-
Notifications
You must be signed in to change notification settings - Fork 258
Description
@cheftako @YifeiZhuang @mmamczur @bowei
The tags are not cut correctly for this repo.
mahamed Mac ~ Desktop Git cloud-provider-gcp master 2✔ 4✎ 3+ 1 USAGE $ git describe --tags --always --dirty
ccm/v34.0.0-17-g55db278bf-dirty
mahamed Mac ~ Desktop Git cloud-provider-gcp master 2✔ 4✎ 3+ 1 $ git tag -l
auth-provider-gcp/v0.0.1
auth-provider-gcp/v0.0.2
auth-provider-gcp/v0.1.0
ccm/v0.0.1
ccm/v22.0.0
ccm/v22.1.0
ccm/v23.0.0
ccm/v24.0.0
ccm/v25.0.0
ccm/v25.2.0
ccm/v25.3.0
ccm/v25.5.0
ccm/v26.0.0
ccm/v26.0.1
ccm/v26.0.2
ccm/v26.0.3
ccm/v26.0.4
ccm/v26.15.0
Can we reset the tags and cut them correctly? Maybe cut the tags to follow the kubernetes tags, so v1.34.4 instead of ccm/v34.4.0 or if you really need to keep the current semver version, cut v34.4.0
Also, we need to have proper releases on GitHub, as many projects and end users depend on the contents of this repo. Look at #433(almost 3y ago), #879, #289(we do publish images but not in a timely manner). 1st party projects such as Kubernetes CI, kops, Cluster API, etc
We should be releasing the cloud provider like this: https://github.com/kubernetes-sigs/cloud-provider-azure/releases, https://github.com/kubernetes-sigs/cloud-provider-kind, proper release on GitHub, binaries in GitHub and images in registry.k8s.io.
Also, the way we generate the binaries is wrong:
mahamed Mac ~ 1 $ gsutil ls gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64 | tail
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251103-ccmv34.0.0-4-g4bc9861a
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251103-ccmv34.1.0
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251106-ccmv34.0.0-8-g433973ac
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251106-ccmv34.1.0-2-g3a17595a
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251113-ccmv34.0.0-11-g25e7d167
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251124-ccmv34.0.0-13-ga4cfad1b
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251125-ccmv34.0.0-15-gc5cb3fa0
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251203-ccmv34.0.0-17-g55db278b
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251203-ccmv34.1.0-4-gffb6ba2d
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/linux-amd64/v20251203-ccmv34.1.0-6-gbe9a8bb4
The file structure should be like this:
gs://k8s-staging-cloud-provider-gcp/gke-gcloud-auth-plugin/v34.1.0-6-gbe9a8bb4/linux/amd64/gke-gcloud-auth-plugin
Then we can copy them to services like artifacts.k8s.io based on the leading version.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status