Skip to content

Conversation

@kyletbase2
Copy link
Contributor

No description provided.


definitions, task_volumes, secrets = Array.new(3){[]}
secrets_policy = {}
secrets_policy = external_parameters.fetch(:secrets_policy, {})
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@kyletbase2 What's the use case for a custom secrets policy?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Guslington This was for a customer who wanted to retrieve DB credentials from Secrets Manager, and pass it to an ECS task using "ValueFrom" environment variables. Maybe there's a better / supported way to do this, but I couldn't find it.

The AWS docs say this needs to be given to the task execution role (not task role, which afaik is what the iam_policies config modifies.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants