SOPS
Mozilla SOPS for encrypting secrets in config files. Supports AWS KMS, GCP KMS, Azure Key Vault, and PGP.
41 commands
Browse by Topic
Install SOPS (macOS)
Install SOPS secrets manager using Homebrew on macOS
Check SOPS version
Verify SOPS installation and display version info
Install SOPS (Go)
Install SOPS using Go on any platform with Go installed
Encrypt file with age
Encrypt YAML file using age key.
Encrypt in place
Encrypt file in place.
Encrypt with AWS KMS
Encrypt using AWS KMS key.
Encrypt specific keys
Encrypt only matching keys.
Encrypt JSON
Encrypt JSON file.
Encrypt with GCP KMS
Encrypt using Google Cloud KMS.
Encrypt with Azure Key Vault
Encrypt using Azure Key Vault.
Encrypt with multiple keys
Encrypt for multiple age recipients.
Exclude keys from encryption
Leave matching keys unencrypted.
Encrypt .env file
Encrypt a dotenv file.
Decrypt file
Decrypt YAML file.
Decrypt to stdout
Decrypt and print to stdout.
Extract specific key
Extract single value from encrypted file.
Decrypt in place
Decrypt file in place.
Decrypt and run as env vars
Decrypt and pass as environment to command.
Decrypt and run with temp file
Decrypt to temp file and pass to command.
Decrypt for piping
Decrypt and pipe to another command.
Edit encrypted file
Open encrypted file in editor.
Edit with specific editor
Edit using specific editor.
Set single value
Set a specific value without opening editor.
Edit and rotate keys
Rotate data key while editing.
Edit with VS Code
Edit using VS Code as editor.
Rotate data key
Rotate the data encryption key.
Add new key
Add a new age key to file.
Remove key
Remove an age key from file.
Generate age key
Generate new age keypair.
Add KMS key to file
Add an AWS KMS key to encrypted file.
Remove KMS key from file
Remove an AWS KMS key from file.
Set SOPS_AGE_KEY_FILE
Set age key file path via env var.
Rotate data key in place
Rotate and write data key in place.
Create .sops.yaml
Example .sops.yaml configuration.
List key groups
Show key groups for encrypted file.
Exec with decrypted env
Export decrypted values as environment.
Multiple creation rules
Different keys per environment path.
Key groups with threshold
Require N of M keys to decrypt.
Encrypted regex in config
Encrypt only secret keys via config rule.
Publish to Vault
Publish decrypted secrets to HashiCorp Vault.
Show file metadata
Show encryption metadata of a file.
Discussion
Loading comments...