Skip to content

Add mirror registry CA certificate support for dataplane nodes#1784

Merged
openshift-merge-bot[bot] merged 1 commit intoopenstack-k8s-operators:mainfrom
rabi:mirror_reg_cert
Feb 5, 2026
Merged

Add mirror registry CA certificate support for dataplane nodes#1784
openshift-merge-bot[bot] merged 1 commit intoopenstack-k8s-operators:mainfrom
rabi:mirror_reg_cert

Conversation

@rabi
Copy link
Contributor

@rabi rabi commented Jan 29, 2026

Mirror registries configured via IDMS/ICSP require TLS verification by default. For registries using private or self-signed CA certificates, dataplane nodes need access to these CA certificates to verify TLS connections when pulling container images.

Note: The presence of IDMS/ICSP doesn't necessarily mean the cluster is disconnected. Mirror registries may be configured for other reasons (performance, policy, etc.).

This change retrieves CA certificates from the ConfigMap referenced by image.config.openshift.io/cluster's additionalTrustedCA field (located in openshift-config namespace) and adds them to the combined-ca-bundle secret.

The existing bootstrap service copies this bundle to EDPM nodes and updates the system trust store, so no edpm-ansible changes are required.

Assisted-By: Claude
Signed-off-by: rabi ramishra@redhat.com

@openshift-ci openshift-ci bot requested review from abays and rebtoor January 29, 2026 10:38
rabi added a commit to rabi/edpm-ansible that referenced this pull request Jan 29, 2026
When OCP is configured with mirror registries using private/self-signed
CA certificates, the openstack-operator now passes these certificates
via the edpm_podman_registry_ca_certs variable.

This enables dataplane nodes to verify TLS connections when pulling
container images from mirror registries that use private CAs.

Depends-On: openstack-k8s-operators/openstack-operator#1784

Assisted-By: Claude
Signed-off-by: rabi <ramishra@redhat.com>
rabi added a commit to rabi/edpm-ansible that referenced this pull request Jan 29, 2026
When OCP is configured with mirror registries using private/self-signed
CA certificates, the openstack-operator now passes these certificates
via the edpm_podman_registry_ca_certs variable.

This enables dataplane nodes to verify TLS connections when pulling
container images from mirror registries that use private CAs.

Depends-On: openstack-k8s-operators/openstack-operator#1784

Assisted-By: Claude
Signed-off-by: rabi <ramishra@redhat.com>
@rabi
Copy link
Contributor Author

rabi commented Feb 1, 2026

/retest-required

@softwarefactory-project-zuul
Copy link

Build failed (check pipeline). Post recheck (without leading slash)
to rerun all jobs. Make sure the failure cause has been resolved before
you rerun jobs.

https://softwarefactory-project.io/zuul/t/rdoproject.org/buildset/e1efe6387274461e8d7658e6a735920c

✔️ openstack-k8s-operators-content-provider SUCCESS in 1h 48m 06s
✔️ podified-multinode-edpm-deployment-crc SUCCESS in 1h 18m 42s
✔️ cifmw-crc-podified-edpm-baremetal SUCCESS in 1h 35m 09s
openstack-operator-tempest-multinode RETRY_LIMIT in 5m 55s

@rabi
Copy link
Contributor Author

rabi commented Feb 2, 2026

recheck

@rabi rabi requested a review from stuggi February 2, 2026 03:19
Mirror registries configured via IDMS/ICSP require TLS verification by
default. For registries using private or self-signed CA certificates,
dataplane nodes need access to these CA certificates to verify TLS
connections when pulling container images.

Note: The presence of IDMS/ICSP doesn't necessarily mean the cluster is
disconnected. Mirror registries may be configured for other reasons
(performance, policy, etc.).

This change retrieves CA certificates from the ConfigMap referenced by
image.config.openshift.io/cluster's additionalTrustedCA field (located
in openshift-config namespace) and adds them to the combined-ca-bundle
secret. The existing bootstrap service copies this bundle to EDPM nodes
and updates the system trust store, so no edpm-ansible changes are required.

Assisted-By: Claude
Signed-off-by: rabi <ramishra@redhat.com>
Copy link
Contributor

@stuggi stuggi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 5, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: rabi, stuggi

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@stuggi
Copy link
Contributor

stuggi commented Feb 5, 2026

/test functional

@openshift-merge-bot openshift-merge-bot bot merged commit a8f825c into openstack-k8s-operators:main Feb 5, 2026
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants