Skip to content

Commit

Permalink
Merge pull request #1989 from asa3311/Replace-k8s.gcr.io-references-w…
Browse files Browse the repository at this point in the history
…ith-registry.k8s.io

Replace k8s.gcr.io references with registry.k8s.io
  • Loading branch information
k8s-ci-robot authored Mar 7, 2023
2 parents 75f14a0 + 5037451 commit cf28a24
Show file tree
Hide file tree
Showing 9 changed files with 10 additions and 10 deletions.
4 changes: 2 additions & 2 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -926,7 +926,7 @@
- URL map / backend service mapping is totally shuffled [\#555](https://github.com/kubernetes/ingress-gce/issues/555)
- Backend health is reported as "Unknown" if there are no pods in the first zone of a regional cluster [\#554](https://github.com/kubernetes/ingress-gce/issues/554)
- Ingress controller does not support HTTP2 with mutual TLS [\#553](https://github.com/kubernetes/ingress-gce/issues/553)
- ErrImagePull: k8s.gcr.io/defaultbackend:1.5 not found [\#549](https://github.com/kubernetes/ingress-gce/issues/549)
- ErrImagePull: registry.k8s.io/defaultbackend:1.5 not found [\#549](https://github.com/kubernetes/ingress-gce/issues/549)
- configure maxRatePerInstance in backend [\#545](https://github.com/kubernetes/ingress-gce/issues/545)
- GKE BackendConfig permissions change `container.backendConfigs.get` does not exist [\#538](https://github.com/kubernetes/ingress-gce/issues/538)
- A new home for 404-server \(defaultbackend\) [\#498](https://github.com/kubernetes/ingress-gce/issues/498)
Expand Down Expand Up @@ -1054,7 +1054,7 @@
- URL map / backend service mapping is totally shuffled [\#555](https://github.com/kubernetes/ingress-gce/issues/555)
- Backend health is reported as "Unknown" if there are no pods in the first zone of a regional cluster [\#554](https://github.com/kubernetes/ingress-gce/issues/554)
- Ingress controller does not support HTTP2 with mutual TLS [\#553](https://github.com/kubernetes/ingress-gce/issues/553)
- ErrImagePull: k8s.gcr.io/defaultbackend:1.5 not found [\#549](https://github.com/kubernetes/ingress-gce/issues/549)
- ErrImagePull: registry.k8s.io/defaultbackend:1.5 not found [\#549](https://github.com/kubernetes/ingress-gce/issues/549)
- configure maxRatePerInstance in backend [\#545](https://github.com/kubernetes/ingress-gce/issues/545)
- GKE BackendConfig permissions change `container.backendConfigs.get` does not exist [\#538](https://github.com/kubernetes/ingress-gce/issues/538)
- A new home for 404-server \(defaultbackend\) [\#498](https://github.com/kubernetes/ingress-gce/issues/498)
Expand Down
2 changes: 1 addition & 1 deletion docs/deploy/gke/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ For other options, see the `--help` output.

Can speed things up if you've already pushed an image (or want to use a specific
version) with `--image-url PATH` (eg,
`--image-url k8s.gcr.io/ingress-gce-glbc-amd64:v1.5.2`). Can also set the `REGISTRY`
`--image-url registry.k8s.io/ingress-gce-glbc-amd64:v1.5.2`). Can also set the `REGISTRY`
env var to provide a custom place to push your image to if it's not the same project
as your cluster is in. The tags pushed to will be that of the
`git describe --tags --always --dirty` command. If the `VERSION` env var is set, that
Expand Down
2 changes: 1 addition & 1 deletion docs/deploy/gke/csm/default-http-backend.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ spec:
# Any image is permissible as long as:
# 1. It serves a 404 page at /
# 2. It serves 200 on a /healthz endpoint
image: k8s.gcr.io/defaultbackend-amd64:1.5
image: registry.k8s.io/defaultbackend-amd64:1.5
livenessProbe:
httpGet:
path: /healthz
Expand Down
2 changes: 1 addition & 1 deletion docs/deploy/gke/csm/glbc.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ spec:
serviceAccountName: glbc
terminationGracePeriodSeconds: 600
containers:
- image: k8s.gcr.io/ingress-gce-glbc-amd64:v1.8.0
- image: registry.k8s.io/ingress-gce-glbc-amd64:v1.8.0
livenessProbe:
httpGet:
path: /healthz
Expand Down
2 changes: 1 addition & 1 deletion docs/deploy/gke/non-gcp/default-http-backend.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ spec:
# Any image is permissible as long as:
# 1. It serves a 404 page at /
# 2. It serves 200 on a /healthz endpoint
image: k8s.gcr.io/defaultbackend-amd64:1.5
image: registry.k8s.io/defaultbackend-amd64:1.5
livenessProbe:
httpGet:
path: /healthz
Expand Down
2 changes: 1 addition & 1 deletion docs/deploy/gke/non-gcp/glbc.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ spec:
terminationGracePeriodSeconds: 600
hostNetwork: true
containers:
- image: k8s.gcr.io/ingress-gce-glbc-amd64:v1.8.0
- image: registry.k8s.io/ingress-gce-glbc-amd64:v1.8.0
livenessProbe:
httpGet:
path: /healthz
Expand Down
2 changes: 1 addition & 1 deletion docs/deploy/resources/default-http-backend.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ spec:
# Any image is permissible as long as:
# 1. It serves a 404 page at /
# 2. It serves 200 on a /healthz endpoint
image: k8s.gcr.io/defaultbackend-amd64:1.5
image: registry.k8s.io/defaultbackend-amd64:1.5
livenessProbe:
httpGet:
path: /healthz
Expand Down
2 changes: 1 addition & 1 deletion docs/troubleshooting/troubleshooting.md
Original file line number Diff line number Diff line change
Expand Up @@ -250,7 +250,7 @@ spec:
terminationGracePeriodSeconds: 60
containers:
- name: default-http-backend
image: k8s.gcr.io/defaultbackend:1.5
image: registry.k8s.io/defaultbackend:1.5
volumeMounts:
- mountPath: /etc/kubernetes
name: kubeconfig
Expand Down
2 changes: 1 addition & 1 deletion pkg/e2e/fixtures.go
Original file line number Diff line number Diff line change
Expand Up @@ -439,7 +439,7 @@ func CreatePorterDeployment(s *Sandbox, name string, replicas int32, version str
Containers: []apiv1.Container{
{
Name: "hostname",
Image: "k8s.gcr.io/e2e-test-images/agnhost:2.32",
Image: "registry.k8s.io/e2e-test-images/agnhost:2.32",
Args: []string{"porter"},
Env: []apiv1.EnvVar{{Name: env, Value: env}},
Ports: []apiv1.ContainerPort{{Name: "server", ContainerPort: porterPort}},
Expand Down

0 comments on commit cf28a24

Please sign in to comment.