Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handling of updated secrets and configuration #28

Open
dmacvicar opened this issue Apr 21, 2021 · 0 comments
Open

Handling of updated secrets and configuration #28

dmacvicar opened this issue Apr 21, 2021 · 0 comments

Comments

@dmacvicar
Copy link

In the CNLC branch, if a secret is updated, kube-notary does not realize it, as it is exposed as an environment variable.

The behavior of KubeNotary should be examined and a decision needs to be made how to handle (or document this case).

As Kubernetes does not appear to provide a solution, unless you use eg. mounted secrets, or Helm tricks, the solution may very well to ignore the problem and document it properly.
If the route of making kube-notary aware of the changes is chosen, it needs to be something in line of how Kubernetes workloads usually deal with this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant