Skip to content

Feature: Automatically trust CA in containerdΒ #545

@RafPe

Description

@RafPe

Have you searched for this feature request?

  • I searched but did not find similar requests

Problem Statement

I am doing exploration of building/hosting and using images internally ( in the cluster created ) via the gitea image registry.

What happens right now out of the box ( when running default idpbuilder without any configuration changes ) we of course would get error about unverified authority i.e.

  Warning  Failed     34s (x4 over 112s)     kubelet            Failed to pull image "gitea.raftech.localtest.me:8443/foobar/echo:v1.0.0": failed to pull and unpack image "gitea.raftech.localtest.me:8443/foobar/echo:v1.0.0": failed to resolve reference "gitea.raftech.localtest.me:8443/foobar/echo:v1.0.0": failed to do request: Head "https://gitea.raftech.localtest.me/v2/foobar/echo/manifests/v1.0.0?ns=gitea.raftech.localtest.me%3A8443": tls: failed to verify certificate: x509: certificate signed by unknown authority
  Warning  Failed     34s (x4 over 112s)     kubelet            Error: ErrImagePull

If this is something we would like to pursue I would be happy to try to contribute under guidance of the maintainers πŸ‘

Possible Solution

My suggestion would be that we could ( since we control all the steps of the build ):

  1. Create folder under /etc/containerd/certs.d/gitea.<hostname>.localtest.me:8443/ca.crt
  2. Populate it with the CA we have self generated

This out of the box gives the ability to use without any problems images hosted in Gitea registry

Alternatives Considered

The only option I see to overcome this would be to provide containerd overrides via cluster config during cluster creation

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions