Uploaded image for project: 'Knative Serving'
  1. Knative Serving
  2. SRVKS-453

Tag to digest resolution with registries with custom CA certs, authentication and mirrors

XMLWordPrintable

    • Icon: Epic Epic
    • Resolution: Unresolved
    • Icon: Normal Normal
    • None
    • None
    • None
    • None
    • Digest resolution for Disconnected clusters
    • To Do
    • 100% To Do, 0% In Progress, 0% Done
    • 15

      Especially for disconnected clusters, it may be useful to work with custom registries, either directly, or using them as mirrors for "outside" images.

      Knative Serving "tag to digest" resolution currently don't work with these.

      The custom registry may

      • be using TLS with a custom certificate authority
      • require authentication
      • be used as a mirror

      For ordinary OpenShift deployments, the following mechanisms would be used:

      Currently, knative only (partially) supports specifying a custom CA via KnativeServing CR

          controller-custom-certs:
            name: custom-configmap
            type: ConfigMap
      

      (but that would break integration with internal registry)

      Ideally, the Serverless operator would consume the existing OpenShift mechanisms (see above) and reconfigure knative serving controller automagically so that digest resolution works whenever an image pull would work for the same image on an OpenShift node.

      User story:

      As a developer,
      having application images on an enterprise registry internal.acme.com , which uses a custom corporate certificate authority (CA), and requires authentication,
      I want to deploy a knative service from an image "internal.acme.com/foo/bar:42" .

              Unassigned Unassigned
              maschmid@redhat.com Marek Schmidt
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

                Created:
                Updated: