-
Notifications
You must be signed in to change notification settings - Fork 20
ci: migrate CI secrets from AWS SSM to Vault KV #1145
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -6,7 +6,7 @@ import * as lambda from 'aws-cdk-lib/aws-lambda'; | |
| import { LayerVersion } from "aws-cdk-lib/aws-lambda"; | ||
| import {ACCOUNT, REGION} from "../config"; | ||
|
|
||
| export const datadogSecretArn = process.env.DATADOG_API_SECRET_ARN!; | ||
| export const datadogSecretArn = 'arn:aws:secretsmanager:us-east-1:425362996713:secret:extension-integration-tests-api-key-PnEPHz'; | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. nit: We may need to document this for future maintenance.
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. yeah, this was an overkill, this wasn't designed with ideal secret manager handling, ideally we'd move this into creation on the project and then cleaning it up, but overall, having a secret in the project is still overkill |
||
| export const extensionLayerArn = process.env.EXTENSION_LAYER_ARN!; | ||
|
|
||
| export const defaultNodeRuntime = lambda.Runtime.NODEJS_24_X; | ||
|
|
||
Uh oh!
There was an error while loading. Please reload this page.