During Cloud Pak Deployer installations, the entitlement key for cp.icr.io is currently validated only through a login test (e.g., skopeo login). However, successful login does not guarantee that the entitlement key has permission to pull the specific images required for the deployment.
In multiple POC scenarios, we observed the following behavior:
podman login cp.icr.io → Login Succeeded
podman pull cp.icr.io/cp/cpd/<image>@sha256:<digest> → denied: You are not authorized to access this resource
This results in:
Installation failing later during Software Hub or component deployment
Describe the solution you'd like
Implement a pre-flight entitlement validation step in Cloud Pak Deployer that performs an image-level authorization check using:
skopeo inspect docker://cp.icr.io/
@
(or tag-based if digest not available)
For every image defined in the deployment configuration:
Run skopeo inspect
If the command fails with an authorization error:
Immediately fail the deployment
Provide a clear and actionable error message
Example expected error output:
ERROR: Entitlement key does not grant access to the following image:
- cp.icr.io/cp/cpd/edb-postgres-license-provider@sha256:...
Please verify that the entitlement key includes the required Cloud Pak permissions.
This validation should:
Run before installation begins
Check unique images only (avoid duplicates)
Stop execution on first unauthorized image
During Cloud Pak Deployer installations, the entitlement key for cp.icr.io is currently validated only through a login test (e.g., skopeo login). However, successful login does not guarantee that the entitlement key has permission to pull the specific images required for the deployment.
In multiple POC scenarios, we observed the following behavior:
podman login cp.icr.io → Login Succeededpodman pull cp.icr.io/cp/cpd/<image>@sha256:<digest> → denied: You are not authorized to access this resourceThis results in:
Installation failing later during Software Hub or component deployment
Describe the solution you'd like
Implement a pre-flight entitlement validation step in Cloud Pak Deployer that performs an image-level authorization check using:
skopeo inspect docker://cp.icr.io/
@
(or tag-based if digest not available)
For every image defined in the deployment configuration:
Run skopeo inspect
If the command fails with an authorization error:
Immediately fail the deployment
Provide a clear and actionable error message
Example expected error output:
ERROR: Entitlement key does not grant access to the following image:
Please verify that the entitlement key includes the required Cloud Pak permissions.
This validation should:
Run before installation begins
Check unique images only (avoid duplicates)
Stop execution on first unauthorized image
My proposal is to streamline our deployment process by
By doing this, I believe we can reduce our setup time by 80% or more.
Maybe add a specific check under cloud pak deployer ?
--check-entitlment
--check-images to avoid doing this every time ?
or using config of deployer like :