Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Process to warn about expiry and rotate secrets for radix<env>app registry #1489

Open
Richard87 opened this issue Nov 1, 2024 · 2 comments
Assignees

Comments

@Richard87
Copy link
Contributor

Richard87 commented Nov 1, 2024

Hot fix for Playground and Dev:

I manually rotated the secrets for playground and dev:

  1. Generate new password (I generated new password2) for the radix-app-registry-secret-ENV token in radixENVapp
  2. Manually updated the keyvault secret radix-app-registry-secret
  3. Manually updated the secret default/radix-app-registry with new password (no ExternalSecret has been created yet)
  4. Restart Operator
@Richard87
Copy link
Contributor Author

Richard87 commented Nov 1, 2024

Hadde det vært en ide (og mulig?) å bruke https://external-secrets.io/latest/api/generator/acr/ ?

@sveinpj
Copy link
Collaborator

sveinpj commented Nov 8, 2024

Can we add secret operator to push the new secret?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants