Skip to content

Conversation

@mburke5678
Copy link
Contributor

@mburke5678 mburke5678 commented Sep 9, 2025

https://issues.redhat.com/browse/OSDOCS-16124

Preview
About configuring sigstore support -- Added to the Important admontion. Current docs.
Creating a cluster image policy CR -- Added paragraph 3, Tech Preview snippet, and prerequisite 4.
Creating an image policy CR -- Removed prerequisite 4. Current docs.

QE review:

  • QE has approved this change.

@mburke5678 mburke5678 added this to the Planned for 4.20 GA milestone Sep 9, 2025
@openshift-ci openshift-ci bot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Sep 9, 2025
@mburke5678 mburke5678 force-pushed the node-openshift-cluster-image-policy-tp branch from 1d23fe8 to 6155e28 Compare September 9, 2025 21:29
@ocpdocs-previewbot
Copy link

ocpdocs-previewbot commented Sep 9, 2025

🤖 Wed Sep 10 20:25:40 - Prow CI generated the docs preview:

https://98786--ocpdocs-pr.netlify.app/openshift-enterprise/latest/nodes/nodes-sigstore-using.html

@mburke5678 mburke5678 force-pushed the node-openshift-cluster-image-policy-tp branch 2 times, most recently from 734b27a to 92027c6 Compare September 9, 2025 22:00
* You have a signing process in place to sign your images.
* You have access to a registry that supports Cosign signatures, if you are using Cosign signatures.
* If registry mirrors are configured for the {product-title} release image repositories, `quay.io/openshift-release-dev/ocp-release` and `quay.io/openshift-release-dev/ocp-v4.0-art-dev`, before enabling the Technology Preview feature set, you must mirror the sigstore signatures for the {product-title} release images into your mirror registry. Otherwise, the default `openshift` cluster image policy, which enforces signature verification for the release repository, will block the ability of the Cluster Version Operator to move the CVO Pod to new nodes, which prevents the node update that results from the feature set change.
* If registry mirrors are configured for the {product-title} release image repositories, `quay.io/openshift-release-dev/ocp-release` and `quay.io/openshift-release-dev/ocp-v4.0-art-dev`, before enabling the Technology Preview feature set, you must mirror the sigstore signatures for the {product-title} release images into your mirror registry. Otherwise, the default `openshift` cluster image policy, which enforces signature verification for the release repository, will block the ability of the Cluster Version Operator to move the CVO Pod to new nodes, which prevents the node update that results from the feature set change. This cluster image policy is Technology Preview and is active only in clusters that have enabled Technology Preview features.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't understand us talking about ClusterImagePolicies here in this ImagePolicy section. Maybe we can drop this line entirely?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

#86087 (comment) This seems originally, we want to provide guidance on the clusters that don't have access to signatures, or need verification against their own signature and the openshift official signature through the mirrors. I see it's a bit confusing, we can wait for feedback and provide more document if needed.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was wondering the same thing as @wking. I wonder if I intended to add it to the cluster image policy module instead.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Here is the source of the text, from a conversation between @wking and @QiWang19 in the original PR.

Copy link
Member

@wking wking Sep 10, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for finding that! I think for me at least, my interest in having the openshift ClusterImagePolicy mentioned in the ImagePolicy portion of the doc was based on "if readers find ImagePolicy interesting and enable TechPreviewNoUpgrade to access it, we should warn them that it will pull in the openshift ClusterImagePolicy, and they'll need to have a plan to access those Red Hat release image signatures". Now that ImagePolicy is GA, but the openshift ClusterImagePolicy is still TechPreview, I think we can safely drop this entry from this file (we should keep it in the ClusterImagePolicy file, where it provides context for our reserving the openshift name prefix). And it's maybe interesting enough to keep in the Sigstore-config file?

@mburke5678
Copy link
Contributor Author

@anahas-redhat Can you PTAL? Thank you.

@anahas-redhat
Copy link

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Sep 10, 2025
@mburke5678 mburke5678 force-pushed the node-openshift-cluster-image-policy-tp branch from 0e48046 to e057d2f Compare September 10, 2025 20:13
@openshift-ci openshift-ci bot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. and removed lgtm Indicates that a PR is ready to be merged. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Sep 10, 2025
@mburke5678 mburke5678 changed the title Node add statment that cluster image policy is TP OSDOCS 16124: Node add statment that cluster image policy is TP Sep 10, 2025
@openshift-ci
Copy link

openshift-ci bot commented Sep 10, 2025

@mburke5678: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@mburke5678 mburke5678 added the merge-review-needed Signifies that the merge review team needs to review this PR label Sep 10, 2025
@ShaunaDiaz ShaunaDiaz added ok-to-merge and removed merge-review-needed Signifies that the merge review team needs to review this PR labels Sep 11, 2025
* You have a sigstore-supported public key infrastructure (PKI) or a link:https://docs.sigstore.dev/cosign/[Cosign public and private key pair] for signing operations.
* You have a signing process in place to sign your images.
* You have access to a registry that supports Cosign signatures, if you are using Cosign signatures.
* If registry mirrors are configured for the {product-title} release image repositories, `quay.io/openshift-release-dev/ocp-release` and `quay.io/openshift-release-dev/ocp-v4.0-art-dev`, before enabling the Technology Preview feature set, you must mirror the sigstore signatures for the {product-title} release images into your mirror registry. Otherwise, the default `openshift` cluster image policy, which enforces signature verification for the release repository, blocks the ability of the Cluster Version Operator to move the CVO pod to new nodes, preventing the node update that results from the feature set change.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* If registry mirrors are configured for the {product-title} release image repositories, `quay.io/openshift-release-dev/ocp-release` and `quay.io/openshift-release-dev/ocp-v4.0-art-dev`, before enabling the Technology Preview feature set, you must mirror the sigstore signatures for the {product-title} release images into your mirror registry. Otherwise, the default `openshift` cluster image policy, which enforces signature verification for the release repository, blocks the ability of the Cluster Version Operator to move the CVO pod to new nodes, preventing the node update that results from the feature set change.
* If registry mirrors are configured for the {product-title} release image repositories, `quay.io/openshift-release-dev/ocp-release` and `quay.io/openshift-release-dev/ocp-v4.0-art-dev`, you must mirror the sigstore signatures for the {product-title} release images into your mirror registry before enabling the Technology Preview feature set. Otherwise, the default `openshift` cluster image policy, which enforces signature verification for the release repository, blocks the ability of the Cluster Version Operator to move the CVO pod to new nodes, preventing the node update that results from the feature set change.

IMHO moving the clause simplifies the sentence, but not remotely a merge blocker, just a thought for later consideration.

Copy link
Contributor

@ShaunaDiaz ShaunaDiaz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@ShaunaDiaz ShaunaDiaz merged commit dd17204 into openshift:main Sep 11, 2025
2 checks passed
@ShaunaDiaz
Copy link
Contributor

/cherrypick enterprise-4.20

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Sep 11, 2025
@openshift-cherrypick-robot

@ShaunaDiaz: new pull request created: #98872

Details

In response to this:

/cherrypick enterprise-4.20

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@mburke5678 mburke5678 deleted the node-openshift-cluster-image-policy-tp branch September 11, 2025 14:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

branch/enterprise-4.20 lgtm Indicates that a PR is ready to be merged. ok-to-merge size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants