-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prefer secure connection during image pruning #14114
Prefer secure connection during image pruning #14114
Conversation
ec98511
to
ad4a823
Compare
Regenerated completions. |
Flake #14122 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Flake #12927 |
[test] |
Flakse #14140. re-[test] |
@miminar can you confirm if this PR will solve the problem from https://bugzilla.redhat.com/show_bug.cgi?id=1448595 ? |
Flake #13426 in job https://ci.openshift.redhat.com/jenkins/job/test_pull_request_origin/1349/. re-[test] |
If they keep using wrong certificate authority, this PR will at least allow them to force insecure connection. |
Flake #12251. re-[test] |
[merge] |
Flake #14228. |
|
f023bc9
to
755f74e
Compare
Fixed. The code now takes into account an insecure flag in user's kubeconfig - just like before. Also the registry pinger now generates more readable errors. It won't attempt HTTP ping if a secure transport is requested. |
@soltysh may I request one more look of yours? |
[test] |
flake #8571 |
The extended tests may need some changes. I'll investigate on Monday. |
755f74e
to
a278e5d
Compare
The pruner now allows insecure connections for private addresses. |
a278e5d
to
48ee2df
Compare
The default stays the same. When a CA bundle or a registry url is specified, require secure connection with certificate verification. Allow the user to force insecure connection using --force-insecure if he has to. Signed-off-by: Michal Minář <[email protected]>
48ee2df
to
af35aba
Compare
Here's a documentation: openshift/openshift-docs#4471 @dmage could you please help review this? I'd like to get it in before the pruning changes for the read-only mode. |
af35aba
to
d8ea2a7
Compare
No change, just re-signed the last commit to trigger new test runs. |
Oh the extended test has been renamed. One more try: |
Signed-off-by: Michal Minář <[email protected]>
d8ea2a7
to
50b0858
Compare
Evaluated for origin testextended up to 50b0858 |
Evaluated for origin test up to 50b0858 |
continuous-integration/openshift-jenkins/testextended SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pull_request_origin_extended/508/) (Base Commit: a1dffba) (Extended Tests: core(ImagePrune)) |
continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pull_request_origin/1794/) (Base Commit: a1dffba) |
@mfojtik merge? |
[merge][severity:blocker] blocker bug: https://bugzilla.redhat.com/show_bug.cgi?id=1448595 |
Flake #12072 |
[merge][severity:blocker] |
Evaluated for origin merge up to 50b0858 |
continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/merge_pull_request_origin/838/) (Base Commit: 5a19120) (Extended Tests: blocker) (Image: devenv-rhel7_6281) |
Automatic merge from submit-queue [3.6][Backport] Prune images (not)securely Back-porting: - #14114 - #14405 - #14914 - #15899 Resolves [bz#1476779](https://bugzilla.redhat.com/show_bug.cgi?id=1476779)
The default stays the same. When a CA bundle or a registry url is specified, require secure connection with certificate verification. Allow the user to force insecure connection using --force-insecure if he has to.