Compare commits
4 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
6155787b59
|
|||
| b6904e4ed2 | |||
| 118baa38f8 | |||
| cab241a96e |
@@ -1,12 +1,16 @@
|
|||||||
FROM alpine:latest
|
FROM alpine:3.22.2
|
||||||
|
|
||||||
ARG USER="user"
|
ARG USER="user"
|
||||||
|
|
||||||
RUN apk add --no-cache kubectl gpg bash && \
|
RUN apk add --no-cache kubectl gpg gpg-agent bash curl helm && \
|
||||||
addgroup $USER && \
|
addgroup $USER && \
|
||||||
adduser -G $USER -D $USER
|
adduser -G $USER -D $USER
|
||||||
|
|
||||||
|
COPY decrypt-secrets.sh /usr/local/bin/
|
||||||
|
|
||||||
USER $USER
|
USER $USER
|
||||||
WORKDIR /home/$USER
|
WORKDIR /home/$USER
|
||||||
|
|
||||||
|
RUN gpg -k
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
21
decrypt-secrets.sh
Executable file
21
decrypt-secrets.sh
Executable file
@@ -0,0 +1,21 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
#
|
||||||
|
# Set the environment variable GPG_PASSPHRASE
|
||||||
|
# Pipe the encrypted data and
|
||||||
|
# - redirect the output into the destination file or
|
||||||
|
# - directly eval the output, in this case make sure ONLY variable definitions are in the file
|
||||||
|
#
|
||||||
|
# The second option would be
|
||||||
|
# eval "`cat secrets.asc | ./decrypt-secrets.sh`"
|
||||||
|
#
|
||||||
|
# To create the encrypted file use
|
||||||
|
# gpg --symmetric --cipher-algo AES256 --armor --output secrets.asc secrets.txt
|
||||||
|
# where secrets.txt is the cleartext file and secrets.asc will be the encrypted file.
|
||||||
|
# Make sure to use a good passphrase, make sure to store the passphrase safely.
|
||||||
|
#
|
||||||
|
# Adding the encrypted file secrets.asc to a source code repository is secure.
|
||||||
|
#
|
||||||
|
|
||||||
|
|
||||||
|
gpg --decrypt --passphrase $GPG_PASSPHRASE --yes --batch --homedir /tmp/.gnupg --output -
|
||||||
Reference in New Issue
Block a user