Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-6490

Enable Option to Skip TLS Verification for Custom S3 Storage in `config.image` for image-registry

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Done
    • Icon: Major Major
    • None
    • openshift-4.16, openshift-4.17
    • Registry
    • False
    • None
    • False
    • Not Selected

      1. Proposed title of this feature request

      Add Option to Skip TLS Verification in config.image for Custom S3 Storage Using Self-Signed Certificates

      2. What is the nature and description of the request?

      This feature request proposes adding an option to skip TLS verification when connecting to custom S3 storage via the config.image object. The current implementation requires customers to specify a trustedCA, which is mandatory even when using self-signed certificates. The requested feature will give customers the flexibility to either provide a trustedCA or bypass the TLS verification by introducing a new optional parameter like skipTLSVerification: true.

      At the moment there is no option to skip TLS verification:

      $ oc explain config.spec.storage.s3
      FIELDS:
        bucket    <string>
          bucket is the bucket name in which you want to store the registry's data.
          Optional, will be generated if not provided.
        chunkSizeMiB    <integer>
          chunkSizeMiB defines the size of the multipart upload chunks of the S3 API.
          The S3 API requires multipart upload chunks to be at least 5MiB. When
          omitted, this means no opinion and the platform is left to choose a
          reasonable default, which is subject to change over time. The current
          default value is 10 MiB. The value is an integer number of MiB. The minimum
          value is 5 and the maximum value is 5120 (5 GiB).
        cloudFront    <Object>
          cloudFront configures Amazon Cloudfront as the storage middleware in a
          registry.
        encrypt    <boolean>
          encrypt specifies whether the registry stores the image in encrypted format
          or not. Optional, defaults to false.
        keyID    <string>
          keyID is the KMS key ID to use for encryption. Optional, Encrypt must be
          true, or this parameter is ignored.
        region    <string>
          region is the AWS region in which your bucket exists. Optional, will be set
          based on the installed AWS Region.
        regionEndpoint    <string>
          regionEndpoint is the endpoint for S3 compatible storage services. It should
          be a valid URL with scheme, e.g. https://s3.example.com. Optional, defaults
          based on the Region that is provided.
        trustedCA    <Object>
          trustedCA is a reference to a config map containing a CA bundle. The image
          registry and its operator use certificates from this bundle to verify S3
          server certificates.
           The namespace for the config map referenced by trustedCA is
          "openshift-config". The key for the bundle in the config map is
          "ca-bundle.crt".
        virtualHostedStyle    <boolean>
          virtualHostedStyle enables using S3 virtual hosted style bucket paths with a
          custom RegionEndpoint Optional, defaults to false.
      

       

      3. Why does the customer need this? (List the business requirements here)

      • Customers using self-signed certificates for their custom S3 storage need a more flexible way to connect without having to specify a trustedCA.
      • It simplifies the process by allowing them to skip TLS verification, reducing operational overhead and time spent configuring and managing trusted certificates.
      • It prevents connection issues that arise from not providing a trustedCA, which currently makes connecting to custom S3 storage impossible if it’s not specified.
      • This will help users who prefer self-signed certificates or lack access to a trusted CA, improving customer satisfaction and reducing friction in custom S3 storage connections.

      4. List any affected packages or components.
      image-registry

       

              DanielMesser Daniel Messer
              rhn-support-dpateriy Divyam Pateriya
              Votes:
              1 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: