Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MountVolume.SetUp failed for volume "ca-download" : references non-existent secret key #315

Closed
zlingqu opened this issue Aug 11, 2019 · 6 comments · Fixed by #348
Closed
Assignees

Comments

@zlingqu
Copy link

zlingqu commented Aug 11, 2019

When I deploy key and CRT with trusted ca, the core module cannot be started.
I think the ./templates/core/core-dpl.yaml file fixes that there must be ca.crt and ca.key in secretname.

My configuration file is as follows

type: ingress
  tls:
    enabled: true
    secretName: "https-key-secret"
    notarySecretName: ""

I user traefik-ingress.

The following error appears when using kubectl describe pod

image

@tlvenn
Copy link

tlvenn commented Aug 15, 2019

Yes the issue has been introduced with fd3576e by @ywk253100

Certificates generated by let's encrypt with cert-manager dont have the ca.crt set, it's blank. Additionally having the core try to mount that secret creates other issues as well with wildcard certificates which exist in other namespaces. Contour for example will do TLS delegation but it will not allow that pod to read / mount that secret.

Could this behavior be put under a new flag please ?

Thanks

@zlingqu zlingqu closed this as completed Sep 9, 2019
@zlingqu
Copy link
Author

zlingqu commented Sep 9, 2019

Thank you!

@ywk253100
Copy link
Collaborator

@zlingqu This isn't fixed yet, let's reopen it to track.

@ywk253100 ywk253100 reopened this Sep 9, 2019
ywk253100 added a commit to ywk253100/harbor-helm that referenced this issue Sep 11, 2019
…ad link on portal

Fixes goharbor#315, when users generating the certificate for ingress with cert manager, the secret contains no certificate for CA, this commit provides an option for users to disable the CA download link on portal to avoid the failure when deploying Harbor chart

Signed-off-by: Wenkai Yin <[email protected]>
ywk253100 added a commit to ywk253100/harbor-helm that referenced this issue Sep 12, 2019
Fixes goharbor#315, fixes goharbor#261
When users generating the certificate for ingress with cert manager, the secret contains no certificate for CA, this commit makes the "ca.crt" optional to avoid the failure when deploying Harbor chart

Signed-off-by: Wenkai Yin <[email protected]>
@tlvenn
Copy link

tlvenn commented Oct 1, 2019

The issue is still not entirely fixed, I just tried with the 1.2.0 chart and there is still a volume ca-download which tries to mount the tls secret and it does not seem there is any way to disable this behavior.

As explained, my wildcard tls secret exists in another namespace than harbor so harbor cannot mount it.

Error from the core pod:
MountVolume.SetUp failed for volume "ca-download" : secret "ingress/my-wildcard" not found

@ywk253100
Copy link
Collaborator

Reopen the issue as it doesn't work for the secret in the other namespace as mentioned by @tlvenn

@ywk253100 ywk253100 reopened this Oct 9, 2019
@jonhatallasf
Copy link

Has there been any traction on a possible solution? We use letsencrypt and thus are bit by the ca.crt empty issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
5 participants