Skip to content

iAnomaly/sceptre-resolver-aws-secrets-manager

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

While AWS CloudFormation templates support the native dynamic references {{resolve:service-name:reference-key}} construct, it only supports a small list of resources notably excluding ones such as CloudFormation::Init and UserData. This resolver bridges that gap.

Please be sure to implement the best practice of adding NoEcho: true on any template parameter containing secrets if you are not already. This prevents exposing the value in the console, CLI, etc.

Installation

pip install --user https://github.com/iAnomaly/sceptre-resolver-aws-secrets-manager/archive/v1.0.0.tar.gz

Usage

Syntax

parameters/sceptre_user_data:
  <name>: !aws_secrets_manager <secret_arn|secret_id>::<SecretBinary|SecretString>::<json_key>

Example

parameters:
  MasterUserPassword: !aws_secrets_manager mysql::SecretString::password
  MasterUsername: !aws_secrets_manager mysql::SecretString::username

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages