-
Notifications
You must be signed in to change notification settings - Fork 517
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changing scramCredentialsSecretName causes resource leak #1074
Comments
This issue is being marked stale because it has been open for 60 days with no activity. Please comment if this issue is still affecting you. If there is no change, this issue will be closed in 30 days. |
Remove stale |
This issue is being marked stale because it has been open for 60 days with no activity. Please comment if this issue is still affecting you. If there is no change, this issue will be closed in 30 days. |
Hi, I'm Dan and I'm the Product Manager for MongoDB's support of Kubernetes. I'm doing some work right now to try and identify how the Community Operator is being used. The Community Operator is something I inherited when I started at MongoDB, but it doesn't get as much attention from us as we'd like and we're trying to understand how it's used in order to establish its future. It will help us prioritize future issues and PRs raised by the community 🙂 Here's a super short survey (it's much easier for us to review all the feedback that way!): https://docs.google.com/forms/d/e/1FAIpQLSfwrwyxBSlUyJ6AmC-eYlgW_3JEdfA48SB2i5--_WpiynMW2w/viewform?usp=sf_link If you'd rather email me instead: [email protected] Thank you in advance! |
What did you do to encounter the bug?
I changed the scramCredentialsSecretName for the same user which created a new scramCredentialsSecret for the same password. The old scramCredentialsSecret is not deleted.
Steps to reproduce the behavior:
scramCredentialSecret
namedmy-scram
:scramCredentialsSecretName
to anything else:What did you expect?
The operator should delete the old
scramCredentialsSecret
for the user if a new secret is created.What happened instead?
The operator creates a new secret with a new name but the old secret is not deleted.
Operator Information
0.7.3
4.4.0
Kubernetes Cluster Information
kubectl version --short --output=yaml
Additional context
It can be observed below that xyzabc-scram-credentials has been created in addition to my-scram-scram-credentials.
Possible root cause and fix
We need some way of identifying a scram credentials secret by the user it was created for.
A naive solution would be to include some information about the user in the secret metadata so that the operator can delete the old secret if it already exists for a user before creating a new one.
The text was updated successfully, but these errors were encountered: