Sekret is a CLI tool to encrypt and edit Kubernetes Secrets. Sekret makes management and deployment for Secret secure and simple.
You can get Sekret with go get.
go get github.com/nownabe/sekretAlso, you can download binaries from GitHub Releases.
curl -sSL -o /path/to/sekret https://github.com/nownabe/sekret/releases/download/v1.1.0/sekret_linux_amd64chmod +x /path/to/sekretsekret command is used following subcommands enc / dec / new / edit.
sekret subcommand [options] filenameThe environment variable ENCRYPTION_KEY is used as the encryption key for all subcommands. Encryption keys must be 16 or 32 bytes. EDITOR variable specifies the editor for new and edit subcommands. Command options can also specify them.
Following commands encrypt secret.yaml and then commit it on Git.
$ export ENCRYPTION_KEY=$(cat /dev/urandom | base64 | fold -32 | head -1)$ sekret enc secret.yaml > secret.yaml.enc$ git add secret.yaml.enc$ git commitEasy to decrypt and apply Secrets.
$ sekret dec secret.yaml.enc | kubectl apply -f -new subcommand creates a new encrypted Secret YAMLs.
$ export EDITOR=vim$ sekret new secret.yaml.encsekret new opens specified editor with the Secret template like following YAML.
apiVersion: v1data: Key: Valuekind: Secretmetadata: creationTimestamp: null name: new-secrettype: OpaqueValues of data must be encoded as base64 in Kubernetes Secrets, but sekret encodes and decodes automatically on opening and saving them. So you can write YAML as completely plain text. If you want to edit as base64, use --decode-base64=false option.
Sekret validates before saving YAML, so it doesn’t save YAML when invalid.
You can edit encrypted Secret YAML like plaintexts with edit subcommand.
$ sekret edit secret.yaml.encsekret edit opens decrypted and base64 decoded YAML in the specified editor. When the editor is closed, it saves encrypted and base64 encoded YAML. Of course, it validates YAML before saving.
Sekret makes lifecycle of Sekret very simple and secure. It is effortless to manage and deploy Secret YAML.