Change theme
Help
Press space for more information.
Show links for this issue (Shortcut: i, l)
Copy issue ID
Previous Issue (Shortcut: k)
Next Issue (Shortcut: j)
Sign in to use full features.
Vote: I am impacted
Notification menu
Refresh (Shortcut: Shift+r)
Go home (Shortcut: u)
Pending code changes (auto-populated)
View issue level access limits(Press Alt + Right arrow for more information)
Unintended behavior
View staffing
Description
What you expected to happen:
if I provide a mocked (invalid) auth token, it should still be able to download Public Images (as it was in GCR)
Background:
in minikube we have an integration test for GCP-Auth Addon (that authenticates kubernetes pods to GCP)
in our test we use a Mocked creds, just to see if the fake creds are propagated into the pods
Steps to reproduce:
After migrating to AR, when our GCP-Auth addon is enabled with the mock credentials we use for testing, attempting to pull images from
Reproduction
$ export GOOGLE_APPLICATION_CREDENTIALS="/Users/<user>/repo/minikube/test/integration/testdata/gcp-creds.json"
$ export GOOGLE_CLOUD_PROJECT="this_is_fake"
$ export MOCK_GOOGLE_TOKEN="true"
$ minikube start --addons gcp-auth
š minikube v1.34.0 on Darwin 14.7 (arm64)
āØ Automatically selected the docker driver. Other choices: qemu2, ssh, vfkit (experimental)
š Using Docker Desktop driver with root privileges
š Starting "minikube" primary control-plane node in "minikube" cluster
š Pulling base image v0.0.45-1727108449-19696 ...
š„ Creating docker container (CPUs=2, Memory=4000MB) ...
š³ Preparing Kubernetes v1.31.1 on Docker 27.3.1 ...
āŖ Generating certificates and keys ...
āŖ Booting up control plane ...
āŖ Configuring RBAC rules ...
š Configuring bridge CNI (Container Networking Interface) ...
š Verifying Kubernetes components...
āŖ Using image
āŖ Using image
āŖ Using image
š Verifying gcp-auth addon...
š Your GCP credentials will now be mounted into every pod created in the minikube cluster.
š If you don't want your credentials mounted into a specific pod, add a label with the `gcp-auth-skip-secret` key to your pod configuration.
š If you want existing pods to be mounted with credentials, either recreate them or rerun addons enable with --refresh.
š Enabled addons: storage-provisioner, default-storageclass, gcp-auth
š Done! kubectl is now configured to use "minikube" cluster and "default" namespace by default
$ kubectl run --rm registry-test --restart=Never --image=
pod "registry-test" deleted
error: timed out waiting for the condition
$ kubectl get pods -A
NAMESPACE NAME READY STATUS RESTARTS AGE
default registry-test 0/1 ErrImagePull 0 5s
$ kubectl describe pods registry-test
...
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal Scheduled 15s default-scheduler Successfully assigned default/registry-test to minikube
Normal BackOff 13s kubelet Back-off pulling image "
Warning Failed 13s kubelet Error: ImagePullBackOff
Normal Pulling 3s (x2 over 15s) kubelet Pulling image "
Warning Failed 2s (x2 over 14s) kubelet Failed to pull image "
Warning Failed 2s (x2 over 14s) kubelet Error: ErrImagePull
Other information (workarounds you have tried, documentation consulted, etc):
related issue on minikube repo