Bug 1375891

Summary: SSLError: [SSL: UNKNOWN_PROTOCOL] unknown protocol
Product: Red Hat Enterprise Linux 7 Reporter: Alex Jia <ajia>
Component: atomicAssignee: Brent Baude <bbaude>
Status: CLOSED ERRATA QA Contact: atomic-bugs <atomic-bugs>
Severity: medium Docs Contact:
Priority: high    
Version: 7.4CC: aweiteka, bbaude, dwalsh, gscrivan, lsm5, mitr
Target Milestone: rcKeywords: Extras
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-11-04 09:06:56 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Comment 3 Brent Baude 2016-09-14 20:33:35 UTC
Alex,

When I replicate and debug your signing action, it appears like the image in question is protected with authentication.  Is that correct?

Comment 4 Brent Baude 2016-09-14 20:42:05 UTC
or perhaps is kept under a v1 schema?

Comment 7 Miloslav Trmač 2016-09-15 16:26:16 UTC
check_v1_registry → requests.get(v1_url); what is the v1_url here?

Wild guess would be that this is an attempt to connect to a HTTP (non-TLS) server using HTTPS.

(And I can’t see any connection to skopeo.)

Comment 8 Antonio Murdaca 2016-09-15 16:33:08 UTC
(In reply to Miloslav Trmač from comment #7)
> check_v1_registry → requests.get(v1_url); what is the v1_url here?
> 
> Wild guess would be that this is an attempt to connect to a HTTP (non-TLS)
> server using HTTPS.
> 
> (And I can’t see any connection to skopeo.)

discussing about this with Brent, adding "--tls-verify=false" in skopeo solves this error.

Still discussing with Brent on the best approach to silence/prompt this error in the atomic CLI

Comment 9 Miloslav Trmač 2016-09-15 16:35:48 UTC
> adding "--tls-verify=false" in skopeo solves this error.

Fascinating. But this is till a Python traceback.

Comment 10 Brent Baude 2016-09-15 22:11:35 UTC
Based on feedback and discussions, this has a proposed fix ->https://github.com/projectatomic/atomic/pull/621.

In short, agreement with Miloslav and Antonio to use --tls-verify=false until we can accurately get the list of insecure registries from the docker configuration (including dealing with CIDR notation).

Comment 15 errata-xmlrpc 2016-11-04 09:06:56 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2016-2628.html