Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Encrypted parameter copying with fluxcd - disable authenticated encryption #1774

Open
nagygergo opened this issue Feb 25, 2025 · 1 comment

Comments

@nagygergo
Copy link

nagygergo commented Feb 25, 2025

Usecase

We're trying to use sops as part of a FluxCD based gitops setup. In this setup, we're trying to mimic the behavior of helm chart values files, where the user doing the deployment of a new application only needs to fill out a Kubernetes Custom Resource we call customer questionnaire, and the data from there is copied into the various appropriate Deployments, Services, Configmaps, Secrets via the Flux kustomize controller. The customer questionnaire also asks for sensitive information pieces like initial passwords, so it needs to be encrypted before committing it to Git.

Problem statement

When the kustomize process inside FluxCD kustomize controller is trying to copy encrypted keys to other files, the decryption procedure fails because during encryption the yaml path of the key is provided as additional authenticated data to the AES cipher, and during decryption, the ciphertext is found in a different file under a different yaml path.

Note: The kustomize controller already uses the --ignore-mac parameter during decryption, so file level integrity checks are not causing an issue with parameter copying.

Solution proposal

Similarly to the --mac-only-encrypted command during encryption, allow for an additional parameter during encryption along the lines of --no-path-enforcement, which would also be stored as part of the sops metadata. The flag would mean that the AES cipher doesn't get any addition authenticated data fed into it during encryption and decryption procedures.

@felixfontein
Copy link
Contributor

I personally don't think this should be supported, since this is reducing security. (Similar to #52.)

Note: The kustomize controller already uses the --ignore-mac parameter during decryption, so file level integrity checks are not causing an issue with parameter copying.

--ignore-mac was only meant as an escape hatch to resolve merging of encrypted files, it was never meant to be used by default. I would consider this a bug in the kustomize controller.

I don't know how flux/kustomize works, but I would suggest to instead of patching encrypted files together, to simply decrypt, combine the files, and then re-encrypt.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants