Skip to content

Registry TLS configuration from registries.yaml is only honored for mirror endpoints #9839

Closed
@intrand

Description

@intrand

Environmental Info:
K3s Version:

1.29.3+k3s1

Node(s) CPU architecture, OS, and Version:

Linux pi3 5.15.0-1049-raspi #52-Ubuntu SMP PREEMPT Thu Mar 14 08:39:42 UTC 2024 aarch64 aarch64 aarch64 GNU/Linux

Cluster Configuration:
1 controlplane node running etcd, 5 worker nodes, all matching raspberry pi computers

Describe the bug:
configuring /etc/rancher/k3s/registries.yaml with the bare minimum for a private registry with a self-signed cert no longer works, but downgrading to 1.29.2+k3s1 allows it to work again without any other changes.

---
configs:
  "registry.domain.tld":
    tls:
      ca_file: /usr/local/share/ca-certificates/ca_from_cluster.pem

Steps To Reproduce:

  1. configure /etc/rancher/k3s/registries.yaml as above
  2. install k3s using latest channel (currently version 1.29.3+k3s1)
  3. deploy some container with its image from that registry
  4. observe a certificate signed by unknown authority error emitted by containerd, captured in kubectl describe pod $pod_name events
  5. downgrade to 1.29.2+k3s1
  6. delete the pod
  7. observe the image pulling without issue

Expected behavior:

to see the image pull correctly as it did in the previous release :)

Actual behavior:

errors related to tls verification and failed pulls

Additional context / logs:

not to lead you down a rabbit hole, but perhaps this is related? #9341

Metadata

Metadata

Labels

No labels
No labels

Type

No type

Projects

Status

Done Issue

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions