Browse Source

Intermediate registry: use --insecure-policy

There is no policy file available, and we aren't concerned with
verifying image signatures at this point.  Add this option to
tell skopeo to proceed regardless.

Change-Id: I15a4978ec0fb338bc05c974b0ec6a21f680c853e
master
James E. Blair 3 months ago
parent
commit
c7818fe499

+ 1
- 1
roles/pull-from-intermediate-registry/tasks/main.yaml View File

@@ -1,6 +1,6 @@
1 1
 - name: Pull artifact from intermediate registry
2 2
   command: >-
3
-    skopeo copy
3
+    skopeo copy --insecure-policy
4 4
     --src-creds={{ intermediate_registry.username }}:{{ intermediate_registry.password }}
5 5
     --dest-creds={{ buildset_registry.username }}:{{ buildset_registry.password }}
6 6
     {{ item.url }}

+ 1
- 1
roles/push-to-intermediate-registry/tasks/push.yaml View File

@@ -1,6 +1,6 @@
1 1
 - name: Push tag to intermediate registry
2 2
   command: >-
3
-    skopeo copy
3
+    skopeo copy --insecure-policy
4 4
     --src-creds={{ buildset_registry.username }}:{{ buildset_registry.password }}
5 5
     --dest-creds={{ intermediate_registry.username }}:{{ intermediate_registry.password }}
6 6
     docker://{{ buildset_registry.host }}:{{ buildset_registry.port }}/{{ image.repository }}:{{ image_tag }}

Loading…
Cancel
Save