Skip to content

Implement Online Entitlement Validation for cp.icr.io Images Before Deployment #1085

@luigimolinaro

Description

@luigimolinaro

During Cloud Pak Deployer installations, the entitlement key for cp.icr.io is currently validated only through a login test (e.g., skopeo login). However, successful login does not guarantee that the entitlement key has permission to pull the specific images required for the deployment.

In multiple POC scenarios, we observed the following behavior:

podman login cp.icr.io → Login Succeeded

podman pull cp.icr.io/cp/cpd/<image>@sha256:<digest> → denied: You are not authorized to access this resource

This results in:

Installation failing later during Software Hub or component deployment

Describe the solution you'd like

Implement a pre-flight entitlement validation step in Cloud Pak Deployer that performs an image-level authorization check using:

skopeo inspect docker://cp.icr.io/@

(or tag-based if digest not available)

For every image defined in the deployment configuration:

Run skopeo inspect

If the command fails with an authorization error:

Immediately fail the deployment

Provide a clear and actionable error message

Example expected error output:

ERROR: Entitlement key does not grant access to the following image:

  • cp.icr.io/cp/cpd/edb-postgres-license-provider@sha256:...

Please verify that the entitlement key includes the required Cloud Pak permissions.

This validation should:

Run before installation begins
Check unique images only (avoid duplicates)
Stop execution on first unauthorized image

Pinned by luigimolinaro

Metadata

Metadata

Assignees

Labels

No labels
No labels
No fields configured for Feature.

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions