fix: Kaniko insecure-registry for Harbor (#193) #97
No reviewers
Labels
No labels
domain:backend
domain:devops
domain:frontend
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
forgejo_admin/westside-landing!97
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "193-kaniko-insecure-registry"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Summary
Kaniko probes HTTPS on port 443 before falling back to HTTP, causing a 90-second timeout against Harbor's HTTP-only in-cluster service. Adding
insecure-registrytells Kaniko to skip the HTTPS probe and use HTTP directly.Changes
.woodpecker.yaml: Addedinsecure-registry: harbor.harbor.svc.cluster.localto the build-and-push step settings, alongside the existinginsecure: trueTest Plan
Review Checklist
insecure: truekept as-is for backward compatibilityRelated Notes
Closes forgejo_admin/pal-e-platform#193
QA Review -- PR #97
Diff Analysis
Single-line addition in
.woodpecker.yaml:Findings
insecure-registryis the correct woodpeckerci/plugin-kaniko setting to bypass HTTPS probing and use HTTP directly. This addresses the 90s timeout root cause.harbor.harbor.svc.cluster.local) matches the existingregistry:setting on the line above. No mismatch.{issue}-{slug}convention.Nits
None.
VERDICT: APPROVED