-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
expose.tls.secretName try to volume mount to core pod #261
Comments
The certificate can be downloaded from Harbor portal, this is why the certificate is mounted into |
I am in the corporate environment, so we don't need download ca file from harbor If you really need, anyway, I think you have to separate with tls.secretName and ca-download secretName first, |
The certificate isn't used only for helm client, it is used for docker client or any other http clients that need to call Harbor API. The certificate downloaded from portal must be the same one used for Harbor ingress. As I said, you should use a separate certificate for Harbor ingress rather than using the default one for ingress controller. If your certificate isn't signed by a CA, you can just copy the |
For clarification,
I don't understand basically, there's no options for ca.crt file in "kubectl create secret tls" command. |
Stumbled on this... I am using cert manager with Let's Encrypt, and it does not (and will not) provide "ca.crt" key in the automatically provisioned ACME certs/secrets: cert-manager/cert-manager#1571 Dirty wourkaround is to add "ca.crt" with intermediate certs to the cert manager generated secret:
|
I have a same problem. I use aliyun LB service。
I have modified the code
|
Same problem. |
Fixes goharbor#315, fixes goharbor#261 When users generating the certificate for ingress with cert manager, the secret contains no certificate for CA, this commit makes the "ca.crt" optional to avoid the failure when deploying Harbor chart Signed-off-by: Wenkai Yin <[email protected]>
Hi,
I have local kubernetes
I want to use ingress with tls enabled.
I guess here's the problem.
When I use tls in ingress,
ingress-nginx-harbor-values.yaml is
and my values.yaml for harbor is
and then run
helm install harbor/harbor -n harbor --namespace harbor -f harbor-values.yaml
Here's an error.
few minutes later,
This related with core-dpl.yaml
harbor-helm/templates/core/core-dpl.yaml
Lines 111 to 123 in 8420734
I don't understand why core need ca cert and why use ingress's!
and the secret does not have ca.crt as you know.
Now work-around is
kubectl create secret generic ingress-tls --from-file=ca.crt=cacerts -n harbor
create(extract) cacerts file manually and
create same name secret forcely.
Thanks.
The text was updated successfully, but these errors were encountered: