Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sealed-secret / existing secret support #2756

Open
DreamingRaven opened this issue Sep 10, 2024 · 0 comments
Open

Sealed-secret / existing secret support #2756

DreamingRaven opened this issue Sep 10, 2024 · 0 comments

Comments

@DreamingRaven
Copy link

DreamingRaven commented Sep 10, 2024

For my clusters, I use gitops and sealed secrets to consistently represent the secrets in my cluster without exposing them or randomly generating them.

I am running v1.13.0 of the operator and a v16 postgresql db, on kubernetes 1.31.0. Notably I also have the configKubernetes.enable_owner_references=true option enabled for ArgoCD to be able to see the resources which contributes in part but wholly necessary.

My problem summary is that I cannot find a clean way to use an existing secret with a user definition for a given postgresql database:

  • There appears to not be a way to reference an existing secret in v1.13.0 for a user's name and password.
  • Alternatively, if I autogenerate a user then force replacement with an existing secret its list of owner references is emptied, and it now only references the postgresql CRD, along with requiring some manual intervention breaking automation. I would have expected that the owner reference would have been extended rather than replaced.

Are there any current ways to reference an existing secret for a database user's password in particular? I do not mind the lack of secret rotation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant