Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[VDF] anago: Publish container images on K8s Infra (k8s-staging-kubernetes) #1199

Merged
merged 4 commits into from
Apr 1, 2020

Conversation

justaugustus
Copy link
Member

@justaugustus justaugustus commented Mar 19, 2020

What type of PR is this?

/kind feature

What this PR does / why we need it:

As part of the vanity domain flip, we need to be able to publish container images on K8s Infra.
As a domain restriction organization policy is in place on the Google Infra projects, we cannot
completely move staging to K8s Infra until dl.k8s.io is moved as well (both the redirect AND the GCS bucket contents).

So in the meantime, we will instead run the GCB stage/release jobs within the current kubernetes-release-test GCP project and grant its GCB service account access to write container images into the new k8s-staging-kubernetes staging project.

(Part of the larger effort to move to the stage/release process to K8s Infra: #911)

Special notes for your reviewer:

Blocked on kubernetes/k8s.io#673.

Does this PR introduce a user-facing change?

[VDF] anago: Publish container images on K8s Infra (k8s-staging-kubernetes)

@k8s-ci-robot k8s-ci-robot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Mar 19, 2020
@k8s-ci-robot
Copy link
Contributor

@justaugustus: Adding label: do-not-merge/blocked-paths because PR changes a protected file.

Reasons for blocking this PR:

[Changes to certain release tools can affect our ability to test, build, and release Kubernetes. This PR must be explicitly approved by SIG Release repo admins.]

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added do-not-merge/blocked-paths Indicates that a PR should not merge because it touches files in blocked paths. do-not-merge/release-note-label-needed Indicates that a PR should not merge because it's missing one of the release note labels. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-kind Indicates a PR lacks a `kind/foo` label and requires one. needs-priority size/M Denotes a PR that changes 30-99 lines, ignoring generated files. approved Indicates a PR has been approved by an approver from all required OWNERS files. area/release-eng Issues or PRs related to the Release Engineering subproject sig/release Categorizes an issue or PR as relevant to SIG Release. labels Mar 19, 2020
@justaugustus justaugustus changed the title [WIP] Vdf [WIP] anago: Publish container images on K8s Infra (k8s-staging-kubernetes) Mar 19, 2020
@justaugustus justaugustus changed the title [WIP] anago: Publish container images on K8s Infra (k8s-staging-kubernetes) [WIP] [VDF] anago: Publish container images on K8s Infra (k8s-staging-kubernetes) Mar 19, 2020
@k8s-ci-robot k8s-ci-robot added release-note Denotes a PR that will be considered when it comes time to generate release notes. kind/feature Categorizes issue or PR as related to a new feature. and removed do-not-merge/release-note-label-needed Indicates that a PR should not merge because it's missing one of the release note labels. needs-kind Indicates a PR lacks a `kind/foo` label and requires one. labels Mar 19, 2020
@justaugustus
Copy link
Member Author

Current failure:

================================================================================
CHECK PREREQUISITES  (1/6)
================================================================================

Checking required system packages: OK
Checking required PIP packages: OK
Skipping security_layer::auth_check...
Checking Docker version: OK
Verifying Docker CLI Experimental status: OK
Checking write access to registry gcr.io/k8s-staging-kubernetes: FAILED
[2020-Mar-19 20:16:34 UTC] check_prerequisites in 3s
FAILED in check_prerequisites.

RELEASE INCOMPLETE! Exiting...


anago: DONE main on ea8008d8b31e Thu Mar 19 20:16:34 UTC 2020 in 3s

Needs kubernetes/k8s.io#673.

@k8s-ci-robot k8s-ci-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. and removed size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Mar 30, 2020
Copy link
Member

@cpanato cpanato left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

Comment on lines 1047 to 1048
arches=($(ls "$release_images"))
for arch in "${arches[@]}"; do
Copy link

@bartsmykla bartsmykla Mar 30, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you can do:

for arch in ${release_images}/*; do

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I went with:

  mapfile -t arches < <(find "${release_images}" -maxdepth 1 -mindepth 1 -type d -exec basename {} \;)
  for arch in "${arches[@]}"; do

based on the guidance in shellcheck SC2207: https://github.com/koalaman/shellcheck/wiki/SC2207

Using find and basename takes some of the unexpected * behavior out of the equation.

lib/releaselib.sh Outdated Show resolved Hide resolved
lib/releaselib.sh Outdated Show resolved Hide resolved
lib/releaselib.sh Outdated Show resolved Hide resolved
lib/releaselib.sh Outdated Show resolved Hide resolved
# @param version - version tag
# @param build_output - build output directory
# @return 1 on failure
release::docker::validate_remote_manifests () {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I know in other places in this file it's not being checked but when you are writing new one you should check if the function receives enough arguments it expects and if not fail.

Copy link
Member Author

@justaugustus justaugustus Mar 30, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks! I've added common::argc_validate to both functions. :)

Comment on lines 1164 to 1167
if ! skopeo inspect "docker://${image}:${version}" --raw >/dev/null 2>&1; then
logecho "Could not find manifest list for ${image}:${version}"
return 1
else
manifest=$(skopeo inspect "docker://${image}:${version}" --raw)
fi

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Have you tried:

    manifest=$(skopeo inspect "docker://${image}:${version}" --raw >/dev/null 2>&1)
    if [ $? ]; then
      logecho "Could not find manifest list for ${image}:${version}"
      return 1
    fi

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I opted for a bit of a combination of the two:

    if ! manifest=$(skopeo inspect "docker://${image}:${version}" --raw); then
      logecho "Could not find manifest list for ${image}:${version}"
      return 1
    fi

See the guidance on shellcheck SC2181: https://github.com/koalaman/shellcheck/wiki/SC2181

@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Mar 30, 2020
Here we add 'release::docker::validate_remote_manifests()', a function
which validates the existence of image manifests on a remote registry
by doing the following:
- Using 'skopeo inspect' to retrieve an image manifest
- Looping through the architectures and checking for an
  architecture-specific digest within the manifest using jq

We do some minor cleanup by using 'find' and 'basename' to populate
arrays for 'for' loops.

Additionally, we validate the correct amount of arguments for
'release::docker::validate_remote_manifests()' and
'release::docker::release()' using 'common::argc_validate'.

This function closely resembles 'release::docker::release()' and could
probably be consolidated. We make the decision to not do this refactor
here to minimize the changes to surrounding functions.

Signed-off-by: Stephen Augustus <saugustus@vmware.com>
@justaugustus
Copy link
Member Author

@bartsmykla -- Thanks for the great review! I've implement some of your suggestions. :)

@justaugustus
Copy link
Member Author

Successfully tested this earlier today...

  • Mock stage

  • Mock release:

    ================================================================================
    PUSH BINARY RELEASE ARTIFACTS alpha (12/14)
    ================================================================================
    
    Bucket-to-bucket copy gs://kubernetes-release-gcb/stage/v1.19.0-alpha.1.114+e178cacb974e9b/v1.19.0-alpha.2/gcs-stage artifacts to gs://kubernetes-release-gcb/release/v1.19.0-alpha.2: OK
    Copy staged kubernetes.tar.gz to /workspace/anago-v1.19.0-alpha.2/src/k8s.io/kubernetes/_output-v1.19.0-alpha.2/gcs-stage/v1.19.0-alpha.2: OK
    Copy staged docker images to /workspace/anago-v1.19.0-alpha.2/src/k8s.io/kubernetes/_output-v1.19.0-alpha.2/release-images: OK
    [2020-Mar-30 16:48:31 UTC] copy_staged_from_gcs in 22s
    Send docker containers from release-images to gcr.io/k8s-staging-kubernetes...
    Pushing gcr.io/k8s-staging-kubernetes/conformance-amd64:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-apiserver-amd64:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-controller-manager-amd64:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-proxy-amd64:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-scheduler-amd64:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/conformance-s390x:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-apiserver-s390x:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-controller-manager-s390x:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-proxy-s390x:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-scheduler-s390x:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/conformance-ppc64le:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-apiserver-ppc64le:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-controller-manager-ppc64le:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-proxy-ppc64le:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-scheduler-ppc64le:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/conformance-arm:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-apiserver-arm:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-controller-manager-arm:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-proxy-arm:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-scheduler-arm:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/conformance-arm64:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-apiserver-arm64:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-controller-manager-arm64:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-proxy-arm64:v1.19.0-alpha.2: OK
    Pushing gcr.io/k8s-staging-kubernetes/kube-scheduler-arm64:v1.19.0-alpha.2: OK
    Creating manifest image
    gcr.io/k8s-staging-kubernetes/kube-controller-manager:v1.19.0-alpha.2...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-controller-manager-amd64:v1.19.0-alpha.2
    with --arch amd64...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-controller-manager-s390x:v1.19.0-alpha.2
    with --arch s390x...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-controller-manager-ppc64le:v1.19.0-alpha.2
    with --arch ppc64le...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-controller-manager-arm:v1.19.0-alpha.2
    with --arch arm...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-controller-manager-arm64:v1.19.0-alpha.2
    with --arch arm64...
    OK
    Pushing manifest image
    gcr.io/k8s-staging-kubernetes/kube-controller-manager:v1.19.0-alpha.2...
    OK
    Creating manifest image gcr.io/k8s-staging-kubernetes/kube-scheduler:v1.19.0-alpha.2...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-scheduler-amd64:v1.19.0-alpha.2 with
    --arch amd64...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-scheduler-s390x:v1.19.0-alpha.2 with
    --arch s390x...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-scheduler-ppc64le:v1.19.0-alpha.2 with
    --arch ppc64le...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-scheduler-arm:v1.19.0-alpha.2 with
    --arch arm...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-scheduler-arm64:v1.19.0-alpha.2 with
    --arch arm64...
    OK
    Pushing manifest image gcr.io/k8s-staging-kubernetes/kube-scheduler:v1.19.0-alpha.2...
    OK
    Creating manifest image gcr.io/k8s-staging-kubernetes/kube-apiserver:v1.19.0-alpha.2...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-apiserver-amd64:v1.19.0-alpha.2 with
    --arch amd64...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-apiserver-s390x:v1.19.0-alpha.2 with
    --arch s390x...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-apiserver-ppc64le:v1.19.0-alpha.2 with
    --arch ppc64le...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-apiserver-arm:v1.19.0-alpha.2 with
    --arch arm...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-apiserver-arm64:v1.19.0-alpha.2 with
    --arch arm64...
    OK
    Pushing manifest image gcr.io/k8s-staging-kubernetes/kube-apiserver:v1.19.0-alpha.2...
    OK
    Creating manifest image gcr.io/k8s-staging-kubernetes/conformance:v1.19.0-alpha.2...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/conformance-amd64:v1.19.0-alpha.2 with
    --arch amd64...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/conformance-s390x:v1.19.0-alpha.2 with
    --arch s390x...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/conformance-ppc64le:v1.19.0-alpha.2 with
    --arch ppc64le...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/conformance-arm:v1.19.0-alpha.2 with --arch
    arm...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/conformance-arm64:v1.19.0-alpha.2 with
    --arch arm64...
    OK
    Pushing manifest image gcr.io/k8s-staging-kubernetes/conformance:v1.19.0-alpha.2...
    OK
    Creating manifest image gcr.io/k8s-staging-kubernetes/kube-proxy:v1.19.0-alpha.2...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-proxy-amd64:v1.19.0-alpha.2 with --arch
    amd64...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-proxy-s390x:v1.19.0-alpha.2 with --arch
    s390x...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-proxy-ppc64le:v1.19.0-alpha.2 with
    --arch ppc64le...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-proxy-arm:v1.19.0-alpha.2 with --arch
    arm...
    OK
    Annotating gcr.io/k8s-staging-kubernetes/kube-proxy-arm64:v1.19.0-alpha.2 with --arch
    arm64...
    OK
    Pushing manifest image gcr.io/k8s-staging-kubernetes/kube-proxy:v1.19.0-alpha.2...
    OK
    [2020-Mar-30 16:54:53 UTC] release::docker::release in 6m22s
    Validating image manifests in gcr.io/k8s-staging-kubernetes...
    Validating manifest list exists for
    gcr.io/k8s-staging-kubernetes/kube-controller-manager:v1.19.0-alpha.2...
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on
    amd64 architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on amd64:
    sha256:db39249cfc8c87eb829d7f88af1963ede4b7e53bf085efe04f1ecdec5af80e6c
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on
    s390x architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on s390x:
    sha256:decad4710630a0e1896d4f1cc27c63cf652e18b20ed8441caeb4b4800e5596a1
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on
    ppc64le architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on ppc64le:
    sha256:e0397742ece30a7de541a1261cb47f2ab1a89869d5828473340bac17dd15e1ee
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on
    arm architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on arm:
    sha256:266cf26642843b50712a585cb351bc9b2b23ea5b566403a1dc217ff33881f532
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on
    arm64 architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-controller-manager on arm64:
    sha256:bfa06292270c664272c2a9e8067b0406cde44742e0c3d7fd0eca0e453fa932d4
    Validating manifest list exists for
    gcr.io/k8s-staging-kubernetes/kube-scheduler:v1.19.0-alpha.2...
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on amd64
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on amd64:
    sha256:e031e82e707e82a0ab290a81249b8d2db254ca8c7cc50106b0701b5150a8fe55
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on s390x
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on s390x:
    sha256:988abdf28d66b97b7188ff0fe60b264451b0005c9d11eb4ea98bc62a06ebc6f4
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on ppc64le
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on ppc64le:
    sha256:5ee7a8bc5720330481bbe5ff7be6407b049f97b169e71d2d5ff17fd6c9b17563
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on arm
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on arm:
    sha256:0ebd78b94db993748a542a82252e407747f2bc914a97afb0c6aad51c0c8f6cbd
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on arm64
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-scheduler on arm64:
    sha256:527da809bd68a3ff7cb152c1b9058c08a64e544c502bb49d0ee8e340a9a2e396
    Validating manifest list exists for
    gcr.io/k8s-staging-kubernetes/kube-apiserver:v1.19.0-alpha.2...
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on amd64
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on amd64:
    sha256:9c5c717be760eb8d75d24ca41ead2f9130915a08e711594af4c81381d226abe9
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on s390x
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on s390x:
    sha256:813ae73e4cdc0bd38dfe5829cd48b384f6b19ecd2f4b814135b54d6a30c9068f
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on ppc64le
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on ppc64le:
    sha256:bf52c4a27c3ca3bcaa82dd0990ab614df9113caf97d80dfbfb099a3cc5206611
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on arm
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on arm:
    sha256:3fc3ad61b07b046758a859620b3b467863d0215b6b9867bbc4af2f6825e37546
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on arm64
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-apiserver on arm64:
    sha256:3badcd11ee302430716bf2a4739bb3001f12abf4953a19305550a401fe4ab2c6
    Validating manifest list exists for
    gcr.io/k8s-staging-kubernetes/conformance:v1.19.0-alpha.2...
    Checking image digest for gcr.io/k8s-staging-kubernetes/conformance on amd64
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/conformance on amd64:
    sha256:1b2008e027270f647377420e781aa3b2f6c338e0041196b95f149d31c11a9dc0
    Checking image digest for gcr.io/k8s-staging-kubernetes/conformance on s390x
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/conformance on s390x:
    sha256:29343e803f7b49d6b5bd5ea20c99a9d0cc5fefd9c4e2bbb6dfb6511a862a44cc
    Checking image digest for gcr.io/k8s-staging-kubernetes/conformance on ppc64le
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/conformance on ppc64le:
    sha256:340f9479becc98127f124a666104a4ea52d48e9e5b4fbb6edc759426edc14d64
    Checking image digest for gcr.io/k8s-staging-kubernetes/conformance on arm
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/conformance on arm:
    sha256:5c1976fe82b4591a396f0559cca6965014494ae92e435ac72995a4b707f45168
    Checking image digest for gcr.io/k8s-staging-kubernetes/conformance on arm64
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/conformance on arm64:
    sha256:f3f9c9e1ee9e41c8f0841a32421b775e56a5520a5908aa1f33594af7de3a4ba1
    Validating manifest list exists for
    gcr.io/k8s-staging-kubernetes/kube-proxy:v1.19.0-alpha.2...
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-proxy on amd64
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-proxy on amd64:
    sha256:d264f2d828acdd7b9ccdd980fbf86d6358fa9f0548e0c72b7a1fdf23e282d371
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-proxy on s390x
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-proxy on s390x:
    sha256:4f735361c78121e291aa9681c942ad450997ba03cf689acbf7dd6d3f68e53237
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-proxy on ppc64le
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-proxy on ppc64le:
    sha256:06bc6c42e1d9b24fe5ce46e2c0f458a99028f11f2b9b86312f631771175d1c7d
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-proxy on arm architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-proxy on arm:
    sha256:2b1e244b724518ba71199b6689d4572017da377f233118076767b094b27cc2e8
    Checking image digest for gcr.io/k8s-staging-kubernetes/kube-proxy on arm64
    architecture...
    Digest for gcr.io/k8s-staging-kubernetes/kube-proxy on arm64:
    sha256:f9acb801120854f7c51b0f9dc6bdec3bf1a700efde22a06ea06d7b5ff5b2c8fc
    [2020-Mar-30 16:54:55 UTC] release::docker::validate_remote_manifests in 2s
    
    Publish official pointer text files to kubernetes-release-gcb...
    Test v1.19.0-alpha.2 > release/latest.txt (published): WARNING
    * v1.19.0-alpha.2 <= v1.19.0-alpha.2 (published) - not updating.
    Test v1.19.0-alpha.2 > release/latest-1.txt (published): WARNING
    * v1.19.0-alpha.2 <= v1.19.0-alpha.2 (published) - not updating.
    Test v1.19.0-alpha.2 > release/latest-1.19.txt (published): WARNING
    * v1.19.0-alpha.2 <= v1.19.0-alpha.2 (published) - not updating.
    [2020-Mar-30 16:55:00 UTC] release::gcs::publish_version in 5s
    [2020-Mar-30 16:55:00 UTC] push_all_artifacts in 6m51s
    

@justaugustus justaugustus changed the title [WIP] [VDF] anago: Publish container images on K8s Infra (k8s-staging-kubernetes) [VDF] anago: Publish container images on K8s Infra (k8s-staging-kubernetes) Apr 1, 2020
@k8s-ci-robot k8s-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Apr 1, 2020
Copy link
Contributor

@hasheddan hasheddan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Apr 1, 2020
Copy link
Member

@cpanato cpanato left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cpanato, hasheddan, justaugustus, saschagrunert

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@justaugustus justaugustus removed the do-not-merge/blocked-paths Indicates that a PR should not merge because it touches files in blocked paths. label Apr 1, 2020
@justaugustus
Copy link
Member Author

Removing the merge hold now that the k8s.gcr.io internal CL is in progress.
cc: @listx @thockin

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/release-eng Issues or PRs related to the Release Engineering subproject cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/feature Categorizes issue or PR as related to a new feature. lgtm "Looks good to me", indicates that a PR is ready to be merged. priority/critical-urgent Highest priority. Must be actively worked on as someone's top priority right now. release-note Denotes a PR that will be considered when it comes time to generate release notes. sig/release Categorizes an issue or PR as relevant to SIG Release. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants