Prepare command to detect need to set DockerInsecureRegistryAddress

Bug #1722632 reported by Steve Baker
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tripleo
Fix Released
High
Steve Baker

Bug Description

Currently when using a local insecure registry, this parameter needs to be appended manually into the environment file:

  DockerInsecureRegistryAddress: 192.168.24.1:8787

The container image prepare command should have an argument to do this, so this manual step is not required.

Changed in tripleo:
status: New → Triaged
importance: Undecided → High
assignee: nobody → Steve Baker (steve-stevebaker)
milestone: none → queens-1
Revision history for this message
YaZug (jon-schlueter) wrote :

This is now implemented in at least 3 different tripleo deployment helpers repos for CI

https://review.openstack.org/#/c/509232/9/roles/overcloud-prep-containers/templates/overcloud-prep-containers.sh.j2@15

https://github.com/openstack/tripleo-quickstart-extras/search?utf8=%E2%9C%93&q=insecure&type=

https://github.com/redhat-openstack/tripleo-upgrade/search?utf8=%E2%9C%93&q=INSECURE&type=

https://github.com/redhat-openstack/infrared/search?utf8=%E2%9C%93&q=insecure&type=

Getting this functionality rolled into tripleo which can be re-used by these other projects would be helpful to reduce amount of code duplication as well as feature richness of the functionality.

Revision history for this message
Steve Baker (steve-stevebaker) wrote :

Rather than adding another option to the prepare command, it should just detect whether the registry is insecure by making https and http calls, then set the DockerInsecureRegistryAddress if it is not https.

summary: - Prepare command needs the option of setting
- DockerInsecureRegistryAddress
+ Prepare command to detect need to set DockerInsecureRegistryAddress
Changed in tripleo:
milestone: queens-1 → queens-2
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to python-tripleoclient (master)

Fix proposed to branch: master
Review: https://review.openstack.org/514473

Changed in tripleo:
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Related fix proposed to tripleo-quickstart-extras (master)

Related fix proposed to branch: master
Review: https://review.openstack.org/514477

Revision history for this message
Bogdan Dobrelya (bogdando) wrote :

Note this has to be backported to Pike, otherwise the quickstart extras will be breaking, when using it to deploy Pike.

tags: added: pike-backport-potential
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Related fix proposed to tripleo-docs (master)

Related fix proposed to branch: master
Review: https://review.openstack.org/516356

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to python-tripleoclient (master)

Reviewed: https://review.openstack.org/514473
Committed: https://git.openstack.org/cgit/openstack/python-tripleoclient/commit/?id=007db34bfcea19d902c19c93265691eb3b902d16
Submitter: Zuul
Branch: master

commit 007db34bfcea19d902c19c93265691eb3b902d16
Author: Steve Baker <email address hidden>
Date: Tue Oct 24 10:59:02 2017 +1300

    Autodetect insecure registry in container image prepare

    This change automatically inserts the DockerInsecureRegistryAddress
    parameter into the containers image environment file if the registry
    is reachable and unencrypted.

    This eliminates a documented manual step, which is also required
    throughout CI. It has been done in tripleoclient so that it can be
    backported. The dedicated workflow for
    blueprint container-prepare-workflow will have its own insecure
    detection.

    Change-Id: I74586145c222921880402cec92bbaa5f10e8b972
    Closes-Bug: #1722632

Changed in tripleo:
status: In Progress → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Related fix merged to tripleo-docs (master)

Reviewed: https://review.openstack.org/516356
Committed: https://git.openstack.org/cgit/openstack/tripleo-docs/commit/?id=9a0ef0cc6565add531079d0d787c59eb9fcf083b
Submitter: Zuul
Branch: master

commit 9a0ef0cc6565add531079d0d787c59eb9fcf083b
Author: Martin André <email address hidden>
Date: Mon Oct 30 16:38:22 2017 +0100

    Remove instruction to append DockerInsecureRegistryAddress

    This is now done automatically by the prepare command that detects if
    the registry is secure and appends DockerInsecureRegistryAddress when
    needed.

    Change-Id: I0c34cc86703888089b20e90accef9ab2c417bf8a
    Depends-On: I74586145c222921880402cec92bbaa5f10e8b972
    Related-Bug: #1722632

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to python-tripleoclient (stable/pike)

Fix proposed to branch: stable/pike
Review: https://review.openstack.org/516452

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to python-tripleoclient (stable/pike)

Reviewed: https://review.openstack.org/516452
Committed: https://git.openstack.org/cgit/openstack/python-tripleoclient/commit/?id=2e2a1ec29d6d53b00d604049113dfd48a9f3181d
Submitter: Zuul
Branch: stable/pike

commit 2e2a1ec29d6d53b00d604049113dfd48a9f3181d
Author: Steve Baker <email address hidden>
Date: Tue Oct 24 10:59:02 2017 +1300

    Autodetect insecure registry in container image prepare

    This change automatically inserts the DockerInsecureRegistryAddress
    parameter into the containers image environment file if the registry
    is reachable and unencrypted.

    This eliminates a documented manual step, which is also required
    throughout CI. It has been done in tripleoclient so that it can be
    backported. The dedicated workflow for
    blueprint container-prepare-workflow will have its own insecure
    detection.

    Change-Id: I74586145c222921880402cec92bbaa5f10e8b972
    Closes-Bug: #1722632
    (cherry picked from commit 007db34bfcea19d902c19c93265691eb3b902d16)

tags: added: in-stable-pike
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Related fix merged to tripleo-quickstart-extras (master)

Reviewed: https://review.openstack.org/514477
Committed: https://git.openstack.org/cgit/openstack/tripleo-quickstart-extras/commit/?id=1d675866bb9e4edadd4e7d62379eb18bbc85bf9a
Submitter: Zuul
Branch: master

commit 1d675866bb9e4edadd4e7d62379eb18bbc85bf9a
Author: Steve Baker <email address hidden>
Date: Tue Oct 24 11:18:00 2017 +1300

    Don't append DockerInsecureRegistryAddress

    This is no longer required as the prepare command detects whether the
    registry is secure and DockerInsecureRegistryAddress as necessary.

    Change-Id: Ieac6b4b2a7ab81688d1dc4315c312eef8be500c9
    Depends-On: I74586145c222921880402cec92bbaa5f10e8b972
    Related-Bug: #1722632

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix included in openstack/python-tripleoclient 7.3.3

This issue was fixed in the openstack/python-tripleoclient 7.3.3 release.

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Related fix proposed to tripleo-upgrade (master)

Related fix proposed to branch: master
Review: https://review.openstack.org/524141

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix included in openstack/python-tripleoclient 8.1.0

This issue was fixed in the openstack/python-tripleoclient 8.1.0 release.

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Related fix merged to tripleo-upgrade (master)
Download full text (25.0 KiB)

Reviewed: https://review.openstack.org/524141
Committed: https://git.openstack.org/cgit/openstack/tripleo-upgrade/commit/?id=4572055ffb52b9fe6ff3567afe709a0a68cf1d6b
Submitter: Zuul
Branch: master

commit 4572055ffb52b9fe6ff3567afe709a0a68cf1d6b
Author: Sofer Athlan-Guyot <email address hidden>
Date: Tue Aug 1 15:30:22 2017 +0200

    Merge tripleo-upgrade repo from redhat-openstack namespace

    Make sure scripts are created with the executable bit set.

    Change-Id: I731902411e987b4ea7c2aa84fef869fe5e1c25ae

    Add a oooq comptatibility layer, documentation and example.

    Change-Id: I30fe6359f1c0098ff9bcdd5939724491d94ef199

    Add support for applying w/a before and after upgrade

    This change adds the ability to apply workarounds before and after
    the overcloud upgrade process has finished. This allows the user
    to workaround particular issues that show up after the upgrade
    process has finished.

    Change-Id: I21a7e885bcc466af6bf80410ba2cc8d03865cb33

    Fix missing quotes

    This changes adds missing quotes to the node_upgrade_script.yml
    templates. Currently the task is failing because of the missing quotes.

    Change-Id: Ied9217df374d09bf90e6878a7c79e22042f44d99

    Add support for applying workarounds post undercloud upgrade

    This change adds support for applying workarounds after the undercloud
    upgrade process has finished as part of the undercloud upgrade.

    Change-Id: If85900969c0d591cf6024408d958a82fa8c8a534

    Adjust overcloud_converge_upgrade_script script

    This change adjusts the overcloud_converge_upgrade_script to allow
    running the upgrade converge stage. In addition it adjust the ssh
    config file to skip host key check so the non-controller script does
    not get stuck waiting for user input.

    Change-Id: Ic38f325c61e90165a5322ef754f7e5514ed8e687

    Append working_dir to logs generated

    Change-Id: I6bc9f0c58ad8684ed03dee042e9cfb2bdc6835f6

    Install ceph-ansible during undercloud upgrade

    ceph-ansible is required to be installed manually for deployments
    with ceph nodes. This change installs the ceph-ansible package
    before the undercloud upgrade.

    Change-Id: If8918a38250a10681d965d0715ebc17078166336

    Use openstack overcloud container image prepare command

    This change adds the use of openstack overcloud container image prepare
    command for generating the environment file containing the container
    image names and local registry address.

    Change-Id: I174f7e3aae415d51224cf73da83a859e90eed095

    Do not rely on ansible inventory for upgrading non controller nodes

    Currently we are relying on the ansible inventory to provide groups
    containing compute nodes and their facts when creating the upgrade
    scripts. In order to remove this requirement and provide easier
    integration this change discovers the compute and swift storage nodes
    from the undercloud. In addition it adds a wait loop for instance live
    migration to complete before and after upgrading compute nodes and adds
    support for swift storage nod...

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.