[go: up one dir, main page]

Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Honor --registry-insecure flag in deploy command #2335

Merged

Conversation

norbjd
Copy link
Contributor
@norbjd norbjd commented May 30, 2024

Changes

  • 🐛 Honor --registry-insecure flag in deploy command

/kind bug

While playing with func in a local environment (with kind), I've noticed certificate signed by unknown authority issues when trying to connect to my local registry, despite passing the --registry-insecure flag:

$ kn func deploy --path myfunc --remote --registry kind-registry:5000 --registry-insecure

Creating Pipeline resources
Error: failed to run pipeline: creating push check transport for kind-registry:5000 failed: Get "https://kind-registry:5000/v2/": tls: failed to verify certificate: x509: certificate signed by unknown authority

Same result with FUNC_REGISTRY_INSECURE; after debugging, it turns out that RegistryInsecure was simply not forwarded from deployConfig to InsecureSkipVerify in ClientConfig 😅

Looking at the PR that introduced --registry-insecure (#2234), it looks like it has never been forwarded. Kind ping to @dprotaso as the author of this PR, maybe I've missed something.

Release Note

fix: honor --registry-insecure flag in deploy command

@knative-prow knative-prow bot added the kind/bug Categorizes issue or PR as related to a bug. label May 30, 2024
@knative-prow knative-prow bot requested review from maximilien and rhuss May 30, 2024 14:57
Copy link
knative-prow bot commented May 30, 2024

Welcome @norbjd! It looks like this is your first PR to knative/func 🎉

@knative-prow knative-prow bot added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels May 30, 2024
Copy link
knative-prow bot commented May 30, 2024

Hi @norbjd. Thanks for your PR.

I'm waiting for a knative member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@matejvasek
Copy link
Contributor

@norbjd Thanks for your contribution!

@matejvasek matejvasek requested review from gauron99 and lkingland and removed request for maximilien and rhuss May 30, 2024 15:06
@matejvasek
Copy link
Contributor
matejvasek commented May 30, 2024

Note: maybe we should rename --registry-insecure to just --insecure (and made it toplevel flag) since this allows plain HTTP also for some functionality other than registry access (e.g. allows plain HTTP for function invocation).
WDYT @lkingland @matzew @gauron99 ?

@matejvasek
Copy link
Contributor

/ok-to-test

@knative-prow knative-prow bot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels May 30, 2024
@norbjd
Copy link
Contributor Author
norbjd commented May 30, 2024

@matejvasek no problem :) btw, I've noticed that the description of --registry-insecure flag was not really clear/correct:

  --registry-insecure        Disable HTTPS when communicating to the registry ($FUNC_REGISTRY_INSECURE)

This flag is not really disabling HTTPS, it's just bypassing the certificate check (InsecureSkipVerify). I was confused first because I thought my registry could be in plain HTTP with this flag, but faced some issues like:

Error: failed to run pipeline: creating push check transport for kind-registry:5000 failed: Get "https://kind-registry:5000/v2/": http: server gave HTTP response to HTTPS client

To me, something like this would be clearer:

  --registry-insecure        Skip certificate verification when communicating in HTTPS with the registry ($FUNC_REGISTRY_INSECURE)

Or, renaming it --registry-insecure-skip-verify would clarify even further 😄 These are just my 2 cents as a user 😉

Copy link
codecov bot commented May 30, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 62.31%. Comparing base (a2bc6f6) to head (387cf06).
Report is 6 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2335      +/-   ##
==========================================
+ Coverage   55.61%   62.31%   +6.69%     
==========================================
  Files         128      128              
  Lines       14891    11531    -3360     
==========================================
- Hits         8281     7185    -1096     
+ Misses       5762     3435    -2327     
- Partials      848      911      +63     
Flag Coverage Δ
e2e-test 38.02% <100.00%> (?)
e2e-test-oncluster-runtime 26.95% <100.00%> (?)
e2e-test-runtime-typescript 27.13% <100.00%> (?)
integration-tests ?
unit-tests 49.25% <100.00%> (?)
unit-tests-macos-latest ?
unit-tests-ubuntu-latest ?
unit-tests-windows-latest ?

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@norbjd
Copy link
Contributor Author
norbjd commented May 30, 2024

The more I'm testing, the more I think there are also missing parts in the insecure registry management when doing remote builds, and this PR might not be enough 👀

Even with the flag honored, I was sadly not able to get a running function 😕: with pack default builder, I couldn't get past this error in the Tekton PipelineRun:

ERROR: failed to initialize analyzer: validating registry read access: ensure registry read access to kind-registry:5000/something/myfunc:latest

After adding more debug logs on Tekton side, I figured out the real error:

Error checking read access: Get "https://kind-registry:5000/v2/": tls: failed to verify certificate: x509: certificate signed by unknown authority

Again! 😄 The error comes from here: https://github.com/buildpacks/lifecycle/blob/v0.19.6/image/registry_handler.go#L77.

I'm assuming that the --insecure-registry flag passed to func deploy is not propagated to the buildpack builder, hence the error, and I'm not really sure on how to do. If you have an idea, please tell me 🙏 if possible, that's something I can include in this PR. From my small experience with the codebase, it should probably be put somewhere around here: https://github.com/knative/func/blob/v0.41.0/pkg/pipelines/resources/tekton/task/func-buildpacks/0.2/func-buildpacks.yaml#L159 (e.g. add the -insecure-registry flag, documented here). Unfortunately, the -insecure-registry flag does not seem supported by the default builder (tested with ghcr.io/knative/builder-jammy-tiny:0.0.244), so I'm stuck 😕

For now, on my side, I think I'm just going to use a HTTPS registry with a valid certificate (something like DockerHub) because initially, I just wanted to test on a kind local environment, but I got already too deep in the rabbithole 😅

I'm wondering if the insecure registry management in deploy worked at some point. @dprotaso do you remember if you got it working (just asking because you've added this flag here: #2234)? If it's not working, maybe you could consider removing this flag temporarily? Or maybe if it's just working with local builds and what I'm trying to do is just an edge case, we can probably add a mutually exclusive rule to avoid passing --insecure-registry and --remote at the same time? Anything that could help users to fail fast would be great IMO.

Thanks!


Side note: with the s2i builder, I got a similar issue, but at least, I was able to go through it by easily (and manually) changing the TLSVERIFY parameter to false. I'm facing other issues with this builder though later in the process, so I won't investigate more, the pack builder seems the most adapted to me.

@dprotaso
Copy link
Member

I think so - I used it for the demo in kubecon here

https://github.com/salaboy/knative-kubecon-eu-2024/blob/main/setup-cluster.sh

@dprotaso
Copy link
Member

@lkingland
Copy link
Member

It would be an improvement to bundle the insecurity settings under a simple --insecure flag.

Thanks for reporting the issue.

@norbjd
Copy link
Contributor Author
norbjd commented May 31, 2024

@dprotaso thanks for the link to the repo, I am indeed doing something very similar with kind. The only difference is that I'm trying to trigger remote (on-cluster) builds with the --remote flag. On your side, it looks like you're using local builds and the experimental "host" builder (https://github.com/knative/func/blob/v0.41.0/cmd/deploy.go#L207).

So, I'm assuming the issue just affects remote builds and insecure registries.

@norbjd
Copy link
Contributor Author
norbjd commented May 31, 2024

OK, I might have an idea on what's happening. There seems to be a misunderstanding on the --registry-insecure flag meaning when doing remote builds. Let me summarize what I've found.

As of today, --registry-insecure in func just means "don't verify TLS certificate" (the value of the flag is used when building the HTTP transport). It does not mean, as the description shows, "Disable HTTPS when communicating to the registry". We can validate this by trying to use a plain HTTP registry and setting --registry-insecure to the deploy command:

Error: failed to run pipeline: creating push check transport for kind-registry:5000 failed: Get "https://kind-registry:5000/v2/": http: server gave HTTP response to HTTPS client

Even with --registry-insecure flag, func will try to send an HTTPS request. Since the registry only speaks HTTP, this will throw the previous error.

That being said, if registry is really speaking HTTPS, but uses self-signed certificates (or more generally, certificates signed by an unknown CA), the previous error will be gone ✨ BUT then, the on-cluster/remote build (tekton pipelinerun) will complain during the "analyze" step:

$ kn func deploy --path myfunc --remote --registry kind-registry:5000/something --registry-insecure
Running Pipeline Task: Building function image on the cluster
Error: function pipeline run has failed with message:

Starting creator...
Parsing inputs...
Ensuring privileges...
Executing command...
===> ANALYZING
Error checking read access: Get "https://kind-registry:5000/v2/": tls: failed to verify certificate: x509: certificate signed by unknown authority
ERROR: failed to initialize analyzer: validating registry read access: ensure registry read access to kind-registry:5000/something/myfunc:latest

This is because buildpack is not configured to ignore certificates signed by unknown authorities. One lead I had was to set CNB_INSECURE_REGISTRIES on the buildpack environment variables:

https://github.com/knative/func/compare/a2bc6f6ffd73c34ea1ab0e3f1cf12a5ea3bfde43...norbjd:knative-func:b931d3c37c2e206b8695359593ba642467c4c81f.diff

diff --git a/pkg/pipelines/resources/tekton/task/func-buildpacks/0.2/func-buildpacks.yaml b/pkg/pipelines/resources/tekton/task/func-buildpacks/0.2/func-buildpacks.yaml
index df5d1f7efd..1e40a8dfeb 100644
--- a/pkg/pipelines/resources/tekton/task/func-buildpacks/0.2/func-buildpacks.yaml
+++ b/pkg/pipelines/resources/tekton/task/func-buildpacks/0.2/func-buildpacks.yaml
@@ -72,6 +72,10 @@ spec:
     env:
       - name: CNB_PLATFORM_API
         value: "0.10"
+      - name: CNB_INSECURE_REGISTRIES
+        value: "kind-registry:5000"
+      - name: CNB_LOG_LEVEL
+        value: "debug"
 
   steps:
     - name: prepare

And build a custom version of func to retrieve the pipeline spec from there:

make build FUNC_REPO_REF=norbjd/knative-func FUNC_REPO_BRANCH_REF=custom-buildpack-pipeline

With this change, the func deploy command error slightly changes and now complains about a HTTP request sent to an HTTPS server:

Running Pipeline Task: Building function image on the cluster
Error: function pipeline run has failed with message:

Starting creator...
Parsing inputs...
Ensuring privileges...
Executing command...
===> ANALYZING
Error checking read/write access: creating push check transport for kind-registry:5000 failed: Get "https://kind-registry:5000/v2/": tls: failed to verify certificate: x509: certificate signed by unknown authority; GET http://kind-registry:5000/v2/: unexpected status code 400 Bad Request: Client sent an HTTP request to an HTTPS server.
ERROR: failed to initialize analyzer: validating registry write access: ensure registry read/write access to kind-registry:5000/something/myfunc:latest

This is because for buildpack, insecure means "plain HTTP", and not "use TLS without certificate check": https://github.com/buildpacks/imgutil/blob/4af87862ff7e7b14b82a061cf8ec40d56ad054f5/remote/options.go#L23

So, with the current behavior of --registry-insecure on func, I am stuck on a loop on the build step: buildpack expects registry to speak plain HTTP, but func expects registry to speak HTTPS; if I use a HTTP registry, func complains, etc ♾️

I'm assuming the best fix would be on func side to change the meaning of --registry-insecure from "don't verify TLS certificate" to "use an HTTP registry without TLS". This could probably be done by not defining a TLSClientConfig here instead of passing InsecureSkipVerify flag).

From there, we could use a HTTP registry with func without getting server gave HTTP response to HTTPS client errors, and pass CNB_INSECURE_REGISTRIES to buildpack. I'm not sure on how to do this still, because everything in the func-buildpacks.yaml file seems to be hardcoded and retrieved from Git before building, so it might not be possible to make dynamic changes.

@lkingland
Copy link
Member

Hello @norbjd

Thanks so much for your clear and thorough examination of how the flag works.

How about we start off with a small PR which updates the flag's description to be more correct.

Then, we can discuss how to enable insecure registries for remote builds.

If setting an environment variable for the Pack builder in the on-cluster build creates the correct behavior, that is something that I believe we can set/create when creating the Pipeline-as-Code artifact which is sent to the server for building.

Again, thanks for looking into this. I suspected this flag was not thoroughly implemented yet through to remote builds, and now we know what's missing.

@lkingland
Copy link
Member

I'm approving this because, while it doesn't completely fix the OP issue, it does get us further down the path towards correctness.

Hoping for more!

/approve

@knative-prow knative-prow bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 6, 2024
@knative-prow knative-prow bot added the lgtm Indicates that a PR is ready to be merged. label Jun 6, 2024
Copy link
knative-prow bot commented Jun 6, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: lkingland, norbjd

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@knative-prow knative-prow bot merged commit 056f3ff into knative:main Jun 7, 2024
39 checks passed
@norbjd norbjd deleted the deploy-honor-registry-insecure-flag branch June 8, 2024 13:08
norbjd added a commit to norbjd/knative-func that referenced this pull request Jun 8, 2024
@norbjd
Copy link
Contributor Author
norbjd commented Jun 8, 2024

@lkingland thanks!

How about we start off with a small PR which updates the flag's description to be more correct.

Here we go: #2348 🥳

knative-prow bot pushed a commit that referenced this pull request Jun 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. kind/bug Categorizes issue or PR as related to a bug. lgtm Indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants