Skip to content

Commit 2dab911

Browse files
committed
Use imageutils instead of hardcoded image paths
A number of tests were using hardcoded image paths instead of going through the imageutils package. The reason for centralizing the logic there is to keep an eye on what images we use and where they come from.
1 parent 7342823 commit 2dab911

File tree

6 files changed

+23
-6
lines changed

6 files changed

+23
-6
lines changed

test/e2e/framework/ingress/BUILD

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ go_library(
2323
"//test/e2e/framework/testfiles:go_default_library",
2424
"//test/e2e/manifest:go_default_library",
2525
"//test/utils:go_default_library",
26+
"//test/utils/image:go_default_library",
2627
"//vendor/github.com/onsi/ginkgo:go_default_library",
2728
"//vendor/google.golang.org/api/compute/v1:go_default_library",
2829
"//vendor/k8s.io/klog:go_default_library",

test/e2e/framework/ingress/ingress_utils.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,7 @@ import (
5454
"k8s.io/kubernetes/test/e2e/framework/testfiles"
5555
"k8s.io/kubernetes/test/e2e/manifest"
5656
testutils "k8s.io/kubernetes/test/utils"
57+
imageutils "k8s.io/kubernetes/test/utils/image"
5758

5859
"github.com/onsi/ginkgo"
5960
)
@@ -944,7 +945,7 @@ func generateBacksideHTTPSDeploymentSpec() *appsv1.Deployment {
944945
Containers: []v1.Container{
945946
{
946947
Name: "echoheaders-https",
947-
Image: "k8s.gcr.io/echoserver:1.10",
948+
Image: imageutils.GetE2EImage(imageutils.EchoServer),
948949
Ports: []v1.ContainerPort{{
949950
ContainerPort: 8443,
950951
Name: "echo-443",

test/e2e/network/kube_proxy.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ var _ = SIGDescribe("Network", func() {
242242
Containers: []v1.Container{
243243
{
244244
Name: "boom-server",
245-
Image: "gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0",
245+
Image: imageutils.GetE2EImage(imageutils.RegressionIssue74839),
246246
Ports: []v1.ContainerPort{
247247
{
248248
ContainerPort: 9000, // Default port exposed by boom-server

test/e2e/storage/utils/utils.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -442,7 +442,7 @@ func StartExternalProvisioner(c clientset.Interface, ns string, externalPluginNa
442442
Containers: []v1.Container{
443443
{
444444
Name: "nfs-provisioner",
445-
Image: "quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2",
445+
Image: imageutils.GetE2EImage(imageutils.NFSProvisioner),
446446
SecurityContext: &v1.SecurityContext{
447447
Capabilities: &v1.Capabilities{
448448
Add: []v1.Capability{"DAC_READ_SEARCH"},

test/e2e/storage/volume_provisioning.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@ import (
5050
e2epv "k8s.io/kubernetes/test/e2e/framework/pv"
5151
"k8s.io/kubernetes/test/e2e/storage/testsuites"
5252
"k8s.io/kubernetes/test/e2e/storage/utils"
53+
imageutils "k8s.io/kubernetes/test/utils/image"
5354
)
5455

5556
const (
@@ -972,7 +973,7 @@ func startGlusterDpServerPod(c clientset.Interface, ns string) *v1.Pod {
972973
Containers: []v1.Container{
973974
{
974975
Name: "glusterdynamic-provisioner",
975-
Image: "docker.io/gluster/glusterdynamic-provisioner:v1.0",
976+
Image: imageutils.GetE2EImage(imageutils.GlusterDynamicProvisioner),
976977
Args: []string{
977978
"-config=" + "/etc/heketi/heketi.json",
978979
},

test/utils/image/manifest.go

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ import (
2929
type RegistryList struct {
3030
GcAuthenticatedRegistry string `yaml:"gcAuthenticatedRegistry"`
3131
DockerLibraryRegistry string `yaml:"dockerLibraryRegistry"`
32+
DockerGluster string `yaml:"dockerGluster"`
3233
E2eRegistry string `yaml:"e2eRegistry"`
3334
InvalidRegistry string `yaml:"invalidRegistry"`
3435
GcRegistry string `yaml:"gcRegistry"`
@@ -37,6 +38,7 @@ type RegistryList struct {
3738
PrivateRegistry string `yaml:"privateRegistry"`
3839
SampleRegistry string `yaml:"sampleRegistry"`
3940
QuayK8sCSI string `yaml:"quayK8sCSI"`
41+
QuayIncubator string `yaml:"quayIncubator"`
4042
}
4143

4244
// Config holds an images registry, name, and version
@@ -65,6 +67,7 @@ func initReg() RegistryList {
6567
registry := RegistryList{
6668
GcAuthenticatedRegistry: "gcr.io/authenticated-image-pulling",
6769
DockerLibraryRegistry: "docker.io/library",
70+
DockerGluster: "docker.io/gluster",
6871
E2eRegistry: "gcr.io/kubernetes-e2e-test-images",
6972
InvalidRegistry: "invalid.com/invalid",
7073
GcRegistry: "k8s.gcr.io",
@@ -73,6 +76,7 @@ func initReg() RegistryList {
7376
PrivateRegistry: "gcr.io/k8s-authenticated-test",
7477
SampleRegistry: "gcr.io/google-samples",
7578
QuayK8sCSI: "quay.io/k8scsi",
79+
QuayIncubator: "quay.io/kubernetes_incubator",
7680
}
7781
repoList := os.Getenv("KUBE_TEST_REPO_LIST")
7882
if repoList == "" {
@@ -94,14 +98,15 @@ func initReg() RegistryList {
9498
var (
9599
registry = initReg()
96100
dockerLibraryRegistry = registry.DockerLibraryRegistry
101+
dockerGluster = registry.DockerGluster
97102
e2eRegistry = registry.E2eRegistry
98-
e2eGcRegistry = "gcr.io/kubernetes-e2e-test-images"
99103
gcAuthenticatedRegistry = registry.GcAuthenticatedRegistry
100104
gcRegistry = registry.GcRegistry
101105
gcrReleaseRegistry = registry.GcrReleaseRegistry
102106
googleContainerRegistry = registry.GoogleContainerRegistry
103107
invalidRegistry = registry.InvalidRegistry
104108
quayK8sCSI = registry.QuayK8sCSI
109+
quayIncubator = registry.QuayIncubator
105110
// PrivateRegistry is an image repository that requires authentication
106111
PrivateRegistry = registry.PrivateRegistry
107112
sampleRegistry = registry.SampleRegistry
@@ -141,6 +146,8 @@ const (
141146
Etcd
142147
// GBFrontend image
143148
GBFrontend
149+
// GlusterDynamicProvisioner image
150+
GlusterDynamicProvisioner
144151
// Httpd image
145152
Httpd
146153
// HttpdNew image
@@ -161,6 +168,8 @@ const (
161168
MounttestUser
162169
// Nautilus image
163170
Nautilus
171+
// NFSProvisioner image
172+
NFSProvisioner
164173
// Nginx image
165174
Nginx
166175
// NginxNew image
@@ -180,6 +189,8 @@ const (
180189
PrometheusToSd
181190
// Redis image
182191
Redis
192+
// RegressionIssue74839 image
193+
RegressionIssue74839
183194
// ResourceConsumer image
184195
ResourceConsumer
185196
// ResourceController image
@@ -219,6 +230,7 @@ func initImageConfigs() map[int]Config {
219230
configs[EchoServer] = Config{e2eRegistry, "echoserver", "2.2"}
220231
configs[Etcd] = Config{gcRegistry, "etcd", "3.3.15"}
221232
configs[GBFrontend] = Config{sampleRegistry, "gb-frontend", "v6"}
233+
configs[GlusterDynamicProvisioner] = Config{dockerGluster, "glusterdynamic-provisioner", "v1.0"}
222234
configs[Httpd] = Config{dockerLibraryRegistry, "httpd", "2.4.38-alpine"}
223235
configs[HttpdNew] = Config{dockerLibraryRegistry, "httpd", "2.4.39-alpine"}
224236
configs[Invalid] = Config{gcRegistry, "invalid-image", "invalid-tag"}
@@ -229,6 +241,7 @@ func initImageConfigs() map[int]Config {
229241
configs[Mounttest] = Config{e2eRegistry, "mounttest", "1.0"}
230242
configs[MounttestUser] = Config{e2eRegistry, "mounttest-user", "1.0"}
231243
configs[Nautilus] = Config{e2eRegistry, "nautilus", "1.0"}
244+
configs[NFSProvisioner] = Config{quayIncubator, "nfs-provisioner", "v2.2.0-k8s1.12"}
232245
configs[Nginx] = Config{dockerLibraryRegistry, "nginx", "1.14-alpine"}
233246
configs[NginxNew] = Config{dockerLibraryRegistry, "nginx", "1.15-alpine"}
234247
configs[Nonewprivs] = Config{e2eRegistry, "nonewprivs", "1.0"}
@@ -239,6 +252,7 @@ func initImageConfigs() map[int]Config {
239252
configs[PrometheusDummyExporter] = Config{gcRegistry, "prometheus-dummy-exporter", "v0.1.0"}
240253
configs[PrometheusToSd] = Config{gcRegistry, "prometheus-to-sd", "v0.5.0"}
241254
configs[Redis] = Config{dockerLibraryRegistry, "redis", "5.0.5-alpine"}
255+
configs[RegressionIssue74839] = Config{e2eRegistry, "regression-issue-74839-amd64", "1.0"}
242256
configs[ResourceConsumer] = Config{e2eRegistry, "resource-consumer", "1.5"}
243257
configs[ResourceController] = Config{e2eRegistry, "resource-consumer-controller", "1.0"}
244258
configs[SdDummyExporter] = Config{gcRegistry, "sd-dummy-exporter", "v0.2.0"}
@@ -248,7 +262,7 @@ func initImageConfigs() map[int]Config {
248262
configs[VolumeISCSIServer] = Config{e2eRegistry, "volume/iscsi", "2.0"}
249263
configs[VolumeGlusterServer] = Config{e2eRegistry, "volume/gluster", "1.0"}
250264
configs[VolumeRBDServer] = Config{e2eRegistry, "volume/rbd", "1.0.1"}
251-
configs[WindowsNanoServer] = Config{e2eGcRegistry, "windows-nanoserver", "v1"}
265+
configs[WindowsNanoServer] = Config{e2eRegistry, "windows-nanoserver", "v1"}
252266
return configs
253267
}
254268

0 commit comments

Comments
 (0)