Get values from SecretsManager during Pipeline stages #2104
Unanswered
davivcgarcia
asked this question in
Q&A
Replies: 2 comments 2 replies
-
It would be great if the environment variables/secrets defined in service manifest passed on to the build environment. |
Beta Was this translation helpful? Give feedback.
2 replies
-
Hey @davivcgarcia ! You can actually attach the additional policy via. the build.additional_policy field: build:
additional_policy:
PolicyDocument:
{
“Statement": [
{
"Action": ["secretsmanager:GetSecretValue"],
"Effect": "Allow",
"Resource": "*"
}
],
"Version": "2012-10-17"
} Thank you for bringing this up - we probably just forgot to close #1689 😅 . Hope this helps! |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I would like to have the Build stage (CodeBuild) getting values from SSM/ParameterStore or SecretsManager. The reason is to handle authentication on Docker Hub and overcome the recent rate limiting applied to anonoymous pulls, without exposing sensitive data in the CodeBuild spec files.
For that I understand that we need to have specific IAM permissions added to CodeBuild, such as
ssm:GetParameters
orsecretsmanager:GetSecretValue
, and then use the structure below in thebuildspec.yaml
:However, looks like this customization is not yet supported with
copilot
(#1689).What is the recommended way for doing that? Is that feature in the roadmap?
Beta Was this translation helpful? Give feedback.
All reactions