Skip to content

Add cifmw_crc_additional_insecure_registries support#3938

Open
vyzigold wants to merge 1 commit into
openstack-k8s-operators:mainfrom
vyzigold:allow-additional-insecure-registries
Open

Add cifmw_crc_additional_insecure_registries support#3938
vyzigold wants to merge 1 commit into
openstack-k8s-operators:mainfrom
vyzigold:allow-additional-insecure-registries

Conversation

@vyzigold
Copy link
Copy Markdown
Contributor

Allow content-provider jobs to register additional insecure registries on the CRC node. This patches insecureRegistries in image.config.openshift.io/cluster and configures crio, paralleling the existing cifmw_crc_additional_allowed_registries mechanism.

This will be used with a custom content-provider job, which will build and provide images of sg-core, mysqld_exporter and prometheus-podman-exporter. The mechanism is generic and can be used with other custom content-provider jobs providing other non-operator, non-openstack-service images in the future.

Generated-By: Claude-Code claude-opus-4-6

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 18, 2026

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 18, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign bshewale for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@centosinfra-prod-github-app
Copy link
Copy Markdown

Build failed (check pipeline). Post recheck (without leading slash)
to rerun all jobs. Make sure the failure cause has been resolved before
you rerun jobs.

https://gateway-cloud-softwarefactory.apps.ocp.cloud.ci.centos.org/zuul/t/rdoproject.org/buildset/a6980b64e0d246b7b2a18bea9daf392d

✔️ openstack-k8s-operators-content-provider SUCCESS in 5h 02m 14s
✔️ podified-multinode-edpm-deployment-crc SUCCESS in 1h 26m 59s
✔️ cifmw-crc-podified-edpm-baremetal SUCCESS in 1h 39m 55s
✔️ cifmw-crc-podified-edpm-baremetal-minor-update SUCCESS in 2h 12m 01s
✔️ podified-multinode-hci-deployment-crc SUCCESS in 1h 52m 21s
✔️ cifmw-multinode-tempest SUCCESS in 1h 54m 58s
✔️ adoption-standalone-to-crc-ceph-provider SUCCESS in 3h 09m 40s
whitebox-neutron-tempest-plugin-podified-multinode-edpm-deployment-crc-2comp FAILURE in 3h 49m 52s
✔️ noop SUCCESS in 0s
✔️ cifmw-pod-ansible-test SUCCESS in 9m 30s
✔️ cifmw-pod-pre-commit SUCCESS in 10m 55s
cifmw-multinode-kuttl FAILURE in 2h 28m 06s

@vyzigold vyzigold force-pushed the allow-additional-insecure-registries branch from c833b72 to 24509a6 Compare May 19, 2026 08:49
@vyzigold vyzigold marked this pull request as ready for review May 19, 2026 13:27
@vyzigold vyzigold force-pushed the allow-additional-insecure-registries branch 2 times, most recently from 6b3b0e3 to 7b5ab65 Compare May 19, 2026 13:34
Allow content-provider jobs to register additional insecure registries
on the CRC node via zuul_return. This patches insecureRegistries in
image.config.openshift.io/cluster and configures crio, paralleling the
existing cifmw_crc_additional_allowed_registries mechanism.

Generated-By: Claude-Code claude-opus-4-6
Signed-off-by: Jaromir Wysoglad <jwysogla@redhat.com>
@vyzigold vyzigold force-pushed the allow-additional-insecure-registries branch from 7b5ab65 to ef7048e Compare May 19, 2026 13:35
@centosinfra-prod-github-app
Copy link
Copy Markdown

Build failed (check pipeline). Post recheck (without leading slash)
to rerun all jobs. Make sure the failure cause has been resolved before
you rerun jobs.

https://gateway-cloud-softwarefactory.apps.ocp.cloud.ci.centos.org/zuul/t/rdoproject.org/buildset/b8a632ec5d0d452ba18df4494d9ac9f0

✔️ openstack-k8s-operators-content-provider SUCCESS in 5h 40m 23s
✔️ podified-multinode-edpm-deployment-crc SUCCESS in 1h 30m 23s
cifmw-crc-podified-edpm-baremetal RETRY_LIMIT in 26m 59s
✔️ cifmw-crc-podified-edpm-baremetal-minor-update SUCCESS in 2h 07m 36s
✔️ podified-multinode-hci-deployment-crc SUCCESS in 1h 44m 07s
✔️ cifmw-multinode-tempest SUCCESS in 1h 53m 25s
✔️ adoption-standalone-to-crc-ceph-provider SUCCESS in 3h 09m 53s
whitebox-neutron-tempest-plugin-podified-multinode-edpm-deployment-crc-2comp FAILURE in 3h 50m 33s
✔️ noop SUCCESS in 0s
✔️ cifmw-pod-ansible-test SUCCESS in 10m 20s
✔️ cifmw-pod-pre-commit SUCCESS in 10m 07s
✔️ cifmw-multinode-kuttl SUCCESS in 3h 06m 33s

@vyzigold
Copy link
Copy Markdown
Contributor Author

recheck

@centosinfra-prod-github-app
Copy link
Copy Markdown

Build failed (check pipeline). Post recheck (without leading slash)
to rerun all jobs. Make sure the failure cause has been resolved before
you rerun jobs.

https://gateway-cloud-softwarefactory.apps.ocp.cloud.ci.centos.org/zuul/t/rdoproject.org/buildset/13927ce533a14292baf0bb1575c185f8

✔️ openstack-k8s-operators-content-provider SUCCESS in 4h 04m 06s
✔️ podified-multinode-edpm-deployment-crc SUCCESS in 1h 22m 18s
✔️ cifmw-crc-podified-edpm-baremetal SUCCESS in 1h 40m 41s
✔️ cifmw-crc-podified-edpm-baremetal-minor-update SUCCESS in 2h 01m 12s
✔️ podified-multinode-hci-deployment-crc SUCCESS in 1h 43m 36s
✔️ cifmw-multinode-tempest SUCCESS in 1h 50m 04s
✔️ adoption-standalone-to-crc-ceph-provider SUCCESS in 3h 10m 42s
whitebox-neutron-tempest-plugin-podified-multinode-edpm-deployment-crc-2comp FAILURE in 3h 49m 13s
✔️ noop SUCCESS in 0s
✔️ cifmw-pod-ansible-test SUCCESS in 8m 57s
✔️ cifmw-pod-pre-commit SUCCESS in 8m 26s
✔️ cifmw-multinode-kuttl SUCCESS in 3h 05m 26s

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant