-
Notifications
You must be signed in to change notification settings - Fork 897
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add second kms
list entry when SOPS file created
#1580
Comments
I think before
But since #1493 change was introduced - that does not work anymore |
Indeed, #1493 broke absolutely necessary behaviour of SOPS. Can it please be reverted? /cc @jonasbadstuebner @felixfontein |
It definitely will not get reverted. Bugs should be fixed, but simply reverting a feature because of one unwanted side-effect is a terrible idea. Could you please explain in more detail what exactly stopped working? I do not have access to AWS KMS so I cannot use the above example to reproduce it. My guess is that deduplication is removing the second key; this also came up during the review of #1493: #1493 (comment) (but unfortunately nobody with AWS knowledge commented there). |
When using KMS, it is often necessary to list the same key multiple times with different parameters, like role as documented above. Deduplication should not be based only on key, but on the full set of parameters. |
I created a potential fix in #1733. This likely also affects the |
Hi folks. My approach to allowing users to create secrets, and then for CI to decrypt and use those secrets, is to allow users to create encrypted files using the
sops
CLI.Users are auth'd using AWS SSO with an AWS CLI profile called
development
.My creation rules in
.sops.yaml
look like this:So when the encrypted file (say,
secrets.yaml
) is created, it looks like this:This is great, but I also need my CI system to decrypt these files. The CI server has an AWS IAM role attached (let's call it
CIServerRole
) with permissions to access the KMS key. My solution at the moment is to manually add anotherkms
list entry like this:I then commit and push this, and the CI server can happily decrypt the file using that IAM role.
I'd rather avoid having to add this manually, due to the toil and possibility of human error. I'd like the
sops
CLI to automatically populate this second "use a role, not a profile" entry to thekms
list. Is this possible using.sops.yaml
?Thanks, and hugely appreciate the awesome work on SOPS!
Aaron
The text was updated successfully, but these errors were encountered: