This commit is contained in:
Adrian Utrilla 2019-09-12 19:09:03 +01:00
Родитель 2ccd06317f
Коммит 0c3f543306
1 изменённых файлов: 45 добавлений и 0 удалений

Просмотреть файл

@ -0,0 +1,45 @@
# Publishing files
The `sops publish` command publishes a file to a pre-configured destination.
These destinations typically feed into production systems that consume the
secrets.
Destination configuration resides in the [`.sops.yaml` configuration
file](sops_yaml_config_file.md).
## Publication targets
A variety of publication targets are supported. We make a distinction between
publication targets that manage at-rest encryption themselves and those that do
not.
// TODO this is confusing
// For instance, why is Vault secure enough to store plain text secrets, but S3 isn't?
// After all, S3 encrypts at rest as well, and also has access controls around it.
// I think this might have been designed with the needs of Mozilla in mind.
When the target does not manage encryption itself, SOPS will still be
responsible for keeping the file encrypted. As such, when publishing to these
targets, SOPS offers the option to reencrypt the files with a new set of keys.
Typically, you'd reencrypt the file with keys that only production systems have
access to. Recreation rules are supported in the [`.sops.yaml` configuration
file](sops_yaml_config_file.md).
For targets that manage encryption themselves, SOPS stores the plain-text,
unencrypted data on the target, and the target is responsible for ensuring the
data is stored securely, encrypted at rest and with appropriate access
controls.
### AWS S3
SOPS can publish files to S3 buckets.
?> S3 does *not* manage encryption itself
### Google Cloud Storage
SOPS can publish files to Google Cloud Storage buckets.
?> Google Cloud Storage does *not* manage encryption itself
### Hashicorp Vault