Add mTLS proxy support for enterprise proxies#4498
Open
dhawalseth wants to merge 3 commits into
Open
Conversation
Addresses CVEs found in container image scanning: - CVE-2026-27143 (Critical, CVSS 9.8) - CVE-2026-27140 (High, CVSS 8.8) - CVE-2026-33810 (High, CVSS 8.2) - CVE-2026-32280 (High, CVSS 7.5) - CVE-2026-32281 (High, CVSS 7.5) - CVE-2026-32283 (High, CVSS 7.5) - CVE-2026-27144 (High, CVSS 7.1) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This change adds support for mTLS authentication when connecting through
proxies that require client certificates (e.g., corporate proxies like Kraken).
Changes:
- Add ProxyTLSConfig type with fields for:
- clientCertSecretRef: K8s secret with tls.crt and tls.key
- caCertSecretRef: K8s secret with ca.crt
- caCertConfigMapRef: ConfigMap with ca.crt (alternative)
- insecureSkipVerify: Skip server cert verification (testing only)
- Update ProxyServerConfig to include optional TLS configuration
- Add proxyTLSVolumesAndMounts helper to create volumes and mounts
for proxy TLS certificates
- Update listener pod creation to mount proxy TLS certs at
/etc/proxy-tls/{http,https}-proxy/{client,ca}/
- Update runner pod creation to mount proxy TLS certs
- Update Helm values.yaml with mTLS configuration examples
- Update Helm templates to pass TLS config to CRD
- Regenerate CRDs with new ProxyTLSConfig schema
Note: This provides the infrastructure to mount certificates. The actual
TLS client configuration in ghalistener requires corresponding changes
in the github.com/actions/scaleset library to use these certificates.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
3 tasks
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Add mTLS (mutual TLS) proxy support for enterprise environments that require client certificate authentication for egress traffic (e.g., corporate proxies like Kraken, Zscaler, or other TLS-terminating proxies).
Motivation
Many enterprise environments route all egress traffic through proxies that require mutual TLS authentication. Currently, ARC only supports basic auth (username/password) for proxy authentication via
credentialSecretRef. This PR adds the infrastructure to support mTLS by:Changes
New
ProxyTLSConfigtypeUpdated Helm Configuration
Certificate Mount Paths
Certificates are mounted to pods at:
/etc/proxy-tls/https-proxy/client/tls.crt- Client certificate/etc/proxy-tls/https-proxy/client/tls.key- Client private key/etc/proxy-tls/https-proxy/ca/ca.crt- CA certificateFiles Changed
apis/actions.github.com/v1alpha1/autoscalingrunnerset_types.go- New ProxyTLSConfig typecontrollers/actions.github.com/resourcebuilder.go- Volume mount logiccharts/gha-runner-scale-set/values.yaml- Configuration examplescharts/gha-runner-scale-set/templates/autoscalingrunnerset.yaml- Template updatesUsage Example
Related PRs
This is part of a coordinated effort to add mTLS proxy support across the GitHub Actions ecosystem:
WithTLSClientCertificate()HTTPOption for Go HTTP clientHTTPS_PROXY_CLIENT_CERT/KEY/CA_CERTenvironment variablesHow it all fits together
WithTLSClientCertificate()Test Plan
proxyTLSVolumesAndMounts()helper🤖 Generated with Claude Code