-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move secret out of Lamba function #20
Comments
I would vote against this idea. We can already decide how we want to pass the secrets via the parent module. Some people may want to pass them as env vars or use another secrets store (vault, gcp etc). To me it seems like this would remove all of those options. |
Considering the password sits on all of your endpoints unencrypted, I would think it being accessible from your aws console / terraform state would be the least of your worries if you have actual things to protect in there. |
Thats a valid point. This is cut from a large piece of the module but you could see where you could pull the password from and pass it to the
|
I put together a variation of this module that moves the secret from sitting in plain text in the lambda function to amazon secrets-manager. Since this is a decent sized change in architecture I was curious if you would be interested in a PR or not.
The text was updated successfully, but these errors were encountered: