-
-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ArgoCD w/ SOPS leveraging AWS KMS #165
Comments
Hi, in background, helm-secrets is a wrapper around sops. helm-secrets supports all features that are supported by sops. Checkout https://github.com/mozilla/sops#kms-aws-profiles for integrate sops and AWS KMS. Additionally you need to provide credentials that the sops is authorized to call the AWS KMS keys. In case you are running EKS, I'm recommend using IRSA. You can also provide the environment variable AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY that holds credentials for a valid AWS IAM account. |
I had assumed as much....just things are a bit wonky w/ My ArgoCD referencing a sops encrypted file; one possibility is that I am forced to use the umbrella chart pattern because ArgoCD doesnt support values on a local filesystem/repo; only values within the repository containing the helm chart definition. The umbrella chart pattern allows values to be set on a local filesys/repo More info https://argo-cd.readthedocs.io/en/stable/user-guide/helm/
I have been hoping for this bad boy to close soon argoproj/argo-cd#6280 |
Checkout https://github.com/jkroepke/helm-secrets/blob/main/docs/ARGOCD.md#known-limitations for some workarounds |
this doesnt seem to be working; i have the below for my
is there a way i can debug this further? The below shows the helm plugin installed on the argocd-repo-server
ArgoCD version: Nit: the docs has a third |
In case you have a sops encrypted file with AWS KMS, you can use something like this.
The |
so...this is going to sound weird...but this works if I clone down your repository and add the plugin via
|
I have no idea here, except checkout if the plugin.yaml is equal at the plugin root |
FWIW - I found my issue (plaguing my soul for 3 days) I referenced a helm-secrets version of |
Mention that the age support is available since 3.10.0 |
@jmclean-starburst I am trying to use AWS KMS as well and facing some issues, could you please guide if something is wrong with the setup? The issue is described here #394. Thanks in advance! |
Problem Statement
I am unable to leverage this plugin in its current state while using AWS KMS Keys and SOPS. do you know if there is support for this or am I just leveraging
helm-secrets
incorrectlyhelm secrets version = v3.9.1
Proposed Solution
No response
Environment
Additional information
No response
Acceptance Criteria
No response
The text was updated successfully, but these errors were encountered: