https://github.com/cbyad/kubegcpsec
Generate from local file k8s secrets manifests used by kubeseal to generate sealed secrets
https://github.com/cbyad/kubegcpsec
Last synced: 3 months ago
JSON representation
Generate from local file k8s secrets manifests used by kubeseal to generate sealed secrets
- Host: GitHub
- URL: https://github.com/cbyad/kubegcpsec
- Owner: cbyad
- Created: 2021-08-09T16:48:08.000Z (almost 4 years ago)
- Default Branch: master
- Last Pushed: 2021-08-13T15:34:04.000Z (almost 4 years ago)
- Last Synced: 2025-01-19T13:49:43.545Z (4 months ago)
- Language: JavaScript
- Size: 11.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# GCP_SECRET_GENERATOR
We can store our secrets in **GCP secret manager**. But in order to store secrets safely in a public or private Git repository (gitops), we use Bitnami’s **sealed-secrets** controller and encrypt our Kubernetes Secrets into SealedSecrets. The sealed secrets can be decrypted only by the controller running in our cluster and nobody else can obtain the original secret, even if they have access to the Git repository.
**kubegcpsec** help us to do all of the process easily.# prerequistes
- kubectl
- kubeseal# Features
- Generate from local file k8s secrets manifests used by kubeseal to generate sealed secrets
- Generate from GCP secret manager k8s secrets manifests used by kubeseal to generate sealed secrets [TODO]
- Generate sealed secrets with kubeseal [TODO]# Usage
```bash
kubegcpsec [options]
Options:
-v, --version output the version number
-f, --filename input file with your .json key-value pairs
-n, --name secret name
-N, --namespace your app namespace
-o, --output generated k8s secrets manifest .yaml
-h, --help display help for command
```# First installation (local)
Download project and do :
1. `npm i && npm run build && npm link`
2. Now you can use `kubegcpsec` in your any terminal session# Input Example to supply
```json
{
"SQL_PASSWORD": "password",
"SQL_USERNAME": "azerty",
"SQL_TEST": "azeta",
"SQL_TEST_1": "qwerty",
"SQL_TEST_2": "toto",
"SQL_TEST_3": "qwerty"
}
```