Skip to content

Conversation

@jamepark4
Copy link
Contributor

@jamepark4 jamepark4 commented Nov 5, 2025

Evaluating FR3 to FR4 updates on hybrid environments.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 5, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@ciecierski ciecierski requested a review from sathlan November 5, 2025 22:11
@ciecierski
Copy link
Contributor

According to latest mail announcement this registry.stage.redhat.io is correct one now.

Copy link
Contributor

@ciecierski ciecierski left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Change pull request title and name of tasks in the tasks file. Other than that it looks good to me.

@danpawlik
Copy link
Contributor

If that is a test, converting into a draft, otherwise change commit message and be more verbose. Thanks

Copy link
Contributor

@sathlan sathlan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Kinda make sense. But I agree that more context is needed. I guess that the cifmw_registry_token credential now points to staging instead of redhat cdn hence the change, but that should be clarified.

@sathlan
Copy link
Contributor

sathlan commented Nov 11, 2025

So this shoudn't work and you should have:

    - 'Error: copying system image from manifest list: Source image rejected: A signature
      was required, but no signature exists'

please confirm.

Furthermore I think the right solution is to activate redirection here.

Full working setup would be:

  1. add those lines to /etc/containers/registries.conf:
[[registry]]
  prefix = ""
  location = "registry.redhat.io"

  [[registry.mirror]]
    location = "registry.stage.redhat.io"
    pull-from-mirror = "digest-only"
  1. run those command as zuul user:
mkdir ~/.config/containers
echo '{"default":[{"type":"insecureAcceptAnything"}]}' > ~/.config/containers/policy.json

No need to rename the image.

Those are what we use to setup the compute node with staging.

Copy link
Contributor

@sathlan sathlan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I mentionned in my comment I don't think this work (it should fail on signature verification) and is the right approach IMHO. We should use what we use on the edpm compute node: proxy registries setup and ignore signature.

Of course if changing the name just work, then I will reconsider ... please let me know.

For me doing the setup in the posted comment resolved the issue without changing the image name.

@jamepark4
Copy link
Contributor Author

@sathlan I can confirm that my hybrid deployment is fully updating now with this image name change applied, but I also don't have a preference on how to unblock the updates job downstream. I can also test what you are recommending if that is the preferred route.

@sathlan
Copy link
Contributor

sathlan commented Nov 11, 2025

Nice. I'm still wondering how does your deployment avoid the signature problem, do you know ?

@jamepark4
Copy link
Contributor Author

@sathlan this is just to pull an image on the initial controller correct? I was under the impression that was already configured to handle the staging registry in this instance. I can redeploy and autohold to inspect it's registry configuration to confirm.

@ciecierski
Copy link
Contributor

@jamepark4 you are correct, this login is to pull an image on the controller-0
I don't think controller-0 is configured to pull any image from registry.redhat.io/ registry.stage.redhat.io. Openstackclient is the only container we are pulling from there. Container is pulled only during update phase.

@jamepark4
Copy link
Contributor Author

@sathlan @ciecierski yea it's strange I can't yet find what's applying the configuration to controller-0 but I didn't need to add the insecure policy to get the update to progress. It appears to already have been present:

[zuul@controller-0 containers]$ cat /etc/containers/policy.json | jq -r .default
[
  {
    "type": "insecureAcceptAnything"
  }
]
[zuul@controller-0 containers]$ podman ps | grep client
3a1f6100a93f  registry.stage.redhat.io/rhoso/openstack-openstackclient-rhel9@sha256:0b524618600a790fadb213e3421e4f3f45310a5706e656ffe5d6be51da252a6a  /usr/bin/sleep in...  4 days ago  Up 4 days                        lopenstackclient

I know downstream has some patches that add the policy to the computes, but I'm not using that in this deployment.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants