Add corporate CA certificates into the CA trust chain¶
Some components like Zuul and Nodepool may need to communicate with corporate services via HTTPS. When such corporate services expose a certificate signed by a corporate Certificate Authority then the CA certificate must be part of the CA trust chain of the component's container.
sf-operator eases the installation of additional CA certificates into Zuul and Nodepool containers via a dedicated ConfigMap resource.
The dedicated ConfigMap resource must be named corporate-ca-certs
.
The ConfigMap's content will by mounted into /usr/share/pki/ca-trust-source/
and processed by the update-ca-trust
command at container startup.
When the ConfigMap is changed the controller automatically recognizes it and restart the corresponding pods.