Skip to content

VaultDynamicSecrets do not revoke lease when associated kubernetes secret is deleted #935

Open
@dcaputo-harmoni

Description

@dcaputo-harmoni

Describe the bug
When the kubernetes secret associated with a VaultDynamicSecret is deleted, the VSO requests a new lease and recreates the secret with the newly leased credentials. But the VSO does not revoke the previous lease before doing so, resulting in orphaned leases. Since the kubernetes secret is the only place that these credentials are used, it is effectively a proxy for the lease - and deleting it should revoke the lease. Or at a minimum, there should be an option to revoke the lease on secret deletion.

To Reproduce
Steps to reproduce the behavior:

  1. Deploy a VaultDynamicSecret
  2. Delete the associated kubernetes secret
  3. A new lease will be obtained and a new kubernetes secret will be created
  4. The previous lease will remain in place

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions