Skip to content

Conversation

@rabi
Copy link
Contributor

@rabi rabi commented Jan 29, 2026

Mirror registries configured via IDMS/ICSP require TLS verification by default. For registries using private or self-signed CA certificates, dataplane nodes need access to these CA certificates to verify TLS connections when pulling container images.

Note: The presence of IDMS/ICSP doesn't necessarily mean the cluster is disconnected. Mirror registries may be configured for other reasons (performance, policy, etc.).

This change retrieves CA certificates from the ConfigMap referenced by image.config.openshift.io/cluster's additionalTrustedCA field (located in openshift-config namespace) and adds them to the combined-ca-bundle secret.

The existing bootstrap service copies this bundle to EDPM nodes and updates the system trust store, so no edpm-ansible changes are required.

Assisted-By: Claude
Signed-off-by: rabi [email protected]

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 29, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: rabi

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot requested review from abays and rebtoor January 29, 2026 10:38
rabi added a commit to rabi/edpm-ansible that referenced this pull request Jan 29, 2026
When OCP is configured with mirror registries using private/self-signed
CA certificates, the openstack-operator now passes these certificates
via the edpm_podman_registry_ca_certs variable.

This enables dataplane nodes to verify TLS connections when pulling
container images from mirror registries that use private CAs.

Depends-On: openstack-k8s-operators/openstack-operator#1784

Assisted-By: Claude
Signed-off-by: rabi <[email protected]>
rabi added a commit to rabi/edpm-ansible that referenced this pull request Jan 29, 2026
When OCP is configured with mirror registries using private/self-signed
CA certificates, the openstack-operator now passes these certificates
via the edpm_podman_registry_ca_certs variable.

This enables dataplane nodes to verify TLS connections when pulling
container images from mirror registries that use private CAs.

Depends-On: openstack-k8s-operators/openstack-operator#1784

Assisted-By: Claude
Signed-off-by: rabi <[email protected]>
@rabi
Copy link
Contributor Author

rabi commented Feb 1, 2026

/retest-required

Mirror registries configured via IDMS/ICSP require TLS verification by
default. For registries using private or self-signed CA certificates,
dataplane nodes need access to these CA certificates to verify TLS
connections when pulling container images.

Note: The presence of IDMS/ICSP doesn't necessarily mean the cluster is
disconnected. Mirror registries may be configured for other reasons
(performance, policy, etc.).

This change retrieves CA certificates from the ConfigMap referenced by
image.config.openshift.io/cluster's additionalTrustedCA field (located
in openshift-config namespace) and adds them to the combined-ca-bundle
secret. The existing bootstrap service copies this bundle to EDPM nodes
and updates the system trust store, so no edpm-ansible changes are required.

Assisted-By: Claude
Signed-off-by: rabi <[email protected]>
@softwarefactory-project-zuul
Copy link

Build failed (check pipeline). Post recheck (without leading slash)
to rerun all jobs. Make sure the failure cause has been resolved before
you rerun jobs.

https://softwarefactory-project.io/zuul/t/rdoproject.org/buildset/e1efe6387274461e8d7658e6a735920c

✔️ openstack-k8s-operators-content-provider SUCCESS in 1h 48m 06s
✔️ podified-multinode-edpm-deployment-crc SUCCESS in 1h 18m 42s
✔️ cifmw-crc-podified-edpm-baremetal SUCCESS in 1h 35m 09s
openstack-operator-tempest-multinode RETRY_LIMIT in 5m 55s

@rabi
Copy link
Contributor Author

rabi commented Feb 2, 2026

recheck

@rabi rabi requested a review from stuggi February 2, 2026 03:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant