2023-07-18
Secret management improvements
To allow for better management of our Kubernetes secrets, Chris set
out to configure git-crypt in GPG key mode. For comparison, the
previous approach was that secrets were stored in Kubernetes only and
had to be accessed via kubectl, and now git-crypt allows us to
transparently work with the files in unencrypted manner locally, whilst
having them secure on the remote, all via .gitattributes.
The following people currently have access to this:
- Johannes Christ jc@jchri.st
(
8C05D0E98B7914EDEBDCC8CC8E8E09282F2E17AF) - Chris Lovering chris.lovering.95@gmail.com
(
1DA91E6CE87E3C1FCE32BC0CB6ED85CC5872D5E4) - Joe Banks joe@jb3.dev (
509CDFFC2D0783A33CF87D2B703EE21DE4D4D9C9)
For Hassan, we are still waiting on response regarding his GPG key accuracy.
The pull request for the work can be found at python-discord/kubernetes#156.
To have your key added, please contact any of the existing key holders. More documentation on this topic is pending to be written, see python-discord/kubernetes#157.
Infrastructure migration decision
The voting started last week will be properly talked about next week, so far it looks like we're definitely not selfhosting Kubernetes at the very least.