An open API service indexing awesome lists of open source software.

https://github.com/cbyad/kubegcpsec

Generate from local file k8s secrets manifests used by kubeseal to generate sealed secrets
https://github.com/cbyad/kubegcpsec

Last synced: 3 months ago
JSON representation

Generate from local file k8s secrets manifests used by kubeseal to generate sealed secrets

Awesome Lists containing this project

README

        

# GCP_SECRET_GENERATOR
We can store our secrets in **GCP secret manager**. But in order to store secrets safely in a public or private Git repository (gitops), we use Bitnami’s **sealed-secrets** controller and encrypt our Kubernetes Secrets into SealedSecrets. The sealed secrets can be decrypted only by the controller running in our cluster and nobody else can obtain the original secret, even if they have access to the Git repository.
**kubegcpsec** help us to do all of the process easily.

# prerequistes
- kubectl
- kubeseal

# Features
- Generate from local file k8s secrets manifests used by kubeseal to generate sealed secrets
- Generate from GCP secret manager k8s secrets manifests used by kubeseal to generate sealed secrets [TODO]
- Generate sealed secrets with kubeseal [TODO]

# Usage

```bash
kubegcpsec [options]
Options:
-v, --version output the version number
-f, --filename input file with your .json key-value pairs
-n, --name secret name
-N, --namespace your app namespace
-o, --output generated k8s secrets manifest .yaml
-h, --help display help for command
```

# First installation (local)
Download project and do :
1. `npm i && npm run build && npm link`
2. Now you can use `kubegcpsec` in your any terminal session

# Input Example to supply
```json
{
"SQL_PASSWORD": "password",
"SQL_USERNAME": "azerty",
"SQL_TEST": "azeta",
"SQL_TEST_1": "qwerty",
"SQL_TEST_2": "toto",
"SQL_TEST_3": "qwerty"
}
```