Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

decrypt SOPs encrypted yaml file via AWS KMS #446

Closed
yalattas opened this issue Apr 5, 2024 · 2 comments
Closed

decrypt SOPs encrypted yaml file via AWS KMS #446

yalattas opened this issue Apr 5, 2024 · 2 comments
Labels
enhancement New feature or request Stale

Comments

@yalattas
Copy link

yalattas commented Apr 5, 2024

Problem Statement

I have files encrypted with SOPs and AWS KMS and stored in git. Locally, I can decrypt the files while having AWS CLI configured with a user that have sufficient privilege to do decrypt on a specific key in KMS

.sops.yaml

creation_rules:
  - filename_regex: '.*/secrets\.y(a)?ml$'
    kms: 'arn:aws:kms:REGION:12345678912:alias/APP-sops'

I want to allow ArgoCD to use IAM Role with ServiceAccount to decrypted the file using the same key that encrypted it at the first place. Therefore, I must have

  1. IAM role allowed to decrypt
  2. K8s ServiceAccount allowing pod to assume a role
  3. KMS key alias configured in ArgoCD to know which key to use
sources:
    - repoURL: https://company.com/chart
      chart: nginx
      targetRevision: 1.2.3
      helm:
        parameters:
          - name: KEY
            value: VALUE
        releaseName: SOMETHING
        valueFiles:
          - $values/nginx/values.yaml
          - secrets://$values/nginx/secrets.yaml

encrypted yaml will look like below

argocdServerAdminPassword: ENC[AES256_GCM,data:123+abc+def/something,iv:123/abc/efg/E=,tag:abc==,type:str]

and decrypted file before ArgoCD render it must be plaintext

argocdServerAdminPassword: weakpassword

Then ArgoCD can handle it and provision the resources. I saw the following message in documentation and not sure if it means that helm-secrets can't support this

https://github.com/jkroepke/helm-secrets/wiki/ArgoCD-Integration

Proposed Solution

No response

Environment

  • Helm Version:
  • Helm Secrets Version:
  • OS:
  • Shell:

Additional information

No response

Acceptance Criteria

No response

@yalattas yalattas added the enhancement New feature or request label Apr 5, 2024
@jkroepke
Copy link
Owner

jkroepke commented Apr 6, 2024

helm-secrets support IAM Roles for service account, but this syntax secrets://$values/nginx/secrets.yaml isn't supported by ArgoCD

Copy link
Contributor

github-actions bot commented May 7, 2024

This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days.

@github-actions github-actions bot added the Stale label May 7, 2024
@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale May 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request Stale
Projects
None yet
Development

No branches or pull requests

2 participants