Skip to content

Commit 63d21c0

Browse files
committed
feat: allow setting and using NODE_EXTRA_CA_CERTS
Currently users can provide certificate files to be used to validate the TLS connection when pulling images from private container registries. However, these certificates are not used when doing HTTP requests to Kubernetes Upstream - the certs are used only for contacting the container registries. If users provide a CA certificate under a configurable path (by default /srv/app/certs/ca.pem) then we can now use this cert to validate the chain of certs in the TLS connection to Kubernetes Upstream.
1 parent e9a6085 commit 63d21c0

File tree

2 files changed

+4
-0
lines changed

2 files changed

+4
-0
lines changed

snyk-monitor/templates/deployment.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,8 @@ spec:
5959
- name: registries-conf
6060
mountPath: "/srv/app/.config/containers"
6161
env:
62+
- name: NODE_EXTRA_CA_CERTS
63+
value: {{ .Values.extraCaCerts }}
6264
- name: SNYK_INTEGRATION_ID
6365
valueFrom:
6466
secretKeyRef:

snyk-monitor/values.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,8 @@ envs:
6666
- name: NODE_OPTIONS
6767
value: --max_old_space_size=2048
6868

69+
extraCaCerts: /srv/app/certs/ca.pem
70+
6971
# CPU/Mem requests and limits for snyk-monitor
7072
requests:
7173
cpu: '250m'

0 commit comments

Comments
 (0)