Self-signed certificates
It is possible to use container registries with self-signed (private) certificates. Be warned, it is an advanced, less convenient matter.
Last updated
It is possible to use container registries with self-signed (private) certificates. Be warned, it is an advanced, less convenient matter.
Last updated
You can opt for using unchecked registries, that means images are not checked at all, image URLs are passed to the agent straight away. This way you can skip setting up certificates for the API.
The environment variable is NODE_EXTRA_CA_CERTS
, the process expects a concatenated list of your certificates. More info:
Concatenating pem files to a single file:
cat *.cert.pem > node_extra_ca_certs
Mount the generated file using and provide the environment variable.
The two supported target nodes require different approaches.
Assumed the host already trusts the CA, when adding a node the install script is visible, you can use this script also to add extra behavior, if it is not explicitly implemented in the UI.
The component allows us to provide additional CA files using the SSL_CERT_FILE
variable, it expects one crt file that you have to mount from the host.
The last command of the script will be extended with two lines:
Make sure you use the correct values.
Using Kubernetes, you have to make sure that nodes already trust your CA: .
You have to modify the install script to mount the crt file to crane.
You can create a secret from a file using this one liner, make sure it is in the dyrectorio namespace.