You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After rotating some keys internally, we realized that all k8up repo passwords are generated using both the project's name and the lagoons's JWT secret, here:
This means that rotating the JWT will cause the generated value to change, leading to restic passwords which are not generated deterministically. Because these passwords are not the expected value, restic fails to access the backup repository, leading to all operations involving the backup repository to fail (Backups, Prunes, Checks, and Restores)
Expected behavior
Lagoon should generate these repository passwords with a value which can be specified in order to ensure these passwords will not change with every JWT token renewal
The text was updated successfully, but these errors were encountered:
my suggestion would be to allow an env variable be injected into the api pods like PROJECT_SECRET_SALT which is used when specified, if not specified the JWTSECRET should be used (like it does today).
Describe the bug
After rotating some keys internally, we realized that all k8up repo passwords are generated using both the project's name and the lagoons's JWT secret, here:
lagoon/node-packages/commons/src/tasks.ts
Line 314 in b74abe8
This means that rotating the JWT will cause the generated value to change, leading to restic passwords which are not generated deterministically. Because these passwords are not the expected value, restic fails to access the backup repository, leading to all operations involving the backup repository to fail (Backups, Prunes, Checks, and Restores)
Expected behavior
Lagoon should generate these repository passwords with a value which can be specified in order to ensure these passwords will not change with every JWT token renewal
The text was updated successfully, but these errors were encountered: