-
Notifications
You must be signed in to change notification settings - Fork 691
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bring-your-own-certificate - controller does not fetch latest key imported #1639
Comments
hi @sybernatus Following our procedure explained here, I can not reproduce the problem that you are saying 😕 Certificate generated by me:
Could you verify if the Sealed Secrets controller has generated a new certificate after you apply your own certificate? I am asking that because the keyregistry is being sorted using the CreationTimestamp (here) Thanks a lot Álvaro |
Thanks for your answer Alvaro. For this cluster, we've already did redeploy sealed-secret without old keys and did re-encrypt the secrets manually as there was not so much secrets. But we have to do the same next week for another cluster with much more secrets to re-encrypt so I will bring your more logs about this. What I can bring you now is more info about the configuration changes we've made on sealed-secret during our test:
From here we start to change the configuration:
We also tried:
I want to make sure about the I'll bring all of this asap. Thanks again |
We are experiencing the same issue. The most recently imported certificate will not be provided while --fetch-cert.
|
Which component:
The name (and version) of the affected component (controller or kubeseal)
Describe the bug
We followed the documentation bring-your-own-certificate
While importing our own key on the controller under the
test-key
secret name, the new key is taken into account by the controller once we restarted it:Even if this is the newest key (
kubectl get secret
):The controller continue to retrieve an old public key using
--fetch-cert
argument. It seems to be randomly taken at each controller restart.This is causing re-encrypting our secrets because there is no way to tell kubeseal to always use the latest key to re-encrypt the sealed secrets.
To Reproduce
Steps to reproduce the behaviour:
Deleting the controller Pod is needed to pick the new keys
kubeseal --fetch-cert
and compare it to the public key in the newly created secret.Expected behavior
Version of Kubernetes:
kubectl version
:Additional context
Today our workaround is:
The text was updated successfully, but these errors were encountered: