Open hinrichd opened 8 months ago
Hi @hinrichd,
Thank you for the detailed report. I see two issues here.
I took a closer look at the code and did some internal testing, and it seems setting HTTPS_PROXY (lower or upper case) is being honoured. So more than likely the issue is related to the permission settings on the HCP Vault Secrets side not matching what you have in your service principal credentials. You will want to verify those credentials match the OrganizationID/ProjectID configured on your HCPAuth.
Also, just be aware that the approach you are taking by setting the proxy globally for VSO, may cause some unexpected behaviour. Ideally, VSO would support granular proxy configuration on the HCPAuth or VaultConnection custom resources. We will probably add support for that use case in a future VSO release.
Ben
Hi @benashz
Thank you for pointing out some details to my related problem. I could solve it now by changing the sp permissions. Sounds good to have some granular proxy config on the HCP Auth in the future release.
THX Hinrich
Describe the bug When using vso on an onpremise cluster behind a proxy, vso do not use the proxy varibales from extraEnv to lookup and connect to Hashicorp Vault Secrets. Connection Test fails due to lookup on KubenDNS and not using proxy.
To Reproduce Steps to reproduce the behavior:
helm install vault-secrets-operator hashicorp/vault-secrets-operator -f values.yaml
"error": "connection check failed, err=dial tcp: lookup api.cloud.hashicorp.com on 10.200.X.X53: server misbehaving"
Lookup using internal kubedns and not using proxy, so it will fail.Environment
Thank You for your help.