Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Watcher-to-API server insecure connection not working #616

Open
bilalbokharee opened this issue Sep 22, 2023 · 4 comments
Open

Watcher-to-API server insecure connection not working #616

bilalbokharee opened this issue Sep 22, 2023 · 4 comments
Labels
kind/bug Categorizes issue or PR as related to a bug.

Comments

@bilalbokharee
Copy link

bilalbokharee commented Sep 22, 2023

Expected Behavior

After setting -auth_mode to insecure in watcher deployment, watcher communicates with API server with no auth required.

containers:
        - args:
            - -api_addr
            - tekton-results-api-service.tekton-pipelines.svc.cluster.local:8080
            - -auth_mode
            - insecure

Actual Behavior

After insecure is set, watcher pod stays in ContainerCreating state, with error message MountVolume.SetUp failed for volume "tls" : secret "tekton-results-tls" not found

Once set to insecure, there is no need for container to get stuck in ContainerCreating, waiting for this volume to mount. It should be bypassed, allowing watcher to poll API server without auth required.

This is based on results v0.8.0

@bilalbokharee bilalbokharee added the kind/bug Categorizes issue or PR as related to a bug. label Sep 22, 2023
@khrm
Copy link
Contributor

khrm commented Sep 22, 2023

@bilalbokharee I think you need to modify watcher deployment to use insecure mode.
From the release manifest, please remove volume and volumemounts for watcher related to tls while using insecure mode, is it working then?

@bilalbokharee
Copy link
Author

@khrm Thanks for the response

I see this error in API server pod after removing volume and volumeMount from watcher deployment

http: TLS handshake error from 100.111.90.29:59006: tls: first record does not look like a TLS handshake

@drGrove
Copy link
Contributor

drGrove commented Nov 8, 2023

You also need to remove volume and volumeMounts for api related to TLS. Otherwise the grpc server is instantiated in secure mode and expects a secure client

@adambkaplan
Copy link
Contributor

You could create a kustomize overlay that adds the grpc insecure arguments and removes the TLS volume mounts. I would be reluctant to include that in any kind of release manifest.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Categorizes issue or PR as related to a bug.
Projects
None yet
Development

No branches or pull requests

4 participants