Skip to content

Commit c10630b

Browse files
committed
sig-release(1732): Clean up lint warnings
Signed-off-by: Stephen Augustus <[email protected]>
1 parent 79e98e2 commit c10630b

File tree

1 file changed

+17
-14
lines changed
  • keps/sig-release/1732-artifact-management

1 file changed

+17
-14
lines changed

keps/sig-release/1732-artifact-management/README.md

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@
1414
<!-- /toc -->
1515

1616
## Summary
17+
1718
This document describes how official artifacts (Container Images, Binaries) for the Kubernetes
1819
project are managed and distributed.
1920

20-
2121
## Motivation
2222

2323
The motivation for this KEP is to describe a process by which artifacts (container images, binaries)
@@ -29,8 +29,9 @@ and that anyone in the project is capable (if given the right authority) to dist
2929
### Goals
3030

3131
The goals of this process are to enable:
32-
* Anyone in the community (with the right permissions) to manage the distribution of Kubernetes images and binaries.
33-
* Fast, cost-efficient access to artifacts around the world through appropriate mirrors and distribution
32+
33+
- Anyone in the community (with the right permissions) to manage the distribution of Kubernetes images and binaries
34+
- Fast, cost-efficient access to artifacts around the world through appropriate mirrors and distribution
3435

3536
This KEP will have succeeded when artifacts are all managed in the same manner and anyone in the community
3637
(with the right permissions) can manage these artifacts.
@@ -66,6 +67,7 @@ occur, so that the promotion tool needs to be capable of deleting images and art
6667
well as promoting them.
6768

6869
### HTTP Redirector Design
70+
6971
To facilitate world-wide distribution of artifacts from a single (virtual) location we will
7072
ideally run a replicated redirector service in the United States, Europe and Asia.
7173
Each of these redirectors
@@ -75,6 +77,7 @@ address and a dns record indicating their location (e.g. `europe.artifacts.k8s.i
7577
We will use Geo DNS to route requests to `artifacts.k8s.io` to the correct redirector. This is necessary to ensure that we always route to a server which is accessible no matter what region we are in. We will need to extend or enhance the existing DNS synchronization tooling to handle creation of the GeoDNS records.
7678

7779
#### Configuring the HTTP Redirector
80+
7881
THe HTTP Redirector service will be driven from a YAML configuration that specifies a path to mirror
7982
mapping. For now the redirector will serve content based on continent, for example:
8083

@@ -96,33 +99,33 @@ manage the images for a Kubernetes release.
9699
97100
### Milestone 0 (MVP): In progress
98101
99-
(Described in terms of kops, our first candidate; other candidates welcome!)
102+
(Described in terms of kOps, our first candidate; other candidates welcome!)
100103
101-
* k8s-infra creates a "staging" GCS bucket for each project
104+
- k8s-infra creates a "staging" GCS bucket for each project
102105
(e.g. `k8s-artifacts-staging-<project>`) and a "prod" GCS bucket for promoted
103106
artifacts (e.g. `k8s-artifacts`, one bucket for all projects).
104-
* We grant write-access to the staging GCS bucket to trusted jobs / people in
105-
each project (e.g. kops OWNERS and prow jobs can push to
107+
- We grant write-access to the staging GCS bucket to trusted jobs / people in
108+
each project (e.g. kOps OWNERS and prow jobs can push to
106109
`k8s-artifacts-staging-kops`). We can encourage use of CI & reproducible
107110
builds, but we do not block on it.
108-
* We grant write-access to the prod bucket only to the infra-admins & the
111+
- We grant write-access to the prod bucket only to the infra-admins & the
109112
promoter process.
110-
* Promotion of artifacts to the "prod" GCS bucket is via a script / utility (as
113+
- Promotion of artifacts to the "prod" GCS bucket is via a script / utility (as
111114
we do today). For v1 we can promote based on a sha256sum file (only copy the
112115
files listed), similarly to the image promoter. We will experiment to develop
113116
that script / utility in this milestone, along with prow jobs (?) to publish
114117
to the staging buckets, and to figure out how best to run the promoter.
115118
Hopefully we can copy the image-promotion work closely.
116-
* We create a bucket-backed GCLB for serving, with a single url-map entry for
119+
- We create a bucket-backed GCLB for serving, with a single url-map entry for
117120
`binaries/` pointing to the prod bucket. (The URL prefix gives us some
118121
flexibility to e.g. add dynamic content later)
119-
* We create the artifacts.k8s.io DNS name pointing to the GCLB. (Unclear whether
122+
- We create the artifacts.k8s.io DNS name pointing to the GCLB. (Unclear whether
120123
we want one for staging, or just encourage pulling from GCS directly).
121-
* Projects start using the mirrors e.g. kops adds the
124+
- Projects start using the mirrors e.g. kOps adds the
122125
https://artifacts.k8s.io/binaries/kops mirror into the (upcoming) mirror-list
123-
support, so that it will get real traffic but not break kops should this
126+
support, so that it will get real traffic but not break kOps should this
124127
infrastructure break
125-
* We start to collect data from the GCLB logs. Questions we would like to
128+
- We start to collect data from the GCLB logs. Questions we would like to
126129
understand: What are the costs, and what would the costs be for localized
127130
mirrors? What is the performance impact (latency, throughput) of serving
128131
everything from GCLB? Is GCLB reachable from everywhere (including China)?

0 commit comments

Comments
 (0)