New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
oc import-image --insecure with specific tag creates istag that points to :latest #8440
Comments
|
Your specific usecase works as follows. You've created an IS which points to As a workaround, since you've mentioned this block you, I'd suggest importing image with or creating one as above manually, which should unblock you immediately. @pweil- mind assigning |
|
There's also |
After looking more into the code, I'm changing my mind this is working as expected, see this line. |
|
@sosiouxme if you agree please close the issue. |
|
@soltysh I've been fiddling with this for a bit and I think it would help for me to provide more context for the use case. The use case (logging deployer) is that I don't actually know in advance whether the repository will be secure or not. It's created according to a template where the user supplies the registry. This is enterprise software, so I don't want to just allow non-secure repositories by default, but there's no way in the template to optionally add an importPolicy (for instance) based on the parameters, because you can only fill in values, not add elements. However we need to use the same deployer and template for both production and pre-production QE images. So if we follow the use case and start with a (default secured) IS then the only thing I could get working at all was the Now this might be working as designed, but I would not say it's working as expected. At least, not from the standpoint of a dumb user like myself. At the least, I would say it is inconsistent.
So, we do have a workaround and this isn't completely blocked now, but it's awfully confusing and easy to shoot your own foot as implemented. Maybe we need a third party to give an opinion on this? |
|
@smarterclayton do we want to allow importing not imported tags through import-image? Currently we will notify the user no such tag exists and that he should create one with oc tag, which is ok for the repos where we've previously fetched the tags. But for the cases where previous import failed, or for the cases where we've limited the no of imported tags, @sosiouxme has a right we would want to be able to import new tags? wdyt? |
|
I tried two below workarounds, but still do not work as expected:
error: the tag "3.2.0" points to "brew-pulp-docker01...com:8888/openshift3/logging-auth-proxy" - use the 'tag' command if you want to change the source to "brew-pulp-docker01...com:8888/openshift3/logging-auth-proxy:3.2.0"
Note: still use :latest tag in pod |
This will not work, because you're trying to change the tag. That's why it's suggesting to use
Works perfectly ok, just run: @chunyunchen can you show me the output of the import command? |
Note the PullSpec ends up with :latest in it. |
|
Only thing that worked for me: Edit: I just noticed the istag is actually wrong on this - it's tagged as "latest" instead of 3.2.0 though that's what it points to. And you can't |
|
@sosiouxme here are the differences between different calls you're doing: Is saying import Assuming you don't have IS will create one with just single tag pointing to 3.2.0. Otherwise it'll match to existing IS and tags, if you have logging-elasticsearch IS with 3.2.0 tag it'll re-import the image, otherwise it'll complain about non-existing tag, suggesting to use Last call is the same as first, thus you're getting that result. I realize this might be confusing but I hope you get the general flow. If not I'd suggest we need to work on docs for |
|
You're right, this worked perfectly, thanks: I thought you were telling @chunyunchen that wouldn't work as it's trying to change the tag. Perhaps I misread. The docs do need some work... Just hasn't been a priority for me yet (also my understanding is evidently not good enough). |
|
@sosiouxme @soltysh
2.2 $ oc import-image brew-pulp-docker01...com:8888/openshift3/logging-kibana:3.2.0 --insecure=true --confirm the example results: |
|
@smarterclayton do we want to allow importing not imported tags through import-image? Or current |
|
I'm debating whether we should move |
|
@smarterclayton +1. Here are the primary use cases I think we need should consider:
|
|
I don't like having import-image as a top-level command either. Is there On Mon, May 16, 2016 at 9:54 AM, Clayton Coleman notifications@github.com
|
Yes, and my use case was drafted using language that makes sense to me. I'm not stuck on anything but those verbs are...
I also think we could put this all under "tag" but would need some args referencing these verbs. An interesting noun that is meaningful to me is "remote". |
|
The "import" command is a good one stop shop for "how do I make an external Let's keep iterating on the use cases and make sure we flush out any lack On Wed, May 18, 2016 at 9:14 AM, Aaron Weitekamp notifications@github.com
|
|
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
|
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
|
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
When I create an imagestream for an insecure registry and the oc import-image --insecure name:tag, it's imported, but the tag is pointing at the :latest tag instead of the one I wanted.
Version
oc v1.1.6-48-g561e4fa
kubernetes v1.2.0-36-g4a3f9c5
Steps To Reproduce
oc import-image --insecure logging-elasticsearch:3.1.0oc describe istag logging-elasticsearch:3.1.0 | grep ImageCurrent Result
Expected Result
Additional Information
This is a test blocker for aggregated logging.
Tags created with --insecure --all look right. Just the specific import points to :latest.
The text was updated successfully, but these errors were encountered: