fix: Kaniko insecure-registry for Harbor (#193) #7
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "193-kaniko-insecure-registry"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Summary
Adds
insecure-registrysetting to the Kaniko build step so it skips the HTTPS probe on port 443 and connects to Harbor over HTTP directly. This eliminates the 90-second timeout caused by Kaniko attempting HTTPS against Harbor's HTTP-only internal service.Changes
.woodpecker.yaml: Addedinsecure-registry: harbor.harbor.svc.cluster.localto thebuild-and-pushstep settings, after the existinginsecure: trueline.Test Plan
Review Checklist
Related Notes
pal-e-platform— infrastructure issue for Kaniko HTTPS probe timeoutQA Review
Scope: 1 file changed, 1 line added, 0 deleted.
Diff Analysis
The change adds
insecure-registry: harbor.harbor.svc.cluster.localto the Kaniko plugin settings in.woodpecker.yaml. This is the correct fix for the HTTPS probe timeout:insecure: truetells Kaniko to allow HTTP registries but it still probes HTTPS firstinsecure-registrytells Kaniko to skip the HTTPS probe entirely for the named hostregistrysetting, which is correctChecklist
registryfield exactlyNits
None.
VERDICT: APPROVE