Comments (1)
If someone is interested, I have performed the tests for the scenarios described above. The answers are:
Will sealed-secrets controller still be able to decrypt the secrets encrypted with the old certificate after the certificate expiration?
No, it will throw an error: "error: failed to encrypt using an expired certificate"
How to add the new TLS key/pair while still keeping the old key/pair in the controller to decrypt the old secrets?
Create a new TLS key/pair and reference it in secretName
of the Helm release, update the Helm release.
To decrypt the secrets with the old expired certificate, do not remove the old certificate from the cluster and keep sealedsecrets.bitnami.com/sealed-secrets-key: active
label on it. The sealed-secret-controller will continue to decrypt the secrets encrypted with the expired certificate, although it's not directly referenced in the Helm release.
from sealed-secrets.
Related Issues (20)
- Kubeseal is not able to fetch certificate HOT 1
- Kubeseal --re-encrypt with local certificates HOT 1
- Activate the golangci-lint gosec linter in the project configuration HOT 1
- Program managed sealed secret in GitOps environment (using ArgoCD) HOT 3
- [Helm] Netpol & Servicemonitor enabled - not able to scrape metrics HOT 1
- lastTransitionTime/lastUpdateTime under status->conditions not updated when updating a SealedSecret
- kubeseal is ignoring NO_PROXY variables upon request for cert.pem (403) HOT 6
- Unseal with --raw HOT 6
- Secret values not getting updated HOT 1
- Vendoring fails on 0.26.1 HOT 1
- Bug in Helm Chart in file role-binding.yaml
- Ability to enable TLS on Ingress with custom certificate which exists on the cluster already HOT 4
- Creating sealed secret throws an error: "an empty namespace may not be set when a resource name is provided" HOT 3
- Status shows no key could decrypt secret for successful created secret HOT 14
- Secret not yet active when deploying with Helm HOT 2
- Templating support for escaping JSON/YAML values HOT 2
- Controller in restricted environment trying to access secrets at cluster level HOT 3
- template.metadata.name ignored in sealed secret HOT 4
- Unable to re-encrypt sealed-secrets HOT 1
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from sealed-secrets.