Bug 1889413 - Only global pull secrets can be configured in clusters where ImageContentSourcePolicy is set
Summary: Only global pull secrets can be configured in clusters where ImageContentSour...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Documentation
Version: 4.4
Hardware: Unspecified
OS: Unspecified
unspecified
low
Target Milestone: ---
: 4.7.0
Assignee: Michael Burke
QA Contact: Sunil Choudhary
Vikram Goyal
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-10-19 15:45 UTC by Lucas López Montero
Modified: 2023-12-15 19:50 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-05-10 23:03:28 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Lucas López Montero 2020-10-19 15:45:24 UTC
Description of problem:

As stated on this comment [1] and described by myself on this KCS article [2], on a cluster with ImageContentSourcePolicy [3] set, only global pull secrets [4] can be created. They cannot be added into a project [5].


Steps to Reproduce:

1. Configure ImageContentSourcePolicy in a cluster.
2. Add a pull secret into a project by linking it to its "default" service account.
3. Inside the project, try to pull images from the registry related to the new pull secret.


Actual results:

- ImagePullBackOff error.


Expected results:

- The images are pulled correctly



If this is considered a normal behaviour, please kindly move this bug to Documentation because I think this should be explained. In that case, Documentation Team could use my KCS article as a reference.



[1] https://github.com/openshift/openshift-docs/issues/19440
[2] https://access.redhat.com/solutions/5499981
[3] https://docs.openshift.com/container-platform/4.4/openshift_images/image-configuration.html#images-configuration-registry-mirror_image-configuration
[4] https://docs.openshift.com/container-platform/4.4/openshift_images/managing_images/using-image-pull-secrets.html#images-update-global-pull-secret_using-image-pull-secrets
[5] https://docs.openshift.com/container-platform/4.4/openshift_images/managing_images/using-image-pull-secrets.html#images-allow-pods-to-reference-images-from-secure-registries_using-image-pull-secrets

Comment 1 Urvashi Mohnani 2020-10-23 14:24:40 UTC
Hi Lucas,

Just to clarify, where are you pulling the image from? Is it from one of the mirrors your configured via ICSP, or is it from the original location that you are mirroring?

If it is from one of the mirrors, only the global pull secret will work.

Comment 2 Lucas López Montero 2020-11-05 12:42:34 UTC
Hi, Urvashi.

The user affected has confirmed that, indeed, they were using mirrors via ICSP.

Comment 3 Urvashi Mohnani 2020-11-05 14:26:22 UTC
Thanks for confirming that Lucas. In that case, this is not a bug. It just needs to be documented better, so moving over to the docs team.

Comment 4 Michael Burke 2021-04-27 16:47:43 UTC
Urvashi and Lucas --

I added a note to several places in the docs. Please take a look. Is the note OK and do we need it in all of the locations in the docs? Are there any others? 

Note:
In a cluster with an `ImageContentSourcePolicy` object, only global pull secrets can be configured for mirrored registries. You cannot add a pull secret to a project.

https://github.com/openshift/openshift-docs/pull/31968

Thank you!
Michael

Comment 6 Michael Burke 2021-05-03 14:00:18 UTC
Lucas --

Thanks for the review. I added the note to https://docs.openshift.com/container-platform/latest/openshift_images/image-configuration.html#images-configuration-registry-mirror_image-configuration. However, I believe the API docs are automatically generated and we cannot edit them after they are created. I am looking into how to do this. 

Thanks!
Michael

Comment 7 Michael Burke 2021-05-05 19:42:59 UTC
QE LGTM in the PR: https://github.com/openshift/openshift-docs/pull/31968#issuecomment-832391948


Note You need to log in before you can comment on or make changes to this bug.