Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-1601

Add sigstore support to the Image CR in OCP 4.x

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Done
    • Icon: Major Major
    • None
    • None
    • Node
    • False
    • False
    • Undefined

      1. Proposed title of this feature request
      Add sigstore configuration support to the cluster wide Image CR.

      2. What is the nature and description of the request?

      The steps to set up sigstore in a OCP 4.x cluster (https://access.redhat.com/verify-images-ocp4) requires modifying the /etc/containers/registries.conf and /etc/containers/policy.json files on the node. However, if the cluster wide Image CR also modifies the same registries.conf and policy.json file when it is used to configure the insecure, allowed, and blocked registries. This causes the sigstore configuration to not take effect as the Image CR has a higher priority.

      3. Why does the customer need this? (List the business requirements here)

      A common place to configure both sigstore and registries would be more user friendly. The proposal is to modify the Image CRD so that users can use the cluster wide Image CR to set up sigstore on the cluster.

      4. List any affected packages or components.

      The registries configuration from the cluster wide image CR is used by node/MCO, builds, imagesteam imports, and registry pull-through.

       

      Note: The current workaround for this is to update the sigstore configuration doc to say that you cannot use the cluster wide Image CR for any registries configuration when using sigstore.

      BZ: https://bugzilla.redhat.com/show_bug.cgi?id=1866268

            gausingh@redhat.com Gaurav Singh
            gausingh@redhat.com Gaurav Singh
            Votes:
            1 Vote for this issue
            Watchers:
            4 Start watching this issue

              Created:
              Updated:
              Resolved: