You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Details on custom certs with worker pools
- adds details on how to use custom certs with worker pools using Kubernetes controller
- also makes tabs for some assigning roles processes, and highlights a detail that could impact architecture security with the warning tag instead of important
* Update kubernetes-workers.md
The administrative flag takes precedence over role attachments. If `administrative = true`, any attached roles will be ignored. You must either set `administrative = false`, or entirely remove the administrative attribute (recommended) for role attachments to take effect.
299
299
300
300
#### 4. Verify the role attachment
@@ -315,7 +315,7 @@ If any of your policies reference the `stack.administrative` field, update them
315
315
316
316
# Would become:
317
317
deny contains "Administrative stacks are not allowed" if {
318
-
some role in input.spacelift.stack.roles
318
+
some role in input.stack.roles
319
319
role.id == "space-admin" # (1)
320
320
}
321
321
```
@@ -330,7 +330,7 @@ If any of your policies reference the `stack.administrative` field, update them
Copy file name to clipboardExpand all lines: docs/concepts/worker-pools/kubernetes-workers.md
+83-1Lines changed: 83 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -950,7 +950,7 @@ spec:
950
950
951
951
### Using VCS Agents with Kubernetes Workers
952
952
953
-
Using VCS Agents with Kubernetes workers is simple, and uses exactly the same approach outlined in the [VCS Agents](./README.md#vcs-agents) section. To configure your VCS Agent environment variables in a Kubernetes WorkerPool, add them to the `spec.pod.initContainer.env` section, like in the following example:
953
+
Using VCS Agents with Kubernetes workers is simple, and uses exactly the same approach outlined in the [VCS Agents](../vcs-agent-pools.md#run-the-vcs-agent-inside-a-kubernetes-cluster) section. To configure your VCS Agent environment variables in a Kubernetes WorkerPool, add them to the `spec.pod.initContainer.env` section, like in the following example:
954
954
955
955
```yaml
956
956
apiVersion: workers.spacelift.io/v1beta1
@@ -1176,6 +1176,88 @@ During the controller's startup, you should see the `FIPS 140 mode {"enabled": t
1176
1176
!!! note
1177
1177
This will only make the controller run in FIPS mode. The Spacelift worker pods are not affected by this setting - they are not compliant with FIPS 140-3 yet.
1178
1178
1179
+
## Supply custom certificates to worker pools
1180
+
1181
+
You can add custom certificate authority (CA) certificates to your worker pools. We support adding them to the controller container and to the container that runs OpenTofu/Terraform.
1182
+
1183
+
### Add certificates to controller container
1184
+
1185
+
1. Ensure your custom certificate is pem-encoded **and** the file name ends in`.pem`.
1186
+
2. Within the controller container, mount the certificate to `/ops/spacelift/certs`.
1187
+
1188
+
This example is for the controller Helm chart. If you're using a manifest, you will need to edit it directly.
0 commit comments