Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in
Celebration

Earn badges and make progress

You're on your way to the next level! Join the Kudos program to earn points and save your progress.

Deleted user Avatar
Deleted user

Level 1: Seed

25 / 150 points

Next: Root

Avatar

1 badge earned

Collect

Participate in fun challenges

Challenges come and go, but your rewards stay with you. Do more to earn more!

Challenges
Coins

Gift kudos to your peers

What goes around comes around! Share the love by gifting kudos to your peers.

Recognition
Ribbon

Rise up in the ranks

Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!

Leaderboard

Come for the products,
stay for the community

The Atlassian Community can help you and your team get more value out of Atlassian products and practices.

Atlassian Community about banner
4,456,773
Community Members
 
Community Events
176
Community Groups

Self Hosted Pipeline Runners with self signed certificate firewall inspection

Hello,

I am running a self hosted runner as mentioned here in K8s. https://support.atlassian.com/bitbucket-cloud/docs/pipelines-runners-frequently-asked-questions/

 

I am running into an issue with our CORP firewall performing inspection on outbound traffic. The runner fails as it cannot talk to Bitbucket to register itself as a runner in my repo.

 

I would like to know how I can install or add the self-signed cert to the bitbucket pod so that it accepts the certificate as valid.

 

Thanks,

1 answer

0 votes

Hi @Bobin Joseph and welcome to the community!

What you can do is build a new Docker image that is based on the image runners are using and modify the certificate store.

An example Docker file would be the following:

FROM docker-public.packages.atlassian.com/sox/atlassian/bitbucket-pipelines-runner:1
COPY ldap.cer $JAVA_HOME/lib/security
RUN \
cd $JAVA_HOME/lib/security \
&& keytool -keystore cacerts -storepass changeit -noprompt -trustcacerts -importcert -alias ldapcert -file ldap.cer

where ldap.cer replace with your certificate. Place the certificate file in the same directory as the Dockerfile, and then you can build the image with the following command

docker image build -t example/runner:cert .

and push it to Dockerhub or another registry.

When you create a runner from the Bitbucket website, you are given a docker container run command to start the runner.
In that command, replace docker-public.packages.atlassian.com/sox/atlassian/bitbucket-pipelines-runner:1 with the name of the image you pushed earlier and then use it to start the runner.

Please feel free to let me know how it goes and if you need anything further.

Kind regards,
Theodora

Suggest an answer

Log in or Sign up to answer
TAGS

Atlassian Community Events