You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 26, 2022. It is now read-only.
Hey - thanks for a great tool! I have a general usage/guidance type question.
I tried to use an ExternalSecret to update an existing secret - one containing certs used for the UI components of a popular tool. The secret is created by that deployment and is supposed to be updated if customisation is wanted.
As this secret was created outside of KES and not produced/owned by it, I see a failed sync with:
NAMESPACE NAME LAST SYNC STATUS
dev argocd-server-tls 1s ERROR, secrets "argocd-server-tls" is forbidden: cannot set an ownerRef on a resource you can't delete: , <nil> 5m48s
I can cause this to succeed by granting delete permissions (on secrets) to the KES controller via its rbac clusterrole external-secrets-kubernetes-external-secrets.
I'm trying to weigh up the pros/cons of passing this delete permission to the KES clusterrole (via role aggregation). I'm not sure what the downside is, but there must be some... so, my question is, what is the reason why delete is omitted from the role here (I'm using v8.0.1).
Aside - if the above isn't the right approach, is there a native solution for this kind of use case? Or is this just not something KES was built to do? No sweat either way!
Thanks - hope to hear from you.
The text was updated successfully, but these errors were encountered:
KES expects to fully own any secret it interacts with and does not support modifying / managing data in existing secrets. Any update or change in the ExternalSecret will overwrite the existing secret.
There's no need for the delete permission for KES as it never deletes any Secrets, deletion of an ExternalSecret by the user would orphan the created Secret which would then be deleted.
Hey - thanks for a great tool! I have a general usage/guidance type question.
I tried to use an ExternalSecret to update an existing secret - one containing certs used for the UI components of a popular tool. The secret is created by that deployment and is supposed to be updated if customisation is wanted.
As this secret was created outside of KES and not produced/owned by it, I see a failed sync with:
I can cause this to succeed by granting delete permissions (on secrets) to the KES controller via its rbac clusterrole
external-secrets-kubernetes-external-secrets
.I'm trying to weigh up the pros/cons of passing this delete permission to the KES clusterrole (via role aggregation). I'm not sure what the downside is, but there must be some... so, my question is, what is the reason why delete is omitted from the role here (I'm using v8.0.1).
Aside - if the above isn't the right approach, is there a native solution for this kind of use case? Or is this just not something KES was built to do? No sweat either way!
Thanks - hope to hear from you.
The text was updated successfully, but these errors were encountered: