-
Notifications
You must be signed in to change notification settings - Fork 404
Feature Request: Secret versioning and auto-update #105
Comments
I also had this requirement from my team, it also hard to tell if the SM secret changes made it to the kube secret before deploying a new version of your app. |
Hi @derrickburns and @Sytten . Can you propose how we might change the CRD to allow this as an option? |
We are kind of limited by the small feature set exposed for secrets but I would suggest the following:
I think this would be a good starting point for more visibility though I am still unsure if this is enough to have a really robust system. |
I would not suggest changing the CRD, but rather change the installlation options for the service. See fluxcd. You need to pass the Git repo url and generate or accept a key that can be uploaded to Git to store updates to the repo. |
On second thought, you do need to track the version of the currently installed secret and the version of the secret as stored in Git. You also need a configuration parameter that signals whether the secret is frozen or can be updated. If the secret has been deleted from AWS but the In total:
|
I am still unsure if modifying git from kubernetes is really a good idea, sounds like a logistical nightmare to me and potential leaks of keys that key modify source code! Plus it is not very helpful for the user to know the version of the |
Check out the [flux project](https://github.com/fluxcd/flux). It is now a CNCF project. It is very popular and does what I am suggesting.
|
This issue is stale because it has been open 90 days with no activity. Remove stale label or comment or this will be closed in 30 days. |
Not stale |
This issue is stale because it has been open 90 days with no activity. Remove stale label or comment or this will be closed in 30 days. |
Not stale |
This issue is stale because it has been open 90 days with no activity. Remove stale label or comment or this will be closed in 30 days. |
Not stale |
This issue is stale because it has been open 90 days with no activity. Remove stale label or comment or this will be closed in 30 days. |
This issue was closed because it has been stalled for 30 days with no activity. |
Not stale |
One issue with the current approach is that it is impossible to know what version of a secret is currently deployed to a cluster nor whether the current secret is the one stored in the backing store.
I propose adding an opaque versionID field to the ExternalSecrets CRD (like ContainerSolutions controller) AND (most importantly) a watcher that updates Git (i.e. GitOps) when the backend detects a new version of the secret.
In this way, the secret is kept up to date AND one can tell which version of the secret is stored in any cluster that is watching that GitHub repo.
The text was updated successfully, but these errors were encountered: