- Image:
ghcr.io/parlesec/protocolsoup-spire-agent
- Purpose: Run SPIRE Agent for node/workload attestation and provide Workload API sockets to workloads.
- Topology role: Identity-plane runtime that bridges workload processes to SPIRE Server trust data.
- No public TCP port is required for normal operation.
- Agent Workload API is provided via Unix socket (
/run/spire/sockets/agent.sock).
- Requires
protocolsoup-spire-server socket access for bootstrap and trust synchronization.
| Variable |
Required |
Default |
Description |
(none) |
N/A |
N/A |
Runtime behavior is defined by embedded bootstrap script and mounted SPIRE config |
/run/spire/sockets/server (read-only): SPIRE Server socket mount.
/run/spire/sockets: agent socket output mount (agent.sock for workloads).
/opt/spire/data/agent: agent state (bundle cache and attestation artifacts).
- Container healthcheck runs:
/opt/spire/bin/spire-agent healthcheck -socketPath /run/spire/sockets/agent.sock
- Bootstrap script waits for server socket and generates join token before launching agent runtime.
- Exposes SPIFFE Workload API over Unix socket:
- X.509-SVID retrieval
- JWT-SVID retrieval
- trust-bundle access
- rotation watch streams
docker run -d --name spire-agent \
-v spire-server-socket:/run/spire/sockets/server:ro \
-v spire-agent-socket:/run/spire/sockets \
-v spire-agent-data:/opt/spire/data/agent \
ghcr.io/parlesec/protocolsoup-spire-agent:latest
services:
spire-agent:
image: ghcr.io/parlesec/protocolsoup-spire-agent:latest
depends_on:
spire-server:
condition: service_healthy
volumes:
- spire-server-socket:/run/spire/sockets/server:ro
- spire-agent-socket:/run/spire/sockets
- spire-agent-data:/opt/spire/data/agent
- Restrict socket volume access to trusted workloads only.
- Keep agent and server on isolated, private networks.
- Rotate join tokens and remove unused registration entries.
- Audit which workloads can mount
agent.sock.
- Agent never becomes healthy: verify server socket mount path and server health.
- Workload cannot get SVID: confirm workload has access to
/run/spire/sockets/agent.sock.
- Bootstrap loop/re-attestation churn: inspect persistent agent data volume and token generation path.
- Windows Docker socket issues: prefer compose-managed SPIRE stack.
latest is published from default-branch builds.
sha-* tags are emitted per build for immutable traceability.
- release tags publish semver variants (
vX.Y.Z, vX.Y, vX).