Comments (4)
NOTE: the kubernetes version is a bit old (I have no control over that). However, the issue should also occur on newer clusters since it is the sealed secret operator that finally decides what the name of the generated secret should be.
from sealed-secrets.
Just encountered this myself, guessing this is what's causing it:
sealed-secrets/pkg/apis/sealedsecrets/v1alpha1/sealedsecret_expansion.go
Lines 327 to 329 in 9439ac6
Is there a reason the name/namespace need to match the SealedSecret
metadata?
from sealed-secrets.
From the docs:
Note the SealedSecret and Secret must have the same namespace and name. This is a feature to prevent other users on the same cluster from re-using your sealed secrets. See the Scopes section for more info.
from sealed-secrets.
shouldn't the metadata.name configuration be removed then from the template? Having this parameter there suggests that it can be independently configured of the name of the sealedsecret. Right now it silently ignores the name.
Alternatively, users could also be warned in the output of kubectl describe and in the status field of the secret. I realize the change would be downwards incompatible.
from sealed-secrets.
Related Issues (20)
- Activate the golangci-lint gosec linter in the project configuration HOT 1
- Program managed sealed secret in GitOps environment (using ArgoCD) HOT 3
- [Helm] Netpol & Servicemonitor enabled - not able to scrape metrics HOT 1
- lastTransitionTime/lastUpdateTime under status->conditions not updated when updating a SealedSecret
- kubeseal is ignoring NO_PROXY variables upon request for cert.pem (403) HOT 6
- Unseal with --raw HOT 6
- Secret values not getting updated HOT 1
- Vendoring fails on 0.26.1 HOT 1
- Bug in Helm Chart in file role-binding.yaml
- Ability to enable TLS on Ingress with custom certificate which exists on the cluster already HOT 4
- Creating sealed secret throws an error: "an empty namespace may not be set when a resource name is provided" HOT 3
- Status shows no key could decrypt secret for successful created secret HOT 18
- decrypt secrets encrypted with custom TLS certificate of expired validity HOT 1
- Secret not yet active when deploying with Helm HOT 2
- Templating support for escaping JSON/YAML values HOT 2
- Controller in restricted environment trying to access secrets at cluster level HOT 3
- Unable to re-encrypt sealed-secrets HOT 3
- kubeseal is creating an empty file HOT 5
- kubeseal fails with timeout when controller is not deployed to primary API node specified in kubeconfig file HOT 4
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from sealed-secrets.