You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
When importing a privateKeySecret generated by Kustomize on a new OnionService, the controller creates a new secret based on the name provided and so the hostname is random.
It is due to Kustomize which append a suffix hash to the secret name, while the Tor Controller is not aware of the new name.
Describe the bug
When importing a
privateKeySecret
generated by Kustomize on a newOnionService
, the controller creates a new secret based on the name provided and so the hostname is random.It is due to Kustomize which append a suffix hash to the secret name, while the Tor Controller is not aware of the new name.
To Reproduce
The Tor Controller creates the secret
onion-secrets
with 5 entries (Tor v2&v3), while Kustomize creates the desired secretsonion-secrets-52gc9c9ccd
.kubectl -n test get secrets onion-secrets tor.k8s.torproject.org/onion-v3 5 15m onion-secrets-52gc9c9ccd tor.k8s.torproject.org/onion-v3 3 14m
By using the Kustomize
disableNameSuffixHash
config, it is woking as expected, such as using the hashed name on the OnionService definition.Expected behavior
When using a Kustomize defined secret, the Tor Controller should use it automatically with the suffix hash.
Additional information
System (please complete the following information):
Additional context
The text was updated successfully, but these errors were encountered: