + "description": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]" }, "sizeBytes": { "type": "integer", diff --git a/build/BUILD b/build/BUILD index 7e7beb7d67..8d3cdbba44 100644 --- a/build/BUILD +++ b/build/BUILD @@ -62,7 +62,11 @@ DOCKERIZED_BINARIES = { [docker_bundle( name = binary, - images = {"gcr.io/google_containers/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal"}, + # TODO(thockin): remove the google_containers name after release 1.10. + images = { + "k8s.gcr.io/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal", + "gcr.io/google_containers/%s:{STABLE_DOCKER_TAG}" % binary: binary + "-internal", + }, stamp = True, ) for binary in DOCKERIZED_BINARIES.keys()] diff --git a/build/build-image/Dockerfile b/build/build-image/Dockerfile index 59be59e409..f9d0adaf03 100644 --- a/build/build-image/Dockerfile +++ b/build/build-image/Dockerfile @@ -13,7 +13,7 @@ # limitations under the License. # This file creates a standard build environment for building Kubernetes -FROM gcr.io/google_containers/kube-cross:KUBE_BUILD_IMAGE_CROSS_TAG +FROM k8s.gcr.io/kube-cross:KUBE_BUILD_IMAGE_CROSS_TAG # Mark this as a kube-build container RUN touch /kube-build-image diff --git a/build/build-image/cross/Makefile b/build/build-image/cross/Makefile index c8ed25375c..fb49f3f2d0 100644 --- a/build/build-image/cross/Makefile +++ b/build/build-image/cross/Makefile @@ -21,7 +21,7 @@ TAG=$(shell cat VERSION) all: push build: - docker build --pull -t gcr.io/google_containers/$(IMAGE):$(TAG) . + docker build --pull -t staging-k8s.gcr.io/$(IMAGE):$(TAG) . push: build - gcloud docker -- push gcr.io/google_containers/$(IMAGE):$(TAG) + gcloud docker -- push staging-k8s.gcr.io/$(IMAGE):$(TAG) diff --git a/build/common.sh b/build/common.sh index 6e4d01e695..7289801157 100755 --- a/build/common.sh +++ b/build/common.sh @@ -96,7 +96,7 @@ kube::build::get_docker_wrapped_binaries() { kube-controller-manager,busybox kube-scheduler,busybox kube-aggregator,busybox - kube-proxy,gcr.io/google-containers/debian-iptables-amd64:${debian_iptables_version} + kube-proxy,k8s.gcr.io/debian-iptables-amd64:${debian_iptables_version} );; "arm") local targets=( @@ -105,7 +105,7 @@ kube::build::get_docker_wrapped_binaries() { kube-controller-manager,arm32v7/busybox kube-scheduler,arm32v7/busybox kube-aggregator,arm32v7/busybox - kube-proxy,gcr.io/google-containers/debian-iptables-arm:${debian_iptables_version} + kube-proxy,k8s.gcr.io/debian-iptables-arm:${debian_iptables_version} );; "arm64") local targets=( @@ -114,7 +114,7 @@ kube::build::get_docker_wrapped_binaries() { kube-controller-manager,arm64v8/busybox kube-scheduler,arm64v8/busybox kube-aggregator,arm64v8/busybox - kube-proxy,gcr.io/google-containers/debian-iptables-arm64:${debian_iptables_version} + kube-proxy,k8s.gcr.io/debian-iptables-arm64:${debian_iptables_version} );; "ppc64le") local targets=( @@ -123,7 +123,7 @@ kube::build::get_docker_wrapped_binaries() { kube-controller-manager,ppc64le/busybox kube-scheduler,ppc64le/busybox kube-aggregator,ppc64le/busybox - kube-proxy,gcr.io/google-containers/debian-iptables-ppc64le:${debian_iptables_version} + kube-proxy,k8s.gcr.io/debian-iptables-ppc64le:${debian_iptables_version} );; "s390x") local targets=( @@ -132,7 +132,7 @@ kube::build::get_docker_wrapped_binaries() { kube-controller-manager,s390x/busybox kube-scheduler,s390x/busybox kube-aggregator,s390x/busybox - kube-proxy,gcr.io/google-containers/debian-iptables-s390x:${debian_iptables_version} + kube-proxy,k8s.gcr.io/debian-iptables-s390x:${debian_iptables_version} );; esac diff --git a/build/debian-base/Makefile b/build/debian-base/Makefile index 47eafa5c64..51513ca50e 100755 --- a/build/debian-base/Makefile +++ b/build/debian-base/Makefile @@ -14,7 +14,7 @@ all: build -REGISTRY ?= gcr.io/google-containers +REGISTRY ?= staging-k8s.gcr.io IMAGE ?= debian-base BUILD_IMAGE ?= debian-build diff --git a/build/debian-hyperkube-base/Makefile b/build/debian-hyperkube-base/Makefile index 54ca29f7e9..ff798c1d07 100644 --- a/build/debian-hyperkube-base/Makefile +++ b/build/debian-hyperkube-base/Makefile @@ -15,15 +15,15 @@ # Build the hyperkube base image. This image is used to build the hyperkube image. # # Usage: -# [ARCH=amd64] [REGISTRY="gcr.io/google-containers"] make (build|push) +# [ARCH=amd64] [REGISTRY="staging-k8s.gcr.io"] make (build|push) -REGISTRY?=gcr.io/google-containers +REGISTRY?=staging-k8s.gcr.io IMAGE?=debian-hyperkube-base TAG=0.8 ARCH?=amd64 CACHEBUST?=1 -BASEIMAGE=gcr.io/google-containers/debian-base-$(ARCH):0.3 +BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):0.3 CNI_VERSION=v0.6.0 TEMP_DIR:=$(shell mktemp -d) diff --git a/build/debian-hyperkube-base/README.md b/build/debian-hyperkube-base/README.md index 2cef311cb6..736684a60d 100644 --- a/build/debian-hyperkube-base/README.md +++ b/build/debian-hyperkube-base/README.md @@ -1,6 +1,6 @@ ### debian-hyperkube-base -Serves as the base image for `gcr.io/google-containers/hyperkube-${ARCH}` +Serves as the base image for `k8s.gcr.io/hyperkube-${ARCH}` images. This image is compiled for multiple architectures. @@ -12,19 +12,19 @@ If you're editing the Dockerfile or some other thing, please bump the `TAG` in t ```console # Build for linux/amd64 (default) $ make push ARCH=amd64 -# ---> gcr.io/google-containers/debian-hyperkube-base-amd64:TAG +# ---> staging-k8s.gcr.io/debian-hyperkube-base-amd64:TAG $ make push ARCH=arm -# ---> gcr.io/google-containers/debian-hyperkube-base-arm:TAG +# ---> staging-k8s.gcr.io/debian-hyperkube-base-arm:TAG $ make push ARCH=arm64 -# ---> gcr.io/google-containers/debian-hyperkube-base-arm64:TAG +# ---> staging-k8s.gcr.io/debian-hyperkube-base-arm64:TAG $ make push ARCH=ppc64le -# ---> gcr.io/google-containers/debian-hyperkube-base-ppc64le:TAG +# ---> staging-k8s.gcr.io/debian-hyperkube-base-ppc64le:TAG $ make push ARCH=s390x -# ---> gcr.io/google-containers/debian-hyperkube-base-s390x:TAG +# ---> staging-k8s.gcr.io/debian-hyperkube-base-s390x:TAG ``` If you don't want to push the images, run `make build` instead diff --git a/build/debian-iptables/Makefile b/build/debian-iptables/Makefile index 1cc75edf17..62f42b1ed5 100644 --- a/build/debian-iptables/Makefile +++ b/build/debian-iptables/Makefile @@ -14,7 +14,7 @@ .PHONY: build push -REGISTRY?="gcr.io/google-containers" +REGISTRY?="staging-k8s.gcr.io" IMAGE=debian-iptables TAG=v10 ARCH?=amd64 @@ -34,7 +34,7 @@ ifeq ($(ARCH),s390x) QEMUARCH=s390x endif -BASEIMAGE=gcr.io/google-containers/debian-base-$(ARCH):0.3 +BASEIMAGE=k8s.gcr.io/debian-base-$(ARCH):0.3 build: cp ./* $(TEMP_DIR) diff --git a/build/debian-iptables/README.md b/build/debian-iptables/README.md index f5c0b3c7e0..a961cd6f6d 100644 --- a/build/debian-iptables/README.md +++ b/build/debian-iptables/README.md @@ -1,6 +1,6 @@ ### debian-iptables -Serves as the base image for `gcr.io/google_containers/kube-proxy-${ARCH}` and multiarch (not `amd64`) `gcr.io/google_containers/flannel-${ARCH}` images. +Serves as the base image for `k8s.gcr.io/kube-proxy-${ARCH}` and multiarch (not `amd64`) `k8s.gcr.io/flannel-${ARCH}` images. This image is compiled for multiple architectures. @@ -11,19 +11,19 @@ If you're editing the Dockerfile or some other thing, please bump the `TAG` in t ```console # Build for linux/amd64 (default) $ make push ARCH=amd64 -# ---> gcr.io/google_containers/debian-iptables-amd64:TAG +# ---> staging-k8s.gcr.io/debian-iptables-amd64:TAG $ make push ARCH=arm -# ---> gcr.io/google_containers/debian-iptables-arm:TAG +# ---> staging-k8s.gcr.io/debian-iptables-arm:TAG $ make push ARCH=arm64 -# ---> gcr.io/google_containers/debian-iptables-arm64:TAG +# ---> staging-k8s.gcr.io/debian-iptables-arm64:TAG $ make push ARCH=ppc64le -# ---> gcr.io/google_containers/debian-iptables-ppc64le:TAG +# ---> staging-k8s.gcr.io/debian-iptables-ppc64le:TAG $ make push ARCH=s390x -# ---> gcr.io/google_containers/debian-iptables-s390x:TAG +# ---> staging-k8s.gcr.io/debian-iptables-s390x:TAG ``` If you don't want to push the images, run `make` or `make build` instead diff --git a/build/lib/release.sh b/build/lib/release.sh index 25a904cf4b..f3e1c9b313 100644 --- a/build/lib/release.sh +++ b/build/lib/release.sh @@ -284,7 +284,11 @@ function kube::release::create_docker_images_for_server() { local images_dir="${RELEASE_IMAGES}/${arch}" mkdir -p "${images_dir}" - local -r docker_registry="gcr.io/google_containers" + local -r docker_registry="k8s.gcr.io" + # TODO(thockin): Remove all traces of this after 1.10 release. + # The following is the old non-indirected registry name. To ease the + # transition to the new name (above), we are double-tagging saved images. + local -r deprecated_registry="gcr.io/google_containers" # Docker tags cannot contain '+' local docker_tag="${KUBE_GIT_VERSION/+/_}" if [[ -z "${docker_tag}" ]]; then @@ -305,14 +309,17 @@ function kube::release::create_docker_images_for_server() { local docker_file_path="${docker_build_path}/Dockerfile" local binary_file_path="${binary_dir}/${binary_name}" local docker_image_tag="${docker_registry}" + local deprecated_image_tag="${deprecated_registry}" if [[ ${arch} == "amd64" ]]; then # If we are building a amd64 docker image, preserve the original # image name docker_image_tag+="/${binary_name}:${docker_tag}" + deprecated_image_tag+="/${binary_name}:${docker_tag}" else # If we are building a docker image for another architecture, # append the arch in the image tag docker_image_tag+="/${binary_name}-${arch}:${docker_tag}" + deprecated_image_tag+="/${binary_name}-${arch}:${docker_tag}" fi @@ -324,7 +331,8 @@ function kube::release::create_docker_images_for_server() { printf " FROM ${base_image} \n ADD ${binary_name} /usr/local/bin/${binary_name}\n" > ${docker_file_path} "${DOCKER[@]}" build --pull -q -t "${docker_image_tag}" ${docker_build_path} >/dev/null - "${DOCKER[@]}" save "${docker_image_tag}" > "${binary_dir}/${binary_name}.tar" + "${DOCKER[@]}" tag "${docker_image_tag}" ${deprecated_image_tag} >/dev/null + "${DOCKER[@]}" save "${docker_image_tag}" ${deprecated_image_tag} > "${binary_dir}/${binary_name}.tar" echo "${docker_tag}" > ${binary_dir}/${binary_name}.docker_tag rm -rf ${docker_build_path} ln "${binary_dir}/${binary_name}.tar" "${images_dir}/" @@ -343,6 +351,7 @@ function kube::release::create_docker_images_for_server() { # not a release kube::log::status "Deleting docker image ${docker_image_tag}" "${DOCKER[@]}" rmi ${docker_image_tag} &>/dev/null || true + "${DOCKER[@]}" rmi ${deprecated_image_tag} &>/dev/null || true fi ) & done diff --git a/build/pause/Makefile b/build/pause/Makefile index fb5e5a75b4..807973fcff 100644 --- a/build/pause/Makefile +++ b/build/pause/Makefile @@ -16,7 +16,7 @@ include ../../hack/make-rules/Makefile.manifest -REGISTRY ?= gcr.io/google_containers +REGISTRY ?= staging-k8s.gcr.io IMAGE = $(REGISTRY)/pause IMAGE_WITH_ARCH = $(IMAGE)-$(ARCH) @@ -29,7 +29,7 @@ ARCH ?= amd64 ALL_ARCH = amd64 arm arm64 ppc64le s390x CFLAGS = -Os -Wall -Werror -static -DVERSION=v$(TAG)-$(REV) -KUBE_CROSS_IMAGE ?= gcr.io/google_containers/kube-cross +KUBE_CROSS_IMAGE ?= k8s.gcr.io/kube-cross KUBE_CROSS_VERSION ?= $(shell cat ../build-image/cross/VERSION) BIN = pause diff --git a/build/root/WORKSPACE b/build/root/WORKSPACE index aa3ade68d3..88f35e1eaf 100644 --- a/build/root/WORKSPACE +++ b/build/root/WORKSPACE @@ -60,16 +60,16 @@ http_file( docker_pull( name = "debian-iptables-amd64", digest = "sha256:a3b936c0fb98a934eecd2cfb91f73658d402b29116084e778ce9ddb68e55383e", - registry = "gcr.io", - repository = "google-containers/debian-iptables-amd64", + registry = "k8s.gcr.io", + repository = "debian-iptables-amd64", tag = "v10", # ignored, but kept here for documentation ) docker_pull( name = "debian-hyperkube-base-amd64", digest = "sha256:fc1b461367730660ac5a40c1eb2d1b23221829acf8a892981c12361383b3742b", - registry = "gcr.io", - repository = "google-containers/debian-hyperkube-base-amd64", + registry = "k8s.gcr.io", + repository = "debian-hyperkube-base-amd64", tag = "0.8", # ignored, but kept here for documentation ) diff --git a/cluster/addons/addon-manager/Makefile b/cluster/addons/addon-manager/Makefile index 2bb4822727..bc653be93a 100644 --- a/cluster/addons/addon-manager/Makefile +++ b/cluster/addons/addon-manager/Makefile @@ -12,7 +12,7 @@ # See the License for the specific language governing permissions and # limitations under the License. -IMAGE=gcr.io/google-containers/kube-addon-manager +IMAGE=staging-k8s.gcr.io/kube-addon-manager ARCH?=amd64 TEMP_DIR:=$(shell mktemp -d) VERSION=v8.5 diff --git a/cluster/addons/addon-manager/README.md b/cluster/addons/addon-manager/README.md index e9ae53458c..6dcdd1e67c 100644 --- a/cluster/addons/addon-manager/README.md +++ b/cluster/addons/addon-manager/README.md @@ -40,20 +40,20 @@ The `addon-manager` is built for multiple architectures. ```console # Build for linux/amd64 (default) $ make push ARCH=amd64 -# ---> gcr.io/google-containers/kube-addon-manager-amd64:VERSION -# ---> gcr.io/google-containers/kube-addon-manager:VERSION (image with backwards-compatible naming) +# ---> staging-k8s.gcr.io/kube-addon-manager-amd64:VERSION +# ---> staging-k8s.gcr.io/kube-addon-manager:VERSION (image with backwards-compatible naming) $ make push ARCH=arm -# ---> gcr.io/google-containers/kube-addon-manager-arm:VERSION +# ---> staging-k8s.gcr.io/kube-addon-manager-arm:VERSION $ make push ARCH=arm64 -# ---> gcr.io/google-containers/kube-addon-manager-arm64:VERSION +# ---> staging-k8s.gcr.io/kube-addon-manager-arm64:VERSION $ make push ARCH=ppc64le -# ---> gcr.io/google-containers/kube-addon-manager-ppc64le:VERSION +# ---> staging-k8s.gcr.io/kube-addon-manager-ppc64le:VERSION $ make push ARCH=s390x -# ---> gcr.io/google-containers/kube-addon-manager-s390x:VERSION +# ---> staging-k8s.gcr.io/kube-addon-manager-s390x:VERSION ``` If you don't want to push the images, run `make` or `make build` instead diff --git a/cluster/addons/calico-policy-controller/calico-node-vertical-autoscaler-deployment.yaml b/cluster/addons/calico-policy-controller/calico-node-vertical-autoscaler-deployment.yaml index c66c3e0720..50ffcab83d 100644 --- a/cluster/addons/calico-policy-controller/calico-node-vertical-autoscaler-deployment.yaml +++ b/cluster/addons/calico-policy-controller/calico-node-vertical-autoscaler-deployment.yaml @@ -17,7 +17,7 @@ spec: scheduler.alpha.kubernetes.io/critical-pod: '' spec: containers: - - image: gcr.io/google_containers/cpvpa-amd64:v0.6.0 + - image: k8s.gcr.io/cpvpa-amd64:v0.6.0 name: autoscaler command: - /cpvpa diff --git a/cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-deployment.yaml b/cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-deployment.yaml index 4f493b8bcf..b338df79df 100644 --- a/cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-deployment.yaml +++ b/cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-deployment.yaml @@ -17,7 +17,7 @@ spec: scheduler.alpha.kubernetes.io/critical-pod: '' spec: containers: - - image: gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2 + - image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2 name: autoscaler command: - /cluster-proportional-autoscaler diff --git a/cluster/addons/calico-policy-controller/typha-vertical-autoscaler-deployment.yaml b/cluster/addons/calico-policy-controller/typha-vertical-autoscaler-deployment.yaml index c59be9af62..4f55962685 100644 --- a/cluster/addons/calico-policy-controller/typha-vertical-autoscaler-deployment.yaml +++ b/cluster/addons/calico-policy-controller/typha-vertical-autoscaler-deployment.yaml @@ -17,7 +17,7 @@ spec: scheduler.alpha.kubernetes.io/critical-pod: '' spec: containers: - - image: gcr.io/google_containers/cpvpa-amd64:v0.6.0 + - image: k8s.gcr.io/cpvpa-amd64:v0.6.0 name: autoscaler command: - /cpvpa diff --git a/cluster/addons/cluster-loadbalancing/glbc/default-svc-controller.yaml b/cluster/addons/cluster-loadbalancing/glbc/default-svc-controller.yaml index 28c4a1f6ed..3fa0e6f789 100644 --- a/cluster/addons/cluster-loadbalancing/glbc/default-svc-controller.yaml +++ b/cluster/addons/cluster-loadbalancing/glbc/default-svc-controller.yaml @@ -24,7 +24,7 @@ spec: # Any image is permissible as long as: # 1. It serves a 404 page at / # 2. It serves 200 on a /healthz endpoint - image: gcr.io/google_containers/defaultbackend:1.4 + image: k8s.gcr.io/defaultbackend:1.4 livenessProbe: httpGet: path: /healthz diff --git a/cluster/addons/cluster-monitoring/google/heapster-controller.yaml b/cluster/addons/cluster-monitoring/google/heapster-controller.yaml index 429be0da77..e5c512d4f5 100644 --- a/cluster/addons/cluster-monitoring/google/heapster-controller.yaml +++ b/cluster/addons/cluster-monitoring/google/heapster-controller.yaml @@ -58,7 +58,7 @@ spec: scheduler.alpha.kubernetes.io/critical-pod: '' spec: containers: - - image: gcr.io/google_containers/heapster-amd64:v1.5.0 + - image: k8s.gcr.io/heapster-amd64:v1.5.0 name: heapster livenessProbe: httpGet: @@ -71,13 +71,13 @@ spec: - /heapster - --source=kubernetes.summary_api:'' - --sink=gcm - - image: gcr.io/google_containers/heapster-amd64:v1.5.0 + - image: k8s.gcr.io/heapster-amd64:v1.5.0 name: eventer command: - /eventer - --source=kubernetes:'' - --sink=gcl - - image: gcr.io/google_containers/addon-resizer:1.8.1 + - image: k8s.gcr.io/addon-resizer:1.8.1 name: heapster-nanny resources: limits: @@ -110,7 +110,7 @@ spec: - --container=heapster - --poll-period=300000 - --estimator=exponential - - image: gcr.io/google_containers/addon-resizer:1.8.1 + - image: k8s.gcr.io/addon-resizer:1.8.1 name: eventer-nanny resources: limits: diff --git a/cluster/addons/cluster-monitoring/googleinfluxdb/heapster-controller-combined.yaml b/cluster/addons/cluster-monitoring/googleinfluxdb/heapster-controller-combined.yaml index 90e3ca3230..384ec060d2 100644 --- a/cluster/addons/cluster-monitoring/googleinfluxdb/heapster-controller-combined.yaml +++ b/cluster/addons/cluster-monitoring/googleinfluxdb/heapster-controller-combined.yaml @@ -58,8 +58,7 @@ spec: scheduler.alpha.kubernetes.io/critical-pod: '' spec: containers: - - image: gcr.io/google_containers/heapster-amd64:v1.5.0 - + - image: k8s.gcr.io/heapster-amd64:v1.5.0 name: heapster livenessProbe: httpGet: @@ -73,13 +72,13 @@ spec: - --source=kubernetes.summary_api:'' - --sink=influxdb:http://monitoring-influxdb:8086 - --sink=gcm:?metrics=autoscaling - - image: gcr.io/google_containers/heapster-amd64:v1.5.0 + - image: k8s.gcr.io/heapster-amd64:v1.5.0 name: eventer command: - /eventer - --source=kubernetes:'' - --sink=gcl - - image: gcr.io/google_containers/addon-resizer:1.8.1 + - image: k8s.gcr.io/addon-resizer:1.8.1 name: heapster-nanny resources: limits: @@ -112,7 +111,7 @@ spec: - --container=heapster - --poll-period=300000 - --estimator=exponential - - image: gcr.io/google_containers/addon-resizer:1.8.1 + - image: k8s.gcr.io/addon-resizer:1.8.1 name: eventer-nanny resources: limits: diff --git a/cluster/addons/cluster-monitoring/influxdb/heapster-controller.yaml b/cluster/addons/cluster-monitoring/influxdb/heapster-controller.yaml index 46a8e36813..6ed433f417 100644 --- a/cluster/addons/cluster-monitoring/influxdb/heapster-controller.yaml +++ b/cluster/addons/cluster-monitoring/influxdb/heapster-controller.yaml @@ -58,7 +58,7 @@ spec: scheduler.alpha.kubernetes.io/critical-pod: '' spec: containers: - - image: gcr.io/google_containers/heapster-amd64:v1.5.0 + - image: k8s.gcr.io/heapster-amd64:v1.5.0 name: heapster livenessProbe: httpGet: @@ -71,13 +71,13 @@ spec: - /heapster - --source=kubernetes.summary_api:'' - --sink=influxdb:http://monitoring-influxdb:8086 - - image: gcr.io/google_containers/heapster-amd64:v1.5.0 + - image: k8s.gcr.io/heapster-amd64:v1.5.0 name: eventer command: - /eventer - --source=kubernetes:'' - --sink=influxdb:http://monitoring-influxdb:8086 - - image: gcr.io/google_containers/addon-resizer:1.8.1 + - image: k8s.gcr.io/addon-resizer:1.8.1 name: heapster-nanny resources: limits: @@ -110,7 +110,7 @@ spec: - --container=heapster - --poll-period=300000 - --estimator=exponential - - image: gcr.io/google_containers/addon-resizer:1.8.1 + - image: k8s.gcr.io/addon-resizer:1.8.1 name: eventer-nanny resources: limits: diff --git a/cluster/addons/cluster-monitoring/influxdb/influxdb-grafana-controller.yaml b/cluster/addons/cluster-monitoring/influxdb/influxdb-grafana-controller.yaml index d562c74847..7c78ed2c49 100644 --- a/cluster/addons/cluster-monitoring/influxdb/influxdb-grafana-controller.yaml +++ b/cluster/addons/cluster-monitoring/influxdb/influxdb-grafana-controller.yaml @@ -29,7 +29,7 @@ spec: operator: "Exists" containers: - name: influxdb - image: gcr.io/google_containers/heapster-influxdb-amd64:v1.3.3 + image: k8s.gcr.io/heapster-influxdb-amd64:v1.3.3 resources: limits: cpu: 100m @@ -46,7 +46,7 @@ spec: - name: influxdb-persistent-storage mountPath: /data - name: grafana - image: gcr.io/google_containers/heapster-grafana-amd64:v4.4.3 + image: k8s.gcr.io/heapster-grafana-amd64:v4.4.3 env: resources: # keep request = limit to keep this container in guaranteed class diff --git a/cluster/addons/cluster-monitoring/stackdriver/heapster-controller.yaml b/cluster/addons/cluster-monitoring/stackdriver/heapster-controller.yaml index c035d51a7a..f4943654d7 100644 --- a/cluster/addons/cluster-monitoring/stackdriver/heapster-controller.yaml +++ b/cluster/addons/cluster-monitoring/stackdriver/heapster-controller.yaml @@ -45,7 +45,7 @@ spec: scheduler.alpha.kubernetes.io/critical-pod: '' spec: containers: - - image: gcr.io/google_containers/heapster-amd64:v1.5.0 + - image: k8s.gcr.io/heapster-amd64:v1.5.0 name: heapster livenessProbe: httpGet: @@ -60,7 +60,7 @@ spec: - --sink=stackdriver:?cluster_name={{ cluster_name }}&use_old_resources={{ use_old_resources }}&use_new_resources={{ use_new_resources }}&min_interval_sec=100&batch_export_timeout_sec=110 # BEGIN_PROMETHEUS_TO_SD - name: prom-to-sd - image: gcr.io/google-containers/prometheus-to-sd:v0.2.2 + image: k8s.gcr.io/prometheus-to-sd:v0.2.2 command: - /monitor - --source=heapster:http://localhost:8082?whitelisted=stackdriver_requests_count,stackdriver_timeseries_count @@ -78,7 +78,7 @@ spec: fieldRef: fieldPath: metadata.namespace # END_PROMETHEUS_TO_SD - - image: gcr.io/google_containers/addon-resizer:1.8.1 + - image: k8s.gcr.io/addon-resizer:1.8.1 name: heapster-nanny resources: limits: diff --git a/cluster/addons/cluster-monitoring/standalone/heapster-controller.yaml b/cluster/addons/cluster-monitoring/standalone/heapster-controller.yaml index ff994966d5..c3f9f8ce61 100644 --- a/cluster/addons/cluster-monitoring/standalone/heapster-controller.yaml +++ b/cluster/addons/cluster-monitoring/standalone/heapster-controller.yaml @@ -45,7 +45,7 @@ spec: scheduler.alpha.kubernetes.io/critical-pod: '' spec: containers: - - image: gcr.io/google_containers/heapster-amd64:v1.5.0 + - image: k8s.gcr.io/heapster-amd64:v1.5.0 name: heapster livenessProbe: httpGet: @@ -57,7 +57,7 @@ spec: command: - /heapster - --source=kubernetes.summary_api:'' - - image: gcr.io/google_containers/addon-resizer:1.8.1 + - image: k8s.gcr.io/addon-resizer:1.8.1 name: heapster-nanny resources: limits: diff --git a/cluster/addons/dashboard/dashboard-controller.yaml b/cluster/addons/dashboard/dashboard-controller.yaml index 0c7ca6b5d8..5a2377620b 100644 --- a/cluster/addons/dashboard/dashboard-controller.yaml +++ b/cluster/addons/dashboard/dashboard-controller.yaml @@ -29,7 +29,7 @@ spec: spec: containers: - name: kubernetes-dashboard - image: gcr.io/google_containers/kubernetes-dashboard-amd64:v1.8.0 + image: k8s.gcr.io/kubernetes-dashboard-amd64:v1.8.0 resources: limits: cpu: 100m diff --git a/cluster/addons/device-plugins/nvidia-gpu/daemonset.yaml b/cluster/addons/device-plugins/nvidia-gpu/daemonset.yaml index 5b157548c1..c66e0e0d37 100644 --- a/cluster/addons/device-plugins/nvidia-gpu/daemonset.yaml +++ b/cluster/addons/device-plugins/nvidia-gpu/daemonset.yaml @@ -36,7 +36,7 @@ spec: hostPath: path: /dev containers: - - image: "gcr.io/google-containers/nvidia-gpu-device-plugin@sha256:0e79da6998a61257585e0d3fb5848240129f0fa5b4ad972dfed4049448093c33" + - image: "k8s.gcr.io/nvidia-gpu-device-plugin@sha256:0e79da6998a61257585e0d3fb5848240129f0fa5b4ad972dfed4049448093c33" command: ["/usr/bin/nvidia-gpu-device-plugin", "-logtostderr"] name: nvidia-gpu-device-plugin resources: diff --git a/cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml b/cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml index cd89c6cd3f..dc638e44dc 100644 --- a/cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml +++ b/cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml @@ -80,7 +80,7 @@ spec: spec: containers: - name: autoscaler - image: gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2-r2 + image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2 resources: requests: cpu: "20m" diff --git a/cluster/addons/dns/kube-dns.yaml.base b/cluster/addons/dns/kube-dns.yaml.base index edf77c3569..ffd13ed47b 100644 --- a/cluster/addons/dns/kube-dns.yaml.base +++ b/cluster/addons/dns/kube-dns.yaml.base @@ -94,7 +94,7 @@ spec: optional: true containers: - name: kubedns - image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.8 + image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.8 resources: # TODO: Set memory limits when we've profiled the container for large # clusters, then set request = limit to keep this container in @@ -145,7 +145,7 @@ spec: - name: kube-dns-config mountPath: /kube-dns-config - name: dnsmasq - image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.8 + image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.8 livenessProbe: httpGet: path: /healthcheck/dnsmasq @@ -184,7 +184,7 @@ spec: - name: kube-dns-config mountPath: /etc/k8s/dns/dnsmasq-nanny - name: sidecar - image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.8 + image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.8 livenessProbe: httpGet: path: /metrics diff --git a/cluster/addons/dns/kube-dns.yaml.in b/cluster/addons/dns/kube-dns.yaml.in index ea20f6d0ff..c3698a4877 100644 --- a/cluster/addons/dns/kube-dns.yaml.in +++ b/cluster/addons/dns/kube-dns.yaml.in @@ -94,7 +94,7 @@ spec: optional: true containers: - name: kubedns - image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.8 + image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.8 resources: # TODO: Set memory limits when we've profiled the container for large # clusters, then set request = limit to keep this container in @@ -145,7 +145,7 @@ spec: - name: kube-dns-config mountPath: /kube-dns-config - name: dnsmasq - image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.8 + image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.8 livenessProbe: httpGet: path: /healthcheck/dnsmasq @@ -184,7 +184,7 @@ spec: - name: kube-dns-config mountPath: /etc/k8s/dns/dnsmasq-nanny - name: sidecar - image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.8 + image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.8 livenessProbe: httpGet: path: /metrics diff --git a/cluster/addons/dns/kube-dns.yaml.sed b/cluster/addons/dns/kube-dns.yaml.sed index af5772fc34..3d44112eba 100644 --- a/cluster/addons/dns/kube-dns.yaml.sed +++ b/cluster/addons/dns/kube-dns.yaml.sed @@ -94,7 +94,7 @@ spec: optional: true containers: - name: kubedns - image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.8 + image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.8 resources: # TODO: Set memory limits when we've profiled the container for large # clusters, then set request = limit to keep this container in @@ -145,7 +145,7 @@ spec: - name: kube-dns-config mountPath: /kube-dns-config - name: dnsmasq - image: gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.8 + image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.8 livenessProbe: httpGet: path: /healthcheck/dnsmasq @@ -184,7 +184,7 @@ spec: - name: kube-dns-config mountPath: /etc/k8s/dns/dnsmasq-nanny - name: sidecar - image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.8 + image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.8 livenessProbe: httpGet: path: /metrics diff --git a/cluster/addons/etcd-empty-dir-cleanup/etcd-empty-dir-cleanup.yaml b/cluster/addons/etcd-empty-dir-cleanup/etcd-empty-dir-cleanup.yaml index e6ca6f9e2c..dd14bdc9bd 100644 --- a/cluster/addons/etcd-empty-dir-cleanup/etcd-empty-dir-cleanup.yaml +++ b/cluster/addons/etcd-empty-dir-cleanup/etcd-empty-dir-cleanup.yaml @@ -23,4 +23,4 @@ spec: dnsPolicy: Default containers: - name: etcd-empty-dir-cleanup - image: gcr.io/google-containers/etcd-empty-dir-cleanup:3.1.10.0 + image: k8s.gcr.io/etcd-empty-dir-cleanup:3.1.10.0 diff --git a/cluster/addons/fluentd-elasticsearch/es-image/Makefile b/cluster/addons/fluentd-elasticsearch/es-image/Makefile index 51222ad380..28f55a4a4a 100755 --- a/cluster/addons/fluentd-elasticsearch/es-image/Makefile +++ b/cluster/addons/fluentd-elasticsearch/es-image/Makefile @@ -14,7 +14,7 @@ .PHONY: binary build push -PREFIX = gcr.io/google-containers +PREFIX = staging-k8s.gcr.io IMAGE = elasticsearch TAG = v5.6.4 diff --git a/cluster/addons/fluentd-elasticsearch/es-statefulset.yaml b/cluster/addons/fluentd-elasticsearch/es-statefulset.yaml index 5aea165ee0..36adf38831 100644 --- a/cluster/addons/fluentd-elasticsearch/es-statefulset.yaml +++ b/cluster/addons/fluentd-elasticsearch/es-statefulset.yaml @@ -73,7 +73,7 @@ spec: spec: serviceAccountName: elasticsearch-logging containers: - - image: gcr.io/google-containers/elasticsearch:v5.6.4 + - image: k8s.gcr.io/elasticsearch:v5.6.4 name: elasticsearch-logging resources: # need more cpu upon initialization, therefore burstable class diff --git a/cluster/addons/fluentd-elasticsearch/fluentd-es-ds.yaml b/cluster/addons/fluentd-elasticsearch/fluentd-es-ds.yaml index f390b3890a..bd2d6d2558 100644 --- a/cluster/addons/fluentd-elasticsearch/fluentd-es-ds.yaml +++ b/cluster/addons/fluentd-elasticsearch/fluentd-es-ds.yaml @@ -75,7 +75,7 @@ spec: serviceAccountName: fluentd-es containers: - name: fluentd-es - image: gcr.io/google-containers/fluentd-elasticsearch:v2.0.4 + image: k8s.gcr.io/fluentd-elasticsearch:v2.0.4 env: - name: FLUENTD_ARGS value: --no-supervisor -q diff --git a/cluster/addons/fluentd-elasticsearch/fluentd-es-image/Makefile b/cluster/addons/fluentd-elasticsearch/fluentd-es-image/Makefile index 651e6e0d50..3e07bdeb35 100644 --- a/cluster/addons/fluentd-elasticsearch/fluentd-es-image/Makefile +++ b/cluster/addons/fluentd-elasticsearch/fluentd-es-image/Makefile @@ -14,7 +14,7 @@ .PHONY: build push -PREFIX = gcr.io/google-containers +PREFIX = staging-k8s.gcr.io IMAGE = fluentd-elasticsearch TAG = v2.0.4 diff --git a/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md b/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md index 8b97511a00..9a651d522f 100644 --- a/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md +++ b/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md @@ -4,11 +4,11 @@ that collects Docker container log files using [Fluentd][fluentd] and sends them to an instance of [Elasticsearch][elasticsearch]. This image is designed to be used as part of the [Kubernetes][kubernetes] cluster bring up process. The image resides at GCR under the name -[gcr.io/google-containers/fluentd-elasticsearch][image]. +[k8s.gcr.io/fluentd-elasticsearch][image]. [fluentd]: http://www.fluentd.org/ [elasticsearch]: https://www.elastic.co/products/elasticsearch [kubernetes]: https://kubernetes.io -[image]: https://gcr.io/google-containers/fluentd-elasticsearch +[image]: https://k8s.gcr.io/fluentd-elasticsearch [![Analytics](https://kubernetes-site.appspot.com/UA-36037335-10/GitHub/cluster/addons/fluentd-elasticsearch/fluentd-es-image/README.md?pixel)]() diff --git a/cluster/addons/fluentd-gcp/event-exporter.yaml b/cluster/addons/fluentd-gcp/event-exporter.yaml index 246fa8c42b..6321b3844f 100644 --- a/cluster/addons/fluentd-gcp/event-exporter.yaml +++ b/cluster/addons/fluentd-gcp/event-exporter.yaml @@ -47,12 +47,12 @@ spec: serviceAccountName: event-exporter-sa containers: - name: event-exporter - image: gcr.io/google-containers/event-exporter:v0.1.7 + image: k8s.gcr.io/event-exporter:v0.1.7 command: - '/event-exporter' # BEGIN_PROMETHEUS_TO_SD - name: prometheus-to-sd-exporter - image: gcr.io/google-containers/prometheus-to-sd:v0.2.2 + image: k8s.gcr.io/prometheus-to-sd:v0.2.2 command: - /monitor - --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons diff --git a/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml b/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml index 130e84aacc..118de635a4 100644 --- a/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml +++ b/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml @@ -27,7 +27,7 @@ spec: dnsPolicy: Default containers: - name: fluentd-gcp - image: gcr.io/google-containers/fluentd-gcp:2.0.14 + image: k8s.gcr.io/fluentd-gcp:2.0.14 env: - name: FLUENTD_ARGS value: --no-supervisor -q @@ -82,7 +82,7 @@ spec: fi; # BEGIN_PROMETHEUS_TO_SD - name: prometheus-to-sd-exporter - image: gcr.io/google-containers/prometheus-to-sd:v0.2.2 + image: k8s.gcr.io/prometheus-to-sd:v0.2.2 command: - /monitor - --stackdriver-prefix={{ prometheus_to_sd_prefix }}/addons diff --git a/cluster/addons/ip-masq-agent/ip-masq-agent.yaml b/cluster/addons/ip-masq-agent/ip-masq-agent.yaml index f6bb21c01b..c27a802cb7 100644 --- a/cluster/addons/ip-masq-agent/ip-masq-agent.yaml +++ b/cluster/addons/ip-masq-agent/ip-masq-agent.yaml @@ -28,7 +28,7 @@ spec: hostNetwork: true containers: - name: ip-masq-agent - image: gcr.io/google-containers/ip-masq-agent-amd64:v2.0.2 + image: k8s.gcr.io/ip-masq-agent-amd64:v2.0.2 resources: requests: cpu: 10m diff --git a/cluster/addons/metadata-proxy/gce/metadata-proxy.yaml b/cluster/addons/metadata-proxy/gce/metadata-proxy.yaml index e537a7ff16..22e84bb204 100644 --- a/cluster/addons/metadata-proxy/gce/metadata-proxy.yaml +++ b/cluster/addons/metadata-proxy/gce/metadata-proxy.yaml @@ -38,7 +38,7 @@ spec: dnsPolicy: Default containers: - name: metadata-proxy - image: gcr.io/google_containers/metadata-proxy:v0.1.9 + image: k8s.gcr.io/metadata-proxy:v0.1.9 securityContext: privileged: true # Request and limit resources to get guaranteed QoS. @@ -51,7 +51,7 @@ spec: cpu: "30m" # BEGIN_PROMETHEUS_TO_SD - name: prometheus-to-sd-exporter - image: gcr.io/google_containers/prometheus-to-sd:v0.2.2 + image: k8s.gcr.io/prometheus-to-sd:v0.2.2 # Request and limit resources to get guaranteed QoS. resources: requests: diff --git a/cluster/addons/metrics-server/metrics-server-deployment.yaml b/cluster/addons/metrics-server/metrics-server-deployment.yaml index 1ed7dbc728..b5c087b12c 100644 --- a/cluster/addons/metrics-server/metrics-server-deployment.yaml +++ b/cluster/addons/metrics-server/metrics-server-deployment.yaml @@ -47,7 +47,7 @@ spec: serviceAccountName: metrics-server containers: - name: metrics-server - image: gcr.io/google_containers/metrics-server-amd64:v0.2.1 + image: k8s.gcr.io/metrics-server-amd64:v0.2.1 command: - /metrics-server - --source=kubernetes.summary_api:'' @@ -56,7 +56,7 @@ spec: name: https protocol: TCP - name: metrics-server-nanny - image: gcr.io/google_containers/addon-resizer:1.8.1 + image: k8s.gcr.io/addon-resizer:1.8.1 resources: limits: cpu: 100m diff --git a/cluster/addons/node-problem-detector/npd.yaml b/cluster/addons/node-problem-detector/npd.yaml index 87365ad17f..714125ea58 100644 --- a/cluster/addons/node-problem-detector/npd.yaml +++ b/cluster/addons/node-problem-detector/npd.yaml @@ -43,7 +43,7 @@ spec: spec: containers: - name: node-problem-detector - image: gcr.io/google_containers/node-problem-detector:v0.4.1 + image: k8s.gcr.io/node-problem-detector:v0.4.1 command: - "/bin/sh" - "-c" diff --git a/cluster/addons/python-image/Makefile b/cluster/addons/python-image/Makefile index 6da4f7d3ce..f23f924706 100644 --- a/cluster/addons/python-image/Makefile +++ b/cluster/addons/python-image/Makefile @@ -12,7 +12,7 @@ # See the License for the specific language governing permissions and # limitations under the License. -IMAGE=gcr.io/google_containers/python +IMAGE=staging-k8s.gcr.io/python VERSION=v1 .PHONY: build push diff --git a/cluster/gce/config-test.sh b/cluster/gce/config-test.sh index b3490014ec..93d254a1b8 100755 --- a/cluster/gce/config-test.sh +++ b/cluster/gce/config-test.sh @@ -149,7 +149,7 @@ ENABLE_METRICS_SERVER="${KUBE_ENABLE_METRICS_SERVER:-true}" # Useful for scheduling heapster in large clusters with nodes of small size. HEAPSTER_MACHINE_TYPE="${HEAPSTER_MACHINE_TYPE:-}" -# Set etcd image (e.g. gcr.io/google_containers/etcd) and version (e.g. 3.2.14) if you need +# Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.2.14) if you need # non-default version. ETCD_IMAGE="${TEST_ETCD_IMAGE:-}" ETCD_DOCKER_REPOSITORY="${TEST_ETCD_DOCKER_REPOSITORY:-}" diff --git a/cluster/gce/gci/configure-helper.sh b/cluster/gce/gci/configure-helper.sh index fed87cfba3..b80d868f26 100644 --- a/cluster/gce/gci/configure-helper.sh +++ b/cluster/gce/gci/configure-helper.sh @@ -1288,7 +1288,7 @@ function prepare-kube-proxy-manifest-variables { local -r src_file=$1; local -r kubeconfig="--kubeconfig=/var/lib/kube-proxy/kubeconfig" - local kube_docker_registry="gcr.io/google_containers" + local kube_docker_registry="k8s.gcr.io" if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then kube_docker_registry=${KUBE_DOCKER_REGISTRY} fi @@ -1462,7 +1462,7 @@ function compute-master-manifest-variables { CLOUD_CONFIG_VOLUME="{\"name\": \"cloudconfigmount\",\"hostPath\": {\"path\": \"/etc/gce.conf\", \"type\": \"FileOrCreate\"}}," CLOUD_CONFIG_MOUNT="{\"name\": \"cloudconfigmount\",\"mountPath\": \"/etc/gce.conf\", \"readOnly\": true}," fi - DOCKER_REGISTRY="gcr.io/google_containers" + DOCKER_REGISTRY="k8s.gcr.io" if [[ -n "${KUBE_DOCKER_REGISTRY:-}" ]]; then DOCKER_REGISTRY="${KUBE_DOCKER_REGISTRY}" fi @@ -2325,7 +2325,7 @@ spec: - name: vol containers: - name: pv-recycler - image: gcr.io/google_containers/busybox:1.27 + image: k8s.gcr.io/busybox:1.27 command: - /bin/sh args: diff --git a/cluster/gce/gci/configure.sh b/cluster/gce/gci/configure.sh index fa5a26e676..24ab1f7466 100644 --- a/cluster/gce/gci/configure.sh +++ b/cluster/gce/gci/configure.sh @@ -234,12 +234,12 @@ function install-kube-manifests { echo "Downloading k8s manifests tar" download-or-bust "${manifests_tar_hash}" "${manifests_tar_urls[@]}" tar xzf "${KUBE_HOME}/${manifests_tar}" -C "${dst_dir}" --overwrite - local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-gcr.io/google_containers}" - if [[ "${kube_addon_registry}" != "gcr.io/google_containers" ]]; then + local -r kube_addon_registry="${KUBE_ADDON_REGISTRY:-k8s.gcr.io}" + if [[ "${kube_addon_registry}" != "k8s.gcr.io" ]]; then find "${dst_dir}" -name \*.yaml -or -name \*.yaml.in | \ - xargs sed -ri "s@(image:\s.*)gcr.io/google_containers@\1${kube_addon_registry}@" + xargs sed -ri "s@(image:\s.*)k8s.gcr.io@\1${kube_addon_registry}@" find "${dst_dir}" -name \*.manifest -or -name \*.json | \ - xargs sed -ri "s@(image\":\s+\")gcr.io/google_containers@\1${kube_addon_registry}@" + xargs sed -ri "s@(image\":\s+\")k8s.gcr.io@\1${kube_addon_registry}@" fi cp "${dst_dir}/kubernetes/gci-trusty/gci-configure-helper.sh" "${KUBE_BIN}/configure-helper.sh" cp "${dst_dir}/kubernetes/gci-trusty/health-monitor.sh" "${KUBE_BIN}/health-monitor.sh" diff --git a/cluster/gce/gci/mounter/Makefile b/cluster/gce/gci/mounter/Makefile index 72efa3b77c..85ee3343d8 100644 --- a/cluster/gce/gci/mounter/Makefile +++ b/cluster/gce/gci/mounter/Makefile @@ -13,7 +13,7 @@ # limitations under the License. TAG=v2 -REGISTRY=gcr.io/google_containers +REGISTRY=staging-k8s.gcr.io IMAGE=gci-mounter all: container diff --git a/cluster/gce/manifests/cluster-autoscaler.manifest b/cluster/gce/manifests/cluster-autoscaler.manifest index 16b78f454e..f580afe48f 100644 --- a/cluster/gce/manifests/cluster-autoscaler.manifest +++ b/cluster/gce/manifests/cluster-autoscaler.manifest @@ -14,15 +14,15 @@ "containers": [ { "name": "cluster-autoscaler", - "image": "gcr.io/google_containers/cluster-autoscaler:v1.1.1", + "image": "k8s.gcr.io/cluster-autoscaler:v1.1.1", "livenessProbe": { "httpGet": { "path": "/health-check", "port": 8085 - }, + }, "initialDelaySeconds": 600, "periodSeconds": 60 - }, + }, "command": [ "./run.sh", "--kubernetes=http://127.0.0.1:8080?inClusterConfig=f", diff --git a/cluster/gce/manifests/e2e-image-puller.manifest b/cluster/gce/manifests/e2e-image-puller.manifest index 5266508500..0351558258 100644 --- a/cluster/gce/manifests/e2e-image-puller.manifest +++ b/cluster/gce/manifests/e2e-image-puller.manifest @@ -14,13 +14,13 @@ spec: cpu: 100m limits: cpu: 100m - image: gcr.io/google_containers/busybox:1.24 + image: k8s.gcr.io/busybox:1.24 # TODO: Replace this with a go script that pulls in parallel? # Currently it takes ~5m to pull all e2e images, so this is OK, and # fewer moving parts is always better. # TODO: Replace the hardcoded image list with an autogen list; the list is # currently hard-coded for static verification. It was generated via: - # grep -Iiroh "gcr.io/google_.*" "${KUBE_ROOT}/test/e2e" | \ + # grep -Iiroh "gcr.io/.*" "${KUBE_ROOT}/test/e2e" | \ # sed -e "s/[,\")}]//g" | awk '{print $1}' | sort | uniq | tr '\n' ' ' # We always want the subshell to exit 0 so this pod doesn't end up # blocking tests in an Error state. @@ -29,52 +29,52 @@ spec: - -c - > for i in - gcr.io/google_containers/alpine-with-bash:1.0 - gcr.io/google_containers/apparmor-loader:0.1 - gcr.io/google_containers/busybox:1.24 - gcr.io/google_containers/dnsutils:e2e - gcr.io/google_containers/e2e-net-amd64:1.0 - gcr.io/google_containers/echoserver:1.6 - gcr.io/google_containers/eptest:0.1 - gcr.io/google_containers/fakegitserver:0.1 - gcr.io/google_containers/galera-install:0.1 - gcr.io/google_containers/invalid-image:invalid-tag - gcr.io/google_containers/iperf:e2e - gcr.io/google_containers/jessie-dnsutils:e2e - gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.14.5 - gcr.io/google_containers/liveness:e2e - gcr.io/google_containers/logs-generator:v0.1.0 - gcr.io/google_containers/mounttest:0.8 - gcr.io/google_containers/mounttest-user:0.5 - gcr.io/google_containers/mysql-galera:e2e - gcr.io/google_containers/mysql-healthz:1.0 - gcr.io/google_containers/netexec:1.4 - gcr.io/google_containers/netexec:1.5 - gcr.io/google_containers/netexec:1.7 - gcr.io/google_containers/nettest:1.7 - gcr.io/google_containers/nginx:1.7.9 - gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.1 - gcr.io/google_containers/nginx-slim:0.7 - gcr.io/google_containers/nginx-slim:0.8 - gcr.io/google_containers/node-problem-detector:v0.3.0 - gcr.io/google_containers/pause - gcr.io/google_containers/porter:4524579c0eb935c056c8e75563b4e1eda31587e0 - gcr.io/google_containers/portforwardtester:1.2 - gcr.io/google_containers/redis-install-3.2.0:e2e - gcr.io/google_containers/resource_consumer:beta4 - gcr.io/google_containers/resource_consumer/controller:beta4 + k8s.gcr.io/alpine-with-bash:1.0 + k8s.gcr.io/apparmor-loader:0.1 + k8s.gcr.io/busybox:1.24 + k8s.gcr.io/dnsutils:e2e + k8s.gcr.io/e2e-net-amd64:1.0 + k8s.gcr.io/echoserver:1.6 + k8s.gcr.io/eptest:0.1 + k8s.gcr.io/fakegitserver:0.1 + k8s.gcr.io/galera-install:0.1 + k8s.gcr.io/invalid-image:invalid-tag + k8s.gcr.io/iperf:e2e + k8s.gcr.io/jessie-dnsutils:e2e + k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.5 + k8s.gcr.io/liveness:e2e + k8s.gcr.io/logs-generator:v0.1.0 + k8s.gcr.io/mounttest:0.8 + k8s.gcr.io/mounttest-user:0.5 + k8s.gcr.io/mysql-galera:e2e + k8s.gcr.io/mysql-healthz:1.0 + k8s.gcr.io/netexec:1.4 + k8s.gcr.io/netexec:1.5 + k8s.gcr.io/netexec:1.7 + k8s.gcr.io/nettest:1.7 + k8s.gcr.io/nginx:1.7.9 + k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.1 + k8s.gcr.io/nginx-slim:0.7 + k8s.gcr.io/nginx-slim:0.8 + k8s.gcr.io/node-problem-detector:v0.3.0 + k8s.gcr.io/pause + k8s.gcr.io/porter:4524579c0eb935c056c8e75563b4e1eda31587e0 + k8s.gcr.io/portforwardtester:1.2 + k8s.gcr.io/redis-install-3.2.0:e2e + k8s.gcr.io/resource_consumer:beta4 + k8s.gcr.io/resource_consumer/controller:beta4 gcr.io/kubernetes-e2e-test-images/serve-hostname-amd64:1.1 gcr.io/kubernetes-e2e-test-images/hostexec-amd64:1.1 - gcr.io/google_containers/servicelb:0.1 - gcr.io/google_containers/test-webserver:e2e - gcr.io/google_containers/update-demo:kitten - gcr.io/google_containers/update-demo:nautilus - gcr.io/google_containers/volume-ceph:0.1 - gcr.io/google_containers/volume-gluster:0.2 - gcr.io/google_containers/volume-iscsi:0.1 - gcr.io/google_containers/volume-nfs:0.8 - gcr.io/google_containers/volume-rbd:0.1 - gcr.io/google_containers/zookeeper-install-3.5.0-alpha:e2e + k8s.gcr.io/servicelb:0.1 + k8s.gcr.io/test-webserver:e2e + k8s.gcr.io/update-demo:kitten + k8s.gcr.io/update-demo:nautilus + k8s.gcr.io/volume-ceph:0.1 + k8s.gcr.io/volume-gluster:0.2 + k8s.gcr.io/volume-iscsi:0.1 + k8s.gcr.io/volume-nfs:0.8 + k8s.gcr.io/volume-rbd:0.1 + k8s.gcr.io/zookeeper-install-3.5.0-alpha:e2e gcr.io/google_samples/gb-redisslave:nonexistent ; do echo $(date '+%X') pulling $i; docker pull $i 1>/dev/null; done; exit 0; securityContext: @@ -91,7 +91,7 @@ spec: cpu: 100m limits: cpu: 100m - image: gcr.io/google_containers/kube-nethealth-amd64:1.0 + image: k8s.gcr.io/kube-nethealth-amd64:1.0 command: - /bin/sh - -c diff --git a/cluster/gce/manifests/etcd.manifest b/cluster/gce/manifests/etcd.manifest index 25b2484752..8fbc0afcc1 100644 --- a/cluster/gce/manifests/etcd.manifest +++ b/cluster/gce/manifests/etcd.manifest @@ -13,7 +13,7 @@ "containers":[ { "name": "etcd-container", - "image": "{{ pillar.get('etcd_docker_repository', 'gcr.io/google_containers/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.2.14') }}", + "image": "{{ pillar.get('etcd_docker_repository', 'k8s.gcr.io/etcd') }}:{{ pillar.get('etcd_docker_tag', '3.2.14') }}", "resources": { "requests": { "cpu": {{ cpulimit }} diff --git a/cluster/gce/manifests/glbc.manifest b/cluster/gce/manifests/glbc.manifest index 3fbf2f6d42..07ea32936c 100644 --- a/cluster/gce/manifests/glbc.manifest +++ b/cluster/gce/manifests/glbc.manifest @@ -13,7 +13,7 @@ spec: terminationGracePeriodSeconds: 600 hostNetwork: true containers: - - image: gcr.io/google_containers/glbc:0.9.7 + - image: k8s.gcr.io/glbc:0.9.7 livenessProbe: httpGet: path: /healthz diff --git a/cluster/gce/manifests/kube-addon-manager.yaml b/cluster/gce/manifests/kube-addon-manager.yaml index 7c8192b6c8..0e852f62be 100644 --- a/cluster/gce/manifests/kube-addon-manager.yaml +++ b/cluster/gce/manifests/kube-addon-manager.yaml @@ -13,7 +13,7 @@ spec: - name: kube-addon-manager # When updating version also bump it in: # - test/kubemark/resources/manifests/kube-addon-manager.yaml - image: gcr.io/google-containers/kube-addon-manager:v8.5 + image: k8s.gcr.io/kube-addon-manager:v8.5 command: - /bin/bash - -c diff --git a/cluster/gce/manifests/rescheduler.manifest b/cluster/gce/manifests/rescheduler.manifest index 584d35ca79..b496449a78 100644 --- a/cluster/gce/manifests/rescheduler.manifest +++ b/cluster/gce/manifests/rescheduler.manifest @@ -13,7 +13,7 @@ metadata: spec: hostNetwork: true containers: - - image: gcr.io/google-containers/rescheduler:v0.3.1 + - image: k8s.gcr.io/rescheduler:v0.3.1 name: rescheduler volumeMounts: - mountPath: /var/log/rescheduler.log diff --git a/cluster/gce/util.sh b/cluster/gce/util.sh index 795904ed9a..8893f7ac69 100755 --- a/cluster/gce/util.sh +++ b/cluster/gce/util.sh @@ -210,7 +210,6 @@ function copy-to-staging() { # ZONE # Vars set: # PREFERRED_REGION -# KUBE_ADDON_REGISTRY function set-preferred-region() { case ${ZONE} in asia-*) @@ -223,26 +222,12 @@ function set-preferred-region() { PREFERRED_REGION=("us" "eu" "asia") ;; esac - local -r preferred="${PREFERRED_REGION[0]}" if [[ "${RELEASE_REGION_FALLBACK}" != "true" ]]; then - PREFERRED_REGION=( "${preferred}" ) - fi - - # If we're using regional GCR, and we're outside the US, go to the - # regional registry. The gcr.io/google_containers registry is - # appropriate for US (for now). - if [[ "${REGIONAL_KUBE_ADDONS}" == "true" ]] && [[ "${preferred}" != "us" ]]; then - KUBE_ADDON_REGISTRY="${preferred}.gcr.io/google_containers" - else - KUBE_ADDON_REGISTRY="gcr.io/google_containers" + PREFERRED_REGION=( "${PREFERRED_REGION[0]}" ) fi } -if [[ "${ENABLE_DOCKER_REGISTRY_CACHE:-}" == "true" ]]; then - DOCKER_REGISTRY_MIRROR_URL="https://mirror.gcr.io" -fi - # Take the local tar files and upload them to Google Storage. They will then be # downloaded by the master as part of the start up script for the master. # @@ -275,6 +260,10 @@ function upload-server-tars() { set-preferred-region + if [[ "${ENABLE_DOCKER_REGISTRY_CACHE:-}" == "true" ]]; then + DOCKER_REGISTRY_MIRROR_URL="https://mirror.gcr.io" + fi + SERVER_BINARY_TAR_HASH=$(sha1sum-file "${SERVER_BINARY_TAR}") if [[ -n "${KUBE_MANIFESTS_TAR:-}" ]]; then KUBE_MANIFESTS_TAR_HASH=$(sha1sum-file "${KUBE_MANIFESTS_TAR}") diff --git a/cluster/get-kube-local.sh b/cluster/get-kube-local.sh index 972ebce6d7..21a8243dd9 100755 --- a/cluster/get-kube-local.sh +++ b/cluster/get-kube-local.sh @@ -97,7 +97,7 @@ function create_cluster { --pid=host \ --privileged=true \ -d \ - gcr.io/google_containers/hyperkube-${arch}:${release} \ + k8s.gcr.io/hyperkube-${arch}:${release} \ /hyperkube kubelet \ --containerized \ --hostname-override="127.0.0.1" \ diff --git a/cluster/images/etcd-empty-dir-cleanup/Makefile b/cluster/images/etcd-empty-dir-cleanup/Makefile index 0fc6994af3..3c6c1c89ba 100644 --- a/cluster/images/etcd-empty-dir-cleanup/Makefile +++ b/cluster/images/etcd-empty-dir-cleanup/Makefile @@ -15,7 +15,7 @@ .PHONY: build push ETCD_VERSION = 3.1.10 -IMAGE = gcr.io/google-containers/etcd-empty-dir-cleanup +IMAGE = staging-k8s.gcr.io/etcd-empty-dir-cleanup TAG = 3.1.10.0 clean: diff --git a/cluster/images/etcd-version-monitor/Makefile b/cluster/images/etcd-version-monitor/Makefile index e061b90015..32921579f3 100644 --- a/cluster/images/etcd-version-monitor/Makefile +++ b/cluster/images/etcd-version-monitor/Makefile @@ -15,11 +15,11 @@ # Build the etcd-version-monitor image # # Usage: -# [GOLANG_VERSION=1.8.3] [REGISTRY=gcr.io/google-containers] [TAG=test] make (build|push) +# [GOLANG_VERSION=1.8.3] [REGISTRY=staging-k8s.gcr.io] [TAG=test] make (build|push) # TODO(shyamjvs): Support architectures other than amd64 if needed. ARCH:=amd64 GOLANG_VERSION?=1.8.3 -REGISTRY?=gcr.io/google-containers +REGISTRY?=staging-k8s.gcr.io TAG?=0.1.1 IMAGE:=$(REGISTRY)/etcd-version-monitor:$(TAG) CURRENT_DIR:=$(pwd) @@ -30,8 +30,12 @@ build: cp etcd-version-monitor.go Dockerfile $(TEMP_DIR) # Compile etcd-version-monitor. - docker run -it -v $(shell pwd)/../../../:/go/src/k8s.io/kubernetes -v $(TEMP_DIR):/build -e GOARCH=$(ARCH) golang:$(GOLANG_VERSION) \ - /bin/bash -c "CGO_ENABLED=0 go build -o /build/etcd-version-monitor k8s.io/kubernetes/cluster/images/etcd-version-monitor" + docker run -it \ + -v $(shell pwd)/../../../:/go/src/k8s.io/kubernetes \ + -v $(TEMP_DIR):/build \ + -e GOARCH=$(ARCH) \ + golang:$(GOLANG_VERSION) \ + /bin/bash -c "CGO_ENABLED=0 go build -o /build/etcd-version-monitor k8s.io/kubernetes/cluster/images/etcd-version-monitor" docker build -t $(IMAGE) $(TEMP_DIR) diff --git a/cluster/images/etcd-version-monitor/README.md b/cluster/images/etcd-version-monitor/README.md index adacfb2ca3..727ff7b2a2 100644 --- a/cluster/images/etcd-version-monitor/README.md +++ b/cluster/images/etcd-version-monitor/README.md @@ -18,7 +18,7 @@ latency metrics (`etcd_grpc_unary_requests_duration_seconds`) to be exposed. To run this tool as a docker container: - make build -- docker run --net=host -i -t gcr.io/google_containers/etcd-version-monitor:test /etcd-version-monitor --logtostderr +- docker run --net=host -i -t k8s.gcr.io/etcd-version-monitor:test /etcd-version-monitor --logtostderr To run this as a pod on the kubernetes cluster: - Place the 'etcd-version-monitor.yaml' in the manifests directory of diff --git a/cluster/images/etcd-version-monitor/etcd-version-monitor.yaml b/cluster/images/etcd-version-monitor/etcd-version-monitor.yaml index 49f1db3981..f632ac2ed6 100644 --- a/cluster/images/etcd-version-monitor/etcd-version-monitor.yaml +++ b/cluster/images/etcd-version-monitor/etcd-version-monitor.yaml @@ -7,7 +7,7 @@ spec: hostNetwork: true containers: - name: etcd-version-monitor - image: gcr.io/google-containers/etcd-version-monitor:0.1.0 + image: k8s.gcr.io/etcd-version-monitor:0.1.0 command: - /etcd-version-monitor - --logtostderr diff --git a/cluster/images/etcd/Makefile b/cluster/images/etcd/Makefile index d63614c397..401811cad1 100644 --- a/cluster/images/etcd/Makefile +++ b/cluster/images/etcd/Makefile @@ -15,7 +15,7 @@ # Build the etcd image # # Usage: -# [TAGS=2.2.1 2.3.7 3.0.17 3.1.11 3.2.14] [REGISTRY=gcr.io/google_containers] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push) +# [TAGS=2.2.1 2.3.7 3.0.17 3.1.11 3.2.14] [REGISTRY=k8s.gcr.io] [ARCH=amd64] [BASEIMAGE=busybox] make (build|push) # The image contains different etcd versions to simplify # upgrades. Thus be careful when removing any tag from here. @@ -29,7 +29,7 @@ TAGS?=2.2.1 2.3.7 3.0.17 3.1.11 3.2.14 REGISTRY_TAG?=3.2.14 ARCH?=amd64 -REGISTRY?=gcr.io/google_containers +REGISTRY?=k8s.gcr.io # golang version should match the golang version from https://github.com/coreos/etcd/releases for REGISTRY_TAG version of etcd. GOLANG_VERSION?=1.8.5 GOARM=7 diff --git a/cluster/images/etcd/README.md b/cluster/images/etcd/README.md index e7dfde8bf6..df5cfe5b3d 100644 --- a/cluster/images/etcd/README.md +++ b/cluster/images/etcd/README.md @@ -10,20 +10,20 @@ For other architectures, `etcd` is cross-compiled from source. Arch-specific `bu ```console # Build for linux/amd64 (default) $ make push ARCH=amd64 -# ---> gcr.io/google_containers/etcd-amd64:TAG -# ---> gcr.io/google_containers/etcd:TAG +# ---> staging-k8s.gcr.io/etcd-amd64:TAG +# ---> staging-k8s.gcr.io/etcd:TAG $ make push ARCH=arm -# ---> gcr.io/google_containers/etcd-arm:TAG +# ---> staging-k8s.gcr.io/etcd-arm:TAG $ make push ARCH=arm64 -# ---> gcr.io/google_containers/etcd-arm64:TAG +# ---> staging-k8s.gcr.io/etcd-arm64:TAG $ make push ARCH=ppc64le -# ---> gcr.io/google_containers/etcd-ppc64le:TAG +# ---> staging-k8s.gcr.io/etcd-ppc64le:TAG $ make push ARCH=s390x -# ---> gcr.io/google_containers/etcd-s390x:TAG +# ---> staging-k8s.gcr.io/etcd-s390x:TAG ``` If you don't want to push the images, run `make` or `make build` instead diff --git a/cluster/images/hyperkube/BUILD b/cluster/images/hyperkube/BUILD index 6ca2ff6d61..9d77f735a2 100644 --- a/cluster/images/hyperkube/BUILD +++ b/cluster/images/hyperkube/BUILD @@ -27,7 +27,7 @@ docker_build( docker_bundle( name = "hyperkube", - images = {"gcr.io/google-containers/hyperkube-amd64:{STABLE_DOCKER_TAG}": "hyperkube-internal"}, + images = {"k8s.gcr.io/hyperkube-amd64:{STABLE_DOCKER_TAG}": "hyperkube-internal"}, stamp = True, ) diff --git a/cluster/images/hyperkube/Dockerfile b/cluster/images/hyperkube/Dockerfile index 71d2300a04..ab90560341 100644 --- a/cluster/images/hyperkube/Dockerfile +++ b/cluster/images/hyperkube/Dockerfile @@ -16,7 +16,7 @@ FROM BASEIMAGE # Create symlinks for each hyperkube server # Also create symlinks to /usr/local/bin/ where the server image binaries live, so the hyperkube image may be -# used instead of gcr.io/google_containers/kube-* without any modifications. +# used instead of k8s.gcr.io/kube-* without any modifications. # TODO: replace manual symlink creation with --make-symlink command once # cross-building with qemu supports go binaries. See #28702 # RUN /hyperkube --make-symlinks diff --git a/cluster/images/hyperkube/Makefile b/cluster/images/hyperkube/Makefile index ccecb9b80e..bd2c4005e6 100644 --- a/cluster/images/hyperkube/Makefile +++ b/cluster/images/hyperkube/Makefile @@ -15,14 +15,14 @@ # Build the hyperkube image. # # Usage: -# [ARCH=amd64] [REGISTRY="gcr.io/google-containers"] make (build|push) VERSION={some_released_version_of_kubernetes} +# [ARCH=amd64] [REGISTRY="staging-k8s.gcr.io"] make (build|push) VERSION={some_released_version_of_kubernetes} -REGISTRY?=gcr.io/google-containers +REGISTRY?=staging-k8s.gcr.io ARCH?=amd64 OUT_DIR?=_output HYPERKUBE_BIN?=$(OUT_DIR)/dockerized/bin/linux/$(ARCH)/hyperkube -BASEIMAGE=gcr.io/google-containers/debian-hyperkube-base-$(ARCH):0.8 +BASEIMAGE=k8s.gcr.io/debian-hyperkube-base-$(ARCH):0.8 TEMP_DIR:=$(shell mktemp -d -t hyperkubeXXXXXX) all: build diff --git a/cluster/images/hyperkube/README.md b/cluster/images/hyperkube/README.md index 60fba63aa4..1bdf38682e 100644 --- a/cluster/images/hyperkube/README.md +++ b/cluster/images/hyperkube/README.md @@ -10,23 +10,23 @@ $ build/run.sh make cross # Build for linux/amd64 (default) -# export REGISTRY=$HOST/$ORG to switch from gcr.io/google_containers +# export REGISTRY=$HOST/$ORG to switch from staging-k8s.gcr.io $ make push VERSION={target_version} ARCH=amd64 -# ---> gcr.io/google_containers/hyperkube-amd64:VERSION -# ---> gcr.io/google_containers/hyperkube:VERSION (image with backwards-compatible naming) +# ---> staging-k8s.gcr.io/hyperkube-amd64:VERSION +# ---> staging-k8s.gcr.io/hyperkube:VERSION (image with backwards-compatible naming) $ make push VERSION={target_version} ARCH=arm -# ---> gcr.io/google_containers/hyperkube-arm:VERSION +# ---> staging-k8s.gcr.io/hyperkube-arm:VERSION $ make push VERSION={target_version} ARCH=arm64 -# ---> gcr.io/google_containers/hyperkube-arm64:VERSION +# ---> staging-k8s.gcr.io/hyperkube-arm64:VERSION $ make push VERSION={target_version} ARCH=ppc64le -# ---> gcr.io/google_containers/hyperkube-ppc64le:VERSION +# ---> staging-k8s.gcr.io/hyperkube-ppc64le:VERSION $ make push VERSION={target_version} ARCH=s390x -# ---> gcr.io/google_containers/hyperkube-s390x:VERSION +# ---> staging-k8s.gcr.io/hyperkube-s390x:VERSION ``` If you don't want to push the images, run `make` or `make build` instead diff --git a/cluster/images/kubemark/BUILD b/cluster/images/kubemark/BUILD index ce7ceb8612..c56bec980c 100644 --- a/cluster/images/kubemark/BUILD +++ b/cluster/images/kubemark/BUILD @@ -12,8 +12,8 @@ docker_build( docker_push( name = "push", image = ":image", - registry = "gcr.io", - repository = "$(PROJECT)/kubemark", + registry = "$(REGISTRY)", + repository = "kubemark", stamp = True, tag = "latest", tags = ["manual"], diff --git a/cluster/images/kubemark/Makefile b/cluster/images/kubemark/Makefile index 6786aeea24..eef4047883 100644 --- a/cluster/images/kubemark/Makefile +++ b/cluster/images/kubemark/Makefile @@ -15,18 +15,21 @@ # build Kubemark image from currently built binaries containing both 'real' master and Hollow Node. # This makefile assumes that the kubemark binary is present in this directory. -REGISTRY?=gcr.io -PROJECT?