feat: wire WOODPECKER_ENCRYPTION_KEY through Terraform #102
No reviewers
Labels
No labels
domain:backend
domain:devops
domain:frontend
status:approved
status:in-progress
status:needs-fix
status:qa
type:bug
type:devops
type:feature
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
forgejo_admin/pal-e-platform!102
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "99-feat-wire-woodpecker-encryption-key-thro"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Summary
woodpecker_encryption_keyas a terraform-managed sensitive variable so the Woodpecker encryption key survives CNPG database migrationsset_sensitivein the Helm release, matching existing secret patternsTF_SECRET_VARSand Woodpecker CI pipeline environment for plan/apply stepsChanges
terraform/variables.tf: addwoodpecker_encryption_keyvariable (sensitive string)terraform/main.tf: addset_sensitiveblock forserver.env.WOODPECKER_ENCRYPTION_KEYin the Woodpecker helm_releaseMakefile: addwoodpecker_encryption_keytoTF_SECRET_VARSfor Salt pillar rendering.woodpecker.yaml: addTF_VAR_woodpecker_encryption_keyto both plan and apply step environmentsTest Plan
tofu fmt -check -recursivepassestofu validatepasses (no syntax errors)tofu planshows only Woodpecker helm_release changingNote: The actual secret value must be added to Salt pillar (
salt/pillar/secrets/platform.sls) separately by the operator.Review Checklist
Related
todo-woodpecker-secrets-terraformReview: LGTM
4 files changed, +18/-1 -- minimal, focused diff.
Verified
terraform/variables.tf: newwoodpecker_encryption_keyvariable is sensitive, placed logically afterwoodpecker_agent_secretterraform/main.tf:set_sensitiveblock follows existing pattern (matches lines 755-777), correctly targetsserver.env.WOODPECKER_ENCRYPTION_KEYMakefile:TF_SECRET_VARSextended with proper line continuation.woodpecker.yaml: env var added to both plan and apply steps,from_secretformat matches all existing entriestofu fmt -checkpassestofu validatepasses (no syntax errors)Operator Action Required Post-Merge
Add
woodpecker_encryption_keyto Salt pillar (salt/pillar/secrets/platform.sls) and create the Woodpecker CI secrettf_var_woodpecker_encryption_keybefore the next CI run.