Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(ecs): support secret environment variables #2994
feat(ecs): support secret environment variables #2994
Changes from 19 commits
146f13e
5384d55
bf91871
a0bb714
2a5155b
d697273
d1c31bf
3c75145
a242dca
67b0abe
f8d0efc
f3cb37a
39909d7
43f8244
3a6a374
f300b28
bcc350a
17e0964
d629929
80d4495
199de19
037f9e4
6cca252
aedbbb8
410cfd5
5f5cf12
6298b4d
865d7f2
a2032a6
f27f8c5
File filter
Filter by extension
Conversations
Jump to
There are no files selected for viewing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a bit unnecessarily convoluted I think. Why not just accept an “arn” string here? This will remove the need for SecretProps and the special casing in renderContainerDefintion
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How do you suggest granting read (
secret.grantRead()
orparameter.grantRead()
) to the task execution role inrenderContainerDefinition
? With a.fromArn()
there? (there's no way to import from ARN currently in SSM, works for AWS Secrets)There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It is also possible to do
taskDefintion.obtainExecutionRole().addToPolicy(...)
but I find that duplicating SSM/Secrets read IAM permissions is not a elegant solution...There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Something like that (polymorphism ;-)):
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice