-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Unable to fetch tags from ECR #3015
Comments
Some additional logs:
I also gave all EC2 permissions to EKS cluster (not pods) and I believe this log started appearing:
|
I'm having the same issue. (Access to metadata from pods was blocked to prevent using node roles by pods) @pbn4 What about remounting new secret each renewing interval in this solution - #2708 (comment) ? |
@admssa The solution in the mentioned comment worked for me. Yup it seems that flux is not able to use AssumeWebIdentityRole on Fargate, although I'm no expert. |
@pbn4 nevermind. I missed that fact that mounted Secrets are updated automatically :) |
I also have this issue. I was debugging a bit this issue and I think the problem is here: Line 130 in 2f8e207
starting at this line, Flux tries to get the instance metadata, but in our case, we don't have it in Fargate. With that, the variable "okToUseAWS" is never true. |
In my tests here, that is it. Works after force okToUseAWS=true. |
Also ran into this. Was trying to use flux with iam roles for service accounts and locked down access to ec2 metadata / instance profile credentials. I modified the preflight code such that |
Is there any update on this? I'm hitting this as well with EKS trying to use the Node role. |
It worked for me |
anyone can help me how to solve it on my end. I am experiencing the same issue. image untagged. Did try the same setup exactly but on AWS EKS EC2 and flux is working as expected. @evq how can i do this and have it on my end as well?
|
This issue has been verified to affect not only AWS Fargate users, but a number of other cases as well. The fix I just merged will be published in Flux v1.23.2. |
Very sorry but an error was made in the 1.23.2 release preparation, and while the PR from #3485 was in I will have to make another release to include this change. It may take some time, meanwhile there is this image available from the official Flux Prerelease repo which includes this change for anyone that needs it:
I am very sorry about this, and will make a point to be more careful and attentive when I am executing releases in the future. I've updated the release notes for v1.23.2 to reflect that an error was made. |
@kingdonb any ETA to have this change released? |
I will look into releasing it this week again if at all possible. I just got a clean security scan from Snyk for the first time in several weeks, so this will probably be Flux 1.24.0, a MINOR upgrade with Alpine 3.14.1 as the new base image. These changes should be bundled together so users with CVE scan requirements can upgrade readily without exceptions raised by security scans. |
@pierluigilenoci See #3537, all of the PRs for 1.24.0 are ready for review now. I think it should be no problem to release 1.24.0 some time this week, but that will have to depend on and be subject to reviews from other maintainers, as I still cannot merge my own PRs without reviews from other maintainers. I can cut a new prerelease image with all of those if you would like, or you can use one of the autogenerated flux-prerelease images for now if you are in need. Each time a new PR merges to master, it gets pushed automatically to fluxcd/flux-prerelease/tags on Docker Hub. The latest pre-release image from this morning was:
The fix for this issue, #3015, has already been merged in master and so is included in this pre-release image, has been for some time already. Please do give it a try if you can and let us know whether this fixes your issue. It would be good to know for sure, or if it is a different issue fixed by #3485. If there is a different issue, there is still time to get it fixed and included for 1.24.0. 🙇 🙏 |
Thank you @kingdonb, Thank you again 🙏🏻 |
This issue is resolved in the 1.24.0 release that was just published. The chart release will be 1.11.0 and is forthcoming in this PR: |
Describe the bug
I have a fluxcd running inside EKS with Fargate. There is a workload for which I have automated update set up with repository being the AWS ECR. Roles for fargate pods give them permissions to access ECR.
Also none of the issues and solution I found in this repository are solving my problem, thus new thread.
To Reproduce
Set up an EKS cluster with fargate and flux and observe flux logs.
Expected behavior
Flux should update the workload with new image.
Logs
ts=2020-04-21T11:11:15.679624161Z caller=warming.go:180 component=warmer canonical_name=xxxx.dkr.ecr.eu-west-1.amazonaws.com/repo auth={map[]} err="requesting tags: Get https://xxxx.dkr.ecr.eu-west-1.amazonaws.com/v2/repo/tags/list: no basic auth credentials"
I did some experimentation with aws-cli docker image inside flux namespace. I was trying to get list of accounts e.g.
configure list
is yielding an empty configuration for this newly created pod and I'm not sure if this is correct. How can I check if arbitrary pod has the access to this URL flux is trying to fetch (I assume flux is specifying authentication somehow)?Additional context
The text was updated successfully, but these errors were encountered: