-
I would love to be able to do the following and use S3's AES256 server-side encryption with AWS-managed (or customer managed) KMS keys:
```
var settings = Context.CreateUploadSettings();
s…
-
### Terraform Version
v1.1.5
### Affected Resource(s)
Hashicorp Boundary Provider
### Terraform Configuration Files
```hcl
provider "boundary" {
addr = "https://"
recovery_kms_hcl =
-
**Describe the bug**
I'm currently using [hashicorp vault chart](https://github.com/hashicorp/vault-helm) which has image 1.3.2 to install in kubernetes cluster(v1.13.10) using helm (v3.0.3) for HA i…
-
### Issue To Be Solved
Currently the Flow CLI only supports Google KMS.
Example:
```
...
"accounts": {
"admin-account": {
"address": "service",
"key": {
"type": "goog…
-
**Help us help you**
We'd like to know more about
[your Tink deployment](https://docs.google.com/forms/d/1mhHvyNJQgTXFDnqOermB7-BD8GQSyvtFPUAhILRbYcA/).
**Describe the bug:**
When using WebIde…
-
**Describe the bug**
Recentñy we want to change standalone vault to HA mode. To do it, we do the migration with the command of migrate, and the config (migrate-old.hcl):
```
storage_source "s3" {
…
-
**Describe the bug**
We are testing migration from Consul to Raft storage in an Istio-enabled EKS cluster. When running in this configuration, all of the Vault server nodes hang indefinitely on s…
-
### What happened?
I am trying to have all our Pulumi stacks have awskms secretsprovider.
I have found out that instantiating a StackReference requires being able to perform `kms:Decrypt` on the KMS…
-
# AWS Profile not correctly resolving .aws/config file
When attempting to use a profile in a .aws/config file, sops does not properly resolve the credentials. Example sops and .aws config files are…
-
**Describe the bug**
Using AWS KMS as a method to automatically unseal HashiCorp Vault most likely results in unnecessary AWS KMS API calls.
I have 2 Vault instances set up that use AWS KMS as a…