Skip to content

[release-1.21] Remember --registry-insecure setting on recurring runs#3574

Merged
knative-prow[bot] merged 3 commits intoknative:release-1.21from
creydr:cp-remember-registry-insecure-flag-1.21
Apr 7, 2026
Merged

[release-1.21] Remember --registry-insecure setting on recurring runs#3574
knative-prow[bot] merged 3 commits intoknative:release-1.21from
creydr:cp-remember-registry-insecure-flag-1.21

Conversation

@creydr
Copy link
Copy Markdown
Member

@creydr creydr commented Apr 2, 2026

Cherry-pick of #3490

creydr and others added 2 commits April 2, 2026 16:10
…native#3484)

When --registry-insecure is used, set tlsVerify=false in the Tekton
pipeline to allow buildah to push to registries with self-signed certs.
* Revert "Pass --registry-insecure flag to Tekton pipeline tlsVerify parameter (knative#3484)"

This reverts commit da21fa2.

* Remember `--registry-insecure` setting on recurring runs

* Run `make schema-generate`

* Simplify parsing

* Extend description of flag, that values are persited

* Add warning, when registry changed but insecure-registry is still set to true

* Fix typo

* Rerun update-codegen

* Cleanup test names

* Add unit test for WarnRegistryInsecureChange

* Run schema-generate

* Update pkg/functions/client.go

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>

* Update pkg/functions/client.go

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>

* Update pkg/config/config.go

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>

* Update pkg/config/config.go

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>

* Fix format issues (goimport and gofmt)

* Refactor registry-insecure unit test to make it available for the Deploy tests too

* Refactor GlobalConfig.WarnRegistryInsecureChange() method to function in cmd package

---------

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>
@knative-prow knative-prow bot requested review from dsimansk and jrangelramos April 2, 2026 14:17
@knative-prow knative-prow bot added the size/XL 🤖 PR changes 500-999 lines, ignoring generated files. label Apr 2, 2026
@creydr
Copy link
Copy Markdown
Member Author

creydr commented Apr 2, 2026

/cherry-pick release-1.20

@knative-prow-robot
Copy link
Copy Markdown

@creydr: once the present PR merges, I will cherry-pick it on top of release-1.20 in a new PR and assign it to you.

Details

In response to this:

/cherry-pick release-1.20

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@creydr
Copy link
Copy Markdown
Member Author

creydr commented Apr 2, 2026

/cc @gauron99

@knative-prow knative-prow bot requested a review from gauron99 April 2, 2026 14:17
@gauron99
Copy link
Copy Markdown
Contributor

gauron99 commented Apr 2, 2026

@creydr pls regenerate docs

@creydr
Copy link
Copy Markdown
Member Author

creydr commented Apr 7, 2026

@creydr pls regenerate docs

Updated it. Sorry for the noise. It's green now

@gauron99
Copy link
Copy Markdown
Contributor

gauron99 commented Apr 7, 2026

/lgtm
/approve

@knative-prow knative-prow bot added the lgtm 🤖 PR is ready to be merged. label Apr 7, 2026
@knative-prow
Copy link
Copy Markdown

knative-prow bot commented Apr 7, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: creydr, gauron99

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@knative-prow knative-prow bot added the approved 🤖 PR has been approved by an approver from all required OWNERS files. label Apr 7, 2026
@knative-prow knative-prow bot merged commit efeae04 into knative:release-1.21 Apr 7, 2026
17 checks passed
@knative-prow-robot
Copy link
Copy Markdown

@creydr: #3574 failed to apply on top of branch "release-1.20":

Applying: Pass --registry-insecure flag to Tekton pipeline tlsVerify parameter (#3484)
Using index info to reconstruct a base tree...
M	cmd/client.go
M	cmd/deploy.go
M	pkg/pipelines/tekton/pipelines_provider.go
M	pkg/pipelines/tekton/templates.go
Falling back to patching base and 3-way merge...
Auto-merging pkg/pipelines/tekton/templates.go
Auto-merging pkg/pipelines/tekton/pipelines_provider.go
Auto-merging cmd/deploy.go
CONFLICT (content): Merge conflict in cmd/deploy.go
Auto-merging cmd/client.go
CONFLICT (content): Merge conflict in cmd/client.go
error: Failed to merge in the changes.
hint: Use 'git am --show-current-patch=diff' to see the failed patch
hint: When you have resolved this problem, run "git am --continue".
hint: If you prefer to skip this patch, run "git am --skip" instead.
hint: To restore the original branch and stop patching, run "git am --abort".
hint: Disable this message with "git config set advice.mergeConflict false"
Patch failed at 0001 Pass --registry-insecure flag to Tekton pipeline tlsVerify parameter (#3484)

Details

In response to this:

/cherry-pick release-1.20

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

creydr added a commit to creydr/knative-func that referenced this pull request Apr 7, 2026
…ns (knative#3574)

* Pass --registry-insecure flag to Tekton pipeline tlsVerify parameter (knative#3484)

When --registry-insecure is used, set tlsVerify=false in the Tekton
pipeline to allow buildah to push to registries with self-signed certs.

* Remember `--registry-insecure` setting on recurring runs (knative#3490)

* Revert "Pass --registry-insecure flag to Tekton pipeline tlsVerify parameter (knative#3484)"

This reverts commit da21fa2.

* Remember `--registry-insecure` setting on recurring runs

* Run `make schema-generate`

* Simplify parsing

* Extend description of flag, that values are persited

* Add warning, when registry changed but insecure-registry is still set to true

* Fix typo

* Rerun update-codegen

* Cleanup test names

* Add unit test for WarnRegistryInsecureChange

* Run schema-generate

* Update pkg/functions/client.go

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>

* Update pkg/functions/client.go

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>

* Update pkg/config/config.go

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>

* Update pkg/config/config.go

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>

* Fix format issues (goimport and gofmt)

* Refactor registry-insecure unit test to make it available for the Deploy tests too

* Refactor GlobalConfig.WarnRegistryInsecureChange() method to function in cmd package

---------

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>

* Ran `./hack/update-codegen.sh`

---------

Co-authored-by: David Fridrich <49119790+gauron99@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved 🤖 PR has been approved by an approver from all required OWNERS files. lgtm 🤖 PR is ready to be merged. size/XL 🤖 PR changes 500-999 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants