Bug: Harbor robot account expired — ImagePullBackOff on new deployments #33
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Type
Bug
Lineage
Discovered during validation of #30 (Nemo qwen infra). Blocks all future deployments of westside-ai-assistant.
Repo
forgejo_admin/pal-e-services(Harbor robot account provisioned via Terraform)What Broke
The
harbor-credssecret in thewestside-ai-assistantnamespace contains credentials for a robot account that no longer exists in Harbor. The only robot account in Harbor isrobot$image-updater. Any new pod rollout fails withImagePullBackOff/ 401 Unauthorized pulling fromharbor.tail5b443a.ts.net/westside-ai-assistant/api:latest.The old pod (from March 31) still runs because it cached the image locally.
Repro Steps
kubectl get events -n westside-ai-assistantshows: "401 Unauthorized"curl -u robot$westside-ai-as...:... harbor/v2/westside-ai-assistant/api/tags/listreturns UNAUTHORIZEDExpected Behavior
Pod should pull the image successfully using valid Harbor credentials.
Environment
Acceptance Criteria
Related
project-westside-ai-assistantScope Review: NEEDS_REFINEMENT
Review note:
review-761-2026-04-03Repo placement mismatch: Issue says fix is in
forgejo_admin/pal-e-services, butwestside-ai-assistantis not in pal-e-servicesvar.servicesat all. The service was never onboarded into the standard provisioning pipeline — harbor-creds was created through a different mechanism.Issues found:
var.services(correct long-term fix, auto-provisionsduration = -1robots), or (b) manual Harbor robot re-creation (bandaid). Update Repo field and add file targets accordingly.Blast radius: No other namespaces affected. All other services use pal-e-services pipeline with non-expiring robots. Only westside-ai-assistant is impacted.