Joey
04/09/2025, 7:56 PMsigge
04/09/2025, 8:02 PMPRESHARED_KEY
and urlJoey
04/09/2025, 8:10 PMJoey
04/09/2025, 8:10 PMJoey
04/09/2025, 8:10 PMsigge
04/10/2025, 2:04 PM'invalid preshared key: rpc error: code = Unauthenticated desc = Request unauthenticated with bearer',
found this thread https://github.com/authzed/authzed-py/issues/89#issuecomment-1718705926
And it seems like it doesn't pass thet preshared key when insecure?Joey
04/10/2025, 2:07 PMsigge
04/10/2025, 2:07 PMsigge
04/10/2025, 2:08 PMJoey
04/10/2025, 2:14 PMsigge
04/10/2025, 3:00 PMJoey
04/10/2025, 3:01 PMJoey
04/10/2025, 3:01 PMsigge
04/10/2025, 3:09 PMSPICEDB_GRPC_PRESHARED_KEY: <set to the key 'preshared_key' in secret 'preview-pr7488-backend-spicedb-shared-config'> Optional: false
this is what I have on the spice db managed by operator, and I have verified that it's the same secret that the backend usessigge
04/10/2025, 3:09 PMsigge
04/10/2025, 3:29 PMJoey
04/10/2025, 3:32 PMJoey
04/10/2025, 3:32 PMsigge
04/10/2025, 3:35 PMts
v1.NewClient(
env.SPICEDB_GRPC_PRESHARED_KEY,
datastoreUrls[tenant], // "preview-pr7488-backend-spicedb-shared.svc.cluster.local:50051"
v1.ClientSecurity.INSECURE_LOCALHOST_ALLOWED,
)
sigge
04/10/2025, 3:43 PMts
const spiceDBCluster = new k8s.apiextensions.CustomResource(
name,
{
apiVersion: 'authzed.com/v1alpha1',
kind: 'SpiceDBCluster',
metadata: {
name,
namespace,
},
spec: {
config: {
datastoreEngine: 'postgres',
datastoreURI,
logLevel,
replicas: replicas.toString(),
image: 'legoraregistry.azurecr.io/authzed/spicedb',
},
secretName: configSecret.metadata.name,
},
},
{ parent: this },
);
this the resource definitionsigge
04/10/2025, 3:44 PMts
new k8s.helm.v3.Release(
'spicedb-operator',
{
namespace: coreNamespace.metadata.name,
repositoryOpts: {
repo: 'https://bushelpowered.github.io/spicedb-operator-chart',
},
chart: 'spicedb-operator',
version: '2.0.0',
values: {
image: {
repository: pulumi.interpolate`${registry}/authzed/spicedb-operator`,
pullPolicy: 'IfNotPresent',
},
installCRDs: true,
...getPodSpecForNodePool(NodePool.SYSTEM),
},
},
{ parent: this, protect: true },
);
Joey
04/10/2025, 3:54 PMINSECURE_LOCALHOST_ALLOWED
only works for localhostJoey
04/10/2025, 3:54 PMsigge
04/10/2025, 4:01 PMINSECURE_PLAINTEXT_CREDENTIALS
, Is there anything else I need to configure when using this option?Joey
04/10/2025, 4:02 PMINSECURE_PLAINTEXT_CREDENTIALS
Joey
04/10/2025, 4:02 PMJoey
04/10/2025, 4:02 PMJoey
04/10/2025, 4:02 PMsigge
04/10/2025, 4:32 PMJoey
04/10/2025, 4:32 PMcanadaduane
05/01/2025, 4:26 PM*.orb.local
DNS by default for containers).
I think it would be very beneficial to future visitors to add v1.ClientSecurity.INSECURE_PLAINTEXT_CREDENTIALS
as the default security setting for documentation that is meant for developers who are trialing spicedb locally.canadaduane
05/01/2025, 4:30 PMJoey
05/01/2025, 5:57 PMJoey
05/01/2025, 5:57 PMJoey
05/01/2025, 5:57 PMcanadaduane
05/01/2025, 10:17 PMcanadaduane
05/01/2025, 10:18 PMJoey
05/01/2025, 10:58 PM