Merge pull request #40585 from xmudrii/k8s.gcr.io-removal
[en] Replace k8s.gcr.io with registry.k8s.io in blogspull/41180/head
commit
628cfd7971
|
@ -119,8 +119,8 @@ Here are some of the images we built:
|
|||
- `gcr.io/kubernetes-e2e-test-images/volume/iscsi:2.0`
|
||||
- `gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0`
|
||||
- `gcr.io/kubernetes-e2e-test-images/volume/rbd:1.0.1`
|
||||
- `k8s.gcr.io/etcd:3.3.15`
|
||||
- `k8s.gcr.io/pause:3.1`
|
||||
- `registry.k8s.io/etcd:3.3.15` (image changed since publication - previously used registry "k8s.gcr.io")
|
||||
- `registry.k8s.io/pause:3.1` (image changed since publication - previously used registry "k8s.gcr.io")
|
||||
|
||||
Finally, we ran the tests and got the test result, include `e2e.log`, which showed that all test cases passed. Additionally, we submitted our test result to [k8s-conformance](https://github.com/cncf/k8s-conformance) as a [pull request](https://github.com/cncf/k8s-conformance/pull/779).
|
||||
|
||||
|
|
|
@ -69,7 +69,7 @@ in `CredentialProviderResponse`. When the value is `Image`, the kubelet will onl
|
|||
match the image of the first request. When the value is `Registry`, the kubelet will use cached credentials for any subsequent image pulls
|
||||
destined for the same registry host but using different paths (for example, `gcr.io/foo/bar` and `gcr.io/bar/foo` refer to different images
|
||||
from the same registry). Lastly, when the value is `Global`, the kubelet will use returned credentials for all images that match against
|
||||
the plugin, including images that can map to different registry hosts (for example, gcr.io vs k8s.gcr.io). The `cacheKeyType` field is required by plugin
|
||||
the plugin, including images that can map to different registry hosts (for example, gcr.io vs registry.k8s.io (previously k8s.gcr.io)). The `cacheKeyType` field is required by plugin
|
||||
implementations.
|
||||
|
||||
```json
|
||||
|
|
Loading…
Reference in New Issue