-
Notifications
You must be signed in to change notification settings - Fork 880
Start Publishing Staging Images to Artifact Registry #3961
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
After #3968 is merged, we need to do a few things:
Bit unsure about other things. |
Spoke about this at the sig-testing meeting. Will push it out to the future when GCR deprecation is actually announced by Google. May want to standardize on Aritfact Registry eventually, but would require tracking down a number of staging registries and changing team push processes (with unclear payoff right now) /priority backlog |
/milestone v1.26 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten |
/milestone v1.33 |
(Some projects are on AR, but not all, thanks to @upodroid) |
We have exceptions for migration: |
Quick update, I'm on track to finish the ACTIVE projects by the deadline by Google(18th of March) Outstanding projects:
Successfully Migrated Projects Projects:
Projects with inactive GCR usage. They will be migrated in late March after the ACTIVE projects are done.
|
@upodroid Are we not done with this ? |
I can't tell if git-sync was done or not -- if so, is there anything I need to DO? |
@thockin TLDR: yes git-sync was moved and you don't need to do anything. x-ref kubernetes/git-sync#940 (comment) Confirming: x-ref etcd-io/etcd#15199 (comment) # check for legacy GCR, which used storage.googleapis.com
crane pull --verbose gcr.io/k8s-staging-git-sync/git-sync:v3.6.9 /dev/null 2>&1 | grep storage
# nothing
# check for artifact registry
$ crane pull --verbose gcr.io/k8s-staging-git-sync/git-sync:v3.6.9 /dev/null 2>&1 | grep /artifacts-downloads | head -n1
Location: /artifacts-downloads/namespaces/k8s-staging-git-sync/repositories/gcr.io/downloads/[snipped super long hash url] You, as an owner of it, can also browse to gcr.io/k8s-staging-git-sync and see that it redirects you to You don't need to do anything, there's some loose plans to migrate to AR domains, but it's not essential, for now it is migrated via https://cloud.google.com/artifact-registry/docs/transition/auto-migrate-gcr-ar and you don't need to do anything. |
I think we can close this. |
Uh oh!
There was an error while loading. Please reload this page.
Part of: #1343
Notes: https://gist.github.com/upodroid/a33723a7e1abc5e9c6fabc6b07e7aac0
When images are built after a PR is merged, they need to be pushed to Artifact Registry(AR).
Unlike Google Container Registry(GCR), you don't need a separate GCP project per staging project. The permission boundary is at the repository level instead of the project. This allows multiple registries to be created per project. Therefore, we will create a new project, start publishing images to it and delete the other projects after the transition.We will need to do the following:- create a new GCP project (k8s-artifacts-staging)
- create a docker image repository per project
- modify the jobs to push images to prow.
- Provision the infra with terraform. There is a separate issue open to deploy changes to terraform via Prow on merges.
Prod changes need to be done via the shell scripts which makes deploying staging via terraform kind of pointless.
Open questions:
@puerco
/area artifacts
/priority important-soon
/area release-eng
The text was updated successfully, but these errors were encountered: