-
Notifications
You must be signed in to change notification settings - Fork 684
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
After update to Helm release 2.6.4 Error updating SealedSecret "secret" not found
message in log
#961
Comments
Error updating SealedSecret
message in logError updating SealedSecret "secret" not found
message in log
Could you provide more details on the steps to reproduce the error? Here is an example we tried with that version, and we could not reproduce: $ helm install sealed-secrets -n kube-system --set-string fullnameOverride=sealed-secrets-controller --version 2.6.4 sealed-secrets/sealed-secrets
...
$ helm ls -A
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
sealed-secrets kube-system 1 2022-09-15 17:09:13.055100484 +0200 CEST deployed sealed-secrets-2.6.4 v0.18.2
...
# test
$ echo -n foobar | kubectl create secret generic secret --dry-run=client --from-file=foo=/dev/stdin -o json > /tmp/secret.json
$ kubeseal < /tmp/secret.json > /tmp/sealedsecret.json
$ kubectl create -f /tmp/sealedsecret.json
sealedsecret.bitnami.com/secret created
$ kubectl get sealedsecrets
NAME AGE
secret 9s
$ kubectl get secrets
NAME TYPE DATA AGE
secret Opaque 1 14s
$ kubectl get secrets/secret -oyaml
apiVersion: v1
data:
foo: Zm9vYmFy
kind: Secret
...
$ echo Zm9vYmFy | base64 -d
foobar |
Sending us the logs from the controller would also help: For example, for the above test: $ kubectl get pods -A |grep sealed
kube-system sealed-secrets-controller-68dd8fb447-jtt25 1/1 Running 0 8m49s
$ kubectl logs -n kube-system sealed-secrets-controller-68dd8fb447-jtt25
controller version: 0.18.2
2022/09/15 15:09:19 Starting sealed-secrets controller version: 0.18.2
2022/09/15 15:09:19 Searching for existing private keys
2022/09/15 15:09:19 ----- sealed-secrets-keyt2jq9
2022/09/15 15:09:19 HTTP server serving on :8080
2022/09/15 15:12:03 Updating default/secret
2022/09/15 15:12:03 Event(v1.ObjectReference{Kind:"SealedSecret", Namespace:"default", Name:"secret", UID:"fb4954ac-5dee-4f56-98f4-eeab95ab0824", APIVersion:"bitnami.com/v1alpha1", ResourceVersion:"25299", FieldPath:""}): type: 'Normal' reason: 'Unsealed' SealedSecret unsealed successfully
2022/09/15 15:12:03 Updating default/secret
2022/09/15 15:12:03 Event(v1.ObjectReference{Kind:"SealedSecret", Namespace:"default", Name:"secret", UID:"fb4954ac-5dee-4f56-98f4-eeab95ab0824", APIVersion:"bitnami.com/v1alpha1", ResourceVersion:"25301", FieldPath:""}): type: 'Normal' reason: 'Unsealed' SealedSecret unsealed successfully |
Thanks for trying to reproduce.
The logs from the controller:
The only difference is that i did the install with argocd:
I will try this also on a new cluster with a all new install tomorrow. |
If it can help, i have been having the same issue, tried with both a clean install of k3s or microk8s. For extra info I am on windows and using the windows version of kubectl and kubeseal. So with a new ubuntu vm (22.04) created with multipass and a default install of k3s.
Results in the following log from the controller
Output of "kubectl version"
Output of "kubeseal --version" |
This also happen to me on all secrets that unsealed after 2.6.4 upgrade.
The secrets unsealed succesfully and working good except the |
Found the issue, working on the fix... |
We will release a new chart including the patched CRD shortly. |
Chart 2.6.7 released including the patched CRD. Thanks, @vizv ! |
Which component:
Helm release 2.6.4
Describe the bug
After the update from chart 2.6.2 to 2.6.4 i get following error on recreated/new created sealedsecrets:
To Reproduce
Steps to reproduce the behavior:
Expected behavior
No not found message in the log
Version of Kubernetes:
v1.21.6 (Openshift)
v1.22.6 (AKS)
kubectl version
:(AKS)
(Openshift)
Additional context
It seems like this also breaks the argocd health-check which caused that the resources is always on status "processing" in argocd with health-detail "Waiting for Sealed Secret to be decrypted" even its decrypted.
https://github.com/argoproj/argo-cd/blob/master/resource_customizations/bitnami.com/SealedSecret/health.lua
The text was updated successfully, but these errors were encountered: