Secrets for all clusters are stored encrypted in Google Cloud Storage with the keys managed via Google KMS. We use the breglas tool to manage the encrypted information.
There is a command to copy secrets between cluster directories, and a command to apply all secrets for a cluster, thus making it easy to spin up a new cluster.
All commands move the secrets through stdin/stdout, except
edit-secrets.sh which uses a temporary ramdisk to store the files which gets unmounted immediately after editing. In all cases secrets never sit on the developers drive.
add-service-account.sh script emits the full service account email address on stdout, which is useful for scripts that need to do further processing, such as giving that service account access to a specific PubSub topic.
Files are only accessible by members of firstname.lastname@example.org.
To create local credentials that are usable by bergals you should run:
gcloud auth application-default login
Also make sure that the
GOOGLE_APPLICATION_CREDENTIALS environment variable isn't set.
The configuration is stored in
config.sh. If you change the bucket or project you will have to re-run
All secrets are stored as base64 encoded kubernetes secrets serialized as YAML.
Secrets are stored in a sub-directory in Google Cloud Storage, the name of which is the name of the cluster they are used in.
We will use the cluster name
etc as a special cluster name for secrets that aren't used in k8s, but are still secrets we need easy access to, such as the
authorized_keys file we distribute to all the jumphosts.
The GKE cluster names as returned from
kubectl config current-context aren't the normal names like
skia-public that are are used to, so there are helper functions in
config.sh to translate between common names and the values returned from