Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit7b01ef3

Browse files
committed
Update secrets.md
1 parent7aa4f67 commit7b01ef3

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

‎_docs/security/secrets.md‎

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,25 +9,25 @@ toc: true
99

1010
Codefresh provides out-of-the-box management for secrets, generally to store secrets for third-party integrations.
1111

12-
For secure secret storage, every Codefreshruntime uses the[Bitnami Sealed Secrets controller](https://github.com/bitnami-labs/sealed-secrets){:target="_blank"} behind the scenes.
13-
This controller is installed as part of theruntime and automatically managed by Codefresh.
12+
For secure secret storage, every CodefreshGitOps Runtime uses the[Bitnami Sealed Secrets controller](https://github.com/bitnami-labs/sealed-secrets){:target="_blank"} behind the scenes.
13+
This controller is installed as part of theRuntime and automatically managed by Codefresh.
1414

1515
##How Sealed Secrets work
1616

1717
Sealed Secrets are based on[public/private key encryption](https://en.wikipedia.org/wiki/Public-key_cryptography){:target="_blank"}. When the controller is installed, it gets a public and private key. The private key stays within the cluster. The public key can be given anywhere to encrypt secrets.
1818

1919
Any kind of secret can be encrypted with the public key (also via the`kubeseal` executable), and then passed to the cluster for decryption when needed.
2020

21-
For GitOps applications, encryption for secrets is critical, as it means that youcan commit any kind of secret in Git as long as it isencrypted.
21+
Codefresh handles Sealed Secrets at the level of the account, meaning that youneed to create a Sealed Secret for an integration once, and it isthen available to all clusters managed in the account. To ensure maximum security, only the ConfigMap with the public key of the SealedSecret is commited to Git.
2222

23-
Here's the event flow for Sealed Secrets:
2423

25-
1. A secret is encrypted by an operator and/or developer with the`kubeseal` executable.
26-
1. A custom Kubernetes resource called SealedSecret is created.
27-
1. The secret is committed in Git.
28-
1. During application deployment, the Codefresh runtime applies this secret to the cluster.
29-
1. The Sealed Secret controller identifies the Sealed Secret object and decrypts it using the private key of the cluster.
30-
1. The Sealed Secret is converted to a[standard Kubernetes secret](https://kubernetes.io/docs/concepts/configuration/secret/){:target="_blank"} inside the cluster.
24+
Here's the event flow for Sealed Secrets in GitOps:
25+
1. The operator or developer creates an encrypted secret with the`kubeseal` executable.
26+
1. Codefresh creates the`SealedSecret` custom Kubernetes resource.
27+
1. Codefresh also creates another Kubernetes resource, the`ConfigMap` containing the public key of the`SealedSecret`.
28+
1. The`ConfigMap` resource is committed to Git.
29+
1. When required for an application or a resource, the Sealed Secret controller identifies the Sealed Secret object and decrypts it using the private key of the cluster.
30+
1. The Sealed Secret is converted to a[standard Kubernetes secret](https://kubernetes.io/docs/concepts/configuration/secret/){:target="_blank"} within the cluster.
3131
1. It is then passed to the application like any other secret, as a mounted file or environment variable.
3232
1. The application uses the secret in its decrypted form.
3333

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp