You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
while aws-secretsmanager-get-secrets is great and easy to use, i'm still missing an official "action" to get values from the AWS parameter store - or a flag / method that aws-secretsmanager-get-secrets is also able to access them.
Or is there another simple solution? :-)
The text was updated successfully, but these errors were encountered:
I was about to request the same thing. I've been working on a large-scale multi-tenanted GHA stack using philips-labs/terraform-aws-github-runner, and certain parameters that we wish to "dynamically discover" (e.g. subnet into which Packer builds will launch w/ EBS-builder), and secrets plus this custom action make that possible. However, it's sometimes a pain when some CLI tool needs to work with the secret (i.e. easy to pass masked secrets as CLI args to a CLI tool, but if the tool requires the secret to dynamically injected into a config file, extra steps/hacks are needed). Being able to (via a simple/convenient API like this action) without un-needed masking would be very helpful.
Hi there,
while aws-secretsmanager-get-secrets is great and easy to use, i'm still missing an official "action" to get values from the AWS parameter store - or a flag / method that aws-secretsmanager-get-secrets is also able to access them.
Or is there another simple solution? :-)
The text was updated successfully, but these errors were encountered: