AWS KMS key compatibility - Secrets Manager for Dedicated
## Why are we doing this work AWS KMS support is a requirement for GitLab Secrets Manager on Dedicated and for GA. OpenBao already supports AWS KMS via the [awskms seal configuration](https://openbao.org/docs/configuration/seal/awskms/), which handles auto-rotation and provides better UX compared to static key management. ## Non-functional requirements - [x] Documentation: Update https://docs.gitlab.com/charts/charts/openbao/ with new awskms parameters - [ ] Feature flag: N/A - [ ] Performance: N/A - [x] Testing: One-time validation in live AWS project before merge; rely on upstream coverage for continuous testing ## Implementation plan **OpenBao Helm Chart:** 1. Add `awskms` unseal support to the [OpenBao chart](https://gitlab.com/gitlab-org/cloud-native/charts/openbao/-/blob/93fe206b6e35cb1c68a14b67ed96215725c2f92f/values.yaml#L211) (currently only supports `static`) 2. Expose configuration parameters for AWS KMS seal 3. Document new parameters in chart documentation 4. Validate functionality in live AWS environment before merge **GitLab Environment Toolkit (GET):** 1. Add variable for passing KMS key ID to the chart 2. Configure `awskms` seal through chart values 3. Ensure Geo compatibility (same KMS key across sites) ## Verification steps 1. Deploy OpenBao with AWS KMS seal configuration 2. Verify unsealing works with IAM service account (no AWS credentials needed) 3. Test key rotation handling
issue