You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/actions-and-automations/setup-backend/webhook/port-execution-agent/usage.md
+42-22Lines changed: 42 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,36 +80,56 @@ For more information take a look at the Requests [proxy configuration documentat
80
80
81
81
### SSL Environment Configuration
82
82
83
-
### Certificate Configuration
84
-
85
-
#### Self-signed certificate
86
-
87
-
Use the following Helm values:
88
-
- Set `selfSignedCertificate.enabled` to `true`.
89
-
- Put your PEM-encoded CA content in `selfSignedCertificate.certificate`.
90
-
91
-
The certificate should be mounted to `/usr/local/share/ca-certificates/`.
92
-
93
-
`REQUESTS_CA_BUNDLE`is an environment variable used to specify a custom Certificate Authority (CA) bundle for verifying SSL/TLS certificates in HTTPS requests.
83
+
### Self-signed Certificate Configuration
84
+
85
+
#### Option 1: Provide certificate in Helm values
86
+
87
+
```yaml
88
+
selfSignedCertificate:
89
+
enabled: true
90
+
certificate: |
91
+
-----BEGIN CERTIFICATE-----
92
+
<YOUR_CERTIFICATE_CONTENT>
93
+
-----END CERTIFICATE-----
94
+
secret:
95
+
useExistingSecret: false
96
+
```
94
97
95
-
Set `REQUESTS_CA_BUNDLE` to the file path of your CA bundle, which should contain one or more CA certificates in PEM format.
98
+
#### Option 2: Use existing Kubernetes secret
96
99
97
-
For example:
98
-
```sh
99
-
REQUESTS_CA_BUNDLE=/path/to/cacert.pem
100
+
```yaml
101
+
selfSignedCertificate:
102
+
enabled: true
103
+
secret:
104
+
name: <SECRET_NAME>
105
+
key: <CERTIFICATE_KEY>
106
+
useExistingSecret: true
100
107
```
101
108
102
-
This configuration directs the `requests` library to use the specified CA bundle for SSL/TLS certificate verification, overriding default system settings. It's useful for trusting self-signed certificates or certificates from a private CA.
109
+
The Helm chart automatically:
110
+
- Mounts the certificate to `/usr/local/share/ca-certificates/cert.crt`
111
+
- Sets `SSL_CERT_FILE` and `REQUESTS_CA_BUNDLE` environment variables
112
+
- Configures Python libraries (requests, httpx) to trust the certificate
103
113
104
114
#### Multiple certificates
105
115
106
-
Use the following Helm values:
107
-
- Keep your certificate via `selfSignedCertificate` as above.
108
-
- Add other certificates by supplying files via `extraVolumes` and mounting them with `extraVolumeMounts` into the container at `/usr/local/share/ca-certificates/<your-cert-name>.crt`.
116
+
When multiple certificates are required, one certificate must be provided via `selfSignedCertificate` as described above. Additional certificates can be mounted using `extraVolumes` and `extraVolumeMounts`:
0 commit comments