Secrets in GCS
This document describes how to set up Spinnaker secrets in a GCS bucket.
Spinnaker supports separating your secrets from your configs through end-to-end secrets management. Simply replace secrets in your config files with the syntax described here, and Spinnaker decrypts them as needed at start time.
To reference secrets in configs, use the following general format for secret literal values, like passwords and tokens:
encrypted:<secret engine>!<key1>:<value1>!<key2>:<value2>!...
To reference secret files like kubeconfig files the syntax is:
encryptedFile:<secret engine>!<key1>:<value1>!<key2>:<value2>!...
The key-value parameters making up the string vary with each secret engine. Refer to the specific documentation for each engine for more information.
For instance, if you replace the GitHub token in your config with an encrypted syntax:
...
github:
enabled: true
accounts:
- name: github
token: encrypted:<secret engine>!<key1>:<value1>!<key2>:<value2>!...
...
Spinnaker will read these secrets at start time.
The secrets framework is extensible and support for new engines can easily be added. Currently the following is supported:
Google Secrets manager is also supported though not at this time documented. You can see the code and translate it to a supported format.
This document describes how to set up Spinnaker secrets in a GCS bucket.
This document describes how to set up Spinnaker secrets in a Google Secret Manager.
This document describes how to set up Spinnaker secrets in an encrypted S3 bucket.