Replies: 1 comment
-
|
I'm not for hardcoding a Kind, instead we could implement an annotation: |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
We use the sops-secrets-operator in our clusters for historical reasons but also want to use flux's sops decryption feature. However, that is currently not possible because the kustomize-controller tries to decrypt objects of kind
SopsSecretand applies the invalid result to the cluster. I would expect the kustomize-controller to ignore objects it cannot decrypt.I propose to add an option to ignore certain objects kinds for decryption. That allows both secret handling approaches to run in parallel.
A possible solution would be to change the
isSOPSEncryptedResourcecase in DecryptResource to exclude objects with certain annotations or e.g. of kindSopsSecret. If you agree to the proposal or suggest an even better solution I will gladly implement it in a PR.Beta Was this translation helpful? Give feedback.
All reactions