You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Until now (w/ Flux1) we were using sops to decrypt secrets in our repository via a kustomize plugin which called sops directly. Our deployment was configured to use a service account that was bound to a gcp service account via workload identity, which had the permission to decrypt the files.
Now, w/ flux2 we cannot do that anymore because the same pod is used to process our “main” flux and the tenants, and we don’t want our tenants to be able to decrypt our secrets.
Do you think adding first-party support for KMS decryption would be feasible in flux2? sops already supports it, so it should be feasible.
The permission to decrypt or not the secrets would be directly handled by KMS: If the service account used for the Kustomization has the permission it works, otherwise it does not work.
This discussion was converted from issue #440 on November 21, 2020 09:42.
Heading
Bold
Italic
Quote
Code
Link
Numbered list
Unordered list
Task list
Attach files
Mention
Reference
Menu
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Until now (w/ Flux1) we were using sops to decrypt secrets in our repository via a kustomize plugin which called sops directly. Our deployment was configured to use a service account that was bound to a gcp service account via workload identity, which had the permission to decrypt the files.
Now, w/ flux2 we cannot do that anymore because the same pod is used to process our “main” flux and the tenants, and we don’t want our tenants to be able to decrypt our secrets.
Do you think adding first-party support for KMS decryption would be feasible in flux2? sops already supports it, so it should be feasible.
The permission to decrypt or not the secrets would be directly handled by KMS: If the service account used for the Kustomization has the permission it works, otherwise it does not work.
Beta Was this translation helpful? Give feedback.
All reactions