Skip to content

update the registry to point to new proxy endpoint #283

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

staciegravy
Copy link
Member

@staciegravy staciegravy commented May 16, 2025

What does this PR do?

Update the registry to point to the new proxy endpoint.

Does this PR introduce a user-facing change?


laverya
laverya previously approved these changes May 27, 2025
@staciegravy staciegravy force-pushed the staciegraves/sc-123590/update-sdk-to-pull-from-new-registry-proxy branch 2 times, most recently from 29f8e0a to f2f8fd9 Compare May 27, 2025 22:26
laverya
laverya previously approved these changes May 27, 2025
Copy link
Member

@laverya laverya left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks fine to me but I'm not the most familiar with the build code

@@ -31,7 +31,7 @@ restartPolicy: Always
# Replicated SDK image properties
# If .Values.images is set, it takes precedence over the following settings.
image:
registry: registry.replicated.com # Registry where the image is hosted
registry: proxy.replicated.com # Registry where the image is hosted
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍 this is probably the most important one. This is the seed for the template.

@@ -41,7 +41,7 @@ func buildAndPushChartToTTL(
return "", err
}

valuesYAML = strings.Replace(valuesYAML, "registry: registry.replicated.com", fmt.Sprintf("registry: %s", imageRegistry), 1)
valuesYAML = strings.Replace(valuesYAML, "registry: proxy.replicated.com", fmt.Sprintf("registry: %s", imageRegistry), 1)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is the one that comes into play during the validate dagger cal (and the validate ci step). buildAndPushChartToTTL will get called with a imageRegistry val passed to it by the result of buildAndPushImageToTTL which has ttl.sh hard coded:

return "ttl.sh", fmt.Sprintf("automated-%s/replicated-image/replicated-sdk", now), "24h", nil

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(just random notes for all of us)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This needs to be changed like it is here.

@@ -307,7 +307,7 @@ func publishChainguardImage(
env := "dev"
if strings.Contains(imagePath, "registry.staging.replicated.com") {
env = "stage"
} else if strings.Contains(imagePath, "registry.replicated.com") {
} else if strings.Contains(imagePath, "registry.replicated.com") || strings.Contains(imagePath, "proxy.replicated.com") {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this will actually never be the proxy? Because i think its always going to want to operate on the published image - not the proxied version. its gonna be the 3 images in publish.go ala -

digest, err = publishChainguardImage(ctx, dag, source, amdPackages, armPackages, melangeKey, version, "registry.replicated.com/library/replicated-sdk-image", libraryUsername, libraryPassword, cosignKey, cosignPassword)

@staciegravy staciegravy force-pushed the staciegraves/sc-123590/update-sdk-to-pull-from-new-registry-proxy branch from 7f12251 to a3d76aa Compare May 28, 2025 16:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants