Is it unreasonable to store a secret in InlineManifests #11238
Unanswered
nickdavies
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I am just starting out with talos linux and I was wondering if it would be considered bad practice (and if so why) for me to patch a secret that I need for bootstrapping the cluster (eg the flux github private key or my 1password-connect auth keys) into my machine config?
I was planning on doing something like:
The content of
flux-secret.yaml
would look something like:and similar for the 1password one where I store the credentials for setting up
onepassword-connect
to talk to the 1password API andexternal-secrets
operator to talk toonepassword-connect
.This feels tempting because it means I can have a single step bootstrap but I want to make sure this isn't a terrible idea from a security perspective.
I saw in #9288 it looks like you can download the spec back again, would that include these secrets that I am sending and if so who is allowed to make that API call?
Beta Was this translation helpful? Give feedback.
All reactions