Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

InfisicalSecret does not update already generated Secret on field change #2400

Closed
tiagovtristao opened this issue Sep 10, 2024 · 5 comments
Closed

Comments

@tiagovtristao
Copy link

Describe the bug

The InfisicalSecret doesn't seem propagate any new changes when you change the .spec.authentication.universalAuth.secretsScope.envSlug field (this could be true for other fields as well). I had to delete the generated secret and the pod using it, so that the new secrets (associated with the new envSlug) would be refetched and propagated onto the pod.

Partial resource below:

apiVersion: secrets.infisical.com/v1alpha1
kind: InfisicalSecret
metadata:
  name: foobar
spec:
  authentication:
    universalAuth:
      credentialsRef:
        secretName: infisical-universal-auth-credentials
        secretNamespace: default
      secretsScope:
        envSlug: production-k8s
        projectSlug: foobar-8-aaa
        recursive: false
        secretsPath: /website

To Reproduce

Edit the .spec.authentication.universalAuth.secretsScope.envSlug field to point to a different one.

Expected behavior

The secret generated by InfisicalSecret should be updated with the new variables, and the deployment reloaded if secrets.infisical.com/auto-reload is set.

@akhilmhdh
Copy link
Member

CC: @DanielHougaard

@DanielHougaard
Copy link
Contributor

Hi @tiagovtristao, thank you for the report. I've made an internal item for this and we'll get to it as soon as possible.

@tiagovtristao
Copy link
Author

@akhilmhdh and @DanielHougaard, thanks for getting into it so quickly! Much appreciated :-)

@DanielHougaard
Copy link
Contributor

@tiagovtristao this has now been fixed in version v0.7.2. Thank you for letting us know!

@tiagovtristao
Copy link
Author

Thank you @DanielHougaard!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants