Remove sourceignore from SOPS guide

No longer needed due to https://github.com/fluxcd/source-controller/pull/329

Signed-off-by: Stefan Prodan <stefan.prodan@gmail.com>
pull/1226/head
Stefan Prodan 4 years ago
parent 719ef3c44c
commit 1ea5d4d2e3
No known key found for this signature in database
GPG Key ID: 3299AEB0E4085BAF

@ -143,23 +143,13 @@ Multiple directories can use separate SOPS configs.
Contributors using the `sops` CLI to create and encrypt files Contributors using the `sops` CLI to create and encrypt files
won't have to worry about specifying the proper key for the target cluster or namespace. won't have to worry about specifying the proper key for the target cluster or namespace.
`encrypted_regex` helps encrypt the the proper `data` and `stringData` fields for Secrets. `encrypted_regex` helps encrypt the `data` and `stringData` fields for Secrets.
You may wish to add other fields if you are encrypting other types of Objects. You may wish to add other fields if you are encrypting other types of Objects.
!!! hint !!! hint
Note that you should encrypt only the `data` or `stringData` section. Encrypting the Kubernetes Note that you should encrypt only the `data` or `stringData` section. Encrypting the Kubernetes
secret metadata, kind or apiVersion is not supported by kustomize-controller. secret metadata, kind or apiVersion is not supported by kustomize-controller.
Ignore all `.sops.yaml` files in a [`.sourceignore`](../components/source/gitrepositories#excluding-files)
file at the root of your repo.
```sh
touch .sourceignore
echo '**/.sops.yaml' >> .sourceignore
```
You can now commit your SOPS config.
## Encrypt secrets ## Encrypt secrets
Generate a Kubernetes secret manifest with kubectl: Generate a Kubernetes secret manifest with kubectl:

Loading…
Cancel
Save