You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
With current implementation, creating the GatewayServer resource would generate a Secret resource with a key pair unless a secret already exists.
That makes it very hard for declarative setup that uses SealedSecret for example for creating this Secret as the sealed-secrets controller would refuse to touch the Secret if it already exists, hence there's a race condition here
Describe the solution you'd like
A way of preventing automatically creating the Secret resource with a key pair when creating the GatewayServer resource
Describe alternatives you've considered
I have no alternatives other than manual intervention or manual setup which kinda beats the purpose of declarative setup
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
With current implementation, creating the
GatewayServer
resource would generate aSecret
resource with a key pair unless a secret already exists.That makes it very hard for declarative setup that uses
SealedSecret
for example for creating thisSecret
as the sealed-secrets controller would refuse to touch theSecret
if it already exists, hence there's a race condition hereDescribe the solution you'd like
A way of preventing automatically creating the
Secret
resource with a key pair when creating theGatewayServer
resourceDescribe alternatives you've considered
I have no alternatives other than manual intervention or manual setup which kinda beats the purpose of declarative setup
The text was updated successfully, but these errors were encountered: