1. Red Hat OpenShift Container Platform 4.14 Documentation
"About the internal image registry": This document explains the role of the registry and its interaction with cluster nodes. It states
"The OpenShift Container Platform registry is a core component that stores and manages container images. [...] Each node in the cluster needs to be able to pull images from the registry to run containers." This supports the requirement for all nodes to have pull access.
Source: Red Hat OpenShift 4.14 Documentation
Architecture -> Key concepts -> Image registry -> About the internal image registry.
2. Red Hat OpenShift Container Platform 4.14 Documentation
"Build strategies": This section details how builds operate within OpenShift. For Source-to-Image (S2I) builds
it states
"S2I produces a new image that incorporates the application source and is ready to run. S2I pushes the resulting image to the specified container image registry." Since builds execute in pods scheduled on cluster nodes (typically workers)
this confirms the requirement for nodes to have push access.
Source: Red Hat OpenShift 4.14 Documentation
Builds -> Build strategies.
3. Red Hat OpenShift Container Platform 4.14 Documentation
"Installing in a restricted network": This guide clarifies the roles of different hosts. It describes how a bastion host is used to mirror images to a private registry
after which all cluster nodes are configured with an ImageContentSourcePolicy to pull images from that private registry during and after installation. This explicitly shows that all cluster nodes
not just the bastion
require access.
Source: Red Hat OpenShift 4.14 Documentation
Installing -> Installing in a restricted network -> Mirroring the OpenShift Container Platform image repository.