Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow podman to push images to the local insecure registry #163

Merged
merged 1 commit into from
Sep 29, 2022

Conversation

brianmcarey
Copy link
Member

@brianmcarey brianmcarey commented Sep 29, 2022

The kubevirt CI infrastructure is moving to using a podman based bootstrap image rather than a docker in docker setup.

When running the pull-kubevirt-cloud-provider-kubevirt-e2e presubmit with podman, the job fails[1] as podman doe not allow pusgin to insecure registries by default[2].

This update will add the local insecure registry to registries.conf when the podman socket is available which will allow podman to push images to the registry.

[1] https://prow.ci.kubevirt.io/view/gs/kubevirt-prow/pr-logs/pull/kubevirt_project-infra/2359/rehearsal-pull-kubevirt-cloud-provider-kubevirt-e2e/1575140184981245952#1:build-log.txt%3A766
[2] https://github.com/containers/podman/blob/main/troubleshooting.md#4-http-server-gave-http-response-to-https-client

/cc @qinqon @rhrazdil

Signed-off-by: Brian Carey bcarey@redhat.com

THe kubevirt CI infrastructure is moving to using a podman based
bootstrap image rather than a docker in docker setup.

When running the pull-kubevirt-cloud-provider-kubevirt-e2e presubmit
with podman, the job fails[1] as podman doe not allow pusgin to insecure
registries by default[2].

This update will add the local insecure registry to registries.conf when
the podman socket is available which will allow podman to push images to
the registry.

[1] https://prow.ci.kubevirt.io/view/gs/kubevirt-prow/pr-logs/pull/kubevirt_project-infra/2359/rehearsal-pull-kubevirt-cloud-provider-kubevirt-e2e/1575140184981245952#1:build-log.txt%3A766
[2] https://github.com/containers/podman/blob/main/troubleshooting.md#4-http-server-gave-http-response-to-https-client

Signed-off-by: Brian Carey <bcarey@redhat.com>
@kubevirt-bot kubevirt-bot added dco-signoff: yes Indicates the PR's author has DCO signed all their commits. size/S labels Sep 29, 2022
@qinqon
Copy link
Contributor

qinqon commented Sep 29, 2022

/lgtm
/approve

@kubevirt-bot kubevirt-bot added the lgtm Indicates that a PR is ready to be merged. label Sep 29, 2022
@kubevirt-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: qinqon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kubevirt-bot kubevirt-bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 29, 2022
@kubevirt-bot kubevirt-bot merged commit 758e313 into kubevirt:main Sep 29, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. dco-signoff: yes Indicates the PR's author has DCO signed all their commits. lgtm Indicates that a PR is ready to be merged. size/S
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants