Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for custom IV #7

Closed
guitmz opened this issue Mar 29, 2018 · 1 comment
Closed

Support for custom IV #7

guitmz opened this issue Mar 29, 2018 · 1 comment

Comments

@guitmz
Copy link

guitmz commented Mar 29, 2018

While I know that this is debatable, I have some scenarios where I would not like the file to physically change every time I encrypt it.

As example, if I run kubesec encrypt myfile, twice the output is not the same and I would like to have it to be the same.

The use case for this is something similar as git-crypt, where the encryption is deterministic (which is required so git can distinguish when a file has and hasn't changed).

Thanks

@shyiko
Copy link
Owner

shyiko commented Mar 29, 2018

Hi.

I see you filed a similar question in getsops/sops#315.
As kubesec is using the same AES-GCM, everything mentioned in that ticket applies here too.

Once Secret is kubesec encrypted, it supposed to be modified through kubesec edit / kubesec patch only (this will preserve DEK and IVs (each "data" entry has its own)). You could also use kubesec merge to merge (preserving keys) encrypted & unencrypted secrets but I'd advise to stick with edit/patch.

I'm idly pondering the idea of adding support for other ciphers but it's not available yet.

@shyiko shyiko closed this as completed Mar 29, 2018
takuro-yamane pushed a commit to takuro-yamane/kubesec that referenced this issue Oct 19, 2022
- remove root installation
- install according to shell type

Closes shyiko#7
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants