-
Notifications
You must be signed in to change notification settings - Fork 216
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NO-ISSUE: add registry.ci.openshift.org to PUBLIC_CONTAINER_REGISTRIES #6344
base: master
Are you sure you want to change the base?
Conversation
Added registry registry.ci.openshift.org to PUBLIC_CONTAINER_REGISTRIES to bypass auth registry validation via validations.ParsePublicRegistries
@fiblan: This pull request explicitly references no jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: fiblan The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hi @fiblan. Thanks for your PR. I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Hey @fiblan, thanks for creating a PR! I'm not familiar with OKD, but does it always allow pulling from If not, it might not be best to have this as a default for others who use the podman configmap for OKD. Perhaps creating a PR to add documentation about OKD might be more preferable? |
Hey @CrystalChun thank you for the request for clarification! I confirm that during the installation phase, access to registry.ci.openshift.org is allowed without credentials since OKD releases are public. Moreover, the modification I proposed in this PR specifically refers to the deploy/podman/okd-configmap.yml. Without this change, the assisted installer will not let you proceed because it requires credentials for the registry, which are not necessary. Therefore, setting the config map for OKD to a public registry (registry.ci.openshift.org) ensures it works perfectly. |
/ok-to-test |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #6344 +/- ##
=======================================
Coverage 68.27% 68.28%
=======================================
Files 241 241
Lines 35873 35874 +1
=======================================
+ Hits 24493 24497 +4
+ Misses 9215 9214 -1
+ Partials 2165 2163 -2 |
@fiblan: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
@fiblan is this still relevant ? if so can you provide some context please ? |
Added registry registry.ci.openshift.org to PUBLIC_CONTAINER_REGISTRIES to bypass auth registry validation via validations.ParsePublicRegistries
List all the issues related to this PR
What environments does this code impact?
How was this code tested?
Checklist
docs
, README, etc)Reviewers Checklist