Skip to content

Commit dd17204

Browse files
authored
Merge pull request #98786 from mburke5678/node-openshift-cluster-image-policy-tp
OSDOCS 16124: Node add statment that cluster image policy is TP
2 parents 673c02c + e057d2f commit dd17204

File tree

3 files changed

+25
-10
lines changed

3 files changed

+25
-10
lines changed

modules/nodes-sigstore-configure-cluster-policy.adoc

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,25 @@ A `ClusterImagePolicy` custom resource (CR) enables a cluster administrator to c
1010

1111
The following example shows general guidelines on how to configure a `ClusterImagePolicy` object. For more details on the parameters, see "About cluster and image policy parameters."
1212

13+
The default `openshift` cluster image policy provides sigstore support for the required {product-title} images. This cluster image policy is active only in clusters that have enabled Technology Preview features. You must not remove or modify this cluster image policy object. Cluster image policy names beginning with `openshift` are reserved for future system use.
14+
15+
:FeatureName: The default `openshift` cluster image policy
16+
include::snippets/technology-preview.adoc[]
17+
1318
.Prerequisites
1419
// Taken from https://issues.redhat.com/browse/OCPSTRAT-918
1520
* You have a sigstore-supported public key infrastructure (PKI) or a link:https://docs.sigstore.dev/cosign/[Cosign public and private key pair] for signing operations.
1621
* You have a signing process in place to sign your images.
1722
* You have access to a registry that supports Cosign signatures, if you are using Cosign signatures.
23+
* If registry mirrors are configured for the {product-title} release image repositories, `quay.io/openshift-release-dev/ocp-release` and `quay.io/openshift-release-dev/ocp-v4.0-art-dev`, before enabling the Technology Preview feature set, you must mirror the sigstore signatures for the {product-title} release images into your mirror registry. Otherwise, the default `openshift` cluster image policy, which enforces signature verification for the release repository, blocks the ability of the Cluster Version Operator to move the CVO pod to new nodes, preventing the node update that results from the feature set change.
24+
+
25+
You can use the `oc image mirror` command to mirror the signatures. For example:
26+
+
27+
[source,terminal]
28+
----
29+
$ oc image mirror quay.io/openshift-release-dev/ocp-release:sha256-1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef.sig \
30+
mirror.com/image/repo:sha256-1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef.sig
31+
----
1832
1933
.Procedure
2034

modules/nodes-sigstore-configure-image-policy.adoc

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,6 @@ The following example shows general guidelines on how to configure an `ImagePoli
2020
* You have a sigstore-supported public key infrastructure (PKI) or provide link:https://docs.sigstore.dev/cosign/[Cosign public and private key pair] for signing operations.
2121
* You have a signing process in place to sign your images.
2222
* You have access to a registry that supports Cosign signatures, if you are using Cosign signatures.
23-
* If registry mirrors are configured for the {product-title} release image repositories, `quay.io/openshift-release-dev/ocp-release` and `quay.io/openshift-release-dev/ocp-v4.0-art-dev`, before enabling the Technology Preview feature set, you must mirror the sigstore signatures for the {product-title} release images into your mirror registry. Otherwise, the default `openshift` cluster image policy, which enforces signature verification for the release repository, will block the ability of the Cluster Version Operator to move the CVO Pod to new nodes, which prevents the node update that results from the feature set change.
24-
+
25-
You can use the `oc image mirror` command to mirror the signatures. For example:
26-
+
27-
[source,terminal]
28-
----
29-
$ oc image mirror quay.io/openshift-release-dev/ocp-release:sha256-1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef.sig \
30-
mirror.com/image/repo:sha256-1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef.sig
31-
----
3223
3324
.Procedure
3425

modules/nodes-sigstore-configure.adoc

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,17 @@ You can use the `ClusterImagePolicy` and `ImagePolicy` custom resource (CR) obje
1212
+
1313
[IMPORTANT]
1414
====
15-
The default `openshift` cluster image policy provides sigstore support for the required {product-title} images. You must not remove or modify this cluster image policy object.
15+
The default `openshift` cluster image policy provides sigstore support for the required {product-title} images. You must not remove or modify this cluster image policy object. This cluster image policy is Technology Preview and is active only in clusters that have enabled Technology Preview features. Cluster image policy names beginning with `openshift` are reserved for future system use.
16+
17+
If registry mirrors are configured for the {product-title} release image repositories, `quay.io/openshift-release-dev/ocp-release` and `quay.io/openshift-release-dev/ocp-v4.0-art-dev`, before enabling the Technology Preview feature set, you must mirror the sigstore signatures for the {product-title} release images into your mirror registry. Otherwise, the default `openshift` cluster image policy, which enforces signature verification for the release repository, blocks the ability of the Cluster Version Operator to move the CVO pod to new nodes, preventing the node update that results from the feature set change.
18+
19+
You can use the `oc image mirror` command to mirror the signatures. For example:
20+
21+
[source,terminal]
22+
----
23+
$ oc image mirror quay.io/openshift-release-dev/ocp-release:sha256-1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef.sig \
24+
mirror.com/image/repo:sha256-1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef.sig
25+
----
1626
====
1727
1828
* Image policy. An image policy enables a cluster administrator or application developer to configure a sigstore signature verification policy for a specific namespace. The MCO watches an `ImagePolicy` instance in different namespaces and creates or updates the `/etc/crio/policies/<namespace>.json` and `/etc/containers/registries.d/sigstore-registries.yaml` files on all nodes in the cluster.

0 commit comments

Comments
 (0)