-
Notifications
You must be signed in to change notification settings - Fork 102
Add mirror registry CA certificate support for dataplane nodes #1784
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: rabi The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
When OCP is configured with mirror registries using private/self-signed CA certificates, the openstack-operator now passes these certificates via the edpm_podman_registry_ca_certs variable. This enables dataplane nodes to verify TLS connections when pulling container images from mirror registries that use private CAs. Depends-On: openstack-k8s-operators/openstack-operator#1784 Assisted-By: Claude Signed-off-by: rabi <[email protected]>
When OCP is configured with mirror registries using private/self-signed CA certificates, the openstack-operator now passes these certificates via the edpm_podman_registry_ca_certs variable. This enables dataplane nodes to verify TLS connections when pulling container images from mirror registries that use private CAs. Depends-On: openstack-k8s-operators/openstack-operator#1784 Assisted-By: Claude Signed-off-by: rabi <[email protected]>
|
/retest-required |
Mirror registries configured via IDMS/ICSP require TLS verification by default. For registries using private or self-signed CA certificates, dataplane nodes need access to these CA certificates to verify TLS connections when pulling container images. Note: The presence of IDMS/ICSP doesn't necessarily mean the cluster is disconnected. Mirror registries may be configured for other reasons (performance, policy, etc.). This change retrieves CA certificates from the ConfigMap referenced by image.config.openshift.io/cluster's additionalTrustedCA field (located in openshift-config namespace) and adds them to the combined-ca-bundle secret. The existing bootstrap service copies this bundle to EDPM nodes and updates the system trust store, so no edpm-ansible changes are required. Assisted-By: Claude Signed-off-by: rabi <[email protected]>
|
Build failed (check pipeline). Post https://softwarefactory-project.io/zuul/t/rdoproject.org/buildset/e1efe6387274461e8d7658e6a735920c ✔️ openstack-k8s-operators-content-provider SUCCESS in 1h 48m 06s |
|
recheck |
Mirror registries configured via IDMS/ICSP require TLS verification by default. For registries using private or self-signed CA certificates, dataplane nodes need access to these CA certificates to verify TLS connections when pulling container images.
Note: The presence of IDMS/ICSP doesn't necessarily mean the cluster is disconnected. Mirror registries may be configured for other reasons (performance, policy, etc.).
This change retrieves CA certificates from the ConfigMap referenced by image.config.openshift.io/cluster's additionalTrustedCA field (located in openshift-config namespace) and adds them to the combined-ca-bundle secret.
The existing bootstrap service copies this bundle to EDPM nodes and updates the system trust store, so no edpm-ansible changes are required.
Assisted-By: Claude
Signed-off-by: rabi [email protected]