Skip to content

Latest commit

 

History

History
38 lines (33 loc) · 1.41 KB

File metadata and controls

38 lines (33 loc) · 1.41 KB

External Registry CA Injection

If you are using a secure external container registry to hold mirrored OpenShift release images, Cincinnati will need access to this registry in order to build an upgrade graph. Here's how you can inject your CA Cert into the Cincinnati pod.

OpenShift has an external registry API, located at image.config.openshift.io, that we'll use to store the external registry CA Cert. You can read more about this API in the OpenShift documentation.

Create a ConfigMap in the openshift-config namespace. Fill in your CA Cert under the key cincinnati-registry, because it's how Cincinnati locates your Cert:

apiVersion: v1
kind: ConfigMap
metadata:
  name: trusted-ca
data:
  updateservice-registry: |
    -----BEGIN CERTIFICATE-----
    ...
    -----END CERTIFICATE-----

Edit the cluster resource from the image.config.openshift.io API and set the additionalTrustedCA field to the name of the ConfigMap you just created above.

$ oc edit image.config.openshift.io cluster
spec:
  additionalTrustedCA:
    name: trusted-ca

The Cincinnati Operator will watch the image.config.openshift.io API and the ConfigMap you created in the openshift-config namespace for changes, then restart the deployment if the Cert has changed.