Closed ScottPierce closed 1 year ago
That doesn't make sense. Changing a file without decrypt permission could break the integrity. One solution could be that you create a new team key for the whole team and share it. Maybe you can use a second backend like age to avoid the permission issue.
Then that would mean that anyone who can add a secret, can also decrypt all the secrets. How would that be overcome?
Ok. I agree. Sorry if overread your requirements to add but not to be able to decrypt all values. I'm not sure if it is possible to define different public keys for different attribute regex within a file in the .sops.yaml. You can define regex to associate files to public keys as far as I know, but I guess not for attributes. Sorry.
thank you
I'm trying to create a secrets.json file that can be checked into git. I want for my entire team to be able to add / encrypt a value to the secrets file, but not decrypt a value. We're using Google Cloud to manage access to the encryption key. When I give the
Cloud KMS CryptoKey Encrypter
permission, and run the following command, I get the following error:When I add the
Cloud KMS CryptoKey Decrypter
permission, everything seems to work fine.Is there a way that I can allow people to add things to the file, without requiring that they have permission to decrypt the entire file?