sops-secretsmanager-cdk
v3.2.0
Published
Safely load secrets from sops into secretsmanager using the CDK
Downloads
1,386
Readme
sops-secretsmanager-cdk
Safely load secrets from sops into secretsmanager using the CDK
Usage
import { SopsSecretsManager } from 'sops-secretsmanager-cdk';
...
const ssm = new SopsSecretsManager(this, 'StoreSecrets', {
path: './path/to/secretsfile.yaml',
kmsKey: myKey, // or use kms.Key.fromKeyArn, or omit and use the key in the sops file
secretName: 'TestSecret', // or secret: mySecret
mappings: {
nameInSecretsManager: {
path: ['path', 'to', 'value', 'in', 'secretsfile'],
// optionally pass encoding: 'json' to pass a portion of the secrets file
},
anotherThingInSecretsManager: {
path: ['other', 'path'],
},
// etc
},
});
if(ssm.secret) {
// secret is a Secret you can tag, for example
}
Properties for SopsSecretsManager
secret
andsecretName
- must set exactly one of these- if
secret
, must besecretsManager.Secret | secretsManager.ISecret
- this secret will be populated with the data from the sops file
- if
secretName
, must be astring
- a secret with this name will be created
- if
asset
andpath
- must set exactly one of these- if
asset
, must be as3Assets.Asset
- this asset should contain the encrypted sops file
- if
path
, must be astring
- should point to the encrypted sops file on disk
- if
kmsKey
- optional- must be a
kms.IKey
- the sops file contains a reference to the KMS key, so probably not actually needed
- must be a
mappings
,wholeFile
andsingleValueMapping
- must setmappings
orsingleValueMapping
or setwholeFile
totrue
- if
mappings
, must be aSopsSecretsManagerMappings
- which determines how the values from the sops file are mapped to keys in the secret (see below)
- if
singleValueMapping
, must be aSopsSecretsManagerMapping
- which determines how a single value from the sops file is mapped to the text value of the secret
- if
wholeFile
is true- then rather than treating the sops data as structured and mapping keys over, the whole file will be decrypted and stored as the body of the secret
- if
fileType
- optional- must be
'yaml'
or'json'
if set - tells sops how to decode the file
- will default getting the extension from the filename
- unless
wholeFile
is true, then defaults to'json'
- must be
Mappings
The mappings
property, if given, specifies how to make values from
the structured sops data (json or yaml) to keys in secrets manager.
It takes an object, where:
- the keys are strings determining the target name in Secrets Manager
- the values are objects with keys:
path
, required, an array of strings, pointing to a value in the structured sops dataencoding
, optional,'string'
or'json'
, control how to alter the value found from sops for storage in Secrets Manager
CDK v1 and v2
CDK v2:
import { SopsSecretsManager } from 'sops-secretsmanager-cdk';
// or
import { SopsSecretsManager } from 'sops-secretsmanager-cdk/cdkv2';
CDK v1:
import { SopsSecretsManager } from 'sops-secretsmanager-cdk/cdkv1';
Implementation
Using the CDK's custom resource mini-framework, the sops secrets file is uploaded to S3 as an asset as is, still encoded. The custom resource Lambda then decodes the secrets (in memory, never on disk) and puts them into the SecretsManager secret.
Integration testing
Run the following to deploy a test stack named
SopsExampleStack
. Note that if a stack with this name exists, it
will be deleted:
$ npm run deploy-example
This compiles and uses the code from your working directory, finds an existing customer-managed KMS key, deploys a stack that uses an sample secret, and verifies that the created secret contains the expected data.
Releasing a new version
- (Almost certainly) be on latest main, with no unpublished changes
- Run
npm version (patch|minor|major)
as appropriate - Run
git push
andgit push origin TAG
whereTAG
is the tag thatnpm version
just created
The tag triggers a Github Actions job to publish to npm.