test deleting and recreating konk and konkservice #209
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Secrets created by cert-manager are not owned by the helm chart, so they don't get cleaned up by the helm operator after deleting a
KonkorKonkService. After deleting and recreating aKonk, it will have a new CA, but secrets created by cert-manager signed by the old CA will still exist. cert-manager won't attempt to recreate these until they reach their renewal period. This can result in a bunch of x509/auth errors after trying to delete and recreate a chart that uses konk, because thekubeconfig-certwill be stale.One solution to this is to enable the global cert-manager option
--enable-certificate-owner-ref=true. Note: we already do this in the tests:konk/Makefile
Line 46 in af0da85
Another option would be to not put any ownerReferences on the konk-ca secret, so that it persists across delete/recreate events.
konk/helm-charts/konk/scripts/provision.sh
Lines 98 to 105 in af0da85
https://infoblox.atlassian.net/browse/ATLAS-9946