Skip to content

[Terraform Credentials] Expirations of multiple credentials (backends, API) in jenkins-infra/terraform-states #5032

@lemeurherve

Description

@lemeurherve

Previous rotation: #4895

A bunch of credentials expires on 08 march 2026 (yes, yesterday :'() in the (private) repository jenkins-infra/terraform-states.

Tip

This private repository manages (using Terraform code) the Terraform State Backend (today using Azure File Share) and project's API tokens (Azure API token for terraform CLI, Cloudflare, DigitalOcean, etc.).


For each credential, we have to:

  • Identify the controller and job(s) using the credential
  • Merge and then apply (manually) the (private) PR which renew the secrets (with a new 3 month expiration date)
  • Update the secret in the Kubernetes Management Chart Secrets for the corresponding Jenkins controller which has the jobs requiring these credentials
    • ⚠️ There is a tedious update process due to how Kubernetes and JCasC work: Sops file update pushed -> kubernetes-management run to change Kubernetes Secret's value -> kubelet updates the symlink -> JCasC reload (triggered by sidecar kiwigrid and/or human) to load in the controller JVM memory -> MB Job scan to load the new value from controller JVM memory to job configuration -> run the job with new value
  • Ensure the job, using the credential, can be run successfully with the new credential

Task list:

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions