Description of problem: insecure image registry isn't always properly generated and we need the following patch to solve this issue: --- /usr/lib/python3.9/site-packages/tripleo_common/image/image_uploader.py 2023-09-25 20:07:29.000000000 +0000 +++ image_uploader.py 2024-06-25 13:24:24.001079282 +0000 @@ -2081,8 +2081,7 @@ pull_source = source_url.netloc + source_url.path cmd = ['buildah', '--debug', 'pull'] - if source_url.netloc in [cls.insecure_registries, - cls.no_verify_registries]: + if source_url.netloc in cls.insecure_registries.union(cls.no_verify_registries): cmd.append('--tls-verify=false') cmd.append(pull_source) Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
Where do I propose the patch ? downstream or upstream ?
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: RHOSP 17.1.4 (openstack-tripleo-common and python-tripleoclient) security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2024:9991