-
Notifications
You must be signed in to change notification settings - Fork 760
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MountVolume.SetUp failed for volume "ca-download" : references non-existent secret key #315
Comments
Yes the issue has been introduced with fd3576e by @ywk253100 Certificates generated by let's encrypt with cert-manager dont have the ca.crt set, it's blank. Additionally having the core try to mount that secret creates other issues as well with wildcard certificates which exist in other namespaces. Contour for example will do TLS delegation but it will not allow that pod to read / mount that secret. Could this behavior be put under a new flag please ? Thanks |
Thank you! |
@zlingqu This isn't fixed yet, let's reopen it to track. |
…ad link on portal Fixes goharbor#315, when users generating the certificate for ingress with cert manager, the secret contains no certificate for CA, this commit provides an option for users to disable the CA download link on portal to avoid the failure when deploying Harbor chart Signed-off-by: Wenkai Yin <[email protected]>
Fixes goharbor#315, fixes goharbor#261 When users generating the certificate for ingress with cert manager, the secret contains no certificate for CA, this commit makes the "ca.crt" optional to avoid the failure when deploying Harbor chart Signed-off-by: Wenkai Yin <[email protected]>
The issue is still not entirely fixed, I just tried with the 1.2.0 chart and there is still a volume As explained, my wildcard tls secret exists in another namespace than harbor so harbor cannot mount it. Error from the core pod: |
Reopen the issue as it doesn't work for the secret in the other namespace as mentioned by @tlvenn |
Has there been any traction on a possible solution? We use letsencrypt and thus are bit by the ca.crt empty issue. |
When I deploy key and CRT with trusted ca, the core module cannot be started.
I think the ./templates/core/core-dpl.yaml file fixes that there must be ca.crt and ca.key in secretname.
My configuration file is as follows
I user traefik-ingress.
The following error appears when using kubectl describe pod
The text was updated successfully, but these errors were encountered: