Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: allow KMS encryption of token environment variable #83

Merged
merged 1 commit into from
May 1, 2024

Conversation

jta
Copy link
Contributor

@jta jta commented May 1, 2024

This commit adds support for encrypting the OBSERVE_TOKEN environment variable in transit.

Previously, this module accepted a kms_key_arn variable which affected all environment variables at rest. However, this still exposed the token in different contexts (e.g. AWS Config). We now allow reusing the KMS key to encrypt the variable, which gets decrypted by our lambda as of version v1.0.20240501.

This commit also introduces a subtle API change to the module. We pass in an object, kms_key, rather than a string, kms_key_arn. This is more friendly to the count operator, which cannot determine the value of an attribute until apply time.

@jta jta force-pushed the joao/kms-encryption branch from 408b559 to 3eec858 Compare May 1, 2024 17:29
This commit adds support for encrypting the `OBSERVE_TOKEN` environment
variable in transit.

Previously, this module accepted a `kms_key_arn` variable which affected
all environment variables _at rest_. However, this still exposed the
token in different contexts (e.g. AWS Config). We now allow reusing the
KMS key to encrypt the variable, which gets decrypted by our lambda as
of version `v1.0.20240501`.

This commit also introduces a subtle API change to the module. We pass
in an object, `kms_key`, rather than a string, `kms_key_arn`. This is
more friendly to the `count` operator, which cannot determine the value
of an attribute until apply time.
@jta jta force-pushed the joao/kms-encryption branch from 3eec858 to 4dc6c82 Compare May 1, 2024 19:41
@jta jta merged commit 5d209d5 into main May 1, 2024
16 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants