Skip to content

Commit c7c50a8

Browse files
authored
Merge pull request #102375 from mburke5678/node-openshift-cluster-policy-ga
OSDOCS 17320 Enable sigstore 'openshift' clusterimagepolicy by default
2 parents 5620665 + 0d4cfb7 commit c7c50a8

File tree

2 files changed

+13
-17
lines changed

2 files changed

+13
-17
lines changed

modules/nodes-sigstore-configure-cluster-policy.adoc

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,15 @@
66
[id="nodes-sigstore-configure-cluster-policy_{context}"]
77
= Creating a cluster image policy CR
88

9+
[role="_abstract"]
910
A `ClusterImagePolicy` custom resource (CR) enables a cluster administrator to configure a sigstore signature verification policy for the entire cluster. When enabled, the Machine Config Operator (MCO) watches the `ClusterImagePolicy` object and updates the `/etc/containers/policy.json` and `/etc/containers/registries.d/sigstore-registries.yaml` files on all the nodes in the cluster.
1011

1112
The following example shows general guidelines on how to configure a `ClusterImagePolicy` object. For more details on the parameters, see "About cluster and image policy parameters."
1213

13-
The default `openshift` cluster image policy provides sigstore support for the required {product-title} images. This cluster image policy is active only in clusters that have enabled Technology Preview features. You must not remove or modify this cluster image policy object. Cluster image policy names beginning with `openshift` are reserved for future system use.
14-
15-
:FeatureName: The default `openshift` cluster image policy
16-
include::snippets/technology-preview.adoc[]
14+
[NOTE]
15+
====
16+
The default `ClusterImagePolicy` object, named `openshift`, provides sigstore support for the required {product-title} images, which are stored in the `quay.io/openshift-release-dev/ocp-release` repository. You must not remove or modify this cluster image policy object. Cluster image policy names beginning with `openshift` are reserved for future system use.
17+
====
1718

1819
.Prerequisites
1920
// Taken from https://issues.redhat.com/browse/OCPSTRAT-918
@@ -30,7 +31,7 @@ $ oc image mirror quay.io/openshift-release-dev/ocp-release:sha256-1234567890abc
3031
mirror.com/image/repo:sha256-1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef.sig
3132
----
3233
33-
* If you are using a BYOPKI certificate as the root of trust, you enabled the required Technology Preview features for your cluster by editing the `FeatureGate` CR named `cluster`:
34+
* If you are using a BYOPKI certificate as the root of trust, you enabled the required Technology Preview features for your cluster by editing the `FeatureGate` CR named `cluster`.
3435
+
3536
[source,terminal]
3637
----

modules/nodes-sigstore-configure.adoc

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,9 @@ You can use the `ClusterImagePolicy` and `ImagePolicy` custom resource (CR) obje
1010

1111
* Cluster image policy. A cluster image policy object enables a cluster administrator to configure a sigstore signature verification policy for the entire cluster. When enabled, the Machine Config Operator (MCO) watches the `ClusterImagePolicy` object and updates the `/etc/containers/policy.json` and `/etc/containers/registries.d/sigstore-registries.yaml` files on all nodes in the cluster.
1212
+
13-
[IMPORTANT]
13+
[NOTE]
1414
====
15-
The default `openshift` cluster image policy provides sigstore support for the required {product-title} images. You must not remove or modify this cluster image policy object. This cluster image policy is Technology Preview and is active only in clusters that have enabled Technology Preview features. Cluster image policy names beginning with `openshift` are reserved for future system use.
16-
17-
If registry mirrors are configured for the {product-title} release image repositories, `quay.io/openshift-release-dev/ocp-release` and `quay.io/openshift-release-dev/ocp-v4.0-art-dev`, before enabling the Technology Preview feature set, you must mirror the sigstore signatures for the {product-title} release images into your mirror registry. Otherwise, the default `openshift` cluster image policy, which enforces signature verification for the release repository, blocks the ability of the Cluster Version Operator to move the CVO pod to new nodes, preventing the node update that results from the feature set change.
18-
19-
You can use the `oc image mirror` command to mirror the signatures. For example:
20-
21-
[source,terminal]
22-
----
23-
$ oc image mirror quay.io/openshift-release-dev/ocp-release:sha256-1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef.sig \
24-
mirror.com/image/repo:sha256-1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef.sig
25-
----
15+
The default `ClusterImagePolicy` object, named `openshift`, provides sigstore support for the required {product-title} images in the `quay.io/openshift-release-dev/ocp-release` repository.
2616
====
2717
2818
* Image policy. An image policy enables a cluster administrator or application developer to configure a sigstore signature verification policy for a specific namespace. The MCO watches an `ImagePolicy` instance in different namespaces and creates or updates the `/etc/crio/policies/<namespace>.json` and `/etc/containers/registries.d/sigstore-registries.yaml` files on all nodes in the cluster.
@@ -98,6 +88,11 @@ You can modify or remove a cluster image policy or an image policy by using the
9888

9989
You can modify an existing policy by editing the policy YAML and running an `oc apply` command on the file or directly editing the `ClusterImagePolicy` or `ImagePolicy` object. Both methods apply the changes in the same manner.
10090

91+
[NOTE]
92+
====
93+
The default `ClusterImagePolicy` object, named `openshift`, provides sigstore support for the required {product-title} images. You must not remove or modify this cluster image policy object. Cluster image policy names beginning with `openshift` are reserved for future system use.
94+
====
95+
10196
You can create multiple policies for a cluster or namespace. This allows you to create different policies for different images or repositories.
10297

10398
You can remove a policy by deleting the `ClusterImagePolicy` and `ImagePolicy` objects.

0 commit comments

Comments
 (0)