=google_containers +# Allow the caller to override this. Beware make's precedence. This: +# REGISTRY=$VAR make +# .. is not the same as: +# make REGISTRY=$VAR +REGISTRY := $(if $(REGISTRY),$(REGISTRY),staging-k8s.gcr.io) all: gcloudpush build: - docker build --pull -t $(REGISTRY)/$(PROJECT)/kubemark . + docker build --pull -t $(REGISTRY)/kubemark . gcloudpush: build - gcloud docker -- push $(REGISTRY)/$(PROJECT)/kubemark + gcloud docker -- push $(REGISTRY)/kubemark push: build - docker -- push $(REGISTRY)/$(PROJECT)/kubemark + docker -- push $(REGISTRY)/kubemark .PHONY: all build gcloudpush push diff --git a/cluster/juju/layers/kubernetes-worker/reactive/kubernetes_worker.py b/cluster/juju/layers/kubernetes-worker/reactive/kubernetes_worker.py index bd84c939c5..ea795e6dca 100644 --- a/cluster/juju/layers/kubernetes-worker/reactive/kubernetes_worker.py +++ b/cluster/juju/layers/kubernetes-worker/reactive/kubernetes_worker.py @@ -686,10 +686,10 @@ def launch_default_ingress_controller(): context['defaultbackend_image'] == "auto"): if context['arch'] == 's390x': context['defaultbackend_image'] = \ - "gcr.io/google_containers/defaultbackend-s390x:1.4" + "k8s.gcr.io/defaultbackend-s390x:1.4" else: context['defaultbackend_image'] = \ - "gcr.io/google_containers/defaultbackend:1.4" + "k8s.gcr.io/defaultbackend:1.4" # Render the default http backend (404) replicationcontroller manifest manifest = addon_path.format('default-http-backend.yaml') @@ -712,7 +712,7 @@ def launch_default_ingress_controller(): "docker.io/cdkbot/nginx-ingress-controller-s390x:0.9.0-beta.13" else: context['ingress_image'] = \ - "gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.15" # noqa + "k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.15" # noqa context['juju_application'] = hookenv.service_name() manifest = addon_path.format('ingress-daemon-set.yaml') render('ingress-daemon-set.yaml', manifest, context) diff --git a/cluster/kubemark/gce/config-default.sh b/cluster/kubemark/gce/config-default.sh index 9e6337cfa8..6d9282d061 100644 --- a/cluster/kubemark/gce/config-default.sh +++ b/cluster/kubemark/gce/config-default.sh @@ -62,7 +62,7 @@ TERMINATED_POD_GC_THRESHOLD=${TERMINATED_POD_GC_THRESHOLD:-100} KUBE_APISERVER_REQUEST_TIMEOUT=300 ETCD_COMPACTION_INTERVAL_SEC="${KUBEMARK_ETCD_COMPACTION_INTERVAL_SEC:-}" -# Set etcd image (e.g. gcr.io/google_containers/etcd) and version (e.g. 3.1.10) if you need +# Set etcd image (e.g. k8s.gcr.io/etcd) and version (e.g. 3.1.10) if you need # non-default version. ETCD_IMAGE="${TEST_ETCD_IMAGE:-}" ETCD_VERSION="${TEST_ETCD_VERSION:-}" diff --git a/cluster/log-dump/logexporter-daemonset.yaml b/cluster/log-dump/logexporter-daemonset.yaml index 8099da1b9d..27aafa876f 100644 --- a/cluster/log-dump/logexporter-daemonset.yaml +++ b/cluster/log-dump/logexporter-daemonset.yaml @@ -36,7 +36,7 @@ spec: spec: containers: - name: logexporter-test - image: gcr.io/google-containers/logexporter:v0.1.1 + image: k8s.gcr.io/logexporter:v0.1.1 env: - name: NODE_NAME valueFrom: diff --git a/cluster/restore-from-backup.sh b/cluster/restore-from-backup.sh index ffa916d71c..d4283fcef1 100755 --- a/cluster/restore-from-backup.sh +++ b/cluster/restore-from-backup.sh @@ -160,7 +160,7 @@ if [ "${ETCD_API}" == "etcd2" ]; then echo "Starting etcd ${ETCD_VERSION} to restore data" image=$(docker run -d -v ${BACKUP_DIR}:/var/etcd/data \ --net=host -p ${etcd_port}:${etcd_port} \ - "gcr.io/google_containers/etcd:${ETCD_VERSION}" /bin/sh -c \ + "k8s.gcr.io/etcd:${ETCD_VERSION}" /bin/sh -c \ "/usr/local/bin/etcd --data-dir /var/etcd/data --force-new-cluster") if [ "$?" -ne "0" ]; then echo "Docker container didn't started correctly" @@ -191,7 +191,7 @@ elif [ "${ETCD_API}" == "etcd3" ]; then # Run etcdctl snapshot restore command and wait until it is finished. # setting with --name in the etcd manifest file and then it seems to work. docker run -v ${BACKUP_DIR}:/var/tmp/backup --env ETCDCTL_API=3 \ - "gcr.io/google_containers/etcd:${ETCD_VERSION}" /bin/sh -c \ + "k8s.gcr.io/etcd:${ETCD_VERSION}" /bin/sh -c \ "/usr/local/bin/etcdctl snapshot restore ${BACKUP_DIR}/${snapshot} --name ${NAME} --initial-cluster ${INITIAL_CLUSTER} --initial-advertise-peer-urls ${INITIAL_ADVERTISE_PEER_URLS}; mv /${NAME}.etcd/member /var/tmp/backup/" if [ "$?" -ne "0" ]; then echo "Docker container didn't started correctly" diff --git a/cmd/kubeadm/app/apis/kubeadm/v1alpha1/defaults.go b/cmd/kubeadm/app/apis/kubeadm/v1alpha1/defaults.go index 772a9612ee..a2a967a019 100644 --- a/cmd/kubeadm/app/apis/kubeadm/v1alpha1/defaults.go +++ b/cmd/kubeadm/app/apis/kubeadm/v1alpha1/defaults.go @@ -47,7 +47,7 @@ const ( // DefaultCertificatesDir defines default certificate directory DefaultCertificatesDir = "/etc/kubernetes/pki" // DefaultImageRepository defines default image registry - DefaultImageRepository = "gcr.io/google_containers" + DefaultImageRepository = "k8s.gcr.io" // DefaultManifestsDir defines default manifests directory DefaultManifestsDir = "/etc/kubernetes/manifests" diff --git a/cmd/kubeadm/app/images/images_test.go b/cmd/kubeadm/app/images/images_test.go index 6c1173e6c2..466f204500 100644 --- a/cmd/kubeadm/app/images/images_test.go +++ b/cmd/kubeadm/app/images/images_test.go @@ -27,7 +27,7 @@ import ( const ( testversion = "v10.1.2-alpha.1.100+0123456789abcdef+SOMETHING" expected = "v10.1.2-alpha.1.100_0123456789abcdef_SOMETHING" - gcrPrefix = "gcr.io/google_containers" + gcrPrefix = "k8s.gcr.io" ) func TestGetCoreImage(t *testing.T) { diff --git a/cmd/kubeadm/app/phases/selfhosting/selfhosting_test.go b/cmd/kubeadm/app/phases/selfhosting/selfhosting_test.go index 9b1b3306b5..5b30899d77 100644 --- a/cmd/kubeadm/app/phases/selfhosting/selfhosting_test.go +++ b/cmd/kubeadm/app/phases/selfhosting/selfhosting_test.go @@ -66,7 +66,7 @@ spec: - --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key - --authorization-mode=Node,RBAC - --etcd-servers=http://127.0.0.1:2379 - image: gcr.io/google_containers/kube-apiserver-amd64:v1.7.4 + image: k8s.gcr.io/kube-apiserver-amd64:v1.7.4 livenessProbe: failureThreshold: 8 httpGet: @@ -153,7 +153,7 @@ spec: valueFrom: fieldRef: fieldPath: status.hostIP - image: gcr.io/google_containers/kube-apiserver-amd64:v1.7.4 + image: k8s.gcr.io/kube-apiserver-amd64:v1.7.4 livenessProbe: failureThreshold: 8 httpGet: @@ -225,7 +225,7 @@ spec: - --cluster-signing-key-file=/etc/kubernetes/pki/ca.key - --address=127.0.0.1 - --use-service-account-credentials=true - image: gcr.io/google_containers/kube-controller-manager-amd64:v1.7.4 + image: k8s.gcr.io/kube-controller-manager-amd64:v1.7.4 livenessProbe: failureThreshold: 8 httpGet: @@ -300,7 +300,7 @@ spec: - --cluster-signing-key-file=/etc/kubernetes/pki/ca.key - --address=127.0.0.1 - --use-service-account-credentials=true - image: gcr.io/google_containers/kube-controller-manager-amd64:v1.7.4 + image: k8s.gcr.io/kube-controller-manager-amd64:v1.7.4 livenessProbe: failureThreshold: 8 httpGet: @@ -373,7 +373,7 @@ spec: - --leader-elect=true - --kubeconfig=/etc/kubernetes/scheduler.conf - --address=127.0.0.1 - image: gcr.io/google_containers/kube-scheduler-amd64:v1.7.4 + image: k8s.gcr.io/kube-scheduler-amd64:v1.7.4 livenessProbe: failureThreshold: 8 httpGet: @@ -424,7 +424,7 @@ spec: - --leader-elect=true - --kubeconfig=/etc/kubernetes/scheduler.conf - --address=127.0.0.1 - image: gcr.io/google_containers/kube-scheduler-amd64:v1.7.4 + image: k8s.gcr.io/kube-scheduler-amd64:v1.7.4 livenessProbe: failureThreshold: 8 httpGet: @@ -526,7 +526,7 @@ metadata: name: testpod spec: containers: - - image: gcr.io/google_containers/busybox + - image: k8s.gcr.io/busybox `, expectError: false, }, @@ -542,7 +542,7 @@ spec: "spec": { "containers": [ { - "image": "gcr.io/google_containers/busybox" + "image": "k8s.gcr.io/busybox" } ] } @@ -557,7 +557,7 @@ kind: Pod metadata: name: testpod spec: - - image: gcr.io/google_containers/busybox + - image: k8s.gcr.io/busybox `, expectError: true, }, diff --git a/cmd/kubeadm/app/phases/upgrade/staticpods_test.go b/cmd/kubeadm/app/phases/upgrade/staticpods_test.go index e51a129579..5b131fbca1 100644 --- a/cmd/kubeadm/app/phases/upgrade/staticpods_test.go +++ b/cmd/kubeadm/app/phases/upgrade/staticpods_test.go @@ -61,7 +61,7 @@ etcd: image: "" keyFile: "" featureFlags: null -imageRepository: gcr.io/google_containers +imageRepository: k8s.gcr.io kubernetesVersion: %s networking: dnsDomain: cluster.local diff --git a/cmd/kubeadm/app/util/template_test.go b/cmd/kubeadm/app/util/template_test.go index ed5fee9c33..c3833bc1b3 100644 --- a/cmd/kubeadm/app/util/template_test.go +++ b/cmd/kubeadm/app/util/template_test.go @@ -22,8 +22,8 @@ import ( const ( validTmpl = "image: {{ .ImageRepository }}/pause-{{ .Arch }}:3.1" - validTmplOut = "image: gcr.io/google_containers/pause-amd64:3.1" - doNothing = "image: gcr.io/google_containers/pause-amd64:3.1" + validTmplOut = "image: k8s.gcr.io/pause-amd64:3.1" + doNothing = "image: k8s.gcr.io/pause-amd64:3.1" invalidTmpl1 = "{{ .baz }/d}" invalidTmpl2 = "{{ !foobar }}" ) @@ -39,7 +39,7 @@ func TestParseTemplate(t *testing.T) { { template: validTmpl, data: struct{ ImageRepository, Arch string }{ - ImageRepository: "gcr.io/google_containers", + ImageRepository: "k8s.gcr.io", Arch: "amd64", }, output: validTmplOut, @@ -49,7 +49,7 @@ func TestParseTemplate(t *testing.T) { { template: doNothing, data: struct{ ImageRepository, Arch string }{ - ImageRepository: "gcr.io/google_containers", + ImageRepository: "k8s.gcr.io", Arch: "amd64", }, output: doNothing, diff --git a/cmd/kubelet/app/options/container_runtime.go b/cmd/kubelet/app/options/container_runtime.go index b57a4e20bc..4225e8dd50 100644 --- a/cmd/kubelet/app/options/container_runtime.go +++ b/cmd/kubelet/app/options/container_runtime.go @@ -26,8 +26,8 @@ import ( ) const ( - // When these values are updated, also update test/utils/image/manifest.go - defaultPodSandboxImageName = "gcr.io/google_containers/pause" + // When these values are updated, also update test/e2e/framework/util.go + defaultPodSandboxImageName = "k8s.gcr.io/pause" defaultPodSandboxImageVersion = "3.1" // From pkg/kubelet/rkt/rkt.go to avoid circular import defaultRktAPIServiceEndpoint = "localhost:15441" diff --git a/docs/api-reference/v1/definitions.html b/docs/api-reference/v1/definitions.html index be51d396db..ff90e1d21f 100755 --- a/docs/api-reference/v1/definitions.html +++ b/docs/api-reference/v1/definitions.html @@ -5201,7 +5201,7 @@ Examples:

names

-

Names by which this image is known. e.g. ["gcr.io/google_containers/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]

+

Names by which this image is known. e.g. ["k8s.gcr.io/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"]

true

string array

diff --git a/examples/cluster-dns/dns-backend-rc.yaml b/examples/cluster-dns/dns-backend-rc.yaml index 9649d367b5..4af1b0dcba 100644 --- a/examples/cluster-dns/dns-backend-rc.yaml +++ b/examples/cluster-dns/dns-backend-rc.yaml @@ -15,7 +15,7 @@ spec: spec: containers: - name: dns-backend - image: gcr.io/google_containers/example-dns-backend:v1 + image: k8s.gcr.io/example-dns-backend:v1 ports: - name: backend-port containerPort: 8000 diff --git a/examples/cluster-dns/dns-frontend-pod.yaml b/examples/cluster-dns/dns-frontend-pod.yaml index b424478383..4a7695f113 100644 --- a/examples/cluster-dns/dns-frontend-pod.yaml +++ b/examples/cluster-dns/dns-frontend-pod.yaml @@ -7,7 +7,7 @@ metadata: spec: containers: - name: dns-frontend - image: gcr.io/google_containers/example-dns-frontend:v1 + image: k8s.gcr.io/example-dns-frontend:v1 command: - python - client.py diff --git a/examples/cluster-dns/images/backend/Makefile b/examples/cluster-dns/images/backend/Makefile index 67992ec266..bac8c89876 100644 --- a/examples/cluster-dns/images/backend/Makefile +++ b/examples/cluster-dns/images/backend/Makefile @@ -13,7 +13,7 @@ # limitations under the License. TAG = v1 -PREFIX = gcr.io/google_containers +PREFIX = staging-k8s.gcr.io IMAGE = example-dns-backend all: push diff --git a/examples/cluster-dns/images/frontend/Makefile b/examples/cluster-dns/images/frontend/Makefile index 2f6337545f..4c17fb59f5 100644 --- a/examples/cluster-dns/images/frontend/Makefile +++ b/examples/cluster-dns/images/frontend/Makefile @@ -13,7 +13,7 @@ # limitations under the License. TAG = v1 -PREFIX = gcr.io/google_containers +PREFIX = staging-k8s.gcr.io IMAGE = example-dns-frontend all: push diff --git a/examples/explorer/Makefile b/examples/explorer/Makefile index 35dd5bd7e7..f550a15a15 100644 --- a/examples/explorer/Makefile +++ b/examples/explorer/Makefile @@ -21,10 +21,10 @@ explorer: explorer.go CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -ldflags '-w' ./explorer.go container: explorer - docker build --pull -t gcr.io/google_containers/explorer:$(TAG) . + docker build --pull -t staging-k8s.gcr.io/explorer:$(TAG) . push: container - gcloud docker -- push gcr.io/google_containers/explorer:$(TAG) + gcloud docker -- push staging-k8s.gcr.io/explorer:$(TAG) clean: rm -f explorer diff --git a/examples/explorer/pod.yaml b/examples/explorer/pod.yaml index 2c26c3e174..0437a24922 100644 --- a/examples/explorer/pod.yaml +++ b/examples/explorer/pod.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: explorer - image: gcr.io/google_containers/explorer:1.0 + image: k8s.gcr.io/explorer:1.0 args: ["-port=8080"] ports: - containerPort: 8080 diff --git a/examples/guestbook-go/Makefile b/examples/guestbook-go/Makefile index 9c63819ebc..ce17d07e80 100644 --- a/examples/guestbook-go/Makefile +++ b/examples/guestbook-go/Makefile @@ -15,9 +15,9 @@ # Build the guestbook-go example # Usage: -# [VERSION=v3] [REGISTRY="gcr.io/google_containers"] make build +# [VERSION=v3] [REGISTRY="staging-k8s.gcr.io"] make build VERSION?=v3 -REGISTRY?=gcr.io/google_containers +REGISTRY?=staging-k8s.gcr.io release: clean build push clean diff --git a/examples/guestbook-go/guestbook-controller.json b/examples/guestbook-go/guestbook-controller.json index 82c0e9134f..0e3553c865 100644 --- a/examples/guestbook-go/guestbook-controller.json +++ b/examples/guestbook-go/guestbook-controller.json @@ -22,7 +22,7 @@ "containers":[ { "name":"guestbook", - "image":"gcr.io/google_containers/guestbook:v3", + "image":"k8s.gcr.io/guestbook:v3", "ports":[ { "name":"http-server", diff --git a/examples/guestbook/all-in-one/guestbook-all-in-one.yaml b/examples/guestbook/all-in-one/guestbook-all-in-one.yaml index 7735c79898..a3415d6a99 100644 --- a/examples/guestbook/all-in-one/guestbook-all-in-one.yaml +++ b/examples/guestbook/all-in-one/guestbook-all-in-one.yaml @@ -30,7 +30,7 @@ spec: spec: containers: - name: master - image: gcr.io/google_containers/redis:e2e # or just image: redis + image: k8s.gcr.io/redis:e2e # or just image: redis resources: requests: cpu: 100m diff --git a/examples/guestbook/legacy/redis-master-controller.yaml b/examples/guestbook/legacy/redis-master-controller.yaml index 0bdf976175..28208103b4 100644 --- a/examples/guestbook/legacy/redis-master-controller.yaml +++ b/examples/guestbook/legacy/redis-master-controller.yaml @@ -17,7 +17,7 @@ spec: spec: containers: - name: master - image: gcr.io/google_containers/redis:e2e # or just image: redis + image: k8s.gcr.io/redis:e2e # or just image: redis resources: requests: cpu: 100m diff --git a/examples/guestbook/redis-master-deployment.yaml b/examples/guestbook/redis-master-deployment.yaml index 3fbcc0f01c..d457a09934 100644 --- a/examples/guestbook/redis-master-deployment.yaml +++ b/examples/guestbook/redis-master-deployment.yaml @@ -13,7 +13,7 @@ spec: spec: containers: - name: master - image: gcr.io/google_containers/redis:e2e # or just image: redis + image: k8s.gcr.io/redis:e2e # or just image: redis resources: requests: cpu: 100m diff --git a/examples/kubectl-container/Makefile b/examples/kubectl-container/Makefile index ea127f1514..a4094ff8bf 100644 --- a/examples/kubectl-container/Makefile +++ b/examples/kubectl-container/Makefile @@ -37,11 +37,11 @@ tag: .tag container: $(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion)) - docker build --pull -t gcr.io/google_containers/kubectl:$(TAG) . + docker build --pull -t staging-k8s.gcr.io/kubectl:$(TAG) . push: container $(if $(TAG),,$(error TAG is not defined. Use 'make tag' to see a suggestion)) - gcloud docker -- push gcr.io/google_containers/kubectl:$(TAG) + gcloud docker -- push staging-k8s.gcr.io/kubectl:$(TAG) clean: rm -f kubectl diff --git a/examples/kubectl-container/pod.json b/examples/kubectl-container/pod.json index ed0ec6599c..540715a6c5 100644 --- a/examples/kubectl-container/pod.json +++ b/examples/kubectl-container/pod.json @@ -8,7 +8,7 @@ "containers": [ { "name": "bb", - "image": "gcr.io/google_containers/busybox", + "image": "k8s.gcr.io/busybox", "command": [ "sh", "-c", "sleep 5; wget -O - ${KUBERNETES_RO_SERVICE_HOST}:${KUBERNETES_RO_SERVICE_PORT}/api/v1/pods/; sleep 10000" ], @@ -36,7 +36,7 @@ }, { "name": "kubectl", - "image": "gcr.io/google_containers/kubectl:v0.18.0-120-gaeb4ac55ad12b1-dirty", + "image": "k8s.gcr.io/kubectl:v0.18.0-120-gaeb4ac55ad12b1-dirty", "imagePullPolicy": "Always", "args": [ "proxy", "-p", "8001" diff --git a/examples/spark/spark-gluster/spark-master-controller.yaml b/examples/spark/spark-gluster/spark-master-controller.yaml index d0b365b713..28cb6ac3fb 100644 --- a/examples/spark/spark-gluster/spark-master-controller.yaml +++ b/examples/spark/spark-gluster/spark-master-controller.yaml @@ -16,7 +16,7 @@ spec: spec: containers: - name: spark-master - image: gcr.io/google_containers/spark:1.5.2_v1 + image: k8s.gcr.io/spark:1.5.2_v1 command: ["/start-master"] ports: - containerPort: 7077 diff --git a/examples/spark/spark-gluster/spark-worker-controller.yaml b/examples/spark/spark-gluster/spark-worker-controller.yaml index 69cc3cec95..0030d8a667 100644 --- a/examples/spark/spark-gluster/spark-worker-controller.yaml +++ b/examples/spark/spark-gluster/spark-worker-controller.yaml @@ -17,7 +17,7 @@ spec: spec: containers: - name: spark-worker - image: gcr.io/google_containers/spark:1.5.2_v1 + image: k8s.gcr.io/spark:1.5.2_v1 command: ["/start-worker"] ports: - containerPort: 8888 diff --git a/examples/spark/spark-master-controller.yaml b/examples/spark/spark-master-controller.yaml index 60fb7ba8a1..ceaef078d2 100644 --- a/examples/spark/spark-master-controller.yaml +++ b/examples/spark/spark-master-controller.yaml @@ -13,7 +13,7 @@ spec: spec: containers: - name: spark-master - image: gcr.io/google_containers/spark:1.5.2_v1 + image: k8s.gcr.io/spark:1.5.2_v1 command: ["/start-master"] ports: - containerPort: 7077 diff --git a/examples/spark/spark-worker-controller.yaml b/examples/spark/spark-worker-controller.yaml index 9c748b3e04..3e5ed50ce0 100644 --- a/examples/spark/spark-worker-controller.yaml +++ b/examples/spark/spark-worker-controller.yaml @@ -13,7 +13,7 @@ spec: spec: containers: - name: spark-worker - image: gcr.io/google_containers/spark:1.5.2_v1 + image: k8s.gcr.io/spark:1.5.2_v1 command: ["/start-worker"] ports: - containerPort: 8081 diff --git a/examples/spark/zeppelin-controller.yaml b/examples/spark/zeppelin-controller.yaml index 56bb90d421..2f578fcfc2 100644 --- a/examples/spark/zeppelin-controller.yaml +++ b/examples/spark/zeppelin-controller.yaml @@ -13,7 +13,7 @@ spec: spec: containers: - name: zeppelin - image: gcr.io/google_containers/zeppelin:v0.5.6_v1 + image: k8s.gcr.io/zeppelin:v0.5.6_v1 ports: - containerPort: 8080 resources: diff --git a/examples/storage/cassandra/image/Dockerfile b/examples/storage/cassandra/image/Dockerfile index 45b7595123..5c4658d7f1 100644 --- a/examples/storage/cassandra/image/Dockerfile +++ b/examples/storage/cassandra/image/Dockerfile @@ -12,7 +12,7 @@ # See the License for the specific language governing permissions and # limitations under the License. -FROM gcr.io/google_containers/ubuntu-slim:0.9 +FROM k8s.gcr.io/ubuntu-slim:0.9 ARG BUILD_DATE ARG VCS_REF diff --git a/examples/storage/redis/redis-controller.yaml b/examples/storage/redis/redis-controller.yaml index fcb5e67cd6..dab2f7f1ab 100644 --- a/examples/storage/redis/redis-controller.yaml +++ b/examples/storage/redis/redis-controller.yaml @@ -13,7 +13,7 @@ spec: spec: containers: - name: redis - image: gcr.io/google_containers/redis:v1 + image: k8s.gcr.io/redis:v1 ports: - containerPort: 6379 resources: diff --git a/examples/storage/redis/redis-master.yaml b/examples/storage/redis/redis-master.yaml index 57305a7a35..589de648f5 100644 --- a/examples/storage/redis/redis-master.yaml +++ b/examples/storage/redis/redis-master.yaml @@ -9,7 +9,7 @@ metadata: spec: containers: - name: master - image: gcr.io/google_containers/redis:v1 + image: k8s.gcr.io/redis:v1 env: - name: MASTER value: "true" diff --git a/examples/storage/redis/redis-sentinel-controller.yaml b/examples/storage/redis/redis-sentinel-controller.yaml index da09e10cbb..6c4b14347a 100644 --- a/examples/storage/redis/redis-sentinel-controller.yaml +++ b/examples/storage/redis/redis-sentinel-controller.yaml @@ -15,7 +15,7 @@ spec: spec: containers: - name: sentinel - image: gcr.io/google_containers/redis:v1 + image: k8s.gcr.io/redis:v1 env: - name: SENTINEL value: "true" diff --git a/examples/storage/rethinkdb/admin-pod.yaml b/examples/storage/rethinkdb/admin-pod.yaml index eac07f33a5..12163909d6 100644 --- a/examples/storage/rethinkdb/admin-pod.yaml +++ b/examples/storage/rethinkdb/admin-pod.yaml @@ -7,7 +7,7 @@ metadata: name: rethinkdb-admin spec: containers: - - image: gcr.io/google_containers/rethinkdb:1.16.0_1 + - image: k8s.gcr.io/rethinkdb:1.16.0_1 name: rethinkdb env: - name: POD_NAMESPACE diff --git a/examples/storage/rethinkdb/rc.yaml b/examples/storage/rethinkdb/rc.yaml index 36b319191c..23becb6e88 100644 --- a/examples/storage/rethinkdb/rc.yaml +++ b/examples/storage/rethinkdb/rc.yaml @@ -16,7 +16,7 @@ spec: role: replicas spec: containers: - - image: gcr.io/google_containers/rethinkdb:1.16.0_1 + - image: k8s.gcr.io/rethinkdb:1.16.0_1 name: rethinkdb env: - name: POD_NAMESPACE diff --git a/examples/volumes/portworx/portworx-volume-pod.yaml b/examples/volumes/portworx/portworx-volume-pod.yaml index c5f195911a..f44302f59e 100644 --- a/examples/volumes/portworx/portworx-volume-pod.yaml +++ b/examples/volumes/portworx/portworx-volume-pod.yaml @@ -4,7 +4,7 @@ metadata: name: test-portworx-volume-pod spec: containers: - - image: gcr.io/google_containers/test-webserver + - image: k8s.gcr.io/test-webserver name: test-container volumeMounts: - mountPath: /test-portworx-volume diff --git a/examples/volumes/portworx/portworx-volume-pvcpod.yaml b/examples/volumes/portworx/portworx-volume-pvcpod.yaml index fb92b320f1..bef2d49656 100644 --- a/examples/volumes/portworx/portworx-volume-pvcpod.yaml +++ b/examples/volumes/portworx/portworx-volume-pvcpod.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: test-container - image: gcr.io/google_containers/test-webserver + image: k8s.gcr.io/test-webserver volumeMounts: - name: test-volume mountPath: /test-portworx-volume diff --git a/examples/volumes/portworx/portworx-volume-pvcscpod.yaml b/examples/volumes/portworx/portworx-volume-pvcscpod.yaml index 464bf5d8fd..8bdd513192 100644 --- a/examples/volumes/portworx/portworx-volume-pvcscpod.yaml +++ b/examples/volumes/portworx/portworx-volume-pvcscpod.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: test-container - image: gcr.io/google_containers/test-webserver + image: k8s.gcr.io/test-webserver volumeMounts: - name: test-volume mountPath: /test-portworx-volume diff --git a/examples/volumes/scaleio/pod-sc-pvc.yaml b/examples/volumes/scaleio/pod-sc-pvc.yaml index ceed7b567e..c94e7bc393 100644 --- a/examples/volumes/scaleio/pod-sc-pvc.yaml +++ b/examples/volumes/scaleio/pod-sc-pvc.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: pod-sio-small-container - image: gcr.io/google_containers/test-webserver + image: k8s.gcr.io/test-webserver volumeMounts: - mountPath: /test name: test-data diff --git a/examples/volumes/scaleio/pod.yaml b/examples/volumes/scaleio/pod.yaml index 4b53b2b53c..b13ec668c7 100644 --- a/examples/volumes/scaleio/pod.yaml +++ b/examples/volumes/scaleio/pod.yaml @@ -4,7 +4,7 @@ metadata: name: pod-0 spec: containers: - - image: gcr.io/google_containers/test-webserver + - image: k8s.gcr.io/test-webserver name: pod-0 volumeMounts: - mountPath: /test-pd diff --git a/examples/volumes/vsphere/simple-statefulset.yaml b/examples/volumes/vsphere/simple-statefulset.yaml index 3684a3b64e..d9de93c257 100644 --- a/examples/volumes/vsphere/simple-statefulset.yaml +++ b/examples/volumes/vsphere/simple-statefulset.yaml @@ -27,7 +27,7 @@ spec: spec: containers: - name: nginx - image: gcr.io/google_containers/nginx-slim:0.8 + image: k8s.gcr.io/nginx-slim:0.8 ports: - containerPort: 80 name: web diff --git a/examples/volumes/vsphere/vsphere-volume-pod.yaml b/examples/volumes/vsphere/vsphere-volume-pod.yaml index 8660d62e49..0204ad3a59 100644 --- a/examples/volumes/vsphere/vsphere-volume-pod.yaml +++ b/examples/volumes/vsphere/vsphere-volume-pod.yaml @@ -4,7 +4,7 @@ metadata: name: test-vmdk spec: containers: - - image: gcr.io/google_containers/test-webserver + - image: k8s.gcr.io/test-webserver name: test-container volumeMounts: - mountPath: /test-vmdk diff --git a/examples/volumes/vsphere/vsphere-volume-pvcpod.yaml b/examples/volumes/vsphere/vsphere-volume-pvcpod.yaml index 291664adaa..326c0031f3 100644 --- a/examples/volumes/vsphere/vsphere-volume-pvcpod.yaml +++ b/examples/volumes/vsphere/vsphere-volume-pvcpod.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: test-container - image: gcr.io/google_containers/test-webserver + image: k8s.gcr.io/test-webserver volumeMounts: - name: test-volume mountPath: /test-vmdk diff --git a/examples/volumes/vsphere/vsphere-volume-pvcscpod.yaml b/examples/volumes/vsphere/vsphere-volume-pvcscpod.yaml index 036aeb280c..c569a0b36d 100644 --- a/examples/volumes/vsphere/vsphere-volume-pvcscpod.yaml +++ b/examples/volumes/vsphere/vsphere-volume-pvcscpod.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: test-container - image: gcr.io/google_containers/test-webserver + image: k8s.gcr.io/test-webserver volumeMounts: - name: test-volume mountPath: /test-vmdk diff --git a/hack/gen-swagger-doc/README.md b/hack/gen-swagger-doc/README.md index eacf5119d8..5b35be4aff 100644 --- a/hack/gen-swagger-doc/README.md +++ b/hack/gen-swagger-doc/README.md @@ -3,7 +3,7 @@ This folder contains the sources needed to build the gen-swagger-doc container. To build the container image, ``` -$ sudo docker build -t gcr.io/google_containers/gen-swagger-docs:v1 . +$ sudo docker build -t k8s.gcr.io/gen-swagger-docs:v1 . ``` To generate the html docs, diff --git a/hack/lib/swagger.sh b/hack/lib/swagger.sh index 25bf16d818..af872d807e 100644 --- a/hack/lib/swagger.sh +++ b/hack/lib/swagger.sh @@ -117,7 +117,7 @@ kube::swagger::gen_api_ref_docs() { -v "${swagger_spec_path}":/swagger-source:z \ -v "${register_file}":/register.go:z \ --net=host -e "https_proxy=${KUBERNETES_HTTPS_PROXY:-}" \ - gcr.io/google_containers/gen-swagger-docs:v8 \ + k8s.gcr.io/gen-swagger-docs:v8 \ "${swagger_json_name}" done diff --git a/hack/local-up-cluster.sh b/hack/local-up-cluster.sh index d1a3464303..8308b98ee6 100755 --- a/hack/local-up-cluster.sh +++ b/hack/local-up-cluster.sh @@ -795,7 +795,7 @@ function start_kubelet { --privileged=true \ -i \ --cidfile=$KUBELET_CIDFILE \ - gcr.io/google_containers/kubelet \ + k8s.gcr.io/kubelet \ /kubelet --v=${LOG_LEVEL} --containerized ${priv_arg}--chaos-chance="${CHAOS_CHANCE}" --pod-manifest-path="${POD_MANIFEST_PATH}" --hostname-override="${HOSTNAME_OVERRIDE}" ${cloud_config_arg} \ --address="127.0.0.1" --kubeconfig "$CERT_DIR"/kubelet.kubeconfig --port="$KUBELET_PORT" --enable-controller-attach-detach="${ENABLE_CONTROLLER_ATTACH_DETACH}" &> $KUBELET_LOG & fi } diff --git a/hack/make-rules/test-cmd-util.sh b/hack/make-rules/test-cmd-util.sh index 0528c2f740..0734ec051b 100755 --- a/hack/make-rules/test-cmd-util.sh +++ b/hack/make-rules/test-cmd-util.sh @@ -37,15 +37,15 @@ KUBELET_HEALTHZ_PORT=${KUBELET_HEALTHZ_PORT:-10248} CTLRMGR_PORT=${CTLRMGR_PORT:-10252} PROXY_HOST=127.0.0.1 # kubectl only serves on localhost. -IMAGE_NGINX="gcr.io/google-containers/nginx:1.7.9" -IMAGE_DEPLOYMENT_R1="gcr.io/google-containers/nginx:test-cmd" # deployment-revision1.yaml +IMAGE_NGINX="k8s.gcr.io/nginx:1.7.9" +IMAGE_DEPLOYMENT_R1="k8s.gcr.io/nginx:test-cmd" # deployment-revision1.yaml IMAGE_DEPLOYMENT_R2="$IMAGE_NGINX" # deployment-revision2.yaml -IMAGE_PERL="gcr.io/google-containers/perl" -IMAGE_PAUSE_V2="gcr.io/google-containers/pause:2.0" -IMAGE_DAEMONSET_R2="gcr.io/google-containers/pause:latest" -IMAGE_DAEMONSET_R2_2="gcr.io/google-containers/nginx:test-cmd" # rollingupdate-daemonset-rv2.yaml -IMAGE_STATEFULSET_R1="gcr.io/google_containers/nginx-slim:0.7" -IMAGE_STATEFULSET_R2="gcr.io/google_containers/nginx-slim:0.8" +IMAGE_PERL="k8s.gcr.io/perl" +IMAGE_PAUSE_V2="k8s.gcr.io/pause:2.0" +IMAGE_DAEMONSET_R2="k8s.gcr.io/pause:latest" +IMAGE_DAEMONSET_R2_2="k8s.gcr.io/nginx:test-cmd" # rollingupdate-daemonset-rv2.yaml +IMAGE_STATEFULSET_R1="k8s.gcr.io/nginx-slim:0.7" +IMAGE_STATEFULSET_R2="k8s.gcr.io/nginx-slim:0.8" # Expose kubectl directly for readability PATH="${KUBE_OUTPUT_HOSTBIN}":$PATH @@ -719,9 +719,9 @@ run_pod_tests() { kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'changed-with-yaml:' ## Patch pod from JSON can change image # Command - kubectl patch "${kube_flags[@]}" -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml -p='{"spec":{"containers":[{"name": "kubernetes-serve-hostname", "image": "gcr.io/google_containers/pause-amd64:3.1"}]}}' - # Post-condition: valid-pod POD has image gcr.io/google_containers/pause-amd64:3.1 - kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'gcr.io/google_containers/pause-amd64:3.1:' + kubectl patch "${kube_flags[@]}" -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml -p='{"spec":{"containers":[{"name": "kubernetes-serve-hostname", "image": "k8s.gcr.io/pause-amd64:3.1"}]}}' + # Post-condition: valid-pod POD has expected image + kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'k8s.gcr.io/pause-amd64:3.1:' ## If resourceVersion is specified in the patch, it will be treated as a precondition, i.e., if the resourceVersion is different from that is stored in the server, the Patch should be rejected ERROR_FILE="${KUBE_TEMP}/conflict-error" @@ -802,13 +802,13 @@ __EOF__ kubectl delete node node-v1-test "${kube_flags[@]}" ## kubectl edit can update the image field of a POD. tmp-editor.sh is a fake editor - echo -e "#!/bin/bash\n${SED} -i \"s/nginx/gcr.io\/google_containers\/serve_hostname/g\" \$1" > /tmp/tmp-editor.sh + echo -e "#!/bin/bash\n${SED} -i \"s/nginx/k8s.gcr.io\/serve_hostname/g\" \$1" > /tmp/tmp-editor.sh chmod +x /tmp/tmp-editor.sh # Pre-condition: valid-pod POD has image nginx kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'nginx:' [[ "$(EDITOR=/tmp/tmp-editor.sh kubectl edit "${kube_flags[@]}" pods/valid-pod --output-patch=true | grep Patch:)" ]] - # Post-condition: valid-pod POD has image gcr.io/google_containers/serve_hostname - kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'gcr.io/google_containers/serve_hostname:' + # Post-condition: valid-pod POD has image k8s.gcr.io/serve_hostname + kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'k8s.gcr.io/serve_hostname:' # cleaning rm /tmp/tmp-editor.sh @@ -2766,7 +2766,7 @@ run_deployment_tests() { create_and_use_new_namespace kube::log::status "Testing deployments" # Test kubectl create deployment (using default - old generator) - kubectl create deployment test-nginx-extensions --image=gcr.io/google-containers/nginx:test-cmd + kubectl create deployment test-nginx-extensions --image=k8s.gcr.io/nginx:test-cmd # Post-Condition: Deployment "nginx" is created. kube::test::get_object_assert 'deploy test-nginx-extensions' "{{$container_name_field}}" 'nginx' # and old generator was used, iow. old defaults are applied @@ -2781,7 +2781,7 @@ run_deployment_tests() { kubectl delete deployment test-nginx-extensions "${kube_flags[@]}" # Test kubectl create deployment - kubectl create deployment test-nginx-apps --image=gcr.io/google-containers/nginx:test-cmd --generator=deployment-basic/apps.v1beta1 + kubectl create deployment test-nginx-apps --image=k8s.gcr.io/nginx:test-cmd --generator=deployment-basic/apps.v1beta1 # Post-Condition: Deployment "nginx" is created. kube::test::get_object_assert 'deploy test-nginx-apps' "{{$container_name_field}}" 'nginx' # and new generator was used, iow. new defaults are applied @@ -2826,7 +2826,7 @@ run_deployment_tests() { kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" '' kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" '' # Create deployment - kubectl create deployment nginx-deployment --image=gcr.io/google-containers/nginx:test-cmd + kubectl create deployment nginx-deployment --image=k8s.gcr.io/nginx:test-cmd # Wait for rs to come up. kube::test::wait_object_assert rs "{{range.items}}{{$rs_replicas_field}}{{end}}" '1' # Delete the deployment with cascade set to false. @@ -3084,7 +3084,7 @@ run_rs_tests() { # Test set commands # Pre-condition: frontend replica set exists at generation 1 kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '1' - kubectl set image rs/frontend "${kube_flags[@]}" *=gcr.io/google-containers/pause:test-cmd + kubectl set image rs/frontend "${kube_flags[@]}" *=k8s.gcr.io/pause:test-cmd kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '2' kubectl set env rs/frontend "${kube_flags[@]}" foo=bar kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '3' @@ -3171,7 +3171,7 @@ run_daemonset_tests() { # Template Generation should stay 1 kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '1' # Test set commands - kubectl set image daemonsets/bind "${kube_flags[@]}" *=gcr.io/google-containers/pause:test-cmd + kubectl set image daemonsets/bind "${kube_flags[@]}" *=k8s.gcr.io/pause:test-cmd kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '2' kubectl set env daemonsets/bind "${kube_flags[@]}" foo=bar kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '3' diff --git a/hack/testdata/deployment-label-change1.yaml b/hack/testdata/deployment-label-change1.yaml index cfcbae3d74..bcd1830427 100644 --- a/hack/testdata/deployment-label-change1.yaml +++ b/hack/testdata/deployment-label-change1.yaml @@ -13,6 +13,6 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:test-cmd + image: k8s.gcr.io/nginx:test-cmd ports: - containerPort: 80 diff --git a/hack/testdata/deployment-label-change2.yaml b/hack/testdata/deployment-label-change2.yaml index 9e465bdb6b..a8bb4acd1a 100644 --- a/hack/testdata/deployment-label-change2.yaml +++ b/hack/testdata/deployment-label-change2.yaml @@ -17,6 +17,6 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:test-cmd + image: k8s.gcr.io/nginx:test-cmd ports: - containerPort: 80 diff --git a/hack/testdata/deployment-multicontainer-resources.yaml b/hack/testdata/deployment-multicontainer-resources.yaml index 533e2e46f4..b36ace094b 100644 --- a/hack/testdata/deployment-multicontainer-resources.yaml +++ b/hack/testdata/deployment-multicontainer-resources.yaml @@ -16,9 +16,9 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:test-cmd + image: k8s.gcr.io/nginx:test-cmd ports: - containerPort: 80 - name: perl - image: gcr.io/google-containers/perl + image: k8s.gcr.io/perl terminationGracePeriodSeconds: 0 diff --git a/hack/testdata/deployment-multicontainer.yaml b/hack/testdata/deployment-multicontainer.yaml index 115888a029..117483957f 100644 --- a/hack/testdata/deployment-multicontainer.yaml +++ b/hack/testdata/deployment-multicontainer.yaml @@ -16,8 +16,8 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:test-cmd + image: k8s.gcr.io/nginx:test-cmd ports: - containerPort: 80 - name: perl - image: gcr.io/google-containers/perl + image: k8s.gcr.io/perl diff --git a/hack/testdata/deployment-revision1.yaml b/hack/testdata/deployment-revision1.yaml index cfbec36c45..2bcb8edea7 100644 --- a/hack/testdata/deployment-revision1.yaml +++ b/hack/testdata/deployment-revision1.yaml @@ -16,6 +16,6 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:test-cmd + image: k8s.gcr.io/nginx:test-cmd ports: - containerPort: 80 diff --git a/hack/testdata/deployment-revision2.yaml b/hack/testdata/deployment-revision2.yaml index 4b171f604b..1ed91c1375 100644 --- a/hack/testdata/deployment-revision2.yaml +++ b/hack/testdata/deployment-revision2.yaml @@ -16,6 +16,6 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:1.7.9 + image: k8s.gcr.io/nginx:1.7.9 ports: - containerPort: 80 diff --git a/hack/testdata/filter/pod-apply-selector.yaml b/hack/testdata/filter/pod-apply-selector.yaml index 73b83d6ba3..f296b68b9a 100644 --- a/hack/testdata/filter/pod-apply-selector.yaml +++ b/hack/testdata/filter/pod-apply-selector.yaml @@ -8,4 +8,4 @@ metadata: spec: containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/hack/testdata/filter/pod-dont-apply.yaml b/hack/testdata/filter/pod-dont-apply.yaml index 7ea1610de9..9b8f9f6e90 100644 --- a/hack/testdata/filter/pod-dont-apply.yaml +++ b/hack/testdata/filter/pod-dont-apply.yaml @@ -8,4 +8,4 @@ metadata: spec: containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/hack/testdata/multi-resource-json-modify.json b/hack/testdata/multi-resource-json-modify.json index 3ff562e6d9..2f88c0ac8e 100644 --- a/hack/testdata/multi-resource-json-modify.json +++ b/hack/testdata/multi-resource-json-modify.json @@ -43,7 +43,7 @@ "spec":{ "containers":[{ "name": "mock-container", - "image": "gcr.io/google-containers/pause:2.0", + "image": "k8s.gcr.io/pause:2.0", "ports":[{ "containerPort":9949, "protocol":"TCP" diff --git a/hack/testdata/multi-resource-json.json b/hack/testdata/multi-resource-json.json index 8ba2198e6d..869fdc7cbf 100644 --- a/hack/testdata/multi-resource-json.json +++ b/hack/testdata/multi-resource-json.json @@ -41,7 +41,7 @@ "spec":{ "containers":[{ "name": "mock-container", - "image": "gcr.io/google-containers/pause:2.0", + "image": "k8s.gcr.io/pause:2.0", "ports":[{ "containerPort":9949, "protocol":"TCP" diff --git a/hack/testdata/multi-resource-list-modify.json b/hack/testdata/multi-resource-list-modify.json index e0885c1024..af902efcfc 100644 --- a/hack/testdata/multi-resource-list-modify.json +++ b/hack/testdata/multi-resource-list-modify.json @@ -47,7 +47,7 @@ "spec":{ "containers":[{ "name": "mock-container", - "image": "gcr.io/google-containers/pause:2.0", + "image": "k8s.gcr.io/pause:2.0", "ports":[{ "containerPort":9949, "protocol":"TCP" diff --git a/hack/testdata/multi-resource-list.json b/hack/testdata/multi-resource-list.json index 8918223aed..17abca285a 100644 --- a/hack/testdata/multi-resource-list.json +++ b/hack/testdata/multi-resource-list.json @@ -45,7 +45,7 @@ "spec":{ "containers":[{ "name": "mock-container", - "image": "gcr.io/google-containers/pause:2.0", + "image": "k8s.gcr.io/pause:2.0", "ports":[{ "containerPort":9949, "protocol":"TCP" diff --git a/hack/testdata/multi-resource-rclist-modify.json b/hack/testdata/multi-resource-rclist-modify.json index 369d73399b..a28169c8ee 100644 --- a/hack/testdata/multi-resource-rclist-modify.json +++ b/hack/testdata/multi-resource-rclist-modify.json @@ -26,7 +26,7 @@ "spec":{ "containers":[{ "name": "mock-container", - "image": "gcr.io/google-containers/pause:2.0", + "image": "k8s.gcr.io/pause:2.0", "ports":[{ "containerPort":9949, "protocol":"TCP" @@ -60,7 +60,7 @@ "spec":{ "containers":[{ "name": "mock-container", - "image": "gcr.io/google-containers/pause:2.0", + "image": "k8s.gcr.io/pause:2.0", "ports":[{ "containerPort":9949, "protocol":"TCP" diff --git a/hack/testdata/multi-resource-rclist.json b/hack/testdata/multi-resource-rclist.json index 369d73399b..a28169c8ee 100644 --- a/hack/testdata/multi-resource-rclist.json +++ b/hack/testdata/multi-resource-rclist.json @@ -26,7 +26,7 @@ "spec":{ "containers":[{ "name": "mock-container", - "image": "gcr.io/google-containers/pause:2.0", + "image": "k8s.gcr.io/pause:2.0", "ports":[{ "containerPort":9949, "protocol":"TCP" @@ -60,7 +60,7 @@ "spec":{ "containers":[{ "name": "mock-container", - "image": "gcr.io/google-containers/pause:2.0", + "image": "k8s.gcr.io/pause:2.0", "ports":[{ "containerPort":9949, "protocol":"TCP" diff --git a/hack/testdata/multi-resource-yaml-modify.yaml b/hack/testdata/multi-resource-yaml-modify.yaml index 86fe824197..067b75630b 100644 --- a/hack/testdata/multi-resource-yaml-modify.yaml +++ b/hack/testdata/multi-resource-yaml-modify.yaml @@ -29,7 +29,7 @@ spec: spec: containers: - name: mock-container - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 ports: - containerPort: 9949 protocol: TCP diff --git a/hack/testdata/multi-resource-yaml.yaml b/hack/testdata/multi-resource-yaml.yaml index bef9e88b2c..642ebdb47e 100644 --- a/hack/testdata/multi-resource-yaml.yaml +++ b/hack/testdata/multi-resource-yaml.yaml @@ -27,7 +27,7 @@ spec: spec: containers: - name: mock-container - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 ports: - containerPort: 9949 protocol: TCP diff --git a/hack/testdata/null-propagation/deployment-l1.yaml b/hack/testdata/null-propagation/deployment-l1.yaml index c5123abc5e..051fba91f8 100644 --- a/hack/testdata/null-propagation/deployment-l1.yaml +++ b/hack/testdata/null-propagation/deployment-l1.yaml @@ -10,4 +10,4 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:1.7.9 + image: k8s.gcr.io/nginx:1.7.9 diff --git a/hack/testdata/null-propagation/deployment-l2.yaml b/hack/testdata/null-propagation/deployment-l2.yaml index ffcbcc099b..3b2426a768 100644 --- a/hack/testdata/null-propagation/deployment-l2.yaml +++ b/hack/testdata/null-propagation/deployment-l2.yaml @@ -14,5 +14,5 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:1.7.9 + image: k8s.gcr.io/nginx:1.7.9 terminationMessagePolicy: null diff --git a/hack/testdata/pod-apply.yaml b/hack/testdata/pod-apply.yaml index a736a599d8..235d1c8f0f 100644 --- a/hack/testdata/pod-apply.yaml +++ b/hack/testdata/pod-apply.yaml @@ -7,4 +7,4 @@ metadata: spec: containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/hack/testdata/pod-with-api-env.yaml b/hack/testdata/pod-with-api-env.yaml index aef451ac2f..3f76d210df 100644 --- a/hack/testdata/pod-with-api-env.yaml +++ b/hack/testdata/pod-with-api-env.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: test-container - image: gcr.io/google_containers/busybox + image: k8s.gcr.io/busybox command: [ "/bin/sh", "-c", "env" ] env: - name: TEST_CMD_1 diff --git a/hack/testdata/pod-with-precision.json b/hack/testdata/pod-with-precision.json index ce59d9c100..6835de64de 100644 --- a/hack/testdata/pod-with-precision.json +++ b/hack/testdata/pod-with-precision.json @@ -9,7 +9,7 @@ "containers": [ { "name": "kubernetes-pause", - "image": "gcr.io/google_containers/pause-amd64:3.1" + "image": "k8s.gcr.io/pause-amd64:3.1" } ], "restartPolicy": "Never", diff --git a/hack/testdata/pod.yaml b/hack/testdata/pod.yaml index 8ccadcecdb..92b504ef77 100644 --- a/hack/testdata/pod.yaml +++ b/hack/testdata/pod.yaml @@ -7,4 +7,4 @@ metadata: spec: containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/hack/testdata/prune/a.yaml b/hack/testdata/prune/a.yaml index aa86f28df4..badd10caa8 100644 --- a/hack/testdata/prune/a.yaml +++ b/hack/testdata/prune/a.yaml @@ -7,4 +7,4 @@ metadata: spec: containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/hack/testdata/prune/b.yaml b/hack/testdata/prune/b.yaml index 6d212ead91..f92fbc47f0 100644 --- a/hack/testdata/prune/b.yaml +++ b/hack/testdata/prune/b.yaml @@ -7,4 +7,4 @@ metadata: spec: containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/hack/testdata/recursive/deployment/deployment/nginx-broken.yaml b/hack/testdata/recursive/deployment/deployment/nginx-broken.yaml index 6d98eda02c..18c0d4ea7a 100644 --- a/hack/testdata/recursive/deployment/deployment/nginx-broken.yaml +++ b/hack/testdata/recursive/deployment/deployment/nginx-broken.yaml @@ -13,6 +13,6 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:1.7.9 + image: k8s.gcr.io/nginx:1.7.9 ports: - containerPort: 80 diff --git a/hack/testdata/recursive/deployment/deployment/nginx.yaml b/hack/testdata/recursive/deployment/deployment/nginx.yaml index f956f0272b..f416d6c25c 100644 --- a/hack/testdata/recursive/deployment/deployment/nginx.yaml +++ b/hack/testdata/recursive/deployment/deployment/nginx.yaml @@ -13,6 +13,6 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:1.7.9 + image: k8s.gcr.io/nginx:1.7.9 ports: - containerPort: 80 diff --git a/hack/testdata/recursive/deployment/nginx.yaml b/hack/testdata/recursive/deployment/nginx.yaml index 9842a65da0..7988317f46 100644 --- a/hack/testdata/recursive/deployment/nginx.yaml +++ b/hack/testdata/recursive/deployment/nginx.yaml @@ -13,6 +13,6 @@ spec: spec: containers: - name: nginx - image: gcr.io/google-containers/nginx:1.7.9 + image: k8s.gcr.io/nginx:1.7.9 ports: - containerPort: 80 diff --git a/hack/testdata/rollingupdate-daemonset-rv2.yaml b/hack/testdata/rollingupdate-daemonset-rv2.yaml index 3214dcffe9..b807e958dd 100644 --- a/hack/testdata/rollingupdate-daemonset-rv2.yaml +++ b/hack/testdata/rollingupdate-daemonset-rv2.yaml @@ -24,6 +24,6 @@ spec: namespaces: [] containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:latest + image: k8s.gcr.io/pause:latest - name: app - image: gcr.io/google-containers/nginx:test-cmd + image: k8s.gcr.io/nginx:test-cmd diff --git a/hack/testdata/rollingupdate-daemonset.yaml b/hack/testdata/rollingupdate-daemonset.yaml index c8a9cdca21..4bc77ed5bf 100644 --- a/hack/testdata/rollingupdate-daemonset.yaml +++ b/hack/testdata/rollingupdate-daemonset.yaml @@ -24,4 +24,4 @@ spec: namespaces: [] containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/hack/testdata/rollingupdate-statefulset-rv2.yaml b/hack/testdata/rollingupdate-statefulset-rv2.yaml index fec5493ab6..4e4fc4e609 100644 --- a/hack/testdata/rollingupdate-statefulset-rv2.yaml +++ b/hack/testdata/rollingupdate-statefulset-rv2.yaml @@ -18,7 +18,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: nginx - image: gcr.io/google_containers/nginx-slim:0.8 + image: k8s.gcr.io/nginx-slim:0.8 ports: - containerPort: 80 name: web @@ -27,7 +27,7 @@ spec: - -c - 'while true; do sleep 1; done' - name: pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 ports: - containerPort: 81 name: web-2 diff --git a/hack/testdata/rollingupdate-statefulset.yaml b/hack/testdata/rollingupdate-statefulset.yaml index 2acbf0f322..ffdc242e17 100644 --- a/hack/testdata/rollingupdate-statefulset.yaml +++ b/hack/testdata/rollingupdate-statefulset.yaml @@ -18,7 +18,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: nginx - image: gcr.io/google_containers/nginx-slim:0.7 + image: k8s.gcr.io/nginx-slim:0.7 ports: - containerPort: 80 name: web diff --git a/hack/testdata/sorted-pods/sorted-pod1.yaml b/hack/testdata/sorted-pods/sorted-pod1.yaml index fba02b9017..aa767a2ea2 100644 --- a/hack/testdata/sorted-pods/sorted-pod1.yaml +++ b/hack/testdata/sorted-pods/sorted-pod1.yaml @@ -7,4 +7,4 @@ metadata: spec: containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/hack/testdata/sorted-pods/sorted-pod2.yaml b/hack/testdata/sorted-pods/sorted-pod2.yaml index f0ab7e906e..f05040569b 100644 --- a/hack/testdata/sorted-pods/sorted-pod2.yaml +++ b/hack/testdata/sorted-pods/sorted-pod2.yaml @@ -7,4 +7,4 @@ metadata: spec: containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/hack/testdata/sorted-pods/sorted-pod3.yaml b/hack/testdata/sorted-pods/sorted-pod3.yaml index 5d166786c7..e02c501fa1 100644 --- a/hack/testdata/sorted-pods/sorted-pod3.yaml +++ b/hack/testdata/sorted-pods/sorted-pod3.yaml @@ -7,4 +7,4 @@ metadata: spec: containers: - name: kubernetes-pause - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 diff --git a/pkg/api/testing/deep_copy_test.go b/pkg/api/testing/deep_copy_test.go index 27c9f42f6a..a93ccd00aa 100644 --- a/pkg/api/testing/deep_copy_test.go +++ b/pkg/api/testing/deep_copy_test.go @@ -64,7 +64,7 @@ var benchmarkPod api.Pod = api.Pod{ Containers: []api.Container{ { Name: "etcd-container", - Image: "gcr.io/google_containers/etcd:2.0.9", + Image: "k8s.gcr.io/etcd:2.0.9", Command: []string{ "/usr/local/bin/etcd", "--addr", @@ -120,7 +120,7 @@ var benchmarkPod api.Pod = api.Pod{ }, Ready: true, RestartCount: 0, - Image: "gcr.io/google_containers/etcd:2.0.9", + Image: "k8s.gcr.io/etcd:2.0.9", ImageID: "docker://b6b9a86dc06aa1361357ca1b105feba961f6a4145adca6c54e142c0be0fe87b0", ContainerID: "docker://3cbbf818f1addfc252957b4504f56ef2907a313fe6afc47fc75373674255d46d", }, diff --git a/pkg/api/testing/replication_controller_example.json b/pkg/api/testing/replication_controller_example.json index 70eef1cff3..8f858c023f 100644 --- a/pkg/api/testing/replication_controller_example.json +++ b/pkg/api/testing/replication_controller_example.json @@ -47,7 +47,7 @@ "containers": [ { "name": "elasticsearch-logging", - "image": "gcr.io/google_containers/elasticsearch:1.0", + "image": "k8s.gcr.io/elasticsearch:1.0", "ports": [ { "name": "db", diff --git a/pkg/kubectl/validation/testdata/v1/invalidPod1.json b/pkg/kubectl/validation/testdata/v1/invalidPod1.json index d935742d77..384d185791 100644 --- a/pkg/kubectl/validation/testdata/v1/invalidPod1.json +++ b/pkg/kubectl/validation/testdata/v1/invalidPod1.json @@ -11,7 +11,7 @@ "containers": [ { "name": "master", - "image": "gcr.io/fake_project/fake_image:fake_tag", + "image": "gcr.io/fake_project/fake_image:fake_tag", "args": "this is a bad command" } ] diff --git a/pkg/kubectl/validation/testdata/v1/invalidPod3.json b/pkg/kubectl/validation/testdata/v1/invalidPod3.json index 4d99181dc0..69e0e85389 100644 --- a/pkg/kubectl/validation/testdata/v1/invalidPod3.json +++ b/pkg/kubectl/validation/testdata/v1/invalidPod3.json @@ -14,7 +14,7 @@ "containers": [ { "name": "apache-php", - "image": "gcr.io/fake_project/fake_image:fake_tag", + "image": "gcr.io/fake_project/fake_image:fake_tag", "ports": [ { "name": "apache", diff --git a/pkg/kubectl/validation/testdata/v1/invalidPod4.yaml b/pkg/kubectl/validation/testdata/v1/invalidPod4.yaml index f02bf7b336..a6958db5eb 100644 --- a/pkg/kubectl/validation/testdata/v1/invalidPod4.yaml +++ b/pkg/kubectl/validation/testdata/v1/invalidPod4.yaml @@ -11,4 +11,4 @@ spec: args: - command: - - \ No newline at end of file + - diff --git a/pkg/kubelet/dockershim/docker_sandbox.go b/pkg/kubelet/dockershim/docker_sandbox.go index b314969a6c..0f06049cff 100644 --- a/pkg/kubelet/dockershim/docker_sandbox.go +++ b/pkg/kubelet/dockershim/docker_sandbox.go @@ -37,7 +37,7 @@ import ( ) const ( - defaultSandboxImage = "gcr.io/google_containers/pause-amd64:3.1" + defaultSandboxImage = "k8s.gcr.io/pause-amd64:3.1" // Various default sandbox resources requests/limits. defaultSandboxCPUshares int64 = 2 diff --git a/pkg/kubelet/images/image_gc_manager_test.go b/pkg/kubelet/images/image_gc_manager_test.go index ee0fc79802..783675dacb 100644 --- a/pkg/kubelet/images/image_gc_manager_test.go +++ b/pkg/kubelet/images/image_gc_manager_test.go @@ -33,7 +33,7 @@ import ( ) var zero time.Time -var sandboxImage = "gcr.io/google_containers/pause-amd64:latest" +var sandboxImage = "k8s.gcr.io/pause-amd64:latest" func newRealImageGCManager(policy ImageGCPolicy) (*realImageGCManager, *containertest.FakeRuntime, *statstest.StatsProvider) { fakeRuntime := &containertest.FakeRuntime{} diff --git a/pkg/kubelet/kubelet_node_status_test.go b/pkg/kubelet/kubelet_node_status_test.go index 38636f70e1..79ee6e88e2 100644 --- a/pkg/kubelet/kubelet_node_status_test.go +++ b/pkg/kubelet/kubelet_node_status_test.go @@ -96,7 +96,7 @@ func generateImageTags() []string { // that kubelet report up to maxNamesPerImageInNodeStatus tags. count := rand.IntnRange(maxNamesPerImageInNodeStatus+1, maxImageTagsForTest+1) for ; count > 0; count-- { - tagList = append(tagList, "gcr.io/google_containers:v"+strconv.Itoa(count)) + tagList = append(tagList, "k8s.gcr.io:v"+strconv.Itoa(count)) } return tagList } @@ -492,11 +492,11 @@ func TestUpdateExistingNodeStatus(t *testing.T) { // images will be sorted from max to min in node status. Images: []v1.ContainerImage{ { - Names: []string{"gcr.io/google_containers:v3", "gcr.io/google_containers:v4"}, + Names: []string{"k8s.gcr.io:v3", "k8s.gcr.io:v4"}, SizeBytes: 456, }, { - Names: []string{"gcr.io/google_containers:v1", "gcr.io/google_containers:v2"}, + Names: []string{"k8s.gcr.io:v1", "k8s.gcr.io:v2"}, SizeBytes: 123, }, }, @@ -680,11 +680,11 @@ func TestUpdateNodeStatusWithRuntimeStateError(t *testing.T) { }, Images: []v1.ContainerImage{ { - Names: []string{"gcr.io/google_containers:v3", "gcr.io/google_containers:v4"}, + Names: []string{"k8s.gcr.io:v3", "k8s.gcr.io:v4"}, SizeBytes: 456, }, { - Names: []string{"gcr.io/google_containers:v1", "gcr.io/google_containers:v2"}, + Names: []string{"k8s.gcr.io:v1", "k8s.gcr.io:v2"}, SizeBytes: 123, }, }, diff --git a/pkg/kubelet/kubelet_test.go b/pkg/kubelet/kubelet_test.go index 1b996c2d1a..18746c67d6 100644 --- a/pkg/kubelet/kubelet_test.go +++ b/pkg/kubelet/kubelet_test.go @@ -127,12 +127,12 @@ func newTestKubelet(t *testing.T, controllerAttachDetachEnabled bool) *TestKubel imageList := []kubecontainer.Image{ { ID: "abc", - RepoTags: []string{"gcr.io/google_containers:v1", "gcr.io/google_containers:v2"}, + RepoTags: []string{"k8s.gcr.io:v1", "k8s.gcr.io:v2"}, Size: 123, }, { ID: "efg", - RepoTags: []string{"gcr.io/google_containers:v3", "gcr.io/google_containers:v4"}, + RepoTags: []string{"k8s.gcr.io:v3", "k8s.gcr.io:v4"}, Size: 456, }, } diff --git a/pkg/volume/util/operationexecutor/operation_executor.go b/pkg/volume/util/operationexecutor/operation_executor.go index 7df9f43d79..1d35438c30 100644 --- a/pkg/volume/util/operationexecutor/operation_executor.go +++ b/pkg/volume/util/operationexecutor/operation_executor.go @@ -453,7 +453,7 @@ type MountedVolume struct { // name: test-pd // spec: // containers: - // - image: gcr.io/google_containers/test-webserver + // - image: k8s.gcr.io/test-webserver // name: test-container // volumeMounts: // - mountPath: /test-pd @@ -491,7 +491,7 @@ type MountedVolume struct { // name: test-pd // spec: // containers: - // - image: gcr.io/google_containers/test-webserver + // - image: k8s.gcr.io/test-webserver // name: test-container // volumeMounts: // - mountPath: /test-pd diff --git a/pkg/volume/util/operationexecutor/operation_executor_test.go b/pkg/volume/util/operationexecutor/operation_executor_test.go index 18e68a3ab0..6aabd54b1f 100644 --- a/pkg/volume/util/operationexecutor/operation_executor_test.go +++ b/pkg/volume/util/operationexecutor/operation_executor_test.go @@ -493,7 +493,7 @@ func getTestPodWithSecret(podName, secretName string) *v1.Pod { Containers: []v1.Container{ { Name: "secret-volume-test", - Image: "gcr.io/google_containers/mounttest:0.8", + Image: "k8s.gcr.io/mounttest:0.8", Args: []string{ "--file_content=/etc/secret-volume/data-1", "--file_mode=/etc/secret-volume/data-1"}, @@ -532,7 +532,7 @@ func getTestPodWithGCEPD(podName, pdName string) *v1.Pod { Containers: []v1.Container{ { Name: "pd-volume-test", - Image: "gcr.io/google_containers/mounttest:0.8", + Image: "k8s.gcr.io/mounttest:0.8", Args: []string{ "--file_content=/etc/pd-volume/data-1", }, diff --git a/pkg/volume/util/util_test.go b/pkg/volume/util/util_test.go index 5fd11f0861..6dcc125eb5 100644 --- a/pkg/volume/util/util_test.go +++ b/pkg/volume/util/util_test.go @@ -164,7 +164,7 @@ metadata: name: testpod spec: containers: - - image: gcr.io/google_containers/busybox + - image: k8s.gcr.io/busybox `, false, }, @@ -181,7 +181,7 @@ spec: "spec": { "containers": [ { - "image": "gcr.io/google_containers/busybox" + "image": "k8s.gcr.io/busybox" } ] } @@ -197,7 +197,7 @@ kind: Pod metadata: name: testpod spec: - - image: gcr.io/google_containers/busybox + - image: k8s.gcr.io/busybox `, true, }, diff --git a/pkg/volume/util_test.go b/pkg/volume/util_test.go index 273722a0c3..011793defe 100644 --- a/pkg/volume/util_test.go +++ b/pkg/volume/util_test.go @@ -94,8 +94,8 @@ func TestRecyclerPod(t *testing.T) { // Pod gets Running and Succeeded newPodEvent(watch.Added, "podRecyclerSuccess", v1.PodPending, ""), newEvent(v1.EventTypeNormal, "Successfully assigned recycler-for-podRecyclerSuccess to 127.0.0.1"), - newEvent(v1.EventTypeNormal, "pulling image \"gcr.io/google_containers/busybox\""), - newEvent(v1.EventTypeNormal, "Successfully pulled image \"gcr.io/google_containers/busybox\""), + newEvent(v1.EventTypeNormal, "pulling image \"k8s.gcr.io/busybox\""), + newEvent(v1.EventTypeNormal, "Successfully pulled image \"k8s.gcr.io/busybox\""), newEvent(v1.EventTypeNormal, "Created container with docker id 83d929aeac82"), newEvent(v1.EventTypeNormal, "Started container with docker id 83d929aeac82"), newPodEvent(watch.Modified, "podRecyclerSuccess", v1.PodRunning, ""), @@ -103,8 +103,8 @@ func TestRecyclerPod(t *testing.T) { }, expectedEvents: []mockEvent{ {v1.EventTypeNormal, "Successfully assigned recycler-for-podRecyclerSuccess to 127.0.0.1"}, - {v1.EventTypeNormal, "pulling image \"gcr.io/google_containers/busybox\""}, - {v1.EventTypeNormal, "Successfully pulled image \"gcr.io/google_containers/busybox\""}, + {v1.EventTypeNormal, "pulling image \"k8s.gcr.io/busybox\""}, + {v1.EventTypeNormal, "Successfully pulled image \"k8s.gcr.io/busybox\""}, {v1.EventTypeNormal, "Created container with docker id 83d929aeac82"}, {v1.EventTypeNormal, "Started container with docker id 83d929aeac82"}, }, diff --git a/staging/src/k8s.io/api/core/v1/generated.proto b/staging/src/k8s.io/api/core/v1/generated.proto index ad22fec198..e5d8f74db6 100644 --- a/staging/src/k8s.io/api/core/v1/generated.proto +++ b/staging/src/k8s.io/api/core/v1/generated.proto @@ -637,7 +637,7 @@ message Container { // Describe a container image message ContainerImage { // Names by which this image is known. - // e.g. ["gcr.io/google_containers/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"] + // e.g. ["k8s.gcr.io/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"] repeated string names = 1; // The size of the image in bytes. diff --git a/staging/src/k8s.io/api/core/v1/types.go b/staging/src/k8s.io/api/core/v1/types.go index 01d5a0d828..d1b464fd40 100644 --- a/staging/src/k8s.io/api/core/v1/types.go +++ b/staging/src/k8s.io/api/core/v1/types.go @@ -3928,7 +3928,7 @@ type PodSignature struct { // Describe a container image type ContainerImage struct { // Names by which this image is known. - // e.g. ["gcr.io/google_containers/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"] + // e.g. ["k8s.gcr.io/hyperkube:v1.0.7", "dockerhub.io/google_containers/hyperkube:v1.0.7"] Names []string `json:"names" protobuf:"bytes,1,rep,name=names"` // The size of the image in bytes. // +optional diff --git a/staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go b/staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go index 860975f718..2c274b13d9 100644 --- a/staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go +++ b/staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go @@ -310,7 +310,7 @@ func (Container) SwaggerDoc() map[string]string { var map_ContainerImage = map[string]string{ "": "Describe a container image", - "names": "Names by which this image is known. e.g. [\"gcr.io/google_containers/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]", + "names": "Names by which this image is known. e.g. [\"k8s.gcr.io/hyperkube:v1.0.7\", \"dockerhub.io/google_containers/hyperkube:v1.0.7\"]", "sizeBytes": "The size of the image in bytes.", } diff --git a/test/e2e/framework/nodes_util.go b/test/e2e/framework/nodes_util.go index 60a545414d..20fd2a157d 100644 --- a/test/e2e/framework/nodes_util.go +++ b/test/e2e/framework/nodes_util.go @@ -83,7 +83,7 @@ func ingressUpgradeGCE(isUpgrade bool) error { command = "sudo sed -i -re 's/(image:)(.*)/\\1 gcr.io\\/k8s-ingress-image-push\\/ingress-gce-e2e-glbc-amd64:latest/' /etc/kubernetes/manifests/glbc.manifest" } else { // Downgrade - command = "sudo sed -i -re 's/(image:)(.*)/\\1 gcr.io\\/google_containers\\/glbc:0.9.7/' /etc/kubernetes/manifests/glbc.manifest" + command = "sudo sed -i -re 's/(image:)(.*)/\\1 k8s.gcr.io\\/glbc:0.9.7/' /etc/kubernetes/manifests/glbc.manifest" } sshResult, err := NodeExec(GetMasterHost(), command) LogSSHResult(sshResult) diff --git a/test/e2e/instrumentation/monitoring/custom_metrics_deployments.go b/test/e2e/instrumentation/monitoring/custom_metrics_deployments.go index b6e861575e..f1d3e0926b 100644 --- a/test/e2e/instrumentation/monitoring/custom_metrics_deployments.go +++ b/test/e2e/instrumentation/monitoring/custom_metrics_deployments.go @@ -127,7 +127,7 @@ func StackdriverExporterPod(podName, namespace, podLabel, metricName string, met func stackdriverExporterContainerSpec(name string, metricName string, metricValue int64) corev1.Container { return corev1.Container{ Name: name, - Image: "gcr.io/google-containers/sd-dummy-exporter:v0.1.0", + Image: "k8s.gcr.io/sd-dummy-exporter:v0.1.0", ImagePullPolicy: corev1.PullPolicy("Always"), Command: []string{"/sd_dummy_exporter", "--pod-id=$(POD_ID)", "--metric-name=" + metricName, fmt.Sprintf("--metric-value=%v", metricValue)}, Env: []corev1.EnvVar{ @@ -175,7 +175,7 @@ func prometheusExporterPodSpec(metricName string, metricValue int64, port int32) Containers: []corev1.Container{ { Name: "prometheus-exporter", - Image: "gcr.io/google-containers/prometheus-dummy-exporter:v0.1.0", + Image: "k8s.gcr.io/prometheus-dummy-exporter:v0.1.0", ImagePullPolicy: corev1.PullPolicy("Always"), Command: []string{"/prometheus_dummy_exporter", "--metric-name=" + metricName, fmt.Sprintf("--metric-value=%v", metricValue), fmt.Sprintf("=--port=%d", port)}, @@ -183,7 +183,7 @@ func prometheusExporterPodSpec(metricName string, metricValue int64, port int32) }, { Name: "prometheus-to-sd", - Image: "gcr.io/google-containers/prometheus-to-sd:v0.2.3", + Image: "k8s.gcr.io/prometheus-to-sd:v0.2.3", ImagePullPolicy: corev1.PullPolicy("Always"), Command: []string{"/monitor", fmt.Sprintf("--source=:http://localhost:%d", port), "--stackdriver-prefix=custom.googleapis.com", "--pod-id=$(POD_ID)", "--namespace-id=$(POD_NAMESPACE)"}, diff --git a/test/e2e/testing-manifests/ingress/http/rc.yaml b/test/e2e/testing-manifests/ingress/http/rc.yaml index 9b7d3b624d..a4bcd5e395 100644 --- a/test/e2e/testing-manifests/ingress/http/rc.yaml +++ b/test/e2e/testing-manifests/ingress/http/rc.yaml @@ -11,7 +11,7 @@ spec: spec: containers: - name: echoheaders - image: gcr.io/google_containers/echoserver:1.6 + image: k8s.gcr.io/echoserver:1.6 ports: - containerPort: 8080 readinessProbe: diff --git a/test/e2e/testing-manifests/ingress/nginx/rc.yaml b/test/e2e/testing-manifests/ingress/nginx/rc.yaml index 9d21ff5500..b80b0837a1 100644 --- a/test/e2e/testing-manifests/ingress/nginx/rc.yaml +++ b/test/e2e/testing-manifests/ingress/nginx/rc.yaml @@ -17,7 +17,7 @@ spec: spec: terminationGracePeriodSeconds: 0 containers: - - image: gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.1 + - image: k8s.gcr.io/nginx-ingress-controller:0.9.0-beta.1 livenessProbe: httpGet: path: /healthz diff --git a/test/e2e/testing-manifests/ingress/static-ip-2/rc.yaml b/test/e2e/testing-manifests/ingress/static-ip-2/rc.yaml index abf9b036ed..391ad67444 100644 --- a/test/e2e/testing-manifests/ingress/static-ip-2/rc.yaml +++ b/test/e2e/testing-manifests/ingress/static-ip-2/rc.yaml @@ -11,6 +11,6 @@ spec: spec: containers: - name: echoheaders-https - image: gcr.io/google_containers/echoserver:1.6 + image: k8s.gcr.io/echoserver:1.6 ports: - containerPort: 8080 diff --git a/test/e2e/testing-manifests/ingress/static-ip/rc.yaml b/test/e2e/testing-manifests/ingress/static-ip/rc.yaml index abf9b036ed..391ad67444 100644 --- a/test/e2e/testing-manifests/ingress/static-ip/rc.yaml +++ b/test/e2e/testing-manifests/ingress/static-ip/rc.yaml @@ -11,6 +11,6 @@ spec: spec: containers: - name: echoheaders-https - image: gcr.io/google_containers/echoserver:1.6 + image: k8s.gcr.io/echoserver:1.6 ports: - containerPort: 8080 diff --git a/test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml b/test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml index 528aa25a12..b1ce4229cb 100644 --- a/test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml +++ b/test/e2e/testing-manifests/serviceloadbalancer/haproxyrc.yaml @@ -17,7 +17,7 @@ spec: version: v1 spec: containers: - - image: gcr.io/google_containers/servicelb:0.1 + - image: k8s.gcr.io/servicelb:0.1 imagePullPolicy: Always livenessProbe: httpGet: diff --git a/test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml b/test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml index c2aa34ca1f..f09c090d5b 100644 --- a/test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml +++ b/test/e2e/testing-manifests/serviceloadbalancer/netexecrc.yaml @@ -12,7 +12,7 @@ spec: spec: containers: - name: netexec - image: gcr.io/google_containers/netexec:1.4 + image: k8s.gcr.io/netexec:1.4 ports: - containerPort: 8080 # This is to force these pods to land on different hosts. diff --git a/test/e2e/testing-manifests/statefulset/cassandra/tester.yaml b/test/e2e/testing-manifests/statefulset/cassandra/tester.yaml index 65699f8e3c..8139cf5f99 100644 --- a/test/e2e/testing-manifests/statefulset/cassandra/tester.yaml +++ b/test/e2e/testing-manifests/statefulset/cassandra/tester.yaml @@ -11,7 +11,7 @@ spec: spec: containers: - name: test-server - image: gcr.io/google-containers/cassandra-e2e-test:0.1 + image: k8s.gcr.io/cassandra-e2e-test:0.1 imagePullPolicy: Always ports: - containerPort: 8080 diff --git a/test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml b/test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml index f1be16ff7c..f61574e8cf 100644 --- a/test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml +++ b/test/e2e/testing-manifests/statefulset/etcd/statefulset.yaml @@ -15,7 +15,7 @@ spec: spec: containers: - name: etcd - image: gcr.io/google_containers/etcd-amd64:2.2.5 + image: k8s.gcr.io/etcd-amd64:2.2.5 imagePullPolicy: Always ports: - containerPort: 2380 diff --git a/test/e2e/testing-manifests/statefulset/etcd/tester.yaml b/test/e2e/testing-manifests/statefulset/etcd/tester.yaml index c5ea0b90c1..ee53bc1419 100644 --- a/test/e2e/testing-manifests/statefulset/etcd/tester.yaml +++ b/test/e2e/testing-manifests/statefulset/etcd/tester.yaml @@ -11,7 +11,7 @@ spec: spec: containers: - name: test-server - image: gcr.io/google-containers/etcd-statefulset-e2e-test:0.0 + image: k8s.gcr.io/etcd-statefulset-e2e-test:0.0 imagePullPolicy: Always ports: - containerPort: 8080 diff --git a/test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml b/test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml index 85f4c080c6..20483ea454 100644 --- a/test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml +++ b/test/e2e/testing-manifests/statefulset/mysql-galera/statefulset.yaml @@ -12,7 +12,7 @@ spec: spec: initContainers: - name: install - image: gcr.io/google_containers/galera-install:0.1 + image: k8s.gcr.io/galera-install:0.1 imagePullPolicy: Always args: - "--work-dir=/work-dir" @@ -41,7 +41,7 @@ spec: mountPath: "/etc/mysql" containers: - name: mysql - image: gcr.io/google_containers/mysql-galera:e2e + image: k8s.gcr.io/mysql-galera:e2e ports: - containerPort: 3306 name: mysql @@ -55,7 +55,7 @@ spec: - --defaults-file=/etc/mysql/my-galera.cnf - --user=root readinessProbe: - # TODO: If docker exec is buggy just use gcr.io/google_containers/mysql-healthz:1.0 + # TODO: If docker exec is buggy just use k8s.gcr.io/mysql-healthz:1.0 exec: command: - sh diff --git a/test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml b/test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml index c7e7ff8d4f..3a60b3473a 100644 --- a/test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml +++ b/test/e2e/testing-manifests/statefulset/mysql-upgrade/tester.yaml @@ -11,7 +11,7 @@ spec: spec: containers: - name: test-server - image: gcr.io/google-containers/mysql-e2e-test:0.1 + image: k8s.gcr.io/mysql-e2e-test:0.1 imagePullPolicy: Always ports: - containerPort: 8080 diff --git a/test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml b/test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml index a483fd5dd3..0436fe25ba 100644 --- a/test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml +++ b/test/e2e/testing-manifests/statefulset/nginx/statefulset.yaml @@ -15,7 +15,7 @@ spec: spec: containers: - name: nginx - image: gcr.io/google_containers/nginx-slim:0.8 + image: k8s.gcr.io/nginx-slim:0.8 ports: - containerPort: 80 name: web @@ -31,4 +31,4 @@ spec: accessModes: [ "ReadWriteOnce" ] resources: requests: - storage: 1Gi \ No newline at end of file + storage: 1Gi diff --git a/test/e2e/testing-manifests/statefulset/redis/statefulset.yaml b/test/e2e/testing-manifests/statefulset/redis/statefulset.yaml index e5ed3a798b..85c6b497ac 100644 --- a/test/e2e/testing-manifests/statefulset/redis/statefulset.yaml +++ b/test/e2e/testing-manifests/statefulset/redis/statefulset.yaml @@ -12,7 +12,7 @@ spec: spec: initContainers: - name: install - image: gcr.io/google_containers/redis-install-3.2.0:e2e + image: k8s.gcr.io/redis-install-3.2.0:e2e imagePullPolicy: Always args: - "--install-into=/opt" diff --git a/test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml b/test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml index 62c534cddc..d08e62800e 100644 --- a/test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml +++ b/test/e2e/testing-manifests/statefulset/zookeeper/statefulset.yaml @@ -12,7 +12,7 @@ spec: spec: initContainers: - name: install - image: gcr.io/google_containers/zookeeper-install-3.5.0-alpha:e2e + image: k8s.gcr.io/zookeeper-install-3.5.0-alpha:e2e imagePullPolicy: Always args: - "--install-into=/opt" diff --git a/test/e2e_node/conformance/build/Makefile b/test/e2e_node/conformance/build/Makefile index abc03366bc..20d74356af 100644 --- a/test/e2e_node/conformance/build/Makefile +++ b/test/e2e_node/conformance/build/Makefile @@ -15,7 +15,7 @@ # Build the node-test image. # # Usage: -# [ARCH=amd64] [REGISTRY="gcr.io/google_containers"] [BIN_DIR="../../../../_output/bin"] make (build|push) VERSION={some_version_number e.g. 0.1} +# [ARCH=amd64] [REGISTRY="staging-k8s.gcr.io"] [BIN_DIR="../../../../_output/bin"] make (build|push) VERSION={some_version_number e.g. 0.1} # SYSTEM_SPEC_NAME is the name of the system spec used for the node conformance # test. The specs are expected to be in SYSTEM_SPEC_DIR. @@ -23,7 +23,7 @@ SYSTEM_SPEC_NAME?= SYSTEM_SPEC_DIR?=../../system/specs # TODO(random-liu): Add this into release progress. -REGISTRY?=gcr.io/google_containers +REGISTRY?=staging-k8s.gcr.io ARCH?=amd64 # BIN_DIR is the directory to find binaries, overwrite with ../../../../_output/bin # for local development. diff --git a/test/e2e_node/conformance/run_test.sh b/test/e2e_node/conformance/run_test.sh index af9f2febc8..6ddb247883 100755 --- a/test/e2e_node/conformance/run_test.sh +++ b/test/e2e_node/conformance/run_test.sh @@ -44,7 +44,7 @@ SKIP=${SKIP:-""} TEST_ARGS=${TEST_ARGS:-""} # REGISTRY is the image registry for node test image. -REGISTRY=${REGISTRY:-"gcr.io/google_containers"} +REGISTRY=${REGISTRY:-"k8s.gcr.io"} # ARCH is the architecture of current machine, the script will use this to # select corresponding test container image. diff --git a/test/e2e_node/gke_environment_test.go b/test/e2e_node/gke_environment_test.go index ee1ddafd4e..dd88976b39 100644 --- a/test/e2e_node/gke_environment_test.go +++ b/test/e2e_node/gke_environment_test.go @@ -84,7 +84,7 @@ func checkIPTables() (err error) { // checkPublicGCR checks the access to the public Google Container Registry by // pulling the busybox image. func checkPublicGCR() error { - const image = "gcr.io/google-containers/busybox" + const image = "k8s.gcr.io/busybox" output, err := runCommand("docker", "images", "-q", image) if len(output) != 0 { if _, err := runCommand("docker", "rmi", "-f", image); err != nil { @@ -170,7 +170,7 @@ func checkDockerConfig() error { // checkDockerNetworkClient checks client networking by pinging an external IP // address from a container. func checkDockerNetworkClient() error { - const imageName = "gcr.io/google-containers/busybox" + const imageName = "k8s.gcr.io/busybox" output, err := runCommand("docker", "run", "--rm", imageName, "sh", "-c", "ping -w 5 -q google.com") if err != nil { return err @@ -185,7 +185,7 @@ func checkDockerNetworkClient() error { // within a container and accessing it from outside. func checkDockerNetworkServer() error { const ( - imageName = "gcr.io/google-containers/nginx:1.7.9" + imageName = "k8s.gcr.io/nginx:1.7.9" hostAddr = "127.0.0.1" hostPort = "8088" containerPort = "80" diff --git a/test/e2e_node/image_id_test.go b/test/e2e_node/image_id_test.go index a131c398b8..090eafa286 100644 --- a/test/e2e_node/image_id_test.go +++ b/test/e2e_node/image_id_test.go @@ -28,7 +28,7 @@ import ( var _ = framework.KubeDescribe("ImageID", func() { - busyBoxImage := "gcr.io/google_containers/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff" + busyBoxImage := "k8s.gcr.io/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff" f := framework.NewDefaultFramework("image-id-test") diff --git a/test/e2e_node/image_list.go b/test/e2e_node/image_list.go index bd55bf59e8..00a35955a7 100644 --- a/test/e2e_node/image_list.go +++ b/test/e2e_node/image_list.go @@ -43,10 +43,10 @@ const ( // before test running so that the image pulling won't fail in actual test. var NodeImageWhiteList = sets.NewString( "google/cadvisor:latest", - "gcr.io/google-containers/stress:v1", + "k8s.gcr.io/stress:v1", busyboxImage, - "gcr.io/google_containers/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff", - "gcr.io/google_containers/node-problem-detector:v0.4.1", + "k8s.gcr.io/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff", + "k8s.gcr.io/node-problem-detector:v0.4.1", imageutils.GetE2EImage(imageutils.NginxSlim), imageutils.GetE2EImage(imageutils.ServeHostname), imageutils.GetE2EImage(imageutils.Netexec), diff --git a/test/e2e_node/jenkins/gci-init-gpu.yaml b/test/e2e_node/jenkins/gci-init-gpu.yaml index 064b77095c..3b943de33f 100644 --- a/test/e2e_node/jenkins/gci-init-gpu.yaml +++ b/test/e2e_node/jenkins/gci-init-gpu.yaml @@ -2,7 +2,7 @@ runcmd: - modprobe configs - - docker run -v /dev:/dev -v /home/kubernetes/bin/nvidia:/rootfs/nvidia -v /etc/os-release:/rootfs/etc/os-release -v /proc/sysrq-trigger:/sysrq -e BASE_DIR=/rootfs/nvidia --privileged gcr.io/google_containers/cos-nvidia-driver-install@sha256:cb55c7971c337fece62f2bfe858662522a01e43ac9984a2dd1dd5c71487d225c + - docker run -v /dev:/dev -v /home/kubernetes/bin/nvidia:/rootfs/nvidia -v /etc/os-release:/rootfs/etc/os-release -v /proc/sysrq-trigger:/sysrq -e BASE_DIR=/rootfs/nvidia --privileged k8s.gcr.io/cos-nvidia-driver-install@sha256:cb55c7971c337fece62f2bfe858662522a01e43ac9984a2dd1dd5c71487d225c - mount /tmp /tmp -o remount,exec,suid - usermod -a -G docker jenkins - mkdir -p /var/lib/kubelet diff --git a/test/e2e_node/node_problem_detector_linux.go b/test/e2e_node/node_problem_detector_linux.go index 3c9b6453ec..9333b66cba 100644 --- a/test/e2e_node/node_problem_detector_linux.go +++ b/test/e2e_node/node_problem_detector_linux.go @@ -45,7 +45,7 @@ var _ = framework.KubeDescribe("NodeProblemDetector", func() { pollInterval = 1 * time.Second pollConsistent = 5 * time.Second pollTimeout = 1 * time.Minute - image = "gcr.io/google_containers/node-problem-detector:v0.4.1" + image = "k8s.gcr.io/node-problem-detector:v0.4.1" ) f := framework.NewDefaultFramework("node-problem-detector") var c clientset.Interface diff --git a/test/e2e_node/remote/node_conformance.go b/test/e2e_node/remote/node_conformance.go index 59e322a77b..625940bf19 100644 --- a/test/e2e_node/remote/node_conformance.go +++ b/test/e2e_node/remote/node_conformance.go @@ -53,7 +53,7 @@ func commandToString(c *exec.Cmd) string { // Image path constants. const ( - conformanceRegistry = "gcr.io/google_containers" + conformanceRegistry = "k8s.gcr.io" conformanceArch = runtime.GOARCH conformanceTarfile = "node_conformance.tar" conformanceTestBinary = "e2e_node.test" diff --git a/test/e2e_node/runtime_conformance_test.go b/test/e2e_node/runtime_conformance_test.go index a616dd9b1e..0a8b7ac57d 100644 --- a/test/e2e_node/runtime_conformance_test.go +++ b/test/e2e_node/runtime_conformance_test.go @@ -275,13 +275,13 @@ while true; do sleep 1; done }, { description: "should not be able to pull non-existing image from gcr.io", - image: "gcr.io/google_containers/invalid-image:invalid-tag", + image: "k8s.gcr.io/invalid-image:invalid-tag", phase: v1.PodPending, waiting: true, }, { description: "should be able to pull image from gcr.io", - image: "gcr.io/google_containers/alpine-with-bash:1.0", + image: "k8s.gcr.io/alpine-with-bash:1.0", phase: v1.PodRunning, waiting: false, }, diff --git a/test/fixtures/doc-yaml/admin/high-availability/etcd.yaml b/test/fixtures/doc-yaml/admin/high-availability/etcd.yaml index 3c73984ba9..d9f2b8e64d 100644 --- a/test/fixtures/doc-yaml/admin/high-availability/etcd.yaml +++ b/test/fixtures/doc-yaml/admin/high-availability/etcd.yaml @@ -5,7 +5,7 @@ metadata: spec: hostNetwork: true containers: - - image: gcr.io/google_containers/etcd:2.0.9 + - image: k8s.gcr.io/etcd:2.0.9 name: etcd-container command: - /usr/local/bin/etcd diff --git a/test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml b/test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml index a41a2c666d..a415ebc19d 100644 --- a/test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml +++ b/test/fixtures/doc-yaml/admin/high-availability/kube-apiserver.yaml @@ -6,7 +6,7 @@ spec: hostNetwork: true containers: - name: kube-apiserver - image: gcr.io/google_containers/kube-apiserver:9680e782e08a1a1c94c656190011bd02 + image: k8s.gcr.io/kube-apiserver:9680e782e08a1a1c94c656190011bd02 command: - /bin/sh - -c diff --git a/test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml b/test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml index a7cfbd5785..7985192978 100644 --- a/test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml +++ b/test/fixtures/doc-yaml/admin/high-availability/kube-controller-manager.yaml @@ -10,7 +10,7 @@ spec: - /usr/local/bin/kube-controller-manager --master=127.0.0.1:8080 --cluster-name=e2e-test-bburns --cluster-cidr=10.245.0.0/16 --allocate-node-cidrs=true --cloud-provider=gce --service-account-private-key-file=/srv/kubernetes/server.key --v=2 1>>/var/log/kube-controller-manager.log --leader-elect 2>&1 - image: gcr.io/google_containers/kube-controller-manager:fda24638d51a48baa13c35337fcd4793 + image: k8s.gcr.io/kube-controller-manager:fda24638d51a48baa13c35337fcd4793 livenessProbe: httpGet: path: /healthz diff --git a/test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml b/test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml index eeef9bb628..1da3091859 100644 --- a/test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml +++ b/test/fixtures/doc-yaml/admin/high-availability/kube-scheduler.yaml @@ -6,7 +6,7 @@ spec: hostNetwork: true containers: - name: kube-scheduler - image: gcr.io/google_containers/kube-scheduler:34d0b8f8b31e27937327961528739bc9 + image: k8s.gcr.io/kube-scheduler:34d0b8f8b31e27937327961528739bc9 command: - /bin/sh - -c diff --git a/test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml b/test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml index b63f25deba..ecb45dd95f 100644 --- a/test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml +++ b/test/fixtures/doc-yaml/admin/limitrange/invalid-pod.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: kubernetes-serve-hostname - image: gcr.io/google_containers/serve_hostname + image: k8s.gcr.io/serve_hostname resources: limits: cpu: "3" diff --git a/test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml b/test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml index c1ec54183b..d83e91267a 100644 --- a/test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml +++ b/test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml @@ -7,7 +7,7 @@ metadata: spec: containers: - name: kubernetes-serve-hostname - image: gcr.io/google_containers/serve_hostname + image: k8s.gcr.io/serve_hostname resources: limits: cpu: "1" diff --git a/test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml b/test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml index a4796fc24c..6414555355 100644 --- a/test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml +++ b/test/fixtures/doc-yaml/user-guide/downward-api/dapi-pod.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: test-container - image: gcr.io/google_containers/busybox + image: k8s.gcr.io/busybox command: [ "/bin/sh", "-c", "env" ] env: - name: MY_POD_NAME diff --git a/test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml b/test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml index 461691df22..204c4ddf59 100644 --- a/test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml +++ b/test/fixtures/doc-yaml/user-guide/liveness/exec-liveness.yaml @@ -10,7 +10,7 @@ spec: - /bin/sh - -c - echo ok > /tmp/health; sleep 10; rm -rf /tmp/health; sleep 600 - image: gcr.io/google_containers/busybox + image: k8s.gcr.io/busybox livenessProbe: exec: command: diff --git a/test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml b/test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml index e7196c6559..1a6ef7bc64 100644 --- a/test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml +++ b/test/fixtures/doc-yaml/user-guide/liveness/http-liveness.yaml @@ -8,7 +8,7 @@ spec: containers: - args: - /server - image: gcr.io/google_containers/liveness + image: k8s.gcr.io/liveness livenessProbe: httpGet: path: /healthz diff --git a/test/fixtures/doc-yaml/user-guide/multi-pod.yaml b/test/fixtures/doc-yaml/user-guide/multi-pod.yaml index 1a1d758e99..c795ce6f4d 100644 --- a/test/fixtures/doc-yaml/user-guide/multi-pod.yaml +++ b/test/fixtures/doc-yaml/user-guide/multi-pod.yaml @@ -42,7 +42,7 @@ metadata: spec: containers: - name: kubernetes-serve-hostname - image: gcr.io/google_containers/serve_hostname + image: k8s.gcr.io/serve_hostname resources: limits: cpu: "1" diff --git a/test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml b/test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml index a5d9c0ff75..d93d4095e1 100644 --- a/test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml +++ b/test/fixtures/doc-yaml/user-guide/secrets/secret-env-pod.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: test-container - image: gcr.io/google_containers/busybox + image: k8s.gcr.io/busybox command: [ "/bin/sh", "-c", "env" ] env: - name: MY_SECRET_DATA diff --git a/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml b/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml index 8f87a8dea5..1ff2e8652f 100644 --- a/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml +++ b/test/fixtures/doc-yaml/user-guide/secrets/secret-pod.yaml @@ -5,7 +5,7 @@ metadata: spec: containers: - name: test-container - image: gcr.io/google_containers/mounttest:0.8 + image: k8s.gcr.io/mounttest:0.8 command: [ "/mt", "--file_content=/etc/secret-volume/data-1" ] volumeMounts: # name must match the volume name below diff --git a/test/fixtures/pkg/kubectl/builder/kitten-rc.yaml b/test/fixtures/pkg/kubectl/builder/kitten-rc.yaml index 91f1aa06c3..48b15cc190 100644 --- a/test/fixtures/pkg/kubectl/builder/kitten-rc.yaml +++ b/test/fixtures/pkg/kubectl/builder/kitten-rc.yaml @@ -13,7 +13,7 @@ spec: version: kitten spec: containers: - - image: gcr.io/google_containers/update-demo:kitten + - image: k8s.gcr.io/update-demo:kitten name: update-demo ports: - containerPort: 80 diff --git a/test/fixtures/pkg/kubectl/cmd/auth/rbac-resource-plus.yaml b/test/fixtures/pkg/kubectl/cmd/auth/rbac-resource-plus.yaml index c358d8aa28..958e054ec5 100644 --- a/test/fixtures/pkg/kubectl/cmd/auth/rbac-resource-plus.yaml +++ b/test/fixtures/pkg/kubectl/cmd/auth/rbac-resource-plus.yaml @@ -30,7 +30,7 @@ items: spec: containers: - name: kubernetes-serve-hostname - image: gcr.io/google_containers/serve_hostname + image: k8s.gcr.io/serve_hostname resources: limits: cpu: "1" diff --git a/test/fixtures/pkg/kubectl/cmd/set/multi-resource-yaml.yaml b/test/fixtures/pkg/kubectl/cmd/set/multi-resource-yaml.yaml index 35b388c7a9..4c1c6f244f 100644 --- a/test/fixtures/pkg/kubectl/cmd/set/multi-resource-yaml.yaml +++ b/test/fixtures/pkg/kubectl/cmd/set/multi-resource-yaml.yaml @@ -13,7 +13,7 @@ spec: spec: containers: - name: mock-container - image: gcr.io/google-containers/pause:2.0 + image: k8s.gcr.io/pause:2.0 --- apiVersion: v1 kind: ReplicationController @@ -30,4 +30,4 @@ spec: spec: containers: - name: mock-container - image: gcr.io/google-containers/pause:2.0 \ No newline at end of file + image: k8s.gcr.io/pause:2.0 diff --git a/test/images/iperf/BASEIMAGE b/test/images/iperf/BASEIMAGE index 1bf3907f76..7f7f90c89a 100644 --- a/test/images/iperf/BASEIMAGE +++ b/test/images/iperf/BASEIMAGE @@ -1,4 +1,4 @@ -amd64=gcr.io/google_containers/ubuntu-slim:0.12 -arm=gcr.io/google_containers/ubuntu-slim-arm:0.12 -arm64=gcr.io/google_containers/ubuntu-slim-arm64:0.12 -ppc64le=gcr.io/google_containers/ubuntu-slim-ppc64le:0.12 +amd64=k8s.gcr.io/ubuntu-slim:0.12 +arm=k8s.gcr.io/ubuntu-slim-arm:0.12 +arm64=k8s.gcr.io/ubuntu-slim-arm64:0.12 +ppc64le=k8s.gcr.io/ubuntu-slim-ppc64le:0.12 diff --git a/test/images/logs-generator/README.md b/test/images/logs-generator/README.md index 8f89bb4a4b..889ba2a7bd 100644 --- a/test/images/logs-generator/README.md +++ b/test/images/logs-generator/README.md @@ -33,7 +33,7 @@ line in a given run of the container. Image is located in the public repository of Google Container Registry under the name ``` -gcr.io/google_containers/logs-generator:v0.1.1 +k8s.gcr.io/logs-generator:v0.1.1 ``` ## Examples @@ -42,13 +42,13 @@ gcr.io/google_containers/logs-generator:v0.1.1 docker run -i \ -e "LOGS_GENERATOR_LINES_TOTAL=10" \ -e "LOGS_GENERATOR_DURATION=1s" \ - gcr.io/google_containers/logs-generator:v0.1.1 + k8s.gcr.io/logs-generator:v0.1.1 ``` ``` kubectl run logs-generator \ --generator=run-pod/v1 \ - --image=gcr.io/google_containers/logs-generator:v0.1.1 \ + --image=k8s.gcr.io/logs-generator:v0.1.1 \ --restart=Never \ --env "LOGS_GENERATOR_LINES_TOTAL=1000" \ --env "LOGS_GENERATOR_DURATION=1m" diff --git a/test/images/pets/peer-finder/BASEIMAGE b/test/images/pets/peer-finder/BASEIMAGE index 425fce2600..0b04ef6e4d 100644 --- a/test/images/pets/peer-finder/BASEIMAGE +++ b/test/images/pets/peer-finder/BASEIMAGE @@ -1,4 +1,4 @@ -amd64=gcr.io/google-containers/debian-base-amd64:0.3 -arm=gcr.io/google-containers/debian-base-arm:0.3 -arm64=gcr.io/google-containers/debian-base-arm64:0.3 -ppc64le=gcr.io/google-containers/debian-base-ppc64le:0.3 +amd64=k8s.gcr.io/debian-base-amd64:0.3 +arm=k8s.gcr.io/debian-base-arm:0.3 +arm64=k8s.gcr.io/debian-base-arm64:0.3 +ppc64le=k8s.gcr.io/debian-base-ppc64le:0.3 diff --git a/test/images/pets/redis-installer/BASEIMAGE b/test/images/pets/redis-installer/BASEIMAGE index 425fce2600..0b04ef6e4d 100644 --- a/test/images/pets/redis-installer/BASEIMAGE +++ b/test/images/pets/redis-installer/BASEIMAGE @@ -1,4 +1,4 @@ -amd64=gcr.io/google-containers/debian-base-amd64:0.3 -arm=gcr.io/google-containers/debian-base-arm:0.3 -arm64=gcr.io/google-containers/debian-base-arm64:0.3 -ppc64le=gcr.io/google-containers/debian-base-ppc64le:0.3 +amd64=k8s.gcr.io/debian-base-amd64:0.3 +arm=k8s.gcr.io/debian-base-arm:0.3 +arm64=k8s.gcr.io/debian-base-arm64:0.3 +ppc64le=k8s.gcr.io/debian-base-ppc64le:0.3 diff --git a/test/images/pets/redis-installer/README.md b/test/images/pets/redis-installer/README.md index 04024c1359..e1c3587af3 100644 --- a/test/images/pets/redis-installer/README.md +++ b/test/images/pets/redis-installer/README.md @@ -4,7 +4,7 @@ The image in this directory is the init container for contrib/pets/redis but for You can execute the image locally via: ``` -$ docker run -it gcr.io/google_containers/redis-install-3.2.0:e2e --cmd --install-into=/opt --work-dir=/work-dir +$ docker run -it k8s.gcr.io/redis-install-3.2.0:e2e --cmd --install-into=/opt --work-dir=/work-dir ``` To share the installation with other containers mount the appropriate volumes as `--install-into` and `--work-dir`, where `install-into` is the directory to install redis into, and `work-dir` is the directory to install the user/admin supplied on-{start,change} hook scripts. diff --git a/test/images/pets/zookeeper-installer/BASEIMAGE b/test/images/pets/zookeeper-installer/BASEIMAGE index 425fce2600..0b04ef6e4d 100644 --- a/test/images/pets/zookeeper-installer/BASEIMAGE +++ b/test/images/pets/zookeeper-installer/BASEIMAGE @@ -1,4 +1,4 @@ -amd64=gcr.io/google-containers/debian-base-amd64:0.3 -arm=gcr.io/google-containers/debian-base-arm:0.3 -arm64=gcr.io/google-containers/debian-base-arm64:0.3 -ppc64le=gcr.io/google-containers/debian-base-ppc64le:0.3 +amd64=k8s.gcr.io/debian-base-amd64:0.3 +arm=k8s.gcr.io/debian-base-arm:0.3 +arm64=k8s.gcr.io/debian-base-arm64:0.3 +ppc64le=k8s.gcr.io/debian-base-ppc64le:0.3 diff --git a/test/images/pets/zookeeper-installer/README.md b/test/images/pets/zookeeper-installer/README.md index 071bc7aa48..598ca7afe9 100644 --- a/test/images/pets/zookeeper-installer/README.md +++ b/test/images/pets/zookeeper-installer/README.md @@ -4,7 +4,7 @@ The image in this directory is the init container for contrib/pets/zookeeper but You can execute the image locally via: ``` -$ docker run -it gcr.io/google_containers/zookeeper-install-3.5.0-alpha:e2e --cmd --install-into=/opt --work-dir=/work-dir +$ docker run -it k8s.gcr.io/zookeeper-install-3.5.0-alpha:e2e --cmd --install-into=/opt --work-dir=/work-dir ``` To share the installation with other containers mount the appropriate volumes as `--install-into` and `--work-dir`, where `install-into` is the directory to install zookeeper into, and `work-dir` is the directory to install the user/admin supplied on-{start,change} hook scripts. diff --git a/test/images/resource-consumer/BASEIMAGE b/test/images/resource-consumer/BASEIMAGE index 425fce2600..0b04ef6e4d 100644 --- a/test/images/resource-consumer/BASEIMAGE +++ b/test/images/resource-consumer/BASEIMAGE @@ -1,4 +1,4 @@ -amd64=gcr.io/google-containers/debian-base-amd64:0.3 -arm=gcr.io/google-containers/debian-base-arm:0.3 -arm64=gcr.io/google-containers/debian-base-arm64:0.3 -ppc64le=gcr.io/google-containers/debian-base-ppc64le:0.3 +amd64=k8s.gcr.io/debian-base-amd64:0.3 +arm=k8s.gcr.io/debian-base-arm:0.3 +arm64=k8s.gcr.io/debian-base-arm64:0.3 +ppc64le=k8s.gcr.io/debian-base-ppc64le:0.3 diff --git a/test/images/resource-consumer/README.md b/test/images/resource-consumer/README.md index 19801af8e3..742bafee36 100644 --- a/test/images/resource-consumer/README.md +++ b/test/images/resource-consumer/README.md @@ -48,7 +48,7 @@ Custom metrics in Prometheus format are exposed on "/metrics" endpoint. ###CURL example ```console -$ kubectl run resource-consumer --image=gcr.io/google_containers/resource_consumer:beta --expose --service-overrides='{ "spec": { "type": "LoadBalancer" } }' --port 8080 +$ kubectl run resource-consumer --image=k8s.gcr.io/resource_consumer:beta --expose --service-overrides='{ "spec": { "type": "LoadBalancer" } }' --port 8080 $ kubectl get services resource-consumer ``` @@ -62,7 +62,7 @@ $ curl --data "millicores=300&durationSec=600" http://:8080/Consume ## Image -Docker image of Resource Consumer can be found in Google Container Registry as gcr.io/google_containers/resource_consumer:beta +Docker image of Resource Consumer can be found in Google Container Registry as k8s.gcr.io/resource_consumer:beta ## Use cases diff --git a/test/images/serve-hostname/README.md b/test/images/serve-hostname/README.md index 28d3733664..a4647ff95f 100644 --- a/test/images/serve-hostname/README.md +++ b/test/images/serve-hostname/README.md @@ -15,19 +15,19 @@ $ make all-push # Build for linux/amd64 (default) $ make push ARCH=amd64 -# ---> gcr.io/google_containers/serve_hostname-amd64:TAG +# ---> staging-k8s.gcr.io/serve_hostname-amd64:TAG $ make push ARCH=arm -# ---> gcr.io/google_containers/serve_hostname-arm:TAG +# ---> staging-k8s.gcr.io/serve_hostname-arm:TAG $ make push ARCH=arm64 -# ---> gcr.io/google_containers/serve_hostname-arm64:TAG +# ---> staging-k8s.gcr.io/serve_hostname-arm64:TAG $ make push ARCH=ppc64le -# ---> gcr.io/google_containers/serve_hostname-ppc64le:TAG +# ---> staging-k8s.gcr.io/serve_hostname-ppc64le:TAG $ make push ARCH=s390x -# ---> gcr.io/google_containers/serve_hostname-s390x:TAG +# ---> staging-k8s.gcr.io/serve_hostname-s390x:TAG ``` Of course, if you don't want to push the images, run `make all-container` or `make container ARCH={target_arch}` instead. diff --git a/test/images/volumes-tester/ceph/Makefile b/test/images/volumes-tester/ceph/Makefile index 2883aafb64..96c9bdbd40 100644 --- a/test/images/volumes-tester/ceph/Makefile +++ b/test/images/volumes-tester/ceph/Makefile @@ -13,7 +13,7 @@ # limitations under the License. TAG = 0.1 -PREFIX = gcr.io/google_containers +PREFIX = staging-k8s.gcr.io all: push diff --git a/test/images/volumes-tester/gluster/Makefile b/test/images/volumes-tester/gluster/Makefile index 4aa5b11351..c4b1654e4f 100644 --- a/test/images/volumes-tester/gluster/Makefile +++ b/test/images/volumes-tester/gluster/Makefile @@ -13,7 +13,7 @@ # limitations under the License. TAG = 0.4 -PREFIX = gcr.io/google_containers +PREFIX = staging-k8s.gcr.io all: push diff --git a/test/images/volumes-tester/iscsi/Makefile b/test/images/volumes-tester/iscsi/Makefile index dd830d4fd2..df13471923 100644 --- a/test/images/volumes-tester/iscsi/Makefile +++ b/test/images/volumes-tester/iscsi/Makefile @@ -13,7 +13,7 @@ # limitations under the License. TAG = 0.1 -PREFIX = gcr.io/google_containers +PREFIX = staging-k8s.gcr.io all: push diff --git a/test/images/volumes-tester/nfs/Makefile b/test/images/volumes-tester/nfs/Makefile index 1e53b19c8b..1c1fc322e2 100644 --- a/test/images/volumes-tester/nfs/Makefile +++ b/test/images/volumes-tester/nfs/Makefile @@ -13,7 +13,7 @@ # limitations under the License. TAG = 0.8 -PREFIX = gcr.io/google_containers +PREFIX = staging-k8s.gcr.io all: push diff --git a/test/images/volumes-tester/rbd/Makefile b/test/images/volumes-tester/rbd/Makefile index dcf3c69f37..27c67f47e2 100644 --- a/test/images/volumes-tester/rbd/Makefile +++ b/test/images/volumes-tester/rbd/Makefile @@ -13,7 +13,7 @@ # limitations under the License. TAG = 0.1 -PREFIX = gcr.io/google_containers +PREFIX = staging-k8s.gcr.io all: push diff --git a/test/integration/benchmark-controller.json b/test/integration/benchmark-controller.json index 47ac4ae0cd..4cce2217eb 100644 --- a/test/integration/benchmark-controller.json +++ b/test/integration/benchmark-controller.json @@ -17,7 +17,7 @@ "spec": { "containers": [{ "name": "test-container", - "image": "gcr.io/google_containers/pause-amd64:3.1" + "image": "k8s.gcr.io/pause-amd64:3.1" }] } } diff --git a/test/integration/framework/util.go b/test/integration/framework/util.go index c9d42a99c4..8fbb57de4b 100644 --- a/test/integration/framework/util.go +++ b/test/integration/framework/util.go @@ -31,7 +31,7 @@ import ( const ( // When these values are updated, also update cmd/kubelet/app/options/container_runtime.go // A copy of these values exist in test/utils/image/manifest.go - currentPodInfraContainerImageName = "gcr.io/google_containers/pause" + currentPodInfraContainerImageName = "k8s.gcr.io/pause" currentPodInfraContainerImageVersion = "3.1" ) diff --git a/test/integration/master/synthetic_master_test.go b/test/integration/master/synthetic_master_test.go index d00f8766b2..aa063be5d2 100644 --- a/test/integration/master/synthetic_master_test.go +++ b/test/integration/master/synthetic_master_test.go @@ -279,7 +279,7 @@ var deploymentExtensions string = ` "spec": { "containers": [{ "name": "nginx", - "image": "gcr.io/google-containers/nginx:1.7.9" + "image": "k8s.gcr.io/nginx:1.7.9" }] } } @@ -306,7 +306,7 @@ var deploymentApps string = ` "spec": { "containers": [{ "name": "nginx", - "image": "gcr.io/google-containers/nginx:1.7.9" + "image": "k8s.gcr.io/nginx:1.7.9" }] } } diff --git a/test/integration/scheduler/volume_binding_test.go b/test/integration/scheduler/volume_binding_test.go index 35f60f8102..de733fd248 100644 --- a/test/integration/scheduler/volume_binding_test.go +++ b/test/integration/scheduler/volume_binding_test.go @@ -324,7 +324,7 @@ func makePod(name, ns string, pvcs []string) *v1.Pod { Containers: []v1.Container{ { Name: "write-pod", - Image: "gcr.io/google_containers/busybox:1.24", + Image: "k8s.gcr.io/busybox:1.24", Command: []string{"/bin/sh"}, Args: []string{"-c", "while true; do sleep 1; done"}, }, diff --git a/test/kubemark/resources/cluster-autoscaler_template.json b/test/kubemark/resources/cluster-autoscaler_template.json index f42c060e25..ffe4a61f8b 100644 --- a/test/kubemark/resources/cluster-autoscaler_template.json +++ b/test/kubemark/resources/cluster-autoscaler_template.json @@ -14,7 +14,7 @@ "containers": [ { "name": "cluster-autoscaler", - "image": "gcr.io/google_containers/cluster-autoscaler:v1.0.0", + "image": "k8s.gcr.io/cluster-autoscaler:v1.0.0", "command": [ "./run.sh", "--kubernetes=https://{{master_ip}}:443?inClusterConfig=0&useServiceAccount=0&auth=/kubeconfig/cluster_autoscaler.kubeconfig", diff --git a/test/kubemark/resources/heapster_template.json b/test/kubemark/resources/heapster_template.json index 491596b2ff..5a9bb512ea 100644 --- a/test/kubemark/resources/heapster_template.json +++ b/test/kubemark/resources/heapster_template.json @@ -33,7 +33,7 @@ "containers": [ { "name": "heapster", - "image": "gcr.io/google_containers/heapster:v1.3.0", + "image": "k8s.gcr.io/heapster:v1.3.0", "resources": { "requests": { "cpu": "{{METRICS_CPU}}m", @@ -55,7 +55,7 @@ }, { "name": "eventer", - "image": "gcr.io/google_containers/heapster:v1.3.0", + "image": "k8s.gcr.io/heapster:v1.3.0", "resources": { "requests": { "memory": "{{EVENTER_MEM}}Ki" diff --git a/test/kubemark/resources/hollow-node_template.yaml b/test/kubemark/resources/hollow-node_template.yaml index 06352442c0..3a16f1f353 100644 --- a/test/kubemark/resources/hollow-node_template.yaml +++ b/test/kubemark/resources/hollow-node_template.yaml @@ -93,7 +93,7 @@ spec: cpu: {{HOLLOW_PROXY_CPU}}m memory: {{HOLLOW_PROXY_MEM}}Ki - name: hollow-node-problem-detector - image: gcr.io/google_containers/node-problem-detector:v0.4.1 + image: k8s.gcr.io/node-problem-detector:v0.4.1 env: - name: NODE_NAME valueFrom: diff --git a/test/kubemark/resources/start-kubemark-master.sh b/test/kubemark/resources/start-kubemark-master.sh index b8d3c8d0ab..fd2b900f09 100755 --- a/test/kubemark/resources/start-kubemark-master.sh +++ b/test/kubemark/resources/start-kubemark-master.sh @@ -695,7 +695,7 @@ fi # Setup docker flags and load images of the master components. assemble-docker-flags -DOCKER_REGISTRY="gcr.io/google_containers" +DOCKER_REGISTRY="k8s.gcr.io" load-docker-images readonly audit_policy_file="/etc/audit_policy.config" diff --git a/test/kubemark/start-kubemark.sh b/test/kubemark/start-kubemark.sh index 5d792c8e8d..6d8ed41afb 100755 --- a/test/kubemark/start-kubemark.sh +++ b/test/kubemark/start-kubemark.sh @@ -193,14 +193,14 @@ function create-and-upload-hollow-node-image { echo 'Cannot find cmd/kubemark binary' exit 1 fi - + echo "Copying kubemark binary to ${MAKE_DIR}" cp "${KUBEMARK_BIN}" "${MAKE_DIR}" CURR_DIR=`pwd` cd "${MAKE_DIR}" RETRIES=3 for attempt in $(seq 1 ${RETRIES}); do - if ! REGISTRY="${CONTAINER_REGISTRY}" PROJECT="${PROJECT}" make "${KUBEMARK_IMAGE_MAKE_TARGET}"; then + if ! REGISTRY="${FULL_REGISTRY}" make "${KUBEMARK_IMAGE_MAKE_TARGET}"; then if [[ $((attempt)) -eq "${RETRIES}" ]]; then echo "${color_red}Make failed. Exiting.${color_norm}" exit 1 @@ -221,7 +221,7 @@ function create-and-upload-hollow-node-image { function create-and-upload-hollow-node-image-bazel { RETRIES=3 for attempt in $(seq 1 ${RETRIES}); do - if ! bazel run //cluster/images/kubemark:push --define PROJECT="${PROJECT}"; then + if ! bazel run //cluster/images/kubemark:push --define REGISTRY="${FULL_REGISTRY}"; then if [[ $((attempt)) -eq "${RETRIES}" ]]; then echo "${color_red}Image push failed. Exiting.${color_norm}" exit 1 @@ -457,6 +457,15 @@ write-local-kubeconfig copy-resource-files-to-master start-master-components +# TODO: Simplify. The caller should have to pass a full registry or nothing. +if [[ -n "${CONTAINER_REGISTRY}" && -n "${PROJECT}" ]]; then + FULL_REGISTRY="${CONTAINER_REGISTRY}/${PROJECT}" +elif [[ -n "${CONTAINER_REGISTRY}" ]]; then + FULL_REGISTRY="${CONTAINER_REGISTRY}" +else + FULL_REGISTRY=staging-k8s.gcr.io +fi + # Setup for hollow-nodes. echo "" echo -e "${color_yellow}STARTING SETUP FOR HOLLOW-NODES${color_norm}" diff --git a/test/utils/image/manifest.go b/test/utils/image/manifest.go index 947132c3cc..85b0e5fd5d 100644 --- a/test/utils/image/manifest.go +++ b/test/utils/image/manifest.go @@ -23,7 +23,7 @@ import ( const ( e2eRegistry = "gcr.io/kubernetes-e2e-test-images" - gcRegistry = "gcr.io/google-containers" + gcRegistry = "k8s.gcr.io" PrivateRegistry = "gcr.io/k8s-authenticated-test" sampleRegistry = "gcr.io/google-samples" )