-
Notifications
You must be signed in to change notification settings - Fork 75
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not able to fetch secret from aws secret manager (cross-accounts) #132
Comments
@xval2307 Thanks for reporting! Ahh interesting... so our URL parser is messed up with the last part of your ARN. Would you try adding a redundant and unused port number after your ARN? That would make the URL parser green and it vals would work as expected as it won't use the information provided via the port part for the AWS SecretsManager mode... In other words, try changing this:
to
Notice that I've added |
I'm seeing this problem too. Also, secret names can have forward slashes which could invalidate the workaround. ref+awssecrets://arn:aws:secretsmanager:eu-west-3:ACCOUNT_ID:secret:secret/name/with/slashes#/SECRET_KEY_1 Thanks for you work! |
I'm facing this issue too, If I add the
|
Hi @mumoshu , We hit this bug and workaround isn't working. Is there anything I can do to help fixing ? |
Worked for me. |
It's the same problem for me. Unfortunately, I cannot use"/" at the beginning because of my project limitations. |
I'm also hitting this problem and workarounds aren't working |
Same issue. Given how critical it is, is there some plans to takle this anytime soon ? Else a recommended work around ? This is particularily problematic in situation where there is a cross account access and therefore we need the full arn |
Worked fine for us. We used two AWS accounts in the same region. For cross-account access, a CMK (Customer-managed key) is required to encrypt the secret. Initially, the argocd-repo-server IRSA role was failing with "AccessDenied secretsmanager:GetSecretValue" and "Access to KMS is not allowed" while syncing the argocd application.
|
Hello maintainers,
I try to deploy helm secrets + vals on ArgoCD to fetch secrets from aws secrets manager in another account.
The arn of mysecret on AWS Console is:
arn:aws:secretsmanager:eu-west-3:ACCOUNT_ID:secret:SECRET_NAME
I haven’t “/” in mysecret name.
And if I remove the “/” in the secret path in helm parameter:
I have the following error message in ArgoCD:
[helm-secrets] vals error: expand awssecrets://arn:aws:secretsmanager:eu-west-3:ACCOUNT_ID:secret:SECRET_NAME?region=eu-west-3: parse "awssecrets://arn:aws:secretsmanager:eu-west-3:ACCOUNT_ID:secret:SECRET_NAME?region=eu-west-3": invalid port ":SECRET_NAME" after host Error: failed parsing --set-file data: plugin "scripts/run.sh downloader" exited with error
Could you please confirm if this is really the case or it's a misconfiguration of my side?
The text was updated successfully, but these errors were encountered: