-
-
Notifications
You must be signed in to change notification settings - Fork 762
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dex secret not found #155
Comments
Hi,
|
+ kubectl describe -n dex externalsecret dex-secrets
Name: dex-secrets
Namespace: dex
Labels: argocd.argoproj.io/instance=dex
Annotations: <none>
API Version: external-secrets.io/v1beta1
Kind: ExternalSecret
Metadata:
Creation Timestamp: 2024-04-18T09:48:36Z
Generation: 1
Resource Version: 51172
UID: 94eb9cd1-310b-4a3d-8574-7ed4b326de5c
Spec:
Data:
Remote Ref:
Conversion Strategy: Default
Decoding Strategy: None
Key: kanidm.dex
Metadata Policy: None
Property: client_id
Secret Key: KANIDM_CLIENT_ID
Remote Ref:
Conversion Strategy: Default
Decoding Strategy: None
Key: kanidm.dex
Metadata Policy: None
Property: client_secret
Secret Key: KANIDM_CLIENT_SECRET
Remote Ref:
Conversion Strategy: Default
Decoding Strategy: None
Key: dex.grafana
Metadata Policy: None
Property: client_secret
Secret Key: GRAFANA_SSO_CLIENT_SECRET
Remote Ref:
Conversion Strategy: Default
Decoding Strategy: None
Key: dex.gitea
Metadata Policy: None
Property: client_secret
Secret Key: GITEA_CLIENT_SECRET
Refresh Interval: 1h
Secret Store Ref:
Kind: ClusterSecretStore
Name: global-secrets
Target:
Creation Policy: Owner
Deletion Policy: Retain
Name: dex-secrets
Status:
Conditions:
Last Transition Time: 2024-04-18T09:48:36Z
Message: could not get secret data from provider
Reason: SecretSyncedError
Status: False
Type: Ready
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Warning UpdateFailed 4m40s (x24 over 109m) external-secrets error retrieving secret at .data[0], key: kanidm.dex, err: secrets "kanidm.dex" not found this is also affecting other deployment as well and for some reasons none of the secrets generated works when trying to login to the deployments woodpecker pre-install-agent-secret-check-jsqrs 0/1 Completed 0 75m
woodpecker woodpecker-agent-5b6945cc7b-8c49l 0/1 CrashLoopBackOff 19 (2m41s ago) 75m
woodpecker woodpecker-agent-5b6945cc7b-nrmmf 0/1 CrashLoopBackOff 19 (2m52s ago) 75m |
|
Well the postscript fails when calling the reset of users with the python k8s client. It doesn't return the expected json payload on the stdout as expected which causes an error on json deserialization.
Manual bash inside the container:
|
Was running into the same JSON decode error on the Ran
Renovate was able to create its own An Oauth2 application was created in Gitea for Woodpecker also. Still not seeing any |
@numpythuckles are you still working on this issue? Ran into the same problem and would appreciate every possible hint. |
getting this issue as well, any progress on it? |
Temporarily created this yaml that I kubectl apply when post-install fails in order to manually create the kanidm.dex The issue still persists though. The post-install errors every time. This temp fix only creates the secret but it does not apply the attributes in the other commands for the function that is failing.
|
Attempting to apply the above results in the following error: |
That's strange. I built and ran this after post-install failed. Did you run it at that point in the process? |
First time I ran it: |
Ah ok, it was there but it was next to the code block indicators so it cut it off. Its fixed. |
Adding |
Yep, as I stated, it is fixed. |
After getting the secrets added, I'm getting this now: |
Thanks for reporting the issues everyone, I think the |
hello @khuedoan
i am a big fan of this and I have been trying to get work like this a week now but I have a little issue trying to make mine work. hoping you could help.
external secret didn't create a secret for dex.
please help
The text was updated successfully, but these errors were encountered: