Skip to content

Commit

Permalink
various: Update links for sops move to new org
Browse files Browse the repository at this point in the history
Sops is now a CNCF Sandbox project and has moved out of the Mozilla
github organization to its own, https://github.com/getsops
  • Loading branch information
Zash committed Oct 12, 2023
1 parent e06aebb commit b4d78f9
Show file tree
Hide file tree
Showing 4 changed files with 6 additions and 6 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ The apps are installed using a combination of helm charts and manifests with the
- [helm-diff](https://github.com/databus23/helm-diff) (tested with 3.5.0)
- [helm-secrets](https://github.com/futuresimple/helm-secrets) (tested with 3.12.0)
- [jq](https://github.com/stedolan/jq) (tested with jq-1.6)
- [sops](https://github.com/mozilla/sops) (tested with 3.7.3)
- [sops](https://github.com/getsops/sops) (tested with 3.7.3)
- [s3cmd](https://s3tools.org/s3cmd) available directly in Ubuntus repositories (tested with 2.0.1)
- [yq4](https://github.com/mikefarah/yq) (tested with 4.26.1)
- [pwgen](https://sourceforge.net/projects/pwgen/) available directly in Ubuntus repositories (tested with 2.08)
Expand All @@ -85,7 +85,7 @@ See [DEVELOPMENT.md](DEVELOPMENT.md).

### :closed_lock_with_key: PGP :closed_lock_with_key:

Configuration secrets in ck8s are encrypted using [SOPS](https://github.com/mozilla/sops).
Configuration secrets in ck8s are encrypted using [SOPS](https://github.com/getsops/sops).
We currently only support using PGP when encrypting secrets.
Because of this, before you can start using ck8s, you need to generate your own PGP key:

Expand Down
4 changes: 2 additions & 2 deletions bin/common.bash
Original file line number Diff line number Diff line change
Expand Up @@ -469,7 +469,7 @@ sops_encrypt_stdin() {

# Encrypt a file in place.
sops_encrypt() {
# https://github.com/mozilla/sops/issues/460
# https://github.com/getsops/sops/issues/460
if sops_check "${1}"; then
log_info "Already encrypted ${1}"
return
Expand All @@ -487,7 +487,7 @@ sops_decrypt_verify() {
exit 1
fi

# https://github.com/mozilla/sops/issues/460
# https://github.com/getsops/sops/issues/460
if ! sops_check "${1}"; then
log_error "NOT ENCRYPTED: ${1}"
exit 1
Expand Down
2 changes: 1 addition & 1 deletion pipeline/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ RUN wget --progress=dot:giga "https://github.com/yannh/kubeconform/releases/down
# sops
# NOTE: This needs to be installed before the helm-secrets plugin.
ENV SOPS_VERSION="3.7.3"
RUN wget --progress=dot:giga "https://github.com/mozilla/sops/releases/download/v${SOPS_VERSION}/sops-v${SOPS_VERSION}.linux" && \
RUN wget --progress=dot:giga "https://github.com/getsops/sops/releases/download/v${SOPS_VERSION}/sops-v${SOPS_VERSION}.linux" && \
install -Tm 755 "sops-v${SOPS_VERSION}.linux" /usr/local/bin/sops && \
rm "sops-v${SOPS_VERSION}.linux"

Expand Down
2 changes: 1 addition & 1 deletion roles/get-requirements.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@
dest: "{{ install_path }}/jq"
- command: sops
version: "{{ sops_version }}"
url: https://github.com/mozilla/sops/releases/download/v{{ sops_version }}/sops-v{{ sops_version }}.linux
url: https://github.com/getsops/sops/releases/download/v{{ sops_version }}/sops-v{{ sops_version }}.linux
dest: "{{ install_path }}/sops"
- command: yq
version: "{{ yq_version }}"
Expand Down

0 comments on commit b4d78f9

Please sign in to comment.