Pavel Sapozhnikov wrote on 2/13/19 9:45 PM:
> Hi
>
> Is there any way to configure Build Webhook URL in OpenShift to be not
> HTTPS?
>
> If answer is yes, then how?
Even if you could, it wouldn't make sense. Do you want somebody to sniff
your hook secret and DoS your server with numerous builds?
On Wed, Feb 13, 2019 at 3:35 PM Marc Boorshtein
wrote:
>
>
>
>
>> what version of OKD?
>>
>
> 3.11
>
>
>>
>>> failed to pull image: open /etc/docker/certs.d/
>>> registry.access.redhat.com/redhat-ca.crt: no such file or directory
>>>
>>
>> It sounds like your docker daemon configuration may be po
> what version of OKD?
>
3.11
>
>> failed to pull image: open /etc/docker/certs.d/
>> registry.access.redhat.com/redhat-ca.crt: no such file or directory
>>
>
> It sounds like your docker daemon configuration may be pointing to a file
> that doesn't exist, can you double check your docker daemon
On Wed, Feb 13, 2019 at 2:33 PM Marc Boorshtein
wrote:
> I'm trying to automate my build of our rhel images on our OKD instance.
> When I try to run my build I get:
>
what version of OKD?
> failed to pull image: open /etc/docker/certs.d/
> registry.access.redhat.com/redhat-ca.crt: no such file
On Wed, Feb 13, 2019 at 2:46 PM Pavel Sapozhnikov <
pavel.sapozhni...@gmail.com> wrote:
> Hi
>
> Is there any way to configure Build Webhook URL in OpenShift to be not
> HTTPS?
>
I do not believe so
> If answer is yes, then how?
>
> If answer is no, how do I retrieve the SSL certificate from Op
Hi
Is there any way to configure Build Webhook URL in OpenShift to be not
HTTPS?
If answer is yes, then how?
If answer is no, how do I retrieve the SSL certificate from OpenShift build
webhook url and give this cert to Bitbucket server?
Thanks
-p
___
I'm trying to automate my build of our rhel images on our OKD instance.
When I try to run my build I get:
failed to pull image: open /etc/docker/certs.d/
registry.access.redhat.com/redhat-ca.crt: no such file or directory
i can pull images from docker on mac without issue from
registry.access.red
Dale,
I'm not finding the documentation right now, maybe it's a KCS article.
But no, we don't remove v2 keys after the migration process. They can
safely be removed after verifying that
kubernetesMasterConfig.apiServerArguments.storage-backend is set to
etcd3. ex :
kubernetesMasterConfig:
apiSe
>
> So, if I want to use skopeo to copy my image to an external registry, as
> part of a promotion stragegy, I need to create my own jenkins slave image?
>
At present, yes. In the same spirit as the skopeo discussion [1], I think
we can do a better job of documenting how to extend our Jenkins imag
i should have known that. Awesome, much easier way to go.
Thanks!
On Wed, Feb 13, 2019 at 1:24 PM Adam Kaplan wrote:
> I can use a BuildConfig to build and push a generic docker image?
>>
>
> Yes - this is what the Docker build strategy is for [1].
>
> [1]
> https://docs.okd.io/3.11/dev_guide/
>
> I can use a BuildConfig to build and push a generic docker image?
>
Yes - this is what the Docker build strategy is for [1].
[1]
https://docs.okd.io/3.11/dev_guide/builds/build_strategies.html#docker-strategy-options
On Wed, Feb 13, 2019 at 12:53 PM Marc Boorshtein
wrote:
> Right now on 3.
Hi Adam,
So, if I want to use skopeo to copy my image to an external registry, as
part of a promotion stragegy, I need to create my own jenkins slave image?
I understand keeping the base image minimum, but I think we should provide
ready to use common slaves such as for running skopeo and buildah.
Hi Marc,
You can extend our slave-base agent image to yum install buildah. In
general we want to keep the slave-base as minimal as possible (we've said
no to similar requests to include skopeo).
You can also use OpenShift builds directly to create images - starting in
4.0 the docker and source str
I want to build a container using our jenkins in okd. I'm using the maven
jenkins agent now quite well and want to do the same thing with some docker
container images that aren't s2i. It looks like this should be doable via
buildah, has anyone created an agent for openshift's jenkins?
Thanks
Mar
That's fine by me, I'de rather have Ansible deploy the config changes correctly.
But maybe is there another Ansible playbook which I could use instead of the
deploy_cluster.yml for doing changes file which would be faster?
Or is deploy_cluster.yml playbook the correct one to use when changing co
15 matches
Mail list logo