Use sops to store secrets inside the repo securely #30

Open
opened 2025-05-29 20:12:22 +00:00 by GhostPLACEHOLDER · 1 comment

Flux can handle the decryption. It this ensures the secrets are stored with the configuration and we don't need to backup them separately. Even desaster recovery is much easier.

https://fluxcd.io/flux/guides/mozilla-sops/

Flux can handle the decryption. It this ensures the secrets are stored with the configuration and we don't need to backup them separately. Even desaster recovery is much easier. https://fluxcd.io/flux/guides/mozilla-sops/

@earl-warren it seems to be safe to store encrypted secrets in public repo. jenkins infra is doing same, eg:

199109fbd6/hieradata/clients/controller.trusted.ci.jenkins.io.yaml (L37)

@earl-warren it seems to be safe to store encrypted secrets in public repo. jenkins infra is doing same, eg: https://github.com/jenkins-infra/jenkins-infra/blob/199109fbd6dec34c514838d1c49d74a115d4a319/hieradata/clients/controller.trusted.ci.jenkins.io.yaml#L37
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: infrastructure/k8s-cluster#30
No description provided.