Giter Site home page Giter Site logo

disposab1e / sealed-secrets-operator-helm Goto Github PK

View Code? Open in Web Editor NEW
11.0 0.0 16.0 101 KB

[DEPRECATED] Sealed Secrets Operator (Helm) installs Sealed Secrets in OpenShift and Kubernetes.

Home Page: http://sealed-secrets-operator-helm.rtfd.io/

License: Apache License 2.0

Dockerfile 1.16% Makefile 44.42% Shell 51.98% Smarty 2.44%
sealed-secrets operator openshift kubernetes crc minikube minishift okd travis-ci github-actions

sealed-secrets-operator-helm's People

Contributors

abessifi avatar disposab1e avatar numblesix avatar rbaumgar avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

sealed-secrets-operator-helm's Issues

Rolle concept

Hi,

Can you please go into detail about the role concept of the Operator?
Seeing the file at https://github.com/disposab1e/sealed-secrets-operator-helm/blob/master/guides/ocp4/manual/role.yaml it seems like that the operator requires quite a lot of access to work. Or could the resources and verbs be broken down into more detail to reduce the permissions of the operator and the operator still work fine?

  • What kind of resources does the Operator, list, get, create, watch, update, delete and patch during normal operation?

Thanks

Installation of sealed-secrets-operator stuck on status "UpgradePending" in a fresh openshift cluster

Steps to reproduce

Step 1:
Spinup a fresh 4.6 openshift cluster

Step 2:
Login to the cluster as kubeadmin

Step 3:
Apply the sealed-secrets-operator subscription through oc command

oc create -f - <<EOF
  apiVersion: operators.coreos.com/v1alpha1
  kind: Subscription
  metadata: 
    labels: 
      operators.coreos.com/sealed-secrets-operator-helm.cicd: ""
    managedFields: 
      - 
        apiVersion: operators.coreos.com/v1alpha1
        manager: olm
        operation: Update
      - 
        apiVersion: operators.coreos.com/v1alpha1
        manager: catalog
        operation: Update
    name: sealed-secrets-operator-helm
    namespace: cicd
  spec: 
    channel: alpha
    installPlanApproval: Automatic
    name: sealed-secrets-operator-helm
    source: community-operators
    sourceNamespace: openshift-marketplace
    startingCSV: sealed-secrets-operator-helm.v0.0.2
EOF

Step 4:
Check the operator status from the openshift console

Screen Shot 2020-10-05 at 10 22 36 PM

missing rbac for handling ingress

The operator cannot create ingress:

{"level":"error","ts":1631867415.8278918,"logger":"helm.controller","msg":"Release failed","namespace":"sealed-secrets","name":"sealed-secret-controller","apiVersion":"bitnami.com/v1alpha1","kind":"SealedSecretController","release":"sealed-secret-controller","error":"failed to install release: rendered manifests contain a resource that already exists. Unable to continue with install: could not get information about the resource: ingresses.networking.k8s.io \"sealed-secret-controller-sealed-secrets\" is forbidden: User \"system:serviceaccount:sealed-secrets:sealed-secrets-operator-helm\" cannot get resource \"ingresses\" in API group \"networking.k8s.io\" in the namespace \"sealed-secrets\"","stacktrace":"github.com/go-logr/zapr.(*zapLogger).Error\n\tpkg/mod/github.com/go-logr/[email protected]/zapr.go:128\ngithub.com/operator-framework/operator-sdk/pkg/helm/controller.HelmOperatorReconciler.Reconcile\n\tsrc/github.com/operator-framework/operator-sdk/pkg/helm/controller/reconcile.go:197\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\tpkg/mod/sigs.k8s.io/[email protected]/pkg/internal/controller/controller.go:256\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\tpkg/mod/sigs.k8s.io/[email protected]/pkg/internal/controller/controller.go:232\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).worker\n\tpkg/mod/sigs.k8s.io/[email protected]/pkg/internal/controller/controller.go:211\nk8s.io/apimachinery/pkg/util/wait.JitterUntil.func1\n\tpkg/mod/k8s.io/[email protected]/pkg/util/wait/wait.go:152\nk8s.io/apimachinery/pkg/util/wait.JitterUntil\n\tpkg/mod/k8s.io/[email protected]/pkg/util/wait/wait.go:153\nk8s.io/apimachinery/pkg/util/wait.Until\n\tpkg/mod/k8s.io/[email protected]/pkg/util/wait/wait.go:88"}
{"level":"error","ts":1631867415.8357806,"logger":"controller-runtime.controller","msg":"Reconciler error","controller":"sealedsecretcontroller-controller","request":"sealed-secrets/sealed-secret-controller","error":"failed to install release: rendered manifests contain a resource that already exists. Unable to continue with install: could not get information about the resource: ingresses.networking.k8s.io \"sealed-secret-controller-sealed-secrets\" is forbidden: User \"system:serviceaccount:sealed-secrets:sealed-secrets-operator-helm\" cannot get resource \"ingresses\" in API group \"networking.k8s.io\" in the namespace \"sealed-secrets\"","stacktrace":"github.com/go-logr/zapr.(*zapLogger).Error\n\tpkg/mod/github.com/go-logr/[email protected]/zapr.go:128\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\tpkg/mod/sigs.k8s.io/[email protected]/pkg/internal/controller/controller.go:258\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\tpkg/mod/sigs.k8s.io/[email protected]/pkg/internal/controller/controller.go:232\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).worker\n\tpkg/mod/sigs.k8s.io/[email protected]/pkg/internal/controller/controller.go:211\nk8s.io/apimachinery/pkg/util/wait.JitterUntil.func1\n\tpkg/mod/k8s.io/[email protected]/pkg/util/wait/wait.go:152\nk8s.io/apimachinery/pkg/util/wait.JitterUntil\n\tpkg/mod/k8s.io/[email protected]/pkg/util/wait/wait.go:153\nk8s.io/apimachinery/pkg/util/wait.Until\n\tpkg/mod/k8s.io/[email protected]/pkg/util/wait/wait.go:88"}

Error with multiple sealed secrets instances

When the operator from OperatorHub is installed in multiple namespaces and CR instances are created in their respective namespaces. The instances fail with the following error

failed to install release: rendered manifests contain a resource that already exists. Unable to continue with install: existing resource conflict: namespace: , name: sealedsecrets.bitnami.com, existing_kind: apiextensions.k8s.io/v1beta1, Kind=CustomResourceDefinition, new_kind: apiextensions.k8s.io/v1beta1, Kind=CustomResourceDefinition

Steps to reproduce:

  1. Create a namespace foo. Install the operator in namespace foo and create the CR in foo
  2. Create a new namespace bar. Install the operator in namespace bar and create the CR in bar

Operator Version: 0.0.2
Environment: OpenShift 4.6

Aggregate sealed secrets to admin cluster role

On OpenShift the sealed secrets resource is not aggregated to the admin cluster role. This prevents service accounts (eg Argo CD) from managing sealed secret resources even though they have admin privileges in that namespace This could be achieved by adding the label

"rbac.authorization.k8s.io/aggregate-to-admin": "true",

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.