sealed-secrets icon indicating copy to clipboard operation
sealed-secrets copied to clipboard

Using sealed-secrets without controller/operator

Open torbenaa opened this issue 1 year ago • 2 comments

I am running my workload on an openshift platform, and I cannot install the controller ( RBAC roles insufficient ).

Are there any supported ways of doing pipeline decryption of sealed secrets ? My gitlab runners could potentially execute 'kubeseal --recovery-unseal ....' during deployment - but I am not sure of this is the best way to go ?

Thanks !

torbenaa avatar Jan 14 '24 09:01 torbenaa

Hi!

I don't think sealed-secrets is the way to go for your specific use case then, I'd say you should use a normal asymmetric encryption program (e.g openssl) with the public key given to devs to seal their keys and the private key stored on your gitlab instance

mohamed-essam avatar Jan 26 '24 12:01 mohamed-essam

I totally understand - but using openssl or simular to do encryption leaves me with a big chunk of unidentifyable data. I really like the format of the sealed secret :)

Is there any real pitfalls in using kuberseal --recovery-unseal as above ?

torbenaa avatar Feb 09 '24 13:02 torbenaa

Hi @torbenaa using --recovery-unseal is a possibility.

However, we don't normally encourage this option since you'll need to provide kubeseal with the private key. In normal conditions is always better to keep the private key only in the cluster and avoid exposing yourself to a possible key leak.

So, the advice is, use it with caution! Regards

agarcia-oss avatar Feb 29 '24 10:02 agarcia-oss