From b23a5007fbd250b69ae72b3153a7841e59644e29 Mon Sep 17 00:00:00 2001 From: Claudiu Belu Date: Sun, 20 Jun 2021 04:23:03 -0700 Subject: [PATCH] tests: Adds e2e-test-auth-img project The gcr.io/k8s-staging-e2e-test-auth-img and gcr.io/kubernetes-e2e-test-auth-img registries are meant to be private, to be used in a few E2E test scenarios, and it is meant to replace the gcr.io/authenticated-image-pulling. An auth token with read-only access will have to be generated afterwards, and then baked into the E2E tests. --- groups/sig-testing/groups.yaml | 14 ++++++++++++++ infra/gcp/infra.yaml | 1 + .../images/k8s-staging-e2e-test-auth-img/OWNERS | 16 ++++++++++++++++ .../k8s-staging-e2e-test-auth-img/images.yaml | 1 + .../promoter-manifest.yaml | 10 ++++++++++ 5 files changed, 42 insertions(+) create mode 100644 k8s.gcr.io/images/k8s-staging-e2e-test-auth-img/OWNERS create mode 100644 k8s.gcr.io/images/k8s-staging-e2e-test-auth-img/images.yaml create mode 100644 k8s.gcr.io/manifests/k8s-staging-e2e-test-auth-img/promoter-manifest.yaml diff --git a/groups/sig-testing/groups.yaml b/groups/sig-testing/groups.yaml index 1e3feefbaf7..65ae6576e9d 100644 --- a/groups/sig-testing/groups.yaml +++ b/groups/sig-testing/groups.yaml @@ -47,6 +47,20 @@ groups: - jgrafton@google.com - skuznets@redhat.com + - email-id: k8s-infra-staging-e2e-test-auth-img@kubernetes.io + name: k8s-infra-staging-e2e-test-auth-img + description: |- + Group that owns pushing rights to the gcr.io/k8s-staging-e2e-test-auth-img staging registry + settings: + ReconcileMembers: "true" + members: + - bentheelder@google.com + - davanum@gmail.com + - linusa@google.com + - mkumatag@in.ibm.com + - spiffxp@google.com + - spiffxp@gmail.com + - email-id: k8s-infra-staging-e2e-test-images@kubernetes.io name: k8s-infra-staging-e2e-test-images description: |- diff --git a/infra/gcp/infra.yaml b/infra/gcp/infra.yaml index 16e9c5b10fe..b5cd9718014 100644 --- a/infra/gcp/infra.yaml +++ b/infra/gcp/infra.yaml @@ -280,6 +280,7 @@ infra: k8s-staging-csi-secrets-store: k8s-staging-descheduler: k8s-staging-dns: + k8s-staging-e2e-test-auth-img: k8s-staging-e2e-test-images: k8s-staging-etcd: k8s-staging-etcdadm: diff --git a/k8s.gcr.io/images/k8s-staging-e2e-test-auth-img/OWNERS b/k8s.gcr.io/images/k8s-staging-e2e-test-auth-img/OWNERS new file mode 100644 index 00000000000..13df266b657 --- /dev/null +++ b/k8s.gcr.io/images/k8s-staging-e2e-test-auth-img/OWNERS @@ -0,0 +1,16 @@ +# See the OWNERS docs at https://go.k8s.io/owners + +approvers: +- BenTheElder +- dims +- listx +- mkumatag +- spiffxp +reviewers: +- BenTheElder +- dims +- listx +- mkumatag +- spiffxp +labels: +- sig/testing diff --git a/k8s.gcr.io/images/k8s-staging-e2e-test-auth-img/images.yaml b/k8s.gcr.io/images/k8s-staging-e2e-test-auth-img/images.yaml new file mode 100644 index 00000000000..d48c82d0a75 --- /dev/null +++ b/k8s.gcr.io/images/k8s-staging-e2e-test-auth-img/images.yaml @@ -0,0 +1 @@ +# No images yet diff --git a/k8s.gcr.io/manifests/k8s-staging-e2e-test-auth-img/promoter-manifest.yaml b/k8s.gcr.io/manifests/k8s-staging-e2e-test-auth-img/promoter-manifest.yaml new file mode 100644 index 00000000000..942000403c3 --- /dev/null +++ b/k8s.gcr.io/manifests/k8s-staging-e2e-test-auth-img/promoter-manifest.yaml @@ -0,0 +1,10 @@ +# google group for gcr.io/k8s-staging-e2e-test-auth-img is k8s-infra-staging-e2e-test-auth-img@kubernetes.io +registries: +- name: gcr.io/k8s-staging-e2e-test-auth-img + src: true +- name: us.gcr.io/k8s-artifacts-prod/e2e-test-auth-img + service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com +- name: eu.gcr.io/k8s-artifacts-prod/e2e-test-auth-img + service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com +- name: asia.gcr.io/k8s-artifacts-prod/e2e-test-auth-img + service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com