lizz secret-management gitlab
lizz secret-management gitlab
Configure secret management for GitLab
Synopsis
The secret-management command is used to configure Kubernetes secrets management with Mozilla SOPS. It generates a age key, store the public key in the GitLab fleet repository, and store the private key in a yaml file to apply it.
lizz secret-management gitlab [flags]
Examples
# Configure secret management
lizz secret-management gitlab --owner=<group> --fleet=<fleet repository name>
kubectl apply -f secret.yaml
Options
--fleet string GitLab repository name where to push the application repository
-h, --help help for gitlab
--hostname string GitLab hostname (default "gitlab.com")
--owner string GitLab user or group name
--personal if true, the owner is assumed to be a GitLab user; otherwise a group
--reconcile if true, the configured options are also reconciled if the repository already exists
--team strings GitLab teams to be given maintainer access (also accepts comma-separated values)
Options inherited from parent commands
--author-email string author email for Git commits
--author-name string author name for Git commits (default "Lizz")
--decryption-secret string name of the secret containing the AGE secret key (default "sops-age")
--fleet-branch string Git branch of the fleet repository (default "main")
-o, --ouput string output where to save the secret to apply (default "secret.yaml")
--path string path to the applications yaml file (default "cluster/applications.yaml")
--private-key-file string path to a private key file used for authenticating to the Git SSH server
--timeout duration timeout for this operation (default 5m0s)
--verbose print generated objects
SEE ALSO
- lizz secret-management - Configure secret management