Restart Server deployment if oidc secret changes #3385
Unanswered
ricardojdsilva87
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello everyone,
Asking here if anyone might have a solution to restart the argocd server deployment upon oidc secret change. It's a particular case and I have already tried to use the checksum annotation to template a secret.
In this case I'm using the following documentation:
https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#sensitive-data-and-sso-client-secrets
Mentioning the secret on the argocd
values.yamlas:Ideally if the secrets were hardcoded here the server deployment would restart due to a change on the configmap using the
checksum/cmhere.But in that case the secrets would be printed in clear text in the configmap.
Those values are created on the helm chart:
To fill out the values of the secret we have integrated the ArgoCD Vault Plugin.
Everything is working and if there is an update on the OIDC configuration, the secret is updated.
The issue here is that even trying to use a checksum similar to the one here like:
Does not detect any drift, because the helm template is done before the secret replacement. In this case the
argocd-secret.yamlwill not change and will always have the following lines set in thevalues.yaml:Asking this because it seems that the Argocd server pods need to be restarted to reload the configuration otherwise the old clientID is used. Using Chart version
7.8.27and argocd version2.13.7.The only way I can see this working would be setting the secrets in clear text directly on the
extra:field. This way the configmap would be changed and the deployment restarted. Also it would imply that the secrets would be on clear text on thevalues.yamlThank you
Beta Was this translation helpful? Give feedback.
All reactions