Add mirror registry CA certificate support for dataplane nodes #1784
+88
−36
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
When OCP has IDMS/ICSP configured, the registries.conf generated from MachineConfig does not include the insecure flag by default. This means mirror registries are treated as secure (HTTPS with TLS verification).
Note: The presence of IDMS/ICSP doesn't necessarily mean the cluster is disconnected. Mirror registries may be configured for other reasons (performance, policy, etc.).
For mirror registries using a private/self-signed CA certificate, dataplane nodes need the CA certificate to verify TLS connections when pulling container images.
The edpm-ansible edpm_podman role needs to be updated separately to consume the edpm_podman_registry_ca_certs variable and install the certificates on dataplane nodes.
Assisted-By: Claude