-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Problem when using sops (mozilla/sops) #6
Comments
hmmm interesting, i'll take a look later today |
seemed to work just fine ?
and my secret:
and my
i also didn't have an and then when I don't have > unset AWS_SDK_LOAD_CONFIG
> sops -d test.yml
Failed to get the data key required to decrypt the SOPS file.
Group 0: FAILED
arn:aws:kms:us-east-2:912613430019:key/b6f13696-3e63-4a0d-aa75-d1e89e7e88c3: FAILED
- | Error decrypting key: NoCredentialProviders: no valid
| providers in chain. Deprecated.
| For verbose messaging see
| aws.Config.CredentialsChainVerboseErrors
Recovery failed because no master key was able to decrypt the file. In
order for SOPS to recover the file, at least one key has to be successful,
but none were. |
I think this commit 071f707 and v0.0.3 will not fix your problem at all - but perhaps it might. I'm certainly at a loss for how/what your problem might be, now that the print and cache functions are essentially identical. Without being able to reproduce this issue it's kinda hard for me help. |
Thanks for trying, but unfortunately it behaves exactly the same. The json output I get from running |
what version and distro of sops are you using ? and can you get me an md5 hash of it? |
you should see if using aws-vault fixes this: 99designs/aws-vault#549 |
I have
I then tried the same (latest) version from the sops github releases:
Both exhibit the same behaviour. I'll will give aws-vault a try. |
I've found an issue in AWS SDK for Go lang: try storing the setting for credential_process not in ~/.aws/config file, but in ~/.aws/credentials instead. Although all documentation seems to imply to use the shared config file, it seems the Go credentials providers tries to find the key in the credentials file. Also remember that the credentials file does not use the 'profile ' prefix, so try the following in
|
is only a Go thing as far as i can tell, and is a bit madness. You should find running Since I can't reproduce this, and because this software is being deprecated, I would encourage you to check out https://github.com/99designs/aws-vault/releases/tag/v6.0.0-beta5 -- they support SSO with this release, and much much more, with a much larger group of folks. |
sops works OK without
aws-sso-fetcher
using the AWS environment variables (AWS_ACCESS_KEY_ID
,AWS_SECRET_ACCESS_KEY
,AWS_SESSION_TOKEN
), but when I introduce it, it doesn't.When running with aws-sso-fetcher enabled, I get:
I have the env var
AWS_SDK_LOAD_CONFIG=1
set.aws-sso-fetcher works fine with terraform/terragrunt and other tools I've tested.
My
~/.aws/config
file is:I'm using aws-sso-fetcher version 0.0.2 on Mac OS Catalina.
The text was updated successfully, but these errors were encountered: