Update e2e test images url

Removes any reference from the registry gcr.io/kubernetes-e2e-test-images in
kubernetes/kubernetes, replacing it with k8s.gcr.io/kubernetes-e2e-test-images.
In some cases, the images had to be updated since a few things have changed since
their original implementation, most notably being the fact that some of the images
have been centralized into the agnhost image.

Co-Authored-By: Claudiu Belu <cbelu@cloudbasesolutions.com>
This commit is contained in:
Caleb Woodbine 2021-03-23 16:33:10 +13:00 committed by Claudiu Belu
parent f6c2068623
commit bbb368b701
20 changed files with 33 additions and 42 deletions

View File

@ -8,4 +8,5 @@ metadata:
spec: spec:
containers: containers:
- name: kubernetes-serve-hostname - name: kubernetes-serve-hostname
image: gcr.io/kubernetes-e2e-test-images/serve-hostname-amd64:1.1 image: k8s.gcr.io/e2e-test-images/agnhost:2.32
command: ["/agnhost", "serve-hostname"]

View File

@ -20,8 +20,8 @@ spec:
- name: wardle-server - name: wardle-server
# build from staging/src/k8s.io/sample-apiserver/artifacts/simple-image/Dockerfile # build from staging/src/k8s.io/sample-apiserver/artifacts/simple-image/Dockerfile
# or # or
# docker pull gcr.io/kubernetes-e2e-test-images/sample-apiserver:1.17 # docker pull k8s.gcr.io/e2e-test-images/sample-apiserver:1.17.4
# docker tag gcr.io/kubernetes-e2e-test-images/sample-apiserver:1.17 kube-sample-apiserver:latest # docker tag k8s.gcr.io/e2e-test-images/sample-apiserver:1.17.4 kube-sample-apiserver:latest
image: kube-sample-apiserver:latest image: kube-sample-apiserver:latest
imagePullPolicy: Never imagePullPolicy: Never
args: [ "--etcd-servers=http://localhost:2379" ] args: [ "--etcd-servers=http://localhost:2379" ]

View File

@ -11,6 +11,6 @@ spec:
spec: spec:
containers: containers:
- name: echoheaders-https - name: echoheaders-https
image: gcr.io/kubernetes-e2e-test-images/echoserver:2.2 image: k8s.gcr.io/e2e-test-images/echoserver:2.3
ports: ports:
- containerPort: 8080 - containerPort: 8080

View File

@ -11,7 +11,7 @@ spec:
spec: spec:
containers: containers:
- name: echoheaders - name: echoheaders
image: gcr.io/kubernetes-e2e-test-images/echoserver:2.2 image: k8s.gcr.io/e2e-test-images/echoserver:2.3
ports: ports:
- containerPort: 8080 - containerPort: 8080
readinessProbe: readinessProbe:

View File

@ -14,6 +14,6 @@ spec:
spec: spec:
containers: containers:
- name: echoheaders - name: echoheaders
image: gcr.io/kubernetes-e2e-test-images/echoserver:2.2 image: k8s.gcr.io/e2e-test-images/echoserver:2.3
ports: ports:
- containerPort: 8443 - containerPort: 8443

View File

@ -11,6 +11,6 @@ spec:
spec: spec:
containers: containers:
- name: echoheaders-https - name: echoheaders-https
image: gcr.io/kubernetes-e2e-test-images/echoserver:2.2 image: k8s.gcr.io/e2e-test-images/echoserver:2.3
ports: ports:
- containerPort: 8080 - containerPort: 8080

View File

@ -15,7 +15,8 @@ spec:
run: hostname run: hostname
spec: spec:
containers: containers:
- image: gcr.io/kubernetes-e2e-test-images/serve-hostname:1.1 - image: k8s.gcr.io/e2e-test-images/agnhost:2.32
command: ["/agnhost", "serve-hostname"]
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: hostname name: hostname
terminationGracePeriodSeconds: 120 terminationGracePeriodSeconds: 120

View File

@ -14,21 +14,15 @@ spec:
run: hostname run: hostname
spec: spec:
containers: containers:
- image: gcr.io/kubernetes-e2e-test-images/serve-hostname:1.1 - image: k8s.gcr.io/e2e-test-images/agnhost:2.32
name: host1 name: host1
command: args: ["serve-hostname", "--http=true", "--udp=false", "--port=8000"]
- /bin/sh
- -c
- /serve_hostname -http=true -udp=false -port=8000
ports: ports:
- protocol: TCP - protocol: TCP
containerPort: 8000 containerPort: 8000
- image: gcr.io/kubernetes-e2e-test-images/serve-hostname:1.1 - image: k8s.gcr.io/e2e-test-images/agnhost:2.32
name: host2 name: host2
command: args: ["serve-hostname", "--http=true", "--udp=false", "--port=8080"]
- /bin/sh
- -c
- /serve_hostname -http=true -udp=false -port=8080
ports: ports:
- protocol: TCP - protocol: TCP
containerPort: 8080 containerPort: 8080

View File

@ -15,7 +15,8 @@ spec:
run: hostname run: hostname
spec: spec:
containers: containers:
- image: gcr.io/kubernetes-e2e-test-images/serve-hostname:1.1 - image: k8s.gcr.io/e2e-test-images/agnhost:2.32
command: ["/agnhost", "serve-hostname"]
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: hostname name: hostname
terminationGracePeriodSeconds: 120 terminationGracePeriodSeconds: 120

View File

@ -11,6 +11,6 @@ spec:
spec: spec:
containers: containers:
- name: echoheaders-https - name: echoheaders-https
image: gcr.io/kubernetes-e2e-test-images/echoserver:2.2 image: k8s.gcr.io/e2e-test-images/echoserver:2.3
ports: ports:
- containerPort: 8080 - containerPort: 8080

View File

@ -11,6 +11,6 @@ spec:
spec: spec:
containers: containers:
- name: echoheaders-https - name: echoheaders-https
image: gcr.io/kubernetes-e2e-test-images/echoserver:2.2 image: k8s.gcr.io/e2e-test-images/echoserver:2.3
ports: ports:
- containerPort: 8080 - containerPort: 8080

View File

@ -8,7 +8,7 @@ metadata:
spec: spec:
containers: containers:
- name: primary - name: primary
image: gcr.io/kubernetes-e2e-test-images/agnhost:1.0 image: k8s.gcr.io/e2e-test-images/agnhost:2.32
env: env:
- name: PRIMARY - name: PRIMARY
value: "true" value: "true"
@ -21,7 +21,7 @@ spec:
- mountPath: /agnhost-primary-data - mountPath: /agnhost-primary-data
name: data name: data
- name: sentinel - name: sentinel
image: gcr.io/kubernetes-e2e-test-images/agnhost:1.0 image: k8s.gcr.io/e2e-test-images/agnhost:2.32
env: env:
- name: SENTINEL - name: SENTINEL
value: "true" value: "true"

View File

@ -12,7 +12,8 @@ spec:
spec: spec:
containers: containers:
- name: netexec - name: netexec
image: gcr.io/kubernetes-e2e-test-images/netexec:1.0 image: k8s.gcr.io/e2e-test-images/agnhost:2.32
command: ["/agnhost", "netexec"]
ports: ports:
- containerPort: 8080 - containerPort: 8080
# This is to force these pods to land on different hosts. # This is to force these pods to land on different hosts.

View File

@ -10,7 +10,7 @@ metadata:
spec: spec:
containers: containers:
- name: master - name: master
image: gcr.io/kubernetes-e2e-test-images/redis:1.0 image: k8s.gcr.io/e2e-test-images/redis:5.0.5-alpine
env: env:
- name: MASTER - name: MASTER
value: "true" value: "true"
@ -23,7 +23,7 @@ spec:
- mountPath: /redis-master-data - mountPath: /redis-master-data
name: data name: data
- name: sentinel - name: sentinel
image: gcr.io/kubernetes-e2e-test-images/redis:1.0 image: k8s.gcr.io/e2e-test-images/redis:5.0.5-alpine
env: env:
- name: SENTINEL - name: SENTINEL
value: "true" value: "true"
@ -42,7 +42,8 @@ metadata:
spec: spec:
containers: containers:
- name: kubernetes-serve-hostname - name: kubernetes-serve-hostname
image: gcr.io/kubernetes-e2e-test-images/serve-hostname:1.0 image: k8s.gcr.io/e2e-test-images/agnhost:2.32
command: ["/agnhost", "serve-hostname"]
resources: resources:
limits: limits:
cpu: "1" cpu: "1"

View File

@ -30,7 +30,8 @@ items:
spec: spec:
containers: containers:
- name: kubernetes-serve-hostname - name: kubernetes-serve-hostname
image: gcr.io/kubernetes-e2e-test-images/serve-hostname:1.1 image: k8s.gcr.io/e2e-test-images/agnhost:2.32
command: ["/agnhost", "serve-hostname"]
resources: resources:
limits: limits:
cpu: "1" cpu: "1"

View File

@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and # See the License for the specific language governing permissions and
# limitations under the License. # limitations under the License.
REGISTRY ?= gcr.io/kubernetes-e2e-test-images REGISTRY ?= k8s.gcr.io/e2e-test-images
GOARM ?= 7 GOARM ?= 7
DOCKER_CERT_BASE_PATH ?= DOCKER_CERT_BASE_PATH ?=
QEMUVERSION=v5.1.0-2 QEMUVERSION=v5.1.0-2

View File

@ -131,7 +131,7 @@ To build AND push an image, the following command can be used:
make all-push WHAT=agnhost make all-push WHAT=agnhost
``` ```
By default, the images will be tagged and pushed under the `gcr.io/kubernetes-e2e-test-images` By default, the images will be tagged and pushed under the `k8s.gcr.io/e2e-test-images`
registry. That can changed by running this command instead: registry. That can changed by running this command instead:
```bash ```bash
@ -142,7 +142,7 @@ REGISTRY=foo_registry make all-push WHAT=agnhost
require the `agnhost` image to be published in an authenticated repo as well: require the `agnhost` image to be published in an authenticated repo as well:
```bash ```bash
REGISTRY=gcr.io/kubernetes-e2e-test-images make all-push WHAT=agnhost REGISTRY=k8s.gcr.io/e2e-test-images make all-push WHAT=agnhost
REGISTRY=gcr.io/k8s-authenticated-test make all-push WHAT=agnhost REGISTRY=gcr.io/k8s-authenticated-test make all-push WHAT=agnhost
``` ```
@ -164,7 +164,6 @@ export KUBE_TEST_REPO_LIST=/path/to/repo_list.yaml
to pull the images from. Sample file: to pull the images from. Sample file:
```yaml ```yaml
e2eRegistry: your-awesome-registry
promoterE2eRegistry: your-awesome-registry promoterE2eRegistry: your-awesome-registry
gcRegistry: your-awesome-registry gcRegistry: your-awesome-registry
sampleRegistry: your-awesome-registry sampleRegistry: your-awesome-registry

View File

@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and # See the License for the specific language governing permissions and
# limitations under the License. # limitations under the License.
REGISTRY ?= gcr.io/kubernetes-e2e-test-images REGISTRY ?= k8s.gcr.io/e2e-test-images
REMOTE_DOCKER_URL ?= REMOTE_DOCKER_URL ?=
DOCKER_CERT_PATH ?= "$(HOME)/.docker" DOCKER_CERT_PATH ?= "$(HOME)/.docker"
export export

View File

@ -31,7 +31,6 @@ import (
// RegistryList holds public and private image registries // RegistryList holds public and private image registries
type RegistryList struct { type RegistryList struct {
GcAuthenticatedRegistry string `yaml:"gcAuthenticatedRegistry"` GcAuthenticatedRegistry string `yaml:"gcAuthenticatedRegistry"`
E2eRegistry string `yaml:"e2eRegistry"`
PromoterE2eRegistry string `yaml:"promoterE2eRegistry"` PromoterE2eRegistry string `yaml:"promoterE2eRegistry"`
BuildImageRegistry string `yaml:"buildImageRegistry"` BuildImageRegistry string `yaml:"buildImageRegistry"`
InvalidRegistry string `yaml:"invalidRegistry"` InvalidRegistry string `yaml:"invalidRegistry"`
@ -91,7 +90,6 @@ func initReg() RegistryList {
var ( var (
initRegistry = RegistryList{ initRegistry = RegistryList{
GcAuthenticatedRegistry: "gcr.io/authenticated-image-pulling", GcAuthenticatedRegistry: "gcr.io/authenticated-image-pulling",
E2eRegistry: "gcr.io/kubernetes-e2e-test-images",
PromoterE2eRegistry: "k8s.gcr.io/e2e-test-images", PromoterE2eRegistry: "k8s.gcr.io/e2e-test-images",
BuildImageRegistry: "k8s.gcr.io/build-image", BuildImageRegistry: "k8s.gcr.io/build-image",
InvalidRegistry: "invalid.com/invalid", InvalidRegistry: "invalid.com/invalid",
@ -212,7 +210,7 @@ func initImageConfigs(list RegistryList) (map[int]Config, map[int]Config) {
configs[AppArmorLoader] = Config{list.PromoterE2eRegistry, "apparmor-loader", "1.3"} configs[AppArmorLoader] = Config{list.PromoterE2eRegistry, "apparmor-loader", "1.3"}
configs[BusyBox] = Config{list.PromoterE2eRegistry, "busybox", "1.29-1"} configs[BusyBox] = Config{list.PromoterE2eRegistry, "busybox", "1.29-1"}
configs[CheckMetadataConcealment] = Config{list.PromoterE2eRegistry, "metadata-concealment", "1.6"} configs[CheckMetadataConcealment] = Config{list.PromoterE2eRegistry, "metadata-concealment", "1.6"}
configs[CudaVectorAdd] = Config{list.E2eRegistry, "cuda-vector-add", "1.0"} configs[CudaVectorAdd] = Config{list.PromoterE2eRegistry, "cuda-vector-add", "1.0"}
configs[CudaVectorAdd2] = Config{list.PromoterE2eRegistry, "cuda-vector-add", "2.2"} configs[CudaVectorAdd2] = Config{list.PromoterE2eRegistry, "cuda-vector-add", "2.2"}
configs[DebianIptables] = Config{list.BuildImageRegistry, "debian-iptables", "buster-v1.6.5"} configs[DebianIptables] = Config{list.BuildImageRegistry, "debian-iptables", "buster-v1.6.5"}
configs[EchoServer] = Config{list.PromoterE2eRegistry, "echoserver", "2.3"} configs[EchoServer] = Config{list.PromoterE2eRegistry, "echoserver", "2.3"}
@ -383,8 +381,6 @@ func replaceRegistryInImageURLWithList(imageURL string, reg RegistryList) (strin
} }
switch registryAndUser { switch registryAndUser {
case initRegistry.E2eRegistry:
registryAndUser = reg.E2eRegistry
case initRegistry.GcRegistry: case initRegistry.GcRegistry:
registryAndUser = reg.GcRegistry registryAndUser = reg.GcRegistry
case initRegistry.SigStorageRegistry: case initRegistry.SigStorageRegistry:

View File

@ -40,9 +40,6 @@ func TestReplaceRegistryInImageURL(t *testing.T) {
}, { }, {
in: "test", in: "test",
out: "test.io/library/test", out: "test.io/library/test",
}, {
in: "gcr.io/kubernetes-e2e-test-images/test:123",
out: "test.io/kubernetes-e2e-test-images/test:123",
}, { }, {
in: "k8s.gcr.io/test:123", in: "k8s.gcr.io/test:123",
out: "test.io/test:123", out: "test.io/test:123",
@ -82,7 +79,6 @@ func TestReplaceRegistryInImageURL(t *testing.T) {
// Set custom registries // Set custom registries
reg := RegistryList{ reg := RegistryList{
DockerLibraryRegistry: "test.io/library", DockerLibraryRegistry: "test.io/library",
E2eRegistry: "test.io/kubernetes-e2e-test-images",
GcRegistry: "test.io", GcRegistry: "test.io",
GcrReleaseRegistry: "test.io/gke-release", GcrReleaseRegistry: "test.io/gke-release",
PrivateRegistry: "test.io/k8s-authenticated-test", PrivateRegistry: "test.io/k8s-authenticated-test",