Open alexey-ban opened 3 years ago
Hi @alexey-ban, which version of the webhook do you use?
Hi @bonifaido helm chart: 1.11.3, image: ghcr.io/banzaicloud/vault-secrets-webhook:1.11.2
Hi, I just found that we have an upstream issue here in the go-containerregistry library that checks the container registries: https://github.com/google/go-containerregistry/issues/723
Hey folks, We're struggling with a similar issue that was originally reported in https://github.com/banzaicloud/bank-vaults/issues/1232
In our case, we have multiple imagePullSecrets
defined that indeed exist and are correct (the reason is because same Pod has containers coming from different internal repos that have different secrets).
How in this scenario, VSW is only able to pull images for the registry whose secret is the first in the imagePullSecrets
list, if the image is in the registry whose secret is 2nd - it fails to pull the image and mutation is not performed.
Hey @bonifaido 👋🏼
I realize this is an upstream issue and looks like not something that can be easily fixed (although the PR that introduced the "bug" is really strange).
We are impacted by this due to our internal container registry having different secrets for different projects (namespace) in the registry.
Do you think there's anything that can be done in VSW to address this?
Hey,
Can someone verify that this issue still present as of today? It seems like there has been some fixes around this one.
Describe the bug: K8s is able to pull images using the provided pull secrets, even if one of them doesn't exist
vault-secrets-webhook picks the first listed imagePullSecret and broke if it not found
Expected behaviour: vault-secrets-webhook should attempt all listed imagePullSecrets to find the one that works.
Steps to reproduce the bug:
Additional context: Add any other context about the problem here.
Environment details:
/kind bug