Skip to content

Commit 1561cd9

Browse files
authored
create staging registry for aws-encryption-provider (#7587)
* create staging registry for aws-encryption-provider * bump provider deps --------- Co-authored-by: upodroid <[email protected]>
1 parent 2cb64f5 commit 1561cd9

File tree

8 files changed

+73
-16
lines changed

8 files changed

+73
-16
lines changed

infra/gcp/terraform/k8s-staging-images/buckets.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ limitations under the License.
1616

1717
module "gcb_bucket" {
1818
source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket"
19-
version = "~> 5"
19+
version = "~> 8.0"
2020

2121
name = "k8s-staging-images-gcb"
2222
project_id = module.project.project_id

infra/gcp/terraform/k8s-staging-images/iam.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ limitations under the License.
1616

1717
module "iam" {
1818
source = "terraform-google-modules/iam/google//modules/projects_iam"
19-
version = "~> 7"
19+
version = "~> 8"
2020

2121
projects = [module.project.project_id]
2222

infra/gcp/terraform/k8s-staging-images/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ limitations under the License.
1616

1717
module "project" {
1818
source = "terraform-google-modules/project-factory/google"
19-
version = "~> 14.5"
19+
version = "~> 17.1"
2020

2121
name = "k8s-staging-images"
2222
project_id = "k8s-staging-images"

infra/gcp/terraform/k8s-staging-images/provider.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,11 @@ terraform {
2525
required_providers {
2626
google = {
2727
source = "hashicorp/google"
28-
version = "~> 5.34.0"
28+
version = "~> 6.12.0"
2929
}
3030
google-beta = {
3131
source = "hashicorp/google-beta"
32-
version = "~> 5.34.0"
32+
version = "~> 6.12.0"
3333
}
3434
}
3535
}

infra/gcp/terraform/k8s-staging-images/registries.tf

+12-11
Original file line numberDiff line numberDiff line change
@@ -17,17 +17,18 @@ limitations under the License.
1717
locals {
1818
// The groups have to be created before applying this terraform code
1919
registries = {
20-
charts = "group:[email protected]"
21-
cloud-provider-kind = "group:[email protected]"
22-
etcd-manager = "group:[email protected]"
23-
ingress-nginx = "group:[email protected]"
24-
kind = "group:[email protected]"
25-
kubernetes = "group:[email protected]"
26-
kueue = "group:[email protected]"
27-
llm-instance-gateway = "group:[email protected]"
28-
secrets-store-sync = "group:[email protected]"
29-
test-infra = "group:[email protected]"
30-
csi-vsphere = "group:[email protected]"
20+
aws-encryption-provider = "group:[email protected]"
21+
charts = "group:[email protected]"
22+
cloud-provider-kind = "group:[email protected]"
23+
etcd-manager = "group:[email protected]"
24+
ingress-nginx = "group:[email protected]"
25+
kind = "group:[email protected]"
26+
kubernetes = "group:[email protected]"
27+
kueue = "group:[email protected]"
28+
llm-instance-gateway = "group:[email protected]"
29+
secrets-store-sync = "group:[email protected]"
30+
test-infra = "group:[email protected]"
31+
csi-vsphere = "group:[email protected]"
3132
}
3233
}
3334

Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
# See the OWNERS docs at https://go.k8s.io/owners
2+
3+
approvers:
4+
- justinsb
5+
- micahhausler
6+
- nckturner
7+
- wongma7
8+
- xdu31

registry.k8s.io/images/k8s-staging-aws-encryption-provider/images.yaml

Whitespace-only changes.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
# google group for us-central1-docker.pkg.dev/k8s-staging-images/aws-encryption-provider is [email protected]
2+
registries:
3+
- name: us-central1-docker.pkg.dev/k8s-staging-images/aws-encryption-provider
4+
src: true
5+
- name: asia-east1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
6+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
7+
- name: asia-south1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
8+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
9+
- name: asia-northeast1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
10+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
11+
- name: asia-northeast2-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
12+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
13+
- name: australia-southeast1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
14+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
15+
- name: europe-north1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
16+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
17+
- name: europe-southwest1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
18+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
19+
- name: europe-west1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
20+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
21+
- name: europe-west2-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
22+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
23+
- name: europe-west3-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
24+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
25+
- name: europe-west4-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
26+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
27+
- name: europe-west8-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
28+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
29+
- name: europe-west9-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
30+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
31+
- name: europe-west10-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
32+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
33+
- name: southamerica-west1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
34+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
35+
- name: us-central1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
36+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
37+
- name: us-east1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
38+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
39+
- name: us-east4-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
40+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
41+
- name: us-east5-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
42+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
43+
- name: us-south1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
44+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
45+
- name: us-west1-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
46+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com
47+
- name: us-west2-docker.pkg.dev/k8s-artifacts-prod/images/aws-encryption-provider
48+
service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com

0 commit comments

Comments
 (0)