-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is Tekton compatible with injected sidecars? (E.g. istio) #701
Comments
Looking through the codebase, here are the answers:
Another thing to note is that there are two init containers remaining, creds-init and the entrypoint copy. I believe the creds-init can be relatively trivially added as the first step to every task. It also does not block execution, at least in the istio case, since neither dockercreds nor gitcreds 1 2 have a network requirement. We should probably convert this to a step in order to support credential use-cases that require network access (e.g. vault credentials), but it's not blocking for istio. I doubt the entrypoint setup will ever require network access, so that's probably fine to stay as an init container (and I'm not sure there's any other way to implement it). Since our pods require istio in order interface with the network correctly, both internal and external, we're going to try to do the following as a temporary workaround:
Some thoughts on followups:
|
Thanks for doing this investigation @dicarlo2 !! If you feel like creating issues in the backlog for any/all of these that would be super cool (and apologies if they already exist and I haven't caught up to them yet haha), in the meantime I've added these to my secret queue of issues to write XD
We'd need:
I'm not familiar with this use case - in this case would the webhook manipulate the pod spec to add the sidecar before the pod actually starts executing? (What would stop that from working currently?)
This makes all kinds of sense (and someone else requested this earlier today!!)
👍 |
Aaaand of course looks like ~50% of this is covered in the proposal in #727 😎 No issues yet (I don't think 🤞 ) for adding sidecars to the Task spec, adding retries to PipelineResources and moving creds-init to a step |
How does Tekton handle injected sidecars? Off the top of my head, potential issues:
The text was updated successfully, but these errors were encountered: