Hello everyone,
I’m currently building an Android Flutter app using a CI/CD pipeline and facing a challenge with securely managing my keystore (.jks) file.
In my setup, I’m storing the .jks file in Google Secret Manager. During the build process, my script fetches the keystore file from Secret Manager and uses it for signing the build. Here’s a summary of my current workflow:
gcloud secrets versions access latest).I want to ensure that this approach adheres to best practices for security and maintainability. Specifically, I’d like to know:
.jks files in CI/CD pipelines?Looking forward to hearing your thoughts and experiences.
Thanks in advance!
Best Regards.,
Karpaga Selvan
This question seems to be a bit dated, but in case it's still relevant: Consider Play App Signing - if you haven't, let Google hold the upload key's production signing key. You only manage the upload key, dramatically reducing the "lose the keystore = lose the app forever" risk.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.