Skip to content

Add corporate CA certificates into the CA trust chain

Some components like Zuul and Nodepool may need to communicate with corporate services via HTTPS. When such corporate services expose a certificate signed by a corporate Certificate Authority then the CA certificate must be part of the CA trust chain of the component's container.

sf-operator eases the installation of additional CA certificates into Zuul and Nodepool containers via a dedicated ConfigMap resource.

The dedicated ConfigMap resource must be named corporate-ca-certs. The ConfigMap's content will by mounted into /usr/share/pki/ca-trust-source/ and processed by the update-ca-trust command at container startup.

When the ConfigMap is changed the controller automatically recognizes it and restart the corresponding pods.