Scope and terms¶
Status: to be expanded — additional scope clarifications and terminology will be added in future revisions.
This document defines the audience, scope, and prerequisites for the air-gapped OpenStack image factory.
Audience and goals¶
- Operators who need reproducible, offline OpenStack builds that can be validated and promoted via Zuul pipelines.
- Teams with control over DNS, certificates, and firewall rules for internal registries and mirrors.
Platform requirements¶
- Core infrastructure:
- Hosts or VMs for Zuul scheduler, executors, web, mergers, logserver, and at least one Nodepool launcher.
- Highly available Zookeeper and SQL backends for Zuul state.
- Object storage (Swift, S3, or NFS-backed web) for logs and build artifacts.
- Security and networking:
- TLS certificates for web endpoints and container registries (public CA or internal PKI).
- Firewall policies that restrict egress while allowing access to internal mirrors and registries.
- Distribution of your trusted CA bundle to all build images.
- Tooling:
- Docker or Podman available on builder images with enough disk (>= 80GB) for multi-service Kolla builds.
skopeo,buildah,qemu-img, andjqinstalled on build nodes for copying images and manipulating manifests.
External dependencies during bootstrap¶
- Access to upstream source control (Gerrit/GitHub) long enough to replicate repositories into your mirrored control plane.
- Temporary egress to seed base container images and populate package mirrors; plan to close these paths after validation.
Readiness checklist¶
- DNS entries created for Zuul web, logs, registry, and mirror endpoints.
- Certificates issued and stored for ingress/registry.
- Storage allocated for mirrors (estimate at least 2x the total size of your desired images and packages).
- Nodepool image baked with container tooling and CA certificates.
- Firewall rules tested to ensure only mirrored endpoints are reachable from build nodes.