-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
External Configuration/Secret Sources #6
Comments
Hey @RichiCoder1 , do you know the estimated date of this feature? I would love to use AWS App Runner, but can't find a secure way to pass secrets (e.g. DB credentials) to the App Runner instances |
I'm afraid I'm not affiliated with AWS at all, so I have about as much of an answer as you do 😅. However, the ticket is marked as |
Hi, ecs.Secret.fromSecretsManager(secret, field?) |
Hi @atali, |
@atali Not sure whether this is a working workaround because I didn't try it, but isn't it possible to pass the secret ARN as an environment variable to the container and there use the awscli to get the secret value and do something with it, for example put it in the container command execution environment in docker-entrypoint.sh like this: #!/bin/bash
set -euxo pipefail
MY_SECRET_VALUE=$(aws secretsmanager get-secret-value --secret-id $MY_SECRET_ARN --query SecretString --output text)
exec env MY_VARIABLE=$MY_SECRET_VALUE "$@" I believe it should work as long as you have a VPC connector to a VPC with a Secrets Manager VPC endpoint and your task role allows the containers to access Secrets Manager. EDIT: If you have jq installed, you can extract secret values by piping the secret string into jq like this: |
Thank you @adonig , I will give a try. Hopefully the new feature will be available soon. |
Thank you! CDK support now pretty please :) |
This feature is now supported in App Runner. Please visit the What's New announcement that also has links to a deep dive blogpost and developer guide. Thank you all for your feedback and support. |
Yes, the team will work on it next and we will keep you posted on the updates. |
Will the CDK L1 construct support it in the short time because it's automatically generated ? |
Hi @atali, |
Hi @kichik, Here are some usage patterns:
Here are the service methods that you can use to directly add this integration:
|
Can we update bulk secret value in apprunner |
Yes, once Customer updates all the secrets via AWS Secrets Manager and then trigger a single deployment on App Runner, we will be refreshing all the secrets. |
Hello, Do you have an example code that shows to add ssm parameter arn (not ssm secrets) with source "SSM Parameter Store" as an environment variable under AWS CDK? |
Is there a way to trigger auto-reload upon secret updates via CDK? Perhaps we could watch for an event, and then somehow call an API to force-reload? |
Hi @moltar, You can listen to the AWS Eventbridge events and invoke |
Hey, yeah, tried that. But EB events only fire if there is CloudTrail on the account, which is a whole other can of worms 😁 |
@moltar How did you end up fixing this, I have this issue now as well, looking for a way on how to fix it.. |
Community Note
If you are interested in working on this issue or have submitted a pull request, please leave a comment
Tell us about your request
The ability to plug in App Configuration and Secrets from an external source (AWS SSM Parameter Store and AWS Secret Manager as MVP). Essentially the equivalent of ECS/Kubernetes, where you can name a provider, some parameters, and the ability to provide values as either environment variables or files.
Describe alternatives you've considered
Baking in config at build time and building multiple images.
Additional context
Good examples of great experiences today that should inspire (if not straight up use):
It'd be nice to also be able to eventually use Vault transparently, but that might be a strech.
The text was updated successfully, but these errors were encountered: