-
Notifications
You must be signed in to change notification settings - Fork 220
Closed
Description
Hi,
we are using SOPS to encrypt our secrets for various people who are allowed to see them and a single key per target environment. With this usage, it's a bit tedious to add this snippet to every single flux kustomization:
spec:
decryption:
provider: sops
secretRef:
name: sops-keyThe kustomize-controller already knows when something is encrypted with SOPS (
kustomize-controller/controllers/kustomization_controller.go
Lines 726 to 730 in e383818
| if IsEncryptedSecret(u) { | |
| return false, nil, | |
| fmt.Errorf("%s is SOPS encrypted, configuring decryption is required for this secret to be reconciled", | |
| ssa.FmtUnstructured(u)) | |
| } |
.spec.decryption.provider. If the kustomize-controller could add keys from a configured file (perhaps even using the environment variable SOPS_AGE_KEY_FILE), configuring this on every kustomization wouldn't be needed anymore.
All this could be added on top of the current API, so no breaking change and specifying another decryption provider or an additional key source would still be possible.
Thanks for making Flux :)
markussiebert
Metadata
Metadata
Assignees
Labels
No labels