-
Notifications
You must be signed in to change notification settings - Fork 827
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Registries used in k/k CI should be on Kubernetes Community infra #1458
Comments
/sig testing |
/milestone v1.21 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten |
this and the other authenticated test repo are pretty much the worst, and just an overall antipattern
at this point this is basically only used to setup GPUs on GCE, the problem with exiting this one is thorny licensing, we're not depending on it in test cases, release artifacts, etc, just setting up GPUs on kube-up.sh we could probably figure it out, but I'm not sure it's worth it. we're always going to be dependent on a third-party for the forseeable future on gpu setup, and we only have like one job using this. the authenticated test tests are not great, and I'm leaning towards we should just delete the tests due to lack of response on sorting out a sustainable alternative (which would require input from the owners of the code under test) hosting a public endpoint with hardcoded login / service account key in the test binaries was a terrible hack and not something we should replicate or continue to depend on, regardless of who owns it. if someone wanted to rebuild these tests they could create an in-cluster registry with auth or something (running on hostnet?) see also: kubernetes/kubernetes#97026, kubernetes/kubernetes#113925 |
ref: @spiffxp at kubernetes/kubernetes#97002 (comment):
gcr.io/k8s-authenticated-test
is the specific case here, but we should try to cover as many as we find./assign
/sig release
/area release-eng artifacts
cc: @kubernetes/release-engineering @kubernetes/ci-signal @thockin
Tagging since they also expressed interest:
@thejoycekung @jeremyrickard @aojea
EDIT(@spiffxp): Broke down into issues per GCP project
And not a GCP project, but
The text was updated successfully, but these errors were encountered: