Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1500507 - Support DockerInsecureRegistryAddress in image prepare command
Support DockerInsecureRegistryAddress in image prepare command
Status: CLOSED ERRATA
Product: Red Hat OpenStack
Classification: Red Hat
Component: python-tripleoclient (Show other bugs)
12.0 (Pike)
Unspecified Unspecified
medium Severity medium
: rc
: 12.0 (Pike)
Assigned To: Steve Baker
Alexander Chuzhoy
: Rebase, Triaged
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2017-10-10 15:11 EDT by Alexander Chuzhoy
Modified: 2018-02-05 14:15 EST (History)
11 users (show)

See Also:
Fixed In Version: python-tripleoclient-7.3.3-3.el7ost
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-12-13 17:13:08 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Launchpad 1722632 None None None 2017-10-10 15:31 EDT
OpenStack gerrit 514473 None None None 2017-10-27 10:21 EDT
OpenStack gerrit 516452 None None None 2017-11-01 16:05 EDT
Red Hat Product Errata RHEA-2017:3462 normal SHIPPED_LIVE Red Hat OpenStack Platform 12.0 Enhancement Advisory 2018-02-15 20:43:25 EST

  None (edit)
Description Alexander Chuzhoy 2017-10-10 15:11:44 EDT
Currently we have to manually add the respective DockerInsecureRegistryAddress (when required).

It would be nice if we could use the --set argument of image prepare to configure the parameter appropriately.
Comment 1 Jon Schlueter 2017-10-12 16:40:14 EDT
This is now implemented in at least 3 different tripleo deployment helpers repos for CI

https://review.openstack.org/#/c/509232/9/roles/overcloud-prep-containers/templates/overcloud-prep-containers.sh.j2@15

https://github.com/openstack/tripleo-quickstart-extras/search?utf8=%E2%9C%93&q=insecure&type=

https://github.com/redhat-openstack/tripleo-upgrade/search?utf8=%E2%9C%93&q=INSECURE&type=

https://github.com/redhat-openstack/infrared/search?utf8=%E2%9C%93&q=insecure&type=

Getting this functionality rolled into tripleo which can be re-used by these other projects would be helpful to reduce amount of code duplication as well as feature richness of the functionality.
Comment 2 Steve Baker 2017-10-12 18:43:00 EDT
Rather than adding another option to the prepare command, it should just detect whether the registry is insecure by making https and http calls, then set the DockerInsecureRegistryAddress if it is not https.
Comment 3 Dan Prince 2017-10-20 08:56:37 EDT
(In reply to Steve Baker from comment #2)
> Rather than adding another option to the prepare command, it should just
> detect whether the registry is insecure by making https and http calls, then
> set the DockerInsecureRegistryAddress if it is not https.

Having it magically enable "DockerInsecureRegistryAddress" might be perceived as security problem by some users though too. I sort of like the idea of letting insecure registry address configuration as being explicitly something you need to enable.
Comment 5 Steve Baker 2017-11-01 16:05:33 EDT
The backport is merged in stable/pike
Comment 8 Alexander Chuzhoy 2017-11-15 10:30:16 EST
Verified:

Environment:
python-tripleoclient-7.3.3-3.el7ost.noarch


An https connection is made to the registry and if it returns an ssl error, then  the DockerInsecureRegistryAddress line is appended automatically.


Example of how it looks in the file:
  DockerInsecureRegistryAddress:
  - 192.168.24.1:8787
Comment 11 errata-xmlrpc 2017-12-13 17:13:08 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2017:3462

Note You need to log in before you can comment on or make changes to this bug.