Skip to content

Commit 9e661c8

Browse files
authored
Merge pull request #16200 from spowelljr/removeOldRegistry
Remove remaining references to k8s.gcr.io
2 parents 10bd017 + 8f47b1d commit 9e661c8

File tree

21 files changed

+69
-79
lines changed

21 files changed

+69
-79
lines changed

deploy/addons/gpu/nvidia-driver-installer.yaml.tmpl

+1-1
Original file line numberDiff line numberDiff line change
@@ -77,5 +77,5 @@ spec:
7777
- name: root-mount
7878
mountPath: /root
7979
containers:
80-
- image: "{{default "k8s.gcr.io" .ImageRepository}}/{{.Images.Pause}}"
80+
- image: "{{default "registry.k8s.io" .ImageRepository}}/{{.Images.Pause}}"
8181
name: pause

deploy/addons/gvisor/gvisor-config.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ oom_score = 0
2929
stream_server_address = ""
3030
stream_server_port = "10010"
3131
enable_selinux = false
32-
sandbox_image = "{{default "k8s.gcr.io" .ImageRepository}}/pause:3.1"
32+
sandbox_image = "{{default "registry.k8s.io" .ImageRepository}}/pause:3.1"
3333
stats_collect_period = 10
3434
systemd_cgroup = false
3535
enable_tls_streaming = false

deploy/iso/minikube-iso/arch/aarch64/package/containerd-bin-aarch64/config.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ oom_score = 0
3131
stream_server_address = ""
3232
stream_server_port = "10010"
3333
enable_selinux = false
34-
sandbox_image = "k8s.gcr.io/pause:3.6"
34+
sandbox_image = "registry.k8s.io/pause:3.6"
3535
stats_collect_period = 10
3636
enable_tls_streaming = false
3737
max_container_log_line_size = 16384

deploy/iso/minikube-iso/arch/x86_64/package/containerd-bin/config.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ oom_score = 0
3131
stream_server_address = ""
3232
stream_server_port = "10010"
3333
enable_selinux = false
34-
sandbox_image = "k8s.gcr.io/pause:3.6"
34+
sandbox_image = "registry.k8s.io/pause:3.6"
3535
stats_collect_period = 10
3636
enable_tls_streaming = false
3737
max_container_log_line_size = 16384

deploy/iso/minikube-iso/package/crio-bin/crio.conf

+1-1
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@ global_auth_file = ""
339339

340340
# The image used to instantiate infra containers.
341341
# This option supports live configuration reload.
342-
pause_image = "k8s.gcr.io/pause:3.2"
342+
pause_image = "registry.k8s.io/pause:3.2"
343343

344344
# The path to a file containing credentials specific for pulling the pause_image from
345345
# above. The file is similar to that of /var/lib/kubelet/config.json

deploy/iso/minikube-iso/package/crio-bin/crio.conf.default

+1-1
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@ global_auth_file = ""
339339

340340
# The image used to instantiate infra containers.
341341
# This option supports live configuration reload.
342-
pause_image = "k8s.gcr.io/pause:3.2"
342+
pause_image = "registry.k8s.io/pause:3.2"
343343

344344
# The path to a file containing credentials specific for pulling the pause_image from
345345
# above. The file is similar to that of /var/lib/kubelet/config.json

deploy/kicbase/containerd.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ oom_score = 0
3131
stream_server_address = ""
3232
stream_server_port = "10010"
3333
enable_selinux = false
34-
sandbox_image = "k8s.gcr.io/pause:3.6"
34+
sandbox_image = "registry.k8s.io/pause:3.6"
3535
stats_collect_period = 10
3636
enable_tls_streaming = false
3737
max_container_log_line_size = 16384

pkg/addons/addons.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -382,7 +382,7 @@ func supportLegacyIngress(addon *assets.Addon, cc config.ClusterConfig) error {
382382
"KubeWebhookCertgenPatch": "docker.io/jettech/kube-webhook-certgen:v1.5.1@sha256:950833e19ade18cd389d647efb88992a7cc077abedef343fa59e012d376d79b7",
383383
}
384384
addon.Registries = map[string]string{
385-
"IngressController": "k8s.gcr.io",
385+
"IngressController": "registry.k8s.io",
386386
}
387387
return nil
388388
}

pkg/minikube/assets/addons.go

+8-8
Original file line numberDiff line numberDiff line change
@@ -246,8 +246,8 @@ var Addons = map[string]*Addon{
246246
"Alpine": "alpine:3.6@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475",
247247
"Kibana": "kibana/kibana:5.6.2@sha256:cd948a9bda4622f1437afc4a3e78be6c8c25fc62f40aa0376f3d690f2436568f",
248248
}, map[string]string{
249-
"Elasticsearch": "k8s.gcr.io",
250-
"FluentdElasticsearch": "k8s.gcr.io",
249+
"Elasticsearch": "registry.k8s.io",
250+
"FluentdElasticsearch": "registry.k8s.io",
251251
"Kibana": "docker.elastic.co",
252252
"Alpine": "docker.io",
253253
}),
@@ -446,8 +446,8 @@ var Addons = map[string]*Addon{
446446
"NvidiaDriverInstaller": "minikube-nvidia-driver-installer:e2d9b43228decf5d6f7dce3f0a85d390f138fa01",
447447
"Pause": "pause:2.0@sha256:9ce5316f9752b8347484ab0f6778573af15524124d52b93230b9a0dcc987e73e",
448448
}, map[string]string{
449-
"NvidiaDriverInstaller": "k8s.gcr.io",
450-
"Pause": "k8s.gcr.io",
449+
"NvidiaDriverInstaller": "registry.k8s.io",
450+
"Pause": "registry.k8s.io",
451451
}),
452452
"nvidia-gpu-device-plugin": NewAddon([]*BinAsset{
453453
MustBinAsset(addons.NvidiaGpuDevicePluginAssets,
@@ -458,7 +458,7 @@ var Addons = map[string]*Addon{
458458
}, false, "nvidia-gpu-device-plugin", "3rd party (Nvidia)", "", "https://minikube.sigs.k8s.io/docs/tutorials/nvidia_gpu/", map[string]string{
459459
"NvidiaDevicePlugin": "nvidia-gpu-device-plugin@sha256:4b036e8844920336fa48f36edeb7d4398f426d6a934ba022848deed2edbf09aa",
460460
}, map[string]string{
461-
"NvidiaDevicePlugin": "k8s.gcr.io",
461+
"NvidiaDevicePlugin": "registry.k8s.io",
462462
}),
463463
"logviewer": NewAddon([]*BinAsset{
464464
MustBinAsset(addons.LogviewerAssets,
@@ -591,7 +591,7 @@ var Addons = map[string]*Addon{
591591
"GCPAuthWebhook": "k8s-minikube/gcp-auth-webhook:v0.0.14@sha256:60fc3f336083dcd0a472caa51edfbf497d4df37115bb65e2d12739ed461db925",
592592
}, map[string]string{
593593
"GCPAuthWebhook": "gcr.io",
594-
"KubeWebhookCertgen": "k8s.gcr.io",
594+
"KubeWebhookCertgen": "registry.k8s.io",
595595
}),
596596
"volumesnapshots": NewAddon([]*BinAsset{
597597
// make sure the order of apply. `csi-hostpath-snapshotclass` must be the first position, because it depends on `snapshot.storage.k8s.io_volumesnapshotclasses`
@@ -948,8 +948,8 @@ func GenerateTemplateData(addon *Addon, cc *config.ClusterConfig, netInfo Networ
948948
// tl;dr If the user specified a custom image remove the default registry
949949
// Without the line below, if you try to overwrite an image the default registry is still used in the templating
950950
// Example - image name: MetricsScraper, default registry: docker.io, default image: kubernetesui/metrics-scraper
951-
// Passed on addon enable: --images=MetricsScraper=k8s.gcr.io/echoserver:1.4
952-
// Without this line the resulting image would be docker.io/k8s.gcr.io/echoserver:1.4
951+
// Passed on addon enable: --images=MetricsScraper=registry.k8s.io/echoserver:1.4
952+
// Without this line the resulting image would be docker.io/registry.k8s.io/echoserver:1.4
953953
if _, ok := cc.CustomAddonImages[name]; ok {
954954
opts.Registries[name] = ""
955955
}

pkg/minikube/bootstrapper/images/images.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ import (
3434
)
3535

3636
const (
37-
// builds a docker v2 repository API call in the format https://k8s.gcr.io/v2/coredns/coredns/tags/list
37+
// builds a docker v2 repository API call in the format https://registry.k8s.io/v2/coredns/coredns/tags/list
3838
tagURLTemplate = "https://%s/v2/%s/tags/list"
3939
)
4040

@@ -70,7 +70,7 @@ func componentImage(name string, v semver.Version, mirror string) string {
7070
return fmt.Sprintf("%s:v%s", path.Join(kubernetesRepo(mirror), name), v)
7171
}
7272

73-
// fixes 13136 by getting the latest image version from the k8s.gcr.io repository instead of hardcoded
73+
// fixes 13136 by getting the latest image version from the registry.k8s.io repository instead of hardcoded
7474
func findLatestTagFromRepository(url string, lastKnownGood string) string {
7575
client := &http.Client{}
7676
errorMsg := fmt.Sprintf("Failed to get latest image version for %s, reverting to version %s.", url, lastKnownGood)

pkg/minikube/config/types.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ type ClusterConfig struct {
7676
KubernetesConfig KubernetesConfig
7777
Nodes []Node
7878
Addons map[string]bool
79-
CustomAddonImages map[string]string // Maps image names to the image to use for addons. e.g. Dashboard -> k8s.gcr.io/echoserver:1.4 makes dashboard addon use echoserver for its Dashboard deployment.
79+
CustomAddonImages map[string]string // Maps image names to the image to use for addons. e.g. Dashboard -> registry.k8s.io/echoserver:1.4 makes dashboard addon use echoserver for its Dashboard deployment.
8080
CustomAddonRegistries map[string]string // Maps image names to the registry to use for addons. See CustomAddonImages for example.
8181
VerifyComponents map[string]bool // map of components to verify and wait for after start.
8282
StartHostTimeout time.Duration

pkg/minikube/image/cache.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,8 @@ func DeleteFromCacheDir(images []string) error {
6161
// SaveToDir will cache images on the host
6262
//
6363
// The cache directory currently caches images using the imagename_tag
64-
// For example, k8s.gcr.io/kube-addon-manager:v6.5 would be
65-
// stored at $CACHE_DIR/k8s.gcr.io/kube-addon-manager_v6.5
64+
// For example, registry.k8s.io/kube-addon-manager:v6.5 would be
65+
// stored at $CACHE_DIR/registry.k8s.io/kube-addon-manager_v6.5
6666
func SaveToDir(images []string, cacheDir string, overwrite bool) error {
6767
var g errgroup.Group
6868
for _, image := range images {

pkg/minikube/reason/match_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ VBoxManage.exe: error: Details: code E_FAIL (0x80004005), component MachineWrap,
5353
{4913, "linux", "PR_KVM_CREATE_BUSY", `Unable to start VM: create: Error creating machine: Error in driver during machine creation: error creating VM: virError(Code=1, Domain=10, Message='internal error: process exited while connecting to monitor: ioctl(KVM_CREATE_VM) failed: 16 Device or resource busy`},
5454
{5950, "linux", "PR_KVM_ISO_PERMISSION", `Retriable failure: create: Error creating machine: Error in driver during machine creation: error creating VM: virError(Code=1, Domain=10, Message='internal error: qemu unexpectedly closed the monitor: 2019-11-19T16:08:16.757609Z qemu-kvm: -drive file=/home/lnicotra/.minikube/machines/minikube/boot2docker.iso,format=raw,if=none,id=drive-scsi0-0-0-2,readonly=on: could not open disk image /home/lnicotra/.minikube/machines/minikube/boot2docker.iso: Could not open '/home/lnicotra/.minikube/machines/minikube/boot2docker.iso': Permission denied'`},
5555
{5836, "", "SVC_OPEN_NOT_FOUND", `Error opening service: Service kubernetes-bootcamp was not found in "default" namespace. You may select another namespace by using 'minikube service kubernetes-bootcamp -n : Temporary Error: Error getting service kubernetes-bootcamp: services "kubernetes-bootcamp" not found`},
56-
{3898, "", "INET_PULL_TIMEOUT", `[ERROR ImagePull]: failed to pull image k8s.gcr.io/kube-controller-manager:v1.17.0: output: Error response from daemon: Get https://k8s.gcr.io/v2/: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)`},
56+
{3898, "", "INET_PULL_TIMEOUT", `[ERROR ImagePull]: failed to pull image registry.k8s.io/kube-controller-manager:v1.17.0: output: Error response from daemon: Get https://registry.k8s.io/v2/: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)`},
5757
{6079, "darwin", "PR_HYPERKIT_CRASHED", `Error creating machine: Error in driver during machine creation: hyperkit crashed! command line:`},
5858
{5636, "linux", "INET_DEFAULT_ROUTE", `Unable to get VM IP address: unable to select an IP from default routes.`},
5959
{6087, "", "GUEST_DOES_NOT_EXIST", `Error getting host status: state: machine does not exist`},

site/content/en/docs/contrib/tests.en.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@ Steps:
294294
asserts basic "service" command functionality
295295

296296
#### validateServiceCmdDeployApp
297-
Create a new `k8s.gcr.io/echoserver` deployment
297+
Create a new `registry.k8s.io/echoserver` deployment
298298

299299
#### validateServiceCmdList
300300
Run `minikube service list` to make sure the newly created service is correctly listed in the output
@@ -314,7 +314,7 @@ Run `minikube service` with a regular `--url` to make sure the HTTP endpoint URL
314314
#### validateServiceCmdConnect
315315

316316
Steps:
317-
- Create a new `k8s.gcr.io/echoserver` deployment
317+
- Create a new `registry.k8s.io/echoserver` deployment
318318
- Run `minikube service` with a regular `--url` to make sure the HTTP endpoint URL of the service is printed
319319
- Make sure we can hit the endpoint URL with an HTTP GET request
320320

site/content/en/docs/handbook/addons/custom-images.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ minikube addons images efk
1919
|----------------------|------------------------------|-------------------|
2020
| IMAGE NAME | DEFAULT IMAGE | DEFAULT REGISTRY |
2121
|----------------------|------------------------------|-------------------|
22-
| Elasticsearch | elasticsearch:v5.6.2 | k8s.gcr.io |
23-
| FluentdElasticsearch | fluentd-elasticsearch:v2.0.2 | k8s.gcr.io |
22+
| Elasticsearch | elasticsearch:v5.6.2 | registry.k8s.io |
23+
| FluentdElasticsearch | fluentd-elasticsearch:v2.0.2 | registry.k8s.io |
2424
| Alpine | alpine:3.6 | |
2525
| Kibana | kibana/kibana:5.6.2 | docker.elastic.co |
2626
|----------------------|------------------------------|-------------------|
@@ -31,7 +31,7 @@ An empty registry means the image is stored locally or default registry `docker.
3131

3232
The `IMAGE NAME` column is used to customize the corresponding image and registry.
3333

34-
Assume we have a private registry at `192.168.10.2:5555` to replace `k8s.gcr.io` and a locally built Kibana called `kibana/kibana:5.6.2-custom`.
34+
Assume we have a private registry at `192.168.10.2:5555` to replace `registry.k8s.io` and a locally built Kibana called `kibana/kibana:5.6.2-custom`.
3535

3636
We could load local images to minikube by:
3737

@@ -54,4 +54,4 @@ minikube addons enable efk --images="Kibana=kibana/kibana:5.6.2-custom" --regist
5454
🌟 The 'efk' addon is enabled
5555
```
5656

57-
Now the `efk` addon is using the custom registry and images.
57+
Now the `efk` addon is using the custom registry and images.

site/content/en/docs/handbook/offline.md

+10-20
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,11 @@ description: >
1010
minikube has built-in support for caching downloaded resources into `$MINIKUBE_HOME/cache`. Here are the important file locations:
1111

1212
* `~/.minikube/cache` - Top-level folder
13-
* `~/.minikube/cache/iso` - VM ISO image. Typically updated once per major minikube release.
14-
* `~/.minikube/cache/images` - Docker images used by Kubernetes.
15-
* `~/.minikube/cache/<version>` - Kubernetes binaries, such as `kubeadm` and `kubelet`
13+
* `~/.minikube/cache/iso/<arch>` - VM ISO image. Typically updated once per major minikube release.
14+
* `~/.minikube/cache/kic/<arch>` - Docker base image. Typically updated once per major minikube release.
15+
* `~/.minikube/cache/images/<arch>` - Images used by Kubernetes, only exists if preload doesn't exist.
16+
* `~/.minikube/cache/<os>/<arch>/<version>` - Kubernetes binaries, such as `kubeadm` and `kubelet`
17+
* `~/.minikube/cache/preloaded-tarball` - Tarball of preloaded images to improve start time
1618

1719
## Kubernetes image cache
1820

@@ -22,25 +24,13 @@ NOTE: the `none` driver caches images directly into Docker rather than a separat
2224

2325
## Sharing the minikube cache
2426

25-
For offline use on other hosts, one can copy the contents of `~/.minikube/cache`. As of the v1.0 release, this directory contains 685MB of data:
27+
For offline use on other hosts, one can copy the contents of `~/.minikube/cache`.
2628

2729
```text
28-
cache/iso/minikube-v1.0.0.iso
29-
cache/images/gcr.io/k8s-minikube/storage-provisioner_v1.8.1
30-
cache/images/k8s.gcr.io/k8s-dns-sidecar-amd64_1.14.13
31-
cache/images/k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64_1.14.13
32-
cache/images/k8s.gcr.io/kubernetes-dashboard-amd64_v1.10.1
33-
cache/images/k8s.gcr.io/kube-scheduler_v1.14.0
34-
cache/images/k8s.gcr.io/coredns_1.3.1
35-
cache/images/k8s.gcr.io/kube-controller-manager_v1.14.0
36-
cache/images/k8s.gcr.io/kube-apiserver_v1.14.0
37-
cache/images/k8s.gcr.io/pause_3.1
38-
cache/images/k8s.gcr.io/etcd_3.3.10
39-
cache/images/k8s.gcr.io/kube-addon-manager_v9.0
40-
cache/images/k8s.gcr.io/k8s-dns-kube-dns-amd64_1.14.13
41-
cache/images/k8s.gcr.io/kube-proxy_v1.14.0
42-
cache/v1.14.0/kubeadm
43-
cache/v1.14.0/kubelet
30+
cache/linux/amd64/v1.26.1/kubectl
31+
cache/kic/amd64/kicbase_v0.0.37@sha256_8bf7a0e8a062bc5e2b71d28b35bfa9cc862d9220e234e86176b3785f685d8b15.tar
32+
cache/preloaded-tarball/preloaded-images-k8s-v18-v1.26.1-docker-overlay2-amd64.tar.lz4
33+
cache/preloaded-tarball/preloaded-images-k8s-v18-v1.26.1-docker-overlay2-amd64.tar.lz4.checksum
4434
```
4535

4636
If any of these files exist, minikube will use copy them into the VM directly rather than pulling them from the internet.

site/content/en/docs/handbook/pushing.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -392,7 +392,7 @@ buildctl --addr unix://buildkitd.sock build \
392392
--frontend=dockerfile.v0 \
393393
--local context=. \
394394
--local dockerfile=. \
395-
--output type=image,name=k8s.gcr.io/username/imagename:latest
395+
--output type=image,name=registry.k8s.io/username/imagename:latest
396396
```
397397

398398
Now you can 'build' against the storage inside minikube. which is instantly accessible to kubernetes cluster.

site/content/en/docs/handbook/vpn_and_proxy.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -72,8 +72,8 @@ This error indicates that the host:port combination defined by HTTPS_PROXY or HT
7272
```text
7373
Unable to pull images, which may be OK:
7474
75-
failed to pull image "k8s.gcr.io/kube-apiserver:v1.13.3": output: Error response from daemon:
76-
Get https://k8s.gcr.io/v2/: net/http: request canceled while waiting for connection
75+
failed to pull image "registry.k8s.io/kube-apiserver:v1.13.3": output: Error response from daemon:
76+
Get https://registry.k8s.io/v2/: net/http: request canceled while waiting for connection
7777
(Client.Timeout exceeded while awaiting headers)
7878
```
7979

@@ -82,9 +82,9 @@ This error indicates that the container runtime running within the VM does not h
8282
#### x509: certificate signed by unknown authority
8383

8484
```text
85-
[ERROR ImagePull]: failed to pull image k8s.gcr.io/kube-apiserver:v1.13.3:
85+
[ERROR ImagePull]: failed to pull image registry.k8s.io/kube-apiserver:v1.13.3:
8686
output: Error response from daemon:
87-
Get https://k8s.gcr.io/v2/: x509: certificate signed by unknown authority
87+
Get https://registry.k8s.io/v2/: x509: certificate signed by unknown authority
8888
```
8989

9090
This is because minikube VM is stuck behind a proxy that rewrites HTTPS responses to contain its own TLS certificate. The [solution](https://github.com/kubernetes/minikube/issues/3613#issuecomment-461034222) is to install the proxy certificate into a location that is copied to the VM at startup, so that it can be validated.

0 commit comments

Comments
 (0)