feat(k8s): ACME email fix, etcd persistence, volume paths #986
No reviewers
Labels
No Label
bug
documentation
duplicate
enhancement
feature
good first issue
help wanted
in progress
invalid
question
wontfix
Copied from Github
Kind/Breaking
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Security
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Status
Abandoned
Status
Blocked
Status
Need More Info
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: cerc-io/stack-orchestrator#986
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "fix-caddy-acme-email-rbac"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Summary
Key Changes
helpers.py: Addedis_ingress_running()check, etcd/PKI extraMountsdeploy_k8s.py: Skip ingress install if already runningspec.py: ACME email getter using constantscluster_info.py: Relative volume path supportdocs/deployment_patterns.md: Volume persistence and registry auth docs- Add GENERATE_TOKEN_PATTERN to detect $generate:hex:N$ and $generate:base64:N$ tokens - Add _generate_and_store_secrets() to create K8s Secrets from spec.yml config - Modify _write_config_file() to separate secrets from regular config - Add env_from with secretRef to container spec in cluster_info.py - Secrets are injected directly into containers via K8s native mechanism This enables declarative secret generation in spec.yml: config: SESSION_SECRET: $generate:hex:32$ DB_PASSWORD: $generate:hex:16$ Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>Add ability to configure private container registry credentials in spec.yml for deployments using images from registries like GHCR. - Add get_image_registry_config() to spec.py for parsing image-registry config - Add create_registry_secret() to create K8s docker-registry secrets - Update cluster_info.py to use dynamic {deployment}-registry secret names - Update deploy_k8s.py to create registry secret before deployment - Document feature in deployment_patterns.md The token-env pattern keeps credentials out of git - the spec references an environment variable name, and the actual token is passed at runtime. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>Mount /var/lib/etcd and /etc/kubernetes/pki to host filesystem so cluster state is preserved for offline recovery. Each deployment gets its own backup directory keyed by deployment ID. Directory structure: data/cluster-backups/{deployment_id}/etcd/ data/cluster-backups/{deployment_id}/pki/ This enables extracting secrets from etcd backups using etcdctl with the preserved PKI certificates. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>