> Note that the test plan requires access to the "Terraform/Infra" AWS account. Contact me if you need access.
- CLI decryption with plaintext! output to stdout:
```
cd services/terraform/remote
sops -d secrets.json
```
- Secrets should be accessible from Terraform:
1. Add example output:
```
lang=terraform
output "my_secret" {
# It must be wrapped in nonsensitive() or TF will output only redacted placeholder
value = nonsensitive(local.secrets["accountIDs.staging"])
}
```
2. Run Terraform:
```
cd services/terraform/remote
terraform apply
```
Should output:
```
Apply complete! Resources: 0 added, 0 changed, 0 destroyed.
Outputs:
my_secret = "123456789012"
```