-
Notifications
You must be signed in to change notification settings - Fork 63
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SOPS with Multi account AWS account #89
Comments
It would be very nice to be able to switch/assume aws roles like it is possible with the aws provider.
|
We use the following workaround: We edited the encrypted SOPS file directly, adding a copy of the same KMS block with the |
With some research, there's a way to set this from the command line: Instead of
use
(yup, that's really kms+role) This seems to set that role value in the SOPS file, and because I had to debug failed role-assumption, it seems to be binding. qv: https://github.com/mozilla/sops#28assuming-roles-and-using-kms-in-various-aws-accounts |
you could also modify the creation_rules:
- path_regex: secrets.enc.yaml
kms: <KMS_KEY_ARN>+<IAM_ROLE_ARN> |
Team,
We are trying to integrate the SOPS solution with our AWS secret manager using terraform. We have multiple AWS accounts and in one of the accounts, we manage all the secrets(for all of the accounts).
Am trying the following method to push the encrypted secret to the AWS secret manager of the different accounts.
Account A
(using AWS credentials )Account B
).provider.tf
data file:
which is throwing the following error.
I've tried to add the kms_key_id/ key_id into it, but there is no options to do the same.
error:
Is there a way to pass the kms_key_id to decrypt the secret file using data resources?
The text was updated successfully, but these errors were encountered: